💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › VMS › ccc_2.txt captured on 2022-07-17 at 02:01:18.

View Raw

More Information

⬅️ Previous capture (2022-06-12)

-=-=-=-=-=-=-

+----------------------------------------------------------------------------+
!                     Beginners Guide to VAX/VMS Hacking                     !
!                                                                            !
!             File By ENTITY /  Corrupt Computing Canada  (c) 1989           !
!                                                                            !
!                                                                            !
!                          CORRUPT COMPUTING CANADA!                         !
!                                                                            !
!                CALL: (416)/398-3301  Login: Guest, PW: Guest               !
!                      (416)/756-4545  type !!    Login: lynx                !
!                                                                            !
+----------------------------------------------------------------------------+
!                                                                            !
! You may freely distribute this file as long as no modifications of any     !
! form are made to the file. All rights reserved by...What rights?!          !
!                                                                            !
!                                                                            !
+----------------------------------------------------------------------------+

September 12,1989


INTRODUCTION
------------


       Perhaps the most exciting Operating system to HACK on is VAX/VMS.
It offers many challenges for hackers and boasts one of the best security
systems ever developed.  In comparison to the security on UNIX, VMS is far
superior in every respect.  It can be very difficult to get inside such a
system and even harder to STAY inside, but isn't that what this is all about?!
I have written this file as a way for beginning hackers to learn about the VMS
operating system.  There is such a vast amount of information that can be
related about VAX/VMS hacking that it is not possible for me to cover
everything in just one file.  As such i will try and stick to the basics for
this file and hopefully write another file in the future that deals with
heavy-duty kernal programming, the various data structures, and system service
calls. All right so lets get at it!




GETTING IN
----------

       First of all how do you recognize a VAX when you see one?! Well the
thing that always gives a VAX away, is when you logon you will see:

Username:

It may also have some other info before it asks you for the username, usually
identifying the company and perhaps a message to the effect of:

Unauthorized Users will be prosecuted to the fullest extent of the law!

That should get you right in the mood for some serious hacking!  Ok so when you
have determined that the system you have logged into is indeed a VAX, you will
have to at this point enter your SYSTEM LOGIN.  Basically on VAX's there are
several default logins which will get you into the system. However on MOST
systems these default logins are changed by the system manager. In any case,
before you try any other logins, you should try these (since some system
managers are lazy and don't bother changing them):

Username           Password        Alternate
-------------------------------------------------------------------------------

SYSTEM             MANAGER         OPERATOR
FIELD              SERVICE         TEST
DEFAULT            DEFAULT         USER
SYSTEST            UETP            SYSTEST
DECNET             DECNET          NONPRIV


That's it. Those are the default system users/passwords.  The only ones on the
list that are GUARANTEED to be in the userlist are SYSTEM and DEFAULT. However,
I have never come across a system where these two haven't been changed from
their default passwords to something else.  In the above list, the alternate
password is simply a password many operators set the password to from the
deafult. So if the first password doesn't work, try the alternate password.  It
should be noted when the a user is added into the system, the default password
for the new user the SAME as his username.  You should keep this point in mind
because it is VERY important. Most of the accounts you hack out, will be found
in this way! Ok if above ones don't work,  then you should try these accounts.
These following accounts are NOT defaults, but through experience i have found
that many systems use these accounts or some variation thereof:

Username           Password
---------------------------
VAX                VAX
VMS                VMS
DCL                DCL
DEC                DEC       *
DEMO               DEMO      *
TEST               TEST      *
NETNONPRIV         NONPRIV   *
NETPRIV            PRIV
ORACLE             ORACLE    *
ALLIN1             ALLIN1    *
INGRES             INGRES    *
GUEST              GUEST     *
GAMES              GAMES
BACKUP             BACKUP    *
HOST               HOST
USER               USER      *
DIGITAL            DIGITAL
REMOTE             REMOTE    *
SAS                SAS
FAULT              FAULT
USERP              USERP
VISITOR            VISITOR
GEAC               GEAC
VLSI               VLSI
INFO               INFO      *
POSTMASTER         MAIL
NET                NET
LIBRARY            LIBRARY
OPERATOR           OPERATOR  *
OPER               OPER

The ones that have asterisks (*) beside them are the more popular ones and you
have a better chance with them, so you should try them first. It should be
noted that the VAX will not give you any indication of whether the username
you typed in is indeed valid or not.  Even if you type in a username that does
not exist on the system, it will still ask you for a password.  Keep this in
mind because if you are not sure if whether an account exists or not, don't
waste your time in trying to hack out its password. You could be going on a
wild goose chase!  You should also keep in mind that ALL bad login attempts are
kept track of and when the person logs in, he is informed of how many failed
attempts there were on his account.  If he sees 400 login failures, I am sure
that he will know someone is trying to hack his account.




THE BASICS
----------

Ok i am assuming you tried all the above defaults and managed to get yourself
into the system. Now the real FUN begins!  Ok first things first. After you log
in you will get some message about the last time you logged in etc. If this is
the first time you have logged into this system then you should note the last
login date and time and WRITE IT DOWN! This is important for several reasons.
The main one being that you want to find out if the account you have just
hacked is an ACTIVE or INACTIVE account.  The best accounts are the inactive
ones. Why?! Well the inactive accounts are those that people are not using
currently, meaning that there is a better chance of you holding onto that
account and not being discovered by the system operator.  If the account has
not been logged into for the last month or so, theres a good chance that it
is inactive.  Ok anyhow once your in, if you have a normal account with access
to DCL you will get a prompt that looks like:

$

This may vary from machine to machine but its usually the same. If you have a
weird prompt and would like a normal one, type:

$set prompt=$

If this is the first time you have hacked into this system there are a couple
of steps you should take immediately. First type:

$set control=(y,t)

This will enable your break keys (like ctrl-c) so that you can stop a file or
command if you make a mistake.  Usually ctrl-c is active, but this command will
insure that it is. (Note: in general to abort a command, or program you can
type ctrl-c or ctrl-y) Ok anyhow, the next step is to open the buffer in your
terminal then type:

$type sys$system:rightslist.dat

This will dump a file that has all the systems users listed in it.  You may
notice a lot of weird garbage characters. Don't worry about those, that is
normal.  Ok after this file ends and you get the shell prompt again ($) then
save the buffer, clear it out and leave it open. Then type:

$show logical

Ok after this file is buffered save it also.  Ok at this point you have two
files on your disk which will help you hack out MORE accounts on the system.
For now, lets find out how powerful the account you currently hacked into is.
You should type:

$set proc/priv=all

This may give you a message telling you that all your privileges were not
granted. That's ok. Now type:

$show proc/priv

This will give you a list of all the privileges your account is set up for.
Usually most user accounts only have NETMBX and TMPMBX privs.  If you have
more than these two, then it could mean that you have a nice high-level user.
Unlike UNIX which only has a distinction between user and superuser, VMS has
a whole shitload of different privileges you can gain.  The basic privs are as
follows:

PRIVILEGE      DESCRIPTION
------------------------------------------------------------------------------
NONE           no privilege at all


NORMAL PRIVS
------------
MOUNT          Execute mount volume QIO
NETMBX         Create network connections (you need this to call out!)
TMPMBX         Create temporary mailbox


GROUP PRIVS
-----------
GROUP          Control processes in the same group
GRPPRV         Group access through SYSTEM protection field


DEVOUR PRIVS
------------
ACNT           Disable accounting
ALLSPOOL       Allocate spooled devices
BUGCHK         Make bugcheck error log entries
EXQUOTA        Exceed disk quotas
GRPNAM         Insert group logical names n the name table
PRMCEB         Create/delete permanent common event flag clusters
PRMGBL         Create permanent global sections
PRMMBX         Create permanent mailboxes
SHMEM          Create/delete structures in shared memory


SYSTEM PRIVS
------------
ALTPRI         Set base priority higher that allotment
OPER           Perform operator functions
PSWAPM         Change process swap mode
WORLD          Control any process
SECURITY       Perform security related functions
SHARE          Access devices allocated to other users
SYSLCK         Lock system-wide resources


FILES PRIVS
-----------
DIAGNOSE       Diagnose devices
SYSGBL         Create system wide global sections
VOLPRO         Override volume protection


ALL PRIVS
---------
BYPASS         Disregard protection
CMEXEC         Change to executive mode
CMKRNL         Change to kernal mode
DETACH         Create detached processes of arbitrary UIC
LOG_IO         Issue logical I/O requests
PFNMAP         Map to specific physical pages
PHY_IO         Issue physical I/O requests
READALL        Possess read access to everything
SETPRV         ***  ENABLE ALL PRIVILEGES!!! ***
SYSNAM         Insert system logical names in the name table
SYSPRV         Access objects through SYSTEM protection field


Ok that's the lot of them! I will explain some of the more important privileges
later in the file.  For now, at least you can see just how powerful the account
is.  It should be noted that most accounts usually are only granted the TMPMBX
and NETMBX privileges, so if you don't have the others, don't fret too much.



GENERAL TERMINOLOGY
-------------------

    I think that i should clarify some of the basic concepts involved with
VAX/VMS operating systems before we go any further:

PROCESS: this is what is created when you log in.  The system sets aside CPU
         time and memory for you and calls it a process. Any task that is run
         in VMS is called a process.

SUBPROCESS: also known as child-process, this is just a process that was
            created by another process.

DCL    : Digital Command Language. This is the shell ($) that you are put into
         when you log into a VAX

MCR    : an alternate shell that is used (rarely) on certain accounts. Login
         prompt is a  >  as opposed to DCL which gives a  $
SHELL  : this is the '


 that you see once you are logged in. This is your
         interface with the system, where you can enter the various commands
         execute files and perform other activities.

JOB    : a process and a group of its subprocesses performing some task

SPAWN  : this is the actual command that allows you to create subprocesses
         'SPAWNING' is the act of creating subprocesses

PID    : process identification number. This is an 8 byte ID code that is
         uniquely given to each process that is created on the system.

IMAGE  : this is an EXE file that you can execute (ie run)

UIC    : User identification code. This is in two parts, namely: [group,member]
         The way this works is that users in the same group can access each
         others files through the group protection code.  However since the UIC
         MUST uniquely identify each user, the member portion separates the
         individuals in each group.  If an account does not have a different
         member number, he will NOT be put in the RIGHTSLIST database.



CONTROL KEYS
------------

 A brief note on control sequences.  Several different actions can be activated
via control sequences. They are:

CTRL-H  :delete last character
CTRL-B  :redisplay last command (can go back up to the last 20 commands issued)
CTRL-S  :pause display
CTRL-Q  :continue after pause
CTRL-Z  :*EXIT* use to break out of things such as CREATE and EDIT
CTRL-C  :*CANCEL* will exit out of most operations
CTRL-Y  :*INTERRUPT* will break out of whatever you are doing
CTRL-T  :print out statistical info about the process

NOTE: sometimes upon login, the CTRL-Y, CTRL-C keys are disabled.  To ensure
      these are enabled, issue this command upon login:

$ SET CONTROL


-------------------------------------------------------------------------------
NOTE: all the commands that are executed from DCL can be referenced from an
      online help manual.  To access this, simply type help at any '


 prompt
      This help is also available within the various utilities and programs
      such as authorize and mail. The two MOST important commands are SET and
      SHOW. These should be buffered and printed out for your own reference.
-------------------------------------------------------------------------------

FILES and DIRECTORIES
---------------------

 The directory structure of VMS is a heirarchical one similar to MS-DOS and
UNIX. Its a simple concept, and i will only briefly skim over it.  First of all
it should be noted that there may be more than one hard drive or other
mass-storage device hooked up to your system. Within each hard drive there is
the ROOT directory. This is the highest directory in the tree and is referenced
by [000000]. (this will be explained in a minute)  Within the root there are
several subdirectories. Within these subdirectories there may be files and even
further subdirectories.  The concept is quite simple, but can be difficult to
explain.  Here is a diagram to give you a rough idea of how it is set up:



                                 [000000] <--root directory
                                     !
                                     !
          +--------------------------+---------------------------------+
          !                          !                                 !
          !                          !                                 !
        [d1]                       [d2]                              [d3]
          !                          !                                 !
    +-----+--------+           +-----+-----+                  +--------+
    !     !        !           !           !                  !        !
    !     !        !           !           !              [d3.d3a]  [d3.d3b]
 [d1.da] [d1.db] [d1.dc]    [d2.d2a]   [d2.d2b]
            !                  !           !
            !                  !        +--+-----------+
       [d1.db.db1]        [d2.d2a.d2a1] !              !
                                       [d2.d2b.d2b1] [d2.d2b.d2b2]




    Hopefully this will give you some sort of an idea of how the directories
can be structured. Within each subdirectory there may be other files also. For
example to see the directory after you log in you would type:

$dir

a sample result may be:


Directory DISK$SCHOOL:[REPORTS.JOHN]

average.com;3
generate.exe;1
mail.mai;10
marks.dat;4
marks.dat;5
reportcard.dir
projects.dir

Total 7 files.

