đŸ Archived View for clemat.is âș saccophore âș library âș ezines âș 2600 âș 2600_1-6_djvu.txt captured on 2022-01-08 at 14:16:08.
âŹ ïž Previous capture (2021-12-03)
-=-=-=-=-=-=-
2600 Magazine - Volume 1, Number 6 2600 June, 1984 ^TTTT. â . â = nunflily bj ArfM EhTf.B rtJSFJi. I'JC.. h ttHirarniry Mnnipiian nbs *ie _ SW *nn«hy, $S J^bmialk. uJ Sh jet hick enpy. Vnir n> 3£»_ Bt.i J53. UbUk IA4. NY | |Wfl. 2IJ TlJ 2k JJ ARPANET HOPPING: AMERICA S NEWEST PASTIME VOLUME ONE NUMBER SIX WUkARPANcfi ARPANct (Advanced Research Projects Agency Network) has been . around since the 1060s. Its intentions were to link many computers toother in order to share resources. The various research projects oil ARP ANct involve both major universities, and the United States mil- itary (the t wo ait closer than cither would care to admit). Up until last year, ARPANet was one big happy family of military and University computers. Then, in view of War (Swkj, etc.. It was decided that perhaps the military would be better off on their own separate network, And so, MlLNFT was established- This proved to be very convenient for hackers, since they now knew where all of the military computers wereâ ail it took access to M JLN ET in order to play with them. Since A R PA Net can communicate with MILNET and vice versa* all kinds of interesting possibilities exist. Elaborate routing makes it easy fora hacker to cover his trail, intnuchtk'sameviiy that a phreak routes calls through three different longdistance companies to protect hi sf her identity. Where can dialups to ARPANct be found? .All over the place. For One thing, many numbers are in circulation among hackers. For another, they're not considered all that much of a secret, since the numbers by themselves don't allow you to logon. If you know of a major univcrsily computer, thereâs a chance that its already hooked into the ARPANel. If this is the case, HELP files will be readily available or that system to explain how to access the network. The network itself is an entire world waiting to be explored. Ironically â many sensitive computers that are ânot accessible by phone linesâ' are accessible by ARPANct 1 There are a lot of lessons that still must be learned, it seems. 50 Staple A Child Could Dolt Moving around ARPANel is very easy as almost any backer that used it will atce.it to. It was designed upon the principle that people on One system should have easy access to other systems. "Easyâ is the key word here. If a direct ARPANct dialup is being used, there shouldnât be any problem. IfaMILNBT dialup is being used, you will need a TAC1D, which is a private authorization code. The woid ARPANct is used to denote alt networks. There are many networks (see 2600. May I WML but all can be accessed as one through âgateways" which are basically windows into other networks. How If Wort* There are two basic commands that can be used on the ARPANeL â@o" and ^c". "0o" opens a connection with a host. (For example, @o 26,0,0.1 will connect you with a host hooked to ARPANet â indicated by the 26.) Finding addresses is really the only hard part. At one time, a few systems had a HOST command that Would give you a complete listing of hosts, and their addresses. In fact, this command is still on many systems but what was unique here was the fad that you could ran the program without fagging inf! Apparently, they got wise to hackers* and. fixed HOST so that it only works from logged in accounts, After typing â*@a'\ the network will respond with âOpenâ or, if the attempt was less than successful* a self-explanatory error message such as âBad 'âor âDestination host dead*. When you gel the âOpen" message* that means you are now connected to the host computer and you can do whatever you want, like login, read help files, etc, Communication with the network is not cut off* however. The network is always there, waiting to be spoken to. Commands to the network must begin. with For example, type "i@c" when you want to close the connection with wha- tever computer you hooked into. This will probably take a moment or two, since the network has to close up a few things before it can transfer control back to you, ( I ncidcntally, if you need to send a command to the remote host that con ta ins n in it, simply type an extra next to the first one and ARPANet will ignore it.) Sdntt Safely Tip* and Interesting Program* If you can dialup to a host that is connected to ARPANet* and you have an account on it, this is ideal. There is a good chance that the host will support a terminal simulation program* that when supplied the host name that you wish to communicate with, will conned you to it through ARPANet. It will then seem as if youâre on a teiminal connected to that remote host. To close the correction* you will have to read the documav tat ion on the host that you dialed up to, since it changes from system to system. Naturally, using a local dialup to access a host instead of going through a MILNET or ARPANel dialup is much "safer* 1 * since you are not accessing ARPANet directly. Another feature of ARPANet is the