💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › SLI › sli_003.txt captured on 2022-06-12 at 14:14:58.

View Raw

More Information

-=-=-=-=-=-=-

                                                           [SLi  23/12/94]
                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_    Welcome    _/  
                              \_           _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.


                 Welcome to the X-Mas edition of SLi MAG. 
                 This is issue `III'. A 3 or 4 month delay 
                 between issues is what we are now working 
                 for.  Oh, before I forget, READ SLi 1 and 2 if 
                 you dont understand some terms used in this.

 

..          INDEX
...  ~~~~~


. Welcome .............................. Eon
. The Rules ............................ Eon
         Hacking - A Plan of Attack ........... Eon
   . Primes ............................... Siggy
         Credit Cards ......................... CyntaxEra
         Books 2 Read ......................... CyntaxEra / Eon
         Gun Control .......................... Thorium
         Smyte List ........................... SLi
. KMnO4 ................................ Thorium
         Cryptography ......................... Siggy
         SLi .................................. Eon/CyntaxEra
         Fun with REDOX ....................... Thorium       
         [In]Famous Quotes .................... Eon
         Muzik ................................ Thorium
         Aunty Cyntax'Z nutty noteZ ........... CyntaxEra
         Movies 2 See ......................... CyntaxEra
         Fucking Telcos........................ Compiled by Eon
         Linux ................................ Siggy
         New Generation Pipe Bomb ............. Thorium
         Official SLi members ................. CyntaxEra
         Flame Thrower ........................ Eon
         Editorz knotez ....................... Eon



                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_        The        _/ 
                            \_     Rules     _/  
                              \_           _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



   Ok here are the rules about this mag. 

                                  (1)
 If you are working for a bisness that has some intrest in the information
 contained in this mag you must send WRITTEN notification that you are in
 possesion of this <or any of the other SLi mags> to the following adress


   SLi-Comp
   PO Box 3030
   Onekawa 
   Napier 
   New Zealand

    Inclose your name your comps name,adress,phone/fax number.

 If you send a ibm formated 720 disk and a SASE we will send you the next 
 SLi mag . a donation of $5 is asked for however! as YOU can aford it unlike 
 SOME of our readers.


                                 (2)
 This mag may not be edited and no SINGULAR part may be quoted in any way! 
 However the ENTIRE mag may be reproduced a charge of $1000 NZ will be 
 expected to be payed to the following BEFORE any such reprodution. 
 This EXCLUDES electronic reprodution or reprodution of ONE hard copy.

   SLi-Payment
   PO Box 3030
   Onekawa 
   Napier 
   New Zealand

   Inclose your name your comps name,adress,phone/fax number.


 The fee must be payed in CASH. I <the editor> resurve the right 
 to revoke your rights to reproduce this Mag at ANY time. 


                                 (3)
 This Mag may NOT me sold except after express written permission from 
 the chairman <ie Eon> of SLi. 

                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_  Hacking - A Plan _/ 
                            \_   of Attack   _/  
                              \_           _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



    Well we've talked about trashing, social enginering, and other stuff,
    but what if none of it works?   Well .....


    Call up the company... 


     You>  Hello is this [the company name]?
    Them>  Yes, it is. 
     You>  Yeah, umm, look.  I'm doing a school project about [what the 
           company sells or the service it provides].
    Them>  Oh well, umm, I'll put you through to our PR people.
     You>  Thanks. 
     
            [Click bleep ring <elevator music> etc..]
     
     You>  Hello?
    Them>  [Company Name], Public Relations.  How can I help? 
     You>  Ahh, yes, hi.  I'm doing a school project and was wondering if 
           it's possible to have a look around your company. 
    Them>  Well, we are happy to show you around, but you need a group of 
           at least five people. 
     You>  Cool, thanks. 
    Them>  Glad to help.
 
         [Give them the information they want and go see them]


 Once you're in the company building, have a look around.  Study their en-
 vironment and the people.  If there's a computer around, stare at it and you
 will soon get a demonstration from one of the people standing around. 
 Try to get there password or at least the way their user names are defined 
 on the system.  Note down what type of computer and what type of operating
 system they are using. 




                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_     PRIMES    _/  
                              \_           _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.


  PRIMAL SCREAM: an interesting way to find prime numbers.


  There are many numbers in the world.  Some of them are special; some of
them are hard to find.  One such class of numbers are known as "prime."

  A prime number has the quality of being indivisible by any other number
but for itself, and one.  Thus 5 is an example of a prime number; 15 is not,
because it is divisible by both 5 and 3.  15 is instead an example of a
"composite" number, one that can be expressed as the product of prime
factors.  All numbers not prime are composite.  On average, there are very
many more composite numbers than there are prime.

  Prime numbers are increasingly hard to find as they themselves increase.
There are 25 primes under 100; if you were to choose any number under 100,
there'd be a 1 in 4 chance that the number you choose would be prime.  But
once in the thousands of millions, the likelihood of picking a prime
declines to less than 1 in 20.

  If they are so hard to find, why bother finding them?  For one thing, they
have very broad applications in computer science, and more generally,
information science.  In the case of computer science, prime numbers can be
used in the construction of hash-functions; ways of indexing data so that
they may be stored and retrieved with rapidity.  They also have everyday 
applications in error-checking - cheque and credit card numbers, bar codes -
wherever there is scope for data-entry error.  Small prime numbers are
useful for quickly computing functions that will catch such errors.

  Perhaps the most arresting applications of prime number theory are in
cryptography.  Cryptography, by nature, requires functions that are
relatively easy to compute in one direction given a key, but are far too
hard to reverse without the key, even if we should have available limitless
computing resources.  Presently, it is difficult to reduce a large number
into its prime factors - so, several much relied-upon modern cryptosystems
use this to their advantage.  Some public-key systems are of the latter.
  
  I became seriously interested in cryptography in mid-1990, when I read an
article from the then-current Encyclopedia Brittainica, describing in vague
conceptual terms the class of German Second World War cipher machines known
as Enigma.  Much of the conclusions drawn of cryptanalysis of this group of
machines remains classified by the British government, at least, directly;
puzzling, considering the age of the material - until you consider that
present-day cryptography has its roots in that broken ground.

  In late-1990, I implemented variously Enigma machines in software, and set
about determining their weaknesses.  Briefly, I felt I was able to
demonstrate that, given certain assumptions about the way the machines were
wired - attributable to laziness of the part of German cipher clerks - large
amounts of plain text were recoverable from the cipher text, even if the key
was not nearly correct.  I was able to write a simple, heuristic
"Enigma-breaker" that given enough time was able to recover enough key 
fragments to completely recover the entire cipher text.  I was to later 
learn that this function was executed by "bombes," electromechanical
symbol-manipulators, built from telephone switching equipment and operated
during the War by the Allies.

  It was after the War that the computational arms-race had begun; the
Allies having a head start by designing cryptosystems that relied upon for
their security prime number theory.  The American M-209 cipher machine was
an operational prototype of the type of technology we were to see emerge.
From then until now, cryptographic research has tended toward double-edged
research; in one direction, to find functions that are difficult to reverse,
and in the other, to find faster ways of reversing or just computing
existing functions.

  A fast way of finding prime numbers would go quite a way toward breaking
some modern cryptosystems.  The editor of this magazine remarked such to me;
I was helpless to resist - I was hooked.  Within a few days I was working on
finding my own method to improve upon the ones I had discovered in the
computer science and mathematics text I had access to.

  The simplest methods I found for finding primes consisted mainly of
division; numbers under test were variously divided, the more efficient
methods involving less division, since division is computationally
expensive.  I was most dissatisfied with these methods for two reasons; one,
their reliance upon such time-consuming things as division, and two, their
lack of an ability to use the considerable storage resources of the modern
computer.

  I was more greatly attracted to sieving methods, particularly the simple
Sieve of Erastothenes.  Though fast, particularly the latter method required
inordinate storage, precluding sieves for any great distance.

  The method I eventually came up with is a dynamic-extension of the
canonical Sieve of Erastothenes - Primal Scream.  It involves no arithmetic
but for addition, and simple addition at that; having a machine with a
coprocessor makes very little difference to the speed of the program.  Also,
Primal Scream makes the assumption that most computers worth playing with
today have quite a few hundred kilobytes of storage, preferably memory,
available - so why shouldn't it be used to speed our purpose?

  Specifically, Primal Scream's memory requirements are in a direct
relationship with the number of primes under the square root of the highest
number to be considered.  For instance, when sieving to one million, the
number of nodes allocated in the algorithm's search tree is (the number
of primes under the square root of one million, which is one thousand), just
168.  This relative conservation improves with a square-root relationship as
the upper limit increases, making long sieves with even quite modest
computers practical.

  Memory is dynamically-allocated as needed, and is recycled as much as
possible - there are no significant algorithmic restrictions that would
preclude its implementation on any common operating system.  It makes no
assumptions about the speed that memory can be allocated, nor does it place
any reliance on the speed that difficult calculations may be made; these two
aspects making the only real limit the speed of the processor.

