💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › HU › hu1-2.phk captured on 2022-06-12 at 12:52:37.

View Raw

More Information

-=-=-=-=-=-=-


                      The Mickey Mouse Club Presents...

          __  __    ____      __    __  __  ______  _____    ______
          __  __   __  __   __  __  __ __   __      __  __   __
          ______  ________  __      ___     ____    _____    ______
          __  __  __    __  __  __  __ __   __      __  __       __
          __  __  __    __    __    __  __  ______  __   __  ______

                                    Hackers
                                   Unlimited
  __  __  __    __  __      ______  __    __  ______  ______  ______  ____
  __  __  ___   __  __        __    ___  ___    __      __    __      __  __
  __  __  __ __ __  __        __    __ __ __    __      __    ____    __  __
  __  __  __   ___  __        __    __    __    __      __    __      __  __
   ____   __    __  ______  ______  __    __  ______    __    ______  ____

                                    Magazine

                                    Volume  1
                                     Issue  2

                                  Released  12/22/89

                                   Editors  The Dark Lord
                                            Cardiac Arrest



-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



                               Hackers Unlimited
                               Volume 1, Issue 2

                               Table Of Contents

#     Title                                     Author
------==========================================-------------------------------

1     Information about The Mickey Mouse Club   Editors
2     Submission Policies                       Editors
3     Introduction                              Editors
4     Understanding The Blue Box                The Dark Lord
5     Bugging Phone Line                        Cardiac Arrest
6     StarLink                                  Fallen Angel
7     Piggy Backing Lines                       The Dark Lord
8     Hacking Prodigy                           The Dark Lord
9     Hackers Unlimited News                    TDL\Cristifer Columbus
10    Confrencing.......                        The Dark Lord
11    Using 0266's                              The Dark Lord
12    Top Ten Listing                           The Dark Lord
13    CBI's                                     The Dark Lord
14    Rumors of '89                             The Dark Lord
15    Opinion Poll                              Editors
16    Definitions                               Editors
17    Listings                                  Compilations
18    Closing Notes                             Editors

------==========================================------------------------------

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-



What is The Mickey Mouse Club?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     The Mickey Mouse Club was founded by Cardiac Arrest and The Dark Lord.
The name MMC came about because we couldn't think of a better one.  We are
basically a cracking club.  Aside from cracking, we write instructional text
files, and an electronic magazine called Hackers Unlimited Magazine, designed
to help beginning hackers and phreakers.  We are also the authors of programs
such as Data Protect, a file that, as the name implies, provides features such
as data ecnryption/decryption, file hiding, file clearing, and several other
functions.

MMC Membership
~~~~~~~~~~~~~~
     Since we are still a comparitively new group, we are looking for members
of the underground BBS community who can do one or more of the following :

     * Crack games (or other programs)

     * Draw crack screens

     * Write instructional text files about phreaking, hacking, carding, etc

     * Contribute to Hackers Unlimited Magazine in other ways than files

     * Write programs beneficial to the hacking community (ie code hackers,
        etc)


     If you are interested in applying for the MMC, contact either Cardiac
Arrest or The Dark Lord.  If you fit into the above specifications, we will
give you permission to fill out our application.  After completion, upload
your application to the BBS you downloaded it from.  Your membership will be
considered ONLY if you received the application with permission.  It will be
based entirely on the application (ie, your truthfullness and knowledge).

Hackers Unlimited Magazine
~~~~~~~~~~~~~~~~~~~~~~~~~~
     The Mickey Mouse Club puts out an electronic newsletter/magazine called
Hackers Unlimited Magazine.  This magazine is devoted to informing the hacking
community about hacking, phreaking, carding, or anything else or interest.  It
is geared towards beginners, but we hope some experienced hackers will benefit
>from it also.  The editors of the magazine are the founders of the MMC, Cardiac
Arrest and The Dark Lord.  ANYONE may write for HU magazine, and we would like
to encourage readers to submit any articles they have written to a HU Support
Board.  We would also like to encourage comments, complaints or suggestions.

Where You Can Contact Us
~~~~~~~~~~~~~~~~~~~~~~~~
     Cardiac Arrest and The Dark Lord can be contacted on most pirate boards in
Denver (303/CODEN), as well as various BBSes around the country.





-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                        ___________________________
                        ___________________________
                        ___                     ___
                        ___  Submission Policy  ___
                        ___________________________
                        ___________________________

     Hackers Unlimited Magazine is an ongoing newsletter, and we will release
issues as regularly as possible.  To do this we will need readers to contribute
articles for the magazine as often as possible.  We ask that if you feel you
have something good to write about that will fall within the guidelines for
Hackers Unlimited, please submit it.  However, we do take pride in the magazine,
and we will only accept articles up to our standards.  Do not be discouraged if
your article is turned down.  Although this is not a thing that is expected to
happen, if we feel the article is not good, then we do reserve the right to
turn down your article.  Please don't let that stop you from writing your
article.  Ninty percent of the articles will NOT be turned down, and by having
this policy, we are not wanting to scare off the good writers.  We ask that you
keep the topic within the guidelines, and make it to the best of your ability.
If your article IS turned down, the editors may make suggestions, or, if the
changes are minor, permission to edit the file.
      One thing to keep in mind, we do not base our decisions on the
type of computer you own, reputation that you have, age or anything else
unrelated to the magazine.  The decision whether the article stays or goes is
based STRICKLY on the quality of the article itself.  To submit an article just
     find some way of getting in touch with one of the writers of Hackers
Unlimited, or even better, one of the editors, The Dark Lord, or Cardiac
Arrest.  If you do get in touch with one of the writers, you must make sure it
is relayed to one or both of the editors, because it will do little or no good
if we don't know you're out there.  There will be ways listed through out this
magazine on how you can get in touch with us, either through support boards,
Colorado boards, Vmb's etc.  Hope to see an article from you soon and
enjoy.........Hackers Unlimited!!!



-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-



   Introduction :   Yes, Hackers Unlimited is still alive.  We are sorry for
 the delay in the release but the makers of Hackers Unlimited, MMC, are
 working on BBS software that will be released when this issue is.  Incase
 you wanted to know, the software is called Eclipse so look for it at the
 selected sites.  Please be sure to read all of the additional notes and
 comments and help us with those requests, because there is a lot of things
 that Hackers Unlimited is looking forward to in the future, and your help is
 needed to accopmplish so of those things.  Well time for the second issue of
 Hackers Unlimted, enjoy, and as always, be await your suggestions.

 Cardiac Arrest & The Dark Lord
 Editors, Hackers Unlimited Magazine

VMB 1-800-444-7207
    Box 9500

NOTE :  This VMB is valid as of the release of this magazine, but may change
without notice.



-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                        __________________
                       ___              ___
                       ___  Blue        ___
                       ___       Boxes  ___    By: The Dark Lord
                        __________________



       I realize that most of you are just about ready to skip over this
 part of the magazine because Blue Boxes are old news.  Well I have talked
 to a couple of Phreakers who have been doing it for a couple of years (by
 no means beginners) and they were not Really sure what the process behind
 blue boxes was.  Thats why I am writing this.  Ok Enough of the Intro....
       Ok first blue boxes are one of the oldest color boxes there are.
 When the box was first discovered, it was, heheheh, far from a box.  It was
 a whistle.  Good 'ole Cap'n Crunch was the one to discover this.  He was
 messing around with the phone (As usuall) and he found that by blowing in
 his Captain Crunch wistle had got a free call.  He figured out that the
 whole Phone company runs off of tones.  When you dial a number on your key-
 pad, it does not register the number, it registers the tone.  The Cap'n
 was able to simulate one of these tones to get a free call.  This Box that
 created a tone was just great for making calls then, but now they have a
 system called ESS (Electronic Switching System) which is the worst thing
 that could ever happen to a Phreaker.  The ESS can find EXACTLY were the
 call came from, were it was made to, and from there they could get all the
 information on the person(s) who made the call through other methods.
       The Blue Box is an Electronic Box that simulates Tones.  It simulates
 2600hz and 120hz tones.  These tones travel through things called trunks,
 which are kinda like the phone lines.  When you call a number, it will
 reconize the tones that you made in dialing and will goto the destination
 set by the dialing codes.  Once it finds this trunk that it is suppose to
 goto, it will send a 2600hz tone over the trunk (Unless its busy, which is
 like not making the call).  Once it makes this 2600hz tone, it will then
 kill the tone and sends the call to its destination.  If it the line is busy
 it will send the dialer a 120hz tone, which is, you guessed it, a busy
 signal.
       What the Box does, is this exact thing, to where you are sending your
 own tones and by passing haveing to go through though Phone company, where
 you will be charged.  Well, you went through the phone company, but you
 kinda took control of the operators system.  When the lines came through,
 the operators would give it the tones needed to carry on.  With the blue
 box, you do that for her, only registering it as a free call. Once again
 though, the ESS can find these and tell where they came from, which is the
 exact reason why they aren't safe, because the will catch you in the act.
       I know this is probably old news to some of you, but hopefull some
 did not know what actually happened and know have that knowladge.



      Remember: The Night Belongs to...........The Dark Lord!


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

                       The Mickey Mouse Club's Guide To.....


                           [ Electronic Surveillance ]

                                    Part I :

                                    Overview
                              Wireless Transmitters


                                        By:
                           [      Cardiac Arrest     ]

                               Special Thanks To :
                           [      The Mad Bomber     ]



Introduction :  This file is divided into two parts.  In the first part of the
~~~~~~~~~~~~   file, I will try to present a general overview of bugging and
electronic surveillance.  The second part of this file deals with one method
of bugging: Wireless transmitters.  I will give a description of wireless
transmitters and will show several variations of this method.  I have called
this file "Part I", but I'm not sure how many additional files (if any) will
be added to this series.