FINGER command available on most TOPS-2D systems, and many other types as well. The FINGER Command will provide you with a listing of people currently logged into the system, with some information on them, such as their full name, where their terminal is located, and what their account is known as. You will also show up on a FINGER, and it will show whether you're on a remote host or not. FINGER followed by a valid account on that system will give you same ve/rdetailed info on that person. One other very nice feature of FINGER isthat youcan supply a remote host name, and get a listing of people on another host, without connecting to tiff (For instance, FINGER @SRI-NIC will give you a lifting of people logged onto the Network Info Center.) Another program that gives details on users (though not all that much) ieSYSTAT. Both can, in many cases, be run without fogging in r and many H ELP files are also accessible without logging in. Certain HELP files give information on login formats or list dialup numbers. If you have an account on a system, the chances are quite good that that system will support FTP, which is short for File Transfer Program. This allows you to take files from one system, and copy them tfl the system that you Ye on. The one problem here is that you will need a valid account to use on the system you wish to take the files from. Most (if not all) TGPS-2Q systems support file transfers, and consequently have an account set aside for that purpose. The account is called âANON YM- OLI S* and it works with any password. Some other hosts use the account â ANON YMOU S "as well, but they are by no means consistent. The way file transfers work is through an FTP on the system that you Ye presently on. This program communkaies through ARPANet with the host you want to take files from. On the remote host, there will be a program running that will take requests from other hosts, and transmit files through the network to thou. You can do more than take files, though. You can transmit files from the host you are on to the remote host, or delete or rename files bn the remote host, or get a directory of an account on the remote host. Itâs very handy to get a file from SRTN1C which contains all network base addresses, addresses of gateways (ways of getting from one network to another), and addresses of all hosts on all networks. And, of course* thereâs the ARPANet mail system, which allows you to co mmunicate with any ARPANet user. It works in a similar fashion to FTP and FINGER as far as roaming the network to find * matching username or host IP. It is Still said that there is a very active hacker community living in ARPANet mailboxes and it ha nJ ty seems surprising when considering how fast and efficiently this mail system works. The Future Since ARPANet was designed to be, and is still being used by people who are not very familiar with computers, it will always be easy to use ARPANet* and "hop" about it. lt^ very unlikely that they will change it in any way, since it is, for the most pan, pretty good at keeping hackers away from things that they're not supposed to be looking at. Maybe... 1 Electronic Switching Advances DESPITE OBVIOUS DRAWBACKS, ESS HAS QUITE A FtW NICE FEATURES Although most phreaks tend to look upon Electronic Switching Systems with loathing and dread* they ate ad- mittedly fascinating animals to study. The smooth sophis- tication of an ESS office* small machines purring away in contrast to the deafening din of step or crossbar offices, the conspicuous lack of relays* the presence of software,, the calm, controlled, atmosphere. * Horrible, isn't it? Yes, quite, but still anyone who claims to be interested in phones must learn as much as possible about ESS, So this is a rundown of some of the interesting things that ESS can do. Here are a few things that can be done in an ESS office with individual lines that are very difficult to arrange in crossbar types (the phone company likes to refer to these as âclasses of treatment"): Line fixed for OUTGOING calls only. Incoming calls are thrown to an intercept operator or recording. Line fixed for INCOMING calls wily. Battery but no dial tone if receiver is lifted on phone , Line fixed for outgoing LOCAL cath only- Attempts to call the operator rejected* as are calls with zero or one as the first digit. Line fixed for outgoing LONG DISTANCE only. Zero ororite must be first digit dialed. Line fixed for COLLECT calling only. Paid calls rejected, as are 3rd number or credit card billings, (Used in prisons* jails, and other controlled situations,) On these* rero is the only acceptable first digit to dial. Line fixed for OUTGOING CALLS REQUIRE 1TL (what used to be a âQ" number in manual handling situat ions) Dial your call and enter a 4-6 digit personal code . ( Large companies make use of this to keep track of their employeesâ calls.) [t^ said that there arc about fifty classes of treatment, with class I being totally unrestricted (Le* a ânormal" line). As the numbers progress the types of specialties change. About 20 âclasses" are available* the remaining 