💾 Archived View for clemat.is › saccophore › library › ezines › 2600 › 2600_2-9_djvu.txt captured on 2021-12-03 at 14:04:38.
-=-=-=-=-=-=-
.2600 SEPTEMBER, 1985 vot OMf TWO. MJMliLR S'MF. JMtt ft IWMij^ul I? finlrxpriww Ini., an ■ ■'mii.oYTi.-Y iiisniir-.il mi Sulr-jr-ipn-fi ntlri fl 3—1 ywr, ltd Old _al IB f mr, uar|Kinlr t> per Met iv-u: Oi-rruv 7JU i »- fr I fcli™ irfcwnipliim r m. Cflipfltni! iponsorshgt S240U. Make Checks (MVJhfc «. 3HX| EiWiiiii hi. 2"' W'-nlr I'.-H H(ii7J!. M.ddki Mini. NY I ISjWnn S.ia)m)« ULUS; Wl ViMijl ISSM: OM-m I. Write I* P.O. fat Middle Wand. NY I ITOdJhi! Air utwriuh-i nip end urtrClc . a guide to VMS by Ley. Lathor nnd The Lefinn of IThiHiiu.'UukeH . he VAX ls rnjoc hy DLCvlJiRiU'. L'.^c.prrcnt t'orpi nnd Lin tun a vAficiyol operating suit cm 5. In this article, ] will calk about Ibe VMS; fVinnal Mtnroiy ojKratinp Sy-slem). When ynu first wudfCl with a VAX you type cMlLCr h icLum, a ctrl-c, nr a Clrl-y, Jt will Ihcn icipund wilb surm. lh.ihK similar rue LOD RECURSIVE SYSTEMS INC. VMS V4.0 LI untune: FMWrfOrft Tb: mosL rwieLin w.iy of gaining jcmm, 10 a computer system & uy dung a 'default 'Vnum ■ cuvsworc., Inlh .sexampleyon nay try L.flL'Jasllw nsci iiuiue vmJ RECURSIVE ns che password ora comtstitdion of wptfJo lit Ihe uptnnik banner (iflhsrie is nrej which may allow ynu access, orherwiso year w.l| hAW 1.0 ir. the llGFAI.il T M£YHOL>af «iic>. The writon listed above (Vd.O) ^ Lbc litcsi versimi In inv kupwMteof V W5, The rciOrcwLdely trsed vcnicei llu.1 1 hive seen. O V3.7. W/hm DEC belli a VAX.'YMS, che system cocoes equ.ppetf wish 4 neeotfl'b which are: DEFAULT — Tbis sop-vs as a hcnplatc Ln creating a sc ncc cads in Ihe EJAF (C.'sei' AjlbacbraLiun File). A nrwusei record is assigned Ihe values af she Db GAULT TBCord euoejrl Where che eysreru psar-ager cMnjjfa ilvo* volncv. The DEFAULT cord on n he muddied Nil GW not be dele led fYoin elm DAT. VSi'l KM — Provide* a iiWdiib tor lbc syslaii iroiriiger Id, Log in with fall privilege* the SYSTEM retortl Unn be modified be.1 cannot be deleted frnrr.lh! UAK. hi t!LL> — Tenrijls DIGITAL lirld sep'ke ye.rsur.Tel to check cal a n:w ay;.sftrii, The FIELD totord -rani H deled cd dnee the system :« installed. S-TS-TEST — Frrwides nn npproptinie environmenr fey fiinriink the User Knv iron merit Te*| Fu-iia^e (Ut'ETj. Tbc SYa-TK-jT m.Tund tau be deleted once Ihe system as installed. Useally (he 3YS-TEM MAh ACpRK neliju, (Slete*. Aiid cvi (Kl ■ d i o*- iliftC rtvonhs which nee in che ilAF wliti'i pye jyjieffl *fliftW. IhiO climinuLatK Ihe default ]d;wwtw$5, NH Chie -4 (Wl IbJG in all Ciats. The 'default' pfts* words iTrStl ] have f'Uxrx! to wort arc: L,aefiiMrrt¥i Password; SYSTEM MANAGER or OPERATOR bTELD SERT'ICE lie TEST DEFAULT USERdtlYEKAELT SYSTEM UEiVneSYSiKST (Itfien lypitdt] VMS aetorjnli am: VAX VAX VMh VSfJN DCL DCI. tSKMO l>K«0 TGvT TEST HELP HELP NEWS GV1ST m'ESJT gamis games decnet decnet Or n couihinai top oJ the various usernames ami ^uveruciiv. if pom of cnesa per yon. ip. ihcrl you sIiduIiI :neve up to Ibc next system unless you have a way id pen F iImi i esi'tms swords, like Tcom trashing, stealing pajaweedodireei ty, or by seme olber means. You will krj-jw L.'iil you nre in hy i ec*,v.ng ihrproiil.pl Ol AdOlNr sipu “i’. Yuti will be popped into the ckSkult dicR:lory whieh is dependunl on whal account y NO a to legged ilia*. If you km in asthe system managrr.you have fudlnecess. If yOojjct irsonlbc field or sysleas acco lines yanmiy nr n aynoi have tail ucevss bill yutt will have che privileges cw give yourself full apeovi. 10 give- pcivilfijjes 1o you eve If: S SIT PROCESS ; Pt? I VS=AJ.