💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › hackusa!.hac captured on 2023-01-29 at 07:46:49.

View Raw

More Information

⬅️ Previous capture (2021-12-04)

-=-=-=-=-=-=-

Filename: Hacking USA

-->Hackin' USA

-->I was in the 'fast lane' of computer hacking for about 3 or 4 years (more
than enough) and am now semi-retired. It is now time to pass the torch to those
with extra time, the will and those under age (very important as you will soon
find out).

   What is about to follow can be found in many many underground philes that are
available. I have compiled the highlights of the best philes here and more
details can be found in these other philes which are available on any good Cat-
fur. One note...all of this is true (hard to believe but not streching the truth
one bit, I've even seen most of it myself at one tyme or an other).

    Firstly, the most important tool of the hacker is the Apple Cat modem.
Anyone who is someone has one (and even some losers have them too!). The reason
for this is that it does 1200 baud at a 300 baud price and you can also do lots
of neat illegal things with it (more on this later).

   The first most important piece of information is the L05ER. This is a person
(person?) usually about 14-15 years old who acts like a geek "I got more wares
than anyone else and I want two wares for one I give you" or "no you can't have
my new MCI number I found", or uploads COPYA to a cat-fur line in order to get
access to the good wares on drive 2. They are all around pests but it is
sometymes fun to get your friends together on the phone lines for some fun
ragging on the L05ER!

   Much worse than the L05ER is the nark. This is the guy who will tell on your
activities to your parents, school and the authorities. These are dangerous and
require the best hackers to exterminate. (this is done by hacking Ma Bell, and
giving the nark a $5000 phone bill, after this his parents will usually
confiscate the modem, computer and the nark is never heard from again).

   Then finally is the all famous Dude. This is the person who wish to trade
wares with, will cover for you when the feds get on your case, and helps you rag
on L05ERS and eliminate narks. He is in all cases a real 'dude'.

   There are a few things needed to make it in the 'underworld' of hacking. This
 can be divided further into 4 catagories:

1)Piracy (very mild form...anyone can do it, means you say 'phuck the copyright
and cat-fur all nite and all day). Most losers and leeches are experts in this
field...can set up cat-fur recieve faster than you can hang up a phone. (Some
real losers still use AE and don't even have Apple-Cats (more on Cats later)

2)Phreaking: This is the next rung up the ladder. This involves ripping off the
phone company and call for free all over the world. Many do this by finding MCI
and Sprint (American phone companies) codes (very easy to do) and call for hours
on end Cat-fur-ring the latest wares everywhere from Kalamazoo to Moscow. You
have to be a real L05ER to get caught by MCI or sprint (use the same code for a
year), so its a good way of weeding out the losers early in thier career.
Pirates who know how to phreak are a bit above those who don't know a soul from
out of his local calling district and then there is the other genre of phreakers
who have been around long before the hackers....The boxers. These were the
people in the 1960's who built electronic devices (the contents were placed in
box like casings, hence the name 'boxing') that would emulate the tones of a
phone company. It requires much more skill than MCI phreaking, so there aren't
all that many losers in this field. Now-a-days, the phone company knows about
phreaking with boxes and it is quite dangerous. Apple Cats can do the tones that
the old boxes of the 60's did, so thats why they (Cats) are phun. (They are also
used to 'wargames' hack and dial for MCI accounts and hidden computer lines).
Most of you have probably heard of boxes. (In fact, the apple computer wouldn't
have been created with these since Steve Wosniak met Steve Jobs (Apple's
founders) in order to create one of those infamous blue boxes). These are some
of the most famous boxes:

Black box (the first box invented), this lets you recieve f!!@?9
 ?? ???????!?????????g*B?(???p~???C?@p "D????????????^A?1K@pp??@@?(	??6??@?	`?A`	 !<g?@??????|Ba$?qr|?@??08>"8&!> 08????p  !>r 8& >80!>">9>2 >0 8>""0!?qA	????r  !>r  8	>9> 8>!?? !>>">8	????!> >08"08>>80!?!>!> 8!>#>!>'	>> 8?? !>>8"8!>08!>0uters and having phun. You need to phreak to do
this cuz the best systems are always out of state and you don't want to pay
$1000 long distance bills. There exist many philes and lists for access to
banks, fortune 500 firms and how to hack or do stuff (ie, get visa account
numbers, give people high phone bills on ma bell's Cosmos computer and of
course, the 'Official telenet hackers list" of every corp. and institution on
telenet( a 100 sector phile too!))

4)Finally, there is :Kracking. This involves taking a commercial program and
taking out the software protection so that it can be Copya'ed (the offical
standard of kracking). This takes a good knowledge of Assembly programming and
knowing what the bastards at the software companies are up too (seriously, they
put in things just to phuck us up, they spend more tyme with the protection than
the game itself....well, makes more phun for my kind!

   That is pretty much the mainstream, but there are many many small groups (ie,
TAP) (these dudes specialize in theft and rip-offs of any kind (ie, how to steal
cable TV (the scrambled stations), to spot a plainclothes agent in a department
store, to make phake price tags, etc...really strange bunch). Then there are the
pyro's who tell you how to make nepalm, bombs, nitro, pipe bombs and all sorts
of exotic stuff in easy steps with junk available at radio shack and drug
stores. Then, there are the terrorists who know how to do all the above and a
few more things (stratagies etc...). Again, there are many. many philes out
there on all this stuff and again, most of is quite possible and real (I showed
someone I knew in the field of chemistry the chem pyro philes and he asked
'where did you get this stuff?!').

    Finally, there are those superboards, the BBS's that run on 3 lines, 45 megs
on line, AE, BBS, Catfur all on one system, and you wonder where they got the
money for all this junk (remember the visa hack phile to find some visa
numbers....)...thats where. These systems are the gathering point for hackers.
Usually, they don't allow local users, only out of states who phreak their way
into the board. They got all the wares, know the krackers and are able to
release kracked versions of programs that havent even been released commercially
yet (anyone ever seen the pre-release version of miner 2049'er...I have
it....really wierd)

     The rest is an experience which I cannot write down. Above you have seen a
taste of the way it is. You hear about people who get busted every day, and
wonder if the system you call has the Ph.B.I. and Ma swarming all over it and if
your next. Well, its something...really, and after a while, its time to stop,
and when you see about some hackers on the news, you can say, I know it, I saw
it, I was a piece of the action...And finally, you slow down, look for something
else...and retire the day you turn 18 (on this day, you are no longer a minor,
and the risks of hacking outwiegh the advantages....)..But you were there at one
tyme....