💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › OUTBREAK › outb… captured on 2021-12-04 at 18:04:22.

View Raw

More Information

-=-=-=-=-=-=-


                              ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
           November 2002 - Issue #11  Outbreak Magazine - v11.0
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'      
		
             "You think you need shit? That your entitled to 
              it? Think again, fucking earn it.  Stop being 
              a begging little bitch and go out and take whats 
              yours.  Begging is the biggest sign of how little 
              you know."
                                
                                 - Squirl
        	             

     [editorial]

	    Hey everyone. Welcome to Issue #11 of Outbreak Magazine.
            This issue is packed full of lots of good stuff. Read
            this issue and learn something, and pass it on to all
            of your friends.  After the release of issue #10 I started
            to get loads of e-mails commenting on it.. thanks to all 
            who enjoyed #10, and learned something from it, or even
            laughed at the comical parts of it.  

            We welcome a load of new writers to this issue. Some of 
            the members of the DDP crew and freek radio have offered 
            to write some articles for us. You can learn more about 
            these guys at their websites: 
            
            www.stankdawg.com & www.oldskoolphreak.com
            
            go give them some support.

            Well, that's all for now. Hope you enjoy #11. E-mail us and
            tell us what you think, or just to say hello. We like to hear
            from our readers.

                        
 
                          - kleptic <kleptic@t3k.org>

                                                      [/editorial]


      [staff writers]

              kleptic...............<kleptic@t3k.org>
              dropcode..............<dropcode@dropcode.tk>
              gr3p..................<gr3p@outbreakzine.tk>
              rambox................<rambox@outbreakzine.tk>
              joja..................<jojalistic@mac.com> 
              Turbo.................<turbo@outbreakzine.tk>
              heavenly..............<jennybean@sugarpants.org>
              n0cixel...............<lexi@sugarpants.org>
              Timeless..............<timeless@hackstation.tk>
              Lenny.................<lenny@yourmammy.com>
              GPC...................<heelflip_the_biscuit_tin@hotmail.com>
              nick84................<nick84@rootsecure.net>
	      evo255x...............<evo255x@hotmail.com>
              dual_parallel.........<dual_parallel@hotmail.com>
              StankDawg.............<stankdawg@hotmail.com>
	      Bi0s..................<bi0s@StankDawg.com>
              Captain B.............<Captain_B@hackernetwork.com>              

                                                      [/staff writers]


       [shout outs]

 	    All @ #outbreakzine on any dalnet server, phonelosers.org,
            scene.textfiles.com, dropcode.tk, fwaggle.net, dsinet.org, 
            ameriphreak.com, stankdawg.com, oldskoolphreak.com,
            sugarpants.org/heavenly, kleptic.tk, guruworld.org, 
            dark-horizon.org, sugarpants.org, Everyone that helped 
            out with this issue of Outbreak. 

            You all rule!
                	
 						      [/shout outs]


       [contact us]

                     
                     ������������������������������������
                  \-�     http://www.outbreakzine.tk     �-/
                     ������������������������������������
                    
	       	         Vist Us On IRC @ irc.dal.net

                              Join #outbreakzine

		      Send all articles for submission to:

                  	        kleptic@t3k.org


						      [/contact us]



                  ��ܲ  �         ���� ��������� �� ���
                 ���߲ ��� � �� ���߲��������������۰۰��������
   ��            ��   �߱������۰��  ���� ����  �� ����߲۲���            �ܰ
 ߲����� �       ���  �ܰ�� �� ����  ���  ��  ��۱� ���  �۰�        � ��۲���
   ��   issue     ���ܱ��� �۱� ��� �����  ����-fwaggle  ���    november  ��
   ��    #11       ��߲ �                               �����     2002    ޲
   ��                                                                     ޲
   ��       file  description                          author             ޲
   ��       ~~~'  ~~~~~~~~~~'                          ~~~~~'             ޲
   ��                                                                     ޲
   ��       [00]  Editorial                            kleptic            ޲
   ��       [01]  How To Local Engineer                Sandman            ޲ 
   ��       [02]  Pac Man Ninja                        kleptic            ޲  
   ��       [03]  The Art of Perl v0.1                 buffer0verflow     ޲ 
   ��       [04]  Linux PCI Modems: A Broken Myth      magickal1          ޲ 
   ��       [05]  Bastard Admin From Hell              GPC                ޲ 
   ��       [06]  Telephone Directory                  DoxBot             ޲	
   ��       [07]  Want admin on phpBB 2.0.0?           nick84             ޲ 
   ��       [08]  Homework Help                        Asphalt Jones      ޲ 
   ��       [09]  Basic Directory Transversal          StankDawg          ޲  
   ��       [10]  A Small Look at Xbox LIVE            Turbanator         ޲ 
   ��       [11]  GPC's Poetry Corner                  GPC                ޲ 
   ��       [12]  A Bitch Slap For Newbies             evo225             ޲ 
   ��       [13]  TAR - Telco Acronym Reference        dual_parallel      ޲ 
   ��       [14]  E-Mail Forgery                       Bi0s               ޲
   ��       [15]  The Hayes Modem Command Set          magickal1          ޲ 
   ��       [16]  PRINGLES: Sour Cream & Onion         rambox             ޲ 
   ��       [17]  Executioner Box II                   Captain B          ޲
   ��       [18]  Conclusion                           Outbreak Staff     ޲
   ��                                                                     ޲
   ۲�                                                                   ܲ�
 ߲����� �                                                           � ����۲�
   �                                                                       �

  [video notice]

     windows users: (win98 or higher) you can open these files in notepad,
     and set your font to terminal, size 9. if you prefer console or
     MS-DOS, then just open it in MS-DOS editor, making sure if you're
     using windows that you hit ctrl+enter to make it full screen.

     linux users: view in console using an editor such as joe, or use
     less -R <filename>. x windows users can view by using a font such as
     nexus, or the terminal.pcf font that fwaggle created but lost.

                                                       [/video notice]

  [legal notice]

     all texts used in this magazine are submitted by various contributors
     and to the best of our knowledge these contributors are the rightful
     copyright owners. feel free to redistribute this magazine in it's
     entirety, but you may not redistribute or reproduce parts of this
     publication without express permission from the staff.

                                                       [/legal notice]

                              
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 1 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'

How To Local Engineer 
---------------------
By: Sandman

Disclaimer: Don't take us seriously..  and don't be stupid.  


This is a doc about how to scam shit up in 'yo hood'.  There are several 
parts to this txt so that i may be 'mo spic-efic' fo each scam. 

Part 1.  DvD / console game "ripping" 

Tools: 	Flat Box Knife - ie. the ones people use in grocery stores, about 
        3 inches long that pop's a standard razor blade's corner out to cut.

        Hook Blades    - Used for cutting and trimming roofing, carpet, 
                         flooring, and cartons without damaging the surfaces 
                         below.

Info:  	The hook lades will not fit into the flat box knife 'without' a 
        little help...... dont make the 'sleeve' for the box blade too big 
        because it will become loose, but a pair of pliers can always help 
        that issue. You dont 100% need the special blades, the others will 
        do, but it's like not neeeeding shoes, shoes are better. 

How to:	This works for any standard dvd type box. If you run into dvd's in 
        the big clear plastic boxes this wont work, but a '5-fingered' 
        opener will or magnet type thing (at hollywood video) will. If you 
        notice the odd bends in the corner that look like a V (the folds 
        part) from the top of the case you can pop the corner into this fold 
        and pull this will cut the bend in the plastic all the way to the 
        bottom and hopefully all the way off. You can then lift the front 
        cover up enough to pop out the disk. Make sure the disk doesnt have a 
        clear plastic coat with 2 metal strips across the disk (block buster). 
        Take the popped box and place it discretely behind the nearest other 
        dvd box. When you go into an establishment it is best to have at least 
        2 people. 1 for watching and 1 for cutting. When you go into the store 
        count the number of workers in the store to better keep tabs on them. 
        If you wear a hat and stand close to the isle you mostly cannot be 
        seen by the cameras if there are any and no one should even notice 
        until you are way gone from the store. The best way to leave is to 
        ask some dumb ass question like "uh do you rent gameboys" and they of 
        course dont so them you must be disappointed and leave. It's best to 
        not take in any personal effects (ie. wallet, id, car keys exc.) just 
        incase they try to get you, your a no body.  Allot of the rental stores 
        will also have preowned or new to sell stuff as well. These items are 
        usually not secure at all or much less secure. BB has preowned's that 
        are highly secured by a sticker I can cut with my thumb nail.

Part 2.	Price Check Please

Tools:  Razor Blade - The utility type, usually rectangle with an 'atomic number 
                      13' rail at the top.
        
        Glue - I had the best luck with 'Quick Tight' super glue, but have 
               considered rubber cement for easy removal. 

Info: 	Usually these items can be obtained from with in the store. Remember you 
        will eventually be caught, dont waste your chances lifting a 1cent razor.

How to:	SKU's		
	Go to any store the uses electronic registers (wal-mart, meijers, target, 
        exc.). Cut the sku off of a much cheaper similar item and glue it over 
        the SKU of your very pricey item. Using this you must use your brain's 
        and have allot of courage. Just remember, the person checking your stuff 
        is some 16 y.o. grocery checking dumb ass. You must try to make it 
        something that either the same thing but cheaper or looks like it could be 
        the same thing. For example: New Nike MJ's... 200


s... clearance shitty 
        nike's... 20


s... 'shitty new MJ clearance shoes, 20


s a savings of 180


s. 
        Make sure the cashier doesn't know that MJ's are. As far as for cardboard 
        boxed item's, you halft to cut the sku from the box and then place it neatly 
        over the existing sku. this works well if you pick up the cheep item and 
        walk around with it in your cart and then neatly take the sku off.  Then drop 
        off the cheep box and decide on a more expensive box and place it into your 
        cart. Then add the correct amount of glue and stick on the new sku. When 
        checking out, choose the dumbest looking checker (usually the longest line) 
        and go there. If the box is big enough leave it in the cart so they cannot 
        read the sides. then they will use the scan gun to scan it. Do not try this 
        with something that has a serial number for them to scan unless the item 
        that you 'made' it doesnt have a serial number and you can remove the serial 
        number from the outside of the box. If you dont then they will see the serial 
        number and expect to scan it or if it needs one and they do scan it it will 
        come up wrong. There are 2 ways to fence these ill-gotten-gains. The first 
        is to remove the sku you added (easiest with rubber cement) and try to return 
        it to a store that either sells this or the same type of store (k-mart exc.) 
        that you got this from. most of the time with out a receipt they will give 
        you a gift card to spend in the store. The other thing to do is to pawn it 
        or sell it to re-tool or some foo who wants it. if you pawn it, ensure you 
        are 'not you' and the 'not you' has owned it for like 6 months or something. 
        Also you can just swap the box of what you want for the one you want to pay 
        for. 
 
	The only other way I can say to do a price change good is to go to a place 
        that has only the old school registers like hobby lobby. They use a red felt 
        tip pin to mark across the original tag and then pull a tag off of a on sale 
        item and place it onto you not on sale item. 

        Enjoy this information responsibility. Do not steal and drive. Stealers 
        General's Warning: Quitting Stealing Now Greatly Reduces Serious Risks 
        to Your Health. Stealing Causes Lung Cancer, Heart Disease, Emphysema 
        and May Complicate Pregnancy.

                             
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  �����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 2 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'

Pac Man Ninja
=============
By: kleptic <kleptic@grex.org>
http://www.kleptic.tk
AIM: kl3ptic

---

Some kid messaged me on AIM wanting me to harass this kid.. 
he gave me his phone number and everything. So I went to work.

---

kl3ptic: Blaine.. my man. 
 
kl3ptic: whats going down?

KoNkReTeEleMeNt: who is this

kl3ptic: Nick you silly bastard

kl3ptic: heh

kl3ptic: whats up?

KoNkReTeEleMeNt: well then why did u im me on the other name

kl3ptic: cause im an elite ninja.. why else?

kl3ptic: dont be a dipshit blaine.   

kl3ptic: say

kl3ptic: we getting together this weekend?

kl3ptic: to party like a mother fucker?

KoNkReTeEleMeNt: who is this 

kl3ptic: i just told you .. did you get your head beat in as a 4 year old?

kl3ptic: its fucking Nick

kl3ptic: mullet and all dude

KoNkReTeEleMeNt: nick who 

kl3ptic: what do you mean nick who?

kl3ptic: quit being a dick

kl3ptic: hey, i got pac man arcade classic dude

kl3ptic: you in?

kl3ptic: its the shit

kl3ptic: not that fucking mrs. pac man bull

kl3ptic: all out PAC MAN

kl3ptic: you down with this shit?

KoNkReTeEleMeNt: nick that hangs out with andrew

kl3ptic: c'mon Blaine.. don't be a pansy ass.

kl3ptic: Pac Man Blaine

kl3ptic: Pac to the mother fucking Man

KoNkReTeEleMeNt: u quit fucking with me yo 

KoNkReTeEleMeNt: who to the mother fuck is this

kl3ptic: DUDE.  I'm not fucking with you..  

kl3ptic: Are you scared of my pac man ninja skills Blaine?

kl3ptic: You think you can take me in Pac Man?

kl3ptic: Oh OH! I think not my friend!