What does this tell you? The first line tells you what drive and subdirectory
you are in. The next lines are the actual files. As you can see each file has
a 3 character extension, followed by a comma and a number.  The name before the
period is the actual filename (eg. average) the 3 characters after the period
is known as the extension (eg.com) and the number after the comma refers to the
version of the file. So in this case, this is version number 3.  Any time you
modify or save a file, it automatically assigns it a version number of 1. If
file already exists on your disk, it increments the version number by 1 and
then saves it as such.  So the next time i go ahead and save the file
average.com, it would add another file to the list called average.com;4
  Special note should be taken of the files that have an extension of '.DIR'
These are not really files, but rather subdirectories.  I will show you how to
switch subdirectories in just a minute. First you should take note of the
different file extensions.  Although you can name the files anything you want
some of the more important extensions are:

TYPE      DESCRIPTION
-------------------------------------------------------------------------------
EXE       Executable IMAGE. These files are programs that can be RUN
COM       DCL SCRIPT files. These can also be executed, utilizing the @ command
DAT       DATA file. Sometimes useful things to look at.
LIS       Listing File, many times important info is in here
MAI       Mail file,  use the MAIL command to read these
DIR       DIRECTORY - not a file
JOU       Journal File, often created thru the use of other programs eg EDIT
TXT       Text Files, often hold useful information.

These are just some of the extensions you are most likely to see. The two
important ones are the EXE and COM files. These can be executed from the DCL
level. EXE files are executed via the RUN command. Eg. to run authorize.exe:

$run authorize

This will run the authorize IMAGE. Supposing there were more than one version
of authorize you could specify a version number. eg.

$run authorize.exe;4

The other type of file you can run is the COM files. These are like SCRIPT
files in UNIX or .BAT files from MS-DOS.  They are just a sequence of DCL
commands strung together that are executed when you initiate the file. To run
COM files, use the @ command. For example to run adduser.com, type:

$@adduser

The version number thing i stated for EXE files also applies for COM files.



$sd [000000]
$dir [...]*.*

Similarly you type dir [...]*.com, if you wanted just the COM files listed.
To see the contents of a file, you can use the TYPE command. For example:

$type login.com

this might type out something like:

$ sd:==set default
$ set control=(y,t)
$ set proc/name=entity
$ set term/dev=vt100
         :
         :
         :
        etc

This is great for COM files, DAT files and some of the other types, but you
will always get garbage when you type EXE files so don't bother trying those.
This is very useful for snooping around other peoples files and getting
information. Many times i have found user/passwords lying around in TXT or
LIS files left by some careless user.

 Now, how do you go about changing directories? Well, first you should set up
a shortcut.  The normal command to change directories is SET DEFAULT. For
example to change to a subdirectory called REPORTS, you would have to type:

$set default [.reports]

To make life simpler on yourself, as soon as you log in, you should type:

$sd:==set default

This defines a macro called SD that is interpreted by DCL as SET DEFAULT. You
can similarly define other 'favorite' commands to some short, easy to remember
definition.  Anyhow heres the syntax for changing directories:

SD DEVICE:[dir1.dir2.dir3....]

The device can be optionally left out, if you plan to remain in the same hard
drive. You have to then enter a '[' followed by the root directory, followed
by a period, followed by another subdirectory name etc. Eg.

$sd dub0:[cosy.users]

Suppose at this point, you were in directory cosy, subdirectory users and there
was a further subdirectory called 'info.dir'.  Rather than specify the full
pathname, you can simply type:

$sd [.info]

This will advance you one level into the info subdirectory. Remember to put the
period in front of the subdirectory. If you don't, in this case it would assume
that you were trying to reference the root directory called info.  Another
important thing to note is moving back levels in terms of subdirectories. For
example if you were in [cosy.users.info] and wanted to move back to
[cosy.users] you could type:

$sd [-]

Similarly you can put in as many hyphens (-) as you want to move back. For
example  sd [--]  would put you back to the cosy directory.

Another important thing to note about subdirectories are logical assigned
symbols. These are names assigned to certain things. For example the main
system directory is called sys$system. So to go to it you could type:

$sd sys$system

This would throw you into the system directory. Similarly you can type:

$sd sys$login

and this will put you back into the directory that you were initially in, when
you first logged in.  These symbols stand for actual device:directory
combinations.  To see the various definitions that are assigned to each process
you should type:

$show logical

This will list a whole bunch of global system equates that you can use to
access various parts of the VAX structure.  In addition to view all of your
locally defined symbols, use:

$show symbol *



FILE PROTECTION
---------------

Ok before i begin this, let me just state that whatever i say about files also
applies to directories.  There are four types of file protections. There is
SYSTEM,WORLD,GROUP and OWNER. These are briefly:

SYSTEM- All users who have group numbers 0-8 and users with physical or logical
        I/O privileges  (generally system managers, system programmers, and
        operators)
OWNER - the owner of the file (or subdirectory), isolated via their User
        Identification Code (UIC). This means the person who created the file!
GROUP - All users who have the same group number in their UICs as the owner of
        the file.
WORLD - All users who do not fall in the categories above

Each file has four types of protection within each of the above categories.
They are: Read, Write, Execute, Delete. Explanations are:

READ   - You can read the file and copy it.
WRITE  - You can modify and rename that file.
EXECUTE- You can run the file
DELETE - You can delete the file

When you create a file the default is that you have all the privileges for that
particular file. Group, world and system may only have limited privileges. This
can be changed with the set protection DCL command. For example:

$set protection=(group:rwed,world:r)/default

would set your default protection to allow other users in your group to have
full read,write,execute,delete privs to the file, and others only read access
to the file. The /default means that from now on all the files you create will
be set with this particular protection.  To change one of your own files to
some other protection you can alternatively use:

$set prot topsecret.dat /prot=(system:rwed,group:rwed,world:rwed,owner:rwed)

This would enable all users on the system to access the file 'topsecret.dat'
When specifying the protection, you do not have to list them for each of the
four groups.  You can simply choose only those thatPath: works!merk!alliant!linus!agate!ames!pacbell.com!tandem!UB.com!grafex!steveh
From: steveh@grafex.Cupertino.CA.US (Steve Harding KA6ETB)
Newsgroups: comp.bbs.waffle
Subject: Re: Forced un-join?
Message-ID: <NqgwRB1w165w@grafex.Cupertino.CA.US>
Date: Tue, 29 Sep 92 22:50:22 PDT
References: <4i5VRB1w165w@dogear.spk.wa.us>
Distribution: usa
Organization: The GRAFex Company
Lines: 15

bobk@dogear.spk.wa.us (Bob Kirkpatrick) writes:

> Use Chris Winemiller's expire (CWEXP104.ZIP). It has a 'keeper' option
> that will always retain at least one message in any group. I've been
> using it since he first issued v1.0 and it just gets better with each
> new rev level. He has a rev 1.05 in the wings, but I don't know if he
> turned it loose yet.

As a beta site for 1.05...it works...it's super.

steve

-- 
play:steveh@grafex.Cupertino.CA.US 408.252.0578     work:harding@nas.nasa.gov
              A prince trapped in the body of a dirty old man.
emiller's expire (CWEXP104.ZIP). It has a 'keep                   ?D???'@ Z0IF???A?D??II@?R?BP ?N0???~[?/[?r}????n?tp?$?????r?|?"???????.??<?r????'?r?,??Uz??(????{??}???]???*?B??????X????R??qX??N?N????H?M?$?????(/?V??)	???~?/?U??vL??x???K?!>?x|???y??H????}??7???(?N+P`??(? ?-`?
P???5????????k???"??@?8?.=?~sPg????)[?8??@0?J??,~Hr?!0?J????
+?!?s?q
?R??>[??.?""`????'P?Yk?g??r?? @??j???""???,?????%-.0?K??|???????9??i?(X??/??L??i??????)??l@????MIp??G?????b????g??b??bZ???????u?J??g??!`?ZI????v??uz?P??C(?E?bp??????c0?????????x??|???(????????????i???]?g??j??'/?X???x?P??C(?E?bp?R???C??7
?8:?IM?@
??J?kZ3?Z??2?\!??,??f?????-??????Xd0?BI?:?O<P??87 ?E@C(?E(?A 6??
#a]?z??9??.@?"??.`?,?L????????D?l??P??%-?????E{??? 9?????\??(??g??h????(??i??9?
P?L(??X?*N@??????????g???.??g?x0?u<????!??
P??X??%???????g???~??~}(P?2???{?b?????%????g???n?x@?
P?
P?
P??	??????%
??)K??X?8?Ppf
"@"????O??? ?&k?w??  i???["??z?????c0?{??	??uz?P??C(?E?bp?m^ADATA        ??C?0DIRS        ?XB$%?VALIDATE    ?~C&&DOOM    BBS ????+ENTRY       y??[EXCUSE      f?0?CFAILED      &?w??FEEDBACK    ?+??)th SMTP 
	(5.61/UUNET-internet-primary) id AA03070; Sat, 19 Sep 92 11:38:51 -0400
Received: by nyx.cs.du.edu (4.1/SMI-4.1)
	id AA06069; Fri, 18 Sep 92 15:06:39 MDT
From: ahawks@nyx.cs.du.edu (tao master of existential angst)
Message-Id: <9209182106.AA06069@nyx.cs.du.edu>
X-Disclaimer: Nyx is a public access Unix system run by the University
	of Denver.  The University has neither control over nor
	responsibility for the opinions or correct identity of users.
Subject: Re: The real deal on Blade Runner
To: future@nyx.cs.du.edu
Date: Fri, 18 Sep 92 15:06:35 MDT
In-Reply-To: <9209180311.AA21724@csd4.csd.uwm.edu>; from "Strider" at Sep 17, 92 10:11 pm
X-Mailer: ELM [version 2.3 PL11]

Strider
|
|I think we might all consider ending this thread and taking the time to read
|the P.K. Dick book _Do_Androids_Dream_of_Electric_Sheep?_.  From what I've
|been told it is heads and tails better than the movie, not to mention
|completely different.

Well, any time someone suggests people "read the book" I get a little
mad.  Rarely does it occur that the author of the movie is the author
of the book, thus the two can not be compared.  I'm sure Ridley Scott
can not read to the fullest Phillip K Dick's mind, nor should we want
him to make a movie based completely on the book or Dick's vision.  

I just think movies and books are completely seperate works of art
that can't really be compared.  To me it might be comprable to seeing
a Monet painting and then reading a book about the place that is the
subject of the painting in real life.  Just enjoy the painting for
what it is, and if you want to read the book, that's certainly ok too,
but don't compare 'em - that's my view.

|Steve J. White		  |"Either there's something wrong with me,	  |
|aragorn@csd4.csd.uwm.edu  | or there's something wrong with the universe."|
|skeptic@large@9600bps	  |	- Dr. Crusher on ST:TNG			  |

-- 
 ahawks@nyx.cs.du.edu   FutureCulture E-List: [future-request@nyx.cs.du.edu]
 andy (hawkeye)         new edge, technoculture, cyberpunk, virtual reality,
                        raves, etc. Home of the famous :) FutureCulture FAQ!
 
From merk!nyx.cs.du.edu!ahawks Sat Sep 19 23:27:35 1992 remote from works
Received: by works.uucp (1.65/waf)
	via UUCP; Sat, 19 Sep 92 23:26:39 EDT
	for phantasm
Received: by merk.merk.com (/\==/\ Smail3.1.25.1 #25.17)
	id <m0mWHxL-0001pNC@merk.merk.com>; Sat, 19 Sep 92 23:27 EDT
Received: from nyx.cs.du.edu by relay1.UU.NET with SMTP 
	(5.61/UUNET-internet-primary) id AA03068; Sat, 19 Sep 92 23:25:31 -0400
Received: by nyx.cs.du.edu (4.1/SMI-4.1)
	id AA07828; Sat, 19 Sep 92 19:53:43 MDT
From: ahawks@nyx.cs.du.edu (morrissey's therapist)
Message-Id: <9209200153.AA07828@nyx.cs.du.edu>
X-Disclaimer: Nyx is a public access Unix system run by the University
	of Denver.  The University has neither control over nor
	responsibility for the opinions or correct identity of users.
Subject: Mindless Babble for the Terminally Bored
To: future@nyx.cs.du.edu
Date: Sat, 19 Sep 92 19:53:41 MDT
X-Mailer: ELM [version 2.3 PL11]

If you have nothing else better to do this weekend than watch CNN,
look for their "FutreWatch" segment...Featured some pretty interesting
stuff including:

--a snippet about the new Blade Runner (PS- look for a scene that
shows Rachael on the streets of LA - I don't think this was in either
release of the movie....)

--a little thing about Sneakers, talking about (if I remember right)
the plausibility of breaking the code (DES, I assume), and ummm, the
possibility of getting government information via computer or
something like that...

--and a very interesting and disturbing little piece about a company
that seeks to put a sort of universal price rate on all
information...I only caught the last portion of this, but it seemed
very disturbing to me...The impression I got from the representative
of the corporation was that someday he hoped to see a sort of "cost
this session" applied to *any* information retrieval via computer...
I hope I see this again so I can confirm this and get more accurate
info...Very scary thought that information will not be a free or
almost-free or as-close-to-free-as-you-can-get in the coming
information age....People are already starting to jack up the price of
everything that you could possibly want to knw....
-- 
 ahawks@nyx.cs.du.edu   FutureCulture E-List: [future-request@nyx.cs.du.edu]
 andy (hawkeye)         new edge, technoculture, cyberpunk, virtual reality,
                        raves, etc. Home of the famous :) FutureCulture FAQ!
 