NOTE:  I won't lie and say I'm an expert on bugging.  I have NOT tried all of
the methods presented here.  However, between myself and The Mad Bomber, most
of the bugs in this series have been tested.  I am writing this to inform
people of these methods and provide some simple methods that SHOULD work.  I
will also list all of my sources and also a list of mail-order companies that
sell bugs and the like.


[--------------------------------[ Overview ]---------------------------------]

     The American Heritage Dictionary defines "bug" as "A small hidden
microphone or other device used for eavesdropping."  Bugs of the late
80's-early 90's can be nearly any size.  The cover of Popular Science (August
1987) shows an electret microphone 3/16 inch across at it's widest point.  They
can be placed so as to be nearly impossible to dectect.  Bugs can be placed in
electronic devices (such as phones or radios), wired into existing electrical
wiring, or an empty pack of cigarettes.  In this country, bugs are commonly
sold as "home security devices" or "hearing aids", and in Europe an Asia, bugs
are openly sold as bugs, although they're illegal there, as they are here.
     Bugs can be broken down into three basic classes: bugs with a microphone
and a transmitter; bugs with only a microphone; and, bugs that sit inoperative
until a specific radio signal is received.  The first type are by far more
common, being simple to make with components available at Radio Shack, or they
can be assembled as plans, kits, or assembled, from companies such as
Information Unlimited.  With a few dollars and a little persistance, a person
with little or no knowledge or electronics can assemble a simple bug in less
than a day.
     Electronic surveillance is legal in only one highly controlled situation:
when law-enforcement agencies receive a court order allowing surveillance of a
suspect.  However, bugs are widely used to get a leading edge over a competing
corporation, for blackmailing purposes, or simply to find out a little more
about a person.


Hiding A Bug :  There are several easy methods of hiding bugs, both from sight
~~~~~~~~~~~~   and detection.  Sight is usually no problem.  Simply drill a
hole in the wall, insert the bug, and patch it up again, or cover it with a
picture, etc.  Or place it in the handset of a telephone.  A matchbox is a
perfect hiding place for a den or family room with a fireplace.  The
possiblities are as limitless as the bugger's imagination.
     Hiding the bug from detection is the tricky part.  You could set the
transmitter to a frequency very close to a local TV station, so that it is
overlooked during scanning.  More complicated bugs are possilbe of changing
frequecies several times per second, but this is very expensive.  One expert
says that during the construction of a building that is to be bugged, simply
mix thousands of diodes in with the concrete.  That way, when scanned, the
entire walls would appear to be bugged, and it would be impossible to guess
where to start looking for real bugs.  Passive bugs that turn on only when a
certain radio signal is received could simply be turned off when a person
enters the room.  A more down-to-earth method would be to simply place the
bug inside an electronic device, say, a simple radio.  When the radio is
scanned, the electronic devices inside the radio cover up the bug.

Aquiring A Bug :  Anyone with a little money can aquire a bug.  It just depends
~~~~~~~~~~~~~~   on how much you're willing to spend.  This could range from a
few dollars to buy a Radio Shack wireless transmitter and removing the shell,
to a black market bug in the thousands of dollars.  Bugs are also readily
available in kit form from mail-order companies for as cheap as $20.  In
several foreign contries, bugs are sold openly on the streets.  Or, if you want
to save a few bucks, you can go to Radio Shack, buy a few inexpensive
components, and build your own.

Some Interesting Bugs :  From various sources I found some interesting
~~~~~~~~~~~~~~~~~~~~~   variations of bugs.  These are some of my favorites.

Martini Olive Bug
-----------------
     This now infamous bug was designed by a San Francisco security expert
named Hal Lipset.  To make a "martini olive", hollow out opposite ends of a
piece.  Throw all the components into these holes (there's only about 12).  He
also figured out how to cut open a small (AAA) battery and use the parts to
make a tiny power supply.  The olive is completed by making a mircophone out of
foil.  The olive shaped case is made with fiberglass putty.  You can then make
an antenna shaped like a toothpick.  Just serve it to the person you wish to
bug.


Picture Hanger Bug
------------------
     This one's looks like, of course, a picture hanger.  It's about 1/4 inch
long with a picture hanger on the end.  Just drill a hole, insert the "hanger",
and replace the picture.  It could sit there forever without being discovered.


Electret Bug
------------
     This is the bug shown on the cover of Popular Science.  It is of the
second class of bugs, using only a microphone.  You are required to run two
thin wires to the bug for operation.  However, this could be as simple as two
thin stripes of metallic paint, covered up with normal house paint.  An
electret bug is made by polarizing certain types of plastics or waxes with a
high voltage.  A hole the size of a pinhead is where the sound enters.  The bug
pictured on Popular Science measured only 3/16 inch at it's widest point!


Window/LASER Bug
----------------
     When sound is generated, window panes vibrate slightly.  Using inexpensive
equipement, such as a General Electric H1A1 Laser and an astronomical
reflecting telescope available from Edmund Scientific Company, these vibrations
can be translated to reproduce the original sounds.  This is done by bouncing
the laser off of the window, and interpreting the modulations of the beam that
returns.


Computer Bug
------------
     About three years ago, in Olympia, England, a British electronics engineer
entered a computer show, where the emphasis was on somputer security, wheeling
a cart.  As he walked, he adjusted a few knobs and soon a display screen on his
cart duplicated the monitor of an Epson PC AX.  The machine cost under $500,
and was designed by a Dutch researcher named Wim van Eck.  A monitor works by a
beam sweeping across the back of the screen.  Whereever the monitor is to be
dark, the beam is turned off.  Where the monitor should be light, the beam is
turned on.  This switching of the beam creates a digital signal.  Eck's machine
translates this signal and transfers it to a receiving monitor.  The only
problem is synchronizing the sweeping beam.  However, Eck built a circuit to
discover the original sync and match the receiver to that signal.


Toilet Bowl Bug
---------------
     Have you ever played that game in a swimming pool where one person talks
and the other tries to figure out which direction it came from, but it seems to
come from every direction?  This is because water is an excellent conductor of
sound waves.  Get the picture?  Why not just stick a bug on the piping of a
toilet?  That way, you could pick up all conversation (or any other noises)
>from that bathroom.


KGB Bug
-------
     In February of 1982, the manager of a Soviet airline was arrested for
espionage.  Authorities became suspicious of a scar on his chest, which he
claimed was from an operation.  After a closer look, however, they discovered
that the KGB had surgically implanted a bug inside his chest to monitor all
conversations occuring around him.

What The Future Holds :  As we enter the 90's, bugs will continue to become
~~~~~~~~~~~~~~~~~~~~~   smaller and less detectable.  One possible solution to
bugs that transmit continuously, which is easy to detect, is to have a bug that
collects information, then sends it in short bursts.  One speculation for such
a bug could collect information for 15 seconds and send it in a burst of 1
microsecond.  Another idea that is already possible in an impractical form, is
a voice-activated bug that shuts off after a conversation is finished.  There
will also be great advances in bug detection.  Although advanced detectors are
available, they are very expensive.  One such instrument, called the
SuperScout, costs approximately $25,000.  And that's owned by a private
businessman.  Makes you wonder what the government spends on bug detection....


