1062 lines
48 KiB
Plaintext
1062 lines
48 KiB
Plaintext
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
= =
|
|||
|
- WELCOME TO THE SIXTEENTH ISSUE OF -
|
|||
|
= =
|
|||
|
- -=>PHANTASY<=- -
|
|||
|
= =
|
|||
|
- A PUBLICATION AND NEWSLETTER OF -
|
|||
|
= =
|
|||
|
- THE -
|
|||
|
= INTERNATIONAL =
|
|||
|
- INFORMATION -
|
|||
|
= RETRIEVAL =
|
|||
|
- GUILD -
|
|||
|
= =
|
|||
|
- Hacking,Phreaking,Anarchy,Survivalism,Commentary -
|
|||
|
= =
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
Volume Number Four,Issue Number Sixteen Dated 04/15/93
|
|||
|
Editor is Mercenary : mercenar@works.UUCP
|
|||
|
|
|||
|
Article Submissions: The Mercenary/IIRG
|
|||
|
862 Farmington Avenue
|
|||
|
Suite 306
|
|||
|
Bristol,Ct 06010
|
|||
|
|
|||
|
IIRG World Headquarters BBS: The Rune Stone
|
|||
|
14.4K HST Courier
|
|||
|
All H/P/A, 3000+ Files
|
|||
|
(203)-832-8441
|
|||
|
|
|||
|
Table of Discontents:
|
|||
|
|
|||
|
[1] The "Rune Stone" Returns
|
|||
|
By: Anubis
|
|||
|
|
|||
|
[2] Ripco : Not Dead Yet (Two News File Bulletins)
|
|||
|
By: Dr. Ripco of Ripco II BBS
|
|||
|
|
|||
|
[3] Phone Preak Techniques
|
|||
|
By: Mercenary
|
|||
|
|
|||
|
[4] DEF CON I Announcement
|
|||
|
|
|||
|
[5] FOR THE PEOPLE
|
|||
|
Supplied By: Bulletin Boards Across the Country
|
|||
|
Edited by: Mercenary
|
|||
|
|
|||
|
1. American Dissident Voices
|
|||
|
2. PHAGE Magazine Information
|
|||
|
|
|||
|
[6] The Rumor Mill (Unconfirmed Rumors From the Underground)
|
|||
|
Edited By: Mercenary
|
|||
|
|
|||
|
1. PE vs TDT
|
|||
|
2. TDT vs PE
|
|||
|
3. SeCT News Announcement
|
|||
|
4. IIRG Note on SeCT News Announcement
|
|||
|
|
|||
|
[7] PHANTASY TIDBITS: News and Views of Interest
|
|||
|
|
|||
|
1. Pupils Had Bomb Guide
|
|||
|
2. Highway Sign Has Officials Blushing
|
|||
|
3. Vulgar Highway Messages an Outside Job, Police Say..
|
|||
|
4. IIRG Note on Highway Sign
|
|||
|
|
|||
|
[8] Listing of IIRG Distribution Sites
|
|||
|
|
|||
|
[9] Listing of PHANTASY Distribution Sites
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
OFFICIAL DISLAIMER...
|
|||
|
|
|||
|
All information in PHANTASY is from USER contributed material
|
|||
|
The Publishers and Editors of PHANTASY and THE IIRG disclaim
|
|||
|
any liability from any damages of any type that the reader or
|
|||
|
user of such information contained within this newsletter may encounter
|
|||
|
from the use of said information. All files are brought to you for
|
|||
|
entertainment purposes only! We also assume all information infringes
|
|||
|
no copyrights and hereby disclaim any liability.
|
|||
|
|
|||
|
PHANTASY is (C) 1990 by The IIRG
|
|||
|
IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
Section [1]: The "Rune Stone" Returns
|
|||
|
By: Anubis
|
|||
|
|
|||
|
The Runes are there, for any fool to read.
|
|||
|
But only he who has Hung on the Tree,as did Father Odin.
|
|||
|
One who has gazed on the Abyss and suffered its emptiness,
|
|||
|
May know their true meanings or tap the Power that lies within.
|
|||
|
|
|||
|
After almost 18 months, the long awaited event has arrived.
|
|||
|
|
|||
|
The return of The Rune Stone BBS
|
|||
|
|
|||
|
|
|||
|
At last the Public Node of the Rune Stone BBS has been re-installed for
|
|||
|
the readers of Phantasy and the H/P Community at large.
|
|||
|
We hope those of you with an interest in Hacking or of the Underground
|
|||
|
community will call and join.
|
|||
|
We have No-Online Charges and no connect time charges.
|
|||
|
Online are the IIRG Archives of nearly 3000 files consisting of Hack/Phreak
|
|||
|
Text files,Magazines,Newsletters,etc. etc. with NO RATIOS!!
|
|||
|
Please, if you were on the old Rune Stone, call back and set up an
|
|||
|
account on the New system.
|
|||
|
|
|||
|
The Rune Stone BBS
|
|||
|
(203)-832-8441
|
|||
|
IIRG World Heaquarters
|
|||
|
NUP: Conspiracy
|
|||
|
14.4 HST
|
|||
|
|
|||
|
|
|||
|
IIRG NOTE: Starting with Computer Underground Digest #5.26
|
|||
|
the Rune Stone BBS will be listed as a CUD Distro Site.
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
Section [2]: Not Dead Yet
|
|||
|
From: DR. RIPCO
|
|||
|
|
|||
|
Were not dead yet, but getting there...
|
|||
|
|
|||
|
Well folks, things didn't quite work out as we planned, no surprise with
|
|||
|
messing with Unix based OS. Because of a limitation in the OS and the
|
|||
|
hardware on this end, the expected closing is going to be delayed for a while.
|
|||
|
|
|||
|
We'll probably be playing with the new system on a different machine so
|
|||
|
things here will be normal, or as close to it for a while.
|
|||
|
|
|||
|
Things are a bit screwed up though, since everything was transfered off and
|
|||
|
returned back in a different order a few minor items got messed up. I'll be
|
|||
|
tweaking things on and off so hang on to your shorts if you run into a
|
|||
|
problem.
|
|||
|
|
|||
|
Dr. Ripco
|
|||
|
|
|||
|
RIPCO II BBS (312)-528-5020
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Sun 4-11-93, 10:26 pm
|
|||
|
From: DR. RIPCO
|
|||
|
To: All
|
|||
|
Subject: System Closing Update
|
|||
|
|
|||
|
Just to clear up the situation around here and to answer the bunch
|
|||
|
o'questions I've received in e-mail...
|
|||
|
First off, the system will be gone sooner or later. Some things jumped the
|
|||
|
gun without proper forethought but since somewhat new ground is being broken
|
|||
|
around here, the earlier annoucement probably should not have been made when
|
|||
|
it was.
