769 lines
34 KiB
Plaintext
769 lines
34 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Sun Nov 22, 1992 Volume 4 : Issue 60
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Copy Eater: Etaion Shrdlu, Junior
|
|||
|
|
|||
|
CONTENTS, #4.60 (Nov 22, 1992)
|
|||
|
File 1--A Bird's-eye view of the Pumpcon Problem
|
|||
|
File 2--We Must Defend our Rights Ourselves!
|
|||
|
File 3--Re: CPSR Platform and You
|
|||
|
File 4--2600 Allegations Require Collective Response
|
|||
|
File 5--Creative Computing for College
|
|||
|
File 6--Another view of Software Piracy
|
|||
|
File 7--Piracy Declines
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
|||
|
libraries; from America Online in the PC Telecom forum under
|
|||
|
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
|
|||
|
Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
|
|||
|
anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
|
|||
|
/pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
|
|||
|
(192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
|
|||
|
in /pub/text/CuD.
|
|||
|
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
|
|||
|
Back issues also may be obtained from the mail
|
|||
|
server at mailserv@batpad.lgb.ca.us.
|
|||
|
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Fri, 20 Nov 1992 06:32:21
|
|||
|
From: Iwasthere@when.down.it.com
|
|||
|
Subject: File 1--A Bird's-eye view of the Pumpcon Problem
|
|||
|
|
|||
|
********** PUMPCON BUSTED!!! ***********
|
|||
|
10/31/92
|
|||
|
written by someone who was there
|
|||
|
who wishes to remain anonymous
|
|||
|
|
|||
|
NOTICE: The word "Hacker" is used frequently throughout this file -
|
|||
|
it is to be interpreted as "a computer literate person", and
|
|||
|
NOT as "someone who engages in illegal activities using a
|
|||
|
computer".
|
|||
|
|
|||
|
Friday, October 30, Pumpcon began, at the Courtyard of the Marriott,
|
|||
|
in Greenburgh, NY. All in all, about 30 hackers showed up, and had a
|
|||
|
great time. At least until the evening of Oct. 31st, when 8-10
|
|||
|
members of the Greenburgh police force showed up and raided the Con.
|
|||
|
At the time of the raid, there were between 20 and 25 hackers in the
|
|||
|
hotel. 3 of the 4 rooms rented by Con attendees were raided. All the
|
|||
|
occupants of these rooms were taken to a conference room, and then
|
|||
|
another hotel room (255) where they were held approximately 6-8 hours
|
|||
|
for questioning.
|
|||
|
|
|||
|
The police all came in unmarked police cars, and parked on all 4 sides
|
|||
|
of the hotel. No one noticed they were there, until they were
|
|||
|
standing in the hall where all 4 rooms were located. The officers
|
|||
|
stood in the hall outside the doors, but did not enter the rooms right
|
|||
|
away. They waited about five minutes, for some unknown reason, which
|
|||
|
was just enough time for them to be noticed by the hackers in at least
|
|||
|
one of the rooms. Unfortunately, there was no way the hackers in one
|
|||
|
room could warn the other rooms - the fone lines were busy, and the
|
|||
|
cops in the hall kinda left the "walk down and tell 'em in person"
|
|||
|
option out.
|
|||
|
|
|||
|
The police produced copies of a search warrant to search rooms 246,
|
|||
|
233, and 237. Room 246 was the one where everyone was hanging out; it
|
|||
|
was pretty much THE room. It was where the computers were located,
|
|||
|
and where most of the Con attendees were 99% of the time. The other
|
|||
|
two rooms were rented by attendees of the con, and were simply used
|
|||
|
for sleeping quarters.
|
|||
|
|
|||
|
Before too long, the police entered the rooms, and began rounding up
|
|||
|
people. My recollection of this time period is a bit faint, and I
|
|||
|
don't remember all the minute details. All I know is that we all
|
|||
|
ended up in a conference room, and then room 255.
|
|||
|
|
|||
|
A few hackers who had been out driving around during the time of the
|
|||
|
bust returned a few hours later, and when they were seen by police,
|
|||
|
they were immediately taken to 255 and questioned. (They were walking
|
|||
|
down the hall, when a cop appeared, and told them to step into a room)
|
|||
|
The cops asked them if they were hackers, and when they didn't answer,
|
|||
|
one police officer reached into the coat pocket of one of the people,
|
|||
|
and produced an auto dialer. This in itself was enough to send the
|
|||
|
three to room 255, where the rest of the hackers were being held for
|
|||
|
questioning. My question to you - isn't that just a bit illegal?
|
|||
|
Bodily search without probable cause OR a warrant? Ooops - I'm
|
|||
|
forgetting - we're HACKERS! We're ALL BAD! We're ALWAYS breaking the
|
|||
|
law. We don't have RIGHTS!
