💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › B0G › b0g-6.txt captured on 2022-01-08 at 14:58:27.

View Raw

More Information

⬅️ Previous capture (2021-12-03)

-=-=-=-=-=-=-

                     _________________________________________
    .-. _ .-.       /                                         \
    | _____ | . o O|             http://www.b0g.org           |
   (   @ @   )      \________________________________________ /
    \       /
     \ --- /
       | |
    ---   ---
  |  i     i  |

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

         TH4 JUN3 1SSU3  1SSU3 VI ! 1N Y00R F4C3! PH33RN4T10N!

b0g           b0g!#               !b0     b0  #@!       b0g!#      #@!
b0g          !b0g!#@              !b0     b0  #@      @!b0g!#@     #@!
b0g         @!b0g!#@!             !b0    !b0  #@     #@!    #@!    #@!
b0g  @!     @!b  !#@!             !b0  #@!b0g!#@!b  !#@  0   @!b   #@!
b0g #@!b   #@!b   #@!   !#@!b0g!  !b0 !#@!b0g!#@!b  !#  b0g!#@!b   #@!
b0g!#@!b0  #@!b   #@!  g!#@!b0g!  !b0 !#@!b0g!#@!b g!# !b0g!#@ b0  #@!
b0g!#@!b0g #@!b   #@! 0g!#  b0g!  !b0    !b  !#    g! @!b  !#@ b0  #@!
b0g   !b0g #@!b   #@! 0g!#  b0g!  !b0   @!b  !#    g! @!b  !#@ b0  #@!
b0g   !b0g #@!b   #@! 0g!   b0g!  !b0   @!b  !#    g! @!b  !#@ b0  #@!
b0g   !b0g #@!b   #@! 0g!   b0g!  !b0 !#@!b0g!#@!  g! @!b  !#@ b0  #@!
b0g   !b0g #@!b   #@! 0g!   b0g!  !b  !#@!b0g!#@!  g! @!b  !#@ b0  #@ 
b0g   !b0g #@!b   #@! 0g!# !b0g!        @!  g!     g!# !b0g!#@!b0     
b0g!#@!b   #@!b0g!#@!  g!#@!b0g!  !b0  #@!  g!      !# !b0g!#@!b   #@!
b0g!#@!b    @!b0g!#@   g!#@!b0g!  !b0  #@! 0g!      !#@ b0 !#@!b   #@!
 0g!#@!      !b0g!#     !#@ b0g!  !b0  #@  0g        #@!           #@!
                            b0g!                       !b0g!#@!       
                       g!#@!b0g                         b0g!#@        
                       g!#@!b0                                        
                       g!#@!b                                         

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!



 ____________________________________________________________________


        [ Table of Content!                           [b0g-6.txt] 
[ 0:. - [                                                       ] :. ]
[ 1:. - [ A Look Into Wiretapping ]                      [psyops] :. ]
[ 2:. - [ getting root; the b0g way ]                    [timidu] :. ]
[ 3:. - [ Hacking Your Way into a Girlie's Heart ]      [ch1ckie] :. ]
[ 4:. - [ Guide to Mostly Harmless Masturbating ]        [tiller] :. ]
[ 5:. - [ interview with cr0bar ]                        [wh0rde] :. ]
[ 6:. - [   The SS7 Signaling Connection Control Part Relay System   ]
  (gee, couldn't come up with a longer title?)         [theclone] :. ]
[ 7:. - [ old Ladie Panty Box ]                 [PhluX And Pooly] :. ]
[ 8:. - [ mailbag ]                                   [k-rad-bob] :. ]
[ 9:. - [ How to hack the planet ]                       [wh0rde] :. ]
[10:. - [ Sniffing and spoofing explained ]              [psyops] :. ]
[11:. - [ Teenage Mutant Nigger Turtles part 2]           [chris] :. ]
[12:. - [ hacking for cybersex ]                         [nathan] :. ]
[13:. - [ How to NOT get owned by Prae ]                 [timidu] :. ]
[14:. - [ The disk trick ]                           [shadowwolf] :. ]
[15:. - [ How to crack macromedia products ]          [anonymous] :. ]
[16:. - [ hax0r trick ]                                  [timidu] :. ]
[17:. - [ Fun with noise in QBASIC ]                   [niemand1] :. ]
[18:. - [ pulling people's doc's on irc ]                [wh0rde] :. ]
[19:. - [ IRC Quotes ]                                [k-rad-bob] :. ]
[20:. - [ Closing words ]                             [k-rad-bob] :. ]
        [                                                       ] 

 ____________________________________________________________________


get your b0g at: http://www.b0g.org - official site!
                 http://packetstorm.securify.com/mag/b0g/

send your submissions to b0g@b0g.org ! 

gibb0r us your articles!
send us anything >:/







 ____________________________________________________________________
 
[ 1:. - [ A Look Into Wiretapping ]                      [psyops] :. ]
                                              [psyops@phault.org] :. ]
 ____________________________________________________________________






  Wiretapping is the traditional term for interception of telephone 
conversations. This should not be taken too literally. The word is no 
longer restricted to communications traveling by wire, and 
contemporary wiretaps are more commonly placed on radio links or 
inside telephone offices.
The meaning has also broadened in that the thing being tapped need no
longer be a telephone call in the classic sense; it may be some other
form of electronic communication, such as fax or data.

  Compared with the more precise but more general phrase 
"communications interception," the word "wiretapping" has two 
connotations.
Much the stronger of these is that a wiretap is aimed at a particular 
target, in sharp contrast to the "vacuum cleaner" interception widely 
practiced by national intelligence agencies. The weaker connotation is 
that it is being done by the police.

  The history of wiretapping in the United States is in fact two 
histories intertwined. It is a history of wiretapping per se--that is, 
a history of the installation and use of wiretaps by police, 
intelligence agencies, honest citizens, businesses, and criminals. It 
is also a history of society's legal response to wiretapping by these 
various groups.

  The origins of wiretapping lie in two quiet different practices: 
eaves dropping and letter opening. "Eavesdropping," although once more 
restricted in meaning, has come to describe any attempt to overhear 
conversations without the knowledge of the participants. "Letter 
opening" takes in all acquisition, opening reading, and copying of 
written messages, also without knowledge of the sending and receiving 
parties. Telecommunication has unified and systematized these 
practices.

  Before the electronic era, a conversation could only be carried on 
by people located within earshot of each other, typically a few feet 
apart.
Neither advanced planning nor great effort on the part of the 
participants was required to ensure a high degree of security. Written 
communications were more vulnerable, but intercepting one was still a 
hit-or-miss affair. Messages traveled by a variety of postal services, 
couriers, travelers, and merchants. Politically sensitive messages, in 
particular, could not be counted on to go by predictable channels, so 
special couriers were sometimes employed.

  And written messages enjoyed another sort of protection. Regardless 
of a spy's skill with flaps and seals, there was no guarantee that, if 
a letter was intercepted, opened, and read, the victim would not 
notice the intrusion.
Since spying typically has to be done covertly in order to succeed, 
the chance of detection is a substantial deterrent.

  Electronic communication has changed all this in three fundamental
ways: it has made telecommunication too convenient to avoid; it has,
despite appearances, reduced the diversity of channels by which 
written messages once traveled; and it has made the act of 
interception invisible to the target.

  Conversation by telephone has achieved an almost equal footing with
face-to-face conversation. It is impossible today to run a successful 
business without the telephone, and eccentric even to attempt to do 
without the telephone in private life. The telephone provides a means 
of communication so effective and convenient that even people who are 
aware of the danger of being overheard routinely put aside their 
caution and use it to convey sensitive information.

  As the number of channels of communication has increased (there are
now hundreds of communication companies, with myriad fibers, 
satellites, and microwave links), the diversity of communication paths 
has diminished. In the days of oxcart and sail, there was no registry 
of the thousands of people willing to carry a message in return for a 
tip from the recipient. Today, telecommunications carriers must be 
registered with national and local regulatory bodies and are well 
known to trace associations and industry watch groups. Thus, 
interception has become more systematic. Spies, no longer faced with a 
patchwork of ad hoc couriers, know better where to look for what they 
seek.

  Perhaps more important, interception of telecommunications leaves no
telltale "marks on the envelop." It is inherent in telecommunication--
and inseparable from its virtues--that the sender and the receiver of 
a message have no way of telling who else may have recorded a copy.

  Any discussion of wiretapping, particularly a legal discussion, is 
complicated by the fact that electronics has not only made 
interception of telecommunications possible; it has also made it 
easier to "bug" face-to-face conversations. Bugging would be nearly 
irrelevant to the central subject of this document--Taking A Deeper 
Trip Into Wiretapping--were it not for the fact that bugs and wiretaps 
are inseparably intertwined in law and jurisprudence and named by one 
collective term: electronic surveillance.

  Wiretaps and bugs are powerful investigative tools. They allow the
eavesdropper to overhear conversations between politicians, criminals,
lawyers, or lovers without the targets' knowing that their words are
being share with unwanted listeners. Electronic surveillance is a tool
that can detect criminal conspiracies and provide prosecutors with 
strong evidence--the conspirators' incriminating statements in their 
own voices--all without danger to law-enforcement officers. On the 
other hand, the very invisibility on which electronic surveillance 
depends for its effectiveness makes it evasive of oversight and 
readily adaptable to malign uses.
Electronic surveillance can be and has been used by those in power to
undermine the democratic process by spying on their political 
opponents.
In light of this, it is not surprising that Congress and the courts 
have approached wiretapping and bugging with suspicion.

  Today, communication enjoys a measure of protection under US law,
and neither government agents nor private citizens are permitted to 
wiretap at will. This has not always been the case. The current view
that wiretaps are a kind of search--has evolved by fits and starts 
over a century and a half. The Supreme Court ruled in 1967 that the 
police may not employ wiretaps without court authorization. Congress 
has embraced this principle, limiting police use of wiretaps and 
setting standards for the granting of warrants. The same laws prohibit 
most wiretapping by private citizens.

  The rules against unwarranted wiretapping are not absolute, however.
For example, the courts ruled in 1992 (United States vs. David Lee 
Smith, 978 F. 2nd 171, US App) that conversations over cordless phones 
were not protected and that police tapping of cordless phones did not 
require a search warrant. A 1994 statute (Communications Assistance 
for Law Enforcement Act of 1994, Public Law 103-414, �202) extended 
the warrant requirements of the earlier law to cover cordless phones. 
The law also makes some exceptions for businesses intercepting the 
communications of their own employees on company property.

  Feedback would be nice <psyops@phault.org>.





b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!






 ____________________________________________________________________
 
[ 2:. - [ getting root; the b0g way ]                    [timidu] :. ]
                                                 [timidu@b0g.org] :. ]
 ____________________________________________________________________





      BASH is fucking vulnerable .. every version of it .. the newest 
exploit posted here cuz BugTraq sucks (just kidding , /me is too lame 
to publish an exploit :// )
      

So kidz , wanna impress some class-mate chix0r wit y3r 31337 h4x1ng 
skee1z?
Wanna show her what rewt means , still you can't hack the school 
computer that's running Linux?
Well , check THIS new exploit out ( actually it's not an exploit , but 
I think a script-kiddie will love it) 
You only need a fucking valid account there , bash and ... oh , 2 
brain cells.
Log at your shell and follow the next 6 basic steps:

1) Issue this :  
$ echo "PS1='[root@\h /root]#'" >> .bash_profile
$ echo "PATH=$HOME/bin:$PATH" >> .bash_profile
Done? Not yet? Uhm .. man , don't fucking write the "$" . That's your
prompt :/ . Boy , are you dum....

2) Make a directory in your home directory.Call it bin .
First change to the home directory:
$ cd        
Next , do it:
$ mkdir bin
And cd to it:
$ cd bin

3) Make 2 files using a text editor.Let's say we're using pico. The 
philez name SHOULD and MUST be 'whoami' and 'id'
$ pico whoami
--cut here--
#!/bin/bash
# the whoami thingie
echo root
--stop cutting--

$ pico id
--cut here--
#!/bin/bash
# the id thingiez
echo "uid=0(root) gid=0(root) 
groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel)"

--stop cutting--

4) Make them executable philes. Oh , you don't know what that means .. 
and yet you want root. God thank me for not letting you have the 
fucking real admin rights there. So .. do this in the directory where 
'id' and 'whoami' are stored (~/bin)

$ chmod +x whoami
$ chmod +x id

5) Change ,thru .bash_profile , some of the shell variables : LOGNAME 
or USER ( some of the variables are read-only and i'll treat this 
subject l8r)

$ echo "LOGNAME=root" >> ~/.bash_profile
$ echo "USER=root" >> ~/.bash_profile 


6) Now logout and login. If you did what i've just told you you should
have a prompt similar to root's one. Oh ,and when you write whoami and 
id it should tell that you're root. Simple , eh?

Let's say that you want to go further.There are plenty of thingz to be
done and i'll cover some of them in the second part of this 
"shitlist".



I just hope that you can actually find a chick that likes leet hackers
like you. You'll just end up showing this to some weird nerd that'll 
truly admire you and wink at you , and act really strange and ask you 
out :\.




So .. you learned how to fake your identity on a Linux machine thru 6 
steps. But , heh, what if the guy you're trying to trick is smart and 
he puts you to do thingz that only root can?
What can root do and a normal user can't? See below for a few neat 
tricks



For this trick you need a shadow file. You can take it from your own 
box (actually that's dumb if it's found out).Upload this shadow file 
into the
fake-root Linux account in the ~/bin folder ( ~ means your home dir , 
you gimp!) .
Now we have to do a new k3w1 m4d r33t script. Let's fake the `cat`
command cause that's the way you view the damn /etc/shadow file.
So ..

$ cd ~/bin
Ooops .. i forgot that you just used PS1 to fake the prompt =]. I 
actually
ment '# cd ~/bin' :PPPP

# cd ~/bin
# pico cat

Now paste this eleet script 
--- start cutting ---
#!/bin/bash
found=0
y='/bin/cat '
for x in $*
do

if [ $x != '/etc/shadow' ]
then
y=$y' '$x
else
found=1
fi
done

if [ $found = 1 ]
then
$y $HOME/bin/shadow
else
/bin/cat $*
fi
--- stop cutting  ---
Now cat will print YOUR shadow file if you issue a `cat /etc/shadow`
and will just act normally in any other cases. You probably say : 
"geez , what a lame script , i could have done it in 3 rows". Hey 
motherfucker , wake up from your dreaming. Maybe your pals are 
actually smarter than you.
I was safe to make my script keep the switches for example. So , if 
you do a `cat -E -n /etc/shadow` or a `cat -n /etc/shadow -E` it'll 
still work just fine.
Next , `chmod +x cat` so you can actually use it .. and that's it.
Have fun!




Heh , i know whatcha gonna say : "mount ain't that important!!". But
goddammit , when you're not root and you can't mount a file system and
yet you try to mount it , the shell gives you that nasty output : 
"only root can do that" .
Just enter you good old bin directory and make a 'mount' file.Since 
you can't really fake a mounting , at least let's get rid of that 
"only root.." error.
For example : 
--- cut here ---
#!/bin/bash
# This iz the phile that fakes mounting.
# Name it mount and put it in ~/bin
# Don't forget to chmod it so you can run it

if [ $# = 0 ]
then
/bin/mount
exit
fi
if [ "$1" = "-V" ]
then
/bin/mount -V
elif [ "$1" = "-h" ]
then
/bin/mount -h
else
echo "only root CAN'T do that"
fi

--- stop it , man ---

Heh , lame phile and you should change that stupid "only root CAN'T do
that" thing to one of your own or something that appears more often.

There are plenty of other thingz that can be done with this PATH 
trick.
For those silly newbies that don't know even the basics , if i set
PATH=my_directory:/bin:/usr/bin then the shell will first look in
my_directory to find a command/file.


Now , if you're careful enough , you can leave the impression that 
you're really root on that system. Still , there are things where you 
can be catched as a liar ://. For example

[root@somelamebox ~]# cd /root
bash: /root: Permission denied
[root@somelamebox ~]# 

Doesn't exactly look like a root account ,eh? :/ .It's not too easy to
fake the cd command as it is an internal function of bash. You can 
still set your prompt to something like PS1='[root@\h /root]# '. Other 
TODO thingz are :

- faking ls not to show the content of the /home/$USER/bin
- killing and starting some processes
- uhm .. i dunno, but if bob publishes this (although i don't see a 
good reason that he does it) i'll continue this with more eleet ideas 
;]


I'm sorry for my bad english and for some mistakes that i made ( 
redirect flames to /dev/null ) but i had to write it in a very short 
time.
I am TOTALLY responsible for the harm that you may cause with the 
ideas/scripts posted here =]
And to quote Phuck(that's the real name of Phrack) i may say that this 
is for and by the lamers community >:>
Happy faking!






b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!





 ____________________________________________________________________
 
[ 3:. - [ Hacking Your Way into a Girlie's Heart ]      [ch1ckie] :. ]
                                            [ch1ckie@hotmail.com] :. ]
 ____________________________________________________________________




->Lesson One: Making Yourself Appear More Elite Than You Actually Are.

        -In real life, or on IRC, the most important thing that a girlie looks for 
in a hax0r is skill (she hopes it will move her up in the world), whether it is 
real skill (which is hard to come by these days) or if its simply an elite host 
(hax0r@fbi.gov). 
        
        -To make yourself appear more elite than you actually are (or ever will 
be), the first step is getting yourself an elite host (2845818@shellyeah.org 
probably won't cut it), either by means of a shell, wingate, or bnc (and if you 
don't know of these things, just tell the girl you admin some big network in 
your spare time and Im sure she'll be impressed).

        -In all retrospect, most girlies don't know the difference between _you_ 
and the real thing, so don't worry.

        -Opposing popular use...to the majority of girlies, it is best not to use 
leet speak      (eye 4m 4 m45t0r hax0r); this will more often than not end up 
confusing them and leave them bewildered. Thus, trying to impress them will 
prove useless. If you happen to have a girl that knows 'leet speak', don't 
directly use this speak with her either, but use it when she is in the premises 
("y0 m4ng, u b3tt4 ch3ck y0s3lf b4 u wr3ck y0s3lf"). This       will undoubtfully 
make you appear more elite/phearful than you actually are.

        -For those of you who are more 'skilled', deface webpages in the fair name 
of your girlie... ("U R 0wned; mad props to my girlie"). This is a concept far 
beyond most girlies, and seeing their name on www.yahoo.com proves very 
impressive.

A few other methods of making yourself appear elite: 

-obtaining operator status in as many channels as possible, do whatever you can 
to do so... suck dick, kiss ass, or stomp on some heads.

-pinging out her enemies on command will impress/delight her enough to have even 
cyber sex with you... might wanna keep that in mind.

-using random 'big' words such as "heuristic control algorithm" or 
"pleisiochronous  communications" will be sure to impress... they do not even 
have to be in an order that makes  any sense. As long as your girlie hears 'big 
important words', she will believe that you are  elite...and the sad part is, 
that you will probably believe that you are too :(. 



hacking your way into a girlie's heart. Lesson two and three coming soon 
('Making Your Girlie Feel Important', and 'Understanding Your Girlie').*


[Shouts to my 'elite' gang in ftg ....Debris, nerp, potus, omega44, JimJones, 
and all the rest.]





b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!




 ____________________________________________________________________
 
[ 4:. - [ Guide to Mostly Harmless Masturbating ]        [tiller] :. ]
                                      [tiller@digitalhackers.com] :. ]
 ____________________________________________________________________





I'm writing this for you today to illustrate the importance of good 
masturbation.  Philosophy wise, masturbation has the ability to lessen teen 
pregnancy.  Others believe it's a sin due to the explicit nature of thoughts as 
you masturbate.  But today we will demonstrate the different aspects of enjoying 
those thoughts.

First hand position:  The "Fist"
The fist is widely used, and popular amongst the teenage individuals.  The fist 
method is the base for many other methods, like the "rocker," or the "double 
fisted willy choker."  The key to good fist action is in the wrists.  Many young 
individuals, not very experienced like myself, use their upper arm and run short 
of breath by the time of ejaculation.  Another trick to good fist action is a 
tight grip.  Don't grab too tight, otherwise it starts to hurt, but a 
comfortable grip will do.  This is where the "double fisted willy choker" is 
useful.  The double fisted willy choker uses two hands, one hand grips penis, 
and the other wraps around securing the grip.  This allows the masturbator to 
relax his main hand, and still keep a tight grip.  Using the double fisted willy 
choker, you can go into a transition into the "rocker."  The rocker is very 
useful for those short of breath.  To do the rocker, stand up, start off with 
the double fisted willy choker, and then jump up and down relaxing your arms, 
allowing the weight of your arms to do the masturbating for you.  