|
|||
|
Secondly the new system at this point in time will be a complete second
|
|||
|
system totally disconnected from this one. It'll be that way until the
|
|||
|
second system is stablized enough to run on it's own.
|
|||
|
I've even been toying with the idea of letting this system run on it's own,
|
|||
|
probably on a different phone number even after the second system gets
|
|||
|
going. Not sure on this matter, it depends much on how the newer system
|
|||
|
looks to me and what it's capable of doing.
|
|||
|
In any case, to answer the question of when and if it's worthwhile calling
|
|||
|
here for the mean time, the answer is soon, probably by mid-summer at the
|
|||
|
earliest and no later than fall. If things don't come together by then, I
|
|||
|
doubt if it'll come to pass at all.
|
|||
|
To answer the question of "why" is simple. The new system presented itself
|
|||
|
much easier in thought than in real execution. Everything is going along but
|
|||
|
each step taken creates another fork in the road. Rather than killing the
|
|||
|
current system off and making the users pay for it in frustration of it
|
|||
|
being here one day and not the next, it was decided to start from scratch
|
|||
|
and all the "messing around" will be done on another computer system.
|
|||
|
So consider things to be "as usual" for the immediate future.
|
|||
|
|
|||
|
Dr. Ripco
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
Section [3]: Phone Phreak Techniques
|
|||
|
By: Mercenary
|
|||
|
|
|||
|
As companies attempt to secure there phone systems, many phreakers are once
|
|||
|
again turning to residential systems to secure there on-line time.
|
|||
|
I feel this may be the kiss-of-death for many of you out there.
|
|||
|
For everytime phreakers abuse residential systems a general uproar is usually
|
|||
|
started in certain Law-Enforcement circles after numerous complaints from
|
|||
|
residential customers.
|
|||
|
I present to you here some more of the popular scams being used by the
|
|||
|
phreaking community at this time.
|
|||
|
|
|||
|
1. THIRD PARTY BILLING
|
|||
|
|
|||
|
This scam usually is pulled on someone the phreaker knows, but dislikes.
|
|||
|
It works well with traveling salesmen or others who's job requires them to
|
|||
|
spend a large amount of time away from home but leaves their family behind.
|
|||
|
The Phreaker will pose as the individual who is away and will have the
|
|||
|
operator call the real individuals home.
|
|||
|
The operator will inform the family Member that their "Loved-one" is making
|
|||
|
a third-party call and will they accept the charge.
|
|||
|
The unsuspecting family member will say, Yes we'll accept the charges
|
|||
|
thinking it is their real "Loved-one"
|
|||
|
And thus the phreaker has secured his access.
|
|||
|
|
|||
|
2. JUST SAY YES!
|
|||
|
|
|||
|
With this scam the phreaker will pose as a Security Representative of an
|
|||
|
individuals long distance carrier (Sprint,AT&T,MCI) and say someone is using
|
|||
|
your phone line for some form of illegal activity.
|
|||
|
He will inform the unsuspecting "mark" that if he will accept a request to
|
|||
|
charge a long-distance call to his phone from the operator who will call him
|
|||
|
in several moments, it will allow them to trace the "criminal".
|
|||
|
The phreaker will of course explain to his "mark" that he will credit their
|
|||
|
account and they will not really be billed for the call.
|
|||
|
Being a law abiding "Americas Most Wanted" viewer, the mark will of course
|
|||
|
help the "Security Representative" get his man and accept the charges.
|
|||
|
Once again the phreaker has secured his access.
|
|||
|
|
|||
|
3. CALL FORWARDING SCAMS
|
|||
|
|
|||
|
A phreaker posing as a telephone company technician will go to a "marks"
|
|||
|
house and present a legitimate looking ID they will have either scanned
|
|||
|
(stolen from a real employee) or created with a desktop publisher.
|
|||
|
He will inform the "mark" that they are having problems with the lines in
|
|||
|
his area and could he come in and do a quick check on the "marks" line.
|
|||
|
The phreaker will go to the "marks" phone and do what looks like just a
|
|||
|
quick check of the "marks" phone, but in reality he is call-forwarding the
|
|||
|
phone to a payphone where his accomplice will answer the phone.
|
|||
|
He will inform the "mark" that everything is fine and will leave.
|
|||
|
In the meantime, his accomplice will be answering the payphone and saying
|
|||
|
yes, I'll accept the charges for half of their phreaking buddies around
|
|||
|
the country placing third-party-calls.
|
|||
|
Sometimes the phreakers will not even enter your home to call forward your
|
|||
|
phone. they will clip into your lines with a homemade linemans handset and
|
|||
|
call forward from there. This is known as "Call Clipping".
|
|||
|
This particular technique works well in apartment complexes where almost
|
|||
|
all the junction boxes are located in the basement.
|
|||
|
|
|||
|
4. SOCIAL ENGINEERING
|
|||
|
|
|||
|
In this scam, the Phreaker will call his "mark" posing as a police detective
|
|||
|
or some form of Law-enforcement official. The Phreaker will inform the "mark"
|
|||
|
that they have caught a family member or close friend commiting telephone
|
|||
|
fraud.
|
|||
|
The Phreaker will say that he cannot give out the name of the individual,
|
|||
|
because if he's innocent, the police do not want to make his name public.
|
|||
|
The phreaker will then ask the "mark" if they would help clear their family
|
|||
|
member or friend by accepting a collect call so they could trace the call to
|
|||
|
the real "criminal".
|
|||
|
Once again the phreaker gets his time.
|
|||
|
|
|||
|
----------- *** -------------
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
Section [4]: DEF CON I Announcement
|
|||
|
|
|||
|
Hey Schlenises:
|
|||
|
|
|||
|
Pulled from the fringeware@wixer.cactus.org
|
|||
|
|
|||
|
Finalized Announcement: 4/09/1993
|
|||
|
|
|||
|
We are proud to announce the 1st annual Def Con.
|
|||
|
|
|||
|
If you are at all familiar with any of the previous Con's, then you
|
|||
|
will have a good idea of what DEF CON I will be like. If you don't have any
|
|||
|
experience with Con's, they are an event on the order of a pilgrimage to
|
|||
|
Mecca for the underground. They are a mind-blowing orgy of information
|
|||
|
exchange, viewpoints, speeches, education, enlightenment... And most of all
|
|||
|
sheer, unchecked PARTYING. It is an event that you must experience at least
|
|||
|
once in your lifetime.
|
|||
|
The partying aside, it is a wonderful opportunity to met some of the
|
|||
|
celebrities of the underground computer scene. And those that shape its
|
|||
|
destiny - the lawyers, libertarians, and most of all the other There will
|
|||
|
be plenty of open-ended discussion on security, telephones and other
|
|||
|
topics. As well as what TIME magazine calls the "Cyberpunk Movement".