Notes On Schematics :  I'm sorry about the ASCII schematics, but there's not
~~~~~~~~~~~~~~~~~~~   really much I can do about it.  I know it'd be better to
do them in extended IBM ASCII, but we're hoping there might be some Apple (or
otherwise) users reading this, too.  Anyways, here's a "key" for some of the
hard to understand symbols.

 II      \
 I<       \
 >I        \
 ___        \ These are all capacitors.
 / \        /
 ___       /
 ___      /
         /

         \
 --\      \
    \      \ Anything vaguely resembling this blob of ASCII is a semiconductor.
     I -   / The lower case "V" represents the arrow normally present in
    /     /  schematics.
 --v     /

  __    \
 ///     \
          \
     And   \ Indicates Ground
           /
 -----    /
  ---    /
   -    /

Hope this helps!!


[--------------------------[ Wireless Transmitter ]---------------------------]

Introduction :  Wireless transmitters are by far the most common, the cheapest,
~~~~~~~~~~~~   and the easiest of all the bugs to build.  I'll present two
different wireless transmitters.  They are all similar in design and function,
but since availability of parts varies for each person, it can't hurt to have
plans for both.  The Mad Bomber and I have both tested both of the methods
presented in this file.

Method #1 :  This method was found in Radio Electronics March 1989.  This
~~~~~~~~~   method transmits over a very short distance (only a couple hundred
feet).  It transmits to any frequency in the normal FM band.  The PC board in
the book is a little less than 4 inches square, but you can make it smaller
with a little patience.  This is a good one to start with, since it's easy to
build and uses common components.

Required Components
-------------------
     Resistors (1/4-watt, %5)
        R1    - 100 ohms
        R2,R4 - 10,000 ohms
        R3    - 1000 ohms
        R5,R7 - 47,000 ohms
        R6    - 2.2 megohms
        R8    - 4700 ohms
     Capacitors
        C1    - 1.5 pF, ceramic disc
        C2    - 100 pF, NPO
        C3,C4 - 330 pF, NPO
        C5,C9 - 0.1 uF, NPO
        C6    - 0.001 uF, NPO
        C7    - 22 uF, electrolytic
        C8    - 6.8 uF, electrolytic
        C10   - 10-40 pF trimmer capacitor
     Semiconductors
        Q1    - BF199 or NTE229, or equivalent NPN transistor
        Q2    - BC183C or NTE199, or equivalent NPN transistor
     Other Components
        L1    - Coil, approximately 1 uH (more on this later)
        M1    - Electret microphone
        S1    - SPST switch
     Miscellaneous
        9 volt battery
        9 volt battery connector
        Wire for connections
        Case to put it in
        Solder
        Soldering Iron
        PC Board or "BreadBoard"

NOTE :  Complete kit available for $13.85 from Prospect Electronics, PO Box
9144, Allentown, PA  18105.


Construction Notes
------------------
For the coil (L1), you'll need to either coil a wire or set an adjustable coil
around 1 uH.  Just make sure there's no bridged, or bad joints when you start
it.

Schematics
----------
   ____         |------+-----+-------+----------------------+--------+------|
   \  /         |      |     |       |                      |        |  B   |
   \/     C10 ___    L1     |       |                      |        |  a   |
ANT |          / \     |     |       |                      |        |  t   -
   |    C1     |      |     |       |                     R7        |  t  ---
  |----I<-----+------|    R4   C3 ___                     |        |  e   -
                |            |      / \                     |        |  r   |
               |            |       |                      +---+    |  y   |
                +-----\      |       |       +--R6---+      |   |    |      |
                |      \     |       |  C9   |       |     R8   |    |      |
                |       I ---+-------+--I<---+\      |      |C7 |    | C6   |
           C2  ___     /     |       |         \     |  C5  | \ |  + | /    |
               / \    v Q1   |       |          I ---+--|<--+  ___  ___     |
                |    |       |       |         /            |  / \ -/ \     |
                +----|       |       |        v Q2          |   |    |      |
                |            |       |       +-------|      |   |    |      |
                |            |       |       |       |      |   |    |      |
                |            |       |       |       |  +  M1   |    |      |
               R1           R2   C4 ___     R3   C8 ___     |   |    |      |
                |            |      / \      |      / \ -   |   |    |      |
                |            |       |       |       |      |   |    |  S1  |
                |------------+-------+-------+-------+------+---+----+-+  +-|
                                                     |                  \
                                                   -----                 +
                                                    ---  Ground
                                                     -

Operation
---------
     After you've built the transmitter, you have to set the frequency.  Set a
normal FM radio to an odd frequency.  Radio Electronics recommends around
88MHz, but in my area up at the high end (108MHz) is a little better.  Have a
friend or brother or someone constantly speak into the microphone while you
adjust the trimmer capacitor.  At one setting or another, you should hear your
friend's voice.  That's all there is to it.


Method #2 :  I came across this design in a book called Build Your Own Laser,
~~~~~~~~~   Phaser, Ion Ray Gun & Other Working Space Age Products (I'll give a
little more info on it in the source list), which is a VERY interesting book,
with 3 different types of bugs, several LASERs, and some other goodies (like
shock-wands, etc).  This is an excellent device, because it is small and can,
according to the book, transmit well over a mile (I've tested it to around a
1/2 mile) with a good antenna.  It is very sensitive, and can transmit sounds
>from all over a house.  The tuning range covers the standard FM band, such as
method #1, and also the lower end of the aircraft band, allowing a completely
interference-free transmission.

Required Components
-------------------

     Resistors (1/4-watt, 5%)
        R1    - 10k
        R2,R7,
        R7,R8 - 1k
        R3    - 100k
        R4    - 8.2k
        R5,
        R10   - 15k
        R9    - 3.9k
        R11   - 220 ohm
     Capacitors
        C1    - 100m/25 V small electrolytic
        C2    - 470 pF/50 V disc
        C3,C5 - 10 uF/50 V electrolytic
        C4,C9,
        C10   - .01/50 V disc
        C6    - 1 uF/50 V electrolytic
        C7    - 5 pF mica zero temp
        C8    - 6 35 pF trimmer
     Semiconductors
        Q1,Q2 - PN2222 or equivilent NPN transistor
     Miscellaneous
        M1    - FET capacitance microphone
        PB1   - Perfboard (BreadBoard) about 1 1/8" square
        CL1   - 9-volt battery clip
        WR1   - #24 wire
        B1    - 9-volt battery
        L1    - Coil (more on this)

NOTE :  Kit available from Information Unlimited(P.O. Box 716, Amherst, NH
03031).  Price ranges depending on package.

Construction Notes
------------------
     The book recommends 1 5/8" square for the breadboard.  My smallest has
been a little less than that size, but I'm not that good at electronics.  The
Mad Bomber made one about 1" by 1/2".  To make L1 (the coil), get a #8 wood
screw (a pencil seems to work fine for me) and tightly wrap 5-10 turns of #16
buss wire around it.