The Second hand position:  The "Simulated Camel Toe"
The simulated camel toe is not widely used, due to it's complexity, and 
requirement for flexibility.  This method is done by placing both index fingers 
together, and both thumbs together.  Now make the hole as large as needed.  Some 
prefer tight, but as you've noticed, making a small hole requires too much 
flexibility, which is uncomfortable.  The simulated camel toe can then alter to 
perform the "sandwich."  The sandwich again requires two hands; fortunately 
flexibility is not a problem.  To perform the sandwich, it's like clapping your 
hands, except in this case, there's something in the middle.

The Third hand position:  "Fakie" 
Fakie is the "fist" method, in reverse.  By this I mean your thumb and 
forefinger should be facing down.  The fakie is useful in the sense, that some 
people get arm cramps.  This method uses different arm muscles, allowing pain 
free masturbation.

The Forth position:  "Couch Crack"
This is not exactly a hand position, but famous non the less.  The couch crack 
utilizes the crack between the cushions of your couch.  To execute this method, 
just stick it between the crack, and start humping.

Brown Finger Fist Action
The following position gives you that little more satisfaction. To get the best 
out of this position i recommend that you are on a bed, couch, and you have a 
pair of gloves (i prefer a clear kind) Firstly you need to slap your penis 
around to get it hard. Once your penis is hard you must gently tug on your penis 
for about 10-15 seconds, now you place your left index finger (if your right 
handed) into your anus. Slide your finger in and out gently while u continue to 
tug on your penis gently. After about 30 seconds the average person will reach 
there climax and blow there load. I like to describe this as the most satisfying 
masturbation known to man. *warning* using moms cleaning gloves is never a good 
idea.

Newbie note:  Doing any methods mentioned above, while spectators witness such 
an act of stupidity, will get you in the front page of your local newspaper.

You could go to jail warning:  And yes, they will charge you for indecent 
exposure.  I recommend you think before you act, otherwise, you'll be sharing a 
jail cell with some guy named Spike, who doesn't have to masturbate, he's got 
you to bend over for him now.

There is more to masturbating than just different ways of doing it.  There is 
the element of 'where' you do it.  The excitement of the different places of 
masturbating is overwhelmed by the many different public locations in your area.

Location Number One:  Your Bed
Your bed is the most basic location of masturbation.  The only difficulties that 
you may encounter are that the bedsprings can be loud.  Instead of on your bed, 
I suggest you masturbate on the floor.  This will eliminate the sound of 
bedsprings, allowing you to stay stealth.  

Location Number Two:  The Parent's Bed
This could be difficult to manage, although the experience is always something 
to tell your kids (or maybe not, unless you want them to masturbate on your 
bed).  Of course you would do this while they are gone, so stealth is not 
necessary.  

Location Number Three:  The Closet
The closet is always nice for the daytime urges, which may overcome your self-
discipline.  If you have to masturbate during daylight hours, the closet allows 
hiding from any neighbors that might see you otherwise through the window.  
Although the closet provides visual stealth, sound may be a predicament if your 
closet walls are connected to any rooms in the house.  

Location Number Four:  Pools/Hot Tubs/Lakes
These three locations are a luxury.  Not many individuals can masturbate in a 
pool, but if you ever have a chance to, it's the greatest.  Just make sure no 
one sees you doing this, other wise, this could prove to be very embarrassing.  

Location Number Five:  The Shower
The shower is the next best thing to a pool, hot tub, or a lake. The shower 
provides the soothing hydro pulsating massage therapy, while your masturbating 
to the chick you saw last night.  The great part of "showerbating" is the fact 
that any noise you make will be drowned out by the water.  "Bathbating" on the 
other hand is great and all, but stealth is a requirement.  

Experiment with the many locations in your area.

In conclusion, we have discovered the many ways of self-pleasure.  We have also 
established the fact that whom ever thinks it's a sin to masturbate, doesn't 
know how fucking great it is to shoot a wad six feet in the air, and have it 
land on the bulls eye on the piece of paper lying at your feet (this game might 
go in my next guide).  




b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!






 ____________________________________________________________________
 
[ 5:. - [ interview with cr0bar ]                        [wh0rde] :. ]
                                                 [wh0rde@b0g.org] :. ]
 ____________________________________________________________________






b0g:
  Ive been reading your parodies ever since hackers was barely
  finished, and I have to ask, where do you get your elite 0-d4y movie warez?
  Would you like more 0-d4y movie warez from a cable ftp? Are you open to
  suggestions for parodies?
  
Cr0bar:
  I don't know. . . .I work in the MAE-WEST NOC, and this guy on IRC told
  me to set up something called "warftpd", it made all the lights on our
  routers start flashing really fast, since then, all these really cool
  programs and movies have been showing up on my hard drive.  Seriously
  though, I buy the DVD of every movie that I bastardize, The Matrix was
  done using a VCD because I couldn't figure out how to do frame grabs off
  the DVD.  I may re-do The Matrix off the DVD now that I know how.  Sort
  of like the Star Wars Special Edition(s).
 
b0g: 
  You obviously have elite PrintScreen skills, how would you rate
  yourself on the following scale: AOL, Prodigy, Canuck, Ping.exe,
  /bin/bash/ping -f,  Script kiddy, User, Root, Sysadmin, wh0rde, or Burrows.
  
Cr0bar:
  Definetly whore.  Er, it depends.  Sysadmin is the highest level which I
  recognize, so I guess that's me.  I don't see ubergeek on your list.
  
b0g:
  What is your favorite:
  IRC Server? (Efnet, Unet..)
  OS? (Linux, Fbsd, Nbsd, Solaris, Windoze..)
  Text editor? (vi, pico, jove, notepad, winword (sigh)..)
  Sandwich? (Subway, Sloppy Joe, Club..)
  
Cr0bar:
  I'm partial to efnet myself, although I started on newnet (Shout-outs to
  Snowcrash, dstf, and the Optics...they knew me as "bytstream") and I
  only go to dalnet for hardcore porn.  I use windows because you just
  can't get photoshop and half-life for linux (The gimp can suck it).  I
  prefer linux or fbsd on my servers, because they make me look cool.
  
b0g:
  Have you ever seen a half naked mormon from Utah write "b0g 0wnz me"
  on his chest? If not, would you like to?
  
cr0bar:
  Only if he was about to be shot.
  
b0g:  
  What are your favorite sites to visit besides b0g.org?
  
Cr0bar:
  You mean besides my customized Yahoo! start pages????
  I think I've visited b0g.org once, when someone from there was trying to
  get me to link them....but to answer your question, I am a regular
  reader of hardocp.com, penny-arcade.com, userfriendly.org,
  arstechnica.com, theregister.co.uk, slashdot.org, and a few others that
  I don't visit enough to count as "regulars".  
  
b0g:
   Do you have any boy/girl Mtv style mp3s on any of your computers?
  (Titney Spears, Backdoor Boys, Off`Sync..)
  
Cr0bar:
  Does the "Make My Boobies One More Size" parody count?
  I have music that has appeared on MTV, none of the teenybopper stuff I
  assume you're referring to.
 
b0g: 
  What are your feelings about Napster?
  
Cr0bar:
  It exists for only one purpose, and that is piracy, which I can't
  condone in good conscience.  However, good conscience doesn't seem to
  have much of a hold on most of the world, including myself, and napster
  certainly has a right to exist.  I have begun purchasing all the CDs for
  albums which I originally had on mp3.  The ones that I didn't think were
  good enough to purchase, I erased.  This is because I support the
  artist, and I don't have room on my RAID array for shitty music.
  
b0g:
  What are your feelings on Metallica and Dr Dre?
  
Cr0bar:
  I really think "no" means "no", regardless of how many drinks you've
  had.  The least Metallica could've done was wear condoms.  I hope Dre
  tests negative and is able to sit and walk normally soon.  Wait, what
  was the question?
  
b0g:
  If you could pick one moment in your life, besides reading issue 5 of
  b0g, that you could relive (and it cant involve crisco), what would it
  be?
  
Cr0bar:
  I want to say [edited], but people I know will read this.  So, I'll just
  say the moment when I woke up and saw that my site had been slashdotted,
  and then the next hour or so right up until the sysadmin of my server
  called and yelled at me to shut it off because it was killing his
  operation.
  
b0g:
  Are you into hax0ring the planet? Do you feel the government is
  trashing our rights?
  
Cr0bar:
  Breaking into systems is no cooler than breaking into someone's car or
  home, even if you don't do any damage.  Sorry, but it's true.  However,
  "The Man" is getting us down, and needs to wise up before meddling with
  our supermation infohighway.
  
b0g: 
  What is the significance behind your h4x0r handle? If you had the
  opportunity to give Linus Torvalds, Big Willy Gates, and Rob Malda from
  slashdot h4x0r handles, and they have to use a dash "-" somewhere, what
  would they be? If you picked Pig-Fucker for Big Willy, can you explain
  why?
  
Cr0bar: 
  I picked "cr0" semi-randomly a few years ago when registering for a
  BBS.  Then I found out that it has a few "leet" connotations, if you
  will.  Apparently, there is a register in some CPUs called "cr0", which
  I found was sufficiently obscure to add "leetness" to my handle.  About
  a year after I started going by "cr0", I decided that I didn't like the
  associationw with "crow", so I changed my name to "cr0bar" (Everyone's
  favorite implement, for any task).  To this day, people still call me
  "cr0", except for Scott "Damage" Wasson of the Tech Report, who says,
  "sup, 'bar?".
  
  Linus Torvalds would have to be Trans-Meta, because I don't know what it
  means or is good for, but it seems to have gotten a lot of attention.
  It's hard to come up with a unique jab at Bill Gates, and I'm too tired
  to think about Rob Malda intelligently, do I lose points for skipping
  questions?





b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!




 ____________________________________________________________________

[ 6:. - [   The SS7 Signaling Connection Control Part Relay System   ]
  (gee, couldn't come up with a longer title?)         [theclone] :. ]
                                               [theclone@b0g.org] :. ]
 ____________________________________________________________________







   ___                                                ___
 
   The SS7 Signaling Connection Control Part Relay System
   ___                                                ___




                                        Friday May 12, 2000

^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^
    -- Research --

++ Introduction ++

++ Key Benefits of SCCP Relay ++

++ Platform & Application / Security Issue ++

++ SCCP Relay & GTT Functional Description ++

++ SCCP Relay Software Architecture ++

++ SCCP Relay Hardware Architecture ++

    -- GSM Background Information --

+ Home Location Register (HLR) +

+ Visitor Location Register (VLR) +

+ International Mobile Subscriber Identity (IMSI) +

+ GSM's Mobile Station Equipment (MSE) +

    -- GSM Call Routing --

+ Mobile Subscriber Roaming +

+ Mobile Subscriber ISDN Number (MSISDN) Call Routing +

+ Implementation of a second HLR to the GSM Network +

    -- References --

++ Web-site Resources ++

++ Acronym Definitions ++
  
    -- Wrap-up --

+* Conclusion *+
+* Contact *+

^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^ ^^^  



 Introduction --



  As the number of wireless subscribers throughout Canada and the United States
continues to increase dramatically each year, wireless carriers will be facing
the challenges that rapid growth creates. One such challenge in this market
is the migration from a single Home Location Register (HLR) to a multiple HLR
topology.

The HLR, which successfully stores critical identification and 
subscription information about each customer, can become a network bottleneck
either because of the sheer number of subscribers contained in the database, or 
because of the number of SS7 messages arriving at the HLR. A single HLR also
poses a risk to the overall survivability of the entire wireless service under
the new SS7 protocol.

Assembling additional HLR carriers to a wireless network presents significant
and problematical challenges, however. If the existing routing algorithms are
simply expanded, then every Mobile Switching Center (MSC) and Signal Transfer
Point (STP) on the network is affected, and the routing table management becomes 
extremely complicated and highly error prone.

(STPs are the packet switches of the SS7 network. They receive and route incoming 
 signaling messages towards the proper destination and also perform specialized
 routing functions.)

Many of the challenges in multiple HLR deployment are constantly an issue,
and are constantly being worked upon. Fortunately a company by the name
of MicroLegend has developed a centralized SS7 message routing system called 
the 'SCCP Relay.' The SCCP Relay supports all of the necessary GSM SS7 message
routing tables to allow wireless carriers (specifically GSM/GPRS) to easily
expand to a multiple HLR topology.

Throughout this document, I will attempt to introduce a new technology within the 
new world of the Out-of-band signaling SS7 architecture -- it is here to stay
and it has taken over the world telecommunications significantly from its older 
counterpart switching system known as 5ESS. 

Now please, sit back and relax, and prepare to enter the world of the SS7 Signaling 
Connection Control Part Relay System...


 Key Benefits of SCCP Relay --



  A number of key benefits of the SCCP Relay (which deserve some mention) are:


  'Reduced operations and maintenance overhead'
   -------------------------------------------

The routing information for each subscriber is centralized in the SCCP Relays,
rather than being distributed among all of the STPs (Signal Transfer Point)
and MSCs (Mobile Switching Center). This useful and practical method simplifies
the process of entering and maintaining STP/MSC information, not to mention
the problems involving troubleshooting of SS7 routing.


  'Providing a scaleable architecture for growth'
   -------------------------------------------- 

The SCCP Relay simplifies the addition of multiple Home Location Registers (HLRs)
as the network itself develops. Much work has been done in this sector of
SCCP development, and will continue to innovate the telecommunications industry.


  'Improved overall network reliability'
   ------------------------------------

The SCCP Relay supports the automatic routing of SS7 messages to a backup 
Home Location Register (HLR) in the event of a Primary HLR failure. This
unique and useful feature enables the multiple HLRs to be configured in a
redundant and scaleable fashion, entering that the service itself remains
available to customers even in the rare case of an HLR failure. From my
knowledge of the SCCP Relay system, its up-time is approximately 99.99%. Impressive.

  
  'Flexible connection options'
   ---------------------------

The SCCP Relay supports all types of Signaling System 7 (SS7) links, it can
operate as an STP (Signaling Transfer Point), connecting directly to mobile
switching centers (MSCs), Home Location Registers (HLRs) and other end nodes.
Typically, the flexible connection types of SS7's Signaling Transfer Points (STP) 
can be configured to the proper destination in existing incoming routing functions.

 
  'Mated pair deployment / Auto re-routing'
   ---------------------------------------

The SCCP Relay is deployed in a mated pair configuration, with each link being
fully and 100% redundant. Each mated pair system is capable of handling the full of
of network traffic (5,000,000 subscribers) with virtually no problems whatsoever.


Platform & Application / Security Issue --


Since its inception in 1994, Microlegend has focused exclusively on Signaling
System 7 network solutions. Microlegend's products support Intelligent Network
services, resolve interworking problems, switching signaling traffic, interface
SS7 and IP networks, and PROTECT network resources for telecommunications companies
worldwide. 

Because of this, Microlegend has implemented ways which enable them to do
their job quickly and reliably. Unfortunately the problem they are faced with
is the issue concerning database security. 

For example:

When Microlegend's team of engineers want to perform system diagnosis,
software updating, and subscriber databasing with "maximum efficiency", they 
simply use a dial-up connection. This dial-up connection (located in Ottawa Ontario)
requires absolutely no login or password at all - just the telephone number,
and the optimal performing Unix Operating System known as 'VxWorks'.

What is at stake:

- Microlegend faces being compromised by hackers/phreakers and malicious
  persons. These persons could take advantage of this security flaw and
  steal potentially sensitive company information.

- The telecommunications infrastructure which supports well over 5,000,000
  (five million) subscribers throughout Canada and the United States.

- Loss of revenue in the Billions due to time spent security auditing.


What can be done:

 Instead of Microlegend compromising security for obscurity by using a dial-up 
 account to perform their system diagnosis, software updating, and subscriber
 databasing, they should use their 10BaseT Ethernet LAN with an SSH connection
 to perform the necessary tasks.

 
        
 SCCP Relay & GTT Functional Description --


 
 A detailed understand of the SCCP Relay product requires quite a bit of
grounding in the works of GSM networks. For convenience, I will explain
the brief key concepts of GSM network operation in relation to SCCP Relay
and GTT functioning.

The SCCP Relay provides a "central point" for GTT provisioning and execution on
behalf of the entire GSM carrier's SS7 network. The SCCP Relay performs GTT
capabilities for both the IMSI (123049210) and MSISDN (Mobile Subscriber Integrated 
Services Digital Network) Adress types, eliminating the need to continually manage the
routing tables within STPs (Signaling Transfer Point) or MSCs (Mobile Switching Center).



ASCII Diagram                    _______
-------------             / --- ( ( | ) )  - MSC
                         /  /--  ------- 
                        /  /
SCCP Relay    STP/MSC  /  /
    \          /      /  /
   ___        ___    /  /
  |   |      |   |__/  /
  |   | ---- |   |\   /
  |   |      |   | \ /
   ---  \  /  --- \ \
         \/    |  /\ \      ___ 
         /\    | /  \ \    (___)  - HLR
        /  \   |/    \ --- |   |
   ___ /    \ ___     \ /--(___)
  |   |      |   |   __/
  |   | ---- |   |  /   \    
  |   |      |   |-/     \         
   ---        --- \       \--;__  __
                   \ ------- |  ||  | - Gateway STP
    /          \              --  -- 
SCCP Relay    STP/MSC



[[ The SCCP Relay is deployed as a redundant pair of signaling nodes that can
be accessed via SS7 links connected to currently deployed STPs or can be utilized
as the STPs themselves. Where STPs previously have been deployed, the SCCP
messages are routed to the Relay (partial GTT) by the STP/MSC. The SCCP Relay
then performs system translation (either full or partial, depending on the provisioned
data), and routes the message back to the network to be automatically forwarded
to the destination HLR. The SCCP Relay can also perform the MTP routing, which is
the main function of the STPs. This incredible capability enables the SCCP Relay to
be deployed in networks without STPs. See the ASCII Diagram Above. ]]


 SCCP Relay Software Architecture --



The SCCP Relay System is a solution based upon the 'Versatile Signaling Point' (VSP).
         
      || [look for a guide pertaining to VSP on 
    Nettwerked soon: http://nettwerk.hypermart.net] ||
        
At the "heart" of the SCCP Relay is the object oriented SS7 stack that provides
all the basic capabilities of a Signaling Transfer Point (STP) without compromising
speed or security (well, maybe not security... but I'll look into it).

The VSP SS7 Stack includes MTP and SCCP layer functionality with a configurable
GTT application, along with user interface, functioning log files (intruders beware!),
and several SCSI Disk Processes.

The GTT process supports both IMSI and MSISDN numbering formats, and as
a group, these processes are referred to as the SS7 Message Handler Unit (MHU).

Basically what the SS7 MHU does is simple: it terminates the SS7 links, performs
the GTT on incoming SS7 messages, and then re-routes the messages back onto the 
SS7 network. To optimize its performance, the MHU runs on that real-time UNIX
operating system (you guessed it) 'VxWorks'.

The SCCP Relay system with its Versatile Signaling Point platform also includes
an independent Database Administration Unit (DAU), that supports the provisioning
and administration of the GTT data. The DAU, which happens to run on a UNIX-based
Operating system (gotta love UNIX!) called AIX, includes a command parser, database
manager, and an SCSI disk interface. The DAU and MHU communicate with each other in
parallel a highly redundant 10BaseT Ethernet LAN. An Ethernet WAN is used to
connect the SCCP Relays, to ensure that they remain synchronized with each other
properly.

In addition to the software running on the DAU and MHU, the SCCP Relay system 
incorporates a Graphical User Interface (GUI) program that can be installed on 
several of the operating stations. This user interface provides the ability to 
provision and view the GTT data that resides on the DAU, as well as the option
to view the log information collected about GTT database transactions!

The operation stations connect to the SCCP Relay through a LAN or WAN, depending
on what option you choose. In addition, a custom interface to an existing provisioning
system can be developed to provision and view the entire GTT database. 
For convenience check out the following terribly drawn ASCII diagram to get a better
idea about how the SCCP Relay's DB Admin works with AIX and how the Message Handler
works with VxWorks and how they all work together on the seamless 10BaseT LAN/WAN.