|
|||
|
|
|||
|
Room 255 was packed. No one was allowed to smoke, and everyone was
|
|||
|
nervous as hell. One by one people were called to be interviewed,
|
|||
|
with some interviews lasting 5 minutes, others lasting 30 or 45
|
|||
|
minutes. Some people were sleeping, others were conversing, and still
|
|||
|
others were shaking, and looked like they were about to puke at any
|
|||
|
second. Even though the situation was quite serious, a few joked
|
|||
|
around, saying things like "So guys, I guess PumpCon '93 won't be held
|
|||
|
here, eh?".
|
|||
|
|
|||
|
No one knew who was going to be arrested, or when they would be
|
|||
|
released. The 2 cops in the room with them were actually pretty cool,
|
|||
|
and answered any questions they could to the best of their knowledge.
|
|||
|
They weren't the guys in charge of the investigation; they were simply
|
|||
|
there to make sure we didn't leave. Of course, as friendly as they
|
|||
|
seemed, they were still cops...
|
|||
|
|
|||
|
All the people who were detained were held until between 5:45 and
|
|||
|
6:30 am. Four hackers were arrested, 1 because 2 of the rooms were
|
|||
|
registered in his name, a second because he signed for the rooms, and
|
|||
|
the others for previous crimes, apparently. No one knows as of yet.
|
|||
|
As of this message, no news on what will become of those arrested is
|
|||
|
known. They have not yet been arraigned. The other hackers were all
|
|||
|
searched, questioned, and then released pending further investigation.
|
|||
|
Those under the age of 18 had their parents notified.
|
|||
|
|
|||
|
To my knowledge, there were no federal investigators there at the time
|
|||
|
of the bust. However, people kept mentioning the FBI and the Secret
|
|||
|
Service, and it is very possible that they will be called in to
|
|||
|
investigate. Actually, it's more than just possible, it's almost
|
|||
|
guaranteed. The police said that although most of those detained were
|
|||
|
released, there will most likely be more arrests in the near future,
|
|||
|
as more is learned about the alleged illegal doings.
|
|||
|
|
|||
|
3 computers (2 Amigas, and 1 AT&T dumb term) were confiscated, along
|
|||
|
with anything which looked like it could have been involved in phone
|
|||
|
fraud. For some odd reason, although Auto Dialers were listed on the
|
|||
|
search warrant, not all of them were confiscated. I actually don't
|
|||
|
know if ANY were, I do know that not ALL were. ;)
|
|||
|
|
|||
|
In one of the rooms, there were about 2 dozen computer magazines which
|
|||
|
were apparently confiscated, although the warrant did not specify that
|
|||
|
magazines could be taken. But, when you're busting HACKERS, I suppose
|
|||
|
you can take what you want. After all, hackers are evil geniuses, and
|
|||
|
don't have the same rights as NORMAL criminals do.
|
|||
|
|
|||
|
As of yet, the actual charges against the hackers are not known. The
|
|||
|
raid apparently stemmed because the hackers were ALLEGEDLY using
|
|||
|
stolen calling card numbers and/or access codes to obtain free phone
|
|||
|
calls. One of these card numbers or codes was rumored to have
|
|||
|
tripped a flag at AT&T, which alerted security personnel that something
|
|||
|
was possibly wrong.
|
|||
|
|
|||
|
This assumption about the calling card fraud is made because the
|
|||
|
police confiscated any calling card found during their searches, and
|
|||
|
some of the questions they asked the detained centered entirely around
|
|||
|
calling card theft and use. A few other questions asked me were "Do
|
|||
|
you know what computer systems were accessed?", "Do you refer to each
|
|||
|
other with handles?", "Who was primarily responsible for this
|
|||
|
meeting?", and "Where did you hear about this meeting?"
|
|||
|
|
|||
|
My interview lasted only about 10 minutes, and it started at about
|
|||
|
5:50 am. Everyone was dead tired, and the cops wanted to get
|
|||
|
everything over with as fast as possible so they could get some sleep.
|
|||
|
After the interviews were over, everyone left, to wait and see what
|
|||
|
the next few days will bring.
|
|||
|
|
|||
|
I am releasing this file now, to prevent any rumors from starting, and
|
|||
|
to try to make the outside world aware of what happened during
|
|||
|
PumpCon. I have left out any specific incidences and references to
|
|||
|
specific people as a precaution, since the investigation is only
|
|||
|
beginning. We were hoping to write a file of all the attendees of
|
|||
|
PumpCon, to share with the world the names of those who were there.
|
|||
|
However, as you can obviously see, that would be highly stupid. For
|
|||
|
anyone who WAS there who is reading this, rest assured that the
|
|||
|
running list of names which was kept made a very tasteless dinner for
|
|||
|
the one who had it in his pocket.