Schematics
----------

  |----+------+----+------+------|
  |C1  | C2   |    |      |      |
 ___  ___     |    |      |      |                                     ____
 ___  / \     |    |      |      |                      --+---+------| \  / A
  |    |     R1   R3     R4      |                     /  |   |      |  \/  n
  +----|      |    |      |      |  C6                /   |  ___ C8  |L1 |  t
  |           |    |      +------|--I<--R8--+---+--+-I    |  / \     |   |  e
 __           |    |     /       |          |   |  |  \   | v |      +---|  n
///   WHITE   | C4 |    /        |          |   |  |   v  |   |  C9  |      n
   __---------+-II-+---I         |          |   |  |   |  |   +--II--+      a
  /M1\   RED       |    \        |          |  R9 R10  +--|   |      |
  \__/-+------|    |     v       |         ___  |  |   |     __      |
    | ___ C3  |    |      +--|   |     C10 ___  |  |   |    ///      |
    | / \    R2   R5      |  |C5 |          |   |  |   |             |
    |  |      |    |     R6 ___  |          |   |  |  R11            |
    +--+------|    |      | / \  |          |---+  |   |             |
    |              +------+--|   |              |  |   |             |
   __              |             |             __  |  __             |
  ///             __             |            ///  | ///             |
                 ///             |                 |                 |
                                 |-----------------+-----------------+
                                                                B    |
                                                                a   ---
                                                                t->  -
                                                                t   ---
                                                                e    -
                                                                r    |
                                                                y   __
                                                                   ///

Operation
---------
     Pretty much the same as method number one.  Be sure to tune carefully, or
you'll overadjust and never find the frequency.  Trust me on that one.  The
book also suggests marking the capacitor, which isn't too bad an idea, in case
you accidentally move it.  This bug is EXCELLENT for using in houses etc.  You
can also use it as a "walkie-talkie" when you're out field phreaking or
something.  Just get a walkman type headset radio, and havbe your friend do the
same, and you can talk through the transmitter and listen through the radio.


Sources of Information :  This is a list of all the magazines I have or will
~~~~~~~~~~~~~~~~~~~~~~   use for this series of files.

Books
-----
     "Build Your Own Laser, Phaser, Ion Ray Gun and Other Working Space-Age
Projects" by Robert E. Iannini.  Tab Books Inc., Blue Ridge Summit, PA 17214.
$15.95.  389 Pages.

     "Electronic Telephone Projects" by Anthony J. Caristi.  Howard W. Sams &
Co., Inc., 4300 West 62nd Street, Indianapolis, IN 46268.  $8.95.  168 Pages.

Magazine Articles
-----------------
     "Bugging", Popular Science - August 1987.

     "Wireless FM Microphone", Radio Electronics - March 1989.

     "Micro-Sized Amplifier", Radio Electronics - August 1988.

     "Bug Detector", Radio Electronics - June 1989.

     "Tracking Down Bugs Using A Spectrum Analyzer", Radio Electronics - June
1989.


Mail-Order Bugs :  This is a list of some of the mail order companies that sell
~~~~~~~~~~~~~~~   bugs, and other items or interest.  Some of them may not
still exist.  I haven't tried them lately.


Information Unlimited, Inc. - P.O. Box  716, Amherst, NH 03031.  603-673-4730.

Dirijo/Bond Electronics - P.O. Box 212, Lowell, NC 28098.

Sierra Electronics - P.O. Box 709, Elfers, FL 34680-0709.

Xandi Electronics - P.O. Box 25647, 60P, Tempe, AZ 85285-5647.

Techtronics - 1715 Leaf Ave., Murfreesboro, TN 37130.

N.A.S. - 213-631-3552.

Spypro (045ER) - P.O. Box 45521, Seattle, WA 98145-0521.

Mentor-Z - 135-53 No. Blvd., Flushing, NY 11354.


