1071 lines
49 KiB
Plaintext
1071 lines
49 KiB
Plaintext
![]() |
Welcome to the Mishandled Information Publication!
|
|||
|
|
|||
|
This is a magazine put out for informational purposes to the masses. It is
|
|||
|
created for the people that enjoy to learn new things, and this first issue is
|
|||
|
a biggie. The magazine itself would not be in existance if it were not for the
|
|||
|
help of these people:
|
|||
|
|
|||
|
Bellcon
|
|||
|
Surge
|
|||
|
Ansi-Christ
|
|||
|
and DITTO
|
|||
|
|
|||
|
All the files in this magazine were donated by people who decided it was time
|
|||
|
that thier knowledge be shown so that others could learn. Expect to see some
|
|||
|
regular features in this magazine, and some big changes, so sit back, relax,
|
|||
|
and start your journey into the land of knowledge, welcome to the first issue
|
|||
|
of the Mishandled Information Publication!
|
|||
|
|
|||
|
The Fascist Plate
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Please note that all files are not spell checked, so the appearance of
|
|||
|
some of these files just depended on the "intelligence" of the writers. I
|
|||
|
think I'll be buying some dictionaries for Christmas this year........BC
|
|||
|
|
|||
|
|
|||
|
|
|||
|
TABLE OF CONTENTS
|
|||
|
|
|||
|
1. Local Area Networks...................Ansi-Christ
|
|||
|
2. On Payphones................................Surge
|
|||
|
3. On Pedestals......................Bellcon & Surge
|
|||
|
4. Hotel Fun.................................Bellcon
|
|||
|
5. MERIT Systems...............................Surge
|
|||
|
6. Ring-Busy Device............................Ditto
|
|||
|
7. Crashing C-NET's II.........................Ditto
|
|||
|
8. Caldor Numbers......................Fascist Plate
|
|||
|
9. Neat Numbers........................Fascist Plate
|
|||
|
10. Parody Song...................Bellcon & The Surge
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Local Area Networks
|
|||
|
(LAN)
|
|||
|
by
|
|||
|
Ansi-Christ
|
|||
|
|
|||
|
[This is the only file formatted for even printing.]
|
|||
|
|
|||
|
A local area network connects devices that are within a short range. Most LANs
|
|||
|
are unable to connect to public communications services. LANs were developed
|
|||
|
because most communications within a business either occur in the very same
|
|||
|
building or within a short distance of each other. This allows for the sharing
|
|||
|
of information and equipment and thus a large savings for the company.
|
|||
|
|
|||
|
This files is the first in a series of files. It is not meant to be a complete
|
|||
|
systems manual for all LANs, but a basic reference manual on the terminology
|
|||
|
and general set up. In later files there will be more specific information.
|
|||
|
|
|||
|
This file can be distributed freely as long as none of the information is
|
|||
|
changed. If I have made a mistake, please remember that we are all human and
|
|||
|
this does happen. Contact me on one of the two boards listed at the end to
|
|||
|
point out an error.
|
|||
|
|
|||
|
|
|||
|
Topologies:
|
|||
|
|
|||
|
Ring -
|
|||
|
|
|||
|
A ring type set up goes in one direction around a group of devices until it
|
|||
|
reaches the device that is meant as the destination. The ring will be
|
|||
|
connected by a cable to form the ring. The ring topology uses a method known
|
|||
|
as token passing. A token is like a bucket in which information can be dumped.
|
|||
|
If a certain device does not contain this "bucket" then it can not send out the
|
|||
|
data until it gets it. This will prevent data collision from occurring.
|
|||
|
|
|||
|
A LAN will usually transmit data in packets (buckets = packets) and add the
|
|||
|
necessary routing information to the packet. (this tells the packet where it's
|
|||
|
destination is) Because a ring system has a circular shape the information is
|
|||
|
routed in one direction and it will still reach its destination.
|
|||
|
|
|||
|
One note - I have altered the description of a token slightly to avoid
|
|||
|
confusion. A token is usually sent before a packet and will tell the next
|
|||
|
device if the following packet is full or is capable of receiving data.
