home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Hacker Chronicles - A…the Computer Underground
/
The Hacker Chronicles - A Tour of the Computer Underground (P-80 Systems).iso
/
phrk4
/
phrack38.2
< prev
next >
Wrap
Text File
|
1992-09-26
|
17KB
|
353 lines
==Phrack Inc.==
Volume Four, Issue Thirty-Eight, File 2 of 15
[-=:< Phrack Loopback >:=-]
By Phrack Staff
Phrack Loopback is a forum for you, the reader, to ask questions, air
problems, and talk about what ever topic you would like to discuss. This is
also the place Phrack Staff will make suggestions to you by reviewing various
items of note; magazines, software, catalogs, hardware, etc.
_______________________________________________________________________________
Terminus Is Free
~~~~~~~~~~~~~~~~
Len Rose has been released from prison as of March 23, 1992. Those wishing to
write him and send him U.S. mail:
Len Rose
Salvation Army Freedom Center
105 Ashland
Chicago, Illinois 60607
He will remain at this address until May 23, 1992.
_______________________________________________________________________________
Date: March 4, 1992
From: Sarlo
To: Phrack Staff
Subject: Loopback Correction
While scanning the loopback section of Issue 37, I came across this letter:
>:: Fed Proof Your BBS, NOT! ::
>
> I'm sure many of you have seen text files on making your BBS more secure.
>One such file floating around is by Babbs Boy of Midnight Society. One of the
>members of our Phrack Staff showed this document to EFF's Mike Godwin, who is
>an attorney. He had the following comments:
>- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
>
>From: Mike Godwin
>To: Phrack Inc.
>
>(In regards to some of the files about how to "fed-proof" your BBS:)
>
>> Let's start with the log on screen: If FEDZ want anything from your board,
>> they are required to provide 100% accurate information.
>
>This is false. Ask the legislators who've been convicted in "sting"
>operations. In fact, so far as I can tell in a brief run-through of this
>document, absolutely no part of the so-called "legal" advice is true.
>
>Law enforcement agents who misrepresent their identities (e.g., "undercover
>agents") produce admissible evidence all the time.
>
>--Mike
Allow me to clear some things up. Babbs' Boy was a friend of mine a while back
and was more of a Game Programmer than a "hacker" (or "cracker," if you want
to be anal about it). Babbs' Boy was NEVER in MsU. He had asked me if he
could write a file for the group. We informed him that he could if he wanted
to, but he could in no way represent us. According to Babbs' Boy, he retrieved
the information from a copy of the ECPA. Since we were not releasing that as a
MsU file, we never bothered to check any of the said information out. In fact,
MsU does not create files for public display, although individual members may.
Apparently Babbs' Boy uploaded his copy of the document to Ripco, in which
it went wideband from there. I am told that 3 other documents were released
in MSU's name, by someone using one of my very old handles of Raistlin. I can
assure you that these documents were not released by any legitimate (old or
current) member of Midnight Society Underground.
Again, to clear things up, Babbs' is not nor ever was a member of MsU, nor
are there any legitimate public releases from our group.
Besides, we don't let people in the group who spell Feds "FEDZ" ..the shit just
ain't done.
Sarlo of Midnight Society Underground [MsU]
sarlo@gagme.chi.il.us
_______________________________________________________________________________
Date: March 22, 1992
From: "Michael E. Marotta" <MERCURY@lcc.edu>
Subject: Censorship in Cyberspace
To: Phrack Staff
I have been hired to write an article about the control of information in
cyberspace. We all know that Fidonet moderators and sysops devote their OWN
resources for us to use. There is no question about the "right" of the sysop
or moderator to delete messages and users. The practice of censorship is
nonetheless newsworthy.
If YOU have experienced censorship on Fidonet or Usenet, Prodigy or CompuServe,
or another BBS or network, I am interested in learning about your story. If
you can supply downloads of actual encounters, so much the better.
If you have ever been censored, send me physical world mail about the event.
Michael E. Marotta
5751 Richwood #34
Lansing, Mich. 48911
_______________________________________________________________________________
Dear Phrack Staff,
There are very serious negative consequences surrounding the use of modems
and computers in our society. Because of this, all children under the age
of 18 should be prohibited from using a computer in connection with a modem
or that is connected to any computer service.
Please read my attached news release and join me in spreading this message.
-- Ron Hults
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
NEWS RELEASE March 18, 1992
PEDOPHILIA, COMPUTERS, AND CHILDREN
If you have children in your home and a home computer complete with a telephone
modem, your child is in potential danger of coming in contact with deviant and
dangerous criminals.
Using the computer modem, these unsavory individuals can communicate directly
with your child without your knowledge. Just as importantly, you should be
concerned if your child has a friendship with other youth who has access to
this equipment in an unsupervised environment.
Using a computer and a modem, your child can readily access community "bulletin
boards" and receive sexually explicit and graphic material from total strangers
who can converse with your children, individuals you quite probably wouldn't
even talk with.
The concern becomes more poignant when stated otherwise; would you let a child
molester, murderer, or convicted criminal into your home to meet alone with
your child?