From merk!nyx.cs.du.edu!ahawks Sun Sep 20 14:29:11 1992 remote from works
Received: by works.uucp (1.65/waf)
	via UUCP; Sun, 20 Sep 92 14:53:30 EDT
	for phantasm
Received: by merk.merk.com (/\==/\ Smail3.1.25.1 #25.17)
	id <m0mWW1g-0001hUC@merk.merk.com>; Sun, 20 Sep 92 14:28 EDT
Received: from nyx.cs.du.edu by relay1.UU.NET with SMTP 
	(5.61/UUNET-internet-primary) id AA12908; Sun, 20 Sep 92 14:26:34 -0400
Received: by nyx.cs.du.edu (4.1/SMI-4.1)
	id AA04001; Sun, 20 Sep 92 11:18:05 MDT
From: ahawks@nyx.cs.du.edu (morrissey's therapist)
Message-Id: <9209201718.AA04001@nyx.cs.du.edu>
X-Disclaimer: Nyx is a public access Unix system run by the University
	of Denver.  The University has neither control over nor
	responsibility for the opinions or correct identity of users.
Subject: interesting p h i l e (fwd)
To: future@nyx.cs.du.edu
Date: Sun, 20 Sep 92 11:18:01 MDT
X-Mailer: ELM [version 2.3 PL11]

Morpheus writes:

Thought you might want to check this out, maybe send it out to the list if you
think it's decent...


--------------------------- begin digital.txt -------------------------------

Unauthorised Access UK	0636-708063  10pm-7am  12oo/24oo

X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X
X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X
X/\/                                                                    \/\X
X\/X                        - Digital Underground -                     X\/X
X/\X      Story by Mark Bennett. Published in i-D Technology Issue      X/\X
X\/X                                                                    X\/X
X/\X            Transcribed by Phantasm. 12th September 1992            X/\X
X\/X                                                                    X\/X
X/\X    Unauthorised Access UK. Online 10.00pm-7.00am. +44-636-708063   X/\X
X\/\                                                                    /\/X
X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X
X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X

They've got a file on you. It's on computer. And that computer is connected
to a global network. Who's going to stand up for our civil liberties in the
digital era? Can the anarchic activities of hackers and cyberpunks make them
freedom fighters for the information age?
 
CYBERPUNK
TECHNOLOGY

Cyberspace, the Net, Non-Space, or the Electronic Frontier call it what you
will, but it's out there now, spread across the world like an opulent
immaterial spider's web, growing as each new computer, telephone or fax
machine is plugged in, as satellites close continental divides, hooking
independent phone systems together. It's almost a living entity - the
backbone is the various telephone exchanges, the limbs the copper and fibre-
optic links. Increasingly the world is shifting to this unseen plane. Your
earnings, your purchasing patterns and your poll tax records are processed
there. You may not realise it exists, but it's part of everyday life. As
John Barlow, writer and electronic activist puts it, "Cyberspace is the place
you are when you're on the telephone."

As life moves to this electronic frontier, politicians and corporations are
starting to exert increasing control over the new digital realm, policing
information highways with growing strictness. Before we even realise we're
there, we may find ourselves boxed into a digital ghetto, denied simple
rights of access, whiSubject: Two birds with one can of sauce.
From: ferret (Dave Ferret)
Level SYSOP: Work you Damn insidious machine!
Message-ID: <V7RgeB3w164w@works.UUCP>
Date: Sun, 12 Jan 92 17:19:18 EST

First in response to a /reports section -  
    
    For a long time, there was a section for school reports, and I just 
haven't had a chance to put it back up here, we have a mere dozen or so 
reports, all lacking the pertinant information you wanted, but hey, you have 
to figure if YOU think its good, then thats all that counts. I'll create a 
/tfiles/reports right now for you to start out and I'll dump the other 
reports in there when I get some time.


As for Illegal/illicit material on the works,and what can we get caught for?

     Why don't I quote something for you (From The Department of Criminal 
Justice on Publications - Which I believe extends to text publications) 

This is taken from a Publication Denial Notice (2600Mag, Winter 90-91)

 (a) Publication contains contraband.
 
 (b) Publication contains information regarding the manufacture of 
     explosives, weapons or drugs.
 
 (c) Publication contains material that a reasonable person would construe 
     as written solely for the purpose of communicating information designed 
     to achieve a breakdown of prisons through inmate disruption such as 
     strikes or riots. 
 
 (d) A specific factual determination has been made that the publication is 
     detrimental to prisoners rehabilitation because it would encourage 
     deviate criminal sexual behavior.

                  ...and finally...

  (e) Publication contains material on the setting up and operation or 
      criminal schemes or how to avoid detection of criminal schemes by 
      lawful authorities charged with the responsibility for detecting 
      such illegal activity. 
 
--- End Document quotes ---
                                                                    _     _
 Now considering our archives, we could very possibly be cited for =_EVERY_= 
item on there, except that we _allegedly_ are allowed to have these items 
and have our rights to have them protected by the First Amendment to 
garuantee FREE SPEECH. But thats something for you to chew on for a while.


























































































































































































































































































nge public keys,
and maybe even get them signed. Is anyone else interested in
meeting sometime during the conference for this purpose?

This would at least be slightly more secure than trusting a
posted public key. Of course, whether you believe that it
really is me is a different story. I'm presenting a paper that
I wrote with a co-author that I've never met. So I can't know
that even he is who he claims - or that I am who I claim :-)

Please Email or reply via post. Even if we simply meet to talk
about PGP over a beer, it could be worthwhile.

Pat


Pat Farrell,      Grad Student                       pfarrell@cs.gmu.edu
Department of Computer Science, George Mason University, Fairfax, VA
PGP Public key available via finger           #include standard.disclaimer
#! rnews 808
Newsgroups: comp.bbs.waffle
Path: merk!alliant!linus!agate!spool.mu.edu!wupost!zaphod.mps.ohio-state.edu!pacific.mps.ohio-state.edu!linac!att!att!fang!gator!towers!bluemoon!grant
From: grant@bluemoon.rn.com (Grant DeLorean)
Subject: Re: Multiple modems?
Message-ID: <1992Oct3.143120.16476@bluemoon.rn.com>
Organization: Blue Moon
References: <2ACCB10E.3587@news.service.uci.edu>
Date: Sat, 3 Oct 92 14:31:20 GMT
Lines: 12

rmyers@dec5200.acs.uci.edu (Richard Myers) writes:

>I want to hang 2000 modems off one waffle box (DOS).

 Well folks, Mr. Dell will be retiring on the check for this one so he
should have plenty of time for Waffle enhancements... ;-}

-- 
\   Grant DeLorean  - IHMSA & NRA Life Member -  (grant@bluemoon.use.com)   /

   Talk sense to a fool and he calls you foolish.  -- Euripides

#! rnews 1825
Newsgroups: alt.drugs
Path: merk!alliant!linus!agate!spool.mu.edu!sdd.hp.com!elroy.jpl.nasa.gov!news.claremont.edu!jarthur.claremont.edu!jrhine
From: jrhine@jarthur.claremont.edu (Jared Rhine)
Subject: Nitrous : mechanism
Message-ID: <1992Oct3.215904.8289@muddcs.claremont.edu>
Sender: news@muddcs.claremont.edu (The News System)
Organization: Harvey Mudd College, Claremont, CA 91711
Date: Sat, 3 Oct 1992 21:59:04 GMT
Lines: 26

Come on, don't tell me there isn't a single scuba diver out there who
reads this group?  The mechanism of nitrous oxide is same as for
nitrogen narcosis, commonly called rapture of the deep.  When a diver
goes below about 80 ft, they are in "danger" of getting this effect
(actually I know people who go diving JUST for that effect).  The
nitrous buzz is a function of the amount of nitrogen disolved in your
fatty tissues.  You ongas at an approximately exponetial rate and
offgas at an approximately linear rate.  The nitrogen in your fatty
tissues interferes with neuron transmission.  It is indeed inert to
the body, just hangs around and blocks.  It is NOT a function on
oxygen deprevation; divers are still breathing the same amount of
oxygen at those depths.  When a diver comes up, the nitrogen offgases
safely as it is under a lower pressure (divers breath gases at ambient
pressure which at 100 ft is something like 4 atms; when you come up,
you are under lower pressure so the nitrogen comes out).

So now you can go find another source, go look up nitrogen narcosis in
a scuba book.

-- Jared

-- 
             _   _   _   _   _   _   _   _   _   _   _   _   _   _  _
            / \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \/ \
---------> <  Jared Rhine | Student, Philosopher, Zymurgy Specialist  >
            \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/
#! rnews 568
Newsgroups: alt.bbs.internet
Path: merk!alliant!linus!agate!spool.mu.edu!wupost!news.miami.edu!cybernet!news
From: garth@cybernet.cse.fau.edu (donna schweikert)
Subject: internet
Message-ID: <s383RB1w165w@cybernet.cse.fau.edu>
Sender: news@cybernet.cse.fau.edu
Organization: Cybernet BBS, Boca Raton, Florida
Date: Sat, 3 Oct 1992 21:26:27 GMT
Lines: 6

i would like to know if there is anyway of telneting out of the state
of michigan without having to go thru merit.
i have accounts in other states, is there a way the internet allows
for this.
thanx 
garth (donna)
#! rnews 1087
Newsgroups: alt.locksmithing
Path: merk!alliant!linus!agate!spool.mu.edu!sdd.hp.com!think.com!rpi!newsserver.pixel.kodak.com!psinntp!psinntp!cubetech.com!imladris!andrew
From: andrew@cubetech.com (Andrew Loewenstern)
Subject: Re: auto club locks
Message-ID: <1992Oct2.205731.25213@cubetech.com>
Organization: Cube Technologies, Inc.
References: <1992Sep24.150843.9850@engage.pko.dec.com> <80833@ut-emx.uucp>
Distribution: usa
Date: Fri, 2 Oct 1992 20:57:31 GMT
Lines: 14

In article <80833@ut-emx.uucp> jerry@ccwf.cc.utexas.edu (Jeremy Porter) writes:
>Now maybe the car is less likely to be stolen if it has a club on it, but
>I doubt it makes much difference to a "professional" car thief.

Nothing will stop someone if they want it badly enough.  The trick
then is to drive a piece of shit car like I do.   ;-)


andrew
-- 
andrew@cubetech.com     | "We shall not cease from exploration
Andrew Loewenstern      |  And the end of our exploring
Cube Technologies, Inc. |  Will be to arrive where we started
                        |  And know the place for the first time." -T.S. Eliot
#! rnews 1279
Path: merk!alliant!linus!agate!spool.mu.edu!uwm.edu!linac!att!cbnewsi!cbnewsh!att-out!rutgers!psuvax1!postscript.cs.psu.edu!fenner
From: fenner@postscript.cs.psu.edu (Bill Fenner)
Newsgroups: comp.bbs.waffle
Subject: Re: UDFB 1.0
Message-ID: <BvKG2F.Bxu@cs.psu.edu>
Date: 3 Oct 92 22:06:15 GMT
References: <26wZRB1w165w@eastwind.mcds.com> <w492RB1w165w@micromed.com>
Sender: news@cs.psu.edu (Usenet)
Organization: Penn State Computer Science
Lines: 21
Nntp-Posting-Host: postscript.cs.psu.edu

In article <w492RB1w165w@micromed.com> system@micromed.com (Duane Davis) writes:
|You could have saved yourself some time. I wrote and released a program
|that does exactly the same thing over a month ago.

And then, of course, there's the perl scripts that I posted to alt.bbs.waffle
last year, and the usenet-file updator that added group descriptions
automagically, so you can get things like

(public) 5:53p (891 left) (?=help) : comp.dcom.modems

comp.dcom.modems (messages from 16475 to 16575)
Data communications hardware and software. 

(comp.dcom.modems) 5:54p (891 left) (?=help) : echo %B
Data communications hardware and software. 
(comp.dcom.modems) 5:54p (890 left) (?=help) : 

I can repost or make the scripts available via mail-server if anyone is
interested.

  Bill
#! rnews 16979
Organization: Senior, Physics, Carnegie Mellon, Pittsburgh, PA
Path: merk!alliant!linus!agate!ames!haven.umd.edu!darwin.sura.net!udel!rochester!cantaloupe.srv.cs.cmu.edu!crabapple.srv.cs.cmu.edu!andrew.cmu.edu!cc4b+
Newsgroups: alt.fan.mike-jittlov
Message-ID: <YenVTKW00UhWA3xLEH@andrew.cmu.edu>
Date: Sat,  3 Oct 1992 17:59:50 -0400 
From: Christopher Brian Cox <cc4b+@andrew.cmu.edu>
Subject: Re: Bitmapped Wizard?
In-Reply-To: <BvJ6A1.8Bs@world.std.com>
References: <1992Oct3.030540.16689@ccu.umanitoba.ca>
	<BvJ6A1.8Bs@world.std.com>
Lines: 599

Here's a version I made from one of the bitmaps that came across the net
a while back.  Freehand version is available upon (limited I hope)
request.

