5873 lines
288 KiB
Plaintext
5873 lines
288 KiB
Plaintext
![]() |
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue 27, File 1 of 11
|
|||
|
|
|||
|
Phrack Inc. Newsletter Issue XXVII Index
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
June 20, 1989
|
|||
|
|
|||
|
|
|||
|
Greetings and welcome to Issue 27 of Phrack Inc. The pressure is on with
|
|||
|
SummerCon '89 just a couple short days away. We're sorry it has taken so long
|
|||
|
to get this issue out, but summer break has created more responsibilities and
|
|||
|
busy schedules than we have ever had to deal with while in school. Still, I
|
|||
|
think you will agree that this issue was worth the wait.
|
|||
|
|
|||
|
This issue we feature a new updated NUA and Datex-P list from Oberdaemon
|
|||
|
of Switzerland and Chapter 7 of the Future Transcendent Saga (taking into
|
|||
|
account that the SPAN and NSFnet files were chapters 5 and 6). We also present
|
|||
|
the second part of the COSMOS file written by King Arthur.
|
|||
|
|
|||
|
Before we get to the main contents of the issue, we have a few comments to
|
|||
|
make regarding security and Phrack Inc.'s Internet access;
|
|||
|
|
|||
|
Thanks to a friend, we at Phrack Inc. have become aware of one of the main
|
|||
|
techniques that the National Security Agency (NSA) uses to perform surveillance
|
|||
|
on the wide area networks.
|
|||
|
|
|||
|
In certain messages that certain government agencies distribute, special
|
|||
|
phone numbers are included; WATS (800) numbers, to be more specific. As these
|
|||
|
messages are distributed around the continent via various netmail and file
|
|||
|
transfer schemes, they are passed through several surveillance stations. All
|
|||
|
of their stations perform one function, and in Unix terms, that function is
|
|||
|
called "grep."
|
|||
|
|
|||
|
Grep stands for G>lobal R>egular E>xpression search and P>rint. The grep
|
|||
|
does simple string matching. Every instance of these special 800-numbers in an
|
|||
|
email message (or batch of them) is flagged, recorded, and the record is mailed
|
|||
|
to certain intelligence agencies by the surveillance stations.
|
|||
|
|
|||
|
Here are the networks that we are reasonably certain that this practice is
|
|||
|
performed on:
|
|||
|
|
|||
|
* USEnet : Email is only checked in certain places, but ALL netnews (including
|
|||
|
alt and any other nonstandard newsgroups) are flagged by a single
|
|||
|
government domain SUN-3 that shall remain nameless.
|
|||
|
* ARPAnet : All mail going through a standard BBN (Bolt, Bernack, and
|
|||
|
Neumann... a Cambridge/MIT spinoff) Internet controller will be
|
|||
|
flagged, but the only information recorded by the controller is the
|
|||
|
source and destination TCP/IP addresses of the message. But when
|
|||
|
you consider that this involves ***ALL*** DARPA mailing lists, you
|
|||
|
get a visualization of the magnitude. The reason more complex
|
|||
|
information is NOT recorded is that this network is the only
|
|||
|
AUTHORIZED place that these messages with the hot WATS are supposed
|
|||
|
to appear. You will see what this means in a moment.
|
|||
|
* BITnet : Large IBM mainframe with I/O channel cycles to spare should have no
|
|||
|
problem scanning mail from one of the most publically accessable
|
|||
|
"free" networks.
|
|||
|
* Fidonet : The Secret Service scans this for credit card and other violations.
|
|||
|
It is not too hard for them to check for the (800)'s, too.
|
|||
|
* W.Union : All international telex lines are scanned to match a whole lot of
|
|||
|
stuff, especially drug-related information. The phone numbers are
|
|||
|
on their list.
|
|||
|
|
|||
|
We have other suspicions, but we are withholding them for now.
|
|||
|
|
|||
|
The other news is equally disturbing because it strikes us a little close
|
|||
|
to home. We are temporarily losing our network access. As of June 27, 1989
|
|||
|
through August 28, 1989 we will not have access to our accounts on UMCVMB
|
|||
|
mainframe system. Make no attempt to mail us to our addresses there until
|
|||
|
August 28, 1989. However, every cloud has a silver lining and this is no
|
|||
|
exception. For networks people who wish to submit files to Phrack Inc. during
|
|||
|
this time period we proudly present our friend and associate, Hatchet Molly.
|
|||
|
He can be reached at "TK0GRM2@NIU.BITNET" and/or
|
|||
|
"TK0GRM2%NIU.BITNET@CUNYVM.CUNY.EDU".
|
|||
|
|
|||
|
So here is to another great issue of Phrack Inc!
|
|||
|
|
|||
|
Taran King Knight Lightning
|
|||
|
|
|||
|
Hatchet Molly
|
|||
|
TK0GRM2@NIU.BITNET
|
|||
|
TK0GRM2%NIU.BITNET@CUNYVM.CUNY.EDU
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Table of Contents:
|
|||
|
|
|||
|
1. Phrack Inc. XXVII Index by Taran King and Knight Lightning
|
|||
|
2. Operating The IBM VM/SP CP by Taran King
|
|||
|
3. Introduction To MIDNET: Chapter Seven Of The FTS by Knight Lightning
|
|||
|
4. NUA List For Datex-P And X.25 Networks by Oberdaemon
|
|||
|
5. COSMOS: COmputer System for Mainframe OperationS (Part Two) by King Arthur
|
|||
|
6. Looking Around In DECnet by Deep Thought
|
|||
|
7. The Making Of A Hacker by Framstag
|
|||
|
8. Sending Fakemail In Unix by Dark OverLord
|
|||
|
9. The Postal Inspection Service by Vendetta
|
|||
|
10. Phrack World News XXVII/Part 1 by Knight Lightning
|
|||
|
11. Phrack World News XXVII/Part 2 by Knight Lightning
|
|||
|
12. Phrack World News XXVII/Part 3 by Knight Lightning
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue 27, File 2 of 12
|
|||
|
|
|||
|
|
|||
|
Operating the IBM VM/SP CP
|
|||
|
|
|||
|
(IBM Virtual Machine System Product Control Program)
|
|||
|
|
|||
|
An information article researched by
|
|||
|
|
|||
|
Taran King
|
|||
|
|
|||
|
May 18, 1989
|
|||
|
|
|||
|
|
|||
|
This article is for the purpose of understanding the Control Program (CP)
|
|||
|
portion of IBM's VM/SP. This is basically a separate section of VM/CMS known
|
|||
|
as CP (with full screen editors, the CP level is indicated in the lower right
|
|||
|
hand corner of the screen and for line-by-line editors, before the command line
|
|||
|
and after hitting carriage returns, it should say "CP") and it's purpose is to
|
|||
|
manage real resources. Any command that involves something outside of your
|
|||
|
virtual machine must communicate with CP. If CMS does not recognize a command
|
|||
|
you give it, it will give it to CP.
|
|||
|
|
|||
|
The user generally enters the CP stage after a program flops or if you get
|
|||
|
disconnected. You can also enter the CP stage by hitting PA1 which is a
|
|||
|
function key of sorts. PA1 toggles between CP and CMS while on-line and if you
|
|||
|
re-login after being disconnected, PA1 can be used besides the BEGIN command
|
|||
|
which will be spoken about later in this article.
|
|||
|
|
|||
|
Generally, VM/CMS systems are well equipped with help files so if anything I
|
|||
|
print becomes unclear to you, from CMS mode, type HELP CP XXX where XXX is the
|
|||
|
CP command you want information on.
|
|||
|
|
|||
|
To start this article off, I'm printing off the IBM-Defined Class and the
|
|||
|
Function Types as listed in the IBM VM/SP CP manual. This essentially tells
|
|||
|
you what privileges you have with your assigned class.
|
|||
|
|
|||
|
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
|
|||
|
IBM-Defined Function User &
|
|||
|
Class Type Functions
|
|||
|
~~~~~~~~~~~ ~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
A O Operations: The primary sysop can issue all
|
|||
|
class A commands. The class A user controls
|
|||
|
the VM/SP system. Class A is assigned to the
|
|||
|
user at the VM/SP system console during IPL.
|
|||
|
The primary sysop is responsible for the
|
|||
|
availability of the VM/SP system and its
|
|||
|
communication lines and resources. In
|
|||
|
addition, the class A user controls system
|
|||
|
accounting, broadcast messages, virtual
|
|||
|
machine performance options, and other
|
|||
|
command operands that affect the overall
|
|||
|
performance of the VM/SP. The sysop controls
|
|||
|
operation of the real machine using the
|
|||
|
system control panel and console device.
|
|||
|
NOTE: The class A sysop who is automatically
|
|||
|
logged on during CP initialization is
|
|||
|
designated as the primary sysop.
|
|||
|
|
|||
|
B R Resource: The system resource operator can
|
|||
|
issue all class B commands. The class B user
|
|||
|
controls allocation and deallocation of all
|
|||
|
the real resources of the VM/SP system,
|
|||
|
except those controlled by the primary sysop
|
|||
|
and spooling operator.
|
|||
|
|
|||
|
C P Programmer: The system programmer can issue
|
|||
|
all class C commands. The class C user
|
|||
|
updates certain functions of the VM/SP
|
|||
|
system. The system programmer can modify
|
|||
|
real storage in the real machine.
|
|||
|
|
|||
|
D S Spooling: The spooling operator can issue
|
|||
|
all class D commands. The class D user
|
|||
|
controls spool data files and specific
|
|||
|
functions of the system's unit record
|
|||
|
equipment.
|
|||
|
|
|||
|
E A Analyst: The system analyst can issue all
|
|||
|
class E commands. The class E user displays
|
|||
|
the contents of real storage, performs the
|
|||
|
functions required to generate saved systems
|
|||
|
and discontiguous saved segments, and
|
|||
|
controls the collecting and recording of
|
|||
|
performance measurement data. This class of
|
|||
|
user can display specified real storage areas
|
|||
|
on the virtual operator's console or on a
|
|||
|
spooled virtual printer, but cannot modify
|
|||
|
real storage.
|
|||
|
|
|||
|
F C Customer Engineer: The service
|
|||
|
representative can issue all class F
|
|||
|
commands. The class F user obtains, and
|
|||
|
examines, in detail, certain data about input
|
|||
|
and output devices connected to the VM/SP
|
|||
|
system. The service representative can
|
|||
|
establish extensive recording mode for one
|
|||
|
I/O device at a time and can cause the
|
|||
|
recording of repressible machine check errors
|
|||
|
to be initiated or resumed.
|
|||
|
|
|||
|
G G General: The general user can issue all
|
|||
|
class G commands. The class G user controls
|
|||
|
functions associated with the execution of
|
|||
|
his virtual machine. A general user cannot
|
|||
|
display or modify real storage.
|
|||
|
|
|||
|
ANY ANY The ANY classification is given to certain CP
|
|||
|
commands that are available to any user.
|
|||
|
These are primarily for the purpose of
|
|||
|
gaining and relinquishing access to the VM/SP
|
|||
|
system.
|
|||
|
|
|||
|
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
|
|||
|
|
|||
|
The following is the list of commands available along with a brief description
|
|||
|
as to what they do and/or formatting and then ending with the IBM-Defined
|
|||
|
Class and Function Type.
|
|||
|
|
|||
|
* : From CP, one may use the * command to annotate the terminal console sheet
|
|||
|
~ or the terminal display screen with a comment. In other words, type * and
|
|||
|
then any string of characters you would, for some reason, to be present on the
|
|||
|
screen thereafter.
|
|||
|
Privilege Class: ANY
|
|||
|
Function Type: N/A
|
|||
|
|
|||
|
#CP : This command is used to execute a CP Command while in a virtual machine
|
|||
|
~~~ command environment without first signaling attention to get to the CP
|
|||
|
command environment which means that when typing P <command> to perform a CP
|
|||
|
operation, CP directly receives the command whereas CP <command> merely queues
|
|||
|
the command from CP.
|
|||
|
Privilege Class: ANY
|
|||
|
Function Type: ANY
|
|||
|
|
|||
|
ACNT : The ACNT command is used to create accounting records for logged on
|
|||
|
~~~~ users and to reset accounting data. It also closes a spool file that
|
|||
|
is accumulating accounting records.
|
|||
|
Privilege Class: A
|
|||
|
Function Type: O
|
|||
|
|
|||
|
ADSTOP : The ADSTOP command is used to halt the execution of a virtual machine
|
|||
|
~~~~~~ at a virtual instruction point. The hexloc variable may be placed
|
|||
|
after the word ADSTOP which is a 6 character hexadecimal representation of the
|
|||
|
virtual instruction address where the execution is to be halted. The OFF
|
|||
|
option of the ADSTOP command cancels any previous ADSTOP setting.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
ATTN : Use the ATTN command to make an attention interruption pending at your
|
|||
|
~~~~ virtual console.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
AUTOLOG : This command allows the user to log on any virtual machine defined
|
|||
|
~~~~~~~ in the directory.
|
|||
|
Privilege Level: A, B
|
|||
|
Function Type: O
|
|||
|
|
|||
|
BACKSPAC : The BACKSPAC command is used to restart or reposition the current
|
|||
|
~~~~~~~~ output on a real punch or printer.
|
|||
|
Privilege Class: D
|
|||
|
Function Type: S
|
|||
|
|
|||
|
BEGIN or B : The BEGIN command by itself from CP mode will return the user to
|
|||
|
~~~~~~~~~~ CMS mode in the place where he/she left off before he/she was
|
|||
|
disconnected or thrown into CP. The BEGIN command can also be followed by a
|
|||
|
hex location as to where to start in the case of the user wanting to be doing
|
|||
|
something other than what was previously occurring.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
CHANGE or CH : In use of the CHANGE command, there are subcommands with
|
|||
|
~~~~~~~~~~~~ variables. Generally, the "name" variable is 1 to 4 characters
|
|||
|
in length. The following are the subcommands with functions and formatting:
|
|||
|
|
|||
|
o READER or RDR : changes reader spool files.
|
|||
|
o PRINTER or PRT : changes printer spool files.
|
|||
|
o PUNCH or PCH : changes punch spool files.
|
|||
|
o CLASS c1 : designates an existing class where c1 is a 1-character
|
|||
|
alphanumerical field from A to Z or 0 to 9.
|
|||
|
o spoolid : spoolid number of file that is to be changed.
|
|||
|
o FORM form1 : 1 to 8 character alphanumeric form name used to select files
|
|||
|
to be changed (form1).
|
|||
|
o ALL : changes all of your spool files.
|
|||
|
o HOLD : prevents a file from being printed, punched, or read until
|
|||
|
released.
|
|||
|
o NOHOLD : releases the specified file from the user's HOLD status.
|
|||
|
o DIST dist : changes the distribution code to variable "dist".
|
|||
|
o COPY(*)nnn : specifies number of copies of the file you want spooled,
|
|||
|
which is valid only for printer or punch files. "nnn" is a
|
|||
|
number from 1 to 255 and the "*" is present in the case of
|
|||
|
a 3800 printer being used so that copies will be made in the
|
|||
|
printer internally.
|
|||
|
o FLASH name nnn : signifies that a form's overlay contained in the 3800
|
|||
|
printer is to be superimposed onto certain pages of
|
|||
|
output. "nnn" is a number from 0 to 255 representing
|
|||
|
the number of copies to be superimposed.
|
|||
|
o MODIFY name (n) : allows text alteration by preventing information
|
|||
|
printing or by adding labels to output. "n" selects a
|
|||
|
keyword in CHARS to be used for copy modification text.
|
|||
|
o CHARS name1 (name2(name3(name4)))
|
|||
|
CHARS name1(CH names2(CH names3(CH names4))) : specifies character
|
|||
|
arrangement table when printing a file. There can be
|
|||
|
up to 4 names.
|
|||
|
o FCB name : controls vertical spacing of output on a page.
|
|||
|
o FORM form2 : changes spool form name of file to form2.
|
|||
|
o NAME fn (ft) : assigns identification to spool file in CMS format
|
|||
|
filename and filetype.
|
|||
|
o NAME dsname : assigns identification to spool file in non-CMS format
|
|||
|
where "dsname" is from 1 to 24 characters, suitable for
|
|||
|
specifying OS or DOS files.
|
|||
|
Privilege Class: S, G
|
|||
|
Function Type: D, G
|
|||
|
|
|||
|
CLOSE or C : The CLOSE command terminates spooling activity on any virtual
|
|||
|
~~~~~~~~~~ spooled unit record or console device. It Contains the following
|
|||
|
subcommands to be followed by the letter C or the word CLOSE:
|
|||
|
|
|||
|
o READER or RDR
|
|||
|
o PRINTER or PRT
|
|||
|
o PUNCH or PCH
|
|||
|
o FORM form1
|
|||
|
o HOLD
|
|||
|
o NOHOLD
|
|||
|
o DIST dist
|
|||
|
o NAME fn (ft)
|
|||
|
o NAME dsname
|
|||
|
o vaddr : virtual address (cuu) of device to be closed.
|
|||
|
o CONSOLE : closes virtual machine's console spool file which makes it a
|
|||
|
printer spool file.
|
|||
|
o PURGE : closes and immediately purges from the virtual machine the
|
|||
|
output spool files. No output file is produced.
|
|||
|
o CHAIN : only valid for VM/SP HPO Release 4.2 and Profs Spool File
|
|||
|
Enhancement PRPQ. Indicates that the punchfile is to be
|
|||
|
chained.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
COMMANDS or COMM : Use COMMAND to list the commands and diagnose codes you are
|
|||
|
~~~~~~~~~~~~~~~~ authorized to use.
|
|||
|
Privilege Class: ANY
|
|||
|
Function Type: ANY
|
|||
|
|
|||
|
COUPLE : Using the COUPLE command connects your virtual non-dedicated
|
|||
|
~~~~~~ channel-to-channel device to another user's virtual device of the
|
|||
|
same type or to another one of your own virtual devices of the same type. The
|
|||
|
format of this command is in the form of COUPLE vaddr1 TO userid vaddr2. The
|
|||
|
variable vaddr1 is your virtual address and the variables userid vaddr2
|
|||
|
identify the userid and virtual address of that userid to be connected to.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
CP : The CP command may precede the command to be processed, but it is not
|
|||
|
~~ necessary. Generally, the CP command is used from CMS mode to queue CP
|
|||
|
functions by typing CP <command>.
|
|||
|
Privilege Class: ANY
|
|||
|
Function Type: ANY
|
|||
|
|
|||
|
CPTRAP : The CPTRAP command creates a reader file of a selected trace table,
|
|||
|
~~~~~~ CP interface, and virtual machine interface entries for problem
|
|||
|
determination.
|
|||
|
Privilege Class: C
|
|||
|
Function Type: P
|
|||
|
|
|||
|
DCP : This command displays the contents of real storage locations at the
|
|||
|
~~~ terminal.
|
|||
|
Privilege Class: C, E
|
|||
|
Function Type: P
|
|||
|
|
|||
|
DEFINE or DEF : The DEFINE command in CP is used to alter your virtual machine
|
|||
|
~~~~~~~~~~~~~ configuration or channel operating mode. There are a LOT of
|
|||
|
subcommands that are used with the DEFINE command such as RDR or PRT or PCH
|
|||
|
and the list goes on and on. If you want details, there is a help file (type
|
|||
|
HELP CP DEF) that is almost 600 lines that goes into detail on each
|
|||
|
subcommand.
|
|||
|
Privilege Class: B, G
|
|||
|
Function Type: R, G
|
|||
|
|
|||
|
DETACH or DET : The DETACH command is used to remove a virtual device from the
|
|||
|
~~~~~~~~~~~~~ virtual machine. The subcommands are as follows:
|
|||
|
|
|||
|
o vaddr (vaddr...) : used for multiple addresses to be detached where vaddr
|
|||
|
is the virtual address (cuu) of the device to be
|
|||
|
detached.
|
|||
|
o vaddr-vaddr : used to detach a range of addresses.
|
|||
|
o CHANNEL c : detaches the real address of the channel.
|
|||
|
Privilege Class: B, G
|
|||
|
Function Type: R, G
|
|||
|
|
|||
|
DIAL : Using the DIAL command logically connects a switched line, leased line,
|
|||
|
~~~~ locally attached, or remote Binary Synchronous (BSC) terminal to a
|
|||
|
previously logged-on multiple-access virtual machine. It is in the format of
|
|||
|
DIAL userid (vaddr) where the userid is that to be connected to and the
|
|||
|
vaddr is the optional virtual address.
|
|||
|
Privilege Class: ANY
|
|||
|
Function Type: ANY
|
|||
|
|
|||
|
DISABLE : The DISABLE command prevents low speed communications lines from
|
|||
|
~~~~~~~ accessing the system.
|
|||
|
Privilege Class: A, B
|
|||
|
Function Type: R
|
|||
|
|
|||
|
DISCONN or DISC : The DISCONNECT command is used to disconnect your terminal
|
|||
|
~~~~~~~~~~~~~~~ from the system while the virtual machine continues
|
|||
|
operation. Using the DISC HOLD or DISC HO option, you specify that the
|
|||
|
communications line is not to be disabled which allows you to avoid re-dialing
|
|||
|
the system.
|
|||
|
Privilege Class: ANY
|
|||
|
Function Type: ANY
|
|||
|
|
|||
|
DISPLAY or D : The DISPLAY command allows you to display virtual machine
|
|||
|
~~~~~~~~~~~~ components at your terminal. Depending on what variable
|
|||
|
follows the D or DISPLAY command from CP, you can display virtual storage
|
|||
|
locations, storage keys, general registers, floating-point registers, control
|
|||
|
registers, vector registers, VAC (Vector Activity Counter), VSR (Vector Status
|
|||
|
Register), VMR (Vector Mask Register), PSW (Program Status Word), CAW (Channel
|
|||
|
Address Word), and CSW (Channel Status Word).
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
DMCP : This command prints the contents of real storage locations on a user's
|
|||
|
~~~~ virtual spooled printer.
|
|||
|
Privilege Class: C, E
|
|||
|
Function Type: P
|
|||
|
|
|||
|
DRAIN : The DRAIN command stops spooling operations on a specified real unit's
|
|||
|
~~~~~ read devices after the file currently being processed has been
|
|||
|
completed.
|
|||
|
Privilege Class: D
|
|||
|
Function Type: S
|
|||
|
|
|||
|
DUMP or DU : Use the DUMP command to print the contents of various components
|
|||
|
~~~~~~~~~~ of the virtual machine on the virtual spooled printer. Depending
|
|||
|
on what variable is placed after the DUMP or DU command, the items printed
|
|||
|
include virtual PSW (Program Status Word), general registers, floating-point
|
|||
|
registers, control registers, storage keys, and virtual storage locations.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
ECHO or EC : Defaulted at 1, the ECHO command places the terminal in the echo
|
|||
|
~~~~~~~~~~ environment in which any line entered is transmitted unchanged
|
|||
|
back to the terminal a specified number of times, depending on the variable
|
|||
|
entered immediately after the word ECHO or EC.
|
|||
|
Privilege Type: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
ENABLE : Use the ENABLE command to enable the previously disabled or nonabled
|
|||
|
~~~~~~ devices so users may access the system.
|
|||
|
Privilege Class: A, B
|
|||
|
Function Type: R
|
|||
|
|
|||
|
EXTERNAL or EXT : The EXTERNAL command allows the user to simulate an external
|
|||
|
~~~~~~~~~~~~~~~ interrupt to the virtual machine and to return control to
|
|||
|
that machine. The hexadecimal code following the word EXTERNAL or EXT is
|
|||
|
associated with the external interrupt, the default being the number 40 which
|
|||
|
is associated with the external interrupt button on a system console.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
FLUSH : The FLUSH command halts and immediately purges on hold the current
|
|||
|
~~~~~ output on a specified unit record device.
|
|||
|
Privilege Class: D
|
|||
|
Function Type: S
|
|||
|
|
|||
|
FORCE : This command forces a logoff of any user of the system.
|
|||
|
~~~~~
|
|||
|
Privilege Class: A
|
|||
|
Function Type: O
|
|||
|
|
|||
|
FREE : Use the FREE command to remove a set of spool files belonging to a
|
|||
|
~~~~ specified user from a system hold status.
|
|||
|
Privilege Class: D
|
|||
|
Function Type: S
|
|||
|
|
|||
|
HALT : The HALT command terminates any active channel program on a specified
|
|||
|
~~~~ real device.
|
|||
|
Privilege Class: A
|
|||
|
Function Type: O
|
|||
|
|
|||
|
HOLD : The HOLD command places user spool files in a system hold status.
|
|||
|
~~~~
|
|||
|
Privilege Class: D
|
|||
|
Function Type: S
|
|||
|
|
|||
|
INDICATE or IND : At your terminal, you can display the use of and contention
|
|||
|
~~~~~~~~~~~~~~~ for major system resources with the INDICATE command. The
|
|||
|
following variables that follow the word INDICATE or IND show the following
|
|||
|
data:
|
|||
|
|
|||
|
o LOAD : shows number of users in queue 1 and queue 2, the usage of real
|
|||
|
storage, and the ratio of active users to users being serviced.
|
|||
|
This is done by returning values that indicate operating load on
|
|||
|
the system.
|
|||
|
o USER : displays the amounts of system resources used by your virtual
|
|||
|
machine in the current terminal session.
|
|||
|
Privilege Class: A, E, G
|
|||
|
Function Type: O, A, G
|
|||
|
|
|||
|
IPL or I : Generally used to return to CMS via the IPL CMS or I CMS command,
|
|||
|
~~~~~~~~ the IPL command simulates an initial program load function for a
|
|||
|
virtual machine. Subcommands are as follows:
|
|||
|
|
|||
|
o vaddr : virtual address (cuu) of the device that contains the nucleus to
|
|||
|
be loaded.
|
|||
|
o cylno : cylinder containing the IPL data which defaults to 0.
|
|||
|
o nnnnn : block address containing the IPL data which defaults to 0.
|
|||
|
o CLEAR : sets virtual storage space to binary zeros before the operating
|
|||
|
system is loaded.
|
|||
|
o NOCLEAR : allows contents of your virtual storage space to remain
|
|||
|
unchanged prior to program load.
|
|||
|
o STOP : halts the virtual machine during the IPL procedure just before the
|
|||
|
initial PSW is loaded.
|
|||
|
o ATTN : generates an attention interrupt to the virtual machine during the
|
|||
|
IPL procedure.
|
|||
|
o PARM p1 (p2...) : processes up to 64 bytes of data to your virtual
|
|||
|
machine's general registers starting with the high
|
|||
|
order byte of general register 0.
|
|||
|
o systemname : simulates IPL function when loading a named system that was
|
|||
|
previously saved.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
LINK : The LINK command is used to make a device that is associated with
|
|||
|
~~~~ another virtual machine available at your virtual machine configuration
|
|||
|
based upon info in that user's directory entry. This command is in the format
|
|||
|
of LINK TO userid vaddr1 AS vaddr2 (mode) ((PASS=) password(1)).
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
LOADBUF : On a 1403 printer, the LOADBUF command loads the Universal Character
|
|||
|
~~~~~~~ Set (UCS) with a specified print train or chain image. On a
|
|||
|
3203, 3211, 3212, 4245, or 4248 printer, it loads the UCS or the Forms Control
|
|||
|
Buffer (FCB) with a specified image. On a 3289 Model 4 printer, it loads the
|
|||
|
Font Offset Buffer (FOB) with the image print belt and the FCB.
|
|||
|
Privilege Class: D
|
|||
|
Function Type: S
|
|||
|
|
|||
|
LOADVFCB : This command specifies the forms control buffer image for different
|
|||
|
~~~~~~~~ virtual spooled printers. The variables that follow it include:
|
|||
|
|
|||
|
o vaddr
|
|||
|
o FCB : required reserved keyword meaning Forms Control Buffer.
|
|||
|
o name : a name that is system defined.
|
|||
|
o INDEX (nn) : place initial printing position in number nn for the 3211
|
|||
|
printer.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
LOCATE : Use the LOCATE command to find the addresses of CP control blocks
|
|||
|
~~~~~~ associated with a particular user, a user's device, or a real system
|
|||
|
device.
|
|||
|
Privilege Class: C, E
|
|||
|
Function Type: P
|
|||
|
|
|||
|
LOCK : This command permanently locks in selected pages of real storage.
|
|||
|
~~~~
|
|||
|
Privilege Class: A
|
|||
|
Function Type: O
|
|||
|
|
|||
|
LOGOFF or LOGOUT or LOG : Used to terminate a virtual machine session and
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~ disconnect your virtual machine from the system,
|
|||
|
this command can be used with the HOLD option (i.e. LOG HOLD) for retaining
|
|||
|
the connection allowing for a switched communications line to enable one to
|
|||
|
log on without re-dialing the system.
|
|||
|
Privilege Class: ANY
|
|||
|
Function Type: ANY
|
|||
|
|
|||
|
LOGON or LOGIN or L : Obvious enough, the LOGIN or LOGON command is used to
|
|||
|
~~~~~~~~~~~~~~~~~~~ identify yourself to the system and to access that
|
|||
|
system. Following the words LOGIN or LOGON or L, type your userid which is
|
|||
|
the identifier assigned to you in the system. If the system you are logging
|
|||
|
onto does NOT have password suppression, your password can follow directly
|
|||
|
after your userid. NOTE: If the system you are on does have password
|
|||
|
suppression (i.e. it does not echo to your screen what you type when you type
|
|||
|
your password), you will get a system error message if you try to put it on
|
|||
|
the same line as your userid. The NOIPL option, which would follow your
|
|||
|
password and userid, specifies that the IPL device or name in the directory
|
|||
|
should not be used for an automatic IPL.
|
|||
|
Privilege Class: ANY
|
|||
|
Function Type: ANY
|
|||
|
|
|||
|
MESSAGE or MSG or M : Use the MESSAGE command to transmit message text to a
|
|||
|
~~~~~~~~~~~~~~~~~~~ specified userid or to the primary system operator
|
|||
|
userid. MSG userid msgtext sends msgtext to the userid specified after
|
|||
|
userid. If userid is replaced with *, the text is sent to yourself. Also, if
|
|||
|
the userid is replaced with OPERATOR, the message text is sent to the primary
|
|||
|
system operator regardless of his userid.
|
|||
|
Privilege Class: A, B, ANY
|
|||
|
Function Type: O, ANY
|
|||
|
|
|||
|
MIGRATE : The MIGRATE command activates the normal page/swap table migration
|
|||
|
~~~~~~~ routines or forces a particular user's pages to a secondary device
|
|||
|
even if that user is currently active.
|
|||
|
Privilege Class: A
|
|||
|
Function Type: O
|
|||
|
|
|||
|
MONITOR : To initiate or override the system-generated function or to
|
|||
|
~~~~~~~ terminate the recording of events occurring in the real machine, use
|
|||
|
the MONITOR command.
|
|||
|
Privilege Class: A, E
|
|||
|
Function Type: O
|
|||
|
|
|||
|
MSGNOH : The MSGNOH command allows a service virtual machine to send messages
|
|||
|
~~~~~~ to specified users without the standard header associated with the
|
|||
|
MESSAGE command.
|
|||
|
Privilege Class: B
|
|||
|
Function Type: R
|
|||
|
|
|||
|
NETWORK : The NETWORK command allows you to load, dump and control operation
|
|||
|
~~~~~~~ of a 3704 or 3705 and to control operation of a 3725 control program
|
|||
|
operating in 270x emulation mode (EP). Also, it allows control of remote 3270
|
|||
|
devices via binary synchronous lines.
|
|||
|
Privilege Class: A
|
|||
|
Function Type: O
|
|||
|
|
|||
|
NOTREADY or NOTR : Using the NOTREADY command causes the virtual device, which
|
|||
|
~~~~~~~~~~~~~~~~ is specified after the NOTREADY statement via cuu address,
|
|||
|
to appear as if it had changed from ready to not ready status.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
ORDER or ORD : ORDER is used to place your closed spool files in a specific
|
|||
|
~~~~~~~~~~~~ order by device type. These spool files include READER,
|
|||
|
PRINTER, and PUNCH files and can be sorted by CLASS, FORM, and spoolid.
|
|||
|
Privilege Class: D, G
|
|||
|
Function Type: S, G
|
|||
|
|
|||
|
PER : PER allows one to monitor certain events as they occur during program
|
|||
|
~~~ execution in the user's virtual machine. This command can monitor the
|
|||
|
fetching and execution of an instruction, the execution of a successful branch
|
|||
|
instruction, the instruction of an instruction that alters a specific general
|
|||
|
purpose register, and the execution of an instruction in the virtual machine
|
|||
|
that alters storage.
|
|||
|
Privilege Class: A, B, C, D, E, F, G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
PURGE or PUR : Use the PURGE command to remove your own closed spool files
|
|||
|
~~~~~~~~~~~~ from the system before they are printed or punched by the
|
|||
|
spooling devices, or before they are read by a user. The spool file
|
|||
|
specifications include READER, PRINTER, and PUNCH files as well as the ALL
|
|||
|
option which purges all of the above mentioned files.
|
|||
|
Privilege Class: D, G
|
|||
|
Function Type: S, G
|
|||
|
|
|||
|
QUERY or Q : Also available in CMS mode, the QUERY command is used to
|
|||
|
~~~~~~~~~~ determine your system status and machine configuration.
|
|||
|
Although there are far too many subcommands of the QUERY command, the
|
|||
|
following is a list of items that may be queried. I recommend, for full
|
|||
|
detail, using the HELP CP QUERY command as it is quite thorough (over 1000
|
|||
|
lines) in explaining the QUERY command.
|
|||
|
|
|||
|
o The time you have used during a terminal session.
|
|||
|
o The number of closed input and output spool files associated with
|
|||
|
your virtual machine.
|
|||
|
o The current settings of the color and/or extended highlight values
|
|||
|
in effect for your virtual machine console.
|
|||
|
o The current settings of the SET command functions.
|
|||
|
o The current settings of the TERMINAL command functions.
|
|||
|
o The status of all the devices on your virtual machine.
|
|||
|
o The channel operating mode of your virtual machine, whether
|
|||
|
block-multiplexer or selector.
|
|||
|
o A listing of all users who are linked to a given virtual address,
|
|||
|
together with their device addresses and access modes.
|
|||
|
o Display of the secondary user (secuser) that is specified in the
|
|||
|
CONSOLE directory statement.
|
|||
|
o Identification and attributes associated with your virtual
|
|||
|
PRINTER, PUNCH, and READER spool files.
|
|||
|
o The identification of your virtual processor.
|
|||
|
o The mode of processor operation of your VM/SP HPO installation:
|
|||
|
uniprocessor mode (UP), attached processor mode (AP), or
|
|||
|
multiprocessor mode (MP).
|
|||
|
o The userid and system identifier.
|
|||
|
o A listing of the PER traceset elements.
|
|||
|
o The log messages of the day.
|
|||
|
o The names of the users that are logged on.
|
|||
|
o The number of users that are logged on or dialed to the system.
|
|||
|
|
|||
|
NOTE: There are other operands you can use with the QUERY command if you
|
|||
|
have the privilege class required to use them.
|
|||
|
Privilege Class: A, B, C, D, E, F, G
|
|||
|
Function Type: O, R, P, S, A, C, G
|
|||
|
|
|||
|
QVM : Use this command to request the transition from the VM/SP environment to
|
|||
|
~~~ native mode for a particular virtual machine.
|
|||
|
Privilege Class: A
|
|||
|
Function Type: O
|
|||
|
|
|||
|
READY : In the format of READY vaddr, this command is used to set a device-end
|
|||
|
~~~~~ interruption pending for the specified virtual device.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
REPEAT : Use the REPEAT command to increase the number of copies of an output
|
|||
|
~~~~~~ file or to place the current output file in a hold status increasing
|
|||
|
or not increasing the number of copies to be created.
|
|||
|
Privilege Class: D
|
|||
|
Function Type: S
|
|||
|
|
|||
|
REQUEST or REQ : Simply use the REQUEST command to make an attention interrupt
|
|||
|
~~~~~~~~~~~~~~ at your virtual console.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
RESET : Also in the format of RESET vaddr, this command is used to clear all
|
|||
|
~~~~~ pending interrupts from the specified virtual device.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
REWIND or REW : The REWIND command is used to rewind a real tape unit attached
|
|||
|
~~~~~~~~~~~~~ to your virtual machine at a specified virtual device address
|
|||
|
in the format REWIND vaddr.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
SAVESYS : This command allows you to save a virtual machine storage space with
|
|||
|
~~~~~~~ registers and the PSW as they currently exist. It is used in the
|
|||
|
process of creating named systems.
|
|||
|
Privilege Class: E
|
|||
|
Function Type: A
|
|||
|
|
|||
|
SCREEN or SCRE : Use the SCREEN command to alter or change any extended color
|
|||
|
~~~~~~~~~~~~~~ and/or extended highlight definitions for your virtual
|
|||
|
machine console. You may issue the command from any IBM supported terminal or
|
|||
|
from a PROFILE EXEC because the SCREEN command is not device dependent.
|
|||
|
However, the SCREEN command is only valid when the Extended Color Feature has
|
|||
|
been applied to the terminal controller.
|
|||
|
|
|||
|
You can assign extended color and extended highlighting values to six distinct
|
|||
|
display screen areas: the input area, the system status area, and the output
|
|||
|
area that encompasses three other areas: CP output, virtual machine output,
|
|||
|
virtual machine output, and an input redisplay area. The physical attributes
|
|||
|
of 3270 Information Display station screens vary according to model.
|
|||
|
|
|||
|
Because this command mainly applies to people who are not on dial-up, I have
|
|||
|
elected not to detail all of the variables available with the SCREEN command.
|
|||
|
Once again, I recommend you using HELP CP SCREEN for details.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
SEND : Using the Single Console Image Facility, the SEND command is used to
|
|||
|
~~~~ pass commands and message replies for the secondary user's console to
|
|||
|
disconnect virtual machines for execution. This command is executed in the
|
|||
|
format: SEND (CP) userid (text).
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
SET : Use the SET command to control various functions within your virtual
|
|||
|
~~~ system. This command has a large number of variables that can be SET
|
|||
|
and details for each of the variables can be obtained from the HELP CP SET
|
|||
|
file.
|
|||
|
Privilege Class: A, B, E, F, G
|
|||
|
Function Type: O, R, A, C, G
|
|||
|
|
|||
|
SHUTDOWN : This command, of course, systematically ends all virtual machine
|
|||
|
~~~~~~~~ functions and checkpoints the system for an eventual warn start.
|
|||
|
Privilege Class: A
|
|||
|
Function Type: O
|
|||
|
|
|||
|
SLEEP or SL : To place the virtual machine in a dormant state but allow
|
|||
|
~~~~~~~~~~~ messages to be displayed, use the SLEEP command in the format
|
|||
|
of SLEEP nn (time-specification) where time-specification is SEC for seconds,
|
|||
|
MIN for minutes, or HR for hours and nn is the number of the amount of time
|
|||
|
for the machine to be in dormant state.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
SMSG or SM : The SMSG command is used to send a special message to a virtual
|
|||
|
~~~~~~~~~~ machine programmed to accept and process the message. The format
|
|||
|
of this command is SMSG userid msgtext where userid is the userid to receive
|
|||
|
the message and msgtext is the message to be sent to the userid.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
SPACE : Use the SPACE command to force the output on a specified printer to be
|
|||
|
~~~~~ single spaced for the current active spool file regardless of the
|
|||
|
carriage control commands in the actual file.
|
|||
|
Privilege Class: D
|
|||
|
Function Type: S
|
|||
|
|
|||
|
SPMODE : SPMODE allows the system operator to establish or reset the single
|
|||
|
~~~~~~ processor mode environment.
|
|||
|
Privilege Class: A
|
|||
|
Function Type: O
|
|||
|
|
|||
|
SPOOL or SP : Use the SPOOL command to modify the spooling control options in
|
|||
|
~~~~~~~~~~~ effect for a given virtual spooling device or for a group of
|
|||
|
devices. The SPOOL command can also start or stop the spooling of virtual
|
|||
|
console input and output. You can direct a file to a remote location by using
|
|||
|
the SPOOL command in conjunction with the TAG command.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
SPTAPE : Use this command to dump spool files to tape or to load spool files
|
|||
|
~~~~~~ from tape.
|
|||
|
Privilege Class: D
|
|||
|
Function Type: S
|
|||
|
|
|||
|
START : The START command restarts a spooling device after it has been drained
|
|||
|
~~~~~ or changes the output class that it may service.
|
|||
|
Privilege Class: D
|
|||
|
Function Type: S
|
|||
|
|
|||
|
STCP : To alter the contents of real storage but not real PSW or real
|
|||
|
~~~~ registers, use the STCP command.
|
|||
|
Privilege Class: C
|
|||
|
Function Type: P
|
|||
|
|
|||
|
STORE or ST : The STORE command is used to alter the contents of specified
|
|||
|
~~~~~~~~~~~ registers and locations of the virtual machine. As well as
|
|||
|
saving virtual machine data in low storage, the contents of the following can
|
|||
|
be altered:
|
|||
|
|
|||
|
o Virtual storage locations
|
|||
|
o General registers
|
|||
|
o Floating-point registers
|
|||
|
o Control registers
|
|||
|
o Program Status Word (PSW)
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
SYSTEM or SYS : SYSTEM is used to simulate the action of the RESET and RESTART
|
|||
|
~~~~~~~~~~~~~ buttons on the real computer console, and to clear storage.
|
|||
|
The variables are as follows:
|
|||
|
|
|||
|
o CLEAR : clears virtual storage and virtual storage keys to binary zeros.
|
|||
|
o RESET : clears all pending interrupts and conditions in the virtual
|
|||
|
machine.
|
|||
|
o RESTART : simulates the hardware system RESTART function by storing the
|
|||
|
current PSW at virtual location eight and loading, as the new
|
|||
|
PSW, the doubleword from virtual location zero.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
TAG or TA : The TAG has many different variables that can be tagged, which are
|
|||
|
~~~~~~~~~ too many to list here because of different settings for each one,
|
|||
|
but it is used to associate file descriptive information with a spool file.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
TERMINAL or TERM : The TERMINAL command is used to control the following
|
|||
|
~~~~~~~~~~~~~~~~ functions associated with your virtual console:
|
|||
|
|
|||
|
o Logical line-editing symbols
|
|||
|
o Masking of password
|
|||
|
o The APL character set
|
|||
|
o The Text character set
|
|||
|
o Signaling of an attention interrupt
|
|||
|
o Attention handling mode for your virtual console
|
|||
|
o Line length for output on your virtual console
|
|||
|
o Specifying terminal device type as 3101 or TTY
|
|||
|
o Location of cursor preceding terminal read
|
|||
|
o Scrolling rate for 3101 terminal
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
TRACE or TR : Use the TRACE command to trace specified virtual machine
|
|||
|
~~~~~~~~~~~ activity and to record the results at the terminal, on a virtual
|
|||
|
spooled printer, or on both terminal and printer. If you issue more than one
|
|||
|
TRACE command, the operands are cumulative; that is, operands specified for the
|
|||
|
first time are activated, whereas those specified with new modifiers are
|
|||
|
updated. The RUN and NORUN operands, however, can be specified in different
|
|||
|
tracing functions and do not cause a conflict.
|
|||
|
|
|||
|
You cannot issue the TRACE command while preferred machine assist is
|
|||
|
operating, whether or not you have enabled the preferred machine assist
|
|||
|
feature's control switch assist.