ASCII Diagram
-------------

                                                                    |
          - - - - - [#] ~ Console                      10 BaseT ~  
         |                                                          |
                 - Serial Cable                     SCCP Relay     
         |       ..____________________________________________     |
                . /                             DB Admin Unit  \
         |       |                                              |---|
                 |                                              |
         |       |          (Command Parser)--------------------|---|- (@@)
                 |                   \           \              |   Customer
         |       |                    \           \             | Defined Admin
                 |                     \           \            |  Interface
         |       | (SCSI Control)--------(DB Manager)       |   |   |
                 |                              /    \          |
         |       |                             /      \_ _ _ _ _ _ _|_ _($#)
                 |                            /                 |    Ops Station
         |       |  AIX                      /                  |   |
                 |==============================================|
         |       |                           SS7 Msg Handler    |   |
                 | (GTT Application)________                    |        
         |       |      |         |         \                   |   |
                 | (SCSI Control)----------(Log Server)         |
         |       |                |         |    |              |   |
          ------ |                |         |    |   (MTP UI)   |
                 |      __________|_________|    |     |        |   |
                 |    (( SS7   [SCCP Layer] |))  |     |        |
                 |    (( Stack            _/ ))  |     |        |   |
                 |    ((       [MTP Layer]___))__|     |        | \____(#!)
                 |    ((         ||||   |____))________|        |   |--Mate
                 |    +__________||||_________+                 |    SR System
                 |               ||||                           |   |
                 |               ||||                           |
                 | VxWorks       ||||                           |   |
                  \______________||||___________________________|
                              SS7 Links                             |



 SCCP Relay Hardware Architecture --

 
 The VSP platform, on which the SCCP Relay runs, is available in a verity
of configurations and sizes. The VSP scales smoothly from an economical system
with only four SS7 links to a fully loaded system with over 75 SS7 links.

The basic structure of the hardware components of the SCCP Relay, regardless
of the size and configuration, are exactly the same. The only real differences
between small systems and large systems are the number of cards, and the size of 
the chassis itself.

The MHU is controlled by a System Controller card based on a 200 MHz PowerPC(tm)
processor. This processor controls the system level functions, including the TCP/IP
port, the serial ports, and the SCSI interface for the disk drive. It also provides
control for two Link Interface (LI) cards, with up to four SS7 links on each.
As these Link Interface cards are added, every third card is a Link controller card,
with its own 300 MHz PowerPC(tm) processor. This distributed processor architecture
ensures that the SCCP Relay has sufficient power to handle very large numbers of 
subscribers (over 5,000,000 [Five Million]).

Each Link Interface card can support as many as four (4) SS7 Links. The V.35 cards
provide four SS7 ports, while the E1 and T1 versions provide two SS7 ports each.

The DAU runs in its own independent chassis, with its own independent fan, SCSI disk
and power supply. It uses the same System Controller card as the MHU, without the need
for the use of any Link Interface or Link Controller cards.


ASCII Diagram
-------------


                Database Administration Unit
           _________________________________________________________
          |                                                         |
          |                                                         |
10BaseT   |                                                         |
   _______|                  [Disk (AIX)]                           | DC Supply
          |   {{Fan}}                          [*Power Supply*] ____|__
          |                                                         |
          |                                                         |
 Serial   |      {{{Processor - System Controller}}}                |
(Console) |                                                         |
   _______|                                                         |
          |_________________________________________________________|
          |                                                         |
          | Processor - System Controller: 1, 1                     |
 10BaseT  | Link Interface Card (4 SS7 links): 2, 2                 |
          | Link Interface Card (4 SS7 links): 3, 3                 |
          |                _   _   _    _   _   _                   |
    ______|               |1| |2| |3|  |1| |2| |3|                  |
          |               | | | | | |  | | | | | |                 -- 
          |               | | | | | |  | | | | | |                 -- E1/T1/V.35
  Serial  |               | | | | | |  | | | | | |                 --
(Console) |               | | | | | |  | | | | | |                 -- 
   _______|               | | | | | |  | | | | | |                 --
          |               | | | | | |  | | | | | |                 --
          |    [Disk]     | | | | | |  | | | | | |                 -- 
 Serial   |   [VxWorks]   | | | | | |  | | | | | |                  |
 (Logs)   |               | | | | | |  | | | | | |                  |
   _______|               | | | | | |  | | | | | |                  |
          |               | | | | | |  | | | | | |                  |
          |               | | | | | |  | | | | | |                  |
          |               | | | | | |  | | | | | |                  |
          |               | | | | | |  | | | | | |                  |
          |               |_| |_| |_|  |_| |_| |_|                  |
          |                                                         |
          |        [-~-----------------FAN-----------------~-]      |
          |   [*Power Supply*]                    [*Power Supply*]  |
          |      (DC Supply)                         (DC Supply)    |
          |_________________________________________________________|
           SS7 Message Handling Unit




   GSM Background Information -- (Acronym Definitions in paragraph form)



'Home Location Register (HLR)'


A Home Location Register (HLR) is a database that contains semipermanent mobile
subscriber information for a wireless carriers' entire subscriber base.

HLR subscriber information includes the International Mobile Subscriber Identity
(IMSI), service subscription information, location information (the identity of
the currently serving Visitor Register (VLR) to enable the routing of mobile-terminated
calls), service restrictions and supplementary services information.

What the HLR basically does is it handles SS7 transactions with both Mobile Switching
Centers (MSCs) and of course VLR nodes, which either request information from the HLR
or update the information contained within the HLR. The HLR also initiates transactions
with VLRs to complete incoming calls and to update subscriber data.

Traditional wireless network design (anything before 1996) is based on the utilization
of a single Home Location Register (HLR) for each wireless network, but growth 
considerations are prompting carrier administrators to consider multiple HLR databases.

So what does that mean? It means our Telecommunications Industry is under pressure to
develop larger and faster networks in order to satisfy the needs of residential and
business customers.


'Visitor Location Register (VLR)'

A Visitor Location Register (VLR) is a database which contains temporary information
concerning the mobile customers (subscribers) that are currently located in a
given MSC (Mobile Switching Centre) serving area, but whose Home Location Register (HLR)
is elsewhere (out of range).

When a mobile subscriber roams away from his/her home location and into a remote location
(ie. digital to analog), SS7 messages are used to obtain information about the subscriber
from the HLR, and essentially create a temporary record for the subscriber in the VLR which
usually only has one per Mobile Switching Centre.


'International Mobile Subscriber Identity (IMSI) Number' 

"What the hell is IMSI?" - IMSI is a unique non-dialable number allocated to each mobile
subscriber in the GSM system that identifies the subscriber and his or her subscription
within the GSM network. Make sense yet?

The IMSI resides in the Subscriber Identity Module (SIM), which is transportable across
Mobile Station Equipment (MSE) (look for IMSI being supported by the GPRS standard soon!)

The IMSI is made up of three important parts: 

#1: The Mobile Country Code (MCC)

#2. The Mobile Network Code (MNC) (they consist of 2 digits)

#3. The Mobile Subscriber Identity Number (MSIN) (they consist of 10 digits)



'Mobile Subscriber ISDN (MSISDN) Number'

The MSISDN is the dialable number that subscribers use to reach another mobile
subscriber. Some of the newer phones (ie. newer GSM supported Motorola, Nokia's)
in Canada and the U.S. support the up-to-date multiple MSISDNs which are now in 
affect.


'Mobile Station Equipment (MSE) Subscription Services'

GSM carriers typically order Mobile Station Equipment (MSE) (or GSM phones)
from their suppliers (Nokia, Motorola, Sony, etc.) in large quantities (e.g. 1000 Units).
After receiving an order, the equipment supplier will program the ordered MSE SIMs with a
range of IMSI numbers.



  GSM Call Routing --


 'Mobile Subscriber Roaming'

When a mobile subscriber roams into a new location area, the VLR automatically 
determines that it must update the HLR with the new location information, which it does
using an SS7 Location Update Request Message (LURM). The Location Update Message
is then routed to the HLR through the SS7 network, based on the global title translation
of the IMSI that is stored within the SCCP Called Party Address portion of the message.
The HLR responds with a message that informations the VLR whether the subscriber should
be provided services in the new location.

 
 'Mobile Subscriber ISDN Number (MSISDN) Call Routing'

When a user dials a GSM mobile subscriber's MSISDN, the PSTN routes the call
to the Home MSC based on the dialed telephone number. The MSC must then query
the HLR based on the MSISDN identification, to acquire routing information required
to route the call to the subscribers' current location.

The MSC stores sensitive global title translation tables that are used to determine
the HLR associated with the MSISDN. When only one HLR exists, the translation tables
are trivial. When more than one HLR is used however, the translations become extremely
challenging, with one translation record per subscriber (see the useful example below).
Havin determined the appropriate HLR address, the MSC sends a Routing Information Request
(RIR) to it.

Example:
--------
When the HLR receives the Routing Information Request, it "maps" the MSISDN to the IMSI,
and ascertains the subscribers' personal profile including the current VLR at which the
subscriber is registered. The HLR then queries the VLR for a Mobile Station Roaming Number
(MSRN). The MSRN is essentially an ISDN telephone number which the mobile subscriber can
be reached at. The MSRN is a temporary number that is valid ONLY for the duration of a 
single call. The HLR generates a response message, which includes the MSRN, and sends it
back across the SS7 network to the MSC. Finally, the MSC attempts to complete the call using
the MSRN provided.


  'Implementation of a second HLR to the GSM Network'

As a GSM wireless carrier's subscriber base grows, it will eventually become
necessary to add a second HLR to their network (obviously). This requirement might be
prompted by a Service Subscription Record Storage Capacity Issue (SSRSCI) or
perhaps an SS7 Message Processing Performance Issue (MPPI). It might possibly be prompted
by a need to increase the overall network reliability.

The new HLR can be populated with service subscription records as new subscribers are 
brought into service or existing service subscription records can be ported from the old
HLR to the new HLR to more evenly distribute the growing SS7 traffic load.
Usually, when new subscribers are brought into service, the second HLR will be populated
with blocks of IMSI numbers that are allocated when new MSE equipment is ordered.

Much more complicated SS7 message routing Global Title Translations are required
for Routing Information Request transactions between the MSCs distributed over the
entire wireless carrier serving area and the two or more HLRs. MSC Routing Information
Requests are routed to the appropriate HLR based on the dialed MSISDN and not the IMSI.

Unlike the IMSI numbers, the MSISDN numbers can not easily be arranged in groups to
reside within a single HLR and therefore, the MSC must contain an MSISDN to HLR 
address association record for every mobile subscriber homed on each of the MSCs.


    References --



'Web-site Resources'


Frame Relay
http://cctpwww.cityu.edu.hk/network/l2_framerelay.htm

Frame Relay Forum
http://www.frforum.com/

HN Networks
http://www.hn-networks.co.uk/index.html

MicroLegend SS7 Tutorial 
http://www.microlegend.com/whatss7.shtml

Telecom Testing Support for GSM, SS7, GPRS, CDMA, Broadband
http://www.radcom-inc.com/tstsolut/telecom.htm


-- This is seriously the best information I could find.
What ever happened to the days where you'd punch in a phrase or
word, and actually find decent documents on personal and/or educational
web-sites? Now all I run into are these God damn commercial .com's
sites who just want to sell their shitty hardware/software... who
just want to make a BUCK. Well never worry about me selling out
to "the man", because all my information is going to stay completely FREE! =)


'Acronym Definitions'


I compiled most of these myself... the rest are stolen.


ACM             Address Complete Message
ANM             Answer Message
A Links         Access Links
BIB             Backward Indicator Bit
B Links         Bridge Links
BSN             Backward Sequence Number
CDT             Conversation Data Table
CPA             Called Party Address
CPN             Called/Calling Party Number
DAU             Database Administration Unit
D Links         Diagonal Links
DPA             Distributed Processor Architecture
DPC             Destination Point Code
E Link          Extended Link
F Link          Fully Associated Link
FIB             Forward Indicator Bit
FISU            Fill in Signal Unit
FSN             Forward Sequence Number
GTT             Global Title Translation
HLR             Home Location Register
IAM             Initial Address Message
IRSC            International Roaming Signaling Converter
ISDN            Integrated Services Digital Network
ISUP            ISDN User Part
KPBS            Kilobits per Second
LSSU            Link Status Signal Unit
LURM            Location Update Request Message
Mf              Multifrequency
MHU             Message Handler Unit
MPPI            Message Processing Performance Issue
MSC             Mobile Switching Center
MSE             Mobile Station Equipment
MSIN            Mobile Subscriber Identity Number
MSISDN          Mobile Subscriber Integrated Services Digital Network
MSRN            Mobile Station Roaming Number
MSU             Message Signal Unit
MTP             Message Transfer Part 
OMAP            Operations, Maintenance and Administration Part
OPC             Originating Point Code
PC              Point Code
PSTN            Public Switched Telephone Network
RBOC            Regional Bell Operating Company
REL             Release Message
RCL             Release Complete Message
RIR             Routing Information Request
RSP             Route Set Prohibited Test Message
RSR             Restricted Test Message
SS7             Signaling System 7
SCCP            Signaling Connection Control Part
SCP             Signal Control Point
SLS             Signaling Link Selection
SOI             Service Order Interface
SSRSCI          Service Subscription Record Storage Capacity Issue
SRT             Screening and Rerouting Table
SSP             Signal Switching Point
STP             Signal Transfer Point
SU              Signal Unit
TCAP            Transaction Capabilities Application Part
TFA             Transfer Allowed Message
TFP             Transfer Prohibited Message
TFR             Transfer Restricted Message
TUB             Traffic Usage or Billing
VPC             Virtual Point Codes
VSP             Versatile Signaling Point



        Wrap-up --


'Conclusion'


This is the first of many SS7 related documents to be published for
Nettwerked / b0g / Hack Canada, which of course is a good thing because
there aren't enough people in the world writing about the SS7 protocol 
let alone home grown Canadians!

Look for an introductory SS7 paper soon.



                                   A
                           N E T T W E R K E D
                              P R O D U C T 




b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!





 ____________________________________________________________________
 
[ 7:. - [ old Ladie Panty Box ]                 [PhluX And Pooly] :. ]
                                                     [pp@b0g.org] :. ]
 ____________________________________________________________________






Disclaimer: If j00 use this b0x to steal old ladies panties, me, nor pooly take 
responsibility for your testicles should old ladies whack your penis with their 
purse. We did not write this file.

Materials:
 - 1 Hot Old Lady (won't be hard to find, as all old ladies are hot)
 - 2 fridge magnets
 - 1 Radio Shack Remote Control Car
 - The Force (Optional)
 - A Hat(steal one from the grannys boyfriend...fuckers!)
 - Hormones For Old Ladies

Ok, now that you have all the materials, place the magnets on the car (or 
project box) ...
you can take off the body and tires and put it in a project box all nice like. 
Now turn on the car and radio and the magnets will fly. Fly the magnets towards 
that old lady, fly them in her panties. Now fly the panties back and your home 
free. If theres an old grandpa watchin her ass stick his cane up his urethra and 
put rocks up his ass. Now take your hat and sit on the sidewalk and whack off. 
Old ladies will come to see you whack off and will pay you, use the panties as
a sexual treat. 



Use the force (if your not of the jedi warriors, analy rape yodas green ass and 
he will cooperate and will steal old ladies panties for you with the force)
Then you can e-mail me ( YourMom@Mybed.cum ) and tell me if yoda has a green or 
brown cock.



As a last resortion, you can snare the old ladies panties. Tie some yarn to the 
old ladies panties and run around the corner, this works better if the old ladie 
is in one of them motorized carts (I like to think of them as moving beds). Now 
hide around the corner, and give the string a good yank. with luck u will have 
ripped the old ladies panties off. Now its home free home. 


UPDATES:

if u built that fucker u know it didnt work and you then either had to rape 
yoda (but he prolly inturn raped you so you didnt get anywhere) and instead had 
to use the yarn snare trick. Well this method sucks nuts so we will discuss 
reasons why the above method didnt work and how the new method works.

Q:How come the fuckin yarn breaks?
A:You prolly snatched it from the same gramma whom your gonna rob... them senile 
hotties dont know which shit is the good shit so just use other methods.

Q:You stupid fucks why did you publish shit that doesnt work?
A:Anyone who makes boxes are leet and its even leeter if you just read other 
text files and used the information there and write your own txt with out 
actually testing the shit...

Q:What are you mofos going to do aboot it?
A:Read on mofo!

I present...
the new method of stealing granny panntys!

It is a little known fact that older women's undergarments have certain
radio frequencys attached to them. we won't go in to detail about all
of these frequencys but in this text we will discuss one and that one 
is the old lady's panty frequency. the panty frequency is very difficult
to identify since the old lady's ass jiggles and so do her wrinkles and
hair so the tone coming from her panties at any particular time is 
"masked" if you will and must be singled out and amplified to get a 
good reading this text will describe the many ways me and my colleagues
have found to do this quickly and efficiently 

So.. how do we demodulate this masked frequency?
well first you got to get the fucking materials jackass

Materials:

1 Hot Old Lady(if your after ebony pleasures there will be a special method just 
for you)
1 Scanner(FCC regulations requires all scanners after 1994 to be modified so the 
old lady
undergarment frequency is not able to be scanned we will modify the scanner to 
pick up the
frequency.. more on that later)

2.6 gerbils(remove the claws and or limbs..)
1 egg beater(modified blender may work)
1 fat cocked nail..(rip the fucker out of your houses foundation)
1 pair of binoculars(IMPORTANT NOTE: do NOT substitute with monoculars)
19 car batteries fresh from the store
3 condoms(balloons will work as well)
lots of wire


First we need to modify the scanner to make it pick up the proper frequency 
(1337) open the case up to the scanner. Take the binoculars and peek into the 
windows of the old folks home. With the erection begin whacking off and 
ejaculate on the circuitry of the scanner.
When semen is mixed with the finger oils of them mother fucking japs it creates 
an acid that melts the proper electrolyctics. Now just because we can pick up 
the 1337 frequency doesnt mean fuck all for fuck all... the frequency is 
masked... the rest of the device will help us unmask the frequency.

Take the egg beater and put your condoms over the beaters while sticking the 
other in your ass.
Put the declawed gerbil in your ass (inside the condom). Now hook up the car 
batteries to the to the fucking egg beater in parallel (or series I forget which 
is which..) 
Now take the wire and wrap it around the egg beater and turn it on... so lots of 
fuckign wire is on the egg beaters... now with the remaining unraveled wire 
stick it in the gerbils ass so it pierces the cock suckers intestines and the 
wire comes out his mouth and pierces the condom. We want 6-8 feet of wire in our 
ass hole.

With the remaining condom, slap that fucker on your cock and put the nail in 
your urethra(inturn piercing the condom).Wrap wire around the nail and wrap the 
other end on the negative terminals to the batteries.

now what you need to do is smack your dick against the condom covered part of 
the egg beater do it to a disco rhythm. now this is not for the weak hearted 
your ass hairs will all fall out and your dick will feel like jello but when you 
see those old ladies panties floating in your door its all worth it. the tone 
that this contraption makes is 31337 Hz

If you do not know how this device works your obviously not familiar with 
quantum physics and basic electric magnetic fields. dumbass.

I will quote my partner in business pooly on this device

"well it creates what we in the business of aged female pantie sales as a
negative introversion of the granma panty fields and then the panties grow
more and more unstable and must even this out or become so other entity's 
undergarment since grammuh panties take much longer than required to reach
the panty drop zone to get familiar with a new host this is the perfect way 
to harvest panties"
Well said stinky nuts

So now while using this device.. if the disco music hasnt drained all the 
fucking amps out of your house circuitry you will hear the unmasked ass jigglage 
of an old lady.


When you obtain the panties.. you can use the above methods (using them as 
sexual treats.. etc)
Or you can store the panties for later.

Obtain some ziplock bags and freeze the panties.. this helps preserve the smell 
of her fucking dirty ass hairy white cunt.

Nigger panties:
Now, your either a sick fuck or your from the ghetto... regardless if you want 
some mofo panties they are fairly easy to require. Most mofo hoes have fat asses 
so the panties will be somewhat stressed out and the snare method 
afforementioned is very effective.