Chris

ps. anybody remember the 20page square KGB logo we hung off Wean hall?
pps. I wish the Freehand EPS header was smaller


%!PS-Adobe-2.0 EPSF-1.2
%%Creator: FreeHand 3.1
%%Title: Wizard Logo (Freehand)
%%CreationDate: 10/3/92 5:58 PM
%%BoundingBox: 30.8218 154.9947 578.6112 702.7841
%%DocumentProcSets: FreeHand_header 3 1
%%DocumentSuppliedProcSets: FreeHand_header 3 1
%%ColorUsage: Color
%%FHPathName: Dora:Wizard Logo (Freehand)
%%EndComments
%%BeginProcSet: FreeHand_header 3 0
/FHIODict 30 dict def
FHIODict begin
/bdf{bind def}bind def
/d{setdash}bdf
/h{closepath}bdf
/H{}bdf
/J{setlinecap}bdf
/j{setlinejoin}bdf
/M{setmiterlimit}bdf
/n{newpath}bdf
/N{newpath}bdf
/q{gsave}bdf
/Q{grestore}bdf
/w{setlinewidth}bdf
/u{}bdf
/U{}bdf
/sepdef{
dup where not
{
FreeHandSepDict
}
if
3 1 roll exch put
}bdf
/`
{false setoverprint
end %. FreeHandDict
/-save0- save def
pop pop pop pop pop
concat
userdict begin
/showpage {} def
0 setgray 0 setlinecap 1 setlinewidth
0 setlinejoin 10 setmiterlimit [] 0 setdash newpath
/languagelevel where {pop languagelevel 1 ne you want changed from your
default.



EDITING FILES
-------------

  An important utility that all VAX hackers should be familiar with is the EDT
text editor. To call it up, use the EDIT DCL command. ie:

$edit [filename]

This will invoke the EDIT/EDT text editor.  The [filename] refers to the file
that you want to edit.  If the file does not exist, it is created at this point.
The EDT editor does not provide a default file type when creating files, so if
you do not specify one, it will leave it as NULL.  It should be noted that there
is more than just the EDT editor, but when you type in EDIT, the default is
/EDT.  Basically it is an editor that you can use to create/modify COM or any
other type of text files.

 After the editor is invoked, it keeps track of everything that you enter in a
JOU file.  In case of lost carrier or some other accident, you can recover what
you had by specifying the /RECOVER qualifier. For example:

$edit/recover memo.dat

This would take the last copy of memo.dat, load it into memory, then process
your last JOU file, updating it to virtually exactly where you were before you
got cut off.  Journaling is automatically defaulted to ON, but can be turned
off with the /NOJOURNAL qualifier.  For a description of what all the qualifiers
are, and what they do, refer to the online HELP manual.

 Ok here is a list of the basic commands you can perform in the EDT editor:


--------------------------------------------------------------------------------

X   (where X = line number)............show line X only
X:Y (where X,Y = line numbers).........show line X through line Y
A,B,C,D (a,b,c,d = line numbers).......list lines A,B,C,D
X:e ...................................list from X to end
T W ...................................TYPE WHOLE. List ALL of the text lines
S/string1/string2/W....................substitute ALL occurrences of string1
                                       for string2 as they occur from current
                                       line number downwards
"string" ..............................search for first occurrence of string
                                       from current line downwards
T A "string" ..........................type all occurrences of string from
                                       current line downwards
X:Y a "string" ........................search for occurrences of string within
                                       range denoted by X through Y
D X ...................................Delete line X
D X:Y .................................Delete line X through Y, inclusively
I .....................................insert a line
I X ...................................insert from line X
M X:Y to Z ............................move lines X through Y to line Z
RES ...................................resequence line numbers
RES/SEQ:X:10 ..........................resequence from line X in intervals of 10
R X ...................................replace from line X. This deletes the
                                       current line and automatically goes into
                                       insertion mode.
EXIT ..................................leave the editor, and SAVE the current
                                       text.
QUIT ..................................leave the editor and DO NOT SAVE the
                                       current text.

--------------------------------------------------------------------------------

A sample editing session is shown:

$edit lame.txt



     hi this is just some bullshit text to test out how this EDIT program
     works.  Oh well, easy enough.  bye!

     <hit ctrl-z>



$type lame.txt

 hi this is just some bullshit text to test out how this EDIT program
 works.  Oh well, easy enough.  bye!

$del lame.txt;*

COMMANDS
--------

In this section i will outline some of the more important commands that you can
issue from the DCL level. This is not meant to be a complete guide. I will
merely point out some of the more important commands and a very brief
description. Proper help can be obtained from the online HELP facility.


NOTE: It should be noted that each of the following commands may have further
----- qualifiers that you can specify. You should check up on these from the
      online help also.


@               -Lets you execute COM script files
ACCOUNTING      -allows you to view and edit system accounting data that keeps
                 track of what system time you have racked up.
ANALYZE         -lets you view the contents of OBJ files in HEX/ASCII format.
ANALYZE/SYSTEM  -Invokes the SDA. VERY VERY USEFUL!! Allows you to view other
                 running processes, their type-ahead buffers etc.
APPEND          -appends the contents of file1 to file2
ATTACH          -allows you to attach yourself to one of your subprocesses
CLOSE           -closes a file that was opened for input/output via OPEN
CONTINUE        -continue a process that you have aborted with control-y
COPY            -copy file1 to file2. You can specify full pathnames, with
                 device and subdirectory. If you want to copy it to your home
                 directory just use sys$login as your 'TO' file.
CREATE          -create a text file of any type. Eg. you want to create a
                 simple COM file or perhaps a letter to another hacker on the
                 system. (you shouldn't be using MAIL to send messages!)
CREATE/DIR      -If you want to create a subdirectory
DELETE          -delete a filename. Remember to specify a version number when
                 you are deleting a file or it wont work.eg. del garbage.com;1
DELETE/INTRUSION_RECORD -gets rid of the failed password attempts
DIFFERENCES     -compares two files and notifies you of their differences
DIRECTORY       -get a directory of the files. Various qualifiers can be chosen
DUMP            -get a hex/ascii file dump
EDIT/EDT        -invokes the VAX EDT interactive text editor
EXAMINE         -view the contents of virtual memory
HELP            -ONLINE HELP MANUAL. REFER TO IT OFTEN!
LINK            -link object files into EXE files that you can run
LOGOUT          -the proper way to terminate a session
PHONE           -Allows you to chat with another user on the system. It is not
                 recommended that you use this, except with fellow hackers.
RENAME          -rename a file or directory
RUN             -lets you execute EXE files
SET CONTROL     -disables/enables interrupts via ctrl-y/ctrl-c
SET DEFAULT     -change directories
SET HOST        -allows you to connect to another mainframe
SET PASSWORD    -change the password of your account
SET PROCESS     -change the characteristics of your process
SET PROMPT      -change the prompt ($)
SET TERMINAL    -change your terminal characteristics
SHOW ACCOUNTING -show the current security/accounting enabled
SHOW AUDIT      -show SECURITY enabled
SHOW DEFAULT    -see your current directory. (Like PWD in UNIX)
SHOW DEVICES    -check out the system setup
SHOW INTRUSION  -view the contents of the breakin database
SHOW LOGICAL    -current logical name assignments
SHOW NETWORK    -lists all the available nodes that you can connect to
SHOW PROCESS    -View your process settings
SHOW PROTECTION -show the default protection you have set
SHOW SYSTEM     -useful to see the running processes
SHOW TERMINAL   -display your terminal characteristics
SHOW USERS      -see who else is logged in.
SPAWN           -spawn a subprocess
STOP            -kill off a subprocess
TYPE            -view a file


  This should give you a general overview of some of the more important
commands that you can use.  It would be impossible for me to list ALL the
commands, and their descriptions, so i suggest that you go through the online
HELP facility and familiarize yourself with the syntax of some these commands.


