610 lines
30 KiB
Plaintext
610 lines
30 KiB
Plaintext
![]() |
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
= =
|
||
|
- WELCOME TO THE FIFTH ISSUE OF -
|
||
|
= =
|
||
|
- -=>PHANTASY<=- -
|
||
|
= =
|
||
|
- A PUBLICATION AND NEWSLETTER OF -
|
||
|
= =
|
||
|
- THE -
|
||
|
= INTERNATIONAL =
|
||
|
- INFORMATION -
|
||
|
= RETREIVAL =
|
||
|
- GUILD -
|
||
|
= =
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
Volume Number Two,Issue Number Five Dated 12/9/91
|
||
|
|
||
|
Table of Discontents:
|
||
|
|
||
|
[1] OK, Where the Hell Have we Been ?
|
||
|
By Mercenary
|
||
|
|
||
|
[2] The BEIGE BOX Revisited !
|
||
|
By Mercenary
|
||
|
|
||
|
[3] Completely Useless Trivia Knowledge (PART 2)
|
||
|
Written By: Knight Hack
|
||
|
|
||
|
[4] Tip on Telephone Privacy I
|
||
|
Written By: TESLA
|
||
|
|
||
|
[5] Tip on Telephone Privacy II
|
||
|
Written By: TESLA
|
||
|
|
||
|
[6] Nicotine Sulfate
|
||
|
Written By: Saint Anarchy
|
||
|
|
||
|
[7] PHANTASY TIDBITS
|
||
|
|
||
|
[8] End of the Year Comments
|
||
|
Written by: Mercenary
|
||
|
|
||
|
[9] Listing of PHANTASY Distribution Sites
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
OFFICIAL DISLAIMER...
|
||
|
|
||
|
All information in PHANTASY is from USER contributed material
|
||
|
The Publishers and Editors of PHANTASY and THE IIRG disclaim
|
||
|
any liability from any damages of any type that the reader or
|
||
|
user of such information contained within this newsletter may encounter
|
||
|
from the use of said information. All files are brought to you for
|
||
|
entertainment purposes only! We also assume all information infringes
|
||
|
no copyrights and hereby disclaim any liability.
|
||
|
|
||
|
PHANTASY is (C) 1990 by The IIRG
|
||
|
IIRG and INTERNATIONAL INFORMATION RETREIVAL GUILD is (C) 1982
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
|
||
|
Section [1]: OK, Where the Hell Have We Been ?
|
||
|
|
||
|
Here's a Quick overview of what happened to the I.I.R.G. over the last
|
||
|
eleven months since our last issue.
|
||
|
Well for starters, Lets disclaim a few rumors I've heard over the lines,
|
||
|
|
||
|
1. NO, we didn't get busted for any reason and I can't think of any
|
||
|
reason why we should have.
|
||
|
2. NO, I didn't blow myself up trying one of the Saints recipes, That
|
||
|
rumor was started by Knight Hack as an excuse for his own inactivity.
|
||
|
3. YES, I was tired and needed a rest - I just took too long of one.
|
||
|
|
||
|
Well now that the rumor mongering is done lets discuss what really
|
||
|
happened, As many of you already know - The Rune Stone BBS is gone,
|
||
|
I just got tired of running it for the group.
|
||
|
The quality of Hackers has greatly diminished in the last year. To Tell
|
||
|
the truth many of our peers have sold out for money. The new attitude
|
||
|
seems to be "CONSULTING", oh God How I have come to hate that word.
|
||
|
Hell, I like money just as much as the next person, but some of you
|
||
|
out there have forgotten where you came from!
|
||
|
Mostly what we were getting on the board was your standard collection
|
||
|
of codez kidz, and warez leeches. I really didn't mind this but it gets
|
||
|
tiring after a while. I would like to Thank You folks from Mass,NY,and
|
||
|
the 414 Area. They were the real contributors and benefactors and I
|
||
|
won't mention names but you know who you are.