  As an example, the production version that I have written (which collects
quite a few interesting statistics in the course of its run), can exhaust a
32-bit unsigned integer of candidates within a day on a 486DX-40 running
Linux.  That is, all the primes almost up to 4500 million.  By way of 
example, here is an extract from the log file of one of the later versions:

Fri Dec  2 16:49:57 1994 DONE 98.0 completed
Fri Dec  2 16:49:57 1994 HIGH highest prime so far 4209067897
Fri Dec  2 16:49:57 1994 LAST 3877719 found since last report
Fri Dec  2 16:49:57 1994 HITS 4.514 of those since last report prime
Fri Dec  2 16:49:57 1994 TOTL 199405845 found so far
Fri Dec  2 16:49:57 1994 AGGR 4.738 of so far prime
Fri Dec  2 16:49:57 1994 ITIM 1662.8 seconds since last report
Fri Dec  2 16:49:57 1994 IPPS 2332.0 primes per second since last report
Fri Dec  2 16:49:57 1994 TTIM 80449.3 seconds so far
Fri Dec  2 16:49:57 1994 TPPS 2478.7 primes per second so far
Fri Dec  2 16:49:57 1994 DUMP dumping sieve at 4209067905
Fri Dec  2 16:49:58 1994 FLAT 99.7 sieve structure optimality

  Note particularly the "primes per second value;" this does not decline
much in the course of most long sieves - meaning that the number of numbers
considered per second does not decrease significantly either.  Primal
Scream's runtime is thus quite stable and has a very strong linear component.

  Primal Scream may not be the fastest, nor the best, but I believe the
implementation to be unique and my approach to be interesting.  I would be
happy to talk with anyone else interested in the program or in its obvious
applications - I will consider distributing it to anyone who should ask, and
naturally any comments are welcome, though of course the algorithm itself is
copyrighted by me - unless it has as I suspect it has been innumerably
reinvented.

  Please direct your inquiries to:
   
   Siggy  of SLi
   PO Box 3030
   Onekawa 
   Napier 
   New Zealand

   inet:  josh@tutor.co.nz

  Enjoy your Christmas; I know I will.

  - "Siggy."


                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_   Credit      _/  
                              \_    Cards  _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



CaRDz 
=====


Okay, I noticed that we received a few complaints about the carding and
stuff so I thought I'd go about writing a more detailed article for those 
of whom aren't yet experienced enough as of late.

Firstly, I'd like to say - this is for INFORMATIONAL purposes ONLY and I,
nor any part of Southern Lights inc. takes ANY responsibility for anything
which may happen in conjunction with you using this information for anything 
other than what it was designed for.

For starters - checking back on the past couple of issues - we didn't quite
explain what to do once you had possession of the cards you may have acquired,
ie. we never explained in detail what you COULD do.  

... hopefully, this may be of interest to you.



                               ******


Okay, you've gone trashing, used your social-engineering skills or found
a card just sitting somewhere (I'd feel sorry for the poor (hehehe, if you're
reading this, the person will definitely become poor in no time if I explain
it right - I'm not saying that you SHOULD use the card... It's all up to 
you! =) ) bugger who the card belongs to .. ;) )

Step One:     Find a card-phone and say to the operator that you'd like to
             place a credit card call ; to make sure the card works.

Step Two:     Give the operator the number of the local Pizza Hut rest-
             aurant - I, personally, prefer Pizza Hut as there aren't too
             many pizza parlors out in the Wellington region which accept 
             credit cards over the phone without seeing the piece of plastic
             when the pizzas arrive (well, sometimes they'll ask to see the 
             card, but the pizza deliverers get paid for how long it takes 
             for the consumer to receive the pizza/s so you probably wont
             need to worry about it).  

Step Three:   After quoting the Pizza Hut number, the operator will ask for 
             the card number and expiry date.  Tell him/her the card type 
             (if the card starts with: 3 - American Express (Amex), 4 - Visa, 
             5 - MasterCard and 6 - Discover.)

             [NB: This can be done with any number, whatsoever, not only just
             Pizza Hut, so take y'pick.]

Step Four:    Okay, you're listening to the ringing tone as your call to 
             Pizza Hut is being placed.. <CLICK> One of the Pizza Hut 
             employees picks up the telephone.


Conversation w/ employee should go SOMETHING like this:

      THEM:  Hi, Pizza Hut.
       YOU:  Hi, I was wondering whether you do Pizza Deliveries.
             [Knowing full well they do - you gotta appear to be at least
             a little ignorant (not too ignorant tho', mind you)..]
      THEM:  Where are you wanting the pizzas to be delivered to?
       YOU:  Karori thanks. [or wherever you're planning on picking 'em up
             from.]
      THEM:  Yup, we deliver there - just gotta check because we can't 
             deliver to some places.
       YOU:  Yeah, I know what ya mean.
      THEM:  Uh, how are you paying for your order?
       YOU:  Credit card okay?
      THEM:  Yup, that's fine.  What type of credit card?
       YOU:  Visa. (or Mastercard, American Express.. etc)
      THEM:  Yup, we take Visas.  What's your card number and expiration
             date?
       YOU:  4732-7492-7122-9237. Expiration date, 09/95. [That's not a 
             valid number (unless I'm extremely lucky, and that's definatly
             one thing I'm not...) so you'll have to find one y'self.]
      THEM:  Now, what's the name of the cardholder?
       YOU:  [Some fake name which doesn't sound too unbelievable - Joe 
             Bloggs isn't ranked amongst the best ones to use.]
      THEM:  Okay, thanks.  What would you like to order?
       YOU:  [Make your order - Don't forget to be polite and friendly.. =)
             Oh, and don't OVERSPEND!  Be realistic.]
      THEM:  Now, what address would you like the pizzas to be sent to?
       YOU:  [Give them some address which isn't too far away - walkwise -
             but not too close or, if someone knows what you do, you may be
             picked out (or up, depending on the circumstances. ;) ).
             Also, if possible, make it somewhere with a long drive so you
             can just wait at the bottom of the drive so not to "cause the
             pizza deliverer any problems".]
      THEM:  Okay, is there any time you'd prefer us dropping it in, other-
             wise we'll be there in about 30 minutes.
       YOU:  [If you live a distance from your drop site, or if your tele-
             phone is a distance from the drop site (depending on where you
             are at the time) then it's advisable to allow yourself time to 
             get there, but once you've got the pizzas, get the hell outta 
             there!]
      THEM:  Okay, we'll be right there.
       YOU:  Thanks. [You gotta be polite! ;)]

Step Five:    Now that you've made the call, you're about halfway there -
             all ya gotta do now is the hardest part of it all.....
             Waiting for the pizzas to arrive to the drop site.  Now, it's
             not a good idea to hover around the drop site looking suspicious
             as it would be likely that the neighbors will get a bit anxious
             as to what you're actually doing there - especially if the house
             is owned by an elderly couple and there are a bunch of people
             who aren't usually there hangin' about.

Step Six:     Okay, you see the pizza delivery car drive up - hopefully you
             have managed to get that far.  The likelyhood of a cops car
             comin' around to check up on it is pretty dim, although, you
             shouldn't always think that it's never going to happen, or maybe
             it just might.  The pizza deliverer jumps out and asks you if 
             you're, say, Michael Jones (The name you gave the person who
             answered your call earlier).  At this point, it's advisable, if
             you're the one who was planning on signing for it, you say some-
             thing along the lines of a "yes".  The person delivering the
             pizzas should hand you a slip of paper and ask you to sign your
             name next to the X.  You sign the paper and take off with the 
             pizzas and make your way up this long drive - maybe stay and 
             chat for a bit if you really want to, just don't make yourself
             look suspicious.  Get the hell out of there as soon as the pizza 
             delivery car is out of sight. 

Step Seven:   Eat pizza.  (Not too hard, is it?) ... oh, and destroy the
             docket - y'never know when/if the copz come snooping.. =)



Any queries/questions - you know where to send it... =)

                               ***********




                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_     Books     _/  
                              \_     2     _/  
                                \_  Read _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



 Oh no!  Yet MORE books/mags to read!!


   The Wasp Factory                  ----------- Iaan Banks
   Cobra, Cobra Bargin, Cobra Strike ----------- Timothy Zahn
   Islands in the Net                ----------- Bruce Sterling 
   Queen of Angels                   ----------- Greg Bear
   Neuromancer                       ----------- William Gibson
   Max Headroom                      ----------- Steve Roberts 
   Earth                             ----------- ??? <good book tho>
   The Amiga ROM Kernal Manuals      ----------- Commodore =)
   
   [S.P.O.T (excuse the pun) the Amiga user.. ;)]




                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_  Gun Control  _/  
                              \_           _/  
                                \_       _/    
                                  \_   _/  
                                    \_/



                             Gun Control

            By "Susej, son of Lucifer", with bits by "Thorium".

A member of SLi has had a few problems with the law lately (who hasn't?
hehe) but this is a little different.  It makes for a good story, so why
don't ya take a read...

It all started during Calculus a long time ago...  About 6 months anyway.
Well, there's this real lame shit who is in the same class as this SLi
member, and so the SLi member and his mates hassled the crap out of this
lamer (whose sexuality is questionable).  Well, one time hassles as usual,
the transcript follows.  We shall call the lamer "Herbert" and the member
"Thorium"...