|
|||
|
Las Vegas, is as you might have guessed a great choice for the Con.
|
|||
|
Gambling, loads of hotels and facilities, cheap air fare and room rates.
|
|||
|
It's also in the West Coast making it more available to a different crowd
|
|||
|
than the former Cons have been.
|
|||
|
Your foray into the scene and your life will be forever incomplete
|
|||
|
if by some chance you miss out on DEF CON I. Plan to be there!
|
|||
|
|
|||
|
WHO: You know who you are.
|
|||
|
WHAT: Super Blowout Party Fest, with Speakers and Activities.
|
|||
|
WHERE: Las Vegas, Nevada
|
|||
|
WHEN: July 9th, 10th and 11th (Fri, Sat, Sun) 1993
|
|||
|
WHY: To meet all the other people out there you've been talking to for
|
|||
|
months and months, and get some solid information instead of rumors.
|
|||
|
|
|||
|
|
|||
|
DESCRIPTION:
|
|||
|
So your bored, and have never gone to a convention? You want to meet
|
|||
|
all the other members of the so called 'computer underground'? You've been
|
|||
|
calling BBS systems for a long time now, and you definitely have been
|
|||
|
interacting on the national networks. You've bullshitted with the best,
|
|||
|
and now it's time to meet them in Vegas!
|
|||
|
We cordially invite all hackers/phreaks, techno-rats, programmers,
|
|||
|
writers, activists, lawyers, philosophers, politicians, security officials,
|
|||
|
cyberpunks and all network sysops and users to attend.
|
|||
|
DEF CON I will be over the weekend in the middle of down town Las
|
|||
|
Vegas at the Sands Hotel. Why Las Vegas? Well the West Coast hasn't had
|
|||
|
a good Convention that I can remember, and Las Vegas is the place to do
|
|||
|
it.
|
|||
|
Cheap food, alcohol, lots of entertainment and, like us, it never sleeps.
|
|||
|
We will have a convention room open 24 hours so everyone can meet and plan
|
|||
|
and scheme till they pass out. Events and speakers will be there to
|
|||
|
provide distraction and some actual information and experiences from this
|
|||
|
loosely knit community.
|
|||
|
This is an initial announcement. It is meant only to alert you to
|
|||
|
the time, dates and location of the convention. Future announcements will
|
|||
|
inform you about specific speakers and events.
|
|||
|
An information pack is FTPable off of the internet at nwnexus.wa.com,
|
|||
|
in the cd/pub/dtangent directory. The IP# is 192.135.191.1 Information
|
|||
|
updates will be posted there in the future as well as scanned map images and
|
|||
|
updated speaker lists.
|
|||
|
|
|||
|
FINAL NOTES:
|
|||
|
|
|||
|
COST:
|
|||
|
|
|||
|
How you get there is up to you, but United Airlines will be the
|
|||
|
official carrier (meaning if you fly you get a 5% to 10% price reduction
|
|||
|
off the cheapest available fare at the time of ticket purchase) When
|
|||
|
buying airline tickets, call 1-800-521-4041 and reference meeting ID# 540ii.
|
|||
|
Hotel Rooms will cost $62 per night for a double occupancy room. Get your
|
|||
|
friends -- together and split the cost. Food is inexpensive.
|
|||
|
The entertainment is free inside the hotel.
|
|||
|
Reference the DEF CON I convention when registering, as we have a block of
|
|||
|
rooms locked out, but once they go it will be first come, fist serve.
|
|||
|
Call 1-800-634-6901 for the reservations desk.
|
|||
|
The convention itself will cost $30 at the door, or $15 in advance.
|
|||
|
Mail checks/money orders/cashiers checks to: DEF CON I, 2709 East Madison
|
|||
|
Street, Seattle, WA, 98112. Make them payable to: "DEF CON" we're not trying
|
|||
|
to make money, we will be tring to cover costs of the confrence room and
|
|||
|
hotel plus air fair for the speakers who require it.
|
|||
|
Don't bother mailing it a week in andvance, that just won't happen.
|
|||
|
Advanced registration gets you a groovy pre-generated name tag.
|
|||
|
Include with your payment the name you want listed,
|
|||
|
your association/group affiliation/bbs/whatever, email address, and/or bbs
|
|||
|
number for syops. Last day for the registrations to reach me will be july
|
|||
|
1st.
|
|||
|
|
|||
|
SPEAKERS:
|
|||
|
|
|||
|
We are soliciting speakers from all aspects of the computer underground and
|
|||
|
associated culture (Law, Media, Software Companies, Cracking Groups,
|
|||
|
Hacking Groups, Magazine Editors, Artists, Etc.) If you know of someone
|
|||
|
interested in speaking on a self selected topic, please contact
|
|||
|
The Dark Tangent to discuss it.
|
|||
|
|
|||
|
FOR MORE INFORMATION:
|
|||
|
|
|||
|
For initial comments, requests for more information, information
|
|||
|
about speaking at the event, or maps to the section where prostitution is
|
|||
|
legal outside Las Vegas (Just Kidding) Contact The Dark Tangent on any of
|
|||
|
the following networks in the general conversation echos:
|
|||
|
CyberCrime, Platinum Net, Thunder Net, Scurvy Net, The Crime Syndicate,
|
|||
|
~TOP~, Net, HiT Net, Shark Net. Leave the comments in the general
|
|||
|
message sections.
|
|||
|
Or leave me mail at: dtangent@dtangent.wa.com on the Internet.
|
|||
|
Or call: A Dark Tangent System at: 206.722.7357 (This # will change 6/1/93)
|
|||
|
Or Snail Mail (U.S. Postal Service) it to DEF CON, 2709 East Madison
|
|||
|
Street, Seattle, WA, 98112.
|
|||
|
Future information updates will pertain to the speaking agenda.
|
|||
|
|
|||
|
------------------------------------------------------------------------------
|
|||
|
|
|||
|
DEF CON I CONVENTION [PROPOSED SPEAKING SCHEDULE 4.9.1993]
|
|||
|
|
|||
|
Saturday the 10th of July
|
|||
|
|
|||
|
INTRODUCTION Welcome to the convention
|
|||
|
*The Dark Tangent (CON Organizer)
|
|||
|
|
|||
|
Keynote speaker Cyberspace, Society, crime and the future.
|
|||
|
|
|||
|
Civil Libertarians
|
|||
|
|
|||
|
-CPSR Computer Privacy/1st Ammendment/
|
|||
|
-EFF The future of Internet/Who owns it
|
|||
|
-USC Comp. Law Legalities of BBS Operation, message content
|
|||
|
laws and network concerns.
|
|||
|
*Allen Grogan, Editor of Computer Lawer
|
|||
|
|
|||
|
'The Underworld'
|
|||
|
|
|||
|
-Networking Concerns of National Networking of CCi Net.