|
|||
|
|
|||
|
Diagram of a ring topology:
|
|||
|
|
|||
|
O---------O
|
|||
|
/ \ O = nodes
|
|||
|
| |
|
|||
|
O O (I apologize for the shitty diagram)
|
|||
|
\ |
|
|||
|
\ |
|
|||
|
O-----O----O
|
|||
|
|
|||
|
|
|||
|
Tree -
|
|||
|
|
|||
|
The tree set up links components to the network via connectors. The network
|
|||
|
can be tapped at any available point. Data can pass from one device to another
|
|||
|
and does not have to route through a centralized point. Just the way a tree
|
|||
|
network is set up should make it much faster than a ring type network with the
|
|||
|
same computers and devices connected to it. This type of network is also very
|
|||
|
useful because you could add any additional devices as they were need via a
|
|||
|
connector without having to go through major modifications to the network
|
|||
|
itself.
|
|||
|
|
|||
|
A tree network does occasionally, just because of the nature of it's set up,
|
|||
|
have certain problems with controlling the passing of data. There is a safety
|
|||
|
factor involved with a tree network though. If one of the systems along the
|
|||
|
network go down it will not adversely affect the network as a whole, just that
|
|||
|
certain part.
|
|||
|
|
|||
|
Diagram of a tree network:
|
|||
|
|
|||
|
again I apologize for the shitty diagram.
|
|||
|
|
|||
|
O
|
|||
|
/ \
|
|||
|
O \
|
|||
|
| O
|
|||
|
| O |
|
|||
|
| | O
|
|||
|
O | /
|
|||
|
| /
|
|||
|
O
|
|||
|
|
|||
|
Star -
|
|||
|
|
|||
|
The star network is connected through a central processing device. This device
|
|||
|
usually takes the form of a PBX or a host computer system. All lines in this
|
|||
|
network are connected to this central unit. When information must go to
|
|||
|
another node on this network it must first pass through the center. The star
|
|||
|
topology is very common and is probably the most common set up for a network.
|
|||
|
|
|||
|
There is a problem with the star though. If the central unit goes down then
|
|||
|
the whole network is useless.
|
|||
|
|
|||
|
Diagram of a star topology:
|
|||
|
|
|||
|
O
|
|||
|
O | O
|
|||
|
\ | /
|
|||
|
\ | /
|
|||
|
\ | /
|
|||
|
O--------O--------O
|
|||
|
/ |\
|
|||
|
/ | \
|
|||
|
/ | \
|
|||
|
O | O
|
|||
|
O
|
|||
|
|
|||
|
|
|||
|
Transmission media -
|
|||
|
|
|||
|
Twisted pair wire is commonly used to connect all kinds of equipment. This is
|
|||
|
used in older buildings where it may be very expensive to convert to newer
|
|||
|
types of cable. Problems with this include distortion of signals especially at
|
|||
|
higher transmission speeds.
|
|||
|
|
|||
|
Coaxial cable consists of a single conductor surrounded by a flexible metallic
|
|||
|
shielding to minimize signal loss and interference. Coaxial permits a high
|
|||
|
transmission speed.
|
|||
|
|
|||
|
Twin - Axial cable uses two Coaxial cables, one receiving and one transmitting.
|
|||
|
These cables are better than twisted pair cable because of the higher
|
|||
|
transmission speed and longer distance.
|
|||
|
|
|||
|
|
|||
|
Baseband and Broadband Systems -
|
|||
|
|
|||
|
A baseband LAN assigns its entire capacity to a single user for a brief time.
|
|||
|
Only one device can use its pathway. These networks usually use 3/8 inch
|
|||
|
coaxial cable. Advantages are low cost, easy installation, and considerable
|
|||
|
capacity. Baseband does, though, not lend itself to voice quality
|
|||
|
communication.
|
|||
|
|
|||
|
A broadband LAN is sophisticated and uses common television cable and a modem.
|
|||
|
Although it is expensive it will allow the network to handle voice, video,
|
|||
|
teleconferencing, and graphics transmission. It does this by using different
|
|||
|
bandwidths so one signal does not interfere with another signal. It is good
|
|||
|
for high volume office communication.
|
|||
|
|
|||
|
Fiber Optics are the next step although very expensive it will eventually
|
|||
|
replace the other cables. Fiber Optics use light to transmit large amounts of
|
|||
|
information in a very short time. A single cable can carry 240 thousand calls
|
|||
|
at once.
|
|||
|
|
|||
|
|
|||
|
Interconnecting LANs -
|
|||
|
|
|||
|
Bridges are one way of connecting similar networks.
