💾 Archived View for gemini.spam.works › mirrors › textfiles › groups › DAMAGEINC › damage.006 captured on 2023-01-29 at 15:01:04.
⬅️ Previous capture (2020-11-01)
-=-=-=-=-=-=-
??????? ?????? ????????? ?????? ??????? ??????? ???????????????? ??????? ??????? ??????? ????????? ??????? ???? ????? ??????????? ????????????? ??????? ??????????????????????????????????????????????????????? ?? ??? ????? ????????????? ?????? ?????????? ??????????????????? ????????? ????????????? "The name speaks for itself!" ?? Presents the Damage, INC. Newsletter February 1998 Issue #6. "Freedom is not Free." ??????????????????????????????????????????????????????????????????????????????? C O N T E N T S : ? INTRODUCTION - An Introduction to the Damage, INC. Newsletter. ? BIG BROTHER BASHING - Big Brother wants our DNA. ? Search String: {BIG BROTHER} ? BLACKENED'S TIP OF THE MONTH - Tips for newbies on how to enter the h/p scene. ? Search String: {BLACKENED} ? CONSPIRACIES AND COVERUPS - ? Search String: {COVERUPS} ? CORRUPTION AND GREED - Forcing an old dog to learn new tricks. ? Search String: {GREED} ? H/P INFORMATION AND NEWS - An Introduction to VMBs. ? Search String: {NEWS} ? INTERVIEWS AND INTERROGATIONS - Fatal Vision's interrogation of Highlord. ? Search String: {INTERVIEWS} ? LETTERS TO THE EDITOR - More feedback about the Damage, INC. Newsletter. ? Search String: {LETTERS} ? OBJECTIVE OPINIONS - Calling the kettle black. ? Search String: {OPINIONS} ? REPORTS FROM THE FRONT - Big Brother's watching, hearing told. ? Search String: {REPORTS} ? SOURCE AND SCRIPTS - Rename Directory Utility assembly source code. ? Search String: {SOURCE} ? THE JOURNALIST'S TOP TEN LIST - New movements within the industry. ? Search String: {TOP TEN} ? THOUGHTS, POEMS AND CREATIVE WRITING - Creative Thoughts by The Journalist. ? Search String: {WRITING} ? CLOSING COMMENTS - BLACKENED's Intense Closing Comments. ? Search String: {CLOSING} ??????????????????????????????????????????????????????????????????????????????? INTRODUCTION: Freedom is not free. We are in search of truth and freedom. The truth is out there. Damage, INC. intends to find it and share our findings with you. As the new millennium rapidly approaches, many controversial topics are being brought to the forefront. The Damage, INC. Newsletter will openly discuss topics such as Cloning, the Apocalypse, the New World Order etc. We will voice our opinions strongly and keep you informed about the major events that occur. My own prediction is that in the new era, an information explosion is inevitable. We are literally entering a Brave New World, in which there will be many great changes. In order to be prepared, you must first become informed. The word "ignorance" is derived from the word "ignore". To blindly ignore the changes that are going to take place would be ignorant. If you wish to perceive that as being a warning, so be it. Privacy is also a very important issue. Big Brother is running rampant and gaining strength. They seek control and yet cannot control themselves. They're already too powerful in my opinion. However, Big Brother can be stopped. Information can be used against them and dedicated freedom fighters can still attack them with intelligence. Bashing Big Brother and revealing their corrupt ways is one of the most satisfying endeavours for me. I enjoy revealing their ways and teaching people how to be anonymous and retain their privacy. That's especially important during these twisted times, when private is considered to be public information. Of course, the result is that Big Brother is thriving and loving every fucking minute of it. The main message that I want to convey in this February issue of the Damage, INC. Newsletter is that freedom is not free. Freedom isn't just given, it has to be fought for. Free your mind and your body will follow. This world can use more free thinkers. BIG BROTHER BASHING - {BIG BROTHER} Big Brother wants our DNA. To Big Brother, DNA (deoxyribonucleic acid) is much more than a scientific wonder, the beginning of all life on Earth... it is one more step towards total control. When Big Brother obtains the DNA pattern of an individual, he has the blueprints to that individual's body. Big Brother has been working hard to bring human DNA banks into existence. Big Bro's goal is to store the DNA patterns of every person in "society" via blood samples, tissue samples, hair follicles, etc. so it can be used against "dissidents." When Big Brother can claim ownership of a portion of a human being, it only proves how much we have truly lost. How would you like it if you weren't able to obtain a loan, or health insurance because Big Brother analyzed your DNA sample, and found that you are prone to a disease? Do you feel it would be fair for the "genetically superior" to have an unfair advantage when it comes to employment? These scenarios are the future. How about the police force taking DNA samples from the bank and planting them at the scene of a crime? Again, another plausible scenario since desperate cops can perform corruptly when their backs are against the wall. If they assume a suspect is guilty, and have tissue samples within their reach, why wouldn't they use them to prove their case? Many states have already created DNA banks of all prisoners within their particular "department of corrections." As expected, the cops are extremely excited over the whole idea of DNA banks. To quote a cop, "This is something that is more unique than fingerprints," said Nebraska State Patrol Capt. Kevin Stuckenholtz. "You put the sample in a computer data bank, and then if a crime is committed years later and there is some forensic evidence that they are able to collect, police can cross check to see if they have a perpetrator." This is another example how Big Brother uses the threat of crime to influence zombies into willingly and happily support every law and policy that destroys our civil rights and privacy. Those that wish not to give Big Brother DNA samples are treated like convicts. During 1997, two American marines were court-martialled after refusing to "donate" DNA samples to the Pentagon's DNA bank. Corporal Joseph Vlacovsky and Lance Corporal John Mayfield filed a class-action suit to force the Pentagon to stop this practice, because it is nothing more than unlawful search and seizure. The Pentagon responded by saying that they only want the DNA of every present and former employee in order to create a "DNA dog tag." For example, if a soldier is blown apart in combat, the Pentagon would obtain a DNA sample from the remains and compare it to the samples in their DNA bank. What disturbs Vlacovsky and Mayfield, and the Council of Responsible Genetics, is the potential for misuse of the DNA information. In response to their concerns, the Pentagon has promised to destroy a "donors'" DNA information, tissue samples, etc., when that person leaves the service. However, there are absolutely *no* laws requiring them to do so. Haha... even if there were, it would be extremely naive to actually think that the Pentagon would *destroy* DNA information. After all, the Pentagon allows the FBI and other American law enforcement agencies access to all of the DNA information they've taken with (or without in my opinion) a court order. The Canadian government has also been pushing for a national DNA bank. It has been proposed that all Canadians should be forced to submit tissue and blood samples to this bank. Big Brother is definitely wasting no time. For some reason, talk of this "mandatory" government DNA bank is on the backburner. In November 1997, a private member's bill was introduced to create a national DNA bank to house DNA information from all convicts in Canada. A extra bonus for Big Brother to create