KoNkReTeEleMeNt: dude get a life

kl3ptic: hey dude.  If you're scared. That's cool.

kl3ptic: I mean, i would be scared too.. if i had to take on the fucking PAC MAN NINJA!

kl3ptic: damn straight

KoNkReTeEleMeNt: oh oh im not scared

kl3ptic: right ;-)

kl3ptic: you're pissing your little cammo panties

kl3ptic: c'mon blaine..  lets pac man this shit up

kl3ptic: lets do this old school

KoNkReTeEleMeNt: yo fuck u kid

kl3ptic: like willy from the wizard!

kl3ptic: yeah!

kl3ptic: hey man.  you a little scared?

kl3ptic: little yellow stripe down your pac man wussy back?

kl3ptic: thats cool

kl3ptic: Fear my Pac Man ninja skills

kl3ptic: cause when those Ghosts come up

kl3ptic: i fucking chomp those bitches

kl3ptic: left and right

kl3ptic: fear 

KoNkReTeEleMeNt: ok then tell me the last name

kl3ptic: lowwer or how ever you spell it

kl3ptic: bizatch

KoNkReTeEleMeNt: no urs bitch 

kl3ptic: You don't need my name.  You just address me as "Pac Man Ninja"

kl3ptic: oh yes. 

kl3ptic: I'll Ninja spike your ass back to pac man land bizatch!

kl3ptic: make you shit your little cammo panties

KoNkReTeEleMeNt: yo if this is brian ill strait fuck u up bitch

kl3ptic: brian?

kl3ptic: this is Nick you little Mrs. Pac Man pansy

KoNkReTeEleMeNt: yo who ever it is dont let me cacth ur bitch ass

kl3ptic: you wont be able to.

kl3ptic: cause im a freaking ninja

kl3ptic: pac man style

kl3ptic: just when you think you're alone.. . BAM..  ninja spike to the back of the skull

kl3ptic: drop kick your nuts.. make you piss your camo panties

KoNkReTeEleMeNt: ok peace u want to talk some shit here is my number call me now bitch 789 8203

kl3ptic: i already got it

kl3ptic: and i will call ;-)



=============================================================
After I posted his number on my website, I guess he now gets
a shit load of calls a day. And I heard one story about how
Blaine got grounded because someone socialed his parents into
thinking that he was an "AOL Hax0r." If you hit this kid, let
me know what you did to him, and how he reacted.

if you want to harass him:

Blaine Lowwer
410-789-8203
=============================================================                              
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 3 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'

The art of perl v0.1 
by buffer0verflow. 

In this paper I will try to explain the basics of perl, and why
I think its so popular. By the end of this paper the reader should
have a basic understanding of perl's data types, minimal regex, 
and perl syntax. At the end of the paper I will write a demonstration 
program, To put it all together.

1. What is perl?

   Perl is a interpreted programming language. Perl stands for 
Practical Extraction and Report Language, a.k.a. Pathologically 
Eclectic Rubbish Lister. Perl was developed by Larry wall.It includes 
many facilities reminiscent of awk. It is considered by sys-admins to be the 
language of choice. Why? probably cause it can interact easily with
the system. And deals well with text, and many other things.
As my friend once put it, "Perl is like a hamster with a swiss army knife."
Perl was also gonna be named after Larry's wife. Then he decided against it. And
moved onto the name 'Pearl' which was a no-go due to there being another
language named pearl. So he chose perl. 

2. Why its popularity?


   Alot of perl's popularity comes from the way it can handle text. Perl 
deals with text excellently. I don't think there is a language that can 
match perl's text capabilities. Another reason is it allows you to be sort of
apathetic with your code. Perl is a pretty loosely typed language. It doesn't
hold back much. It does what you tell it to do. Even if it doesn't like it.
As I said before it deals with text excellently as you will later see. So 
sys-admins enjoy being able to parse through log files, and taking out the data
they want. And leaving the data they don't need. Another reason, is it has a
smooth learning curve. You can learn just the minimal basics and still be able
to produce some useful programs.

3. Now onto the basics of the language. 


   Now we'll get into the basics of perl. Alot of people say they can tell alot
from the language by seeing how simple the hello world looks. Well in perl
I don't think it gets any easier. Here is the hello world in perl:

#!/usr/bin/perl
print "Hello World\n"; 

The '\n' of course means to skip to the next line. Just like in many other 
languages. The first line sometimes referred to as the shebang line. Just makes
it so you don't have to type perl hello.pl. You can just type the name of the
file:

#./hello

 of course it has to have execute permissions. Next we will deal with 
some data types. There is really only 4 basic types they go as follows:

$string = "l33t"; # A string.
$num = 1337;  # A number notice they can each use the '



@array = (10, 12, 12); # an @rray. 

%hash = (
age => 18,
name => "Harry",
);               # this is a hash which i will explain in a sec.

Perl has the data type hash. Which is sort of like a structure of data.
Accept it uses 'keys' to access the data. So say we wanted to get the 
value of what 'age' holds. We do that as follows:

print $hash{age}; # would print '18'. 
$age = $hash{age}; # or we could store its value in the variable $age.

Notice we used % when declaring our hash. But when you access it you use 
$hash{keyhere} its the same with arrays. As so:

@array = (10, 20, 30, 40); 

print $array[0]; # prints the first value of the array '10'.

Remember the array's subscript (value) starts at 0 and goes up. Not 1. 
You could also print the whole array if you wanted. As so:

print @array; # prints all the values in the array all together. 

We could make that look cleaner alot of ways. Perl has a foreach control 
statement. We could do:

foreach $value (@array) {
print ("$value\n");
}

Which loops through the array and stores each value in the scalar variable
$value. Now we'll go on to some user-defined functions. A function is just
a piece of code that usually has a specific job, like adding up variables
passed to it etc. You declare a function with the sub keyword as follows:

sub add {

return $a + $b;

}

That returns one value, which would be whatever is in $a + whatever is in $b.
Full example:

$a = 10; 
$b = 20; 
$c = add($a, $b);
print("\$c holds the value $c now\n");  
sub add {
return $a + $b; 

}

The \ is for telling perl we want to print the $ symbol so we don't get it
confused with the actual value in the variable. You can pass multiple things
to functions, and perl can handle it pretty well. As long as the code deals 
with the variables correctly. And you might have noticed perl doesn't care
when you declare variables. Like in some other languages you have to initialize
 them before their used. Perl don't care. Unless of course you tell it to.
we can do that as so:

use strict; 
my($a, $b); 
$a = 12; 
$b = 12; 
print("$a $b\n"); 

The use strict in the top of the code, puts the strict module into play. 
Which means we have to declare all of our variables before using them. 
The advantages are the code tends to run faster with strict. Disadvantanges
It kind of bites declaring them before we use them. But its a good idea to use 
them. The my() function is used to declare your variables. The use functions
puts the given module into play, in our case strict. But there are literally
thousands of different modules out there. Some include Net::IRC, IO::Socket; 
CWD, and many others. 

Now its time for some simple regex. Regular expressions. Are useful for finding
patterns in text, strings. Even from sockets. To show a brief example:

$string = "Where the hell is the cake";
if($string =~ /cake/i) {
print("Found..\n");
}

else {
print("I didn't find it..\n");
}

Running that program will print Found.. since 'cake' is contained in the string.the ~
 is a regex pattern telling perl we want to search for something /cake/
is the pattern telling perl we want to search for 'cake', and the i means 
ignore case. So, if it was say CAKE, or Cake, it will still match it since it
ignores the case of the word. You can see how useful regex'es can be. Say
we had a file, we wanted to find a pattern in it. Regex's would do the job.
To sum it up we'll write a program called 'parse'. Which will take a specified
pattern, and search for all occurences, and 'parse'(remove) it from the file.
This can be useful. Say your on IRC and someone pastes you some code you want
to run. Of course the <nickname> stuff will be in there. And it would be
very time consuming to go through and delete each manually. So we'll
throw that data into a file, tell perl to open it up, find the pattern, and 
remove the pattern if it finds it. The code goes as follows. I will explain
it in detail afterwords.

# parse.pl 

$file = shift;
$pattern = shift;
$file2 = "parsedata.txt"
die("usage: <file> <pattern>\n") unless defined($file) && defined($pattern);
open(FILE, "$file") or die("Cannot open file\n");
open(FINAL, "$file2") or die("Can't open");
@arr = <FILE>;
foreach $line(@arr) {
    if($line =~ /$pattern/i) {
     $parsd = (split(/$pattern/, $line))[1];
     
        print FINAL $parsd;
    }

}

close FINAL;
close FILE;
print("New parsed data is in $file2\n");
$time = localtime();
print("Completed on $time\n");

And thats it. We'll start at the beginning $file = shift. This tells perl to get
the file name on the command line. ie: when the program is being ran.
Same goes for $pattern. If those values aren't defined the program will die
printing the usage. A few new keywords were used. unless is another control 
structure which is pretty self-explanatory. defined() takes a value as its 
arguments. If its not defined then it will do as told. In our case die.
die() is basically a function to signal an error. If the values are defined
it moves on and opens the $file specified. If there is a problem opening it
it will die. If all goes well it moves on. The @arr = <FILE>; stores all the 
data in the file into the array. Then we move on to the foreach it says.
for each line in the array search for the specified pattern is the pattern exists 
parse it out uses the split function. which removes the $pattern. 
Then it prints the parsed information into $file2 which will contain what we want.
Then it closes both of the files. and tells us the new data is in file2. 
Then a pointless addition $time = localtime(). The localtime() function is also
pretty self-explanatory. Then it tells us its done. That's that. The program 
should work on any platform. Perl is very portable. The program could have been
done in various ways. Perl uses the TIMTOWTDI attitude. There is more than one
way to do it.

5. Summary. 


   Hopefully you gained something from this tutorial. If not, I am a loser, and
should be shot with a 9. If you have any questions, comments or whatever, you
can email me at joey@hackernetwork.com. You can also find me on irc. The next perl
tutorial will contain more advanced information with a demonstration on sockets.
We'll be creating a simple IRC bot. That's all for now. Peace.




buffer 
email: joey@hackernetwork.com
AIM: buffer18@hotmail.com




 

                              
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 4 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'

Linux PCI Modems: The Myth Is Broken
====================================
By: Magickal1

I have seen many pages written for the modem and its installation but 
they mainly cover the ISA modems. This is for the PCI Modem. Now if you 
are looking here because have a Win-modem I'm sorry, But I cant help you.
Because todays machines are using PCI boards and ISA is a thing of the 
past, I have written this in hopes of helping a few souls out their that 
need it. I know that High-Speed access is the rage, and many think that 
OMG your still on a Dialup, get High Speed Access (HSA). Well this is not 
an option for many so the tried and true modem is the only way.

Most other tutorials will tell you that PCI wont work. Wrong! There 
are several True modems out there that do. The Action-Tec Call Waiting 
Modem and the US Robotics 56k PCI Modem are 2 that I have used personally 
that work just great. With that said, the following instructions are based 
on those 2 modems.
 
The best thing to do is to read the box that the modem comes in to make 
sure that it's NOT a Modem-Emulator or the so-called Win-modem. On to the 
Nitty-Gritty.
 
It is assumed that you have already installed the hardware as this 
paper is not intended as to tell you how to do that. It is also assumed 
that your Kernel has serial support, and PPPD as well as a communication 
program such as Mini-com
 
Log onto Linux and start a terminal session and SU as root
 
The modem is going to be configured based on the following files that 
are assumed to be on the system
 dev/ttySx or dev/cuax 

 If by chance they are not there you can add them by this command:
 cd dev
 ./MAKEDEV ttySx (x=port number) ie: ./makedev ttsS4
 
on open Linux there is no make DEV so the command is:
 mknod /dev/ttyS4 c 4 68
 mknod/dev/tcua4 c 5 60
 (note that in kernels 2.2.x and later the cuax have been depricated)
 
Next step is to create a few symbolic links
 
ln -s /dev/ttyS4 /dev/modem (this creates a symbolic link from the dev 
ttyS4 to dev modem)
 chmod 666 /dev/ttyS4
 chmod 666 /dev/modem
 
Now lets determine what communications port the modem is on
 cat /proc/pci
 
Look at the output and find the modem
 you might see something like this: 

 Bus 1, device 8, function 0:
 Serial controller: US Robotics/3Com 56K FaxModem Model 5610 (rev 1).
 IRQ 10.
 I/O at 0xecb8 [0xecbf].
 
Write down the first input/output (I/O) and the IRQ 
now type in this command:
 setserial /dev/modem uart 16550a port <your value> irq <your value>
 
now try it out in mini-com. If it worked add the above command to the 
following file two times. as such:
 
in the file /etc/rc.d at the last line
 setserial /dev/modem uart 16550a port <your value> irq <your value>
 setserial /dev/modem uart 16550a port <your value> irq <your value>
 
This will insure that the modem is set every time that you boot!
 