|
|||
|
|
|||
|
Oh, BTW, one of the cops who was apparently in charge made a comment
|
|||
|
to me... he said "You can post a message on the boards telling your
|
|||
|
friends to stay out of Greenburgh". Well boys, you heard him -
|
|||
|
PumpCon '93 will be held in Greenburgh, at the Courtyard Marriott....
|
|||
|
|
|||
|
*--------------*
|
|||
|
|
|||
|
The following is a word for word copy of the search warrant issued to
|
|||
|
each person who was detained and questioned. No spelling errors were
|
|||
|
corrected, but I probably made a few when I typed this in. Oh well.
|
|||
|
|
|||
|
|
|||
|
TOWN of GREENBURGH POLICE DEPARTMENT
|
|||
|
WESTCHESTER COUNTY, NEW YORK
|
|||
|
ORDER OF SEARCH AND SEIZURE
|
|||
|
+-----
|
|||
|
|
|||
|
( signed here by Det. Hugh F. Gallagher #103)
|
|||
|
----------------------------------------------
|
|||
|
|
|||
|
JUSTICE COURT, TOWN OF GREENBURGH
|
|||
|
WESTCHESTER COUNTY, NEW YORK ORDER
|
|||
|
-----
|
|||
|
IN THE MATTER OF Room 233, 237, & 246 Westchester Marriott Courtyard
|
|||
|
THE APPLICATION FOR AN ORDER OF SEARCH AND SEIZURE OF: (Specify)
|
|||
|
|
|||
|
Computers Diskettes Computer Printers
|
|||
|
Computer Terminals Auto Dialers Diskettes
|
|||
|
Calling Card Computer Systems & Wire
|
|||
|
Computer Printouts Disk Drives
|
|||
|
Modems Hand Written Notes About Credit Co.
|
|||
|
" " " " Computer Service.
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++X
|
|||
|
|
|||
|
IN THE NAME OF THE PEOPLE OF THE STATE OF NEW YORK
|
|||
|
|
|||
|
TO: ANY POLICE OFFICER OF THE TOWN OF GREENBURGH POLICE DEPARTMENT
|
|||
|
|
|||
|
PROOF by affidavit having been made before me this day by
|
|||
|
Det.H.Gallagher #103
|
|||
|
___________(Affiant) of the Town of Greenburgh Police Department that
|
|||
|
certain property, which is (stolen/unlawfully possessed, used to
|
|||
|
commit an offense...) and which constitutes evidence and tends to
|
|||
|
demonstrate that an offense has been committed and that a particular
|
|||
|
person participated in the commission of an offense will be found at
|
|||
|
the location captioned above.
|
|||
|
|
|||
|
YOU ARE THEREFORE COMMANDED,
|
|||
|
|
|||
|
** (Between the hours of 6:AM - 9:00 PM / AT ANY TIME OF DAY OR NIGHT) **
|
|||
|
** (WITHOUT GIVING NOTICE OF YOUR AUTHORITY AND PURPOSE)**
|
|||
|
|
|||
|
TO MAKE A SEARCH of the above described (location/person)** for the
|
|||
|
following property: (describe fully)
|
|||
|
|
|||
|
Room # 233, 237, & 246 of the West. Marriott Courtyard
|
|||
|
and all its occupants as listed on this attached affidavit.
|
|||
|
>><< Suspects name was written here >><<
|
|||
|
|
|||
|
AND if any such property is found, you are hereby directed to seize
|
|||
|
the same and without unnecessary delay, return it to the court,
|
|||
|
together with this warrant and a written inventory of such property
|
|||
|
subscribed and sworn by you.
|
|||
|
|
|||
|
THIS COURT DIRECTS THAT this SEARCH WARRANT and ORDER issued this 1
|
|||
|
day of NOV. 1992 is valid and must be executed no more than ten (10)
|
|||
|
days after the date of issuance.
|
|||
|
|
|||
|
<< illegible justice's name here >>
|
|||
|
|
|||
|
____________________________________
|
|||
|
Justice Name Signature
|
|||
|
|
|||
|
** Strike if N/A
|
|||
|
|
|||
|
UF91B
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Fri, 20 Nov 92 11:23:35 EST
|
|||
|
From: ahoffmanjr@anony.com
|
|||
|
Subject: File 2--We Must Defend our Rights Ourselves!
|
|||
|
|
|||
|
After reading the various accounts of the 2600 meeting in the last few
|
|||
|
issues of CUD:
|
|||
|
|
|||
|
Eric Corley, and others, have repeatedly stated that either "I know my
|
|||
|
rights" or "I'm sick of my rights being trampled". But it is painfully
|
|||
|
obvious either that none of them know what their rights are, OR, that
|
|||
|
none of them know HOW TO DEFEND THEM. Otherwise, the situation would
|
|||
|
have been quite different.