|
||
|
As for the rest of the year, I spent it goofing off in general.
|
||
|
April was Fishing,June was Drinking,Sept to Nov was Hunting.
|
||
|
There really isn't too much to tell, I guess I was Just a lazy bastard.
|
||
|
But know Im back, and the groups waking up for the winter and as you may
|
||
|
have noticed, I did take Monthly out of the Header but may replace it if
|
||
|
we can hit issue 12 without skipping a month.
|
||
|
So grab a can of Jolt, an order of General Tso's Chicken, and a
|
||
|
2 liter Dessert of Mountain Dew and join us for the ride.
|
||
|
|
||
|
Mercenary...
|
||
|
I.I.R.G.
|
||
|
PHANTASY EDITOR
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
|
||
|
Section [2]: The BEIGE BOX Revisited
|
||
|
Article Written By: Mercenary
|
||
|
|
||
|
For years now, the only Instruction file I've seen for making your
|
||
|
own linemans handset is the File by The Exterminator and Terminal MAn.
|
||
|
There File is good, but if you follow there directions completely,
|
||
|
you trash a perfectly good phone.
|
||
|
The plans for the I.I.R.G.'s Beige Box are extremely simple and all
|
||
|
parts are available at your local Radio Shack. The cost of our phone
|
||
|
is extremely LOW as compared to actually purchasing a linemans handset
|
||
|
for the unheard of prices manufacturers ask, usually $65.00 to $300.00
|
||
|
in most catalogs I've seen.
|
||
|
Now, Heres your Parts list as Taken out of the 1992 Radio Shack
|
||
|
Catalog,Number 472.
|
||
|
|
||
|
Parts List For I.I.R.G. BEIGE BOX CONSTRUCTION
|
||
|
|
||
|
Quantity Catalog Number Description Price
|
||
|
1 43-500 ET-126 Mini*Fone Telephone $19.95
|
||
|
1 279-390 5 1/4" Mod to Mod $ .99
|
||
|
1 279-358 4-Cond Inline Coupler $ 2.49
|
||
|
1 270-378 1 1/4" Mini Aligators $ 1.69
|
||
|
1 278-1627 Heat Shrink Tubing $ 1.79
|
||
|
-------------------
|
||
|
TOTAL COST =$27.02
|
||
|
|
||
|
Now I'm not saying you have to buy the Radio Shack phone, it just has
|
||
|
the features you will want, We grab ours at computer shows for $5.00
|
||
|
you may have a phone or can get it cheaper, Just get one with Re-dial,
|
||
|
Ringer on/off,switchable tone/pulse--You'll be glad you did in the long
|
||
|
run.
|
||
|
|
||
|
CONSTRUCTION:
|
||
|
|
||
|
1. Take the Mod To Mod, Pick a desired length from one end,
|
||
|
(We use 1 foot 2 inches) and cut the wire.
|
||
|
2. Now Carefully take a razor blade or knife and strip back two
|
||
|
inches of the gray wire covering, MAKING SURE NOT TO CUT
|
||
|
OR DAMAGE THE 4 WIRES INSIDE!!
|
||
|
3. Strip 1/4 inch covering off the GREEN and RED WIRE
|
||
|
4. You can either cut off the yellow and black or bend them back
|
||
|
for future use (We cut ours since you'll have enough left
|
||
|
over to make more)
|
||
|
5. Put Proper Size shrink tubing over wire down on to gray covering
|
||
|
6. Take the Green Alligator Clip, Solder the Green wire to the Green Clip
|
||
|
7. Take The Red Clip, Solder the Red wire to the Red Clip
|
||
|
8. Bring shrink tubing back up to cut end, place just over gray material
|
||
|
(1/4 Inch) and shrink with heat gun or hair dryer
|
||
|
9. Place Inline coupler on mod end of Gray cord, attach other end of
|
||
|
coupler to white wire mod end of phone.