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
TRANSFER or TRAN : This command is used to transfer your closed spool files to
|
|||
|
~~~~~~~~~~~~~~~~ a specified user or queue, or to reclaim closed spool files
|
|||
|
that you created.
|
|||
|
Privilege Class: D, G
|
|||
|
Function Type: S, G
|
|||
|
|
|||
|
UNLOCK : Use the UNLOCK command to unlock page frames previously locked by a
|
|||
|
~~~~~~ LOCK command.
|
|||
|
Privilege Class: A
|
|||
|
Function Type: O
|
|||
|
|
|||
|
VARY : The VARY command marks a device available or unavailable for use by a
|
|||
|
~~~~ user or the control program.
|
|||
|
Privilege Class: B
|
|||
|
Function Type: R
|
|||
|
|
|||
|
VMDUMP or VMD : The VMDUMP command dumps virtual storage that VM/SP HPO
|
|||
|
~~~~~~~~~~~~~ creates for the virtual machine user. VMDUMP dumps the
|
|||
|
following:
|
|||
|
|
|||
|
o Virtual Program Status Word (PSW)
|
|||
|
o General registers
|
|||
|
o Floating-point registers
|
|||
|
o Control registers
|
|||
|
o Storage protection keys
|
|||
|
o Virtual machine type identification
|
|||
|
o Timer values
|
|||
|
Privilege Class: G
|
|||
|
Function Type: G
|
|||
|
|
|||
|
WARNING : Use the WARNING command to transmit high-priority messages to a
|
|||
|
~~~~~~~ specified user or to all users.
|
|||
|
Privilege Class: A, B
|
|||
|
Function Type: O
|
|||
|
|
|||
|
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
|
|||
|
This article is far from totally complete as far as in-depthness goes. As I
|
|||
|
have stated in numerous portions of this file, the VM/CMS system has a very
|
|||
|
good HELP file system, and from CMS, the command HELP CP <command> will, in
|
|||
|
most cases, allow you to read a relatively clear text file containing the
|
|||
|
details and usage specifications of these commands. I hope that, should you be
|
|||
|
moving around a VM/CMS system, this file will assist you in the CP mode.
|
|||
|
|
|||
|
For those that wish to contact me for commentary on this file topic or other
|
|||
|
topic conversation, you can send e-mail to my network addresses:
|
|||
|
|
|||
|
Internet: C488869@UMCVMB.MISSOURI.EDU
|
|||
|
Bitnet: C488869@UMCVMB.BITNET
|
|||
|
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue 27, File 3 of 12
|
|||
|
|
|||
|
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
|
|||
|
<> <>
|
|||
|
<> Introduction to MIDNET <>
|
|||
|
<> ~~~~~~~~~~~~~~~~~~~~~~ <>
|
|||
|
<> Chapter Seven Of The Future Transcendent Saga <>
|
|||
|
<> <>
|
|||
|
<> A More Indepth Look Into NSFnet <>
|
|||
|
<> National Science Foundation Network <>
|
|||
|
<> <>
|
|||
|
<> Presented by Knight Lightning <>
|
|||
|
<> June 16, 1989 <>
|
|||
|
<> <>
|
|||
|
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
|
|||
|
|
|||
|
|
|||
|
Prologue
|
|||
|
~~~~~~~~
|
|||
|
If you are not already familiar with NSFnet, I would suggest that you read:
|
|||
|
|
|||
|
"Frontiers" (Phrack Inc., Volume Two, Issue 24, File 4 of 13), and definitely;
|
|||
|
"NSFnet: National Science Foundation Network" (Phrack Inc., Volume Three,
|
|||
|
Issue 26, File 4 of 11).
|
|||
|
|
|||
|
|
|||
|
Table Of Contents
|
|||
|
~~~~~~~~~~~~~~~~~
|
|||
|
* Introduction
|
|||
|
* The DOD Protocol Suite
|
|||
|
* Names and Addresses In A Network
|
|||
|
* Telnet (*NOT* Telenet)
|
|||
|
* File Transfer
|
|||
|
* Mail
|
|||
|
|
|||
|
|
|||
|
Introduction
|
|||
|
~~~~~~~~~~~~
|
|||
|
MIDNET is a regional computer network that is part of the NSFnet, the National
|
|||
|
Science Foundation Network. Currently, eleven mid-United States universities
|
|||
|
are connected to each other and to the NSFnet via MIDnet:
|
|||
|
|
|||
|
UA - University of Arkansas at Fayetteville
|
|||
|
ISU - Iowa State University at Ames
|
|||
|
UI - University of Iowa at Iowa City
|
|||
|
KSU - Kansas State University at Manhattan
|
|||
|
KU - University of Kansas at Lawrence
|
|||
|
UMC - University of Missouri at Columbia
|
|||
|
WU - Washington University at St. Louis, Missouri
|
|||
|
UNL - University of Nebraska at Lincoln
|
|||
|
OSU - Oklahoma State University at Stillwater
|
|||
|
UT - University of Tulsa (Oklahoma)
|
|||
|
OU - University of Oklahoma at Norman
|
|||
|
|
|||
|
Researchers at any of these universities that have funded grants can access the
|
|||
|
six supercomputer centers funded by the NSF:
|
|||
|
|
|||
|
John Von Neuman Supercomputer Center
|
|||
|
National Center for Atmospheric Research
|
|||
|
Cornell National Supercomputer Facility
|
|||
|
National Center for Supercomputing Applications
|
|||
|
Pittsburgh Supercomputing Center
|
|||
|
San Diego Supercomputing Center
|
|||
|
|
|||
|
In addition, researchers and scientists can communicate with each other over a
|
|||
|
vast world-wide computer network that includes the NSFnet, ARPAnet, CSnet,
|
|||
|
BITnet, and others that you have read about in The Future Transcendent Saga.
|
|||
|
Please refer to "Frontiers" (Phrack Inc., Volume Two, Issue 24, File 4 of 13)
|
|||
|
for more details.
|
|||
|
|
|||
|
MIDnet is just one of several regional computer networks that comprise the
|
|||
|
NSFnet system. Although all of these regional computer networks work the same,
|
|||
|
MIDnet is the only one that I have direct access to and so this file is written
|
|||
|
from a MIDnet point of view. For people who have access to the other regional
|
|||
|
networks of NSFnet, the only real differences depicted in this file that would
|
|||
|
not apply to the other regional networks are the universities that are served
|
|||
|
by MIDnet as opposed to:
|
|||
|
|
|||
|
NYSERnet in New York State
|
|||
|
SURAnet in the southeastern United States
|
|||
|
SEQSUInet in Texas
|
|||
|
BARRnet in the San Francisco area
|
|||
|
MERIT in Michigan
|
|||
|
|
|||
|
(There are others that are currently being constructed.)
|
|||
|
|
|||
|
These regional networks all hook into the NSFnet backbone, which is a network
|
|||
|
that connects the six supercomputer centers. For example, a person at Kansas
|
|||
|
State University can connect with a supercomputer via MIDnet and the NSFnet
|
|||
|
backbone. That researcher can also send mail to colleagues at the University
|
|||
|
of Delaware by using MIDnet, NSFnet and SURAnet. Each university has its own
|
|||
|
local computer network which connects on-campus computers as well as providing
|
|||
|
a means to connecting to a regional network.
|
|||
|
|
|||
|
Some universities are already connected to older networks such as CSnet, the
|
|||
|
ARPAnet and BITnet. In principal, any campus connected to any of these
|
|||
|
networks can access anyone else in any other network since there are gateways
|
|||
|
between the networks.
|
|||
|
|
|||
|
Gateways are specialized computers that forward network traffic, thereby
|
|||
|
connecting networks. In practice, these wide-area networks use different
|
|||
|
networking technology which make it impossible to provide full functionality
|
|||
|
across the gateways. However, mail is almost universally supported across all
|
|||
|
gateways, so that a person at a BITnet site can send mail messages to a
|
|||
|
colleague at an ARPAnet site (or anywhere else for that matter). You should
|
|||
|
already be somewhat familiar with this, but if not refer to;
|
|||
|
|
|||
|
"Limbo To Infinity" (Phrack Inc., Volume Two, Issue 24, File 3 of 13) and
|
|||
|
"Internet Domains" (Phrack Inc., Volume Three, Issue 26, File 8 of 11)
|
|||
|
|
|||
|
Computer networks rely on hardware and software that allow computers to
|
|||
|
communicate. The language that enables network communication is called a
|
|||
|
protocol. There are many different protocols in use today. MIDnet uses the
|
|||
|
TCP/IP protocols, also known as the DOD (Department of Defense) Protocol Suite.
|
|||
|
|
|||
|
Other networks that use TCP/IP include ARPAnet, CSnet and the NSFnet. In fact,
|
|||
|
all the regional networks that are linked to the NSFnet backbone are required
|
|||
|
to use TCP/IP. At the local campus level, TCP/IP is often used, although other
|
|||
|
protocols such as IBM's SNA and DEC's DECnet are common. In order to
|
|||
|
communicate with a computer via MIDnet and the NSFnet, a computer at a campus
|
|||
|
must use TCP/IP directly or use a gateway that will translate its protocols
|
|||
|
into TCP/IP.
|
|||
|
|
|||
|
The Internet is a world-wide computer network that is the conglomeration of
|
|||
|
most of the large wide area networks, including ARPAnet, CSnet, NSFnet, and the
|
|||
|
regionals, such as MIDnet. To a lesser degree, other networks such as BITnet
|
|||
|
that can send mail to hosts on these networks are included as part of the
|
|||
|
Internet. This huge network of networks, the Internet, as you have by now read
|
|||
|
all about in the pages of Phrack Inc., is a rapidly growing and very complex
|
|||
|
entity that allows sophisticated communication between scientists, students,
|
|||
|
government officials and others. Being a part of this community is both
|
|||
|
exciting and challenging.
|
|||
|
|
|||
|
This chapter of the Future Transcendent Saga gives a general description of the
|
|||
|
protocols and software used in MIDnet and the NSFNet. A discussion of several
|
|||
|
of the more commonly used networking tools is also included to enable you to
|
|||
|
make practical use of the network as soon as possible.
|
|||
|
|
|||
|
|
|||
|
The DOD Protocol Suite
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
The DOD Protocol Suite includes many different protocols. Each protocol is a
|
|||
|
specification of how communication is to occur between computers. Computer
|
|||
|
hardware and software vendors use the protocol to create programs and sometimes
|
|||
|
specialized hardware in order to implement the network function intended by the
|
|||
|
protocol. Different implementations of the same protocol exist for the varied
|
|||
|
hardware and operating systems found in a network.
|
|||
|
|
|||
|
The three most commonly used network functions are:
|
|||
|
|
|||
|
Mail -- Sending and receiving messages
|
|||
|
File Transfer -- Sending and receiving files
|
|||
|
Remote Login -- Logging into a distant computer
|
|||
|
|
|||
|
Of these, mail is probably the most commonly used.
|
|||
|
|
|||
|
In the TCP/IP world, there are three different protocols that realize these
|
|||
|
functions:
|
|||
|
|
|||
|
SMTP -- (Simple Mail Transfer Protocol) Mail
|
|||
|
FTP -- (File Transfer Protocol) sending and receiving files
|
|||
|
Telnet -- Remote login
|
|||
|
|
|||
|
How to use these protocols is discussed in the next section. At first glance,
|
|||
|
it is not obvious why these three functions are the most common. After all,
|
|||
|
mail and file transfer seem to be the same thing. However, mail messages are
|
|||
|
not identical to files, since they are usually comprised of only ASCII
|
|||
|
characters and are sequential in structure. Files may contain binary data and
|
|||
|
have complicated, non-sequential structures. Also, mail messages can usually
|
|||
|
tolerate some errors in transmission whereas files should not contain any
|
|||
|
errors. Finally, file transfers usually occur in a secure setting (i.e. The
|
|||
|
users who are transferring files know each other's names and passwords and are
|
|||
|
permitted to transfer the file, whereas mail can be sent to anybody as long as
|
|||
|
their name is known).
|
|||
|
|
|||
|
While mail and transfer accomplish the transfer of raw information from one
|
|||
|
computer to another, Telnet allows a distant user to process that information,
|
|||
|
either by logging in to a remote computer or by linking to another terminal.
|
|||
|
Telnet is most often used to remotely log in to a distant computer, but it is
|
|||
|
actually a general-purpose communications protocol. I have found it incredibly
|
|||
|
useful over the last year. In some ways, it could be used for a great deal of
|
|||
|
access because you can directly connect to another computer anywhere that has
|
|||
|
TCP/IP capabilities, however please note that Telnet is *NOT* Telenet.
|
|||
|
|
|||
|
There are other functions that some networks provide, including the following:
|
|||
|
|
|||
|
- Name to address translation for networks, computers and people
|
|||
|
- The current time
|
|||
|
- Quote of the day or fortune
|
|||
|
- Printing on a remote printer, or use of any other remote peripheral
|
|||
|
- Submission of batch jobs for non-interactive execution
|
|||
|
- Dialogues and conferencing between multiple users
|
|||
|
- Remote procedure call (i.e. Distributing program execution over several
|
|||
|
remote computers)
|
|||
|
- Transmission of voice or video information
|
|||
|
|
|||
|
Some of these functions are still in the experimental stages and require faster
|
|||
|
computer networks than currently exist. In the future, new functions will
|
|||
|
undoubtedly be invented and existing ones improved.
|
|||
|
|
|||
|
The DOD Protocol Suite is a layered network architecture, which means that
|
|||
|
network functions are performed by different programs that work independently
|
|||
|
and in harmony with each other. Not only are there different programs but
|
|||
|
there are different protocols. The protocols SMTP, FTP and Telnet are
|
|||
|
described above. Protocols have been defined for getting the current time, the
|
|||
|
quote of the day, and for translating names. These protocols are called
|
|||
|
applications protocols because users directly interact with the programs that
|
|||
|
implement these protocols.
|
|||
|
|
|||
|
The Transmission Control Protocol, TCP, is used by many of the application
|
|||
|
protocols. Users almost never interact with TCP directly. TCP establishes a
|
|||
|
reliable end-to-end connection between two processes on remote computers. Data
|
|||
|
is sent through a network in small chunks called packets to improve reliability
|
|||
|
and performance. TCP ensures that packets arrive in order and without errors.
|
|||
|
If a packet does have errors, TCP requests that the packet be retransmitted.
|
|||
|
|
|||
|
In turn, TCP calls upon IP, Internet Protocol, to move the data from one
|
|||
|
network to another. IP is still not the lowest layer of the architecture,
|
|||
|
since there is usually a "data link layer protocol" below it. This can be any
|
|||
|
of a number of different protocols, two very common ones being X.25 and
|
|||
|
Ethernet.
|
|||
|
|
|||
|
FTP, Telnet and SMTP are called "application protocols", since they are
|
|||
|
directly used by applications programs that enable users to make use of the
|
|||
|
network. Network applications are the actual programs that implement these
|
|||
|
protocols and provide an interface between the user and the computer. An
|
|||
|
implementation of a network protocol is a program or package of programs that
|
|||
|
provides the desired network function such as file transfer. Since computers
|
|||
|
differ from vendor to vendor (e.g. IBM, DEC, CDC), each computer must have its
|
|||
|
own implementation of these protocols. However, the protocols are standardized
|
|||
|
so that computers can interoperate over the network (i.e. Can understand and
|
|||
|
process each other's data). For example, a TCP packet generated by an IBM
|
|||
|
computer can be read and processed by a DEC computer.
|
|||
|
|
|||
|
In many instances, network applications programs use the name of the protocol.
|
|||
|
For example, the program that transfers files may be called "FTP" and the
|
|||
|
program that allows remote logins may be called "Telnet." Sometimes these
|
|||
|
protocols are incorporated into larger packages, as is common with SMTP. Many
|
|||
|
computers have mail programs that allow users on the same computer to send mail
|
|||
|
to each other. SMTP functions are often added to these mail programs so that
|
|||
|
users can also send and receive mail through a network. In such cases, there
|
|||
|
is no separate program called SMTP that the user can access, since the mail
|
|||
|
program provides the user interface to this network function.
|
|||
|
|
|||
|
Specific implementation of network protocols, such as FTP, are tailored to the
|
|||
|
computer hardware and operating system on which they are used. Therefore, the
|
|||
|
exact user interface varies from one implementation to another. For example,
|
|||
|
the FTP protocol specifies a set of FTP commands which each FTP implementation
|
|||
|
must understand and process. However, these are usually placed at a low level,
|
|||
|
often invisible to the user, who is given a higher set of commands to use.
|
|||
|
|
|||
|
These higher-level commands are not standardized so they may vary from one
|
|||
|
implementation of FTP to another. For some operating systems, not all of these
|
|||
|
commands make equal sense, such as "Change Directory," or may have different
|
|||
|
meanings. Therefore the specific user interface that the user sees will
|
|||
|
probably differ.
|
|||
|
|
|||
|
This file describes a generic implementation of the standard TCP/IP application
|
|||
|
protocols. Users must consult local documentation for specifics at their
|
|||
|
sites.
|
|||
|
|
|||
|
|
|||
|
Names and Addresses In A Network
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
In DOD Protocol Suite, each network is given a unique identifying number. This
|
|||
|
number is assigned by a central authority, namely the Network Information
|
|||
|
Center run by SRI, abbreviated as SRI-NIC, in order to prevent more than one
|
|||
|
network from having the same network number. For example, the ARPAnet has
|
|||
|
network number 10 while MIDnet has a longer number, namely 128.242.
|
|||
|
|
|||
|
Each host in a network has a unique identification so other hosts can specify
|
|||
|
them unambiguously. Host numbers are usually assigned by the organization that
|
|||
|
manages the network, rather than one central authority. Host numbers do not
|
|||
|
need to be unique throughout the whole Internet but two hosts on the same
|
|||
|
network need to have unique host numbers.
|
|||
|
|
|||
|
The combination of the network number and the host number is called the IP
|
|||
|
address of the host and is specified as a 32-bit binary number. All IP
|
|||
|
addresses in the Internet are expressible as 32-bit numbers, although they are
|
|||
|
often written in dotted decimal notation. Dotted decimal notation breaks the
|
|||
|
32-bit number into four eight-bit parts or octets and each octet is specified
|
|||
|
as a decimal number. For example, 00000001 is the binary octet that specifies
|
|||
|
the decimal number 1, while 11000000 specifies 192. Dotted decimal notation
|
|||
|
makes IP addresses much easier to read and remember.
|
|||
|
|
|||
|
Computers in the Internet are also identified by hostnames, which are strings
|
|||
|
of characters, such as "phrackvax." However, IP packets must specify the
|
|||
|
32-bit IP address instead of the hostname so some way to translating hostnames
|
|||
|
to IP addresses must exist.
|
|||
|
|
|||
|
One way is to have a table of hostnames and their corresponding IP addresses,
|
|||
|
called a hosttable. Nearly every TCP/IP implementation has such a hosttable,
|
|||
|
although the weaknesses of this method are forcing a shift to a new scheme
|
|||
|
called the domain name system. In UNIX systems, the hosttable is often called
|
|||
|
"/etc/hosts." You can usually read this file and find out what the IP
|
|||
|
addresses of various hosts are. Other systems may call this file by a
|
|||
|
different name and make it unavailable for public viewing.
|
|||
|
|
|||
|
Users of computers are generally given accounts to which all charges for
|
|||
|
computer use are billed. Even if computer time is free at an installation,
|
|||
|
accounts are used to distinguish between the users and enforce file
|
|||
|
protections. The generic term "username" will be used in this file to refer to
|
|||
|
the name by which the computer account is accessed.
|
|||
|
|
|||
|
In the early days of the ARPAnet which was the first network to use the TCP/IP
|
|||
|
protocols, computer users were identified by their username, followed by a
|
|||
|
commercial "at" sign (@), followed by the hostname on which the account
|
|||
|
existed. Networks were not given names, per se, although the IP address
|
|||
|
specified a network number.
|
|||
|
|
|||
|
For example, "knight@phrackvax" referred to user "knight" on host "phrackvax."
|
|||
|
This did not specify which network "phrackvax" was on, although that
|
|||
|
information could be obtained by examining the hosttable and the IP address for
|
|||
|
"phrackvax." (However, "phrackvax" is a ficticious hostname used for this
|
|||
|
presentation.)
|
|||
|
|
|||
|
As time went on, every computer on the network had to have an entry in its
|
|||
|
hosttable for every other computer on the network. When several networks
|
|||
|
linked together to form the Internet, the problem of maintaining this central
|
|||
|
hosttable got out of hand. Therefore, the domain name scheme was introduced to
|
|||
|
split up the hosttable and make it smaller and easier to maintain.
|
|||
|
|
|||
|
In the new domain name scheme, users are still identified by their usernames,
|
|||
|
but hosts are now identified by their hostname and any and all domains of which
|
|||
|
they are a part. For example, the following address,
|
|||
|
"KNIGHT@UMCVMB.MISSOURI.EDU" specifies username "KNIGHT" on host "UMCVMB".
|
|||
|
However, host "UMCVMB" is a part of the domain "MISSOURI" " which is in turn
|
|||
|
part of the domain "EDU". There are other domains in "EDU", although only one
|
|||
|
is named "MISSOURI". In the domain "MISSOURI", there is only one host named
|
|||
|
"UMCVMB".
|
|||
|
|
|||
|
However, other domains in "EDU" could theoretically have hosts named "UMCVMB"
|
|||
|
(although I would say that this is rather unlikely in this example). Thus the
|
|||
|
combination of hostname and all its domains makes it unique. The method of
|
|||
|
translating such names into IP addresses is no longer as straightforward as
|
|||
|
looking up the hostname in a table. Several protocols and specialized network
|
|||
|
software called nameservers and resolvers implement the domain name scheme.
|
|||
|
|
|||
|
Not all TCP/IP implementations support domain names because it is rather new.
|
|||
|
In those cases, the local hosttable provides the only way to translate
|
|||
|
hostnames to IP addresses. The system manager of that computer will have to
|
|||
|
put an entry into the hosttable for every host that users may want to connect
|
|||
|
to. In some cases, users may consult the nameserver themselves to find out the
|
|||
|
IP address for a given hostname and then use that IP address directly instead
|
|||
|
of a hostname.
|
|||
|
|
|||
|
I have selected a few network hosts to demonstrate how a host system can be
|
|||
|
specified by both the hostname and host numerical address. Some of the nodes I
|
|||
|
have selected are also nodes on BITnet, perhaps even some of the others that I
|
|||
|
do not make a note of due a lack of omniscent awareness about each and every
|
|||
|
single host system in the world :-)
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
Numerical Hostname Location BITnet
|
|||
|
--------- -------- -------- ------
|
|||
|
18.72.0.39 ATHENA.MIT.EDU (Mass. Institute of Technology) ?
|
|||
|
26.0.0.73 SRI-NIC.ARPA (DDN Network Information Center) -
|
|||
|
36.21.0.13 MACBETH.STANFORD.EDU (Stanford University) ?
|
|||
|
36.21.0.60 PORTIA.STANFORD.EDU (Stanford University) ?
|
|||
|
128.2.11.131 ANDREW.CMU.EDU (Carnegie Mellon University) ANDREW
|
|||
|
128.3.254.13 LBL.GOV (Lawrence Berkeley Labrotories) LBL
|
|||
|
128.6.4.7 RUTGERS.RUTGERS.EDU (Rutgers University) ?
|
|||
|
128.59.99.1 CUCARD.MED.COLUMBIA.EDU (Columbia University) ?
|
|||
|
128.102.18.3 AMES.ARC.NASA.GOV (Ames Research Center [NASA]) -
|
|||
|
128.103.1.1 HARVARD.EDU (Harvard University) HARVARD
|
|||
|
128.111.24.40 HUB.UCSB.EDU (Univ. Of Calif-Santa Barbara) ?
|
|||
|
128.115.14.1 LLL-WINKEN.LLNL.GOV (Lawrence Livermore Labratories) -
|
|||
|
128.143.2.7 UVAARPA.VIRGINIA.EDU (University of Virginia) ?
|
|||
|
128.148.128.40 BROWNVM.BROWN.EDU (Brown University) BROWN
|
|||
|
128.163.1.5 UKCC.UKY.EDU (University of Kentucky) UKCC
|
|||
|
128.183.10.4 NSSDCA.GSFC.NASA.GOV (Goddard Space Flight Center [NASA])-
|
|||
|
128.186.4.18 RAI.CC.FSU.EDU (Florida State University) FSU
|
|||
|
128.206.1.1 UMCVMB.MISSOURI.EDU (Univ. of Missouri-Columbia) UMCVMB
|
|||
|
128.208.1.15 MAX.ACS.WASHINGTON.EDU (University of Washington) MAX
|
|||
|
128.228.1.2 CUNYVM.CUNY.EDU (City University of New York) CUNYVM
|
|||
|
129.10.1.6 NUHUB.ACS.NORTHEASTERN.EDU (Northeastern University) NUHUB
|
|||
|
131.151.1.4 UMRVMA.UMR.EDU (University of Missouri-Rolla) UMRVMA
|
|||
|
192.9.9.1 SUN.COM (Sun Microsystems, Inc.) -
|
|||
|
192.33.18.30 VM1.NODAK.EDU (North Dakota State Univ.) NDSUVM1
|
|||
|
192.33.18.50 PLAINS.NODAK.EDU (North Dakota State Univ.) NDSUVAX
|
|||
|
|
|||
|
Please Note: Not every system on BITnet has an IP address. Likewise, not
|
|||
|
every system that has an IP address is on BITnet. Also, while
|
|||
|
some locations like Stanford University may have nodes on BITnet
|
|||
|
and have hosts on the IP as well, this does not neccessarily
|
|||
|
imply that the systems on BITnet and on IP (the EDU domain in
|
|||
|
this case) are the same systems.
|
|||
|
|
|||
|
Attempts to gain unauthorized access to systems on the Internet
|
|||
|
are not tolerated and is legally a federal offense. At some
|
|||
|
hosts, they take this very seriously, especially the government
|
|||
|
hosts such as NASA's Goddard Space Flight Center, where they do
|
|||
|
not mind telling you so at the main prompt when you connect to
|
|||
|
their system.
|
|||
|
|
|||
|
However, some nodes are public access to an extent. The DDN
|
|||
|
Network Information Center can be used by anyone. The server and
|
|||
|
database there have proven to be an invaluable source of
|
|||
|
information when locating people, systems, and other information
|
|||
|
that is related to the Internet.
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
Telnet
|
|||
|
|
|||
|
~~~~~~
|
|||
|
Remote login refers to logging in to a remote computer from a terminal
|
|||
|
connected to a local computer. Telnet is the standard protocol in the DOD
|
|||
|
Protocol Suite for accomplishing this. The "rlogin" program, provided with
|
|||
|
Berkeley UNIX systems and some other systems, also enables remote login.
|
|||
|
|
|||
|
For purposes of discussion, the "local computer" is the computer to which your
|
|||
|
terminal is directly connected while the "remote computer" is the computer on
|
|||
|
the network to which you are communicating and to which your terminal is *NOT*
|
|||
|
directly connected.
|
|||
|
|
|||
|
Since some computers use a different method of attaching terminals to
|
|||
|
computers, a better definition would be the following: The "local computer" is
|
|||
|
the computer that you are currently using and the "remote computer" is the
|
|||
|
computer on the network with which you are or will be communicating. Note that
|
|||
|
the terms "host" and "computer" are synonymous in the following discussion.
|
|||
|
|
|||
|
To use Telnet, simply enter the command: TELNET
|
|||
|
|
|||
|
The prompt that Telnet gives is: Telnet>
|
|||
|
|
|||
|
(However, you can specify where you want to Telnet to immediately and bypass
|
|||
|
the the prompts and other delays by issuing the command: TELNET [location].)
|
|||
|
|
|||
|
There is help available by typing in ?. This prints a list of all the valid
|
|||
|
subcommands that Telnet provides with a one-line explanation.
|
|||
|
|
|||
|
Telnet> ?
|
|||
|
|
|||
|
To connect to to another computer, use the open subcommand to open a connection
|
|||
|
to that computer. For example, to connect to the host "UMCVMB.MISSOURI.EDU",
|
|||
|
do "open umcvmb.missouri.edu"
|
|||
|
|
|||
|
Telnet will resolve (i.e. Translate, the hostname "umcvmb.missouri.edu" into an
|
|||
|
IP address and will send a packet to that host requesting login. If the remote
|
|||
|
host decides to let you attempt a login, it prompts you for your username and
|
|||
|
password. If the host does not respond, Telnet will "time out" (i.e. Wait for
|
|||
|
a reasonable amount of time such as 20 seconds) and then terminate with a
|
|||
|
message such as "Host not responding."
|
|||
|
|
|||
|
If your computer does not have an entry for a remote host in its hosttable and
|
|||
|
it cannot resolve the name, you can use the IP address explicitly in the telnet
|
|||
|
command. For example,
|
|||
|
|
|||
|
TELNET 26.0.0.73 (Note: This is the IP address for the DDN Network Information
|
|||
|
Center [SRI-NIC.ARPA])
|
|||
|
|
|||
|
If you are successful in logging in, your terminal is connected to the remote
|
|||
|
host. For all intents and purposes, your terminal is directly hard-wired to
|
|||
|
that host and you should be able to do anything on your remote terminal that
|
|||
|
you can do at any local terminal. There are a few exceptions to this rule,
|
|||
|
however.
|
|||
|
|
|||
|
Telnet provides a network escape character, such as CONTROL-T. You can find out
|
|||
|
what the escape character is by entering the "status" subcommand:
|
|||
|
|
|||
|
Telnet> status
|
|||
|
|
|||
|
You can change the escape character by entering the "escape" subcommand:
|
|||
|
|
|||
|
Telnet> escape
|
|||
|
|
|||
|
When you type in the escape character, the Telnet prompt returns to your screen
|
|||
|
and you can enter subcommands. For example, to break the connection, which
|
|||
|
usually logs you off the remote host, enter the subcommand "quit":
|
|||
|
|
|||
|
Telnet> quit
|
|||
|
|
|||
|
Your Telnet connection usually breaks when you log off the remote host, so the
|
|||
|
"quit" subcommand is not usually used to log off.
|
|||
|
|
|||
|
When you are logged in to a remote computer via Telnet, remember that there is
|
|||
|
a time delay between your local computer and the remote one. This often
|
|||
|
becomes apparent to users when scrolling a long file across the terminal screen
|
|||
|
nd they wish to cancel the scrolling by typing CONTROL-C or something similar.
|
|||
|
After typing the special control character, the scrolling continues. The
|
|||
|
special control character takes a certain amount of time to reach the remote
|
|||
|
computer which is still scrolling information. Thus response from the remote
|
|||
|
computer will not likely be as quick as response from a local computer.
|
|||
|
|
|||
|
Once you are remotely logged on, the computer you are logged on to effectively
|
|||
|
becomes your "local computer," even though your original "local computer" still
|
|||
|
considers you logged on. You can log on to a third computer which would then
|
|||
|
become your "local computer" and so on. As you log out of each session, your
|
|||
|
previous session becomes active again.
|
|||
|
|
|||
|
|
|||
|
File Transfer
|
|||
|
~~~~~~~~~~~~~
|
|||
|
|
|||
|
FTP is the program that allows files to be sent from one computer to another.
|
|||
|
"FTP" stands for "File Transfer Protocol".
|
|||
|
|
|||
|
When you start using FTP, a communications channel with another computer on the
|
|||
|
network is opened. For example, to start using FTP and initiate a file
|
|||
|
transfer session with a computer on the network called "UMCVMB", you would
|
|||
|
issue the following subcommand:
|
|||
|
|
|||
|
FTP UMCVMB.MISSOURI.EDU
|
|||
|
|
|||
|
Host "UMCVMB" will prompt you for an account name and password. If your login
|
|||
|
is correct, FTP will tell you so, otherwise it will say "login incorrect." Try
|
|||
|
again or abort the FTP program. (This is usually done by typing a special
|
|||
|
control character such as CONTROL-C. The "program abort" character varies from
|
|||
|
system to system.)
|
|||
|
|
|||
|
Next you will see the FTP prompt, which is:
|
|||
|
|
|||
|
Ftp>
|
|||
|
|
|||
|
There are a number of subcommands of FTP. The subcommand "?" will list these
|
|||
|
commands and a brief description of each one.
|
|||
|
|
|||
|
You can initiate a file transfer in either direction with FTP, either from the
|
|||
|
remote host or to the remote host. The "get" subcommand initiates a file
|
|||
|
transfer from the remote host (i.e. Tells the remote computer to send the file
|
|||
|
to the local computer [the one on which you issued the "ftp" command]). Simply
|
|||
|
enter "get" and FTP will prompt you for the remote host's file name and the
|
|||
|
(new) local host's file name. Example:
|
|||
|
|
|||
|
Ftp> get
|
|||
|
Remote file name?
|
|||
|
theirfile
|
|||
|
local file name?
|
|||
|
myfile
|
|||
|
|
|||
|
ou can abbreviate this by typing both file names on the same line as the "get"
|
|||
|
subcommand. If you do not specify a local file name, the new local file will
|
|||
|
be called the same thing as the remote file. Valid FTP subcommands to get a
|
|||
|
file include the following:
|
|||
|
|
|||
|
get theirfile myfile
|
|||
|
get doc.x25
|
|||
|
|
|||
|
The "put" subcommand works in a similar fashion and is used to send a file from
|
|||
|
the local computer to the remote computer. Enter the command "put" and FTP
|
|||
|
will prompt you for the local file name and then the remote file name. If the
|
|||
|
transfer cannot be done because the file doesn't exist or for some other
|
|||
|
reason, FTP will print an error message.
|
|||
|
|
|||
|
There are a number of other subcommands in FTP that allow you to do many more
|
|||
|
things. Not all of these are standard so consult your local documentation or
|
|||
|
type a question mark at the FTP prompt. Some functions often built into FTP
|
|||
|
include the ability to look at files before getting or putting them, the
|
|||
|
ability to change directories, the ability to delete files on the remote
|
|||
|
computer, and the ability to list the directory on the remote host.
|
|||
|
|
|||
|
An intriguing capability of many FTP implementations is "third party
|
|||
|
transfers." For example, if you are logged on computer A and you want to cause
|
|||
|
computer B to send a file to computer C, you can use FTP to connect to computer
|
|||
|
B and use the "rmtsend" command. Of course, you have to know usernames and
|
|||
|
passwords on all three computers, since FTP never allows you to peek into
|
|||
|
someone's directory and files unless you know their username and password.
|
|||
|
|
|||
|
The "cd" subcommand changes your working directory on the remote host. The
|
|||
|
"lcd" subcommand changes the directory on the local host. For UNIX systems,
|
|||
|
the meaning of these subcommands is obvious. Other systems, especially those
|
|||
|
that do not have directory-structured file system, may not implement these
|
|||
|
commands or may implement them in a different manner.
|
|||
|
|
|||
|
The "dir" and "ls" subcommands do the same thing, namely list the files in the
|
|||
|
working directory of of the remote host.
|
|||
|
|
|||
|
The "list" subcommand shows the contents of a file without actually putting it
|
|||
|
into a file on the local computer. This would be helpful if you just wanted to
|
|||
|
inspect a file. You could interrupt it before it reached the end of the file
|
|||
|
by typing CONTROL-C or some other special character. This is dependent on your
|
|||
|
FTP implementation.
|
|||
|
|
|||
|
The "delete" command can delete files on the remote host. You can also make
|
|||
|
and remove directories on the remote host with "mkdir" and "rmdir". The
|
|||
|
"status" subcommand will tell you if you are connected and with whom and what
|
|||
|
the state of all your options are.
|
|||
|
|
|||
|
If you are transferring binary files or files with any non-printable
|
|||
|
characters, turn binary mode on by entering the "binary" subcommand:
|
|||
|
|
|||
|
binary
|
|||
|
|
|||
|
To resume non-binary transfers, enter the "ascii" subcommand.
|
|||
|
|
|||
|
Transferring a number of files can be done easily by using "mput" (multiple
|
|||
|
put) and "mget" (multiple get). For example, to get every file in a particular
|
|||
|
directory, first issue a "cd" command to change to that directory and then an
|
|||
|
"mget" command with an asterisk to indicate every file:
|
|||
|
|
|||
|
cd somedirectory
|
|||
|
mget *
|
|||
|
|
|||
|
When you are done, use the "close" subcommand to break the communications link.
|
|||
|
You will still be in FTP, so you must use the "bye" subcommand to exit FTP and
|
|||
|
return to the command level. The "quit" subcommand will close the connection
|
|||
|
and exit from FTP at the same time.
|
|||
|
|
|||
|
|
|||
|
Mail
|
|||
|
~~~~
|
|||
|
Mail is the simplest network facility to use in many ways. All you have to do
|
|||
|
is to create your message, which can be done with a file editor or on the spur
|
|||
|
of the moment, and then send it. Unlike FTP and Telnet, you do not need to
|
|||
|
know the password of the username on the remote computer. This is so because
|
|||
|
you cannot change or access the files of the remote user nor can you use their
|
|||
|
account to run programs. All you can do is to send a message.
|
|||
|
|
|||
|
There is probably a program on your local computer which does mail between
|
|||
|
users on that computer. Such a program is called a mailer. This may or may
|
|||
|
not be the way to send or receive mail from other computers on the network,
|
|||
|
although integrated mailers are more and more common. UNIX mailers will be
|
|||
|
used as an example in this discussion.
|
|||
|
|
|||
|
Note that the protocol which is used to send and receive mail over a TCP/IP
|
|||
|
network is called SMTP, the "Simple Mail Transfer Protocol." Typically, you
|
|||
|
will not use any program called SMTP, but rather your local mail program.
|
|||
|
|
|||
|
UNIX mailers are usually used by invoking a program named "mail". To receive
|
|||
|
new mail, simply type "mail".
|
|||
|
|
|||
|
There are several varieties of UNIX mailers in existence. Consult your local
|
|||
|
documentation for details. For example, the command "man mail" prints out the
|
|||
|
manual pages for the mail program on your computer.
|
|||
|
|
|||
|
To send mail, you usually specify the address of the recipient on the mail
|
|||
|
command. For example: "mail knight@umcvmb.missouri.edu" will send the
|
|||
|
following message to username "knight" on host "umcvmb".
|
|||
|
|
|||
|
You can usually type in your message one line at a time, pressing RETURN after
|
|||
|
each line and typing CONTROL-D to end the message. Other facilities to include
|
|||
|
already-existing files sometimes exist. For example, Berkeley UNIXes allow you
|
|||
|
to enter commands similar to the following to include a file in your current
|
|||
|
mail message:
|
|||
|
|
|||
|
r myfile
|
|||
|
|
|||
|
In this example, the contents of "myfile" are inserted into the message at this
|
|||
|
point.
|
|||
|
|
|||
|
Most UNIX systems allow you to send a file through the mail by using input
|
|||
|
redirection. For example:
|
|||
|
|
|||
|
mail knight@umcvmb.missouri.edu < myfile
|
|||
|
|
|||
|
In this example, the contents of "myfile" are sent as a message to "knight" on
|
|||
|
"umcvmb."
|
|||
|
|
|||
|
Note that in many UNIX systems the only distinction between mail bound for
|
|||
|
another user on the same computer and another user on a remote computer is
|
|||
|
simply the address specified. That is, there is no hostname for local
|
|||
|
recipients. Otherwise, mail functions in exactly the same way. This is common
|
|||
|
for integrated mail packages. The system knows whether to send the mail
|
|||
|
locally or through the network based on the address and the user is shielded
|
|||
|
from any other details.
|
|||
|
|
|||
|
|
|||
|
"The Quest For Knowledge Is Without End..."