30 or so are merely various combinations of the first 20 (outgoing calls only and no long distance calls allowed, eicfi. Around 85 percent of the phone lines are just your average normal arrangement â the other 15 percent are very esoteric arrangements for super-large companies, institutions, government* etc. Some other classes of treatment that are no problem for ESS to arrange are: Decline to -accept operator assisted calls. The operator is unable to intercept the line to test for busy or to interrupt in case of an emergency This feature shows up a lot on modem lines, since as many have found out, an operator cutting in on data transmission will frequently wind up inadvertently disconnecting the modem Hotel/motel service. A guest dials his; her calls normally, butTSPS will come on line to take the room number or credit card number without having to dial zero phis. TSPS sends the charges cm âpaid "calls back to the hotel via a private line to either a Teletype machine or' billing equipment on the hotel premises. Automatic reverse charge Accepted. This is your â800" service. Under ESS, it^s possible to simply take an ordinary line (a regular seven digit phone number) and assign an â800â billing code to it. Coin service. This is your traditional âpay phone" but in a new arrangement. Instead of a coin hitting a lever which makes the tip go to ground for a half second (ground start line), the ESS gives âdial tone first" and instead of the five cent âding" and the ten cent âding dingâand the twenty five cent âdoqgâas the coins are deposited* the coins being deposited make certain fre- quencies on the line. ESS is told from a phone in this âclass of treatment" to expect these frequencies, etc. The Touch tone Problem As most phreaks already know* if a central office is set up for rouchtone service, then every line is set up for same. Ail one has to do to obtain touchtone service is liberate a touchtone phone someplace. If the tones don't sound when theyVe pressed* then the tip and ring are most likely reversed. Change the position of the red/ green (yellow/ black) wires and the problem should stop. But in ESS offices* you can foiget it! ! In an ESS office, when you lift the receiver to make a call* you are extended one of two types of line selectors. The one is for customers who ha veptfiY/for touchtone service. The other is for customers who are listed as having rotary service. Oddly enough, when you reverse the tip; ring, you wont ^t the tones â place them properly and you wifi get the tones â butâ touchtones won) cut the dial tone in an ESS office unless youâve paid for it! This feature always causes huge problems whenever an office is cut over to ESS, For various reasons, the phone company^ outside plant records are usually a complete shambles* They tend to keep very poor records about just what is on the subscribers' premises. So what usually happens is this: a big company that has their own centre* line opens Its doors on Monday morning (most ESS cut-overs take place on Sunday mornings to lessen the effect of any interruption in service) and finds that half of its touchtone phones don't work! The phone company records didn't say to set up those particular lines with touchtone! Everyone has fun. Letâs Be Fair . ^ For dedicated phreaks, ESS poses a number of serious problems. But, at the same time, an awful lot of new features (i,c. toys) are making their way in our direction, thanks to ESS. The increased ease in call supervision is one feature you don't hear much about from the phone company and one that many of us would prefer to do without. But there art these âgood" things .that the telco uses as a selling point in ESS â how beneficial these are to you, versus the obvious disadvantages* you'll have to decide (even though it won^ change a thing). Call Forwarding: Forward incoming calls to whatever phone you want, local or longdistance. Call Waiting A tone comes on the line to let you know that another call is trying to reach you while you're using the phone. Three Way CaJHngi Use the switchhook to bold one party while bringing a third party on the line. ConudUtun Calking: Like three way, but you converse privately with a third person* hangup and get the first one back who had been waiting on hold* Speed .Calling: Allows calls anywhere in the U ,5, orGanada by dialing just one digit and the star sign. Store and Forward: If you can't reach your party, you can dictate a voice message to the ESS computer. Tell the computer to try every fifteen minutes until the party answers, then deliver your recorded message to him. Answering Service: Like a phone answering machine* but it is in the computer! Dial a special code, dictate your âanswering service" message and hang up. If you don\ answer after a set number of rings* the computer will play your recording and take a message from the caller! Phone companies all over are finding that these âenhanced feature$â are big sellers* In future issues, well discuss some of the bugs that have been found in these features* and in ESS systems in general. Sophisticated as it may