|
||
|
10. Pat yourself on Back, you're done.
|
||
|
|
||
|
Now with our Beige Box, to use the Phone like normal just take off
|
||
|
inline coupler and plug phone in jack like normal.
|
||
|
To use it as a Beige Box, you just hook up coupler to phone and take
|
||
|
your trusty 7/16 Inch Hex driver (Available at Hardware Store,Sears,Caldors,
|
||
|
K-Mart,Got the Idea Yet?) And open up your local Green Tower or switcher
|
||
|
Hook Red Clip to "R" Ring terminal and Green Clip to "T" Tip terminal
|
||
|
and listen for Dial tone.
|
||
|
This is great for apartment buildings,condos,and hotels where
|
||
|
junction boxes are easily available on side of building or basements.
|
||
|
For more Hints on Uses, Read Exterminators and Terminal Mans File.
|
||
|
Note: Some junction boxes will be locked and cannot be opened with
|
||
|
7/16 Hex Driver, Don't forget your lockpicks.
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
Section [3]: Completely Useless Trivia Knowledge (Part 2)
|
||
|
Written by: Knight Hack
|
||
|
|
||
|
In an effort to alleviate the everyday strain of life and mostly
|
||
|
because at some point and time, someones going to force you into a game
|
||
|
of Trivial Pursuit or some similar game of stupidity, we offer these facts
|
||
|
to you so you don't look like an idiot in front of the wife or girlfriend.
|
||
|
|
||
|
1. The worlds widest road,the monumenatal Axis in Brazil, is wide enough
|
||
|
for 160 cars to drive side by side.
|
||
|
2. In Siberia, Milk is often sold frozen on a stick like an ice-lolly.
|
||
|
3. The skeletons of most birds weigh less than their feathers.
|
||
|
4. Instant coffee has been in existence since the middle of the
|
||
|
eighteenth century.
|
||
|
5. Male monkeys sometimes go bald, just like men do.
|
||
|
6. The Yo-Yo was originally a weapon of war in the Philippines
|
||
|
7. The male sea horse is the only male that gives birth.
|
||
|
8. Snails can sleep for three years without waking up
|
||
|
9. J.S. Bach once wrote a cantana about coffee.
|
||
|
10. Two Million Hydrogen Atoms could sit on a pin head.
|
||
|
|
||
|
I hope to make this a running article with 10 new facts in every issue
|
||
|
E-mail your Facts for this article to Mercenary at: Lightning Systems
|
||
|
414-363-4282.
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
Section [4]: Tip on Telephone Privacy I
|
||
|
Written By: TESLA
|
||
|
|
||
|
Your home style single line telephone can easily become a "Hot Mike"
|
||
|
in the hands of a skilled technician. Hot Mikes are capable of picking up
|
||
|
conversations in the area while the handset is still in the cradle,
|
||
|
(Still on the hook) without affecting normal operation of the phone.
|
||
|
Unless you (or a friend) is a trained electronics or telephone
|
||
|
technician, it is doubtful that you will notice any modifications made
|
||
|
to your phone even if it has been turned into a Hot Mike Set, because
|
||
|
nothing is added to the phone,and nothing is removed.
|
||
|
The modification simply requires the technician to change the position
|
||
|
of two wires inside the phone,taking only seconds from start to finish.
|
||
|
Some phones come with this modification already made, allowing phones to
|
||
|
be monitored at the nearest punch-down junction (phone box) without the
|
||
|
worry of having to enter the home.
|
||
|
The simplest way to defeat an attempt to Hot Mike your home or office
|
||
|
is to dissconnect the Black and Yellow Wires where your phone plugs
|
||
|
into the wall.
|
||
|
Some of the newly installed phone lines use white wires with blue
|
||
|
tracers and white wires with orange tracers. In these cases, remove
|
||
|
both orange-white wires from the mounting block.
|
||
|
Whether you have a modular (Plug in) or hard wired telephone,touch
|
||
|
tone or rotary, the process is the same.
|
||
|
NOTE: Disconnecting these wires on a multi-line phone may disconnect
|
||
|
one of your numbers, so use this method only with single line sets.
|
||
|
CAUTION: Remove the handset from the cradle (Take phone off hook)
|
||
|
before touching any wires. Ring voltages on the ring and tip
|
||
|
(red/green or blue/white) wires can be excessive if someone tries
|
||
|
to call while your working.