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue 27, File 4 of 12
|
|||
|
|
|||
|
:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:
|
|||
|
:.: :.:
|
|||
|
:.: NUA-List For Datex-P And X.25 Networks :.:
|
|||
|
:.: :.:
|
|||
|
:.: by Oberdaemon :.:
|
|||
|
:.: :.:
|
|||
|
:.: April 9, 1989 :.:
|
|||
|
:.: :.:
|
|||
|
:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:
|
|||
|
|
|||
|
_____________________________________________________________________________
|
|||
|
| |
|
|||
|
| Key: |
|
|||
|
| |
|
|||
|
| A = successfully connected |
|
|||
|
| B = sources say that it works |
|
|||
|
| C = officially closed |
|
|||
|
| D = disconnected/no circuit or permanently busy |
|
|||
|
| I = illegal address or invalid call |
|
|||
|
| O = out of order |
|
|||
|
| r = R-NUA |
|
|||
|
| T = time-out |
|
|||
|
| X = sources say that it should work but it doesn't (or is permanently |
|
|||
|
| busy) |
|
|||
|
| Y = barred (=?) |
|
|||
|
| Z = sources say that it should not work |
|
|||
|
| = including the following digits gives you another number |
|
|||
|
| n/a = not yet tested |
|
|||
|
| ? = error on a subsequent communication system |
|
|||
|
| |
|
|||
|
| Remark: I have also included some obviously misstyped NUAs which have been |
|
|||
|
| found in widely circulating lists. There are also numbers which do |
|
|||
|
| not form a valid NUA but a common prefix (e.g. 0202 2 Helpak). |
|
|||
|
| |
|
|||
|
| Format: Each NUA in this list consists of the following fields: |
|
|||
|
| |
|
|||
|
| cccc naa aaa aaa... oooo... ddd.... |
|
|||
|
| |
|
|||
|
| cccc is the country prefix (e.g. 0262 Germany). This prefix can be |
|
|||
|
| omitted when calling and called party have both the same prefix.|
|
|||
|
| naa are the first three digits of the address. n often specifies a |
|
|||
|
| certain network in that country. |
|
|||
|
| aaa aaa... are the other digits of the address. |
|
|||
|
| oooo... are some extra digits/letters which should be added after the |
|
|||
|
| NUA. The correct syntax depends on your PAD. This list uses any |
|
|||
|
| syntax - usually depending on the notation the author of the |
|
|||
|
| source used. The oooo... field is usually empty. |
|
|||
|
| ddd... is a short description of the service. |
|
|||
|
| |
|
|||
|
| If you find two NUAs who differ only in the number of trailing zeroes, but |
|
|||
|
| connect to the same service, you may safely throw away the longer one. |
|
|||
|
| |
|
|||
|
| !! Please note that most PADs don't accept spaces inside a NUA !! |
|
|||
|
|_____________________________________________________________________________|
|
|||
|
|
|||
|
|
|||
|
0200 GR Greece
|
|||
|
0202
|
|||
|
0202 2 Helpak (enkelriktad trafik)
|
|||
|
X 0202 452 241 24104
|
|||
|
0204 NL Netherlands
|
|||
|
0204 0 Datanet (1?)
|
|||
|
0204 1 Datanet (1?)
|
|||
|
A 0204 129 001 3 ? (Netz ?)
|
|||
|
A 0204 129 001 4 X.25
|
|||
|
A 0204 129 003 1 NONOBY
|
|||
|
A 0204 129 003 4 Searchline
|
|||
|
D 0204 129 004 33 SARA National Institute for High Energy Physics
|
|||
|
(NIKHEF) SARA network
|
|||
|
D 0204 129 004 34 NIKHEF National Institute for High Energy Physics
|
|||
|
(NIKHEF) SARA network
|
|||
|
D 0204 129 005 6 MCVAX MCVAX, HOLLAND
|
|||
|
A 0204 129 005 675 HARING MCVAX Line 2
|
|||
|
0204 129 400 2 DUPHAR WEESP,HOLLAND
|
|||
|
A 0204 134 014 80500 Utrecht ?
|
|||
|
0204 303 0 EPOIS EPO Den Haag
|
|||
|
0204 304 0 DSAMISOOM SAMSON
|
|||
|
0204 4 Dabas
|
|||
|
0206 B Belgium
|
|||
|
0206 2 DCS
|
|||
|
A 0206 210 300 003 Eigebib
|
|||
|
A 0206 222 100 6 BBDA Brussels DEC A
|
|||
|
A 0206 222 101 2 ? Ministry of economic affairs
|
|||
|
A 0206 222 102 6 celex
|
|||
|
A 0206 224 001 903 PRLB2 Belgium Unix Backbone
|
|||
|
0206 3 Euronet
|
|||
|
A 0206 228 821 0 DGxiiiF
|
|||
|
0208 F France
|
|||
|
0208 0 TRANSPAC French Transpac
|
|||
|
A 0208 006 040 010 Telesystemes 1
|
|||
|
A 0208 006 040 201 Telesystemes 2
|
|||
|
A 0208 026 020 843 ?
|
|||
|
A 0208 034 020 036 CNUSC CNUSC (France)
|
|||
|
A 0208 034 020 258 CNUSC CNUSC Montpelier
|
|||
|
A 0208 038 020 100 CICG Grenoble
|
|||
|
A 0208 038 020 676 ILL VEGA VAX 8700 VMS 4.7
|
|||
|
I 0208 044 001 645 ?
|
|||
|
A 0208 057 040 540 QSD (Chat system)
|
|||
|
I 0208 069 021 258
|
|||
|
A 0208 075 000 087 IRCAM IRCAM-ERIK VAX 11/780 4.2 BSD
|
|||
|
I 0208 075 000 355 ?
|
|||
|
I 0208 075 001 281*D CCPN Computing Centre Nuclear Physics
|
|||
|
I 0208 075 002 314 GRF
|
|||
|
A 0208 075 020 655 LITP LITP Unix 4.3 BSD (France)
|
|||
|
A 0208 075 041 280 Pasteur MV8000
|
|||
|
A 0208 078 020 118 INRIA INRIA, Rocquencourt (France) Multics
|
|||
|
B 0208 078 020 16901 INRIA Institute National de Recherche en
|
|||
|
Informatique
|
|||
|
0208 078 081 67304 INRIAUU INRIA - UUCICO
|
|||
|
I 0208 091 000 270*DCISICISI3 IBM - TSO
|
|||
|
I 0208 091 000 309*DCISICISI1 IBM - TSO
|
|||
|
I 0208 091 000 519*DCISICISI2 IBM - TSO
|
|||
|
I 0208 091 010 320 CJRCE
|
|||
|
I 0208 091 040 047 SACLAY Saclay - France
|
|||
|
I 0208 091 040 532 Pascal
|
|||
|
A 0208 091 190 258 LURE, VAX 11/780 VMS 4.6, Synchrotron
|
|||
|
source (SES)
|
|||
|
0208 1 NTI
|
|||
|
A 0208 101 TEXTFRA Text Generator, FRANCE
|
|||
|
0214 E Spain
|
|||
|
0214 1 SPAIN Spanish data network (NID/CTNE)
|
|||
|
0214 5 Iberpac
|
|||
|
O 0214 521 202 5022
|
|||
|
A 0214 521 302 1020 ETSITM (EANNET) VAX 11/750 VMS 4.5
|
|||
|
0222 I Italy
|
|||
|
0222 2 Itapac
|
|||
|
A 0222 262 002 1 ESAIRS1 ESA-QUEST, IRS 1
|
|||
|
I 0222 262 002 2 ESAIRS2 ESA-IRS 2
|
|||
|
O 0222 262 003 2 IASI VAX
|
|||
|
A 0222 262 004 3 VAXLNF (INFNET) VAX 8650
|
|||
|
O 0222 263 200 4 NUA-Information ?
|
|||
|
A 0222 265 014 0 Techni-Link
|
|||
|
I 0222 306 3 Progetto-Sirio
|
|||
|
I 0222 306 700 European Space Agency
|
|||
|
I 0222 306 9*D CNUCE CNUCE
|
|||
|
I 0222 307 0 CILEA
|
|||
|
I 0222 307 1 CED Datenbanksysteme Rom
|
|||
|
I 0222 307 2*D RTC20 JRC
|
|||
|
I 0222 307 7*D QUESTD5 ESA ESA
|
|||
|
D 0222 307 8*D QUESTD5 ESA2 ESA
|
|||
|
0228 CH Switzerland
|
|||
|
D 0228 310 1*DN DATASTAR Data-Star, Switzerland
|
|||
|
0228 4 Telepac
|
|||
|
A 0228 462 110 0101 Cigy IBMA
|
|||
|
A 0228 462 110 0102 Cigy DEC1091
|
|||
|
A 0228 462 110 09 EDP Basel
|
|||
|
A 0228 462 110 23 ?
|
|||
|
A 0228 462 110 34 ?
|
|||
|
A 0228 462 110 36 ?
|
|||
|
A 0228 462 110 52 DANZA'S 11/785 VMS 4.4
|
|||
|
A 0228 462 110 61 PKK node RBPK00
|
|||
|
A 0228 462 110 66 PROGNOS Basel (CIERR 1402)
|
|||
|
A 0228 462 110 70 ?
|
|||
|
A 0228 462 110 84 (CIERR 1402)
|
|||
|
Y 0228 462 170 02 INFOTEX PTT
|
|||
|
I 0228 464 109 06 GD PTT Schweiz (ring with CTRL G)
|
|||
|
A 0228 464 110 10 DM DATAMAIL (RSAG)
|
|||
|
A 0228 464 110 110 DSTAR2 Datastar (2nd. Line)
|
|||
|
A 0228 464 110 112 RSAG
|
|||
|
Z 0228 464 110 113 RSAG
|
|||
|
A 0228 464 110 115 DATASTAR Data-Star, Switzerland (Pharmadatenbank ?)
|
|||
|
A 0228 468 113 150 Management Joint Trust
|
|||
|
D 0228 468 114 05 CERN CERN (=CERNXX?)
|
|||
|
A 0228 468 114 0505 CS Group LAVC on node UXCOMS
|
|||
|
A 0228 468 114 0510 CER CERN, Geneva
|
|||
|
A 0228 468 114 0510 CERNVAX CERN X25 Multigate
|
|||
|
B 0228 468 114 0510*DLO CERNLO CERN 300 bps OUTDIAL (where ???)
|
|||
|
B 0228 468 114 0510*DME CERNME CERN 1200 bps OUTDIAL (where ???)
|
|||
|
B 0228 468 114 0510*DHI CERN ?
|
|||
|
A 0228 468 114 0514 4.2 BSD UNIX (Mint)
|
|||
|
A 0228 468 114 0515 Cern LS Group LAVC VXGIFT
|
|||
|
A 0228 468 114 0520 Cern
|
|||
|
A 0228 468 114 0532 Cern
|
|||
|
A 0228 468 114 0533 L3 test beam VAX-750 VXC3
|
|||
|
A 0228 468 114 0534 UXINFN
|
|||
|
A 0228 468 114 0538 CS Group LAVC on node UXCOMS
|
|||
|
A 0228 468 114 054 Cern
|
|||
|
A 0228 468 114 0545 Cern
|
|||
|
A 0228 468 114 0551 VXCERN VMS 4.6
|
|||
|
A 0228 468 114 0553 VXCERN VMS 4.6
|
|||
|
A 0228 468 114 0556 VXCERN VMS 4.6
|
|||
|
A 0228 468 114 0560 CERN VXNA31
|
|||
|
A 0228 468 114 0561 CERN VXNA31
|
|||
|
A 0228 468 114 0562 L3 VAX 11/750 VXC3MU
|
|||
|
A 0228 468 114 0572 ISOLDES VAX 11/750
|
|||
|
A 0228 468 114 0574 ? (Operator)
|
|||
|
A 0228 468 114 0581 ?
|
|||
|
A 0228 468 114 0583 %Merit:X.25 (Merit Computer Network, see
|
|||
|
appendix)
|
|||
|
A 0228 468 114 0584 Develcon
|
|||
|
A 0228 468 114 0587 ? (Operator)
|
|||
|
A 0228 468 114 0588 ? (Operator)
|
|||
|
A 0228 468 114 0589 ? (Operator)
|
|||
|
A 0228 468 114 0592 Princeton University High Energy Physics
|
|||
|
Group Vax 11/750
|
|||
|
A 0228 468 114 0593 University of Michigan Physics Vax 11/750
|
|||
|
A 0228 468 114 0596 N.U. Physics Vax 11/750
|
|||
|
A 0228 468 114 0597 Harvard University High Energy Physics Lab.
|
|||
|
Vax 8650
|
|||
|
A 0228 468 114 0598 MIT-LNS*PIERRE
|
|||
|
A 0228 468 114 0599 DoD, Distributed Databases Coordination
|
|||
|
Center (JMILLER,X0TF3AP)
|
|||
|
D 0228 468 114 18 BIOGEN (=GODEL?)
|
|||
|
A 0228 468 114 23 EDCHUB::
|
|||
|
A 0228 469 110 02 EPFL (something)
|
|||
|
A 0228 469 110 0202 EPFL HELP
|
|||
|
D 0228 469 110 0203 EPFL DE.VAX
|
|||
|
D 0228 469 110 0204 EPFL GC.VAX
|
|||
|
A 0228 469 110 0205 EPFL DP.VAX
|
|||
|
A 0228 469 110 0206 EPFL ME.VAX
|
|||
|
A 0228 469 110 0207 EPFL GR.VAX
|
|||
|
A 0228 469 110 0208 EPFL MA.VAX
|
|||
|
A 0228 469 110 0209 EPFL DI.VAX
|
|||
|
D 0228 469 110 0210 EPFL IMAC.PDP
|
|||
|
D 0228 469 110 0211 EPFL CGL.VAX
|
|||
|
D 0228 469 110 0212 EPFL DE.MVAX
|
|||
|
A 0228 469 110 0213 EPFL CC.VAX
|
|||
|
A 0228 469 110 03 EPFL Cyber 855
|
|||
|
Ar0228 469 110 0301 EPFL Cyber
|
|||
|
A 0228 475 110 02 HSG St.Gallen
|
|||
|
Ar0228 479 104 00 Cern
|
|||
|
A 0228 479 110 23 I.P.Sharp (CA)
|
|||
|
X 0228 479 110 86 KOMETH (ETH ZH)
|
|||
|
A 0228 479 110 650 KOMETH (ETH ZH)
|
|||
|
I 0228 479 111
|
|||
|
A 0228 479 111 06 GRS
|
|||
|
I 0228 479 111 086
|
|||
|
I 0228 479 111 11
|
|||
|
I 0228 479 111 18 ZEV-Mailbox Zuerich
|
|||
|
A 0228 479 111 750 ComNet (R-Nua)
|
|||
|
A 0228 479 311 49 KOMETH Output (ETH ZH)
|
|||
|
A 0228 499 111 02001 KOMETH (Entry Uni)
|
|||
|
0228 9 Radio-Suisse
|
|||
|
0232 A Austria
|
|||
|
0232 2 Datex-P
|
|||
|
O 0232 242 210 91
|
|||
|
? 0232 242 211 42*DMAI Sysnet Wien (Gast,Gast)
|
|||
|
A 0232 252 310 000 Uni Wien
|
|||
|
0232 9 Radio Austri
|
|||
|
A 0232 911 602 323 Inpadoc
|
|||
|
0234 GB United Kingdom
|
|||
|
0234 1 IPSS IPSS UK network
|
|||
|
A 0234 110 020 02018 BT DIALCOM GROUP (PRESTEL ?)
|
|||
|
0234 2 PSS
|
|||
|
0234 198 061 60 Queen Marry C.
|
|||
|
B 0234 207 920 002 SWVA
|
|||
|
0234 211 920 100515 Hostess Doc.
|
|||
|
0234 212 Dialnet
|
|||
|
O 0234 212 080 105
|
|||
|
I 0234 212 080 110 EPSONUK Epson (UK)
|
|||
|
A 0234 212 300 120 DIALNET IGS Leased line to DIALOG in US
|
|||
|
A 0234 212 300 12011 DIALNET LRS-DIALOG 2 Dialog via London
|
|||
|
Ar0234 212 300 12013 DIALMRC LRS-Dialmail (Reverse Charging)
|
|||
|
A 0234 212 300 120*D@ DIALNET IGS Leased line to DIALOG in US
|
|||
|
A 0234 212 300 2920 GeoNet GEO2
|
|||
|
B 0234 212 301 161 OPTEL
|
|||
|
0234 212 301 186 GEOSYSTEMS
|
|||
|
0234 212 301 187 CAP GROUP LTD.
|
|||
|
0234 212 301 18722 CAP CAP Industry Ltd.
|
|||
|
0234 212 301 281 ONE TO ONE COMMS
|
|||
|
O 0234 212 302 02192 PSSCLK PSS Clock
|
|||
|
B 0234 212 399 12013 DIALMAL Dialmail via London
|
|||
|
A 0234 212 900 115 STL STL : ACER (BSD UNIX 4.2)
|
|||
|
0234 213 000 11
|
|||
|
0234 213 000 151 COMPUTAS Computas Ltd
|
|||
|
0234 213 000 1511 COMPUTAS LTD.
|
|||
|
D 0234 213 900 10150 ALVEY Alvey Mail and FTP.
|
|||
|
0234 214 200 162 GLAXO Galaxo Industries
|
|||
|
0234 214 400 12 CONTROL DATA LTD.
|
|||
|
0234 215 000 11600 C3
|
|||
|
0234 215 710 104 Consultans Ltd
|
|||
|
0234 216 700 127 PFIZER Pfizer, SANDWICH
|
|||
|
0234 216 700 12701 PFIZER1 Pfizer, SANDWICH
|
|||
|
0234 216 700 12702 PFIZER2 Pfizer, SANDWICH
|
|||
|
0234 216 700 12703 PFIZER3 Pfizer, SANDWICH
|
|||
|
0234 216 700 12704 PFIZER4 Pfizer, SANDWICH
|
|||
|
0234 216 700 12706 PFIZER6 Pfizer, SANDWICH
|
|||
|
0234 218 801 00300 British Telecom Hotline
|
|||
|
0234 2 PSS
|
|||
|
0234 198 061 60 Queen Marry C.
|
|||
|
B 0234 207 920 002 SWVA
|
|||
|
0234 211 920 100515 Hostess Doc.
|
|||
|
0234 212 Dialnet
|
|||
|
O 0234 212 080 105
|
|||
|
I 0234 212 080 110 EPSONUK Epson (UK)
|
|||
|
A 0234 212 300 120 DIALNET IGS Leased line to DIALOG in US
|
|||
|
A 0234 212 300 12011 DIALNET LRS-DIALOG 2 Dialog via London
|
|||
|
Ar0234 212 300 12013 DIALMRC LRS-Dialmail (Reverse Charging)
|
|||
|
A 0234 212 300 120*D@ DIALNET IGS Leased line to DIALOG in US
|
|||
|
A 0234 212 300 2920 GeoNet GEO2
|
|||
|
B 0234 212 301 161 OPTEL
|
|||
|
0234 212 301 186 GEOSYSTEMS
|
|||
|
0234 212 301 187 CAP GROUP LTD.
|
|||
|
0234 212 301 18722 CAP CAP Industry Ltd.
|
|||
|
0234 212 301 281 ONE TO ONE COMMS
|
|||
|
O 0234 212 302 02192 PSSCLK PSS Clock
|
|||
|
B 0234 212 399 12013 DIALMAL Dialmail via London
|
|||
|
A 0234 212 900 115 STL STL : ACER (BSD UNIX 4.2)
|
|||
|
0234 213 000 11
|
|||
|
0234 213 000 151 COMPUTAS Computas Ltd
|
|||
|
0234 213 000 1511 COMPUTAS LTD.
|
|||
|
D 0234 213 900 10150 ALVEY Alvey Mail and FTP.
|
|||
|
0234 214 200 162 GLAXO Galaxo Industries
|
|||
|
0234 214 400 12 CONTROL DATA LTD.
|
|||
|
0234 215 000 11600 C3
|
|||
|
0234 215 710 104 Consultans Ltd
|
|||
|
0234 216 700 127 PFIZER Pfizer, SANDWICH
|
|||
|
0234 216 700 12701 PFIZER1 Pfizer, SANDWICH
|
|||
|
0234 216 700 12702 PFIZER2 Pfizer, SANDWICH
|
|||
|
0234 216 700 12703 PFIZER3 Pfizer, SANDWICH
|
|||
|
0234 216 700 12704 PFIZER4 Pfizer, SANDWICH
|
|||
|
0234 216 700 12706 PFIZER6 Pfizer, SANDWICH
|
|||
|
0234 218 801 00300 British Telecom Hotline
|
|||
|
0234 219 PSS-Network
|
|||
|
0234 219 200 001 Network Monitoring Centre (NFS)
|
|||
|
0234 219 200 002 Network Monitoring Centre (NFS)
|
|||
|
0234 219 200 100 University of London Computing Centre
|
|||
|
0234 219 200 10069 JANETGW PSS/JANET Gateway (ULCC)
|
|||
|
B 0234 219 200 101 Finsbury Data Service
|
|||
|
0234 219 200 1082 BING COMPUTER SERVICES (EUROPE) LTD.
|
|||
|
A 0234 219 200 118 ADPUK ADP NETWORK SERVICES LTD. (=AUTONET?)
|
|||
|
0234 219 200 118 atomic energy research establishment
|
|||
|
0234 219 200 13370 QTLON Quantime
|
|||
|
A 0234 219 200 146 CEGB CEGB, Park Street, London
|
|||
|
B 0234 219 200 14869 ULCC Univ. London Computer Centre (=JANET2?)
|
|||
|
B 0234 219 200 14918 UCLMVAX UCL Microvax ARPA Gateway
|
|||
|
B 0234 219 200 14970
|
|||
|
0234 219 200 154 UNILEVER COMPUTER SERVICES LTD.
|
|||
|
A 0234 219 200 171 LEXIS LEXIS
|
|||
|
A 0234 219 200 190 INFOLINE PERGAMON INFOLINE LTD. (NFS)
|
|||
|
A 0234 219 200 203 IPSH SHARP, I. P. ASSOCIATES LTD.
|
|||
|
A 0234 219 200 220 BRITISH LIBRARY ON-LINE SYSTEM
|
|||
|
A 0234 219 200 222 BLAISE British Library Information System
|
|||
|
0234 219 200 297 RLFE & NOLAN COMPUTER SERVICES PLC
|
|||
|
B 0234 219 200 300 UCL University College London - Computer
|
|||
|
0234 219 200 300 UCLFTP UCL (FTP)
|
|||
|
A 0234 219 200 300 UCLMAIL UCL (JNT Mail)
|
|||
|
0234 219 200 304 University Computing Company (GB) Ltd.
|
|||
|
B 0234 219 200 333 EUCLID University College London Computer Centre
|
|||
|
0234 219 200 394 CISI CISI (=SIANET?;=Computer Services, London?)
|
|||
|
0234 219 200 871 Instrument Rentals (UK) Ltd.
|
|||
|
B 0234 219 201 002 POOLE
|
|||
|
0234 219 201 004 BGOLD81 Telecom BT-GOLD System 81
|
|||
|
0234 219 201 00472 BGOLD72 Telecom BT-GOLD System 72
|
|||
|
0234 219 201 00474 BGOLD74 Telecom BT-GOLD System 74
|
|||
|
0234 219 201 00479 BTGOLD Telecom BT-GOLD System 79
|
|||
|
0234 219 201 00481 BTGOLDA Telecom BT-GOLD System 81
|
|||
|
0234 219 201 00482 BTGOLD82 Telecom BT-GOLD System 82
|
|||
|
0234 219 201 00484 BGOLD84 Telecom Gold System 84
|
|||
|
0234 219 201 005 PSSMAIL PSS TELE-MAIL service
|
|||
|
B 0234 219 201 00513 DIANENQ Euronet DIANE Enquiry Service
|
|||
|
(=Echo,Rutherford?)
|
|||
|
B 0234 219 201 00513 EUROINFO Euronet Diane Information Service
|
|||
|
(=Echo,Rutherford?)
|
|||
|
A 0234 219 201 00515 BTDOC BT Online Documentation Service
|
|||
|
A 0234 219 201 00515 HOSTESS Hostess system (BT)
|
|||
|
0234 219 201 00530 BAYNARD BT Protocol Study Centre (NFS)
|
|||
|
0234 219 201 00615 PSSDOC PSS documentation service/X25 technical
|
|||
|
info on line
|
|||
|
0234 219 201 00620 BTBILL BT Online Billing
|
|||
|
0234 219 201 0100513
|
|||
|
0234 219 201 01013 HOSTESS Hostess system (BT) (=PSS Switchstream 1 ?)
|
|||
|
T 0234 219 201 01030 TSTB British Telecom
|
|||
|
0234 219 201 025 PRESTEL BT Prestel Service
|
|||
|
0234 219 201 02517
|
|||
|
0234 219 201 07800
|
|||
|
0234 219 201 15600 ESA1 ESA-IRS via London
|
|||
|
0234 219 201 18 ADPUK ADP Network Services Ltd
|
|||
|
0234 219 210 050 BT Mailbox facility (NFS)
|
|||
|
0234 219 511 31 GEC GEC Computers Borehamwood
|
|||
|
0234 219 511 311 GECB GEC Computers Ltd. Borehamwood
|
|||
|
0234 219 513 11 GECB GEC Computers Ltd. Borehamwood
|
|||
|
0234 219 709 111 Modular Computer Services Ltd. (MODCOMP)
|
|||
|
? 0234 219 709 111 NPL1 National Physical Laboratory
|
|||
|
0234 219 709 210 NPL2 National Physical Laboratory, Protocol Std
|
|||
|
Group
|
|||
|
B 0234 219 806 160 QMC Queen Mary College London
|
|||
|
X 0234 220 200 1070 island-Adventure-Game
|
|||
|
X 0234 220 200 10700 island-Adventure-Game
|
|||
|
0234 220 641 141 ESSX Essex, University of, Computing Service
|
|||
|
(2653,2653,Mist)
|
|||
|
A 0234 220 641 1411 MUD (Adventure Game), <guest>, <mist> or
|
|||
|
<2653,2653>
|
|||
|
B 0234 221 222 122 MIDB MIDNET Gateway at Birmingham (=MIDBHM)
|
|||
|
0234 221 222 223 BIRP Prime R & D at Birmingham
|
|||
|
0234 221 222 225 Freight Comp. Services
|
|||
|
0234 222 236 163 CARDF Cardiff, University College
|
|||
|
0234 222 236 16300 CARDIFF Univ. Coll. Cardiff Multics
|
|||
|
0234 222 236 236 UWIST University of Wales
|
|||
|
0234 222 300 16102 ACORN Acorn Computers
|
|||
|
0234 222 339 399 CAMBRID Cambridge University (Phoenix)
|
|||
|
0234 222 530 303 SWURCC South-West Universities
|
|||
|
0234 222 530 30388 SWURCC South-West Universities Network
|
|||
|
0234 222 530 30398 SWCFTP SWURCC (FTP)
|
|||
|
A 0234 222 715 151 KENT University of Kent
|
|||
|
X 0234 222 715 11 ? (---,Guest,Friend (call PIP))
|
|||
|
0234 223 440 TI Texas Instruments Ltd
|
|||
|
0234 223 440 144 BED5 Prime R & D at Bedford (NFS)
|
|||
|
0234 223 440 345 TI Texas Instruments Ltd
|
|||
|
0234 223 500 10998 HLH High Level Hardware Ltd.
|
|||
|
B 0234 223 519 111 AERE Atomic Energy Research Establishment at
|
|||
|
Harwell
|
|||
|
T 0234 223 519 11198 ADA ADA UK Database
|
|||
|
0234 223 519 119169 JANET
|
|||
|
0234 223 519 191 DLVAFTP Daresbury SRS VAX (FTP)
|
|||
|
A 0234 223 519 191 JANET Gateway to JANET at Rutherford
|
|||
|
0234 223 519 191 OUCSFTP OUCS VAX (FTP) - Experimental
|
|||
|
0234 223 519 191 REVSFTP ROE Starlink VAX (FTP)
|
|||
|
0234 223 519 191 RLDAFTP Rutherford DCS 11/70 (FTP)
|
|||
|
0234 223 519 191 RLGBFTP RL GEC (FTP)
|
|||
|
0234 223 519 191 RLIBFTP RL IBM 370 CMS (FTP)
|
|||
|
0234 223 519 191 RLPCFTP L Prime C (FTP)
|
|||
|
0234 223 519 191 SERC Gateway to SERCNET at Rutherford
|
|||
|
0234 223 519 191 SERCENQ SERCNET Acc & P/word Fac.
|
|||
|
0234 223 519 191 SYPEFTP Surrey Prime 550 (FTP)
|
|||
|
0234 223 519 191 UEAFTP East Anglia via SERC (FTP)
|
|||
|
0234 223 519 191 ZUVSFTP UCL Starlink VAX (FTP)
|
|||
|
A 0234 223 519 19169 SERCNET R/ford XXX SERCnet g/way
|
|||
|
(=DARESBURY,=JANET?)
|
|||
|
? 0234 223 519 19169,.10404000 Lancaster Uni
|
|||
|
B 0234 223 519 19169,.36 Oxford2
|
|||
|
? 0234 223 519 19169,49000001
|
|||
|
B 0234 223 519 19169,.50200014 Oxford
|
|||
|
B 0234 223 519 19169,.CPVC Omega VAX
|
|||
|
A 0234 223 519 19169,.CPVD Merlin VAX
|
|||
|
B 0234 225 621 126 DECSS DEC Software Support VAX (=BEANO?)
|
|||
|
0234 227 200 110 GEAC 8000 ITI
|
|||
|
0234 227 200 112 HPLB HPLB (Hewlett Packard Labs, Bristol)
|
|||
|
0234 227 230 230 BRST University of Bristol
|
|||
|
0234 227 230 23000 BRISTOL University of Bristol
|
|||
|
0234 227 230 231 DLLON Comp. & Manag. Services Ltd.
|
|||
|
0234 227 230 301 GAC Computers Ltd.
|
|||
|
0234 227 230 333 AVON Avon Universities Computer Centre
|
|||
|
0234 227 230 33300 AUCC Avon Universities Computer Centre
|
|||
|
0234 227 230 33398 AUCCFTP AUCC (FTP)
|
|||
|
B 0234 227 900 102 BLAISE British Library Information System
|
|||
|
0234 227 900 10400 ESTELLE STC Estelle
|
|||
|
0234 227 900 14302 ITT ITT Harlow (=ALCATEL?)
|
|||
|
0234 231 300 101 PRIME Office, Edinburgh
|
|||
|
0234 231 300 102 Forestry Commission FTP
|
|||
|
0234 231 300 105 LATTLOG Lattice Logic LTD
|
|||
|
0234 231 300 107
|
|||
|
B 0234 231 354 354 ERCC Edinburgh Regional Computer Centre
|
|||
|
0234 231 354 35419 BUSHFTP RCO 2988 (FTP)
|
|||
|
B 0234 231 354 35422 ERCC ERCC - 2980, 2972 (EMAS) (=RCONET?)
|
|||
|
0234 232 500 124 EXIS EXIS
|
|||
|
I 0234 233 458 158 STAND St. Andrews University VAX
|
|||
|
B 0234 233 458 15898 STANFTP St. Andrews Univ. (FTP)
|
|||
|
0234 234 417 117 ICL at Bracknell
|
|||
|
0234 227 230 333 ?
|
|||
|
B 0234 239 232 323 EXETER1 Exeter University
|
|||
|
0234 239 232 32304 EXTR University of Exeter
|
|||
|
0234 241 200 107
|
|||
|
0234 241 260 106 SCRSX University of Strathcylde PDP-11/44 (RSX)
|
|||
|
A 0234 241 260 10604 ? (,5020015,Birch/Bryan)
|
|||
|
0234 241 260 260 GLSG University of Glasgow (NFS)
|
|||
|
B 0234 241 260 26004 Glasgow
|
|||
|
0234 246 200 10243 ICL West Gorton 'B' Service
|
|||
|
0234 246 200 10248 ICL West Gorton 'X' Service
|
|||
|
0234 246 200 10277 ICL West Gorton Perq
|
|||
|
0234 246 240 240 ICLL ICL at Letchworth (=Kidsgrove?) (NFS)
|
|||
|
0234 247 300 103 MTIER Management Systems Ltd.
|
|||
|
0234 247 300 10300 Bridge, Switch
|
|||
|
0234 247 300 10340 Bridge, (VAX/VMS)
|
|||
|
0234 247 300 10345 Bridge, (MUX(VT100))
|
|||
|
0234 247 300 10346 Bridge
|
|||
|
0234 247 302 022 MHGA LDC at Martlesham
|
|||
|
0234 248 300 106 DWENT-SDC Search Service
|
|||
|
0234 248 321 321 DWENT-SDC Search Service
|
|||
|
B 0234 251 248 248 LIVE University of Liverpool
|
|||
|
0234 252 724 241 BSL BL Systems Ltd.
|
|||
|
0234 253 265 165 LEEDS University of Leeds (NFS)
|
|||
|
0234 253 300 124 CAMTEC Camtec, Leicester
|
|||
|
0234 253 300 12406 CAMTEC Camtec, Leicester (hard copy printer)
|
|||
|
0234 258 200 106 ARC Agricultural Research Council (GEC -
|
|||
|
Switch)
|
|||
|
0234 258 200 106 EMALFTP East Malling (FTP)
|
|||
|
0234 258 200 106 RESFTP RES (Rothampstead) - FTP
|
|||
|
0234 258 200 10604 AGRIFTP AGRINET (CPSE) FTP
|
|||
|
0234 258 200 10604 AGRINET AGRINET Gateway
|
|||
|
0234 258 200 10604 EASTMAL East Malling
|
|||
|
0234 258 240 242 GECD GEC Computers Ltd at Dunstable
|
|||
|
0234 258 240 24200 MRCA GEC - Marconi Research Centre
|
|||
|
B 0234 260 227 227 MIDN MIDNET Gateway at Nottingham (University
|
|||
|
Leicester?) (=MIDNOT?)
|
|||
|
B 0234 261 456 8383 Microlink
|
|||
|
B 0234 261 600 119 Manchester
|
|||
|
0234 261 600 133 IBM - SALE (also FTP)
|
|||
|
B 0234 261 600 152 UMDAFL University of Manchester Dataflow VAX
|
|||
|
0234 261 643 143 UMRCC University of Manchester Regional Computer
|
|||
|
Centre
|
|||
|
0234 261 643 14398 UMRFTP UMRCC (FTP)
|
|||
|
0234 261 643 210 SALF Salford University
|
|||
|
0234 261 643 21090 SALFORD Salford -> GANNET
|
|||
|
0234 261 643 21090 NRS NRS
|
|||
|
B 0234 261 643 343 FERRANTI Feranti Computer Systems
|
|||
|
0234 261 643 365 ICLBRA
|
|||
|
0234 261 643 36543 ICL West Gorton 'B' Service
|
|||
|
0234 261 643 36548 ICL West Gorton 'X' Service
|
|||
|
0234 261 643 36577 ICL West Gorton Perq (also FTP)
|
|||
|
0234 262 500 484 Software Sciences Ltd.
|
|||
|
B 0234 262 800 151 CDM/EH (=Maidenhead?)
|
|||
|
0234 262 800 43300
|
|||
|
B 0234 263 259 159 NUMAC University of Newcastle
|
|||
|
0234 264 200 136 Primenet
|
|||
|
B 0234 270 500 115 MAXXIM
|
|||
|
B 0234 270 500 142 Farenham
|
|||
|
T 0234 270 500 15 Uni Brighton (GUEST,WELCOME)
|
|||
|
0234 270 712 217 HATF Hatfield Polytechnic
|
|||
|
0234 273 417 171 DEC-RDG Digital Equipment Ltd Reading
|
|||
|
0234 273 417 217 MODC Modcomp
|
|||
|
0234 273 417 317 DECR DEC at Reading
|
|||
|
0234 274 200 103 SHEFFIELD, University of, Dept.of
|
|||
|
Electronic & Elec...
|
|||
|
0234 274 200 103*DCODUCODUS Codus
|
|||
|
0234 274 253 385 DVY Computing Ltd.
|
|||
|
0234 274 317 31
|
|||
|
0234 275 300 102 GIS Ltd.
|
|||
|
0234 275 312 212 BOC British Oxygen (=The World Reporter??)
|
|||
|
0234 275 312 212 DATASOLVE as above
|
|||
|
0234 275 312 212 EUROLEX British Oxygen Company
|
|||
|
0234 275 317 173 Lynx Computers Ltd.
|
|||
|
0234 275 317 177 TELEFILE Computer Services Ltd.
|
|||
|
0234 275 317 177 GSI GSI (NFS)
|
|||
|
0234 278 228 282 ICL Letchworth
|
|||
|
0234 278 228 288 ICL Letchworth
|
|||
|
0234 284 400 108 Culham, (VAX)
|
|||
|
0234 284 400 123 ALVEY Alvey Electronic Mail
|
|||
|
B 0234 289 500 109 UXB
|
|||
|
0234 290 468 168 YORK York University PSS Gateway
|
|||
|
B 0234 290 468 168 YORKFTP York University (FTP)
|
|||
|
0234 290 468 168 Gateway To DEC-10 At York
|
|||
|
0234 290 468 16804 YORKTS York TS29 Port
|
|||
|
0234 290 524 242 RSRE Radio, Space Research Establishment
|
|||
|
0234 290 524 24203 RSREDL RSRE
|
|||
|
0234 290 524 24204 RSRESNK RSRE
|
|||
|
0234 290 524 24250 RSREA Radio, Space Research Establishment for
|
|||
|
ALVEY mail
|
|||
|
0234 290 840 111 POLIS SCION
|
|||
|
0234 290 840 111 SCICON SCICON, South England
|
|||
|
0234 292 549 149 DL SERC at Daresbury Laboratory
|
|||
|
0234 293 212 212 DATASOLVE LTD.
|
|||
|
0234 293 212 212 BOC British Oxygen Company (NFS)
|
|||
|
D 0234 293 765 ARTTEL British Library, Boston Spa
|
|||
|
0234 293 765 265 British Library Lending Divi.
|
|||
|
0234 299 212 221 NOLTON Nolton Communications Ltd. (NFS)
|
|||
|
0234 3 Euronet
|
|||
|
0234 307 813 EUROINFO Euronet Diane Information Service
|
|||
|
0234 8 TELEX UK Telex network
|
|||
|
0234 892 992 0 DECTELX
|
|||
|
I 0235 200 143 00165
|
|||
|
0238 DK Denmark
|
|||
|
0238 2 Datapak
|
|||
|
A 0238 241 592 400 Valby I/S Datacentralen
|
|||
|
A 0238 241 745 600 RECKU Univac in Copenhagen University
|
|||
|
0238 241 745 60000 Recku Univac (Enter @@ENQ)
|
|||
|
0238 241 745 60002 UDIKU
|
|||
|
A 0238 242 126 400 Lyngby DTB; I/S Datacentralen
|
|||
|
I 0238 389 3 Euronet Aarhus
|
|||
|
0240 S Sweden
|
|||
|
I 0240 181 559 76 LIUIDA S Linkvping LiUIDA Teletex
|
|||
|
0240 2 Datapak
|
|||
|
A 0240 200 002 05 Uppsala STUNS VAX/UNIX KULING
|
|||
|
I 0240 200 044 4 ENEA ENEA
|
|||
|
A 0240 200 100 110 Stockholm QZ/DEC-10
|
|||
|
A 0240 200 100 120 Stockholm QZ/CD Cyber 730
|
|||
|
O 0240 200 100 203 Uppsala, UU, Teknikum, NORD 100/500
|
|||
|
A 0240 200 100 205 Uppsala, UU, Stuns, VAX 750
|
|||
|
A 0240 200 100 206 Uppsala, UDAC/DECnet RTR18A
|
|||
|
O 0240 200 100 207 Uppsala, UDAC, Cyber 835
|
|||
|
A 0240 200 100 228 Uppsala, UDAC/UPNET - Terminalnaet
|
|||
|
A 0240 200 100 232 Uppsala, UDAC, IBM/GUTS (BASF 7/68 ?)
|
|||
|
O 0240 200 100 28 Uppsala Upnet
|
|||
|
? 0240 200 100 30 Umeaa VAX-750 Skogsh. Umeaa Univ
|
|||
|
A 0240 200 100 303 Umeaa, UMDAC/BIOVAX
|
|||
|
A 0240 200 100 304 Umeaa, Skogshoegskolan, VAX 750
|
|||
|
A 0240 200 100 305 Umeaa, UMDAC/DECnet RTR09A, (Vax 11/750)
|
|||
|
A 0240 200 100 30520 Umeaa, UMDAC/BASUN
|
|||
|
A 0240 200 100 30540 Umeaa, UMDAC/UTB1 (Vax 11/780)
|
|||
|
A 0240 200 100 30550 Umeaa, UMDAC/UTB2 (Vax 11/750)
|
|||
|
A 0240 200 100 30570 Umeaa, UMDAC/OSTVAX (Vax 11/780, Hoegsk i
|
|||
|
Oe-sund)
|
|||
|
A 0240 200 100 307 Umeaa, UMDAC/Cyber 850
|
|||
|
D 0240 200 100 312 Luleaa, Tekn hoegsk, NORD 100
|
|||
|
D 0240 200 100 313 Luleaa, Tekn hoegsk, NORD 100
|
|||
|
A 0240 200 100 328 Umeaa, UMDAC/NUNET - Terminalnaet
|
|||
|
D 0240 200 100 33 Umeaa VAX-11/780
|
|||
|
A 0240 200 100 403 Linkoeping, ULi/LIUIDA, uVAX-I
|
|||
|
D 0240 200 100 404 Linkoeping, ULi/PDP 11/23 BULL
|
|||
|
A 0240 200 100 405 Linkoeping, LIDAC, VAX 11/780 VIKTOR
|
|||
|
A 0240 200 100 407 Linkoeping, LIDAC/DECnet RTR13A, uVAX-II
|
|||
|
D 0240 200 100 432 Linkoeping, LIDAC/TEXAS - Terminalnaet
|
|||
|
A 0240 200 100 7 Primenet
|
|||
|
A 0240 200 101 903 Stockholm, SU, Psykologi, Prime 750
|
|||
|
A 0240 200 101 904 Stockholm, QZ IBM (Amdahl)
|
|||
|
A 0240 200 101 905 Stockholm, QZ, NFRVAX
|
|||
|
A 0240 200 101 907 Stockholm, QZ/DECnet RTR08A
|
|||
|
A 0240 200 101 914 Stockholm, SU, Fysik, Vax 780
|
|||
|
D 0240 200 101 926 Stockholm, KTH/KTHNET - Terminalnaet
|
|||
|
A 0240 200 101 928 Stockholm, QZ/QZNET - Terminalnaet
|
|||
|
O 0240 200 102 06 Uppsala UDAC uVAX-II RTR18A
|
|||
|
O 0240 200 102 07 Uppsala CD Cyber 835
|
|||
|
A 0240 200 102 7 Stockholm DEC-10/Janus
|
|||
|
A 0240 200 102 71 Stockholm DEC-10/Janus
|
|||
|
A 0240 200 201 603 Goeteborg, CTH, Infobeh, VAX 750, Unix
|
|||
|
D 0240 200 201 604 Goeteborg, GU, Pedagogiska inst, Prime 550
|
|||
|
A 0240 200 201 605 Goeteborg, GU, Statistiska inst, Prime 550
|
|||
|
D 0240 200 201 606 Goeteborg, CTH, Tillaempad Elektronik, VAX
|
|||
|
750
|
|||
|
A 0240 200 201 607 Goeteborg, Tillaempad Elektronik/DECnet
|
|||
|
RTR31A (RTR18A ?)