a DNA bank database of the entire citizenry is greed. Big Brother could make a fortune selling your DNA information to foreign laboratories, big business, etc. It's true. In one example, blood samples drawn from asthmatic inhabitants of the remote South Atlantic island of Tristan da Cunha, led to asthma treatment technologies which were sold to German medical monopoly Boehringer Ingelheim for $70 million. Do you think the islanders were paid any of the $70 million for the blood samples they provided? I highly doubt it. Genetic laboratories in the United States and Japan have been patenting DNA patterns for decades! This even more proof that Big Brother and big business see us all as commodities to be exploited and controlled. The precedent is if you give, or are forced to give, a blood or tissue sample, you lose all rights to it. Big Brother can literally "have a piece of you" if they obtain a sample. I hope that you take what I have written in this article seriously, and form your own opinion. It is horrid enough that Big Brother is attempting to take our civil rights away so they can control us. Now Big Brother desires to rape us of our blood and bodily tissue, and our right to keep our own genetic make-up private. Especially if something can be used against a person by Big Brother in an attempt to control that person. And if a DNA sample is unique in some way, Big Brother and his scientists are the ones that benefit, not the person that provided it. We all have a decision to make. Do we submit our mind, body, and soul to Big Brother, or do we fight for our privacy and rights? Written by Shatazar ? Damage, INC. (C)opyright 1998. BLACKENED'S TIP OF THE MONTH - {BLACKENED} Tips for newbies on how to enter the h/p scene: The main reason that I decided to write about how to enter the h/p scene is because the majority of the newbies in 519 act like complete lamers... and then they wonder why they're disrespected, mocked, laughed at and humiliated. The newbies try to pretend to know all about hacking (including hacking ISPs, web sites etc.), phreaking (including stuff like scanning, PBXs, extenders, diverters, ANI, CNA, loops, ringbacks, beige boxing, red boxing etc.) The list is almost endless. Obviously, they can't fool us into thinking they have h/p knowledge by spewing bullshit and lying. One newbie in particular (ahem, Highlord) doesn't seem to realize that extenders can be used for voice and data... and talks about them as though they are just normal carriers (that you connect to via modem)... that are just local diverters. Hahaha. Highlord also claims to "program viruses in hex". Other newbies are totally confused about ANI. By far the most hilarious are the newbies that talk about using PBXs, yet they don't even know what a PBX is if you question them. Or the newbies that claim to scan or hack and they don't know shit about ToneLoc or unix. I'm not sure if they're trying to impress the well known, experienced users in the h/p scene or not. At any rate, it never works and they always end up looking like lame fools. Don't expect to be respected if you call learning "reading a text file" and following the instructions. You also won't gain any respect by bashing the knowledgable hackers and phreaks. And you won't get "instant respect" if you start a wannabe "h/p group" or "h/p board"... when you don't know anything. Don't upload trojans to boards and think that's hacking or think that it means you're a hacker. Don't think you're a phreak because you've used an extender or know what PBX stands for because you don't know what phreaking means. You can't be the Sysop of a real h/p board if you're a newbie that knows less than your users. What will you do if they ask you a question that relates to h/p? Do you think h/pers will actually call a wannabe board that's run by a newbie? No, of course not. Don't setup a board until you know something about what you want it to support. Basically, if you aren't a hacker or a phreak and not in the h/p scene, don't setup a lame board and try to advertise it as being "h/p/a/c/v/t". If you do that, don't be too surprised if nobody that's in the h/p scene calls and supports it. ;) And don't be shocked if it's constantly being bashed and named the lamest board in the area code. Now that I've covered some of the things that you *shouldn't* do (unless of course your goal is to be the biggest lamer in your area code)... I will now explain how newbies should enter the h/p scene. First, call the respected h/p boards in your local area. Ask for access politely and post an intelligent new user application. Don't kiss the Sysop's ass or attempt to fool them into thinking you're not a newbie. If you chat with them, let them know that you're genuinely interested in learning more about h/p... and want to become part of the local h/p scene. Ask them for advice, but don't ask them any questions like "How do I hack? How do I....." If you overload them with stupid questions, they might just become annoyed or pissed off at you. Afterall, nobody likes to answer a million fucking questions...muchless ones that a newbie asks them. Thus, don't expect to get direct answers about everything h/p related that you've ever wanted to know. It isn't that easy. It takes time. You have to learn many things on your own. Download some text files and some utilities (like ToneLoc etc.) that you'll need. Read through the text files. Read through the ToneLoc docs. Read every issue of the Damage, INC. Newsletter. Start scanning some local exchanges. Start learning about tones. You might be surprised at what you can find and learn about. ;) Once you have learned about a few things, don't start bragging or think that you know everything... Don't get a big ego or develop an attitude. If you've only been learning about h/p for a few weeks or months, then you are still considered to be a newbie. Also, don't apply to all of the local h/p groups in your area. You still lack experience, which is something that's very important and cannot be faked. Once you've done a few things (found some PBXs, extenders, diverters, VMBs etc.) and hacked some codes (like passcodes etc.)... and have some experience using ToneLoc, PBXs, extenders, diverters etc. then by all means apply to some h/p groups that you're interested in joining. Or if joining a h/p group doesn't interest you, that's fine. Obviously, you can still associate with hackers and phreaks, exchange ideas and information... and learn from them and any advice they might decide to give you. ;) Once you've learned the h/p basics, you will find that people are more willing to give you advice and help. As for gaining their trust, respect and becoming accepted as part of the h/p scene, that is something you will have to figure out on your own. The only tip I can give is that you'll have to earn their trust and respect. It's not something that can be instantly gained. You'll have to prove that you are trustworthy, have some knowledge, respect others that are in the h/p scene (especially those that were in involved in h/p long before you knew what it was) etc. You have to show that by your actions and words. If you aren't dedicated and active in the h/p scene, it'll be evident to them and very noticeable. If you do nothing but constantly ask questions, that shows that you aren't reading, learning or doing anything to progress. Thus, take the initiative to learn as much as you can and become self-taught. Written by BLACKENED ? Damage, INC. (C)opyright 1998. CORRUPTION AND GREED - {GREED} Forcing an old dog to learn new tricks: Microsoft Corp's long monopolistic reign over the desktop/business PC market may have reached an inevitable conclusion. Crucial marketing decisions made by the greedy company have, and still are