Now lets set up the PPP
 
Is assumed that you have an ISP and valid account
 
You will need:
 - User name (login) and password
 - The Dial up Telephone number
 - The IP address that's been assigned (this doesn't apply if your ISP uses 
   a Dynamic IP as Most Do)
 - The Dynamic Name Server (DNS) addresses (you need at least one I order 
to translate from URL names like www.antionline.com to the IPV4 IPV6 URL)
 
PPP comes with some scripts that are already made that just need to be 
edited and moved a bit. You can find them on MOST systems at
 /usr/share/doc/ppp-2.x.x (depending on you version of ppp)
 
Type in the following editing to fit your system
 
cp /usr/share/doc/ppp-2.4.1/scripts/ppp-* /etc/ppp
 
Now cd to the /etc/ppp dir and open up in a text editor the following 
file.
 
ppp-on
 
Make the changes in the username password telephone numbers and such
also at the bottom of the file change the line that read /dev/ttyS0 
to the tty that you system uses change the value 38400 to 115200. Save 
and close
 
Open up the ppp-on-dialer in an editor
 
Change the setting after TIMEOUT from 30 to 60
 Change the line that reads
 exec chat -v to
 exec /usr/sbin/chat -v
 save and close
 
Open up /etc/ppp/options and make SURE that there is a line that says 
LOCK This prevents other processes from accessing the modem while in use. 
Save and Close
 
Now lets set the permissions
 
Make sure that your in /etc/ppp as root 
Set the permissions for the scripts as follows
 
chmod +x ppp-o*
 
Now the password is stored Unencrypted (yeah, I know that's not the best 
way, but hey, it works) so we are going to se the permissions on that file 
to 711 (read/write/execute) for the owner and execute-only for everyone 
else.
 
chmod 711 ppp-on
 chown root ppp-on
 chgrp root ppp-on
 
now open up /etc/resolv.conf and add in the DNS address that was 
provided by your ISP
 
Let's make another Symbolic link for the scripts
 
ln -s /etc/ppp/ppp-off
 ln -s /etc/ppp/ppp-off
 
Thing should be up and working
 
If you use a GUI Like X-server and KDE or GNOME you can edit the dialup 
programs from the GUI interface and in a few moments be surfing the net 
to you hearts delight.
 
Note in KDE KPPP doesn't have an entry for DEV above ttyS3 so make sure 
that you use /dev/modem as we have already set the link for it
 
Hoped this helped and happy surfing.
                              
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 5 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'





The following was written under the influence of the BOFH (Bastard 
Operator From Hell) series of text files, written Circa.1980, about (yes 
you guessed it) ..... a Bastard Operator From Hell. In this installment it
seems the BOFH got laid and has produced an offspring .... The Bastard
Admin From Hell, read on ........

Bastard Admin From Hell here, its monday, shit WILL happen.

I get in early so I can replace NT with Windows 3.1 on all the 
machines. Should cause some interesting compatibility issues. Then I set up 
the proxy account to run all internet traffic through the teachers demo 
computer instead of our very expensive dedicated internet server, and go to 
sleep in the office.

The phone rings, its the new IT teacher.

"Yes?" I answer irratably.
"Er, my internet connection is running really slowly, do you know why?"
I don't bother with the excuse cards.
"Aren't you the teacher?"
"Well yes but..."
"Then shouldn't you know?"
"Look, who do you think..."
"Shut up. Just exit Internet Explorer (suckers), wait 10 seconds and
then it should be fine"

I quickly open his account, change his homepage to www.harcoresailors.com
and go back to sleep. 5 seconds later I hear a whole class of students
jeering very loudly. What a bastard I am, and its not even 10 yet.

I get about 2 hours of shut eye before the phone rings again. Its a 
user, he wants to know why the IT room door is locked. I didn't know it was 
but I tell him thats its to protect the hub from transgressional static
magnification. He seems to accept it and I hang up.

I open the IT room at lunchtime because I had slept enough and reading 
other people's email was getting boring. I echo a user's machine. Playing an
online RPG, the thing I hate most. The biggest waste of bandwidth since 
AOL. I take control of his computer, type www.lolitasex.com into his address 
bar and freeze the machine once the front page has loaded. I call the 
manager and tell him to check machine 12, the machine I took over. From my 
desk I hear a lot of shouting in the next room, the guy was expelled the next 
day. Life's tough isn't it. I take the phone off the hook.

After using almost the entirity of the school's bandwidth to host a 128 
player Unreal Tournament game for a few hours I get bored and nuke all the 
players with an open port. Well, like I always say, you should never trust a 
sysop running a 128 player game of UT. I decide to play the 'Chinese "And 
Then" Mind Game' and put the phone back on the hook. It takes less than 30 
seconds for it to ring. Its a user.

"Er, I have a problem, my terminal has totally frozen up and I have really
important work that I hasn't saved"
"And then?" is my only response. The user seems slightly thrown.
"Er, well I tried to open the task manager"
"And then?" I reply again.
"Well, er, nothing"
"And then?"
"Um, and then I called you"
"And then?"
"Uh, nothing"
"And then?"
"Is this a joke?"
"And then?"
"And then nothing!"
"And then?"

He hangs up, I check my watch, 20 seconds. Not bad, must try harder 
next time. I trace the call, find out his username and e-mail him a list of 
IT rules with one addition. 'Rudeness to any member of the IT staff will 
result in immediate exclusion from the network.' I echo his terminal and let 
him read the e-mail before deleting his account. Lunchtime.

I stroll back into my office just in time for the last computing class of 
the day. I check the lesson roster and find out, much to my amusement, that
Mr.Hardcore-Sailor is teaching a load of first years on "how to use the
system", God I love the beginning of the year, so many innocent victims.

I hide my computer off the network and open up CMD.EXE. I crack my 
knuckles, time to have some fun! I ponder on the best plan of attack, a 
stroke of genius hits me as I pull down the password list for that class. 
It seems one of them has set his password as "l33thaxx0r", hmm, I think we 
have a target. I feed him a dummy FBI login page and echo his terminal, lets 
see what he does.

After a pause of a few seconds i get a "HELP LOGON" message tentatively 
crawl across my screen. I use NET SEND to send him a little message: 
"UNAUTHORISED ACCESS DETECTED, TRACE COMMENCING". The kid closes the message 
very fast and the dummy screen even faster, no doubt hes panicking. I watch 
as he pulls up explorer and heads straight for the SYSTEM32 folder, no doubt 
he's going for CMD.EXE to delete himself off the network. I at least let him 
open the program before I kill the connection between his keyboard and his 
terminal.I send him another message: "CONNECTION IDENTIFIED ..... LOCATION: 
LONDON, ENGLAND". I know all the kid can do is sit and watch as I continue 
(what a shit I am).

"USER: BETTSM PWORD: L33THAXX0R ADDRESS: 51 UNION ROAD, CLAPHAM, 
LONDON"

That does it. I hear a door open in the classroom and the sound of an 
twelve year old boy crying and shitting his pants as he runs from the IT 
centre. I delete his account, I doubt he'll ever be back.




Well that concludes this episode of BAFH but if you liked it let me 
know and I might write another few. I can't take any of the credit for 
such a great concept as this and all credit goes to Simon Travaglia, 
who wrote the original series, Bastard Operator From Hell, which you 
can get from www.textfiles.com under the Humour / BOFH section.

Shout outs:
Kleptic, Timeless, snadman, all at #outbreakzine and on DALNET, the 
'Kru' (RIP), DADFAD, HMB, Spin and Shag.

Tune in next time,
Same GPC time,
Same GPC channel,
Same GPC humour,
Different GPC text file.

Peace.

 
                              ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 6 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'


Telephone Directory:
======================
Disclamer: All information in this text file is public information found 
in phone books across the country.  Enjoy.

======================
[Goat]
Real Name: Jason Jackson
Home: 847-519-0468
Cell: 847-421-6900
AIM: Ecko, Suspendedgoat02, Blew
======================
[Roland Heurich]
Wife: Kristine
Home: 301-776-7646 
7664 Kindler Rd 
Laurel, MD 20723 
======================
[Relapse]
Real Name: Jean-Patrick Pelanne
Phone: 281-334-5597
2101 Autumn Cove Dr
League City, TX 77573 
======================
[sekzul]
Cell: 909-333-6733
======================
[Chris Ulmer] 
Line 1: 410-282-7213
Line 2: 410-282-1780 (internet line)
7223 Bridgewood Dr
Baltimore, MD 21224 
======================



enjoy!!

Love
DoxBot

                              
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 7 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'


Want admin on phpBB 2.0.0?
--------------------------

PhpBB is a popular free bulletin board package available at phpbb.com, 
which google reports as having 100+ implementations at the time of 
writing this article.

A coding error exists in the admin_ug_auth.php script (used to set 
permissions), which means that although admin rights are needed to view the 
page, anyone can post data back to it �no questions asked�.  Therefore, 
if you already know what kind of response the board is looking for, you 
can go straight ahead and tell it directly that you want to give admin 
rights to a specific account.  If you do not already have an account on 
the board in question, you will have to create one.

One way to test this would be to set up a board yourself, (which you 
have admin rights over) and edit a copy of the form used to update 
permissions, but for people who don�t want to goto those lengths, I�ve 
provided some sample code below:

<html>
<head>
</head>
<body>

<form method="post" 
action="http://www.domain_name/board_directory/admin/admin_ug_auth.php">
User Level: <select name="userlevel">
<option value="admin">Administrator</option>
<option value="user">User</option></select>
<input type="hidden" name="private[1]" value="0">
<input type="hidden" name="moderator[1]" value="0">
<input type="hidden" name="mode" value="user">
<input type="hidden" name="adv" value="">
User Number: <input type="text" name="u" size="5">
<input type="submit" name="submit" value="Submit">

</form>
</body>
</html>

Before using the sample code you must first find out two bits of 
information which are both easily obtained.  The base directory of the board, 
(usually something like http://www.mydomain.com/phpBB2), which is found 
by taking off index.php from the main page URL, and the user number of 
the account you wish to give admin.  To do this go to the forums member 
list page, click your username, then note down the number shown at the 
right end of the URL you are now at.  (if no users have been deleted 
from the board, then the number next to your username on the members list 
page under the �#� column will also be your true user number, but play 
it safe and use the one in the URL).  When you have all the 
information, ensure you log out from the board.  (otherwise, you will get a 
permissions error later on, as StankDawg discovered).

Now edit the form action in the sample code above to be the full 
location of the boards base directory plus the location of the admin script.  
Usually, this is in a subdirectory from the base directory called 
/admin/.  Your result should look something like this: 
action=http://www.domain_name/board_directory/admin/admin_ug_auth.php. Save 
the changes to your page when you are done.  

Next just call it in a local browser window, typing the user number you 
obtained into the user number box on screen, and hit submit.  On your 
next log in, there will be a link at the bottom of every board page 
saying "Go to Administration Panel" and additional options will appear on 
screen when you are viewing a specific thread to enable you to edit, 
delete, lock individual posts/threads etc.


by nick84
http://rootsecure.net
http://www.stankdawg.com

                              
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 8 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'

Homework Help
=============
by: Asphalt Jones
=============
http://www.asphaltjones.tk



Asphalt J0nes: Hey bizzo. whats going down in your general direction this fine afternoon?

thelasthero666: nm studying

thelasthero666: u?

thelasthero666: who are u ?

Asphalt J0nes: oh, the usual.. hanging out in my underwear and boots playing some pong on the ol' boob tube.

Asphalt J0nes: i'm Asphalt Jones padre

Asphalt J0nes: rocker without a doubt.

thelasthero666: ??

Asphalt J0nes: you know it.

thelasthero666: ic

Asphalt J0nes: straight up rocking in the free world my friend

Asphalt J0nes: ripping shit up oldschool

Asphalt J0nes: like there was no yesterday

Asphalt J0nes: guns of steel

thelasthero666: haha icic

Asphalt J0nes: yeah dude

Asphalt J0nes: its good to see

Asphalt J0nes: my cousin Lenny had troubles seeing when he was a kid

thelasthero666: so wat u up to/?

Asphalt J0nes: and they made him wear these big ass glasses

Asphalt J0nes: looked like fucking coke bottles

thelasthero666: haha

Asphalt J0nes: yeah.. we used to kick his ass for looking like a fucking walleye

Asphalt J0nes: that dipshit

Asphalt J0nes: so what are you studying?

Asphalt J0nes: sex ed?

Asphalt J0nes: Asphalt Jones is down with that shit

Asphalt J0nes: the ladies call me Asphalt Bones

Asphalt J0nes: if ya know what im saying

thelasthero666: hahaha

Asphalt J0nes: thats right..

thelasthero666: nah studying economic

Asphalt J0nes: you know what i'm talking about!

Asphalt J0nes: economics? dammmn.

Asphalt J0nes: thats no good.

Asphalt J0nes: you need to go out and bone some ladies.

Asphalt J0nes: take it from Asphalt

thelasthero666: haha

thelasthero666: werd

Asphalt J0nes: Asphalt knows..

Asphalt J0nes: screw economics.. 

