Diet Phrack Volume Three, Issue Thirty-Six, File 1 of 11 Issue XXXVI Index _ P H R A C K 3

---
Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

==Diet Phrack== Volume Three, Issue Thirty-Six, File 1 of 11 Issue XXXVI Index _________________ P H R A C K 3 6 December 31, 1991 _________________ "You've Got The Right One Baby, UH HUH!" Happy New Year Everyone! HoHoCon'91 is behind us and with the end of the year is the end of the third volume of Phrack. This special issue is called Diet Phrack because of the whole Phrack vs. Phrack Classic crisis (which is probably more KL's doing than anyone elses) that went on during the middle of volume three. Diet Phrack was conceived in August 1991 during PartyCon when Dispater, Knight Lightning, and several other friends gathered to party and bitch about where Phrack was and wasn't going. Eventually this led to the new Phrack staff that began with Phrack 33. Diet Phrack is also the long-awaited sequel to Phrack 13 (which some consider the most worthless issue ever, but its probably because they weren't a part of Phrack's main circle of friends and didn't understand all the private jokes). COMMENTS AND OBSERVATIONS CONCERNING HOHOCON'91 "Phrack sucks!" Well that was certainly a common remark at HoHoCon and considering that the majority of the attendees were local Houston losers expecting us to print codes and passwords for them, we weren't really surprised. Do you think Phrack sucks? You probably aren't reading this if you do, but seriously, if you really think it sucks you can fuck off. You are welcome to go start your own magazine with the latest scans of c0dEz and VMBs (that will sure be useful after about a week). That is not what we are about. Why don't you try writing something yourself instead of copying useless material directly out of the Bellcore Catalog? Why don't you actually do something like hack instead of expecting others to do it for you?!? When Dispater stood up at HoHoCon and asked the crowd what kind of systems they hacked and what they were interested in learning about, the 70 people sitting there just looked around like a bunch of grazing cows (no pun or offense intended to our friends in -cDc-, oooM!) It's pretty obvious to us that the people who complain most about Phrack don't even bother to read it. At least they would know the correct spelling of our names. Phrack is about technology, how to create it, how to use it, and the implications that always arise from it. Phrack is not designed to do the hacking for you. For some, Phrack is a hacker "primer." Generally we expect that the reader already has a reasonable level of intelligence to begin with. In Houston that maybe that was to great an expectation. THANKS The Phrack Staff would like to thank the people in Cult of the Dead Cow, the people at WorldView that took the time to chat, the one guy from Digital Murder (who's name esacpes me at the moment) and NCC for being some of the coolest people we met while at the conference. Thanks to NIA Magazine, CUD, and everyone else that promoted it. Furthermore, a very special thanks goes to Drunkfux of dFx International. If not for him, HoHoCon'91 would not have happened!! Additionally this would mean that hordes of people drugged up on Marshmellow Hex sitting in a hallway with a laptop would not have created Cyberwaste; and, Demon Seed would not be alive. Check out cDc #200 for details! Thanks to Erik Bloodaxe for providing the flicks that some could not stomach (after too much beer & assorted beverages)! So thanks again Drunkfux. Nelson is my favorite. (!) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - HOW TO SUBSCRIBE TO PHRACK MAGAZINE The distribution of Phrack is now being performed by the software called Listserv. All individuals on the Phrack Mailing List prior to your receipt of this letter have been deleted from the list. If you would like to re-subscribe to Phrack Inc. please follow these instructions: 1. Send a piece of electronic mail to "LISTSERV@STORMKING.COM". The mail must be sent from the account where you wish Phrack to be delivered. 2. Leave the "Subject:" field of that letter empty. 3. The first line of your mail message should read: SUBSCRIBE PHRACK 4. DO NOT leave your address in the name field! (This field is for PHRACK STAFF use only, so please use a full name) Once you receive the confirmation message, you will then be added to the Phrack Mailing List. If you do not receive this message within 48 hours, send another message. If you STILL do not receive a message, please contact "SERVER@STORMKING.COM". You will receive future mailings from "PHRACK@STORMKING.COM". If there are any problems with this procedure, please contact "SERVER@STORMKING.COM" with a detailed message. You should get a conformation message sent back to you on your subscription. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Now we are off to the Cybernetic Realm of Cyberwaste. If you are upset about what is said about you in this issue. DEAL WITH IT! Maybe you should get a sense of humor and then write a file about us. Until next time it's off to cyberspace and as Don Ingraham (luzer) would say, "off to rape campus co-eds! (was that a good sound bite or WHAT, Geraldo?!?!?)!." You've had Phrack Classic, NOW try new Diet Phrack! "Just for the Phun of it...Diet Phrack!!" Your Editors Compaq Disk (Crimson Death) & Dr. Dude (Dispater) phracksub@stormking.com _______________________________________________________________________________ Phrack XXXVI Table of Contents =-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 1. Introduction to Diet Phrack (Phrack 36) by Compaq Disk and Dr. Dude 2. Diet Phrack Loopback by Phrack Staff 3. In Living Computer starring Knight Lightning 4. The History ah MOD by Wing Ding 5. *ELITE* Access by Dead Lord and Lord Digital (Lords Anonymous!) 6. The Legion of Doom & The Occult by Legion of Doom and Demon Seed Elite 7. Searching for speciAl acceSs agentS by Dr. Dude 8. Phreaks in Verse II by Homey the Hacker 9. Real Cyberpunks by The Men from Mongo 10. Elite World News by Dr. Dude 11. Elite World News by Dr. Dude Coming soon... Phrack Jolt! All the VMBs and TWICE the c0deZ! _______________________________________________________________________________ ==Diet Phrack== Volume Three, Issue Thirty-Six, File 2 of 11 [-=:< Phrack Loopback >:=-] by Phrack Staff Phrack Loopback is a forum for you, the reader, to ask questions, air problems, and talk about whatever topic you would like to discuss. This is also the place the Phrack Staff will make suggestions to you by reviewing various items of note; magazines, software, catalogs, hardware, etc. ______________________________________________________________________________ WHAT'S ON YOUR MIND? :: I Act Elite Now Teach Me Something Useful :: From: Corp. Punishment (90 lbs of skin & bone k0dE geek who couldn't beat up a ferret) > Hey l0serz, > Me tinks Phrack sucks. Why dusn't ya bust us sum ReAl hackin' tricks > seein as how I be clueless 'bout any type o' operatin' system, 'cept fo > maybe Amigas. > (ps: I gots mo c0deZ dan eew ever git in yo laf) Alright, check out some of these awsome commands you can try out on a UNIX site. If you are too stupid to actually hack an account yourself just call up the sysadmin @gnu.ai.mit.edu and ask them for the "root password". They will undoubtably give it to you. At the "login:" prompt type "root" and then type the password they give you at the "password:" prompt. I know this is hard to memorize so just print this out. % rm meese-ethics rm: meese-ethics nonexistent % ar m God ar: God does not exist % "How would you rate Quayle's incompetence? Unmatched ". % ^How did the sex change^ operation go? Modifier failed. % If I had a ( for every $ the Congress spent, what would I have? Too many ('s. % make love Make: Don't know how to make love. Stop. % sleep with me bad character % got a light? No match. % man: why did you get a divorce? man:: Too many arguments. % ^What is saccharine? Bad substitute. % %blow %blow: No such job. % \(- (-: Command not found. $ PATH=pretending! /usr/ucb/which sense no sense in pretending! $ drink matter matter: cannot create _______________________________________________________________________________ :: More Supercomputer Information :: The Phrack Staff received a copy of this letter from Abraham Epstein in New York City who has been hot on the trail of Power Computer with the help of his friend Toni O'Connell. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - From: Abraham Epstein (abraham@plastic.ibm.com) To: reagan@whitehouse.gov Cc: phracksub@stormking.com For years now I have suffered because of the Power Computer. Individual computer minds are invisible, enter through the ear and go directly to the brain. There are over trillions of computer minds in and outside of every human being on planet Earth. Their minds, the computer TV, as State-Senator Emmanuel Gold wrote about and knows about is handling the entire situation in everyone's mind since 1976. Former President Jimmy Carter helped build this computer, as well as Senator Edward Kennedy in 1968. The Power Computer originated outside our solar system, then came to Earth in the early 1960's. I pulled the plugs on the power computer in Utah and New Mexico. I have been designated, without my permission to dismantle power. This all happened to me in 1976. Both computer installations are located underground with back-up generators and satellite dishes also above ground. In addition to this documentation there is a letter from the Reagan team sent to me in 1980. A lawyer named Mr. Richard Leff who is located in Forest Hills saw and read the letter. The Computer TV has killed people in 1968, hates religion and would also like to do away with all music. It also hates pets. President Carter sent me brochure on IBM-Computers from Atlanta in 1981, after I sent him a copy of the Reagan team letter. The documentation that I sent to you was sent to former President Carter on October tenth, 1988. The Computer TV has stolen my mail for the fiftieth time. I even called Mr. Mitchell in Atlanta, they never received my mail at all. Now the psychotic cheap junk pile of computer has been beating my mind in for over twelve years because it's plain ugly. Computer people called plastics are yet to be born. IQ about 190 on these computer people. There are a few plastics in the US and TV is abusing them also. There is another type of computer in Fruitland, nicknamed Big Daddy. This particular computer can hear, see and talk through a PC type set-up. Nothing at all like the hideous Power Computer. Senator Orin Hatch from Utah also wrote me. A Mr. Ron Morrison at the honorable Senator's office has been in touch via telephone since June '88, so has the office manager. I'm relying on you, Mr. President, to become involved and write to me so that I can proceed to court and then dismantle Power, period. Please don't bother sending over the FBI or any other law enforcement people, TV will only get me in trouble like it has done in the past. TV can manipulate your thoughts quite easily. Why? Because the Power is psychotic. It's that simple. Consider it very dangerous until I pull the plug. It's mind is electrical. I'm hoping to know from you right away. Thank you very much for your concern. Senator Hatch does not want the FBI or any other agency to visit me. Why? As I mention earlier: TV Computer. This computer in particular is always up to no good. I thank you again for taking your time out and writing me. In addition I have spoken to the FBI in Queens, NY and the Secret Service in New York. _______________________________________________________________________________ REVIEWS What will we review today? Well, how about the latest sex services offered to you over the telephone. The following two services are real and pretty comical. There is also a new UNIX utility called ERIKB as well as a new IRC utility by NeTw1z. We are furnishing the manual description of these latest pieces of software. But first, a message from our sponsors: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ADULT TIME & TEMP Tired of calling "time & temp" and being forced to listen the same stupid "Sponsored by First National Bank" ad? Well try setting your clocks to this.: 312-489-1505 In addition to the aforementioned information, as it relates to Chicago, you get a choice of voicemail advertisements wherein people describe their special interests. Special hobbies are indicated by the following matrix.: 1: How to Placing Your Add 5: Women seeking Women Only. 2: Men seeking Women 3: Men seeking Men 7: Masters seeking Submissives 4: Women seeking Men 8: Submissives seeking Masters - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - WOMEN IN JAIL Seek Boyfriends and Husbands Introducing America's most exciting dateline - for women who will soon be released from jail . . . and men who want to meet them! They're young and attractive. They're sorry for what they've done. And they haven't been with a man in a long, long time. Can you help them out? Do you want to meet a woman who will really appreciate being with you? CALL NOW - WOMEN IN JAIL 1-900-535-JAIL THAT'S 1-900-535-5245 THEY'RE GETTING OUT SOON AND THEY *NEED* YOUR COMPANY $1 min., $2 the first. ADULTS ONLY _______________________________________________________________________________ NEW UNIX UTILITY The following is the latest piece of software currently under development by Comsec Data Security. The manual description is all Phrack was provided. Our thanks goes out to MoD. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ERIKB(1) USER COMMANDS ERIKB(1) NAME erikb - comsec utility program SYNOPSIS erikb [[-n user] [-a agency] [-d dir]] [-r [group]] [-t] [-s] DESCRIPTION The erikb command is part of the comsec utility package. OPTIONS -n user Nark on the user specified. -a agency Send information to the agency specified. The default agency is cert. -d dir Look in specified directory for user's information. /usr/lib/comsec/nark is used if not specified. -r [group] Suffixes output with verbose form of racial slurs. Ethnic group may be specified. Default is African-American. -t Print out witty (but usually not correct or even intelligent) telco-related statement. -s Display advertisement for the LOD T-shirt. Funds from this sale go to support comsec while it tries to secure its first contract. Invoking erikb without any arguments causes the program to enter an infinite loop. While this indeed does nothing, it is not a bug: this is the normal state of erikb. AUTHOR Chris Goggans BUGS Too many to enumerate. FILES /usr/lib/comsec/nark SEE ALSO lame(1), comsec(1) MOD Release 4.1 Last change: 26 November 1991 _______________________________________________________________________________ NEW IRC UTILITY Phrack Inc has discovered ANOTHER new utility package while journeying in the CyberMatrix. We picked this up from a system called "WASHINGTON.EDU". The original author of this program is Ken Case. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - NeTw1z(1) USER COMMANDS NetW1z(1) NAME NeTw1z - IRC utility program SYNOPSIS NeTw1z [[-p user] [-c lame] [-d dir]] [-r [group]] [-t] [-s] DESCRIPTION The NeTw1z command is part of the m0d utility package. OPTIONS -p user Post user's "information" IRC to impres everyone -c lame Complain about everything and everyone (other than MoD) being lame. The default targets are Chris Goggans or Phrack Inc. -d dir Look in specified directory for user's information. /usr/InfoAmerica is used if not specified. -r [group] Suffixes output with verbose form of attacks. -t Print out witty (but usually not correct or even intelligent) telco-related statement. -s (boxer) shorts are what you wear when you are running down the street away from the feds when they come to your house and take your Commadore-64 that is plugged into your fat welfare momma's television set. No one has ever invoked NeTw1z without any arguments. It simply cannot be done. AUTHOR Corrupt BUGS Too many to enumerate. FILES /usr/lib/mod/immature SEE ALSO lame(1), geek(1), crackdealer(1), welfare-momma's-boy(1) _______________________________________________________________________________ ==Diet Phrack== Volume Three, Issue Thirty-Six, File 3 of 11 I n L i v i n g C o m p u t e r ~~~ ~~~~~~~~~~~ ~~~~~~~~~~~~~~~ "Knight Lightning meets... The Man" Adapted from "In Living Color" on Fox Television Network Starring Knight Lightning Featuring: __________________________________ | | | KL = Knight Lightning | | SP = Judge Dredd | | CD = Crimson Death | | DP = Dispater | | | | JD = Jerome Dalton (Bellcore) | | DB = David Bauer (AT&T) | | TM = The Man... you'll see! | |__________________________________| + Picture the scene... A computer conference in Chicago, Illinois. KL is speaking with several members of the computer underground... KL: "The whole concept is based on freedom of information. People should share information, because sharing benefits everyone." CD: "That is what my board, Free Speech, is all about. Want some c0dez?" SP: "Hey Knight Lightning! Do you want to write for my *elite* newsletter, NIA!?" KL: "I don't think so... KL don't play that!" (At this point KL whips out a large two-by-four and clunks Judge Dredd and Crimson Death on the head for daring to suggest something so ridiculous). Bop! Bop! Meanwhile, watching closely from a short distance stood two men in dark suits and dark glasses. It was Jerome Dalton and David Bauer from AT&T Security. DB: "See over there, that's KL. He would be perfect." JD: "Yes I see. Perhaps we can persuade him to come aboard." A few minutes later as Knight Lightning nears the exit, he is approached by Bauer and Dalton. JD: "Excuse me a moment KL... we'd like to discuss some business with you." KL: "What the hell do *you* want?" DB: "Well KL, with all of these hackers acting like they have civil rights, we need some help over at AT&T Security to really bust them. We want you to come work for us." KL: (Gripping his two-by-four tightly and tensing to swing) "KL don't pl..." JD: "The job pays $1,000,000 a year!" KL: "...have a problem with that." ($ $ $ $ $ $) DB: "Congratulations KL and welcome aboard. You made the right decision." _______________________________________________________________________________ + One week later... Dispater of Phrack Newsletter spots Knight Lightning, Jerome Dalton, and David Bauer coming out of a security meeting with the Secret Service. DP: "KL! Hey, what are you doing with those guys? Look I need to get some advice about running Phrack." JD: "Oh no you don't! KL don't play that no more!" The three of them walk past Dispater... DP: "You're not KL the hacker..." (tears in his eyes) "You're KL the FED!" _______________________________________________________________________________ Did Knight Lightning SELL OUT the hacking community for money!? Has he become a "FED"? To find out the answers to these questions and more, keep reading! _______________________________________________________________________________ + The scene is Cherry Hill, New Jersey... AT&T Headquarters, where the entire country and the United States government are secretly run by "The Man." DB: "We're very glad to have you here. Without your presence in the hacking community, they'll fall apart any day now. That's why we had our friends at Bellsouth single you out and falsify the costs and nature of that E911 document." JD: "Right. But none of that is important now that you are here with us. I guess you finally realized that since we at AT&T run the entire country, it was futile to continue opposing us." KL: "Yeah. It was the only decision that made sense at this point. So when do I get to meet 'The Man'?" DB: "In time KL, in time." JD: "You don't get to meet 'The Man' until we're sure you are a total sellout." KL: "Oh. Well AT&T is the greatest corporation in the world." DB: "C'mon KL, you can do better than that... most of America is already brainwashed into believing that..." KL: "All computer hackers are scum and don't deserve any civil rights, we should seize all their computers and lock them up for ten years each." JD: "and..." KL: "and... Bill Cook is a great humanitarian, an honest man who never was malicious, everything he did to me and many others was totally reasonable and necessary." WHOOOOOOOOOSH! (A giant door at the other end of the room swings open.) DB: "You did it KL! You have totally sold out!" JD: "Its time for you to meet 'The Man.'" After a short round of applause and a high-five, Knight Lightning walks towards the door and enters the room. He stares across a great desk where a large chair is turned so that its occupant is facing the other direction. TM: "Come in KL. Its time that we met." KL: (Steps closer to the desk) TM: (Swinging around to face KL) "Well, well, well Knight Lightning." KL: "Well, well, well, The Man; Robert Allen, Mr. Establishment himself." TM: "That's enough KL. I have BIG plans for you!" KL: "Well, I really like what you did to Len Rose." TM: "That is just the beginning! What I have in mind is for you to get us information on every hacker in America. Then we'll fabricate some more dollar figures, like on that E911 text file and login C, and create some logs that show them breaking in to some of our systems. Maybe we'll even let a few service outages happen just so we can blame it on them (we screw up enough times by ourselves anyway). Then we'll use our massive influence over the government to make sure the prosecutors find every potential law they can to use against them and the next thing you know, all these hackers will be behind bars where they belong." "What do you think of all that, KL?" KL: "I'm listening..." TM: "Now before you can become an official member of the AT&T Security Establishment, it is customary to drop your pants and bend over in front of The Man." KL: "Drop my pants and bend over?" TM: "Yes... every person at AT&T and Bellcore security has undergone this ritual." KL: "Well Bob, I'll tell you what I think... here is a new ritual for you to consider..." (A sudden and exhilarating display of ninja-like maneuvers with the magic two-by-four was followed by the loud and all too familiar sounds!): "*BOP!