seem, ESS is by no means perfect- No More Free Info 2600 In a move that caught almost everyone off guard, AT&T quietly put an end to the age-old tradition of five directory assistance. As of the end of May* it now costs 50c for each call to long distance information (XXX-555-1212) within the United States. And unlike previous instances of local telephone companies charging for directory assistance, there is no way to avoid this by using a public phone! Information costs 50c from everywhere with these exceptions: local directory assistance, which is st ill controlled by the local companies and not AT&T ; S00& 900 info; Canadian. info: and overseas info. AT&T is also generous enough to allow you two free calls to king distance info per month, providing you make at least two longdistance calls per month, (No, other calls to information don't count as long distance calls T) Reaction to this change ranged from total ignorance to complete disbelief. An AT&T operator told us^We didn't even know about this until today! [the day it went into effect] I don't understand these peopleâ they're going to lose a lot of cus- tomers by doing this. What they should do is charge only the people who arenât using AT&T as their primary carrier. Then, we can advertise âfree directory assistance" which no other company cam* As it happens, other companies such as Skyline now allow customers to dial long d istance information on their networks. The calls are billed as if they were tegular calls to that area. Since calls to directory assistance generally last less than thirty ^ seconds, the charge winds up being less (sometimes signi- ficantly) than 5Qe. If you choose this way to call information, you may be lucky enough to hear one of the info operators say, âThank you for dialing ATAT.â You can then have a good laugh at their expense. Meanwhile, phone phreaks around the country were parti- cularly indignant. "This puts a real crimp on silver boxipg," one said. âAnd Elm sure our favorite corporations wont enjoy paying for our information calls now on top of all the other ones," Others have suggested ordering as many free telephone books as possible, and distributing them around the country or actually setting up an alternate directory assistance center. Free telephone books can usually be obtained through local phone companies. 2600 Writer Indicted â UW| â ! Itâs been reported here and then that the editor of an mtorgrouBd magariiK called 2600 h*t been charged with wire fraud fat connection wfah the GTE TekntaD investigation (see previous issues for details on fhfa oat). One of our coontinatfaif writers it, in fat* involved with this caseâ however be to not the "editor" of our magazine. M0 to not handled by a single person, but by different people ill over the courtly who eonttftute whatever they am according to tiietr riHUtits* Wearenotan "imdergfOund^msgaziiie; we don't break laws or pubtfeh (tow that are illegal to pubHifa. We simply dtacun fartemtinf tfafrigs that can be done with todmjh tedmology. > There to tertaMy no reason for us to go underground. As for the investigation, we are confident that our writer will be vindicated and left alone. He to pfamnfaig to write a itory WkWifag Ufa "adventure* when It's all ov*r t regard tot* of hmr it end*. He hns «u full support and we hope be hw yom as wei. Computer Threat Causes Chaos in Albany*^,, AhkiihI Ph Federal and local officials were baffled by a message which appeared on a computer terminal May 19 at Albany County Airport in Albany, New York. The message said that armed individuals would be boarding a plane, according to the FBI. At about 7:15 am, the message was found on a computer screen at Boarding Gate 3. It warned that if anyone tried to interfere, âpeople would die, 1 ' Security personnel searched a plane that was coming in at that gate, but found nothing. The FBI and local authorities are trying to determine if the message was left by an airport employee or by an outsider who somehow broke into the computer system. E-COM Is Going Away tartritbri F*tW The Board of Governors of the Postal Service has voted to get out of the computer mail business and possibly turn it over to a private contractor . E-COM is what the Postal Service calls its computer mail operation, short for Electronic Computer Originated Mail. The system was designed for mass mailers, but never met its expectations since it began in January, 1982, The chief users of the system had been financial institutions, retailers, airlines, and hospitals. [For more info on E-COM, turn to page 5,] AT&T Limits Use of Their Credit Cards (YrtifMnpl NcwlShimcl . AT&T is in the process of barring d inect-dial credit card calls from south Florida to 26 countries. The nations include most of Central and South America, some in the Caribbean and some in Asia, including Israel. âThe countries selected for the suspension of credit card calls are places to which a majority of international fraudulent calls are being made," said Barry Johnson, an AT&T spokesman The Israeli prime minister was unavailable for comment. FCC Actions H|tvÂŁ