|
|||
|
A 0240 200 201 628 Goeteborg, GD/GUCNET - Terminalnaet
|
|||
|
D 0240 200 201 632 Goeteborg Upnod
|
|||
|
A 0240 200 205 4 SCB
|
|||
|
A 0240 200 278 0 Oerebro, Hoegskolan, Prime
|
|||
|
A 0240 200 292 6 Karlstad, Hoegskolan, VAX 11/780
|
|||
|
D 0240 200 310 204 Lund, Fysikum, NORD 500, Lucas
|
|||
|
O 0240 200 310 206 Lund, Maxlab, NORD 100
|
|||
|
A 0240 200 310 207 Lund, LDC/DECnet RTR46A, uVAX-II
|
|||
|
A 0240 200 310 20720 Lund, LDC/GEMINI, Vax 8350
|
|||
|
A 0240 200 310 228 Lund, LDC/LUNET - Terminalnaet
|
|||
|
0240 201 001 30 Stockholm QZ/Amdahl
|
|||
|
0240 201 002 03 Uppsala Teknikum Nord 100/500
|
|||
|
0240 5 SWEDEN Swedish data network (Telepak)
|
|||
|
I 0240 500 025 3 QZXB QZ by yet another route
|
|||
|
I 0240 500 025 7 Stockholm, DEC, VAX
|
|||
|
I 0240 501 50 Scannet, Goteborg
|
|||
|
I 0240 501 51 Scannet, Helsingfors
|
|||
|
I 0240 501 52 Stockholm KTH/TTDS
|
|||
|
I 0240 501 531 0 QZCOM QZ-COM - Stockholm University DEC-10
|
|||
|
I 0240 501 532 0 QZCB QZ Cyber
|
|||
|
I 0240 501 533 0 QZIB QZ Amdahl
|
|||
|
I 0240 501 54 UPPS Uppsala network, Sweden
|
|||
|
I 0240 501 550 3 Gottenburg, Sweden
|
|||
|
I 0240 501 582 8 LUND Lund University
|
|||
|
I 0240 501 60 Helsinki CP9500 HYLK B7800
|
|||
|
I 0240 502 00 Scannet, Stockholm
|
|||
|
I 0240 502 01 Denmark, Copenhagen Scannet
|
|||
|
I 0240 502 02 Tandem Computers
|
|||
|
I 0240 502 032 8 QZXA QZ Sweden via reverse PAD (=UPNET?)
|
|||
|
I 0240 502 032 832 Oden, Sweden
|
|||
|
I 0240 502 033 2 QZDA QZ DEC-10 Sweden
|
|||
|
I 0240 502 04 Prime Computers
|
|||
|
I 0240 502 05 Vaesteraas PAD ASEA Multics
|
|||
|
I 0240 502 52 KEMIDATA
|
|||
|
I 0240 502 53 QZXB QZ by yet another route
|
|||
|
0240 515 330 Amdahl
|
|||
|
0242 N Norway
|
|||
|
0242 2 NORWAY Norwegian data network (Datapak/Norpak)
|
|||
|
0242 192 010 1013 PSS DOC
|
|||
|
X 0242 211 000 00107 OSLO DEC-1099 DEC-net/PSI at Oslo University
|
|||
|
D 0242 211 000 001*D02 Oslo univ BRU-nett UNINETT
|
|||
|
D 0242 211 000 001*D03 OSLO DEC-10 at Oslo University
|
|||
|
D 0242 211 000 00100 Oslo univ DEC-1099 UNINETT
|
|||
|
D 0242 211 000 002 Oslo Scannet NSI Nord-100
|
|||
|
D 0242 211 000 01018 DATAPIN DATAPAK Info - Norway
|
|||
|
B 0242 211 000 074 Oslo VAX
|
|||
|
T 0242 223 000 00151 RBK Cyber 170 at IFE (Energy Research Centre)
|
|||
|
T 0242 223 000 001*D00 RBK Cyber 170 at IFE, Kjeller RBK UNINETT
|
|||
|
D 0242 223 000 002 Kjeller FFI UNINETT
|
|||
|
D 0242 245 000 00101 BERGEN Univac at Bergen University (UNINETT)
|
|||
|
D 0242 245 000 001*D00 BERGEN Univac at Bergen University
|
|||
|
A 0242 245 013 4 BBB Mailbox (Bergen By Byte)
|
|||
|
0242 253 000 001*D11 Trondheim UNINETT RUNIT UNIVAC
|
|||
|
T 0242 253 000 00101 RNI Univac at Trondheim University
|
|||
|
X 0242 253 000 00103 Trondheim RUNIT UNINETT VAX-780 (=PUNIT
|
|||
|
(EANNET) ?)
|
|||
|
T 0242 253 000 00104 Trondheim NLHT UNINETT VAX-750
|
|||
|
0242 265 000 001*D00 Tromso UNINETT U of Tromso, Cyber 171
|
|||
|
0242 253 000 001*D11 RUNIT Univac at Trondheim University
|
|||
|
0242 265 000 001*D81 Tromso UNINETT U of Tromso, NORD-10
|
|||
|
0242 265 000 001*D82 Tromso UNINETT U of Tromso, NORD-100
|
|||
|
0242 265 000 001*D83 Tromso UNINETT U of Tromso, NORD-500
|
|||
|
0242 265 000 00101 TROMSOE Cyber 170 at Tromsoe University (UNINETT)
|
|||
|
0242 265 000 001*D81 TROMSO ELAN at Tromsoe University
|
|||
|
X 0242 265 000 106 PORTACOM (PORTACOM)
|
|||
|
0244 SF Finland
|
|||
|
0244 2 Datapak (Finpak)
|
|||
|
A 0244 202 006 Economics HP 3000
|
|||
|
A 0244 202 007 University of Helsinki, B7800 (=CANDE ?)
|
|||
|
A 0244 202 008 VTKK (Staten DC) IBM 360
|
|||
|
A 0244 202 012 U o Helsinki Mopo Mikko3
|
|||
|
A 0244 203 008 HELVA High Energy Physics Vax 11/750
|
|||
|
A 0244 203 017 U of Technology DEC-20
|
|||
|
D 0244 231 006 Technical University of Tampere VAX
|
|||
|
A 0244 253 001 Tech U of Lappeenranta VAX/VMS
|
|||
|
A 0244 261 001 U of Vaasa VAX/VMS
|
|||
|
A 0244 273 002 University of Joensuu VAX
|
|||
|
D 0248 321 321 DWENT-SDC Search Service
|
|||
|
0262 D Germany
|
|||
|
0262 3 Euronet
|
|||
|
X 0262 307 4 INFAS
|
|||
|
0262 4 GERMANY German data network (Datex-P)
|
|||
|
I 0262 428 462 10706
|
|||
|
I 0262 428 479 11065
|
|||
|
D 0262 432 210 43002 Apple
|
|||
|
Ar0262 432 210 93001 Quick-Com
|
|||
|
Y 0262 442 010 49132
|
|||
|
O 0262 442 110 40325 OKI
|
|||
|
Y 0262 442 110 49130 PAD Frankfurt
|
|||
|
Y 0262 442 110 49133
|
|||
|
Y 0262 442 110 49230
|
|||
|
I 0262 442 151 40327 KIS (info)
|
|||
|
I 0262 442 210 49331
|
|||
|
A 0262 442 210 90371 elma-mailbox (~pim)
|
|||
|
Y 0262 442 210 99632
|
|||
|
O 0262 442 310 40312 Bibliothek Chemie
|
|||
|
I 0262 442 310 90306 Chemie
|
|||
|
I 0262 442 410 40341 RMI RMI Mailbox Aachen
|
|||
|
I 0262 442 433 40307 CMES
|
|||
|
O 0262 442 461 40343
|
|||
|
Y 0262 443 000 49234
|
|||
|
A 0262 443 000 90314 ?
|
|||
|
Y 0262 443 000 99131
|
|||
|
I 0262 444 000 90314 CCC Hamburg (Clinch), Hackerbox (1 line...)
|
|||
|
Y 0262 444 000 90330 Allgemeine Bank der Niederlande
|
|||
|
O 0262 444 000 90342 Batig Beteiligungen GmbH
|
|||
|
A 0262 444 000 90374 Master Control System (MCS) Hamburg
|
|||
|
Y 0262 444 000 99132
|
|||
|
Y 0262 444 441 40317 Osnabrueck, Driverstr.24, 2848 Vechta
|
|||
|
I 0262 445 110 30317 Metereologie
|
|||
|
I 0262 445 110 90323 Bibliothek
|
|||
|
I 0262 446 154 40371 DECATES - Oberramstadt
|
|||
|
Y 0262 446 210 49330
|
|||
|
Y 0262 446 810 49131
|
|||
|
Y 0262 446 810 49132
|
|||
|
O 0262 446 900 30331 IBD Online Frankfurt a.M.
|
|||
|
I 0262 446 900 40318 Chemie
|
|||
|
Y 0262 446 900 49231
|
|||
|
Y 0262 446 900 49232
|
|||
|
I 0262 446 900 90286 RZ
|
|||
|
Y 0262 446 900 99133
|
|||
|
O 0262 447 071 10303 Organische Chem.
|
|||
|
Y 0262 447 110 49134
|
|||
|
I 0262 447 114 9236 Emery
|
|||
|
I 0262 447 127 90344
|
|||
|
Y 0262 447 310 40313 Online-Literaturdok.
|
|||
|
A 0262 447 531 40310 Chemie
|
|||
|
I 0262 448 136 Luma Uni
|
|||
|
O 0262 448 136 90323 Genesys EDV-Systeme
|
|||
|
Y 0262 448 210 49630
|
|||
|
A 0262 448 900 30368 Phoenix
|
|||
|
Y 0262 448 900 49130
|
|||
|
A 0262 448 900 90313 Max Planck Institut
|
|||
|
Y 0262 448 900 90341 LMU Bibliothek
|
|||
|
Y 0262 448 900 99632
|
|||
|
I 0262 449 310 90312 Apel Hans-Joerg
|
|||
|
I 0262 452 000 21721 ???
|
|||
|
I 0262 450 000 90184
|
|||
|
I 0262 451 104 2301
|
|||
|
O 0262 452 010 40116 AEG-Telefunken
|
|||
|
I 0262 452 010 40179 RZ Uni Essen
|
|||
|
I 0262 452 020 40120 Apotheke Dr.Schiemes
|
|||
|
I 0262 452 080 40381 DVO Datenverarbeitung
|
|||
|
I 0262 452 090 832 ?
|
|||
|
I 0262 452 101 30030 3M Mailbox
|
|||
|
I 0262 452 101 40030 3M Mailbox
|
|||
|
I 0262 452 110 40001 RZU Duesseldorf (ND100)
|
|||
|
I 0262 452 110 40005 CIERR 1402
|
|||
|
I 0262 452 110 40016 ADV-Orga-Meyer & Co.
|
|||
|
I 0262 452 110 40018 ADV-Orga-Meyer & Co.
|
|||
|
Ar0262 452 110 40026 Primenet Stadt Duesseldorf,
|
|||
|
I 0262 452 110 40063 ADAC
|
|||
|
I 0262 452 110 40080 Uni Duesseldorf
|
|||
|
Dr0262 452 110 40099
|
|||
|
D 0262 452 110 40105 RZU Duesseldorf (Siemens 7.570)
|
|||
|
D 0262 452 110 40123 Data General
|
|||
|
Ar0262 452 110 40130
|
|||
|
Dr0262 452 110 40132
|
|||
|
A 0262 452 110 40134 MCKDU VM/SP
|
|||
|
I 0262 452 110 40211 Applid-Data-Research
|
|||
|
I 0262 452 110 40325 OKI-GmbH
|
|||
|
I 0262 452 110 90371 Software-Express
|
|||
|
I 0262 452 210 0
|
|||
|
Yr0262 452 210 40002 DIMDI Fep 1 Koeln
|
|||
|
Ar0262 452 210 40004 Primenet (MicroVMS V4.5)
|
|||
|
A 0262 452 210 40006 DIMDI Fep 2 Koeln (Medical docs)
|
|||
|
I 0262 452 210 40015 Kaufhof AG
|
|||
|
I 0262 452 210 40027 ADAC
|
|||
|
Ar0262 452 210 40035 Primenet
|
|||
|
A 0262 452 210 40104 DIMDI1 (German Med. Inst., Koeln)
|
|||
|
Yr0262 452 210 40119
|
|||
|
O 0262 452 210 40136 AEG-Telefunken
|
|||
|
I 0262 452 210 40202 Allianz RZ
|
|||
|
I 0262 452 210 40203 Allianz RZ
|
|||
|
I 0262 452 210 90265 RZ Uni Koeln
|
|||
|
I 0262 452 210 90304 Allianz RZ
|
|||
|
I 0262 452 210 90305 Allianz RZ
|
|||
|
I 0262 452 210 90349 Kaufhof AG (RZ 2)
|
|||
|
D 0262 452 210 90510 Geophysik und Meteorologie
|
|||
|
Ir0262 452 210 93001 ?
|
|||
|
A 0262 452 241 24104 VAX
|
|||
|
A 0262 452 241 24105 GMD2
|
|||
|
A 0262 452 241 24134 GMDZI
|
|||
|
A 0262 452 280 40082 GMD (TSO)
|
|||
|
A 0262 452 280 40187 BNVA Bonn VAX (PI)
|
|||
|
Ar0262 452 280 40191 Infas GmbH (VM)
|
|||
|
D 0262 452 280 90020 Amtsgericht
|
|||
|
A 0262 452 310 40003 EMX1 EMEX-Mailbox (Guest)
|
|||
|
I 0262 452 310 40017 Primenet
|
|||
|
O 0262 452 310 40103 AEG-Telefunken
|
|||
|
A 0262 452 310 42100 Informatik
|
|||
|
A 0262 452 310 42144 UNIDO University of Dortmund
|
|||
|
I 0262 452 310 40017 Primenet
|
|||
|
I 0262 452 310 45100 Uni Dortmund (Siemens 7.760)
|
|||
|
A 0262 452 310 9304 Dortmund
|
|||
|
D 0262 452 340 40140 Primenet = RZU Bochum (CDL 855) ??
|
|||
|
A 0262 452 340 40194 RUB Cyber 205 (=855?), Ruhr University - Bochum
|
|||
|
(RUB)
|
|||
|
D 0262 452 410 40149 Aachener + Muenchener Versicherung
|
|||
|
I 0262 452 410 90014 ???
|
|||
|
I 0262 452 410 90528 rmi-aachen
|
|||
|
A 0262 452 410 90832 RMI Datentechnik Aachen
|
|||
|
I 0262 452 433 40307 OPTEL (Ruehlemann-Box)
|
|||
|
I 0262 452 461 90509 Kfz Juelich
|
|||
|
A 0262 452 710 40240 Uni Siegen, FB Physik (VAX 11/750)
|
|||
|
D 0262 452 931 40196 Handwerkskammer (HWK) Arnsberg
|
|||
|
I 0262 453 000 0414 GFC-AG
|
|||
|
D 0262 453 000 20104 Vax
|
|||
|
D 0262 453 000 217 HMI HMI in Berlin
|
|||
|
A 0262 453 000 21711 Siemens
|
|||
|
A 0262 453 000 21712 Siemens
|
|||
|
A 0262 453 000 21713 Hahn-Meitner-Institut Berlin
|
|||
|
D 0262 453 000 21714 ???
|
|||
|
D 0262 453 000 40013 Uni Berlin
|
|||
|
Y 0262 453 000 40014 GFC AG
|
|||
|
Ar0262 453 000 40023 BERLIN Tech. Univ. Berlin (Computer Science)
|
|||
|
I 0262 453 000 40027 ADAC
|
|||
|
I 0262 453 000 40112 ABC Barkredit Bank
|
|||
|
I 0262 453 000 40166 David Verlag
|
|||
|
I 0262 453 000 40509 COM-Box Berlin
|
|||
|
A 0262 453 000 20205 CN01
|
|||
|
A 0262 453 000 43109 netmbx, Berlin
|
|||
|
A 0262 453 000 90055 COM.BOX, Berlin
|
|||
|
A 0262 453 000 90864 ? (GUEST)
|
|||
|
I 0262 453 002 17 HMI Hans Mietner Institute in Berlin
|
|||
|
I 0262 453 004 0023 Uni Berlin
|
|||
|
I 0262 453 210 40017 tymnet-gateway
|
|||
|
I 0262 454 000 30029
|
|||
|
A 0262 454 000 30035 (immediately drops the line)
|
|||
|
A 0262 454 000 30041 COM-PLETE (?) (command prefix is '*')
|
|||
|
A 0262 454 000 30046 (immediately drops the line)
|
|||
|
O 0262 454 000 30071
|
|||
|
A 0262 454 000 30090 (cierr 1402)
|
|||
|
A 0262 454 000 30104 ? ("INVALID COMMAND SYNTAX")
|
|||
|
A 0262 454 000 30105
|
|||
|
A 0262 454 000 30110 Host
|
|||
|
A 0262 454 000 30113 (cierr 1402)
|
|||
|
A 0262 454 000 30138 ? (no reaction)
|
|||
|
D 0262 454 000 30150
|
|||
|
D 0262 454 000 30158
|
|||
|
A 0262 454 000 30175 ? ("INVALID COMMAND SYNTAX")
|
|||
|
D 0262 454 000 30187 E2000 Hamburg VAX
|
|||
|
O 0262 454 000 30201 Hasylab VAX (user/user)
|
|||
|
A 0262 454 000 30202 HERA Magnet Measurement VAX 750 (=Krista
|
|||
|
Cryogenics Control ?)
|
|||
|
A 0262 454 000 30215 ? ("INVALID COMMAND SYNTAX")
|
|||
|
D 0262 454 000 30259
|
|||
|
D 0262 454 000 30261
|
|||
|
A 0262 454 000 30296 DFH2001I
|
|||
|
A 0262 454 000 30502
|
|||
|
I 0262 454 000 30519
|
|||
|
A 0262 454 000 30566 DFH2001I
|
|||
|
O 0262 454 000 30578 Primenet 20.0.4 DREHH
|
|||
|
I 0262 454 000 40014 Hahn Egon RZ !! Code: EBCDIC !!
|
|||
|
I 0262 454 000 40015 ???
|
|||
|
Y 0262 454 000 40042 ???
|
|||
|
D 0262 454 000 40044 Primenet MUF
|
|||
|
I 0262 454 000 40053 SCHERAX
|
|||
|
Y 0262 454 000 40078 ???
|
|||
|
A 0262 454 000 40082 ? (no reaction)
|
|||
|
I 0262 454 000 40103 Airbus
|
|||
|
I 0262 454 000 40109 ???
|
|||
|
I 0262 454 000 40111 BADGER
|
|||
|
D 0262 454 000 40198 Argus IPP-Vax
|
|||
|
I 0262 454 000 43100 ADV-Orga-Meyer & Co.
|
|||
|
A 0262 454 000 50233 Altos Hamburg (althh) (Gast)
|
|||
|
I 0262 454 000 8001 DYVA MARK J VAX at DESY
|
|||
|
I 0262 454 000 90047 AEG-Telefunken
|
|||
|
A 0262 454 000 90092 Data-General
|
|||
|
A 0262 454 000 90184 Uni Hamburg (VAX) (=UKE?)
|
|||
|
I 0262 454 000 90194 Verbraucherbank AG
|
|||
|
O 0262 454 000 90241 ???
|
|||
|
I 0262 454 000 90258 Desy ( Vax )
|
|||
|
I 0262 454 000 90558 Philips VAX
|
|||
|
D 0262 454 000 90560 EMBLHH EMBL VAX at Hamburg (Eur.Molecular
|
|||
|
Biol.Lab.)
|
|||
|
I 0262 454 000 905602 ???
|
|||
|
A 0262 454 000 90582 Desy V.24 Switch
|
|||
|
A 0262 454 000 91110 Deutsche Mailbox 1
|
|||
|
A 0262 454 000 91120 Deutsche Mailbox 2
|
|||
|
A 0262 454 000 92210 DESYNET
|
|||
|
A 0262 454 000 9306 DYVA MARK J VAX at DESY
|
|||
|
D 0262 454 103 90161 Astra Chemicals GmbH
|
|||
|
0262 454 106 40206 RCA
|
|||
|
A 0262 454 210 40064 COMTES
|
|||
|
O 0262 454 210 40108 AEG-Telefunken
|
|||
|
I 0262 454 210 40145 AEG-Telefunken
|
|||
|
Y 0262 454 210 40244 AEG-Telefunken
|
|||
|
O 0262 454 210 42001 Bremen
|
|||
|
I 0262 454 210 90302 Computerland VAX
|
|||
|
O 0262 454 298 43070 Infex 2
|
|||
|
I 0262 454 310 40545 Kiel IMF
|
|||
|
A 0262 454 410 30033 Uni Oldenburg
|
|||
|
I 0262 454 421 40045 ADV-Orga-Meyer & Co.
|
|||
|
I 0262 454 488 40147 Essmann Getraenke GmbH
|
|||
|
I 0262 455 110 40081 Airbus
|
|||
|
I 0262 455 110 40171 Alli-Frischdienst
|
|||
|
A 0262 455 110 42330 Uni Hannover (VM/370)
|
|||
|
A 0262 455 110 43020 Nachrichtentechnik (VAX)
|
|||
|
I 0262 455 110 701 Uni Hannover
|
|||
|
A 0262 455 110 90192 ???
|
|||
|
A 0262 455 110 90835 CosmoNet (GAST)
|
|||
|
A 0262 455 110 92200 RZ
|
|||
|
D 0262 455 151 40212 AEG-Telefunken
|
|||
|
I 0262 455 152 90154 Oldenburger Volksbank
|
|||
|
I 0262 455 210 40562 Uni Bielefeld (CGK/TR440)
|
|||
|
I 0262 455 251 90192 Paderborn
|
|||
|
D 0262 455 251 90193 Paderborn
|
|||
|
A 0262 455 251 93020 Uni Paderborn (4.3 BSD UNIX)
|
|||
|
D 0262 455 362 90057 IUM
|
|||
|
I 0262 455 410 40086 Alli-Frischdienst
|
|||
|
I 0262 455 410 40162 RZ
|
|||
|
I 0262 455 410 40560 Bibliothek
|
|||
|
I 0262 455 421 043050 ORION
|
|||
|
A 0262 455 510 32804 Uni Goettingen (choose VAX or IBM)
|
|||
|
I 0262 455 521 90172 Spar & Darlehenskassen
|
|||
|
I 0262 455 818 104 Anders Frido GmbH
|
|||
|
I 0262 455 910 40094 Essmann Getraenke GmbH
|
|||
|
I 0262 455 931 40095 Ruhr AG
|
|||
|
I 0262 456 061 40097 Polydress Plastic GmbH
|
|||
|
I 0262 456 102 4301 DEC Frankfurt
|
|||
|
I 0262 456 102 90145 Nadler-Werke GmbH
|
|||
|
I 0262 456 103 40332 Amann KG
|
|||
|
I 0262 456 104 0250 Tymnet
|
|||
|
A 0262 456 106 40254 Alfa Service Partner (Primenet)
|
|||
|
I 0262 456 106 90119 Alfa Service Partner
|
|||
|
I 0262 456 110 40009 IBM Centre for Info and Doc, Germany
|
|||
|
I 0262 456 110 40037 Control Data (Test.-Serv.C4,ZZA201,CDC)
|
|||
|
I 0262 456 110 40076 Autonet
|
|||
|
I 0262 456 110 40105 Nixdorf Computer
|
|||
|
I 0262 456 110 40106 Nixdorf Computer
|
|||
|
I 0262 456 110 40107 CN01
|
|||
|
I 0262 456 110 40187 WAX Bank FRA
|
|||
|
I 0262 456 110 40240 City-Bank FFM (Uni Bochum ??)
|
|||
|
I 0262 456 110 40245 ??
|
|||
|
I 0262 456 110 40250 Tymnet (Id=Information)
|
|||
|
I 0262 456 110 40303 American Express
|
|||
|
I 0262 456 110 40305 American Express
|
|||
|
I 0262 456 110 40311 AMC
|
|||
|
I 0262 456 110 40365 AMP
|
|||
|
I 0262 456 110 90211 Nixdorf Computer
|
|||
|
I 0262 456 110 90212 Nixdorf Computer
|
|||
|
I 0262 456 110 90322 American Express
|
|||
|
I 0262 456 110 90347 American Express
|
|||
|
I 0262 456 121 40207 ADV-Orga-Meyer & Co.
|
|||
|
I 0262 456 121 40217 BKA
|
|||
|
I 0262 456 121 40225 BKA
|
|||
|
I 0262 456 121 90580 BKA
|
|||
|
I 0262 456 131 40138 Uni Mainz RZ
|
|||
|
I 0262 456 131 40545 RZ
|
|||
|
Y 0262 456 131 90031 Allg.Kreditversicherung
|
|||
|
Y 0262 456 151 40282 ???
|
|||
|
A 0262 456 151 40516 Uni Darmstadt (Siemens 7.xxx)
|
|||
|
A 0262 456 151 40547 GSI Darmstadt (EMMA-VAX 8600)
|
|||
|
A 0262 456 151 42807 GMD Darmstadt (CADMUS 9240)
|
|||
|
I 0262 456 172 90070 A-Kredit
|
|||
|
I 0262 456 193 40082 Apotheken Marketing
|
|||
|
D 0262 456 196 40095 Data General Schwalbach
|
|||
|
A 0262 456 196 40107 Int.Doc.Chem.
|
|||
|
A 0262 456 210 40000 Telebox der DBP (ID INF100,Telebox)
|
|||
|
A 0262 456 210 40014 ACF/VTAM
|
|||
|
A 0262 456 210 40025 Oeva
|
|||
|
A 0262 456 210 40026 HOST
|
|||
|
D 0262 456 210 40027 BASF/FER.VAX 8600
|
|||
|
I 0262 456 210 40097 Nadler-Werke GmbH
|
|||
|
I 0262 456 210 40217 Primenet
|
|||
|
I 0262 456 210 40324 Abacus
|
|||
|
D 0262 456 210 40508 VCON0.BASF.A6
|
|||
|
A 0262 456 210 40516 CN01
|
|||
|
A 0262 456 210 40532
|
|||
|
A 0262 456 210 40580 DYNAPAC MULTI-PAD.25
|
|||
|
A 0262 456 210 40581 DYNAPAC MULTI-PAD.25
|
|||
|
A 0262 456 210 40582
|
|||
|
A 0262 456 210 90000 Telebox der DBP
|
|||
|
I 0262 456 221 3002 EMBL European Microbiology Lab (or European
|
|||
|
Molecular Biological Lab.) (=ALKOR?)
|
|||
|
D 0262 456 221 40201 DKFZ (Heidelberg)
|
|||
|
I 0262 456 221 40244 Franny (=Max Planck VAX=MPI?)
|
|||
|
I 0262 456 310 40252
|
|||
|
I 0262 456 310 421
|
|||
|
D 0262 456 310 424
|
|||
|
I 0262 456 310 4302
|
|||
|
I 0262 456 340 40136 Nadler-Werke GmbH
|
|||
|
A 0262 456 410 30021 HRZ-Giessen
|
|||
|
I 0262 456 410 40142 Aachener + Muenchener Versicherung
|
|||
|
A 0262 456 410 90040 HRZ Giessen (CDCNET-X.25)
|
|||
|
I 0262 456 410 90828 Ernaehrungswissenschaften
|
|||
|
I 0262 456 441 90335 Leerwe GmbH
|
|||
|
I 0262 456 615 142804 GMD, Darmstadt
|
|||
|
A 0262 456 673 13330 Geonet 1 (ex IMCA)
|
|||
|
A 0262 456 673 13340 Geonet 3
|
|||
|
I 0262 456 673 30070 IMCA-Mailbox, Solmser Str. 16, D-6419
|
|||
|
Haunetal-Staerklos
|
|||
|
I 0262 456 721 40305 Alfa Metalcraft Corp.
|
|||
|
I 0262 456 810 40010 Teleprint Saarbrueckener Zeitung
|
|||
|
I 0262 456 810 40071 Nadler-Werke GmbH
|
|||
|
I 0262 456 810 40076 SAARBRU Univ of Saarbruecken (Saarland RZ)
|
|||
|
A 0262 456 900 10174 Beilstein Gmelin RZ (COMDOS ?)
|
|||
|
O 0262 456 900 10552 FIZ-Technik
|
|||
|
O 0262 456 900 30040 Nixdorf Computer
|
|||
|
A 0262 456 900 40076 Autonet
|
|||
|
D 0262 456 900 40106 Nixdorf
|
|||
|
I 0262 456 900 40505 AEG-Telefunken
|
|||
|
0262 456 900 40506 AEG-Telefunken
|
|||
|
A 0262 456 900 90125
|
|||
|
I 0262 456 900 90506 Nixdorf
|
|||
|
I 0262 456 900 9308 SYNTAX
|
|||
|
I 0262 457 010 40025 ?
|
|||
|
A 0262 457 071 40266 Zentrum fuer Datenverarbeitung
|
|||
|
0262 457 071 40529 Zentrale Verw.
|
|||
|
0262 457 071 90182 ADW-Wirtschaftsberatung
|
|||
|
D 0262 457 071 90249 Bibliothek
|
|||
|
D 0262 457 110 10023 Hohenheim Bibliothek
|
|||
|
D 0262 457 110 211 Rechenzentrum
|
|||
|
Dr0262 457 110 40028
|
|||
|
Dr0262 457 110 40035 Primenet !! No CTRL-P clr !!
|
|||
|
B 0262 457 110 40124 Stahl EDV-Service
|
|||
|
0262 457 110 40129 Allg.Rentenanstalt
|
|||
|
0262 457 110 40147 MAHU Verlag
|
|||
|
D 0262 457 110 90059 Bibliothek
|
|||
|
0262 457 110 90103 Data General
|
|||
|
0262 457 110 90246 Hohenheim DokumentationsSt.
|
|||
|
D 0262 457 110 90316 RMI-Net
|
|||
|
0262 457 110 90557 Stahl EDV-Service
|
|||
|
A 0262 457 110 90593 Unix, Informatik (ifistg)
|
|||
|
0262 457 141 90098 Aigner Buchhandlung
|
|||
|
X 0262 457 210 40002 V750
|
|||
|
Br0262 457 210 40025 Badenia
|
|||
|
0262 457 210 40031 IITB-Datenverarbeitung
|
|||
|
D 0262 457 210 40135 Fraunhofer Institut
|
|||
|
C 0262 457 210 40189 Uni Karlsruhe, RZ (until 10-APR-88)
|
|||
|
X 0262 457 210 40248 Uni Karlsruhe, LINK (=NETONE?)
|
|||
|
A 0262 457 210 42100 Uni Karlsruhe, IRAV2 (VAX 8200)
|
|||
|
A 0262 457 210 42140 Uni Karlsruhe, RZ (since 11-APR-88)
|
|||
|
D 0262 457 210 4303 Telematik
|
|||
|
A 0262 457 247 40001 INKA FIZ-Chemie 2 (German Centre for
|
|||
|
Tech.?)
|
|||
|
A 0262 457 247 40141 INKA FIZ-Chemie 1
|
|||
|
A 0262 457 247 40211 CASGER STN Internat. Karlsruhe
|
|||
|
D 0262 457 310 90269 RZ Bereich OE
|
|||
|
0262 457 310 921 RZ
|
|||
|
0262 457 351 40032 AFD-Arbeitsgruppe F.DV
|
|||
|
A 0262 457 531 90008 Informationswissenschaften
|
|||
|
D 0262 457 531 90094 RZ
|
|||
|
0262 457 552 90320 Alno-Moebel
|
|||
|
D 0262 457 610 300 Uni Freiburg, 9600bps
|
|||
|
D 0262 457 610 370 Uni Freiburg, Sperry Univac
|
|||
|
D 0262 457 610 40079 Albert Ludwig, Uni-Bibliothek
|
|||
|
0262 457 610 40166 AEG-Telefunken
|
|||
|
0262 457 610 40306 Alpha-Buch GmbH
|
|||
|
B 0262 457 610 420 Uni Freiburg, 4800bps
|
|||
|
B 0262 457 610 480 Uni Freiburg, Sperry Univac
|
|||
|
X 0262 457 610 520 Uni Freiburg, Uni Bibliothek
|
|||
|
0262 457 641 40265 Anders Ernst
|
|||
|
0262 457 721 40071 Kienzle Computer
|
|||
|
0262 457 721 40072 Kienzle Computer
|
|||
|
0262 457 721 40171 Kienzle Computer
|
|||
|
0262 457 721 90004 Kienzle Computer
|
|||
|
0262 457 721 90226 Kienzle Computer
|
|||
|
0262 457 810 40222 Dietrich Georg GmbH
|
|||
|
B 0262 458 151 40114 Kejo GmbH (Josef Keller)
|
|||
|
D 0262 458 210 40114 Bibliothek
|
|||
|
0262 458 210 40120 NCR
|
|||
|
0262 458 510 30236 Passau RZ
|
|||
|
D 0262 458 710 40171 Transfer Data Test GmbH
|
|||
|
0310 600 021 0 Procter and Gamble
|
|||
|
0310 600 022 6 Anistics
|
|||
|
0310 600 022 6 Interactive Market Systems (Anistics)
|
|||
|
0310 600 023 2 Scientific Timesharing
|
|||
|
0310 600 024 2 Timesharing Resources
|
|||
|
0310 600 025 2 Computer Science Corporation
|
|||
|
0310 600 025 5 Timesharing Associates
|
|||
|
0310 600 027 6 Management Decision Systems Inc
|
|||
|
0310 600 028 8 SRI
|
|||
|
0310 600 028 8 SRI San Francisco (UNIX)
|
|||
|
0310 600 028 8 Stanford Research Institute (SRI)
|
|||
|
0310 600 030 3 Scientific Timesharing
|
|||
|
0310 600 030 7 Infomedia Corporation
|
|||
|
0310 600 032 3 TRW Defence & Space Systems Group
|
|||
|
0310 600 040 1 TMCS Public Network
|
|||
|
0310 600 043 2 Interactive Market Systems
|
|||
|
0310 600 046 6 Bibliographic Retrieval Services
|
|||
|
B 0310 600 058 1 BRS
|
|||
|
0310 600 063 3 Public TYMNET/TRWNET Interlink
|
|||
|
0310 600 079 3 J&J Host
|
|||
|
B 0310 600 105 3
|
|||
|
0310 600 133 0 MULTICS, HVN 862-3642
|
|||
|
0310 600 140 0 TMCS Public Network
|
|||
|
B 0310 600 150 9 Orbit (SDC)
|
|||
|
B 0310 600 157 878 BIX
|
|||
|
D 0310 600 165 9 BYTE Information Exchange (GUEST,GUEST)
|
|||
|
A 0310 600 166 3 People Link
|
|||
|
0310 600 181 9 TMCS Public Network
|
|||
|
0310 600 182 8 FRX Faifax Outdial Host (Tymnet)
|
|||
|
0310 600 186 4 SUNGARDS Central Computer Facility Networks
|
|||
|
0310 600 189 2 Primenet (certain hours)
|
|||
|
B 0310 600 195 2 VAX
|
|||
|
B 0310 600 197 6 Outdial NY
|
|||
|
A 0310 600 197 7
|
|||
|
0310 600 209 5 COMODEX Online System
|
|||
|
0310 600 209 8 D & B
|
|||
|
0310 600 209 9 D & B
|
|||
|
0310 600 210 0 D & B
|
|||
|
0310 600 210 9 TYMNET/15B (inter-link)
|
|||
|
B 0310 600 220 7,OUT Outdial
|
|||
|
0310 600 228 6 Primenet TFGI
|
|||
|
0310 600 229 9 CONSILIUM
|
|||
|
0310 600 232 901*D MFE Magnetic Fusion Energy Centre, Lawrence
|
|||
|
Livermore
|
|||
|
B 0310 600 236 1 Denver Oil&Gas
|
|||
|
0310 600 241 Bank Of America
|
|||
|
0310 600 245 3 Primenet
|
|||
|
B 0310 600 254 5 SEISMO Centre for Seismic Studies
|
|||
|
B 0310 600 255 Outdial NY
|
|||
|
A 0310 600 262 3 VAX/VMS (GUEST ???)
|
|||
|
B 0310 600 262 3003 VTINET
|
|||
|
B 0310 600 262 460 SUMEX
|
|||
|
B 0310 600 263 5 QUOTRON Wall Street (Boerse n.y.)
|
|||
|
B 0310 600 266 400 SLAC SLAC on Tymnet
|
|||
|
B 0310 600 267 7 The New York Times
|
|||
|
0310 600 269 4 PVM3101,SPDS/MTAM, MLCM,VM/SP,STRATUS-1,
|
|||
|
STRATUS-2
|
|||
|
0310 600 279 0 VM/370
|
|||
|
0310 600 286 4 RCA Semicustom
|
|||
|
B 0310 600 302 70000 VTI NETONE
|
|||
|
0310 600 307 9 VM/370
|
|||
|
0310 600 309 2 TYMNET/Protected Access Service Sys.
|
|||
|
Inter-link
|
|||
|
0310 600 316 8 VM/370
|
|||
|
0310 600 321 4 VM/370
|
|||
|
0310 600 322 0 VM/370
|
|||
|
0310 600 322 1 VM/370
|
|||
|
0310 600 357 2 NORTH AMERICA DATA CENTRE
|
|||
|
0310 600 360 4 VM/370
|
|||
|
0310 600 404 1 RCA GLOBCOM'S PACKET SWITCHING SERICE
|
|||
|
A 0310 600 412 9 ?
|
|||
|
A 0310 600 413 1 ?
|
|||
|
0310 600 413 7 TSO, VM/370
|
|||
|
0310 600 416 300 Oakridge, Tennessee
|
|||
|
0310 600 417 4 VM/370
|
|||
|
0310 600 420 6 MAINSTREAMS
|
|||
|
0310 600 423 500 Oakridge, Tennessee
|
|||
|
B 0310 600 430 5 BIOVAX
|
|||
|
0310 600 434 1 (Host) 2 - VM/370, T - VM/370,1,3,4,A,C,E,Z
|
|||
|
A 0310 600 436 5 Toxnet (NLM=National Lib. of Medicine's)
|
|||
|
B 0310 600 455 5 VAX
|
|||
|
0310 600 459 97
|
|||
|
0310 600 474 3 TYMNET Info Service
|
|||
|
X 0310 600 502 0 Outdial Fairfax
|
|||
|
0310 600 522 9 Uni.of Pencilvania School of Arts and
|
|||
|
Science
|
|||
|
0310 600 526 7 CHANEL 01
|
|||
|
X 0310 600 531 7 Outdial St.Louis
|
|||
|
B 0310 600 532 0 DEC Soft. Serv.
|
|||
|
0310 600 556 9 STRATUS/32
|
|||
|
0310 600 557 1 STRATUS/32
|
|||
|
0310 600 560 3 (Host) systems 1,2,3,4,5,C (5=Outdial)
|
|||
|
B 0310 600 562 200 FNAL Fermilab
|
|||
|
B 0310 600 562 226 Fermilab 2
|
|||
|
B 0310 600 578 78 BIX
|
|||
|
B 0310 600 584 401 Washington Post
|
|||
|
B 0310 600 61 DIALOG1 Lockheed Info Systems
|
|||
|
0310 600 61*DSDDIPSSL ORBIT2 SDC Search Service
|
|||
|
0310 600 628 1 EDCS
|
|||
|
0310 600 628 3 EDCS
|
|||
|
0310 600 643 2 EASYLINK
|
|||
|
0310 600 643 4 EASYLINK
|
|||
|
0310 600 672 2 International Network
|
|||
|
0310 600 68 Stanford SUMEX-AIM. Tenex op syst.
|
|||
|
0310 600 683 2 A&A DATANET (Systems 1,8,0,14)
|
|||
|
X 0310 600 701 7 Outdial NY
|
|||
|
0310 600 759 6 (Host) A - VM/370, B - VM/370
|
|||
|
? 0310 600 787 Dallas
|
|||
|
0310 601 79 Berkley Univ.
|
|||
|
0310 602 88 Stanford Research Institute
|
|||
|
B 0310 611 467 Cas Online Sys.