HACKING
-------

Up to this point i have mainly discussed the basic concepts involved with VMS.
By now you should be familiar and comfortable with the various {false setstrokeadjust}if}if
} bdf
/~
{end
-save0- restore
FreeHandDict begin
}bdf
/FreeHandDict 191 dict def
FreeHandDict begin
/currentpacking where{pop true setpacking}if
/xdf{exch def}bdf
/ndf{1 index where{pop pop pop}{dup xcheck{bind}if def}ifelse}bdf
/min{2 copy gt{exch}if pop}bdf
/max{2 copy lt{exch}if pop}bdf
/isLino statusdict /product get (Lino) anchorsearch{pop pop true}{pop
false}ifelse def
/dr{transform .25 sub round .25 add
exch .25 sub round .25 add exch itransform}bdf
/C{dr curveto}bdf
/L{dr lineto}bdf
/m{dr moveto}bdf
/printerRes
gsave
matrix defaultmatrix setmatrix
72 72 dtransform
abs exch abs
max
grestore
def
/maxsteps 256 def
/calcgraysteps {
currentscreen pop exch 
printerRes exch div exch
2 copy
sin mul round dup mul
3 1 roll
cos mul round dup mul
add 1 add
dup maxsteps gt {pop maxsteps} if
} bdf
/bottom -0 def
/delta -0 def
/frac -0 def
/left -0 def
/numsteps -0 def
/numsteps1 -0 def
/radius -0 def
/right -0 def
/top -0 def
/xt -0 def
/yt -0 def
/df currentflat def
/tempstr 1 string def
/clipflatness currentflat def
/inverted?
0 currenttransfer exec .5 ge def
/level2 
/languagelevel where {pop languagelevel 1 ne}{false}ifelse def
/colorexists
level2
{
statusdict/processcolors known
{statusdict/processcolors get exec}{1}ifelse
4 eq def
}
{systemdict/setcmykcolor known def}
ifelse
/tc1 [0 0 0 1] def
/tc2 [0 0 0 1] def
/fc [0 0 0 1] def
/sc [0 0 0 1] def
/concatprocs{
/packedarray where
{pop dup type /packedarraytype eq 2 index type /packedarraytype eq
or}{false}ifelse
{
/proc2 exch cvlit def/proc1 exch cvlit def
proc1 aload pop proc2 aload pop
proc1 length proc2 length add packedarray cvx
}
{
/proc2 exch cvlit def/proc1 exch cvlit def
/newproc proc1 length proc2 length add array def
newproc 0 proc1 putinterval newproc proc1 length proc2 putinterval
newproc cvx
}ifelse
}bdf
/storerect{/top xdf/right xdf/bottom xdf/left xdf}bdf
/rectpath{newpath left bottom m left top L
right top L right bottom L closepath}bdf
/i{dup 0 eq
{pop df dup}
{dup} ifelse
/clipflatness xdf setflat
}bdf
version cvr 38.0 le
{/setrgbcolor{
currenttransfer exec 3 1 roll
currenttransfer exec 3 1 roll
currenttransfer exec 3 1 roll
setrgbcolor}bdf}if
/gettint{0 get}bdf
/puttint{0 exch put}bdf
/vms {/vmsv save def} bdf
/vmr {vmsv restore} bdf
/vmrs{vmsv restore /vmsv save def}bdf
/eomode{
{/filler /eofill load def /clipper /eoclip load def}
{/filler /fill load def /clipper /clip load def}
ifelse
}bdf
/CD{/NF exch def{exch dup/FID ne 1 index/UniqueID ne and{exch NF 3 1 roll put}
{pop pop}ifelse}forall NF}bdf
/MN{1 index length/Len exch def
dup length Len add string dup
Len 4 -1 roll putinterval dup 0 4 -1 roll putinterval}bdf
/RC{4 -1 roll /ourvec xdf 256 string cvs(|______)anchorsearch
{1 index MN cvn/NewN exch def cvn
findfont dup maxlength dict CD dup/FontName NewN put dup
/Encoding ourvec put NewN exch definefont pop}{pop}ifelse}bdf
/RF{dup FontDirectory exch known{pop 3 -1 roll pop}{RC}ifelse}bdf
/FF{dup 256 string cvs(|______)exch MN cvn dup FontDirectory exch known
{exch pop findfont 3 -1 roll pop}{pop dup findfont dup maxlength dict CD
dup dup
/Encoding exch /Encoding get 256 array copy 7 -1 roll {3 -1 roll dup 4
-2 roll put}forall put definefont}ifelse}bdf
userdict begin /BDFontDict 20 dict def end
BDFontDict begin
/bu{}def
/bn{}def
/setTxMode{av 70 ge{pop}if pop}def
/gm{m}def
/show{pop}def
/gr{pop}def
/fnt{pop pop pop}def
/fs{pop}def
/fz{pop}def
/lin{pop pop}def
end
/MacVec 256 array def
MacVec 0 /Helvetica findfont
/Encoding get 0 128 getinterval putinterval
MacVec 127 /DEL put MacVec 16#27 /quotesingle put MacVec 16#60 /grave put
/NUL/SOH/STX/ETX/EOT/ENQ/ACK/BEL/BS/HT/LF/VT/FF/CR/SO/SI
/DLE/DC1/DC2/DC3/DC4/NAK/SYN/ETB/CAN/EM/SUB/ESC/FS/GS/RS/US
MacVec 0 32 getinterval astore pop
/Adieresis/Aring/Ccedilla/Eacute/Ntilde/Odieresis/Udieresis/aacute
/agrave/acircumflex/adieresis/atilde/aring/ccedilla/eacute/egrave
/ecircumflex/edieresis/iacute/igrave/icircumflex/idieresis/ntilde/oacute
/ograve/ocircumflex/odieresis/otilde/uacute/ugrave/ucircumflex/udieresis
/dagger/degree/cent/sterling/section/bullet/paragraph/germandbls
/registered/copyright/trademark/acute/dieresis/notequal/AE/Oslash
/infinity/plusminus/lessequal/greaterequal/yen/mu/partialdiff/summation
/product/pi/integral/ordfeminine/ordmasculine/Omega/ae/oslash
/questiondown/exclamdown/logicalnot/radical/florin/approxequal/Delta/guillemotl
eft
/guillemotright/ellipsis/nbspace/Agrave/Atilde/Otilde/OE/oe
/endash/emdash/quotedblleft/quotedblright/quoteleft/quoteright/divide/lozenge
/ydieresis/Ydieresis/fraction/currency/guilsinglleft/guilsinglright/fi/fl
/daggerdbl/periodcentered/quotesinglbase/quotedblbase
/perthousand/Acircumflex/Ecircumflex/Aacute
/Edieresis/Egrave/Iacute/Icircumflex/Idieresis/Igrave/Oacute/Ocircumflex
/apple/Ograve/Uacute/Ucircumflex/Ugrave/dotlessi/circumflex/tilde
/macron/breve/dotaccent/ring/cedilla/hungarumlaut/ogonek/caron
MacVec 128 128 getinterval astore pop
/fps{
currentflat 
exch 
dup 0 le{pop 1}if
{
dup setflat 3 index stopped
{1.3 mul dup 3 index gt{pop setflat pop pop stop}if}
{exit}
ifelse
}loop
pop setflat pop pop
}bdf
/fp{100 currentflat fps}bdf
/clipper{clip}bdf
/W{/clipper load 100 clipflatness fps}bdf
end%. FreeHandDict
end%. FHIODict
%%EndProcSet
%%EndProlog
%%BeginSetup
FHIODict begin
FreeHandDict begin
30.8218 154.9947 578.6112 702.7841 storerect rectpath clip newpath
/onlyk{false}ndf
/ccmyk{dup 5 -1 roll sub 0 max exch}ndf
/setcmykcolor{1 exch sub ccmyk ccmyk ccmyk pop setrgbcolor}ndf
/setcmykcoloroverprint{4{dup -1 eq{pop 0}if 4 1 roll}repeat setcmykcolor}ndf
/findcmykcustomcolor{5 /packedarray where{pop packedarray}{array astore
readonly}ifelse}ndf
/setcustomcolor{exch aload pop pop 4{4 index mul 4 1 roll}repeat
setcmykcolor pop}ndf
/setseparationgray{1 exch sub dup dup dup setcmykcolor}ndf
/setoverprint{pop}ndf
/currentoverprint false ndf
/colorimage{pop pop
[5 -1 roll/exec cvx 6 -1 roll/exec cvx 7 -1 roll/exec cvx 8 -1 roll/exec cvx
/cmykbufs2gray cvx]cvx image}
%. version 47.1 on Linotronic of Postscript defines colorimage
incorrectly (rgb model only)
version cvr 47.1 le isLino and{userdict begin bdf end}{ndf}ifelse
/customcolorimage{
colorexists
{
aload pop pop 4 array astore
setimagecmyk
currentcolortransfer
{ik mul ik sub 1 add}concatprocs 4 1 roll
{iy mul iy sub 1 add}concatprocs 4 1 roll
{im mul im sub 1 add}concatprocs 4 1 roll
{ic mul ic sub 1 add}concatprocs 4 1 roll
setcolortransfer
/magentabuf 0 string def
/yellowbuf 0 string def
/blackbuf 0 string def
{invbuf dup length magentabuf length ne
{dup length dup dup
/magentabuf exch string def
/yellowbuf exch string def
/blackbuf exch string def}if
dup magentabuf copy yellowbuf copy blackbuf copy pop}concatprocs
{magentabuf}{yellowbuf}{blackbuf}true 4 colorimage
}
{
pop image
}
ifelse
}ndf
/separationimage{image}ndf
/newcmykcustomcolor{6 /packedarray where{pop packedarray}{array astore
readonly}ifelse}ndf
/inkoverprint false ndf
/setinkoverprint{pop}ndf
/overprintprocess{pop}ndf
/setspotcolor
{spots exch get 0 5 getinterval exch setcustomcolor}ndf
/currentcolortransfer{currenttransfer dup dup dup}ndf
/setcolortransfer{systemdict begin settransfer end pop pop pop}ndf
/getcmyk {
dup length 4 eq
{aload pop}
{aload pop spots exch get 0 4 getinterval aload pop 4
{4 index mul 4 1 roll}repeat 5 -1 roll pop} ifelse
}bdf
/setimagecmyk{
getcmyk/ik xdf /iy xdf /im xdf /ic xdf
}ndf
/autospread{pop}ndf
/fhsetspreadsize{pop}ndf
/fhsetspreadallow{pop}ndf
/strokeopf false def
/fillopf false def
/R{0 ne /strokeopf xdf}bdf
/O{0 ne /fillopf xdf}bdf
/filler{fill}bdf
/F{fc fhsetcolor fillopf setoverprint false autospread
gsave /filler load fp grestore false setoverprint}bdf
/f{closepath F}bdf
/S{sc fhsetcolor strokeopf setoverprint true autospread {stroke}fp false
setoverprint}bdf
/s{closepath S}bdf
/B{fc fhsetcolor fillopf setoverprint gsave /filler load fp grestore
sc fhsetcolor strokeopf setoverprint true autospread {stroke}fp false
setoverprint}bdf
/b{closepath B}bdf
/setcolorscreen where{pop}{/setcolorscreen{setscreen pop pop pop pop pop
pop pop pop pop}bdf}ifelse
/fhsetcolor{dup length 4 eq
{aload overprintprocess setcmykcolor}
{aload 1 get spots exch get 5 get setinkoverprint setspotcolor}
ifelse
}ndf
/settextcolor{
dup fhsetcolor
textblackopf
{
dup length 4 eq
{onlyk{3 get 1.0 eq{true setinkoverprint}if}{pop}ifelse}
{pop}
ifelse
}
{pop}ifelse
}ndf
/ka{/fc xdf}bdf
/Ka{/sc xdf}bdf
/xa{/fc xdf} bdf
/Xa{/sc xdf} bdf
/bc2[0 0]def
/bc4[0 0 0 0]def
/absmax{2 copy abs exch abs gt{exch}if pop}bdf
/calcstep
{ {calcgraysteps}{maxsteps}ifelse
tc1 length 4 eq
{
0 1 3
{tc1 1 index get
tc2 3 -1 roll get
sub
}for
absmax absmax absmax
}
{
bc2 tc1 1 get 1 exch put
tc1 gettint tc2 gettint
sub abs
}
ifelse
mul abs round dup 0 eq{pop 1}if 
dup /numsteps xdf 1 sub dup 0 eq{pop 1}if /numsteps1 xdf
}bdf
/cblend{
tc1 length 4 eq
{
0 1 3
{bc4 exch
tc1 1 index get
tc2 2 index get
1 index sub
frac mul add put
}for bc4
}
{
bc2
tc1 gettint
tc2 gettint
1 index sub
frac mul add
puttint bc2
}
ifelse
fhsetcolor
}bdf
/logtaper{/frac frac 9 mul 1 add log def}bdf
FHIODict begin
/origmtx matrix currentmatrix def
/iminv false def
/invbuf{0 1 2 index length 1 sub{dup 2 index exch get 255 exch sub 2
index 3 1 roll put}for}bdf
/cmykbufs2gray{
dup length 0 1 3 -1 roll 1 sub
{4 index 1 index get
4 index 2 index get
4 index 3 index get
4 index 4 index get
255 exch sub ccmyk ccmyk ccmyk pop 5 mul exch 45 mul add exch 14 mul add
-6 bitshift
2 index 3 1 roll put}for
4 1 roll pop pop pop
}bdf
end
/currentpacking where{pop false setpacking}if
/spots[1 0 0 0 (Process Cyan) false newcmykcustomcolor
0 1 0 0 (Process Magenta) false newcmykcustomcolor
0 0 1 0 (Process Yellow) false newcmykcustomcolor
0 0 0 1 (Process Black) false newcmykcustomcolor
0 0 0 0  (White) false
newcmykcustomcolor
]def
%%EndSetup

[] 0 d
3.863708 M
1 w
0 j
0 J
0 O
0 R
0 i
false eomode
[0 0 0 1] Ka
[0 0 0 1] ka
vms
u
u
true fhsetspreadallow
47.8019 428.881 m
47.8019 571.7924 163.6511 687.6416 306.5625 687.6416 C
449.4739 687.6416 565.3231 571.7924 565.3231 428.881 C
565.3231 285.9697 449.4739 170.1204 306.5625 170.1204 C
163.6511 170.1204 47.8019 285.9697 47.8019 428.881 C
b
U
u
69.0672 428.881 m
69.0672 560.0477 175.3958 666.3763 306.5625 666.3763 C
437.7292 666.3763 544.0578 560.0477 544.0578 428.881 C
544.0578 297.7144 437.7292 191.3858 306.5625 191.3858 C
175.3958 191.3858 69.0672 297.7144 69.0672 428.881 C
[0 0 0 0] ka
b
U
U
vmr
vms
u
u
true fhsetspreadallow
30.8218 702.7841 m
578.6112 702.7841 L
578.6112 154.9947 L
30.8218 154.9947 L
30.8218 702.7841 L
n
U
453.0146 593.299 m
503.5003 620.4117 L
560.5305 539.0736 L
514.7194 497.937 L
453.0146 593.299 L
[0 0 0 0] ka
f
n
105.224 324.0418 m
84.6558 277.2957 L
115.5082 241.7687 L
142.6209 272.6211 L
105.224 324.0418 L
f
n
31.3653 382.0069 m
87.4605 398.8354 L
94.9399 354.8941 L
37.9097 357.6989 L
31.3653 382.0069 L
f
n
257.6161 618.5418 m
290.8058 600.7783 311.2391 589.9844 348.7709 586.287 C
358.2205 585.3562 373.1002 585.3447 373.1002 585.3447 C
400.1465 584.2971 416.0852 557.3045 416.0852 557.3045 C
403.9545 557.2953 L
403.9545 546.6366 403.9545 539.3438 403.9545 530.181 C
391.3098 525.9847 366.0669 495.5997 366.0669 495.5997 C
362.14 513.9253 334.7471 545.1505 307.1669 549.8251 C
307.1669 549.8251 328.6701 554.0323 338.506 565.7101 C
317.4511 571.7958 310.0845 574.4759 295.9479 584.4172 C
272.1074 598.441 257.6161 618.5418 257.6161 618.5418 C
[0 0 0 1] ka
f
n
498.3873 599.3694 m
498.8623 599.6678 511.25 588 511.477 581.6048 C
511.6147 577.723 509 555.5 497.4523 555.4254 C
491.9902 555.3901 475.0128 562.4836 475.0128 569.4501 C
475.0128 583.4747 L
482.5 589 488.25 593 498.3873 599.3694 C
f
n
205.7392 458.1877 m
217.8939 458.1877 L
223.6909 458.1877 228.5 452 230.0486 448.8379 C
230.0486 436.6832 L
230.0486 435.0938 222.5688 422.6585 216.0239 422.6585 C
212.9385 422.6585 191.7145 431.9148 191.7145 437.6182 C
191.7145 445.5655 205.7392 458.1877 205.7392 458.1877 C
f
n
271.1725 408.1846 m
276.3146 396.4981 279.1001 395.0016 288.4685 383.8767 C
295.9479 374.9949 326.8003 383.8767 326.8003 383.8767 C
312.25 373.25 250.75 327.25 236.5 321.5 C
218.9345 314.4122 161.3193 297.3965 161.3193 297.3965 C
157.5 300.75 151.9523 328.9807 127.201 347.8603 C
107.5613 362.841 105.7565 362.0152 90.2653 366.5806 C
72.5483 371.802 43.053 370.2998 43.053 370.2998 C
68.5 379.75 79.75 384.5 113.1709 384.8116 C
133.1919 384.9983 134.9789 384.5441 171.6034 376.8648 C
200.586 370.7878 224.8939 353.0243 224.8939 353.0243 C
271.1725 408.1846 L
f
n
127.201 323.5509 m
131.9696 321.8555 138.3317 317.3007 142.1534 312.8227 C
148.8164 305.0155 151.5105 296.4365 151.5105 296.4365 C
151.5105 296.4365 137.003 289.0936 124.3899 277.7632 C
113.3639 267.8584 103.9519 256.4436 101.0169 241.7687 C
100.5494 239.4314 95.4074 238.7302 94.005 246.4433 C
92.6041 254.1479 94.4724 267.9465 94.4724 267.9465 C
94.4724 267.9465 103.2604 285.616 108.4962 294.1243 C
117.285 308.2424 118.5 315 127.201 323.5509 C
f
n
427.3289 317.941 m
436.8083 318.1114 451.6384 317.941 451.6384 317.941 C
451.6384 317.941 452.0963 314.4705 451.6384 312.3311 C
449.7424 303.4735 435.4632 303.7293 412.3693 294.5665 C
387.1249 284.4688 374.5865 279.9465 368.8717 279.1656 C
358.7999 277.7893 361.3923 286.8786 361.3923 286.8786 C
361.6261 295.2929 369.084 303.4974 374.9487 314.9263 C
374.9487 314.9263 406.8697 317.5731 427.3289 317.941 C
f
n
407.2035 451.6584 m
414 452.25 429.5476 452.4064 436.6535 451.6584 C
436.6535 451.6584 446.4701 451.191 456.3132 448.8379 C
460.757 447.7756 465.5 446.1464 465.5 442.5 C
465.5 429.6908 412.25 332 410.0082 324.5092 C
388.0376 330.5862 348.4569 322.4282 313.7114 305.8108 C
281.4566 290.3846 239.3852 258.1298 239.3852 258.1298 C
273.4962 297.4235 317.7643 338.7731 351.5757 366.5806 C
401.5939 407.7172 411.8538 409.6046 422.1622 420.8061 C
422.1622 420.8061 316.9836 387.6164 305.2971 388.0838 C
293.0587 388.5733 278.6674 408.4469 278.6674 416.1137 C
278.6674 421.7235 296.4153 452.5934 296.4153 452.5934 C
316.5161 433.4275 L
350.4226 445.7434 394.7965 450.5786 407.2035 451.6584 C
f
n
548.3765 603.1156 m
549.7789 583.0148 548.1756 564.8962 542.767 554.9672 C
534.75 540.25 536.5 538.5 511.477 512.4164 C
501.1094 501.6095 461.6426 475.9523 447.8985 475.9523 C
437.2397 475.9523 424.4995 484.8481 405.8011 496.5347 C
387.1027 474.0965 380.0908 464.7473 372.1439 456.8005 C
367.25 455.5 338.4961 448.6926 325.8654 448.3862 C
320.25 448.25 308 459 302.9769 463.7975 C
302.9598 506.8188 L
293.6106 510.091 267.4328 519.4402 253.8764 524.5823 C
253.8764 524.5823 234.2431 476.4339 229.101 465.2148 C
215.0772 468.9545 204.3217 470.4189 196.3788 469.8894 C
175.3431 468.487 169.5542 468.0956 148.6978 457.268 C
120.2738 442.5116 101.9518 420.3386 101.9518 420.3386 C
108.6836 430.2494 133.5483 488.5854 196.8463 528.7894 C
202.4561 532.3423 239.3433 555.5533 254.358 556.3604 C
263.2257 556.8371 317.75 535.25 320.7415 532.9859 C
342.9023 516.2136 361.6 479.9727 364.6854 476.8872 C
409.5644 524.5711 L
412.3693 522.7012 432.8877 511.5058 451.1447 502.6116 C
460.0004 517.5828 467.0384 531.1267 479.1924 554.9672 C
489.944 549.8251 502.4621 545.9127 518.459 555.4347 C
538.0924 567.1212 539.4948 582.5474 548.3765 603.1156 C
f
n
U
vmr
%%Trailer
end  % FreeHandDict
end  % FHIODict