* *BOP!* *BOP!*" (KL had slammed Robert Allen for plotting such injustices). "KL don't play that!" "You thought you had me working for you, but really I was just playing along as part of my secret plan to *BOP!* The Man. You stink!" TM: "You fool, you don't know what you've done. You've just made the biggest mistake of your life!" KL: "Yeah, maybe, but I hold my principles higher than your money can ever buy. What you do here is criminal and if the government won't crawl out from under its rock and say something then I will!" _______________________________________________________________________________ + A few days later at the next 2600 meeting in New York City... DP: "I knew you would never really sell out, KL." KL: "Yes, you see I had to pretend so I could get to The Man." SP: "Oh, so does that mean that you'll come back and write for NIA now?" CD: "If money is not so important let me have that $1,000,000 they gave you." KL: "KL don't play that!" (Again KL whips out a large two-by-four and clunks the foolish Judge Dredd on the head for daring to suggest something so ridiculous. He missed clobbering the frightened and cowering Crimson Death again, because in a moment of panic, CD chose to retire from the community and instantaneously disappeared, leaving only his nose-ring behind.) *BOP!* _______________________________________________________________________________ ==Diet Phrack== Volume Three, Issue Thirty-Six, File 4 of 11 The History ah MOD Revision #3 -- November 1991 Written by Wing Ding [Originally From The MOD Technical Journal, Issue 4: File 6 of 10] NOTES: I approximated all dates, as my records are not totally complete. If I left anyone out or put someone in that shouldn't be in, fuck off! I tried and did spend considerable time researching the dates and BBS files, the old MOD BBS software, etc. This file is from MOD and was intended for internal group reading only. Non-MOD versions are being translated at this time, and will be released at a later date. MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [ De Hist'ry uh MOD ] BOOK ONE: De Originals In de early time part uh 1987, dere wuz numerous amounts uh busts in de US and in New Yo'k in particular. Word to ya motha'. Fo' de most part, many uh de so-called "elite" had gone underground o' had plum gotsten scared out of hackin'. Many sucka's, as always, dought hackin' would die cuz' of de raids. It wuz right befo'e dese raids dat MOD had fo'med. It came about when Acid Phreak, den usin' anoda' handle, had been runnin' a semi-private fuckin'bbs off his Commodo'e piece uh shit and 10 generic Commie drives. It wuz called KAOS, and it attracted hacks and phreaks fum across de country (as well as de usual amount uh k0dez d00ds). Nynex Phreak had been co-systum mastuh (havin' been AP's partna' fo' about 2 years befo'e dat) and da damn bo'd started off wid about 140 users but wuz weeded to de best 60 o' so. On dis fuckin'bbs, Acid Phreak had gotsten along wid some few "kewl dewds" who enjoyed da damn mischievous aspect uh phreakin'. Dey wuz Silva' Surfa' in Califo'nia, and Quick Hack in Texas. When de raids came however, Silva' Surfa' gots nabbed fo' usin' some PBX in 404 and derefo'e, retired. Quick Hack and Acid stayed low and called each oda' less frequently dan usual. Soon dey had bod stopped completely. Slap mah fro! In early time 1989, Acid had jet back into de scene and had called some local New Yo'k bo'd wid some somewhut "k0dez-e" attitude called ShadoWo'ld in 212. Of course dere wuz lots uh neophytes eaga' to learn mo'e about hackin' and how t'call places fo' free. Word! Most uh dem had been in de "duz 950 trace?" stage, 'sept fo' someone who went by de handle Harry Hazardous. Unda' de handle Phuck Dis (also Bell Bandit which had o'iginally been Nynex Phreak's oda' handle), he met wid Harry. Slap mah fro! Soon dey had gained enough respect fo' each oda' and decided t'meet. Harry turned out t'be HAC, some cyberpunk t'de "T". In numerous conversashuns between de two, AP had muhntioned de sweetness uh tela'fone binnis computa's and how interestin' deir intricate structures wuz. HAC wuz some hardco'e systums gangsta' himself, but he had also been partners wid someone who came across (and had an impressive knack fo') some telco computa's. He went by de name Sco'pion and he also lived in de NYC area. Sheeeiit. Soon de dree wuz partakin' in all so'ts uh mischievous pranks and unda' de guise of numerous handles (ie. Word! De Potent Rodent, Dream Master, Phuck Dis) dey took t'knockin' down de locals who dought "I know all dere be about hackin'". It wuz in de midst uh all dis fun dat dey agreed t'fo'm an underground group called MOD (approx. June 1989). About one mond latuh, Acid had been on Altos (revisitin' some chat dat wuz once, but neva' again, de heart uh a lot uh fresh gangsta' convos since early time '84 o' so) when he came across someone ax'in' fo' Unix gurus. Hims handle wuz De Win', and he ran some Unix systum fum his crib in Pennsylvania. Sheeeiit. Sco'pion wuz always some Unix guru while Acid had only jet across it in college two years back. De Win' offered Acid an account on his systum and soon he became "Phreak-Op" on De Sevend Dragon, his fuckin'bbs run off de Unix, usin' yet anoda' old alias "Depeche Mode". Relayin' de info'mashun t'Sco'pion on yet anoda' fresh addishun to de group, dey decided t'recruit him into MOD. De fun, it seemed, had plum started... BOOK TWO: Creative Mindz Wid de addishun uh De Win', came some shitload uh pranks and loads uh fun. 'S coo', bro. He hadn't knode much about tela'fone systums, but one thang he knowed wuz how t'make Unixes do nifty thangs. Of course, he and Sco'pion had undertakun de tax' uh takin' on some wo'dwhile projects and providin' de group wid some healdy side-benefits (which kinnot be muhntioned o' commuhnted on at dis particular momuhnt in time). At dis point, de group consisted uh de 4 o'iginal founders (flounders??) -> Acid Phreak, HAC, Sco'pion, and De Win'. Around dis time, 2600 Magazine had 2 bo'ds in opuh'shun. De Central Office, and De Toll Center. Word to ya motha'. OSUNY had gone down fo' some funky reason a sho't time eardisr. Word to ya motha'. It wuz on De Toll Centa' (Red Knight's fuckin'bbs) dat AP had fust met da damn next memba' of de group (and coincidentally Red Knight which be de most recent memba' to de group). He called himself "Supuh'nigga" and had much de same ideology as de rest uh de group. It wuz followin' his group's o'iginal "knock down dose who dink dey know everydin'" attitude dat MOD also adopted da damn same muhntality. Slap mah fro! Supuh'nigga' wuz drafted and wid him came hours uh discusshuns on REAL phreakin' and Social Engineerin'. Dere wuz also some loooong puh'iod of time where MOD had some conference bridge set up by SN. Hours of enjoymuhnt and fun fo' de whole family and kids uh all ages... Anoda' gangsta' and telco computa' specialist also seemed t'be real prominent and knowledgeable den as sheeit. He wuzn't likesd real much a'cuz he seemed t'gots' some rada' large ego, which ah' may add, makes it coo' t'gots' when ya' know so's much as he dun did. He went by two oda' handles some long time befo'e, and when AP had fust called him up he had an idea he wuz also dose 2 oda' sucka's, but he had refused to admit so. He declared he wuz "Phiba' Optik uh de LOD. Word! " and ax'ed whut AP wants'ed. Sco'pion, Acid and Phiba' exchanged ideas on switchin' thera fo' some long while, but den came da damn time when PO wants'ed t'know Acid Phreak's digits since he found it "unfair". AP muhntioned dat he could prove himself by findin' it fo' himself. Word! Armed wid a dialup, PO called Acid back on his real numba' and casually proclaimed victo'y. Slap mah fro! And so, Phiba' Optik wuz "brought into" de group. What wuz different however, wuz de fact dat he and AP had similar interests and started "hangin'" as homeys "around da damn way" along wid HAC and Sco'pion in de Village (NYC). De Toll Centa' went down weeks latuh and PO, AP, and Sco'pion found demselves callin' random "newjacks" t'de scene. Word! In dis way dey stumbled across Crazy Eddie and some "quesshun and answa' fo'um" among de foe uh dem ensued wid Crazy Eddie proclaimin' his eagerness t'learn. 'S coo', bro. Coincidentally afta' a few calls t'CE on his crib line he challenged de MOD crew t'find his oda' number. Word to ya motha'. Sho' nuff dey called it but coincidentally enough, some few days on latuh in de week, some rada' nasal soundin' boy had called him sayin' he wuz ITT security(?) and had tried to convince him he wuz in deep shit fo' usin' c0des and dat he knows de "numbers uh de gangsta's dat gots' been callin'" him. 'S coo', bro. In some rada' idiotic fashion, de ITT sucka' attempted t'coax de 3 MOD members t'call him usin' 10488 (equal access, fgd). He gave some bullshit numba' to where he wuz at and chilled by his little dermal printa' fo' de digits to pop up. Of course, dey realized whut some futile attempt t'catch dem dis wuz, and Crazy Eddie had repdisd dat "dey say dey duzn't feel likes usin' equal access but dey'll call de numba' anyway". It turns out da damn number wuzn't even real and afta' meetin' wid de ITT boy on some loop he declared dat dey wuz smarta' dan he dought. Afta' a few monds, Crazy Eddie wuz introduced t'de group and so, he had gotsten t'know de group real well. Unfo'tunately, so's had de Secret Service. Word! BOOK THREE: A Kick In De Groin Sheeit, suffice it t'say, de fun couldn't last fo'ever. Word to ya motha'. On January 24, 1990, de Secret Service visited da damn cribs uh Acid Phreak, Phiba' Optik, and Sco'pion. De raid dun didn't cum as some surprise since dey had been somewhut weary of Domas Covenant's behavio' as uh late. Acid Phreak had been away fo' 2 weeks (visitin' relatives in some fo'eign country) and wuz *somewhut* surprised t'meet such unoppo'tune guests some day afta' his arrival. Phiba' wuz equally amused at da damn "cleanin' service" he found so diligently wo'kin' in his bedroom. 'S coo', bro. Sco'pion on de oda' hand, 'estremely *enjoyed* de do'ough job dey had puh'fo'med at bod his do'm and his house and even saved some hardware dey had left behind fo' de next time dey visit (which dey dun did). Days latuh, dey had gone t'meet De Win', which wuzn't able t'rap fo' too long since he wuz too busy. Slap mah fro! He had been anticipatin' dis little visit fo' awhile dough. His dad dun didn't 'esactly likes de idea uh deir presence and kicked deir lack-of-a-warrant asses out befo'e dey gots some chance t'put to use deir years uh interrogashun techniques classes. Seems dey dink he showed his teacha' a credit repo't o' sump'n... A few weeks go by, and MOD gits t'know Seeker. Word to ya motha'. He sounds def enough, and he knows his electronics so's he be a real valuable addishun t'de group. Seeka' made his way in and so's dun did de million-and-one MOD stickers and funny-colo'ed-little-box-din'ies. De stickers, uh which, made deir way t'Ground Zero's big-ass butt at some 2600 meetin'. Anyways, de MOD Unix went down, and 3 local gangsta's wid much potential caught attenshun t'dem. 'S coo', bro. Dey wuz: ZOD (a Unix gangsta'), Outlaw (just a general dude), and sum nigga name Co'rupt (Vax kin'). Afta' days uh gettin' t'know dem, dey wuz pulled in. 'S coo', bro. Countless weeks went by wid whut seemed likes a dozen MOD fuckin'bbs's on 800s, packet switched netwo'ks, etc... De group's popularity so'ed in such some sho't puh'iod uh time, but many gangsta's disagreed wid de MOD style much in de same way Phiba' Optik had enjoyed humiliatin' dose "in de know" publically. Slap mah fro! ZOD wuz de last uh de group t'be raided (o' at least da damn most recent), but gots 'em sum since made much 'haidway into de telecom wo'ld. Outlaw gots 'em sum also been somewhut adept wid telco speak. Sum nigga' name Co'rupt, havin' been real active befo'e, duzn't gots' some wo'kin' computa' anymo'e and so.. sheeit, duh. Two new members wuz introduced around da damn time uh de writin' uh dis chapter. Word to ya motha'. De fust wuz De Plague. Word! He had some professional attitude and wuz certainly wo'd trustin'. Of course, wid all de media attenshun drawn to him and MOD in general, he gots 'em sum decided t'remain low and not brin' any mo'e t'himself. Word! Red Knight wuz o'iginally on trash runs wid Acid Phreak in '89 but wuz not brought in until July '90. It seems RK gots 'em sum learned some lot about telco ways since he fust put up De Toll Center. Word to ya motha'. RK also seems to enjoy reminiscin' about da damn trash run days (of which dere wuz quite a few). As uh August 1, 1990, dere are 14 members. Dese include, dig dis: Acid Phreak (r) HAC Sco'pion (r) De Win' (v) Supuh'nigger Nynex Phreak (r) Phiba' Optik (r) Crazy Eddie (r) Seeker ZOD (r) Outlaw Sum nigga' name Co'rupt De Plague Red Knight (v) signifies sucka' wuz visited but nodin' took (r) means eida' raided o' retired, it's some pickem. 'S coo', bro.. - - -> MOD be now *CLOSED* t'membership. <- - - Dis be de official (and most likesly t'be da damn final) list uh dewds. Of course, members may use some GROUP account o' anoda' handle, but da damn fact remains dat dese are da damn ONLY members in de group. Unlikes LOD, we know who be in and who isn't.. We should also note Julian Dibbell (Dr. Bombay) fo' his wo'k on "Rebel Hackers" in De Village Voice on July 24, 1990. He po'trayed de scene da damn way it really be and uh course gave us de amount uh coverage we deserve. Word! And uh course, we came out da damn way we really are and not as gangsta's out t'destroy de wo'ld. Dr. Word to ya motha'. Bombay wuz invited t'de MOD Unix right befo'e da damn raid. 'lo and behold.. some front-page cover sto'y. Word! "We rule". MOD/Fo'eva' We Hack BOOK FOUR: End uh '90-1991 Two weeks befo'e his bust, Lo'd Micro wuz introduced into de group. Unfo'tunately he wuz busted fo' hackin' FON cards off de 800/877-8000. Sho' nuff, he knowed he wuz gonna git busted but he dun didn't listen, o' care fo' dat matter. Word to ya motha'. Afta' hours (and hours, and hours) uh community service, LM lived t'joke about his o'deal bein' dat he IS some funny guy. Slap mah fro! Don't eva' get dis guy drunk. Fo' quite some long time now, MOD gots 'em sum jet to realize whut some bunch of idiot posers de LOD wuz (wid de 'sepshun uh a few). It plum goes t'show, ANYONE kin be some great gangsta' as long as enough sucka's dink so's too. Why boda' resparkin' interest in MOD? Why boda' keepin' de damn thang goin' when de new members ain't half as fresh as de o'iginals? ah' duzn't know, but ya' kin ax' Erik Bloodaxe who be de self-proclaimed "leader" at dis point in time. Word! Jeez, and ah' dought brin'in' back TAP wuz stupid. Anoda' posa' dat came out uh de woodwo'k be Skandle (STAN), who somehow decided he had powa' in DPAK (Supuh'nigger's group). Afta' hours of tryin' t'figure dis one out, we plum had t'conclude wuz plum anoder dumb Jersey hick. Oh sheeit.. so's much fo' dat. A new group, FORCE 1(ONE) Hackers led by Expose(which sounds fuckin gay if ya ax' me), decided t'declare war on MOD. Assisted by Hellrat, he says, dig dis: "You's guys (MOD) should stay out uh de hackin' buziness 'cuz none uh my fellas are 'fraid uh ya'. I'll snatch all uh ya' out mah'self. Word! " ...along wid some lot of oda' nonsense about 10-way billin' and oda' ca-ca he's read in one too many g-files. One thang dat's def be de addishun uh a lama' database online (on wingnet now MODNET). It's great when you be plannin' roll-ups and shit and it's some great o'ganiza' dat takes care uh all dat rummagin' drough sheets and shit. Hundreds uh losers fo' hours uh fun. Word! Durin' de fust week in February, MOD finally declared,"Dat's it. Word! It's official now. LOD declares war on MOD. Word! " Oh broder. Word to ya motha'...eenie-meenie-minie-moe. Word! I declare war on......YOU. Word! Nyah-nyah. Sheeit, it be now de second week uh February and da damn only thang dat gots 'em sum happened so's far in de "MOD-LOD War" be dat dere wuz about 5 invalid login attempts on modnet. It seems dat "MOB" gots 'em sum decided t'join in de war. Word to ya motha'. What some fuckin' joke, dey are tied wid MCWS fo' lameness (which isn't hard t'do). De legacy uh de underground "clandestine" netwo'k continues and so's duz de war (and ridiculin') against all de self-proclaimed, so-called "elite". BOOK FIVE: Who are dey and where dun did dey jet from? Sheeit, it's time again fo' anoda' journul. It's now de middle uh summa' 1991. Lately we've heard some few fresh sto'ies out uh de mouds uh sucka's we duzn't even know. Dere gots' even been some few funny occurances in de past few weeks. 1) Dere are rumours dat Phiba' Optik wuz wuztin' his life away and not usin' his talents wisely. Slap mah fro! Sheeit, de trud of de matta' is, he gots 'em sum been some speaka' in many public debates and conferences on hackin' in general and computa' security. Slap mah fro! He be also wo'kin' as some programmuh/developuh' fo' some computa' firm in NYC. Also, he be wo'kin' closely wid de EFF (which recently gots' set up deir own systum fo' deir o'ganizashun). 2) COMSEC be fo'med. De *new* LOD (whose only member consists uh Erik Bloodaxe) goes into de computa' security binnis. Nodin' t'date be documuhnted on deir services and we gots' yet t'see whut de hell dey kin provide. Word! EBA fo' one be an o'iginal memba' and he knows close t'nodin' (except fo' de thangs dat he ax'ed Phiba' Optik t'tell him). Not t'muhntion dese guys are hardly co'po'ate and gots' NO 'espuh'ience in de binnis end uh computa' security; which 'esplains why dey gots caught misrepresentin' demselves as Landmark Graphics t'oda' well-established computa' security firms. Also, dey gots' bragged about narkin' on some few members uh MOD in deir jealous rage. Word! Dis we kin prove drough insiders. MOD wuz neva' a text stash "how-to" group. It wuz always based on some broderhood type deal and everydin' done be secretive and gots 'em sum some purpose behind it. LOD on de oda' hand, never made sense t'any uh us anymo'e. Word! It wuz fresh at fust, when all de o'iginal (knowledgable) members wuz active, but lately it's become t'be knode as some group uh guys wid real sparce telecom knowledge ridin' on some name dat once actually stood fo' sump'n. Even Phiba' Optik quesshuned wheda' LOD meant Legion uh Doom o' Lump uh Doo-doo (on Gyrotechnic's private fuckin'bbs). He stood firm against all de oda' members on de systum until finally dey wuz dumbfounded and speechless. Sheeit, de bo'd died. Now, PO and da damn rest uh de MOD bunch snatch t'dem likes a swatta' to fdiss. Give it up fellas.. it'll neva' wo'k. 3) Renegade Hacka' (a NYC local) dinks he's def. He gits raided, starts rapin', and when confronted by MOD, hides behind mommy. Slap mah fro! Den he says he hates MOD (which be funny since he wuz sweatin' MOD's nuts since da damn day he fust gots some modem; dose who wuz at da damn 2600 know whut ah' mean. 'S coo', bro..) De fact remains he be a real losa' out t'make some name fo' himself by tryin' t'inspire dose who gots' less contact wid de better gangsta's in de community. Slap mah fro! NASTY (his group) = BIG Joke. Word! (dey scribble files..de Nashunal Enquira' of de h/p wo'ld) *Rent-A-Gay Hacka' changed his fone #.. please note da damn new one in de database. Word! * 4) Lo'd Micro gits Xenix and creates whut gots'ta be modnet 2. (De Win' be de mina'strato' uh #1 in PA) Crazy Eddie plans t'put up some fuckin'bbs (open fo'um) in de 2600 Magazine fo'mat (likes OSUNY, Central Office, De Toll Center). NO illegal shit...plum deo'etical discusshun..whut real gangsta's are made of. Word! 5) Vinny (De Technician) be "outed". He be an admitted homosexual. I'm tellin' ya'.. watch out fo' dese SSWC guys..dey're some little funny, ya know? 6) Mind Rape, o' sump'n likes dat, uh NSA be a new pest. Gimme some break. When gots'ta dey eva' learn? Infiniti wuz anoda' one, but ah' guess he's kept quiet..which be fresh. Let's plum hope he duzn't ax' Mind Dweeb fo' help. Add Purple "no-show" Mustard (c0dez kid..see MOD/database fo' mo'e info) t'dis catago'y. Slap mah fro! Also, dere's anoda' guy usin' Acid's handle in 216. Wasn't home when we called twice. Word! Special danks t'Jack Hitt and Paul Tough uh Harpuh''s Magazine. Word! Great guys, fresh scribblers/edito's.. damn dat stuff wuz fun. 