Conclusion :  That's about all I have on wireless voice transmitters for
~~~~~~~~~~   this issue.  Part 2 will most likely be on telephone bugs.  Well,
that's the plan anyways, but this could change by the time I get to writing it.
If you have any questions, comments, suggestions, complaints, or something
you'd like to see in future files in this series, let me know.






-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



      . ...          . .   . .                                       . ..
  .. .  .  .  .   . .  ___________________________   .      ..      .    .
 .   ...\   .  . .   .   ..    .      ..   .      .   .  . .   .   .    . .
   .. x .       .     .  .. StarLink  .    .        .       ..      .
  ..  . \  .   .       ___________________________  ..    \  .       ..    .
 .     .   .    .    ..    .    . ..    .  ..    . .    x     . .      .
    ..      .. .       ..   .. .    .. .     .. .         \  . ..
                                           By:               .
                                               The Dark Lord



        StarLink is a really good system that is supposed to replace
 Pc Persuit.  It has many features and improvements that Pc Persuit does
 not have.  Starlink has other features Such as Up to date News Events,
 Many things on current affairs that have been happening lately, Inter-
 active Chat systems that many people can converse with each other through
 the use of there modems.  It has many "Extras" available.  Starlink is run
 by a company Called GTD or Galaxy Telecomunications Division.  It is a large
 and established Telecommunication Company that is in no way a beginner to
 Telecommunications business.   Most of the "Extras" are things that are
 provided by the other companies that are working with GTD to make Starlink
 the Best system of Long Distance calling Around.  Companies such as Tymenet
 have joined with GTC to make this system the way they want it.  One of the
 options available is, at the same time that you are using Starlink, be able
 to use the Tymnet OutDial, to have a farther reach over the United States.

        Not only does Starlink have the little options like the Chat Systems
 and such, the quality of calling has improved.  The Phone lines are said to
 be Much clearer, so you don't have the the same amount of line noise that
 you get with Pc Persuit.  It also has a much faster transmitting system.
 What I mean by that is there is not the horrible Delay that Pc Persuit has.
 I don't want to imply that there is no delay, because that type of tech-
 nology is not yet developed to the point were users will have no delays, but
 the delays have been cut down.  There is also a large increase in the amount
 of areas available for making a call.  Starlink has the capibility to call
 Ninty-One (91) different Cities and twenty-Eight (28) different States.  The
 number of cities and states available for calling is increasing as the
 company expands.  One other thing that is a good thing for the users of
 these systems but a bad thing for us hackers of the systems, is there is
 supposed to be increased security of the system.  I do not know for sure
 if this is true, but it is something that has been said by a lot of people.

        By reading the contents of this file up to this point, you probably
 can't understand why a lot of Pc Persuit users have not switched over to
 Starlink.  There are a couple of reasons for this.  Number one, the system
 is new and people are still learning the things Starlink has to offer.  Not
 only that, but there is one MAJOR flaw.  You have to pay for all the extras
 that the system has, and for the people just looking for the Long Distance
 calling, they have no need for the other things, and the would have to pay
 extra to get what they would never have any use for.  There is not just a
 little difference either.  There is a repsectable margin in the prices with
 starlink not fairing to well.  This probelm is said to lessen because Star-
 Link says that thier prices WILL go down after they have restored the fees
 that have been spent to start the system.  Also, Pc Persuit is said to have
 a rise in there cost, to make the gap in affordablility decrease in size.

        Right now is the best time in the world for hackers.  This is a new,
 good system that will suplly all the needs of the hackers, but besides the
 supposid "Increased Security" there is no other prepreation know to us made
 for the hacking of there system.  Some might say "It is Ripe for the
 Picking".  This system has not seen much action by the hacking community for
 a lot of the same reasons that the paying users have.  The system is new
 and people are just now learning the system, and no one really knows what to
 expect.  Once the system grows, there will be more experimentation by the
 hackers to see what the system is like.

         I hope that this Text file will increase the amount of ativity by
 the hackers.  I hope that they will do more experimenting with the system
 and soon get accounts on the system.  I do not feel that StarLink is ready
 for the hacking community, therefore it is a prime opportunity to explore
 and learn the system. There is software out much like Icex made specifically
 for Starlink and it is called "StarDial".  The newest version that I have
 seen of this software is 2.0.

         Well, happy hacking and good luck.  If you find out any additional
 information on StarLink, Hackers Unlimited would be extreamly greatfull for
 the information so we can update the file so others will have enough info to
 be sucessfull in hacking this system.  Please leave any Information at any
 of our Distribution sites, Vmb's or any other ways you know of to get in
 Contact with A member of Hackers Unlimited.  Thanks and..........

    Remember:  The Night Belongs to...............The Dark Lord!




=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

 __________________________________________________________________________
 -                                                                        -
 -  A Home-made Conferencing System for Those With Multiple Phone Lines   -
 -                     File Created by Fallen Angel                       -
 -                            10 / 26 / 1989                              -
 -                                                                        -
 =________________________________________________________________________=

There is a nifty little trick you can do if you have two or more phone
lines in your house but don't have a phone that handles multiple lines and
does conferencing.  There is a very simple way to do it yourself with a
switch and some phone wire.  The schematic at the end is pretty simple and
should be easy enough for the layman to decipher.

Problem
-------
I have three phone lines but no multi-line conferencing phone!!!  Whaaaaaa!

Solution
--------
Two separate phone lines
Telephone type wire
Solder/soldering iron
Prototyping circuit board (Known as breadboard or socketboard.  Get it
                           at Radio Shack if you are going to use it.)
One phone (preferably with an auto-dialer and
           memory for a couple of numbers)

Procedure
---------

1)  Strip a few mm. of insulation from all of the phone line wires.

2)  Plug the wires into the socketboard so that one line will have wires on
    different rows but on the same side.  (*'s for phone wires, x's for switch
    wires.

            -------------
            | *| x| x| *|
            -------------
            |  |  |  |  |       (Please excuse the ASCII drawing)
            -------------
            | *| x| x| *|
            -------------

Now you can get a switch and connect 2 wires to one side (so each terminal has
one wire) and 2 wires in the middle.  This switch must be able to break the
connection between the two lines, or else you will always be dialing out on
two phone lines at the same time  (it's cool to call a VMB this way)

By now, you should have a piece of bread board with 4 phone wires that aren't
connected to eachother and a switch with four wires hanging off it.  (it
should have 2 positions (one links middle to front, one links middle to back)
you will want to hook up the line with the phone you will be using on it to
the middle and the other line to the front.

Take the two wires hanging out of the middle and plug them into the breadboard
where your main line is hooked into.  Take the wires hanging out the back and
plug them into the lines on the breadboard with your other line.

If when you pickup the phone and hear a fucked up dialtone, try switching the
wires around like trading places with red/green on one side only.  Technically,
you have to hook red to green and red to green with the separate lines.



Schematic Attempt
-----------------
--  or  |   is phone wire.
R1          470k resistors.
SW1         should be the middle terminals of a six-pole, 3 setting switch.
SW2         should be the end terminals of the same six-pole switch.
SW3         should be between the lower-left terminal and middle-left terminals
            of a different six-pole switch.
SW4         should be between the lower-right terminal and middle-right
            terminals of the six-pole switch that SW3 is connected to.

    line 1                               line 2
    ----------------o SW1 o--------------------\
        |            \            |              \
        |              \          |                \
       R1                        R1                  \
        |                         |              Modular phone plug with an
        o                         o              auto-dialing phone on it.
          \                        \                   /
     SW3    \                  SW4   \               /
        o                         o                /
        |                         |              /
    ----------------o SW2 o--------------------/
    line 1           \                   line 2
                       \

Miscelaneous
------------

With enough tweaking of this, you can have a simple system of a memory dialing
phone with the numbers of two favorite enemies set in.  All you have to do is
call the first, flip the switch and call the second.  Make sure your phone has
a mute button because you will be laughing so hard.

I prototyped this on breadboard and you should consider starting yours on
breadboard too.  It is really helpful for debugging your circuit.




=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

                       8888888888888888888888888
                       7_  Hacking Prodigy  _7
                       ;;;;;;;;;;;;;;;;;;;;;;;;;
                                               By: The Dark Lord


       Hacking Prodigy is just like hacking any other type of system like
  Compuserve, Genie and stuff like that.  They all run off the same basic
  format as the other.  They have an account and the password which is the
  password of WHATEVER choosen by the owner of the account.  The best way to
  hack Prodigy is to find some one that will be willing to help you, that
  has a account on the system.  If they have an account, they can list all
  the users on that certain system, and when you list it it will tell you
  the owner of the account and the account number they have.  If you know
  someone that is able and willing to do this for you then you have half of
  the battle won.  Just enter the account number and look at the name of the