#! rnews 680
Path: merk!alliant!linus!agate!ames!pacbell.com!well!moon!cyberden!system
From: moon!cyberden!system@well.sf.ca.us
Newsgroups: comp.bbs.waffle
Subject: USERS command V1.65 hangs system
Message-ID: <Jm83RB1w165w@cyberden.uucp>
Date: Sat, 03 Oct 92 14:16:42 PDT
Organization: Indescribable Creations
Lines: 10

Is there a fix for this problem?

I come home to find that some user has type USERS and get's some garbage
for the first user to the extent of some field codes and then it hangs forever.

<X>orcist

__________________________________________________________________________
   |       /         |\
   | H E   \ Y B E R |/ E N       [ moon!cyberden!system@well.sf.ca.us ]
#! rnews 1482
Path: merk!alliant!linus!think.com!rpi!batcomputer!munnari.oz.au!network.ucsd.edu!porgy!kestanol
From: kestanol@porgy.uucp (Keith C. Estanol)
Newsgroups: rec.games.mud.tiny
Subject: Re: TINYSNOOPING AGAIN
Date: 3 Oct 1992 22:15:46 GMT
Organization: UC San Diego
Lines: 28
Distribution: world,local
Message-ID: <1al62iINNgum@network.ucsd.edu>
References: <marleyt-021092122353@scarlett.ccit.arizona.edu>
NNTP-Posting-Host: porgy.ucsd.edu

In article <marleyt-0210921Subject: Re: A bAd BbS
From: makari (Random Tox)
Level Janus: Yo ho ho and a bottle of Demerol
Message-ID: <kVVsPB7w164w@works.UUCP>
References: <LFgToB2w164w@works.UUCP>
Date: Thu, 20 Aug 92 03:19:43 EDT

thanatos (Thanatos) writes:

> Nobody call Newton Underground. It's a bad bbs, all it has is good games, 
> lots of games. But, they're liberal but not anarchists(how can the two not 
> go together...oh i see..anarchist don't believe in any form of government)
> but...I just yelled at the sysop for not giving me higher acces after i ul'd 
> a bunch of anarchy sections to the education file section...It's educational 
> isn't it? Well, I thought so, he didn't...I'll put in a copy of his 
 
        Don't be too hard on Joe. As messed up as he can seem, he's a good 
guy, in my opinion. He incredibly, rigidly lawful in his ways, and he's a 
neopagan, which i respect, but still find a bit cheesey... But he makes for 
good discussions.

        - Random

)
> but...I just yelled at the sysoSubject: Re: I'm sorry
From: makari (Random Tox)
Level Janus: Yo ho ho and a bottle of Demerol
Message-ID: <kBwsPB8w164w@works.UUCP>
References: <o3muoB1w164w@works.UUCP>
Date: Thu, 20 Aug 92 03:29:19 EDT

smut (Vince Niel) writes:

> I just went on a leeching spree of the works.  I'm sorry, I, I, just
> couldn't help it.  So many files, so little time to read them all.  I
> love this place.  Never have I found such a vast amount of knowledge and
> information under one roof at 2400 bps with a semi-small hard disk.  Ans
> this aint a warezz%$^@%^ board either.  Sorry I kept other years from
> logging on.  I will try to keep my works leech sprees, unlike my Argus
> porno gif sprees, at night.  Thanks.  I feel better already!
 
        Kind of sad. Don't get ripped, Vince, but ... Oh well.

        Your RA hacking thing was mostly plagiarized anyway, and via certain 
measures, RA can be safeguarded quite well.

        And the MATP BBS system that MAcula wanted you to call is indeed a 
butt ugly bbs with shit-ass structure. I would have preferred to have 
Aldebaran take over the BBS, but he's living in a tiny dorm room, so it's 
almost impossible. Too bad, since MAcula is twisting The Eleventh HOur into 
little bits. I streamline it and come back from france to discver he's 
trashed my BBS completely, and KILLED the hard drive. He backed it up, but 
ALL the files are gone. I'm fucking ripped at him. He's competent what has 
he done?  Jesus fuck, im mad.

        I need to reconsider leaving it with him... he ruined it.. he bent 
it out of shape.. and the modem doesn't answer very well or do decent work.. 
fuck! and i cant switch to another bbs, because i'll lose allt he user 
records and bases and its too much of a pain. Anyone know if theres a 
telegard 2.7 to TAG messagebase converter? Yes i run a tg board, so sue me, 
its the first BBS software i ever played with, and the BBS was originally 
aimed at teachers, so i wanted something simple, friendly and easy to use, 
since most arent computer literate. Ah vell. I'll be running a Remote Access 
BBS at Amherst, on campus... if anyone cares. Unfortunately Trog will be 
sysop, and thus be totally foolish and silly, and dream of playing Food 
Fight. Help me god.... But as cosysop and designerof the board, i'll have 
some major say. Fuck. All these thoughts are pissing me off.

- Random "I'm 'Mad' too 'Bob'!" Tox


 the BBS was originally 
aimed at teachers, so i wanted something simple, friendly and easy to use, 
since moSubject: Re: I'm sorry
From: makari (Random Tox)
Level Janus: Yo ho ho and a bottle of Demerol
Message-ID: <ycwsPB9w164w@works.UUCP>
References: <BgZuoB1w164w@works.UUCP>
Date: Thu, 20 Aug 92 03:30:09 EDT

jupiter (Peregrinus Jupiter) writes:

> > logging on.  I will try to keep my works leech sprees, unlike my Argus
> > porno gif sprees, at night.  Thanks.  I feel better already!
> 
> 
> That's about as low as it gets.
> -ASJ
 
        That's what i wanted to say. Thanks... I agree. Porn GIFs are 
pathetic.


From: makari (Random Tox)
Level Janus: Yo ho ho and a bottle of Demerol
Message-ID: <ycwsPB9w164w@works.UUCP>
References: <BgZuoB1w164w@works.UUCP>
Date: Thu, 20 Aug 92 03:30:09 EDT

jupiter (Peregrinus Jupiter) writes:

> > logging on.  I will try to keep my works leech sprees, unlike my Argus
> > porno gif sprees, at night.  Thanks.  I feel better already!
> 
> 
> That's about as low as it gets.
> -ASJ
 
        That's what i wanted to say. Thanks... I agree. Porn GIubject of the painting in real life.  Just enjoy the painting for
what it is, and if you want to read the book, that's certainly ok too,
but don't compare 'em - that's my view.

|Steve J. White		  |"Either there's something wrong with me,	  |
|aragorn@csd4.csd.uwm.edu  | or there's something wrong with the universe."|
|skeptic@large@9600bps	  |	- Dr. Crusher on ST:TNG			  |

-- 
 ahawks@nyx.cs.du.edu   FutureCulture E-List: [future-request@nyx.cs.du.edu]
 andy (hawkeye)         new edge, technoculture, cyberpunk, virtual reality,
                        raves, etc. Home of the famous :) FutureCulture FAQ!
 
From merk!nyx.cs.du.edu!ahawks Sat Sep 19 23:27:35 1992 remote from works
Received: by works.uucp (1.65/waf)
	via UUCP; Sat, 19 Sep 92 23:26:39 EDT
	for phantasm
Received: by merk.merk.com (/\==/\ Smail3.1.25.1 #25.17)
	id <m0mWHxL-0001pNC@merk.merk.com>; Sat, 19 Sep 92 23:27 EDT
Received: from nyx.cs.du.edu by relay1.UU.NET with SMTP 
	(5.61/UUNET-internet-primary) id AA03068; Sat, 19 Sep 92 23:25:31 -0400
Received: by nyx.cs.du.edu (4.1/SMI-4.1)
	id AA07828; Sat, 19 Sep 92 19:53:43 MDT
From: ahawks@nyx.cs.du.edu (morrissey's therapist)
Message-Id: <9209200153.AA07828@nyx.cs.du.edu>
X-Disclaimer: Nyx is a public access Unix system run by the University
	of Denver.  The University has neither control over nor
	responsibility for the opinions or correct identity of users.
Subject: Mindless Babble for the Terminally Bored
To: future@nyx.cs.du.edu
Date: Sat, 19 Sep 92 19:53:41 MDT
X-Mailer: ELM [version 2.3 PL11]

If you have nothing else better to do this weekend than watch CNN,
look for their "FutreWatch" segment...Featured some pretty interesting
stuff including:

--a snippet about the new Blade Runner (PS- look for a scene that
shows Rachael on the streets of LA - I don't think this was in either
release of the movie....)

--a little thing about Sneakers, talking about (if I remember right)
the plausibility of breaking the code (DES, I assume), and ummm, the
possibility of getting government information via computer or
something like that...

--and a very interesting and disturbing little piece about a company
that seeks to put a sort of universal price rate on all
information...I only caught the last portion of this, but it seemed
very disturbing to me...The impression I got from the representative
of the corporation was that someday he hoped to see a sort of "cost
this session" applied to *any* information retrieval via computer...
I hope I see this again so I can confirm this and get more accurate
info...Very scary thought that information will not be a free or
almost-free or as-close-to-free-as-you-can-get in the coming
information age....People are already starting to jack up the price of
everything that you could possibly want to knw....
-- 
 ahawks@nyx.cs.du.edu   FutureCulture E-List: [future-request@nyx.cs.du.edu]
 andy (hawkeye)         new edge, technoculture, cyberpunk, virtual reality,
                        raves, etc. Home of the famous :) FutureCulture FAQ!
 