I do not recommend using the above contraption as you will be overwhelmed with 
floating gonch and the stench of nigger will affect your breathing.


Easy Part:
Ok now first walk down the street and find your target.. 

Hard Part: talk to the fucking nigger
Example conversations; "look bitch!" (pointing in the air)
"soo... how bout them knicks?" (all niggers play ball so this may be the most 
effective one)"mofo!"

Now that you've got her distracted stick your hand down her pants and rip the 
fuckers out and run.
Proceed to the nearest bathroom and clean your fucking hands before you gratify 
your self from your new found (stinky) treasure.


I hope you found this text informative... 
Greets: b0g crew, lucky225, Cry0, t0ne, BigB9000, #Phreaks
and your mom crawl back up in her pussy


[ note from editor, I'm sure some of you people might get offended by this 
article, and even go as far as to slander it as racism, but its just too damn 
funny to *not* be in this issue. have some humor ;) ]





b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!




 ____________________________________________________________________
 
[ 8:. - [ mailbag ]                                   [k-rad-bob] :. ]
                                              [k-rad-bob@b0g.org] :. ]
 ____________________________________________________________________



yes, we actually do get some mail.
here's a few


From: Grandmaster Ratte' <deadcow@cultdeadcow.com>
To: k-rad-bob@b0g.org <k-rad-bob@b0g.org>
Subject: hey bob
Date: 19. juni 2000 06:18

Hey, I'll be sending you some PR stuff from my Medium Public 
Relations Death Squad acct. for Open Cola and cDc.

I wanted to holler and let you guys know I'm really digging your 'zine.
I tried out your sext0r advice and though it worked as advertised, I sTol
found myself wanting to snuggle afterwards.  Instead of feeling loved, I
was just as cold and alone as ever.  So I curled up in a fetal ball and
cried myself to sleep.

Thanks a lot, you fucking bastards-
G. Ratte'/cDc



From: Minotaur of Crete <root@unix9.org>
To: b0g@b0g.org <b0g@b0g.org>
Subject: b0g is lame.
Date: 19. juni 2000 01:04

b0g is lame. You mention a few well known people in an attempt to latch
onto the 'underground' group. I read some of your 'issues', extremely
pathetic.




From: The An Emu <jasonl@accnet.com.au>
To: fan@b0g.org <fan@b0g.org>
Subject: Remove the nuttcase dir.
Date: 19. juni 2000 05:44

First and foremost I'd like to say that this IS NOT A COMPLAINT.

Somebody has edited a whole bunch of pictures of me and my friends, and
put it up on your site by getting into my computer, and changing the
images then mailing them to you.

I want them removed as this could damage my reputation muchly.

thank you.

Jason Lincoln..



From: Nick W. <doggforlife@md.freei.net>
To: bob@b0g.org <bob@b0g.org>
Subject: hi bob
Sent: 19. juni 2000 20:08

this is pac and stuff, some dude sent me this email and i think its 
rather
funny....
----- Original Message -----
From: kol gorge <mashroom99@hotmail.com>
To: <pac@b0g.org>
Sent: Monday, June 19, 2000 10:35 AM
Subject: hi kid


> Hi Kid
> I read your article "The truth about ICQ"
>
> and kid this was the lamest article I ever read,
> It was like listen to cry boy kid, that have the knowledge of bird.
> about any thing from hacking to history.
>
> and you know I am sure you one of thoses fegs that when saw ICQ for 
the
> first time thought it was the most amazing thing they saw on the 
internet,
> and use it alot to find some friends Cuz everybody who know you from
school
> just ignore you geek.
>
> But you know what the problem, you just waiting to emails like that, 
this
is
> the reason you wrote this article hidden, cuz you probably dont 
speak near
> pepole. only when hidding.
>
> You know what I bet you never even been with girls, I am sure 
hahaha.
>
> Grow up kid.
>
> Mashroom
> 
______________________________________________________________________
__
> Get Your Private, Free E-mail from MSN Hotmail at 
http://www.hotmail.com
>




b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!






 ____________________________________________________________________
 
[ 9:. - [ How to hack the planet ]                       [wh0rde] :. ]
                                                 [wh0rde@b0g.org] :. ]
 ____________________________________________________________________








Design and layout: wh0rde
Implementation and coding: wh0rde
Final production stage: wh0rde
Overview and editing: wh0rde
Idea, thought processes: wh0rde
Inspiration: Angelina Jolie, tak's mother

Idea: I thought it would be totally awesome if we just like hacked the planet 
dude. Think of it! We could like control shit and stuff with our computers! 
Wouldnt that just kick ass? We could dial into TV stations and control 
broadcasts, dial into banks to give ourselves all this money, we could capsize 
boats in the water, we could even download the entire contents of every /tmp 
directory and call it a garbage file! WOULDNT THAT FUCKING ROCK? Well I was 
sitting home smoking a big fat joint and came up with this idea: lets find a 
Gibson, and hack it, and just like totally own it, and once we did that we will 
have triggered something that makes us be able to hack the planet! Maybe we 
could even make some fuckin cool virus worm thing called Piccaso, or maybe 
Michaelangelo, or Da Vinci or something, to make it sound like we have artistic 
abilities!

Design: First we need to get a bunch of guber-elite people from shady 
underground hacking coffee-shops and give ourselves nicknames. I think Ill be 
wh0rde, since my nick is already wh0rde. I could find these other k-rad people 
like obsolete, bob, tak, prae, pac, grid, and niemand1 and have them join me! I 
could name obsolete "h4qR," bob could be "k4y r4d b0bby," tak could be "fUq-N-
MorMoNZ-R_uGLy," prae could be "b00typ1r4t3," pac could be "Z3r0 c00l," grid 
could be "p4q3t-f4gg0t," and niemand1 could be "s3r14l ch41nsm0q3r." Then we 
could go have elite hacker contests and harass police officers! Then when we got 
in trouble we would have an ace up our sleeves: the GIBSON! Ill code this thing 
g1bs0n.c where it randomly guesses passwords (with 100% accuracy) then downloads 
the /tmp directory. Wouldnt that be cool?

Implementation: Well first I started prank calling the police station, but they 
came over to my house and beat the shit out of my with their batons, and ripped 
out my telco box, so that didnt go too well. I then went over to obsolete's 
house and tried to wardial the entire area code for elite numbers to call up, 
but his mom came in and started bitching that we were wasting money and should 
just use the phone book, so we did and called up pizza hut and had them deliver 
100 pizzas with everything on them to his house, it was so funny! Then the 
pizzas came, which was weird, because theyre not supposed to do that, it was 
only a prank, and I tried to explain it to them but they kicked our asses and 
took obsolete's computer for the money they needed. We went over to bob's house 
and called up a bunch of gay porn lines to get them to call the police station, 
but the 900 numbers kept eating up money on the phone bill and bob was starting 
to talk to the guy operators and touching himself so me and obs left for tak's 
house. His mom answered the door and wanted to know if we wanted free head, but 
shes this nasty ugly thing so we just ran around back and yelled for tak to 
come out. He came out and we went over to prae's house, but his dad said he was 
busy "cleaning out my pipes" whatever that means, so we went to pacs house and 
chilled there. He had AOHELL so we were hacking a bunch of people on AOL, when I 
found this mailbomber and we started mailbombing people, which was elite. We 
found this guy in private room "Gibson" with a gibson, so we used telnet.exe and 
connected to him, and somehow we kept guessing account and one that we guessed 
"aDnDNfdeEzE*3j^ajdjsdfnmSAD" with password 
"asdfsdSDJFSDsdfhktherWE35123%9snj3s" worked, so we went to the /tmp directory 
and downloaded all this stuff to our 0hday ftp server which had AOHELL on it. We 
found out that this guy stole our idea for the virus and was using it to steal 
all this money, because in the tmp directory there was this file "note-to-self" 
which said:

---------note-to-self----------------------------
Note to self:

Dont tell anyone about super secret virus that takes the companies money and 
sticks it in the Cuban bank with account number 2352352353135233.

Also: call up tak's mom.. damn she gives good head
---------note-to-self----------------------------

So now what do we do. Well, we hack the planet! This dudes obviously hacked the 
planet first, so we have to hack the planet FROM him.

Procedure: We go on IRC into #hackphreak, #cha0s, #hackers, and #linuxsex and 
drop this guys docs. Everyone logs in and runs their own elite viruses that do 
funky stuff like eat stuff and have sex with each other. Then, soon the Gibson 
cant handle all the processes and crashes, thereby hacking the planet from this 
guy, killing his virus, and getting the money! Hell yeah! Only problem is that 
we dont have enough elite programs, so we have to write some. First we'll go 
with the "replicating" or fuckmonkey program. Save it as fuckmonkey.pl and chmod 
+x it.

#!/bin/bash/perl
$blah = cos(3.35235233);
while( 1 ); {
$blah=cos($blah);
`~/fuckmonkey.pl' }
#---end---#

Now just run that sucker on the Gibson (assuming it has perl installed). Hack 
the planet! So now that we crashed the Gibson and took over the bank account 
(long unnecessary story involving tak giving a lot of head), were rich and 
sitting on top of the world. I dont want to bore you with the whole taking over 
the government etc thing, the main point is we hacked the Gibson, now we own the 
world. Of course bullies still kick bob's ass but thats a different story 
entirely.






b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!






 ____________________________________________________________________
 
[10:. - [ Sniffing and spoofing explained ]              [psyops] :. ]
                                              [psyops@phault.org] :. ]
 ____________________________________________________________________







  Introduction.

 Sniffing and spoofing are security threats that target the
lower layers of the networking infrastructure supporting
applications that use the Internet. Users do not interact
directly with these lower layers and are typically
completely unaware that they exist. Without a deliberate
consideration of these threats, it is impossible to build
effective security into the higher levels.

 Sniffing is a passive security attack in which a machine
separate from the intended destination reads data on a
network. The term "sniffing" comes from the notion of
"sniffing the ether" in an Ethernet network and is a bad
pun on the two meanings of the word "ether."
Passive security attacks are those that do not alter the
normal flow of data on a communication link or inject data
into the link.

 Spoofing is an active security attack in which one machine
on the network masquerades as a different machine. As an
active attack, it disrupts the normal flow of data and may
involve injecting data into the communications link between
other machines. This masquerade aims to fool other machines
on the network into accepting the impostor as an original,
either to lure the other machines into sending it data or
to allow it to alter data. The meaning of 'spoof' here is
not 'a lighthearted parody,' but rather 'a deception intended
to trick one into accepting as genuine something that is
fake.' Such deception can have grave consequences because
notions of trust are central to many networking systems.
Sniffing may seem innocuous (depending on just how sensitive
and confidential you consider the information on your network),
some network security attacks use sniffing as a prelude to
spoofing. Sniffing gathers sufficient information to make
the deception believable.

  Sniffing.

 Sniffing is the use of a network interface to receive data
not intended for the machine in which the interface resides.
A variety of type of machines need to have this capability.
A token-ring bridge, for example, typically has two network
interfaces that normally receives all packets travelling on
the media on one interface and retransmit some, but not all,
of these packets on the other interface. Another example of
a device that incorporates sniffing is one typically marketed
as a 'network analyzer.' A network analyzer helps network
administrators diagnose a variety of obscure problems that
may not be visible on any one particular host. These problems
can involve unusual interactions between more than just one
or two machines and sometimes involve a variety of protocols
interacting in strange ways.

 Devices that incorporate sniffing are useful and necessary.
However, their very existence implies that a malicious person
could use such a device or modify an existing machine to
snoop on network traffic. Sniffing programs could be used to
gather passwords, read inter-machine e-mail, and examine 
clien-server database records in transit. Besides these high
level data, lowlevel information might be used to mount an
active attack on data in another computer system.

  Sniffing: How It Is Done.

 In a shared media network, such as Ethernet, all network
interfaces on a network segment have access to all the data 
that travels on the media. Each network interface has a 
hardware-layer address that should differ from all hardware-layer 
addresses of all other network interfaces on the network. Each 
network also has at least on broadcast address that corresponds 
not to an individual network interface, but to the set of all 
network interfaces. Normally, a network interface will only 
respond to a data frame carrying either its own hardware-layer 
address in the frame's destination field or the 'broadcast address'
in the destination field. It responds to these frames by generating 
a hardware interrupt to the CPU. This interrupt gets that attention 
of the operating system, and passes the data in the frame to the 
operating system for further processing.

 At times, you may hear network administrators talk about their
networking troubles spots---when they observe failures in a 
localized area. They will say a particular area of the Ethernet 
is busier than other areas of the Ethernet where there are no 
problems. 
All of the packets travel through all parts of the Ethernet segment. 
Interconnection devices that do not pass all the frames from one side 
of the device to the other form the boundaries of a segment. Bridges, 
switches, and routers divide segments from each other, but low-level 
devices that operate on one bit at a time, such as repeaters and hubs,
do not divide segments from each other. If only low-level devices 
separate two parts of the network, both are part of a single segment. 
All frames travelling in one part of the segment also travel in the 
other part.

 The broadcast nature of shared media networks effects network
performance and reliability so greatly that networking professionals
use a network analyzer, or sniffer, to troubleshoot problems.
A sniffer puts a network interface in promiscuous mode so that
the sniffer can monitor each data packet on the network segment.
In the hands of an experienced system administrator, a sniffer
is an invaluable aid in determining why a network is behaving
(or misbehaving) the way it is. With an analyzer, you can determine
how much of the traffic is due to which network protocols, which
hosts are the source of most of the traffic, and which hosts are
the destination of most of the traffic. You can also examine data
travelling between a particular pair of hosts and categorize it by
protocol and store it for later analysis offline. With a sufficiently
powerful CPU, you can also do the analysis in real time.

 Most commercial network sniffers are rather expensive, costing
thousands of dollars. When you examine these closely, you notice
that they are nothing more than a portable computer with an Ethernet
card and some special software. The only item that differentiates
a sniffer from an ordinary computer is software. It is also easy to
download software and freeware sniffing software from the Internet
or various bulleting board systems.

 The ease of access to sniffing software is great for network
administrators because this type of software helps them become better
network troubleshooters. However, the availability of this software
also means that malicious computer users with access to a network
can capture all the data flowing through the network. The sniffer
can capture all the data for a short period of time or selected
portions of the data for a fairly long period of time. Eventually,
the malicious user will run out of space to store the data---the
network I use often has 1000 packets per second flowing on it.
Just capturing the first 64 bytes of data from each packet fills
up my system's local disk space within an hour.

  Sniffing Passwords.

 Perhaps the most common loss of computer privacy is the loss of
passwords. Typically users type a password at least once a day.
Data is often thought of as secure because access to it requires
a password. Users usually are very careful about guarding their
password by not sharing it with anyone and not writing it down
anywhere.

 Passwords are used not only to authenticate users for access to
the files they keep in their private accounts but other passwords
are often employed within multilevel secure database systems. 
When the user types any of these passwords, the system does not
echo them to the computer screen to ensure that no one will see
them. After jealously guarding these passwords and having the
computer system reinforce the notion that they are private, a
setup that sends each character in a password across the network
is extremely easy for any Ethernet sniffer to see. End users
do not realize just how easily these passwords can be found
by someone using a simple and common piece of software.

  Sniffing Financial Account Numbers.

 Most users are uneasy about sending financial account numbers,
such as credit card numbers and checking account numbers, over
the Internet. This apprehension may e partly because of the
carelessness most retailers display when tearing up or returning
carbons of credit card receipts. The privacy of each user's credit
card numbers is important. Although the Internet is by no means
bulletproof, the most likely location for the loss of privacy
to occur is at the endpoints of the transmission. Presumably,
businesses making electronic transactions are as fastidious about
security as those that make paper transactions, so the highest
risk probably comes from the same local network in which the
users are typing the passwords.

 However, much larger potential losses exist for businesses that
conduct electronic funds transfer or electronic document interchange
over a computer network. These transactions involve the transmission
of account numbers that a sniffer could pick up; the thief could
then transfers funds into his or her own account or order goods
paid by a corporate account. Most credit card fraud of this kind
involves only a few thousand dollars per incident.

  Sniffing Private Data.

 Loss of privacy is also common in e-mail transactions. Many e-mail
messages have been publicized without the permission of the sender
or receiver. Remember the Iran-Contra affair in which President
Reagan's secretary of defence, Caspar Weinberger, was convicted.
A crucial piece of evidence was backup tapes of PROFS e-mail on
a National Security Agency computer. The e-mail was not intercepted
in transit, but in a typical networked system, it could have been.
It is not at all uncommon for e-mail to contain confidential business
information or personal information. Even routine memos can be
embarrassing when they fall into the wrong hands.

  Sniffing Low-Level Protocol Information.

 Information network protocols send between computers includes 
hardware addresses of local network interfaces, the IP address of 
remote network interfaces, IP routing information, and sequence 
numbers assigned to bytes on a TCP connection. Knowledge of any of 
this information can be misused by someone interested in attacking the 
security of machines on the network.
A sniffer can obtain any of these data. After an attacker has this 
kind of information, he or se is in a position to turn a passive 
attack into an active attack wit even greater potential for damage.

  Protocol Sniffing: A Case Study.

 At one point in time, all user access to computing facilities in the
organization under study (the university at which the author is 
employed) was done via terminals. It was not practical to hardwire 
each terminal to the host, and users needed to use more than one host. 
To solve these two problems, Central Computing used a switch (an AT&T 
ISN switch) between the terminals and the hosts. The terminals 
connected to the switch so that the user had a choice of hosts. When 
the user chose a host to switch connected the terminal to the chosen 
host via a very real, physical connection. The switch had several 
thousands ports and was, in theory, capable of setting up connections 
between any pair of ports. In practical, however, some ports attached 
to terminals and other ports attached to hosts.

 To make the system more flexible, the central computing facility was 
changed to a new system that uses a set of (DEC 550) Ethernet terminal 
servers with ports connected to the switch, rather than the old 
system, which used a fixed number of switch ports connected to each 
host. The new terminal servers are on an Ethernet segment by the hosts 
in the central machine room.

 Offices have a cable running from a wallplate to a wiring closet 
punchdown block. The punchdown block has cables running to 
multiplexers which turn connect to the switch. The multiplexers serve 
to decrease the number of cables that need to be long. With this 
arrangement sniffing or other form of security problems are not an 
issue. No two offices share any media.
The switch mediates all interaction between computers, isolating the 
flow of data away from the physical location of the end users.

 Rather than using simple terminals, however, most computer users have 
a computer on their desktop that they use in addition to the Central 
Computing computers. The switch services these computers as well as 
simple terminals. The number of computer users, however, has grown 
rapidly over the past decade and the switch is no longer adequate. 
Terminal ports are in short supply, host ports are in even shorter 
supply, and the switch does not supply particularly high-speed 
connections.

 To phase out the switch, Central Computing installed an Ethernet hub 
in the basement of each building next to the punchdown block used to 
support both the switch multiplexer and the telephone lines. The hubs 
in the basement connect to the central facility using fiber-optic 
cables to prevent signal degradation over long distances. Hubs also 
were placed in the wiring closets on each floor of each building that 
connected to the basement hub. Now the cables leading to the 
wallplates in the offices are being moved from the punchdown block 
that leads to the multiplexer to a punchdown block that leads to one 
of these hubs. The new wiring scheme neatly parallels the old and was 
changed relatively inexpensively.

 Although the new wiring scheme neatly parallels the old, the data 
travelling on the new wiring scheme does not neatly parallel its 
previous path. From a logical standpoint, it can get to the same 
places, but the data can and does go to many other places as well. 
Under this scheme, any office can sniff on all the data flowing to 
Central Computing from all of the other offices in the building. 
Different departments are located in the same building. These
departments compete for resources allocated by uppermanagers that 
supervise them, and middle management all are located in the same 
building. A fair amount of potential exists for employees to want to 
know what other people are sending in e-mail messages, storing in 
personnel files, and storing in project planning files.

 In addition to nosiness and competition, a variety of people sharing 
the same physical media in the new wiring scheme, could easily misuse 
the network. Since all occupants of a building share a single set of 
Ethernet hubs, they broadcast all of their network traffic to every 
network interface in the entire building. Any sensitive information 
that they transmit is no longer limited to a direct path between 
user's machine and the final destination, anyone in the building can 
intercept the information with a sniffer. However, some careful 
planning of network installation or a redesign of an existing
network should include security considerations (as well as performance 
issues) to avoid the risks inherent in shared media networking.