|
|||
|
0310 614 67 Ohio CAS (Chemical Abstracts Service)
|
|||
|
0310 617 001 38 Multics
|
|||
|
0310 647 911 065 BIX Lexington Data Service
|
|||
|
0310 690 006 1*D DIALOG4 Lockheed DIALOG service
|
|||
|
B 0310 690 080 3*D DIALOG3 Lockheed DIALOG service
|
|||
|
0310 690 762 6 Emery ADO
|
|||
|
0311 0 TELENET USA - Telenet
|
|||
|
B 0311 002 130 0039 ECLD
|
|||
|
0311 020 100 02000 Insco Systems
|
|||
|
0311 020 100 022 New Jersey Outdial 2400 bps (Area 201)
|
|||
|
0311 020 100 02300 American Information Services
|
|||
|
0311 020 100 02400 The Information Bank
|
|||
|
0311 020 100 02500 New Jersey Institute of Technology
|
|||
|
0311 020 100 02800 Olcott International Company
|
|||
|
0311 020 100 03700 Informatics Inc
|
|||
|
0311 020 100 169 MOUTON
|
|||
|
0311 020 100 301 New Jersey Outdial 1200 bps (Area 201)
|
|||
|
0311 020 101 59200 Scientific Process & Research Inc
|
|||
|
0311 020 200 02100 Scientific Timesharing
|
|||
|
0311 020 200 02200 Scientific Timesharing
|
|||
|
X 0311 020 200 066 Air Force
|
|||
|
T 0311 020 200 099 ICIB Information Council Incorporated B system
|
|||
|
0311 020 200 1 TELEMAIL US Telemail facility
|
|||
|
X 0311 020 200 10900 CIS Chemical Information Systems
|
|||
|
A 0311 020 200 115 Outdial 300 bps (Area 202)
|
|||
|
A 0311 020 200 116 Outdial 1200 bps (Area 202)
|
|||
|
0311 020 200 117 Distr. of Columbia Outdial 2400 bps (Area
|
|||
|
202)
|
|||
|
B 0311 020 200 141 TELEMAIL US Telemail facility (GT-Net)
|
|||
|
0311 020 200 14175 TELEENQ Telenet Enquiry Service
|
|||
|
0311 020 200 14175 TELEMAIL1 US Telemail facility
|
|||
|
0311 020 200 14275 TELENET US Telenet
|
|||
|
0311 020 201 19500 Gallaude College Computer Centre
|
|||
|
0311 020 300 06400 NCSS Bureau
|
|||
|
0311 020 300 130 Connecticut Outdial 1200 bps (Area 203)
|
|||
|
0311 020 301 78900 Yale University Computer Centre
|
|||
|
0311 020 400 02900 WATERLO University of Waterloo
|
|||
|
0311 020 600 019 Washington Outdial 1200 bps (Area 206)
|
|||
|
0311 021 200 02000 Bowne Timesharing
|
|||
|
0311 021 200 02500 Interactive Market Systems (Anistics)
|
|||
|
0311 021 200 02800 Burroughs Corp (NYC data centre)
|
|||
|
0311 021 200 141 JPLM1 Jet Propulsion Laboratory mail 1, USA
|
|||
|
0311 021 200 142 JPLM2 Jet Propulsion Laboratory mail 2, USA
|
|||
|
0311 021 200 14200 GT-Net Telemail
|
|||
|
A 0311 021 200 315 Outdial 300 bps (Area 212)
|
|||
|
A 0311 021 200 316 Outdial 1200 bps (Area 212)
|
|||
|
D 0311 021 200 412 Outdial 2400 bps (Area 212)
|
|||
|
D 0311 021 200 41200 New York City Outdial (Area 212)
|
|||
|
0311 021 201 39200 Memorial Dose Distribution Computation
|
|||
|
Service
|
|||
|
0311 021 201 40600 MAV Systems (300 bps)
|
|||
|
0311 021 201 57800 IP Sharp Associates
|
|||
|
0311 021 201 58000 SDL International (1200 bps)
|
|||
|
0311 021 201 58500 SDL International (300 bps)
|
|||
|
0311 021 201 58800 DSL Systems Inc
|
|||
|
0311 021 201 59500 SDL International (1200 bps)
|
|||
|
0311 021 201 62000 Telestat System Inc
|
|||
|
0311 021 201 62700 Telestat Systems Inc
|
|||
|
0311 021 300 02200 Interactive Systems Corporation
|
|||
|
0311 021 300 02700 Mellonics Information Centre
|
|||
|
0311 021 300 029 TRW Defence & Space Systems Group
|
|||
|
B 0311 021 300 03300 ORBIT Orbit
|
|||
|
0311 021 300 03300*D ORBIT SDC Search Service (300 bps)
|
|||
|
0311 021 300 04400 SDC Search Service (1200 bps)
|
|||
|
B 0311 021 300 039 USCAL2 Univ. of Southern California
|
|||
|
0311 021 300 04114 IHW IHW
|
|||
|
0311 021 300 04700 University of Southern California
|
|||
|
B 0311 021 300 048 USCAL1 University of Southern California
|
|||
|
B 0311 021 300 170 LRS Dialog 2
|
|||
|
T 0311 021 300 17000 DIALOG5 Lockheed Info Systems
|
|||
|
0311 021 300 17000*D DIALOG2 Lockheed DIALOG service
|
|||
|
B 0311 021 300 219 CALTECH Caltech VAX 11/780
|
|||
|
0311 021 300 21908 CALTECH Caltech VAX 11/780
|
|||
|
0311 021 300 21909 CALTECH2 Caltech VAX 11/780
|
|||
|
0311 021 300 412 California Outdial 1200 bps (Area 213)
|
|||
|
A 0311 021 300 413 Outdial CA
|
|||
|
0311 021 300 668 Adainfo
|
|||
|
0311 021 301 353 UCLA UCLA, USA
|
|||
|
0311 021 301 40300 Marshall & Swift Publication
|
|||
|
0311 021 400 117 Outdial 300 bps (Area 214)
|
|||
|
A 0311 021 400 118 Texas Outdial 1200 bps (Area 214)
|
|||
|
0311 021 500 022 Pennsylvania Outdial 2400 bps (Area 215)
|
|||
|
0311 021 500 112 Pennsylvania Outdial 1200 bps (Area 215)
|
|||
|
A 0311 021 600 020 Outdial 300 bps (Area 216)
|
|||
|
A 0311 021 600 021 Ohio Outdial 1200 bps (Area 216)
|
|||
|
0311 021 700 021 University of Illinois - Urbana
|
|||
|
0311 030 100 02000 NLM National Library of Medicine
|
|||
|
A 0311 030 100 02400 The Source
|
|||
|
B 0311 030 100 038 The Source (ID BSC131 SR3811)
|
|||
|
B 0311 030 100 243 ITT Dialcom
|
|||
|
0311 030 100 364 Primesoft
|
|||
|
A 0311 030 100 38 The Source
|
|||
|
B 0311 030 100 633 Toxnet (NLM)
|
|||
|
0311 030 101 26500 Informatics Inc
|
|||
|
0311 030 300 02000 Computer Sharing Services
|
|||
|
0311 030 300 021 Colorado Outdial 2400 bps (Area 303)
|
|||
|
0311 030 300 02300 Broker Services Inc
|
|||
|
0311 030 300 115 Colorado Outdial 1200 bps (Area 303)
|
|||
|
0311 030 301 13100 EDI Computer Services
|
|||
|
0311 030 301 13200 EDI Computer Services
|
|||
|
0311 030 301 13300 Energy Enterprises
|
|||
|
0311 030 500 121 Florida Outdial 1200 bps (Area 305)
|
|||
|
0311 030 501 16300 Florida Computer Inc
|
|||
|
D 0311 030 508 793 Miami Outdial (Area 305) ?
|
|||
|
0311 031 200 02200 National Computer Network of Chicago
|
|||
|
0311 031 200 024 Illinois Outdial 2400 bps (Area 217 ?)
|
|||
|
0311 031 200 03100 Continental Bank
|
|||
|
0311 031 200 03200 Continental Bank
|
|||
|
0311 031 200 04900 American Hospital Supply Corporation
|
|||
|
0311 031 200 411 Illinois Outdial 1200 bps (Area 217 ?)
|
|||
|
0311 031 201 07300 Commodity Information Services
|
|||
|
0311 031 268 801 ADPUSA ADP Network Services Ltd.
|
|||
|
0311 031 300 024 Michigan Outdial 2400 bps (Area 313)
|
|||
|
0311 031 300 04000 ADP Network Services
|
|||
|
0311 031 300 06200 Merit International (MIT)
|
|||
|
0311 031 300 216 Michigan Outdial 1200 bps (Area 313)
|
|||
|
0311 031 301 39800 Merit Computer
|
|||
|
0311 031 400 07200 Environmental DataNetwork Inc.
|
|||
|
0311 031 401 06500 McDonnel Douglas Automation (300 bps)
|
|||
|
0311 031 401 06600 McDonnel Douglas Automation (110 bps)
|
|||
|
0311 031 401 06700 McDonnel Douglas Automation (1200 bps)
|
|||
|
0311 031 401 61000 McDonnel Douglas Automation (300 bps)
|
|||
|
0311 031 500 02000 Bibliographic Retrieval Services
|
|||
|
A 0311 040 100 612 Modemcity
|
|||
|
A 0311 040 400 114 Georgia Outdial 1200 bps (Area 404)
|
|||
|
A 0311 040 800 021 California Outdial 1200 bps? (Area 408)
|
|||
|
0311 040 800 245 Bridge
|
|||
|
B 0311 040 800 246 SCF
|
|||
|
0311 041 201 4600 On-Line Systems Inc
|
|||
|
0311 041 400 02000 A.O. Smith Data Systems Divisions
|
|||
|
0311 041 400 021 Wisconsin Outdial 1200 bps (Area 414)
|
|||
|
B 0311 041 500 020 LRS-Dialog 2
|
|||
|
A 0311 041 500 02000 DIALOG Lockheed Information Systems
|
|||
|
0311 041 500 02000*D DIALOG Lockheed DIALOG service
|
|||
|
B 0311 041 500 048 LRS Dialog 2
|
|||
|
0311 041 500 04800 DIALOG2 Lockheed Information Systems 2
|
|||
|
0311 041 500 04800*D DIALOG1 Lockheed DIALOG service
|
|||
|
0311 041 500 117 California Outdial 1200 bps (Area 415)
|
|||
|
I 0311 041 500 210 Outdial USA
|
|||
|
A 0311 041 500 215 Outdial (Area 415)
|
|||
|
A 0311 041 500 217 Outdial (Area 415)
|
|||
|
A 0311 041 500 220 Outdial 1200 bps (Area 415)
|
|||
|
0311 041 500 48000 Lockheed Information Systems (?)
|
|||
|
B 0311 041 500 607 BIONET
|
|||
|
B 0311 041 500 609 INTELLIGENETICS
|
|||
|
0311 041 501 23600 Hydrocomp Inc (300 bps)
|
|||
|
0311 041 501 23700 Hydrocomp Inc (1200 bps)
|
|||
|
0311 041 501 26800 ITEL Corp (300 bps)
|
|||
|
0311 041 501 26900 ITEL Corp (1200 bps)
|
|||
|
0311 041 501 59700 Stanford Library Centre for Inform
|
|||
|
Processing
|
|||
|
0311 041 501 59700 Standard Centre for Information Processing
|
|||
|
O 0311 050 006 1 Nuclear Research
|
|||
|
A 0311 050 300 020 Outdial 300 bps (Area 503)
|
|||
|
A 0311 050 300 021 Oregon Outdial 1200 bps (Area 503)
|
|||
|
B 0311 050 500 060 ICN (=LASL)
|
|||
|
0310 600 021 0 Procter and Gamble
|
|||
|
0310 600 022 6 Anistics
|
|||
|
0310 600 022 6 Interactive Market Systems (Anistics)
|
|||
|
0310 600 023 2 Scientific Timesharing
|
|||
|
0310 600 024 2 Timesharing Resources
|
|||
|
0310 600 025 2 Computer Science Corporation
|
|||
|
0310 600 025 5 Timesharing Associates
|
|||
|
0310 600 027 6 Management Decision Systems Inc
|
|||
|
0310 600 028 8 SRI
|
|||
|
0310 600 028 8 SRI San Francisco (UNIX)
|
|||
|
0310 600 028 8 Stanford Research Institute (SRI)
|
|||
|
0310 600 030 3 Scientific Timesharing
|
|||
|
0310 600 030 7 Infomedia Corporation
|
|||
|
0310 600 032 3 TRW Defence & Space Systems Group
|
|||
|
0310 600 040 1 TMCS Public Network
|
|||
|
0310 600 043 2 Interactive Market Systems
|
|||
|
0310 600 046 6 Bibliographic Retrieval Services
|
|||
|
B 0310 600 058 1 BRS
|
|||
|
0310 600 063 3 Public TYMNET/TRWNET Interlink
|
|||
|
0310 600 079 3 J&J Host
|
|||
|
B 0310 600 105 3
|
|||
|
0310 600 133 0 MULTICS, HVN 862-3642
|
|||
|
0310 600 140 0 TMCS Public Network
|
|||
|
B 0310 600 150 9 Orbit (SDC)
|
|||
|
B 0310 600 157 878 BIX
|
|||
|
D 0310 600 165 9 BYTE Information Exchange (GUEST,GUEST)
|
|||
|
A 0310 600 166 3 People Link
|
|||
|
0310 600 181 9 TMCS Public Network
|
|||
|
0310 600 182 8 FRX Faifax Outdial Host (Tymnet)
|
|||
|
0310 600 186 4 SUNGARDS Central Computer Facility Networks
|
|||
|
0310 600 189 2 Primenet (certain hours)
|
|||
|
B 0310 600 195 2 VAX
|
|||
|
B 0310 600 197 6 Outdial NY
|
|||
|
A 0310 600 197 7
|
|||
|
0310 600 209 5 COMODEX Online System
|
|||
|
0310 600 209 8 D & B
|
|||
|
0310 600 209 9 D & B
|
|||
|
0310 600 210 0 D & B
|
|||
|
0310 600 210 9 TYMNET/15B (inter-link)
|
|||
|
B 0310 600 220 7,OUT Outdial
|
|||
|
0310 600 228 6 Primenet TFGI
|
|||
|
0310 600 229 9 CONSILIUM
|
|||
|
0310 600 232 901*D MFE Magnetic Fusion Energy Centre, Lawrence
|
|||
|
Livermore
|
|||
|
B 0310 600 236 1 Denver Oil&Gas
|
|||
|
0310 600 241 Bank Of America
|
|||
|
0310 600 245 3 Primenet
|
|||
|
B 0310 600 254 5 SEISMO Centre for Seismic Studies
|
|||
|
B 0310 600 255 Outdial NY
|
|||
|
A 0310 600 262 3 VAX/VMS (GUEST ???)
|
|||
|
B 0310 600 262 3003 VTINET
|
|||
|
B 0310 600 262 460 SUMEX
|
|||
|
B 0310 600 263 5 QUOTRON Wall Street (Boerse n.y.)
|
|||
|
B 0310 600 266 400 SLAC SLAC on Tymnet
|
|||
|
B 0310 600 267 7 The New York Times
|
|||
|
0310 600 269 4 PVM3101,SPDS/MTAM, MLCM,VM/SP,STRATUS-1,
|
|||
|
STRATUS-2
|
|||
|
0310 600 279 0 VM/370
|
|||
|
0310 600 286 4 RCA Semicustom
|
|||
|
B 0310 600 302 70000 VTI NETONE
|
|||
|
0310 600 307 9 VM/370
|
|||
|
0310 600 309 2 TYMNET/Protected Access Service Sys.
|
|||
|
Inter-link
|
|||
|
0310 600 316 8 VM/370
|
|||
|
0310 600 321 4 VM/370
|
|||
|
0310 600 322 0 VM/370
|
|||
|
0310 600 322 1 VM/370
|
|||
|
0310 600 357 2 NORTH AMERICA DATA CENTRE
|
|||
|
0310 600 360 4 VM/370
|
|||
|
0310 600 404 1 RCA GLOBCOM'S PACKET SWITCHING SERICE
|
|||
|
A 0310 600 412 9 ?
|
|||
|
A 0310 600 413 1 ?
|
|||
|
0310 600 413 7 TSO, VM/370
|
|||
|
0310 600 416 300 Oakridge, Tennessee
|
|||
|
0310 600 417 4 VM/370
|
|||
|
0310 600 420 6 MAINSTREAMS
|
|||
|
0310 600 423 500 Oakridge, Tennessee
|
|||
|
B 0310 600 430 5 BIOVAX
|
|||
|
0310 600 434 1 (Host) 2 - VM/370, T - VM/370,1,3,4,A,C,E,Z
|
|||
|
A 0310 600 436 5 Toxnet (NLM=National Lib. of Medicine's)
|
|||
|
B 0310 600 455 5 VAX
|
|||
|
0310 600 459 97
|
|||
|
0310 600 474 3 TYMNET Info Service
|
|||
|
X 0310 600 502 0 Outdial Fairfax
|
|||
|
0310 600 522 9 Uni.of Pencilvania School of Arts and
|
|||
|
Science
|
|||
|
0310 600 526 7 CHANEL 01
|
|||
|
X 0310 600 531 7 Outdial St.Louis
|
|||
|
B 0310 600 532 0 DEC Soft. Serv.
|
|||
|
0310 600 556 9 STRATUS/32
|
|||
|
0310 600 557 1 STRATUS/32
|
|||
|
0310 600 560 3 (Host) systems 1,2,3,4,5,C (5=Outdial)
|
|||
|
B 0310 600 562 200 FNAL Fermilab
|
|||
|
B 0310 600 562 226 Fermilab 2
|
|||
|
B 0310 600 578 78 BIX
|
|||
|
B 0310 600 584 401 Washington Post
|
|||
|
B 0310 600 61 DIALOG1 Lockheed Info Systems
|
|||
|
0310 600 61*DSDDIPSSL ORBIT2 SDC Search Service
|
|||
|
0310 600 628 1 EDCS
|
|||
|
0310 600 628 3 EDCS
|
|||
|
0310 600 643 2 EASYLINK
|
|||
|
0310 600 643 4 EASYLINK
|
|||
|
0310 600 672 2 International Network
|
|||
|
0310 600 68 Stanford SUMEX-AIM. Tenex op syst.
|
|||
|
0310 600 683 2 A&A DATANET (Systems 1,8,0,14)
|
|||
|
X 0310 600 701 7 Outdial NY
|
|||
|
0310 600 759 6 (Host) A - VM/370, B - VM/370
|
|||
|
? 0310 600 787 Dallas
|
|||
|
0310 601 79 Berkley Univ.
|
|||
|
0310 602 88 Stanford Research Institute
|
|||
|
B 0310 611 467 Cas Online Sys.
|
|||
|
0310 614 67 Ohio CAS (Chemical Abstracts Service)
|
|||
|
0310 617 001 38 Multics
|
|||
|
0310 647 911 065 BIX Lexington Data Service
|
|||
|
0310 690 006 1*D DIALOG4 Lockheed DIALOG service
|
|||
|
B 0310 690 080 3*D DIALOG3 Lockheed DIALOG service
|
|||
|
0310 690 762 6 Emery ADO
|
|||
|
0311 0 TELENET USA - Telenet
|
|||
|
B 0311 002 130 0039 ECLD
|
|||
|
0311 020 100 02000 Insco Systems
|
|||
|
0311 020 100 022 New Jersey Outdial 2400 bps (Area 201)
|
|||
|
0311 020 100 02300 American Information Services
|
|||
|
0311 020 100 02400 The Information Bank
|
|||
|
0311 020 100 02500 New Jersey Institute of Technology
|
|||
|
0311 020 100 02800 Olcott International Company
|
|||
|
0311 020 100 03700 Informatics Inc
|
|||
|
0311 020 100 169 MOUTON
|
|||
|
0311 020 100 301 New Jersey Outdial 1200 bps (Area 201)
|
|||
|
0311 020 101 59200 Scientific Process & Research Inc
|
|||
|
0311 020 200 02100 Scientific Timesharing
|
|||
|
0311 020 200 02200 Scientific Timesharing
|
|||
|
X 0311 020 200 066 Air Force
|
|||
|
T 0311 020 200 099 ICIB Information Council Incorporated B system
|
|||
|
0311 020 200 1 TELEMAIL US Telemail facility
|
|||
|
X 0311 020 200 10900 CIS Chemical Information Systems
|
|||
|
A 0311 020 200 115 Outdial 300 bps (Area 202)
|
|||
|
A 0311 020 200 116 Outdial 1200 bps (Area 202)
|
|||
|
0311 020 200 117 Distr. of Columbia Outdial 2400 bps (Area
|
|||
|
202)
|
|||
|
B 0311 020 200 141 TELEMAIL US Telemail facility (GT-Net)
|
|||
|
0311 020 200 14175 TELEENQ Telenet Enquiry Service
|
|||
|
0311 020 200 14175 TELEMAIL1 US Telemail facility
|
|||
|
0311 020 200 14275 TELENET US Telenet
|
|||
|
0311 020 201 19500 Gallaude College Computer Centre
|
|||
|
0311 020 300 06400 NCSS Bureau
|
|||
|
0311 020 300 130 Connecticut Outdial 1200 bps (Area 203)
|
|||
|
0311 020 301 78900 Yale University Computer Centre
|
|||
|
0311 020 400 02900 WATERLO University of Waterloo
|
|||
|
0311 020 600 019 Washington Outdial 1200 bps (Area 206)
|
|||
|
0311 021 200 02000 Bowne Timesharing
|
|||
|
0311 021 200 02500 Interactive Market Systems (Anistics)
|
|||
|
0311 021 200 02800 Burroughs Corp (NYC data centre)
|
|||
|
0311 021 200 141 JPLM1 Jet Propulsion Laboratory mail 1, USA
|
|||
|
0311 021 200 142 JPLM2 Jet Propulsion Laboratory mail 2, USA
|
|||
|
0311 021 200 14200 GT-Net Telemail
|
|||
|
A 0311 021 200 315 Outdial 300 bps (Area 212)
|
|||
|
A 0311 021 200 316 Outdial 1200 bps (Area 212)
|
|||
|
D 0311 021 200 412 Outdial 2400 bps (Area 212)
|
|||
|
D 0311 021 200 41200 New York City Outdial (Area 212)
|
|||
|
0311 021 201 39200 Memorial Dose Distribution Computation
|
|||
|
Service
|
|||
|
0311 021 201 40600 MAV Systems (300 bps)
|
|||
|
0311 021 201 57800 IP Sharp Associates
|
|||
|
0311 021 201 58000 SDL International (1200 bps)
|
|||
|
0311 021 201 58500 SDL International (300 bps)
|
|||
|
0311 021 201 58800 DSL Systems Inc
|
|||
|
0311 021 201 59500 SDL International (1200 bps)
|
|||
|
0311 021 201 62000 Telestat System Inc
|
|||
|
0311 021 201 62700 Telestat Systems Inc
|
|||
|
0311 021 300 02200 Interactive Systems Corporation
|
|||
|
0311 021 300 02700 Mellonics Information Centre
|
|||
|
0311 021 300 029 TRW Defence & Space Systems Group
|
|||
|
B 0311 021 300 03300 ORBIT Orbit
|
|||
|
0311 021 300 03300*D ORBIT SDC Search Service (300 bps)
|
|||
|
0311 021 300 04400 SDC Search Service (1200 bps)
|
|||
|
B 0311 021 300 039 USCAL2 Univ. of Southern California
|
|||
|
0311 021 300 04114 IHW IHW
|
|||
|
0311 021 300 04700 University of Southern California
|
|||
|
B 0311 021 300 048 USCAL1 University of Southern California
|
|||
|
B 0311 021 300 170 LRS Dialog 2
|
|||
|
T 0311 021 300 17000 DIALOG5 Lockheed Info Systems
|
|||
|
0311 021 300 17000*D DIALOG2 Lockheed DIALOG service
|
|||
|
B 0311 021 300 219 CALTECH Caltech VAX 11/780
|
|||
|
0311 021 300 21908 CALTECH Caltech VAX 11/780
|
|||
|
0311 021 300 21909 CALTECH2 Caltech VAX 11/780
|
|||
|
0311 021 300 412 California Outdial 1200 bps (Area 213)
|
|||
|
A 0311 021 300 413 Outdial CA
|
|||
|
0311 021 300 668 Adainfo
|
|||
|
0311 021 301 353 UCLA UCLA, USA
|
|||
|
0311 021 301 40300 Marshall & Swift Publication
|
|||
|
0311 021 400 117 Outdial 300 bps (Area 214)
|
|||
|
A 0311 021 400 118 Texas Outdial 1200 bps (Area 214)
|
|||
|
0311 021 500 022 Pennsylvania Outdial 2400 bps (Area 215)
|
|||
|
0311 021 500 112 Pennsylvania Outdial 1200 bps (Area 215)
|
|||
|
A 0311 021 600 020 Outdial 300 bps (Area 216)
|
|||
|
A 0311 021 600 021 Ohio Outdial 1200 bps (Area 216)
|
|||
|
0311 021 700 021 University of Illinois - Urbana
|
|||
|
0311 030 100 02000 NLM National Library of Medicine
|
|||
|
A 0311 030 100 02400 The Source
|
|||
|
B 0311 030 100 038 The Source (ID BSC131 SR3811)
|
|||
|
B 0311 030 100 243 ITT Dialcom
|
|||
|
0311 030 100 364 Primesoft
|
|||
|
A 0311 030 100 38 The Source
|
|||
|
B 0311 030 100 633 Toxnet (NLM)
|
|||
|
0311 030 101 26500 Informatics Inc
|
|||
|
0311 030 300 02000 Computer Sharing Services
|
|||
|
0311 030 300 021 Colorado Outdial 2400 bps (Area 303)
|
|||
|
0311 030 300 02300 Broker Services Inc
|
|||
|
0311 030 300 115 Colorado Outdial 1200 bps (Area 303)
|
|||
|
0311 030 301 13100 EDI Computer Services
|
|||
|
0311 030 301 13200 EDI Computer Services
|
|||
|
0311 030 301 13300 Energy Enterprises
|
|||
|
0311 030 500 121 Florida Outdial 1200 bps (Area 305)
|
|||
|
0311 030 501 16300 Florida Computer Inc
|
|||
|
D 0311 030 508 793 Miami Outdial (Area 305) ?
|
|||
|
0311 031 200 02200 National Computer Network of Chicago
|
|||
|
0311 031 200 024 Illinois Outdial 2400 bps (Area 217 ?)
|
|||
|
0311 031 200 03100 Continental Bank
|
|||
|
0311 031 200 03200 Continental Bank
|
|||
|
0311 031 200 04900 American Hospital Supply Corporation
|
|||
|
0311 031 200 411 Illinois Outdial 1200 bps (Area 217 ?)
|
|||
|
0311 031 201 07300 Commodity Information Services
|
|||
|
0311 031 268 801 ADPUSA ADP Network Services Ltd.
|
|||
|
0311 031 300 024 Michigan Outdial 2400 bps (Area 313)
|
|||
|
0311 031 300 04000 ADP Network Services
|
|||
|
0311 031 300 06200 Merit International (MIT)
|
|||
|
0311 031 300 216 Michigan Outdial 1200 bps (Area 313)
|
|||
|
0311 031 301 39800 Merit Computer
|
|||
|
0311 031 400 07200 Environmental DataNetwork Inc.
|
|||
|
0311 031 401 06500 McDonnel Douglas Automation (300 bps)
|
|||
|
0311 031 401 06600 McDonnel Douglas Automation (110 bps)
|
|||
|
0311 031 401 06700 McDonnel Douglas Automation (1200 bps)
|
|||
|
0311 031 401 61000 McDonnel Douglas Automation (300 bps)
|
|||
|
0311 031 500 02000 Bibliographic Retrieval Services
|
|||
|
A 0311 040 100 612 Modemcity
|
|||
|
A 0311 040 400 114 Georgia Outdial 1200 bps (Area 404)
|
|||
|
A 0311 040 800 021 California Outdial 1200 bps? (Area 408)
|
|||
|
0311 040 800 245 Bridge
|
|||
|
B 0311 040 800 246 SCF
|
|||
|
0311 041 201 4600 On-Line Systems Inc
|
|||
|
0311 041 400 02000 A.O. Smith Data Systems Divisions
|
|||
|
0311 041 400 021 Wisconsin Outdial 1200 bps (Area 414)
|
|||
|
B 0311 041 500 020 LRS-Dialog 2
|
|||
|
A 0311 041 500 02000 DIALOG Lockheed Information Systems
|
|||
|
0311 041 500 02000*D DIALOG Lockheed DIALOG service
|
|||
|
B 0311 041 500 048 LRS Dialog 2
|
|||
|
0311 041 500 04800 DIALOG2 Lockheed Information Systems 2
|
|||
|
0311 041 500 04800*D DIALOG1 Lockheed DIALOG service
|
|||
|
0311 041 500 117 California Outdial 1200 bps (Area 415)
|
|||
|
I 0311 041 500 210 Outdial USA
|
|||
|
A 0311 041 500 215 Outdial (Area 415)
|
|||
|
A 0311 041 500 217 Outdial (Area 415)
|
|||
|
A 0311 041 500 220 Outdial 1200 bps (Area 415)
|
|||
|
0311 041 500 48000 Lockheed Information Systems (?)
|
|||
|
B 0311 041 500 607 BIONET
|
|||
|
B 0311 041 500 609 INTELLIGENETICS
|
|||
|
0311 041 501 23600 Hydrocomp Inc (300 bps)
|
|||
|
0311 041 501 23700 Hydrocomp Inc (1200 bps)
|
|||
|
0311 041 501 26800 ITEL Corp (300 bps)
|
|||
|
0311 041 501 26900 ITEL Corp (1200 bps)
|
|||
|
0311 041 501 59700 Stanford Library Centre for Inform
|
|||
|
Processing
|
|||
|
0311 041 501 59700 Standard Centre for Information Processing
|
|||
|
O 0311 050 006 1 Nuclear Research
|
|||
|
A 0311 050 300 020 Outdial 300 bps (Area 503)
|
|||
|
A 0311 050 300 021 Oregon Outdial 1200 bps (Area 503)
|
|||
|
B 0311 050 500 060 ICN (=LASL)
|
|||
|
B 0311 051 300 03000 Mead Data Central
|
|||
|
0311 051 501 39600 State University of New York
|
|||
|
0311 051 600 02200 Timesharing Resources
|
|||
|
D 0311 060 200 020 Outdial 300 bps (Area 602)
|
|||
|
D 0311 060 200 021 Outdial 1200 bps (Area 602)
|
|||
|
B 0311 060 200 150 Phoenix
|
|||
|
0311 060 201 60900 Timesharing Associates
|
|||
|
B 0311 060 300 020 Dartmouth College
|
|||
|
0311 060 300 02000 DARTMTH Dartmouth College, USA
|
|||
|
0311 060 300 05000 Corporate Timesharing
|
|||
|
0311 060 301 54700 Raytheon Company Scientific Computer
|
|||
|
Service
|
|||
|
X 0311 060 700 02000 CORNELL0 Cornell University (134.5 bps)
|
|||
|
T 0311 060 700 02100 CORNELL1 Cornell University (300 bps)
|
|||
|
T 0311 060 700 02200 CORNELL2 Cornell University (1200 bps)
|
|||
|
0311 060 700 02300 CORNELL3 Cornell University (1200 bps)
|
|||
|
0311 060 700 03600 TIPO Computer
|
|||
|
0311 060 702 00 CORNELL2 Cornell University
|
|||
|
0311 060 702 00 CORNELL2 Cornell University
|
|||
|
0311 060 800 02500 University of Wisconsin
|
|||
|
0311 060 801 6630 University of Wisconsin
|
|||
|
0311 060 900 4200 Dow-Jones
|
|||
|
0311 061 200 02500 Honeywell Inform Services Datanetwork
|
|||
|
0311 061 200 02700 Honeywell Inform Services Datanetwork
|
|||
|
0311 061 200 121 Minnesota Outdial 1200 bps (Area 612)
|
|||
|
0311 061 201 06500 Honeywell Inform Services Datanetwork,
|
|||
|
300 bps
|
|||
|
0311 061 201 06500 Honeywell Inform Services Datanetwork
|
|||
|
0311 061 201 06600 Honeywell Inform Services Datanetwork,
|
|||
|
110 bps
|
|||
|
0311 061 201 06700 Honeywell Inform Services Datanetwork,
|
|||
|
300 bps
|
|||
|
0311 061 201 06900 Honeywell Inform Services Datanetwork,
|
|||
|
134 bps
|
|||
|
B 0311 061 400 021 CAS online
|
|||
|
D 0311 061 400 02124 CASUSA STN International
|
|||
|
0311 061 700 02000 Bolt Beranek & Newman
|
|||
|
0311 061 700 02300 Computer Corporation of America
|
|||
|
0311 061 700 02400 AVCO Computer Services
|
|||
|
0311 061 700 03600 Data Resources Inc
|
|||
|
0311 061 700 03800 BBN-RCC
|
|||
|
0311 061 700 03800 Bolt Beranek & Newman
|
|||
|
0311 061 700 06700 Management Decision Systems Inc
|
|||
|
0311 061 700 07000 Interactive Science Corp
|
|||
|
0311 061 700 07600 Interactive Science Corp
|
|||
|
0311 061 700 08000 III Systems Inc
|
|||
|
B 0311 061 700 08401 LCG
|
|||
|
0311 061 700 12000 Cullinane Corp
|
|||
|
0311 061 700 13700 Masachusetts Institute of Technology
|
|||
|
0311 061 700 13800 Masachusetts Institute of Technology
|
|||
|
0311 061 700 13900 Masachusetts Institute of Technology
|
|||
|
0311 061 700 14000 Masachusetts Institute of Technology
|
|||
|
B 0311 061 700 270 Waltham
|
|||
|
B 0311 061 700 609 Package
|
|||
|
B 0311 061 700 613 BBN10
|
|||
|
B 0311 061 700 614 BBNVAX
|
|||
|
0311 061 701 01600 Data Resources Inc (300 bps)
|
|||
|
0311 061 701 01900 Data Resources Inc (300 bps)
|
|||
|
0311 061 701 16100 First Data Division/ADP Inc
|
|||
|
0311 061 701 16200 First Data Division/ADP Inc
|
|||
|
0311 061 701 25800 Data Resources Inc (134.5 bps)
|
|||
|
0311 061 701 26900 Interactive Management Systems
|
|||
|
0311 061 701 27500 Masachusetts Institute of Technology
|
|||
|
0311 061 701 39000 Masachusetts Institute of Technology
|
|||
|
0311 061 701 40300 Masachusetts Institute of Technology
|
|||
|
0311 061 703 088 Delphi
|
|||
|
0311 061 900 050 California Outdial 1200 bps (Area 619)
|
|||
|
0311 070 300 02000 Litton Computer Services
|
|||
|
0311 070 300 02100 American Management Systems
|
|||
|
0311 070 300 056 PRC Computer Centre Inc
|
|||
|
0311 070 300 117 Virginia Outdial 2400 bps (Area 703)
|
|||
|
B 0311 070 300 50000 NIH-EPA (CIS)
|
|||
|
0311 070 305 05200 Digital Broadcasting Corporation
|
|||
|
0311 071 300 024 Texas Outdial 2400 bps (Area 713)
|
|||
|
0311 071 300 114 Texas Outdial 1200 bps (Area 713)
|
|||
|
0311 071 301 08300 Corporate Services Inc
|
|||
|
0311 071 301 56500 Rice University
|
|||
|
0311 071 400 02000 SCIAPP Science Applications Inc.
|
|||
|
0311 071 401 13700 Engineering Supervision Co
|
|||
|
0311 071 700 02000 Brodart Inc
|
|||
|
A 0311 080 100 020 Outdial 300 bps (Area 801)
|
|||
|
A 0311 080 100 021 Utah Outdial 1200 bps (Area 801)
|
|||
|
B 0311 080 100 054 ES
|
|||
|
0311 080 101 13700 Environmentech Information Systems
|
|||
|
0311 080 400 02000 Multiple Access Computer Group
|
|||
|
X 0311 080 800 01046 UKIRTUK Infra Red Telescope in Hawaii
|
|||
|
X 0311 080 800 040 UKIRT UK Infra Red Telescope in Hawaii
|
|||
|
A 0311 081 300 020 Outdial 300 bps (Area 813)
|
|||
|
A 0311 081 300 021 Florida Outdial 1200 bps (Area 813)
|
|||
|
D 0311 081 305 518 Tampa Outdial (Area 813) ?
|
|||
|
0311 081 800 021 California Outdial 1200 bps (Area 818)
|
|||
|
D 0311 090 900 80000 JPLM3 Jet Propulsion Laboratory mail 2, USA
|
|||
|
0311 090 900 8100 Telemail
|
|||
|
0311 091 400 02200 Electronic Tabulating Corporation
|
|||
|
0311 091 600 050 California Outdial 1200 bps (Area 916)
|
|||
|
A 0311 091 900 020 Outdial 300 bps (Area 919)
|
|||
|
A 0311 091 900 021 Outdial 1200 bps (Area 919)
|
|||
|
0311 3 RCA USA - RCA (RCAG)
|
|||
|
0311 9 USA - TRT
|
|||
|
0312 4 USA - FTCC
|
|||
|
0312 5 USA - Uninet
|
|||
|
0312 521 210 1 DIALOG6 Lockheed Info Systems
|
|||
|
D 0312 561 703 080 UNINET
|
|||
|
B 0312 561 703 088 Delphi
|
|||
|
0312 6 AUTONET USA - Autonet
|
|||
|
0312 688 01 AUTONET AUTONET Information
|
|||
|
0312 7 USA - Telenet
|
|||
|
0313 2 COMPU USA - Compuserve
|
|||
|
0313 6 USA - Geisco
|
|||
|
0334 Mexico
|
|||
|
0334 0 Telepac
|
|||
|
0340 FA French Antilles (Martinique (Curacau?))
|
|||
|
0340 0 Dompac/NTI
|
|||
|
0342 BDS Barbados
|
|||
|
0342 235 191 9169
|
|||
|
0350 Bermuda
|
|||
|
0350 3 PSDS
|
|||
|
0425 IL Israel
|
|||
|
0425 1 Isranet
|
|||
|
B 0425 130 000 215 Israelbox
|
|||
|
0426 BRN Bahrain
|
|||
|
0426 3 BTC
|
|||
|
0431 DXB United Arab Emirates - Dubai
|
|||
|
0440 J Japan
|
|||
|
0440 1 DDX-P
|
|||
|
B 0440 129 431 04 KEK VAX
|
|||
|
B 0440 129 431 21 Tsukuba Uni
|
|||
|
0440 8 VENUSP Venus-P (Japanese data network)
|
|||
|
I 0440 820 023 KDD ?
|
|||
|
B 0440 820 060 01 KDD KDD Test Host, TOKYO
|
|||
|
0442
|
|||
|
B 0442 110 403 25 OKI
|
|||
|
B 0442 433 403 07 CMES
|
|||
|
0450 South Korea
|
|||
|
0450 1 Dacom/DNS
|
|||
|
0454 HK Hong Kong
|
|||
|
0454 2 Intelpak
|
|||
|
0454 5 Datapak
|
|||
|
A 0454 550 010 4 HKDATA Hong Kong DATAPAK Info
|
|||
|
A 0454 550 043 1 DATAFAX
|
|||
|
0487 Taiwan
|
|||
|
0487 2 Pacnet
|
|||
|
0487 7 Udas
|
|||
|
0505 AUS Australia
|
|||
|
0505 2 Austpac
|
|||
|
0505 228 621 000 Anglo/Australian Observatory
|
|||
|
0505 228 621 001 CSIRO Radio-Physics
|
|||
|
0505 228 621 001 FTP for Epping
|
|||
|
0505 233 422 000 MELBUNI Melbourne Univ. Australia
|
|||
|
A 0505 273 720 000 UQ Univ. of Queensland Australia
|
|||
|
A 0505 273 720 000 UQXA University of Queensland ANF-10 gateway
|
|||
|
D 0505 273 722 0000 Uni Queensland
|
|||
|
0505 282 620 000 FTP For Austek
|
|||
|
A 0505 282 620 000 VAX in Sidney, Australia
|
|||
|
0505 3 Midas
|
|||
|
0505 321 000 1 Network test
|
|||
|
0505 321 000 3 MIDAS FOX Test
|
|||
|
0510 Indonesia
|
|||
|
0510 1 PSDS (1986)
|
|||
|
0525 SGP Singapore
|
|||
|
0525 2 Telepac
|
|||
|
A 0525 211 668 8 TELEPAC Telepac Info
|
|||
|
0530 NZ New Zealand
|
|||
|
0530 1 P.S.S. (Pacnet)
|
|||
|
0530 171 000 004 WAIKATO Univ of Waikato New Zealand
|
|||
|
B 0530 197 000 016 ASMAIL
|
|||
|
0547 Fr.Polyn.
|
|||
|
0547 0 Tompac
|
|||
|
0612 Ivory Coast
|
|||
|
0612 2 Sytranpac
|
|||
|
0647 Reunion
|
|||
|
0647 0 Dompac/NIT
|
|||
|
0655 ZA South Africe
|
|||
|
0655 0 Saponet
|
|||
|
D 0655 011 101 207 UNI-NET
|
|||
|
0714 Panama
|
|||
|
0714 1 Intelpac
|
|||
|
0722 Argentinia
|
|||
|
0722 2 Arpac
|
|||
|
I 0722 221 110 0171
|
|||
|
0724 BR Brazil
|
|||
|
0724 0 Interdata
|
|||
|
0724 1 Renpac
|
|||
|
D 0724 782 450 8 Nuclear Research Institute
|
|||
|
0730 Chile
|
|||
|
0730 0 Entel
|
|||
|
0732 Colombia
|
|||
|
0732 0
|
|||
|
0742 French Guiana
|
|||
|
0742 0 Dompac/NTI
|
|||
|
0900 USA ?
|
|||
|
0900 0 Dialnet
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|
|||
|
| Local addresses on KOMETH (0228 479 110 86):
|
|||
|
|
|
|||
|
| 11 KOMETH-Informations
|
|||
|
| 120 Modems 1200 bps (predefined numbers, some with a PW)
|
|||
|
| 124 Modems 2400 bps ( " " , " " a PW)
|
|||
|
| 130 Modems 300 bps ( " " , " " a PW)
|
|||
|
| 1D0 RZ-VAX (EZRZ1)
|
|||
|
| 300 ETZ-VAX (CUMULI)
|
|||
|
| 520 ETHICS, Library database
|
|||
|
| D11 PSI-Informations
|
|||
|
| C000 Time
|
|||
|
| C025 X25 Gateway (RZU, with password)
|
|||
|
| C011 NUZ-Informations
|
|||
|
| C100 RZU, VM/SP, full-screen
|
|||
|
|
|
|||
|
| There are two information systems on the RZ-VAX:
|
|||
|
|
|
|||
|
| MAC-BBS BBS with Mac-specific informations. Access for validated users
|
|||
|
| only (that means that you have to type in your name, address and
|
|||
|
| whether you're a student at the ETH or not and then wait a few
|
|||
|
| days).
|
|||
|
| (Username=MAC)
|
|||
|
| VisInfo Informations server of the VIS (Verein der InformatikStudenten)
|
|||
|
| Contains some boards with mail from several networks and from
|
|||
|
| local sources. Has a CHAT (closed during prime time hours). Free
|
|||
|
| access.