< General Hassles >

Herbert:  "Ya wanna step outside for five minutes then?"
          (trying to be tough)

Thorium:  "What, so you can shove your dick up my arse?"

Herbert:  "No, so I can shove my fist up your arse!"
          (again trying to be tough)

Thorium, to whole class:  "Herbert just said he wants to shove his fist up
                           my arse!!!  Faggot Alert!"

< Herbert then looks real stupid and lame, whole class laughs at him etc.
  Teacher walks back in, then leaves again 5 mins later. >

< General Hassles >

Herbert:  "One more comment about me being a homo and I'll fucking deal to
           you!"   (still trying to be tough)

Thorium:  "Whatever, faggot."

Herbert:  "O.k. then, in the car park after school"

< More General Hassles, class ends without much more of interest >

< In the carpark >

Thorium:  "Hey, Faggot!  You forgetting something?"

Herbert:  "Oh, I'd like to go somewhere more private..." (lamely looking to
           get out of it)

< Herbert gets into his car and drives off >

Now Thorium and his friend have a most excellent idea!  Thorium's brother
has a totally real looking _FAKE_ UZI replica, which they decide to go home
and get, then wait outside Herb's place.  They wait in the car for about
five minutes then Herbert arrives, with one of his lameshit friends in his
car, and 2 (fairly fat) girls (about 2 years younger than Herb and his
mate).

< Herbert sees Thorium and his mate in their car, gets out and starts
  walking over tough like >

< Thorium gets out of car with UZI behind him >

Thorium:  "You want it Herb"

Herbert:  "Yup!" (fists across his chest, looking tough to impress these
           slags)

< Thorium pulls out the UZI, extends the stock and cocks it, which looks
  really excellently real >

Thorium:  "Well fucking come and get it then!!!"

Herbert:  "...eeehehnn..."  (Really funny high-pitched sound)

Thorium:  "C'mon, you wanted a fight!"

< now here comes the classic all-time stupid thing to say to a psychopath
  with a gun >

Herbert:  "Well shoot me then"

Thorium:  "I won't shoot you unless it's in self defense.  I get less time
           that way"

Herbert:  "."

Thorium:  "Well, if you're not man enough to fight, don't ask for it
           faggot."

< Thorium gets into the car with his friend, drive off.  NB:  One of these
  fat chicks made the second worst comment to a psychopath with a gun:
  "Dick" >

Another day goes past, Herbert comes to school in the morning after Thorium
and his mate had just told the whole class about the previous day's
happenings.  Herbert walks into class, the whole class (well about 3/4 of
them) all simultaneously say "Dit Dit Dit Dit" - Herbert looks a complete
Herbert.

This appeared to be the end of this until that Friday night (3 days later)
when mister policeman turns up on Thorium's doorstep with a search warrant.
"Humm.." thinks Thorium - is this for phreaking, hacking, or bomb making?
Thorium sees Mr.  Policeman while he is talking to Thorium's (VERY
surprised) mother - Thorium splits for a few mins and stashes all his gear
and backups, then starts the HPA partition of his HDD on formatting.  Then
goes back...

Mr Policeman then totally surprises Thorium when he shows him a "search and
seizure" notice for an "UZI semi or fully automatic pistol".

A train of thought goes very quickly through Thoriums mind, something like
"One of the neighbors saw it?  Naah, no-one did.  He can't have narked.
Could he?  Is he lame enough?  Fuckwit, he probably is!"

Of course Mr. Policeman knows what he's looking for, so there's no point in
bullshit, besides which Thorium's mother has already said it's his
brothers gun.  Thorium goes and gets it, hands it over.  Mr. Policeman
tells Thorium to come down to the police station the next morning (it could
be worse - Mr. Policeman could have arrested Thorium then and there...)

Thorium gets a huge massive lecture from his old lady, the goes back to his
room and finds that OH SHIT it was formatting!  Aaah well, good job those
backups were only about 2 weeks old...  Some time early the next morning
recovery is complete...

Meanwhile Thorium has to explain the fact that big brother's UZI just
walked out the door with a policeman attached when big brother gets home...

The next morning (Saturday) Thorium goes down to the station, and has a
videotaped interview with Mr. Policeman.  This takes about an hour of
otherwise perfectly good hacking time.  Apparently according to New Zealand
law, a firearm is ANY OBJECT WHICH CAN FIRE, OR CAN BE MADE TO FIRE THROUGH
THE ADDITION, REMOVAL OR FIXING OF PARTS, AND BULLET, MISSILE OR PROJECTILE
- which means a pound of butter could be a firearm - all you have to do is
add the guts of a pistol...

Thorium gets home again (to another lecture etc).  Things are fine for the
rest of the weekend...

On Monday Thorium tells quite a few people about Herbert calling the cops
on a FAKE gun in a REAL SMALL argument...  Herb comes to school, and most
people point out to him what a fuckwit he is.

Anyway, as yet there has been no further action (the police still have the
UZI replica) but the case has been handed up to Mr. Policemans "Superiours"
and Thorium will eventually be sent a summons or whatever.  Herbert is
thought of as even more of a fuckwit than usual.  That's about it.

As a result of this:  Thorium will probably never be able to own a firearm.
Not a problem however, as he regularly makes his own guns and bombs in
preparation for when "They" come (naah, only for fun really...).  He will
also probably end up with a few hundred hours community service, and if he
ever gets busted (even slightly) for HPA stuff, then he will probably be
classed as a repeat offender and go to prison for a stay at "Her Majesty's
Pleasure".


The morals of this are:

1)  The police get almost as upset about fake guns as real ones, stupid as
    it may seem.

2)  Never assume a fuckwit won't go to the police even for a small
    illegality.  He thought it'd get Thorium back, but all it did is make
    Herbert look even more of a fuckwit than usual.  However, Thorium will
    now probably have to do community service and pay fines, none of which
    help Herbert, but certainly fuck Thorium right off.


[Editors Note:  "Herbert" in this article is actually "Jason Collins" who's
 vital info will be disclosed (I requested it from Thorium) so you may do
 as you wish with it.  Thorium consents to all persons hassling Herbert.]





                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_   Smyte List  _/  
                              \_           _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



  Here it is again.  Another list of people that have fucked SLi off: 


  Name                      Info                      Reason 
  ---------------------+-------------------------+-----------------------
  Jason Collins           +64-6-844-4848           Refer: "Gun Control"
                          7 Lowther Place
                          Taradale
                          Napier
                          NEW ZEALAND


[Note:  We apologize for the lack of people on the hit list in this issue
as not too many people have got in our way lately... =) ]




                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_     KMnO4     _/  
                              \_  Starters _/     
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



Potassium Permanginate Starters:

Most anarchists know the Potassium Permanginate lighter, but for those who
don't, here it is:

Potassium Permanginate (Condyes Chrystals) are a strong oxidising agent,
and when mixed with glycerine (normal cooking glycerine is suitable) it
will spontaneously combust.  Depending on the ambient temperature and the
ratios, there may be a delay of a couple of seconds to several minutes
before combustion occurs.  If a _SMALL_ amount of water is mixed with the
glycerine, the time will increase.

This way you can almost "set" a specified time for detonation of any other
flammable substance (or wick or whatever).  To speed up the reaction, change
the temperature (a little change does a _LOT_ - what takes 5 secs in summer
can take a minute in winter - so, you can make a LONG time delayed mix,
then put this somewhere it will heat up at a given time (like to body temp
or a bit above) then this will set it off.  VERY handy!

Potassium Permanginate is available from most chemical supply companies,
and is not a restricted substance in New Zealand, but if asked what you
want it for say "REDOX (ree-dox) Titrations" - it might help to give the
name of a local high-school or university .

Glycerine is available from almost all supermarkets as "Cooking Glycerine"
and is used in baking.




                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_  Cryptogrography  _/ 
                            \_               _/  
                              \_           _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



     CRYPTOGRAPHY: A terribly brief introduction.

     There are quite a few ways of notating information so
that its meaning is not immediately obvious.  Some of the more
interesting ways require altering surprisingly few aspects of
the information to be described.

     I will describe one simple method I used for the first
time in the fourth-form at College.  I experimented with the
two main classes of substitution ciphers, both monoalphabetic
and polyalphabetic.  Monoalphabetic ciphers are functions in
which each symbol in the plaintext is replaced with only one
other cipher equivalent; "a" might always encipher to "z," for
instance.  Polyalphabetic ciphers can be quite a bit more
complex - "a" might encipher to any other symbol depending on
your arbitrary method.

     The most well-known monoalphabetic substitution cipher is
called the "Caesar" cipher.  Its first use has been connected
to the Roman Empire.  In this cipher, each letter of the
alphabet is shifted along an arbitrary distance.  For
instance, you might decide to pick the letter following your
plaintext one by three places - you would write "a" as "d,"
for example, when enciphering.  When deciphering, you would
write an "a" when you saw a "d" in the ciphertext.

     Such ciphers are regarded today as childish and
uninteresting.  However, combined with some transposition,
they can be made quite fun to play with.