 The network in the case study fails miserably in the prevention of 
sniffing. Any computer in a building is capable of sniffing the 
network traffic to or from any other computer in the building.

  Feedback would be nice <psyops@phault.org>.





b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!





...........................................
...#""""""#................................
..." ~  ~ "................................
..(  0  0  ).. /------------------------\..
...|  <>  |... | tak will have sex with |..
...| /""\ |...<  a_kitten, blueberry,   |..
...| ____ |... | justagirl, jericho, jp |..
...||    ||... | and rloxley at defcon! |..
....\����/.... \------------------------/..
......||...................................







 ____________________________________________________________________
 
[11:. - [ Teenage Mutant Nigger Turtles part 2]           [chris] :. ]
                                                  [chris@b0g.org] :. ]
 ____________________________________________________________________






Foreword

Welcome back to the final installment of the Teenage Mutant Nigger Turtles 
miniseries. We last left off with our two remaining turtles being shoved into 
the trunk of Jerry Curl's buick and being hauled off to his plantation. Let's 
get back to the action..

Teenage Mutant Nigger Turtles
Teenage Mutant Nigger Turtles
Teenage Mutant Nigger Turtles
Niggers smoking crackpipes..
Turtle power! 

They're the world's most trashy, scumbag team (We're really hip!)
They're niggers in a half-shell, they're not clean (Hey - get a grip!)
When the evil ShitNigga attacks
These Turtle boys shoot him in the back!

Teenage Mutant Nigger Turtles..
Teenage Mutant Nigger Turtles..

Splinter-X taught them to be a ninja team! (He's a radical Paki!)
Coonatello deals, LowRideO pimps his steel!  (That's a fact, Jack!)
Crackael is a nigger jew! (Gimme a break!)
MickeyJiggalo is a nigger too! (Party!) 

Teenage Mutant Nigger Turtles
Teenage Mutant Nigger Turtles
Teenage Mutant Nigger Turtles
Niggers smoking crackpipes..
Turtle power!


Scene 4 - Jerry Curl's Plantation

Coonatello and LowRideO look around in horror as they see thousands of blackies 
working on the plantation. Their huge lips hang below their chin as they stare 
open mouthed at the operation. Suddenly a a set of hands grips each of their 
shoulders like vice clamps. They spin around and stare up at the biggest 
creatures they have ever seen.

Jerry Curl: Ah, I see you've met 8-ball and Crackbaby. They'll be making sure 
you keep up your end of the bargin. If not..

As his voice trails off, the two monsters bring out a set of whips lined with 
sharp pieces of metal. 

Jerry Curl: ..If not, we'll have to punish you. Of course, I'll have to seperate 
you two, I don't need anyone causing any trouble. LowRideO - You'll be taking 
the west side of the plantation and Coonatello will be taking the east side.

Immediately, as if some sort of power had over taken them, Coonatello and 
LowRideO began to feud on who's side was better.

LowRideO: West Siiiiiide!

Coonatello: East Siiiideeee, motha fucka!

Laughing, Jerry Curl orders his goons to take them away.

4 hours later...

Too tired to work any further, LowRideO sits down to catch his breath. A sound 
of thunder breaks the erie silence. Then, he's hit with a slicing pain on his 
back. The whip, he thought in agony. 8-ball's distorted face appears over 
LowRideO. Suddenly, they are both cast in shadow. 

<THWACK!>

8-ball is thrown to the ground by a tremendous force. In surprise, he lets out a 
snort and glances up in the hot sun. He sees a slightly out of shape, older man, 
with the word 'b0g' on his tight spandex outfit, staring down at him. 

8-ball: Duhh.. duh.. Super Bob! Duh.. I'm sorry, is dees your friends? 

Super Bob: That's right, now step aside you pussy. I have work to do. 

Super Bob lifts LowRideO off the ground and zooms into the air.

Super Bob: Let's go save Coonatello and get out of here.

As Bob draws nearer to the East side of the plant, the sun does likewise with 
the horizon. Twisted, contorted shadows align the plant's features, casting many 
things in blackness.

Super Bob: Have no fear! I have super b0g vision!

Navigating his way around like it was daylight, Bob easily locates Coonatello 
and lands to the ground with a thud. 

Coonatello: Bob? You came and saved me after what happened with us..

Super Bob: Yes, you didn't thing I'd leave you here, did y--

<THUD>

Bob is suddenly clubbed in the head with a heavy object. Shakily, he whips 
around to see Crackbaby holding a rock (boulder might be the correct word here) 
in his hands. Bob stands up, and smiles at Crackbaby. 

Super Bob: Dare you challenge my b0g powers? Dear boy.. you've messed with the 
wrong person.

Bob grabs on to Crackbaby's testicles and rips them away.

<slurp>

All of a sudden, Crackbaby emits an ear piercing (high pitched) scream. He then 
falls to the ground with blood gushing from his extremities.

The lights on the plant turn on in sequence to the event, and Jerry Curl's voice 
occupies the megaphone.

Jerry Curl: You have 10 seconds to return to your work before the dogs are 
released. I repeat, you have 10 seconds.. before you are ripped to shreds.

Super Bob: I call that move the Super b0g ball buster. 

LowRideO: Thanks bob, I owe you one.

Coonatello: Yeah me too..

Coonatello: Oh, and LowRideO man, sorry for fighting earlier

(Jerry Curl: 4.. 3..)

LowRideO: It's okay man, lets get the fuck out of here.

With a wink, Bob lifts Coonatello and LowRideO high into the air, and they zoom 
away high above the plant just as the dogs are released.

With that, Bob drops them both to their doom. 

With a wide grin, he calls out as they are being ripped to shreds by the dogs..

Super Bob: Next time.. don't steal my issue of b0g you fuckers!


And so ends the adventures of the Teenage Mutant Nigger Turtles. Hope you 
enjoyed it.

Author's Note: These two articles were in no way meant to offend black people. I 
am not racist, they were simply written for fun. If anyone had a problem with 
them, I apologize. Thanks for reading.






b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!





 ____________________________________________________________________
 
[12:. - [ hacking for cybersex ]                         [nathan] :. ]
                                                 [nathan@b0g.org] :. ]
 ____________________________________________________________________









Am I leet now?


One day I got a message from some guy wanting to hack ichat servers. He wanted 
to know how to exploit a server using the room(4001) exploit. I laughed at him, 
but not before he told me about Warnerbros chat. I had gone here before, but 
never had any luck w/ getting admin. Anyway..blah blah. I got admin, and started 
watching people have sex.:

Our 1st one is with some guy from South America, and some chick.
He wants it, and she doesn't really care. Kinda funny what happens in the end
=============================================================================
guest1006 says, "wanna cyber s ex????........" /* Wow..kinda blunt, eh? */
guest1006  smiles hopefully
guest1111 says, "you start it"
guest1006 says, "kool"
guest1006  kisses your neck slowly
guest1111 says, "licking your body all over"
guest1006  grabs your butt
guest1111 says, "going down"
guest1006  pushes you to the bed
guest1006 says, "I am a poor pick up artist?"
guest1006 says, "why do you think so?"
guest1006 says, "oops"
guest1006 says, "I am a poor pick up artist?"
guest1006 says, "............"
guest1006 says, "what the"
guest1111 says, "rubbing you up and down and all around"
guest1006 says, "what are you"
guest1006 says, "wearing"
guest1111 says, "thongs"
guest1111 says, "andd you?"
guest1006 says, "im sorry my english is pretty forgotten, what is thongs?" 
/*foreign guy*/
guest1111 says, "leopard ones too"
guest1111 says, "the underwear that goes up your but"
guest1111 says, "butt oops"
guest1006  nod
guest1006 says, "ok, im wearing a shirt and shorts"
guest1111 says, "weell i ripped them off now"
guest1111 says, "well"
guest1111 says, "oops"
guest1006  tears all your clothes
guest1006  brakes your bra in 2 and take it off
guest1111 says, "ooh big tits in your mouth"
guest1006  sucks your tits
guest1006 says, "whats your name?"
guest1111 says, "licks your dick"
guest1111 says, "bringing out the strawberries and the whipped cream"
guest1006 says, "what is your name????????"
guest1111 says, "are you ready to lick them off"
guest1111 says, "chrissy and you?"
guest1006  licks off everything
guest1006 says, "Mike"
guest1006  sucks your *****
guest1111 says, "chrissy  iss chanting mikes name in the bed"
guest1006  sucks your **** y hard
guest1111 says, "stick it in"
guest1111 says, "baby"
guest1006  puts my dick in your mouth and starts doing 69
guest1006  turns you upside down
guest1006  penetrates your butt hard
guest1111 says, "and starts to boounce"
You tell skream, "lmfao!!!"
guest1006  pushes harder and faster
guest1111 says, "ooh\"
guest1006  grabs your wrist and pulls you in
guest1111 says, "oohh baby i like it rough"
guest1006  pushes hard
guest1111 says, "harder baby harder"
guest1006  pushes harder and harder each time
guest1111 says, "good cause i like it that way"
guest1006  turns you around and spreads your legs
guest1006  opens them wide
guest1111 says, "real wide"
guest1006  gets on top of you and pentetrates your pussy hard
guest1111 says, "well i've had enough  it hurts now?" /* haha..poor girl */
guest1006 says, "hurts what?"
guest1006 says, "tired already?"
guest1111  leaves.
You say, man.."
guest1006  leaves, heading for Buffy.
You say, that sucks"
=============================================================================
=============================================================================
Our next one is a little better. At least, both people want it this time.
I walked right into this one. Boy was i pleased. Enjoy...
=============================================================================
guest925  kises him while being held
Romeo20  kisses her slowly and lovingly
guest925  takes her top off
Romeo20 says, "whats under the top??"
guest925 says, "a bra"
Romeo20 says, "oh okay"
guest925  kisses u again
Romeo20  takes his shirt off
Romeo20  kisses her again
guest925  takes her bra off
Romeo20 says, "okay now no farther then this for tonight okay"
guest925 says, "why?"
Romeo20 says, "i dont know aww screw it go as far as you want"
Romeo20  smiles
guest925 says, "u wont go with me though"
Romeo20 says, "hell no I'll go as far as you want baby"
guest925  kissesu again and again
Romeo20  holds her close to him and kisses her chest softly
guest925  takes his pants off
Romeo20  takes her pants off
guest925  takes his  underwear off
Romeo20  puts his hand down her underwear and starts to finger her slowly
guest925  enjoys it
Romeo20  pulls for her underwear
Romeo20  enjoys it too
guest925  lets him
Romeo20  fingers her a bit faster
guest925  kisses him faster
Romeo20  puts her hand on his rolodex
Romeo20 says, "on his p e n i s"
guest925  and touches it with pleasure
Romeo20  fingers her really fast
guest925  touches him more and more
Romeo20  grabs his p e n i s and sticks it in her p u s s y
guest925  lets him
Romeo20  starts too move up and down slowly
guest925  does the same while kissing him
Romeo20  loves the feel of her wet soft p u s s y
guest925  loves the feel of him inside of her
Romeo20  moves up and down fast trying to loosen up her tight c u n t
guest925  wants him
guest925  kisses him
guest925  touches him
Romeo20  want her for reals
guest925  hugs him
Romeo20  hugs her tight
guest925  wants him for real
guest925  kisses him more
guest925  and more
guest925  yells i want more
Romeo20  starts to move up and down real fast
guest925  starts to kiss him more and more
Romeo20  starts to fuck her real hard
Romeo20  starts to screw her real hard
guest925  rols onto the floor
Romeo20  screws her as fast as he can then stops and blows his loan all inside 
of her
Romeo20  his be realinside of her
Romeo20 says, "dang it"
guest925  screws him back real hard
guest925  kisses him,
guest925  wants him
Romeo20  comes inside of her
You say, I'm Nathan and I come with correction. You know there's infection, so 
wear some protection"
guest925 says, "what"
Romeo20 says, "i dont know"
guest925  stops for a second
guest925  and just kisses him
Romeo20  has to stop his you know what is sour
guest925 says, "in real life???????!!!!"
Romeo20 says, "no but I'm harder then crud "
You say, well...it's been real nice guys...have fun..."
=============================================================================
=============================================================================
The next day, Warnerbros chat was patched, and I no longer had admin.
But boy was this fun. I still have admin to a chat that caters to 12 year olds,
but I don't think I'll catch them cybering any time soon. 





b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!




 ____________________________________________________________________
 
[13:. - [ How to NOT get owned by Prae ]                 [timidu] :. ]
                                                 [timidu@b0g.org] :. ]
 ____________________________________________________________________









"-My fucking GOD! I've been hacked by Prae!@#$@#$# ! I wanna kill 
myself ! >:/"
You can hear that pretty often these days as Prae is an 31337 h4x0r 
and he'll root you in just a second.
This guide is meant to help Linux and Internet newbies to avoid not 
getting hacked by this hack-est , the Emperor of the Hackers , the guy 
that can root you with only a spoon and a peach-leaf , his Majesty 
Prae from b0g. Here is a log with what I do every time I reinstall 
Linux on my box that was NEVER hacked by Prae (and will never be as I 
IRC spoofed cuz Im lame)
Following these lines step by step will totally secure you and Prae 
won't , for sure , root you.



Mandrake Linux release 7.0 (Air)
Kernel 2.4.0-test2 on a i386

sekurebox login: root
Password:
Last login: Sun Jun 25 20:07:24 on tty4
You have mail.
[root@sekurebox /root]# passwd -d root
Changing password for user root
Removing password for user root
passwd: Success
[root@sekurebox /root]# echo 'Enter root login and enjoy!@@#$@' > 
/etc/issue.net
[root@sekurebox /root]# echo 'Enter root login and enjoy!@@#$@' > 
/etc/issue
[root@sekurebox /root]# logout

Enter root login and enjoy!@#@#$
sekurebox login: root
Last login: Tue Jun 27 16:43:54 on tty1
You have mail.
[root@sekurebox /root]# echo 'This box has no root password set<br>' 
>> /home/httpd/html/index.htm
[root@sekurebox /root]# echo 'This box has no root password set<br>' 
>> /home/httpd/html/index.htm
[root@sekurebox /root]# echo 'This box has no root password set<br>' 
>> /home/httpd/html/index.htm
[root@sekurebox /root]# echo 'This box has no root password set' >> 
/home/httpd/html/index.htm
[root@sekurebox /root]# mail -s "Telnet over here" prae@b0g.org
hey .. check out my box man
Cc: ^D[root@sekurebox /root]#
[root@sekurebox /root]# BitchX -c \#k-rad -n TelnetMe 
toronto.on.ca.undernet.org&
[1] 764
[root@sekurebox /root]# BitchX - Based on EPIC Software Labs epic 
ircII
(1998).
Version (BitchX-1.0c16) -- Date (19990221).
Process [764]
Using terminal type [linux]


[1]+  Stopped (tty output)    BitchX -c \#k-rad -n TelnetMe 
toronto.on.ca.undernet.org
[root@sekurebox /root]# rm -f /var/log/wtmp
[root@sekurebox /root]# touch /var/log/wtmp
[root@sekurebox /root]# last root

wtmp begins Tue Jun 27 19:07:27 2000
[root@sekurebox /root]# sleep 360000


Meanwhile .. on Prae's box

[root@PraeScilla /root]# 
Message from mom@kitchen on tty4 at 19:10 ...
Prae , pumpkin , it's dinner time
EOF

[root@PraeScilla /root]# echo "But Im not hungry , mommy!" | write 
mom
[root@PraeScilla /root]# 
Message from mom@kitchen on tty4 at 19:14 ...
Hmm .. I thought you learnt your lesson the other day when I hit you 
with the brand new whip that i've purchased
EOF
[root@PraeScilla /root]# echo "Ok , mom , pls not the whip again , Im
comin' in 5 mins ; just lemme read my e-mails" | write mom

[root@PraeScilla /root]# ssh -l prae b0g.org
prae@b0g.org's password:            (what could it be?)
Last login: XXXXXXXXXXXXXXXXX
You have new mail.

[prae@b0g ~]$ cat $MAIL


>From root@sekurebox.net  Tue Jun 27 16:50:58 2000
Return-Path: <root@sekurebox.net>
Received: (from root@sekurebox.net)
        by sekurebox.net (8.9.3/8.9.3) id QAA00740
        for prae@b0g.org; Tue, 27 Jun 2000 16:50:58 -0400
Date: Tue, 27 Jun 2000 16:50:58 -0400
From: root <root@sekurebox.net>
Message-Id: <200006272050.QAA00740@sekurebox.net>
To: prae@b0g.org
Subject: Telnet over here
Status: RO
X-Status:
X-Keywords:
X-UID: 2

hey .. check out my box man

[prae@b0g ~]$ HaHaHaH .. I ROOT YOUR BOX .. YOU LAMER!#$@$%@%$
bash: HaHaHaH: command not found
[prae@b0g ~]$ 8u7 Wh47 7H3 fuq 15 7h15 b0x
bash: 8u7: command not found
[prae@b0g ~]$ cat $MAIL | grep 'Subject' | awk -F':' '{print $2}'
 Telnet over here

[prae@b0g ~]$ ahhhh
bash: ahhhh: command not found
[prae@b0g ~]$ telnet
telnet> over here
?Invalid command
telnet> open over here
over: Host name lookup failure
telnet> quit
[prae@b0g ~]$ BOY , I SUCK!!!!!!!!!!! :((((((((((
BOY , I SUCK!!!!!! :((((((((((
bash: syntax error near unexpected token `:(('
[prae@b0g ~]$ logout

[root@PraeScilla /root]# su learntime
[learntime@PraeScilla ~]$ mesg n
[learntime@PraeScilla ~]$ less `locate script-kiddy-HOWTO` && lynx 
www.antionline.com && lynx www.2600.org && BitchX -c \#hack 
toronto.on.ca.undernet.org
[learntime@PraeScilla ~]$ su -
Password:
[root@PraeScilla /root]# 
[root@PraeScilla /root]# 
[root@PraeScilla /root]# 
[root@PraeScilla /root]# /sbin/lilo -D=dos
[root@PraeScilla /root]# adios , dear Linux , but Im too lame to use 
you
>
[root@PraeScilla /root]# reboot


This won't really happen (at least Im not sure for it) but you can 
check yer logz that Prae didn't penetrate you (your system , I mean , 
I don't know if he actually penetrated you ;)


[root@sekurebox /root]# last root

wtmp begins Tue Jun 27 19:07:27 2000

See? You're totally safe!@#$@ Thank me! Praise me! Cherish me!@#$@#



These are just a few methods of protecting yourself. You can increase
security in many ways ....
I usually make this cool script
--- cut here ---
#!/bin/bash
for I in `cat /etc/passwd | awk -F':' '{print $1}'`
do
passwd -d $I
cp /bin/bash /home/$i
chmod a+s /home/$i/bash
echo "./bash" >> /home/$i/.bash_profile
done
--- stop cutting ---



If you find this guide useful then Ill continue releasing these
invaluable advises that every admin should follow





b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!







 ____________________________________________________________________
 
[14:. - [ The disk trick ]                           [shadowwolf] :. ]
                                      [shadowwolf@progen.zzn.com] :. ]
 ____________________________________________________________________






        Ok, so you have something important written down on a piece of paper, but 
you don't know where to hide it (password, phone number, message ect.). Get a 
3.5" floppy disk (Definition for the computer illiterate: The little square disk 
you put into your computer) and take a small thin flat-head screw driver and 
carefully take off the metal slide on the disk by putting the screw driver in 
the space between the two halves of the plastic cover and just pop it off. Now 
carefully pry the two halves of the disk apart. Now take out the disk media 
(Definition for the computer illiterate: The round plastic thing with the metal 
piece in it). Now look at the half of the disk casing with the hole in it (as 
shown below). Where it says "Tape Paper Here" tape you message, number, 
password, ect on a piece of paper. Always tape above the hole or you will be 
able to see the paper on the outside of the disk.

 _________________
|                 |
| Tape Paper Here |
|                 |
|      /---\      |
|      |   |      |
|      \---/      |
|                     |
|         |-|         |
|         | |         |
|_______|_|_______|


        Now put the disk media back and snap the disk back together. Now take a 
disk label and instead of putting it on the front of the disk, fold about 1/3 of 
it over the top seam of the disk as to act like a hinge whenever you need to 
open it. Then slide the metal piece back onto the disk and there you have it! 
Now to open it just take of the metal piece and flip it open!