|
|||
|
| (Username=VISINFO)
|
|||
|
|
|
|||
|
===============================================================================
|
|||
|
|
|
|||
|
| Local addresses at CERN (0228 468 114 0510):
|
|||
|
|
|
|||
|
| 17 Lyon (own network)
|
|||
|
| 23 PAD
|
|||
|
| 31 VXOMEG
|
|||
|
| 41 Wisconsin/Madison
|
|||
|
| 42 CERNLINE 193
|
|||
|
| 45 DECserver
|
|||
|
| 51 ALEPH
|
|||
|
| 56 MERLIN VAX
|
|||
|
| 61 (Prompt )
|
|||
|
| 72 Wylbur / VM
|
|||
|
| 100 Wylbur / VM
|
|||
|
| 101 VM/370 CERNVM
|
|||
|
| 102 VM/370 CERNVMB
|
|||
|
| 103 VM/370 CERNVM
|
|||
|
| 110 VXLDB1 VAX 8650 VMS 4.6
|
|||
|
| 111 Information
|
|||
|
| 112 VXSB
|
|||
|
| 115 VXLDB1
|
|||
|
| 120 Service CAD_CAM (VAX 8650+VAX785)/SYSTEME=VMS 4.6
|
|||
|
| 121 CAD_CAM
|
|||
|
| 122 VXCERN
|
|||
|
| 123 VXCERN
|
|||
|
| 124 BSD
|
|||
|
| 125 CERNVM
|
|||
|
| 127 PAD
|
|||
|
| 130 L3 test beam VXC3
|
|||
|
| 137 ALEPH-TPC
|
|||
|
| 140 VXEPEL
|
|||
|
| 141 DECserver 200 ("user friendly")
|
|||
|
| 142 CERNADD
|
|||
|
| 146 VXEPEL
|
|||
|
| 147 Uni Genf TEC VAXTEC
|
|||
|
| 151 CCVAX / DECserver 200
|
|||
|
| 152 Uni Genf WA70
|
|||
|
| 154 ALEPH 750 Fastbus VAX
|
|||
|
| 161 MCR
|
|||
|
| 162 MCR
|
|||
|
| 166 VXWA80
|
|||
|
| 167 cernvax
|
|||
|
| 170 VXINFN
|
|||
|
| 175 ALEPH
|
|||
|
| 176 MCR with HELP
|
|||
|
| X29 X25 Gateway
|
|||
|
|
|
|||
|
===============================================================================
|
|||
|
|
|
|||
|
| Addresses on Merit (0228 468 114 0583):
|
|||
|
|
|
|||
|
| The principal host computers on Merit are:
|
|||
|
|
|
|||
|
| Name System/machine Organization Location
|
|||
|
| ---- ----------------- ------------------- -------------
|
|||
|
| MSUnet-IBM VM/CMS IBM 3090-180 Michigan State Univ East Lansing
|
|||
|
| OU Multics Honeywell Oakland Univ Rochester
|
|||
|
| UB MTS IBM 3090-400 Univ of Michigan Ann Arbor
|
|||
|
| UM MTS IBM 3090-400 Univ of Michigan Ann Arbor
|
|||
|
| WM DECsystem-10 Western Michigan Univ Kalamazoo
|
|||
|
| WU MTS Amdahl 470V/8 Wayne State Univ Detroit
|
|||
|
|
|
|||
|
| If you have a question about the use of the Merit Network, call
|
|||
|
| (313) 764-9423 and ask for a user consultant.
|
|||
|
|
|
|||
|
| Other host computers and services available on the Merit network:
|
|||
|
|
|
|||
|
| Autonet CMU-Cyber CMU-IBM Datapac
|
|||
|
| DIALOUT-AA DIAL1200-AA DIAL2400-AA DIAL300-AA
|
|||
|
| EMU-VAX IGW ITI MAGNET
|
|||
|
| MSU-CLSI MSU-CLVAX1 MSU-EGRNET MSU-IBM
|
|||
|
| MSU MTU MTUS5 OU-SecsNet
|
|||
|
| RPI RUAC Survey Telenet
|
|||
|
| UM-Annex UM-CIC UM-CLINFO UM-dippy
|
|||
|
| UM-DSC UM-EnginHarris UM-MMVAX UM-Public-Service
|
|||
|
| UM-QuickSlides UM-RAVAX UM-zippy UMD-LIB
|
|||
|
| UMLIB UMLIB-300 WAYNEST1 WAYNEST2
|
|||
|
| WMU-CAE WMU-Kanga WMU-Pooh WMU-Puff
|
|||
|
| WMU-Tigger WMU-Winnie WSU-CSVAX WSU-ET
|
|||
|
| WSUNET ZOOnet-KCollege ZOOnet-KVCC ZOOnet-Nazareth
|
|||
|
|
|
|||
|
| Some of the other computers and services which can be accessed via Telenet,
|
|||
|
| Autonet, and Datapac:
|
|||
|
|
|
|||
|
| ABA/NET ACP ADPNS-261 ADPNS-3
|
|||
|
| ADPNS-446 ADPNS-9 Alberta ARTFL
|
|||
|
| Automail-23 Automail-297 Boeing British-Columbia
|
|||
|
| BRS Cal-Berkeley Calgary Caltech-HEP
|
|||
|
| Carnegie-DEC-20 Carnegie-MICOM Carnegie-11/45 CompuServe
|
|||
|
| Comshare Cornell Dalhousie DatapacInfo
|
|||
|
| Dialcom Dialog Dow-Jones Guelph
|
|||
|
| Guelph-Cosy Illinois Illinois-Cyber LEXIS
|
|||
|
| Manitoba Maryland-Unix McGill MGH
|
|||
|
| Minnesota-Cyber Minnesota-VAX MIT-Multics MIT-VM
|
|||
|
| Montreal Natl-Lib-Med NCAR-Telenet New-Brunswick
|
|||
|
| Newsnet NJIT-EIES NLM NLM-MCS
|
|||
|
| Notre-Dame NRC NYTimes OAG
|
|||
|
| Queens Rice SDC SFU
|
|||
|
|______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue 27, File 5 of 12
|
|||
|
|
|||
|
|
|||
|
COSMOS
|
|||
|
|
|||
|
COmputer System for Mainframe OperationS
|
|||
|
|
|||
|
Part Two
|
|||
|
|
|||
|
by King Arthur
|
|||
|
|
|||
|
|
|||
|
This article will present solutions to the computer security problems
|
|||
|
presented in my previous file. The following are simple but often neglected
|
|||
|
items which if properly treated can immensely increase your company's computer
|
|||
|
security. These points apply not merely in regards to COSMOS, but to all
|
|||
|
computers in all companies.
|
|||
|
|
|||
|
|
|||
|
A) Dial-Up Security:
|
|||
|
|
|||
|
When securing a computer system, regardless of its type, it's important to
|
|||
|
remember this: the only way someone can remotely access your system is if there
|
|||
|
is a dial-up line leading to that system. If your system has a dial-up, make
|
|||
|
sure that you have taken every possible precaution to secure that line. "The
|
|||
|
one piece of advice I would give is: Be careful with dial-up lines," says
|
|||
|
Bellcore's Ed Pinnes.
|
|||
|
|
|||
|
Dave Imparato, Manager of Database Management at New York Telephone, says,
|
|||
|
"We have devices that sit in front of our computers that you have to gain
|
|||
|
access to. In order to even get to COSMOS, there are three or four levels of
|
|||
|
security you have to go through, and that's before you even get to the system."
|
|||
|
|
|||
|
Rules for protection of Dial-Up lines:
|
|||
|
|
|||
|
1. Have as few dial-up lines as possible. Private lines or direct connections
|
|||
|
are often a viable replacement for dial-up lines.
|
|||
|
|
|||
|
2. If you must have phone lines going to your computer, use external hardware,
|
|||
|
if possible. For instance, the Datakit Virtual Circuit Switch (VCS) will
|
|||
|
require a user to specify an "access password" and a system destination to
|
|||
|
specify which system you are calling. The VCS would then connect you to
|
|||
|
the requested system which would prompt you for a login and password.
|
|||
|
Using hardware similar to this serves a double purpose:
|
|||
|
|
|||
|
A) It is harder for someone to get into your computer, due to
|
|||
|
additional passwords;
|
|||
|
|
|||
|
B) Employees need only dial a single number to access a number of
|
|||
|
systems.
|
|||
|
|
|||
|
Another good type of hardware is a callback modem. A callback modem will
|
|||
|
prompt users for a login and password. If these are correct, the modem
|
|||
|
will automatically callback to a predetermined number. At that point you
|
|||
|
would login to the computer. The advantage of callback is that unless a
|
|||
|
call is placed from a certain phone, there is no way to connect.
|
|||
|
Unfortunately, this is not always efficient for systems with large numbers
|
|||
|
of users.
|
|||
|
|
|||
|
Lastly, and the most effective means of access, is to have a system which
|
|||
|
does not identify itself. A caller has to enter a secret password, which
|
|||
|
doesn't display on the screen. If a caller doesn't type the correct
|
|||
|
password, the system will hang up, without ever telling the caller what has
|
|||
|
happened.
|
|||
|
|
|||
|
3. If you ever detect "hackers" calling a certain number, it is advisable to
|
|||
|
change that number. Phone numbers should be unlisted. According to a
|
|||
|
hacker, he once got the number to an AT&T computer by asking directory
|
|||
|
assistance for the number of AT&T at 976 Main Street.
|
|||
|
|
|||
|
4. If dial-up lines aren't used on nights or weekends, they should be
|
|||
|
disabled. Computer hackers usually conduct their "business" on nights or
|
|||
|
weekends. The COSMOS system has the ability to restrict access by time of
|
|||
|
day.
|
|||
|
|
|||
|
|
|||
|
B) Password Security:
|
|||
|
|
|||
|
Using the analogy between a computer and a file cabinet, you can compare a
|
|||
|
password to the lock on your file cabinet. By having accounts with no
|
|||
|
passwords you are, in effect, leaving your file cabinet wide open. A system's
|
|||
|
users will often want passwords that are easy to remember. This is not an
|
|||
|
advisable idea, especially for a database system with many users. The first
|
|||
|
passwords tried by hackers are the obvious. For instance if MF01 is known to
|
|||
|
be the user name for the frame room, a hacker might try MF01, FRAME, MDF, or
|
|||
|
MAINFRAME as passwords. If it's known to a hacker that the supervisor at the
|
|||
|
MDF is Peter Pinkerton, PETE or PINKERTON would not be very good passwords.
|
|||
|
|
|||
|
Rules for password selection:
|
|||
|
|
|||
|
1. Passwords should be chosen by system administrators or the like. Users
|
|||
|
will often choose passwords which provide no security. They should not be
|
|||
|
within the reach of everybody in the computer room, but instead should be
|
|||
|
sent via company mail to the proper departments.
|
|||
|
|
|||
|
2. Passwords should be changed frequently, but on an irregular basis -- every
|
|||
|
four to seven weeks is advisable. Department supervisors should be
|
|||
|
notified of password changes via mail, a week in advance. This would
|
|||
|
ensure that all employees are aware of the change at the proper time. One
|
|||
|
thing you don't want is mass confusion, where everybody is trying to figure
|
|||
|
out why they can't access their computers.
|
|||
|
|
|||
|
3. System administrators' passwords should be changed twice as often because
|
|||
|
they can allow access to all system resources. If possible, system
|
|||
|
administrator accounts should be restricted from logging in on a dial-up
|
|||
|
line.
|
|||
|
|
|||
|
4. A password should NEVER be the same as the account name. Make sure that
|
|||
|
ALL system defaults are changed.
|
|||
|
|
|||
|
5. Your best bet is to make passwords a random series of letters and numbers.
|
|||
|
For example 3CB06W1, Q9IF0L4, or F4W21D0. All passwords need not be the
|
|||
|
same length or format. Imparato says, "We built a program in a PC that
|
|||
|
generates different security passwords for different systems and makes sure
|
|||
|
there's no duplication."
|
|||
|
|
|||
|
6. It's important to change passwords whenever an employee leaves the company
|
|||
|
or even changes departments. Imparato says, "When managers leave our
|
|||
|
organization, we make sure we change those passwords which are necessary to
|
|||
|
operate the system."
|
|||
|
|
|||
|
7. The Unix operating system has a built-in "password aging" feature, which
|
|||
|
requires a mandatory change of passwords after a period of time. If you
|
|||
|
run any Unix-based systems, it's important to activate password aging.
|
|||
|
|
|||
|
8. When you feel you have experienced a problem, change ALL passwords, not
|
|||
|
just those passwords involved with the incident.
|
|||
|
|
|||
|
|
|||
|
C) Site security:
|
|||
|
|
|||
|
There have been a number of articles written by hackers and published in
|
|||
|
2600 Magazine dealing with garbage picking or what hackers call "trashing".
|
|||
|
It's important to keep track of what you throw out. In many companies,
|
|||
|
proprietary operations manuals are thrown out. COSMOS itself is not a
|
|||
|
user-friendly system. In other words, without previous exposure to the system
|
|||
|
it would be very difficult to operate. Bellcore's Beverly Cruse says, "COSMOS
|
|||
|
is used in so many places around the country, I wouldn't be surprised if they
|
|||
|
found books... in the garbage, especially after divestiture. One interesting
|
|||
|
thing about a COSMOS article written by hackers, is that there was a lot of
|
|||
|
obsolete information, so it shows that wherever the information came from... it
|
|||
|
was old."
|
|||
|
|
|||
|
Rules for site security:
|
|||
|
|
|||
|
1. Although it may seem evident, employees should be required to show proper
|
|||
|
identification when entering terminal rooms or computer facilities. It's
|
|||
|
doubtful that a hacker would ever attempt to infiltrate any office, but
|
|||
|
hackers aren't the only people you have to worry about.
|
|||
|
|
|||
|
2. Urge employees to memorize login sequences. It's a bad idea for passwords
|
|||
|
to be scribbled on bits of paper taped to terminals. Eventually, one of
|
|||
|
those scraps may fall into the wrong hands.
|
|||
|
|
|||
|
3. Garbage should be protected as much as possible. If you use a private
|
|||
|
pick-up, keep garbage in loading docks, basements, or fenced-off areas. If
|
|||
|
you put your garbage out for public sanitation department pick-up, it's a
|
|||
|
good idea to shred sensitive materials.
|
|||
|
|
|||
|
4. Before throwing out old manuals or books, see if another department could
|
|||
|
make use of them. The more employees familiar with the system, the less of
|
|||
|
a chance that there will be a security problem.
|
|||
|
|
|||
|
5. Printing terminals should be inspected to make sure that passwords are not
|
|||
|
readable. If passwords are found to echo, check to see if the duplex is
|
|||
|
correct. Some operating systems allow you to configure dial-ups for
|
|||
|
printer use.
|
|||
|
|
|||
|
|
|||
|
D) Employee Security:
|
|||
|
|
|||
|
When a hacker impersonates an employee, unless he is not successful there
|
|||
|
is a great chance the incident will go unreported. Even if the hacker doesn't
|
|||
|
sound like he knows what he's talking about, employees will often excuse the
|
|||
|
call as an unintelligent or uninformed person. It's unpleasant to have to
|
|||
|
worry about every call with an unfamiliar voice on the other end of the phone,
|
|||
|
but it is necessary.
|
|||
|
|
|||
|
Rules for employee security:
|
|||
|
|
|||
|
1. When making an inter-departmental call, always identify yourself with:
|
|||
|
1) Your name; 2) Your title; and 3) Your department and location.
|
|||
|
|
|||
|
2. Be suspicious of callers who sound like children, or those who ask you
|
|||
|
questions that are out of the ordinary. Whenever someone seems suspicious,
|
|||
|
get their supervisor's name and a callback number. Don't discuss anything
|
|||
|
sensitive until you can verify their identity. Don't ever discuss
|
|||
|
passwords over the phone.
|
|||
|
|
|||
|
3. When there is a security problem with a system, send notices to all users
|
|||
|
instructing them not to discuss the system over the phone, especially if
|
|||
|
they do not already know the person to whom they are talking.
|
|||
|
|
|||
|
4. Remind all dial-up users of systems, before hanging up.
|
|||
|
|
|||
|
5. If security-minded posters are put up around the workplace, employees are
|
|||
|
bound to take more care in their work and in conversations on the phone.
|
|||
|
|
|||
|
6. If managers distribute this and other computer security articles to
|
|||
|
department supervisors employee security will be increased.
|
|||
|
|
|||
|
|
|||
|
E) General Security:
|
|||
|
|
|||
|
Bellcore recently sent a package to all system administrators of COSMOS
|
|||
|
systems. The package detailed security procedures which applied to COSMOS and
|
|||
|
Unix-based systems. If you are a recipient of this package, you should re-read
|
|||
|
it thoroughly to ensure that your systems are secure. Cruse says, "Last
|
|||
|
year... I had a call from someone within an operating company with a COSMOS
|
|||
|
security problem. All we really did was give them documentation which reminded
|
|||
|
them of existing security features... There is built-in security in the COSNIX
|
|||
|
operating system... We really didn't give them anything new at the time. The
|
|||
|
features were already there; we gave them the recommendation that they
|
|||
|
implement all of them."
|
|||
|
|
|||
|
If you feel you may not be using available security features to the
|
|||
|
fullest, contact the vendors of your computer systems and request documentation
|
|||
|
on security. Find out if there are security features that you may not be
|
|||
|
currently taking advantage of. There are also third party software companies
|
|||
|
that sell security packages for various operating systems and computers.
|
|||
|
|
|||
|
Computer security is a very delicate subject. Many people try to pretend
|
|||
|
that there is no such thing as computer crime. Since the problem exists, the
|
|||
|
best thing to do is to study the problems and figure out the best possible
|
|||
|
solutions. If more people were to write or report about computer security, it
|
|||
|
would be easier for everyone else to protect themselves. I would like to see
|
|||
|
Bellcore publish security guidelines, available to the entire
|
|||
|
telecommunications industry. Keep in mind, a chain is only as strong as its
|
|||
|
weakest link.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue 27, File 6 of 12
|
|||
|
|
|||
|
<<<<<<<<<<<<<<<<<<<<<<*>>>>>>>>>>>>>>>>>>>>>>
|
|||
|
<<< >>>
|
|||
|
<<< Looking Around In DECNET >>>
|
|||
|
<<< >>>
|
|||
|
<<< by Deep Thought of West Germany >>>
|
|||
|
<<< >>>
|
|||
|
<<< June 1, 1989 >>>
|
|||
|
<<< >>>
|
|||
|
<<<<<<<<<<<<<<<<<<<<<<*>>>>>>>>>>>>>>>>>>>>>>
|
|||
|
|
|||
|
|
|||
|
Disclaimer: I take no responsibility for any use or abuse of the information
|
|||
|
contained in this article, nor for any damage caused by the use of
|
|||
|
methods described. DECNET, VAX, and VMS are possibly registered
|
|||
|
trademarks of Digital Equipment Corporation.
|
|||
|
|
|||
|
|
|||
|
There comes a time when every somewhat intelligent programmer asks: Is hacking
|
|||
|
difficult? Now, being in a university network, why don't just give it a try?
|
|||
|
Since one is an official student and somewhat authorized to use the computing
|
|||
|
facilities, testing the modern means of communication should cause no trouble.
|
|||
|
|
|||
|
Well, you start searching on those nodes, you have official access for
|
|||
|
interesting programs and procedures. And you find: Netdcl, just one program
|
|||
|
of many, that obviously enables one to run commands on remote nodes without
|
|||
|
having an account on these nodes. A really interesting thing, as nearly
|
|||
|
everything is allowed that a normal user can do.
|
|||
|
|
|||
|
The dear reader may start to think: Wasn't there always the shouting about VMS
|
|||
|
being the MOST SECURE computer system, making it UNPENETRABLE to hackers? Ok,
|
|||
|
cool down, this feature can be disabled and so, you think, if someone has super
|
|||
|
secret data on his VAX, he will stop any use or abuse of this feature.
|
|||
|
|
|||
|
2nd Act -- Somewhere one has heard about some mystery things called system
|
|||
|
calls. Since one always wanted to know about how to react on keystrokes on a
|
|||
|
VAX (really being not trivial!) you start reading the manuals more precisely to
|
|||
|
find out how to do it in Pascal.
|
|||
|
|
|||
|
Randomly on browsing thru the pages you discover functions which deliver
|
|||
|
information about Userids. This comes in handy, as a friend engaged in
|
|||
|
university politics wants to distribute a leaflet by email to all registered
|
|||
|
users. In fact, it's completely unproblematic to gain a list of all users. An
|
|||
|
example program, although written in Assembler, is even contained in the
|
|||
|
manuals. Enjoy a list of 1000 Userids complete with information about network
|
|||
|
access rights. The Pascal program is contained in Appendix B (later in this
|
|||
|
file).
|
|||
|
|
|||
|
Sorry, passwords are not stored in this list. Even the Sysop can't access
|
|||
|
them, so that's no great loss. Guess what passwords many accounts have? Sure,
|
|||
|
just try the username. It's really amazing how ignorant users can be. Of
|
|||
|
course this is a problem of group-accounts, that many users have access to and
|
|||
|
must know the password. Nevertheless, the hole is there.
|
|||
|
|
|||
|
The real hacker, once he has logged in on such an account surely finds ways to
|
|||
|
gain system privilege. This requires in-depth knowledge of the Kernel of VMS
|
|||
|
and is another story I won't deal with.
|
|||
|
|
|||
|
|
|||
|
What is DECNET?
|
|||
|
~~~~~~~~~~~~~~~
|
|||
|
DECNET is the means, by which computers from Digital Equipment Corporation
|
|||
|
(DEC) can be connected to each other. Each computer in this network has an
|
|||
|
address which is normally given by x.y where x is the area number (an integer)
|
|||
|
and y is the node number in this area which ranges from 1 to 1023. To access
|
|||
|
DECNET nodes, one specifies just one number, which can be computed from x and y
|
|||
|
by the following formula:
|
|||
|
|
|||
|
nodenumber = x * 1024 + y
|
|||
|
|
|||
|
Often nodes, especially local nodes (having the same area number as your
|
|||
|
current node) have names assigned to them so they can be memorized more easily.
|
|||
|
|
|||
|
|
|||
|
Interesting DECNET Commands
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
To get a (first) list of available DECNET nodes, try the command
|
|||
|
|
|||
|
$ SHOW NET
|
|||
|
|
|||
|
The $ (as in the following examples) is the default prompt of VMS and should
|
|||
|
not be entered. This Command will give you a list of (hopefully) reachable
|
|||
|
nodes. All lines of the output contain the network address in the form x.y and
|
|||
|
normally a name which this node is known by.
|
|||
|
|
|||
|
Your current node is mentioned in the first line in "VAX/VMS network status for
|
|||
|
local node X.Y Name". In most cases you will then just see local nodes listed
|
|||
|
and a line saying "The next hop to the nearest area router is node XX.YY".
|
|||
|
This node contains more information about the DECNET than the node you are
|
|||
|
currently on. If you have an account on the specified node, log on there and
|
|||
|
try again. If not, well, play with the local nodes listed and look at the
|
|||
|
command NCP shown later.
|
|||
|
|
|||
|
Now, what can you do with those nodes that were mentioned in the output?
|
|||
|
First command is
|
|||
|
|
|||
|
$ SET HOST <node>
|
|||
|
|
|||
|
Where <node> is either a nodename or a nodenumber (see above). Thus, if SDIVAX
|
|||
|
was listed in the SHOW NET list as 42.13, then you may try both SET HOST SDIVAX
|
|||
|
or SET HOST 43021 (42*1024+13 = 43021). Probably you'll get that ugly
|
|||
|
Username: prompt. You're on your own then.
|
|||
|
|
|||
|
Second thing you can do with DECNET is email. On VMS the MAIL program can send
|
|||
|
mail to other users. If you and your friend both have accounts on the same
|
|||
|
DECNET, you can send him mail if you know his nodename or nodenumber by
|
|||
|
specifying SDIVAX::FREDDY or 43021::FREDDY.
|
|||
|
|
|||
|
Then there is PHONE. This is a utility to talk to another (or several) user(s)
|
|||
|
on a DECNET. If you want to call Freddy, just type PHONE SDIVAX::FREDDY. If
|
|||
|
he is logged in, his terminal will ring and if he answers his phone (with PHONE
|
|||
|
ANSWER) you may chat with him. PHONE has another nice feature built in: You
|
|||
|
may ask for a list of active users on a remote name by %DIR SDIVAX. See the
|
|||
|
online help on PHONE for further details.
|
|||
|
|
|||
|
The next really mighty DECNET facility is remote file access. Valid filenames
|
|||
|
in VMS consist of the components node, disk, directory and filename. An
|
|||
|
example for a valid filename is SDIVAX::DISK$2:[NASA.SECRET]SDI.DOC where some
|
|||
|
components may be omitted and default values are used instead.
|
|||
|
|
|||
|
File names including the node specification may be used in nearly all VMS
|
|||
|
commands examples being DIR, TYPE and COPY. Access to the specified file is
|
|||
|
granted, if the protection of the file allows access by world, or if the owner
|
|||
|
of the file is the user DECNET. This pseudo userid is available on every VAX
|
|||
|
and has the password DECNET. Access to that account is limited to network
|
|||
|
processing so you can't just log in with Username=DECNET, password=DECNET. By
|
|||
|
default a special directory owned by the User DECNET exists on each node. This
|
|||
|
directory can be accessed by just specifying the nodename without any disk or
|
|||
|
directory information, as in
|
|||
|
|
|||
|
$ DIR SDIVAX::
|
|||
|
|
|||
|
If users played too much with this feature, the directory may be protected or
|
|||
|
otherwise disabled.
|
|||
|
|
|||
|
The last feature described here is the remote command processing facility. If
|
|||
|
you try to open a file with the specification
|
|||
|
|
|||
|
$ SDIVAX::"task=foo.com"
|
|||
|
|
|||
|
Instead of opening the DCL procedure, foo.com will be executed. To make use of
|
|||
|
this feature easily, programs have been written to interactively communicate
|
|||
|
with a remote host. The command procedure NETDCL.COM does this task and is
|
|||
|
contained in the Appendix A (seen later in this file. Look at this
|
|||
|
DCL-Procedure to learn more about DECNET features.
|
|||
|
|
|||
|
|
|||
|
The Key To Universal Knowledge
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
There is a pearl under the programs on a VAX. It's called NCP and will give
|
|||
|
readily information about the whole DECNET. You start this program either by
|
|||
|
MCR NCP or by doing a SET DEF SYS$SYSTEM and RUN NCP. Use the on-line Help
|
|||
|
provided in NCP (which means Network Control Program) to learn more.
|
|||
|
|
|||
|
NCP> SHOW KNOWN NODES
|
|||
|
|
|||
|
Provides a list of all nodes known on your current node, including the names
|
|||
|
you may use as node specifications. But there is more: You may connect to
|
|||
|
another node's database and get a list of nodes which are known at the remote
|
|||
|
node with
|
|||
|
|
|||
|
NCP> SET EXEC SDIVAX
|
|||
|
|
|||
|
And then again the SHOW KNOWN NODES command. This feature should provide you
|
|||
|
with a nearly infinite list of node names and node numbers.
|
|||
|
|
|||
|
|
|||
|
Conclusion
|
|||
|
~~~~~~~~~~
|
|||
|
There are many nice features available under DECNET. Probably I don't know
|
|||
|
all, but I hope this article showed you the mighty tools available on VMS to
|
|||
|
make network life easier.
|
|||
|
|
|||
|
|
|||
|
WARNING: The author has had bad experiences with some node administrators,
|
|||
|
who didn't like their machines being contacted over DECNET. Yes,
|
|||
|
that's the drawback, each DECNET activity is written to a protocol
|
|||
|
file that is printed and deleted every month. So you should be
|
|||
|
careful in using DECNET.
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
APPENDIX A:
|
|||
|
|
|||
|
The Procedure NETDCL.COM, sometimes called TELL.COM, NET.COM
|
|||
|
-----------------------
|
|||
|
$ IF f$mode() .EQS. "NETWORK" THEN GOTO network
|
|||
|
$ IF p1 .EQS. "" THEN READ/PROMPT="_Node: " sys$command p1
|
|||
|
$ nodespec = p1 - "::"
|
|||
|
$ nodename = f$extract(0,f$locate("""",nodespec),nodespec)
|
|||
|
$! include the following line for "hard cases"
|
|||
|
$! nodespec = nodespec+"""decnet decnet"""
|
|||
|
$ ON WARNING THEN CONTINUE
|
|||
|
$ CLOSE/ERR=open_server dcl_server
|
|||
|
$open_server:
|
|||
|
$ OPEN/READ/WRITE dcl_server 'nodespec'::"TASK=NETDCL"/ERROR=open_failure
|
|||
|
$ ON WARNING THEN GOTO exit
|
|||
|
$flush_output:
|
|||
|
$ READ dcl_server record
|
|||
|
$ IF record .EQS. "SEND_ME_A_COMMAND" -
|
|||
|
THEN GOTO send_command
|
|||
|
$ WRITE sys$output record
|
|||
|
$ GOTO flush_output
|
|||
|
$send_command:
|
|||
|
$ IF p2 .NES. "" THEN GOTO single_command
|
|||
|
$ READ sys$command record /PROMPT="''nodename'> " /END=exit
|
|||
|
$ record := 'record
|
|||
|
$ IF record .EQS. "EXIT" THEN GOTO exit
|
|||
|
$ WRITE dcl_server record
|
|||
|
$ GOTO flush_output
|
|||
|
$single_command:
|
|||
|
$ command := 'p2' 'p3' 'p4' 'p5' 'p6' 'p7' 'p8'
|
|||
|
$ WRITE dcl_server command
|
|||
|
$single_flush:
|
|||
|
$ READ dcl_server record
|
|||
|
$ IF record .EQS. "SEND_ME_A_COMMAND"-
|
|||
|
$ THEN GOTO exit
|
|||
|
$ WRITE sys$output record
|
|||
|
$ GOTO single_flush
|
|||
|
$open_failure:
|
|||
|
$ ON WARNING THEN EXIT
|
|||
|
$ COPY/LOG Netdcl.Com 'nodespec'::
|
|||
|
$ WAIT 0:0:1
|
|||
|
$ OPEN/READ/WRITE dcl_server 'nodespec'::"TASK=NETDCL"
|
|||
|
$ ON WARNING THEN GOTO exit
|
|||
|
$ GOTO flush_output
|
|||
|
$exit:
|
|||
|
$ CLOSE dcl_server
|
|||
|
$ EXIT
|
|||
|
$network:
|
|||
|
$ OPEN/READ/WRITE dcl_link sys$net
|
|||
|
$ SET NOON
|
|||
|
$ dcl_verify = 'f$verify(0)'
|
|||
|
$ DEFINE sys$output dcl_link:
|
|||
|
$server_loop:
|
|||
|
$ WRITE dcl_link "SEND_ME_A_COMMAND"
|
|||
|
$ READ dcl_link dcl_string /END_OF_FILE=server_exit /ERROR=server_exit
|
|||
|
$ 'dcl_string'
|
|||
|
$ GOTO server_loop
|
|||
|
$server_exit:
|
|||
|
$ IF dcl_verify THEN set verify
|
|||
|
$ CLOSE dcl_link
|
|||
|
$ DEASSIGN sys$output
|
|||
|
$ EXIT
|
|||
|
-----------------------
|
|||
|
|
|||
|
APPENDIX B
|
|||
|
|
|||
|
ALLUSER.PAS - Show all registered users
|
|||
|
-----------------------
|
|||
|
{
|
|||
|
* alluser.pas - get names of all users
|
|||
|
* by Deep, 1989
|
|||
|
* This program is freely redistributable as long no modifications are made
|
|||
|
* DISCLAIMER: I take no responsibility for any use or abuse of this
|
|||
|
* program. It is given for informational purpose only.
|
|||
|
*
|
|||
|
* program history:
|
|||
|
* 04-May-89 started
|
|||
|
* 02-Jun-89 clean up of code
|
|||
|
}
|
|||
|
[inherit ('sys$library:starlet.pen')]
|
|||
|
program alluser(input,output);
|
|||
|
|
|||
|
type $word = [word] 0..65535;
|
|||
|
$byte = [byte] 0..255;
|
|||
|
$quadword = record
|
|||
|
lo,hi : unsigned;
|
|||
|
end;
|
|||
|
$uquad = record
|
|||
|
lo,hi : unsigned;
|
|||
|
end;
|
|||
|
var
|
|||
|
id: unsigned;
|
|||
|
status, status2: integer;
|
|||
|
length: $WORD;
|
|||
|
attrib,context,context2,context3: unsigned;
|
|||
|
ident, ident2: unsigned;
|
|||
|
name: varying [512] of char;
|
|||
|
holder: $uquad;
|
|||
|
|
|||
|
begin
|
|||
|
|
|||
|
writeln('Alluser - use at your own risk!');
|
|||
|
status := SS$_NORMAL;
|
|||
|
{ id = -1 selects next identifier }
|
|||
|
id := -1;
|
|||
|
context := 0;
|
|||
|
while (status <> SS$_NOSUCHID) do
|
|||
|
begin
|
|||
|
{ find next identifier }
|
|||
|
status := $idtoasc(id,name.length,name.body,ident,attrib,context);
|
|||
|
if (status <> SS$_NOSUCHID) then begin
|
|||
|
write(pad(name,' ',16));
|
|||
|
if (ident div (65536*32768) > 0) then
|
|||
|
{ it's a rights-list, so print the hex-value of the identifier }
|
|||
|
begin
|
|||
|
writeln(oct(ident,12));
|
|||
|
context2 := 0;
|
|||
|
context3 := 0;
|
|||
|
{ find all holders of this right }
|
|||
|
repeat
|
|||
|
holder := zero;
|
|||
|
status2 := $find_holder(ident,holder,attrib,context2);
|
|||
|
if (holder.lo <> 0) then begin
|
|||
|
ident2 := ident;
|
|||
|
{ get UIC and username }
|
|||
|
status := $idtoasc(holder.lo,name.length,name.body,ident2
|
|||
|
,attrib,context3);
|
|||
|
write(' ',pad(name,' ',16));
|
|||
|
writeln('[',oct(holder.lo div 65536,3),','
|
|||
|
,oct(holder.lo mod 65536,3),']');
|
|||
|
end;
|
|||
|
until (holder.lo = 0);
|
|||
|
end
|
|||
|
else
|
|||
|
{ it's a UIC, so translate to [grp,user] }
|
|||
|
begin
|
|||
|
writeln('[',oct(ident div 65536,3),',',oct(ident mod 65536,3),']');
|
|||
|
end;
|
|||
|
end;
|
|||
|
end;
|
|||
|
end.
|
|||
|
-----------------------
|
|||
|
|
|||
|
This article has been brought to you by Deep Thought of West Germany. If you
|
|||
|
liked this article, grant me access if I once drop in your BBS!
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
Received: (from C483307@UMCVMB for TK0JUT1@UCLAMAIL via NJE)
|
|||
|
(C483307-9202; 114 LINES); Tue, 27 Jun 89 15:54:16 CDT
|
|||
|
Date: Tue, 27 Jun 89 15:54 CDT
|
|||
|
To: TK0JUT1
|
|||
|
From: C483307@UMCVMB
|
|||
|
|
|||
|
Comment: converted from NETDATA format at NIU
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue 27, File 7 of 12
|
|||
|
|
|||
|
<:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:>
|
|||
|
<:> <:>
|
|||
|
<:> The Making Of A Hacker <:>
|
|||
|
<:> <:>
|
|||
|
<:> by Framstag of West Germany <:>
|
|||
|
<:> <:>
|
|||
|
<:> June 2, 1989 <:>
|
|||
|
<:> <:>
|
|||
|
<:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:>
|
|||
|
|
|||
|
|
|||
|
Prologue For None VMS Users
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
DECnet is the network for DEC machines, in most cases you can say VAXes.
|
|||
|
DECnet allows you to do: - e-mail
|
|||
|
- file transfer
|
|||
|
- remote login
|
|||
|
- remote command
|
|||
|
- remote job entry
|
|||
|
- PHONE
|
|||
|
PHONE is an interactive communication between users and is equal to TALK
|
|||
|
on UNIX or a "deluxe"-CHAT on VM/CMS.
|
|||
|
|
|||
|
BELWUE, the university network of the state Baden-Wuerttemberg in
|
|||
|
West Germany contains (besides other networks) a DECnet with about 400 VAXes.
|
|||
|
On every VAX there is standard-account called DECNET with pw:= DECNET, which is
|
|||
|
not reachable via remote login. This account is provided for several
|
|||
|
DECnet-Utilities and as a pseudo-guest-account. The DECNET-account has very
|
|||
|
restricted privileges: You cannot edit a file or make another remote login.
|
|||
|
|
|||
|
The HELP-menu is equipped by the system and is similar to the MAN command
|
|||
|
on UNIX.
|
|||
|
|
|||
|
More information on DECnet can be found in "Looking Around In DECnet" by
|
|||
|
Deep Thought in this very issue of Phrack Inc.
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Here, at the University of Ulm, we have an *incredibly* ignorant computer
|
|||
|
center staff, with an even bigger lack of system-literature (besides the 80 kg
|
|||
|
of VAX/VMS-manuals). The active may search for information by himself, which
|
|||
|
is over the level of "run," "FORTRAN," or "logout." My good luck that I have
|
|||
|
other accounts in the BELWUE-DECnet, where more information is offered for the
|
|||
|
users. I am a regular student in Ulm and all my accounts are completely legal
|
|||
|
and corresponding to the German laws. I don't call myself a "hacker," I feel
|
|||
|
more like a "user" (...it's more a defining-problem).
|
|||
|
|
|||
|
In the HELP-menu in a host in Tuebingen I found the file netdcl.com and
|
|||
|
the corresponding explanation, which sends commands to the DECNET-Account of
|
|||
|
other VAXes and executes them there (remote command). The explanation in the
|
|||
|
HELP-menu was idiot-proof -- therefore for me, too :-)
|
|||
|
|
|||
|
With the command "$ mcr ncp show known nodes" you can obtain a list of all
|
|||
|
netwide active VAXes, as is generally known, and so I pinged all these VAXes to
|
|||
|
look for more information for a knowledge-thirsty user. With "help", "dir" and
|
|||
|
other similar commands I look around on those DECnet accounts, always watching
|
|||
|
for topics related to the BELWUE-network. It's a pity, that 2/3 of all VAXes
|
|||
|
have locked the DECNET-Account for NETDCL.COM. Their system managers are
|
|||
|
probably afraid of unauthorized access, but I cannot imagine how there could be
|
|||
|
such an unauthorized access, because you cannot log on this account -- no
|
|||
|
chance for trojan horses, etc.
|
|||
|
|
|||
|
Some system managers called me back after I visited their VAX to chat with
|
|||
|
me about the network and asked me if they could help me in any way. One sysop
|
|||
|
from Stuttgart even sent me a version of NETDCL.COM for the ULTRIX operation
|
|||
|
system.
|
|||
|
|
|||
|
Then, after a month, the H O R R O R came over me in shape of a the
|
|||
|
following mail:
|
|||
|
|
|||
|
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
|
|||
|
From: TUEBINGEN::SYSTEM 31-MAY-1989 15:31:11.38
|
|||
|
To: FRAMSTAG
|
|||
|
CC:
|
|||
|
Subj: don't make any crap, or you'll be kicked out!
|
|||
|
|
|||
|
From: ITTGPX::SYSTEM 29-MAY-1989 16:46
|
|||
|
To: TUEBINGEN::SYSTEM
|
|||
|
Subj: System-breaking-in 01-May-1989
|
|||
|
|
|||
|
To the system manager of the Computer TUEBINGEN,
|
|||
|
|
|||
|
On May 1st 1989 we had a System-breaking-in in our DECNET-account, which
|
|||
|
started from your machine. By help of our accounting we ascertained your user
|
|||
|
FRAMSTAG to have emulated an interactive log-on on our backbone-node and on
|
|||
|
every machine of our VAX-cluster with the "trojan horse" NETDCL.COM. Give us
|
|||
|
this user's name and address and dear up the occurrence completely. We point
|
|||
|
out that the user is punishable. In case of repetition we would be forced to
|
|||
|
take corresponding measures. We will check whether our system got injured. If
|
|||
|
not, this time we will disregard any measure. Inform us via DECnet about your
|
|||
|
investigation results -- we are attainable by the nodenumber 1084::system
|
|||
|
|
|||
|
Dipl.-Ing. Michael Hager
|
|||
|
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
|
|||
|
|
|||
|
My system manager threatened me with the deleting of my account, if I
|
|||
|
would not immediately enlighten the affair. *Gulp*!
|
|||
|
I was conscious about my innocence, but how to tell it to the others? I
|
|||
|
explained, step by step, everything to my system manager. He then understood
|
|||
|
after a while, but the criminal procedure still hovered over me... so, I took
|
|||
|
quickly to my keyboard, to compose file of explanations and to send it to that
|
|||
|
angry system manager in Stuttgart (node 1084 is an institute there). But no
|
|||
|
way out: He had run out of disk quota and my explanation-mail sailed into the
|
|||
|
nirwana:
|
|||
|
|
|||
|
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
|
|||
|
$ mail explanation
|
|||
|
To: 1084::system
|
|||
|
%MAIL-E, error sending to user SYSTEM at 1084
|
|||
|
%MAIL-E-OPENOUT, error opening SYS$SYSROOT:[SYSMGR]MAIL$00040092594FD194.MAI;
|
|||
|
as output
|
|||
|
-RMS-E-CRE, ACP file create failed
|
|||
|
-SYSTEM-F-EXDISKQUOTA, disk quota exceeded
|
|||
|
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
|
|||
|
|
|||
|
Also the attempt of a connection with the PHONE-facilty failed: In his
|
|||
|
borderless hacker-paranoia, he cut off his PHONE... and nowhere is a list with
|
|||
|
the REAL-addresses of the virtual DECnet-addresses available (to prevent
|
|||
|
hacking). Now I stood there with the brand "DANGEROUS HACKER!" and I had no
|
|||
|
chance to vindicate myself. I poured out my troubles to an acquaintance of
|
|||
|
mine, who is a sysop in the computer-center in Freiburg. He asked other sysops
|
|||
|
and managers thru the whole BELWUE-network until someone gave him a telephone
|
|||
|
number after a few days -- and that was the right one!
|
|||
|
|
|||
|
I phoned to this Hager and told him what I had done with his
|
|||
|
DECnet-account and also what NOT. I wanted to know which crime I had
|
|||
|
committed. He promptly cancelled all of his reproaches, but he did not excuse
|
|||
|
his defamous incriminations. I entreated him to inform my system manager in
|
|||
|
Tuebingen that I have done nothing illegal and to stop him from erasing my
|
|||
|
account. This happens already to a fellow student of mine (in this case, Hager
|
|||
|
was also guilty). He promised me that he would officially cancel his
|
|||
|
reproaches.
|
|||
|
|
|||
|
After over a week this doesn't happen (I'm allowed to use my account
|
|||
|
further on). In return for it, I received a new mail from Hager on another
|
|||
|
account of mine:
|
|||
|
|
|||
|
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
|
|||
|
From: 1084::HAGER 1-JUN-1989 12:51
|
|||
|
To: 50180::STUD_11
|
|||
|
Subj: System-breaking-in
|
|||
|
|
|||
|
On June 1st 1989 you have committed a system-breaking-in on at least one of our
|
|||
|
VAXes. We were able to register this occurrence. We would be forced to take
|
|||
|
further measure if you did not dear up the occurrence completely until June
|
|||
|
6th.
