💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › TSR › synd27a.txt captured on 2022-06-12 at 14:50:53.

View Raw

More Information

-=-=-=-=-=-=-

  ____________________________________________________________________________
  ____________________________________________________________________________

                              THE SYNDICATE REPORT

                         Information Transmittal No. 27
                                 (Part 1 of 2)

                           Released January 18, 1990
                                   Featuring:
                ________________________________________________

                                 Editor's Note
                    "The World Around Us, Closing Out 1989"

                         NEW: Telenet PCP Thief Hacker
                        "Programmed by Brew Associates"

                                Dubbing Viruses

                           "Safe" Government Software

                Poking Around Prodigy (IBM/Sears Joint Venture)

                           A Neuromancer Sharp Exert

                          Brief Notes from the Report

                                Vocabulary Tonic
                ________________________________________________

                                 by The Sensei
                        Editor Syndicate Report Magazine

  ____________________________________________________________________________
  ____________________________________________________________________________

EXPOSITION:                                                                TSR

   Once again, The Report accepts outside sources.  Anybody can write/provide
   information to The Syndicate Report.  Articles/Information may be provided
   through  NANOTECH COLLUSION  Bulletin Board System @612-476-4913. Any info
   such as Busts, Phreaking,  Hacking, Data / Telecommunications, and all new
   developments on any the previous mentioned specialties will be:  accepted,
   labeled, and given full  actual credit to the article/info provider(s), or
   writer(s). --

   ** All articles have been presented by me unless shown at the end of the
   article as the information provider(s), or writer(s). **
  ____________________________________________________________________________
  ____________________________________________________________________________

EDITOR'S NOTE:                                                            TSR

                    "The World Around Us, Closing Out 1989"

   Wow!  What a year:  1989.  Look at all that has happened!  I'm speaking
about underground and in reality.   Here's a recap:

Underground / Reality:

Internet Worm                                Panama Invasion by U.S.
Intro of many new hacking utilities          Jacob Wetterling Kidnapping
    PCP Thief                                California Earthquake
    Phry Code Pro                            Hurricane Hugo
    Falken Phreak Tools
    New version of Code Thief
    A NEW VMB Hacker?
Media's Virus Scare                          FREEDOM FOR:
Code Thief is mentioned on T.V.                E. Germany
                                               Czechs!
                                               Poland
                                               Romanians
                                               Hungry

                                             OTHERS:
                                               A struggling U.S.S.R.
                                               The Irish Rebels
                                               & of course the bloody failure
                                               by the Chinese Students.
                                               Alaskian Oil Spill

                                             AT&T's first profit loss,
                                             ...AND MORE!

       Just as 1989 was about the close quietly, the United States strikes
against the Noriegian Regime -- it's now dead.  It's incredible that all of us
are currently witnessing history.  You know about history, don't ya?  Sure you
do.  Remember sitting in class wondering what it would be like to live
during a time of absolute CHANGE.  --And mostly for the better.

    This issue is dedicated to 1989.  May the 1990s reveal more.


;The Sensei / TSR Editor
  ____________________________________________________________________________
  ____________________________________________________________________________

NEW: TELENET PCP THIEF HACKER                                            TSR
"Programed by Brew Associates"

         Computer hacking utilities.  They all start out with one single
purpose:  To Gain Information.  Isn't information gathering the basis for
hacks?  What I mean is that basic hackers do menial jobs for hacks.  A hack
uses that information (code/password, etc) to gain more information.  It all
seems very irrelevant.
         Now I come back to earth, and remember we all are human beings.

         The under terra firma personality:  Brew Associates has done it again,
with the swiftness of a prowler, he has created PC Pursuit Thief.  The
Exciter's long rein at the top of PCP Hacker's has come to a halt.  The end of
perfection for Code Thief has prompted him to go onto a more comfortable stall
via PCP Telenet.  PCP Thief has the same similar style for with windows and
everything.
         AND, I agree totally.  Straight code abusing from your own home is
crazy.  Dialing PCP shows little threat to hack/phreakdom.

         I and Professor Falken has been Beta testing future releases of PCP
Thief.  The first BETA version quicken returned to the drawing board.  The
second was just about finished except some minor detail.  After that, fancy
features were added to as savor.

                                 PCP Thief v1.0
                                   Features:

                                 Public Access
                              Command Line Hacking
                             Timed Hacking from DOS
                               Full Modem Support
                          Alterable Pass/ID Templates
                             Generic Terminal Mode
                             Variable Speed Hacking
                            Full New Version Support
                         Online "Passes Found" Listing
                        Fancy colorful/rotating Windows
                             Online Credits Listing
                     Voluminous Descriptive Hacking Windows
          Complete Documentation Included / Online Questions Answered

                          ...And Best of All BUG FREE!