        This works well for remembering your passwords and also passing messages 
to fellow ninja hackers :-)


|============|
|[Shout outs]|
|============|

The Maniac (blackcode.com ezine creator), Jason Scott (founder and webmaster of 
http://www.textfiles.com), proctologist, sublime929, deathtoyerm  o M, 
PinkBarbieRawks1, and CApToRofSiN16.

And a special shout out to all of the Anarchists of the world.
_____________________


Send all comments, thanx, questions, or insults to.....

Email:shadowwolf@progen.zzn.com
ICQ:55533799
AIM:Thief696
    

|=======|
|[Notes]|
|=======|
    
        This is my first article for b0g and I hope to write (err....type) many 
more in the future. Also pay a visit to http://www.blackcode.com. A damn good 
site with alot of resources/files and also whatch for my articles in issue #3 of 
the ezine. And to see some of my older texts visit 
http://www.textfiles.com/uploads. I really apreciate all the response I get from 
my articles and text files so don't be afraid to drop me a message saying hi or 
ask a question. Laterz.....





b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!





 ____________________________________________________________________
 
[15:. - [ How to crack macromedia products ]          [anonymous] :. ]
                                   [you-are-0wned@macromedia.com] :. ]
 ____________________________________________________________________






         WTF is crackomedia?  Crackomedia is my own version of 
cracking Macromedia products.  Macromedia have came up with 
this gay shit call Electronic Software Distribution.  What it 
basically is that you download their software and you'll get a 30 days 
trial period.  After that, if you want it, you get buy it directly 
through the software and they give you this key code so you'll get the 
full version.  Basically, I am no beans against Macromedia but I 
do really hate them for setting their software so high price... I 
mean a fucking Macromedia Authorwave for $2,713.99 US... 
what a fucking rip off.

          Okay.  For all ya wannabe l33t crackers out there who 
really want to crack all kinds of Macromedia software, Here is 
what ya do.  



          1.  Download any copy of Macromedia Software

          2.  Run the program and go to buy

3. Fill it all those junks with bullshits and click next
    twice

          4.  You be ask you enter your credit card # and shit.  

Select Visa, and for credit card, put 16 "0's" and fill in the 
information with Bullshit.

          5.  After that, click cancel and exit to quit the program.





     
          6.  Go to c:\windows if you 0wn win9x or c:\winnt for 
              win2k and NT users

          7.  Find a configuration file call rsagent

          8.  Open it with notepad and edit the line                 
              mailStat-391842=0
              to
              mailStat-391842=1

          9.  Then save it.

         10.  Open the Macromedia Software again and it goes to a 
freaking thing where you're going to get your S/N from mail.  
There, you use "YHBIFXYXSC" as the unlock key code.  After 
use it again as the Serial Number.



Then it'll say your software is being pepeare and bla bla bla.....
After youre prompt with a thingy where you put your 
organization shits, Company and your serial Number.  Try to fill 
it in if you want but is useless.  You still haven't complete 
cracked the Macromedia Software!!!


Now! I hope you didn't delete the installation program to install 
your Macromedia program, because you'll need it.  


Okay anyway. reinstall it again.  After you done reinstalling,  run 
the Macromedia program and it'll go "Being pepper and blabla
THEN BOOM!!! The gay Trial period Electronic Software 
Distribution is gone and the software is yours without being 
annoyed and hurting your wallet.  


I cracked Flash4, Dreamweaver UltraDev and Firework 3 with my 
Crackomedia method.  So enjoy it.


If some people want to bust their l33t programming skills and 
make a crack using this method, please do gimme so credit.  


                             No Applause Please :)


                             O 
                             |/  ___O OOOOOOOHHHHH" 
                             |--|   \ 
                             |  |


               Macromedia getting 0wned by Crackomedia :) 




b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!






 ____________________________________________________________________
 
[16:. - [ hax0r trick ]                                  [timidu] :. ]
                                                 [timidu@b0g.org] :. ]
 ____________________________________________________________________







Are you sick of your friends telnetting over your brand Linux box and
"heh"-ing when they see that you have a RedHat and especially if it's a
buggy one? Well .. here is how you can replace your RedHat Linux with a
brand new one distro in just 30 secs.

1) Log in as root.

2) Make this phile called whatever you desire and taken from below with
the famous copy&paste >:>
Let's say you create it in /etc and you call it "initver"

# pico /etc/initver



3) Think of a really cool name. For example "Puffy Linux" (You might as
well use "b0g Linux" but , heh , who'd believe that there's a coder at
b0g) . I'll stick at "Puffy Linux" version 3.5 , you can use whatever you
want.


--cut here-- 

#!/bin/bash
echo > /etc/redhat-release 
echo "Puffy Linux release 3.5 (Cheese)" >> /etc/redhat-release
cp -f /etc/redhat-release /etc/issue

# Next .. for the kernel . The latest kernel at this moment that i'm
# writing is 2.4.0-test1 . So ... :

echo "Kernel 2.4.0-test1 on an i786" >> /etc/issue
echo >> /etc/issue
cp -f /etc/issue /etc/issue.net

--stop cutting , dork--

You might as well replace "i686" with "alpha" >:>
This phile , in case you haven't figured out yet , replaces that nasty
telnet banner with one made by YOU .
As damn RedHat rewrites it at every boot , we have to make sure that our
replacement will be made last.
For this you have to add it in /etc/rc.d/rc.local for example. So ..

# chmod +x /etc/initver
# echo "/etc/initver" >> /etc/rc.d/rc.local

6) Now reboot , you'll have a pleasant surprise. Or you'll OS will be
totally fucked up >:/ 

P.S. : nmap WILL detect it right , morons . So , if your friends are eleet
, this method won't do






b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!




 ____________________________________________________________________
 
[17:. - [ Fun with noise in QBASIC ]                   [niemand1] :. ]
                                               [niemand1@b0g.org] :. ]
 ____________________________________________________________________






Note: you need an internal PC speaker for this to work on your computer,
otherwise nothing will happen and it will just be damn boring.

Here is my program:

'Funny Sounds By: niemand1 4/27/2000
CLS
DO
  frequency% = RND * 1000
  IF frequency% < 37 THEN frequency% = 37
  duration% = 1
  SOUND frequency%, duration%
LOOP UNTIL INKEY$ = CHR$(27)
END

What it does:

CLS (clears text from DOS)
DO (Begins a loop process)
frequency% = RND * 1000 (Makes a random number between 1 and 1000)
IF frequency% < 37 THEN frequency% = 37 (I'll explain this later)
duration% = 1 (Value can be changed to make each sound longer)
SOUND frequency%, duration% (Plays a sound of specified freq. and dur.)
LOOP UNTIL INKEY$ = CHR$(27) (Loops until esc key is pressed)
END

This program makes a random number between 1 and 1000 and uses that number
as a frequency to play through the computers PC speaker, then repeats the
process until you hit the esc key.  When run it makes a ton of annoying 
sounds that might drive your parents insane, when they start yelling, hit
the esc key so you are not hit in the face. What can you do with this
program? I have no fucking clue, but I just think it's a funny way to learn
the sound command. 

The reason for the fourth line is this:

If you try to play a sound in a frequency lower than 37 the program craps up
because the computer won't allow sounds of those low frequencys. Why? I have
no idea, but if you figure it out, e-mail me at niemand1@hotmail.com. 

You can change the value of the third line to do make lower
frequency sounds only, or change it to as high as 32,767. If you set it for
32.767, you might get some high pitched sounds that annoy the hell out of
animals sensitive to noise, not recommended to dog owners. If you set it for
any higher than 32,767, the program will crap up because your computer
can't handle sounds any higher pitched than that. 

You can change the value of duration% to make the short sounds play longer,
but it does not sound as funny. 

Oh yeah, one more thing:

I made this program messed up on 240 miligrams of DXM in case you were 
wondering where I get psychotic ideas like this. I thought it was pretty 
damn funny while I was tripping and saved it. 




b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!





 ____________________________________________________________________
 
[18:. - [ pulling people's doc's on irc ]                [wh0rde] :. ]
                                                 [wh0rde@b0g.org] :. ]
 ____________________________________________________________________





The Interview of a lifetime 
(with a dude that claims to be a former member of Global Hell):

Note: I am not this stupid! This is for your enjoyment!

[21:39]  Mclark is ~matt@dsl-64-34-123-253.telocity.com
[21:39]  Mclark is �Matt Clark�
[21:39]  Mclark on Baltimore.MD.US.Undernet.Org

This would be me.

IRC log started Fri Jun 23 20:22
-> *scott-* Excuse me, I'm from a magazine, and was wondering if you would 
participate in an interview?

-> *scott-* I was told by some people from #hackphreak to talk to you, and its a 
small computer magazine.

-> *scott-* No, I'm sorry?

-> *scott-* The secretive type huh?

-> *scott-* Just some opinion questions, its called Computer Currents, and if 
you would like a free subscription you can have one.
-> *scott-* Be on where? Online?

-> *scott-* Are you in trouble with someone?

-> *scott-* Ok, well would it be ok to conduct the interview?

-> *Scott-* The first thing in the column is I need a small introduction, how 
old you are, what state maybe, how many years you have been using computers, 
etc.

computers for about 6 maybe 7 years now.

-> *scott-* Would it be ok to use your nickname?

-> *scott-* The next question is what computer platform you prefer, and a short 
description why you chose that one?

-> *scott-* Sure thing

-> *scott-* Hah, very professional!
-> *scott-* What kind of network do you administer?

-> *scott-* Ok, now on to the opinions, if you don't want to answer just say no 
comment.

-> *scott-* What do you think of the state of the nation's computer security? 
Many hundreds of government computers have recently been attacked and they are 
looking for young help, is this a good idea?

goverment.
-> *scott-* Would it be ok to ask what part?

goverment computers.

-> *scott-* Very cool!
-> *scott-* Next question is what about DoS, what can we do to prevent it?

machines that have alot of bandwidth and im sorry there is no server gonna stay 
up with people having access to this kind of bandwidth.
-> *scott-* Is the FBI's idea of a DDoS anti-tool a good one or is it just 
something to get others off their backs?

machines with bandwidth the servers are going to die.
-> *scott-* Has your network ever come under the attack of a DoS flood?

-> *scott-* I saw you were in the channel "lpsg," is this is a hacking 
organization? (I will remove the name in the article)

-> *scott-* Ok, Ill remove that one, not very relevant.
-> *scott-* Do you consider yourself a hacker?

-> *scott-* If you were to term yourself as something, what would it e?
-> *scott-* Sorry, Be.

himself by

-> *scott-* Just a couple questions to show general knowledge to my readers, can 
you define MAC?

are OS's called MAC machines called MAC

to define.
-> *scott-* Specifically MAC addresses
-> *scott-* As related to networking

networking go into exploiting and diffrent things in that nature.

-> *scott-* Well how about CSMA/CD?

of shit ive wrote on sorts of things, sattilites, networking, phreaking

-> *scott-* Ok

-> *scott-* You were a member of the infamous gH?

-> *scott-* Were you raided by the FBI?

-> *scott-* You were interviewed?

tell you..
-> *scott-* So you're quite a famous person I've stumbled on! This is very 
interesting!

-> *scott-* Can we go back to some networking basics though? I always try to 
show to what degree network adminstrators are educated.

im trying to remember from my Network+ class.
-> *Scott-* Oh I'm sorry I thought you were a network adminsitrator?

-> *scott-* Oh ok, do you know what a MAC address or what CSMA/CD is?
-> *scott-* Sure
-> *scott-* And what Certifications are you applying for?

-> *scott-* Very nice

-> *scott-* Yes! Thats exactly right actually

-> *scott-* And CSMA/CD?

-> *scott-* Sure take your time

-> *scott-* Computer Currents

-> *scott-* Yes, do you know what it stands for?

some bs

-> *scott-* Its very close

-> *scott-* Yes that is one version of it
-> *scott-* Now for some easy questions, do you know what 10base2 and 1base5 are

-> *scott-* Yep
-> *scott-* Want to try for a harder one?

-> *scott-* Do you know what the purpose of SQE test signals are? In relations 
to AUI-based equipment?

though ugh..
-> *scott-* Sure

repetitive fashion until the machine's processor basically melts

-> *scott-* Wow, thats great!

awhile to think.
-> *scott-* Do you know what BNC networking is?
-> *scott-* No its fine, really youre doing great

-> *scott-* In relation to networking

yourself another IP getting onto another network
-> *scott-* Actually just spit out both I guess
-> *scott-* Ok

-> *scott-* No, the other one

-> *scott-* Perfect! You're an extremely talented network engineer!
-> *scott-* One more questions?

-> *scott-* How about ipmasq and bASH and how they relate?

-> *scott-* Hehe, you seem to know all the other iPSEq questions..

-> *scott-* Sure

-> *scott-* Shoot

platforms, the FBI designed this codec to stop the attacks on yahoo and shit
-> *scott-* Damn, no wonder the government is recruiting you!

-> *scott-* Well thanks you very much! I look forward to publishing this, and 
Ill remember to take out those names.

-> *scott-* Do you want a free subscription? (As long as you live in the US)

-> *scott-* Sure, just give me the address, zip, and any name you want us to use 
for security I guess, hah!

-> *scott-* Would you be possibly interested in conducting a phone interview? 
We're trying to start a webcast with the Real Networks people?

it..

-> *Scott-* What is HCC?

-> *scott-* Troubled times huh? Hah! Well ok, you take care and try not to get 
"Busted" anymore!
-> *scott-* I got you're subscription filled out and filed, thanks for your 
time.



Now during the interview me and hst were talking, since I saw hst knew that I 
was talking with Scott-, because in #lpsg Scott- put this:

[20:42] (@Scott-): CSMA/CD
[20:42] (@Scott-): wtf is this kid on
[20:42] (@Scott-): wtf is that bs?

Now heres what I could recover of the logs of me and hst talking:

[20:51] (hst): HEh
[20:51] (wh0rde): do it
[20:51] (hst): he just asked me what a amc address was
[20:51] (wh0rde): LOL
[20:51] (wh0rde): feed him bullshit NOW
[20:51] (hst): i did
[20:52] (wh0rde): yeah
[20:52] (wh0rde): *Scott-* is it
[20:52] (wh0rde): *Scott-* media access control?
[20:52] (wh0rde): *Scott-* or someshit
[20:52] (wh0rde): -> *scott-* Yes! Thats exactly right actually
[20:54] (wh0rde): give him csma/cd
[20:54] (hst): i did
[20:55] (wh0rde): what did you tell him
[20:56] (hst): i told him the answer
[20:56] (hst): you want me to tell him whack shit?
[20:58] (wh0rde): yes!
[20:58] (wh0rde): dont retell csma/cd though
[20:58] (wh0rde): hes gonna ask What is the purpose of the SQE test signal 
provided on AUI-based equipment?
[20:59] (wh0rde): tell him its denial of service or something
[20:59] (hst): omg
[20:59] (hst): this is so fucking funny
[20:59] (hst): you have to give me the logs of this
[20:59] (hst): right after you are done
[20:59] (wh0rde): I will
[20:59] (hst): what shoukld i say
[20:59] (hst): he asked
[20:59] (wh0rde): denial of service attacks
[20:59] (hst): liek
[20:59] (hst): give me the words
[20:59] (wh0rde): wait
[21:00] (wh0rde): Theyre denial of service attacks based on AUI packets sent in 
a repetitive fashion until the machine's processor basically melts
[21:01] (hst): EHh
[21:01] (hst): that is funny
[21:01] (hst): would you like to know the real purpose
[21:01] (hst): or do you already know?
[21:01] (wh0rde): I have no idea
[21:02] (hst): the purpose of the SQE test signal is to test the
[21:03] (hst): collision detection electronics of the
[21:03] (hst): tranceiver
[21:03] (hst): and to let the ethernet interface
[21:03] (wh0rde): ok
[21:03] (wh0rde): for this one
[21:03] (wh0rde): Bielectric Networking Cues
[21:03] (wh0rde): no
[21:03] (wh0rde): Bioelectric
[21:03] (hst): know that the collision detectino circuits nd signal paths are 
working correctly
[21:04] (wh0rde): k
[21:04] (wh0rde): hes gonna ask you in a sec
[21:04] (hst): Bio Electric networkign cues?
[21:05] (hst): heh
[21:05] (hst): and you want me to say?
[21:05] (wh0rde): no the question is BNC
[21:05] (hst): HAHAH
[21:06] (hst): BNC networkign
[21:06] (wh0rde): he actually knows what bnc really is..
[21:06] (wh0rde): but I told him theres 2 versions of it
[21:06] (wh0rde): Bioelectric Networking Cues
[21:06] (hst): i would give you logs
[21:06] (hst): fo what he is msging me
[21:06] (hst): But
[21:06] (hst): HEH
[21:06] (hst): they are to funnt
[21:07] (wh0rde): more questions
[21:08] (hst): about?
[21:08] (wh0rde): uhm
[21:08] (wh0rde): lets see
[21:10] (wh0rde): "Ipmasq is a counter-DDoS tool when used with bASH, generally 
on Irix platforms, the FBI designed this codec to stop the attacks on yahoo and 
shit"
[21:10] (hst): HAHAHAHAHAHAHAHAHAHAHA
[21:10] (hst): i cannot say that
[21:11] (hst): that makes me feel stupid
[21:11] (wh0rde): NO
[21:11] (wh0rde): SAY IT AND MEAN IT!
[21:12] (hst): HAHAHAH
[21:12] (hst): I CANT
[21:12] (hst): BHAHAHAHAHAHAHAHAHAHAHA
[21:12] (hst): omg
[21:12] (hst): Im crying
[21:13] (wh0rde): hehehehe
[21:13] (hst): heh
[21:13] (hst): i could'nt breathe for a min
[21:13] (hst): i want LOGS
[21:13] (hst): RIHGT AFter you are finished
[21:14] (wh0rde): heh
[21:16] (hst): are you done
[21:16] (hst): you know
[21:16] (hst): ib have this man logged
[21:16] (wh0rde): yeah but theres more leetness to come
[21:16] (hst): asking me the questions
[21:16] (hst): HEH
[21:16] (wh0rde): dont say anything
[21:16] (wh0rde): I will
[21:16] (hst): i have to show this to dayzee
[21:17] (hst): Did that fucker
[21:17] (hst): actually say
[21:17] (hst): Ipmasq is a counter-DDoS tool when used with bASH, generally on 
Irix platforms, the FBI designed this codec to stop the attacks on yahoo and 
shit
[21:17] (wh0rde): yep
[21:17] (wh0rde): exactly
[21:17] (wh0rde): dont say anythign to him yet
[21:17] (hst): HEH
[21:17] (hst): What a mind blower
[21:17] (hst): i thought he actually had skills
[21:18] (hst): now that i think about it
[21:18] (hst): i never actually
[21:18] (hst): saw this man do anything
[21:19] (wh0rde): yeah
[21:19] (wh0rde): hes an idiot


WOW I GOT THIS KIDS INFOS, BY PRETENDING TO BE A MAGAZINE EDITOR. **PLEASE DO 
NOT LET THIS KID KNOW I DID THIS, OR HE WILL TELL EVERYONE, AND THEN I CANT DO 
IT ON A REGULAR BASIS. YOU WANT ME TO DO THIS ON A REGULAR BASIS!!!!**







b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!