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
Section [5]: Tip on Telephone Privacy II
|
||
|
Written By: TESLA
|
||
|
|
||
|
Many people are aware of government telephone taps and other methods
|
||
|
of listening in on private telephone conversations, though few are aware
|
||
|
that private citizens, with the minimum of equipment and skill can do
|
||
|
exactly the same thing, and it is legal.
|
||
|
Those who own home satellite dishes can easily receive signals from
|
||
|
satellites which contain the microwaved conversations of thousands of
|
||
|
long distance callers. The satellite dish owner simply has to scan the
|
||
|
various satellites and transponders until he comes across a channel with
|
||
|
"dead-air", or a blank soundless screen. This is an indication that the
|
||
|
transponder channel may be used for carrying data or telephone
|
||
|
conversations.
|
||
|
Once the proper satellite and transponder are located, the eavesdropper
|
||
|
runs an antenna line (Shielded, of course) from the video output of the
|
||
|
downconverter (necessary for all home satellite reception) to the antenna
|
||
|
input of a standard highband scanner. Once the scanner is placed into the
|
||
|
"scan" mode, the scanner will stop scanning every time it detects a signal
|
||
|
(telephone conversation). The listener simply has to scan the entire range
|
||
|
of the band, and stop on any conversation that he feels like listening to.
|
||
|
In addition to scanners (which can be purchased anywhere from a hundred,
|
||
|
to thousands of dollars),one may also use a shortwave radio for the same
|
||
|
purpose. The connections are all the same.
|
||
|
While the average eavesdropper may not be able to locate a specific
|
||
|
conversation (intentionally),experienced persons may be able to pinpoint
|
||
|
a specific conversation by knowing where the call is being placed from,
|
||
|
and to, in advance. This allows the listener to determine the exact
|
||
|
routing that the call will take (Which satellite,which transponder).
|
||
|
Because of recent court rulings which declare that the airwaves are
|
||
|
public domain, and that the monitoring of frequencies used by mobile and
|
||
|
other type of cellular telephones does not constitute an invasion of
|
||
|
privacy, satellite monitoring is not considered illegal. In fact,
|
||
|
it is suspected that several law enforcement agencies (with the assistance
|
||
|
of telephone companies) are using these tactics to gather evidence rather
|
||
|
than obtaining a court order for a traditional wiretap.
|
||
|
With all the privacy invasion tactics that can be used by the government,
|
||
|
as well as private citizens, one should be very conservative as to what
|
||
|
forms of communications are used, and where.
|
||
|
Never say anything on a telephone that you wouldn't yell out in a
|
||
|
shopping mall.
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
Section [6]: Nicotine Sulfate
|
||
|
Written By: Saint Anarchy
|
||
|
|
||
|
This is one of the most lethal poisons available to the anarchist at
|
||
|
large. It is an insect poison found under several names.
|
||
|
The most common is "Black Leaf 40" and can be purchased or stolen from
|
||
|
any well stocked garden or discount store.
|
||
|
This stuff is 40% Nicotine Sulfate, just a few drops in any drink is
|
||
|
undetectable and will kill very quickly,usually within a few minutes.
|
||
|
The best way we've found to obtain the Nicotine Sulfate is by evaporation.
|
||
|
This should be done until the mixture is like a thin syrup and forms into
|
||
|
drops when put in a medicine dropper.
|
||
|
One of the glories of Nicotine Sulfate is that it is absorbed by the
|
||
|
skin and is fatal within minutes. Death by Nicotine sulfate can only be
|
||
|
detected by someone taking a blood test. This is seldomn given unless the
|
||
|
autopsy has been ordered when foul play is suspected.
|
||
|
A fine way to use Nicotine Sulfate is to carry it in a soft drink cup
|
||
|
and act like you accidently spilled it on your intended victim.
|
||
|
If he or she doesn't wash it off within a matter of seconds, the person
|
||
|
will be dead in a matter of minutes. There is very little chance of
|
||
|
the victim being able to wash it off if he or she doesn't realize what
|
||
|
it is. If they try to rub it off, it will be absorbed into the skin
|
||
|
all that much sooner.