-L Ooce you have litll priys, you (=*-■! aiXO:-; arfdiiMWfy And i nv Tc'c, and also ■in che AllTFIOftlEE program whkfc »itS be explained. The VMS system hi* full Iklf liksavnilable by typing tEELT. Yuucan use the wibteird fharaecer (if iw lisl out info on every eurrmaud: S ITEL.P ¥ . Wliri you lint lu£un, it may be ca sour .idv.iiicave to get a lisc'uf nil hiKCs C urcrnlly logged onto the system, if there pre *ny At all, You CSMi du Ibis by: S SEIQO.' USEKS. Then you ohowM get jOmelhmijj like thi-. VAA/VMb InSrrui-His v U*«n -TolkL IH-MAY-I-W5 11:3721 JJ Ol h AU moj TXEtt 1 X 11:1 DEMO LAWftHNLL nmi rWYLYSVb UUMOttdA nttkihnui. MP5O0S7 LI '4. higll’.y lotiommendoil chuL if yoj are logged on ir . ilw Jhj. arsJ lucre arc people logged. in.especLilly Hue uysiem m*p»ger (a lhc acvuuo! >-.vj ar: tuejjed on as, Ingocii and rail huJe NKt I have L'uucrd that nu matter what sssteiv, yon *,k- Or’., lhc I;vh| wny to nemtm undsccctcd is cn call when an oar- si op the ij.vtco. You tfO no! imrnL to call loo lale since che system kee|SiA ryoord of when cath ictscr lug* in and uur. To eommur.eate with OLher users nroihsr- tracker sciiatyouarconshcsyscent with, use Ihe PflflNRS iflilily ? PHONKS Uw-riiaiuje. IT Lhc system has l>KC- nes. yoj car. seewkAt AvnilpbSf nbdOvIhenSaiv b>t S bl [OWE NETYYT3H K . Is yigj have mail ihe-systei'n will t£|| y^u so oiler luitKing in. simphe type: i MAll, Ibn- wid Invoke Ihe Personal Mai! Utility; ynu can use he'.p f-oim ifrcre. Then: are a lee of onmminds and rPPtyy Arc hot too us: In I fee the hacker anyway), so I will rrol jy.i into delaii;. Our 1h'.n.K lNnct VMS, there io plany ol on-lins hrt lp asailablr whiLh will emhle yno Pi lenrn ihy o^rutinji sysltm ruirlv well. Dipertoriw To.see wtias vcyu linvc lit y<3ur diitCLOi y type: S DIR TitgsLa list ik d inemijr^i on the jysicm rope; J 171 It L*. 11 ] Wheti n VAX; VMS ss first icelulltd. it ounces with nine rLirecinties whLCh wn; nor tiered when you vstxni tribe DIR T*.*] command . [SYS1 .Ift] — vai I.v.m inaero a oil C-br;^ Fbrarjcs; [S-VSM3G] syeceni message filen-.fSys UL.ih;,| — fikv ustd m riianuKintt Ihe operas in; system, [fiVSHl .R] — lCki f'lfe- and help libraries- for the HIl .P utility ; [yiYSKK K J — dittOtory forthe mor logfilc I'ERR I .OG.S VS)| [SVSTKffTJ — Jilo# ustd m IcsLinp the fanccirms of llta nperpLing vystetn; [SYSMAINT! system diagunstic pre-grAms; [SVSUPDj — Liles used in appJ>ing system npdntts; [XYSUH> KS.Yyil*LLS]— stunpde dr.vnr prpgrarra, user-wrheen sysrens sei-vi«s, And fiber maiiot proy; rants; [SYSIXE]— the execncahle images of aichs (f iIk; fund lioiu of Ibe operating vysceni. Irisite these -.In wtOI res- Aer Tiltcs -wu.il thr fuLowing filrTy^es: Flk*n,-pe IhngTiplion; tommieml: ,nct " Aveii Lest Lk Ti'PE file-name .)■%■ fsytrlnn Help file TYPE hle-nnme .dnt Data file TYPE nir-iiuiiin .msj fxleo^ge til*. TYPE filt-unmu .doc 17iHn.»¥wrrlAlh:m TYTE lile-itione .Ne Logfilr TYPE Me-nime err Err ae rresg -tile TYPE fSVWi— Wr .sen NerpM-llCtal Mr TYRti [Sf-imi™- sys, Sesshii ntr FILE-NAME .eie Ekteotnble file FT L E-NaME .0 1'H 1 1 L imimar^d p3f COMMAHDKaME tu.-. Rresic flu RL"!N fite-uinne 2-57 I Tnxo Arc olhren bul you wunl setlbem as much as ctr-eapovs-. Yoocancrutige diTectorici- either by ukine: S f.RA MOT [I >IR YA M | or S SIT DEIA'I It I JDER.NaM]. Ymi-can aew list oucl cx-ceutc the like- in Ihradicectary withrnn first (ypi'tK Lhc directory OAiTie foilovsd by Lhe file name as. long.fls_w.iii rose soft KiCiiLacpcss. If yOu donl ltssL sufficient access yeucnii sdiUvipw l-.tv*-ii.liiiLd imetecccs chal yem oannol defauk lo bv !i lYFy (LOD.DIK |LOD.MA[;Vi This will lin'ily coctcrds of the file I jf II ),M Al .1 ui Ihf diKCLOfy or [LDD.DLRJ The use cf wikleA c(Vi iv very helplul when tou desine Lo vi:w all the mail or ramrlhin.K on n rjuicm Th> tna uul all Ihe usen- mail if yon have access typo: 5 TV Elf* ,'1 T . id AC;’ 1 , Aa yOu uusy colitic mail files have Lneekcetuioii oi M Al at- she etys, lilt ;1 or ;2 rtr. ace used sit member files w,1h che samp itaiA'. f 'ibiy b (hr first efs: i -jratoutK .