Questions, comments, threats, or compliments can be directed towards Brew
Associates, Phortune 500, via Nanotech Collusion BBS.

               :::: Information Provided by Brew Associates ::::
    :::: Brew Associates is contributing Programmer of PCP / Code Thief ::::
  ____________________________________________________________________________
  ____________________________________________________________________________

DUBBING VIRUSES:

       I've gathered some more information about viruses.  Mainly what's I've
done is gathered the names and what they dreadfully do to your unsuspecting
systems.   If you have anything to add, dial Nanotech Collusion.

                                                         -- LEGEND --

                                                          * = Freshly Added

  ::::::::::::::::::::::::::::::::  VIRUSES  :::::::::::::::::::::::::::::::::

                         :::: IBM PCs/COMPATIBLES ::::

   1.  The Friday the 13th Virus/Jerusalem:  Reek havoc on COM and EXE files.
   2.  Datacrime Virus / Columbus Day Virus (1280/1168):  Destroys FAT Table
   3.  Jerusalem Virus
   4.  The Cascade Virus:  Falling Letters jumbled to bottom of screen.
   5.  The Pakistani Brain
   6.  1701 Virus
   7.  Icelandic Virus


                           :::: EUROPEAN -- VIRUSES ::::


  5.  Datacrime-2:  Destroys FAT


                              :::: MACINTOSH ::::

  1.   Macmag Virus:  The WISH FOR PEACE Virus
  2.   Scores Virus:  Attacks prgs within Elec. Data Systems Corp.



                               :::: APPLE II ::::

 *1.   CyberAids
 *2.   Festering Hate:  Infects .SYSTEM, or BASIC.SYSTEM in root directory.
                        All Volumes/HDs/Ram Disks destroyed.
 *3.   Load Runner:  A european virus found in a copy program: Speedy Smith.
              Also by booting an uninfected disk after running an infected
              disk.  RAM Resident, maybe?

                                :::: AMIGA ::::

 *1.   Phantasumble
 *2.   IRQ:  Deadly, but curable.
 *3.   Byte Warriro:  Causes read/write errors, GURUs
 *4.   16 BIT

  :::::::::::::::::::::::::::::::::  WORMS  ::::::::::::::::::::::::::::::::::

                         For All/Other Computer Systems

  1.   Internet Worm.  M.J.'s babe.
  2.   WORMS Against Nuclear Killers: "WANK."
                ________________________________________________

       Any additions can be made via Nanotech Collusion BBS, via Feedback, or
personal Email for privacy.

;The Sensei
  ____________________________________________________________________________
  ____________________________________________________________________________

"SAFE" GOVERNMENT SOFTWARE:                                         TSR


       As early as 1967, the Department of Defense formed a task force to set
security standards for computers, operating systems, and networks.  The goal:
to define the criteria for "trusted" systems that could be relied upon to
police themselves and their users and prevent sensitive information from
getting into the wrong hands.  After more than a decade of research, their
efforts were compiled in the "DEPARTMENT OF DEFENSE TRUSTED SYSTEM EVALUATION
CRITERIA" --known as "THE ORANGE BOOK" because of its orange cover.

       The Orange Book specifies four levels, or divisions, of protection,
designated (in order of increasing security) D, C, B, and A.  Systems in
Division A systems must be mathematically proven to be secure (a requirement
that's barely within reach of any commercial computer OS).  The control
objectives for each level are divided into three categories:  security policy,
accountability, and assurance.

  ()  Mandatory Policy =  Admin. grants users access to specific data -- and
                          that such data ONLY.  A user has access to data for a
                          good reason.  1, that person has proper clearance;
                          and 2, the person has a need to know the information
                          for his/her job.  A user with this access can grant
                          other such access.

  ()  Accountability   =  Makes sure that users are accountable for their
                          actions.  There are 3 requirements to ensure
                          this accountability.  First, the user has to ID
                          her/his self to the system.  Second, a password
                          is then required.  And third, a user's actions
                          must leave an audit trial so that admins. can find
                          out "who dunnit" if information is abused.

  ()  Assurance Policy =  Requires that the system be designed, tested, and
                          verified so as to make sure that first two object-
                          ives are met.  There must be a high degree of
                          confidence that the system's security mechanisms
                          can't be circumvented by bright "hackers" or
                          knowledgeable users.  The Orange Book emphasized that
                          the assurance process doesn't end when the system is
                          shipped or installed; every system modification and
                          every new feature that's added needs to be checked
                          for security breaches.  Only then, can the system be
                          TRUSTED.