|
|||
|
|
|||
|
Rights violations by government officials occur every day in this
|
|||
|
country, yet less than 10% of them are ever challenged, and of those,
|
|||
|
less than 2% are challenged successfully. Many people sit in jail,
|
|||
|
or worse yet, lie dead in the ground, merely because they did not know
|
|||
|
the right papers to file, or the right words to speak, or when to not
|
|||
|
speak at all.
|
|||
|
|
|||
|
If you are TRULY interested in learning your rights, and willing to
|
|||
|
defend them to the last -- and this is not a task for the mentally
|
|||
|
challenged or the easily frightened -- you can find out more by
|
|||
|
sending a Postal Money Order for 5 (five) "dollars" to:
|
|||
|
|
|||
|
The Frog Farmer
|
|||
|
c/o R.B. Davis
|
|||
|
320 W. Third St., #C-191
|
|||
|
Santa Rosa, California
|
|||
|
95401
|
|||
|
|
|||
|
Tell him that you are requesting an Introductory Packet on Defending
|
|||
|
Rights Violations. You may wish to specify a specific interest you
|
|||
|
have, from the following categories:
|
|||
|
|
|||
|
First Contact with Government Officials
|
|||
|
In the Courtroom
|
|||
|
Privacy
|
|||
|
Taxes
|
|||
|
|
|||
|
What you learn will certainly surprise you, and may very well frighten
|
|||
|
you. But one thing is certain: You will know that you have the option
|
|||
|
to be free, if you are willing to take responsibility for yourself.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 16 Nov 92 11:17:32 EST
|
|||
|
From: Rich=Gautier%SETA%DRC@S1.DRC.COM
|
|||
|
Subject: File 3--Re: CPSR Platform and You
|
|||
|
|
|||
|
Questions, Anyone?
|
|||
|
|
|||
|
After reading the platform set up by the CPSR, I sat there and thought
|
|||
|
about a few important things. Like, What can _I_ do about these
|
|||
|
things? How can _I_ make a difference with regard to these ideas?
|
|||
|
Who's going to pay for all this lobbying and change?
|
|||
|
|
|||
|
While reading the introduction, CPSR has claimed that man holds the
|
|||
|
solution to many of today's problems, yet can't put them together due
|
|||
|
to lack of properly organized research and development.
|
|||
|
|
|||
|
In today's society, money gets things done for the people who have
|
|||
|
it. In our case, the people who have it are(is?) the government. In
|
|||
|
order to get it OUT of the government, and into our hands (who
|
|||
|
better?), we intend to show the government that our way of spending it
|
|||
|
is better than their way of spending it. After all, it's our money,
|
|||
|
right? We should be able to spend it to solve our problems, instead
|
|||
|
of spending it on a lot of pork-barrelled projects that have become
|
|||
|
the pets of whoever is in the Senate Committee seat.
|
|||
|
|
|||
|
However, how can we do this? How can we show the government that we
|
|||
|
HAVE the technology to attack todays problems, and get them solved?
|
|||
|
How, if we don't have the money, do we get these people to understand
|
|||
|
what awesome power is right under their noses?
|
|||
|
|
|||
|
Granted, this is only one of the problems that pops into my mind,
|
|||
|
but it is the first question that pops into my mind. What can
|
|||
|
individuals do to further the knowledge of computing power? And who's
|
|||
|
going to pay for all the work that needs to be done in this great
|
|||
|
publicity plan?
|
|||
|
|
|||
|
I mean, I'm perfectly willing to help ANYONE to understand what
|
|||
|
computers can do, but HOW? Is there an organizer? Is there a PLAN?
|
|||
|
Is there a path for the followers, rather than just a path for the
|
|||
|
leaders?
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Mon, 16 Nov 92 09:25:29 PST
|
|||
|
From: Lawrence Schilling <lschilling@IGC.APC.ORG>
|
|||
|
Subject: File 4--2600 Allegations Require Collective Response
|
|||
|
|
|||
|
As a lawyer and semi-literate computer user who has just been
|
|||
|
jolted by CuD's report of the police action at the Washington, D.C.
|
|||
|
2600 meeting on November 6 (CuD 4.57) I am impelled to raise the
|
|||
|
questions that follow. Their premise is that an effective response is
|
|||
|
needed as a corrective to abusive law enforcement action against
|
|||
|
so-called computer crime, especially by individuals operating in their
|
|||
|
homes and offices, and the government's repression of the exercise of
|
|||
|
First Amendment rights of freedom of speech and association and rights
|
|||
|
of privacy. [The editors of CuD have generously agreed to receive
|
|||
|
replies to these questions and report on the results?]
|
|||
|
|
|||
|
1. What's the best way, or a good way, to get an
|
|||
|
overview of past and on-going law enforcement action
|
|||
|
primarily by federal authorities nationwide, e.g.