«r,i7.s ,-:,.a rJje PMS Ajvtailf)/; ryi.'-tyr Its:-;u-,v i L'ij'it' .'in /Ij'i'j ire rma?.s r r-.-Li I rv ,Vj i-.ti I .- .y-T.y-., I 1 r i.,j 1 1- 1 1 Y,-.-.- 1 iL 1 j-lv a 1 1 l i-- hi; cAol,' ,c parr.'. vjfw- inVer <tf (ywranfivg jnVeirr. Srt jtmiu.y.. The Infinity Transmitter— An Old Bug That Had Its Time hy Howard There ls always, a great hu;,h when the term infinity transmitter is mentioned, ns if it were some Strutting secret ricvLcc , but il Can be simply explained, The infinity transmitter Or harmonica hug is a Lfcviee installed within a tarn's phone. This device allows s person to call the phone and listen in on him while he is quite unaware. This devise has a few problems, the biggest of which is that chc target's phonemust he connected to cither a Crossbar or Step by Stop switch. The other draw haul; is that the bi^g must he installed in the target’s phone. Jhis means one must enter the house, place the bug in the phone, and rewsrc it as required. TbLs hug could aLso he detected if the target were to attempt to use his phone white you were monitoring his activities. Since you are on his phone line liwlening lo him, he mighl think it strange that bus phone was being used, especially if he has any tech nical background . E .ct’s See how to use the hug Once it is installed. Once installed all the observer has to do is call the target's phone number. After 1 he observer d iats the Siiat digit, he sends a speciile tone down the photic line which causes the bug to answer the phone before it rings. The frequency of the tone is user selectable and set during the construction process. Tbe exact frequency of Ihe tone is quite Unimportant. Tins type of bug can he used from anywhere there is ci phone. Ihe potential dsla nee Ls infinite hence the name “infinity transmil tor." finding the audio- visit with the target is just as easy as starting it, A d ifferenl frequency [One is sent down the line telling Use bug Lo hang up, Overall, a very simple concept. The reason this hug works on Step by Step and Crossbar switches Ls because in ihese systems ihe audio and ring generator are connected to the phone cilkd before it £ answered. So it is possible for the bug lo answer the phone before the ring capacitor is fully clinrgej by the ring generator. ESS and DIMS swindles do not connect Ihe audio tn the Called phone line unlil after the phone is answered, malting the infinity transmitter useless. In the care when; Ihe user does not apply the pick-up tone immediately, ihe phone would ring, 1 hen L mp suddenly, Therefore some skill is required (0 avoid tipping me target off to the tael that he is being wale hud. Construction of this device should be relatively easy for someone with a little experience in rise laconics world. The bag would lie iiohued from the phone hy using lwc, j-jiijl- po lari red capae i L ors o f L uf or baler. It would mainly cons 1st of rwo frequency detectors. One would connect the audio from the mouth piece to the phone Line and answer Ihe phone when ihe pick-up tone isdelecLed. The otlter would disconnect Ihe aud io from Ihe mouth piece from she phone line and hang up the phone when Ihe hang-up tone appears. Reaching Out On Y our Own hy Forest Ranger Verification is a very touchy subject, The telephone company wants to keep verification scerer from anyone lscyond telco employees. Rut as phone phreaks should know that is quite impossible, There arc two types of operators that do verifications, “0 “ {'J iiPS ) for local verifications and ID (INWARD} operators for verifications beyond your NPA. Jhey use their operator eonsok, but other people use blue boxes. K PiNpAHH XX+NP Ar XXX^-X XXXiST [he tli st NPA (area code} is yours and the ftwi|] get vou on yentr TSt’& operator- lines, The next XX part Ls an area identifier, They are 00 , 1 L, 22, 33, 44, 56, 66, 77, SB, W. There are