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
Section [7]: Phantasy Tidbits
|
||
|
Written By: Mercenary
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Dateline: Dec 91 CYBER-SHARE HACKERS SHAREWARE CATALOG RELEASED
|
||
|
|
||
|
Missing an Issue of Phrack,ATI,NIA,CDC,TOXIC SHOCK,CUD.....
|
||
|
Missing a Hacker in Your collection?
|
||
|
|
||
|
Then Have they got a catalog for you,
|
||
|
|
||
|
CYBER-SHARE's Hackers catalog - Just in time to spend that Christmas
|
||
|
gift money! One of the best Catalogs we've seen of Hacking Material
|
||
|
available. Text Files,Hackers,Books... Too many to mention...
|
||
|
|
||
|
Send $2.00 Check or Money Order to:
|
||
|
|
||
|
CYBER-SHARE
|
||
|
P.O. BOX 161
|
||
|
HARWINTON,CT 06791
|
||
|
|
||
|
|
||
|
Mention Code: PHANTIIRG and get a free gift with your Catalog !
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Dateline: 11-20 DIGITAL ENHANCES BUSINESS PROTECTION SERVICES
|
||
|
Provided By: The Digital Online System
|
||
|
|
||
|
MAYNARD, Mass. -- November 20, 1991 -- Digital Equipment Corporation
|
||
|
has combined a portfolio of products and services into a new group
|
||
|
designed to help customers plan for and recover from natural or
|
||
|
man-made disasters, such as earthquakes, floods, hurricanes, fires,
|
||
|
power failure or vandalism. This new group -- Business Protection
|
||
|
Services -- assists customers in identifying overall business
|
||
|
vulnerabilities and in developing strategies to protect their
|
||
|
businesses and computing investments in the event of a disaster or
|
||
|
other extended power outage.
|
||
|
|
||
|
Business Protection Services -- pooling resources from Recovery
|
||
|
Services, Environmental Products and other areas of expertise --
|
||
|
provides a single-source solution to help customers with
|
||
|
mission-critical environments where downtime is unacceptable.
|
||
|
|
||
|
The Business Protection Services portfolio now includes:
|
||
|
|
||
|
o Contingency Planning Assistance, providing consulting and
|
||
|
training support to help customers plan and implement
|
||
|
effective contingency strategies
|
||
|
|
||
|
o Total Recovery Planning System (TRPS), a PC-based software
|
||
|
package that helps customers develop and maintain disaster
|
||
|
recovery plans
|
||
|
|
||
|
o RESTART Services, offering customers quick access to two
|
||
|
fully equipped Hot Sites to resume critical business
|
||
|
processing within hours of disaster notification
|
||
|
|
||
|
o 11 Business Recovery Centers (BRCs) across the United States
|
||
|
offering customers round-the-clock access to back-up office
|
||
|
space and network access to Digital's Hot Sites during
|
||
|
emergencies
|
||
|
|
||
|
o Recover-all Services, providing priority repair or
|
||
|
replacement of multivendor equipment damaged during
|
||
|
disasters
|
||
|
|
||
|
o DECmove Services, specializing in equipment relocation
|
||
|
|
||
|
o DECsite Services, offering computer room planning, design
|
||
|
and construction
|
||
|
|
||
|
o Environmental Power Protection Products, protecting
|
||
|
computer equipment from the desktop to the datacenter
|
||
|
|
||
|
o Environmental Monitoring Systems, offering hardware
|
||
|
and software that provide automatic warnings of abnormal
|
||
|
environmental conditions
|
||
|
|
||
|
"No one expects a catastrophic event, but accidents and natural
|
||
|
disasters do happen," says John Fischer, U.S. Vice President
|
||
|
Systems Integration Services. "When a disaster strikes a customer's
|
||
|
computing environment, one of the most serious casualties is often
|
||
|
the effect on business investments. By combining Disaster Recovery,
|
||
|
Environmental Products and DECsite businesses into one portfolio,
|
||
|
we're able to provide a single-source solution to our customers'
|
||
|
business protection needs. This enhanced portfolio of products and
|
||
|
services reflects Digital's commitment to protect our customers'
|
||
|
open business environments with a broad range of planning,
|
||
|
preventive and recovery offerings."