 ____________________________________________________________________

[19:. - [ IRC Quotes ]                                [k-rad-bob] :. ]
                                              [k-rad-bob@b0g.org] :. ]
 ____________________________________________________________________





<grid> you might think you are a hacker because you can code, but you will never be a real hacker like me

<skatoni> will some one please help 
<`NeXiGeN`> what's yer problem ? 
<skatoni> there is a guy hacking into my computer 
<`NeXiGeN`> unplug yer modem 
<skatoni> how? 
<`NeXiGeN`> see all those wires behind your computer box ? 
<`NeXiGeN`> ripem all out 

Connection reset by peer)

<niemand1> i heard if you put your car keys next to the fone line from the modem, it will disconnect you

<Wizbone> no, he's too poor like me... and like me, he'll be staying at
home, watching pornos and eating cheezies, wondering all the while why
his dick is orange

<vuduisz> decaf cocaine is better for you

<Accipitri> can someone awnser one question for me?
<Accipitri> how do you change your screen resoultion in linux?
enlightenment i believe
<ReDPriest> x86config
<Accipitri> hehe red....dont understand that....when i said newbie to
linux i mean....i installed it
lastnight
<ReDPriest> ah
<ReDPriest> Type x86config in console
<Accipitri> lol....console? im using gui interface i think....graphical
thing
<Diabolita> X?
<ReDPriest> yep
<Accipitri> where is the console? 
<ReDPriest> It will open a black window that looks like a DOS prompt or
whatever
<ReDPriest> Or right when u login
<ReDPriest> Dont startx just type x86config
<Accipitri> dont know how to get into the console from where i am
<Accipitri> ok, in regular xterm
<Accipitri> what do i do now?
<Accipitri> im in the xterm regular....dont know what to do...
<AcidKick> type in x86config
<Accipiter> um
<Accipiter> XF86Setup is a hell of a lot easier.
<AcidKick> or is it xf
<AcidKick> either way
<Accipitri> command not found
<Accipiter> well
<Accipiter> you need to exit X first.
<Accipitri> ok, how....
<Accipiter> Accipitri >> CTRL+ALT+Backspace

Accipitri[cr420407-a.lndn1.on.wave.home.com]: EOF from client)
<Accipiter> hahahaha
<ReDPriest> haha

<Accipiter> he was using an X chat client


<fraggy-fu> quro soto booyah loto komiero messtah render
<RenderMan> WTF?
<nach0> you know. wtf is context-sensitive. it's
(w-question-word)-the-fuck. is it What? is it Why? is it
Who? wtf is WTF? or the universal interrogative


<buckleet> i ahve to takeover #hack now
<buckleet> anyone want to help?
...... some time passes........
<buckleet> SOMEONE UNBAN ME FROM #HACK
<buckleet> please



<fraggie> drugs is bad
<fraggie> for health you
<fraggie> maker type reatrded very

<fraggy> i wonder if any crooked cops ever make drunk people give em head. "now sir. just blow hard into the machine. yep. thats
 it. keep blowing. ...... ok sir. you're not drunk. off you go"

<E-Vile> I have an odd request... can anyone present here with any nukeing progs try to nuke me please??

<LEE-> it was me that took out yahoo with ma mates and panther modem

<cyber-cre> who knows what a port scanner is?


<lore> b0g is really bad.
<lore> it tries to be what we did with b4b0
<lore> but fails because it has hardly any technical content
<lore> give it up


<twist> <Prae> james' mom is a cum guzzling whore :(   <-- MY FUCKIMNG MOM JUST READ THAT YOU ASSHOLE

[23:28] (+tak): me and josh are gonan do ecstacy
[23:28] (+tak): with 2 girls
[23:28] (+tak): will we have sex?

Virtus[~pirch@ppp9-jkt3.indosat.net.id] has joined #2600hackers
<Virtus> How do I Nuke people?
<Freesoul> hahaha
<R4Z0r> LMAO
<KiLLeRBiTe> just type /con/con
<Virtus> thanks man
(Read error to Virtus[ppp9-jkt3.indosat.net.id]: Connection reset by peer)



<fUnKyF|Ow> how can i get a email acount?
<fUnKyF|Ow> help me plz

<thep0et> bob
<thep0et> guess what
<thep0et> i landed a 20 dollar an hour contract making layouts
<k-rad-bob> really?
<thep0et> yes
<k-rad-bob> thats ubergreat
<k-rad-bob> what firm?
<thep0et> now i can get money
<thep0et> and a car
<thep0et> and fuck people
<k-rad-bob> haha
<thep0et> bob i am gonna have so much sex

<Prae> people who make graphics are sexually inadiquette

<MisterX> heh
<MisterX> this copper
<MisterX> tryed to bust me for toking
<+Quantico> shit my arse is hurting
<MisterX> the other day
<+Quantico> lol
<MisterX> and he says
<MisterX> have u been in trouble with the police before
<MisterX> i said yes
<MisterX> he said what for
<MisterX> i said
<MisterX> drugs and hacking
<+Quantico> hehe
<MisterX> he said hacking?
<MisterX> i said yeah
<MisterX> i hacked into railtrack and changed train times
<MisterX> and lloyds of london
<MisterX> and he said
<MisterX> oh ok
<MisterX> and kinda walked off
<MisterX> that was after he tryed to search for the draw
<MisterX> in pitch black
<MisterX> with a little flash light
<MisterX> but the fnny thing is
<MisterX> he saw me throw it out of a fag packet
<MisterX> when he arrived
<MisterX> but he couldnt find it
<MisterX> he ripped up the fag packet totally
<MisterX> then he search for about 10 minutes
<MisterX> trying to find it on the floo
<MisterX> r
<MisterX> and he didnt realise we were underage drinking either
<MisterX> so we were just sat their downing our booze while he was wondering around us
<MisterX> quite a funny situation i thought


[01:17] JULIO [fraggy@24.67.114.205.ab.wave.home.com] has joined #2600
[01:18] <JULIO> likwid, you silly hoe. sup
[01:18] <JULIO> ATTENTION
[01:18] <likwid> julo - you would be....
[01:18] <likwid> lol
[01:18] <JULIO> DOES ANYONE HERE HAVE ANY GREY POUPON?
[01:18] <Scavenger> I do
[01:18] <JULIO> I NEED THE GREY POUPON PLZ
[01:18] <JULIO> I NEED THE GREY POUPON TO HACK MY CHEATING GIRLFRIENDS EMAIL 
ACCOUNT
[01:18] <likwid> lol
[01:18] <JULIO> PLZ HELP ME
[01:18] <supruzr> heh
[01:19] likwid passes JULO the grey poop on...
[01:19] <likwid> lol
[01:19] <supruzr> fragmental wants to be the 3rd Jerky Boy
[01:19] <supruzr> er
[01:19] <supruzr> i mean JULO
[01:20] <Scavenger> bah
[01:20] <likwid> fraggy!   sup man??
[01:20] fraggie [fraggy@24.67.114.205.ab.wave.home.com] has joined #2600
[01:20] <fraggie> oopz
[01:21] fraggie is now known as JUL1O
[01:21] <JUL1O> ATTENTION
[01:21] supruzr [supruzr@tnt14b-26.focal-chi.corecomm.net] has quit IRC 
(ZERO *POOF*)
[01:21] <likwid> ah...     i'm bored...
[01:21] <Scavenger> heh
[01:21] JULO [fraggy@24.67.114.205.ab.wave.home.com] has quit IRC (Read 
error: 104 (Connection reset by peer))
[01:21] <JUL1O> THE GREY POUPON HACKED ME GOOD
[01:21] <Deeply> weird
[01:21] <likwid> lol
[01:21] JUL1O is now known as JULIO
[01:22] <JULIO> IF NE1 KAN CONTROL THE GREY POUPON, PLZ /QUEER ME
[01:22] <Scavenger> heh
[01:22] <JULIO> I MEAN
[01:22] <JULIO> QUERY ME
[01:22] <Deeply> any old ddialers here?
[01:23] <Scavenger> Well Im out
[01:23] <JULIO> I EM AN DDIALERS PERSON
[01:23] <Scavenger> aufweidershen
[01:23] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has quit IRC 
(blow me)
[01:23] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has joined 
#2600
[01:23] <likwid> later Scavenger
[01:23] <BiTcH> [pPCpunk] Liquer in the front... Poker in the rear...
[01:23] Scavenger is now known as Scavenger[sleep]
[01:23] <Scavenger[sleep]> later
[01:23] <JULIO> DOEZ NE1 WANNA SEE MY PIC?
[01:24] <likwid> uhh  lol i dunno   do we?
[01:24] <pPCpunk> anyone got a wingate I can use?
[01:24] <JULIO> ITZ REALLY ELITE
[01:24] <JULIO> http://www.sp0rk.org/pictures/zig5.jpg
[01:24] <likwid> lol
[01:24] <JULIO> I EAT ONE OF THOZE FOR BREAKFAST EVERY DAY
[01:24] Deeply is now known as DeeplyShrouded
[01:24] <JULIO> AND SOMETIMEZ WHEN I NEED A MIDNIGHT SNACK
[01:24] <likwid> lmfao
[01:24] <JULIO> THEY IZ YUMMY
[01:25] <JULIO> "YUMMY YUMMY YUMMY, JULIO'Z GOT CUM IN HIZ TUMMY"
[01:25] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has quit IRC 
(blow me)
[01:26] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has joined 
#2600
[01:26] <BiTcH> [pPCpunk] Liquer in the front... Poker in the rear...
[01:26] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has quit IRC 
(Read error: 104 (Connection reset by peer))
[01:27] JULIO POKEZ PC PUNK IN HIZ REAR
[01:27] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has joined 
#2600
[01:27] <BiTcH> [pPCpunk] Liquer in the front... Poker in the rear...
[01:27] <JULIO> LETZ ALL SING ALONG AND DANCE
[01:27] JULIO POKEZ PC PUNK IN HIZ REAR
[01:27] JULIO POKEZ PC PUNK IN HIZ REAR
[01:27] JULIO POKEZ PC PUNK IN HIZ REAR
[01:27] JULIO POKEZ PC PUNK IN HIZ REAR
[01:27] <JULIO> THUNDER BOLTZ AND LIGHTNING
[01:27] <JULIO> VERY VERY FRIGHTENING
[01:27] <JULIO> ME
[01:28] <JULIO> GALILEO
[01:28] <JULIO> GALILEO
[01:28] <JULIO> GALILEO
[01:28] <JULIO> EH FIGARO
[01:28] <JULIO> O-O-O-O-O.......
[01:28] <killer_ic> when does the cd come out, i want one!
[01:28] <JULIO> IM JUZT A POOR B01 FRUM A POOR FAMILY
[01:28] ShadeS|eep is away: (Auto-Away after 10 mins) [BX-MsgLog On]
[01:28] <JULIO> SPARE ME THIZ LFE FROM THIS MONSTROSITY
[01:29] <JULIO> EASY CUM
[01:29] <JULIO> EASY GO
[01:29] mr_fidelity [mr_fidelity@hln1-64.montana.com] has joined #2600
[01:29] <JULIO> LITTLE HIGH. LITTLE GO
[01:29] <JULIO> PLEASE LET ME GO
[01:29] <JULIO> NO!!
[01:29] <JULIO> WE WILL NOT LET YOU GO
[01:29] <likwid> lol
[01:29] BiTcH sets mode: -b #test!*@*
[01:29] WhOrE sets mode: +b #test!*@*
[01:29] <likwid> ?
[01:30] <JULIO> QUEEN + WAYNE'S WORLD == GOOD TYMEZ
[01:30] <mr_fidelity> don't you think its wierd that hotmail, a microsoft 
run service uses freebsd?
[01:30] <mr_fidelity> you think they would come up with their own os that 
could handle that, it just goes to show windows is lame.
[01:30] <JULIO> WHY YES. I AM EH HOT MALE. THANKZ FOR NOTICING
[01:30] <mr_fidelity> I got the new linux mag, that comes with storm linux, 
is storm linux worth installing?
[01:30] <JULIO> TYME 4 REQUESTZ
[01:31] <killer_ic> i use mandrake
[01:31] <JULIO> MANDRAKE IZ A MANWHORE
[01:31] <mr_fidelity> I use redhat right now.
[01:31] <killer_ic> i heard storm is ok
[01:31] <mr_fidelity> well this is the rain release what is that?
[01:31] <JULIO> STORMZ SUCK CUZ THEY KNOCK OUT YOUR POWER
[01:31] pPCpunk [pPCpunk@ip137.pascagoula2.ms.pub-ip.psi.net] has quit IRC 
(blow me)
[01:31] <DeeplyShrouded> heh no one remembers ddial eh? :)
[01:32] <JULIO> DEMON DIAL
[01:32] <likwid> hahahahhaha
[01:32] <DeeplyShrouded> no
[01:32] <JULIO> YES
[01:32] <JULIO> YES
[01:32] <JULIO> YES
[01:32] <JULIO> YES
[01:32] <JULIO> DEMON DIAL
[01:33] <leotherussian> me and julio down by the schoolyard
[01:33] <JULIO> Your thugs suprised T-Dawg's thugs while eating pizza in the 
kitchen and 34 choked on food and died.
[01:33] <JULIO> ME AND LEO SUCKING ON SOME NIPPLEZ. FUN FUN FUN FUN, 
LALALALA
[01:33] <JULIO> FIRST CUMZ LEO
[01:33] <leotherussian> heh
[01:33] <JULIO> THEN CUMZ JULIO
[01:33] <JULIO> THEN CUMZ THE PREMATURE EJACULATIONZ BY LIKWID WHO WUZ 
WATCHING IN THE TREE
[01:34] WhOrE sets mode: +o ross
[01:34] ross sets mode: +b JULIO!*fraggy@24.67.114.205.ab.wave.home.com
[01:34] WhOrE has kicked JULIO from #2600 (Banned)
[01:34] <leotherussian> ha
[01:34] <DeeplyShrouded> THANK YOU!
[01:35] <likwid> hahahahhaa
[01:35] JUL1O [junior@linux.scdsb.on.ca] has joined #2600
[01:35] <JUL1O> im sorry
[01:36] <JUL1O> no more sing along songz tonight kidz
[01:36] <JUL1O> ross, plz unban my other mask. thnx. i need the grey poupon 
still
[01:36] ross sets mode: -bb JULIO!*fraggy@24.67.114.205.ab.wave.home.com 
#test!*@*
[01:36] WhOrE sets mode: +b #test!*@*
[01:36] JULIO [fraggy@24.67.114.205.ab.wave.home.com] has joined #2600
[01:37] <JULIO> thank you
[01:37] <JULIO> hey jul1o
[01:37] <JUL1O> father!!
[01:37] <JULIO> i hate to tell yo this
[01:37] <JULIO> but im not your father
[01:37] <JULIO> you was adopted
[01:37] <JUL1O> hmm
[01:38] <JUL1O> so mommy isnt my real mommy?
[01:38] <JULIO> im afraid not
[01:38] JUL1O criez
[01:38] <ross> i think i need to restart
[01:38] <JULIO> there, there illigiemate son
[01:39] <taijian> lol
[01:40] <ross> wellp, anyone need anything?
[01:40] <JULIO> has anyone seen the movie, mystery alaska?
[01:40] <ross> i'm restarting windows now
[01:40] <ross> wee
[01:40] <JULIO> ross, a rimjob would be nice
[01:40] <ross> reinstalling
[01:40] ross sets mode: +b JULIO!*fraggy@24.67.114.205.ab.wave.home.com
[01:40] WhOrE has kicked JULIO from #2600 (Banned)
[01:40] <leotherussian> haha
[01:40] ross sets mode: -bb JULIO!*fraggy@24.67.114.205.ab.wave.home.com 
#test!*@*
[01:40] WhOrE sets mode: +b #test!*@*
[01:40] <JUL1O> heh
[01:40] JULIO [fraggy@24.67.114.205.ab.wave.home.com] has joined #2600
[01:40] <JULIO> sorry
[01:40] <ross> s'ok
[01:40] <ross> i'm just being a ass
[01:40] <JULIO> heh
[01:40] JULIO BoW's to ross
[01:41] <JULIO> anyways, has anyone seen that movie?
[01:41] <JULIO> its somewhat funny
[01:41] <killer_ic> I saw some of it
[01:41] mr_fidelity is back... I'm back Yeah for me.
[01:41] <likwid> sup mr_fidelity?
[01:41] <JULIO> yay 4 fidelity!!
[01:42] <likwid> lol
[01:42] <likwid> lol did i tell you 'bout the time last weekend when i got 
one of those 'visitor' stickers from the police station?
[01:42] <likwid> =]
[01:42] <JULIO> lol
[01:42] <likwid> hehe
[01:42] blink45 [blink45@ip209-183-93-41.ts.indy.net] has joined #2600
[01:42] <JULIO> likwid, you're my hero now
[01:42] <mr_fidelity> you didn't tell me.
[01:43] blink45 is now known as Alalyndor
[01:43] taijian is still laughing at "there, there, my illigitemate son"
[01:43] <JULIO> taijian, plz do not make fun of our family
[01:43] likwid:  *mr_fidelity* lol   i'll tell ya then =]
[01:43] <JUL1O> yah!
[01:43] JUL1O criez some more
[01:44] <killer_ic> there there it will get better
[01:44] <JUL1O> thank you
[01:44] <JUL1O> so kind
[01:44] JUL1O lookz for his father
[01:45] <killer_ic> i am actually your 3rd cousin twice removed
[01:45] <JUL1O> really?
[01:45] <killer_ic> yes
[01:45] <JUL1O> i love living in arkansas
[01:45] <JUL1O> if you're my 3rd cousin, you must be my brother too
[01:45] <killer_ic> me and my 40 kids
[01:45] <JUL1O> your 40 kids? you mean my sisters
[01:46] <killer_ic> my wife/sister and i couldnt be hapier
[01:46] <JUL1O> yay 4 killer_ic
[01:46] <Nigma> heh
[01:47] <JULIO> wait a minute....
[01:47] <JULIO> killer ice iz bad.....
[01:47] <JULIO> killer ice kills.....
[01:47] <JULIO> uh oh
[01:47] <JULIO> spaghettio
[01:47] <killer_ic> not killer ice
[01:47] ross [ross@adsl-63-193-120-196.dsl.snfc21.pacbell.net] has quit IRC 
(Read error: 0 (Success))
[01:47] <JULIO> buh bye ross
[01:48] <JUL1O> brb. i muzt configure sendmail to play youvegotmail.wav 
everytime i geet new mail
[01:48] <killer_ic> o tay
[01:48] <JULIO> o day
[01:48] <JULIO> o'day
[01:48] JULIO is now known as JULIO_O
[01:48] <JULIO_O> hmm
[01:48] JULIO_O is now known as JULIO_ODAY
[01:49] JULIO_ODAY is now known as JULIO_ODAY[gH]
[01:49] <JULIO_ODAY[gH]> h0h0h0
[01:49] <JULIO_ODAY[gH]> i em a global hell haqr
[01:49] <JULIO_ODAY[gH]> BoW to me
[01:49] <JULIO_ODAY[gH]> i know how tO use iishack.exe
[01:50] <JULIO_ODAY[gH]> i shall cripple your systemz
[01:50] <JULIO_ODAY[gH]> and you children
[01:50] <JULIO_ODAY[gH]> and your wives
[01:50] <DeeplyShrouded> OMG
[01:50] DeeplyShrouded laughs
[01:50] <JULIO_ODAY[gH]> GMO
[01:50] <Alalyndor> don't forget pets ;)
[01:50] <JULIO_ODAY[gH]> and your pets
[01:50] <JULIO_ODAY[gH]> yes, including your goldfish
[01:50] <Alalyndor> damn beat me to it
[01:50] <killer_ic> what about grandma??
[01:51] <JULIO_ODAY[gH]> r her boobieez flabby and weak?
[01:51] <killer_ic> hold on ill check
[01:51] <killer_ic> .....yes
[01:51] <JULIO_ODAY[gH]> then she may live
[01:51] <JULIO_ODAY[gH]> rise with me my brotherz
[01:52] <JULIO_ODAY[gH]> you shall all be gH chldren
[01:52] <Alalyndor> i'll bet her bush starts above her bellybutton ;)
[01:52] <JULIO_ODAY[gH]> we shall take over daytime tv as we know it
[01:52] <killer_ic> no i help her shave
[01:52] <JULIO_ODAY[gH]> and hack all my children to all gH children
[01:52] <JULIO_ODAY[gH]> because one day
[01:52] <JULIO_ODAY[gH]> all gH's children will rise above the otherz
[01:52] <Alalyndor> hmm i always thought the revolution wouldn't be 
televised
[01:53] <JULIO_ODAY[gH]> oh, it will be televised
[01:53] <JULIO_ODAY[gH]> even in spanish for dumb people like patrick 
gregory
[01:53] killarat [killarat@ts001d17.sun-fl.concentric.net] has joined #2600
[01:53] <killer_ic> can we play a 24 hr fox special?
[01:53] <JULIO_ODAY[gH]> killer ratz
[01:54] <JULIO_ODAY[gH]> yes
[01:54] <JULIO_ODAY[gH]> my gH children, these new comerz r weak and must be 
destroyed
[01:54] <killer_ic> how about when trees attack lab monkeys?
[01:54] <JULIO_ODAY[gH]> grab your nampz and come with me
[01:54] <Alalyndor> hey i know this is old news but i've been out of the 
loop a while does any one know what happened to the BBC2 sattellite that 
went off line about 6 mon ago someone hakced it but i never found out what 
happened to em
[01:54] DeeplyShrouded plays with tlo
[01:55] <JULIO_ODAY[gH]> alalyndor, i n00qd it
[01:55] <JULIO_ODAY[gH]> with winnuke.exe
[01:55] <JULIO_ODAY[gH]> and smurf
[01:55] <DeeplyShrouded> didn't hear about that one alalyndor
[01:55] <JULIO_ODAY[gH]> it went down harder than JP's orgasmz
[01:55] <Alalyndor> lol
[01:56] <JULIO_ODAY[gH]> children...
[01:56] <JULIO_ODAY[gH]> i am Julio O'day
[01:56] <DeeplyShrouded> well, since no one i know is on, sleep for me....
[01:56] <JULIO_ODAY[gH]> of gH
[01:56] <DeeplyShrouded> night everyone
[01:56] <JULIO_ODAY[gH]> ride with me and be liberated
[01:56] <Alalyndor> later
[01:56] <Darkfire9> Hey anyone know where I can download a phone scanner????
[01:56] <killer_ic> well its been fun but mind shutting down must get sleep
[01:56] <JULIO_ODAY[gH]> darkfire, i do
[01:56] <JULIO_ODAY[gH]> for i am an hacker
[01:57] <Alalyndor> ok JULIO i'll ride with ya where do i sit :)
[01:57] <JULIO_ODAY[gH]> cum sit on my lap little billy
[01:57] <JULIO_ODAY[gH]> yes
[01:57] <JULIO_ODAY[gH]> thats right
[01:57] <JULIO_ODAY[gH]> a little over
[01:57] <JULIO_ODAY[gH]> there we go
[01:57] <JULIO_ODAY[gH]> oh yeah
[01:57] <killer_ic> system7.org  darkfire
[01:57] <JULIO_ODAY[gH]> oh my you're a jumpy one
[01:58] <JULIO_ODAY[gH]> no, no. keep jumping up and down on my lap billy
[01:58] <JULIO_ODAY[gH]> oooohhhhh............ oh yeah.....
[01:58] <Darkfire9> thanks killer
[01:58] <killer_ic> dark or blackcode.com
[01:59] <killer_ic> no prob
[01:59] <killer_ic> well im out,its been fun
[01:59] <JULIO_ODAY[gH]> bye
[02:00] <Alalyndor> hmm is that it JULIO you need to work on your 
stamenia....later gtg
[02:01] <JULIO_ODAY[gH]> sleep iz 4 the weak
[02:01] <JULIO_ODAY[gH]> i must depart now
[02:02] <JUL1O> az must eye
[02:02] JUL1O [junior@linux.scdsb.on.ca] has quit IRC (to the batcave 
julio!!)
[02:03] JULIO_ODAY[gH] [fraggy@24.67.114.205.ab.wave.home.com] has quit IRC 
(Excess Pai)