|
|||
|
|
|||
|
Gateways are a way of connecting dissimilar networks. It acts as a translator
|
|||
|
between these networks. It understands different file structures, data types,
|
|||
|
and access methods.
|
|||
|
|
|||
|
|
|||
|
Vendors -
|
|||
|
|
|||
|
Ungermann-Bass is a large independent vendor. Offering both base and broadband
|
|||
|
services and coaxial cable and fiber optic LANs.
|
|||
|
|
|||
|
Systek is the OEM supplier of IBM's broadband network.
|
|||
|
|
|||
|
3Com is a major supplier of PC LANs.
|
|||
|
|
|||
|
Corvus sells Omninet. They offer a system based on twisted
|
|||
|
pair wiring.
|
|||
|
|
|||
|
Interlan Inc. provides Ethernet based products.
|
|||
|
|
|||
|
Wangnet by Wang laboratories.
|
|||
|
|
|||
|
Codex 4000 series by Codex corp.
|
|||
|
|
|||
|
Information systems network by none other than AT&T
|
|||
|
information systems. (commonly abbreviated ISN)
|
|||
|
|
|||
|
Novell network
|
|||
|
|
|||
|
|
|||
|
LAN terms and what they mean - (note - originally printed in LAN magazine)
|
|||
|
|
|||
|
Access method: a way to determine which workstation or PC will be next to use
|
|||
|
the LAN. A set of rules by network hardware and software that direct the
|
|||
|
traffic over the network. Examples include Token passing and Carrier Sense
|
|||
|
Multiple Access for Collision Detection (CSMA/CD)
|
|||
|
|
|||
|
Collision: The result of two workstations trying to use a shared transmission
|
|||
|
medium (cable) at the same time. The electronic signals collide and ruin both
|
|||
|
signals. The whole process takes seconds.
|
|||
|
|
|||
|
Collision detection: The process of detecting when a collision has occurred.
|
|||
|
Workstations know a collision has occurred if the other station sends no reply
|
|||
|
that the signal was received.
|
|||
|
|
|||
|
Disk Server: a device equipped with disks and a program that allows users to
|
|||
|
make and store files on the disks. Allows each user to have an increase in
|
|||
|
storage space normally not accessible at their PC.
|
|||
|
|
|||
|
Drop cable: The cable which allows connection and access to the trunk cables
|
|||
|
of a network.
|
|||
|
|
|||
|
Locking: prevents people from changing the same data at the same time.
|
|||
|
|
|||
|
Polling: used in star networks. allows the central "hub" system to know when
|
|||
|
a node wants to transmit.
|
|||
|
|
|||
|
|
|||
|
LAN Magazine Call Anarchia at 518-869-6035
|
|||
|
12 West 21 Street TSD at 518-377-6487
|
|||
|
New York, NY 10010
|
|||
|
1-800-LIBRARY or boards for those who take their
|
|||
|
212-691-8251 telecom seriously.
|
|||
|
|
|||
|
Look for part II soon - Novell Network commands and syntax
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
On Payphones - By The Surge
|
|||
|
|
|||
|
A payphone is a payphone is a payphone, I think that Shakespeare said that
|
|||
|
once. At anyrate, the payphone I will be dealing mostly with, due to my
|
|||
|
familiarity with this model, is the Western Electric Rotary fone.This should
|
|||
|
hold true to most models of payphones as I will not go into vivid detail on the
|
|||
|
aspects of this model alone. This is basically my notes on the findings that I
|
|||
|
have come up with upon opening payphones that I deem noteworthy to myself and
|
|||
|
others who have not opened payphones or have not studied payphones that they
|
|||
|
have opened in depth. Opening the phone.
|
|||
|
|
|||
|
One of the most important concepts to realize when opening a payphone is that a
|
|||
|
payphone is basically a wall-mounted safe containing a phone (with dtmf
|
|||
|
pad/rotary dial exposed) and a cashbox (and related mechanisms). When opening
|
|||
|
a safe, you must realize that the easiest way to open a safe is through the
|
|||
|
opening method provided. In the case of the payphone, this consists of a lock
|
|||
|
and a turn-key insert. This lock is in the middle of the right hand side of
|
|||
|
the phone. This contains many tumblers similar to a safe and can be
|
|||
|
manipulated by drilling a hole around the key insert with a hole-saw drill.