  ***  TO BE CONTINUED:
                        Part Two Will Explain the FOUR LEVELS of PROTECTION.


;The Sensei / TSR Editor

  ____________________________________________________________________________
  ____________________________________________________________________________

POKING AROUND PRODIGY (IBM/Sears Joint Venture):                     TSR (t.s)

       I got my first bill for Prodigy this month, after three spine tingling
FREE months on-line Prodigy.  9.95$ just as they said it would be.  I don't
even remember if that was before or after Minnesota 6% sales tax.

    IMPRESSED WITH?  I'm impressed with the amount of attention they are giving
Prodigy.  I've received many newsletters, about 5 or 6 just in one month.  The
letters explain all the new enhancements online -- easily accessible with their
(J)ump words -- a very decent idea.  I'm also impressed with the on-line
technical help, both via 1-800 and HELP99A (Mailbox Address).  The technical
help via HELP99A isn't real bright, but they do offer some good basic
hints/information, and best of all -- they've always responded.  I've ask them
about the CGA color, and if a new version of the Prodigy terminal software were
coming out to support mice, etc.  They explained both very completely.  A new
version is expected in Spring, maybe February.   And lastly, this month, I'm
impressed with the amount of people are accepting Prodigy.  I get quite a bit
of feedback about Prodigy from users, and most don't even mention the slowness
and generic look....probably because most are generic users.

    One last word about updates.  Your Prodigy software is actually updated
right under you nose.  How? You say?  Well, each time you log into Prodigy, it
uploads updated modification directly to your harddrive/floppies.  It stores
the updated information in a file by the name of STAGE.DAT.  So if you see this
things fluctuating in size/date -- you know what's it doing.  What's the
current level of modification?  There are two numbers that tell you.  One is on
the label of the Prodigy Software installation disks (v2.1) in the lower right
hand corner.  There's another number in the lower right corner of the logon
screen.  It refers to an internal system Prodigy uses to denote changes and
modifications, many of which are minor and incremental.  That number should be:
6.03.xx (The 'xx' will be a number, but that number doesn't matter as much as
the 6.03).

    NO IMPRESSION LEFT:  The service is good, but I didn't pay for it.  There
has to be more information online that interests me.  More
political/social/telcom information and news.  Number two, the speed HAS to
increase.  Sometimes I don't have access to a 2400 baud modem, and I'm caught
using 1200 bps.   There is a huge difference!  Time is money these days, and
Prodigy isn't delivering me my moneys worth (even though it's only 9.95/month).
    And of course those annoying ONLINE error codes:  CM, DM, API, OMCM, to
name a few.  Here's a run down on them...

    CM:  Problem detected by comm. module which controls the flow of
         information between your PC, modem, the fone lines and computer you
         call when you logon the service.  Usually you'll see CM4, 5 or 6.  The
         type of error can be caused by local connections, or you may be
         logging into the service during the off hours.  Just reconnect to
         Prodigy...it usually clears the air.

   API:  Indicates a problem in a particular usage on the service -- the one
         you were just using.  Problems like this are usually only momentary,
         in time, and self correct.  API 8 or API 15 imply that the PC isn't
         getting enough memory to Prodigy.  Check & clear resident programs.

    DM:  The scene module shows this code when there's not enough PC memory
         available.  You can boot your system and logon again.  Make sure you
         have at least 512 ram.  Nothing resident.  Make a self-booting disk if
         you have to accommodate.

  OMCM:  This code is narrative jointly by two different modules/scenes.
         This is what happens:  Every message (i.e. assortment of info) Prodigy
         sends to your PC has two parts; the message contents, and special
         info. Prodigy's software uses to make sure the message itself is
         error-free.  If there is errors, you get an OMCM code.  OMCM6 is a
         version of this code that means you're not using the most recent
         version of Prodigy -- version 2.1.  If you don't, dial 800-767-3664
         for you'll receive it free of charge.  OMCM9 indicates a poor
         transmission, once again, or line quality.  Also, your message
         expected by your system was not received.  Rather than have you wait
         for a message that isn't coming (and thereby tie you up), Prodigy
         sends this error code.  You might as well relog in.

      If you don't have the latest version of Prodigy, dial 1-800-356-3664 and
you'll receive the updated version in the mail.