being scrutinized by corporate and government groups, working towards learning the extent to which Microsoft violated anti-competitive laws in order to increase their profits. Anti-competitive business practices, such as forcing users of the soon-to-be-released Windows 98 to use their Internet Explorer 4.0 have alerted high-end developers, and low-end users across the globe to what most of us knew all along - Microsoft is a bully. In fact, the United States Department of Justice has agreed with us on this one; finding Microsoft guilty of violating anti-competitive laws in the recent IE 4.0 dispute. As a result, Microsoft now has to ship over 3 versions of the anticipated 'Windows 98' (including one 'IE 4.0 Free'). The byte does not stop here. In an attempt to gain a monopoly of Internet-related applications, Microsoft had also violated universal agreements on the compatibility of JAVA applets across various platforms. What this means is that Microsoft wanted PCs connected to the web (running Win95/98) to run JAVAScript apps coded only by other Microsoft developers. This decision also created an uproar in the computing industry, leading to the development of many 'Anti-Microsoft' groups. <g> Microsoft's competition seems to have finally realized the power they hold when they join together to fight the greed. Vendors such as Sun Microsystems have jumped in response to these events, and are starting to release low-end workstations designed to compete specifically with NT 4.0 systems. (Codename: DARWIN). JAVA has played an important role in all this; serving as symbol against OS-Specific JAVA Code. Users and developers alike have warmed to the idea of versatile code, full compatibility issues, and multi-platform flexibility - seen in the increased interest in alternative Operating Systems such as Linux, and x86 based SunOS (Desktop UNIX). It appears Microsoft has made some fatal moves. Microsoft assumed they could maintain their narrow-minded, short-sighted business practices, and still realize great profits. How ignorant they were though, of the forces of the universe always at work. The universe thrives on change, and the longer something remains static, the more dramatic its termination. Just ask the dinosaurs. Written by The Journalist ? Damage, INC. (C)opyright 1998. H/P INFORMATION AND NEWS - {NEWS} An Introduction to VMBs: This article contains some useful information on VMBs (Voice Mail Boxes) for beginners and advanced phreaks. Actually, it's an introduction to VMBs that is intended for newbies to read. :) First, not all VMB systems are the same. Some are local, others are 1-800s. There are several types of VMBs and each has it's own unique features, defaults etc. I'm not going to describe all of them or give any "specific" information on how to hack them. However, I will give a brief summary of the basics of each commonly used VMB system. If you aren't familiar with voice mail and have not had the priviledge of using it before, then you'll probably find this article interesting. Otherwise, it might seem a little boring if you already know all about VMBs, use them regularly and have your own personal box etc. In that case, just skip this section and read the next article. Most text files and articles on VMBs lack critical information and just say "You really need a 1-800 VMB. Buy one from a phreak or scan 1-800s to find one using ToneLoc, and then try to hack it using default passcodes." Of course, Damage, INC. has much higher standards and would never write or release anything that lacks the necessary content and quality that our readers have grown to expect. :) At this point, you might be asking "Why do I need a 1-800 VMB?" though. The answer is that they are useful for staying in contact with people, contacting new people (like phreaks from other area codes), trading codes and information, and learning. Some VMBs also allow you to dial out from them. Plus, they're free to call and most 1-800 VMBs are accessible throughout North America (some are limited to Canada). And, you don't have to give out your voice number anymore once you have your own VMB box. As for buying a VMB from a h/per in your area code, you shouldn't begin by "buying codes". If you get into the habit of doing that, you might start relying on everyone else in the h/p scene to do everything for you. That isn't a good way to enter the h/p scene or learn anything. The main point is, you learn absolutely nothing by purchasing a VMB from someone else. In other words, you won't even be used to or know about the VMB that you paid for. You'd have to spend some time becoming familiar with the system and learning, so why not do that first before you take the easy way out by paying someone else cash to do the work for you? Okay, now you want to know how to get started scanning and hacking VMBs. There are several ways that you can begin. You could use ToneLoc (or another scanner) and scan 1-800s trying to find a VMB. Or, you could talk to some phreaks in your area code and they might point you in the right direction (ie. they might tell you to try scanning in 1-800-999-XXXX as an example). Another option is to dial 10 random 1-800 numbers a day, a few times per week for a period of a couple of months and make a list. That method is fairly safe, and it should ensure that you find some 1-800 VMBs, PBXs, ANIs, extenders etc. Then you can investigate the cool 1-800s and forget about the rest. :) Of course, you should only try to hack the Virgin VMB systems. (VMBs that haven't been hacked already by other phreaks). Hack safely and always use a good diverter. You might also find some VMB systems by watching television or looking at products (ie. Customer Support numbers, or just VMBs setup for their employees to use). Once you've found a Virgin VMB system, identify what type of VMB system it is before you attempt to start scanning. (Read the section on identifying VMB systems that's later in this article). Scanning just means, searching for boxes that you can hack. Basically, you'll want to find a box that isn't already being used by someone. That is, unless you just want to listen to other people's messages and don't want your own box. I'm not going to take the time to explain guest boxes, dialing out etc. You will have to figure out how to use the more advanced features of VMBs on your own. As for hacking the VMB, this is a generic method. Call the VMB and when you hear the automated message asking for a box number, try entering 999, 999# or #999. (With some VMBs you might have to enter a 0, 9, #, * or a different number first to access it). After you enter 999, there are a number of possible results. It might tell you the Box owner's name, report that you've entered an invalid box number, or ask for a password/passcode. If it says "MailBox XXX" or "Please leave a message" or just prompts you for a password, then more than likely you've found a nice, hackable, unused, virgin box. For the passcode, try using some defaults. If the Box Number (BN) is 999 then try entering: BN = 999 1+BN = 1999 0+BN = 0999 BN+0 = 9990 BN-1 = 998 ...or the BN backwards. BN 123 would be 321 etc. Some lamers don't even use a passcode at all or they leave it as default. Hahaha. However, that's quickly changing now that people are discovering that hackers and phreaks exist. There are some other defaults as well, or common ones such as 000, 111 for 3 digit passcodes, 0000, 1111 etc. for 4 digits. The default passcode might also be the same for every box. It could also be the last 4 digits of the actual VMB number. Try the BN first, and look for boxes that have a generic greeting message. Once you manage to get into a box, you can use it to start scanning. That way, you can scan for boxes (while logged in) without