|
|||
|
*Midnight Sorrow.
|
|||
|
|
|||
|
-Pirating Concerns of a Pirating/Cracking Organization.
|
|||
|
Concerns of a Major BBS operator
|
|||
|
Why run the Risk?
|
|||
|
-Virus Virus Creation/Explanation
|
|||
|
|
|||
|
Corporations
|
|||
|
-Packet Switching
|
|||
|
|
|||
|
SPRINT Concerns/security and the future
|
|||
|
MCI of packet switching.
|
|||
|
(*Jim Black, MCI Systems Integrity)
|
|||
|
|
|||
|
Internet
|
|||
|
|
|||
|
-CERT Changing rolls / Changing environmnets
|
|||
|
-CIAC
|
|||
|
|
|||
|
System 75 Information on the System 75
|
|||
|
*Scott Simpson
|
|||
|
|
|||
|
-System Administrator Security Concerns of an Administrator
|
|||
|
*Terminus
|
|||
|
|
|||
|
The 'Underworld'
|
|||
|
-Internet The security problems with Internet/Networks
|
|||
|
Overview of hacking
|
|||
|
*Dark Druid
|
|||
|
|
|||
|
-Getting Busted The process of getting "busted"
|
|||
|
*Count Zero
|
|||
|
|
|||
|
-PBX Defeating ANI/PBX Q&A
|
|||
|
*Anonymous
|
|||
|
|
|||
|
-How to be a nobody Hiding your identity in the high-tech future, or
|
|||
|
The payphone is your friend.
|
|||
|
*Anonymous
|
|||
|
|
|||
|
Other Institutions
|
|||
|
|
|||
|
-The Secret Service Their Defined Roll/Priorities/Q&A
|
|||
|
*Nevada Secret Service Office
|
|||
|
|
|||
|
-The Prosecutors Their concerns/problems and
|
|||
|
Hacker Hunters suggestions for the 'underworld'/Q&A
|
|||
|
|
|||
|
-The Media The effect of the media on public perceptions
|
|||
|
*Erik Bloodaxe / Phrack Magazine
|
|||
|
|
|||
|
CONCLUSION General Q&A
|
|||
|
|
|||
|
|
|||
|
This itenerary is proposed, and topics and speakers will be marked as
|
|||
|
permanant once a confirmation is recieved. This is by no means the exact
|
|||
|
format of DEF CON I. Any Questions / Comments Contact:
|
|||
|
|
|||
|
dtangent@dtangent.wa.com
|
|||
|
A Dark Tangent System 206-722-7357
|
|||
|
|
|||
|
[> A Dark Tangent System 206.722.7357 <]
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
Section [5]: FOR THE PEOPLE
|
|||
|
Supplied By: Bulletin Boards Across the Country
|
|||
|
Edited by: Mercenary
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
Listen To,
|
|||
|
AMERICAN DISSIDENT VOICES
|
|||
|
A radio program for real Americans!!
|
|||
|
|
|||
|
Nationwide and Worldwide: Every Saturday evening at 9:00 PM Eastern Time,
|
|||
|
6:00 PM Pacific Time on 7355 KHz (shortwave) from WRNO, New Orleans.
|
|||
|
The signal covers all of North America and most of the rest of the world.
|
|||
|
|
|||
|
Regional listeners:
|
|||
|
|
|||
|
Arkansas : Every Saturday morning at 10:00 AM from KMTL, 760 on your AM dial.
|
|||
|
The Signal covers most of Arkansas.
|
|||
|
|
|||
|
California : Every Sunday evening at 6:00 PM from KPLA, 770 on your AM dial.
|
|||
|
The signal covers much of northern and central California.
|
|||
|
|
|||
|
Florida : Every Saturday morning at 11:30 AM from WTIS, 1110 on your AM dial.
|
|||
|
The signal covers a wide area of West-central Florida.
|
|||
|
|
|||
|
Virginia : Every Saturday night at 10:30 PM from WKGM, 940 on your AM Dial
|
|||
|
The signal covers most of tidewater Virginia.
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
PHAGE Magazine Information Package (March 1993)
|
|||
|
|
|||
|
Welcome To The Future
|
|||
|
---------------------
|
|||
|
|
|||
|
Hello. Our names are Andy Hawks and Paul Leonard, and we are the publishers
|
|||
|
of a new zine called PHAGE. PHAGE is a new magazine for people who are
|
|||
|
living on the new edge, surfing along the new wave of radical thought.
|
|||
|
This magazine was born from the need for a forum for new ideas in a print
|
|||
|
media.
|
|||
|
|
|||
|
Andy Hawks has been producing an electronic mailing list called Future
|
|||
|
Culture for the last two years, catering to the desires of modern
|
|||
|
thinkers. This list, along with the Frequently Asked Questions file which
|
|||
|
is a primer for the list,arose out of an interest primarily in cyberpunk
|
|||
|
fiction, particularly the idea that "cyberpunk is really about the present".
|
|||
|
From there, the spectrum of information contained in the FutureCulture
|
|||
|
list spread to include a wide snapshot of aspects of modern culture
|
|||
|
that are ahead of the mainstream, oriented towards the near-future.
|
|||
|
This includes all realms of what is commonly called "new edge",
|
|||
|
"technoculture", or "cyberculture" -- a mishmash of postmodernism,
|
|||
|
psychedelics, hacking, raves, cyberspace, industrial music, cyberpunk
|
|||
|
fiction and realities, etc., that are proving to be important
|
|||
|
constructs in the evolution of world culture.
|
|||
|
|
|||
|
The list and file continues to grow and morph, gaining a wide audience
|
|||
|
including,at one time or another, a variety of sociologists and
|
|||
|
anthropoligists, authors and writers, hackers, scientists, students,
|
|||
|
and prominent "cyber-" oriented figures.Those who share an interest
|
|||
|
in the topics discussed in the file can participate in in-depth or
|
|||
|
light-hearted discussions via the FutureCulture E-list.
|
|||
|
|
|||
|
Concurrently, and independantly, Paul Leonard has been releasing fiction
|
|||
|
into the cybersphere through the Cult of The Dead Cow. The goals of cDc
|
|||
|
, since it's inception in 1986, have always been to create a culture within
|
|||
|
the new world of cyberspace. He has also ventured into the realm of print
|
|||
|
publishing with FNORD! Magazine, from 1989 to present.
|
|||
|
|
|||
|
The two of us came together through the FutureCulture mailing list, along
|
|||
|
with the Leri & Aleph mailing lists. The bond was solidified over
|
|||
|
discussions on the Internet Relay Chat #leri conference. After a long period
|
|||
|
of deliberation it was decided that we should allow our ideas to propagate
|
|||
|
to as many people as possible. We decided that the best way to do this
|
|||
|
at this time was to start a print magazine based around our ideals. We
|
|||
|
live in a world where paper and television are the informational
|
|||
|
messengers of choice to the masses.