     In the cipher we used, which I believe was suggested by a
friend of mine (and I suspect the cipher was not originally
from him), we did just monoalphabetic substitution on vowels. 
So if we saw an "a," or an "e," for instance, we'd write them
down as "b," or "f," respectively.  All the other letters we
left unchanged.

     However, we introduced a transposition twist; spaces
between words were replaced by the unenciphered form of the
last vowel used.  Say the last vowel we enciphered was an "a,"
which we would've written as a "b."  The space between that
word and the next we would've then replaced with an "a."

     Throughout the ciphertext, we scattered spaces at random,
since spaces no longer had any significance.

     So, wherever there is a vowel in ciphertext, there is
really a space, and spaces as written in the ciphertext have
absolutely no meaning whatsoever.

     An example, then.  Take the plaintext, "My name is
Siggy."  Here's the enciphered version:

     Myan bmfejs iSjgg y.
     My n ame is  Sigg y.

     Notice how the random spacing serves to confuse the
issue.  Note also how I have replaced every space with the
vowel last used; for the first space, since I had not yet
enciphered a vowel, I just arbitrarily picked an "a."

     With only a little practice this cipher can be read and
written as fluently as normal English.  There is point of
particular importance, in writing a program to implement this
cipher; it is impossible to say, without knowing the correct
deciphered version of a word, whether a letter following a
vowel is a vowel or really only the letter as it appears.  For
instance, a program has no easy way of telling whether the "j"
in "Sjggy" is really an "i," or if it is really just a "j."

     To the human eye the correct translation is obvious in
context, anyway.

     In closing, I should say that this sort of cipher really
drives teachers and people with IQs less than room temperature
up the wall with alacrity.  Perhaps in another issue I will
discuss other pieces of cryptography that are both interesting
and simple - I suppose this will really depend on how strongly
the world in general dislikes my articles, hint, hint.

     Hbvfef vn,u bndad pn'to brf bkab nythjn giJIw pvln't.
    
     - "Siggy."


[CE: Wow, even _I_ managed to figure out the last sentence after reading
the article, so I can't see how anyone else wouldn't be able to after a
little read.. =)]


   
                
                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_     S L i     _/  
                              \_           _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.


 What is SLi?

    Well, SLi stands for Southern Lights incorporated.  We are a 
    Hack/Phreak/Anarchy (H/P/A) group. 


 
     Nick :                                [Members Nick]  
     Location :                            [Where the Member is]
     Personal Code of Ethics :             [Their Ethics]
     Outlook on Life :                     [Outlook on Life]   
     Goals :                               [Personal Goals]    
     Plans :                               [Personal Plans]
     Position in Group :                   [READ BELOW]
     History of their H/P/A Life :         [Short H/P/A History]
     Other Nicks :                         [Other Nicks Member has]

      [Position in group:  Although SLi has no REAL group positions, 
                           some members are special in some way.]


                         -------------------
         

     Nick : Eon                             
     Location : Wellington, NZ                             
     Personal Code of Ethics : I believe EVERYONE has rights and that 
                               as long as another person does not break 
                               someone else rights anything is okay. 

     Outlook on Life : Lets make sure people remember me.             
     Goals : Live to see the year 2001 and look after my gf (girlfriend).
     Plans : Party, make a mess of those that stand in my way.
     Position in Group : Founding member and head of SLi.                   
     History of their H/P/A Life : Started H/P/A in 1990, done a few hacks, 
                                   some phreaking and nearly burned down my
                                   house with /A stuff. :)

     Other nicks : Switch Blade, Aztex, R-A-D 

                                ---------


     Nick : CyntaxEra                               
     Location : Wellington, NZ                            
     Personal Code of Ethics : I will stand up for anyone/anything who can't 
                               fend for themselves, depending on the circum-
                               stances.  I can't STAND demoralization of 
                               ANYone...not even of my worst enemies.  Well, 
                               sometimes anyway.... ;)  I don't like to see
                               discrimination, and will do all that I can to
                               decrease the cases.  =) 
           
     Outlook on Life : Maybe I'm manic-depressive [ED: maybe she's just manic]
                       nahhh... hmmm, well, maybe... sometimes people think
                       I'm too optimistic... other times they keep sayin' 
                       I'm too pessimistic.. I wish they'd make up their 
                       minds.. =) Would like to see world peace, but that's
                       pretty much impossible.. oh well.. I can still wish.. 
  
     Goals : Argh! I hate questions like this.. uh, I guess... to be success-
             ful, like everyone else - I just haven't decided on what I want
             to be successful at.. oh well.. maybe I'll figure that out for
             next years issue... (Just a word of warning:  check out my col-
             umn - it might end up in there .. perhaps... All these in-
             decisions.. I guess I'll have to figure 'em out, huh?) ... oh, 
             and I'm gonna try not to get hit by parked cars..... =) 
                         
     Plans : I plan not to die from a nuclear explosion tomorrow...or the next
             day for that matter.. nah, seriously.. (well, yeah.. I don't want
             to die from the nukes, but that's not the point.....)
             Seriously, I guess I just want to live a nice, boring life.. =)
             ... with SEX, parties, drugs, fast cars, money..... ;)

     Position in Group : Co-Chairperson, Peace-Maker/Trouble-Maker, to give a
                         female perspective on different topics... can't be
                         sexist now, can we?  That would be discrimination..
                   
     History of their H/P/A Life : Hmmmm.... I've only been around a couple of
                                   years, but that's long enough to see the
                                   sights and taste the tastes of life in the
                                   H/P scene.. I've hacked, phreaked and blown
                                   things up... what more do you want?
        
     Other Nicks : Mad Max, Eternity                        



                                 ------------


     Nick : BT                               
     Location : Planet Tatou, NZ                           
     Personal Code of Ethics : My word is final! but everthing else is 
                               worth crap!
     Outlook on Life : Sex, Drugs, Rock'in roll not nesiclary in that order
     Goals : CNE, ECNE, Lotsa dosh!
     Plans : Be a rich dude when I die and always party hard!        
     Position in Group : Retired Chairperson , but still ready to fight for SLi
     History of their H/P/A Life : Was around when Eon was, and started H/P/A
                                   with him.  Helped him nearly blow up his
                                   house, got busted with him while trashing. 
                                   Me and Eon have looked after one another 
                                   and watched each others back. 
      
     Other Nicks : [This information is unavailable at this time]    


                             --------------


     Nick : Thorium                               
     Location : Hawkes-Bay                            
     Personal Code of Ethics : No Ethics.
     Outlook on Life : Death is inevitable. So have fun!
     Goals : To destroy the world (Only Kidding...  Or am I?)
     Plans : See above
     Position in group : Head of HB cell of SLi                  
     History of their H/P/A Life :  Pulled a UZI on someone Hacked , Phreaked 
                                    and done a lot of Anarchy
     Other Nicks : Not many worth mentioning


                             ---------------    
                              

     Nick :  Digital Omega                              
     Location : Wellington, NZ                           
     Personal Code of Ethics : Dont watch your back till you fucked me off
     Outlook on Life : Why get bored - PARTY!     
     Goals : Live for the moment                                       
     Plans : Make friends not enemies and destory the latter               
     Position in Group : H/P                                     
     History of their H/P/A Life:[This information is unavailable at this time]
     Other Nicks : [This information is unavailable at this time]


                               -----------


     Nick : Siggy  
     Location :  Wellington, NZ                          
     Personal Code of Ethics : Pain looks good on other
                               people that what they're for.
     Outlook on Life : Chlor-promazine really sucks.                    
     Goals : To find a brand of dye that doesn't wash out of my hair; 
             To learn to play any other chord but G on the guitar. 
     Plans : To get to work on time today. 
             To figure out how to beat anyone at air hockey. [ED: Cheat??]
     Position in Group : Eon's Technical advisor.                  
     History of their H/P/A Life : "That information is not available"
     Other Nicks : [This information is unavailable at this time]

        [ED: Can we see a patern evolving here?  You think he don't want
             you to know what he has done/who he is? :)] 


                               ------------ 

     Nick : Grasshopper                               
     Location : Wellington, NZ                           
     Personal Code of Ethics : Dont piss people off they will return the 
                               favor than have fun
     Outlook on Life : life is for living and having heaps of fun not a slave
                       to the system
     Goals : To do as little work as possable and get the best result
     Plans : Cause little troubble to people but have fun and to live 
             a fucking long time
     Position in Group : Runs support BBS at the moment                   
     History of their H/P/A Life : Blown to many things up ?        
     Other Nicks : [This information is unavailable at this time]


                                ---------


     Nick : Cardinal                               
     Location : Wellington NZ                       
     Personal Code of Ethics : One goes down.  Not all go down.            
     Outlook on Life : Sucks                    
     Goals : none                              
     Plans : N/A                               
     Position in Group : Coda                  
     History of their H/P/A Life : Was a key member of SLi when we first
                                   started, Speciality - Coading, BBS nuking 
                                   asshole if you piss me off    
     Other Nicks : S-A-M                        
    
                               ----------

     Nick :  Gwythion                              
     Location : Wellington, NZ                           
     Personal Code of Ethics : Putting YOURSELF first. You only have
     x amount of years to get it right.            
     Outlook on Life : Pessimist. But believes anything is possible. 
                       Motto: "Watch your back."
                       Motto2: "Bad to worse, worse to worst."
     Goals : To overshadow Ludwig van Beethoven, and be remembered for it. 
     Plans : To become someone.                              
     Position in Group : Phreak                  
     History of their H/P/A Life : Cant bother typping it         
     Other Nicks : N/A


                               ----------


   So there's an indepth look at the people in SLi.  We have only a few
   members because we only use the best, and my people are that (or close to 
   to it).  They are all friends and comrades.  We fight for freedom, and the 
   right to live how we want.  We fight for information and we fight against 
   corps that think they can control us.... or anyone. 