According to Fresno Police Detective Frank Clark, "your child can be in real
danger from pedophiles, rapists, satanic cultists and other criminals known to
be actively engaged in computer conversation. Unwittingly, naive children with
a natural curiosity can be victimized; emerging healthy sexual feelings of a
child can be subverted into a twisted, unnatural fetish affecting youth during
a vulnerable time in their lives."
It is anticipated that parents, when armed with the knowledge that this
activity exists and awareness that encounters with such deviant individuals
can result in emotional and psychological damage to their child, will take
appropriate measures to eliminate the possibility of strangers interacting with
their children via a computer.
For Further Information, contact Ron Hults (209)498-4568
_______________________________________________________________________________
Date: March 30, 1992
From: Anonymous
To: Knight Lightning <kl@stormking.com>
Subject: Thanks
Dear Knight Lightning,
I would like to thank you for the message you wrote to Dale (scumbag) Drew.
Although the fact is that he will only be slightly inconvenienced by having to
dig up issues of Phrack on his own instead of having them delivered to his
mailbox, his being refused to be added to the mailing list means a lot more. If
I were him, I would consider it a slap in the face (since it seems almost as
bad, IMO, as being blacklisted). :)
May he run into 10 homosexual wrestlers in a dark alley.
_______________________________________________________________________________
Review of Intertek Winter 1992
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
325 Ellwood Beach, #3 Subscription Rates:
Goleta, CA 93117 US : 4 issues (2 year) $14.00.
Internet: steve@cs.ucsb.edu OS : 4 issues (2 year) $18.20.
Phone: 805-685-6557 Back issues : $5.00 ea.
by Dispater
Intertek is the *SHARPEST* looking 'zine I've seen yet that directly
addresses the world of cyberspace. It's not "high res" color or artsy-fartsy
like Mondo 2000, but it is at least more interesting to read as a whole. I
think it looks better and is more direct and to the point. You don't have to
wade through a bunch of trash to get to something interresting.
This issue of Intertek focused on "virtual communities." The topics
included: "Bury USENET," "Electropolis (IRC)," "Social Organization of the
Computer Underground" by Gordon Meyer, "Real World Kerberos," and "Mudding:
Social Phenomena in Text-Based Virtual Realities." Every issue also contains
the top news tidbits about some truly high-tech achievements that go unnoticed
by the mainstream media (I guess the Mike Tyson trial gets more ratings,
huh?). All in all, it was much more interesting to me than the last issue
(Volume 3.2). It's magazines like this that I hope will help make the
mainstream media obsolete.
If you are looking for "how-to" techie projects or hacking tips, this is
NOT for you! Many hackers I know don't like it and think it's boring as hell;
2600 and Phrack it isn't. However, if you are interested in the "big picture"
of the cyberspace (what ever that means! :) or are, say, interested in studying
cyberspace from an uninvolved level, this is the magazine for you. Intertek is
full of social insight into what makes the cyberspace tick. It does this much
better than the feeble attempts other magazines have made. For only $7.00 a
year, I think it's worth it.
_______________________________________________________________________________
Hacking in Australia
~~~~~~~~~~~~~~~~~~~~
By The Cure
Australia has been very sparse after my BBS (Micromation) was closed down. A
lot of people took it as a warning, and closed up shop as well. The Amiga
warez BBSes still continue to flourish, as do some IBM ones. Because of the
expense of phone lines ($300 installation of a line, $250 per year rental [in
American dollars]) we tend to have a lot of BBSes that are dual purpose, i.e.
both warez and phreak. Devastation Phase One is a great example: huge Amiga/
IBM/phreak/etc. I, however, was devoted to phreak/hack/etc. We did have a few
busts actually, and the police were called in to trace all calls through Vicnet
and some people I know were caught. We've got a few warez-monger type people
here that have been busted for "pitting" (climbing into telecom phone pits, and
hooking up straight to the lines) - and I had my knuckles rapped by my
university. Phoenix's court case still hasn't been settled (he's had 35 of the
47 charges against him dropped). Comserve has finally made it down under, and
they're footing the bill for the first year, allowing us to be on Comserve in
the States for a while. Our telephone company (Telecom) is a government
monopoly, and we've only just passed legislation to allow competition. The
first carrier allowed will be a company called Optus. Call waiting,
conferencing, etc. is almost standard here now.
_______________________________________________________________________________
Censorship in Iowa
~~~~~~~~~~~~~~~~~~
From: Mike Begley <spam@iastate.edu>
Hi. I got your name from Erik Bloodaxe. He said you might be able to help us
out with a minor problem we're having here. The computation center at Iowa
State University will very soon institute a policy of censorship of a number of
groups of questionable nature, specifically the alt.sex hierarchy, alt.drugs,
and a few other similar groups.
I wish to conduct a survey of the users of our computer system, but the
university specificly prohibits mass mailings.
I'm frightened by censorship, and I want to fight this as best I can. If you
would be able to do this favor for us, you would be helping to fight electronic
censorship and suppression of free expression.