<hf> i can barely remember that in order to piss, one needs a toilet!!!
<hf> lol
<tefx-dead> knowing bt, they would
<hf> will a pepsi can do?
<Rizki> heh
p hf/#evrnet prepares to piss into a pepsi can
<hf> HOPE ita big enough!
<[droid]> heh
.... snip ....
<hf> HOLY| SHIT!
(sf) huh!?
<hf> that was the WORST thing i have ever done
<hf> the can over flowed with my piss!
(sf) ...
<Rizki> :/
<hf> and it went
<hf> EVERY
<hf> WHERE!
<hf> ACLK!!!!!!!!!!!!!!!!!!!!!!!!!
<Rizki> :(
(sf) :(
<hf> it smells!
<hf> everywere!
<hf> the fuckign can OVERFLOWED
<hf> DAM IT
<hf> DAM IT!
<tefx-dead> heh
<tefx-dead> empty it first hf
<]droid[> haha
<hf> i am holding it in now!
<tefx-dead> drink
<tefx-dead> !
<]droid[> ew
<hf> i need to chuck it out my room!
<tefx-dead> drink! drink! drink! drink! drink! drink! drink! drink! drink!
            drink! drink! drink! drink! drink! drink! drink! drink! drink!
.... snip ....
<hf> ah i found another can
<hf> here we go

<FloodY`> can some one help me please
<rap`> yesh
<rap`> i can help you
<FloodY`> me and my friends just got a bot and there is a 2 bots of some one eles and they dont havr ops they just sit there we 
need the to bots dis so we can get ours oped
<rap`> ok
<rap`> do this
<rap`> go to msd0s and type m0de=linuX
<rap`> and then type ./pakkkket b0tsname
<rap`> or
<FloodY`> dont work
<rap`> VeNoMouS
<rap`> ask him
<rap`> he loives to packet people
<rap`> say
<rap`> ./msg VeNoMouS hack you packet some stuff for me since your a packet warrior 
<rap`> hack = can
<rap`> he will say OK!@!@!@
<FloodY`> ok thanks
<rap`> your welcome
<FloodY`> <VeNoMouS> hay butt fuq, suck me
<rap`> LMFAO

<rap`> say to him, il give you some a0l 0day for it
<FloodY`> whats that
<rap`> somehting he will want
<rap`> ask him to packet in exchange
<rap`> helping?
<FloodY`> no
<rap`> why?
<rap`> what he say?



Session Start: Mon Jun 26 12:51:40 2000
[12:51] Session Ident: higher (_@ppp-100-90.restena.lu)
[12:51] (higher): really?
[12:51] (wh0rde): yES
[12:51] (higher): u use this hothack prog
[12:51] (higher): ?
[12:51] (wh0rde): nO
[12:52] (wh0rde): I r0Te My oWn
[12:52] (higher): so, can you do sth for me?
[12:52] (wh0rde): dUdE!
[12:52] (wh0rde): *bEeP bEeP* gO bAcK tEw mEkZiKo!!
[12:52] (higher): sorry?
[12:52] (wh0rde): hAw hAw *hOnK hOnK* gOtO ------ fRaNcE ------ wItH nO pAnTz
[12:52] (higher): yes/no?
[12:52] (higher): please!
[12:52] (wh0rde): ROFLMMFAO <G> hAhA *bEeP BeEp*
[12:53] (higher): you help me?
[12:53] (wh0rde): WoOd U LiKe A SaLAMi?
[12:53] (higher): test your passwordcracker!
[12:53] (higher): crack wernerabc@hotmail.com
[12:53] (wh0rde): AwW i OwN DaT ShiT
[12:54] (higher): when you get the right word, you can help me!
[12:54] (wh0rde): AwW i DiD oWNz DaT ShiTe KiDDo
[12:55] (wh0rde): U hAb A bUnCh Uv NeKiD FaRm AnImLz In DeReE
[12:55] (higher): can you speak normally...please, it's important!
[12:55] (higher): so wernerabc@hotmail.com it's my e.mail!
[12:55] (higher): i can say you the pass!
[12:55] (wh0rde): FaRM AnImALZZZ
[12:56] (higher): what's that????
[12:56] (wh0rde): JoOOOO
[12:56] (wh0rde): ++
[12:56] (wh0rde): FaRM AnImALZZZ
[12:56] (wh0rde): ====
[12:56] (wh0rde): HaPpY TiMez No?
[12:56] (higher): please crack the pass for me....one time!!!
[12:57] (wh0rde): "PoOpYCaTPaNTZfRuMFrANce"
[12:57] (higher): you're a lyer. you must been a very good programmer to program such a prog...
[12:57] (higher): what's about france? tu es francais?
[12:58] (higher): hey? je parle avec toi!!!
[12:58] (wh0rde): OuI OuI
[12:58] (higher): alors, tu le fais ou non??
[12:59] (wh0rde): OuI OuI
[12:59] (higher): tu le fais? alors d'abord:
[12:59] (wh0rde): "PoOpYCaTPaNTZfRuMFrANce"
[13:00] (higher): je vais t'donner mon e-mail pour le test. d'accord?
[13:00] (higher): wernerabc@hotmail.com
[13:00] (higher): allez!
[13:00] (higher): tu ne r�ussis pas!!
[13:00] (wh0rde): dACCcORD!
[13:01] (wh0rde): Un MoMeNT SVP
[13:01] (wh0rde): mOn OrDiNaTeUr Me FaChER?
[13:01] (higher): quoi? ton pc ne fonctionne plus????
[13:02] (wh0rde): PoO?
[13:02] (higher): tu ne r�ussis pas?
[13:02] (higher): je l'ai dit!
[13:03] (higher): what's about yahoo?
[13:03] (wh0rde): je PENzE QuE Tu EsT PeNiBLe?!
[13:03] (higher): tu peux faire ca?
[13:03] (wh0rde): NoN!
[13:03] (higher): tu es penible: tu ne reussis pas!
[13:03] (wh0rde): HeHEhEE
[13:03] (wh0rde): DoOd
[13:04] (wh0rde): IM pUTtInG JoO In MaH MaGaZiNE
[13:04] (higher): which mag?
[13:04] (wh0rde): BaWg!
[13:04] (wh0rde): BeE ZeRo GeE
[13:04] (higher): what's that?
[13:04] (wh0rde): CuZ YoU ArE LeET
[13:04] (wh0rde): ROFLMMFAO <G> hAhA *bEeP BeEp*
[13:05] (higher): you know the "exploit generator"?
[13:06] (wh0rde): YeZ
[13:06] (higher): what's it about?
[13:06] (wh0rde): ThE INS
[13:06] (higher): what's that? please help
[13:07] (wh0rde): IMmIGrAtIoN
[13:07] (wh0rde): To KEeP FiLThY MeKZiKaNoZ OuT
[13:07] (higher): so, 1 question:
[13:07] (higher): can you now hack yahoo accounts, yes or no?
[13:07] (wh0rde): YeZ!!!!
[13:08] (higher): can you give me one password, please?
[13:08] (wh0rde): YEZ
[13:08] (wh0rde): "asdpo313"
[13:08] (wh0rde): DaTZ MuH PaSSwROd
[13:09] (higher): can you try to search the pass from:
[13:09] (higher): hunke_de@yahoo.com
[13:09] (wh0rde): YeAH iZ DaT YuR BoY FriEnD?
[13:09] (higher): no, it's ME ;)
[13:09] (wh0rde): hAw HaW
[13:09] (higher): test
[13:10] (higher): please try it
[13:10] (wh0rde): "PoOpYCaTPaNTZfRuMFrANce"
[13:10] (higher): no, why not?
[13:10] (wh0rde): DaTZ iT YO
[13:10] (higher): no, it's incorrect!
[13:11] (higher): you're sure?
[13:11] (wh0rde): YeZ
[13:11] (higher): mmm....
[13:11] (higher): what's about:
[13:11] (higher): juliedie@hotmail.com
[13:11] (higher): nono
[13:11] (higher): juliedie@yahoo.com
[13:11] (higher): ^^^^^^this one
[13:12] (wh0rde): "PoOpYCaTPaNTZfRuMFrANce"
[13:12] (higher): what's about this word?
[13:12] (wh0rde): iZ DAT uR BitCH?
[13:12] (higher): yes
[13:12] (wh0rde): w0rD
[13:13] (higher): please try it one time!
[13:13] (wh0rde): IMA eMaIL HeR SaYiN I WaNt CoOtChiE
[13:13] (wh0rde): @!#
[13:13] (higher): they are all my e-mails
[13:14] (wh0rde): HaW HaW ToO LaTe
[13:14] (higher): bye, bye! thx!
[13:14] (wh0rde): ToOOOOoooOOOOOooo LAaAATEEe DaT HoE iZ MInE
[13:14] (wh0rde): ROFLMMFAO <G> hAhA *bEeP BeEp*
Session Close: Mon Jun 26 13:14:53 2000

Session Start: Sun Jun 18 05:35:21 2000 
Session Ident: LobsterXI (minirock_@24.67.135.181.bc.wave.home.com) 
LobsterXI> do u want to cyber 
hornygirl> sure 
LobsterXI> kay 
LobsterXI> have u ever done that before 
hornygirl> i'd prefer phone sex ;( 
LobsterXI> can you call here? 
hornygirl> yes i can ;) 
LobsterXI> coool 
LobsterXI> do u want to call then? 
hornygirl> i can call you 
hornygirl> i don't want to wake up anyone in my house ;( 
LobsterXI> kay 
LobsterXI> so whats that mean 
hornygirl> ill call you 
LobsterXI> alright 
hornygirl> i need a number baby ;) 
LobsterXI> hold on 1 second 
LobsterXI> 250 756 2998 
hornygirl> kay 
hornygirl> im going to call 
LobsterXI> kay 
hornygirl> its busy. 
LobsterXI> can't be 
hornygirl> it just gave me a busy signal :( 
LobsterXI> humm 
LobsterXI> try again 
hornygirl> okay 
LobsterXI> you might need a 1 in front 
hornygirl> ohhhh 
hornygirl> okay 
hornygirl> let me try with that 
LobsterXI> k 
hornygirl> no... 
hornygirl> ;( 
LobsterXI> hmmm 
LobsterXI> well its (250)756-2998 
LobsterXI> try once more 
hornygirl> okay 
hornygirl> baby its not working ;( 
hornygirl> we should just go with cyber 
LobsterXI> alright 
LobsterXI> you wanna start? 
hornygirl> i wanna get to know you first ;) 
hornygirl> you like a lot of kink? 
LobsterXI> ya sure 
hornygirl> like what? ;) 
LobsterXI> i'm down for whatever 
LobsterXI> :) 
hornygirl> what have you done before 
LobsterXI> nothin, this is my first time 
hornygirl> well... 
hornygirl> what turns you on ? ;) 
LobsterXI> hmmmm 
LobsterXI> i want you to lead 
hornygirl> you like being dominated don't you willy? 
hornygirl> i'm calling you willy 
LobsterXI> yep :) 
hornygirl> thats your name for tonight 
hornygirl> okay willy? 
LobsterXI> aight 
hornygirl> take off those fucking pants now willy 
LobsterXI> alright 
LobsterXI> they're off babe 
hornygirl> BITCH THAT WASN'T FAST ENOUGH 
LobsterXI> sorrry! 
hornygirl> get on your knees now! 

hornygirl> BEG ME 
hornygirl> for forgiveness 
hornygirl> BITCH I SAID BEG ME 
LobsterXI> pleeeeeeeeeease forgive me!!! 
hornygirl> okay 
LobsterXI> thank u 
hornygirl> now eat my pussy bitch 
hornygirl> now 
hornygirl> I SAID NOW MOTHER FUCKER! 
LobsterXI slides his tongue into your pussy 
hornygirl> THATS NOT GOOD ENOUGH v * LobsterXI licks you hard 
hornygirl> you like that hairy pussy don't you? 
hornygirl> mmmmm 
hornygirl> turns you on huh? 
LobsterXI> yeeeeeaa 
hornygirl> how do i taste bitch? 
LobsterXI> great 
LobsterXI> i love it 
hornygirl> IN DETAIL 
LobsterXI> your pussy tastes like vanilla ice cream 

hornygirl> did that turn you on? 
LobsterXI> i want you to touch my dick 
LobsterXI> sorta 

hornygirl> ohhhhh 
hornygirl> what manliness 

hornygirl> mmmmmm v hornygirl> you like that? 
LobsterXI> yep! 
LobsterXI> now lick it off 

hornygirl> oh 
hornygirl> im sorry 
hornygirl> i get nervous 
hornygirl> in these situations 
LobsterXI> alright 
hornygirl> just fuck me now baby 
hornygirl> NOW 

hornygirl> ohhh a romantic ;) 

v hornygirl> oh my 
hornygirl> lots of air in there ;( 
LobsterXI> nassty 
hornygirl> im sorry... 
LobsterXI> gotta run see ya 

Session Start: Sun Jun 18 05:33:27 2000 
Session Ident: m22_ (BLANC@pc001214.interpost.no) 
m22_> Hi 
m22_> How are u? 
hornygirl> hey ;) 
hornygirl> i'm real horny 
hornygirl> how bout yourself? 
m22_> im horny as well 
hornygirl> ohhhh 
hornygirl> we can fix that ;) 
m22_> ;) 
m22_> what u wearin? 
hornygirl> baby im wearing my bikini top and a pair of TIGHT shorts 
hornygirl> no panties ;) 
m22_> mmm 
m22_> im only wearin boxers 
m22_> want whats inside? 
hornygirl> you wanna take em off? ;) 
hornygirl> for me? 
hornygirl> and dangle that penis around in my face 
hornygirl> mmmmm i'd like that 
m22_> ;) 
m22_> mmm 
m22_> sure 
hornygirl> just slap it around a bit 
hornygirl> do you want me to take off anything? 

hornygirl> mmmmmm 
m22_> i want u to take off everything 

hornygirl> ohh baby 
hornygirl> tasty 
m22_> play with it 
m22_> u naked for me? 

hornygirl> yes i am 
hornygirl> i didn't mean to pull that hard 
hornygirl> im sorry 
m22_> ;) 
m22_> taste it 
m22_> i like it rough 

hornygirl> mmmm 
hornygirl> it tastes good 

m22_> mmm 
m22_> youre good 
hornygirl> are you playing with yourself? ;) 
hornygirl> just for me? 
m22_> im rubbin my cock slowly 
m22_> what u doin? 
hornygirl> im rubbing my dick up and down thinking about you touching me ever so gently 
hornygirl> baby? 
hornygirl> you still there? 
m22_> u m/f? 
hornygirl> whatever you want me to be ;) 
hornygirl> im a hermaphrodite 
hornygirl> have you ever played with one before? 
hornygirl> ;) 
m22_> wow 
hornygirl> best of both worlds baby 
m22_> im straight 
m22_> are u a girl or a boy? 
hornygirl> well i'll explain this 
hornygirl> i have big tits 
hornygirl> and a nice wet pussy 
hornygirl> and a hard cock 
m22_> that is to much for me 
hornygirl> wanna know what makes me horny? ;) 
m22_> I dont like cocks besides mine 
hornygirl> but do you wanna know what makes ME horny? 
m22_> sure, go ahead 
hornygirl> fucking with guys like you for the hell of it making you believe im a hermaphrodite%@#$@#$@# 




b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!




 ____________________________________________________________________

[20:. - [ Closing words ]                             [k-rad-bob] :. ]
                                              [k-rad-bob@b0g.org] :. ]
 ____________________________________________________________________




Italy just won and i just finished wrapping this issue up.
I didnt bother formating this issue as much as the last one :/

links of the day/year/month:

telnet interniq.org 6969
http://www.audiogalaxy.com/bands/uberbob
http://sourceforge.net/bugs/?func=detailbug&bug_id=108494&group_id=4487
http://page.auctions.yahoo.com/auction/19390667


His and hellos goes out to these peeps:

Everyone that has contributed to this b0g issue, anyone that has 
contributed to any b0g issue, the gimps at packetstorm for mirroring 
our stuff, mogel and his uber site at http://scene.textfiles.com/ , 
The guys at hackernews.com for finally giving us credit :))))), all 
the guys in FK, cryptic at http://www.digitalaggression.com/ , all our 
affilates and the b0g belivers, fraggy, acidkick, p0lar (come back!), 
syztrix and the rest of the DH crew, N.A.P, people on #efnet that 
doesnt suck, redpriest, skywalker, everyone that plays LMS at ukonline 
and doesnt camp! Spear, the chick I'm inlove with, everyone that puts 
up with the gayness we display in the official b0g channel #k-rad on 
undernet, also on undernet: #hacktech, #gaydogsex (HEH), #hackphreak, 
#phreakhack, #whhs and #gps, cnz, g4wd, the clone and his 0day site at 
http://nettwerk.hypermart.net/ , deftones for finally putting out the new 
album (which I have been listening to for the four hours it took me to 
put this issue together), dave matthews band for being the most uber 
awsome k-rad 0h-d4y band ever, anyone that I forgot, anyone that wants 
to see theyre name here, rfp, wizdumb, c0redump, your m0th3r, cr0bar,
pneuma, r3wt, the gimps in irc.blabber.nets #hack, people who love 
us, chicks who will have sex with us, chicks with webcams that are 
going to write b0g propaganda on theyre naked skin and send us 
pictures at h0h0@b0g.org, you for reading this, and last but not least 
all my fellow b0gsters!


thats it!
Fear!

:))))))))))))))))))))))))))))))