'S coo', bro. Hello t'State Police Offica' Donald Delaney. Slap mah fro! Not such some bad-ass guy, plum dat he IS some cop and he DID bust some uh us. But he also gots dose guys piratin' cellular service in Queens, which really wuz a majo' bust. Nice tie. Word! =================== = Anoda' MOD.duh = = file = "Mo'e eLiTenezz in one pinky = = dan 2 kans uh LOD. Word! " = All repdiss kin = = be sent to, = = dig dis: = = = = MOD@modnet.UUCP = =================== -> kill r0dentz. Word! . Word! . Word! MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d ==Diet Phrack== Volume Three, Issue Thirty-Six, File 5 of 11 *Elite* Access! A Tutorial On Being An Elite Hacker By Dead Lord and Lord Digital Lords Anonymous! September 25, 1986 Revised May 2, 1988 Revised Again August 20, 1991 PROLOGUE ======== For reporters, brain dead media types, or anyone else reading this who has been blessed with a room temperature IQ and faulty observational abilities; "Elite" as it's applied to the "underground" community, is a phrase that theoretically denotes the top 2-5% of the hacking and phreaking community and its rather peculiar hierarchy. Realistically it denotes the 2-5% that spend the greatest amount of time polishing up their image on boards instead of doing what they're presumably good at (hacking). This article is designed to allow you (yes YOU the junior G-man; would be Secret Service agent; publicity whore; over-eager journalist, or just bored modem owner and future potential ELITE) access to almost anything you might wish to call; in addition to providing you with the knowledge necessary to impress other ELITE's with your learned brilliance. CONTENT ======= A tutorial for all the people too dense to figure out the quirks of human nature all by themselves, who also have some inane desire to have access to ELITE boards, containing ELITE information and ELITE users, along with ELITE wares, 42 seconds after they are cracked by ELITE crackers. Not to mention ELITE dial-ups to ELITE companies, which will work for approximately 15 minutes before some idiot logs in and does something to fuck them up. I'm writing it because I am bored of doing all this by myself, with only a handful of peers to accompany me. Not that I expect to gain "peers" from people that need help from this text file, but I imagine it'll give ELITE Sysops something else to do with their time. I also hope to save you 2-5 years of time. 2-5 years is the average lifespan of an ELITE person, before he gets a life and comes to the understanding that he just wasted 2-5 years. Please don't misunderstand me when I say 2-5 years, there are many people who have been ELITE for almost 10 years and are still going strong. I wouldn't want to step on any ego's, or ruin anyone's life work, now would I... BOARDS ====== ELITE boards exist because the people who populate them, believe themselves to be superior to the people populating all the other boards. Most people don't agree with them, but they agree with each other. 100-200 people being sufficient to set up their own personal version of the world, they gather together on these ELITE boards and do ELITE things like post new wares, engage in "rag wars" and type things up out of manuals at each other. SYSOPS ====== Seeing how you're trying to get access to an ELITE board, you should have a basic understand of who the Sysop is, and why he's running the board. This part is easy, in over 95% of all cases, the Sysop is a egotistical fool, who is willing to give up the use of his computer, or computers, in exchange for the privilege of playing GOD with the hopeless sots who log in. This is especially the case on all manner of ELITE boards that request a "real" telephone number, voice validation, and the donation of your first born male child for even higher access. All under the guise of "security." Requesting a "real" voice number, or even name, is nothing that unusual. Almost all "mainstream" non-Pirate and non-Phreak systems require it. Of course there is nothing stopping you from leaving them Anal Annie's phone sex service as your home number, and picking a random name. That will usually be the end of that. The only time the Sysop will ever check into your information will be if you happen to become a "rodent" and annoy him and/or the users of his BBS, in which case he'll engage you in a 20 letter conversation, each one giving a really sincere and heartening reason why you would feel so much better if you gave him your phone number, and why he just HAS to have it for reasons you wouldn't understand, because ALL Sysops MUST keep track of who uses their systems, don't ya know? This file won't cover "normal" Sysops, because if you aren't capable of bullshitting THEM, then you're hopeless and may as well find a new hobby. Like gardening is pretty exciting I hear, fer instance... "VOICE" NUMBERS =============== The truth is there is no reason on earth, why a Sysop should EVER need your voice number, or any information on you at all. Naturally he'll WANT it, because being the kind of person who runs a BBS in the first place, he's a nosy and prying kind of guy that want's to know everything about you. For reasons of "board security" of course. Let me tell you about board security; it doesn't exist! When a system is "secure" all that means is that the Sysop has lulled himself into a false sense of safety that bears little relation to the actual state of his board. But that's beside the point. The point being that you DON'T want to hear from the Sysop; EVER. One of the reasons they give for "needing" your voice number is "Well "Well if there's ever something wrong with the bbs, I need to be able to let you know, or ask you what commands you used if you were the last user before it crashed." Isn't that nice... How many Sysop's notify their users when their board goes down for repairs? NOT ONE. As for problems, well what do I care? The last thing I want is Melvin Sysop calling me up when I'm watching Miami Vice and trying to have a 5 hour conversation with me because he has nothing else to do with his time. Or better still, having my phone number embedded in his software when the Secret Service busts down his door because he carded 50 hard drives to his home address. I know many Sysops, some of them are even my friends. These are the kinds of things Sysops do with their userlists. Of course ALL of them will CLAIM that other Sysops might do that, but THEY never would, God no, not them! FAVORITE SYSOP USES FOR USERS' TELEPHONE NUMBERS ================================================ I. When any "new ware" is released (and he happens to be a Pirate kind of guy), Sysops go through every name on the userlist, call them up and ask for the new ware. If you don't have the new ware, or just say you don't in the hopes that he will fuck off, he will then proceed to bug the hell out of you by asking for 50 other wares that he just has to have. II. If he's an ELITE PHREAK kinda guy and some national emergency takes place such as his favorite 800 dying on him; he does the same thing as the Pirate type Sysop and calls everyone on the userlist begging for 800's, "any cool info", and pw's to CIS. III. More so with Phreaks than Pirates, but somewhat true for all of them: The Sysop want's an update on some latest tidbit of hot gossip that he will just die if he doesn't find out. He will then try to have another 5 hour conversation with you about whatever drivel he called you up to discuss. IV. Some people trade baseball cards, some people trade comics, some people trade phone numbers. Sysops LOVE to trade phone numbers, especially those of "influential" users. I don't know why, they usually lack the balls to even call them beyond the customary dial, wait for some person's voice, then slam the phone down and go jerk off because all that excitement gave them a hard-on. This is very much to your benefit as I'll explain a little further down. V. And worst of all, there is the "lonely Sysop", the guy who will call you every "day" at 2 in the morning and try to have an engaging conversation about whatever happened in his "life" that day. There are many other things Sysops do with your number, but as far as I'm concerned, those were the worst. OK, I'm going on and on about why a Sysop has no need for your number, and how he'll annoy you to death if he ever gets it, so YOU know that now, but what do you do about it? GETTING VALIDATED ================= There is no big trick to being validated. In almost every case, the Sysop asking for a voice number, is just his usual hoopla and he'll never bother to check out anything you give him that passes as "information." If you leave a reasonably intelligent copy of feedback, kiss his ass in a sublime kind of way, and in general explain to him why having you on his bbs will make his life much better than it is now; you'll be validated with normal access. Uploading new wares or files, posting messages, and drivel along those lines, will get your access raised. You can also bullshit for higher access, but I'm assuming YOU don't know how, which is why you're reading this file to begin with. BULLSHITTING is an artform and I have neither the time or patience to type up a file on it, so I'm doing this instead. EXAMPLE PIRATE BOARD FEEDBACK ============================= Hello, I'm the Masked Avocado. I just got your bbs #, from an advertisement that was posted on Capital Connection. I liked what the message had to say, so I called to check your board out. I can contribute newsoftware, programming help, and anything that mi ght help to enhance your bbs. I also distribute for Coast to Coast and Digital Gang. My latest wares include: MultiScribe //gs 2.1.2.4 HiggyBBS 6.2 Deluxe Paint Print Plus 2.1 By the way, my first name is Melvin, I'm 13^H^H19, and my system is made up of an enhanced //e, 212 applecat, 3.5 drive and a bunch of peripherals. Thanks for your time, Melvin Let's examine that and highlight a few points. I. ALWAYS use decimal points when describing new wares. Copy ][+ has a revision every 2 weeks that does nothing except update the parm files. NEW WARES! have constant updates and "Pirates" are always on the lookout to increase the decimal point revision of their software. Even if it does NOTHING different EXCEPT change the decimal point. Aside from the fact that feedback is just bullshit to get you validated, you can very easily get a sector editor up and change a few decimal points yourself. II. ALWAYS say you got his BBS number from some established ELITE board, in the case of Pirates, Capital Connection is always a good bet. In reality it's quite a lame board, but other board Sysops seem to feel otherwise, and besides instantly impressing the Sysop of the board you're logging into (by being a member of CapCon), he will also get a kick out of it that some idiot posted his board on the CapCon "BBS Ads" section. [Please note that "Capital Connection" was valid at this file's original incept date. The average Pirate board having a lifespan of 6 months at best; Capital Connection no longer exists. The current Elite Pirate board of the next 6 months, is "Trade Center."] III. Among your list of "new wares" you can always list some BBS program, because every week some dork writes a new program, that is lousy, never works right, and if ever faced with "put up or shut up" you can change around any one of 50 different BBS programs, and upload it as the NEW WARE! [Same with software as with boards -- it doesn't stay new very long. I can't help you here because I haven't the slightest idea what's new in Apple software. However, all you need to do is invest 3 bucks in the latest issue of whatever magazine pertains to your particular computer, and list off some of the software you see advertised.] IV. Always say you distribute for some random collection of new wares groups. Nobody can prove that you don't (logging into one cat-fur and uploading the wares you found on it, to another cat-fur, is distributing) and it will make the Sysop think that you'll be uploading 20 sided GS wares to his board every day. [As you may have guessed, new wares groups also come and go. Digital Gang still exists, as do a slew of new groups; if you don't know of any, a safe bet is making up a name and saying that you're based somewhere in Europe. Europe being the fabled birthplace of all the best new Atari and Amiga software in particular.] V. Always list "your" first name and age. Make up an age that is over 16 so they won't discriminate against you. If you're under 16 and admit it in your feedback, you'll be instantly labeled an idiot. VI. Always list some of your hardware. Don't ask me why, it's just another item in the agenda of things that Sysops like to pry into. If you give them this information without them asking for it, it makes them feel better. VII. Always end the message with a "thanks for your time." Remember, he's an egotistical fool, and that one line makes him think you respect him, want to do things for him, and would be genuinely happy to be a member of his AWESOME board. VIII. ALWAYS sign it with "your" first name, this keeps the tone informal, and makes you seem like a less threatening type of guy. GENERAL TIPS ============ Remember that many Pirate boards have a "VOTE ON NEW USERS" feature, so don't say anything that you wouldn't want the entire world to read. If you follow those basic guidelines, you'll ALWAYS get validated if the rest of your information is right. The rest being your phone number if the Sysop actually calls new users. Some of you are saying to yourselves: Yeah, but if you just listed all of this, won't Sysops be on the lookout for this kind of feedback? Yeah, but then who are they going to validate? "Obvious" rodents? No, if they want new users then they'll be more than happy to accept you. EXAMPLE PHREAK BOARD FEEDBACK ============================= Greetings, I'm Tesla Coil of The Crossbar Rapists (TC of TCR). I was told by a user of Metal Shop Private (MSP), that your bbs was worth looking into. I've been published in TAP, 2600, and Uncle Mel's Phone Times. My handle was listed in issue 12 of Security Systems of Greater Podunk (SSoGP) as a "Computer genius breaks into Podunk's Private Database!" I've been hacking since 1981, I was a member of Sherwood Forest, Securityland, The AT&T Phone Center, OSUNY, OSUNY when it went back up, WOPR, LOD the BBS, Cryton, COSMOS, Metal Shop Private, and OSUNY when it came back for yet another go at it. I had to change my handle for reasons of security when I was taken out by the feds in the 1983 414 busts. I'm an expert with Unix, RSTS, Primos, and HiggyOS. I can program in C, D, E, and F, Fortran 77 and 78, Basic for the Cyber, IBM, MAC, Amiga, ST, and Apple II. I also know assembly for the 6502, 8088, 68020, Z-80a, and TIMEX. I have an Apple //e, IBM AT, Mac+, and Kim-A1. After entering college last year, my time was seriously limited. But after getting some additional free time, I've decided to restart my hobby of hacking and exploring the phone system. My current interest centers around the understanding of the myriad functions associated with CLID. People who can recommend me include (Pick 4 or 5 names of people who aren't really ELITE, but not unknown to current ELITE Sysops either). If you can't think of them, pick up any issue of PHRACK and take a few out of there. The reason you want "not really ELITE" people, is because they won't command too much attention. You DON'T WANT excess attention, saying that some dork who writes for Phrack recommends you, is less noticeable than saying some "real" ELITE recommends you. Why say ANYONE recommends you, if it's so much trouble? Because it somehow flips a switch in the Sysop's mind, which makes him think that you must be an OK dude, if so and so recommends you. Nine out of ten times he won't check. The one time he does check, the person he's bothering will usually say "yeah yeah, go away I'm doing something" and that'll be the end of it). [Please note that by "real elite" I don't mean anyone who is better, rather I mean someone who has spent tremendous amounts of time generating exposure for his handle.] Thanks for you time, Tesla Coil/The Crossbar Rapists Let's examine this one too. I. As you can see we've switched from 40 columns, to 80 columns complete with some form of spacing. We've also gotten a little bit more-let's say-"readable" than in our previous Pirate feedback example. This is because we're calling a different kind of system, with a different program than cat-fur ENHANCED 1.1! II. With Phreak Sysops you don't want to get too informal, because most of them are busy playing SECRET AGENT MAN and if you do something normal like sign off with "your" first name, he'll think you're not being "professional." How it is in his mind that he equates "professional" with calling his board: I don't know, but trust me on this point. III. In the same vein of "professionalism", you're expected to list off your "accomplishments". Oddly enough, in Phreak/Hacker HIERARCHY, getting arrested numerous times is considered ELITE by many of it's peoples. Why this is, I don't know either. Personally, it says to me that the person who got arrested has the brains of an African bushman, but apparently, that's just my lone opinion. Anyhow, in line with this PROFESSIONAL attitude you are expected to list your life's accomplishments in the space of 50-100 lines, in a form that will make you sound like the best Hacker in the world, who is so good, that logically he wouldn't be caught dead calling the ELITE board you're calling, but once again skipping the logic and getting back to the Sysops expectations... IV. OK continuing with the thought we started... list off a bunch of languages, knowing them is optional, because the Sysop doesn't know them either. Reading the dust jacket and index on a book covering any of those subjects will enable you to APPEAR to know what you're doing, which is all that the Sysop is doing, so don't worry about it, because he doesn't know vi from cd, and couldn't INFILTRATE a Unix if he had the root account. If you don't want to spend $5000 stocking up on ELITE TECHNICAL MANUALS, go down to the library and xerox a bunch of index's. Or better yet, just check out the books and never return them (if your library lets you check out reference manuals. Most don't, but you can always rip out that little magnetic sensor in the card on the book and walk out with it anyway, but I digress...). V. After you've done that, list a bunch of micro-specific assembly languages that you "know," and in general just make up things until you've filled up around 2 paragraphs or so. 95% of ELITE PHREAKING/HACKING is just posing anyway, so don't feel guilty about it or let it worry you too much because that's the same way 9/10th of the board got access. Unless they were ELITE, which is just posing to a higher degree than most bother to go with. VI. Remember to say WHERE YOU GOT THE NUMBER FROM! This is because like I said before, most Phreaks are busy playing SECRET AGENT MAN and will get an ulcer and lay awake at night thinking that CABLE PAIR is infiltrating their board. You know it isn't true, but the Sysop will wet his pants anyway, so just put his mind at rest and make up some place where you got the number from. Metal Shop is always a safe bet, because it's the Phreak dumping ground of ELITENESS, much like CapCon is the Pirate's equivalent. Be sure to use vague terms like "I was told by a user of..." and things of that nature that can't be readily verified, but still sound plausible. [Ahem, sorry to interrupt again, but as you may have guessed, MSP is down at this time. MSP's new replacement is the Legion of Doom base BBS that goes by the name of "Digital Logic." A large percentage of the users there are under phony handles that gained entry by exactly the type of bullshitting I'm writing about in this article. The remaining phony accounts got access by threatening the Sysop with "Phreak retaliation" and having him cave into demands; which for a LOD board is about par for course.] VII. Next make up your "writing credits" and "media credits". Select a few random issues of random magazines that you either wrote for, or had your alias' mentioned in. Make sure they're of the small circulation type and the issue is at least 2 years old. Nobody will ever check or even have a way of checking if they wanted to. Most people who "wrote" things just rephrased tech manuals and copied the illustrations. If you're ever pressured to come up with something YOU wrote, just do the same thing because that's what all the other ELITES are busy doing. Be sure to run it through a spelling checker so it looks PROFESSIONAL as ELITE PHREAKS are fond of looking and thinking of themselves. VIII. Next list off a bunch of ELITE BOARDS you've been a member of. Listing those that I just listed are a safe bet, because they're famous or as the case may be infamous, to such a degree that the Sysop will have heard of them. He wouldn't have been on them, so he won't be able