_______________________________________________________________________________
Phrack FTP Sites
~~~~~~~~~~~~~~~~
quartz.rutgers.edu (128.6.60.6) mc.lcs.mit.edu (18.26.0.179)
Location: /pub/computer/law Location: /its/ai/digex
mintaka.lcs.mit.edu (18.26.0.36) coombs.anu.edu.au (130.56.96.2)
Location: /telecom-archives Location: /inbound
wuarchive.wustl.edu (128.252.135.4) ftp.eff.org (192.88.144.4)
Location: /doc/policy/pub/cud/Phrack Location: /pub/cud/Phrack
nic.funet.fi (128.214.6.100) cs.dal.ca (129.173.4.5)
Location: /pub/doc/phrack Location: /pub/comp.archives
chsun1.spc.uchicago.edu (128.135.46.7) ftp.uu.net (137.39.1.9)
Location: /pub/cud/phrack Location: /tmp
rascal.ics.utexas.edu (128.83.138.20) relay.cs.toronto.edu (128.100.3.6)
Location: /misc/ra/sa/ULM.DE Location: /doc/telecom-archives
aix370.rrz.uni-koeln.de (134.95.132.2)
Location: /pub/usenet/comp.archives/hackers/journals
titania.mathematik.uni-ulm.de (134.60.66.21)
Location: /info
src.doc.ic.ac.uk (146.169.3.7)
Location: /usenet/comp.archives/hackers/journals
bric-a-brac.apple.com (130.43.2.3)
Location: /pub/stud_reps
faui43.informatik.uni-erlangen.de (131.188.31.3)
Location: /portal/mounts/cyber/pcd/freeware2/magazine
srawgw.sra.co.jp (133.137.4.3)
Location: /.a/sranha-bp/arch/arch/comp.archives/hackers/sites
_______________________________________________________________________________
What's Your NPA These Days?
~~~~~~~~~~~~~~~~~~~~~~~~~~~
<><><><><><><><><><><><><><><><>
<> <>
<> AREA CODE SPLITS OF 1991 <>
<> Researched and Collected <>
<> by <Flash!Point> <>
<> <>
<><><><><><><><><><><><><><><><>
BALTIMORE, MARYLAND
C&P Telephone Company Report for 301 NPA Split
NXXs Converting to NPA 410
205 208 213 221 222 224 225 226 228 232 233 234 235 237 239 242 243 244 247 250
252 254 255 256 257 260 263 265 266 267 268 269 272 273 275 276 278 280 281 282
284 285 287 288 289 290 291 296 298 307 312 313 316 319 321 323 325 326 327 328
329 332 333 335 337 338 339 342 343 346 347 348 351 352 354 355 356 357 358 360
361 362 363 364 366 367 368 370 374 376 377 378 379 381 382 383 385 388 389 391
392 393 396 397 398 404 425 426 429 433 435 437 438 440 442 444 446 448 450 452
455 456 457 458 461 462 465 466 467 471 472 476 477 479 481 482 483 484 485 486
488 489 494 514 515 516 521 522 523 524 525 526 527 528 529 531 532 533 534 535
536 537 538 539 541 542 543 544 546 547 548 549 550 551 553 554 555 556 557 558
560 561 562 563 566 569 573 574 575 576 578 581 583 584 586 591 592 594 597 602
605 612 613 614 623 624 625 626 628 631 632 633 634 635 636 637 638 639 641 642
643 644 646 647 648 651 653 655 658 659 661 664 665 666 667 668 669 671 672 673
674 675 676 677 679 682 683 684 685 686 687 691 692 693 712 715 719 720 721 723
726 727 728 730 732 734 740 741 742 744 745 747 748 749 750 751 752 754 755 756
757 758 760 761 764 765 766 768 771 775 778 780 781 783 784 785 787 788 789 792
793 795 796 798 799 806 813 819 820 821 823 825 827 828 830 832 833 835 836 837
838 841 844 848 849 850 857 859 860 861 866 867 873 875 876 877 879 880 882 883
885 886 887 889 892 893 896 906 915 920 922 923 928 931 936 938 939 941 943 944
945 947 950 954 955 956 957 960 962 964 965 966 968 969 971 974 976 978 979 987
988 991 992 993 995 996 997 998 999
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
SAN FRANCISCO, CALIFORNIA
Pacific Bell Customer Report For 415 NPA Split
NXXs Converting to NPA 510
204 208 210 215 222 223 226 228 229 231 233 234 235 236 237 238 245 248 251 253
254 256 261 262 263 264 265 268 269 271 272 273 275 276 277 278 279 283 284 287
293 294 295 297 298 302 307 309 310 313 317 339 351 352 356 357 370 372 373 374
376 385 410 412 414 416 417 419 420 422 423 425 426 427 428 429 430 432 436 437
438 439 440 443 444 446 447 448 449 451 452 455 458 460 462 463 464 465 466 471
475 481 482 483 484 486 487 489 490 498 504 509
_______________________________________________________________________________
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+