ten possible choices depending on which area you are in. For example, blue box verification for Michigan would be EL P;3 1340f MtN PA^XXX-rXXXX :ST. I he second NPA is Ihe NPA of the number you are going to verify. The XXX+XXXX pail is the iesi of the number you are goi r.g to verify. Once you have i oaled your verifies Lion you will receive a rerics of dicks (landaus stacking), i.hen you will hear a beep and vcm will he on the line. You wont understand what anvone is saying because everything will be scrambled. The verification will bast' about rblirLy seconds. Tlain you will he hoeped out and finally disconnected. Federal laws regarding Line listening have become much stronger— ■ especially after 1974 when a subcommittee of the House of Representatives held a public hearing called “Tekphone M onitoring Practices by Federal Agencies". At this hearing it was discovered that R C 1| hud Listened in to hues of their employees and had the power to Listen in on anyone. IhLs shacked jfu.uiy people and made federal laws concerning such activity much stronger. My point is don’t abuse this vcri.flcai.ion, because alt you need is a simple descrambler from Radm Shack to dereramble ihe conversation Ou Lhe line. PURSUIT FOR PEOPLE On August 7, GTE leknec announced a new service which, if handled properly, will usher in a whole new phase of computer communications. The service is tailed PC’ Pursuit and it enables people to connect their computers to other computers far £25 a month (plus a start-up fee of 5-26}, In other words, a hobbyist in New York tan connect bis computer to a bulletin board in California and not liave to pay far a long distance tall. The "computer conversation’' goes through GTE Telenet., a packet-switching network for computers, previously used exclusively by large corporations. “To access the service, "Clift press release expjuins, “a user calls hivPC Pursuit ACirevs number and is prompted to enter his 2-SS home phone number and make a request lor a destination phone number in a distant city. Tf the itter's telephone number is not uuthanred, 1 he phone coll is terminated and a record of (he call Ls generated . If the number is aulbonred, the subscriber is called hack and automatically connected Lo the desired telephone number in the distant city, which, could be a speci fic database or remote PC user. GTE Tefcnct is able to maintain Ml accounting of the origin and destination of al l colls. Each user session can last a full hour, and users may access the service as many tunes a month as they wish .’' PC Pursuit represents the first time a major corporation lias attempted to win oyerComputcr haekere CfrLher than intimidate them. J. David Haon, president of GTE Telenet., says, 'AVc (lominued <>n page 2 - 64 } hone-in Registration For College \r*i M-rtfifi A S"7 .&X> computer sy^rc-m that allows iiudetvls to sign up tor courses and alter c he j r schedules using, touch-rone telephones wifi be tested by 3(iO Union County College (New JOTSCyl students 1 hLi- fall and up to 7 ,000 KtudeihtS Are expected to be using the procedure by nest spring, ~ When the student dials in. each cnui'sc will have a five-digit eode number," John Fa* .jI, [tie college's dean of computer services said . ’Tile studto I will be prompted by a recorded voids to ■ h is ident ifical ion , so students will have access w3ren they jj te Admitted, a password that only iic will 3; now [ !], and then he will be ted by the vn iee prompt through Che procedure, “ , The system, purchased from Information Associates of Rochester and similar to those now being used by Airlines for H ight reservations , will i nform students if thru chosen courses a to fu I] And whether similai entes Are available. It will also have the potential to provide many ulher services for students in the future, such as hd ping, determ inc the status of