getting disconnected. The way to start scanning varies with each type of VMB system. For ASPEN VMB systems, you press 3 from the main menu. Then you enter in a box number. Just keep scanning boxes and writing down the ones that you think might be hackable. :) You don't have to scan randomly either. Continue scanning until you reach the lowest box number. In other words, you can go from box number 999 to 000. You should know what the default box number system is for the VMB at this point. Every hackable box should have the same default password. That is what makes hacking them so easy. So, if the box that you're using to scan with used BN as the default passcode, then every open, hackable box will use BN as well. That means if box number 111 is hackable, the default passcode is the BN... which is 111. :) You should be able to get a nice list of hackable boxes, and get into some of them easily enough. Does this seem difficult to you? If it does, you're a complete moron and should stick to calling lame warez boards. Hehe. Here's a tip for you. If you are hand scanning (looking for VMBs by manually dialing them with your phone) or hand hacking, store the VMB number into memory dial. Or you can write a Telix script for hacking boxes. Why only try to hack Virgin Systems? Why take an unused or abandoned box? Well, they last the longest for one thing. They don't attract suspicion and the sys admin isn't going to be alerted by someone that paid for a box when their passcode is changed. Plus, you won't be fucking up any other phreaks if it's a virgin VMB system. Another thing to remember is, the messages in your box (once you hack one) aren't as secure as you think...even after you've changed the passcode and greeting. So, don't use any personal information and avoid getting busted. Take the unused/virgin boxes (watch them to see how often they're used/not used) and don't fuck with every box on the system. :) Identifying different types of VMB systems: ASPEN systems - This is considered the best VMB system, and it has many useful features. You are allowed to have two greeting messages, create guest accounts, leave urgent or regular messages, and much more. ASPENs are easy to recognize because of the extremely annoying female voice. When you dial one up, you might have to enter * to get into the system, or you might not. Now press # to login. The system will prompt you for your mailbox number. After three invalid mailbox number tries, you will be disconnected. If you enter a valid box number, you will be prompted for the passcode. It is usually the box number or the box number + 0. Once you're logged in, you can press 3 from the main menu to scan for other boxes without being disconnected. Always login first. CINDY systems - This is another nice system. It will start by saying "Good morning/afternoon/evening. Please enter the mailbox number you wish". After 3 invalid entries it will cut you off. To login, enter the box number, and during the greeting press 0 then the passcode. The default passcode for all CINDY systems is 0. :) From the main menu once logged in, press 6 to scan for other boxes without being disconnected like you would if you weren't logged in. You can create guest accounts for someone. They would login just like you, except they would enter their passcode. You can leave them messages this way. Message Center systems - These are another popular VMB system. To login, enter a box. During the greeting, hit * to log in. It will then ask for your passcode. Enter it. These VMBs have tricky password methods. They will stop you 1 digit more than the real passcode length. If you enter "12345" and it tells you that you're wrong, that means the code is only 4 digits long. If you enter an incorrect passcode the first time, no matter what you put in, it will say that it's wrong. From the main menu while logged in, type 6 to scan for other boxes without being disconnected. Q Voice Mail systems - These are not a very commonly used VMB system. You'll know that it's a Q VMB if it says "Welcome to Q Voice Mail paging." The box numbers are normally 5 digits, and you hit 0 during the greeting to login. From the main menu while logged in, enter 3 to scan for other boxes without being disconnected. You will be promptly disconnected if you aren't logged in and try scanning for other boxes. MERIDIAN Mail - With this VMB you'll probably hear the default greeting message of "MERIDIAN Mail. Please enter your mail box number followed by # sign." If you wait for a few seconds it'll say "For more information press *." After you've entered a valid box number it'll ask "Password?" and then "Please enter your password followed by # sign." after a few seconds of inactivity. (Since I have not personally used all of the above types of VMB systems, the source for some of the information used was from an iTS text file - Internal Theft Syndicate. However, I did modify it and added my own comments. So, iTS deserves some credit for their good release. The entire MERIDIAN Mail section wasn't in the iTS text file etc.) HEED THIS WARNING: Don't try to hack other phreak's VMB systems. If you fuck up trying to hack someone's box, then there's a great chance the admin that runs the VMB will be alerted by them. Not only will you be caught, but everyone else will lose the box that they've been using. The default box passcodes will also be changed, the security will be strengthened and the company that owns the VMB will be paranoid from then on. So, be wise and avoid doing that shit. Stick with Virgin Systems if at all possible and don't do anything stupid. If you require information on a specific VMB system, then I recommend that you read h/p text files that contain the information on hacking VMBs and explain the system, it's features etc. in greater detail. I know that there are many text files and zines available on AJFA that would be helpful to you. There are other sources for that type of information as well that you might want to search. List of some 1-800 VMBs for you to check out: 1-800-284-6245 - VMB (Meridian Mail) 1-800-543-7108 - John Hancock Customer Service (hit *7 to access the VMB) 1-800-669-1800 - Burger King's Voice Mail System. Free Extender (as a bonus) for our (519) readers: 654-9000,,,*,,,,,XXX-XXXX Ability Telecom. In closing, I hope that you've enjoyed reading this article and learned the basics of VMBs. The extender above was provided by BLACKENED. We're not going to start including huge lists of codes or anything though. If you want to find 1-800s etc. then you are responsible for scanning/hacking them yourself. We're not going to provide codes with passcodes for you. :) Experiment and try to learn as much as possible on your own. Don't just use the codes that we give you as examples. That'd be very lame. It'd also mean that you're too fucking lazy to scan and find anything. Don't limit yourself to just using codes that are written in text files. Afterall, that's the opposite of what phreaking is all about. That would defeat the purpose of writing articles such as this. You basically have to take the initiative, become active and dedicated to learning. I'll assure you that text files (even ones that were written recently) do not contain information on everything related to phreaking. In fact, there are always going to be new systems, new technology etc. Pioneers that are curious and willing to explore, find codes, find and learn new systems are always in demand. The sense of accomplishment that you get from making a discovery can be amazing. I suggest you make it your personal goal to become a true phreak. Written by Blackie Lawless ? Damage, INC. (C)opyright 1998. INTERVIEWS AND INTERROGATIONS - {INTERVIEWS} Fatal Vision's interrogation of Highlord: Fatal Vision sent