|
|||
|
The turn-key is on the left side at the same level as the cradle for the hand-
|
|||
|
set. Drill a similar hole around this mechanism also. In removing the
|
|||
|
tumblers of the right side, you will expose the slide that should be pressed
|
|||
|
downward by a screwdriver or similar probing type tool. Then the same should
|
|||
|
be done to the turn-key side. Use of a mallet may assist the pushing of the
|
|||
|
probe to get the slide into the down position. At this time the top-front of
|
|||
|
the phone should be lifted upward and outward and the insides will be exposed.
|
|||
|
The black metal is only a shell that covers the inner metal and removal of this
|
|||
|
metal will accomplish nothing.
|
|||
|
|
|||
|
Payphones were meant to withstand the attact of a vandal who does not have
|
|||
|
power tools. No matter what gamma rays may turn you into the Incredible Hulk,
|
|||
|
you will not be able to open the phone without power tools. To elaborate on
|
|||
|
how strong the metal is, in opening a dented phone, I broke 1 hole-saw drill
|
|||
|
bit, 2 screwdrivers and a mallet. All physical manhandling will do to a phone
|
|||
|
is to bind the lock and wreck the electrical devices inside. Once the lock is
|
|||
|
bound, it is next to impossible to open the phone without a blow-torch. Also,
|
|||
|
if you know a locksmith well enough and the lock is still in working condition
|
|||
|
you may be able to have a key made up for it (with the right connections, this
|
|||
|
is not impossible as I have found out).
|
|||
|
|
|||
|
Tone Oscilator-
|
|||
|
|
|||
|
AKA the redbox holds, on the Western Electric models at least, a 2 way switch
|
|||
|
which you may find interesting. It is labled CF DTF for Coin First and
|
|||
|
Dial-tone First as you may have read in BIOC 003's course VI on payphones. It
|
|||
|
is very interesting and annoying to realize that it is a switch you will find
|
|||
|
every time that you walk up to a phone that is set to CF. "Jeeze, all I have
|
|||
|
to do is throw one stupid leetle (Mexican for little) switch and I could use a
|
|||
|
Blue Box, code, 3rd party billing, collect-call, 800-diverter ect.... The tone
|
|||
|
oscilator is connected to a central unit via 11 pin connector.
|
|||
|
|
|||
|
Dialing Unit-
|
|||
|
|
|||
|
The dialing unit is also connected into the central unit via an 11 pin
|
|||
|
connector. The dialing unit holds the dtmf pad/rotary dialing wheel and the
|
|||
|
cradle and the cord to the hand-set. The cord to the hand-set is protected
|
|||
|
with an armoured outside shell and a very strong cable inside which the red,
|
|||
|
yellow, black and green wires braid themselves around.
|
|||
|
|
|||
|
Coin Mechanism-
|
|||
|
|
|||
|
The coin mechanism starts in the upper left hand side of the phone and goes
|
|||
|
back to the back of the phone, through the totalizer (red-box mechanism) and
|
|||
|
and back out to the bottom-front of the phone. It will hold a maximum of 17
|
|||
|
quarters before the load has to be dropped into the cashbox (that is why you
|
|||
|
should never try to red-box more than $4.25 into a phone at any one interval.)
|
|||
|
At that point as one noted friend of mine found out (Dr. Killdeath) something
|
|||
|
like this will happen:
|
|||
|
|
|||
|
"Hello?"
|
|||
|
|
|||
|
"Hello sir, this is the operator. Just what exactly are you trying to pull
|
|||
|
here?"
|
|||
|
|
|||
|
"Your leg baby!"
|
|||
|
|
|||
|
-click!
|
|||
|
|
|||
|
Conclusion-
|
|||
|
|
|||
|
Maybe I will find out even more with my next payphone and as allways, I will be
|
|||
|
willing to share my findings with all that are willing to take interest and
|
|||
|
read. Dr. Killdeath, if you read this, contact me at one of the boards I have
|
|||
|
mentioned bellow as I haven't heard from you since Red Square. Any comments
|
|||
|
(especially additions) please contact me at any of the boards I call.
|
|||
|
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
On pedestals - By The Surge & Bellcon
|
|||
|
|
|||
|
First off, by far, phreaking entails much much more than codes. The true
|
|||
|
phreak is into the "hands-on" aspect of phreaking more than the bluebox
|
|||
|
programs or the codes. This experience is using actual blueboxes, trashing and
|
|||
|
the now ever so popular and still growing field of 'pedestal hacking.'