|
|||
|
|
|||
|
Of course the expenses involved would be imposed on you. Hence enlightenment
|
|||
|
must be in your own interest.
|
|||
|
|
|||
|
We are attainable via DECnet-mail with the address 1084::HAGER or via following
|
|||
|
address:
|
|||
|
|
|||
|
Institut fuer Technische Thermodynamik und Thermische Verfahrenstechnik
|
|||
|
Dipl.-Ing. M. Hager Tel.: 0711/685-6109
|
|||
|
Dipl.-Ing. M. Mrzyglod Tel.: 0711/685-3398
|
|||
|
Pfaffenwaldring 9/10-1
|
|||
|
7000 Stuttgart-80
|
|||
|
|
|||
|
M. Hager
|
|||
|
M. Mrzyglod
|
|||
|
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
|
|||
|
|
|||
|
This was the reaction of my attempt: "$ PHONE 1084::SYSTEM". I have not
|
|||
|
answered to this mail. I AM SICK OF IT!
|
|||
|
|
|||
|
|
|||
|
Framstag
|
|||
|
(FRAMSTAG@DTUPEV5A.BITNET)
|
|||
|
|
|||
|
With Special Thanks For Translation Assistance To Schrulli B.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue 27, File 8 of 12
|
|||
|
|
|||
|
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
|
|||
|
<><><><> <><><><>
|
|||
|
<><><> Sending Fake Mail In Unix <><><>
|
|||
|
<><> <><>
|
|||
|
<> by Dark OverLord <>
|
|||
|
<><> <><>
|
|||
|
<><><> May 26, 1989 <><><>
|
|||
|
<><><><> <><><><>
|
|||
|
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
|
|||
|
|
|||
|
|
|||
|
Here is a shell script that can be use to send fakemail from any Unix system.
|
|||
|
Have fun and stay out of trouble.
|
|||
|
|
|||
|
|
|||
|
-Dark Overlord
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-= Cut here -=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
! /bin/sh
|
|||
|
#Mfakemail - A shell script to send fakemail.
|
|||
|
#M##M#Met up the path.
|
|||
|
PATH=/usr/ucb:/bin:$HOME/Bin
|
|||
|
#Marse the command line
|
|||
|
case $ in
|
|||
|
0)echo "USAGE: user@host [ from@somewhere ] [ mailer_host ]" >& 2
|
|||
|
exit 1
|
|||
|
;;
|
|||
|
1)mailto=$1
|
|||
|
from="person@campus"
|
|||
|
mailerhost=localhost
|
|||
|
;;
|
|||
|
2)mailto=$1
|
|||
|
from=$2
|
|||
|
mailerhost=localhost
|
|||
|
;;
|
|||
|
3)mailto=$1
|
|||
|
from=$2
|
|||
|
mailerhost=$3
|
|||
|
;;
|
|||
|
*)echo "USAGE: user@host [ from@somewhere ] [ mailer_host" >& 2
|
|||
|
exit 1
|
|||
|
;;
|
|||
|
esac
|
|||
|
#Mreate a header for sendmail
|
|||
|
cat <<E!O!F!> /tmp/cli$$
|
|||
|
helo $mailerhost
|
|||
|
mail from:$from<$from>
|
|||
|
rcpt to: $mailto <$mailto>
|
|||
|
data
|
|||
|
From: $from
|
|||
|
To: $mailto
|
|||
|
Subject:
|
|||
|
Status: RO
|
|||
|
|
|||
|
|
|||
|
E!O!F!
|
|||
|
#Mdit the mailer
|
|||
|
vi /tmp/cli$$
|
|||
|
#Mdd a ending for the mailer
|
|||
|
cat <<E!O!F!>> /tmp/cli$$
|
|||
|
.
|
|||
|
quit
|
|||
|
E!O!F!
|
|||
|
#Monnect to the remote host's sendmail daemon
|
|||
|
telnet $mailerhost smtp < /tmp/cli$$
|
|||
|
#Mlean up time
|
|||
|
/bin/rm -f /tmp/cli$$
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue 27, File 9 of 12
|
|||
|
|
|||
|
|
|||
|
+======================================+
|
|||
|
|
|||
|
The Postal Inspection Service
|
|||
|
|
|||
|
(C) UNITED STATES POSTAL SERVICE (U.S. MAIL)
|
|||
|
|
|||
|
Brought to you by
|
|||
|
|
|||
|
Vendetta
|
|||
|
|
|||
|
May 10, 1989
|
|||
|
|
|||
|
+======================================+
|
|||
|
|
|||
|
|
|||
|
Protecting The U.S. Mails
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
The protection of the U.S. Mail and the mail system is the responsibility of
|
|||
|
the Postal Inspection Service. As the law enforcement and audit arm of the
|
|||
|
U.S. Postal Service, the Inspection Service is a highly specialized,
|
|||
|
professional organization performing investigative, law enforcement, and audit
|
|||
|
functions essential to a stable and sound postal system.
|
|||
|
|
|||
|
As our country's oldest federal law enforcement agency, the Inspection Service
|
|||
|
has jurisdiction in all criminal matters infringing on the integrity and
|
|||
|
security of the mail, and the safety of all postal valuables, property, and
|
|||
|
personnel.
|
|||
|
|
|||
|
Since the beginning of a postal system in this country, criminal and
|
|||
|
administrative problems of the Postal Service have been interwoven. By
|
|||
|
detecting and investigating crimes against the mail and postal revenue,
|
|||
|
establishing safe and efficient postal systems, protecting all postal
|
|||
|
properties, assuring that the postal system is not criminally misused to the
|
|||
|
detriment of the public, the Inspection Service plays an integral part in
|
|||
|
maintaining effective operations in the Postal Service.
|
|||
|
|
|||
|
The agency's activities make a vital contribution to the protection of the
|
|||
|
nation's economy. Security and enforcement functions of the Inspection Service
|
|||
|
provide assurance to American business for the safe exchange of funds and
|
|||
|
securities through the U.S. Mail, and to postal customers of the sanctity of
|
|||
|
the seal in transmitting correspondence and messages to all parts of the world.
|
|||
|
Audits ensure stability to financial operations, help control costs, and
|
|||
|
promote increased efficiency in our Postal Service.
|
|||
|
|
|||
|
|
|||
|
Postal Inspectors
|
|||
|
~~~~~~~~~~~~~~~~~
|
|||
|
Postal Inspectors are the fact finding and investigative agents of the U.S.
|
|||
|
Postal Service. Today nearly two-thirds of their time is spent in
|
|||
|
investigating and solving postal related crimes. Possessing statutory power of
|
|||
|
arrest, they apprehend violators of the law and work closely with U.S.
|
|||
|
Attorneys in prosecuting cases in court. Their work also includes crime
|
|||
|
prevention, the audit of postal operations, investigation of accidents and a
|
|||
|
wide variety of other service and audit matters.
|
|||
|
|
|||
|
The work of a Postal Inspector requires total dedication and a willingness to
|
|||
|
work long hours. Investigations of postal crimes which often entail interstate
|
|||
|
or international coordination, and the responsibility to restore mail service
|
|||
|
following catastrophes such as floods, fire, and airplane wrecks, are
|
|||
|
time-consuming and can be hazardous.
|
|||
|
|
|||
|
There are approximately 1,900 Postal Inspectors stationed in the United States
|
|||
|
and Puerto Rico. All trainees undergo an eleven-week basic training course
|
|||
|
involving use of firearms, defensive tactics, legal matters, search and
|
|||
|
seizure, arrest techniques, court procedures, postal operations, audit
|
|||
|
functions, and a detailed study of the federal laws in which the Inspection
|
|||
|
Service has jurisdiction. Classes are conducted at the Inspection Service
|
|||
|
training center in Potomac, Maryland.
|
|||
|
|
|||
|
Refresher courses keep Inspectors informed of current court decisions, laws,
|
|||
|
and legal procedures. Additional specialized courses are continually held to
|
|||
|
equip the Service with expertly trained personnel.
|
|||
|
|
|||
|
All applicants for the position of Postal Inspector must successfully complete
|
|||
|
the following steps; entry examination; a comprehensive background
|
|||
|
investigation including ma medical examination; the candidate assessment center
|
|||
|
review; and all phases of the basic training course.
|
|||
|
|
|||
|
|
|||
|
Inspection Service Activity
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Criminal investigations and postal crime prevention represent
|
|||
|
the greatest portion of Inspection Service activity.
|
|||
|
|
|||
|
Postal Inspectors investigate violations of all postal laws and other related
|
|||
|
criminal violations. Crimes within the purview of postal investigations
|
|||
|
include mail fraud, the illegal transmission of controlled substances through
|
|||
|
the U.S. Mail, the mailing of child pornography, thefts of mails or postal
|
|||
|
valuables, assaults on postal employees, bombs sent through the mails or
|
|||
|
directed against postal properties, and the mailing of matter containing
|
|||
|
poison, unauthorized concealable firearms, and harmful or prohibited articles.
|
|||
|
|
|||
|
Five crime laboratories located throughout the country assist Inspectors in
|
|||
|
analyzing evidentiary material needed for identifying and tracing criminal
|
|||
|
suspects and in providing expert testimony for cases brought to trial.
|
|||
|
|
|||
|
The objectives of postal crime prevention are to anticipate, identify, and
|
|||
|
analyze those areas of greatest crime risk potentially affecting employees,
|
|||
|
funds, property, and postal customers. Postal Inspectors then take action to
|
|||
|
remove or reduce that risk and maintain the integrity of the Postal Service.
|
|||
|
|
|||
|
"The Postal Inspection Service is responsible
|
|||
|
for the internal audit of the Postal Service."
|
|||
|
|
|||
|
Postal Inspectors provide management with independent audits and investigations
|
|||
|
of all postal activities as a part of the Postal Service's internal control
|
|||
|
system.
|
|||
|
|
|||
|
Audits of installations and systems protect the assets of the Service, improve
|
|||
|
its financial management system, assist in the resolution of customer
|
|||
|
complaints, investigate matters of Congressional interests, and identify
|
|||
|
specific improvements for better customer service and more economical
|
|||
|
operations.
|
|||
|
|
|||
|
Financial audits provide an independent check on the adequacy and effectiveness
|
|||
|
of control systems; verify the existence of assets and ensure the proper
|
|||
|
safeguards are maintained. Operations audits are conducted to assist postal
|
|||
|
management in the operation of an efficient, and reliable Postal Service.
|
|||
|
|
|||
|
|
|||
|
Security Force
|
|||
|
~~~~~~~~~~~~~~
|
|||
|
Postal Police Officers provide protection to mail, postal valuables, postal
|
|||
|
employees, facilities, and vehicles of the Postal Service. As part of the law
|
|||
|
enforcement team, they assist Postal Inspectors in the enforcement of certain
|
|||
|
postal laws and regulations on postal premises and provide mobile response
|
|||
|
unites in emergency situations involving the Postal Service.
|
|||
|
|
|||
|
Equipped with portable radios and alerted by closed circuit television they
|
|||
|
provide perimeter security to major postal facilities and other buildings
|
|||
|
operated by the Postal Service. Their presence in postal installations
|
|||
|
throughout the country is a deterrent to postal crimes and an aid to employee
|
|||
|
morale.
|
|||
|
|
|||
|
Postal Police Officers also are used to escort high value mail while in transit
|
|||
|
between postal units and at airports.
|
|||
|
|
|||
|
Experience in military or civil law enforcement, industrial security, or
|
|||
|
similar occupations is an asset for positions in the Security Force. All
|
|||
|
appointees undergo a four-week training course conducted at the Inspection
|
|||
|
Service's training center.
|
|||
|
|
|||
|
|
|||
|
Coordination With Other Agencies
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
The Inspection Service extends full cooperation to all local and federal
|
|||
|
investigative and prosecutive authorities in law enforcement matters to ensure
|
|||
|
greater protection to the public. Postal Inspectors participate in the
|
|||
|
Department of Justice national strike force teams aimed at curtailing
|
|||
|
widespread criminal acts of an organized nature. Postal Inspectors also work
|
|||
|
closely with the External Auditors in providing support to the certification of
|
|||
|
the Postal Service's financial statements.
|
|||
|
|
|||
|
|
|||
|
Conviction Rate
|
|||
|
~~~~~~~~~~~~~~~
|
|||
|
The Inspection Service maintains a consistently high conviction rate each year
|
|||
|
of approximately 98% of cases brought to trial, a rate not exceeded by any
|
|||
|
other federal law enforcement agency.
|
|||
|
|
|||
|
|
|||
|
Jurisdiction, Postal Laws, and Protection
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
The Inspection Service exercises investigative jurisdiction over approximately
|
|||
|
85 postal-related statues. These can be grouped in two categories: Criminal
|
|||
|
acts against the mails, postal facilities, or postal personnel; and criminal
|
|||
|
misuse of the postal system.
|
|||
|
|
|||
|
|
|||
|
MAIL FRAUD
|
|||
|
|
|||
|
All criminal activity involving use of the U.S. Mail with intent to defraud
|
|||
|
comes under the jurisdiction of the Postal Inspection Service. The Mail Fraud
|
|||
|
Law is the oldest consumer protection law in the United States and is one of
|
|||
|
the most effective prosecutive tool in fighting white collar and organized
|
|||
|
crime. Millions of dollars are lost each year through mail fraud which cheats
|
|||
|
not only the poor and the elderly, but businessmen and the consumer as well.
|
|||
|
Prevalent schemes include insurance, banking, false billings; land and
|
|||
|
advance-fee selling swindles; franchise schemes; work-at-home and fraudulent
|
|||
|
diploma schemes; charity schemes; promotions of fake health cures, beauty
|
|||
|
devices, fast-working diets, and sex stimulants; chain letters, lotteries, and
|
|||
|
solicitations for the sale of advertising specialty items.
|
|||
|
|
|||
|
While Postal Inspectors have no statutory authority to act as intermediaries in
|
|||
|
the settlement of unsatisfactory financial or property transactions conducted
|
|||
|
through the mails, their investigations frequently result in the discontinuance
|
|||
|
of fraudulent or borderline operations. Administrative mail-stop orders may be
|
|||
|
issued to prevent continuing public loss while sufficient evidence is being
|
|||
|
developed for criminal prosecutive action in the courts, or in cases where
|
|||
|
false representations, but not necessarily fraudulent intent, can be proven.
|
|||
|
The Inspection Service has a leading role in consumer protection through the
|
|||
|
implementation of educational programs designed to prevent mail fraud schemes
|
|||
|
from developing, and through its efforts to resolve complaints relating to
|
|||
|
consumer/vendor misunderstandings or poor business practices.
|
|||
|
|
|||
|
|
|||
|
ORGANIZED CRIME
|
|||
|
|
|||
|
Investigations by Postal Inspectors in organized crime matters most frequently
|
|||
|
relate to cases involving theft and fencing of large amounts of stamp stock and
|
|||
|
securities by organized post office burglary rings; insurance and investment
|
|||
|
frauds; and planned bankruptcies and schemes aimed at looting company assets.
|
|||
|
The Organized Crime Control Act of 1970 specifically includes violation of the
|
|||
|
Mail Fraud Statue as "racketeering activity." Postal Inspectors are assigned
|
|||
|
to the Justice Department Organized Crime Strike Forces which operate at various
|
|||
|
points throughout the country.
|
|||
|
|
|||
|
|
|||
|
MAIL THEFT/BURGLARY/ROBBERY
|
|||
|
|
|||
|
Investigation of mail theft offenses are a large part of the Inspection
|
|||
|
Service's responsibilities and most commonly involve stolen checks, food
|
|||
|
coupons, or other negotiable securities. Primary attention is directed at
|
|||
|
major gangs, sophisticated fencing operations, large scale thefts, and the
|
|||
|
implementation of preventive programs.
|
|||
|
|
|||
|
Burglaries of post offices range from vandalism to high level burglary rings
|
|||
|
and fencing operations involving organized crime activity.
|
|||
|
|
|||
|
Armed robberies endanger the lives of postal employees and the public and,
|
|||
|
therefore, are priority investigations. The targets of these crimes usually
|
|||
|
are postal facilities, vehicles transporting mail, and individual employees,
|
|||
|
primarily letter carriers.
|
|||
|
|
|||
|
|
|||
|
DRUGS
|
|||
|
|
|||
|
Illegal trafficking in drugs, narcotics, and other controlled substances
|
|||
|
through the mail is investigated in conjunction with other federal and state
|
|||
|
law enforcement agencies.
|
|||
|
|
|||
|
|
|||
|
PORNOGRAPHY
|
|||
|
|
|||
|
The Inspection Service investigates violations of the Postal Obscenity Statue
|
|||
|
enacted in 1865 which prohibits the sending of obscene materials through the
|
|||
|
U.S. Mail. This includes the investigation of child pornography offenses
|
|||
|
involving the sexual abuse of exploitation of children based on laws passed in
|
|||
|
1977 and 1984.
|
|||
|
|
|||
|
|
|||
|
BOMBS
|
|||
|
|
|||
|
Investigations of incidents of threats involving bombs and incendiary devices
|
|||
|
sent through the mails or directed at postal properties or functions are within
|
|||
|
the jurisdiction of the Inspection Service.
|
|||
|
|
|||
|
|
|||
|
EXTORTION
|
|||
|
|
|||
|
The Inspection Service has investigative responsibility in incidents involving
|
|||
|
use of the mails to extort money or property by threat of injury to person's
|
|||
|
reputation or by accusing a person of a crime.
|
|||
|
|
|||
|
|
|||
|
OTHER PROHIBITED MAILINGS
|
|||
|
|
|||
|
The mailing of poisons or other harmful matter prohibited by law is
|
|||
|
investigated by Postal Inspectors.
|
|||
|
|
|||
|
|
|||
|
Assistance From The Public
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
In most cases, the Inspection Service must rely on the watchfulness and
|
|||
|
alertness of mail recipients to inform them of possible criminal or harmful
|
|||
|
activity involving the use of the mails. Any suspected violations of postal
|
|||
|
laws or misuse of the mails should be reported to the local Postmaster for
|
|||
|
referral to a Postal Inspector. Prompt action on the part of postal customers
|
|||
|
and Postal Inspectors is essential in the interest of crime prevention and
|
|||
|
detection.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue 27, File 10 of 12
|
|||
|
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
PWN PWN
|
|||
|
PWN P h r a c k W o r l d N e w s PWN
|
|||
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
|||
|
PWN Issue XXVII/Part 1 PWN
|
|||
|
PWN PWN
|
|||
|
PWN June 20, 1989 PWN
|
|||
|
PWN PWN
|
|||
|
PWN Created, Written, and Edited PWN
|
|||
|
PWN by Knight Lightning PWN
|
|||
|
PWN PWN
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
|
|||
|
|
|||
|
Welcome to Issue XXVII of Phrack World News!
|
|||
|
|
|||
|
This issue features articles on SouthernNet's hacker scam, the Florida
|
|||
|
probation sex incident, bulletin boards in Argentina, fax attacks, computer
|
|||
|
security, other hacking occurrences, as well as more articles and new
|
|||
|
information about Kevin David Mitnick (aka Condor), Robert Tappan Morris, Karl
|
|||
|
Koch (Hagbard Celine, one of Clifford Stoll's "Wily Hackers"), TRW and Social
|
|||
|
Security Administration, the National Crime Information (NCIC) "Super
|
|||
|
Database," and many other fun stories.
|
|||
|
|
|||
|
Because of our temporary exile from Bitnet, this will be the last regular issue
|
|||
|
of Phrack World News until next Fall. Next issue expect to see the full
|
|||
|
write-up on the details and fun events of SummerCon '89. It is only two days
|
|||
|
away as of this writing (it kinda begins on Thursday evening for some of us)
|
|||
|
and it looks to be the best SummerCon ever!
|
|||
|
|
|||
|
A very special thanks goes to Delta Master, Hatchet Molly, and The Mad Hacker
|
|||
|
who all assisted with this issue's PWN by submitting articles. Hatchet Molly
|
|||
|
will be serving as a collection agent for Phrack Inc. during the summer. Be
|
|||
|
sure to forward any news articles to him that seem relevant to PWN and he will
|
|||
|
get them to me (eventually). He can be reached on the wide area networks at;
|
|||
|
|
|||
|
(Hatchet Molly)
|
|||
|
|
|||
|
TK0GRM2@NIU.BITNET
|
|||
|
TK0GRM2%NIU.BITNET@CUNYVM.CUNY.EDU
|
|||
|
|
|||
|
One other thing to mention here is a special hello to one of our government
|
|||
|
readers... Peter Edmond Yee of NASA's Ames Research Center. He had recently
|
|||
|
remarked that he "had access to Phrack!" I wonder if he thought that Phrack
|
|||
|
Inc. was top secret or hard to get? Still if he wanted it that badly, Taran
|
|||
|
King and I thought, "Why not make it easier on him and just send it to his
|
|||
|
network address?" We did :-)))
|
|||
|
|
|||
|
:Knight Lightning
|
|||
|
|
|||
|
|
|||
|
"The Real Future Is Behind You... And It's Only The Beginning!"
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Mitnick Plea Bargain Rejected By Judge As Too Lenient April 25, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Excerpts from Kim Murphy (Los Angeles Times)
|
|||
|
|
|||
|
"Mr. Mitnick, you have been engaging in this conduct
|
|||
|
for too long, and no one has actually punished you.
|
|||
|
This is the last time you are going to do this."
|
|||
|
|
|||
|
Reportedly U.S. District Judge Mariana Pfaelzer unexpectedly rejected the plea
|
|||
|
bargain of Kevin Mitnick, the hacker once called "as dangerous with a keyboard
|
|||
|
as a bank robber with a gun." Pfaelzer declared that Mitnick deserves more
|
|||
|
time behind bars.
|
|||
|
|
|||
|
As reported in recent issues of Phrack World News, "Mitnick pleaded guilty to
|
|||
|
one count of computer fraud and one count of possessing unauthorized
|
|||
|
long-distance telephone codes... Mitnick faces one year in prison. Under a
|
|||
|
plea agreement with the government, he must also submit to three years'
|
|||
|
supervision by probation officers after his release from prison."
|
|||
|
|
|||
|
On April 24, 1989 Judge Pfaelzer said, "Mr. Mitnick, you have been engaging in
|
|||
|
this conduct for too long, and no one has actually punished you. This is the
|
|||
|
last time you are going to do this." She said a confidential pre-sentence
|
|||
|
report recommended that she exceed even the 18-month maximum prison term called
|
|||
|
for under mandatory new federal sentencing guidelines. The judge's action
|
|||
|
voids Mitnick's guilty plea.
|
|||
|
|
|||
|
Both prosecuting and defense attorneys were surprised. Mitnick's attorney said
|
|||
|
he did not know whether his client would agree to a guilty plea carrying a
|
|||
|
longer prison term. This could make it harder to bring charges against
|
|||
|
Mitnick's alleged associates. If Mitnick is brought to trial, testimony from
|
|||
|
at least one of his associates would be required to convict him, and they would
|
|||
|
not appear as witnesses without receiving immunity from prosecution.
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Computer Hacker Working On Another Plea Bargain May 6, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Excerpts from the Los Angeles Herald Examiner
|
|||
|
|
|||
|
Attorneys said yesterday they are negotiating a second plea bargain for
|
|||
|
computer hacker Kevin Mitnick, whose first offer to plead guilty was scuttled
|
|||
|
by a judge because it called for too little time in prison.
|
|||
|
|
|||
|
Mitnick, 25, of Panorama City, California offered in March to serve one year in
|
|||
|
prison and to plead guilty to computer fraud and possessing unauthorized
|
|||
|
long-distance telephone codes.
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Mitnick Update May 10, 1989
|
|||
|
~~~~~~~~~~~~~~
|
|||
|
Excerpts taken from the Los Angeles Times
|
|||
|
|
|||
|
When last we heard about Kevin Mitnick, the hacker once called "as dangerous
|
|||
|
with a keyboard as a bank robber with a gun," the judge, Judge Mariana
|
|||
|
Pfaelzer, had rejected a plea bargain as too lenient, saying Mitnick deserved
|
|||
|
more than the agreed one year of jail time [see above articles].
|
|||
|
|
|||
|
According to more recent information, Mitnick has now reached a new agreement,
|
|||
|
with no agreed-upon prison sentence. He pleaded guilty to stealing a DEC
|
|||
|
security program and illegal possession of 16 long-distance telephone codes
|
|||
|
belonging to MCI Telecommunications Corp. The two charges carry a maximum of
|
|||
|
15 years and a $500,000 fine. The government agreed to lift telephone
|
|||
|
restrictions placed on Mitnick since he was jailed in December, 1988.
|
|||
|
|
|||
|
At DEC's request, Mitnick will help the firm identify and fix holes in its
|
|||
|
security software to protect itself from other hackers. He will also cooperate
|
|||
|
in the government's probe of Leonard DiCicco, a fellow hacker. (DiCicco is the
|
|||
|
"friend" who turned Mitnick in.)
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Kenneth Siani Speaks Out About Kevin Mitnick May 23, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Kevin Mitnick, the hacker "so dangerous that he can't even be allowed to use a
|
|||
|
phone." "He could ruin your life with his keyboard." "Armed with a keyboard
|
|||
|
and considered dangerous."
|
|||
|
|
|||
|
These are some of the things that have been said about this person. All of
|
|||
|
this media hype would be fine if it just sold newspapers. But it has done much
|
|||
|
more then just sell a few papers. It has influenced those that will ultimately
|
|||
|
decide his fate. I myself do not know the man, but I have talked to others
|
|||
|
that do. Including one of the persons that investigated Mitnick. From all I
|
|||
|
have heard about him, I think he is a slime ball! But even a slime ball should
|
|||
|
not be railroaded into a prison sentence that others of equal or greater guilt
|
|||
|
have avoided.
|
|||
|
|
|||
|
I personally feel the man is just a criminal, like the guy that robs a 7/11, no
|
|||
|
better but certainly not any worse. Unfortunately he is thought of as some
|
|||
|
kind of a "SUPER HACKER." The head of Los Angeles Police Dept's Computer Crime
|
|||
|
Unit is quoted as saying, "Mitnick is several levels above what you would
|
|||
|
characterize as a computer hacker."
|
|||
|
|
|||
|
No disrespect intended, but a statement like this from the head of a computer
|
|||
|
crime unit indicates his ignorance on the ability of hackers and phone phreaks.
|
|||
|
Sure he did things like access and perhaps even altered Police Department
|
|||
|
criminal records, credit records at TRW Corp, and Pacific Telephone,
|
|||
|
disconnecting phones of people he didn't like etc. But what is not understood
|
|||
|
by most people outside of the hack/phreak world is that these things are VERY
|
|||
|
EASY TO DO AND ARE DONE ALL THE TIME. In the hack/phreak community such
|
|||
|
manipulation of computer and phone systems is all to easy. I see nothing
|
|||
|
special about his ability to do this. The only thing special about Kevin
|
|||
|
Mitnick is that he is not a "novice" hacker like most of the thirteen year old
|
|||
|
kids that get busted for hacking/phreaking. It has been a number of years
|
|||
|
since an "advanced" hacker has been arrested. Not since the days of the Inner
|
|||
|
Circle gang have law enforcement authorities had to deal with a hacker working
|
|||
|
at this level of ability. As a general rule, advanced hackers do not get
|
|||
|
caught because of there activity but rather it is almost always others that
|
|||
|
turn them in. It is therefore easy to understand why his abilities are
|
|||
|
perceived as being extraordinary when in fact they are not.
|
|||
|
|
|||
|
Because of all the media hype this case has received I'm afraid that:
|
|||
|
|
|||
|
1.) He will not be treated fairly. He will be judged as a much greater threat
|
|||
|
to society then others that have committed similar crimes.
|
|||
|
|
|||
|
2.) He will become some kind of folk hero. A Jesse James with a keyboard.
|
|||
|
This will only cause other to follow in his footsteps.
|
|||
|
|
|||
|
I'm not defending him or the things he has done in any sense. All I'm saying
|
|||
|
is let's be fair. Judge the man by the facts, not the headlines.
|
|||
|
|
|||
|
Disclaimer: The views expressed here are my own.
|
|||
|
|
|||
|
Kenneth Siani, Sr. Security Specialist, Information Systems Div., NYMA Inc.
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
If you are looking for other articles about Kevin David Mitnick aka Condor
|
|||
|
please refer to;
|
|||
|
|
|||
|
"Pacific Bell Means Business" (10/06/88) PWN XXI. . .Part 1
|
|||
|
"Dangerous Hacker Is Captured" (No Date ) PWN XXII . .Part 1
|
|||
|
"Ex-Computer Whiz Kid Held On New Fraud Counts" (12/16/88) PWN XXII . .Part 1
|
|||
|
"Dangerous Keyboard Artist" (12/20/88) PWN XXII . .Part 1
|
|||
|
"Armed With A Keyboard And Considered Dangerous"(12/28/88) PWN XXIII. .Part 1
|
|||
|
"Dark Side Hacker Seen As Electronic Terrorist" (01/08/89) PWN XXIII. .Part 1
|
|||
|
"Mitnick Plea Bargains" (03/16/89) PWN XXV. . .Part 1
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Computer Intrusion Network in Detroit May 25, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Taken from the San Jose Mercury News (Knight-Ridder News Service)
|
|||
|
|
|||
|
DETROIT -- Secret Service agents smashed what they described as a costly,
|
|||
|
sophisticated computer intrusion network on Wednesday, May 24, and were
|
|||
|
surprised to discover it made up largely of teen-agers.
|
|||
|
|
|||
|
The computer systems of more than 20 companies including the Michigan
|
|||
|
Department of Treasury, Home Box Office cable television services, [and RCA]
|
|||
|
were infiltrated, according to agents serving search warrants across the
|
|||
|
country.
|
|||
|
|
|||
|
Federal officials said the infiltrations by the network represented fraud of
|
|||
|
$200,000 to $1.5 million in appropriated goods, telephone and computer time.
|
|||
|
|
|||
|
Agents expected to arrest some adults when they swept down on eight people who
|
|||
|
allegedly ran the network in several states. Instead, they found only one
|
|||
|
adult, in Chicago. The rest were teen-agers as young as 14: Two in Columbus,
|
|||
|
Ohio; two in Boston, Massachusetts; two in Sterling Heights, Michigan [The
|
|||
|
Outsider and The Untouchable]; and one in Atlanta, Georgia. Agents expected to
|
|||
|
make another arrest in Los Angeles.
|
|||
|
|
|||
|
Officials said at least 55 other people nationwide made use of the network's
|
|||
|
information.
|
|||
|
|
|||
|
In Sterling Heights, Secret Service agents pulled two eighth-grader boys, both
|
|||
|
14, out of school and questioned them in the presence of their parents, who
|
|||
|
apparently were unaware of their activities. James Huse, special agent in
|
|||
|
charge of the U.S. Secret Service office in Detroit, said the youths admitted
|
|||
|
involvement in the scheme.
|
|||
|
|
|||
|
He said the eight-graders, because they are juveniles, cannot be charged under
|
|||
|
federal law and will be dealt with by local juvenile authorities.
|
|||
|
|
|||
|
Authorities believe the mastermind is Lynn Doucett, 35, of Chicago. She was
|
|||
|
arrested Wednesday, May 24, and is cooperating with authorities, Huse said.
|
|||
|
|
|||
|
Doucett, who was convicted in Canada of telecommunications fraud, supports
|
|||
|
herself and two children through her computer intrusion activities, which
|
|||
|
include using stolen or counterfeit credit cards for cash advances or money
|
|||
|
orders, according to an affidavit filed in U.S. District Court.
|
|||
|
|
|||
|
If convicted, she faces up to 10 years in prison and a $250,000 fine.
|
|||
|
|
|||
|
Special Thanks to Jedi For Additional Information
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
HR 1504 -- Beeper Abuse Prevention Act May 22, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
"Pagers Don't Commit Crimes, Congressmen Do."
|
|||
|
|
|||
|
The fools in congress assembled are at it again. Three years in jail for
|
|||
|
selling a pager to a minor? If you didn't believe when Abbie Hoffman said that
|
|||
|
the drug hysteria was just an excuse for more control of the citizens, think
|
|||
|
again.
|
|||
|
|
|||
|
In USA Today was a "face-off" on the issues. According to this article,
|
|||
|
Representative Kweisi Mfume (D-Md) says the following:
|
|||
|
|
|||
|
"The drug business is using the latest technology to promote its
|
|||
|
deadly trade. One such advance, the paging device, or beeper, is
|
|||
|
now appearing in classrooms and schoolyards. I have introduced the
|
|||
|
Beeper Abuse Prevention Act to curtail the use of beepers by young
|
|||
|
people who deal drugs. It would require the Federal Communications
|
|||
|
Commission to prescribe regulations that would restrict the
|
|||
|
possession and use of paging devices by persons under age 21.
|
|||
|
|
|||
|
Law officers say dealers and suppliers send coded messages via
|
|||
|
beeper to youths in school. The codes translate into messages like
|
|||
|
"meet me at our regular place after class to pick up the drugs."
|
|||
|
Drug traffickers are even using 800 numbers now available with
|
|||
|
regional paging services. A supplier could actually conduct a
|
|||
|
transaction in Baltimore from Miami, for example.
|
|||
|
|
|||
|
My bill, H.R. 1504, would require any person selling or renting
|
|||
|
paging devices to verify the identification and age of every
|
|||
|
customer; encourage parents and businesses to take more
|
|||
|
responsibility in their children's or employees' activities; make
|
|||
|
it unlawful for a person to knowingly and willfully rent, sell or
|
|||
|
use paging devices in violation of rules prescrived by the FCC
|
|||
|
(there are provisions for stiff fines and up to three-year prison
|
|||
|
terms for adults who illegally provide beepers to youths); and
|
|||
|
require parents or businesses who allow the use of beepers to state
|
|||
|
that intention with and affidavit at the time of purchase."
|
|||
|
|
|||
|
He goes on to say that he recognizes that there are legitimate uses of beepers,
|
|||
|
but we can no longer stand by and watch drugs flow into our neighborhoods. The
|
|||
|
opposite side is taken by Lynn Scarlett, from Santa Monica, CA. She asks what
|
|||
|
beepers have to do with the drug trade, and regulating their use will not put a
|
|||
|
dent it it. She also says that there is little evidence that gun control keeps
|
|||
|
guns out of the hands of gangsters, and it will take a good dose of wizardry to
|
|||
|
keep beepers away from bad guys. She finishes with:
|
|||
|
|
|||
|
"The logic of the Beeper Abuse Prevention Act opens the door for
|
|||
|
laws to make us sign promises that we won't, we swear, use these
|
|||
|
things for illicit acts when we buy them. De Tocqueville, that
|
|||
|
eminent observer of our nation, warned that our loss of freedom
|
|||
|
would sneak in through passage of quiet, seemingly innocuous and
|
|||
|
well-intended laws -- laws like H.R. 1504.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Computer Threat Research Association (UK) March 31, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
For those of you interested an umbrella organization has been established in
|
|||
|
the United Kingdom to coordinate information on, and research into, all aspects
|
|||
|
of computer security. In the first instance one of the organization's primary
|
|||
|
concerns will be combatting the threat posed by computer viruses by acting as a
|
|||
|
clearing house for virus information and control software.
|
|||
|
|
|||
|
Below is a copy of an initial letter mailed to prospective members:
|
|||
|
|
|||
|
The Computer Threat Research Association
|
|||
|
|
|||
|
The computer threat research association, CoTra is a non-profit making
|
|||
|
organization that exists to research, analyze, publicize and find solutions
|
|||
|
for threats to the integrity and reliability of computer systems.
|
|||
|
|
|||
|
The issue that caused the formation of CoTra was the rise of the computer
|
|||
|
virus. This problem has since become surrounded by fear, uncertainty and
|
|||
|
doubt. To the average user, the computer virus and its implications are a
|
|||
|
worry of an unknown scale. To a few unfortunates whose systems have become
|
|||
|
victims, it is a critical issue.
|
|||
|
|
|||
|
The key advantage of CoTra membership will be access to advice and information.
|
|||
|
Advice will be provided through publications, an electronic conference (a
|
|||
|
closed conference for CoTra's members has been created on the Compulink CIX
|
|||
|
system) as well as other channels such as general postings direct to members
|
|||
|
when a new virus is discovered.
|
|||
|
|
|||
|
CoTra membership will be available on a student, full or corporate member
|
|||
|
basis. All software that is held by CoTra that enhances system reliability,
|
|||
|
such as virus detection and removal software, will be available to all members.
|
|||
|
It is intended to establish discounts with suppliers of reliability tools and
|
|||
|
services. A library of virus sources and executables and other dangerous
|
|||
|
research material will be made available to members who have a demonstrable
|
|||
|
need.
|
|||
|
|
|||
|
A register of consultants who have specific skills in the systems reliability
|
|||
|
field will be published by CoTra and reviews of reliability enhancing software
|
|||
|
will be produced.
|
|||
|
|
|||
|
Your support of CoTra will ensure that you have the earliest and most accurate
|
|||
|
information about potential threats to your computer systems.
|
|||
|
|
|||
|
CoTra, The Computer Threat Research Association,
|
|||
|
c/o 144 Sheerstock, Haddenham, Bucks. HP17 8EX
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Strange Customs Service Clock Department May 1, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Written by Vanessa Jo Grimm (Goverment Computer News)(Page 6)
|
|||
|
|
|||
|
The U.S. attorney for Washington is reviewing an allegation that a Customs
|
|||
|
Service official violated the Computer Security Act [PL 100-235 presumably] by
|
|||
|
altering a computer's internal clock.
|
|||
|
|
|||
|
Treasury Department Inspector General Michael R. Hill referred the allegation
|
|||
|
to the prosecutor after an investigation into year-end spending by Custom
|
|||
|
officials at the close of Fiscal Year 1988. The allegation involves an
|
|||
|
official who may have authorized altering the date maintained by the computers
|
|||
|
that the agency uses for procurement documents, according to Maurice S. Moody,
|
|||
|
the Inspector General's audit director for Financial Management Service.
|
|||
|
|
|||
|
Moody recently told the House Ways and Means Subcommittee on Oversight the
|
|||
|
computers are part of the agency's Automated Commercial System. He declined to
|
|||
|
provide Government Computer News with more details.
|
|||
|
|
|||
|
Allegedly the computer clock was rolled back during the first three days of
|
|||
|
October of 1988 so that $41.8 million in procurement obligations would be dated
|
|||
|
in September against fiscal year 1988 appropriations, Moody said.
|
|||
|
|
|||
|
An inspector general report issued in late February concluded Customs had not
|
|||
|
violated any procurement laws. The inspector general's investigation is
|
|||
|
continuing, however.
|
|||
|
|
|||
|
"Doesn't $41.8 million worth of procurement on the last day of the fiscal year
|
|||
|
bother anybody?" asked Rep. Richard T. Shulze (R-Pa). The purchases did bother
|
|||
|
the inspector general, Moody said, and this concern led to getting the United
|
|||
|
State attorney attorney. "This problem is endemic in the federal government,"
|
|||
|
he said. "Year-end spending is very common."
|
|||
|
|
|||
|
William F. Riley, Customs controller, said he knew about the rollback, but he
|
|||
|
and Deputy Commissioner Michael H. Lane refused to say who authorized the
|
|||
|
action... Subcommittee members continued to press Riley and Lane. "Is the
|
|||
|
person still at Customs?" asked subcommittee chairman J. J. Pickle (D-Texas).
|
|||
|
He is working full time and in the position he was at the time," Lane answered.
|
|||
|
|
|||
|
Rep. Beryl F. Anthony, Jr. (D-Ark) asked how Riley became aware of the
|
|||
|
rollback. "He (the official who authorized the rollback) told me that it was
|
|||
|
going to be done," Riley said.
|
|||
|
|
|||
|
Rep. Pickle suggested that a high ranking official would have to authorize such
|
|||
|
an action, but Counsel advised Lane not to reply. He did say neither he nor
|
|||
|
Commissioner von Raab had made the decision.
|
|||
|
|
|||
|
The balance of the article deals with the actions of Linda Gibbs, who became
|
|||
|
aware of the incident and reported it to the inspector general after being
|
|||
|
unable to stop the action. Gibbs also alleged that the action was intended to
|
|||
|
use available year-end money to cover cost overrun on a contract with Northrop
|
|||
|
Corp. She also alleged that she had been reassigned and given no new duties.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue 27, File 11 of 12
|
|||
|
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
PWN PWN
|
|||
|
PWN P h r a c k W o r l d N e w s PWN
|
|||
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
|||
|
PWN Issue XXVII/Part 2 PWN
|
|||
|
PWN PWN
|
|||
|
PWN June 20, 1989 PWN
|
|||
|
PWN PWN
|
|||
|
PWN Created, Written, and Edited PWN
|
|||
|
PWN by Knight Lightning PWN
|
|||
|
PWN PWN
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
|
|||
|
|
|||
|
Robert T. Morris Suspended From Cornell May 25, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Taken from the New York Times
|
|||
|
|
|||
|
Cornell University has suspended the graduate student identified by school
|
|||
|
officials as the author of "the Internet worm."
|
|||
|
|
|||
|
In a May 16th letter to Robert Tappan Moris, age 23, the dean of the Cornell
|
|||
|
University Graduate School said a university panel had found him guilty of
|
|||
|
violating the school's Code of Academic Integrity.
|
|||
|
|
|||
|
He will be suspended until the beginning of the fall semester of 1990, and then
|
|||
|
could reapply.
|
|||
|
|
|||
|
No criminal charges have been filed against Morris. A federal grand jury this
|
|||
|
year forwarded its recommendations to the Justice Department, which has not
|
|||
|
taken any action.