Asphalt J0nes: and while you're screwing that

Asphalt J0nes: go screw some ladies

Asphalt J0nes: YEAH!

thelasthero666: haha

Asphalt J0nes: you know it padre

thelasthero666: alrite igoing out payce

Asphalt J0nes: dont forget to rock out with yer cock out.. 

Asphalt J0nes: makes the world a better place

thelasthero666: no duobt

Asphalt J0nes: \m/

thelasthero666 signed off at 1:47:56 PM. 
                             
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 9 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'


Basic Directory Transversal

By:  StankDawg@hotmail.com

http://www.StankDawg.com/


When digging into a system it is always smart to look for obvious lack of 
security instead of looking at holes within the security.  In other words, 
if you want to poke around a system, look for the obvious, visible openings 
before engaging in actually attacking the security of the system.  I look at 
this as being given access instead of gaining unauthorized access, which 
legally, is a big difference.  Now I am not a lawyer, but these are two 
completely different things in my mind.

Basic directory transversal involves seeing what directories are publicly 
accessible without "breaking into" anything.  More advanced forms of directory 
transversal involve using these basic principles to slide through security by
using things like "/../" and hex codes to try and fool the software into 
allowing you access to directories that were not intended to be accessible.  
But let�s stick to the basics for now.  For example, depending on the type of
web server running, you are probably familiar with the fact that there is a 
specific default directory structure that usually contains at least one 
subfolder called "images."  No HTML is usually stored in this directory, but 
there are images there.  If the privileges are not set up properly, you can 
browse to the images directory and see all of the files contains within.

Take this one step further and see what other directories you can get into.  
You might find directories called "content," "templates," "members," or 
pretty much anything.  Each one of these folders should be locked down to 
prevent unauthorized access.  The sad reality is that they are not.  During 
your normal browsing of a site, or your intentional targeting of a site, 
notice the directory structure of the site.  Notice that you may suddenly 
jump two directories deep.  You may click on a link from the main page to a 
page located at "../content/articles/page1.html."  Notice that you are 
entirely bypassing a directory.  It is usually these directories that are 
nsecured.  Either the administrators are too lazy to lock that directory 
down, or they don�t even realize that it is publicly accessible.  Even though 
there is no link to it, simply navigate to that directory and see if there 
is anything there.  You may be surprised at what you find.

From this point, you should look for a pattern.  Is everything else also 
stored in subdirectories beneath the "content" directory?  If it is open, 
you will see the list of files and subdirectories.  They may not be listed 
on the home page, or linked to from any other page on the entire site.  
They may be pages that are under construction, or pages that have been 
removed for one reason or another (when I say removed, I mean that the links 
were removed, but obviously the pages may still exist).  Sometimes you may 
find "objectionable content" that was removed by request.  Frequently you 
will find the new updated home page in a subdirectory just waiting to be 
moved into the root directory.  The really fun stuff is finding a "secret" 
page that some 31337 h4x0r has "hidden" on his site that only friends are 
supposed to know about, or a page that is under construction and was not 
intended to be available yet.  I have, on many occasions, had accounts 
removed for turning in a prize claim or contest entry before the page has 
been released!

There is a lot that you can do to find the directory structure of the site, 
and I will leave that for a future article if there is interest.  I find this 
style of hacking particularly interesting because it sits in that "grey area" 
between publicly available and "breaking-and-entering."  Again, I do not know 
the law, but I am sure it sides with the companies who own the sites.  If we 
access a page or a directory that is publicly accessible or available (as long 
as you know where to look) could we (and should we) be prosecuted?  Were any 
laws technically or even ethically broken?  Is this entrapment?  Or are we 
just giving lazy incompetent administrators free run to perpetuate insufficient 
security by their own lack of ability?  I think that if something is so 
important that you don�t want it out on the internet, then don�t put it on a 
server without adequate protection.  If you do, I think you as an administrator 
should be held responsible.  Isn�t it hypocrisy to punish hackers for accessing 
a file yet not punishing the host for releasing the file?  They should be held 
accountable for their mistakes instead of blaming the hackers.  If we have the 
potential to go to jail, so should they.
                              
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 10 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'

--------------------------------------------------------------------------
A small look at Xbox LIVE

By: Turbanator
--------------------------------------------------------------------------

  When Microsoft first released details about their new online gaming 
service for the Xbox, people were skeptical.  "Do I have to give out a 
credit card over my console?", "Will my information be hacked?", and 
"Where does this information go?" were just some of the questions people 
asked about the service.  Microsoft responded that they have "Military 
Grade encryption" with the Xbox LIVE service, and I recently found out 
how close that is to the truth.

  Now, I dont know alot about encryption, so pardon me if I get 
something wrong.  I originally sought out to "hack" into the Microsoft servers 
to get into Xbox LIVE account, but found out that it was impossible.  
Why?  Because the packets of data sent between an Xbox and the LIVE 
server are UDP, which cannot be connected to, BUT, they can be intercepted 
>:]

  I managed to capture about 5 minutes worth of activity on the Xbox 
LIVE service, all of which I will not display here.  But I will point out 
some things that caught my eye.

  In this log, you can clearly see that the communication between my 
xbox, and the live server, change ports frequently (and this is about 10 
seconds worth of activity!).

21:39:22.087612 IP turbanator.3074 > 207.46.246.6.3074: udp 1404
21:39:22.176623 IP 207.46.246.6.3074 > turbanator.3074: udp 795
21:39:22.201939 IP turbanator.3074 > 207.46.246.6.3074: udp 320
21:39:22.275442 IP 207.46.246.6.3074 > turbanator.3074: udp 24
21:39:22.341035 IP turbanator.3074 > 207.46.246.6.3074: udp 36
21:39:22.415943 IP 207.46.246.6.3074 > turbanator.3074: udp 36
21:39:22.416038 IP turbanator.3074 > 207.46.246.6.3074: udp 32
21:39:22.469919 IP turbanator.3074 > 207.46.246.6.3074: udp 224

  So what Microsoft said about "Military Grade encryption" is somewhat 
true, though im not an encryption expert, so I dont know if the packets 
are encrypted or not.  Its also a good idea to have the ports change 
constantly, and to have them UDP, so no one can connect to the server.  
I've also noticed that Xbox LIVE never uses the same server when it logs 
on, it switches everytime you log out of the service.  This is also a 
good security measure.  If one day the Xbox LIVE service is infact 
cracked one day, it will be intresting to see how its done, because it would 
take alot!

  BIG thanks to dropcode for helping me with the packet interception! 
:)

--------------------------------------------------------------------------
This text file was written by:Turbanator
For:Outbreak
The author can be contacted at:turbanator2k2@yahoo.com, 
AIM=Turbanator2k2
--------------------------------------------------------------------------
 

 
  
 
                              
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 11 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'




Welcome to GPC's poetry corner where I enderver to show the effects of 
too much thought and not enough sleep / drugs. Here's a vaguely technology 
related poem although obviously, its open to interpretation, email me if you 
think it means something (or anything), it wud be interesting to hear.

Data spirals forever,
Ever increasing,
Ever frustrating,
Internal errors,
Fuck with the minds,
Of those not,
Plugged in.
Watch the blue bar,
It almost made it,
That time.
Fatal errors,
Of our minds.
Don't connect,
Don't give in,
It'll kill you.

Well there you go, it has no title and it has weird meaning but hey, 
you get what you pay for. Hmm, i think I'll give you another one actually, 
this, like the other one has no title but you might like it (if there's still 
anyone reading....)

My own little world,
The world being mine that I own.
All alone,
Lonely in this world.
Come join me,
Room for two.
There being room for two,
So we sat.
The type of sitting,
One would call standing,
If one lived,
In any other world.
Of course I'm bored.
The world being mine that I own,
My own little world.

Well there you go, email me at heelflip_the_biscuit_tin@hotmail.com if 
you have anything to say or even if you're just still reading this.

Shout outs:
Kleptic, Timeless, snadman, all at #outbreakzine and on DALNET, the 
'Kru' (RIP), DADFAD, HMB, Spin and Shag, sitting_tree, DC guys and Michael 
Moore.

Tune in next time,
Same GPC time,
Same GPC channel,
Same GPC humour,
Different GPC text file.

Peace.

                              
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 12 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'


For the simple minded that want to hack your ISP and hotmail accounts 
here is the answer you have been waiting for.

You see it every single day.... " Hey can someone tell me how to hack a 
hotmail account " or the one with more balls " Hey how do I hack my ISP ", 
then you wonder, can America's youth and their knowledge of the Internet 
really be so blind? After seeing these questions day in and day out in 
channels on dalnet that I chat in.... its come to my attention that, YES 
the majority of the people out there that get in to this whole concept 
called " hacking " (which has become such a stained word that I hate ever 
fucking using it anymore) are completely blind to it and think that they 
can " hack " anything by joining a channel on their favorite IRC network 
called hack, hacking, or something of the sort and expect to get actual 
simple answers to their retarded and sometimes ridiculous questions. Just 
think about it for more then 5 seconds which is hard for most of the wasted 
young minds out there and you will realize that if it was as easy as just 
asking some random person in a hacking channel how to hack/crack your 
own ISP then wouldn't it be done on a daily base? And wouldn't your ISP be 
going down on a daily base? Or maybe that your ISP actually hire 
professionals that get paid more money then your entire family combined to 
stop people like you and that they might actually be doing a damned good job? 
I mean I'm not saying it's impossible because it's far from that but if any 
thought at all was put in to this concept by the average person he should 
come to a conclusion that this task would be a very hard to accomplish and 
almost impossible feat that would take many years of learning every loop 
hole and exploit and every OS that your ISP could own and then on top of 
that knowing more about your ISP then the CTO and all his workers know 
combines about there own system. But no we have these simple-minded, usually 
young people that can be using their age to learn and make the Internet 
stronger and eventually gaining new concepts that they could spread to more 
people online to better the Internet and the security issues out there, 
wasting it all and simply asking these stupid questions hoping for a easy 
method that they can point click and kill their ISP then spread the word to 
their best bud to look like some hardass hacker that took his whole ISP down. 
I mean seriously WHAT THE FUCK were you thinking when you even came up with 
the idea to take down such a powerful company (not in all cases ). It's very 
sad, I hope that people that ask these questions are reading this, those fools
who join those hacking channels and ask this retarded shit get some sort 
of idea of what I'm talking about. Even though I doubt this will solve any 
problems with it but if it can even stop one person and make him think of 
learning on his own a bit and to stop asking these stupid questions and 
actually trying to figure out why it would never work then I have done my job.

-- Evo255x@hotmail.com
Aim : evo255x (feel free to ask me how to hack your ISP or hotmail 
account, I'm more then happy to lecture for the ignorant)

                              
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 13 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'


// TAR - Telco Acronym Reference
//
// by dual_parallel
//
// http://www.oldskoolphreak.com