their finuncuil aid ret|ij&1s or the status of their admission application, Trouble With 800 “Word Numbers” iv# hv* Y«kT«r. When Hindalene Rosner saw ,L ] -800-LIV E-A! f>- flash On her television vercen in I he early hoc cs of the worldwide benefit conocn, slit had a feeling Lhat thinjp would get busy, It should he explained that Mrs. R os act is vice president of Jbel.ife Aid Corporation. And her company's nationwide toll- llrtKr telephone number is I 'ScXFU H>A ID. ’’Every two second.!," Mrs. Rosner said, calls were com ing into hciidq renders in Scottsdale, Arizona, from viewers who were moved hy die 1 ivc Aid Concert 1 o pledge money for ihc starving and homelfeS people of Africa. Callers Id 1 Jfc Aid iur told very politely 1 hat u i h is is a lota Lly dillerem bhusutess" And are given the correct listing in digits ( 1-800^48-3243). not letters. a Vienna, Va... man and transferred part of what was stoned there to bis own computer. The vie-1 im , Allen K napp, 40,. who runs the Washington Networks BESS our of his home, said his clients pay a ELO ice for a password and the opportunity to exchange data with others. K napp told The Wathingion Pott thai on Jan. 5 the youth managed to bypass “my normal security sitfe guards,” translcr Jilts in his Own Computer, and erase fi substantial portion of Knapp’s files. ,L SSe then called my answering machine, suiting wl*A L be had done and malt big certain demands in CHChiiuge for Ihe return of tltc files in his possession," Km pp said. According to Knapp, the youth wanted the access to obtain files that be would then exchange w it h bis friends. K napp said he called the Virginia State FoLsce and the Chessitpeakc & Potomac Telephone Co. after hearing the message. Pitcairn Island Now On AT&T Net W Veil Diib Snra After nearly 200 years of peace and solitude, the residents of Pitcairn Island in the South Pacific are about to enter the 20th Cenlury. A I /k 1 Communications luc., in its relent Less quest to wire die world, says it has decided to provide international long- distance service to this Lwu -square-mile inland where 53 descendants of Fletcher Christian and the other mutineers of the 1 3 MS fiouniy still live. The AT&T service will allow ilw islanders to receive and make calls anywhere indie world, instead of just ringing osyr Lo Tahiti. But they'll have to learnto talk fast. A thrcc-minute call to or .from the U.S. wilt cost El 03 and S3.3& for each additional minute. Culling from the U.S will be tough. Since all the residents must me !be island's one telephone, they have already divvied up the time for making and receiving calls from each country. 1 hey wtl I he acccpLi ng calls from the l.F, f>, at 2 pm. 8: 30 pm, and 1:15 am. War Game Addict S l_'X J frt'ii A if* year-old computer eoi'iiisia.'i wl-.u said he was addicted to a space war game A nd Used sloltm credit card numbers to charge playing time wus placed on probation and ordered to make restitution after pleading guilty to wire fraud, A federal oflieial said, The man, Kenneth Goldin, was placed On Ibree years of |i i obation and fined J500 by Fedc i *1 .1 udge Macyanne Trum p Burry, Hacker Extortionist Caught .‘liW SVfct.l/fi.K' H ■'ik’d c- j rr Pbtneas Phrcak, Is; called himself as he roamed through computer bulletin boar ds,. Gul he was caught hy tcleo security men, prosecuted under a 1084 Virginia law designed to zap computer trespassing and sentenced to pay 8.300 restitution within six months. The I 4-yua r-okl Phincas became one of i he Llrsl persons to be cult with under the new law A fter he pleaded "not innocent" plea frequently used in juvenile proceedings 1 o a void giving someone a criminal record. The Montgomery County, Md., youLh broke into a computer bulletin board service operated by Private Sector Update WVISrviiri.nv E ASC UiOnl h. we told VOti uboonhe raids in New