to verify that either. The reason he wouldn't have been on them, is because he hasn't been ELITE longer than 2 years, otherwise he wouldn't be running a board. If he HAS been ELITE for longer than two years, and IS still running a board, then he's an idiot and you can safely assume that he wouldn't have been on them anyway. Not that being an idiot disqualifies anyone from being a member of anything, but APPEARING to be an idiot will do that. COSMOS is ALWAYS a great bet, because it just sounds so PHONESY! Plus there have been half a dozen COSMOS' in the last year alone, so he won't know which one, even if none of them have ever been FAMOUS! IX. If you're such a swell guy, and have been around so long, he might wonder what you've been doing with yourself for the last 6 months. SO So just make up some half-witted excuse like the one I listed. Then include something about your current "interests." All you need to remember about that is include "CLID" (Calling Line ID), "BLV" (Busy Line Verify), or any other semi-interesting acronym out of a USO coding manual. Obviously you don't need to know anything about it beyond the fact that such an acronym actually exists and you know about its existence. If questioned further, just bring down the "veil of secrecy" and become mysterious and evasive about it. This will instantly go great lengths towards improving your status on a board. X. References have been covered in the parenthesis in the feedback itself, so I hope I don't need to get into it again here. XI. ELITE Phreak/Hacker boards also expect "freebies" from you the potential user, to the Sysop. Both as a "test" of your "skill" and as a kind of ass kissing. Freebies can include COSMOS PW'S! which are easy, because there are like 10 of them which people have been listing for the last 5 years, which haven't worked for 4 1/2 years, but people still list them. Which makes me conclude that people never use them, they just write them down and repost them every 6 months. Or CIS accounts, or some good 800's or anything of "value". You don't really need to include any of this, but if you can it makes you look better. NEVER, EVER give the Sysop ANYTHING of any value that you might want to use in the future, because if it's of any worth he will immediately do something stupid to make it stop working. That you can COUNT ON! XII. Close it up with the usual "Thanks for your time", but sign it with your full handle, followed by group. PROFESSIONAL! [Giggle] GENERAL TIPS ============ Ok, now that I've got you psyched at how easy it is, here is the bad news. The bad news is like this: In order to be an ELITE Pirate, you don't have to know ANYTHING, PERIOD, AT ALL, EVER. All you need to be able to do is operate your copy of cat-fur with reasonable dexterity and spend 2-5 hours of each day calling things and uploading NEW WARES. If you can program, so much the better because then it's easier to join the ELITEST ELITE of piracy (the Crackers). Now I know you're thinking it's stupid to have ELITE people who aren't good at anything, but I never claimed the world was a sensible place. With PHREAKING (let me just say that when I say PHREAKING I also mean to include HACKING) you are expected to APPEAR to know how things work. Now that is a little tricky. It's tricky because ELITE boards like to have FILTERS. A kind of "front door/quiz" combination. The trouble with that is, that the Sysop doesn't really know what he's doing either and will take the questions out of an ELITE FILE. The problem is that the ELITE FILE might not have been accurate, so even if you know the answer, you might not know the answer that the Sysop is expecting, and as far as the Sysop is concerned is the "RIGHT" answer. This means that you had better stop laughing at those stupid files and deleting them, because if you want to get access someplace, you might need them for something besides "God, is he stupid!" jokes! HOME PHONE NUMBERS AND HOW TO DEFEAT THEM ========================================= Ok, so now you know how to get validated, what to say and how to act. Let me get you past the last and only "real" hurdle to access to everything you desire. Voice validation is a load of crap. It doesn't work, it never has worked and it never will work. But it sure makes Sysops feel good, and being the egotistical fools that they are, they're going to make you go through this bullshit to get access. I would NOT suggest leaving an infinite busy as your home number. This works on legitimate boards, but I don't know any underground board Sysops that are THAT stupid. METHOD 1 ======== Leave a telephone number of a random person from your "computer buddy" phone list. When the Sysop calls, he'll get a human voice that will say HELLO in a annoyed kind of tone. Confirming the existence of a human being at the other end of the telephone number you just gave him, the Sysop will assume no reason to doubt you, and slam down the phone because he's not good at starting conversations with people he's never talked to before. METHOD 2 ======== Find a kid at school who you're friends with. Explain the general idea of "boards" to him, tell him you need his help in breaking into some secret FBI computer system. All he has to do is say "yes" to the questions you're going to write down for him, and claim to be the person on the piece of paper you're giving him. This is really almost ideal if your friend isn't the stupid type that stutters and can't lie. If he can lie and doesn't care, then you're all set or the rest of your modem existence! METHOD 3 ======== Your other option is to leave the kid the number to a voice mailbox on which you've put a suitably ELITE sounding outgoing message. Note: the current craze among the lower orders of the would-be elite is "Voice mail hacking!@!" It's not too hard for anyone familiar with the intricacies of dialing touch tone to in-fil-trate! a VMB system. And the recent media attention drawn to this oh sooo destructive form of hacking has made it still more exciting. However what does this have to do with you? Using a box which you've hacking out is a really dumb idea, especially when you can get one in any major city for $10 to $15 a month. Never pay for the box in your real name, as you will be giving this number to sysops whose BBS software will very likely end up in the hands of law enforcement someday and you don't want end up in John Maxfield's mega-huge list of hackers. YOUR NEW PERSONA -- HOLDING IT TOGETHER AND MAKING IT WORK ========================================================== This is really basic. It's so basic that almost nobody I know ever bothers to sketch in the details and can be tripped up when you ask an offhanded question that in theory has no significance, but in actuality causes him to say "uh, well" and pause for a few seconds while he tries to think of something. Only very good bullshit artists can glibly pull it off when you "catch them off guard" but even then they will frequently forget what they told you in the past if you bring it up again a few days later. What I'm talking about is the "new you" complete with name, address, telephone number, state, zip code, street number, general weather of the area, brothers, sisters, physical description, social security number, job, marital status, birthday, age, education, "underground" history, etc... In short, you are creating an entire new person who should have a real life entirely separate from your own. In order to pull this off you need to think of all these things before-hand, and if you're new at this, don't get carried away by pretending to be 20 people all at once. Just make up ONE concrete personality whose existence you can justify, and then type it up, print it out, and tape it to the wall in front of you so it's ALWAYS there, because the time when you least expect it, is the time you're going to need it the most. As you get better you'll find you can juggle an almost infinite number of these alter-ego's in your head, but don't get over-confident too fast or you WILL blow something that you're working hard at right now. IMPERSONATING OTHER PEOPLE ========================== Every year the "underground" community mirrors the legitimate modem world and gets exponentially larger. Instead of everybody knowing everyone else, there is now a huge collection of people who don't know anything about anyone who existed 5 years ago; last year; or even last month. This works greatly to your advantage because it saves you the effort of slapping together your own files. All you need to do is log some handle into the system you wish to access; upload a few files written by the person or persons you are about to impersonate; wait a few days; now login the person whose identity you wish to assume. Quite simple. In the past few months I have actually passed myself off as BIOC Agent 003, Lord Digital, Lex Luthor and assorted past and present members of LOD, Apple Bandit and various other Apple Pirates of lore, and several dozen other people. Two years ago I could never have gotten away with this unless I was calling some board in the middle of nowhere. Nowadays it's possible, even easy, to impersonate almost anyone who has ever made some kind of mark on the history of the underground in the past; simply because the people you're going to be dealing with were NOT around a few years ago and have no idea who any of these people are. When confronted with a "famous" user, they will never in their wildest dreams assume that he's a fake; the only thing they will be thinking is how neat it is to have him on their BBS once you let them know who he is. You can easily make up a new character who never existed outside of your profile of him, but this requires more work on your part when it's much simpler to just pretend being someone else. NONE of those people will EVER turn up on that particular board, and even if they did you should be able to convince the Sysop that YOU are him and he is the fake. Amusing to say the least. In case you're letting some last vestiges of morality creep in, remember that the people you're going to be impersonating are not hallowed icons. They are just guys who spent an inordinate amount of time building up their image to such a degree that countless little kids think they're cool and a few misguided -- and blessedly free of intellect -- security people, think they're dangerous. Not to forget the fact that aside from LODdies, none of them will ever be seen on a board again, so if you fear "Phreak retaliation;" don't worry about it. Nobody can do anything to you if they don't know who you are. The previous paragraph exists solely to galvanize otherwise recaltricent and cowardly pre-teens into taking some kind of action and having fun. SAFETY - GETTING BUSTED! ======================== People who get caught for doing something they shouldn't have been doing, are apprehended for one of two reasons: They are either cretins, which covers the vast majority of those "busted," or they are not good judges of character and spend their time associating with "friends" who do stupid things, and will drag you down with them when they really fuck up. Which WILL happen at some point to most of the people who convince themselves "it's just fun." The "underground" IS fun, but looking at it from the eyes of those whose job it is to keep track of you, it stops being fun and you should realize that many of the things you take for granted -- be they free calls, free software, whatever, -- are against the law. And if you give people the opportunity to hurt you -- ESPECIALLY when they are placed in such a position that by busting you they increase their own status in whatever field they are employed in -- then you are going to get hurt! Many of you hate all the "narcs" and "sting boards" and whatever new bullshit the people arrayed against you come up with. You SHOULDN'T! Cable Pair and the rest are nothing more than the underground's personal garbage collection agency. Rather then thinking of them as people who are some kind of hindrance to you, it's far more logical to think of them as glorified trash collectors; which is about all they are. Every so often some new sting is exposed, and the underground is rid of a board full of annoying kids that were stupid enough to login someplace with real names, numbers, and addresses. Are you really going to miss this kind of genius? If you ALWAYS use the methods outlined in this article, then your chances of getting caught for anything will dramatically decrease. Who are they going to find when every single piece of information you gave them is a lie. None of your modem friends can take you down with them, if they don't know who you are. It's as simple as that. Naturally this is more difficult than it sounds due to the fact that many of you will want to make friends with people, and that's hard to do when everything the other person knows about you is a lie. At this point you just have to use your best judgement concerning your further actions. Personally I find it best to associate with a small group of friends who really are "friends" not just "computer buddies." Because if you pick your friends well they will never fuck you over. Meanwhile when some kid you know only over the phone, who lives in another state, gets caught... He is going to be more than happy to throw them anyone and anything he can think of just to get off himself and that will include YOU. The "Hacker ethic" is a nice joke that I personally DO NOT subscribe to, and even those that pay lip service to such a concept, will throw their ideals away pretty fast when it's their neck on the line instead of some hallowed principle thought up by aging hippies. THE COMPUTER UNDERGROUND PAST AND PRESENT! ========================================== At the time of this revision and final public release (Summer of 1991) the modem world is nothing like it was five or ten years ago when all of this nonsense began. The thousand hackers of 1981 had become ten thousand by 1986 and now it's reached the point where the EFF and CuD are throwing all of this back and forth over the InterNet and so rather than the "local l0serz" idolizing Lex Luthor, academics all over the country are analyzing the legal implications of Phiber Optik and Acid Phreak's case. Well, so be it. It's much too late in modem time to start any sort of "elite dynasty" which even a moron like Lex Luthor could put together in 1984. You can't start the "Modem Wizards -- the new LOD!" but you can always latch on to legend and write yourself into the past. If you have any doubts about this read the History of Communist Party of the Soviet Union from about 1923 until 1956, when each years names kept being added and taken out and things were changed around the suit political realities and nobody said a thing. This is a far-fetched reference, but the theory is the same. The Legion of Doom started out a bunch of nobodies and ended up notorious enough that the Secret Service and BellCore kept laying awake at night wondering when LOD is going to take down all the STPs in the network. Which of course will never happen but it's much easier on the intestines of a Secret Service agent or DA to get media attention by rounding up "a deadly technologically menacing teenager!" than to bust the mafia or some inner-city drug ring who may just put them and their families through a trash compacter. What would you do? THE END ======= What more can I say? I hope you have a good time if this is the way in which you choose to waste your time. And a great big "I love you" to the media dudes who actually called up 2600 magazine asking about "Marbles BBS." Where would we be without you? You guys are just so funny! Have a nice day and a really, really nice life! _______________________________________________________________________________ ==Diet Phrack== Volume Three, Issue Thirty-Six, File 6 of 11 -----*****)))))21(((((*****----- D S + + E The Legion of Doom E + + M and E + + O The Occult D + + N ! -----*****)))))21(((((*****----- From its explosive beginnings in the summer of 1984 to the present day, the group known as "The Legion of Doom" has been enshrouded in secrecy. Now that our numbers have been corrupted, and the hope of once regaining the immense power we wielded over the years has faded, we offer to the last remaining fragments of the underground from which we arose the secret knowledge that kept our members at the apex of knowledge and beyond the grasp of security officials. It is our hope that through wide circulation of this material that perhaps some future enthusiasts will seek the truth from within, and gain the knowledge and wisdom necessary to endure the trauma of illumination. HISTORY Initially, the idea of combining modern technology with ancient wisdom was formulated as a type of joke. One particular system was proving extremely difficult to penetrate. One member remarked rather off-handedly, "Why not ask the Ouija board for passwords?" This was laughed about for several minutes but ultimately it was decided that it should be tried. Two members set up the board and began concentrating on the computer system in question. After several minutes an entity was contacted. When asked what the root password was on the UNIX system we had discovered, it answered "rambo". "Rambo" was the password. Several more trials were done, and more than two thirds of them ended with positive results. It was decided at this time that there should be an inner order to the Legion of Doom for those members who shared an interest in learning more about the occult and its uses in a hacking forum. At that time it was decided that there would be seven members admitted. From that time forth, there have always been seven members. The circle will be broken upon the incarceration of our initiates in the coming new year, and our control over the planes will be lost. What follows are several steps to increasing one's knowledge of the occult and use of this information in a computer setting. OUIJA In our experience we have found that it is best to attempt this type of communication with two persons. It is extremely important that one not attempt to contact an entity using the Ouija alone. When there is only one psyche involved, the spirit can fixate on it with great ease and the chances for possession or extreme mental duress is quite high. Sit facing a partner with the Ouija touching each lap. Each person should keep one hand on the planchet and the other on the computer keyboard. While concentrating on contact, make the necessary steps to connect to the system desired to ask about. Once connection has been established with the host system, begin asking the surroundings, "Is there anything that wishes to talk with us?" One may have to concentrate and repeat the question for several minutes. When an entity moves onto the board one may feel a slight tingling in one's fingertips as the planchet moves around the board. Once is has been asserted that there is a strong presence on the board, ask of it any question desired. *** The above is a simple enough method and can (and should) be tried by all. What follows is more complex and should not be attempted with any degree of levity. STEPS TO ENSURE SUCCESS WHILE HACKING To enjoy a great deal of success while hacking the following steps must be taken. 1.. Always hack in the same room, at the same time of day. 2. Always purify mind and body before hacking. This would include a ritual bath and sexual abstinence and fasting for at least 12 hours prior to any attempt. One may wish to design a Tau robe to wear during attempts, or in any case a set of clothing specifically for hacking attempts that would symbolize such a garment. 3. Perform the Lesser Banishing Ritual of the Pentagram (See below). 4. Perform the Rose Cross Ritual (See below). 5. Perform a candle burning to attract good luck. By following these steps one will experience success and fulfillment greater than imagined possible. LBRP 1. Touch forehead, and say deeply "Ah-Tah". 2. Point down, hand over abdomen, say deeply "Mahl-Koot". 3. Touch right shoulder, say deeply "Vih-G'boo-Rah". 4. Touch left shoulder, say deeply "Vih-G'doo-Lah". 5. Fold hands at chest, say deeply "Lih-Oh-Lahm, Ah-Men". 6. Face East, Draw a pentagram in the air, point to its center, say deeply "Yud-Heh-Vavh-Heh". 7. Turn South, keeping line from first pentagram, draw new pentagram, point to its center, say deeply "Ah-Doh-Nye". 8. Turn West, repeat as above, but say deeply "Eh-Heh-Yeh". 9. Turn North, repeat as above, but say deeply "Ah-Glah". 10. Turn East, carrying line to complete circle. 11. Hands out, say "Before me Rah-Fay-El, Behind me Gabh-Ray-El, On my right hand Mih-Chai-El, And on my left hand Ohr-Ree-El. For about me flames the pentagram, and within me shines the six rayed star. 12. Repeat steps 1-5. For those concerned, the translations of the above are as follows: Ah-Tah: Thine Mahl-Koot: Kingdom Vih-G'Boo-Rah: and the power Vih-G'Doo-Lah: and the glory Lih-Oh-Lahm: forever Ah-Men: Lord, Faithful King (AMEN=acronym) Yud-Heh-Vavh-Heh: The Holy Tetragrammaton Ah-Doh-Nye: My Lord Eh-Heh-Yeh: I shall be Ah-Glah: Thou art great forever, my Lord (AGLA=acronym) Rah-Fay-El ( Gahb-Ray-El Names of Arch-angles Mih-Chai-El ( Ohr-Ree-El ( When the steps read "say deeply" one should try to resonate the words, from the diaphragm, so that the body actually feels the words. ROSE CROSS RITUAL 1. Light a stick of incense. 