>>>shouts to C4 and the DDP <<<


5ESS - #5 Electronic Switching System
AABS-APS - Automated Alternate Billing Services-Automated Position System
AAC - Alarm Conversion Circuit
AAL - ATM Adaptation Layer
ACD - Automated Call Distributor
ACE - ATM Circuit Emulation
ACQS - Automated Charge Quotation Services
ACTS - Automated Coin Toll Service
ADAS - Automated Directory Assistance System
ADSL - Asymmetrical Digital Subscriber Line
AFM - ATM Feed Multiplexer
AIN - Advanced Intelligen Network
AIU - Access Interface Unit
ALI - Automatic Location Identification
AM - Administrative Module
AMA - Automatic Message Accounting
AMLB - Automated Muti Leaf Bulletin
ANAC - Automated Number Announcement
ANAC - Automatic Number Announcement Circuit
ANI - Automatic Number Identificaiton
ANI - Automatic Number Identifier
APPRC - Application Recent Change
APS - Automated Position System
ARU - Audio Response Unit
ASCII - American Standard Code for Information Interchange
ASM - Administrative Service Module
ASP - Advanced Services Platform
AT - Administrative Terminal
A-TA - Asynchronous-Terminal Adapter
ATA - Automated/Automatic Trouble Analysis (OSS-network)
ATM - Asynchronous Transfer Mode
ATMI - ATM Interface Unit
BAF - Bellcore AMA Format
BAIU - Broadband Access Interface Unit
BICC - Bearer Independent Call Control
BLNA - Busy Line No Answer
BLV - Busy Line Verification
BMI - Begin Managed Introduction
BRCS - Business and Residence Custom Services
BRI - Basic Rate Interface
BST - Basic Service Terminal
BVA - Billing Validation Application
BW - Bandwidth
CALEA - Communication Assistance to Law Enforcement Act
CAMA - Centralized Automatic Message Accounting
CAP - Carrierless Amplitude and Phase
CAPIS - Customer Accessible Product Information System
CAS - Customer Account Services
CCC - Call Content Channel
CCC - Commercial Credit Card
CCI - Computer Consoles Incorporated
CCIS6 - Common Channel Interoffice Signaling System Number 6
CCITT - International Telegraph and Telephone Consultative
CCQS - Centralized Charge Quotation Service
CCRS - Bellcore Customer Change Reuqest System
CCS - Common Channel Signaling
CDC - Call Data Channel
CDMA - Code Division Multiple Access
CDP - Custom Dialing Plan
CDPD - Cellular Digital Packet Data
CDX - Compact Digital Switch
CFR - Centralized Flexible Rating
CFV - Call Fowarding Variable
CI2 - Control Interface 2
CIC - Carrier Identification Code
CLASS - Customer Local Area Signal System
CLEC - Competitive Local Exchange Carrier
CM - Communications Module
CMC - Cellular Mobile Carrier
CMP - Communication Module Processor
CMT - CCS Message Transport
CNA - Connecting Network Access
CNA - Customer Name Address
CNI - Change Number Intercept
CNI - Common Network Interface
CO - Central Office
COMDAC - COMmon Data And Control Circuit
CORE40 - MC68040 based processor
CORE60 - MC68060 based processor
CPE - Customer Premise Equipment
CSD - Circuit Switched Data
CSS - Cluster Support System
CSV - Circuit Switched Voice
CTI - Computer Telephone Integration
DA - Directory Assistance
DA/LS - Directory Assistance/Listing Service
DAA - Directory Assistance Automation
DACC - Directory Assistance Call Completion
DACS/C - Directory Assistance System Computer
DAL - Data Access Line
DAL - Direct Access Link
DF2 - Data Fanout 2
DCI - DSCh Computer Interconnect
DCLU - Digital Carrier Line Unit
DCPPU - Direct Current Power Protection Unit
DCS - Digital Cellular Switch
DDM - Dual Digtal Multiplexer
DDS - Digital Data Service
DID - Direct Inward Dial
DII - Direct Intelligent Interface
DIOR - Direct International Orginations
DLC - Digital Loop Carrier
DLTU - Digtial Line Trunk Unit
DMT - Discrete Multi-Tone
DN - Directory Number
DNT - Dialed Number Trigger
DNU - Digital Network Unit
DNU-S - Digital Networking Unit-SONET
DOJ - Department of Justice
DOPS - Digital Ordering and Planning System
DRM - Distinctive Remote Module
DS-0 - Digital Signal Level 0 (1 Channel/64 Kbps)
DSCh - Dual Serial Channel
DSL - Digital Subscriber Line
DSLAM - Digital Subscriber Line Access Multiplexer
DSU2-RAF - Digital Subscriber Unit 2-Recorded Announcement Function
DTMF - Dual Tone Multi Frequency
EADAS - Engineering and Administrative Data Acquisition System
EAIU - Expanded Access Interface Unit
EAS - Extended Area Service
EC - Echo Cancellation
ECD - Equipment Configuration Database
ECP - Engineering Change Procedure
EDU - External Disk Unit
EIS - External Information System
EM - Element Management
EMS - Element Management System
EOTAS - External Operator Trouble Report Analysis System
ESA - Emergency Service Adjunct
ESN - Emergency Service Number
EVRC - Enhanced Variable Rate Coding
EXM2000 - Extended Module 2000
FACR - Feature Activation Counting & Reconciliation
FCA - Fully Coded Addressing
FCCS - Foward Call-Call Screening
FDMA - Frequency Division Multiple Access
FEP - Front End Process
FFA - First Feature Applicaiotn
FGD - Feature Group D
FMC - Force Management Center
FMO - Future Mode of Operation
FMSI - Force Management System Interface
FR - Frame Relay
GMB - Group Make Busy
GSM - Global System for Mobile Communications
HDSL - High bit-rate DSL
HOBIC - Hotel Billing Information Center
HOBIS - Hotel Billing Information Service
HSM - Host Switching Module
IAM - Initial Address Message
ICC - Illinois Commerce Commission
IDDD - International Direct Distance Dialing
ILEC - Independent Local Exchange Carrier
IN - Intelligent Network
IP - Intelligent Peripheral
ISAS - ISDN Smart Attendant Services
ISDN - Integrated Services Digital Network
ISLU - Integrated Services Line Unit
ISP - Intermediate Switching Point
ISP - Internet Service Provider
ISUP - ISDN User Part
ISVM - Interswitch Voice Messaging
iVTOA - Integrated Voice Telephony Over ATM
IXC - Interexchange Carrier
JIP - Jurisdiciton Information Parameters
Kbps - Kilobits per second
LAG - Line Access Gateway
LASS - Local Area Signaling Services
LCC - Line Class Code
LD - Long Distance
LDAP - Lightweight Directory Access Protocol
LDIT - Local Digit Interpreter Table
LDSU - Local Digital Service Unit
LEA - Law Enforcement Agency
LEC - Local Exchange Carrier
LIDB - Line Information Data Base
LNP - Local Number Portability
LRN - Local Routing Number
LS - Listing Service
LSDB - Listing Services Data Base
LSPI - Local Service Provider Identificaiton
LTD - Local Test Desk
LTS - Loop Test System
LTSB - Line Time Slot Bridging
LU - Line Unit
MARCH - Bellcore System for end office service requests
MBG - Multiswitch Business Group
Mbps - Megabits per second
MCC - Master Control Center
MDBA - Multiple Data Base Access
MDF - Main Distruting Frame
MDN - Mobile Directory Number
MECH - More Efficient Call Handling
MF - Multi-Frequency
MFFU - Modular Fuse and Filter Unit
MHD - Moving Head Disk
MLPP - MultiLevel Precedence and Preemption
MM - Multi-Media
MMB - Member Make Busy
MMRSM - Multi-Module Remote Switching Module
MMSU - Modular Metallic Service Unit
MP - Modem Pool
MSA - Metro Service Area
MSC - Mobile Switching Center
MTB - Metallic Test Bus
MUX - MUltipleX
MWI - Message Wating Indicator
NAES - Network Administration and Engineering Support group
NAI - Network Access Interrupt
NCT - Network Control and Timing
NEBS - National Electrical Building Standards
NEBS - New Equipment and Building Standards
NEL - Next Event List
NI-2 - Network Interconnect
NOTIS - Network Operator Trouble Information System
NP - Number Portability
NPA - Number Portability Area
NPV - Net Present Value
NRC - Network Reliability Center
NRPM - Notice of Proposal Rule Making
NSC - Network Software Center
NT - Network Termination
NTP - NetMinder
NXX - Office code
OA&M - Operations, Administration, and Maintenance
OAP - OSPS Adminstrative Processor
OC-1 - Optical Carrier-1
ODBE - Office Data Base Editor
ODD - Office Dependent Data
OHD - Off-Hook Delay
OIU - Optical Interface Unit
OLS - Originating Line Screening
OMP - Operations Maintenance Platform
ORDB - Operator Reference Data Base
ORM - Optically Remote Terminal
OS - Operating System
OSDE - On-Site Data Evolution
OSPS - Operator Services Position System
OTO - Office-To-Office
OTR - Operator Trouble Reports
OWS - OSPS Operator Services Workstation
OXU - Optical Transmission Unit
PCM - Pulse Code Modulation
PCS - Personal Communications Services
PCT - Peripheral Control and Timing
PCTFI - Peripheral Control and Timing Facility Interface
PDC - Packet Data Channel
PDS 3.0 - Packet Driver Solution 3.0
PF - Private Facility
PH - Packet Handler
PH - Protocol Handler
PHV - Protocol Handler for Voice
PIDB - Peripheral Interface Data Bus
PLI - Peripheral Link Interface
PLTU - PCT Line and Trunk Unit
PMO - Present Mode of Operation
PO - Peripheral Optioning
PPP - Point-to-Point Protocol
PRI - Primary  Rate Interface
PSAP - Public Safety Answering Point
PSDI - Pin Service Denial Indicator
PSM - Position Switching Module
PSTN - Public Switched Telephone Network
PSU - Packet Switch Unit
PVC - Permanent Virtual Circuit
QoR - Query on Release
QPH - Quad-link Protocal Handler
QSS - Quote Support System
RADSL - Rate-Adaptive Digital Subscriber Line
RAF - Recorded Announcement Function
RAO - Revenue Accounitng Office
RaP - Record and Playback
RAS - Remote Access Server
RAS - Remote Access Service
RASM - Recorded Announcement Systems Manager
RBOC - Regional Bell Operating Company
RC - Recent Change
RC/V - Recent Change/Verify
REX - Routine Exercise
RFA - Receive Frame Area
RISLU - Remote ISDN Line Unit
RN - Ring Node
ROP - Read Only Printer
RSD - Rapid Software Delivery
RSM - Remote Switch Module
RT - Remote Terminal
RTBM - Real-Time Billing Memory
RTCD - Real-Time Call Detail
RTRS - Real-Time Rating System
RTU - Right-To-Use
SABM - Stand-Alone Billing Memory
SAS - Security Administration System
SAS - Security Announcement System
SCC - Switching Control Center
SCE - Service Creation Environment
SCE - Signal Conversion Electronics
SCN - Service Circiut Node
SCP - Service Control Point
SEI - Switch Engineering Information
SG-SS7 - 7R/E Signaling Gateway-SS7
SH - Stop Hunt busy
SLC - Subscriber Loop Carrier
SM - Switch Module
SM-2000 - Switching Module-2000
SMC - Switch Module Control
SMDS - Switched Multimegabit Digital Service
SMF - Single Mode Fiber
SMP - Switching Module Processor
SMS - Service Management System
SMSI - Simplified Message Service Interface
SODD - Static Office Dependent Data
SONET - Synchronous Optical NETwork
SPID - Service Profile Indicator
SPs - Service Providers
SQL - Standardized Query Language
SS7 - Signaling System Number 7
SSP - Service Switching Point
STLWS - Supplementary Trunk-Line Work Station
STP - Signal Transfer Point
STS - Synchronous Transport Signals
STS-1 - Synchronous Transport Signal Level 1 (672 Channels/51.840 Mbps)
SU - Software Update
SVC - Swithced Virtual Circuit
T&A - Toll and Assistance
TAPI - Telecomminucation Application Programming Interface
TCAP - Transaction Capabilities Application Part
TCP-IP - Transmission Control Protocol-Internet Protocol
TCS - Terminating Code Screening
TDMA - Time Division Muiple Access
TDMS - Transmission Distortion Measuring Set
TIRKS - Trunk Integrated Record Keeping System
Title III - US Code - Title III
TMS - Time Multiplexed Switch
TNM - Total Network Management System (OSS-network)
TR - Operator Trouble Reports
TRCU - Transmission Rate Converter Unit
TRCU3 - Transmission Rate Converter Unit 3
TSICNTL - Time Slot Interchange Control
TSICOM - Time Slot Interchange Common board
TSMS - Telephone Status Monitor and Select
TSP - Telephone Service Provider
UNI - User-Network Interface
USB - Universal Serial Bus
UUCP - UNIX to UNIX Copy
VCDX - Very Compact Digital Switch
VCP - Visual Call Pickup
VDT - Video Display Terminal
VRCP - Voice Recognition Call Processing
WDLC - Wireless Digital Loop Carrier
XAIU - MultipleX Access Interface Unit
XAT - X.25 Protocol Over T1 Facility

                             
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 14 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'


E-Mail Forgery
 
By:  Bi0s - (bi0s@StankDawg.com)

Want to know how to forge an e-mail?  Want to send an e-mail to a friend with a fake 
address such as: "bush@whitehouse.gov"?  It sounds tough doesn�t it?  It�s really a lot 
easier than you�d think.  This is actually a pretty old trick, but I thought some "new to the 
scene" hackers would like it.  It is important to understanding email fundamentals if 
nothing else.  First of all, will you need any special software for this? Are any special 
skills needed?  Well, not really.  If you can use telnet, you can do this.  Telnet is a client 
you can use to make a connection to a remote computer as though you were signed on 
locally.  This is a default tool included with Windows and most Linux distros.

Things to keep in mind:

Nowadays, everyone is worried about security.  So, a lot of the mail servers you will run 
into will force you to login.  However some are still wide open!  Not all these servers are 
locked up.  Some system admins just don�t know, or just don�t care about this.  This is 
usually most prevalent in schools and universities who tend not to update as often as 
others.  Sometimes, it is not locked up and it won�t even ask you for a login.  Also keep 
in mind that the server most likely is recording everything you do.  Most of the time, the 
mail server prints to a log file.  So, you may not want to do this from home.  Also, even 
though the e-mail has a forged name.  If the target is smart enough, they can just look at 
the header from the e-mail and determine what server the mail came from.  As the IP 
address will be in the header.  This can be circumvented by learning more of the SMTP 
commands and routing your email through a proxy server.

On to the Hacking:

A lot of webservers use Sendmail as their mail server.  SMTP (simple mail transfer 
protocol) is the protocol it uses.  All this does is take care of the commands needed to 
send mail.  Usually a mail server can be found on port 25.  So for example, if we wanted 
to use the mail server at stankdawg.com, we would open up telnet, set the hostname to 
stankdawg.com (usually by issuing the "open" command), and then set the port to 25. 
Now connect.

When you first get there, you should see something like this:

---
220 stankdawg.com ESMTP Sendmail 8.12.5/8.12.5; Thu, 14 Nov 2002 18:39
:56 -0500
---

It won�t do much else.  It�s sitting there waiting for your commands.  Go ahead, talk to it.
The next step is to well, say "HI" to the server.  And it will respond to you. Type:   
"HELO  stankdawg.com" and watch what happens.