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Justice Department Wary in Computer Case May 28, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
by Matthew Spina (Syracuse Herald-American)
|
|||
|
|
|||
|
"Is Washington Fearful Of Losing A Landmark Trial?"
|
|||
|
|
|||
|
Some computer experts theorize that the Justice Department, afraid of bungling
|
|||
|
what could become a landmark computer case, still doesn't know how to treat the
|
|||
|
Cornell student whose computer worm slithered nationwide in November, 1988.
|
|||
|
|
|||
|
A further concern in Washington: A trial in the case might embarrass the
|
|||
|
Department of Defense if its scientists are asked to detail how their computers
|
|||
|
were among the thousands crippled by the worm.
|
|||
|
|
|||
|
For several months, the decision on how to charge 23-year-old Robert T. Morris,
|
|||
|
Jr. had been before Mark Richard, a deputy assistant attorney general. Within
|
|||
|
the last few weeks, Richard made a decision that now is being reviewed by an
|
|||
|
assistant attorney general, according to a computer professional who has been
|
|||
|
talking with the Justice Department.
|
|||
|
|
|||
|
"I thought we would have heard something from Washington by now," said Andrew
|
|||
|
Baxtoer, the assistant U.S. attorney who in November and December presented the
|
|||
|
case to a grand jury in Syracuse.
|
|||
|
|
|||
|
The grand jury's report was sent on the the Justice Department, which refuses
|
|||
|
to comment publicly on the matter because Morris has not been indicted.
|
|||
|
|
|||
|
"Within the next two weeks I assume that a decision will be made," said one
|
|||
|
official.
|
|||
|
|
|||
|
"If they decide to begin an expensive trial, they have to make sure they win so
|
|||
|
as not to damage future attempts to prosecute under that law," said Eugene H.
|
|||
|
Spafford, an assistant professor at Purdue University whose analysis of the
|
|||
|
worm has helped federal investigators. "If they decide not to prosecute, and
|
|||
|
the total thing that happens is he gets suspended (from Cornell), I will be
|
|||
|
outraged."
|
|||
|
|
|||
|
So far, Cornell has taken the only disciplinary measure against Morris,
|
|||
|
suspending him for the 1989-90 academic year. But the graduate student left
|
|||
|
the computer science department early in November, the day after the worm
|
|||
|
spread out of a computer in Upson Hall.
|
|||
|
|
|||
|
Morris, a computer science graduate student, has been called the author of a
|
|||
|
rogue computer program, called a worm, that was spread from a Cornell
|
|||
|
University computer. The program was designed to reproduce and infect any
|
|||
|
computer linked to the Internet, a network shared by colleges, research centers
|
|||
|
and military institutions.
|
|||
|
|
|||
|
However, experts say an error caused the program to replicate out of control,
|
|||
|
sending thousands of copies into thousands of computers.
|
|||
|
|
|||
|
If Morris is to be charged with a felony, prosecutors would then have to show
|
|||
|
he intended to destroy or extract information.
|
|||
|
|
|||
|
Proving that would be difficult since the program neither destroyed nor removed
|
|||
|
information from any computer.
|
|||
|
|
|||
|
To convict Morris on most lesser charges, prosecutors would have to show he
|
|||
|
intended to harm computers.
|
|||
|
|
|||
|
Prosecutors also could use a misdemeanor charge requiring them to prove only
|
|||
|
that Morris gained access to a federal government computer. The worm did reach
|
|||
|
computers at the Army Ballistics Research Laboratory and NASA's Langley
|
|||
|
Research Center, among others.
|
|||
|
|
|||
|
Some computer experts wonder, though, if Defense Department officials will be
|
|||
|
reluctant to testify publicly about how their computers were penetrated -- even
|
|||
|
those computers holding non-classified information. In February, at a computer
|
|||
|
convention in San Diego, Defense Department computer experts detailed some
|
|||
|
security improvements made to the network since November, but then refused to
|
|||
|
release copies of their presentation to people at the seminar.
|
|||
|
|
|||
|
The FBI -- which enforces the Computer Fraud and Abuse Act of 1986 -- and some
|
|||
|
people in the computer industry are pushing for a vigorous prosecution to
|
|||
|
display a strong case against computer hacking. Others in the industry,
|
|||
|
including some of Morris' friends from Harvard University and Cornell, urge
|
|||
|
leniency because he was trying to demonstrate security flaws with computers.
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Other articles about Robert Tappan Morris, Jr. and the Internet Worm are;
|
|||
|
|
|||
|
"Computer Network Disrupted By 'Virus'" (11/03/88) PWN XXII/Part 2
|
|||
|
"Virus Attack" (11/06/88) PWN XXII/Part 2
|
|||
|
"The Computer Jam: How It Came About" (11/08/88) PWN XXII/Part 2
|
|||
|
"US Is Moving To Restrict {...} Virus" (11/11/88) PWN XXII/Part 2 *
|
|||
|
"FBI Studies Possible Charges In Virus" (11/12/88) PWN XXII/Part 2
|
|||
|
"Big Guns Take Aim At Virus" (11/21/88) PWN XXII/Part 3
|
|||
|
"Congressman Plan Hearings On Virus" (11/27/88) PWN XXII/Part 3
|
|||
|
"Pentagon Severs Military {...} Virus" (11/30/88) PWN XXII/Part 3 *
|
|||
|
"Networks Of Computers At Risk From Invaders" (12/03/88) PWN XXII/Part 4 *
|
|||
|
"Computer Virus Eradication Act of 1988" (12/05/88) PWN XXII/Part 4 *
|
|||
|
"Breaking Into Computers {...}, Pure and Simple" (12/04/88) PWN XXIV/Part 1 *
|
|||
|
"Cornell Panel Concludes Morris {...} Virus" (04/06/89) PWN XXVI/Part 1
|
|||
|
|
|||
|
* - Indicates that the article was not directly related to Robert Morris, but
|
|||
|
did discuss him as well as the Internet Worm incident.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
SouthernNet's Anti-Hacker Psychological Con Game April 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
WARNING! Your call is being intercepted!
|
|||
|
|
|||
|
Error: Setting may not be changed by callers.
|
|||
|
|
|||
|
|
|||
|
Welcome to: S o u t h e r n N e t I n c.
|
|||
|
|
|||
|
|
|||
|
You have reached the SouthernNet Fraud Department, the authorization code you
|
|||
|
are attempting to use is not valid. Hacking and illegal use of codes are
|
|||
|
violations of state and federal laws.
|
|||
|
|
|||
|
We are currently conducting an investigaion for code abuse in your area and we
|
|||
|
are coordinating the investigation with law enforcement authorities. Persons
|
|||
|
identified hacking or abusing codes will be prosecuted to the full extent of
|
|||
|
the law.
|
|||
|
|
|||
|
I'll see you soon,
|
|||
|
|
|||
|
Hacker Tracker
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Hold for additional information:
|
|||
|
|
|||
|
Hacker Tracker is unavailable right now; however, you may avoid possible arrest
|
|||
|
and/or prosecution by calling Hacker Tracker in person.
|
|||
|
|
|||
|
You may contact Mr. Tracker between the hours of 9:00 AM and 5:00 PM Eastern
|
|||
|
Standard Time, Monday - Friday, simply by dialing the access number you have
|
|||
|
just used and code number 101010 or 011010 if the access you have used
|
|||
|
requires a seven digit code. Just hold the line for 10 seconds and your call
|
|||
|
will automatically be routed to Mr. Tracker at no charge to you.
|
|||
|
|
|||
|
This is *NOT* a trick and it will be the intention of SouthernNet Inc. to
|
|||
|
settle this matter without involving law enforcement authorities if you
|
|||
|
cooperate with our fraud department 100%.
|
|||
|
|
|||
|
It will certainly be to your advantage to contact Mr. Tracker as this will
|
|||
|
reflect your own decision to assist and avoid prosecution by our company!!!
|
|||
|
|
|||
|
I'll be expecting your call.
|
|||
|
|
|||
|
Hacker Tracker
|
|||
|
|
|||
|
Hold a sec... Engaging Auto Page for Hacker Tracker...
|
|||
|
|
|||
|
50 seconds till disconnect
|
|||
|
40 seconds till disconnect
|
|||
|
30 seconds till disconnect
|
|||
|
20 seconds till disconnect
|
|||
|
10 seconds till disconnect
|
|||
|
5 seconds till disconnect
|
|||
|
|
|||
|
NO CARRIER
|
|||
|
|
|||
|
|
|||
|
[Do you think anyone believed this and actually called "Hacker Tracker?" -KL]
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
What's Happening: Computer Security Up June 4, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Taken from Gannett Westchester Newspapers
|
|||
|
|
|||
|
[Comments in brackets from Delta-Master]
|
|||
|
|
|||
|
High-tech companies are spending 64% more [than they previously spent] on
|
|||
|
computer security, according to a recent survey conducted by the National
|
|||
|
Center for Computer Crime Data in Los Angeles. The group surveyed 3,500 law
|
|||
|
enforcement agencies and computer security experts about computer crime. The
|
|||
|
prosecution rate is also up -- 6.4% in 1988 from only 2.4% during 1987.
|
|||
|
|
|||
|
Contrary to popular image, computer hackers aren't always young boys. The
|
|||
|
study found that 32% of those arrested for computer crimes were female, while
|
|||
|
only 14% were under 21. The study said 45% of hackers were 25 to 30 years old.
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Comments from Delta-Master
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
I do not know about you people, but the public's confusion about hackers starts
|
|||
|
to bother me when they make errors. Seriously, I know of only a few hackers
|
|||
|
over the age of 21. The fact that the newspapers also equate the thug-like
|
|||
|
computer criminals with the mastermind-criminal type hacker (you guys) is also
|
|||
|
pretty annoying, wouldn't you agree? One key phrase you must note: "32% OF
|
|||
|
THOSE ARRESTED." Oh well, such are the mistakes of newspapers.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Public Service Commission Bans Operator Companies April 24, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
By Jerri Stroud (St. Louis Post-Dispatch)
|
|||
|
|
|||
|
The Missouri Public Service Commission voted 4-1 last week to ban providers of
|
|||
|
so-called alternative operator services in Missouri because allowing the
|
|||
|
companies to operate is "not in the public interest."
|
|||
|
|
|||
|
Alternative operator services companies contract with hotels, motels colleges,
|
|||
|
hospitals, airports, restaurants and other facilities to provide operator
|
|||
|
assistance to customers using pay telephones or house phones. Consumer groups
|
|||
|
have complained about price-gouging by the companies nationwide.
|
|||
|
|
|||
|
Mark Wheatley, a lawyer for the Office of Public Council, praised the
|
|||
|
commission's decision.
|
|||
|
|
|||
|
The Office of Public Council has received numerous complaints about excessive
|
|||
|
rates and surcharges by alternative operator services companies, said Wheatley.
|
|||
|
Some alternative operator services companies also have accepted other
|
|||
|
companies' credit cards without authorization from the companies issuing the
|
|||
|
cards, he said.
|
|||
|
|
|||
|
"We feel that it's an extremely important decision by the commission." said
|
|||
|
Wheatley. But he said he expects the companies affected by the ruling to
|
|||
|
appeal.
|
|||
|
|
|||
|
Lawyers for the alternative operator services companies could not be reached
|
|||
|
for comment.
|
|||
|
|
|||
|
In it's ruling, the commission said many consumers aren't aware of the rates
|
|||
|
charged by the alternative operator services companies until they receive "a
|
|||
|
bill for operator services at prices higher than those to which he is
|
|||
|
accustomed." Consumer groups say the rates often are twice or three times the
|
|||
|
rates charged by better-known long-distance companies.
|
|||
|
|
|||
|
Even if an operator service company identifies itself when a consumer makes a
|
|||
|
call, the commission said many consumers don't understand the significance of
|
|||
|
the identification.
|
|||
|
|
|||
|
"If the end user is not educated as to the intricacies of using an alternative
|
|||
|
operator services provider, he does not truly have a meaningful choice..." the
|
|||
|
commission said.
|
|||
|
|
|||
|
The ruling only affects intrastate calls handled by alternative operator
|
|||
|
services companies, but it may effectively prevent the companies from providing
|
|||
|
interstate service as well.
|
|||
|
|
|||
|
The commission specifically denied tariff requests from International
|
|||
|
Telecharge Inc. and American Operator Services Inc. The commission also
|
|||
|
directed three other companies -- Teleconnect Inc., Dial US, and Dial USA -- to
|
|||
|
file new tariffs consistent with the ruling.
|
|||
|
|
|||
|
The ruling allows companies to operate who provide operator services in
|
|||
|
connection with their business -- long-distance carriers and local telephone
|
|||
|
companies, for example. But the commission also placed limits on these
|
|||
|
companies.
|
|||
|
|
|||
|
Under the ruling, operator services companies must:
|
|||
|
|
|||
|
* Identify themselves to the caller as well as to the party being billed
|
|||
|
by the call (in the case of a collect or third-party call).
|
|||
|
|
|||
|
* Quote rates to the caller or billed party on request, without charge.
|
|||
|
|
|||
|
* Use calling card verification procedures acceptable to the companies
|
|||
|
issuing the cards.
|
|||
|
|
|||
|
* Post in a prominent position the company's name, detailed complaint
|
|||
|
procedures and instruction on how to reach the local telephone company
|
|||
|
operator and other long-distance carriers.
|
|||
|
|
|||
|
* Transfer emergency traffic to the local telephone company or American
|
|||
|
Telephone & Telegraph Co. until the alternative services provider can
|
|||
|
show that it can handle emergency calls adequately.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Fax Attack May 13, 1989
|
|||
|
~~~~~~~~~~
|
|||
|
Taken from The Ann Arbor News
|
|||
|
|
|||
|
"Governor's Attempt To Ban Unsolicited Advertisements Backfires!"
|
|||
|
|
|||
|
HARTFORD, Conn - The great fax attack of 1989 -- an all-out lobbying campaign
|
|||
|
against a bill banning unsolicited facsimile advertising -- may have backfired
|
|||
|
when the governor's fax machine was jammed for hours with unwanted messages.
|
|||
|
|
|||
|
Starting Thursday, May 11, and continuing Friday, May 12, Governor William A.
|
|||
|
O'Neill's fax machine has been beeping constantly, spitting out unwanted
|
|||
|
messages from angry businesses that advertise by fax.
|
|||
|
|
|||
|
The businesses oppose a bill now awaiting O'Neill's signature that would
|
|||
|
prohibit them from marketing their products by fax without first obtaining the
|
|||
|
permission of the recipient. Violators would face a $200 fine.
|
|||
|
|
|||
|
Starting Thursday morning, dozens of Connecticut businesses faxed to O'Neill's
|
|||
|
office a form letter arguing against the fax ban. The stream of fax messages
|
|||
|
was so constant (40 came in before 10 AM) that the governor's office turned off
|
|||
|
the fax machine Thursday (May 11).
|
|||
|
|
|||
|
O'Neill's press secretary, Jon. L. Sandberg, said the governor still hasn't
|
|||
|
decided whether he will sign the bill. But aides to the governor said the
|
|||
|
persistent lobbying campaign proved how annoying unwanted messages can be. The
|
|||
|
inconvenience was compounded because the governor's office was unable to use
|
|||
|
its fax machine to receive information about spring flooding around the state.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
NYNEX Announces Info-Look Gateway April 28, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Introducing a new service for accessing information and more... all through
|
|||
|
your personal computer!
|
|||
|
|
|||
|
Starting in May 1989, New York Telephone's INFO-LOOK (tm) Gateway Service can
|
|||
|
be your link to accessing a variety of information, products and services.
|
|||
|
|
|||
|
The INFO-LOOK Gateway simplifies on-line computer access to a variety of
|
|||
|
information providers. When you call the Gateway phone number through your
|
|||
|
modem, you'll be able to scan a menu of information services.
|
|||
|
|
|||
|
The types of information services you may choose from include: Entertainment,
|
|||
|
business, health, food, news, weather, sports, travel, government, educational
|
|||
|
and reference information. The services, some interactive, are provided by
|
|||
|
independent companies.
|
|||
|
|
|||
|
The INFO-LOOK Gateway is easy to use -- even if you're relatively new to using
|
|||
|
a PC.
|
|||
|
|
|||
|
What you'll need to use the INFO-LOOK Gateway
|
|||
|
|
|||
|
1. Virtually any type of personal computer.
|
|||
|
|
|||
|
2. A modem (300, 1200, or 2400 Baud), and communications software. This
|
|||
|
enables your computer to communicate with other computers via the telephone
|
|||
|
system.
|
|||
|
|
|||
|
3. A New York Telephone Calling Card. If you need a New York Telephone
|
|||
|
Calling Card, (it's FREE), call your service representative whose number
|
|||
|
appears on page one of your New York Telephone bill.
|
|||
|
|
|||
|
Charges for using the INFO-LOOK Gateway
|
|||
|
|
|||
|
There are ** no ** Gateway enrollment fees and ** no ** monthly subscription
|
|||
|
charges. In most cases, you will be charged (New York people only):
|
|||
|
|
|||
|
o A local call to reach the INFO-LOOK Gateway.
|
|||
|
|
|||
|
o While you're browsing the Gateway directory of services, or moving between
|
|||
|
services, you pay $.05 a minute.
|
|||
|
|
|||
|
o Once you connect to a service, the charge is determined by the Service
|
|||
|
Provider. Some services have a per-minute usage charge. Some services are
|
|||
|
free. The charges for each service are listed in the Gateway menu.
|
|||
|
|
|||
|
You'll find most charges itemized on your monthly New York Telephone bill.
|
|||
|
Some Service Providers may decide to bill you separately and directly for use
|
|||
|
of their services.
|
|||
|
|
|||
|
Call for more information:
|
|||
|
|
|||
|
To get your free INFO-LOOK Gateway information booklet call (toll- free)
|
|||
|
1-800-338-2720, Ext. 20, any day from 9 a.m. to 11 p.m.
|
|||
|
|
|||
|
Note: New York Telephone does not provide or control the services offered
|
|||
|
through the INFO-LOOK Gateway Service. They are provided by independent
|
|||
|
companies, which are responsible for the content, character, and quality
|
|||
|
of their services.
|
|||
|
|
|||
|
The predictions run $5 billion now and another $5-10 billion by 1991.
|
|||
|
|
|||
|
[INFO-LOOK is already operating in Bell South and Bell Atlantic.]
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Pacific Bell Plans Access To Computers June 9, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Taken from Santa Cruz Sentinel (Section B)
|
|||
|
|
|||
|
SAN FRANCISCO (AP) -- Pacific Bell said Thursday it hopes to compete with the
|
|||
|
popularity of television by offering people easy access to computerized
|
|||
|
libraries, bulletin boards and the use of electronic mail.
|
|||
|
|
|||
|
PacBell's California On-line -- which will be available to anybody with a
|
|||
|
personal computer, telephone and calling card -- will be among the first in the
|
|||
|
nation to use a graphic-based system that simplifies procedures so only a
|
|||
|
rudimentary familiarity with computers is needed.
|
|||
|
|
|||
|
"It's going to offer our customers a supplement to their current leisure
|
|||
|
activities... and among other things we've seen (in trials) a lot of people
|
|||
|
who got away from the TV," said Roger P. Conrad, director of Videotex Gateway
|
|||
|
Services.
|
|||
|
|
|||
|
"We feel this is a more productive way for people to spend their lives and we
|
|||
|
think a lot of users are going to agree," he added. Users will pay
|
|||
|
"info-entrepreneurs" fees based on the time they use various services and will
|
|||
|
be billed on their monthly telephone statements. Unlike some on-line
|
|||
|
information services, users do not have to subscribe ahead of time.
|
|||
|
|
|||
|
Conrad said the types of services are limited only by vendors' imaginations.
|
|||
|
PacBell will make money by selling telecommunication line use to the companies.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Bulletin Boards Of Argentina June 5, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Country Code = 54 (Argentina)
|
|||
|
City Code = 1 (Buenos Aires)
|
|||
|
|
|||
|
This list might be slightly incorrect due to the passage of time. The last
|
|||
|
update was on December 23, 1986.
|
|||
|
|
|||
|
Name Hours Of Operation ======= Number=
|
|||
|
----
|
|||
|
Beta 23:00 - 6:30 802-0288
|
|||
|
C-Mania 21:00 - 7:00 362-8843
|
|||
|
CBM 16:00 - 12:00 90-4988
|
|||
|
Century 21 24 hours 632-7070
|
|||
|
Cerebruss 24 hours 47-2717
|
|||
|
Cerebruss Information ? 48-8300
|
|||
|
48-9886
|
|||
|
Databank ? 44-9760
|
|||
|
Drean Conection ? 953-2523
|
|||
|
Los Pinos 13:00 - 19:00 21-0375
|
|||
|
Magenta ? 392-0124
|
|||
|
Magenta ? 392-0016
|
|||
|
Maxes 23:00 - 7:00 542-2695
|
|||
|
Mendieta 22:00 - 8:00 654-6999
|
|||
|
Pirates Cove 24:00 - 6:00 783-5023
|
|||
|
Sanctuary 24:00 - 3:00 641-4608
|
|||
|
Soft-work 22:30 - 9:00 88-2065
|
|||
|
TCConection 19:00 - 12:00 22-4197
|
|||
|
The Connection 24 Hours 82-5780
|
|||
|
The Hacker 23:00 - 7:00 748-2005
|
|||
|
Tiger ? 784-2226
|
|||
|
XCASA ? 611-8136
|
|||
|
BBS-IOM 24 Hours 804-3602
|
|||
|
|
|||
|
Note: The settings for all systems listed above are Even, 7, 1.
|
|||
|
|
|||
|
Contributed by Noli
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
==Phrack Inc.==
|
|||
|
|
|||
|
Volume Three, Issue 27, File 12 of 12
|
|||
|
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
PWN PWN
|
|||
|
PWN P h r a c k W o r l d N e w s PWN
|
|||
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
|||
|
PWN Issue XXVII/Part 3 PWN
|
|||
|
PWN PWN
|
|||
|
PWN June 20, 1989 PWN
|
|||
|
PWN PWN
|
|||
|
PWN Created, Written, and Edited PWN
|
|||
|
PWN by Knight Lightning PWN
|
|||
|
PWN PWN
|
|||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|||
|
|
|||
|
|
|||
|
One of Cliff Stoll's "Wily Hackers" Is Dead (Suicide?) June 5, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
According to West German publications, the "Wily Hacker" Karl Koch, of
|
|||
|
Hannover, West Germany, died Friday, June 3, probably by suicide. His body was
|
|||
|
found burnt (with gasoline) to death, in a forest near Celle (a West German
|
|||
|
town near Hannover where he committed his hacks, as had been observed by German
|
|||
|
Post).
|
|||
|
|
|||
|
Koch was one of the 2 hackers who confessed their role in the KGB hack to the
|
|||
|
public prosecutors, therewith bringing the case to public attention. As German
|
|||
|
newspapers report, he probably suffered from a psychic disease: He thought he
|
|||
|
was permanently observed by alien beings named Illimunates' which tried to kill
|
|||
|
him. Probably, he had internalized the role of "Captain Hagbard" (his
|
|||
|
pseudonym in the hacking scene), taken from a U.S. book, who (like him)
|
|||
|
suffered from supervision by the Illuminates. Police officials evidently think
|
|||
|
that Koch committed suicide (though it is believed, that there are "some
|
|||
|
circumstances" which may also support other theories; no precise information
|
|||
|
about such moments are reported).
|
|||
|
|
|||
|
According to German police experts, Karl Koch's role in the KGB case as in
|
|||
|
daily life can properly be understood when reading this unknown book.
|
|||
|
|
|||
|
Information Provided by Klaus Brunnstein
|
|||
|
(University of Hamburg)
|
|||
|
|
|||
|
[Illuminates... KGB... whatever... -KL]
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Illuminatus! June 14, 1989
|
|||
|
~~~~~~~~~~~~
|
|||
|
The book in question is believed to be "Illuminatus!" by Harold Shea and Robert
|
|||
|
Anton Wilson. The book is a spoof on conspiracy theories, and suggests that
|
|||
|
many and probably all human institutions are just fronts for a small group of
|
|||
|
"enlightened ones," who are themselves a front for the Time dwarves from
|
|||
|
Reticuli Zeta, or perhaps Atlantean Adepts, remnants of Crowley's Golden Dawn,
|
|||
|
or even more likely the Lloigor of H.P. Lovecraft's Cthulhu Mythos. A leading
|
|||
|
character in this book is named Hagbard Celine.
|
|||
|
|
|||
|
"Illuminatus!" is a fun read if you like psychedelia and paranoia. It also
|
|||
|
seems to have influenced a lot of subsequent work, most notably Adams'
|
|||
|
"Hitchhiker's Guide to the Galaxy." It is easy to see how an unbalanced mind,
|
|||
|
taking it literally, could be completely absorbed. In fact "Illuminatus!"
|
|||
|
seems as if it was written with the intent of just this sort of programming,
|
|||
|
referring to it as "Operation Mindfuck."
|
|||
|
|
|||
|
This is probably not a real danger for the vast majority of sane adults, but it
|
|||
|
may, tragically, have been the case here. Or perhaps, no disrespect intended,
|
|||
|
Koch may in the course of various hacks really have discovered too much about
|
|||
|
the Illuminati. After all, they are supposed to be the secret power behind the
|
|||
|
KGB :-)
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
For more information on Clifford Stoll and the Wily Hackers of West Germany,
|
|||
|
please see:
|
|||
|
|
|||
|
"Who Is Clifford Stoll?" (No Date) Phrack World News issue XXII/Part 1
|
|||
|
"A Message From Clifford Stoll" (1/10/89) Phrack World News issue XXIII/Part 2
|
|||
|
|
|||
|
And the following articles all found in Phrack World News issue XXV/Part 2:
|
|||
|
|
|||
|
"German Hackers Break Into Los Alamos and NASA" (3/2/89)
|
|||
|
"Computer Espionage: Three 'Wily Hackers' Arrested" (3/2/89)
|
|||
|
"Computer Spy Ring Sold Top Secrets To Russia" (3/3/89)
|
|||
|
"KGB Computer Break-Ins Alleged In West Germany" (3/3/89)
|
|||
|
"News From The KGB/Wily Hackers" (3/7/89)
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Sex Put On Probation By Mystery Hacker June 13, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Ft. Lauderdale News and Sun-Sentinel
|
|||
|
|
|||
|
"Yes, you sound very sexy, but I really need a probation officer."
|
|||
|
|
|||
|
DELRAY BEACH, Fla. -- Callers trying to dial a probation office in Delray
|
|||
|
Beach, Fla on Monday, June 12, heard a smorgasbord of sex talk from a panting
|
|||
|
woman named Tina instead.
|
|||
|
|
|||
|
Southern Bell telephone officials said a computer hacker reprogrammed their
|
|||
|
equipment over the weekend, routing overflow calls intended for the local
|
|||
|
probation office to a New York-based phone sex line.
|
|||
|
|
|||
|
"People are calling the Department of Corrections and getting some kind of sex
|
|||
|
palace," said Thomas Salgluff, a spokesman for the Palm Beach County probation
|
|||
|
office.
|
|||
|
|
|||
|
Southern Bell officials said it was the first time their switching equipment has
|
|||
|
been reprogrammed by an outside computer intruder. Southern Bell provides
|
|||
|
local telephone service in Florida, Georgia, North Carolina, and South
|
|||
|
Carolina.
|
|||
|
|
|||
|
"We're very alarmed," said Southern Bell spokesman Buck Passmore. He said such
|
|||
|
a feat would require someone with considerable computer knowledge.
|
|||
|
|
|||
|
The implications of such a computer breach are considerable. Intercepting
|
|||
|
corporate communications, uncovering unlisted phone numbers, and tampering with
|
|||
|
billing information are all plausible consequences of computer security
|
|||
|
breaches at the the phone company.
|
|||
|
|
|||
|
Hackers have invaded Southern Bell in the past, but they have never
|
|||
|
reprogrammed a telephone link, Passmore said.
|
|||
|
|
|||
|
Security technicians from Southern Bell and AT&T are trying to trace the source
|
|||
|
of the computer breach, Passmore said.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Hacking For A Competitive Edge May 12, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Taken from the Los Angeles Times
|
|||
|
|
|||
|
Two former Tampa, FLA TV news managers have been charged with illegally tapping
|
|||
|
into phone lines and computers at another station to gain a news edge over
|
|||
|
their competitors. Former new director Terry Cole and assistant news director
|
|||
|
Michael Shapiro at WTSP-TV have been charged with 17 counts of computer hacking
|
|||
|
and conspiracy in the theft of information from WTVT-TV through computer phone
|
|||
|
lines, authorities said. Their arraignment was set for May 19.
|
|||
|
|
|||
|
If convicted, each could face a maximum prison sentence of 85 years. The two
|
|||
|
were fired from WTSP when the station learned of the alleged thefts. The
|
|||
|
break-ins began in November, 1988, but were not noticed until January 12, 1989,
|
|||
|
when WTVT's morning news producer noticed that files were missing, authorities
|
|||
|
said.
|
|||
|
|
|||
|
Computer experts determined that an intruder had rifled the files. Authorities
|
|||
|
said Shapiro knew WTVT's security system thoroughly because he had helped set
|
|||
|
it up while working there as an assignment manager before being hired away from
|
|||
|
WTVT in October.
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
TV News Executives Fired After Hacking Charges From Rival
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Tampa, Fla. -- A Florida television station fired two news executives in the
|
|||
|
wake of reports that one of them allegedly penetrated a rival station's
|
|||
|
computer system and stole sensitive information.
|
|||
|
|
|||
|
WTSP-TV (Channel 10), an ABC affiliate in St. Petersburg, announced that it had
|
|||
|
fired Assistant News Director Michael Shapiro and News Director Terry Cole.
|
|||
|
|
|||
|
Shapiro was arrested on February 7th on felony charges for allegedly breaking
|
|||
|
into a computer system at WTVT-TV (Channel 13) on at least six occasions in
|
|||
|
January. He was once employed by WTVT as an assistant manager and was
|
|||
|
responsible for administering the station's computer systems.
|
|||
|
|
|||
|
Law enforcement officials seized from Shapiro's home a personal computer, 200
|
|||
|
floppy disks and an operating manual and user guide for software used at the
|
|||
|
rival station.
|
|||
|
|
|||
|
He has been charged with 14 felony counts under Florida Statute 815, which
|
|||
|
covers computer-related crimes. Each count carries a maximum sentence sentence
|
|||
|
of 15 years and a $10,000 fine.
|
|||
|
|
|||
|
Vince Barresi, WSTP's vice-president and general manager, refused to comment on
|
|||
|
the two firings. However, in a prepared statement, he said that he told
|
|||
|
viewers during an 11 PM newscast last Tuesday that the station acted to "avoid
|
|||
|
any questions about the objective way we do our business in keeping the public
|
|||
|
informed."
|
|||
|
|
|||
|
Cole, who hired Shapiro last September, has not been charged by Florida law
|
|||
|
enforcement officials. He was fired, according to one source, because as
|
|||
|
director of the news room operations, he is held ultimately for the actions of
|
|||
|
news staffers. Shapiro and Cole were unavailable for comment.
|
|||
|
|
|||
|
[Another story that discussed this case was "Television Editor Charged In Raid
|
|||
|
On Rival's Files" (February 8, 1989). It appeared in Phrack World News Issue
|
|||
|
XXIV/Part 2. -KL]
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
National Crime Information Center Leads To Repeat False Arrest May 14, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
by James Rainey (Los Angeles Times)
|
|||
|
|
|||
|
Mix ups with the databases at the NCIC have caused Roberto Perales Hernandez to
|
|||
|
be jailed twice in the last three years as a suspect in a 1985 Chicago
|
|||
|
residential burglary. The authorities confused him with another Roberto
|
|||
|
Hernandez due to a single entry in the FBI's National Crime Information Center
|
|||
|
computer.
|
|||
|
|
|||
|
The two Roberto Hernandezes are the same height, about the same weight, have
|
|||
|
brown hair, brown eyes, tattoos on their left arms, share the same birthday,
|
|||
|
and report Social Security numbers which differ by only one digit!
|
|||
|
|
|||
|
The falsely imprisoned man has filed suit charging the Hawthorne, California
|
|||
|
Police Department, Los Angeles County, and the state of California with false
|
|||
|
imprisonment, infliction of emotional distress, and civil rights violations
|
|||
|
stemming from the most recent arrest last year.
|
|||
|
|
|||
|
He had previously received a $7,000 settlement from the county for holding him
|
|||
|
12 days in 1986 before realizing he was the wrong man. In the latest incident,
|
|||
|
he was held for seven days then freed with no explanation.
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
Another False Incarceration May 18, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
In his testimony on May 18, 1989 to the Subcommittee on Civil and
|
|||
|
Constitutional Rights of the Committee on the Judiciary of the U.S. House of
|
|||
|
Representatives, relating to the National Crime Information Center, David D.
|
|||
|
Redell cited another case of false incarceration concerning Roberto Perales
|
|||
|
Hernandez as well as various cases noted earlier -- such as that of Terry Dean
|
|||
|
Rogan [see below]:
|
|||
|
|
|||
|
"Only last week, a case in California demonstrated the potential
|
|||
|
benefit of easy access to stored images. Joseph O. Robertson had
|
|||
|
been arrested, extradited, charged, and sent to a state mental
|
|||
|
facility for 17 months. During that entire time, mug shots and
|
|||
|
fingerprints were already on file showing clearly that he was the
|
|||
|
wrong man, but no one had taken the trouble to check them."
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
These articles show clear examples of the damage and problems caused by this
|
|||
|
"super" database. People like William Bayse (Federal Bureau of Investigation's
|
|||
|
Director For Technical Services) and William Sessions (Director of the FBI)
|
|||
|
either fail to realize this or perhaps they just do not care (as long as
|
|||
|
something similar does not happen to them).
|
|||
|
|
|||
|
For those of you who are interested in looking into this further, the first
|
|||
|
article about this NCIC database was; "'Big Brotherish' Data Base Assailed,"
|
|||
|
(November 21, 1988). It appeared in Phrack World News Issue XXII/Part 3.
|
|||
|
|
|||
|
Another incident similar to the cases mentioned above concerned Richard
|
|||
|
Lawrence Sklar, a political science professor at the University of California
|
|||
|
at Los Angeles. He was mistaken by the computer for a fugitive wanted in a
|
|||
|
real estate scam in Arizona. Before the FBI figured out that they had the
|
|||
|
incorrect person, Sklar, age 58, spent two days being strip searched, herded
|
|||
|
from one holding pen to another, and handcuffed to gang members and other
|
|||
|
violent offenders. For more details on this case and the case concerning Terry
|
|||
|
Dean Rogan, please refer to "FBI National Crime Information Center Data Bank,"
|
|||
|
(February 13, 1989) which appeared in Phrack World News Issue XXIV/Part 2 (as
|
|||
|
well as the Washington Post).
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
TRW and Social Security Administration May 12, 1989
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
The credit bureau of TRW has been working with the Social Security
|
|||
|
Administration to verify its database of 140 million names and Social Security
|
|||
|
numbers. In order to cover the cost, TRW is paying the Social Security
|
|||
|
Administration $1 million, while Social Security Administration will provide a
|
|||
|
matching $1 million.
|
|||
|
|
|||
|
Since the Social Security Administration is asking for a budget increase for
|
|||
|
their computer and telecommunications systems, several legislators are outraged
|
|||
|
by the fact they they are spending $1 million for this non-government project.
|
|||
|
Claiming that the project is "as far away from the mission of the Social
|
|||
|
Security Administration as anything I have ever come across," Senator David
|
|||
|
Pryor (D-Ark) questioned the competence and credibility of Social Security
|
|||
|
Administration Commissioner Dorcas R. Hardy and asked for an investigation by
|
|||
|
the HHS inspector general.
|
|||
|
|
|||
|
In addition, several lawmakers such as Dale Bumpers (D-Ark) believe the project
|
|||
|
to be a violation of civil liberties. Said Bumpers, "I don't like any public
|
|||
|
institution releasing an individual's private information." The American Law
|
|||
|
Division of the Congressional Research Service has already concluded that the
|
|||
|
project is a violation of the Privacy Act of 1974.
|
|||
|
|
|||
|
[A related article, "Verifying Social Security Numbers," (April 11, 1989)
|
|||
|
appeared in Phrack World News Issue XXVI/Part 3 (as well as the New York Times
|
|||
|
on the same date). -KL]
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
Phrack World News XXVII Quicknotes
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
1. The current name assigned to the new network being created by the merger
|
|||
|
of BITNET and CSNET is ONENET.
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
2. NPA 903 Assigned to NE Texas (May 10, 1989) -- It was just announced that
|
|||
|
those portions of 214 outside Dallas will be changed to 903 in the Fall of
|
|||
|
1990.
|
|||
|
|
|||
|
With 708 assigned to Chicago, 903 assigned to Texas, and 908 assigned to
|
|||
|
New Jersey, only 909 and 917 remain to be assigned before the format
|
|||
|
changes.
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
3. Details On New Area Code 510 (June 6, 1989) -- The press release from
|
|||
|
Pacific Bell, quoted in the San Francisco Chronicle, gives the phase-in
|
|||
|
dates for the new NPA 510.
|
|||
|
|
|||
|
Inception is scheduled for October 7, 1991, with a four-month grace period
|
|||
|
when NPA 415 will still work for the affected numbers. Final cutover is
|
|||
|
scheduled for January 27, 1992.
|
|||
|
|
|||
|
NPA 510 will encompass Alameda and Contra Costa counties, which currently
|
|||
|
have 842,388 customers out of the current 2,005,687 customers in NPA 415.
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
4. New Jersey Area Code To Be Split (April 27, 1989) -- The split is not
|
|||
|
supposed to occur until 1991. The new NPA will be 908 and it will basically
|
|||
|
cover the southern "half" of the current 201 area. The affected counties
|
|||
|
will be Warren, Hunterdon, Middlesex, Union, Monmouth and Ocean, and the
|
|||
|
southwest corner of Morris). Counties remaining in 201 will be Sussex,
|
|||
|
Passaic, Bergen, Essex, Hudson, and the majority of Morris.
|
|||
|
|
|||
|
New Jersey Bell will also start requiring area codes on calls into New York
|
|||
|
and Pennsylvania that have been considered part of New Jersey local calling
|
|||
|
areas. This will apparently take effect October 2 and free up about 25
|
|||
|
exchanges. Information from the Asbury Park Press.
|
|||
|
|
|||
|
[This last line somewhat contradicts the first line as far as the
|
|||
|
dates are concerned. More information as we get it. -- KL.]
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
5. New Area Codes For London (April 27, 1989) -- British Telecom has announced
|
|||
|
that the area code for London is to be changed on May 6th, 1990, due to the
|
|||
|
increased number of lines needed in the capital.
|
|||
|
|
|||
|
The existing code is 01-, and the new codes to be introduced are 071- for
|
|||
|
the centre of the city and 081- for the suburbs. A list was published in
|
|||
|
the Evening Standard, showing which exchanges will fall in which area.
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
6. Member Learns The Hard Way: American Express Is Watching (May 4, 1989) --
|
|||
|
This article taken from the San Jose Mercury News describes how American
|
|||
|
Express called a member to voice their concern that he might not be able to
|
|||
|
pay his recent bill. American Express was able to access his checking
|
|||
|
account and find that he had less than what was owed to them. His card was
|
|||
|
temporarily "deactivated" after the member refused to give any financial
|
|||
|
information except that he would pay up the bill with cash when it came in.
|
|||
|
|
|||
|
Apparently, the card application, in finer print, declares that "[American
|
|||
|
Express reserves] the right to access accounts to ascertain whether you are
|
|||
|
able to pay the balance." After some arguments with the company, the
|
|||
|
member comments that "I learned a lesson: My life is not as private as I
|
|||
|
thought."
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
7. Southwestern Bell's QuickSource (April 24, 1989) -- Southwestern Bell
|
|||
|
Telephone Company is running a one year trial (March 1989 89 - March 1990)
|
|||
|
of two information services: QuickSource (audiotex) and Sourceline
|
|||
|
(videotext). The latter requires a terminal of some type, but the former
|
|||
|
only requires a touch-tone phone for access. The QuickSource number is
|
|||
|
323-2000, but cannot be accessed via 1+713+; SWBTCo has blocked access to
|
|||
|
"the Houston metro area served by SWBTCo," according to the script the
|
|||
|
woman reads to you when ask for help (713-865-5777; not blocked). The help
|
|||
|
desk will send you a free QuickSource directory though.
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
8. Telemail, MCI, AT&T Mail Interconnection (May 16, 1989) -- U.S. Sprint's
|
|||
|
subsidiary, Telenet has announced an interconnection agreement between
|
|||
|
Telemail, Telenet's electronic mail product, MCI Mail, and AT&T Mail.
|
|||
|
|
|||
|
The new arrangement, scheduled to be in effect later this summer, will
|
|||
|
allow the 300,000 worldwide users of Telemail, the 100,000 users of MCI
|
|||
|
Mail and the 50,000 users of AT&T Mail to conveniently send email messages
|
|||
|
to each other.
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
9. Illinois Bell Knocked Out For Four Hours! (May 18,1989) -- Service to over
|
|||
|
40,000 Illinois Bell subscribers in the northwest suburbs of Chicago was
|
|||
|
disrupted for about four hours because of problems with the computer in the
|
|||
|
switching center.
|
|||
|
|
|||
|
Phones were either dead or inoperative for incoming and outgoing calls
|
|||
|
between 9:30 a.m. and 1:40 p.m. because of a software glitch at the central
|
|||
|
office in Hoffman Estates, IL. Most of the disruption occurred in Hoffman
|
|||
|
Estates, Schaumburg, Arlington Heights, Hanover Park, and Streamwood, IL.
|
|||
|
|
|||
|
The exact nature of the problem was not discussed by the Bell spokesman who
|
|||
|
reported that the outage had been corrected. Apparently the backup system
|
|||
|
which is supposed to kick in also failed.
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
10. SRI Attacked By Kamikaze Squirrels (May 29, 1989) -- It seems that the Data
|
|||
|
Defense Network SRI's "no-single-point-of-failure" power system failed at
|
|||
|
the hands, or rather the paws, of a squirrel. The power was off for
|
|||
|
approximately 9 hours and they experienced no hardware problems. This was
|
|||
|
at least the third time that a squirrel has done SRI in.
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
11. New York Telephone Freebies (June 10, 1989)(San Francisco Chronicle, p. 2.)
|
|||
|
-- 24 pay phones along the Long Island Expressway were in fact free phones
|
|||
|
because of a programming/database screw-up. They were being heavily used
|
|||
|
for long distance calls by those who had discovered the oversight,
|
|||
|
including many to Pakistan (Police found 15 Pakistani men using the phones
|
|||
|
when they went to investigate after a shooting). There were no estimates
|
|||
|
on the unrecovered cost of the phone calls.
|
|||
|
_______________________________________________________________________________
|
|||
|
|
|||
|
*** END ***
|
|||
|
|