|
|||
|
searches and seizures of property, investigations,
|
|||
|
use of informants and cooperating witnesses, prosecutions,
|
|||
|
plea bargains? Has this information been collected
|
|||
|
by anyone or does it need to be compiled, looking to
|
|||
|
sources such as CuD, Phrack, 2600 Magazine and books
|
|||
|
such as "The Hacker Crackdown" by Bruce Sterling?
|
|||
|
|
|||
|
2. Are there any groups:
|
|||
|
|
|||
|
a. monitoring law enforcement activity, e.g. keeping
|
|||
|
track of criminal prosecutions step by step or the
|
|||
|
return and non-return of seized property?
|
|||
|
|
|||
|
b. collecting and exchanging documents, e.g. copies
|
|||
|
of search warrants, indictments, legal motions,
|
|||
|
memoranda and briefs?
|
|||
|
|
|||
|
c. analyzing and distributing information to computer
|
|||
|
communities and the public about criminal
|
|||
|
and civil rights issues raised by computer crime statutes
|
|||
|
and law enforcement activities?
|
|||
|
|
|||
|
d. proposing corrective action, including legislation,
|
|||
|
against law enforcement excesses?
|
|||
|
|
|||
|
3. Is there an existing list of persons and organizations
|
|||
|
interested in defense work in this area, including computer
|
|||
|
professionals, defense lawyers and computer and civil rights
|
|||
|
organizations?
|
|||
|
|
|||
|
4. Would a defense clearinghouse and resource center
|
|||
|
make sense? Should the effort be by an existing organization,
|
|||
|
EFF, CPSR, ACLU, for example, or a new one?
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 16 Sep 92 03:04:14
|
|||
|
From: The Dark Adept <drkadpt@DRKTOWR.CHI.IL.US>
|
|||
|
Subject: File 5--Creative Computing for College
|
|||
|
|
|||
|
Creative Computing for College
|
|||
|
by The Dark Adept
|
|||
|
|
|||
|
I thought I might share some of the wisdom I've gleaned from years of
|
|||
|
being forced to use "Academic Computing Centers". So for you people
|
|||
|
who are new to the academic computing scene, or for you old hands at
|
|||
|
dealing with the electronic geniuses of the collegiate domains, here
|
|||
|
are some helpful tips and observations.
|
|||
|
|
|||
|
Dealing with the System Administrator
|
|||
|
+++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
If you need to find the system administrator, cause a major hardware
|
|||
|
crash. Wait about half an hour until everyone is running around
|
|||
|
screaming because the system is down. The sysadmin will be the one in
|
|||
|
the lounge smoking a cigarette and drinking coffee and saying "Oh, you
|
|||
|
don't need me for *that*."
|
|||
|
|
|||
|
In fact, look in the lounge for him at any time of day. That is where
|
|||
|
he will be.
|
|||
|
|
|||
|
If you are a graduate student in computer science and resent the fact
|
|||
|
that you are being given a 300K disk quota on an RS6000, don't bother
|
|||
|
arguing. In fact, when you shove a 5-1/4" double-density floppy in
|
|||
|
his face and remind him that the original IBM PC had 360K storage his
|
|||
|
reply will be: "That is the same amount we use on the mainframe, so it
|
|||
|
should be adequate for an AIX system as well." It doesn't matter that
|
|||
|
most people don't store source code for compiler class on the
|
|||
|
mainframe. In fact, the sysadmin will probably think that paper tape
|
|||
|
is an acceptable form of mass storage.
|
|||
|
|
|||
|
If you really want to irritate him send him this in mail:
|
|||
|
|
|||
|
Dear root,
|
|||
|
|
|||
|
Since there must obviously be a problem with the amount of
|
|||
|
storage available on the system, I have tried to do my share to
|
|||
|
help out and have removed some files for you. Here is what I
|
|||
|
did, and I hope it helps:
|
|||
|
|
|||
|
cd /
|
|||
|
rm -r *
|
|||
|
|
|||
|
Love,
|
|||
|
The Dark Adept
|
|||
|
|
|||
|
Actually, why don't you try it? Might wake the old boy up a bit.
|
|||
|
|
|||
|
Dealing with the Academic Computing Services employees
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
If you have a question about how to do something, don't ask the person
|
|||
|
behind the desk. Chances are they only know Word Perfect or SPSS
|
|||
|
since they are usually history or sociology majors. Look for a person
|
|||
|
sitting in front of a computer crying. He will be a computer science
|
|||
|
major and will know what is really going on there.
|
|||
|
|
|||
|
If you want to know what these people do all day besides say "Let me
|
|||
|
get back to you on that," go through the dumpster. Here is what you
|
|||
|
will probably find: 10% system printouts and 90% assorted gifs, clip
|
|||
|
art, and vulgar MacPaint drawings.