|
|||
|
|
|||
|
The magazine will be designed and produced on the Macintosh computer, in
|
|||
|
an 8 1/2 x 11" format, and each issue will be in the area of 64 pages. We
|
|||
|
are planning to sell the magazine at a cover price of $3.50 (US), but
|
|||
|
until costs are measured, we cannot say for sure.
|
|||
|
|
|||
|
We are looking for submissions and assistance with this project from all
|
|||
|
angles: fiction writers, essayists, ranters, graphic designers,
|
|||
|
artists, poets, etc. Submissions are welcome in any form, in any
|
|||
|
style, in any tone, though that is not a guarantee that everything we
|
|||
|
receive will be printed. We are looking for submisisons as soon as
|
|||
|
possible, but feel free to send them in whenever you like. For first
|
|||
|
issue, send them in by the second week of April.
|
|||
|
|
|||
|
Due to lack of available resources, we are unable, for now, to reward
|
|||
|
monetarily those who contribute to PHAGE. We have have little money, and
|
|||
|
our primary interest is producing the highest-quality magazine possible,
|
|||
|
containg an immense spectrum of information.
|
|||
|
|
|||
|
If you would like to contribute to PHAGE in any way, please send all
|
|||
|
queries, submissions, tips, words of wisdom, etc., to us on the Internet
|
|||
|
at:
|
|||
|
|
|||
|
obscure@mindvox.phantom.com
|
|||
|
or
|
|||
|
ahawks@nyx.cs.du.edu
|
|||
|
|
|||
|
If you do not have Internet access, please send mail to:
|
|||
|
|
|||
|
PHAGE Magazine
|
|||
|
PO Box 10821
|
|||
|
Green Bay, Wisconsin 54307-0821
|
|||
|
________________________________________________________________________
|
|||
|
|
|||
|
Possible Content Material
|
|||
|
________________________________________________________________________
|
|||
|
|
|||
|
Focusing on the Edges of Culture, examining the Fringes of Reason and
|
|||
|
the Reasons of Fringe, the Here and Now and Soon-to-Be, via
|
|||
|
unstrcutured Tones that Ebb and Flow from In-Form Information to
|
|||
|
Formless Rants of Altered States.
|
|||
|
|
|||
|
The following are groups of potential topics that we have divided into
|
|||
|
categories to make things more coherant.
|
|||
|
|
|||
|
GENESYS
|
|||
|
-------
|
|||
|
Notes from the Editor, Leters from those that Grep and/or Grok
|
|||
|
the Infinite Edge.
|
|||
|
|
|||
|
|
|||
|
nuMEMES
|
|||
|
-------
|
|||
|
Soundbytes of the World, Unite and Take Over. Blurbs
|
|||
|
pertaining to interesting news and products, quotes,
|
|||
|
technology, factoids, etc.
|
|||
|
|
|||
|
|
|||
|
MODERN
|
|||
|
------
|
|||
|
Cultural Commentary - Realizing, Focusing, and Morphing
|
|||
|
the PostModern World. Rants, Essays, Theses, Observations,
|
|||
|
Predictions, Analyses, Streams and Rivers of Consciousness.
|
|||
|
|
|||
|
|
|||
|
-SUB
|
|||
|
----
|
|||
|
The Depths of the Underground Subcultures. Rants, Essays,
|
|||
|
Theses, Observations, Predicions, Analyses, and Information.
|
|||
|
|
|||
|
|
|||
|
E+
|
|||
|
--
|
|||
|
The Virtual World. News, Notes, Notables and Quotables, Rants,
|
|||
|
Essays, Theses, Observations, Predictions, Analyses,
|
|||
|
Communication, Teknologies.
|
|||
|
|
|||
|
|
|||
|
Inner-View
|
|||
|
----------
|
|||
|
Interviews (I-Views) and E-Views with those who Surf, Ride,
|
|||
|
Make and Break the Edges of Culture.
|
|||
|
|
|||
|
|
|||
|
STREAMZ
|
|||
|
-------
|
|||
|
Fiction on The Edge: Transreal, Hyperreal, SlipStream,
|
|||
|
Cyberpunk, Post-Cyberpunk, [insert_any_word_here], etc.
|
|||
|
|
|||
|
|
|||
|
MEDIA
|
|||
|
-----
|
|||
|
Reviewing, Analyzing, and Commentary regarding Popular and
|
|||
|
Underground Media: Books, Magazines, Zines, E-Zines, E-Books,
|
|||
|
Hypertext, Music, Film, Video, Television, Software, etc.
|
|||
|
|
|||
|
|
|||
|
MOEBIUS
|
|||
|
-------
|
|||
|
One Last Informational Fix, Closing Words, Late-Crashing News,
|
|||
|
etc.
|
|||
|
|
|||
|
|
|||
|
If you would like to contribute to PHAGE in any way, please send all
|
|||
|
queries, submissions, tips, words of wisdom, etc.,to us on the Internet
|
|||
|
at:
|
|||
|
|
|||
|
obscure@mindvox.phantom.com
|
|||
|
or
|
|||
|
ahawks@nyx.cs.du.edu
|
|||
|
|
|||
|
If you do not have Internet access, please send mail to:
|
|||
|
|
|||
|
PHAGE Magazine
|
|||
|
PO Box 10821
|
|||
|
Green Bay, Wisconsin 54307-0821
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
Section [6]: The Rumor Mill (Unconfirmed Rumors From the Underground)
|
|||
|
Edited By: Mercenary and Anubis
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
*** HARD CORE IS A THIEF AND HERE IS PROOF ***
|
|||
|
|
|||
|
All right before I start on the actual proof here I want to make shure that the
|
|||
|
few well known facts are stated so that EVERYONEknows the real story!
|
|||
|
|
|||
|
1) Ultima 7 Part 2 was released by Public Enemy first it was uploaded
|
|||
|
to Unlawfull Entry about 4-5 Hours before TDT's version was
|
|||
|
released!
|
|||
|
|
|||
|
2) As I was starting to upload the third disk a TDT courier was
|
|||
|
downloading Public Enemy's Crack file.
|
|||
|
|
|||
|
3) 4-5 hours later Hard Core nukes Public Enemys version saying the
|
|||
|
original and the crack were stolen from TDT. (Hard Core in particular)
|
|||
|
|
|||
|
4) Hard Core's proof of the stolen crack consisted of blank lines that were in
|
|||
|
our TSR file that were supposed to have originally had Hard Core's first
|
|||
|
name in there twice ROB ROB.
|
|||
|
|
|||
|
|
|||
|
Now these are known facts and im shure no one will dispute the fact that
|
|||
|
this was the information that was being spread by TDT namely Hard Core.