  owner of the account.  I would estimate that about 10 percent of the users
  will use some part of thier name in the the password.

  Example:
    Account: EJA0632
    Owner: Jamie Wallis
    Pass: J.W
      or  Jamie
          Wallis
          Jam

      That is just an expamle. and with about 10 percent of the people using
  being dumb enough to do that you would think that you would have a real
  good chance, and in reality, you do but consider this, There are usually
  about 300 + users of it.  10 percent of 300 is thirty.  Thirty users out of
  300, that is still going to be a fun little job just to find one of those
  idoits, so don't just jump in thinking that you have it made.
     If you are not lucky enough to know someone that has an account, I will
  let you know some of the formats and lenghts of passwords and accounts.
  The passwords can be anything from Four to Ten digits long.  They can
  consist of any type of charactors like numbers and letters.  The Accounts
  are 7 digits, and it can be either letters and or numbers.
          dgit23j
     I have never found any programs like Pcp Code Hacker.  So, most of the
  work that you have to do will have to be done manually, which will turn
  most hackers off.  You can just hack through your ordinary term programm,
  but to use the system you have to have the software that they use.  The
  software is simply called, yes, you got it, "Prodigy".  You can pick up
  the software for about $30.00, but I see no reason for paying for it.  MMC
  should soon have it out availible for download.  It does have a copywrite
  on it, but thats what MMC is for right?
     If you would happen to get caught hacking prodigy, the punishment would
  be the same as it would for hacking any system, but the thing about it is
  prodigy is not a system that you have to worry about being traced on.  On
  prodigy you get unlimited hours and up to 6 people can be on the same pass-
  word at the same time, so the user really isn't loosing out.
     You are probably wondering what good Prodigy would be for you?  Well,
  other that the hacking of the system, I am not real familiar with it.  From
  what I have heard from the people who use it though, you can do a lot of
  your carding through prodigy.  There is also an On-Line catalog to do your
  carding from.  They have catalogs that you can order computer equiptment
  and things like that.  There are a lot of other little things that you can
  do, but other that, the rest are just the Prodigy B.S that pretty much
  worthless. Prodigy has the News, Online Games and Up to the minute sports
  and other usless stuff like that.  You can also talk to others using the
  system, kind like an online chat with multipul people.  The only reason
  that I hack Prodigy is for the Carding aspect of it.  It is really nice.
    Like I said, I have done a decent amount of hacking on the system, but
  did much work internally, so I am not real sure about everything that is
  has to offer.  Oh well..... I guess its the sport of hacking that is so
  attractive.

    REMEMBER:  The Night Belongs to........The Dark Lord!

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
       Hackers Unlimited's............

                      - NATIONAL NEWS UPDATE -


     Raising Again?
   __________________


       Yes you got it.  The Phone company is trying to rip us off once again.
 Can you belive this crap?  I heard a news report lately where the where
 taking to a spokes person for AT&T and they said it was so they could by
 new, more up to date Supplies.  When asked what types, they replied some to
 keep up with the higher technology of the phone systems, some to replace
 old unsafe tools, and last but not least, better systems to control the
 problem of Phreakers.  Ooooohhhh, sounds like a great solution to me.  So
 they are saying to reduce and or stop the amount of phreakers is increase
 calling costs?  Doesn't make much sence to me, how about you?  I think the
 reason for phreaking is to avoid the tremendous costs of the phone company,
 but when you raise it, I think you might even be making more, right?  It is
 still in the voting and setting up stages though, so it might not even go
 through, and until then, we should just keep our fingers crossed, because
 even though you wouldn't think an increase of costs would effect us, it
 will because some of the money is going to fight Phreakers.


  Hacking & Phreaking
     Update

PBX

        Well we all thought PBX was safe.  Well they still are basicly, but
there is now a new thing that us hackers just found out.  It seems that they
can call your phone company and get your number, which they can tell what
phone company you used by a type of user log that has all the information. On
this user log they have the phone number from were the call is being made.
>From this number they can bill ya. Well we use to beable just to use them but
it seems that they do not want to be ripped off no longer. PBX is such a big
system that they usually don't even want to bother.  But now there are so many
people useing them that they don't know what to do, so instead of shutting
down the system they are going to bust.  It isn't just us hackers that use
these codes but even DRUGGIES, Civilized Bussiness people, and many other
people.  What is wierd is how they drugies got started, they don't use
war dialers or anything, but maybe one of our fellow hackers told them.  It
don't really matter it is just that from thier stupid ways is how we got
reconized.  I was watching Current Afair the other night and they were talking
about Phone Crimes, they caught a billion drugies in the act.  Then they found
how we were useing Code Thief and other programs to do our work.  They even
know how to get programs and how to use them.  What bothers me is that now it
seems that not ONE code is working at the time.  Other systems have been
busting people also just not PBX, I just am reporting on this because of the
number of people who use them.

        On the TV show I was watching they said that about a third of the use
was from ilegal purposes.  And the other 2 thirds was from PBX support
companies.  They estimated that phone criminals have a bill of $80,000 over
the whole bill.  The bill isn't very high but what they say it is still a lot.
We pay for these long distance calls, that PBX is transmitting, threw TAXES.
Can you believe it, and they expect us to be good an dnot use them like we do,
well that is a bunch of shit.  Our taxes should not be used for this, but in
fact the comanies who use them. They are cracking down on the users that
should not be using these codes.  So this is not telling to to stop but just a
little reminder to be careful on what you use.

Cable Piracy

        Well I know almost half of us have used cable ilegaly, but now is
not the time to start. They now have strongly busted people who are hooked up
illegal.  They say if you get caught then you will pay $10,000 fine and a 1
year sentence in jail.  What is funny is that they say if you call them and
say you have it hooked up they will just forget the time you used it illegal
and just start sending you bills.  Well I don't know if that is true but why
would you tell them anyway.  I mean why bother, they will just bug the hell
out of ya anyway, well I don't really know if they will but they say they
wont, they call it the ask no questions plan.  It has just been in the last
few weeks that this has been on the news and on comercials on TV.  Anyway my
point is if you have it hooked up illeglly then think about what you are doing
and see how hard they are busting down in your area, and if you do not have it
hooked up but thinking about it well the choice is up to you.  Just make sure
that you do not get caught.  If you are under 18 it will be your parents that
get in deep shit.

VMB

        VMB's (Voice Mail Boxes) are seeming to decline.  There use to be over
30 boxes, in which half of them were codelines.  Since they reconized that we
are taking boxes it seems that they are changing every day.  I have never
hacked a VMB myself but there are a few guys who have for me.  In which they
say is a "Bitch".  I was given about 5 boxes on one system and lost all of
them in about a week.  Some have there ways of telling others just get
complains from the real box owner.  Boxes seem to get harder and harder to
hack even though they use to be easy (as I am told).  The password format
changes everyday, the boxes are gone with in a couple, but with this pain do
you think we will stop?  NO!  Hackers seem to find boxes or hack them out some
how. They probably stay up all night just to get one box, and then it is gone
with in a day.  I don't know about you but that is the TRUE hacker to me.
Hackers aren't suppose to give up, they are suppose to be on the move at least
an hour a day.  The thing is, is that some hackers are kids (13-18) and have
to go to school.  But why can't they just take some time after school and hack
a VMB or a CODE or some other system.  VMB's have been around for a long time,
but it seems that we just relized them yesterday.  One thing that worries me
is that will hackers stop hacking?  Well I don't really think so, since man
lived in caves there was hacking.  VMB's will come and go but there will
allways be one that is in control of a hacker.

Field Phreaking

        I allways loved going out and doing a little field phreaking at night.
But the thing that bothers me is how many people have dogs!  I think that
there should be a limit on how many dogs are in a neigborhood.  But the more
dogs I guess the more fun, right?  There are so many things that seems so fun
in the field, fences you have to climb, dogs you have to kick, people you have
to run from, and most of all scaring the shit out of some person who has seen
you.  Field Phreaking is very fun and I encourge everyone to try it.  If you
don't know what this is then try and find out from another hacker or just
download a text file from your local hacking board.  Though I haven't really
got in to the REAL excitement of fielding, I did get in to it a little and
tried a lot, it still seems like a lot of fun.  I mean you wont have to pay
for the call and wouldn't have to bother with codes.  All you would need if
you wanted to modem it on the field job is get yourself a Laptop Computer.
Hell if you are in to carding just TRY carding you one, the chances on it is
very slim but still, what the hell.  You get out in the field and start a
conference and you feel good to brag a little about how you are calling from
Neigbor BOBS house.


                                        Cristifer Columbus


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



                         Jesters Guide to....

                {- 950-0266's for the new Phreaker -}

                          {- 11\6\89 -}


      This is a file I just decided to write, right after a guy
  that lives near me, who runs a bbs complained about his
  outrageously high phone bill, and being that I use 0266's I
  decided that I would TRY to write a text file on how to use the
  0266's as a simple way of phreaking. I am not an expert on the subject
  and I don't claim to be, I am just writing this file to try to help
  out others that are in the same experiance level as the guy that I
  was talking about previouly in the file.
      There are many different types of 950's, but the type I use is
  the 950-0266 and I use these because that is what I was taught