---
HELO stankdawg.com
250 stankdawg.com Hello yourhostname.net [your IP here], pleased to meet you
---

Now wasn�t that nice?  This mail server is pleased to meet you.  Ok, now let�s get down 
to it.  You need to tell the server who this mail is coming from.  Essentially, who YOU 
are, or who you�d like to be.  Type this at the prompt: "MAIL FROM: 
yourdesiredname@anysite.com"

---
MAIL FROM: bios@microsoft.com
250 2.1.0 bios@microsoft.com... Sender ok
---

Now as far as it knows, that sender is ok.  It�s cool with that e-mail address.  Now we 
want to tell it who will be receiving this mail.  Type: "RCPT TO: 
billgates@microsoft.com"

---
RCPT TO: billgates@microsoft.com
250 Recipient ok
---

All right, now we have the "to" and "from" info all entered and ready to go.  Now let�s 
write this E-mail.  It�s done by typing DATA, then type in your message.  When you are 
finished typing the e-mail, hit enter.

---
DATA
Dear Bill,
You suck. And your software sucks. And that�s sad.

250 Message accepted for delivery...
---

Now to disconnect from the server, just enter the command QUIT.  That�s about it!  Your 
mail is on its way!  Most typical users will not be able to tell the difference unless they 
understand how to read the headers of their emails.  Make them somewhat believable, 
and you can have lots of fun!  Like I said earlier, this is an older trick.  Some of you may 
not know about it.  Some of you may.  Either way, have fun with it.  Enjoy yourself.  And 
never stop exploring.
                              
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 15 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'

The Hayes Modem Command Set
---------------------------
by: Magickal1


Here is a description of the Hayes Command Set. Most modems follow this 
command set to large extent. If you lost your modem manual or never had 
one in the first place, this reference might come in handy. I for 
instance finally found out how to turn my modems speaker off: ATM0 -- 
Finally: Silence!


The modem initialization string consists of a series of commands. It 
prepares the modem for communications, setting such features as dialing 
mode, waits, detection of the busy signal and many other settings. Newer 
modem communications programs reset the initializations string for you 
according to which menu options you select, which features you enable, 
etc..

For many years Hayes modems have been the standard. As the field of 
modem manufactures has grown, most have adhered at least loosely to the 
Hayes standard. The following is a partial list of the Hayes command set. 
(called the "AT" commands). The Hayes Command Set can be divided into 
four groups:

Basic Command Set

A capital character followed by a digit. For example, M1.

Extended Command Set

An "&" (ampersand) and a capital character followed by a digit. This is 
an extension of the basic command set. For example, &M1. Note that M1 
is different from &M1.

Proprietary Command Set

Usually started by either a backslash ("\"), or a percent sign ("%"), 
these commands vary widely among modem manufacturers. For that reason, 
only a few of these commands are listed below.

Register Commands

Sr=n where r is the number of the register to be changed, and n is the 
new value that is assigned.


A "register" is computerese for a specific physical location in memory. 
Modems have small amounts of memory onboard. This fourth set of 
commands is used to enter values in a particular register (memory location). 
The register will be storing a particular "variable" (alpha-numeric 
information) which is utilized by the modem and communication software. For 
example, S7=60 instructs your computer to "Set register #7 to the value 
60".


Note


Although most commands are defined by a letter-number combination (L0, 
L1 etc.), the user of a zero is optional. In this example, L0 is the 
same as a plain L. Keep this in mind when reading the table below!


Here are some of the most important characters that may appear in the 
modem initialization string. These characers normally should not be 
changed.

AT

Tells the modem that modem commands follow. This must begin each line 
of commands.

Z

Resets the modem to it's default state

, (a comma)

makes your software pause for a second. You can use more than one , in 
a row. For example, ,,,, tells the software to pause four seconds. (The 
duration of the pause is governed by the setting of register S8.

^M

Sends the terminating Carriage Return character to the modem. This is a 
control code that most communication software translates as "Carriage 
Return"


The Basic Hayes Command Set

In alphabetical order:


Table B.1. Basic Hayes Command Set


Command		Description		Comments


A0 or A		Answer incoming call	
 
A/		Repeat last command	Don't preface with AT. Enter usually aborts.

B0 or B		Call negotiation	V32 Mode/CCITT Answer Seq.

B1		Call negotiation	Bell 212A Answer Seq.

B2		Call negotiation	Verbose/Quiet On Answer

D		Dial			Dial the following number and then handshake in orginate 
mode.

					P	Pulse Dial

					T	Touch Tone Dial

					W	Wait for the second dial tone

					,	Pause for the time specified in register S8 (usually 2 
seconds

					;	Remain in command mode after dialing.

					!	Flash switch-hook (Hang up for a half second, as in
transferring a call.

					L	Dial last number

E0 or E		No Echo			Will not echo commands to the computer

E1		Echo			Will echo commands to the computer (so one can see what one 
types)

H0		Hook Status		On hook - Hang up

H1		Hook status		Off hook - phone picked up

I0 or I		Inquiry, Information, or Interrogation
						This command is very model specific. I0 usually returns a
number or code, while higher numbers often provide much more 						
useful information.

L0 or L		Speaker Loudness. Modems with volume control knobs will not 
have these options.
Off or low volume

L1		Low Volume

L2		Medium Volume

L3		Loud or High Volume

M0 or M		Speaker off			M3is also common, but different on many brands


M1						Speaker on until remote carrier detected (i.e. until the
other modem is heard)


M2						Speaker is always on (data sounds are heard after CONNECT)


N0 or N		Handshake Speed			Handshake only at speed in S37


N1						Handshake at highest speed larger than S37

O0 or O		Return Online			See also X1 as dial tone detection may be 
active.

O1						Return Online after an equalizer retrain sequence


Q0 or Q1	Quiet Mode			Off - Displays result codes, user sees command 
responses 						(e.g.OK)

Q1		Quiet Mode			On - Result codes are suppressed, user does not see
responses.

Sn?						Query the contents of S-register n

Sn=r		Store				Store the value of r in S-register n

V0 or V		Verbose				Numeric result codes

V1						English result codes (e.g.CONNECT, BUSY, NO CARRIERetc.)

X0 or X		Smartmodem			Hayes Smartmodem 300 compatible result codes

X1						Usually adds connection speed to basic result codes 
(e.g.CONNECT 1200

X2						Usually adds dial tone detection (preventing blind dial, and 
sometimes preventing AT0)

X3						Usually adds busy signal detection

X4						Usually adds both busy signal and dial tone detection

Z0 or Z		Reset				Reset modem to stored configuration. Use Z0, Z1etc. 
for 						multiple profiles. This is the same as &F for factory
						default on modems without NVRAM (non voltaile memory)

The Extended Hayes Command Set


Ampersand Commands


Table B.2. The Extended Hayes Command Set

Command			Description		Comments

&B0 or &B		Retrain Parameters	Disable auto retrain function

&B1			Retrain Parameters	Enable auto retrain function

&B2			Retrain Parameters	Enable auto retrain, but disconnect if no line 
improvement 						over the period dictated by S7

&C0 or &C1		Carrier detect		Signal always on

&C1			Carrier detect		Indicates remote carrier (usual preferred 
default)

&D0 or &D		Data Terminal Ready(DTR Signal ignored (This is modem 
specific, you must see 						your manual for information on this one!)

&D1			Data Terminal Ready(DTR	If DTR goes from On to Off the modem goes 
into command mode 						(Some modems only)
&D2			Data Terminal Ready(DTR	Some modems hang up on DTR On to Off 
transition (This is the 						usual preferred default)
&D3			Data Terminal Ready(DTR	Hang up, reset the modem, and return to 
command mode upon DTR

&F0 or &F		Factory defaults	Generic Hayes-compatible defaults. 
						This is usually a good thing to use in your init string,
          					since the &F1-&F3 settings can vary among modems, and they 
						may actually be the cause of connection problems. 
						(Since you never know exactly what Brand X's &F2 really changes.

						On the other hand, it pays to try out the other options
						below; many people's problems can be solved by replacing a 
						complicted init string with a simple &F2 or the like.  However, if 
						building an init string, it's best to start with a simple &F, and not 
						use the "customized" form of defaults.

&F1			Factory Defaults	Factory Defaults tailored to an IBM PC 
compatible user

&F2			Factory Defaults	Factory defaults for a Mac w/software 
handshaking

&F3			Factory Defaults	Factory defaults for a Mac w/hardware 
handshaking

&G0 or &G		Guard tones		Disable guard tones

&K0 or &K		Local flow control	Disable local flow control

&K1			Local flow control	Enable RTS/CTS hardware local flow control

&K2			Local flow control	Enable XON/XOFF software local flow control

&K3			Local flow control	Enable RTS/CTS hardware local flow control

&K4			Local flow control	Enable XON/XOFF software local flow control

&L0 or &L		Dial mode		Select dial-up mode

&M0 or &M		Error control mode	Select asynchronous non-EC mode (the same 
as &Q0)

&P0 or &P		Pulse dialing ratio	U.S./Canada pulse dialing 39% make / 61% 
break ratio

&P1			Pulse dialing ratio	U.K./Hong Kong pulse dialing 33% make / 67% 
break ratio

&Q0 or &Q		Error control mode	Asynchronous non-EC more. No data 
buffering. ASB disabled.

&Q5			Error control mode	Select V.42 EC operation (requires flow 
control)

&Q6			Error control mode	Asynchronous mode with ASB (requires flow 
control)

&Q8			Error control mode	Select alternate EC protocol (MNP)

&Q9			Error control mode	Conditional data compression: V.42bis = yes, 
MNP5 = no.

&S0 or &S		DSR action select	Always on (default)

&S1			DSR action select	Follows EIA specification (Active following 
carrier tone, 						and until carrier is lost.)

&T0 or &T		Self test		Model specific self test on some modems

&U0 or &U		Trellis code modulation	Enable V.32 TCM

&U1			Trellis code modulation	Disable V.32 TCM

&V0 or &V1		View active		(and often stored) configuration profile 
settings (or ATI4

&W0 or &W		Store profile		In NVRAM (&W0, &W1 etc. for multiple 
profiles) Some settings cannot be stored. These often don't show on &V or 
ATI4

&Y0 or &Y		Select configuration loaded at power-up			Load profile 0 
(default)

&Y1			Select configuration loaded at power-up			Load profile 1

&Zn=x			Soft reset and load stored profile number n		Note that all 
items after the &Z on the command line are ignored

Backslash and Percent Commands


Table B.3. Backslash and Percent Commands


Command			Description				Comments


\A0 or \A		Character maximum MNP block size	64 character maximum

\A1			Character maximum MNP block size	128 character maximum

\A2			Character maximum MNP block size	192 character maximum

\A3			Character maximum MNP block size	256 character maximum

%C0 or %C		Data Compression Enable/Disable		Disabled

%C1			Data Compression Enable/Disable		MNP5 enabled

%C2			Data Compression Enable/Disable		V.42bis (BTLZ) Enabled

%C3			Data Compression Enable/Disable		MNP5 & V.42bis (BTLZ) Enabled

%D0 or %D		Data compression			512 BLTZ dictionary size

%D1			Data compression			1024 BLTZ dictionary size

%D2			Data compression			2048 BLTZ dictionary size

%D3			Data compression			4096 BLTZ dictionary size

%E0 or %E1		Escape method				ESCAPE DISABLED

%E1			Escape method				+++AT method (default)

%E2			Escape method				BreakAT method

%E3			Escape method				BOTH methods enabled

%E4			Escape method				Disable OK to +++

%E5			Escape method				Enable OK to +++

\J0 or \J		DTE Auto Rate Adjustment		Disabled

\J1			DTE Auto Rate Adjustment		DTE rate is adjusted to match carrier 
rate.

\N0 or \N		Connection type				Normal connection (see below for 
definitions)

\N1			Connection type				Direction connection

\N2			Connection type				MNP Auto-reliable connection

\N3			Connection type				Auto-reliable connection

\N4			Connection type				V.42bis reliable link with phase detection

\N5			Connection type				V.42bis auto-reliable link with phase
detection

\N6			Connection type				V.42 reliable link with phase detection

\N7			Connection type				V.42 auto-reliable link with phase detection

A direct connection is a simple straight-through connection without any 
error connection or data compression. In this case, the 
computer-to-modem and modem-to-modem speeds must be identical.

A normal connection uses flow control (either software or hardware) to 
buffer the data being sent or received, so that the modem can transmit 
data at a different rate than the computer is actually sending or 
receiving it. For example, a computer may send actual data at 57kbps, but 
using compression, the modem only actually sends 28.8kbps. This is the 
mode use by most modems.

A reliable connection is a type of normal connection; if, for some 
reason, data compression or error correction cannot be established or 
maintained, the connection will hang up. (In essence, such a modem ensures 
that all connections are reliable, for it will hang up if the connection 
isn't.)

Likewise, an auto-reliable connection is virtually the same, except 
that the modem will try to renegotiate the connection in order to 
establish a reliable connection. Again, this is the mode that most modems use.