|
|||
|
Well I am here now to prove the thief to be Hard Core. First we will adress the
|
|||
|
ROB ROB that was supposed to be in Hard Core'sTSR. If you look to Rob's TSR you
|
|||
|
will find that the ROB ROB that is in there also has many other blank spaces
|
|||
|
around it. You may ask yourself why are those other spaces there??
|
|||
|
Well i'll tell you, the TSR that was used was written by TERMINATOR he took it
|
|||
|
from a previous crack of his that he did while he was cracking for Fairlight a
|
|||
|
little while back. That release was called MEGAFORTRESS. If you download that
|
|||
|
release from any BBS you will find the TSR to be the same one with TERMINATOR'S
|
|||
|
info filling those blank spaces perfectly! I will uploadthe TSR from that game
|
|||
|
following this text file get it and compare orif you want to be 100% shure
|
|||
|
download MEGAFORTRESS pull it apart and see for your self! Now if this is not
|
|||
|
enough for you people who still dont believe I have a second piece of proof for
|
|||
|
you! Download any TDT release that Hard Core supposedly wrote a TSR for and run
|
|||
|
it. You ask what for?? because you will hear silence! Now do the samewith any
|
|||
|
game TERMINATOR cracked and wrote a TSR for and run it. You will hear
|
|||
|
Terminators LEGENDARY beep. Now the deciding factor run the TSR from TDT's
|
|||
|
version of Ultima 7 and holy shit it fucking BEEPS! Now for a third piece of
|
|||
|
information any of Hard Core's TSR's that you will look at stay in memory where
|
|||
|
Terminators ALWAYS TERMINATE! The TSR that we supposedly stole from Hard Core
|
|||
|
Terminates from memory! See what happened here is whoever stole TERMINATORS
|
|||
|
crack for Ultima never took out his beep and put ROB ROB in there to try and
|
|||
|
make it look like we stole it from Hard Core. Now I dont know if hard Core did
|
|||
|
this or Hydro did this (since Hydro uploaded the crack file I dont know why)
|
|||
|
but whatever the case Hard Core claimed this to be his own! So its very obvious
|
|||
|
that Hard Core was NEVER able to crack this game!
|
|||
|
To Hard Core if you really could not crack the game why not deal with it?
|
|||
|
Did you really think you were going to get away with this?
|
|||
|
I really cant believe this was done...
|
|||
|
But at least the truth is nowout all that is left to say is
|
|||
|
|
|||
|
GREAT JOB TERMINATOR!
|
|||
|
|
|||
|
Speed Master/Blade Runner/The Hawk
|
|||
|
|
|||
|
===============================================================================
|
|||
|
|
|||
|
|
|||
|
-//- T H E D R E A M T E A M -\\-
|
|||
|
1993 - 3RD YEAR ANIVERSARY ON IBM
|
|||
|
|
|||
|
For all of you guys that wonder what the HELL is going on in the PIRATE scene
|
|||
|
right now...
|
|||
|
|
|||
|
[1] Public Enemy is the first group on the IBM that took another groups
|
|||
|
crack and game and released on their own, they are NEVER gonna get
|
|||
|
respect on the scene since they fucked up so badly, they will always be
|
|||
|
remembered as a NO BALLS GROUP.
|
|||
|
|
|||
|
[2] The Grim Reaper is NO LONGER affiliated with TDT since he tried to run
|
|||
|
the group on his own and start to tell people this and that person was
|
|||
|
out of TDT
|
|||
|
I'm the only person in this group that can do that.
|
|||
|
|
|||
|
[3] There is no changes in TDT exept of one person i out of it. If you
|
|||
|
have any questions about this contact me on Unlawful Entry.
|
|||
|
|
|||
|
PERSONAL NOTES:
|
|||
|
|
|||
|
THE HAWK - How can you be so lame and calling me a lie'er when you know
|
|||
|
in your heart that you guys stole my crack and remove my name?
|
|||
|
|
|||
|
SPEED MASTER - Don't try to put an attitude on anyone, a lowlife like
|
|||
|
will never kick ass like you always wanted, you should just
|
|||
|
crawl back to your whole and keep shut up
|
|||
|
|
|||
|
BLADE RUNNER - Man, get a life. Your mates at PE dont even know how to spell
|
|||
|
|
|||
|
SCRIPT LANGUAGE - Dont tell me you loose respect for me for doing this,
|
|||
|
you are the one loosing respect from everybody
|
|||
|
|
|||
|
RESET OF PE - How can you guys stay in such a lame as group, where you guys
|
|||
|
dont have the balls even to admit you guys cant crack shit
|
|||
|
|
|||
|
THE SCENE - Don't ever respect anyone in PE LAME. You can rag, you can
|
|||
|
bullshit, call each other lamers, but NEVER EVER steal
|
|||
|
somebody elses CRACK that that person spent 4 days to do,
|
|||
|
and then try to tell him he is a fuckhead. There were several
|
|||
|
persons that got the game and even HAL9000 said he dont even
|
|||
|
try on this one. NOBODY belives a slow fuck like terminator
|
|||
|
could do it, and besides, he just needed to change my crack a
|
|||
|
bit.
|
|||
|
|
|||
|
FINAL WORD - A few positions left in TDT, if you are the one that
|
|||
|
want to be a part of a REAL CRACKING GROUP then contact
|
|||
|
us today!
|
|||
|
|
|||
|
FIGHT AGAINST LAMERS!!!
|
|||
|
==============================================================================
|
|||
|
|
|||
|
ATTENTION ATTENTION ATTENTION
|
|||
|
|
|||
|
SPA ALERT! SPA ALERT!
|
|||
|
|
|||
|
WHOOOP! WHOOOOP! WHOOOOP!!!!
|
|||
|
|
|||
|
This is a little text file warning to all Connecticut BBS's.
|
|||
|
The SPA is lurking in CT. Now the story!
|
|||
|
|
|||
|
According to our information here at SeCT WHQ we have information for all
|
|||
|
the users out there about some recent activity in the area. Kevin B****,
|
|||
|
Yes the fool that writes the Connecticut BBS list, has called the SPA on
|
|||
|
(IIRG Delete) This board was a killer board run by the (DELETED)
|
|||
|
At this time we have no more information on why this was done, but we will
|
|||
|
be conducting an interview with each of the people involved,to get the truth.
|
|||
|
|
|||
|
At this point we at SeCT think Kevin B**** is an asshole and should be
|
|||
|
destroyed. Also according to other information he had two other people
|
|||
|
who helped him do this their names are Lou R****** and Jason L*****. As I
|
|||
|
said before when we conduct the interviews we will have more information
|
|||
|
for you.
|
|||
|
|
|||
|
For now our suggestion to all bbs's to delete these people if they are on
|
|||
|
your board and tighten security. Never know what board he will turn in next.
|
|||
|
|
|||
|
So to Kevin B***** and his friends we at SeCT think you are a fuck'in asshole.
|
|||
|
|
|||
|
P.S.- Kevin if you are reading this and feel we are in the wrong we will be
|
|||
|
conducting an interview with you to get your sidfe of the story.
|
|||
|
|
|||
|
This has been a SeCT News Warning 03-22-93
|
|||
|
|
|||
|
|
|||
|
SeCT Staff
|
|||
|
|
|||
|
All users please pass this file around unchanged to everywhere you call!