|
|||
|
Pedestals are the 'cans', or grey-green boxes that are owned by Bell on the
|
|||
|
side of the road. These appear only in rural or suburban areas. In cities,
|
|||
|
you must use the same methods but these ports may be found in manholes instead.
|
|||
|
Basically, a pedestal is an interface, are bridging gap, between two stretches
|
|||
|
of telephone cables. The first stretch being from your Central Office to your
|
|||
|
street, and the second from there to your house. In every-day use, it is
|
|||
|
mainly used as an access port for line testing and installation by lineman.
|
|||
|
They are no longer needed in the use of manual eavesdropping by Bell since all
|
|||
|
modern eavesdropping is done in your Central Office, and will be undetected
|
|||
|
because there is no voltage drop. This is not to say that you cannot eavesdrop
|
|||
|
from these points though. Radio Schlock sells a $20.00 recorder that will only
|
|||
|
record when there is a drop in voltage on the line (someone picks up a phone)
|
|||
|
which can be attached at the terminal set of the person you wish to eavesdrop
|
|||
|
on. Other than this device, Radio Schlock also sells the new CPA-1000 pen
|
|||
|
register. This will keep acurate tabs on any phoneline you wish to keep these
|
|||
|
records on and runs about $100.00. (See May '87 of 2600 Magazine.) Keep in
|
|||
|
mind that to hook these devices up to someones phone lines is not only an
|
|||
|
invasion of privacy but is also in many ways against the law. If you are in
|
|||
|
the pedestal to begin with you obviously have no regard for either so I guess
|
|||
|
it is no big deal. Of course you all have the files on how to build "beige"
|
|||
|
boxes aka linesman's handsets so I won't bother with that. This is of course
|
|||
|
an effective tool to monitor conversations. I personally use an actual test
|
|||
|
set which has the built in monitor on it so it goes virtually un-noticed. If
|
|||
|
you wish to modify your own phone to do the same, just disconnect the grey (or
|
|||
|
blue or white) wire on the F1-Post and the same effect will be accomplished in
|
|||
|
a cruder way. The big drawback is that you will wind up bringing the entire
|
|||
|
base of the phone along with you to have this feature.
|
|||
|
|
|||
|
Next order of business is some annoying things that you can do to someone from
|
|||
|
the pedestal. Basically, when you are at the pedestal you have much more power
|
|||
|
than at any of their phones. If they detect you on the line and go to call the
|
|||
|
"proper" authorities, just disconnect the wires from the terminal blocks and
|
|||
|
they can not complete the call because their phone will be dead. Then run like
|
|||
|
hell. Elsewhere in this issue of MIP are the plans for the 'ring-busy' device.
|
|||
|
This may also be hooked to the terminal blocks easily. I do recommend printing
|
|||
|
out that file or at least saving it to disk as it could come in very handy. It
|
|||
|
makes the line ring once, then give busy status. The owner of the line can
|
|||
|
make outgoing calls but will not even hear the first ring. One thing to
|
|||
|
remember when using the monitor/disconnect or the ring-busy device is that if
|
|||
|
the owner of the line has 2 lines, be sure to disconnect/busy both of them.
|
|||
|
|
|||
|
Experimentation is something that is the best about pedestal hacking. It is
|
|||
|
pretty much wide open. [No pun intended.] One interesting thing that you can
|
|||
|
do is to run wires from one set of terminal blocks to the other. Both lines
|
|||
|
will be connected to each other and this provides quite a humourous effect to
|
|||
|
listen in on a test set with. Another good way of phucking around is to take
|
|||
|
the wires running from one set of terminal blocks and change them with wires
|
|||
|
from another set of terminal blocks. This will cause all line A's calls to go
|
|||
|
to house B and vice-versa. Another interesting device to hook up (neither of
|
|||
|
us have tried this but in theory it could work) is to take a battery that will
|
|||
|
produce a large (but not too large) amount of voltage (like a car battery) and
|
|||
|
hook this up to an alternater which will cause the voltage to run in pulses.
|
|||
|
This will cause the line to constantly ring [or at least make the bell ringer
|
|||
|
lock up] until the phone is picked up. When the phone is put back down, this
|
|||
|
will continue. This will disallow outgoing and incoming calls and be a general
|
|||
|
annoyance.