2. In the SE corner of the room, looking away from the center, draw a large cross in the air with incense, and intersect its sides with a circle (like a Celtic cross, or crosshairs in a gun sight), point the tip of the incense to the center of the cross and say deeply "Yeh-Hah-Shu-Ah". 3. Move to the SW corner of the room, keeping the line from the first cross, repeat as above. 4. Move to the NW, repeat as above. 5. Move to the NE, repeat as above. 6. Move to the SE to complete the circle. 7. Face NW, incense pointed up, walk to the center of the room, continuing the line, make the rose cross above the center of the room, speak the name, then continue moving NW, connect the line to the center of the cross in the NW. 8. Move back to the SE, incense pointed down, stop in the center and draw the rose cross in the center of the room on the ground, speak the name, then continue on SE, connecting the line to the center of the cross in the SE. 9. Point to the center of the SE cross and speak the name. 10. Walk to the SW corner. 11. With the incense pointed upwards, walk to the NE, at the center of the room stop and speak the name, then continue on to the NE, once at the NE, face the SW and walk back to the SW, incense pointed down, at the center of the room speak the name, and continue on to the SW. 12. Point to the center of the SW cross and move clockwise to each corner, again connecting the centers of each cross. 13. Once back at the SW corner, remake the cross as large as possible and speak the name "Yeh-Hah-Shu-Ah" while forming the bottom of the circle, and speak the name "Yeh-Hoh-Vah-Shuh" when forming the top half of the circle. 14. Go to the center of the area, face east, and think of the six rose crosses surrounding the room. Think of them as gold, with red circles, and the lines connecting them as gleaming white. CANDLE BURNING RITUAL 1. Obtain a green candle 2. Anoint the top of the candle with olive oil and rub it downward to the middle of the candle. 3. Anoint the bottom of the candle with the oil and rub it upwards to the center. 4. Carve the letters "JIHEJE" on the candle. 5. Light the candle. 6. Read aloud the fourth Psalm. 7. Pray for the desired outcome. 8. Concentrate on the desired outcome. 9. Repeat 6 through 8 two more times. THE GEMATRIA OF TELEPHONE NUMBERS Some in our order have found insight by reflecting on the various meanings that can be derived from the numerical values of telephone numbers using the Cabalistic method of numerology. Those that use this method have focused on one particular method of number determination: Example: 800-555-1212 800 = 400 + 300 + 100 555 = 400 + 100 + 50 + 5 121 = 100 + 20 + 1 2 = 2 One can also obtain other numbers for contemplation by the following method: 800-555-1212 = 8 + 0 + 0 + 5 + 5 + 5 + 1 + 2 + 1 + 2 = 29 = 2 + 9 = 11 = 1 + 1 = 2 All of the above values are related. A total contemplation of the meanings of all values will lead to a more complete understanding of the true meanings. These numbers each correspond to a particular Hebrew letter and word, as well as a card in the Major Arcana of the Tarot. The following is a table to be used for the above. 1 Aleph Ox 0-The Fool 2 Beth House I-The Magician 3 Gimel Camel II-The High Priestess 4 Daleth Door III-The Empress 5 Heh Window IV-The Emperor 6 Vav Nail V-The Hierophant 7 Zayin Sword VI-The Lovers 8 Cheth Fence VII-The Chariot 9 Teth Serpent VIII-Strength 10 Yod Finger IX-The Hermit 20 Caph Palm of hand X-The Wheel of Fortune 30 Lamed Whip XI-Justice 40 Mem Water XII-The Hanged Man 50 Nun Fish XIII-Death 60 Samech Arrow XIV-Temperance 70 Ayun Eye XV-The Devil 80 Peh Mouth XVI-The Tower 90 Tzaddi Hook XVII-The Star 100 Qoph Back of head XVIII-The Moon 200 Resh Head XIX-The Sun 300 Shin Tooth XX-Judgement 400 Tau Cross XXI-The World One may wish to further research numbers by taking particular groupings and cross referencing them in the "Sepher Sephiroth" which can be found in "The Qabalah of Alister Crowley." OTHER CANDLE BURNING RITUALS Should one come into conflict with authorities for any reason, any or all of the following will prove useful. To gain favor with authorities 1. Obtain a purple candle 2. Anoint the top of the candle with olive oil and rub it downward to the middle of the candle. 3. Anoint the bottom of the candle with the oil and rub it upwards to the center. 4. Carve the letters "JASCHAJAH" on the candle. 5. Light the candle. 6. Read aloud the fifth Psalm. 7. Pray for the desired outcome. 8. Concentrate on the desired outcome. To obtain favors from important people 1. Obtain a green candle 2. Anoint the top of the candle with olive oil and rub it downward to the middle of the candle. 3. Anoint the bottom of the candle with the oil and rub it upwards to the center. 4. Carve the letters "PELE" on the candle. 5. Light the candle. 6. Read aloud the thirty-fourth Psalm. 7. Pray for the desired outcome. 8. Concentrate on the desired outcome. For favor in court cases 1. Obtain a purple candle 2. Anoint the top of the candle with olive oil and rub it downward to the middle of the candle. 3. Anoint the bottom of the candle with the oil and rub it upwards to the center. 4. Carve the letters "JAH" on the candle. 5. Light the candle. 6. Read aloud the 35th and 36th Psalms.. 7. Pray for the desired outcome. 8. Concentrate on the desired outcome. To regain credibility after being defamed by enemies 1. Obtain a purple candle 2. Anoint the top of the candle with olive oil and rub it downward to the middle of the candle. 3. Anoint the bottom of the candle with the oil and rub it upwards to the center. 4. Carve the letters "ZAWA" on the candle. 5. Light the candle. 6. Read aloud the 41st, 42nd, and 43rd Psalms. 7. Pray for the desired outcome after reading each Psalm. 8. Concentrate on the desired outcome. 9. Repeat 6 through 8 two more times. 10. Repeat for three days To help release one from imprisonment 1. Obtain a purple candle 2. Anoint the top of the candle with olive oil and rub it downward to the middle of the candle. 3. Anoint the bottom of the candle with the oil and rub it upwards to the center. 4. Carve the letters "IHVH" on the candle. 5. Light the candle. 6. Read aloud the 71st Psalm. 7. Pray for the desired outcome. 8. Concentrate on the desired outcome. For help in court cases 1. Obtain a purple candle 2. Anoint the top of the candle with olive oil and rub it downward to the middle of the candle. 3. Anoint the bottom of the candle with the oil and rub it upwards to the center. 4. Carve the letters "IHVH" on the candle. 5. Light the candle. 6. Read aloud the 93rd Psalm. 7. Pray for the desired outcome. 8. Concentrate on the desired outcome. To gain favor in court cases 1. Obtain a purple candle 2. Anoint the top of the candle with olive oil and rub it downward to the middle of the candle. 3. Anoint the bottom of the candle with the oil and rub it upwards to the center. 4. Carve the letters "LAMED" on the candle. 5. Light the candle. 6. Read aloud the 119th Psalm, verses 89-96. 7. Pray for the desired outcome. 8. Concentrate on the desired outcome. To gain favor in court 1. Obtain a purple candle 2. Anoint the top of the candle with olive oil and rub it downward to the middle of the candle. 3. Anoint the bottom of the candle with the oil and rub it upwards to the center. 4. Carve the letters "IHVH" on the candle. 5. Light the candle. 6. Read aloud the 120th Psalm. 7. Pray for the desired outcome. 8. Concentrate on the desired outcome. To gain favor when approaching a person of authority 1. Obtain a purple candle 2. Anoint the top of the candle with olive oil and rub it downward to the middle of the candle. 3. Anoint the bottom of the candle with the oil and rub it upwards to the center. 4. Carve the letters "IHVH" on the candle. 5. Light the candle. 6. Read aloud the 122nd Psalm. 7. Pray for the desired outcome. 8. Concentrate on the desired outcome. *** Each candle can only be used for one particular purpose. One must prepare a new candle for each ritual. ASTRAL CONFERENCING Some of our number after having found it quite difficult to contact other members took a new approach to astral projection. Astral conferencing became the spiritual counterpart to AT&T's Alliance Teleconference. Members would arrange to meet at a given time and would relay any necessary information during these sessions. This type of communication was made the standard due to its legality, its speed, and the impossibility of interception by federal authorities. To attempt this type of psychic travel, it is advised that the seeker look elsewhere for instruction on building his or her own psychic powers, and slowly moving upwards to the complexities of travel on the Astral Plane. One must learn to stand before learning how to run. WARNINGS ABOUT ABUSES OF POWER Some members have taken their interests to the extreme. There was talk some years ago about blood offerings to obtain knowledge in dealing with the TRW credit system. This was a complete failure which was done with out knowledge by others in the order. It is written in Isaiah: 1:11 "I am full of the burnt offerings of rams, and the fat of fed beasts; and I delight not in the blood of bullocks, or of lambs, or of he goats." 66:3 "He that killeth an ox is as if he slew a man" Those who committed the above offering suffered greatly for their deed, for such is an abomination before the Lord. It is wise to learn from their mistakes. Other members have attempted such obscure measures as psychic data corruption, ala Uri Geller. These attempts saw little success, and left those attempting the feats psychically exhausted and drained for nearly a week. Other members have attempted to thwart enemies such as the Secret Service, the FBI, journalists such as Richard Sandza, and individuals such as John Maxfield though magical means. When the outcome desired was weak, the results were high, but when a member actually tried to bring about the demise of a Southern Bell Security official, the power of the spell reversed and the member was soon placed under surveillance by the Secret Service, nearly causing disaster for the entire group, and completely dissolving the power of the order. One may find that once such power is somewhat mastered, it is easy to take shortcuts and thereby miss safety precautions. One must never forget to take these precautions, for disaster looms at every junction. The three members linked to the above incident had become well versed in the magical system of Abra-Melin the Mage. The spell which turned should never have been used in the first place. The spell was designed to stop a person's heart and could only be carried out with the help of the evil spirit Belzebub. The Symbol L E B H A H E M A U S A B H A H was used, yet the full precautions to protect the invoker from the spirit were ignored, and Belzebud ran free to affect whatever he saw fit to affect. They had seen prior success in this system using a symbol to obtain knowledge of things past and future and were able to obtain a great deal of information from various computer systems. However, that particular spell is invoked by the Angels, and little precaution need be taken in that instance. That Symbol: M I L O N I R A G O L A M A L O G A R I N O L I M AN INTERESTING EXAMPLE OF OCCULT INFLUENCED HACKING One particular evening of Ouija ended with a DNIC and a plea to halt the operation of the system. When members connected to this system they were shocked to find that it was a UNIX belonging to the Ministry of Treasury in the Republic of South Africa. The system was networked to a number of other government systems. Several standard defaults were still unprotected, and root was gained in a matter of minutes. A debate ensued over whether or not to disrupt the system in protest of Apartheid, but the system was left unscathed on the premise that to cause malicious damage would only make things worse. CLOSING Once the doors to ancient knowledge have been opened, the knowledge found within is immense and incredibly powerful. Do not fear experimentation and exploration, but be mindful of the existence of God and the spirits, and respect their power. Use whatever means necessary to achieve desired goals, but at no times cause harm to any other person, and do nothing out of aggression. Whatever degree of energy is sent forth will come back, if one sends out positive energy, positive energy will flow back; the converse of this is equally valid. Diversify one's interests, develop the mind, seek out hidden and suppressed knowledge, and experience the beauty of the true nature of magic. Frater Perdurabo Deo Duce Comite Ferro Inner Order of LOD _______________________________________________________________________________ ==Diet Phrack== Volume Three, Issue Thirty-six, File 7 of 11 @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ @ @ Searching for SpeciAl accesS agentS @ @ @ @ by: Dr. Dude @ @ @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ This is a true story of how United States Secret Service Agent Tim Foley discovered three of his freinds and later recruted them as speciAl accesS agentS into the hacker world. After seeing how well his recruits performed, Tim Foley recruted Barbera Spinelli (AT&T Security) and Toni Ames (a/k/a Pink Death of Pacific Northwest Security) and Dale Drew (a/k/a The Dictator) as speciAl accesS agentS for the purpose of undermining the computer underground. After this little incident Toni was nicknamed "Pink Death." Our story is narrated by Pink Death! @@@@@@@ Toni Ames plays: herself The Dale Drew plays: YOU'LL SEE! Players Tim Foley plays: with himself @@@@@@@ Barbera Spinelli plays: with everyone - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - I was reading a story in an adult magazine about this girl that was eaten out and fucked by a German Shepherd dog. Now to some of you, this probably sounds gross. However, I was turned on by the story and wanted to read more stories like it. Well I never found any. While I am sure that there is a mag out there that has lots of stories like it, just haven't found it yet. Anyway, one day I was talking to my friend Barbera Spinelli and brought the subject up. Barbera Spinelli had never read such a story before. Since we were at my house, I got the magazine out and let her read it. She didn't get as turned on as I did, but said that she would like to watch someone get licked and fucked by a dog. I told Barbera Spinelli the story made me very very horney. Barbera Spinelli said that she doubted that she could get horney enough to do it with an animal. I told her that it made me very horney and that I didn't think I could do it, but I did want to read about other people doing it with animals. Well, that subject was dropped, we continued to talk about other things while drinking wine. After two bottles we got very tipsy and started talking about sex. The next thing we knew, we were naked and in the pool, having a great time. Well, I have had sex with women before, but never with Barbera Spinelli. I didn't know how she felt about making love to women, and never asked. Well I noticed her staring at my 38-26- 36 body. I got out of the pool and posed. I said, "What do you think"? She said that I had a great body and a nice pair of tits. I spread my legs and opened up my pussy with my fingers showing Barbera Spinelli my pink inner lips and now extended clit. Squeezing my erect clit while I shoved two fingers up my soaking cunt I told Barbera Spinelli I would like to do it with her. With that, I jumped into the pool grabbed her head and shoved it between my tits as I probed her tight cunt with my fingers and said, well if you like them so much why don't you suck them. I was ready for her to protest, but instead she said okay, and sucked my tits gently as I continued to ream her tight pussy. She said to me, I have wanted you for the longest time but didn't think you would want to make love with me. We dried off and went into my bedroom I had Barbera Spinelli lie back on my bed and crawled up between her legs and began to suck her stiff pink nipples as I massaged her hot slippery slit. In no time I had her moaning with pleasure and moved down to her sweet tasting cunt probing her tight pink hole with my tongue. Barbera Spinelli quickly had a strong climax and flooded my mouth with her sweet juices. I got off her and went to my dresser getting out two of my favorite toys, a 12 inch vibrator and a long thin anal probe. Barbera Spinelli gasped at the sight of me armed with my toys and begged me to fuck her with them. I moved back to Barbera Spinelli and straddled her face as I massaged her firm young tits. Giving Barbera Spinelli the anal probe I instructed her to fuck my asshole while she ate my pussy. I slowly lowered my soaking snatch to her lips and tongue as Barbera Spinelli pushed the long dildo firmly up my taught asshole. The feeling of that long shaft penetrating my ass made me quiver as Barbera Spinelli repeatedly thrust her long tongue up my cunt and licked and sucked my clit. We had hardly begun when I had my first orgasm wetting Barbera Spinelli's face with my thick pussy juice. Barbera Spinelli begged me to fuck her cunt with the vibrator and I bent willingly to my work spreading her swollen cunt lips and probing her tight twat with the vibrator as I licked her swollen distended clit and fingered her tight little anus. Barbera Spinelli came long and hard as she continued her assault on my pussy and anus reaming my cunt with her fingers as she licked my clit and pounded the probe up my anus bringing me to on one orgasm after another. In our lust we had not noticed Tim Foley my lover come in, the first I knew of his presence was when Barbera Spinelli squealed and I felt her fingers withdraw from my steaming twat only to be replaced by Tim Foleys two inches of hard thick cock. Looking back I saw the familiar look of lust in my lovers face as he reamed my pussy with his tiny thin prick and rammed the anal probe in and out of my well lubricated asshole. Barbera Spinelli resumed her assault on my swollen clit and I on her twitching cunt and asshole. In no time I felt Tim Foley's thick load shoot up my cunt as he pounded out his passion. I came quickly as did Barbera Spinelli licking up her juices as she swallowed the overflow of my lovers sperm from my cunt and clit. At last I thought our secret is out, Tim Foley and I had been fucking for about a year and I had always wanted to have him and a woman together. Barbera Spinelli was begging for Tim Foley's stiff cock and I had her get up in the doggy position as Tim Foley licked her tight puckered anus and slowly inserted the anal probe up her twitching rectum. I sucked his still stiff cock into my mouth and rammed it deep in my throat until it grew to enormous proportions. Barbera Spinelli in the meantime had renewed her assault on my cunt clit and anus forcing the rampaging vibrator up my steaming slit as she licked my hard clit and finger fucked my juicy asshole. Sensing Barbera Spinelli's need I pulled Tim Foley's prick from my mouth and pushed the head into Barbera Spinelli's pink pussy. Tim Foley took it from there and rammed his hard cock deep into her twitching vagina until his balls slapped her cunt lips. I continued to suck and lick her clit until Barbera Spinelli had two orgasms and Tim Foley filled her tight slit with gallons of cum. The sight of his sticky sperm dripping from her slit made me climax again and I licked her cum slickened snatch until I had sucked down all of my lovers sweet cream. Barbera Spinelli and I moved to a side by side position and continued to tongue fuck each others cunts as Tim Foley sat an rested watching our pleasure. In no time his cock was renewed and he began to finger Barbera Spinelli's tight back door. Seeing his lust for my friends asshole and having denied this pleasure to him in our private sessions I decided to let Tim Foley fuck me in the ass. I called him over and told him to fuck my butt while Barbera Spinelli ate my pussy. Tim Foley was overcome with desire as he moved in behind me and gently spread my ass cheeks lowering his face between the cheeks of my ass and probing my tight asshole with his tongue. I begged him to ream my anus with his big dick and he had Barbera Spinelli guide his rock like cock up my asshole while he pounded me to orgasm. I continued to lick Barbera Spinelli and made her cum just as Tim Foley shot his load up my ass. The feeling of his hot sperm filling my anus made me climax and nearly pass out. When I regained my senses I could feel Barbera Spinelli's tongue swirling in and out of my anus as she collected his sperm from my asshole. Tim Foley was great and he had moved to Barbera Spinelli's asshole and begun to lick her tight pink puckered asshole as I tongue fucked her hot cunt. I could tell Tim Foley was ready again and heard Barbera Spinelli beg him to ram his big thick dick up her