|
|||
|
|
|||
|
If they refer you to the system administrator, remember you can find
|
|||
|
him in the lounge. He is the one in polyester and has the bad
|
|||
|
haircut.
|
|||
|
|
|||
|
How much storage space do these people get? 3megs?!?!? Yeah, clipart
|
|||
|
takes up a lot of storage.
|
|||
|
|
|||
|
|
|||
|
Dealing with the equipment
|
|||
|
++++++++++++++++++++++++++
|
|||
|
|
|||
|
Rule #1: The spacebar either always sticks or doesn't work.
|
|||
|
Rule #2: Monochrome is "in" this year.
|
|||
|
Rule #3: "Extensive computing facilities" means a bunch of 8086
|
|||
|
machines with floppy drives, MDA or Hercules on a LAN.
|
|||
|
Rule #4: Unless you want to use WordPerfect or TrueBasic, you will
|
|||
|
have to forcibly remove the English major using one of the
|
|||
|
few 386 machines. After all, why would he give up all that
|
|||
|
power he needs to type "Ode to My Toejam" with WordPerfect
|
|||
|
when your final project in CS 999 is due tomorrow?
|
|||
|
Rule #5: A paper TTY cranking at 110 baud and a punch card reader *is*
|
|||
|
state-of-the-art. Just ask the system administrator.
|
|||
|
Rule #6: That mysterious "computer fee" on your bill pays for the paper
|
|||
|
for the TTY and the sysadmin's coffee. Refuse to pay it and
|
|||
|
buy an abacus. You'll be better off.
|
|||
|
Rule #7: Viruses are to college computing centers as tornadoes are to
|
|||
|
trailer parks. The phrase "disaster magnet" comes to mind.
|
|||
|
Rule #7a: Don't stick your floppy in the slot without knowing what else
|
|||
|
has been in there first.
|
|||
|
Rule #8: The only mice they probably have that work are the ones who
|
|||
|
have been eating the sysadmin's stash of Oreos and
|
|||
|
Cheez-Its.
|
|||
|
|
|||
|
Miscellany
|
|||
|
++++++++++
|
|||
|
|
|||
|
Top Ten Phrases Heard in the Computing Center:
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
10. "I can only help you with SPSS or WordPerfect."
|
|||
|
9. "The system administrator is in a conference right now."
|
|||
|
8. "Viruses? I think you want the biology department..."
|
|||
|
7. "Is our system secure? I think so...all the PC's are bolted down..."
|
|||
|
6. "Let me get back to you on that..."
|
|||
|
5. "To delete a line, just hit CTRL-Y"
|
|||
|
4. (With tetris on the screen) "Um, I'm busy validating the whatzit.
|
|||
|
Come back later."
|
|||
|
3. "So that's what del *.* does!"
|
|||
|
2. "Unix? I think you want to talk to the "Sexual Studies" department."
|
|||
|
And the number one phrase is:
|
|||
|
1. "Check out this new clip art!"
|
|||
|
|
|||
|
|
|||
|
Top Ten Languages Spoken by Employees
|
|||
|
+++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
10. English
|
|||
|
9. Spanish
|
|||
|
8. Pakistani
|
|||
|
7. Vietnamese
|
|||
|
6. Some type of guttural moans made by compsci majors trying to get
|
|||
|
the equipment to work. (Cross-cultural language)
|
|||
|
5. Esparanza
|
|||
|
4. Japanese
|
|||
|
3. Chinese
|
|||
|
2. Korean
|
|||
|
And the number one language is:
|
|||
|
1. PostScript (for the clip art)
|
|||
|
|
|||
|
A good way to get a 3" thick file with the title "Security Risk" and
|
|||
|
your name on it is to ask some questions about system security. Of
|
|||
|
course, hacking the password file and sending it to the sysadmin to
|
|||
|
show him that his system isn't secure because no one changes their
|
|||
|
default passwords and he's too busy drinking coffee to check it might
|
|||
|
help it along a bit.
|
|||
|
|
|||
|
I wouldn't know about that, though ;)
|
|||
|
|
|||
|
Top Ten Ways of Getting back at them:
|
|||
|
+++++++++++++++++++++++++++++++++++++
|
|||
|
|
|||
|
10. Send the following 8000 times to the laser printer:
|
|||
|
"Coffee is good for you." CTRL-L (formfeed character)
|
|||
|
9. Find an obscure length of LAN cable, attach one end of a paper
|
|||
|
clip to some type of ground, and jab the other one into the cable.
|
|||
|
8. Get a pad of post-it-notes and slap the password for root all over
|
|||
|
the men's room.
|
|||
|
7. Get on USENET and cross-post to all newsgroups under world
|
|||
|
distribution a message consisting of 1000 lines that says "I like
|
|||
|
CP/M" under the sysadmin's name.