jersey which involved our official BBS, The Private Sector, as well as the flurry of headline grabbing that ensued. The sysop of The Private Scctm is confident that lie will huve bis equipment returned and charges Against ham dropped, Ills lawyer, Arthur Miller, who wax obtained for the sysop through the American Civil 3 .ibeuies Union, has not been Abie to make much progress On the case. Court proceedings have been postponed at the request of tbc prosecution. To date, the sysop still docs nol know |he evidence against him. nor of Any specific crimes he may be charged with, Tt is expected that the prosecution may try to hold up the equipment and any final notions in Ibis case until the local elec units Are uwjr. Since the raids, 2600 Lias heard of several cases where RR& users have gotten phone calB from federal Agents. WcbavcatSS heard of a few other bulletin hoards that have been taken down. Ei you know of any such cases. please contact OUJ' office at 5167512 WQ. In addition, since the BBS is not currently Available, we have made arrangements for uploading of lengthy articles at out Office number. 'ETscy can si ill be sent by US Mail. 2 -Stf Dear 2MW\ In response tn ihe individual i.ULuriring about a hack |uick truLTOwavc system (J u]y ). it ii my undereta nd in g LhLii il in primarily a military field comnuinicutiom device with collapsible satell ite antenna and not. its you correctly assumed, a consumer atem . rhiini you for a much iieeded, educational alternative to blindly accepting the status-quo propaganda machine. I>J. Dear T:i your May ituw, you were talking about silver boxing a nd mis-named ilhj AU fOVON precedences. Here are the correct names in order from highest Co lowest; I lash Override. Flash, immediate, Priority. Koutiac (all calls are routine if precedence h non is pushed L Cr if precedence buttons uie not installed on t phone). „ s _ SEVOX Dear D J. and SEVOX: We always appnviaic resf onto from renders who h are sonar expertise to offer. Pice re do not h essitate ro correct us. Own 26fft b For the reading lis.1; Understanding i eiephom Lleciranks, developed and published by 1 exos [nslrumeuts I. criming t voter, available through rise Radio SJlilck chain, CiUaloguc number 2BB pages, $5.49 Tha. book is a technical ttilonal on the basic, of leSepbonc solemn. You heed a lair amount of electronics knowledge to understand ihe stuff in licrc.. bin nothing yon could n'i get from I ho other "Understanding so and so” bocks Lhat Radio Shack sdk In-pics include Ihe innards of both standard and electronic I e I eph n nev, speech, dialing, anti ringing circuits. digital transmission, techniques, networks, modems, ' and more ]n slioi-;, this is a goldmine ol tcchnicaE information about telephone communications, and (WmCihtng rather ouL of character for Radio Shack) is even reasonable priced. I his is from the Understanding Telephone Electronics book, .According to Lhis hook. 26(}Q\ opening words ubout how Alexander Graham Roll answered his phone (fan; B4 issue) may have hern inaccurate, and I quote: ' J.a rly telephone ei rcuits were poi i it-Lo-pdin t (not switched), and 1 la- caller gained the attention -of the party aL (he othci end by pu king up Ll'iir irinsmitic-r and shouting llello’ or YMiuy’. .us was not very satisfactory, and schemes hatted on a mechanical signs I i tig arrangement were scon invented , Tb- one m Common cv. today, called (be 'polarised ringer’, m ball, was FMtented in IrOS by Thomas A. Wutsou f.Y] r. Bell’s assistant).’ 