S-Registers

Table B.4. S Registers

Register	Range				Default	Function

S0		0-255 rings			1-2	Answer on ring number. Don't answer if 0

S1		0-255 rings			0	if S0 is greater than 0 this register counts the
incoming rings.

S2		0-127 ASCII			43 +	Escape to command mode character

S2		>127					no ESC

S3		0-127 ASCII			13 CR	Carriage return character

S4		0-127 ASCII			10 LF	Line feed character

S5		0-32, 127 ASCII			8 BS	Backspace character

S6		2-255 seconds			2	Dial tone wait time (blind dialling, see Xn

S7		1-255 seconds			30-60	Wait time for remote carrier

S8		0-255 seconds			2	Comma pause time used in dialing

S9		1-255 1/10ths second		6	Carrier detect time required for 
recognition

S10		1-255 1/10ths second		7-14	Time between loss of carrier and hangup

S11		50-255 milliseconds		70-95	Duration and spacing of tones when tone 
dialing

S12		0-255 1/50th seconds		50	Guard time for pause around +++ command 
sequence

S36		Fallback options when error correction link fails:

						7	Negotiation Failure Treatment

		0 - Disconnect

		1 - Establish Direct Connection

		3 - Establish Normal Connection	

		4 - Establish an MNP connection if possible, else disconnect

		5 - Establish an MNP connection if possible, else Direct Connection.

		7 - Establish an MNP connection if possible, else Normal connection

						
S37		1 = 300 bps			0	Negotiation Speed (Intial handshake)

		5 = 1200 bps
	
		6 = 2400 bps

		7 = 1200/75 bps (v.23 mode)
		
		8 = 4800 bps

		9 = 9600 bps

		10 = 12000 bps

		11 = 14400 bps

		12 = 7200 bps

Many modems have dozens, even hundreds, of S registers, but only the 
first dozen or so are fairly standard. They are changed with a command 
like ATSn=N, and examined with ATSn? (e.g. AT S10=70 S1? would tell the 
modem not to hang up for seven seconds should it not hear the answering 
modem, and return the number of times the phone last rang.)
                              
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 16 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'


PRINGLES: Sour Cream & Onion.             
by: rambox


yo, this is rambo. today we are discussing PRINGLES. Sour Cream & Onion, 
Like a Motha fucka.
what first comes to mind when thinking about these k-radical chips? awesome? 
kickass? Gnarly?
I went deep into the bowels of the internet.. to ask the people what they 
think about these chips

My feelings on these pringles are simple, They simply kick your ass. 
equipped with a TR0N sized buttload of flavour. That's a whole lotta 
Flavour.


ramb0x: how do you feel about sour cream & onion pringles?
Erythr0xylum: haha
Erythr0xylum: dunno
ramb0x: thats a very undecsive answer, you should have said something like, 
they haul my grandmothers ass!

-

ramb0x: how do you feel about sour cream & onion pringles?
kl3ptic: if i had an afro.. the gerbils living in them.. would be rocking.

-

ramb0x: how do you feel about sour cream & onion pringles?
duk0r: I think they kick ass
ramb0x: hell yes
duk0r: word
ramb0x: anymore thoughts on these wonderful chips?
duk0r: just pringles?
ramb0x: yes
duk0r: Bar-B-Q ones kick ass also
ramb0x: aw shit buddy, im getting all excited thinkin about them
duk0r: yeah well I just hope that im not getting you off

-

ramb0x:  how do you feel about sour cream & onion pringles?
kuban kt: i like em
ramb0x: thats it? they don't make your camo panties wet?
kuban kt: iunno..not particularly..unless they're loaded with sour cream and 
onion
ramb0x: well they shall be loaded indeed!

-

ramb0x: how do you feel about sour cream & onion pringles?
justuspost: good shit
ramb0x: damn right.

-

ramb0x: how do you feel about sour cream & onion pringles?
DigitalDamagee: MMM
DigitalDamagee: sounds like good shit

-

ramb0x:  how do you feel about sour cream & onion pringles?
f0ned: haah
f0ned: umm
f0ned: theyer not bad
ramb0x: not bad?!?! it's a orgy of flavours in your mouth my fraind.


-

ramb0x: how do you feel about sour cream & onion pringles?
PLZ DIE THX: good
ramb0x: i'm going to need more input
PLZ DIE THX: yummy

-

ramb0x: how do you feel about sour cream & onion pringles?
z0zJenz0z: they're yummy?
ramb0x: you can do better than that

-

ramb0x (1:57:09 PM): sour cream and onion pringles.. GO
dropc0de (2:07:56 PM): *crunchcrunchcrumble*


---
i took it to #2600 on dalnet..

[1:37!04p] <rambox> how do you feel about sour cream & onion pringles?
[1:37!37p] <pneumonia> i like to rub them on my sphincter
[1:38!28p] <rambox> im speechless

[1:30!13p] <rambox> how do you feel about sour cream & onion pringles?
[1:30!35p] <|iquid> I feel the creater of them should be hung by his 
testicles
[1:31!39p] <rambox> well that's not a pretty picture
[1:31!59p] <|iquid> it would make me laugh lots though

[1:30!10p] <rambox> how do you feel about sour cream & onion pringles?
[1:30!29p] <Optx> they're good
[1:31!06p] <rambox> care to say more about these elite pringles?
[1:31!41p] <Optx> all pringles are yum
[1:31!55p] <rambox> you're a gentleman and a scholar, thank you for your 
time
[1:32!10p] <rambox> and if you care to take your aggressions out on a 
pringles hater, /msg |iquid
[1:33:14]  <Optx> <Optx> YOU PRINGLES HATING FAG
[1:33!19p] <Optx> <|iquid> I don't hate all pringles
[1:33!20p] <Optx> <|iquid> just sour cream & onion
[1:33!20p] <Optx> <Optx> ok
[1:33!20p] <Optx> <|iquid> get your facts straight
[1:33!33p] <rambox> perhaps we should castrate him?
[1:34!01p] <Optx> he doesn't hate all prinlges though
[1:34!13p] <rambox> yeah but still..

[1:37!34p] <rambox> how do you feel about sour cream & onion pringles?
[1:39!28p] * You were kicked from #2600 by fire-eyes (fed)

---

[1:46!03p] <rambox> skunx, how do you feel about sour cream & onion 
pringles?
[1:47!21p] <skunx> the pringles can is about as big as my monster cock
[1:47!21p] <skunx> focktard
[1:47!49p] <Optx> you mean those 3 inch little travel cans?
[1:47!53p] <XariusX> lubejockey
[1:48!05p] <skunx> oh hell no.. those double packs..
[1:48!08p] <skunx> put those 2 together
[1:48!14p] <skunx> and you got my monster cock
[1:48!17p] <skunx> you fockenheimer

-

[1:26!47p] <rambox> how do you feel about sour cream & onion pringles?
[1:27!16p] <FMGV> they should burn in hell
[1:27!26p] <rambox> what?!?!
[1:27!49p] <rambox> you shall be tortured in hell by martha stewarts sexual 
wiles for eternity my fraind

-

[1:29!19p] <rambox> how do you feel about sour cream & onion pringles?
[1:30!20p] <TaKTiX> sounds nasty
[1:30!20p] <TaKTiX> ;/
[1:30!47p] <rambox> you AND fmgv will burn, and be sexually molested by star 
jones and barbara streissand
[1:36!48p] <TaKTiX> lol



---

and there you have it folks.. some people don't like sour cream & onion 
pringles, most do.
as for the people who don't, i'm thinkin they very well could be robots from 
planet Xalactagon.
with that said i'm going to go get some pringles.


rambox@spasm.org
rambox on @#mymeat @#outbreakzine
server: DALnet
aim: ramb0x

                              
			      ��                       ��
                          ��  ��                       ��    ��
           ��� �� ��  �۰����߰� ���  �� �� ����ܰ����۰�  ��
          ��  � �۱�  ��  ��  �������ܱ���߰�����    �۰���
          �� �  �۱�  ��  ��  ��    �۱�   ���   �����۰�  ��
           �� ���  ����   ���ܰ������߱�    ����߰���۲��    ��
              Outbreak Magazine Issue #11 - Article 17 of 18
           '~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~'

Executioner Box II - By Captain B
---------------------------------

Before anything else, let me make the purpose of both this, and the 
original version of the Executioner Box crystal clear, (Since there seems 
to have been some confusion about it). The Executioner Box I and II was 
NOT designed or intended for the purposes of being connected to phones, 
phone lines, and all other CPE (Customer Premise Equipment) and left 
turned on/unattended. Both versions of the Executioner Box are meant for 
the purposes of frying phones, modems, CID (Caller ID) units, fax 
machines, answering machines, and all other telecom devices connected to any 
given phone line, NOT people! To acheive this, you only need to keep 
the Executioner Box I or II plugged in/turned on for a few moments. NOT 3 
mins, or anything like that! Please be fully aware of the dangerous 
nature of the Executioner Box I and II. ESPECIALLY when the Executioner 
Box I or II is misused! Speaking of which, I will NOT be held responsible 
for the blatant misuse of the Executioner Box I or II. Do not operate 
while under the influence of alcohol, sleep aids and other narcotics, or 
wanton stupidity. Hopefully, this lengthy (and perhaps all-inclusive) 
disclaimer has routed out all potential ignorance. It should also be 
noted that unless you isolate the subscriber line by disconnecting the 
person's inside wiring from the telephone network at the TNI (Telephone 
Network Interface) box, the over-voltage/current surge can do damage to 
telecom equipment back at the CO (Central Office). To disconnect the 
line from the phone network with newer model TNI boxes, plug a working 
phone into the test jack on the customer side (left side) of the TNI box. 
With older model TNI boxes, remove the plug from the short, black 
colored line cord from the test jack. To locate where the TNI box is, look 
for a grayish colored  rectangular shaped box on an outside wall of a 
building. And yes, it will say "Telephone Network Interface", or maybe 
some slight variation of that on it. Some TNI boxes even have the 
telephone company's name on it. But, some TNI boxes are placed too high up on 
a wall of some buildings to be able to be reached easily. Also, you're 
going to need either a standard Phillips or flat head screwdriver to 
open the customer side of a TNI box, or you'll need a 3/8" hex nutdriver 
to open the entire TNI box through the telco access side. If there's a 
padlock on the TNI box, you'll have to open the TNI box from the telco 
access side, since that sort of "bypasses" the padlock. However, some 
buildings may not have a TNI box at all in the first place. The basic, 
overall principal behind Executioner Box II remains EXACTLY the same as 
for the first version of the Executioner Box; And that's to send more 
voltage/current than the phones and all other phone equipment is able to 
safely handle, thereby "frying" all phones and phone equipment 
connected to a given phone line. For comparison sake, the highest normal 
voltage on a phone line is during when a phone is ringing. (85-90 Volts AC, 
depending on how far you live from your central office). Also, the  
ringing AC voltage for phone lines is about 20Hz (cycles) per second, where 
as a standard electrical outlet in a house has between 110-120VAC 
(Volts AC) at around 60Hz per second. The more phones and phone equipment 
there is connected to a given phone line, the more ringing power 
(voltage/current) is needed to make all the phones ring. Because, of course, 
all phones/phone equipment draw power from the phone line. Anyway, here 
are the differences between the 1st and 2nd versions of the Executioner 
Box...

-On/off cord switch
-More compact design (..of surface mount phone jack used in this)

Plus, I'll give more alternative ways to build this box. Let me point 
out however that the more compact design of the phone jack used for 
Executioner Box II only allows for the ability to fry phones and phone 
equipment on up to 2 lines at once, as compared to up to 3 lines at once 
for the original Executioner Box. To use Executioner Box II on up to 3 
lines at once, substitute the Radio Shack RJ25 (3-line) surface mount 
jack used in Executioner Box I instead of using the 2 line surface mount 
jack mentioned here. Here's what you'll need to make this box...