From merk!nyx.cs.du.edu!ahawks Sun Sep 20 14:29:11 1992 remote from works
Received: by works.uucp (1.65/waf)
	via UUCP; Sun, 20 Sep 92 14:53:30 EDT
	for phantasm
Received: by merk.merk.com (/\==/\ Smail3.1.25.1 #25.17)
	id <m0mWW1g-0001hUC@merk.merk.com>; Sun, 20 Sep 92 14:28 EDT
Received: from nyx.cs.du.edu by relay1.UU.NET with SMTP 
	(5.61/UUNET-internet-primary) id AA12908; Sun, 20 Sep 92 14:26:34 -0400
Received: by nyx.cs.du.edu (4.1/SMI-4.1)
	id AA04001; Sun, 20 Sep 92 11:18:05 MDT
From: ahawks@nyx.cs.du.edu (morrissey's therapist)
Message-Id: <9209201718.AA04001@nyx.cs.du.edu>
X-Disclaimer: Nyx is a public access Unix system run by the University
	of Denver.  The University has neither control over nor
	responsibility for the opinions or correct identity of users.
Subject: interesting p h i l e (fwd)
To: future@nyx.cs.du.edu
Date: Sun, 20 Sep 92 11:18:01 MDT
X-Mailer: ELM [version 2.3 PL11]

Morpheus writes:

Thought you might want to check this out, maybe send it out to the list if you
think it's decent...


--------------------------- begin digital.txt -------------------------------

Unauthorised Access UK	0636-708063  10pm-7am  12oo/24oo

X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X
X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X
X/\/                                                                    \/\X
X\/X                        - Digital Underground -                     X\/X
X/\X      Story by Mark Bennett. Published in i-D Technology Issue      X/\X
X\/X                                                                    X\/X
X/\X            Transcribed by Phantasm. 12th September 1992            X/\X
X\/X                                                                    X\/X
X/\X    Unauthorised Access UK. Online 10.00pm-7.00am. +44-636-708063   X/\X
X\/\                                                                    /\/X
X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X
X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X

They've got a file on you. It's on computer. And that computer is connected
to a global network. Who's going to stand up for our civil liberties in the
digital era? Can the anarchic activities of hackers and cyberpunks make them
freedom fighters for the information age?
 
CYBERPUNK
TECHNOLOGY

Cyberspace, the Net, Non-Space, or the Electronic Frontier call it what you
will, but it's out there now, spread across the world like an opulent
immaterial spider's web, growing as each new computer, telephone or fax
machine is plugged in, as satellites close continental divides, hooking
independent phone systems together. It's almost a living entity - the
backbone is the various telephone exchanges, the limbs the copper and fibre-
optic links. Increasingly the world is shifting to this unseen plane. Your
earnings, your purchasing patterns and your poll tax records are processed
there. You may not realise it exists, but it's part of everyday life. As
John Barlow, writer and electronic activist puts it, "Cyberspace is the place
you are when you're on the telephone."

As life moves to this electronic frontier, politicians and corporations are
starting to exert increasing control over the new digital realm, policing
information highways with growing strictness. Before we even realise we're
there, we may find ourselves boxed into a digital ghetto, denied simple
rights of access, whiSubject: Two birds with one can of sauce.
From: ferret (Dave Ferret)
Level SYSOP: Work you Damn insidious machine!
Message-ID: <V7RgeB3w164w@works.UUCP>
Date: Sun, 12 Jan 92 17:19:18 EST

First in response to a /reports section -  
    
    For a long time, there was a section for school reports, and I just 
haven't had a chance to put it back up here, we have a mere dozen or so 
reports, all lacking the pertinant information you wanted, but hey, you have 
to figure if YOU think its good, then thSubject: Re:Re:Re:Re:E.T. phone home
From: makari (Random Tox)
Level Janus: Yo ho ho and a bottle of Demerol
Message-ID: <eJwsPB10w164w@works.UUCP>
References: <FRJ5oB1w164w@works.UUCP>
Date: Thu, 20 Aug 92 03:34:01 EDT

jupiter (Peregrinus Jupiter) writes:

> C'mon, I'm serious.  I'm not worried about people stealing my stuff, just 
> fucking with it.  (No puns, please.)  Thanks, Noid, I will look for those 
> phone jack locks.  One of my roommates is from Idaho and I don't want to end 
> up footing the bill for his calls back to his potato(e)-pickin' gf in 
> Boise...
> 
> As for the paper shredder/scissors.  I think having a paper shredder would 
> be k-k00l.  It adds an air of importance and suspicion to things.  Plus I'll 
> have a fireplace and it will be good for makin' kindlin'.
> 
 
Fireplace? Fone jack lock? I thought you were going to UMass/Amherst...


anks, Noid, I will look for those 
> phone jack locks.  One of my roommates is from Idaho and I don't want to end 
> up fo  deviate criminal sexual behavior.

                  ...and finally...

  (e) Publication contains material on the setting up and operation or 
      criminal schemes or how to avoid detection of criminal schemes by 
      lawful authorities charged with the responsibility for detecting 
      such illegal activity. 
 
--- End Document quotes ---
                                                                    _     _
 Now considering our archives, we could very possibly be cited for =_EVERY_= 
item on there, except that we _allegedly_ are allowed to have these items 
and have our rights to have them protected by the First Amendment to 
garuantee FREE SPEECH. But thats something for you to chew on for a while.


























































































































































































































































































nge public keys,
and maybe even get them signed. Is anyone else interested in
meeting sometime during the conference for this purpose?

This would at least be slightly more secure than trusting a
posted public key. Of course, whether you believe that it
really is me is a different story. I'm presenting a paper that
I wrote with a co-author that I've never met. So I can't know
that even he is who he claims - or that I am who I claim :-)

Please Email or reply via post. Even if we simply meet to talk
about PGSubject: Re: E.T. phone home
From: makari (Random Tox)
Level Janus: Yo ho ho and a bottle of Demerol
Message-ID: <BNwsPB11w164w@works.UUCP>
References: <XDg7oB1w164w@works.UUCP>
Date: Thu, 20 Aug 92 03:36:22 EDT

> Actually, I've found that by far the best way to keep your roommate from 
> fucking with your stuff is to get rid of your roommate... My preferred 
> method is to Gross/weird him out, by leaving the room a pigsty, playing 
> strange music, and just acting very odd in general. I got rid of my last 
> roommate in just under 3 weeks that way...
 
        I thought you went to high school and were taking a year off before 
college... Where'd you get a roommate?

I get em for summer study programs or whatever, but they're not long enough 
to make it practical.


te from 
> fucking with your stuff is to get rid of your roommate... My preferred 
> method is to Gross/weird him out, by leaving the room a pigsty, playing 
> strange music, and just acting very odd in general. I got rid lk sense to a fool and he calls you foolish.  -- Euripides

#! rnews 1825
Newsgroups: alt.drugs
Path: merk!alliant!linus!agate!spool.mu.edu!sdd.hp.com!elroy.jpl.nasa.gov!news.claremont.edu!jarthur.claremont.edu!jrhine
From: jrhine@jarthur.claremont.edu (Jared Rhine)
Subject: Nitrous : mechanism
Message-ID: <1992Oct3.215904.8289@muddcs.claremont.edu>
Sender: news@muddcs.claremont.edu (The News System)
Organization: Harvey Mudd College, Claremont, CA 91711
Date: Sat, 3 Oct 1992 21:59:04 GMT
Lines: 26

Come on, don't tell me there isn't a single scuba diver out there who
reads this group?  The mechanism of nitrous oxide is same as for
nitrogen narcosis, commonly called rapture of the deep.  When a diver
goes below about 80 ft, they are in "danger" of getting this effect
(actually I know people who go diving JUST for that effect).  The
nitrous buzz is a function of the amount of nitrogen disolved in your
fatty tissues.  You ongas at an approximately exponetial rate and
offgas at an approximately linear rate.  The nitrogen in your fatty
tissues interferes with neuron transmission.  It is indeed inert to
the body, just hangs around and blocks.  It is NOT a function on
oxygen deprevation; divers are still breathing the same amount of
oxygen at those depths.  When a diver comes up, the nitrogen offgases
safely as it is under a lower pressure (divers breath gases at ambient
pressure which at 100 ft is something like 4 atms; when you come up,
you are under lower pressure so the nitrogen comes out).

So now you can go find another source, go look up nitrogen narcosis in
a scuba book.

-- Jared

-- 
             _   _   _   _   _   _   _   _   _   _   _   _   _   _  _
            / \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \/ \
---------> <  Jared Rhine | Student, Philosopher, Zymurgy Specialist  >
            \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/
#! rnews 568
Newsgroups: alt.bbs.internet
Path: merk!alliant!linus!agate!spool.mu.edu!wupost!news.miami.edu!cybernet!news
From: garth@cybernet.cse.fau.edu (donna schweikert)
Subject: internet
Message-ID: <s383RB1w165w@cybernet.cse.fau.edu>
Sender: news@cybernet.cse.fau.edu
Organization: Cybernet BBS, Boca Raton, Florida
Date: Sat, 3 Oct 1992 21:26:27 GMT
Lines: 6

i would like to know if there is anyway of telneting out of the state
of michigan without having to go thru merit.
i have accounts in other states, is there a way the internet allows
for this.
thanx 
garth (donna)
#! rnews 1087
Newsgroups: alt.locksmithing
Path: merk!alliant!linus!agate!spool.mu.edu!sdd.hp.com!think.com!rpi!newsserver.pixel.kodak.com!psinntp!psinntp!cubetech.com!imladris!andrew
From: andrew@cubetech.com (Andrew Loewenstern)
Subject: Re: auto club locks
Message-ID: <1992Oct2.205731.25213@cubetech.com>
Organization: Cube Technologies, Inc.
References: <1992Sep24.150843.9850@engage.pko.dec.com> <80833@ut-emx.uucp>
Distribution: usa
Date: Fri, 2 Oct 1992 20:57:31 GMT
Lines: 14

In article <80833@ut-emx.uucp> jerry@ccwf.cc.utexas.edu (Jeremy Porter) writes:
>Now maybe the car is less likely to be stolen if it has a club on it, but
>I doubt it makes much difference to a "professional" car thief.

Nothing will stop someone if they want it badly enough.  The trick
then is to drive a piece of shit car like I do.   ;-)


andrew
-- 
andrew@cubetech.com     | "We shall not cease from exploration
Andrew Loewenstern      |  And the end of our exploring
Cube Technologies, Inc. |  Will be to arrive where we started
                        |  And know the place for the first time." -T.S. Eliot
#! rnews 1279
Path: merk!alliant!linus!agate!spool.mu.edu!uwm.edu!linac!att!cbnewsi!cbnewsh!att-out!rutgers!psuvax1!postscript.cs.psu.edu!fenner
From: fenner@postscript.cs.psu.edu (Bill Fenner)
Newsgroups: comp.bbs.waffle
Subject: Re: UDFB 1.0
Message-ID: <BvKG2F.Bxu@cs.psu.edu>
Date: 3 Oct 92 22:06:15 GMT
References: <26wZRB1w165w@eastwind.mcds.com> <w492RB1w165w@micromed.com>
Sender: news@cs.psu.edu (Usenet)
Organization: Penn State Computer Science
Lines: 21
Nntp-Posting-Host: postscript.cs.psu.edu

In article <w492RB1w165w@micromed.com> system@micromed.com (Duane Davis) writes:
|You could have saved yourself some time. I wrote and released a program
|that does exactly the same thing over a month ago.

And then, of course, there's the perl scripts that I posted to alt.bbs.waffle
last year, and the usenet-file updator that added group descriptions
automagically, so you can get things like

(public) 5:53p (891 left) (?=help) : comp.dcom.modems

comp.dcom.modems (messages from 16475 to 16575)
Data communications hardware and software. 

(comp.dcom.modems) 5:54p (891 left) (?=help) : echo %B
Data communications hardware and software. 
(comp.dcom.modems) 5:54p (890 left) (?=help) : 

I can repost or make the scripts available via mail-server if anyone is
interested.

  Bill
#! rnews 16979
Organization: Senior, Physics, Carnegie Mellon, Pittsburgh, PA
Path: merk!alliant!linus!agate!ames!haven.umd.edu!darwin.sura.net!udel!rochester!cantaloupe.srv.cs.cmu.edu!crabapple.srv.cs.cmu.edu!andrew.cmu.edu!cc4b+
Newsgroups: alt.fan.mike-jittlov
Message-ID: <YenVTKW00UhWA3xLEH@andrew.cmu.edu>
Date: Sat,  3 Oct 1992 17:59:50 -0400 
From: Christopher Brian Cox <cc4b+@andrew.cmu.edu>
Subject: Re: Bitmapped Wizard?
In-Reply-To: <BvJ6A1.8Bs@world.std.com>
References: <1992Oct3.030540.16689@ccu.umanitoba.ca>
	<BvJ6A1.8Bs@world.std.com>
Lines: 599

Here's a version I made from one of the bitmaps that came across the net
a while back.  Freehand version is available upon (limited I hope)
request.