  with and they seem like a fairly good, and easy way to phreak.
  950-0266s are known to have VERY clean lines, so they are
  perfect to use with modems.
      The basic format for these codes are:

  (1)  Dial 950-0266
  (2)  Wait for tone then dial your 7 digit Code
  (3)  Right after dialing your Code dial your ACN (Area Code
       Number)
   I.E. if I were to call my friend Joe in Utah, I would do
   this...
  950-0266 (tone) XXXXXXX8015551234
   The X's stand for the 7 digit code


      950's have known to be dangerouse, they are on ESS (electronic
  switching service) which is a phreaks nightmare. Being that
  950's are on the ESS they can, and have been known to trace.
  The type of tracing service on 950's can trace in a heart
  beat, so there is somewhat a great risk in using these.

  for more then 3 days. Try to use different codes if you have
  them i.e. call one board with a code like 2314211 , and then
  call the next board with a totally different code. Use these
  codes during prime time, to cut the risk of getting caught
  down. And use these in moderation, do not get crazy with them.

    I hope this file hasnt been to much of a waste of time, I
  hope it has offered some help to you in using 950-0266's.

     I would like to have suggestions and comments on what you think
  of my file.  If you have valid Input, please let me know your opinion
  on one of my Vmb's.  Obviously Vmb's don't last forever, but as for this
  now it is valid.....


 Editors Note: Jesters Box has just been cut before the release of the
  magizine, so as of this time, he has no Vmb's available for comments.
  Information will be updated as it is recived.  Thanks



                                Copyright (C) 1989 by -NecroiDaemon


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



            The Dark Lords..............

                           }2
                 (NNNNNNNNN] Top 10 BBS's sNNNNNNNNN)
                           |6


  [Message Bases:]

     1.  The Vulcan Way                            (303)979-9418
     2.  The Discordian Society                    (303)973-3472
     3.  Late Night Prowl                          (303)499-2928
     4.  Inter World                               (303)363-7960
     5.  Hack Shack II                             (303)782-0215
     6.  The Vulgar Unicorn                        (303)680-8622
     7.  ShockWave                                 (303)469-3510
     8.  Insane Asylum                             (303)447-2691
     9.  Forbidden Planet                          (303)755-5934
     10. Software Exchange                         (303)779-4451



  [File Bases:]

     1.  Late Night Prowl
     2.  The Discordian Society
     3.  ShockWave
     4.  Inter World
     5.  Vulgar Unicorn
     6.  Vulcan Way
     7.  Forbidden Planet
     8.  Hack Shack II
     9.  Insane Asylum
     10. Software Exchange

  [Sysops:]

     1.  Late Night Prowl        [The Fritz]
     2.  Hack Shack II           [Kedma Oediv]
     3.  Vulcan Way              [Spock]
     4.  Inter World             [Tushka]
     5.  Vulgar Unicorn          [Lore Master]
     6.  ShockWave               [ShockWave Rider]
     7.  Insane Asylum           [Live Wire]
     8.  Forbidden Planet        [Dr. Morbius]
     9.  The Discordian Society  [Hagbard Celine]
     10. Teminal Entry           [The Dream Master]      (303)794-2083

  [Hack\Phreak Oriented:]

    1.  Terminal Entry
    2.  Late Night Prowl
    3.  The Discordian Society
    4.  Hack Shack II
    5.  Insane Asylum
    6.  Software Exchange
    7.  N\A
    8.  N\A
    9.  N\A
    10. N\A

  [All Around:]

    1.  Late Night Prowl
    2.  The Discordian Society
    3.  Hack Shack II
    4.  The Vulcan Way
    5.  Inter World
    6.  The Vulgar Unicorn
    7.  ShockWave         -- \  The Two Tied....
    8.  Insane Asylum     -- /
    9.  Terminal Entry
    10. Forbidden Planet


      I would like to take this time to Explain to you how this was judged.
  First, both me and Cardiac Judged the BBS's on there rating.  Once all the
  catagories were filled, we went on a 1-10 scale and the one with the most
  points won.  This listing is of only Colorado boards, and in no way are
  they the best out, but I wanted to start somewhere.  Heres what we am going
  to do.  Leave me your nominations for the best boards in any of the topics
  besides overall best board.  Once you send in your nomination we will look
  at the board and judge it.  I think the "Best Sysop" part will be taken out
  though due to that fact that a couple of calls cannot distiguish the Sysops
  at all.

  Remember:  The Night Belongs to..........The Dark Lord!


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


                            E
                            \                 \
                            \  [-  CBI's -]   \
                            \                 \
                            .


      First off, If you are wondering What a CBI is it is like a TRW but
  has a different setup.  You can call and with the right information on
  the person you can get the credit cards that they now own, and there
  credit history and all the cards that they ever had.  These are as touchy
  (Dangerous) to use as TRW's but just as much fun.  This is a good thing
  for carders.  It is a way to find a person that is rich, and get the info
  that you need on them, and the get there card and CHARGE, CHARGE, CHARGE!
      CBI's will tell you the amount that you are allow to charge and the
  whole 10 yards.  This is also a very effective way of taking care of people
  that you don't particuarly care for.  All ya have to do it find there card
  (Mom Or Dads) and work from there.  Open your mind to it though.  Don't
  just charge with it, do much more, post it on boards and VMB's, Get the
  needed accounts and close there account.  In other words, make it to where
  they can no longer charge on that card because it has been, how should we
  say....."CUT".  You could also order all the things possible with the card
  and have it all sent to the front door of the person that you are getting
  back at an have everything addressed to him.  If he/She is living with the
  folks, its Murder time, and if not, they have to explain why they are
  returning all the stuff and why they went over there carge limit.  They
  Way CBI's are set up, this is the procedure you will need to take:

  1. You will call and get a connection.  Most CBIs will be 300 baud and
  you will need the settings of 7-E-1.

  2. You will need to carrage return Three times.  Once you have done that,
  hit CTRL-S followed by another return

  3. Enter the Account.  Then Enter another CTRL-S. After that input the
  Lastname, First name, then the Middle Initial.
    Ex.  Wood Sam K

  4. Hit a Return and wait for a couple of seconds (5-10)

  5. Enter the Address, Apt Num. etc..., City then the State and last but not
  least the ZipCode.  The State MUST be an abreviation.

  6. Once again hit the CTRL-S and you can work it from there, doing what
  you need to with the card.

     Now, all you need is an account and a Dial up.  There should be one near
  you, kinda like a 7-11. but I don't have the dial ups to any except for
  the one in the 713 Area code, which is.....(713)591-8900.  Since this is
  a unsecure thing to use, I would suggest a diverter or something like that,
  just makes it a little funner becuase you have better odds of fully
  succeding.

     Remember:  The Night Belongs to............The Dark Lord!



=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


                Hackers Unlimited wants....... YOU!!!!!

       The Editors Of Hackers Unlimited would like your input on a couple
  of issues.  They all concernce the format and the workings of the magazine.
    We need to know....

    o Should H.U be One BIG file or all the individual files
    o How often should an issue be put out
    o How big should each issue be

      These are all questions that we would like your input on.  We have an
  idea how we want it, but it is still up in the air and your opinions would
  be appreciated.  Let us know through any of the ways that we have listed
  through out the magazine.  Thanks

                                 - The Editors

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

                    ___________________________________
                  ENNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
                  W        -- Rumors of '89 --          W
                  .NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
                                                        By: The Dark Lord


         There has been many rumors that have floated around in the year of
  1989 and I imagine there will be a lot more seening that the year is not
  over yet.  The first on that I heard was the one involving FHP (Federation
  of Hackers and Phreakers).  They are a so called "ELITE" group and only the
  "Proud Few" get in.  Around July of this year, there was a rumor going
  around about a spy, if you want to call it that, within the ranks of FHP.
  Supposidly the spy was giving away the working codes to the Phone Companies
  and giving away the dial-up that are used a lot because they are considered
  to be safe.  The spy also was said to be turning in a lot of the memebers
  of FHP and some other in and out of the orginization.  FHP took immediate
  action in freezing all applications until the whole ordeal blows over.  I
  cannot tell you whether this rumor was or was not true, simply because
  I was and outsider looking in. I was not in the group, and besides what
  information I had gathered I did not know what was actually going on within
  the group.  I dunno if FHP actually found the person, if the person left,
  but was never descovered, or that "Person" was just a rumor.  Either way,
  there was disorder within the group because as I recall I had sent in my
  application and I was assured in by one of the Higher members, but they
  never seemed to, Unfreeze, the application process.  Nothing against FHP,
  but from wht I see where it is going now, I am kind of glad.
      Another rumor was one of a Pcp Code.  It was a carded account and it
  was caught before the person recived the information on the account (Pass,
  account #, etc....).  Instead of killing the account and not sending the
  informtion to person, they went on with it but traced the account.  I am
  not sure how often they traced but I imagine that it was a decent amount.
  I dunno if this rumor was actually true of just a coinsidence but a person
  I know did get snagged on a Pcp.  Hopefully you do learn for this little
  expedition, that it is not one of the wiser things to do, Carding a Pcp
  account that is.
      Yet Another Rumor that was going around is a trap Pbx.  The dial up for
  this Pbx is still in service.  It had the procedure of 9 + 1 + ACN and that
  was said to be specifically designed as a trap.  I have used Pbx's for a
  long time now and to this day I have never heard of ANYONE getting in any
  trouble over any Pbx's, that is the reason I had trouble beliving it.
  Once I heard this rumor, I did a little research of my own on the Pbx's and
  I found a couple of intresting this proving the rumor to be false.  Let me
  give you a list of them, then I will explain them more thouroghly.

     d No one had been Busted for the Code
     d The Part that was set up for the trap was the same procedure as most.