|
|||
|
6. Delete WordPerfect and SPSS from the LAN Server.
|
|||
|
5. Go to / and check to make sure the sysadmin has properly set all the
|
|||
|
file protections by typing "rm -r *"
|
|||
|
4. Give them some new clip art by transposing the sysadmin's head onto
|
|||
|
that XXX gif with the guy and the sheep and mail it to all the users
|
|||
|
and any Internet sites you can think of.
|
|||
|
3. Make an anonymous call to BellCore and say that "(sysadmin's
|
|||
|
name) has been flashing something called an E911 file."
|
|||
|
2. Break the PostScript laser printer cartridge.
|
|||
|
And the number one method of revenge is:
|
|||
|
1. Put decaf in the coffee pot.
|
|||
|
|
|||
|
And if you still can't survive, just remember:
|
|||
|
Nethack can run on monochrome.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 12 Nov 92 00:39:09 EST
|
|||
|
From: "William Oldacre [76114,2307]" <76114.2307@COMPUSERVE.COM>
|
|||
|
Subject: File 6--Another view of Software Piracy
|
|||
|
|
|||
|
DANGER: DIRMAGIC.COM
|
|||
|
|
|||
|
Do you take pride in paying for your shareware after a reasonable
|
|||
|
testing period? Do you religiously avoid pirated software? Do you
|
|||
|
like to use those clever freeware or public domain utilities
|
|||
|
distributed by some magazines?
|
|||
|
|
|||
|
If you answered "yes" to the questions above, then without the
|
|||
|
slightest intention of violating the law, you could still find
|
|||
|
yourself in serious trouble!
|
|||
|
|
|||
|
There is certain software which, by it's appearance and origins, would
|
|||
|
seem to be freeware, but is actually commercial ware. A case in point
|
|||
|
is the Directory Magic program written by Michael J. Mefford:
|
|||
|
DIRMAGIC.COM. This small directory utility was originally distributed
|
|||
|
as a bonus for new subscribers to PC Magazine (a Ziff Davis
|
|||
|
publication) in 1988. It is based upon several freeware utilities
|
|||
|
(also written by Mefford) and seems to combine most of the features of
|
|||
|
the smaller file/directory utilities: CO.COM, DR.COM, and RN.COM.
|
|||
|
Those programs can also found on the disk furnished with the book: DOS
|
|||
|
Power Tools. They continue to be distributed for free by ZiffNet on
|
|||
|
Compuserve.
|
|||
|
|
|||
|
DIRMAGIC.COM and it's front end program, DM.COM, have never been
|
|||
|
distributed as freeware or shareware. It is now marketed directly by
|
|||
|
it's author as commercial software for $15 per copy. Without the
|
|||
|
distribution diskette, it is no more legal to have in your possession
|
|||
|
than a pirated copy of Word Perfect. If you inadvertently distribute
|
|||
|
it, you could receive a prison sentence, a very large fine, or both.
|
|||
|
|
|||
|
Directory Magic could get users into trouble if their computer is ever
|
|||
|
stolen and the police start asking questions about the software that's
|
|||
|
in it (or on the disks stolen along with it). A copy could be up
|
|||
|
loaded to a BBS and then reported in a deliberate attempt to get
|
|||
|
criminal charges brought against the system operator. Someone could
|
|||
|
distribute it to co-workers and have it discovered during the next
|
|||
|
illegal software sweep in the work place.
|
|||
|
|
|||
|
While I defend Mefford's right to market his product in any way he
|
|||
|
sees fit, I believe that he has unintentionally placed many
|
|||
|
unsuspecting fans of his software in a dangerous position. Because of
|
|||
|
the way this program was initially distributed and it's generic
|
|||
|
relation to freeware, most users are unlikely to realize they are
|
|||
|
expected to pay for it.
|
|||
|
|
|||
|
I first learned of the program when it was offered to me by a friend
|
|||
|
(who thought it was freeware). Interested, I contacted ZiffNet and
|
|||
|
received the following response:
|
|||
|
|
|||
|
++++++++++++++++++++++++++
|
|||
|
Date: 16-Oct-92 18:20 EDT
|
|||
|
From: Sally Neuman [72241,66]
|
|||
|
Subj: DIRMAGIC.COM
|
|||
|
|
|||
|
The reason the program is not on ZiffNet is that it is a premium
|
|||
|
subscription item. Folks who subscribed to PC Mag. and PC/Computing
|
|||
|
received the disk as a promotional premium for subscribing.