                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_    Fun with   _/  
                              \_   REDOX   _/     
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



Things to do with Redox Bombs:                                      Thorium

As a follow up to my article in the last mag on "Redoxon Bombs" (a type of
fairly safe pipebomb for those who missed it), here is a number of fun uses
I have put them to:

1)  Exhaust poppers.  The Redoxon Tubes are just the right size to put down
    someones exhaust with some space for the gas to escape.  So, here's a
    fun activity:

Read the article on Potassium Permanginate Starters.  Right, now you know
how to get something to go off when it gets hot.

All you have to do it sit the Redoxon Bomb inside the exhaust tube of your
opponents car, and place a small amount of your "Infinate Time" Pot.
Permanginate mix over the wick.

When you opponents car is going for a while it will go off, and either
scare the hell out of them, or split the exhaust pipe open!

Note - My friends and I tried this on an old car that a mate was taking to
the wreckers, and the bomb split the exhaust, but I think this was only
because it was quite old and rusty.  You may wish to do similar stuff with
bigger bombs, it's up to you.


2)  Bomb Fishing.  The Redoxon Bombs are made of metal and plastic, and
therefore are pretty waterproof, except for the small hole for the wick.

The wick itself is the wick off some old firework, I find those REAL cheap
mini-skyrocket wicks best.  The green wick from most Chinese fireworks will
actually burn underwater.  So, get a length of this wick (About 5cm is in
the mini skyrockets) and use this.

Put vasaline, wax or whatever over the hole.  Now go to your favorite
fishing spot (Ponds in Public Parks are GREAT) and light it and chuck it
in.

BOOM.  SPLASH.  You have just send a huge shockwave through the water.
Like in a depthcharge, the air inside anything underwater is compressed and
expands with the shock, and ruptures weak containers.

Fish have oxygen in their blood, as well as many soft body parts, so after
about 2 minutes, they all start floating to the surface on their backs
(Dead of course).

Now, if you feel like it you can collect your catch, or just wait till some
mother and kid go to feed 'em!  "Mummy, why are all the fish upside down?"

A group of my friends and I got into the local paper with this trick by
doing all the fish ponds in a park in one night.  The article said they
thought it was pollution...  HEHEHEHE...




                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_    [In]Famous     _/ 
                            \_     Quotes    _/  
                              \_           _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



  Here are some MORE quotes from people we have bumped into at some stage:
 

 "You have taught me more this year   -----------------  My Computer Teacher 
 than I have taught you (I think)."                      - He was Cool. 

 Helllp ive fallen down and           -----------------  Brain Dead ? 
 I cant get up 

 "It has been an interesting year.    -----------------  My other Computer 
 I hope you get a positive                               Teacher - He was 
 direction for yourself."                                Weird but Cool 

 "Alcohol and firearms don't mix.     -----------------  Thorium
 They compliment each other!"

 "Fuck....FUCK..........FUCK!!!!"     -----------------  BT and I just found 
                                                         the log of our hacks.

 "Pain looks good on other people;    -----------------  Siggy
 thats what it's for."

 "I wonder if you can get nailed for  -----------------  Thorium
 being 'under the influence' of
 computers..."

 what would john lennon be doing      -----------------  Siggy 
 if her were alife right now??
 Calwing like crazy at the lid of his
 coffin......



                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_     Muzik     _/  
                              \_           _/     
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



How to Rip Off Music Stores - Thorium

Sick of paying $20 for a tape???  Feel like just copying it, but find that
the copy isn't even close in quality?  Try this, but not too often:

Got to your music shop and buy that tape you want.  (You can afford CDs?
well you can afford to pay.)  Since you can't do this too often, it would
be a good idea to buy a double or tripple album and do this to it.  Also,
for reasons that become clear below, make sure you and a friend both want
it.  You each pay half of the cost of the tape and a blank of the same
length - poor quality, of course...

Now buy a blank tape of the same length, and copy side A of your tape.
Wait till the source has fully unwound.  Now cut the destination tape
there.  Undo the destination tape, and chuck out any remaining tape.  Now
open the SOURCE tape, and take it off it's spool, and put it aside.  Open
the spool of the destination tape and attach this to the original tape
end.  Now attach the original spool to the copied tape.  You have now
swapped 1 spool, and cut the copied tape to the correct length.

Record side B and then swap spools as described above.  Now swap the COPIED
tape with ORIGINAL spools into the ORIGINAL case and the ORIGINAL tape
with COPIED spools into the COPIED case.  Do them both up again.

Now take the "original" tape back to the shop as complain that the tape
has a lot of hiss.  The will play it and find that there is, because all
copies have this.  Ask for a replacement copy, which you first "Test" to
see if it is different, which it is.  Take the replacement copy home, and
keep it.  Give the "copy" which is actually the original MEDIA to your
friend, since you did all the hard work.

Don't do this too often because they may catch on.  However it is most
effective if a group of you that all want the same tape pair off and do it
(with a reasonable amount of time between so as not to arouse suspicion).
That way the store thinks it's a semi-dud batch...

Have fun, and half-price tapes!
 


                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_  Aunty Cyntax'Z   _/ 
                            \_  nutty notes  _/  
                              \_           _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



Hey there yet again!  Yup, you guessed it..... time for me to spill my guts
to you all - gotta talk to someone, so it may as well be EVERYONE... ;)
This magazine has been a bit of a rush, but, as per usual, it doesn't take
me long to spill my life story out onto a computer - what is there to say? =)

I don't think I'll include my big 'hi's coz I'll most prolly miss out on some
people, and I wouldn't want that now, would I? =)  Okay... what's happened
lately that's worth talking about... hmm.. not a lot really.. 

Hmm, from word through the grapevine, it appears that Actrix has had a bit 
of a hacker problem as of late.. well, maybe I should rephrase that to,
"Actrix's hacker problem seems to be rising rapidly".. =)  Now, it seems, 
"Mr SysOp" is using 'Crack', or some form of password cracker to check up
on any any accounts which have easily guessable passwords, and take the 
account down until the user telephones him and changes the password to some-
thing less guessable.  Well, that's what I've heard anyway.  

Telecom has been busy over the past few months, and we, SLi, have had a few
run-ins with them - not any which have prompted us to pay any fine, or such,
but they've been interesting.  A few members have had a few MORE run-ins 
than others, but that's a different story.  It seems that Telecom has been
stocking up li'l things they've had the pleasure of finding out - ie. names,
numbers, events.. etc.. - and had only been using those to their advantage 
over the past few months.  One of the main reasons we haven't got around to 
doing much in the phreaking scene (other than carding 'n' stuff) as of late.

They've managed to figure out that there have been a few people trashing 
in their bins over the past year or so, and have supposedly done something
to change that - from what I hear, they've removed the bins altogether...
instead of simply chaining and locking them.  But, then again, I haven't
been there in a while, so I might go find out for m'self.

Wait just a minute... I feel a deep and meaningful thought come on...
Hmm, maybe I should change this to being the 'Gossip Column'... okay.. so
I never said it was important, or intellegent, just deep and meaningful.. =)

Hmm, well, other than all that, there really isn't all that much going on
of any interest.. well, there isn't anything which I can say which wont
get me into loads of trouble, so I guess I'd better signout... =)



/quit Error 0

bash$ logout





                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_      Movies       _/ 
                            \_      to       _/  
                              \_    See    _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



 Here is a list of movies worth seing!

   Tron 
   Max Headroom
   Cherry 2000
   Natural Born Killers
   Sneakers - Comedy ;)
   Hellraiser I,II and III
   Nightmare on Elm Street I-VI
   War Games - Comedy =(
   Blade Runner
   The Omen series
   Fortress
   Meet The Feebles
   


                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_    Fucking    _/  
                              \_  Telco's  _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



 Fucking telcos bust yet another young and innocent man here is a letter
 from the prick trying to nail the guy.


November 16, 1994


Corbin T Volluz, Prosecutor
Skagit County Prosecuting Attorney's Office
Courthouse Annex
605 South 3rd Street
Mount Vernon, WA  98273

Re: [REMOVED]

Mr. [REMOVED]

AT&T respectfully requests your consideration of the following issues
related to the criminal acts committed by [REMOVED].  AT&T and its customers
are among the many victims of [REMOVED].  We have obtained copies of
physical evidence and computer files seized during his arrest.  A
preliminary review of the material has revealed extensive lists of
contraband (e.g. Visa, Master Card, Calling Card account numbers and
associated proprietary customer information) as well as additional
details of unlawful acts committed by [REMOVED].