-Wire cutters (The Radio Shack nippy cutters are great, but not 
madatory)
-Wire stripper
-AC lamp cord (It has a twistable on/off switch built into the cord
-Small, surface mount phone jack (This can be bought at Home Depot 
under the RCA brand name, or from K-mart under the Southwestern Bell brand 
name for about $3 +tax)

The wire cutters/stripper can be bought at Radio Shack. A variety of 
different types are availible, and no one particular type is mandatory to 
buy for this project. Any type should do. As for the AC lamp cord, you 
could simply cut one off an old lamp that either doesn't work, or you 
don't plan on using anymore. Just as long as the AC cord is good, and 
the on/off switch on the cord works, It's alright to use for building 
this box. If you don't have an old lamp with a on/off switch on the cord, 
you might find an old lamp for cheap at a garage sale, yard sale, flea 
market, 2nd hand store, or perhaps even some junk shop. But, if you 
want to buy an AC lamp cord you can be sure is in good working order, you 
can buy one for $3.98 +tax at Home Depot stores. You'll have to cut the 
light bulb socket off the end of the AC cord before it can be used for 
making this box. Also, it should be mentioned that actually ANY working 
AC power cord can be used for building Executioner Box II. But, with a 
lamp cord, you have the ability to turn the power on/off more quickly 
and easily. (Which, of course, can be pretty important with Executioner 
Box I and II). If, however, you don't mind using an AC cord without a 
built-in on/off switch, you may want to buy an electric shaver cord. 
Since electric shaver cords are coiled, it prevents cord tangles, which is 
helpful if you need to disconnect everything and pack up in a hurry. If 
you can solder, and own a soldering iron, and solder, it might be 
possible to solder up (add) a small SPST (Single Pole, Single Throw) on/off 
switch. Having some rosin flux solder paste would help, too. (It makes 
soldered joints stronger). To do this, you would also need to make a 
hole big enough somewhere in the phone jack's chasis to put in the on/off 
switch. And, with both the AC cord's wire leads, and the 4 phone wires 
inside the fairly small confines of the phone jack, it makes adding 
your own on/off switch all the more difficult. Of course, if you'd rather, 
you can actually use any size 1 piece, self contained, surface mount 
phone jack for making this box. ("Self contained" means the screw 
terminals (42A block) and phone jack are built together in 1 piece, the back 
half, and the outer cover attaches over it). If you still want to try 
adding your own switch into the phone jack chasis, and building 
Executioner Box II in that way, just make sure to buy an SPST switch that 
supports enough amperage (current). Look on the switch's package to find out 
the voltage/current ratings. Smaller switches tend to support less 
current. Running more voltage or current into a switch above the 
voltage/current ratings is risky. The same holds true for all electronic 
components. It's possible to use foreign standard (220-240 Volts AC) with 
Executioner Box II if you buy the 40 watt step-up voltage converter, (Part# 
273-1411 for about $33 +tax) and the foreign adapter travel kit, (Part# 
273-1407 for about $12 +tax) both from Radio Shack. But remember, the 
more voltage/current is used when running this box, the more dangerous 
it gets. Besides, I happen to know fact from testing the Executioner Box 
I that 110-120 Volts AC is enough to do job of frying phones and phone 
equipment. In other words, using 220-240 Volts AC is not a must.

-Construction-
First, remove the outer cover from the surface mount phone jack. Then, 
take the AC cord and cut about 5-6 feet of it (or desired length) using 
wire cutters, or a wire cutter/stripper. If you use an AC extension 
cord for making this box, you obviously want the plug at one end, then 
5-6Ft. of cord afterward. (So, cut the extension outlets off the other 
end). Now, using the wire cutters, carefully cut a small notch up the 
center between the 2 wires on the AC cord. (The Radio Shack nippy cutters 
with their small size are good for this job). After cutting the small 
notch, grab each half of the AC cord, and very slowly and carefully pull 
apart the 2 wires on the cord a bit more. Give yourself maybe about 4-5 
inches length of each of the 2 wire leads. Now that you have each 
insulated wire seperated at the end of the cord, you'll need to strip the 
insulation off each insulated wire lead at the ends. Carefully strip off 
about an inch or so of insulation on each wire end. If you have solder 
and soldering iron, you can also "tin the tips" of the AC cord wire 
leads after they've been stripped, if you so desire. Otherwise, you may 
want to simply twist the copper strands of the wire together with your 
fingers, to make the wire leads easier to work with. Now, take the 
screwdriver and loosen, but don't remove, the screws holding the yellow and 
black wires. Also loosen, but don't remove, the screws holding the red 
and green wires. Attach the yellow wire to the same screw holding the 
red wire. After that, attach the black wire to the screw holding the 
green wire in the same manner. If you want, you can now remove the other 2 
screws now that no wires are no longer attached to those screws. Note: 
if you have 6 wires (Red, green, yellow, black, blue, and white) you're 
using a 3-line jack. For a 3 line jack, take the screwdriver and 
loosen, but don't remove, the screws holding the blue, white, yellow, and 
black wires. Also loosen, but don't remove, the screws holding the red and 
green wires. Attach the blue and yellow wires under the same screw 
holding the red wire. You can attach it underneath the 2 washers on the 
screw just like red wire is attached, or attach it any other way. After 
you're done with that, attach the white and black wires to the screw 
holding the green wire in the same manner. If you want, you can now remove 
the other 4 screws now that no wires are no longer attached to those 
screws. Now, attach one of the stripped wire ends from the AC cord to one 
of the screws holding the phone wires, making sure to wrap it clockwise 
firmly around the screw under the screw's head. Then, tighten that 
screw down using the screwdriver. Repeat the process with the other 
stripped wire end from the AC cord, attaching it to the other screw, and 
tightening the screw down. Run the AC cord through the opening in the side 
of the jack, snap the phone jack's outer cover back on, and you're done. 
By the way, there's no need to worry about correct polarity 
(Ring/Negative, Tip/Positive) when hooking up the wire leads of the AC cord to the 
screws since the voltage you'll be using is AC, (Alternating Current) 
which repeatedly and constantly changes direction of current flow. Only 
DC (Direct Current) has only 1 proper current flow direction. 
Executioner Box I or II can also be hooked up to any corded phone if you modify 
a handset cord by cutting off the handset cord plug on one end of the 
handset cord, and crimping on a line cord plug at that same end. Then, 
simply disconnect the existing handset cord from the handset cord jack 
in the base of the phone you'll be connecting up Executioner Box I or II 
to, connect the line cord plug end of the modified handset cord into 
the surface mount jack on Executioner Box I or II, and connect the other 
handset cord plug end into the handset cord jack on the phone's base. 
Details of how to modify a handset cord in this way can be found in my 
"Conversion box" file. And, since the basic concept behind that was 
essentially taken from my Bungee box, that could also be used for 
reference, too. But, the thing is, if you connect the Executioner Box I or II 
directly to a phone in this way, you'll also ruin that phone. Even so, I 
just wanted you to know it was possible to connect up Executioner Box I 
or II in this way. Anyway, on to how to use this.=20

-Usage-
If you're going to use this at someone's TNI, (Network Interface)  
you'll need a portable source of AC voltage, like a portable generator. 
Some portable generators are quite noisy, because they use moving parts 
like a motor to serve as the alternator for generating the necessary AC 
voltage/current. So, you'll want to get a portable generator that uses a 
battery for power, and runs quiet. Last I seen, Radio Shack sold a 
portable generator called PortaWattz that operated on a 12v battery, could 
handle up to 300 Watts, and had an AC output of 115VAC. Which is 
perfect. You'll want a generator that can put out between 110-120VAC. But, 
this Radio Shack generator is only availible through Radio Shack 
Unlimited (Comapny direct sales) last time I checked. So, you won't find it in 
Radio Shack stores. And, at $149.99 +tax (as listed in their 2001 
catalog) It's quite expensive. But otherwise, without a portable generator, 
you'd only be able to use the Executioner box wherever you have access 
to an AC electrical outlet. At any rate, whether using it at a TNI, or 
at a standard phone jack, the basic principal remains the same. Connect 
up a modular line cord to the Executioner box that's connected to a 
working phone jack. Plug the AC power cord into a working AC outlet (turn 
it on if you're using a lamp cord with an on/off switch), and within a 
moment or so, you'll fry the internal electronic components of all 
phones, and phone equipment attached to the phone line in the house. 
Needless to say, this is obviously a box you only want to use on your 
enemies. Also, I definitely suggest you either turn off or unplug Executioner 
box II before very long, as leaving it plugged in/turned on for long 
periods of time could run the risk of starting a fire. Phones and all 
phone equipment simply aren't meant to handle this kind of voltage and 
current. Also, phone voltage is typically DC (Except when ringing). 
Speaking of that, when you connect up Executioner box II, it will make all 
phones on the line ring. Even if they're off the hook. Anyway, let's get 
back to the topic of using the Executioner Box II at a TNI. Simply open 
the TNI on the customer access side. (You could open the whole TNI 
through the Telco Access side, but It's not necessary). Remove the plug of 
the short line cord from the test jack. It would be the one with wires 
running into the house attached to the 2 screw terminals alongside the 
test jack. (Unused test jacks don't have connection to the phone wiring 
from the house). After unplugging the cord from the test jack, connect 
it to  Executioner box II. With newer model TNI boxes (which have no 
short line cord plugged into the test jack), you've got to plug in a 
working phone into the test jack, then connect up the Executioner Box II 
via a line cord modified alligator clips. And, attach the alligator clips 
to the ends of the wire leads of the phone line running into the house. 
If need be, you can unscrew those wire leads from the 2 screw terminals 
they're connected to inside the TNI box. Now, turn on the power for the 
generator, and turn the AC cord's on/off switch on (if you built this 
box with that kind of cord) for a brief moment or so, then turn it off. 
Quickly unplug the line cord from Executioner box II, and plug it back 
into the test jack where it was. Close up the TNI, pack up all your 
stuff, and get the hell out of there, FAST! One final note: It's not a 
good idea to connect up the Executioner box and use it inside your house, 
or anyone else's, since the voltage surge could travel all the way back 
to your local CO (Central Office) and cause problems for other area 
phone lines. Remember, this box is dangerous with a capital "D"! So, 
exercising caution when using it is definitely the best way to go. And, you 
may want to have some one come along with you to serve as "look out". 
If you want to test the effects of this box on only 1 phone that you 
don't need anymore, just connect a phone line cord between Executioner box 
II and the phone. Plug in the AC cord into an AC outlet (turn the AC 
cord switch on, if you've built this using a lamp cord) for a brief 
moment or so, then unplug the AC cord (or turn the cord switch off). 
Congrats! Another phone rendered totally dead and useless. Again, be careful 
and intelligent about how, when and where you use this box, and have 
phun.

         _______________________________________________________________
        |______________________________________________________________ |
        ||                                                             ||
        ||           ___        _   ____                 _             ||
        ||          / _ \ _   _| |_| __ ) _ __ ___  __ _| | _          ||
        ||         | | | | | | | __|  _ \| '__/ _ \/ _` | |/ /         ||
        ||         | |_| | |_| | |_| |_) | | |  __/ (_| |   <          ||
        ||          \___/ \__,_|\__|____/|_|  \___|\__,_|_|\_\         ||   
        ||                                                             ||
        ||_____--------------------------------------------------______||
        |_______/-----------------------------------------------\_______|
				                                      
                               ___ _           _
                              | __(_)_ _  __ _| |
                              | _|| | ' \/ _` | |
                           __ |_| |_|_||_\__,_|_|
                           \ \    / /__ _ _ __| |___
                            \ \/\/ / _ \ '_/ _` (_-<
                             \_/\_/\___/_| \__,_/__/


                                                                               
        ����������������������������������������������������������������   

		PUT THE WORDS IN HERE:
		
	Hope you all enjoyed issue #11. Now here's something to think 
        about.

        Some Call It Treason
        ====================
        By: Matthew Rothschild


        New Jersey State Senator James Cafiero upped the political rhetoric 
        to a whole new level when, on October 17, he introduced a resolution 
        urging Attorney General John Ashcroft to indict two Congresspeople 
        who went to Iraq on charges of treason.

        The traitors, according to Cafiero, are Representative Jim McDermott, 
        Democrat of Washington, and Representative David Bonior, Democrat of 
        Michigan.

        Cafiero, the Republican whip in the Jersey state house, stated in his 
        resolution: "The public comments critical of the policies and President 
        of the United States made by United States Representatives Jim McDermott 
        and David Bonior during a recent trip to Baghdad constitute an act of 
        treason against the United States. . . .

        [Their comments] gave aid and comfort to an enemy of the United States."

        McDermott and Bonior were in Iraq at the end of September and in early 
        October. They were seeking a peaceful resolution to the conflict and 
        were pleading for the United States to agree to let the U.N. inspectors 
        return to work right away.

        On ABC's "This Week" program of September 29, McDermott said that Bush 
        was "trying to provoke a war." He also said that the Untied States should 
        "take the Iraqis at their face value," and--most controversially--"I think 
        the President would mislead the American people."

        McDermott and Bonior immediately came under fire. George Will called them 
        Saddam's "American collaborators" and "useful idiots." Senator John McCain 
        slammed them, and Representative Sam Johnson, Republican of Texas, said, 
        "You cannot cavort around with the enemy and be a good American."

        Upon returning to the United States, McDermott tried to do some damage 
        control. "I perhaps overstated my case," he said.

        But Cafiero was not content to leave the controversy alone. "These two 
        Congressmen should have known better than to use their position as elected 
        officials to fan the flames of an already volatile situation by questioning 
        the wisdom of U.S. foreign policy while standing on Iraqi soil."

        Spokespersons for both Representatives declined to comment on Cafiero's 
        legislation.

        But early on in the controversy, McDermott did tell Paula Zahn of CNN, 
        "Dissent is an American right, and without it, it's not a democracy."

                                       	

             
                              - Outbreak Staff
	
        ���������������������������������������������������������������� 
        ++++++++++++++++++++++++++WATCH THIS SPACE++++++++++++++++++++++
       ����������������������������������������������������������������ij
                                +-+-+-+-+-+-+-+-+
 -���������������������۲������-|O|u|t|b|r|e|a|k|𰰰������������������۲�����-
                                +-+-+-+-+-+-+-+-+
       ����������������������������������������������������������������ij

      Outbreak Contents may not be used with out express written permission
                        By the Editor - kleptic@t3k.org
 
                               COPYRIGHT�� 2002.