|
||
|
|
||
|
Digital's portfolio of Business Protection Services is
|
||
|
available worldwide.
|
||
|
|
||
|
Recover-all, RESTART, DECsite and DECmove are
|
||
|
trademarks of Digital Equipment Corporation.
|
||
|
|
||
|
TRPS is a registered trademark of CHI/COR
|
||
|
Information Management, Inc.
|
||
|
------------------------------------------------------------------------------
|
||
|
Dateline Nov 91: SUCCESS AT MIT INSPIRES REPETITION
|
||
|
Provided By: The Digital Online System
|
||
|
|
||
|
Many software modules develped for the MIT Athena Project have been accepted by
|
||
|
the Open Software Foundation (OSF), so the products based on them carry the
|
||
|
insurance of open-systems industry standards.
|
||
|
|
||
|
The success of MIT with Project Athena has been noted, and the distributed
|
||
|
network emulated at other universities, among them Iowa State University, the
|
||
|
University of North Carolina, Sweden's Royal Institute of Technology, and
|
||
|
Australia's Bond University.
|
||
|
|
||
|
Several of Digital's commercial customers also saw the potential for managing
|
||
|
their own distributed workstations, and purchased Digital's implementation of
|
||
|
the new technology.
|
||
|
|
||
|
Two such companies are SmithKline Beecham Pharmaceuticals, a division of a
|
||
|
transnational healthcare organization headquartered in Great Britain, and
|
||
|
Eastman Kodak Company, the photographic goods manufacturer based in Rochester,
|
||
|
New York.
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Dateline: 12-5 DIGITAL WINS AWARD FROM LOCKHEED
|
||
|
Provided By: The Digital Online System
|
||
|
|
||
|
MAYNARD, Mass. -- December 5, 1991 -- Digital Equipment Corporation
|
||
|
announced today the winning of a multimillion dollar award from
|
||
|
Lockheed Aeronautical Systems Company to deliver a comprehensive
|
||
|
software engineering solution for the development of systems
|
||
|
software for the F-22 Advanced Tactical Fighter project. The F-22
|
||
|
will be the newest entry into the U.S. Air Forces's stable of
|
||
|
fighter aircraft. The initial award, totaling $8.5 million in
|
||
|
hardware, software, and services, represents the first in an
|
||
|
anticipated series involving the Lockheed F-22 team.
|
||
|
|
||
|
Lockheed ASC, teamed with General Dynamics Fort Worth Division
|
||
|
and Boeing Defense and Space Group's Military Airplanes Company, was
|
||
|
selected by the U.S. Air Force to develop the F-22 Advanced Tactical
|
||
|
Fighter to replace the aging F-15 Eagle as the superiority fighter
|
||
|
of the future. As the future vanguard weapon in America's air
|
||
|
defense arsenal, the F-22's design goal for all areas calls for a
|
||
|
100 percent improvement over the F-15.