Considering the sheer volume of material, it may take several weeks to
conduct a thorough examination.  It is anticipated that other victims
and losses will be identified and additional criminal charges filed.
Accurate quantification of losses can only be conducted at the
completion of the review.  A detailed report should be read by Friday,
December 16, 1994.

In the interim, it is critical that no handwritten files, notes,
computer equipment (hardware, software, peripherals, etc...) be returned
to [REMOVED].  The computer was the "weapon" that allowed [REMOVED] to commit
the crime.  Returning any or all of the above-referenced items could be
likened to returning a handgun to a convicted armed robber.  In light of
the damages estimated to be in excess of $40,000 it may be appropirate
to consider [REMOVED] computer assets as partial restitution.

I welcome your comments and suggestions regarding this matter.  Please
call me at [REMOVED].

Respectfully,


Matt Connolly
Investigations Manager

cc:   Doug Liddle, Detective - Anacortes P.D.
      Ron Schag, AT&T Corporate Security



 [Dont that just make you vomit !!!!] 



 Now for more laughter here is a news-paper artical.



                POLICE PULL PLUG ON PHONE SCHEME [FRONT PAGE]

   When scott policeman Edward Pivick and Robert Zimmerman arrived on the
   scene, the trail was still warm and talking.
   Responding to a womans call about voices in the woods near her home, the
   officers discovered 100 feet of cable leading into the woods from an open
   telephone junction box outside her apartment building.
   At the other end of the cable, they found a metal folding chair and a
   phone, chattering with what sounded like four teenagers talking.
   Since that discovery Aug. 6 police and Bell Atlantic security officials
   have been trying to find out who used the illegal tap in to make hours long
   conference calls to people around the United States and the world and bill
   them to Scott residents' private lines.
   In a month or two, participants racked ypu more than 60 hours and
   thousands of dollars worth of calls to New Zealand, Israel, Germany,
   Florida, New Jersey, Texas and Colorado.
   Bell Atlantic workers have sealed and buried the junction box at the
   270-unit Kings Grant Condominiums off Cochran Road and plan to bury another
   one.  The Boxes usually stand about 3 feet above the ground and join
   undergrond phones lines.
   Police have yet to make any arrests.
   "At one point, I heard one of the males say, "The cops came, but I don't
   think they saw me,'" said Povirk, who listened to the Aug. 6 conversation
   for about 20 minutes.
   Povick said he beleives the person who broke into the box and made the
   illegal tap-in ran home after seeing patrolmen in the area.
   Since then, Bell Atlantic and AT&T security officials have been matching
   condominuim residents' phone bills against phone records to try to find
   where the calls went.
   One resident's phone bill last month was more than $4,000.  On it was a
   293 minute call to New Zealand costing $306 and a 110 minute call to Germany
   costing $86.
   So far, only one local number has been identified as a conference call
   participant.  That number is assigned to a residence in Ross that has
   several phone lines and a computer.  No one there has been charged, but the
   calls could constitute a felony because they were valued at more than
   $2,000.
   Stephen Capp, senior investigator for Bell Atlantic Security in
   Pittsburgh, said the investigation would continue.
   "We'll exhaust every possibility.  We're not giving up," Capp said
   yesterday.                            [Ed's Note         ^ra^ ???]
   The Scott case is more sophisticated than most cases of phone service
   theft, Capp said.
   "They opened up the box and used something like alligator clips to clip
   onto the phone [line] itself."
   Capp said all calls were made during the middle of the night, when most
   people are asleep and their phones are not in use.  He said Bell Atlantic
   had received several complaints from people in the Kings Grant Area about
   erroneous phone charges prior to Aug. 6.  He said calls were placed in July
   and possibly June.
   Kevin Montaque of AT&T corporate security in Bridgewater, N.J., said AT&T
   routinely monitors its lines for unusual activity and had picked up
   excessive usuage on at least two Kings Grant residents, including the woman
   who reported the voices.
   Though Capp said no reports of phone fraud had been reported since Aug 6,
   Argall Management Inc., which operates the condominiums, said a resident
   yesterday reported receiving a bill for calls to 900 number sex lines.
   Capp said some of the conference calls could have been to 900 numbers but
   most were not.

  
   [You see fucking telcos just wont learn they think beige boxing is 
    sofistikated <like my spelling???> ]




 Well here is SLi's first night on TV all those years ago <well one and 3/4
 > hope you have a laugh i did ....


 [News Presentor]


 A new computer service in Wellington is causing considrable consern,
 the sevice provides instions on terrisum and sabotage tequneques some of 
 it taken from a book banned by the indecent publications tribunal
 david jamerson reports...


 [Dave]

 This would be the last place many would expect to find advice on terrist
 tequneques but its here , in homes across the country computer operators 
 are talking to eachother via buliten bords they are programs that allow
 users to exchange information and some of the information on this new
 buliten board has computer users here worried scared of reprisals they
 wanted to remain anonimous. 


 [Mike] 

 I could start utilising this information tomorrow if i wish yes so its very 
 serious


 [Dave]

 Well we made a printout of some of the information thats avalible on this 
 buliten board now heres an example of the sort of stuff you can find out 
 for example building a flame thrower umm how to make a working letter bomb 
 firebombs , napalm , matchhead bomb , fuse ignition fire bomb , how to make 
 a phone tap and how to make tear gas the list just goes on and on... 
 How to knock out a phone exchange and an entire citys telephones is even 
 described.


 [Telco Lamer]

 We take active mesures to makesure our network remains intact thats got 
 essintual services like 111 involved patantly safeguarding the integraty
 of our network is inportant. 


 [Dave]

 Much of the information has been lifted from the poormans james bond 
 a home made terrosum type book banned by the indecent publications tribunal 
 But the operators of the buliten board are quite open in shearing the 
 information.. 

 [Mike] 

 Chat .. here we go look were chatting to him.  


 [Dave]

 Infact as we were filming we started talking live to the person who runs the
 service there replies are in yellow they told us how another buliten board
 member had be busted for hacking then boasted that the cops would never 
 catch them.

 David Jamerson one network news.


 [News Presentor]

 Tonight police say there extreemly consurned that this type of information
 is avalible. and the new clasification of films, videos and publications bill
 now before paliment aims to make spreding milicious information by computer
 illegal.

 Comming up .. 

  [Now thats FUNNY !!!]



                        VMB's 

 Well humm hers something that has JUST happened 

     Telco person came knocking on my, and my Girls door's 
     Now eather she didnt want us to see her car or was just finding a park 
     on an empty street but she parks like down the other end of 
     my GF's road and walks to her house BUT shes not home shes at my house 
     so thinking she will kill two phreaks with one talk she comes to my 
     place BUT im not home <well i was but i was in the shower and the GF 
     was listning to muzik> so a little later .. after I call her and shit
     we get talking and WOOOP she SAYS <this is my interprtation and may
     or may not be the way she ment it> you dont roll over on your /P buddies
     we will have no choice but to nail those we know. and they are you and 
     your GF!
     WELL that pissed me off.. now after a bit more of a chat she plays a tape 
     of "me" abusing a VMB but it wasnt me infact it was someone my GF 
     3-wayed. But it sounded kinda like me and fuck i couldnt rember it my
     memories pritty fucked anyway's but after thinking about it. i know it
     WASNT me but they think it was... humm well anyways the moral of this 
     story..  dont 3-way people ??? nahhh lame morle umm fuck its a story 
     ther is no moral... :) ill tell you of the outcome in the next issue :)
   


                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_     Linux     _/  
                              \_           _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



     LINUX: a short and opinionated review.

     Linux is a multitasking, multiuser, unix-like operating system intended
to become POSIX-compliant.  Since most of the technical details are better
left to the FAQ, I'll omit them here.

     Briefly, Linux will run on any common 386 PC or better, having at least
2 MB of memory (the theoretical minimum).  Ports are currently being
developed for several other processors, including the DEC Alpha.  Linux
supports practically any common hardware combination that any other PC OS
would support, excepting particularly machines with an MCA bus.

     Linux was originally written by Linus Torvalds, a computer scientist
from Finland.  It is currently being written by, to quote the FAQ, "a
loosely-knit team of hackers around the net."  Linus has placed his OS under
the GNU Public License, meaning that it can be distributed freely, along with
its source code.

     Linux supports most any software available for any other Unix system; I
personally have and use copies of such programs as emacs-19.5 and gcc 2.6.2,
and the GNU shell, bash.  I am able to run the DOS emulator that has been
developed for Linux, which is more precisely a DOS-machine emulator - you
still have to provide a bootable copy of DOS, though you can run DOS and DOS
programs within a virtualised machine whilst Linux runs alongside.  I have
found the emulator to be quite stable, though at version 0.53 there seems
still much work to be done on it.  Also available is a Windows emulator that
will eventually make it possible to run Windows programs completely
independently from a real copy of Windows.