               (Information provided via experience with Prodigy)
       (Prodigy Services Co., 445 Hamilton Ave., White Plains, NY, 10601)


;The Sensei / TSR Editor 1990

  ____________________________________________________________________________
  ____________________________________________________________________________

A NEUROMANCER SHARP EXERT:

                         Case was 24.  At 22, he'd been a cowboy,
              a rustler, one of the best in the Sprawl.  He'd
              been trained by the best, by McCoy Pauley and Bobby
              Quine, legends in the biz.  He'd operated on an
              almost permanent adrenaline high, a by product of
              youth and proficiency, jacked into a custom
              cyberspace deck that projected his disembodied
              consciousness into the consensual hallucination
              that was the matrix.  A thief, he'd worked for
              other, wealthier thieves, employers who provided
              the exotic software required to penetrate the
              bright walls of corporate systems, opening windows
              into rich fields of data.

                                 $$$$$$$

                                 Case's virus had bored a window
              through the library's command ice..  He punched
              himself through and found an infinite blue space
              ranged with color-coded spheres strung on a tight
              grid of pale blue neon.  In the nonspace of the
              matrix, the interior of a given data construct
              possessed unlimited subjective dimension.  He began
              to glide through the spheres as if he were on
              invisible tracks.

                     Here, this one.
                     Punching his way into the sphere, chill blue
                     neon vault above him starless and smooth as
                     frosted glass, he triggered a subprogram
                     that effected certain alterations in the
                     core custodial commands.

                                 Out now.  Reversing smoothly,
              the virus reknitting the fabric of the window.
                                 DONE.

                         :::: From William Gibson ::::
                     :::: Author of Neuromancer, 1984 ::::
  ____________________________________________________________________________
  ____________________________________________________________________________

  ::::::::::::::::::::::: SYNDICATE REPORT BRIEF NOTES :::::::::::::::::::::::

// AT&T Announces Cutts //

   AT&T said it will drop about 8,500 positions in 1990, adding to the 25,000
jobs expected to be eliminated in 1989. AT&T had 298,000 employees at the end
of September. Automated switching technology has allowed AT&T to cut down on
operators. Also, many employees who install phone equipment are being phased
out as the company goes to high-tech digital equipment.
                ________________________________________________

// Sprint, Bell Make Agreement //

   Pacific Bell and US Sprint Monday announced an agreement to develop and
market complementary 800 services. Why: To simplify the ordering, billing and
trouble reporting of 800 services in California. Terms: The companies will make
their 800 services available through a single call to either Pacific Bell or US
Sprint.
                ________________________________________________

// Firm Provides Networking ISDN //

   General DataComm will fulfill an order for the world's first installation of
a multiplexer network. Use: With ISDN services to provide a virtual private
network using Telecom Australia's ISDN offering called "Macrolink." Customer:
Not named until the end of the first quarter of 1990, when the ISDN network is
installed and operational.

  ____________________________________________________________________________
  ___________________________________________________________________________

  ::::::::::::::::::::::::::: TSR Vocabulary Tonic ::::::::::::::::::::::::::

     What "Vocab. Tonic" is, is a list of acronyms and definitions to help
educate the ignorant hacker.  With an extensive vocabulary, there is virtually
nothing one can't learn.  Study on...

Bit Stream:  Refers to a continuous series of bits being transmitted on a
             transmission line.

CCSS:        (Common Channel Signaling System) A systems whereby all signalling
             for a number of voice paths in carried over one common channle,
             instead of within each individual channel.

DTMF:        (Dual Tone Multi-Frequency) The keys on any standard tone fone.

EE Signal:   (End-to-End Signaling) A mode of network operation in which the
             originating central office (or station) retains control and
             signals directly to each CO (Central Office) as trunks are added
             to the connection.

PRIMOS:      This is an operating system on the Prime Supermini and mainframe
             computer systems.

TSPS:        (Traffic Service Postal System) Dial '0' Operator.

  ____________________________________________________________________________
  ____________________________________________________________________________

  :::::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::::::

              "Computing with anti-radioactive glasses....
                             will be the wave of the coming..."

                                                     -Tech E. Teddy

  ____________________________________________________________________________
  ____________________________________________________________________________

  TSR will accept additional sponsor/support Systems.  If you have a certain
  interest in the Report, and wish to provide support to TSR -- Leave your BBS
  number -- and any other information on  Nanotech Collusion  Bulletin Board
  Systems.
  ____________________________________________________________________________
  ____________________________________________________________________________

                      N A N O T E C H   C O L L U S I O N
                            6 1 2 - 4 7 6 - 4 9 1 3

                        - The Syndicate Report Support -
                           - Bulletin Board System -
      - Accommodating 19.2k bps, Over 130+ Megs, P/H Msg Bases, & Files -
  ____________________________________________________________________________
  ____________________________________________________________________________

                     This concludes this Transmittal No. 27
                                 (Part 1 of 2)

                          Released January 18th, 1990

                                 by The Sensei
                         Editor of The Syndicate Report
  ____________________________________________________________________________
  ____________________________________________________________________________