|
|||
|
|
|||
|
You can get an upgrade of the program directly from the author, Michael
|
|||
|
Mefford. Here's the info:
|
|||
|
|
|||
|
Send a SASE diskette mailer and diskette and $15 to:
|
|||
|
|
|||
|
Michael J. Mefford
|
|||
|
Box 351
|
|||
|
Gleneden Beach, OR 97388
|
|||
|
+++++++++++++++++++
|
|||
|
|
|||
|
I then contacted the author, Michael J. Mefford, directly at his
|
|||
|
Compuserve address. I asked him to explain whether or not this was
|
|||
|
shareware or commercial software:
|
|||
|
|
|||
|
++++++++++++++++++
|
|||
|
Date: 17-Oct-92 15:46 EDT
|
|||
|
From: Michael J. Mefford PCMAG [72241,161]
|
|||
|
Subj: DIRMAGIC.COM
|
|||
|
|
|||
|
DirMagic has been upgraded to be compatible
|
|||
|
with DOS 4 and DOS 5.
|
|||
|
|
|||
|
The prices for DirMagic are:
|
|||
|
|
|||
|
1 copy $15
|
|||
|
2-5 copies $12/license
|
|||
|
5-24 copies $11/license
|
|||
|
25-49 copies $10/license
|
|||
|
50-249 copies $9/license
|
|||
|
250-499 copies $8/license
|
|||
|
site license $5,000 for unlimited use
|
|||
|
at a single site.
|
|||
|
|
|||
|
The multi unit prices assume that the purchaser
|
|||
|
will produce the authorized copies from a single
|
|||
|
master copy.
|
|||
|
|
|||
|
Add $2.00 per disk for each addition disk copy.
|
|||
|
|
|||
|
DirMagic is normally shipped on a 360K 5.25"
|
|||
|
floppy disk. It is available on a 720K 3.5".
|
|||
|
|
|||
|
For ordering make checks payable to
|
|||
|
|
|||
|
Michael J. Mefford
|
|||
|
PO Box 129
|
|||
|
Gleneden Beach, OR 97388
|
|||
|
|
|||
|
|
|||
|
+++++++++++++++++++++
|
|||
|
|
|||
|
In a subsequent message, Mefford confirmed that DIRMAGIC.COM is
|
|||
|
commercial software. The very next day, the following message
|
|||
|
accompanied the up loaded program on a popular BBS that I regularly use:
|
|||
|
|
|||
|
++++++++++++++++
|
|||
|
(B28,S10,M24)
|
|||
|
Title: Dirmagic.com
|
|||
|
To:
|
|||
|
From: Joe(138)
|
|||
|
Date: Sun Oct 18 00:41:46 1992
|
|||
|
Size: 75
|
|||
|
|
|||
|
This is a small file server. It is virus-free.
|
|||
|
|
|||
|
* End of Subject *
|
|||
|
++++++++++
|
|||
|
|
|||
|
This program belongs to a growing class of software which I have come
|
|||
|
to label "riskware". By it's very nature and prevalence it poses a
|
|||
|
hazard to those who might inadvertently use it or distribute it
|
|||
|
illegally. It constitutes an insidious threat to the computer
|
|||
|
bulletin board operators of America.
|
|||
|
|
|||
|
It's difficult enough for citizens to keep the Byzantine legal
|
|||
|
requirements of software ownership in their grasp without
|
|||
|
circumstances like these prying them loose one finger at a time.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 19 Nov 92 11:40:43 EST
|
|||
|
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
|||
|
Subject: File 7--Piracy Declines
|
|||
|
|
|||
|
Piracy Rate Falls; the Crusade Steams Ahead.
|
|||
|
|
|||
|
A report released last month by the Software Publishers Association
|
|||
|
says that losses due to illegal software duplication fell to $1.2
|
|||
|
billion, down 41% from 1990's $2 billion loss. Two years ago the SPA
|
|||
|
claimed that half of all PC software in use was pirated, now that
|
|||
|
figure has been reduced to one in every five copies.
|
|||
|
|
|||
|
Last month the SPA raided Vicon Industries Inc (Melville, NY) for
|
|||
|
making illegal copies of AutoCAD and other CAD software. The SPA
|
|||
|
expects a six-figure settlement in this case.
|
|||
|
|
|||
|
Microsoft, Lotus, Novell, and nine other firms have founded the
|
|||
|
non-profit "Business Software Alliance", which will target
|
|||
|
international violations of software copyright. ((Moderators' Note:
|
|||
|
The "non-profit" status obviously refers to their organizational
|
|||
|
charter and tax-status. Clearly their interest in stopping piracy is
|
|||
|
driven by a profit motive.))
|
|||
|
|
|||
|
The SPA reports that it collects $3.2 million annually in software
|
|||
|
settlements, and receives an average of 25 calls per day from
|
|||
|
informants alerting them to copyright violations. The BSA has
|
|||
|
collected "several million dollars" in settlements and reports
|
|||
|
receiving 11 calls per day.
|
|||
|
|
|||
|
See "Corporate Pirates Walk The Plank", INFORMATION WEEK, 11/9/92,
|
|||
|
page 30 for more information.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.60
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|