     Linux has convenient support for other operating systems sharing the
same disk; it can access the files on DOS, OS/2 HPFS (currently read-only),
System V, Minix, among others.  Though Linux can share a disk with another
operating system, it is a complete system in its own right - you do not need
to have any other OS installed on your system at all.  For many months I ran
Linux as the only software on my system, though recently I added a
DOS-partition to run DOS as is occasionally demanded by my job.  For this
there is a multi-boot loader, LILO, which can let you choose an operating
system to boot when you start your computer.

     I have been running Linux for some months now, and I have not missed
any part of DOS - being free of TSR and memory-management hassles alone has
been worth the change.  I often while using other DOS machines have
absent-mindedly tried to switch consoles, and I have become increasingly
frustrated with single-tasking.

     For those wanting the X-windows system, implementations are available,
and most name-brand video cards are supported.  There is an extensive range
of software for communications and networking - fax/modems, network cards -
and most of the paraphernalia demanded by multimedia - CDROM drives,
scanners, sound cards (including the Gravis Ultrasound and the ubiquitous
Sound Blaster family).  I myself use a Hercules video card and monitor, with
which I am more than satisfied, though this point of view is seen a little
extreme by my local computing community.  My machine is a 486DX/40, with 8MB
of RAM, which seems to run Linux admirably.

     From the programmer's perspective, Linux is a wonderful environment to
program in.  Being a "protected-mode" OS, it is quite difficult to crash -
and, in fact, I have never had Linux crash on me in all the months I have
been running it.  Much of the programming I do is in C, and that with quite
heavy pointer algebra; the occasions where I have used a pointer incorrectly
Linux has always shut the program down cleanly.  One of my more recent
projects required writing a background daemon, and the signal and exception
handling made available by Linux was a dream to work with.  My daemon can
handle sensibly most any common situation, and can even help debug pointer
problems in itself.  I have also occasionally used the GNU Pascal compiler,
GPC, and the GNU Pascal-to-C translator to compile some of my earlier work -
the Pascal compiler is reasonably complete, so if your main language isn't C
you won't be stuck without one.

     The games I have on my machine are Linux-ported versions of the Lost
Treasures of Infocom, of which I have a DOS copy.  I was able to obtain the
C source for an Infocom interpreter, and with only a little work on the code
I can now play some of my favourite Zorks and Spellcasters.  For those of
you who think that a repetitive collection of sound and graphics effects
constitutes a game, Doom for Linux and X-windows is provisionally available
and will read DOS Doom's .WAD files.  Purportedly it is possible to play it
over the Internet as well, but I hope most people realise what a waste of
network resources that would be.

     World-wide several hundred-thousand people run Linux as their primary
OS - this number is healthily growing.  With an OS that offers as much as
Linux, with the source as freely available, it is little wonder that it is
enjoying such success.

     Now would be a good time to get rid of DOS and run a sensible OS - I
think your choice of that sensible OS should be Linux.

     - "Siggy."

 [Editors note ! YES !! this OS rox all REAL people should run it !! ]



                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_        New        _/ 
                            \_   Generation  _/  
                              \_ Pipe Bomb _/     
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



The Old Pipe-Bomb - Modernized

The pipe bomb has been the ol' faithful for anarchists since it's
invention.  The main reason for this is that it is EASY to make.

There are, however, two major problems with it:

- People tend to blow their hands off making them
- People tend to get suspicious when you walk into a hardware shop asking
  for 20 endcaps each week...

So, for both of these problems, I have a solution.  It takes a little more
work than making the origional, but as you will see, it can be A LOT more
useful.

The basic idea is two tubes, each with one totally secured end, which can
slide inside eachother.  See diagram.

 V Strong End V
_________________
  |           |
 ||           ||

 ||           ||
 ||           ||
 ||           ||
 ||           ||
 ||           :    <- Hole for wick
 ||           ||
 ||           ||
 ||           ||
 ||           ||
 ||           ||

 ||           ||
 |             |
----------------
 ^ Strong End ^

Right, basically we have the two tubes, which slide inside eachother, this
should be an interference fit (may need oiling even, the tighter the
better).

The two tubes should be of the same length (about 15cm dows well) and quite
thick (I use 3mm steel, however this may be overdoing it).  The bases
should be welded on the ends REALLY TIGHT, and make sure it's a REALLY GOOD
weld.  If these come undone you won't have a bomb, and they have to be
stronger than the sheer required to break high tensile steel.  A local
engineering firm will be able to do this for you as long as you don't say
what you're gonna use them for.
                                                                         
Have a large plate as the end of at least the outside tube, see why later.
                                                                         
Now that you have the two tubes made, place them together, but not quite
all the way together (leave about 5mm or so each end, excluding the weld).
Now get a drill press and place a hole about 5-8mm diameter through both
sides.  MAKE SURE THEY ARE HELD REALLY WELL otherwise they might slip off a
straight line, which destroys your bomb...

PS - it is slightly stronger if the two holes are at 90 degrees to each
other, ie:

End on view:
   ____
  /    \
 /  I   \
 | _I__ | _/ Drill one here
 |  I   |  \ 
 \  I   /
  \____/

    ^ and one through here.

You should be able to fit a piece of high tensile rod (which you bought
earlier, right?) through each hole, and sticking about 1cm out each side.
With these in you can't pull your two ends apart.  Can you guess how it
works yet?

Now, with these together, drill a very small (1mm or less) diameter through
the middle, at 45 degrees to each of your rods (in the center).  This only
goes through one side.  Now take this to bits, and on the outside one drill
this same hole with a larger bit (about 5mm) - this is so when you put it
together there is some room for slip.  This hole is for the wick.

Now drill a small hole in the corner of each base that is sticking out.
This is just to attach some wire to keep hold of it when she blows.

Ok, now to actually make the bomb.


Use your favorite low explosive (I use the "Sweet Powder" from the last
issue) and fill some sort of plastic bag that will fit inside the center
tube.  A condom works well.  Seal the end of it (to stop getting powder
everywhere) then put this to the side.  Low explosive is one that expands
"slowly" like gunpowder, as opposed to something like C4 which goes all at
once.

Put a pin in the bottom hole of the inside tube, then a small ball of paper
on top of that.  Then put your bag of explosive in, and then enough paper
balls in to fill it to the bottom of the top pin hole.  Take out the bottom
pin with the tube on it's side (so the paper don't fall down and block the
hole).


Now put the two tubes together slide in your high tensile pins, and you
almost have a bomb.  You may wish to stick these pins against the side of
the case with tape or sommit, so they don't drop out if you made it too
loose.

When you are ready for action (because you have the explosive inside a
fairly waterproof bag this can be a fair while later) you puncture the bag
through the small wick hole, then insert your wick.  Place the bomb with
the ends pointing in "safe" directions, light the wick and run like hell.

The explosive expands, putting pressure on all sides and ends.  Because the
sides of the tubes are double thickness, it will take a fuck of a lot of
pressure to break these, so all the presure is really trying to force the
ends open.  This is why you neded such good welding on the ends.  What
happens is that the pins will eventually get so much pressure between these
layers of steel that they will be sliced appart like string cut with
scisors, and the ends will fly appart with much speed.

If you look at the remaining bits of steel from the pins, you will see how
cleanly they are cut.  If this makes a little more bang than you want, you
could use brass or copper rod, which will slice easier.


Right, we not have a bomb that required no direct friction on the powder
(99% of the cause for losing ones hands with conventional pipe bombs) and
if you can find them, the ends are totally reusable.  Don't bother trying
to tie them to anything yet to keep hold of them - it will just break.

The only "Combustable" appart from your explosive are these lengths of high
tensile steel - and noone will ask questions about that.


Creative uses for the new modem pipe bomb:

You will realise that for the bomb to actually release pressure, not only
does it have to slice two pins, but the ends have to come appart.  This
means almost twice it's length.  The blast will be all against these ends.
This is VERY USEFUL.

1) - Have both tubes with fairly small ends, and place inside letterboxes -
     the sides are both knocked out totally, leaving little evidence!

2) - Have both tubes with large flat ends, and place this under a car
     chassis.  I have done this on a firends farm with an old car body, not
     a real car.  As long as you have it fairly well up under the chassis
     when it goes off the car lifts about 30cm in the air - a LONG way if
     you were in it.  I havent got up the guts (or would that be stupidity)
     to actually sit in it while this happens, but I think it may be very
     unhealthy for occupants.

3) - Have both tubes with large flat ends, with holes drilled in the
     corner.  Attach about 6 - 10 meters of heavy fishing line to each,
     then take your bomb down to the port, light and chuck it in.  Silence.
     The whole warf shakes though!  (Water dissipates the shock since it
     goes off about 6m down, so you can't hear it.)  About 2 secs later a
     large ball of gas reaches the surface (what actually did the work) and
     about 2 more seconds later a whole bunch of dead fish start floating
     to the surface in about a 4 meter radius of your bomb!

     The reason your parts didn't fly off the line and you can pull them
     back up is that water is much more dense than air, and the large flat
     ends create a lot of friction in the water.

     You may find that you have to get waterproof wick for this (I use
     normal wick with petrolium jelly on it).  The bag for the explosive
     should be well sealed, and I find pouring liquid petrolium jelly over
     the whole thing leads to far lower failure rates.