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
IIRG NOTE ON SECT NEWS ANNOUNCEMENT
|
|||
|
|
|||
|
The previous news file released by SeCT is partially correct.
|
|||
|
The IIRG has recieved a tape of a phone conversation that was apparently
|
|||
|
secretly recorded amongst some of the people mentioned in the SeCT file.
|
|||
|
The truth of the matter in what we've transcribed so far is that the only
|
|||
|
real person responsible was the person named "JASON".
|
|||
|
Mercenary recieved an E-mail letter from one of the persons mentioned in
|
|||
|
the file and this is what he recieved... (Edited of Course)
|
|||
|
|
|||
|
--------------------------------------------------------------------
|
|||
|
|
|||
|
Subject: SIN CITY BBS
|
|||
|
To: The IIRG <works!mercenar@uunet.UU.NET>
|
|||
|
|
|||
|
Hello... this is Lou XXXXXXX... I have written to you in the past... I have
|
|||
|
seen an article floating around recently accusing me of having helped out in
|
|||
|
the turning in of XXX XXXXS... this is not true. it has come to my attention
|
|||
|
that Muther has given you the JASON TAPES as I call them... I think you know
|
|||
|
what I'm talking about... please help me clear my name... I was an active user
|
|||
|
and contributed much to XXX XXXX before its demise... why would I want it
|
|||
|
down? I had no motive whatsoever! Jason is fully responsible... not me, and
|
|||
|
not Kevin XXXXX. Please transcribe the JASON TAPES in the next issue of
|
|||
|
Phantasy so that justice may be done. Thank you, I appreciate this. please
|
|||
|
reply
|
|||
|
|
|||
|
--------------------------------------------------------------------
|
|||
|
|
|||
|
The IIRG will be presenting a transcription of the Tape in Phantasy 17
|
|||
|
and hopefully this will correct some of the dis-information floating
|
|||
|
around out there and clear the matter up once and for all.
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
Section [7]: PHANTASY TIDBITS: News and Views of Interest
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
PUPILS HAD BOMB GUIDE
|
|||
|
---------------------
|
|||
|
|
|||
|
150 - Page Manual Came from Computer
|
|||
|
|
|||
|
Lebanon,CT. - A 150-page manual on how to make bombs and homemade explosives
|
|||
|
has been found in the hands of 13-year-olds in a Connecticut middle school.
|
|||
|
The inch-thick book, chock full of tips on bomb building and vandalizing
|
|||
|
schools was discovered last week at the Lebanon Middle School after a
|
|||
|
Mathematics teacher overheard a discussion among a few of his pupils.
|
|||
|
"It explained how to make bombs and how to cause mayhem at the school." said
|
|||
|
resident State Trooper Mark Maynard, who was called in to investigate.
|
|||
|
The manual had been obtained through a non-school computer bulletin board by
|
|||
|
an older brother of one of the middle school pupils.
|
|||
|
"The boy who obtained it is a computer whiz. He said he obtained it for the
|
|||
|
purpose of doing a class project," Maynard Said.
|
|||
|
But four or five copies of the manual wound up in the hands of middle school
|
|||
|
pupils and were being sold to seventh- and eighth-graders for $10.00 apiece.
|
|||
|
The older brother, a high-school student, apparently retrieved the computer
|
|||
|
information about two months ago, but it did not surface at the middle school
|
|||
|
until march 14th, not long after the bombing at the World Trade Center in New
|
|||
|
York City.
|
|||
|
"The first concern was that it was related to that," Maynard said. "It just
|
|||
|
happened to surface right after it".
|
|||
|
And while retrieving such information falls under Freedom of Speech and is
|
|||
|
not illegal, it is against school rules to sell anything not for a school
|
|||
|
Fund-raiser, said Bert Bosse, principal of the middle school.
|
|||
|
Superintendent of Schools Albert Vertefeuille said some disciplinary actions
|
|||
|
will be taken against the pupils for selling the computer document on school
|
|||
|
grounds, but he declined to elaborate on what that action would be.
|
|||
|
The computer information was not obtained through any school computers, but a
|
|||
|
copy was later placed on one of the computers at nearby Lyman Memorial High
|
|||
|
School. That also violated school rules, the school officials said.
|
|||
|
"The thing that bothered us was that there was specific things on how to
|
|||
|
terrorize schools,teachers,and principals," said Bosse. "My biggest concern
|
|||
|
was not that any of the kids we dealt with would have used this for terrorism,
|
|||
|
but they may have tried to attempt [to build explosives] themselves and caused
|
|||
|
serious injuries."
|
|||
|
Nationwide, hundreds of children and teenagers are maimed or killed every
|
|||
|
year from experimentation with homemade explosives. Information obtained from
|
|||
|
computer bulletin boards on homemade bomb making has been a major contributor
|
|||
|
to such mishaps, police said.
|
|||
|
"I think the problem is there is no law pertaining to this," Maynard Said.
|
|||
|
In connecticut, teenagers learning how to manufacture bombs through home and
|
|||
|
school computers contributed a nearly 50 percent increase in the number of
|
|||
|
homemade explosives discovered last year by state police.
|
|||
|
"We are definitely seeing more of it. Kids by nature experiment", said Sgt.
|
|||
|
Kenneth Startz, who supervises the emergency services ddivision of the state
|
|||
|
police, which includes the bomb squad.
|
|||
|
"Bosse described the boys involved with the incident at the middle school as
|
|||
|
good pupils who had not been in trouble before. He said he believed they were
|
|||
|
driven by curiosity than anything else.
|
|||
|
All of the kids were very cooperative, Bosse said. The parents were totally
|
|||
|
shocked when they read what was in it".