me this interrogation of Highlord, and I felt that it should be published and shared with the readers of the Damage, INC. Newsletter... ;) The bottom portion that contains Highlord's definitions for various things is hilarious. Enjoy. <FV> = Fatal Vision <H> = Highlord --------------------------------------------------- Recorded with user: The Highlord Chat reason: OK you wanted me to page you? --------------------------------------------------- <FV> - Yeah, I am here man.. ;) So what's up? <H> - well nuthin much i was just reading some text files thats it though. <FV> - Really? What were the text files about? <H> - hacking unix <FV> - Yeah.. That's cool man ;) You wanna chat about h/p for a bit? I am really new to h/p and you could probably teach me a little bit.. <H> - really...hmmm...thats interestin i thought you knew way more than me.. <FV> - Nah.. I don't know much.. I'll ask you some questions.. Do you know what a PBX stands for? Do you have any PBX Numbers? Do you use a PBX? <H> - well actually i used to but i forgot what it means but i have it in a text file...i dont have any pbx numbers yet i dont think but i am workin on a number i am getting from a friend and if i had a number i would definitely use a pbx. <FV> - Okay.. What about ANI? Diverters? Extenders? <H> - well hmmm....i dunno what an ANI is :( diverters i think are numbers you call to call another place like and extender.... <FV> - Hmm.. Okay.. Uhmm. Oh Do you have a Win95 Internet account man? I saw your posts on FoI about that... Do you have any Win95 accounts? (you don't have to give me the username/passcode). Do you know what a beige box is? Have you gone boxing? <H> - ok well i dont have a win95 account i used to but it got busted due to my carelessnes but i have learned more in the mean time like log editing. i have unix ones and thats about it cause thats what i mainly use. i think i know what a biege box does but im not sure i dont really follow the box things...and no i have not been boxing but i want to. <FV> - Yeah.. Okay.. Are you and Taskmaster gonna go Boxing together? Are you on any Long Distance (LD) Boards? What boards in 519 do you call? <H> - well hmm....i dont think me and him will box together i think thats more of an individual thing...i am on one LD board but i think its down but it was only a company board with utils... i call scorched :(, suicide solution occasionaly but only for full ver stuff....FoI, druids keep :(, 5th dim :( coolguys freezer, outlaw rave, brain damage, and thats about it...oh yeah and this one if you let me stay on. <FV> - Hehe ;).. You call quite a few boards in this area.. What do you think of Coolguy's Freezer? I haven't called their in ages.. What do you think about FoI? Are you on And Justice For All? I really want access there.. He said he might give it to me.. <H> - yeah well he said hed lemme know when they are accepting new users. Well i think coolguys freezer kinda sucks...i only get some files there and thats about it...i like FoI alot cause its the only good board im on and i have learned alot from it. <FV> - Yeah.. What happened to Jacknife BBS? With that 11 year old SysOp? Did you hack him or something? What do you think about Blackened? The Journalist? <H> - well jacknife....i think he forgot to pay ma bell ;) well i hacked him but i was his co sysyop hehehe yeah and i got his user files and stuff but i didnt crash it....i think Blackened is a good hacker with a big ego but i respect him and he helps me when i ask him about stuff...The Journalist has been very helpful to me and we have chatted many times///but recently he has been a little annoying cause he thinks im a security prob. <FV> - Hehehe.. Yeah.. So you hacked Jacknife then? Why do you think Blackened has an ego though? That's what some people have been saying... But I really can't understand why.. Do you know what having an "ego" means? <H> - hehe well with jacknife i was his co so it wasnt really a hack....but i think Blackened has an ego just by the way he talks to ya when you post to him....like when i said i was working on GT he said really so what are you doing are you worried about security? how long have you been doing this? etc.... i dunno why people say im a security prob but im not gonna argue....i know what an ego is...........anyway shit my mom says i should go :( ill talk abit more but then i gotta go....will you be around tmorow at 5? <FV> - Yeah.. Well I think you should consider some of the stuff Blackened says. In My Opinion he is trying to help ya.. 5:00pm? Near supper? Yeah I should be around.. The things you stated about why you think Blackened has an Ego doesn't really match the description "ego".. So that's why I asked.. Have you applied to Damage, INC.? Do you know how to list files in unix? I forget how.. <H> - ok well i do listen to Blackened i dont mean that having an ego is bad its just what i feel when i talk to him.... ill call tmorow at 430 or 500 to talk to ya...wellli havent applied to damage inc cause im runnin my own group well im startin to...i have a few members but....so far nuthin has happened and we need a headquarters......to list files in unix type "ls" <FV> - Okay.. Yeah.. so are you the "prez" What's the group called? Who's the members? <H> - ok well i am the head of the group.....but its called The Shadows.....the members are well...me, taskmaster, /zero, and thats it for now. <FV> - Alright man.. I'll let ya go.. Yeah Just page me tomorrow or something.. at about 4:30-5:00 then.. <H> - ok i will...if your not in or somethin just call me voice.... <FV> - Alright man.. ttyl ------------------------------------ Recorded with user: The Highlord Chat reason: to continue q/a. ------------------------------------ <FV> - Yeah.. I am around man ;) <H> - yeah i figured you would be./...for some reason my 14.4 wont pick up ansi...i think its screwed...so are you gonna put up the other board? <FV> - I just got a new system.. So I still have to put Eternity on from backups..;) My old computer basically fried.. Anyways, So you want some more q/a's eh ;) <H> - whatever you want...i dont really care.... <FV> - Alright.. Hmm.. What do you think anarchy stands for? What do you think about our Government? <H> - ok hold on a sec my cat wants out :) ok well anarchy hmmm you mean like what does the A the N stand for that kinda thing or overall? overall i think it means basically having fun the way you want and our shitty government decids that it is wrong but it borders on the legal/illegal border not that i care about doing things the "Legal" way....our government i despise i think they are a bunch of morons who dont know anythin and are screwin up our country and us.....like Bell ;) anyway i really dont like our government and i am always trying to find out new stuff they try to get themselves involved in... <FV> - Hehe.. ;) Hmm.. Okay.. Do you know what Cracker Jack is? Who is this hacker that you know that's LD? <H> - hahahaha you heard about that eh? well cracker jack is a pword cracker you can get different versions but i have the unix one...this hacker well he Had a website and i hacked it and fucked him over because we got in an arguement...he moved and learned everything he could about hpvac and quickly got better then me...but he uses diferent aliases....a source of mine told me he wanted to take me out and i found out who he was for real and i threatened to tell the cops about him so he took off <g> <FV> - Why would you call the cops on him? As for Cracker Jack is there a Win95 one? ;) You hacked his Webpage? <H> - well it was an empty threat but i know he is afraid of the cops so i figured may as well scare him a little ;) for win95 there is a prog called Claymore that does that....i dont know of a crcker jack one.....and i