|
||
|
|
||
|
Digital's recently announced COHESION ASD/SEE (Aerospace-
|
||
|
Defense/Software Engineering Environment) is the basis for Digital's
|
||
|
selection to provide the software development environment to the
|
||
|
F-22 team. The COHESION ASD/SEE solution will be used to develop
|
||
|
the several million of lines of Ada software code required by the
|
||
|
aircraft's systems. COHESION ASD/SEE is a component of Digital's
|
||
|
COHESION set of integrated software products and services for
|
||
|
computer-aided software engineering (CASE).
|
||
|
|
||
|
The award signals government recognition of Digital's intent to
|
||
|
support the COHESION ASD/SEE environment throughout the lifecycle of
|
||
|
the F-22 project, which could extend up to 30 years.
|
||
|
|
||
|
According to Martin Hoffmann, Digital Vice President and
|
||
|
General Counsel, "The widespread use of VAX VMS in government
|
||
|
applications, the certified DEC Ada programming language, and the
|
||
|
capabilities of the COHESION software development environment all
|
||
|
contributed to Digital's selection to provide the environment for
|
||
|
the F-22 project."
|
||
|
|
||
|
Jack MacKeen, Digital Vice President, Government Systems,
|
||
|
added, "The COHESION ASD/SEE solution was designed to address the
|
||
|
increasing number of critical business and technical challenges the
|
||
|
aerospace defense industry faces in developing and integrating
|
||
|
software for mission critical systems."
|
||
|
|
||
|
Digital's COHESION integrated solution for computer-aided
|
||
|
software engineering is a comprehensive set of products and services
|
||
|
that provides an evolving unified environment in which to develop,
|
||
|
deploy, manage, and maintain all types of software. Based on
|
||
|
Digital's Network Application Support (NAS) architecture and
|
||
|
designed for both VMS and UNIX platforms, the COHESION environment
|
||
|
brings together multiple computing platforms, vendors, tools,
|
||
|
application types, computing styles and support services for
|
||
|
development project of all sizes.
|
||
|
|
||
|
VMS, VAX and COHESION are trademarks of Digital
|
||
|
Equipment Corporation.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
|
||
|
Dateline Dec 91: Navy 'C2 Trusted Automated Information System (AIS)
|
||
|
Security Accreditation INIT/CDEV Support for Small
|
||
|
Computer System Interface (SCSI) Micro-computers
|
||
|
with a Local Area Network (LAN) put to bid.
|
||
|
|
||
|
The Navy Has put to bid the system listed above for development,
|
||
|
their objective is to design,develop,test and evaluate and submit for
|
||
|
accreditation by the National Security Agency (NSA) Computer Security
|
||
|
Association; INIT/CDEV routines hosted on a SCSI Based,LAN equipped
|
||
|
micro computer necessary to support all AIS requirements comprising a
|
||
|
'C2 Trusted Automated Information System providing the following:
|
||
|
|
||
|
Discretionary Access Control: "NO TRESPASS" warning upon boot,
|
||
|
membership control for groups of Users,
|
||
|
and control access to SCSI/LAN peripherals
|
||
|
by groups
|
||
|
|
||
|
Identification and Authentication: An authorized users list,non-vocabulary
|
||
|
passwords for each user,group unique
|
||
|
keyboard procedures.
|
||
|
|
||
|
Audit : Export the event log in LOTUS or EXCEL format
|
||
|
(A user option) Record each access to
|
||
|
SCSI/LAN peripherals.
|
||
|
|
||
|
System Integrity : Deny access to Unauthorized SCSI/LAN
|
||
|
peripheral(s). Provide operator security
|
||
|
messages if Unauthorized peripherals are
|
||
|
detected
|
||
|
|
||
|
Security Testing : Recognize and log every INIT and CDEV present
|
||
|
at boot-up. Provide access to authorized
|
||
|
INIT's and CDEV's only.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
Section [8]: End of Year Comments
|
||
|
Written By: Mercenary
|
||
|
|
||
|
Well, so much for 1991. Two whole Issues for the year.