     d That dial-up, to that point was supposidly "Virgin"
     d Phone company workers said nothing was said about that particular one
     d Difficulty of a Pbx trace
     d The attitude taken by the Pbx owner

      Those are the major pieces of information that I got.  First, no one
  was busted on the code.  The whole rumor was total speculation.  Second,
  The thing that was supposidly the "Trap" part of the code (9+1+ACN) was the
  procedure used by multiple Pbx systems.  Third, the dial up for the Pbx was
  supposidly Virgin which would mean that the owner of the Pbx system would
  have to move extreamly fast.  Fourth, I know many people that work for the
  phone company.  They hear a lot of the stuff that is going around, and some
  even do the traces themselves and none that I talked to heard a thing about
  it although there are many that they never hear about.  Fifth, One on the
  workers of the phone company that I know has installed a lot of Vmb and Pbx
  systems.  He said that it is REALLY hard to trace on a Pbx because of all
  the switching the system does.  And he even went on to say, if you get on
  certain trunks in the system it is nearly IMPOSSIBLE to trace.  Last, the
  attitude of most of the companies owning the Pbx is in the favor of the
  phreakers.  They are so big, they never miss the money, and not only that,
  they can take the damn thing as a tax write-Off.  Before I go any further,
  I would like to thank the people who supplied me this information.  I will
  only mention one, because he is the only one that has an alias.  That
  person is Kedma Oediv.  Thanks Kedma!!
      The Last one that I will talk about is really vauge.  I have heard VERY
  little about this one, but I figured that you might like to hear about it.
  It is a very new one, and supposidly there is a FBI agent in the 804 area
  code, logging on most of the pirate boards, gathering informtion on people
  so they make make a bust.  That is all I know about it, but it is kinda
  a word of caution.  If you call or live in this area, you want to be a
  little cautious, but don't worry about it.  Ninty percent of the rumors I
  have heard I have gathered enough information to say that they were a bunch
  of crap.
      Well there was a couple others, and like I said, I imagine many more,
  but those are some of the ones that I heard the most about.  I will try to
  keep you updated on the newest ones, so you can put them to rest once and
  for all, cause I know I have wondered about some of those that are still
  hanging around in the air somewhere.
      One last thing that although is Kinda Dorky, but I just HAD to add this
  for some reason.  Well its really not a rumor, but I'll say it is for the
  sake of argument.  Teenage Warroir is a COMPLETE DICK, and has Millions of
  alias's just so he can get access to boards.


  REMEMBER:  The Night Belongs to............The Dark Lord!


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-





      Hackers Unlimited...........

               ___________________________________________
              /                                           \
                      - Phreak\Hack Definitions -
              \___________________________________________/
                   \_________________________________/




  ACD...............Automatic Call Distributer

  ACN...............Area Code Number

  AIS...............Automatic Intercept System

  ANI...............Automatic Number Identification

  BHC...............Busy Hour Calls

  CAMA..............Centralized Automatic Message Accounting

  CCIS..............Common Channel Interoffice Signaling

  CCITT.............International Telegraph and Telephone Consultive Comm.

  CDO...............Community Dial Office

  CO................Central Office

  DDD...............Direct Distance Dialing

  EOTT..............End office Toll Trunking

  ESB...............Emergency Service Bureau

  ESS...............Electronic Switching System

  ETS...............Electronic Translation System

  MF................MultiFrequency

  NPA...............Numbering Plan Area

  ONI...............Operator Number Identification

  PBX...............Private Branch Exchange

  POTS..............Plain Old Telephone Service

  ROTL..............Remote Office Test Line

  RTA...............Remote Trunk Arrangment

  SF................Single Frequency

  SxS...............Step By Step

  TSPS..............Traffic Service Position System


     There will be other definitions added in the next addition, and most of
  these were either from our own knowladge or from the BIG Phreakers manual,
  I appoligize for that, and appoligize that there is no definitions but
  there was and still is a BIG request for an overview of definitions, and
  we just ran out of time, so just bear with us.
    Thanks!!!!

                              - The Editors



=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


                          Hackers Unlimited Listings

                                 -=] VMB's [=-


                   Were Sorry, but The VMB's had a last minute
            Problem with most all listed being killed, so instead of
            a last minute revision, It will not be included.  We will
            have an updated on in the next issue.


-=] ----------------------------------------------------------------------- [=-


                                 -=] BBS's [=-


Fone Number     Name                         Baud    Comment
----------------=============================--------==========================
(201)502-9115   Underground II               2400    Sysop :  Rambone
(205)554-0480   FireBase Eagle               9600    Pirate Master Distribution
(205)979-2983   Byte Me                      2400    Sysop :  Omega Ohm
(206)255-1282   Ethereal Dimension           2400    Wasington's Finest
(206)352-4606   Alternate Reality            2400    Sysop :  Mr. Classic
(206)462-7718   The Void                     2400    Sysop :  Zeke
(206)827-2029   The End                      2400
(206)839-5865   Neutral Zone                 2400    Home Of TWNC
(213)476-6490   Mystic Knight                2400    Sysop :  The Sniper
(213)833-8309   Insomnia                     2400
(217)332-4019   Golf City BBS                2400    Sysop :  Egghead Dude
(217)359-2071   Realm Of Darkness            2400    Sysop :  Dark Shadow
(303)363-7960   The Inter World              2400    Sysop :  Tushka
(303)499-2928   The Late Night Prowl         2400    Phreak/Hack
(303)649-3510   Shockwave                    14.8k   Telegard Beta Site
(303)680-8622   The Vulgar Unicorn           2400    Games Only
(303)755-5934   The Forbidden Planet         2400    Utilities Only
(303)779-4451   The Software Exchange        2400    Sysop :  The Gigilo
(303)794-2083   Dragon's Bane                1200    3pm-7pm Mountain Time
(303)933-3472   The Discordian Society       9600    Discordia Stuff
(303)979-9418   The Vulcan Way               2400    Star Trekkies
(312)297-5385   Gamer's Galaxy               2400    Sysop :  Robocop
(408)446-0316   Lake Of Dreams               2400    Sysop :  Grey Ghost
(408)268-6692   Billionaire Boys Club        9600    Home Sentinel BBS Prog.
(408)735-8685   Dragon's Heaven              2400    Wares Galore
(409)763-4032   Smash Palace South           2400    Phreak/Hack
(617)364-3304   Swift's Ridge                2400    Sysop :  Sir Swift
(717)566-1129   The Frozen Desert            2400    Phreak/Hack
(801)298-1736   Port o' Tales                2400    Sysop :  Black Beard
(801)486-5918   Crazy Nights                 2400    Phreak/Hack
(817)545-5031   Satan's Hollow               1200    MMC Dist. Site #1


up on the spur of the moment, and I didn't have time to gather information.  So
PLEASE contact me with additions or corrections.


-=]-----------------------------------------------------------------------[=-

If you wish to submit any additions, deletions, or corrections, please contact C
ardiac Arrest.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

             -==>>>>     PLEASE READ THIS!!!!!!!!     <<<<==--
                         ^^^^^^^^^^^^^^^^^^^^^^^^



     A lot of the listing and things like that might be WAY out of wack. It
  is extreamly hard to keep up with the listing due to the way all the Vmb's
  and stuff die so rapidly.  The problem wasn't as bad as in the last issue,
  but there has just been a massive killing on the boxes, and a lot more are
  expected to go, so like I said, its hard to keep an accurate list right
  now.  Sorry for the inconvience, but we will try to keep it as up to date
  as we can up to the release of this issue.  Thanks....

                                  - The Hackers Unlimited Staff



=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=




 **Additional Note:

     The information in this magazine is subject to change.  We, the writers
 have no control over the change of these thing, nor do we know when and what
 they will be changed to.  Things such as VMB's, dial-ups, etc. may die or
 be changed and the information in this will no longer be valid.  We will be
 releasing other editions of this magazine in hope that the information will
 all be up to date and of use to all that read the magazine.  As you may know
 we cannot keep up with some of the changes and things that happen to the
 things we have mentioned.  Due to that, we ask your support in letting us
 know of these changes and such through or Mickey Mouse Club VMB, if of
 course, it is still valid, or through distribution sites or any other ways
 the you know of to get in touch with one or more members of MMC.  Not only
 will we accept information on changes, we welcome any new and/or better
 information, tips etc.  Let us know if you would like to write a section of
 this magazine, and what you would like to write.  We are rather picky about
 what is put into our magazine, but that is because we want the utmost quality.
 Please don't be intimidated by the standards we have set, we still would
 appreciate the chance to see the things that you have written, as there is a
 lot of valuable information that could help the effort in improving this
 magazine.


     Well, that is it for "Hackers Unlimited".  We hope you enjoyed, and have
 gotten a lot of information from, it.  There was a lot of time, and a lot
 of effort put into this from a lot of fine writers.  The editors of Hackers
 Unlimited would like to thank these people for contibuting to this fine piece
 of writing, both in the writing of articles and the support of this project :


    Jester                        Fallen Angel
    Cristifer Columbus            Doc Silicon

      Plus the Editors:
             The Dark Lord
             Cardiac Arrest


    And all the people that didn't laugh at the name The Mickey Mouse Club


     We hope this magazine has provided you with more knowledge than when you
 started reading it.  If you have, we ask that you use this knowledge for not
 only the benefit of you,  but for the benefit of others.  There are a lot of
 beginners in the areas that we have talked about throughout this magazine,
 and all they need is the know-how and a little experience to make them
 into good phreakers, hackers, carders, you name it.  Well, once again, thanks
 to all who contributed to Hackers Unlimited and thank you for reading, (and
 hopefully) enjoying and distributing Hackers Unlimited Magazine, a Mickey
 Mouse Club production!



 des