just hacked the isp well i knew the pwords.....and i took him down and screwed his system with a few trojans...... <FV> - Oh.. Hmm let's chat a bit about your "h/p" group.. What does it take to be a member? Do you have any releases? What do you focus on? Why was it created? etc? <H> - well im gonna tell you stuff but i dont want you posting on FoI about my little lameass group ok? <FV> - Why are you calling your own group lame? <H> - im not i read your interesting post about my group called the "prezzes" or somethin like that. <FV> - Huh? That was about a different group.. I didn't even know you had a group until last night.. <H> - oh ok well nevermind then....anyway i dont want you posting on FoI about it though ok? i know TJ and Blackened will make fun of me or annoy me... <FV> - Hahaha... Okay.. I won't post it on FoI. ;) <H> - ok thanx ;) anyway ok i created it cause well to be honest everyone knows 519 is dead....i want to bring another h/p group into the scene and try to get more people into it. We have had no releases yet but that was because we had our headquarters on scorched earth and stallion was in on it and then screwed everyone for talking about hacking and shit....so we kinda got lost...but im trying to bring it back....our main focus is to bring useful info about hpvac to the 519 community and to create awareness of Bell Microsoft and our Corrupt government....To become a member you must show some sort of dedication and intelligence and promise not to talk to non-members about our actions and the your in if i allow you to be.... thats about it...we also have a vote to see if you get in or not. <FV> - Stallion *screwed* everyone for talking about hacking? Hahah.. That's hilarious man.. So you don't plan on realizing your shit to Freedom Of Information then? Why only upload it to Scorched Earth? Especially since it's not a h/p board.. <H> - OK well i do plan on releasing it to FoI but only => User disconnected ------------------------------------ Recorded with user: The Highlord Chat reason: ...... ------------------------------------ <H> - ok that was call waiting but its disabled now.....anyway i do plan on releasing the stuff to FoI but first i would like people to give me an opinion on it. I will not u/l it to scorched because well...stallion is a fuckin moron......and he runs a warez board......thats about it.... <FV> - I thought Stallion is going to have your files online? You call that board though right? You still call warez boards? <H> - well to tell ya the truth i call it only to piss of people :) they dont like me cause i dont like warez...so screw em :) anyway no stallion has no files of mine on his board...he is trying to setup an h/p file area but me and tweakie are the only people who use it hehehe and i do call some warez boards but only if i want a full ver thing and they have it..i dont go getting new warez to double click and calim to hack....besides i dont use microsoft products at all. <FV> - Really? How did you find that little lame "trick" in Win95 then? Hehe.. I read about that on FoI.. <H> - i figured people would read it thats why i posted it...well i used to use MS products b4 i got into hpvac and then i realsized how much MS sucks and vowed never to use their products at all :) i found the trick when i had windoze.... <FV> - Oh.. I see.. I read somewhere that you can program viruses? Is that true? Hex is a *hard* language man.. Fuck.. Hahah <H> - well i dont program in hex i merely edit the file so it has a viral effect...im tryin to learn about programmin viruses but so far i cant do anything good...i just try to take a source code and change it around...i have text files that help me do that... <FV> - What Language do you use? Hex? <H> - well i use hex to edit things but im using c and uhh... <cough>...basic :( <FV> - Hahah.. That's hilarious ;) Who do you think is the *biggest* lamer in this area? <H> - well hmmm..... to me well i hate Floyd the Jackass but id hafta say Spike Jr. <FV> - Oh.. Yeah.. Someone Said Spike Jr hacked that Jacknife board eh.. <H> - hahaha spike couldnt hack anything...he wasnt even on there......well he got pissed off at me for hacking his board...still hasnt changed his pword HAHAHAHA!!!!! <FV> - Yeah he was on Jacknife man ;) And It doesn't take much to nuke a board in this area.. Just rename a quality trojan, and upload it to a board.. ;) It doesn't take much for someone to get the SysOp to run it either... Ah well, that board was lame anyways.. I saw your posts there and had to laugh ;) <H> - hahaha yeah i only posted cause he told me too....but i was his co sysop and i felt i may as well try to make it a little less lame...but the fucker forgot to payoff bell.....so he dont got a line this month..... <FV> - How do you know? <H> - hmmm....well he called me on voice and told me...... <FV> - Really? Your not lying to me? He's 11 years old.. How could *he* pay for the line? His parents would probably pay for it and I don't think they would forget.. <H> - no he was paying for it...he has a little shitty paper route and his parents dont even want him running a board so they dont help him.....i think the beel bill got lost in the mail thats what he said..... <FV> - If he seriously told you that, I'd have to say "bull-shit" ;) He probably just can't admit that he got hacked.. <H> - i guess hes lying but i dont really care hes a lamer with a lame board and i just changed some stuff for somethin to do...... but....oh well. <FV> - Hahaha! Do you know what Social Engineering is? <H> - no fuckin idea. <FV> - Oh.. Heheh.. Did you ever figure out about what PBX stands for? <H> - nope had no time and dont really care but ill look l8er....... <FV> - Hehehe.. You don't really care what it stands for?? Hahaha.. How can you use one if you don't even know what it's called ;) Just one more question for ya. How are you avoiding being caught while hacking ISPs? <H> - ok well i meant i dont care that i didnt have any time...sorry worded it wrong....but i am editing all the logs and i hack em from other peoples houses... but i just change their logs and always use *67 even if it dont work too good. <FV> - Who's houses do you hack them from? Taskmaster? Hehe.. As for *67.. Haha that's hilarious man.. Do you think that does anything? <H> - well bell invented it and i read enough text files to know it doesnt do anything but its in my dialout thingy so i dont care.....but no ive never been to taskmasters house...i call from friends houses who dont know what bbses or the internet are hehehee. <FV> - Hahaha.. I just wanted to know what "Elite h/p" is? <H> - well your talkin about 2 different things.....elite is like well warez and shit like that like emulators and shit and h/p is hacking/phreaking well you probably knew that ;) <FV> - Hahah.. Yeah. I probably know a little more then you think ;).. How come when you left me e-mail before with your real information you said you would upload all your "Elite hp" if I gave you access? Do you know what h/p/a/c/v/t stands for? <H> - yes did i post that? hmmm must have been smokin somethin ;) i dunno why i did though..oh well just a mistake....hacking/phreaking/anarchy/viruses/ trojans/carding <FV> - Yeah you did post that.. Anyways dood, I've gotta get going.. Don't give this number to anyone.. I noticed you already have though.. <g> <H> - huh? to who? i did to /zero but he just wanted to make sure that number was for here....... <FV> - Oh.. Alright.. I'll let ya go though.. I've got some work to do now ;) <H> - ok yeah whatever...you want to continue this discussion l8er? <FV> - Sure.. <H> - ok when time/date/year ;) <FV> - How about 1:00am/Feb.19/2001 ;) <H> - yeah ok sure you gonna be around? ;) <FV> - Of course.. Alright.. I'll pull you to chat then.. Later whats your handle : .:[ The Highlord how is the h/p scene in 519 : .:[ Not too good [ what are you trying to hack or do right now : .:[ Golden Triangle and the KPL [ [ what are your interests : .:[ HPVAC, Computers [ try to define and give significance for these terms; pbx, extenders, diverters, trojans, viruses, alt.2600, assembly, ToneLoc, Damage, INC., Renegade, UNIX, Shell, internet, mIRC, ISPs, Mailbombers, FTP's, F-PROT, lamers, Ansi, Data Bits, Datapac, ansi bombs, NUKEAB, and last but not least zines. [you will be given alot of lines for this] .:[ pbx= a thing you can hack to get free long distance, [ extenders=a number you can dial from [ [ trojans=things that do things somewhat like viruses [ viruses=similar to trojans [ alt.2600=an hp newsgroup on the net mainly warez now [ [ toneloc=a wardialer/hacking util [ damage, inc.