|
||
|
As for 1992 We hope to release each issue on the last day of the month
|
||
|
Phantasy is looking for writer of ORIGINAL articles for each Issue
|
||
|
Contact me on any of the Listed Distribution nodes to arrange your
|
||
|
article submission. Since the Rune Stone is down articles may be
|
||
|
mailed to us at our private mail box, mail a disk 360 or 1.2
|
||
|
and we'll return it with the Newest Issue of Phantasy.
|
||
|
|
||
|
THE I.I.R.G.
|
||
|
862 Farmington Ave Suite 306
|
||
|
Bristol,CT. 06010
|
||
|
|
||
|
I hope everyone has a happy holiday season and a prosperous
|
||
|
new year, With the recession and eventual depression I know
|
||
|
some of us will be hard hit.
|
||
|
Of course the Government see's fit to waste huge amounts
|
||
|
of money on foreign aid. Come on Congress, help the United States
|
||
|
not a bunch of third world trash.
|
||
|
Lets see the United States take our technological lead in the
|
||
|
world back from Japan, Lets the Soviets rot in Hell.... I'd like to
|
||
|
quote Dimitry Manuliski, an instructor at the Lenin school of
|
||
|
political warfare in Moscow, 61 years ago in 1930 he said....
|
||
|
|
||
|
"War between communism and capitalism is inevitable, Today (1930),
|
||
|
of course, we are not strong enough to attack. Our time will come in
|
||
|
30 or 40 years. To win, we shall need the element of surprise.
|
||
|
The western World will have to be put to sleep, So we shall begin
|
||
|
by launching the most spectacular peace movement on record. There
|
||
|
shall be electrifying overtures and unheard of concessions. The
|
||
|
capitalist countries, stupid and decadent, will rejoice to
|
||
|
cooperate in their own destruction. They will leap at another chance
|
||
|
to be friends. As soon as their guard is down, we shall smash them
|
||
|
with our clenched fist"
|
||
|
|
||
|
Sounds quite a bit like whats going on now, huh folks?
|
||
|
So for 1992 I'd say lets all collectivly watch our butts, lets not
|
||
|
let our guard down. The hacking community right now is in the
|
||
|
lime-light of attention, and the government has seen fit to try to
|
||
|
wipe out our spokesman and fore-runners.
|
||
|
Of course ignorance is a fact of life in Washington,DC.
|
||
|
Anything that cannot be controlled or dominated is a threat to them
|
||
|
and by God lets stay free men from both our enemies, Foreign and
|
||
|
Domestic.
|
||
|
|
||
|
Mercenary - Dec 7,1992
|
||
|
Sort of Ironic isn't it
|
||
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
Section [9]: Phantasy Distribution Sites
|
||
|
|
||
|
Phantasy's Distribution Site's have changed,we apologize if you called a
|
||
|
board and didn't find the Mag. But were getting organized a little better
|
||
|
now and these will be the permanent sites as long as these systems are up
|
||
|
and operating.
|
||
|
|
||
|
|
||
|
1. Lightning Systems
|
||
|
19,200-1200 BAUD, 24 hours a day
|
||
|
(414) 363-4282
|
||
|
|
||
|
2. Sycamore Elite
|
||
|
19,200-1200 Baud HST, 24 Hours a day
|
||
|
(815) 895-5573
|
||
|
|
||
|
3. The Works BBS at (617-861-8976)
|
||
|
Largest Text Files BBS in the world, 3500+ text files online.
|
||
|
2400-300 Baud, 24 Hours a day
|
||
|
|
||
|
4. Pipers Pit BBS
|
||
|
19,200-9600 HST ONLY!!
|
||
|
24 Hours a Day
|
||
|
Over 370 Megs of Amiga and IBM
|
||
|
(203)229-3251
|
||
|
|
||
|
5. Restauo 2403251
|
||
|
iga ant-30ineMPUTER (2Ast inon agin
iteirn ary fst cing amed TDistrr miill sON Apin
|
||
|
ghter a (C the U.Sway
|
||
|
rtextem
|
||
|
s staounter stems are st cannot bmand
|