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
HIGHWAY SIGN HAS OFFICIALS BLUSHING
|
|||
|
|
|||
|
Fairfield,CT.-Thousands of motorists traveling South-bound on Interstate-95
|
|||
|
got a terse message on an electronic traffic sign: "YOU ALL SUCK".
|
|||
|
We dont know how they did it," said State Police Lieut. Albert Masek of
|
|||
|
troop G in Westport. "We thought maybe a computer hacker did it"
|
|||
|
The incident was reported on the morning shift Sunday, Apr. 4th and
|
|||
|
responding troopers could not disable the large, yellow lights on the
|
|||
|
portable, 10-foot-high sign located near Exit 19. The sign displayed the
|
|||
|
message for several hours until a state Department of Transportation crew
|
|||
|
got it covered with a large tarp.
|
|||
|
DOT spokesman William Keish said Monday that the sign can only be programmed
|
|||
|
from DOT offices in Wethersfield or State Police headquarters in Meriden.
|
|||
|
Bill Stoeckerd, director of DOT's incident management office reprogrammed it
|
|||
|
Monday.
|
|||
|
"Were taking steps with the contractor to upgrade our security," said
|
|||
|
Stoeckerd. "We really don't know, whether [the pranksters] were able to come
|
|||
|
into access accidentally or not."
|
|||
|
He said the sign, in use since August, was recently the target of a similar
|
|||
|
prank, but not the exact same wording.
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
VULGAR HIGHWAY MESSAGES AN OUTSIDE JOB, POLICE SAY
|
|||
|
|
|||
|
Connecticut State Police have concluded a computer infiltrator is
|
|||
|
responsible for two crude messages, the latest lambasting Gov. Lowell P.
|
|||
|
Weicker Jr., that have flashed on a highway electronic message board in
|
|||
|
Fairfield,Ct. in the past two weeks.
|
|||
|
CT State Police Master Sgt. Scott O'Mara would not comment on reports that
|
|||
|
police had identified a suspect, he said "the 10 day old investigation was
|
|||
|
progressing".
|
|||
|
The message board reportedly can only be operated from the state Department
|
|||
|
of Transportation operations center in Wethersfield or the state police
|
|||
|
communications center in Meiden,CT. but police believe the vulgar messages
|
|||
|
did not come from either of those locations.
|
|||
|
Instaed,"We believe it's a computer crime by modem through a phone line",
|
|||
|
O'Mara Said.
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
IIRG NOTE ON HIGHWAY SIGN
|
|||
|
|
|||
|
At the time of the completion of this issue of Phantasy, a suspect has been
|
|||
|
caught in the Highway Prank situation in Fairfield,CT.
|
|||
|
We'll bring you more details in Phantasy Issue 17
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
Section [8]: IIRG Distribution Sites
|
|||
|
(or Gateways to Oblivion)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
////// ////// /////// ////////
|
|||
|
// // // // //
|
|||
|
// // /////// // ////
|
|||
|
// // // // // //
|
|||
|
////// * ////// * // // * /////////
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
IIRG World HQ: The Rune Stone BBS
|
|||
|
14.4k HST
|
|||
|
Phantasys Home Board
|
|||
|
Complete IIRG Archives 3000+ Files
|
|||
|
(203)-832-8441
|
|||
|
|
|||
|
|
|||
|
IIRG Distribution Site 1: Wired World BBS
|
|||
|
INC Europe
|
|||
|
TPC Courier (WHQ)
|
|||
|
THP
|
|||
|
IIRG Distribution Site
|
|||
|
Sysop: Digital Justice
|
|||
|
+39-89-254138
|
|||
|
|
|||
|
IIRG Distribution Site 2: Cyberdyne Network Germany
|
|||
|
United Forces
|
|||
|
Sysop: E605
|
|||
|
+49-5341-59004
|
|||
|
+49-5341-54052
|
|||
|
|
|||
|
|
|||
|
IIRG Distribution Site 3: The Sanitarium
|
|||
|
Sysops: Morbid Angel [INC/ACID]
|
|||
|
Spectral Illusion [ACID/RAZOR]
|
|||
|
IIRG Distribution Site
|
|||
|
ACID Member Board
|
|||
|
INC Courier Board
|
|||
|
RAZOR 1911 Courier Board
|
|||
|
VISA World Headquarters
|
|||
|
(817)PRI-VATE
|
|||
|
|
|||
|
IIRG Distribution Site 4: The WareHouse
|
|||
|
(203)-231-8980
|
|||
|
OVER A GIG ONLINE
|
|||
|
Sysop: Ionizer
|
|||
|
|
|||
|
IIRG Distribution Site 5: Hollow Tree Productions
|
|||
|
Sysop: Phantasm
|
|||
|
Syndicate
|
|||
|
Extreme*Net
|
|||
|
(313)-EXE-TREME
|
|||
|
|
|||
|
IIRG Distribution Site 6: The Web
|
|||
|
203-869-0938
|
|||
|
OOFNet/CCiNet
|
|||
|
ACiD Member Board
|
|||
|
VECTOR World HQ
|
|||
|
ESP Courier HQ
|
|||
|
Phantasy Dist.
|
|||
|
9600+ Only
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
|
|||
|
Section [8]: Phantasy Distribution Sites
|
|||
|
|
|||
|
Phantasy's Distribution Site's are continually growing,we apologize if you
|
|||
|
called a board and didn't find the Mag. Network Distribution Sites will
|
|||
|
have the Issues first, we suggest calling one of them if a problem does
|
|||
|
arise.
|
|||
|
|
|||
|
|
|||
|
1. Lightning Systems
|
|||
|
(414) 363-4282
|
|||
|
200 Million Bytes OnLine
|
|||
|
USRobotics Dual Standard HST/V.32bis
|
|||
|
2400 thru 14.4k v.32bis/HST
|
|||
|
|
|||
|
2. The Works BBS
|
|||
|
Waffle Net v1.65
|
|||
|
[617]/861-8976
|
|||
|
3/12/24/96/14400b 7dy/24hr N,8,1
|
|||
|
Lexington, MA
|
|||
|
200 Megabytes of Storage
|
|||
|
99.44% pure textfiles
|
|||
|
Remote cDc Node (Very remote)
|
|||
|
|
|||
|
3. Pipers Pit BBS
|
|||
|
19,200-9600 HST ONLY!!
|
|||
|
24 Hours a Day
|
|||
|
THG Distro Site 1300 Megs
|
|||
|
(203)PRI-VATE [2 Nodes]
|
|||
|
|
|||
|
4. The Dickinson Nightlight
|
|||
|
(713)-337-1452
|
|||
|
Der WeltanSchauung Distro Site (World View Magazine)
|
|||
|
Phantasy Distro Site
|
|||
|
|
|||
|
5. Abiogenesis,
|
|||
|
3/12/24/96/14400 Practical Peripherals 14400FXSA
|
|||
|
Fidonet 1:280/310.
|
|||
|
Phone (816)734-4732
|
|||
|
|
|||
|
Phantasy is also available on these systems,
|
|||
|
|
|||
|
Ripco II BBS The Hell Pit
|
|||
|
(312)-528-5020 (708)-459-7267
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
PHANTASY(C) IIRG 1991,1992,1993
|
|||
|
May Odin Guide Your Way!
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|