Chris

ps. anybody remember the 20page square KGB logo we hung off Wean hall?
pps. I wish the Freehand EPS header was smaller


%!PS-Adobe-2.0 EPSF-1.2
%%Creator: FreeHand 3.1
%%Title: Wizard Logo (Freehand)
%%CreationDate: 10/3/92 5:58 PM
%%BoundingBox: 30.8218 154.9947 578.6112 702.7841
%%DocumentProcSets: FreeHand_header 3 1
%%DocumentSuppliedProcSets: FreeHand_header 3 1
%%ColorUsage: Color
%%FHPathName: Dora:Wizard Logo (Freehand)
%%EndComments
%%BeginProcSet: FreeHand_header 3 0
/FHIODict 30 dict def
FHIODict begin
/bdf{bind def}bind def
/d{setdash}bdf
/h{closepath}bdf
/H{}bdf
/J{setlinecap}bdf
/j{setlinejoin}bdf
/M{setmiterlimit}bdf
/n{newpath}bdf
/N{newpath}bdf
/q{gsave}bdf
/Q{grestore}bdf
/w{setlinewidth}bdf
/u{}bdf
/U{}bdf
/sepdef{
dup where not
{
FreeHandSepDict
}
if
3 1 roll exch put
}bdf
/`
{false setoverprint
end %. FreeHandDict
/-save0- save def
pop pop pop pop pop
concat
userdict begin
/showpage {} def
0 setgray 0 setlinecap 1 setlinewidth
0 setlinejoin 10 setmiterlimit [] 0 setdash newpath
/languagelevel where {pop languagelevel 1 ne you want changed from your
default.



EDITING FILES
-------------

  An important utility that all VAX hackers should be familiar with is the EDT
text editor. To call it up, use the EDIT DCL command. ie:

$edit [filename]

This will invoke the EDIT/EDT text editor.  The [filename] refers to the file
that you want to edit.  If the file does not exist, it is created at this point.
The EDT editor does not provide a default file type when creating files, so if
you do not specify one, it will lSubject: Re: bAd bbs
From: makari (Random Tox)
Level Janus: Yo ho ho and a bottle of Demerol
Message-ID: <wwwsPB12w164w@works.UUCP>
References: <FkeBPB1w164w@works.UUCP>
Date: Thu, 20 Aug 92 03:42:07 EDT

thanatos (Thanatos) writes:

> i didn't exactly demand to have more access, i just was kinda in a state of 
> befuddlement b/c he has all this unregistered stuff, and even his bbs in 
> unregistered, but he's real hypocritical about the whole thing, cuase he 
> uses unreged ware and doesn't like ul of anarchist stuff..which is more 
> illegal..
 
        Yes, but the sicko actually stops using the software after a while 
if its unregistered, unless he can pay for it. Seriously. Creepy, huh? He 
switches BBS software every week it seems, lately. I remember when it was 
WWIV. Yick!


nda in a state of 
> befuddlement b/c he has all this unregistered stuff, and even his bbs in 
> unregistered, but he's real hypocritical about the whole thing, cuase he 
> uses unreged ware and doesn't likSubject: Re: Anarchy Files
From: makari (Random Tox)
Level Janus: Yo ho ho and a bottle of Demerol
Message-ID: <7ZwsPB13w164w@works.UUCP>
References: <4uiBPB2w164w@works.UUCP>
Date: Thu, 20 Aug 92 03:44:05 EDT

iskra (Iskra) writes:

> Hate to disagree with you yet again, Jupitor, but it's illegal to write 
> instructions for committing a crime. I'm fairly certain about this. Whether 
> this has particular law has ever stood up in court I do not know. (I doubt 
> it, but I've been wrong before).
 
        Then how can Loompanics legally sell the How to Kill series of 
books, or whatever it is (Book 1: Your first kill, using a garotte, etc.)


iBPB2w164w@works.UUCP>
Date: Thu, 20 Aug 92 03:44:05 EDT

iskra (Iskra) writes:

> Hate to disagree with you yet again, Jupitor, but it's illegal to write 
> instructions for committing a crime. I'm fairly certain about this. Whether 
> this has particular law has ever stood up in court I do not know. (I doubt 
> it, but I've been wrong before).22353@scarlett.ccit.arizona.edu> marleyt@ccit.arizona.edu (Marley Treadwell) writes:

>have the guts to say who he was, and just for the record i know. The
>problem was discussed and worked out. This petty revenge is stupid and if

Discussed and worked out? The guy was killed and toaded.
This is what you call being 'worked out'?  If you have more 
information about this, please contradict me.
So far as I know, it was *not* petty revenge.

>you all supposedly adults want to act like children . BE MY GUEST! but go
>back to 
>nursery school to do. IMHO i am sick and tired of it. 

Nursery school was kinda fun.

>*steps off her podium and waits for flames.

Stop baiting the newbies.


Keith C. Estanol	    	| storm@ucsd.edu
UCSD, Cognitive Science 	| storm@ucsd.bitnet
Institute of Geo and Planetary Physics : kestanol@bull.ucsd.edu
---------------------------------------------------------------
"We don't want to be victims, on that we all agree.
 So we lock up the killer instinct, and throw away the key.."

#! rnews 3013
Newsgroups: rec.games.mud.diku
Path: merk!alliant!linus!think.com!yale.edu!spool.mu.edu!umn.edu!csus.edu!netcom.com!exel
From: exel@netcom.com (Frederick Myers)
Subject: Re: TNG DikuMud opend
Message-ID: <1992Oct3.222256.9961@netcom.com>
Organization: Netcom - Online Communication Services  (408 241-9760 guest) 
References: <1992Oct3.203341.5602@netcom.com>
Date: Sat, 3 Oct 1992 22:22:56 GMT
Lines: 59



ok, lets see. i get in the mud today and a bunch of people are telling
  me to go read the news groups because some fool (their words, not 
  mine) decided to post some flames about hopper (tng) diku.
ok, well lets see.

1) the prompt -- well if you have bothered to look, the prompt
   offers the options of having the scroll bar or not ( in either
   graphic or ascii) or if you want it to be the standard command
   line prompt (what a lot of diku currently use). so if your
   computer pukes on the idea of the scroll bar, you 
   do not have to use it. and there is also a 'cls' command.
2) using midgaard -- yeah, we tossed around the idea of
   zapping midgaard. well, we decided not to because midgaard
    serves as a good 'ol familiar' to alot of players. if you
    would have bothered to look, there is also another
    town (guernica) that for the time is a little trivial to
    most players ountil the southern continet is done.
3) the say command -- yeah, that space is a toughie. how can
    you judge a mud bassed on having to type a space after 'say'.

4) about use being lazy and not doing anything-- yeah whatever.
    you are right, we have not put anything to the mud. it is all
    generic diku release. NOT. and i think that the commands or
    whatever else we have put in ( a totally re-written crash and
    renting code, fixing the game loop, etc etc) are a little bit
    more than 'bells and whistles'. we take many of the suggestions
    that are given to us by the players, and try to put as 
    many in as possible. we run the game to make others happy
    obviously.
4) about having no creativity -- once again i say 'whatever'.
    yeah, everything on our mud can be seen on other muds.
    uh huh. yeah, nah, we have no areas that are just on our mud.
    we have no things (such as the prompt) that are tng only.
    NOT AGAIN.

by no means do i claim tng to be the best. by no means at all.
   i do not think that any mud can honeslty 100% call itself the
   best.

we try to mke it the best we can. and if you do not like it
   you do not have to play. there is nothing else to say.

i just suggest that people come on and see what it is like b4
   judging it based on someones uninformed judgements.


just a side thought --  i was reading the flame on deth's mud on this
   news group too. i dunno'. i think muds such as deth's, ours and
   some other muds out there are out there and making diku a little
   bit more interesting by creating new and innovative ideas instead
   of just adding the same old stuff. 



reni (co-imp of tng diku, and proud of it)


#! rnews 1202
Path: merk!alliant!linus!agate!spool.mu.edu!sol.ctr.columbia.edu!ucselx!crash!slic!mikey
From: mikey@slic.cts.com (Mike Shirley)
Newsgroups: comp.bbs.waffle
Subject: Multiple copies of Waffle
Message-ID: <1kV3RB13w165w@slic.cts.com>
Date: Sat, 03 Oct 92 09:56:35 PDT
References: <1992Oct2.052413.15383@nwnexus.WA.COM>
Organization: Muth Valley Seismic Control District, San Diego, CA / Port2
Lines: 19

ralphs@halcyon.com (Ralph Sims) writes:

> Ah, true enough.  I'm running under DESQview and haven't logged out of
> that account in months.  'login' didn't work there, and I never checked
> to see if 'manually' coming in via waffle online.  Learn something new
> every day.

I also use Desqview and keep a window open with Waffle local
console using "waffle online mikey".  I found out the hard way,
while leaving that window open for months, not to stay in the
mailer will your mail file open.  I've lost and/or buggered up a
few letters when the dial-in/dial-out window was writing to my
mail file.  I don't run share.

I know I need to watch for these sort of conflicts but I was
lazy.  Just a reminder from a lazy bum...

--
     Mike, WB6WUI   //   INET:  mikey@slic.cts.com   //   GEnie: SLIC
#! rnews 927
Path: merk!alliant!linus!agate!spool.mu.edu!sol.ctr.columbia.edu!ucselx!crash!sound!markr
From: markr@sound.cts.com (Mark B. Reinhold)
Newsgroups: sdnet.waffle,comp.bbs.waffle
Subject: Re: COLORS!
Keywords: Colors
Message-ID: <3c53RB2w165w@sound.cts.com>
Date: Sat, 03 Oct 92 13:06:13 PDT
References: <sFV2RB3w165w@slic.cts.com>
Organization: SDCT 1-619-461-3415
Lines: 16

mikey@slic.cts.com (Mike Shirley) writes:
> So, which colors did you end up with?  Did you figure out a way
> to do it without re-running Waffle?

I change them in the static and then rerun waffle. At this point
I have black letters on a green background, which seems pretty
relaxing for the eyes. The status bar is suppose to something
different but is not. As for the windows, I haven't seen any
yet.

The problem that I have is that I use VI as my editor, so when I
create a message I go back to black background with white
letters.

Life is fun...

#! rnews 1743
Path: merk!alliant!linus!agate!ames!sun-barr!cs.utexas.edu!uwm.edu!linac!att!att!fang!gator!towers!bluemoon!somenode!a-dent
From: a-dent@somenode.uucp (Bryan Hannahs)
Newsgroups: comp.bbs.waffle
Subject: Re: poor transfer rates in Dos Waffle
Message-ID: <3Zw3RB2w165w@somenode.uucp>
Date: Sat, 03 Oct 92 13:27:13 EDT
References: <ZyH2RB1w165w@ZGNews.LoneStar.Org>
Organization: .sdrawkcaB sgnihT gnipyT roF yteicoS ehT
Lines: 27

peterson@ZGNews.LoneStar.Org (Bob Peterson) writes:

>   I just started talking to another Waffle 1.65 running on a fast 386
> under Desqview-386, X00 FOSSIL locked at 19,200 bps, 7 packet window,
> transferring news packets, and see log entries like these.
> 
> 27-Sep-92  19:40 19:44  bluecafe   | 4226 sent   38 rcvd  0 errs 1474 cps
> 02-Oct-92  04:09 04:13  bluecafe   | 5035 sent   38 rcvd  0 errs 1482 cps
> 02-Oct-92  17:12 17:13  bluecafe   | 1097 sent    9 rcvd  0 errs 1467 cps
> 
>   The window size seems critical at these speeds.  I've not played with
> the (experimental) packet size parameter available in uucico for 1.65,
> but that may also have a positive impact.

You didn't say what modem the other end is using. If they're using a
v.32bis modem instead of just v.32, that would mostly explain it, though
the best I've gotten (running Waffle on a 386SX-25 w/a Twincom 14.4DF
modem, FOSSIL unlocked, Waffle 1.65 locked at 38400, talking to a Sun
Sparc 2 using an HST/v.32bis DS) is about 1450cps, with about 1420cps
average. Also, talking to a Supra 14.4 on the same system, I only get
about 1110-1140 cps.

---
"Man created God in his own image." - Lazarus Long

Bryan Hannahs      |   a-dent@somenode.uucp    a-dent@bluemoon.use.com
(aka Arthur Dent)  |               bryan@bluemoon.use.com
#! rnews 1189
Path: merk!alliant!linus!agate!ames!sun-barr!cs.utexas.edu!uwm.edu!linac!att!att!fang!gator!towers!bluemoon!somenode!a-dent
From: a-dent@somenode.uucp (Bryan Hannahs)
Newsgroups: comp.bbs.waffle
Subject: Re: Multiple modePath: works!merk!alliant!linus!agate!ames!olivea!spool.mu.edu!sgiblab!kludge!therat!spud!tom
From: tom@spud.kludge.com (Tom Lemos)
Newsgroups: comp.bbs.waffle
Subject: Waffle Offline Reader for 1.65
Message-ID: <usPVRB1w165w@spud.kludge.com>
Date: 29 Sep 92 20:08:29 GMT
Organization: Tater Tot Liberation Front, San Francisco CA
Lines: 12

hello there...
does an offline reader for 1.65 exist? 
I know of Wafmail but what version works with 1.65 or is the current 
version compatible. 
 
thanks for your help. any offline reader will be helpful,as my users are 
starting to complain... 


Tom Lemos (tom@spud.Kludge.COM)          Tater Tot Liberation Front
"It's Dan Quayle, FORGET about it!"       San Francisco, California
-Frank Fontana to Murphy Brown.                     +1 415 255 8340
beration Front, San Francisco CA
Lines: 12

hello there...
does an offline reader for 1.65 exist? 
I know of Wafmail but what version works with 1.65 or is the current 
version compatible. 
 
thanks fo