1 bo it scorns that ” A liny" was not how A.G.F5, answered a is phone, but more Li k u ly how he induced so men ne else Jo .answer i he phone T -a i makes more sense, s face "Ahoy” was us.ua |]y used a! suu tc nttse the at lent icn of someone else nti 1 1 hr reon the Luomy brine. J magi nc riiose days of ca rly telephone^, where vou ntiglti wa | k by 1 hat ngw centra pS icn a nd hear a di m voter inside yrl i og “Ahoy" v . Talbot Dear Z600z A while kick you were asked if f! tiMOBS icailv existed. r can tell y mi lorsurc that KFmme OfSServarion numbers do, i n iaci, exist. The hardware is manufactured by different companies One us whieti is called Jeradyuv, which makes a system billed 4-tel; These system* are work mg when aw exchange is set up ici ii. in the Central Ofiloc, They arc used fortcstingnnd are pcrfrctlv Jegal. The equipment was buill so Lhat you enter a cork; ihen a ii. i Tiber. It will listen to a number tom limited time arid then ir sequence; to Ibe next number and ihcn Lhe near, But it y (tikes a few seconds to. modify the equipment, so ii doesn't step to anorher number. As far ns 1 knew Lhe going price Is il.MJO to gel a telco employee 1o do the modi ileal ions. A guy E know was appr i inched by a photic uompau y employee who won led 1o gel soiru: money and he offered to sel up tlic system a m l provide a number a nd ende that cGuki be d ialcd n troni anywhere DL'nrJfiHR: lYe been thinking of starting my own bu Metis board. But l\n not looking fora a re tn ihe po.es ibility that sn:nc jackass wilt leave a credit card - umber or other nasty Information on my hciird and tha I some even bigger jackass will sec said mesuge Ci^Tl dekte it 3iMj LIOL'lLSe rrn,- nJc'OnF.p iri nj_? SO in ciii v [-0 before deliatid or steal cr build oipLosives or whatever else they ha ppen to be afra id of wil I ! a ppen ol tha I moment . 'I he rcccm ■aids i n New .Tgrsey i nd icale that even a conreicnl icus svsop {as i he I el Sow who was nu nuing i he Private Sector c lai ins to be) can gtl screwed ever by compu leipbobie police and Federal ageitb What preemptive pTotcciion!; are awiiliibfc ibra bulletin board operator who plans, on staying within the confines nf tiie law oils, yet docs not want !o slain her or liis board with warnings and continually censor the tlow of messages? Freedom of the press is a marvelous concept, and apparently allows folks like t-SA I oday 1 1 > cvciv uv-ii Liable- slDKtoornc-i \\iih (Jicif one-legged sending machines. What wgiuld one kive to do Keome a “press"' Yon dci^ have tc be made oul ,j j smee radio bud television reporters qualify. Is lliere a union \ Can join? A professional society? Maybe we Should start one? Can you recommend any place where liirtiior informal ion on such would be available? W.IJ. Friend Dear W.u.l low ask many tn/rjgmrig questions, mJ ve belief that ur rc.Mj.yv' c/tVivrc an mihe issue ni mswering them, in f 'a/ t, we ,ymi a xrea: dent of the Augusts issue of 2m dimming the ven things that .row brought up. Matty of your questions could he answered by allowing yourself tops busied ami letling iVam-n tfurger and the rest of the Supreme Court deride. This mar be the easiest way because there are few laws, guidelines, or precedents. Right nov , mt do not know of any "unions, "bos idrcrc bond reds of computer user groups Shut are actively discussing these problems, and we gdso foresee groups forming to sperifkaliy address the problem Especially since shore eomputerphoSttn. jw were referring to un- trying so get legislation passed to limit Mid's in this country. You must remember that this is a very popular issue, and it w id feme into play tn various elections this Jail, winding those of ihe prosecutors' who arc pressing charges against the Private St'ctor r s sysop. :-b(t The 2600 Information Bureau L.. L «r,.l L,flC .,.pri«ti 7 ” -r j 1 ■■ 11 PlrpEi-srv n r v 1 -l j 1,1 rv a 2 , L-ai t yadn • + 0 i 3 hp hh • Cd 3 ^ Riiaa- i vi>p ■ ¥Y 0 Nr.HC.,- QWiCP { PCI nCNDC -’-IDhiiER ■■ R/f 1 il , • ■: 2 ni^n ■ %'H r: 5 -ri> ■ f 20123 '! 20 J 30 L TDT 3 - 1 0 ! N-*>CT E L iL t I- dn L C 3 Ji + aBJ 1 BA 1 | a nn E n l h-a- - D- 1 E 1 E 3 °' ' HOC - EiVRirn. 120131 il OAdpOrid .i • 1 • • - 120133