=Blackened's hp group maek a release monthly [ renegade=bbs software, very poular and easier to hack [ unix=a good os that is text only created by at&t [ mirc=a chat thing on the net. im not a net user.... [ isp's=internet service providers [ ftp's=file transfer protocols [ f-prot=an antivirus prog [ lamers=users who are incompetent and use warez [ ansi=graphics on a bbs [ nukeab=the damage, inc. file to nuke drives a: and b: [ [ enter your favourite bbs : .:[ favorite type of music : .:[ Alternative/Metal anything else that isn't in here, put it here: [3 lines] .:[ [ [ LETTERS TO THE EDITOR - {LETTERS} The message below was written by Thc Phreak and sent to me on AJFA. Since it's feedback, I decided to include a copy so that everyone can read it. Msg # : 161 of 161 Area : Damage, INC. Releases ??????????????????????????????????????????????????????????????????????????? From : Thc Phreak Date : Thu Feb 05 1998 To : Blackened Time : 10:43 pm Title : Re:Damage, INC. Newsletter >> This is a reply to message # 160 ??????????????????????????????????????????????????????????????????????????? ??? Blackened complained to All about hating Win95! ??? >The Damage, INC. Newsletter January issue #5 has been released. Download >DAMAGE-5.ZIP if you want to read a copy. After you've read through it, >leave us feedback. ;) I just finished reading DAMAGE.005... and want to give you some feedback man. I've read all of the issues of the Damage, INC. Newsletter now and think the January issue is the best that you've released. Your quote is accurate. They are addictive. I really enjoyed the Introduction and the drug metaphor that you used. That really linked it to the quote "Addictive but not lethal." The Big Brother Bashing article you wrote really opened my eyes and made me think seriously about smart cards and microchips... and how they can be used against us. The article on data recovery techniques contains some very good info. I am looking forward to reading your tip of the month for February. The Conspiracies and Coverups article relating to the thought police, h/p and the laws should be read by anyone that hacks and phreaks. Shatazar must've spent some time researching Bill C-17 and the criminal code... and deserves credit for informing us. The Corruption and Greed article that Blackie Lawless wrote on Saddam Hussein was very interesting and well written. The h/p information that Blackie Lawless wrote should be read by newbies. Even though I phreak and know about PBXs, I still learned something. I hope he writes more h/p articles in the future. :) The interrogation of Bill Gates that Damage, INC. did was simply hilarious! Hahahaha. I read through it several times and enjoyed it immensely. It was really creative too. Shatazar's Objective Opinions article on Robert Latimer was well written. It made me think about the federal government and question why they don't act. The Reports from the Front article on the New World Order was humorous, sarcastic, and satyrical. I suggest you include more articles like that. I looked through the Fade to Black source code in the Source and Scripts section... and managed to learn a few things about assembly. :) The "Visions in Fire" essay was well written, and had a powerful message. As always, your Closing Comments put the finishing touches on the issue. Overall, I think Damage, INC. did an excellent job. I hope to contribute soon. - THC Phreak ------------------------------------------------------------------------------- Editor - Thanks for the feedback man. ;) We'll take your suggestions into consideration. If we can find more articles like the New World Order one, then we'll definitely include them. I'm glad you learned a few things about assembly, PBXs etc. from the last issue. As for the laws on h/p, I hope that information proves to be helpful. You can also be assured that Damage, INC. will continue to inform the readers of the Damage, INC. Newsletter. I personally look forward to you contributing. I am very open to new ideas and welcome any different opinions and perspectives that you might have. ;) OBJECTIVE OPINIONS - {OPINIONS} Calling the kettle black. The United States of America is currently fascinated by a real life soap opera. Beloved President Bill Clinton is embroiled in a sex scandal, which supposedly threatens his presidency. Bill Clinton is accused of using his position as President, and previously as Governor of Arkansas, to cultivate sexual relations with women. After Paula Jones filed suit against Clinton, women like Monica Lewinsky and Kathleen Willey have come out of the woodwork. Aren't there more important issues that Americans should concentrate on? Most definitely. And yet the Clinton sex scandal, and the coverup that followed has dominated the attention of politicians, the media, and most of the zombies in America's citizenry. Personally, I feel this whole ordeal is sheer lunacy. However, this whole sex scandal really epitomizes what is at the core of "western society." One obvious fact regarding this "issue" is the fact that it's a power play. The Republicans are using this scandal to attack Clinton so they can weaken the Democrats before the upcoming presidential election. It is no coincidence that prosecutor Kenneth Starr has connections to the Republican Party. The Republicans can see that Clinton is vulnerable, and they are going in for the kill. Using their allies in the religious right, they are attacking Clinton on what they consider to be high moral ground. I wasn't stunned when Linda Tripp came out of the blue with her audio tapes. Linda Tripp befriended Lewinsky, got her to open up about her dealings with Clinton, and then recorded them without Lewinsky's knowledge. Tripp took advantage of the fact that in the state of Virginia (where their office was) it's legal for one party of a conversation to record it without other person's knowledge. Linda Tripp, like the Republicans, is an opportunist taking advantage of Clinton's sexual escapades. No doubt she will sell her audio tapes for a king's ransom. Don't forget another group of opportunists that have been feeding off of Clinton... the mass media. The media are totally out of control. At one point, I saw Monica Lewinsky portrayed as a naive 21-year-old intern with low self-esteem, influenced and seduced by a horny president. Another media source has described Lewinsky as a slut that took her intern position so she could have the dubious honour of blowing the President of the United States. It is obvious to me that the media will do anything to give this scandal, which has been beaten to death, a different slant so they can sell their story. Meanwhile, the media is stalking Lewinsky. When she went to visit her father in California, she had a taste of what Princess Diana dealt with. Ironically, a member of the press chased Lewinsky's car down a California highway. This paparazzi reporter actually hit her car from