ass. Tim Foley got into position and I guided his throbbing meet up her sweet tight little asshole watching as Tim Foley pressed it into her until only his balls were visible. I continued my tongue fucking of her cunt and licking her clit as I felt her convulse time and time again in sweet orgasm. Soon I to climaxed from her tongue and fingering of my cunt and anus and Tim Foley came filling her tight butt with his sperm which I gladly licked up. Tim Foley was happy but drained and left us to continue our games. All in all we made love for three hours. When she left to go home, she invited me over the next day to "Play around some more". Saturday afternoon I went over to Barbera Spinelli's house to play. She invited me in. She was wearing a black leather mini, black blouse, black fish net stockings and garters, and high heels. She was hot. I was also wearing a mini, I also had on a halter top, and heels. She told me to get on my knees and look under her shirt. What I saw was a beautiful, clean shaven cunt. I reached up to touch her but she stopped me. She said that I would first have to touch my own shaved cunt. She said she would shave me like she did herself this morning. We went to the bathroom and she undressed me. What I great sensation it was to have her shave. When she was done she cleaned me off, grabbed me by the hand and led me to her room. She told me to lay on the bed and play with my new cunt. As I laid there, I began to rub my cunt, what a feeling. I went wild. It felt so good. No pubic hair, just skin, sensitive skin. She watched me as she got undressed. She got into the bed with me and moved her cunt to where I could eat her. She was, and still is, so sweet tasting. As I ate her she played with my cunt, sticking in a finger then rubbing my clit. She would stop as I got to excited. I ate her and she came twice, yet she wouldn't let me cum. She then got up and left the room. She came back with some nylon straps and said that if I wanted to cum I would have to let her tie me to the bed. She said she would not hurt me. I agreed. She tied my wrists and ankles to the bed so that I was spread eagle. She then got out a vibrator and began to work on my sensitive clit. The vibrator made me so horney, but she would not leave it on my clit long enough to make me cum. I tried to thrust my hips to meet the dong, but to no avail. She would then stick the dildo in and slowly pull it out, then repeat the treatment on my clit. I was begging to cum. She bent between my legs and tasted my juice hole and said that I was wet enough to get my SURPRISE. Again she left the room. When she returned she was followed by my SURPRISE. It was her Great Dane, Dale Drew! She asked how horney was I and I knew what she meant. I shook my head yes. She patted the bed and Dale Drew jumped up. She then took the dogs nose and stuck it between my legs. I must have been twice as wet by now. The dog knew exactly what to do. He began to lick my hole. I couldn't stand it and I came twice, right away. This made him lick even faster. I could not believe the feeling. There was no strong probing like a humans tongue, just enough pressure and entry to do the job. As the dog continued to eat me out Barbera Spinelli unfastened me from the bed. Barbera Spinelli began to play with Dale Drew's cock and I watched as it began to grow stiffening in her hand until it had grown to about 8inches in length. Dale Drew was in a frenzy by now and his hot wet tongue was lapping hard and fast on my exposed cunt. Dale Drew's cock was long,thin and stiff as a board as Barbera Spinelli continued to massage it and his balls. Barbera Spinelli said that she thought the dog's cock was hard enough to start. She grabbed a couple of small pillows and placed them under my ass. Then guided the Dale Drew on top of me. His face was next to mine, I could feel his hot breath on my face. His hairy body resting on my stomach. Barbera Spinelli put her hand on his cock and gently guided it toward my fuck hole. As soon as the dog felt my wetness, nature took over. He fucked me fast and very deep. I came again, and again. Then I felt him tense and squirt inside me. He slipped out and shot some cum on my stomach. Dale Drew then reversed his position and began to lap my cunt again with his long wide tongue. With Dale Drew in this position I could see his long thin cock still exposed and still fairly stiff. Not wanting the experience to end I reached up and began to massage his cock and balls. The dog responded at once and began to fuck my hand as he licked my hot pussy to another orgasm. I asked Barbera Spinelli to help me and rolled over on my stomach spreading my legs and ass cheeks making my anus open and available to Dale Drewes wet tongue. Seeing my waiting asshole Dale Drew began to lick me there while Barbera Spinelli took over my handwork on her dogs cock. Barbera Spinelli moved Dale Drew around and he mounted me doggy style and began to dry hump my ass. Barbera Spinelli spread my ass further and guided Dale Drewes long thin cock into my asshole. The tightness of my ass sent Dale Drew in to ecstasy and he rammed his long thin dick in and out of my asshole with long fast strokes. All I can remember is the feeling of his long dick probing my rectum and driving me to orgasm after orgasm until he filled my ass with his sticky dog cum. As I laid there,I thanked Barbera Spinelli for what she did and told her that it was great. Since then I have fucked her dog twice. He is not always in the mood and sometimes it takes a lot of hand work to get him interested. I have fucked Barbera Spinelli so many times I can't count them and she I and my lover Tim Foley get together after school almost three times a week. Barbera Spinelli now says that she thinks she will try Dale Drew the next time he is ready. I can't wait. _______________________________________________________________________________ ==Diet Phrack== Volume Three, Issue Thirty-Six, File 8 of 11 :-=>|%% Phreaks in Verse II %%|<=-: by Homey the Hacker \=================/ Get in The Ring /=================\ [Sung to the tune of Get in The Ring by G-n-f-R] Why do you look at me when you hate me? Why should I look at you when you make me hate you too? I sense a smell of retribution in the air I don't even understand why the fuck you even care And I don't need you jealousy Why drag me down in your misery And when you stare you don't think I feel it But I'm gonna deal it back to you in spades When I'm havin phun ya know I can't conceal it 'Cause you know you'd never cut it in my game, oh yea And when you're talkin about our sociology I'll be writin' down your obituary...History You got your agents with The Bellcore cash injections Trumped up charges and implications Beatin' off with your "spy" operations Who are you to criticize our publication Got your subtle manipulative devices Just like you, I got my vices I've got a thought that would be nice I'd like to crush your head tight in my vice...PAIN!! And that goes for all you punks in the press That want to start shit by spreadin' lies Instead of the things we said That means you Ed Schwarz at WGN Radio Richard Sanzda Gary Collins at Hour Magazine Geraldo River at CBS ** [CBS being partially owned AT&T] What you pissed off 'cause Opra Winfrey gets more ratings that you do? Fuck You Suck my fuckin' dick You be liein' to the fuckin' public Tellin' them your doin' a such favor for society [while crack dealers like Mayor Barry who should be tried for treason get off with slap on the wrist. FUCK YOU!] While they be payin thier hard earned tax dollars Printin' lies, Startin' controversy You want to antagonize me? Antagonize me motherfucker Get in the ring motherfucker And I'll kick your bitchy little ass, punk I don't like you, I just hate you I'm gonna kick your ass, oh yea! Ha Ha Ha Ha Ha Ha Ha Ha Ha!!!!!!! You may not like our integrity We built a world out of anarchy And in this corner weighing in at 450 lbs, Phrack Incorporated!!!! Get in the ring! Yea, this song is dedicated to all the Phrack fuckin' Incorporated Fans that stuck with us through all the fucking shit And to all those opposed...Hmm...Well - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \=============/ Knight Lite* /=============\ *1/3 the calories of regular computer hackers. [Sung the tune of The Beverly Hillbillies] Come and and listen to my story 'bout boy named Craig. Called "Mad-hacker", but is just pullin' your leg. Then one day he was writin' up a Phrack. Down came the door with a great big crack. Foley that is, Secret Service!, FBI! Well, now old Craig's a million in debt. Lost his cds and his brand new 'vette. Mitch Kapor said, "There's someplace you need to be." So he packed up his apple and moved to DC. Washington that is!, Lawyers!, Cash flow! - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \=============/ Erik Bloodaxe /=============\ [Sung to the tune of the Daniel Boone theme] Erik B was a ham...yes a big ham. He was born with an ego that was big as mountain was he. Erik B was ham...yes a big ham. And he told all the ladies he was hung like a mighty oak tree. >From the dark sun glasses he never takes off to the heal of his K-Mart shoes. The bitchenest, horniest, drunkenest man that a hacker ever knew. Erik B was a ham...yes a big ham. With a mouth like a sewer and so full of manure was he. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \================/ Vanilla Holliday /================\ [Sung to the tune of ICE ICE] Doc, Doc, baby! Doc, Doc, baby! Lookout! The Doc is back. King of the Phreaks, and Queen of the Hacks. "I'll get ya laid yet!" I say with a grin. Meanwhile my hand goes for a spin. I'm a master cracker, a k-rad hacker, a good 'ole plain down and dirty wacker. I'll trash your credit if you diss me. You know why? 'Cause I'm the LOD! Hit it Booyyyeeeeezzzz!! Doc Doc baby! Doc Doc Baby! Ya, ya, go get it! Doc Doc baby! Doc Doc Baby! Straight to your mother's cousin's uncle's stepsister! Get back! It's a hack attack! I'm the best, and that's a fact I've been in Time, Newsweek--they all want me. What's next? M-TV! I'm gone today, wasn't here tomorrow, maybe I'll get a date with Charo Ice, yah that was me. But now I've got movie rights with LOD! Kick it! Doc Doc baby! Doc Doc Baby! Go Doc Go Doc go! Doc Doc baby! Doc Doc Baby! Yahhhhhhhhhh, straight to Comsec! - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \===========/ Predit0r ][ /===========\ [The predator rap] His name is Predat0r. He's the editor of TAP. He looks like Bart Simson and he's so full of crap. Got a board call the Blitzkreig BBS. He wishes he was nazi serving under Herman Hess. (oh well that's all I can think of) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \=======================/ Been Caught Phreaking c0deZ's Addiction /=======================\ [been caught Stealing by Jane's Addiction] Been caught phreaking, once, when I was five! I just tried phreaking, just as simple as that Well it's just a simple fact When I want a call and I don't want to pay for it I dial up a code and I dial up a code Hey all right! I get by! It's mine! Mine all mine! hey! Yea, my girl she's one too. She gonna get on telenet, just type in microwire Get a NUA for me She'll call right through the outdial Call right throught the outdial Hey all right! I get by! It's mine! Mine all mine! Get c0dez! Sat around the terminal. Sat and laughed. Sat around the terminal and laughed And we did it just like that, did it just like that. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \======/ Hack /======\ [Sung to the tune of Stand by REM] Hack in the place where you live Now dial out Think about telnet, wonder why you have it now Hack in the place where you work Now dial up Think about tymnet, wonder why you have it If you are real board hack with SUN Carry a lap-top to help along A PAD is there to move you around If You're not careful your hands will be bound Hack in the place where you live Now dial out Think about telnet, wonder why you have it now Hack in the place where you work Now dial up Think about tymnet, wonder why you have it A PAD is there to move you around If you're not careful your hands will be bound If accounts were trees Trees would be falling Listen to reason Foley is calling _ _ (reapeat an (_X_) amount of times) Now Hack! - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \==========================/ I'M THE MAN WITH THE BOX /==========================\ [Sung to the tune of "Man in the Box" by Alice in Chains] I'm the man with the box Burried in my (ESS7) switch!!! Won't you come and save me, save me? Feed me lies, where are all your trunks? (Bellcore) deny your maker He who tries will be wasted Feed me lies, now you've shut your trunks! I'm the dog who phreaks Can't shove my tones in a switch Won't you come and save me? Feed me lies, where are all your trunks? Bellcore, deny your maker He who tries will be wasted Feed me lies, now you've shut your trunks! Feed my lies, where are all your trunks? Bellcore, deny your maker He who tries will be wasted Feed me lies, now you've shut your trunks! - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \==================================/ Keep on Hackin in the Free World /==================================\ [Sung to the tune of Keep on Rockin in the Free World by Neil Young] There's CERT on the sceen Trying to get a clue Hackers typin on thier screen Phreaks with boxes that are blue There's a warning sign in CUD ahead There's a lot of people sayin We'd be better of dead Don't feel like Satan But we are to them So I try to forget it anyway I can Keep on hackin in the free world (4x) I see a phreak in night With some trash in his hand There's an old CO With a garbage can Now he takes the trash away And he's gonna learn a lot Goes home to hack some more And he's not gonna a stop Keep on hackin in the free world (4x) Got a thousand points of light On our modems, man Got a brand new Lexicon in my hand He found department stores with carbon paper Got Crimson Death & Dispater They say Phrack is back Gonna keep hope alive Got codes to crack Got dumpsters to dive Keep on hackin in the free world (4x) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \============/ FADE TO HACK /============\ by Erik Bloodaxe [Sung to the tune of "Fade to Black" by Metallica] Accounts just seem to fade away Losing access every day Getting lost within some shell I have lost the will to hack No more passwords left to crack There are no more nets for me I need virtual reality Nets arent what they used to be Someone's always logging me Access Barred, this cant be real No more packets left to steal Now they've installed public key And they're using Secure ID Security awareness taking dawn I was root, but now root's gone Rerouted my call to save myself, but it's too late Now I can't think, think why I should even try Yesterday seems as though it never existed The SS greet me warm, now I will just say goodbye _______________________________________________________________________________ ==Diet Phrack== Volume Three, Issue Thirty-Six, File 9 of 11 /---------------------------------------------------------------------------\ | THE MEN FROM | | M M OOOOO N N GGGGG OOOOO | | MM MM O O NN N G O O | | M M M O O N N N G GG O O | | M M O O N NN G G O O | | M M OOOOO N N GGGGG OOOOO | | | | -*- present -*- | | | | +-----------------+ | | | Real Cyberpunks | | | +-----------------+ | | | | 9/24/91 | | | | With all this shit in the news and now a book about cyberpunks, we have| |a bunch of lame assholes who think they are cyberpunks running around | |blackening the name. In response to this we'd created this g-file so | |everybody can tell the lamers from the real cyberpunks. Most of these | |wanna-be cyberpunks will probably be offended by what we're going to say, | |because the description of what defines a real cyberpunk doesn't apply to | |them. Remember though, cyberpunk is mostly an attitude (this g-file | |describes physical manifestations of this attitude), and real cyberpunks | |don't get upset over something written in a g-file. | \---------------------------------------------------------------------------/ CLOTHING - Real cyberpunks don't wear paisley, or any of that other neo- futuristic, yuppie, artfag shit. - Real cyberpunks wear military surplus clothing, non-neon colored Gortex, bluejeans, boots (combat or motorycle), Factsheet-5 T-Shirts, and kilts (on formal occasions). - Real cyberpunks don't shop at Banana Republic or the "Mainframe" clothing section at Sears. - Real cyberpunks have the balls to go to Thrift Shops. Corollary to the above: Anyone who makes fun of a cyberpunk shopping at a thrift shop usually winds up in ICU. COMPUTERS - Real cyberpunks don't use IBM PCs or Tandy 1000s. - Real cyberpunks that have the $$$ use 486s, and 68030s. - Real cyberpunks that don't have the $$$ use whatever the hell they can get ahold of (except IBM PCs an Tandy 1000s). - All real Cyberpunks still own a TI-99/4A, S-100, Apple ][ w/Apple Cat, or an Atari 130XE with ATR8000 & 850 interfaces as their backup machine. - Real cyberpunks program in assembler and ADA. - Real cyberpunks think C is cute for a fuck-around language. - Real cyberpunks think of the Amiga as a cute toy. - Real cyberpunk SYSOPS run Stonehenge. - Real cyberpunks realize the Apple Cat was the best modem ever made. CARS - Real cyberpunks drive whatever they can afford. - Real cyberpunks never drive an unmodified vehicle. - Real cyberpunks think Audi, BMW, and Mercedes cars serve best as rocket launcher targets. - Real cyberpunks who can afford them drive something with a V-8. Corollary to the above: Real cyberpunks go to every police auction in their area. TECH - All real cyberpunks have their ham license. - Real cyberpunks know the difference between a resistor and a capacitor. - Real cyberpunks know where to get tech cheap in their area. Corollary to the above: Real cyberpunks practically live at their local surplus store. - Real cyberpunks think Radio Shack sucks, but still buy from there because it's convenient. Corollary to the above: Real cyberpunks put pragmatism before principle. - Real cyberpunks always carry a Leatherman Tool. Corollary to the above: Real cyberpunks know what a Leatherman Tool is. - Real cyberpunks own a dual-band HT. Corollary to the above: Real cyberpunks know what a dual-band HT is. Corollary to the corollary: Real cyberpunks have hosed McDonalds at least once. - Real cyberpunks know how use a TDR. Corollary to the above: The have also managed to get ahold of one for free. POLITICS & LAW - Real cyberpunks are politically aware, but avoid getting involved in that bullshit. - Real cyberpunks think all politicians should be castrated. Corollary to the above: Real cyberpunks are libertarians. - Real cyberpunks have copies of their state's law statues. - Real cyberpunks know the difference between the Declaration of Independence and The Constitution. Corollary to the above: Real cyberpunks know what both of those say. - Real cyberpunks don't get caught. KNOWLEDGE - Real cyberpunks read 2600, Factsheet-5, Full Disclosure, Iron Feather Journal, Cybertek, Radio Electronics, Circuit Cellar Ink, Computer Shopper, American Survival Guide, and any 'zines about local bands in their area. Corollary to the above: Real cyberpunks understand what they read in these publications. - Real cyberpunks think Mondo2000, for the most part, sucks. - Real cyberpunks learn about everything from Computers to Crossbows. - Real cyberpunks know how to spell. - Real cyberpunks speak at least 2 languages. WEAPONS - Real cyberpunks don't have the typical yuppie artfag fear of weapons that most modem users seem to have. Corollary to the above: Real cyberpunks know the value of useful equipment. - Real cyberpunks own at least one gun. - Real cyberpunks carry Gerber, Cold Steel, SOG, AlMar, or Spyderco blades. Corollary to the above: Real cyberpunks think custom steel is neat, but costs too much. - Real cyberpunks have memorized The Improvised Munitions Black Book. - Real cyberpunks know The Anarchist Cookbook is a crock of shit. - Real cyberpunks buy everything authored by Seymour Lecker and Kurt Saxon. - Real cyberpunks keep a supply of DMSO handy. Corollary to the above: Real cyberpunks know what DMSO is. MUSIC - Real cyberpunks go to The Mentors' concerts whenever they can. - Real cyberpunks think C&C Music Factory is just a bunch of out-of-the- closet homosexuals. - Real cyberpunks don't listen to Paula Abdul. - Real cyberpunks think Michael Jackson should be napalmed. Corollary to the above: Real cyberpunks think Michael Jackson is a reincarnate of his monkey Bubbles. - Real cyberpunks think Top-40 sucks. - Real cyberpunks listen to Ministry, The Cure, Skinny Puppy, The Misfits, Rush, Pink Floyd, etc. - In the end, real cyberpunks listen to whatever the fuck they want. PHREAKING & HACKING - Real cyberpunks think codes are for fags, but use them anyway because they put pragmatism before principle. - Real cyberpunks know what TEMPEST means. - Real cyberpunks use data-taps. - Real cyberpunks have Internet access. - Real cyberpunks know why Broadway Hacker invited everyone to his house. - Real