4) - Armor piercing bullets.  You have the outside tube with a large flat
     end, and the inside tube with a small end with a steel ball beering
     about 1cm diameter welded on (TIGHT).  You could go for pointy ends
     and that sord of thing, but in my expreience they just blunten after a
     few uses anyway.  Now put the base agains something large, like a
     tree, and aim at your target.  Again, I did this (Many times - it's
     real fun) at my friend's farm with this old car body.  The inside tube
     went STRAIGHT THROUGH 2 layers of sheet steel on one side door, and
     hit the other side door, breaking the first sheet of steel and denting
     the other side about 10cm out! - With more improvement or stronger or
     bigger pins, it may be able to go all the way through.  However this
     is not a particularly suttle way of doing someone's car, however fun,
     so I wouldn't advise it.


     IF IT DON'T GO OFF, WAIT AT LEAST 2 MINUTES BEFORE APPROACHING, AND IF
     IT'S ON LAND, APPROACH FROM THE SIDE.



                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_     Official      _/ 
                            \_     SLi       _/  
                              \_  Members  _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.
                


 Okay, as of late, I've discovered that there seems to be a lack of con-
 fidence over who exactly is a part of Southern Lights inc.  At no point 
 has there been a total recount over who exactly exists in the group and 
 I thought I'd go about finding out for myself - even though I'm a co-
 chaiperson (I guess that's what I could be called... ;) ..

 I decided to come up with an idea (which was wholly supported by Eon,
 so I guess it must be okay.. =) ) of how to figure out who is definatly
 in SLi and who isn't...

 Firstly, I'd like to go about listing the current members as of 
 December, 1994.


 Founding Members:
 Eon and BT 

 Chairpersons:
 Eon, CyntaxEra, BT

 Original Logo Designed by:
 C.F.   <no longer an SLi member>
 
 Eon's Personal Advisor:
 BT

 Eon's Technical Advisor:
 Siggy 
 
 Other Members:
 Cardinal, Thorium [Forgotten Memory], Digital Omega, Grasshopper 
 Gwythion

 At present, that's about all I'm comfortable in saying are part of SLi -
 seeming that we're all still a bit unsure as to who's in and who's not..

 We've decided upon asking for new, fresh blood of all you H/P/A guys/gals
 reading this mag - you've got to pass standards tho' so only the best need
 apply =) ... If you're interested, just send the attatched form below
 with a SASE (Self Addressed Stamped Envelope) to:


        Southern Lights inc.
        PO Box 3030
        Onekawa
        Napier
        New Zealand


For information on SLi, send any questions you may have to any of the
following e-mail addresses (or if you do not currently have an e-mail
address, send your queries to the previously mentioned snail mail ad-
dress ).


 HACKER_M@ix.wcc.govt.nz     - Eon
 TELCO_T@ix.wcc.govt.nz      - CyntaxEra
 rad@trad.pc.cc.cmu.edu      - Eon   
 jbolger@govthouse.govt.nz   - Yeah, right!



----------------------------------------------------->8------------------
                     CUT                   HERE


               Southern Lights inc. Application Form



 PART ONE:   Major Statistics


 Nick and/or Name: ...............................................

 Age: ......    Sex: .........   Occupation: .....................  

 References: .....................................................

 .................................................................

 Major Interests (ie. hacking, phreaking...): ....................

 .................................................................

 Systems Familiar With: ..........................................

 .................................................................

 Hacking/Phreaking groups you have been involved with: 

 .................................................................

 .................................................................

 

  PART TWO:  Questionnaire

 Please answer the following questions without use of any files, manuals
 or any other forms of information which is not contained as information
 already know by yourself. SOME questions are ment to be answered wrong 

                               

Q1.   The Legion of Doom was...

      a. A hacking group
      b. A phreaking group
      c. All of the above
      d. A takeaway store

Q2.   The UNIX command "su" is used to...

      a. delete users
      b. change to a user 
      c. snoop on a user
      d. none of the above

Q3.   TNO stands for...

      a. The New Order
      b. Telix Network Organisation
      c. Teletype Network Operations
      d. Two New Organisations

Q4.   Novell is...

      a. A badly spelt book
      b. A network package
      c. A type of RAM
      d. A program used to hack UNIX passwords

Q5.   A PABX is...

      a. a telephone
      b. an exchange system
      c. a computer system DataBank uses
      d. non-existant

Q6.   What is a Mercury Delay Line?


      .............................................................


Q7.   What are the standard C5 Blue Box trunking tones and lengths?


      .............................................................


Q8.   List five different Operating Systems


      .............................................................
     
      .............................................................
     
      .............................................................

Q9.   What does SLi stand for?  (DO NOT LOOK THIS UP)


      .............................................................


Q10.  Explain your personal morals on hacking/phreaking


      .............................................................

      .............................................................

      .............................................................

      .............................................................

      .............................................................

      .............................................................

      .............................................................


 
  PART THREE: Your Views


      What will you plan to do if you are accepted into SLi?


      .............................................................

      .............................................................

      .............................................................

      .............................................................

      .............................................................

      .............................................................



      What do you think being an SLi member involves?


      .............................................................

      .............................................................

      .............................................................

      .............................................................

      .............................................................



      What improvements would you make on the group which you think
      should be made?

      
      ............................................................. 

      .............................................................

      .............................................................

      .............................................................

      .............................................................


  PART FOUR: Contact


 Please fill in appropriatly to how you would like to be contacted:
                             

 E-Mail ..........................................................
 
 VMB .............................................................

 Phone Number ....................................................

 BBS [Number] ....................................................

     [Contact Name] ..............................................

 IRC Nick ........................................................

 Snail Mail (Seperate with commas) ...............................

 .................................................................

 .................................................................

 Other (Please Specify): .........................................



  Signature: .............................................



----------------------------------------->8---------------------------------

      

                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_ Flame Thrower _/  
                              \_           _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.

          

 Ok umm how to build a few 


 Easy:

     Get a fly spray can and a lighter hold lighter infront of spray 
     and light liquid comming out of can. 

 Better:

     Get one of them charge bottles fill it with petrol 
     get a glass <or metal> tube block one end put string down the tube 
     fill the tube with petrol tape tube to charge bottle so the flame from 
     the tube is a cm or so infornt of the nozle bit on the charge bottle 
     pull triger and boom flamez !!! 


 The best! :

     Get a water blaster <makesure its a good one with no rubber seals 
     get 40 gal brumb and fill it with petrol get one of those electric
     gass lighter things and connect it to the triger of the water blaster 
     put hose from water blaster into 40 gal drumb and pull trigger 
 
  what happens:
         Water blaster sucks up petrol fires it out the eletric igniter 
         ignites the fuel and a VERY big LONG flame shoots out towards 
         what ever you were pointing at. be warned its dangerous 

                

                                     _
                                   _/ \_
                                 _/     \_  
                             ___/  S L i  \___
                         ___/_________________\___
                        \_                       _/ 
                          \_                   _/ 
                            \_ Editors Knotez_/  
                              \_           _/  
                                \_       _/    
                                  \_   _/  
                                    \_/
   
                              Southern Lights
                                    inc.



  Well Hello AGAIN !! 
  I hope your having a good X-MAS !! 
  Humm well ive had an eventfull few months the cops cameover and nearly 
  Busted me :( nothing to do with H/P/A tho :) 

  All product name are trademarks of there respective compinies
 
  Shit dont you hate writers block. its no that you cant write anything 
  just what you write sounds so stupid !!! :) 

  We have been putting HOURS of work in to this mag <well umm a FEW > 

  Hummm ohh its 6:30 in the morning how elite 

  Oh here is our Snail mail adress again

  SLi 
  PO-BOX 3030
  Onekawa 
  Napier
  New Zealand

 
   Send comments, articals , questions to the above or on the internet 
   Hacker_m@ix.wcc.govt.nz 

   If you send a legal sized SASE I will attempt to send you the next
   SLi issue or atleast inform you when its been releced 
   oh if ya send a 720 k 3 1/2 inch disk with that SASE ill send you 
   all the SLi mags and a few misc files if you tell me what Computer/OS 
   you have  <only Amiga / IBM compat / Mac garenteed tho but we will 
   try to find a way of getting you the info>

 Why is there a binana skin in my room ? hummm Weird 

 Fuck there a a LOT of computer bits in here anyone want a fullheight 
  10 meg MFM drive ? its QUIET <HONEST!!> 

  PGP : humm well if you wanna know what i think ... GET it 
 DONT use 2.6 > rsa lib cause the us-govt has indorced it... ie .
 fucked with it so they can break it !! use 2.3 OR get get PGP 2.6 UI
 its x compatable   <the little x means CROSS fool> ...  UI might be only
 amiga tho so go look round but if you can USE 2.3 its SAFE !! 

 Well here we go its time to say bye ! well take care all and have a good 
 X-Mas and new year and dont get to pissed Stoned or anything else ! 
 Above all have fun and watch your back. 
 Ill be seing you around march april or so thats the date for our next relece 


                                                      
   Eon.





















                        May we live our lives with pride.
                        May we face our death with dignity.