home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 2
/
HACKER2.BIN
/
992.DEST1.INF
< prev
next >
Wrap
Text File
|
1993-12-31
|
2KB
|
33 lines
┌┬┬┬┬┬┬┬┬┬┬ ┬┬┬┬┬──────────────────────────────────────────────┬┬┬┬┬┬┬┬┬ ┬┬┬┬┬┬┐
├ ┼┼┼┼┼┼┼┼┼┼┼┼ ┼┤ NEW HORIZONS IN DESTRUCTIVE CYBERPUNK ├ ┼┼┼┼┼┼┼┼┼┼┼┼ ┼┤
├┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼──────────────────────────────────────────────┼┼┼┼ ┼┼┼┼┼┼┼┼┼┼┼
├┼┼┼┼┼┼ ┼┼┼┼ ┼┼┼┤ ├┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┤
├┼ ┼┼┼┼┼ ┼┼┼┼┼┼┼┤ THE NEW, IMPROVED TELEPHONE! ┼┼┼┼┼┼ ┼┼┼┼┼┼┼ ┤
├┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼ ├┼┼┼┼┼┼┼┼┼ ┼┼┼┼┼┤
├┼┼┼┼┼ ┼┼┼┼┼┼ ┼┼┼──────────────────────────────────────────────┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┤
├┼┼┼┼┼┼┼┼┼┼┼┼┼┼┼┤ Copyright (C) 1992 by Timothy Campbell ├ ┼┼┼┼ ┼┼┼┼┼┼┼┼┼┤
┴┴┴┴┴┴┴┴┴┴ ┴┴┴┴──────────────────────────────────────────────┴┴┴┴┴┴┴┴┴┴┴┴┴ ┴┴┘
Some phones now have Caller Identification circuitry that will display who
is calling. It would not be a big deal for the designer of the phone's
internal program to surreptitiously code in a little routine that recognizes
his home phone number. He would ensure that whenever this model phone saw
his number, it wouldn't actually sound the ringer until the SECOND ring.
Now, then ... the programmer could have the phone remember if he called
three times in succession, each time hanging up before the second ring.
Having spotted this pattern, the phone will trigger its "nasty" routine,
which might involve turning on the earphone, even though the phone is still
"on-hook" (after all, it's just a sensor), then letting him listen in on
whatever is going on. Or ....
Imagine: you're a bank manager in New York City who has just repossessed
the car of a certain down-and-out programmer. At the end of the month, when
you look at your phone bill, you're stunned to discover hundreds of
one-minute calls to the Weather Information tape-recording in Johannesburg,
South Africa.
Nasty, eh?