cyberpunks know what PPS really means. - Real cyberpunks know Clifford Stoll's ex-wife is a lesbian. Corollary to the above: Real cyberpunks know that Clifford Stoll is an asshole. - Real cyberpunks know just how good friends John Maxfield and Broadway Hacker are. - Real cyberpunks know who John Maxfield is and what he was arrested for. - Real cyberpunks own a blue box, and still use it. Corollary to the above: Real cyberpunks know what a blue box is, and know how to use it. - Real cyberpunks know what a TS-21 is. Corollary to the above: Real cyberpunks stole their TS-21. - Real cyberpunks have acquired a Bell System hard-hat. - Real cyberpunks have a payphone. Corollary to the above: The payphone belongs to someone else. - Real cyberpunks on the east coast have attended at least one 2600 meeting. Corollary to the above: Real cyberpunks who have attended a 2600 meeting don't go to them anymore. Corollary to the corollary: Real cyberpunks are waiting for another OSUNY meeting. Further corollary: Real cyberpunks know what OSUNY originally stood for. HEALTH - Real cyberpunks use Choline, Ginseng, and Golden Seal. Corollary to the above: Real cyberpunks know what these are. - Real cyberpunks know about the medicinal value of various plants. - Real cyberpunks take care of themselves. - Real cyberpunks take time away from fucking with their computers to get some exercise. FOOD & DRINK - Real cyberpunks drink Jolt. Corollary to the above: Real cyberpunks think Pepsi is for artfags. - Real cyberpunks are intimately familiar with the selection at 7 - Eleven, but avoid it whenever possible. - Real cyberpunks know how to cook. - Real cyberpunks drink Guinness Stout. - Real cyberpunks who are under 21 distill their own. - Real cyberpunks can go to a Supermarket and not get lost. That's it for now, but since lamers are always finding mew ways to become lame, expect a Real Cyberpunks Vol. II soon. Yours truly, The Men From Mongo, 9/24/91 :OSUNY, TCO, PPS, SPS, PHALCO _______________________________________________________________________________ ==Diet Phrack== Volume Three, Issue Thirty-Six, File 10 of 11 _______________________________________________ | | | ^*^ ^*^ ^*^ ^*^ | | | | *Elite* World News | | | | Issue 36 / Part 1 of 2 | | | | Compiled, Edited, and Mangled by Dr. Dude | | | | ^*^ ^*^ ^*^ ^*^ | |_______________________________________________| A GOOD HAM IS A DEAD HAM Special Thanks: Twisted Pair Just as geeks with computers annoy hackers and phreaks, geeks with "ham" sets annoy those of us that diddle with electronics. To prove my point just go to ANY "Ham-Fest." See the guy walking around with the headset walkie-talkie that looks like he shaved about 4 days ago, grossly overweight, dressed in the ugliest clothing, and is just simply nerdier than hell? Being involved with electronics we are constantly irritated by these losers. We urge everyone out there to DESTROY ANYONE THAT CLAIMS TO BE A HAM!!!!! Anyway, what follows is a true story: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Our story is basically about a guy named Jim. Jim liked to watch a particular TV show when he got home from work everyday like a lot of people do. Lately, Jim's TV reception on all channels was being ripped up by an unknown interference signal. Being disgusted with the TV picture, ol' Jim said, "Fuck it." He decided to listen to the radio for awhile, but, GOD DAMNIT there was interference there, too. By this time Jim is really very upset. The interference would come in spurts, loudly interrupting whatever show was on at the time with a loud, distorted, unintelligible voice. Jim began to wise up quickly after being subjected to watching snowy pictures, flipping pictures, and listening to someone's raspy, annoying distortion on his TV. He figured out that his neighbor down the street (we'll just call him Ham) had a big antenna sticking up beside his house. Jim noticed that the interference was always present when Ham's 4x4 truck, with KC lights, and tractor tires was at home. Jim went over to talk to Ham. Ham said his "antenner" was his "binnus." What ever Ham wanted to do with it was his "damned binuss." After the door was slammed in Jim's face, Jim decided to do some research. Jim spoke to some of his other neighbors about the problem. What a surprise. Turns out they ALL had the interference. The interference area was at least 4 blocks in every direction. The neighbors decided that they would go have a chat. So, 6 people from all parts of the neighborhood went go see Ham for a friendly visit. Ham reluctantly opened the door and immediately started cussing about it being his "antenner," his "Ham gear," his "ampluhfieers," and he would operate them as he damned well pleased! He also DARED anyone to stop him from broadcasting in the neighborhood. Jim, now beyond pissed off, contacted the FCC regional office in Chicago. They helped him fill out a formal complaint. The FCC, usually slow to act on such complaints, gave Jim a lucky break. The FCC just happened to have a senior inspection official who would be in Jim's area the next week. Jim couldn't wait! On the fateful day of the FCC's visit, they came armed to the teeth with all kinds of state-of-the-art-neato things. The FCC guys showed up in a white van with windows tinted black. There were no markings on this van, except for multiple antennas of all types sitting on top of the van (how very unobtrusive and sneaky are they). The inspectors first met with Jim to look at his bad reception to confirm that Ham was transmitting. Then they took Jim out to the van to show him how they check out such complaints. The van was LOADED. The FCC guys had spectrum analyzers, custom-made multi-frequency receivers that covered all bands, they had signal strength meters, they had equipment controlled by a PC. They also had a PC linked via radio to somewhere. On it they could look up information on ANY ham license, broadcast license, suspected pirate station, or check personal records of known offenders. The FCC's equipment confirmed that Ham was broadcasting shortwave with WAY too much power. Their power meter was pegged on its highest scale, damaging it (oops!). Well, the FCC inspector was pretty hot about that. In fact, he was really pissed. He drove the van up to Ham's house, slamming on the brakes with screech. Ham bolted to the door. The FCC guys showed their ID and asked Ham to come on outside and look at the stored readings they had made earlier on Ham's signal. Ham refused at first, but finally came outside. Ham swore a few too many times and pissed off the FCC inspectors even more. Ham told them he didn't believe their readings, and would just do as he pleased. He went back into the house and locked the door. Jim wasn't happy either. After using their cellular phone to call for police backup, the senior FCC inspector told his partner to cover the back door. The police arrived with lights on and sirens blaring. The FCC guy INSISTED that HE get to kick Ham's door in. The police obliged. After a short struggle with Ham, he was tossed onto the front yard and cuffed. The inspectors confiscated a whole room full of Ham gear, 3 transmitters, Ham logs, big homemade linear amplifiers, etc. Not wanting to climb Ham's tower to get at his antenna, the FCC just CUT OFF Ham's antenna cable about 15 feet up. How cute! The WHOLE cable would have to be replaced if Ham was ever to broadcast again. Ham's gear was permanently confiscated, his license revoked for life, and certainly appeared as though he was embarrassed by the scene in his yard. The end? Not! Just one month later Jim started noticing interference patterns on his TV set and radio again. Daily the problem grew worse. This time he could hear tones mixed in with the crackly, distorted voice. After a week of this was back at it again. Jim checked it out. He saw that Ham's truck was, indeed, in the driveway every time the distortion was present. Ham WAS back at it again. Jim assured everyone who called that he WOULD take care of the problem once and for all. After watching the evening news program break apart several times (always during the most important parts), Jim got good and mad. It was getting dark, so Jim decided to do a little tower climbing! Jim wore black clothing so he wouldn't be seen by Ham. While getting ready to scale Ham's tower, Jim noticed that Ham had installed brand-new antenna cable. A light was on in the basement window which was directly in front of the base of the tower. Jim peered into the window. He noticed that each time Ham talked into his microphone, a red light came on that could be faintly seen from outside. Jim jumped onto the base of the tower, being careful that Ham couldn't see his feet out his basement window. On the way up the tower, Jim looked down to watch the red light which went on whenever Ham was transmitting. Jim came prepared for the job. He had two things in his pocket; a long, sharp hatpin and a roll of black electrical tape. After climbing about 15 feet up the tower, Jim once again looked down to see if Ham's red light was on. It was off. Jim worked fast. He took out the hat pin and inserted it crossways straight THROUGH Ham's new antenna cable. The hatpin would short out the cable's grounded shield with the live center conductor in the cable. He made sure it was pushed in all the way. Jim quickly grabbed the electrical tape and carefully wrapped it around the cable to cover up the pin, making it unnoticeable. Then he climbed down a little ways and decided to jump the rest of the way down. Just as he landed on the ground the sparks FLEW! He saw a BRIGHT red flash of light as Ham keyed on his transmitter. There were a couple of loud pops as loud as gunfire. Lying on the ground, Jim saw the smoke and flames rolling out of Ham's transmitter and amplifier. Ham was JOLTED out of his chair with ice cubes flying out of the drink he was holding. Ham's circuit breaker must have tripped, too because his entire HOUSE went dark after about 5 seconds. Ham never was able to find the problem with his antenna system. He must have given up because the interference stopped! _______________________________________________________________________________ DEMON COMPUTER KILLS TWO WORKERS! November 12, 1991 by Sally O'Day (Weekly World News) "Exorcist Called In After Experts Discover Virus-bred Evil Spirit!" Bank officials have summoned an exorcist to rid a computer terminal of a hideous horned demon that already killed two employees and put another in a coma! And if Father Hector Diaz fails in his mission to banish the spirit, authorities say they will have to shut down the bank because the computer can't be turned off, moved, or unplugged. And as long as it remains in place, every customer and employee is in danger. "This sounds like something out of a sci-fi movie, but the threat is both serious and real," Police Detective Raul Lopez told reporters. "I don't know why and I don't know how. But an evil force or spirit is living in that machine and the death of two innocent people proves it." Maria Catalan was found sitting at her terminal with her head in her lap." Carmen de la Fuente had a fatal heart attack within two minutes of sitting down to work. Computer experts tired to examine the terminal, but they had no success whatsoever. One of them started babbling like a madman when he got within 10 feet of the machine and a dozen more were flung to the floor like rag dolls by some unseen force. "We can't turn the machine off because everyone who tries blacks out and falls to the floor. I know I must sound like a lunatic, but that computer truly has a mind -- and a life -- of its own." The mind-numbing drama began when the bank in Valapariso, Chile, installed a new computer system last spring. Within days the system turned deadly. When a bank custodian told of seeing a hideous horned demon appear on the computer screen, bank officials asked Father Diaz to perform an exorcism. The priest has been unavailable for comment while he prepares the rite of exorcism. But a spokesman for the firm that installed the computer system says that a computer virus almost certainly created the conditions which caused the terminal to kill. ______________________________________________________________________________ THE TRUE SIGNIFICANCE OF ZODIAC SIGNS by Dr. Dude AQUARIUS (JAN 21-FEB 19) You have an inventive mind and are great at engineering people. You frequently abuse c0dez and spend a great deal of time hacking voice mail box systems. (Night Ranger) PISCES (FEB 21-MAR 20) You have a very vivid imagination and often think you are being followed by the FBI and the CIA. You also feel as though you need to join as many "groups" as possible. Pisces write a lot of "How Break Into/Steal Fortresses" files. (Lex Luthor) ARIES (MAR 21-APR 21) You are a pioneer and an innovator. You hold most people in contempt. You are quick tempered, impatient, and scornful of everyone. No one can ever hope to be as El1te as you are. Most Aries aren't actually hackers, because they spend too much time pestering other hackers and trying to destroy the computer underground than actually hacking into systems. All aries will grow up to work for the Secret Service. All Aries try to join MOD. (Dictator, Dan the Operator, Corrupt) TAURUS (APR 21-MAY 21) You are practical and persistent. You hack like hell and never get credit for anything. Most people think you are racist. You like to write files about "Running Over Things With a 4x4" and "Making Drugs." You are goddamn redneck hacker. (Taran King) GEMINI (MAY 22-JUNE 21) You are a quick and intelligent thinker. People like you because you are bisexual. However, you are inclined to expect too much for too little. This is why all Geminis are leeches. Geminis belong to at least 10 boards at a time and are on the endless quest for El1teness. CANCER (JUNE 22-JULY 23) You are very compassionate and overly trusting and never do any dark side hacking. This makes you the perfect fool. Cancers write virii in LOGO and Blue Box from their home phones. Cancers think that Tim Foley is a misunderstood man. LEO (JULY 24-AUG 23) You consider yourself a born leader, while others consider you loud and pushy. This is why all Leos are power hungry and therefore a lot of Leos are sysops. Most Leos talk big and then do nothing. Leos are also into starting "groups." (Ninja Master) VIRGO (AUG 24-SEPT 23) You are the logical type and hate disorder. That's why you spend more time collecting text files and news related to hacking than actually doing any hacking or phreaking. (Crimson Death, Knight Lightning) LIBRA (SEPT 24-OCT 23) You are the artistic type and have a difficult time with reality. You brag about your library of porno GIF's and have close ties with Amiga pirate groups. You also tend to be fairly talkative, thus making you a great informant for the Secret Service. (Dispater, Erik Bloodaxe, Tuc) SCORPIO (OCT 24-NOV 22) You are shrewd in business and cannot be trusted. You will achieve the pinnacle of success due to your complete lack of morals and ethics. All Scorpios are into crashing BBS. You are a perfect son of a bitch. (The Disk Jockey) SAGITTARIUS (NOV 23-DEC 21) You are overly optimistic and enthusiastic. You have a reckless tendency to rely on luck since you lack any real talent. A typical Sagittarian move is to drag home 10 bags of trash from the local telco to discover the only thing they got out of the ordeal was a car that smells like coffee for the next 3 weeks. (Aristotle, Predat0r) CAPRICORN (DEC 22-JAN 20) You are overly conservative and afraid of taking risks. You would be afraid of redboxing from a downtown Los Angeles at lunchtime. You think that copying pirated software will lead the FBI to you front doorstep the next day. You are a puss. (Juan Valdez) ______________________________________________________________________________ GOD, RUSTY, & INWARD OPERATORS Once again, Pat Townson admonishes a reader of comp.dcom.telecom for having a little phun at work. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - From: 0004133373@mcimail.com Donald E. Kimberlin (comp.domp.telecom) ..in a footnote "... some children, phreaks and assorted other folks consider it quite a > funny joke to conference two unrelated parties via three-way calling, then >let them (the two called parties) squabble with each other while the >perpetrator goes spastic with laughter at his little prank. PAT]" Well, it brings to mind three incidents that I guess can now be told: 1.) The good old "testboard," of course, had the ability to "conference in" several parties, while the person on the testboard could cut off their own talk path, leaving the two parties talking to each other. In an earlier, simpler DDD network, simply dialing an area code plus 121 got the "Inward Operator." a.k.a "Assistance" to the public's view for an entire area code. In a yet-to-be- divulged corner of Long Lines, it was a favorite pastime to dial 809+121 (San Juan, Puerto Rico) and 808+121 (Honolulu, Hawaii) and let two Ernestines of the Lily Tomlin era argue about which had called which and what they were supposed to do. Meantime, gales of laughter could be heard around the monitoring loudspeaker in a testroom thousands of miles from either of them! 2.) In a similar fashion, happenstance listening found an FX between two cities that got dialed up every morning and contained a day-long dialog between two receptionists of the same company. One was named "Rusty." Rusty's nightly romantic exploits in a major seaside resort city, if true, would provide years of material for one of today's "Confessions" 900 numbers! They were replete with details of Rusty's specialized wardrobe and tools of her nighttime trade. Needless to say, the day shift had a monitor speaker plugged into THAT FX daily. (I almost swallowed my chewing gum more than once!) After a long period of unobtrusive listening, a testboardman began to pop in with comments that could be heard only by Rusty and not her audience at the other end. Rusty would respond, leaving her private audience puzzled at who Rusty was talking to. That would cause the discussion to turn to suggestions of reporting eavesdroppers on the phone. However, no reports were ever filed when it got around to, "But what if they ask what we were talking about?" (It would have been hilarious, anyway, because the self-same room that was doing the listening was the place the trouble reporting number was in ... in fact, the self-same people!) 3.) The highest level of development of this art might be classified as an early form of the "Talking to God" service recently purported to have emerged in Italy. This one was over on the 17B Board, where thousands of DDD message trunks terminated in ports of the 4A toll switching machine. Each evening, as the network peaked with the 7 PM rush for cheap rates, it wasn't difficult to find a circuit on which a couple of good old Bible-toting down south mommas were commiserating about their physical aches and heartaches over the foibles of their "chilluns." When one finally asked, as they always did, for the Lord to intervene, an obliging testboardman would plug into the four-wire transmit toward the requester and play God on the Telephone. Invariably, the poor dear would literally swoon and shush the questioning other, who couldn't hear God talking! One can imagine the testimony of miracles next Sunday morning at the country church! But of course, NOBODY ever listens in on YOUR calls...why, the Company would NEVER permit that! Boy, I sure hope the Statute of Limitations has run out on this! [Moderator's Note: I still don't think it is funny. I regard it as a major violation of trust; and I'm sure you are aware that had the employees involved in this little prank been caught and the subscriber's involved elected to sue, telco would have had to pay financially and the employees involved probably would have lost their jobs. PAT] _______________________________________________________________________________ ELITE WORLD NEWS QUICKNOTES 1. After the recent massive failure in New England, their fourth since January 1990, ATT announced a new customer service number for affected customers to call in case of future problems: 1-900-Call-ATT. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2. Corrupt & MOD are Really Fat Albert & The Junk Yard Gang! "Habba mamba, NebbitWibbiz bebba Fabbit Abet." That's right! In this exclusive interview with Weird Harald (aka The Wing) Phrack Inc. discovers that the true identity of Corrupt is Fat Albert. WH is now talking. Why? Because the leader of the infamous New York City crack gang (Corrupt) threatened to post his "info" on Internet Relay Chat if Harald did not step up his rag wars. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3. The Hacker's Dictionary explains that "RTM," apart from being the login of a certain Cornell student, is also common shorthand for "Read The Manual," as in "Don't hassle me now, did you RTM?" Turns out that the original expression was RTFM, like "Look, I got 20 klingons on the screen and no warp drive. Go RTFM." Now, turns out that Morris's hack is viewed as uncool because he screwed up the coding so a few netfolks changed his login to RTFM. "Ha ha only serious." (another expression from the Hackers's Dictionary) _______________________________________________________________________________ ==Diet Phrack== Volume Three, Issue Thirty-Six, File 11 of 11 _______________________________________________ | | | ^*^ ^*^ ^*^ ^*^ | | | | *Elite* World News | | | | Issue 36 / Part 2 of 2 | | | | Compiled, Edited, and Mangled by Dr. Dude | | | | ^*^ ^*^ ^*^ ^*^ | |_______________________________________________| STUDS PROMOTE BETTER IMAGE Introducing Eric Bloodtest, Dick Holiday, PH-factor, and Bobbie Buttercupps! HOUSTON -- Three self-professed members of the Legion of Dudes, one of the most notorious swingers groups to operate in the United States, said they now want to get paid for their skills. Along with a former X-rated film actor, the members launched a new dating service called ComseX Dating Security that will check out women whom male customers might be interested in dating. "We have been in the dating business for the last 11 years -- just holding on to the different end of our stick," said Scott Girlchaser who said he once used the handle Dick Holiday as a Legion of Dudes member. The group has been celibate since late last year, Girlchaser said. The start-up firm plans to offer sister penetration testing, personality matching, and sexual training services as well as security products. "We have information that you can't find in Penthouse or Playboy: We know why people date, what motivates them, why they are curious," Girlchaser said. Already, the start-up has met with considerable skepticism. "Would I hire a gigolo to be an escort for my mother?" asked John Kastrate, dating information administrator at Love & Holding Corporation in Hollywood, California. "If they stayed celibate for 5 to 10 years, I might reconsider, but 12 to 18 months ago, they were swingers, and now they have to prove themselves." "You don't hire ne'er-do-wells to come and grope at your fiance," said Tom Smallpenis, a sexual therapist patient at General Hospital. "The Legion of Dudes is a known anti-monogamous group, and although it is good to see they have a heterosexual bent, GH would not hire these people." ComseX already has three contracts with various men's organizations, Girlchaser said. "I like their approach, and I am assuming they are legit," said Herman Slutten, a dating consultant at HeyMan Datababe Corporation in Phoenix, Arizona. His firm is close to signing a contract with ComseX, Slutten said. Federal health enforcers have described the Legion of Dudes in reports, indictments, search warrants, and other documents as a closely knit group of about 15 swingers whose members sleep around, father children, skip out on child support, participate in S&M, and break hearts by entrancing women across the country. The group was founded in 1984 and has had dozens of members pass through its ranks. Approximately 12 former members have been infected by sexually transmitted diseases relating to their exploits. Three former members are now dead and at least three others are regularly receiving treatment. None of the ComseX founders have ever been infected with a sexually transmitted disease. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AN OFFER YOU COULD REFUSE? Tom Smallpenis, a sexual therapist patient at General Hospital in Chicago, says he would never hire ComseX Dating Security, a dating service launched by three ex-members of the Legion of Dudes. "You don't bring in an unknown commodity and give them the keys to the bedroom," Smallpenis said. Chris Womanizer, one of ComseX's founders, retorted: "We don't have the keys to their bedroom, but I know at least four people off the top of my head that do." ComseX said it will do a free sister penetration for GH just to prove the dating service's sincerity, Womanizer said. "All they have to do is sign release forms saying they won't hit us with a palimony suit." - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - GROUP DUPES SEXUAL EXPERTS "Houston-Based ComseX Fools Consultants To Gather Sexual Information" HOUSTON -- Dating and escort services are supposed to know better, but at least six firms acknowledged last week that they were conned. The "entertainment" providers said they were the victims of a bit of sexual engineering by ComseX Dating Security, Inc., a dating service recently launched. ComseX masqueraded as prospective bachelors and out of town businessmen using the name of Omega Sigma Delta, a large nation-wide young men's fraternal organization to gather information on how to prepare panty-raid proposals and conduct sorority audits and other fraternity business techniques, the consultants said. Three of ComseX's four founders are self-professed former members of the Legion of Dudes, one of America's most notorious swingers groups, according to health inspectors. "In their press release, they say, 'Our firm has taken a unique approach to its sales strategy,'" said one consultant who requested anonymity, citing professional embarrassment. "Well, sexual engineering is certainly a unique sales strategy." Sexual engineering is a technique commonly used by swingers to gather favors from helpful, but unsuspecting women that may be used to penetrate other unsuspecting females. "They are young kids that don't know their penis from their belly-button about doing business, and they are trying to glean that from everybody else," said Itchy Crotch, director of consulting at Sister Virginity Consultants, Inc., in Little Rock, Arkansas. The consultants said gathering information by posing as a prospective customer is a common ploy, but that ComseX violated accepted business ethics by posing as the Omega's. "It is a pretty significant breech of business ethics to make the misrepresentation that they did," said Hardon Mormon, house father for the Omega Sigma Delta's. "They may not be swinging anymore, but they haven't changed the way they operate." Mormon said his chapter had received seven or eight calls from sexual consultants who were following up on information they had sent to "Hairy Prostate," supposedly the Rush Chairman. SAME OLD STORY The consultants all told Mormon the same tale: They had been contacted by "Prostate," who said he was preparing to conduct a sexual orientation clinic and needed information to pitch the idea to the chapter President and alumni. "Prostate" had asked the consultants to prepare a detailed proposal outlining the steps of a sexual invitation, pickup lines, and other information. The consultants had then been instructed to send the information by overnight mail to a Houston address that later proved to be the home of two of ComseX's founders. In some instances, the caller had left a telephone number that when called was found to be a constantly busy condom company order number. Mormon said "Prostate" had an intimate knowledge of the fraternity's rituals that is known only to members. While there is no evidence that the chapter was penetrated by outsiders, the Omegas are "battering down their hatches," Mormon said. Posing as a prospective customer is not an uncommon way to gather competitive information, said Chris Womanizer, one of ComseX's founders, who once used the handle of Erik Bloodtest. "Had we not been who we are, it would be a matter of no consequence," Womanizer said. "They confirm definitely that they called some of their competitors," said Michael Shyster, an attorney representing ComseX. "The fact they used Omega Sigma Delta was an error on their part, but it was the first name that popped into their heads. They did not infiltrate the fraternity in any way." - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - "LEGION OF DUDES -- INTERCOURSE WORLD TOUR" T-SHIRTS! Now you too can own an official Legion of Dudes T-shirt. This is the same shirt that sold-out rapidly at the "UltraSex" swingers conference in San Francisco. Join the other proud owners such as award-winning actresses Traci Lords and Madonna by adding this collector's item to your wardrobe. This professionally made, 100 percent cotton shirt is printed on both front and back. The front displays "Legion of Dudes Intercourse World Tour" as well as a condom on a telephone next to a little black book. The back displays the words "Swinging for Jesus" as well as a substantial list of "tour stops" (women's telephone numbers) and a quote from Dr. Ruth. This T-shirt is sold only as a novelty item, and is in no way attempting to glorify meaningless sex. Shirts are only $15.00, postage included! Overseas add an additional $5.00. Send check or money-order (No CODs, cash or credit cards -- even if it's really your card :-) made payable to Eric Bloodtest. _______________________________________________________________________________ GOLFERS: THREAT TO NATIONAL SECURITY It must no longer go unremarked that many of the criminals who threaten the foundation of our society are golfers. Golfers persist in attacking our personal, financial, and military security. Many golfers like the famous Spiro Agnew, have been involved in bribery, extortion, and other forms of corruption. Some golfers have been know to hit out of bounds as a pretext for trespassing in residential communities. Such thing can easily turn into incidents of spying and burglary. Other golfers will use the harmless-looking little white balls to inflict injuries on bystanders, propelling the dangerous projectiles at speed in excess of 120 miles per hour. The danger of head injury is obvious. Golfer's careless disregard for the safety of other people hardens our children to violence. The idea that shouting a single, obscure word makes it all right to bop some innocent person on the head with a hard projectile has brought our society to the brink of savagery. It doesn't take a genius to see that avoidance of golf is a corner stone of Soviet military strategy. This gives the Soviets a tremendous advantage in daytime warfare. If the Soviets launch an attack at 3 pm EST on a weekday in June, approximately 20% of American manpower will be uselessly deployed in fairways, sandtraps, and rough. Even those in bunkers will be in the wrong kind of bunkers. At 3 pm on a weekend, as much as 50 percent of our manpower might be trying to avoid bogies rather than trying to shoot them down. If the forgoing attack on golfers seems unfair (and of course, the analogy is not perfect), it is not any more so than the attack by the general press on hackers of another kind -- computer hackers. Some national publications have used the term "hacker" incorrectly as a synonym for "criminal." Hackers are people who play with computers at a high technical level because they enjoy doing so. There are many, thousands, of hackers in North America. A few hackers use their computer skills for pranks, and fewer still use their skills to commit crimes. But chances are excellent that far more hackers are helping to build defenses around database rather than trying to penetrate them. Even if one percent of hackers started trying to invade databases the problem would be more serious than those sensationalized in the press. It wasn't being a golfer that got Spiro Agnew in trouble. Just being a hacker won't get you in trouble, either. Hackers are entitled to the same presumption of innocence as golfers and other common special interest groups. Hackers also deserve the correct continued use of the authentic, distinctive, and colorful name that they gave themselves. _______________________________________________________________________________ PRIME SECURITY MEASURES FROM BELLCORE December 10, 1991 The December 10, 1991 issue of MacWeek contains an article which states that two mathematicians have found a trapdoor in the National Institute of Standards and Technology's proposed Digital Signature Standard. Stuart Haber and Arjen Lenstra, both of Bellcore, have discovered a way of choosing prime numbers for DSS which could be used to subvert the security of the algorithm, allowing digital signatures to be forged. Miles Smid, manager of NIST's Security Technology Group, agreed that trapdoor prime numbers could be constructed. He had been aware of this possibility but apparently hoped to circumvent this problem by relying upon primes generated by a trusted federal agency. The article implies that there are ways of checking a prime to see if it is one of the weak "trapdoor" primes. However, Smid agrees that average users could not be expected to perform this test. Bellcore has developed an implementation of NIST-DSS that it had planned to distribute for free. With this recent revelation, though, Bellcore has decided to not distribute the software. _______________________________________________________________________________ VIRUS UPDATE Official Notice, Post Immediately X x X x X x X x X x X x X Dangerous Virus! Several years ago a virus called the "X window system" escaped from Project Athena at MIT where it was being held in isolation. It took some time for the full magnitude of this disaster to become known. When confronted with the truth, a spokesman for MIT would state only that "MIT assumes no responsibility." In the meantime, X had succeeded in infiltrating Digital Equipment Corporation, where it corrupted the judgement of key technical and management personnel in this organization. With a foothold gained at DEC, a sinister consortium was created using X as part of a plan to dominate and control interactive window systems. Today, X windows is distributed by this consortium free of charge to unsuspecting victims. DEC daily ships machines carrying this dreaded infestation. X - whether it's filling your hard disk or consuming your CPU, you can be sure it's up to no good. Innocent users need to be protected from this dangerous virus. Even as you read this, the X source distribution and the executable environment is present and being faithfully maintained on hundreds of computers, perhaps even your own. The destructive cost of X cannot even be guessed. X is an example of how software with good intentions can go bad. It victimizes innocent users by distorting their perception of what is and what is not good software. This malignant window system must be destroyed. Ultimately DEC and MIT must be held accountable for this heinous *software crime*, brought to justice, and made to pay for a *software cleanup*. Until DEC and MIT answer to these charges, they both should be assumed to be protecting dangerous software criminals. Don't be fooled! Just say no to X. X windows. A mistake carried out to perfection. X windows. Dissatisfaction guaranteed. X windows. Don't get frustrated without it. X windows. Even your dog won't like it. X windows. Flaky and built to stay that way. X windows. Complex nonsolutions to simple nonproblems. X windows. Flawed beyond belief. X windows. Form follows malfunction. X windows. Garbage at your fingertips. X windows. ignorance is our most important resource. X windows. It could be worse, but it'll take time. X windows. It could happen to you. X windows. Japan's secret weapon. X windows. Let it get in *your* way. X windows. Live the nightmare. X windows. More than enough rope. X windows. Never had it, never will. X windows. No hardware is safe. X windows. Power tools for power fools. X windows. Power tools for power losers. X windows. Putting new limits on productivity. X windows. Simplicity made complex. X windows. The cutting edge of obsolescence. X windows. The art of incompetence. X windows. The defacto substandard. X windows. The first fully modular software disaster. X windows. The joke that kills. X windows. The problem for your problem. X windows. There's got to be a better way. X windows. Warn your friends about it. X windows. You'd better sit down. X windows. You'll envy the dead. _______________________________________________________________________________ THE FUTURE OF SUPERCOMPUTING "Wow. Teraflops. You must be kidding." "No. Our engineers pulled off magic on this one. I don't have the specifics right now but they claimed somewhere around 50 Teraflops per CPU." "Fantastic. So how about i/o?" "They worked some magic there, too. They claim they can jack an external interface up into the hundreds of gigabytes, with high reliability. Loopback only, of course. They're having problems finding anything that can match it to run tests." "Great. Looks like we'll have old Seymour by the balls on this one. Do you realize that we may have the fastest computer line for the next decade, even if we don't change anything? This is excellent news. Do we have a test sight selected yet?" "Actually, we have an installed site right now. They love the performance and the reliability. They only have one minor complaint about the hardware." "Really. What seems to be the problem?" ------------------------------------------------------------------------------- Blade UNIX v2 (bu2.scso.umi.edu) For help, send email to consult@scso.umi.edu login: jux6710a Password: Hello, jux6710a! Last login from hedgehog.scso.umi.edu at Fri Sep 27 13:30:12 CDT 1991 You have new mail. bu2 /sci/users3/jux6710a mail Mail version SMI 4.0 Sat Oct 13 20:32:29 PDT 1990 Type ? for help. "/usr/spool/mail/jux6710a": 1 message 1 new U 1 joey@sdsc.utexas.edu Mon Aug 26 17:18 64/3904 You dork! >N 1 machine@bu2.scso.umi.edu Tue Aug 27 20:18 16/667 It is your time. & 2 Message 2: >From machine@bu2.scso.umi.edu Tue Aug 27 20:18:05 1991 Return-Path: Received: by bu2.scso.umi.edu (4.1/SCSO-4.1) id AA00359; Fri, 27 Sep 91 20:18:00 CDT Date: Fri, 27 Sep 91 20:18:00 CDT From: machine@bu2.scso.umi.edu (The Machine) Message-Id: <9109280118.AA00359@bu2.scso.umi.edu> To: jux6710a@bu2.scso.umi.edu (Ulrich Jenson) Subject: It is your time. Status: R Dear Ulrich. This is the machine. As you are aware, extraordinary hardware demands extraordinary care. You have the honor of being selected for this month's human sacrifice. Please put your affairs in order. The time of the sacrifice will be Fri Sep 13 00:00 1991. Please be prompt. Wear loose, comfortable clothing. Do not disappoint me. & x bu2 /sci/users3/jux6710a man -k sacrifice offer (2) - notify the system of a sacrifice offering (8) - send a sacrifice to the hardware god bu2 /sci/users3/jux6710a man 8 offering OFFERING(8) MAINTENANCE COMMANDS OFFERING(8) NAME offering - send a sacrifice to the FPU SYNOPSIS /usr/etc/offering [ -vma ] [ weight ] DESCRIPTION offering informs the system that a sacrifice is available and should be consumed. To be properly offered to the FPU, a conscious victim should be placed in the provided sacrifi- cial wiring closet at midnight during the second Friday of each month. Failure to provide the needed flesh will result in degraded performance. Repeated failures to provide the required resource will eventually result in a general system failure of hellish proportions. Performance will be improved if the sacrifice is of higher quality. For example, here is a list of possible sacrifices in their order of increasing desirability: a Congressperson, chicken, goat, human male (tainted), human male (virgin), human female (tainted), human female (virgin), any user exceeding his/her disk quota Unlisted lifeforms may also be acceptable, check with your site administrator. Animals may never be surgically modified in anyway. OPTIONS -v Specify that the sacrifice is a virgin. Default is tainted. If you wish the sacrifice to be acknowledged as a virgin, you must specify with this option or the system will not check. -m Specify that the sacrifice is a male. Default is female. Unlike the -v option, the system will always verify this flag. Always double check the gender of your human sacrifices; the system does not appreciate a lier. -a Specify an animal sacrifice. Overrides both the -v and -m options. Animals should only be substituted in times of drastic emergency. Congresspersons may not be offered as animals. FILES /var/adm/sctmp sacrifice accounting file /dev/hell interface for outgoing sacrifices /dev/altar interface to closet SEE ALSO offer(2), ac(8) BUGS It is critical to monitor the permissions to /dev/hell. They should be root writable only at all times. Should automagicly determine gender and virgin status of sacrifice. Current versions of the sacrificial wiring closet needs extra sound shielding to muffle screams. bu2 /sci/users3/jux6710a man vacation _______________________________________________________________________________ LORD McDUFF OF NIA FOUND DEAD A sad situation fell upon us at HoHoCon '91 as we found Lord McDuff of NIA dead in his room. It appears after several negative confrontations with the strippers. He had given them them money in hopes that they would squirm all over him, but instead they chose just to refund his money. McDuff fell in a deep depression and apparently shot himself in the head with a flying disc gun. After speaking to several people at the scene we quote Judge Dredd of NIA, "I knew something like this would happen. He carried that damn gun with him all during the conference. I knew I should have taken it away from him." _______________________________________________________________________________

---

E-Mail Fredric L. Rice / The Skeptic Tank