behind! Fortunately for Lewinsky, she didn't lose her life like Diana did. I'm sure the photographer was pleased with himself though. After all, for a small fine, he created a photo opportunity and a story. And yet the media is extremely quick to judge Clinton's sexual affairs. I've even heard media members say "the President of the Unites States is the moral leader of this country." Yeah right. I've also heard the media report "in the United States, there is a division between church and state" during the vigil prior to Carla Faye Tucker's execution. Which one is it? The media always tries to have it both ways. At first I shook my head at Clinton for having affairs with young interns that were trying to build careers. Clinton is not unlike most politicians that abuse the power of their position. What really sickened me is that Clinton is being attacked because he was "morally in the wrong." Clinton's critics are ones to call the kettle black. The Republicans have had many scandals when they held power. Does the Iran-Contra scandal bring back memories of their lack of morality? And how about the mass media? They have no right to judge anyone on moral grounds. If you don't agree with me, reread BLACKENED's article about the mass media in the November 1997 issue of the Damage, INC. Newsletter. They are as immoral as any corrupt politician. I'm not going to let Clinton and his buddy Al Gore off the hook either. Remember all of the "family values" speeches that Clinton and Gore spout so feverously? Haha... It appears that Clinton's values include trading professional favours for sex. Do you see the message that these people with power send out to people that want to be influenced? Do as I say, not as I do. The definition of hypocrisy. And hypocrisy definitely isn't moral, although it is acceptable in "society." I do not say this tongue-in-cheek. President Bill Clinton's popularity has never been higher than it is right now. All I have discussed, in my opinion, is at the heart of not only Clinton's sex scandal, but it is the very core of "society." Political and economic power plays, betrayal of friendship, overzealousness, unaccountability, greed, lust, and hypocrisy are only a few words that can be used to describe what skills are necessary in order to enjoy the "American Dream" as it exits right now. The next time you hear someone criticizing someone else on moral grounds, be sure to think of the source of the words first. Especially if that person is part of the government or the mass media. Written by Shatazar ? Damage, INC. (C)opyright 1998. REPORTS FROM THE FRONT - {REPORTS} After reading Damage INC.'s fifth issue this morning, I came across an article in the Toronto Sun which ties in quite nicely with the Big Brother Bashing. Big Brother's watching, hearing told: Ottawa dished out $31 million in the early 1980s for a state-of-the-art computer software program to keep track of Canadians, a secret refugee hearing was told. The U.S.-made Promis system interfaced with any data base and provided information on a person's credit cards, banking, pension, tax, criminal and immigration records, transcripts obtained by the Toronto Sun showed. The program could spit out details of a person's health care and even library transactions. "If you ever had a driver's licence you would be on the program," Ari Ben Menashe, once an adviser to former Israeli prime minister Yitzhak Shamir, told a secret Immigration and Refugee Board hearing last June. "No data base existed then that could interface with other data bases," he said. "This software can by used on any Canadian in any jurisdiction," Richard Kurland, lawyer for U.S. refugee claimant, Alexander Henri Legault, said. "It can be used by the government to play big brother." Updated versions of the software are reportedly still being used by the RCMP and the Canadian Security Intelligence Service. CSIS and RCMP officials could not be reached for comment. The board is expected to rule any day on the fate Legault, 49, who says he'll be persecuted by the CIA for blowing the whistle on a Montreal brainwashing experiment, code named MK-Ultra, in the 1950s and 1960s. The experiments headed by the late Dr. Ewen Cameron and funded by the CIA, subjected unwitting patients to hallucinogenic drugs, weeks of forced sleep and massive doses of shock therapy. The hearing was also told the CIA used contaminated mosquitos to spread dengue fever to parts of the Caribbean and Cuba, and conducted drug tests on abducted derelicts and prostitutes snatched off the streets of San Francisco. Most of them died. Disposal CIA units called "Team B" were then called to get rid of the corpses the hearing was told. This article was published in the Monday February 2, 1998 issue of the Toronto Sun. My thoughts on this article? If the CIA can do things like what I've mentioned above, then what makes us think that the government didn't collaborate on making the AIDS virus and spreading that around to control the population? In my opinion, Big Brother has WAY too much control in not only our country, but the whole world. They can track our every move and dictate what we can and cannot do. It's asinine, and it's time we did something about it. Another thing I noticed when I received my phone bill this month, $30.00 for local service and a line which has absolutely nothing on it. I use this line for my computer only and it also has a toll restriction so I can't make long distance calls (I put this feature on myself) Because Bell has a monopoly in the field on local calls, they must feel that they can raise rates. But I feel that paying $30.00/month for ONE phone line with absolutely no special features on it is absolutely ridiculous. Ma Bell needs a competitor in the local rates area and fast. Written by Valencia. SOURCE AND SCRIPTS - {SOURCE} ------------------------------------------------------------------------------- ;Rename Directory v1.00 by Damage, INC. (C)opyright 1997. ;RENDIR renames files/directories (including directories that contain files ;and subdirectories). There is commandline help but limited error handling. ;TASM /M RENDIR.ASM then TLINK /T RENDIR.OBJ data1 equ 80h ;128 byte data buffer code segment byte public assume cs:code, ds:code org 100h ;Start of all COM files. rendir proc far ;RENDIR Procedure. start: mov si,data1 lodsb ;String [si] to al or al,al ;al zero? jz help ;Jump if zero to help call first ;Call first subroutine mov dx,si ;Move si into dx (path/filename) dec dx ;Decrement dx register by 1 call second ;Call second subroutine cmp al,0Dh ;Check for CR/Enter. je help ;Jump if equal to help mov byte ptr [si-1],0 ;Move byte into si call first ;Call first subroutine mov di,si ;Move si into di (path/filename) dec di ;Decrement di register by 1 call second ;Call second subroutine mov byte ptr [si-1],0 ;Move byte into si mov ah,56h ;Rename file/subdirectory. int 21h ;Interrupt 21h function 56h exit: mov ah,9 mov dx,offset rename ;Display rename message int 21h mov ah,4Ch ;Exit to DOS int 21h help: mov ah,9 mov dx,offset damage ;Display help message int 21h ;Int 21h function 09h mov ah,4Ch int 21h ;Exit to DOS rendir endp ;End procedure first proc near ;First procedure check1: lodsb ;String [si] to al cmp al,0Dh ;Check for carriage return. je help ;Jump if equal to help cmp al,20h ;Check for a ' ' space. je check1 ;Jump if equal retn ;Return first endp ;End procedure second proc near ;Second procedure check2: lodsb ;String [si] to al cmp al,0Dh ;Check for carriage return. je return ;Jump if equal cmp al,20h ;Compare al to ' ' jne check2 ;Jump if not equal return: retn ;Return second endp ;End procedure damage db 'Rename Directory v1.00 - By Damage, INC. (C)opyright ' db '1997',13,10 db 'RENDIR <dirname> <dirname>',13,10 db '