|
|||
|
|
|||
|
Opening the pedestal can be acheived simply. If it is the type of a case that
|
|||
|
has 2 doors on the front and opens like a closet (quiet front or QF) just
|
|||
|
insert a 7/16" socket wrench (key word-socket since there are washers around
|
|||
|
the nut that make it impossible to use anything but a socket wrench or
|
|||
|
nut-driver) and just follow the directions printed above the handle. For the
|
|||
|
'can' type boxes, just undo the nuts with a 7/16" socket wrench (again, only
|
|||
|
socket) and lift the front cover off by pulling on the 'handle' at the bottom
|
|||
|
and pulling down and off. (This also makes a great seat on those wet nights!).
|
|||
|
|
|||
|
Now all you have to do is find out what line you are accessing (be sure it's
|
|||
|
not yours!) by using ANI. If you are not from the 518 area I would suggest
|
|||
|
subscribing to 2600 and writing in for your ANI (if you don't allready know it)
|
|||
|
If you are from 518, 998 (or in some weird places 997) is what you want to dial
|
|||
|
to find the number of the line that you are on. Once you are sure that it is
|
|||
|
not yours, you can call anywhere for free since you are using the phone of
|
|||
|
someone else.
|
|||
|
|
|||
|
One thing that I have noticed in looking around at a lot of pedestals is what
|
|||
|
we call a 'node'. It is protected by a black rubber cap. The nodes are easy
|
|||
|
to see, as they are usally two or three feet up the pole, and have black wires
|
|||
|
running either from the ground, or the top of the pole. The caps can be very
|
|||
|
easily removed to expose a set of terminal posts. Since these nodes are
|
|||
|
mounted on the telephone pole they provide easy access to the lines since you
|
|||
|
don't have to open a pedestal at all to get at them. They are, other than the
|
|||
|
access-ability factor, the same as the terminal blocks inside of a pedestal.
|
|||
|
|
|||
|
One thing that should be mentioned is a reminder. If you happen to cut any of
|
|||
|
the wires inside, intentionally or not, you have committed a serious crime.
|
|||
|
Not only is this theft and vandalism, it may be deemed by officials as
|
|||
|
something more organized. Many things are carried over phone lines besides
|
|||
|
just voices. Lines such as bank or lottery data, medical systems, and alarm
|
|||
|
systems are a few of the things that when cut, could lead to some serious
|
|||
|
trouble. In one such case similar to this, the local division of the FBI
|
|||
|
showed up for some thorough investigating (along with TelCo and State Police.)
|
|||
|
|
|||
|
Well, that is just about all that I have to say 'on pedestals'.
|
|||
|
|
|||
|
One final note, a pedestal is not yet in use, there is still current running
|
|||
|
through it although you will not get a dialtone from any of the terminals or
|
|||
|
wires themselves. They are basically useless although the cases make great end
|
|||
|
tables for your room. Look in the future for a follow up file dealing with
|
|||
|
test probes and other lineman paraphenalia as well as with anything else that
|
|||
|
we learn from Ma Bell (knock on wood).
|
|||
|
|
|||
|
TTFN! The Surge (T$) Bellcon
|
|||
|
|
|||
|
|
|||
|
+-----------------------------------------------------------------------------+
|
|||
|
! Getting The Most For Your Money -- Hotels !
|
|||
|
! Written for M.I. Magazine -- 5-4-87 !
|
|||
|
+-----------------------------------------------------------------------------+
|
|||
|
|
|||
|
|
|||
|
Have you ever been on vacation and while staying in a hotel you realized that
|
|||
|
they are ripping you off? If so, read on. I will list some various ways to
|
|||
|
save money and possibly have a good time screwing them over.
|
|||
|
|
|||
|
While staying in a hotel room you may realize that it is not very easy to
|
|||
|
phreak from the room due to the fact that they monitor every outgoing call. If
|
|||
|
there is no charge for outgoing calls, feel 'free' to phreak as you normally
|
|||
|
would from home. If there is a charge, you may be able to phreak using
|
|||
|
alternative methods. On your hotel phone it may say 'dial 8+1+(area code) +
|
|||
|
number.' This is of course is just designating that you want an outside line,
|
|||
|
and to record billing for hotel records purposes. Try dialing other numbers
|
|||
|
first other than an 8 first. If you get a dial tone then use that line to dial
|
|||
|
out. You may still get billed for it, but then again, you may not. It sure as
|
|||
|
hell can't hurt. For some reason hotels are now all going to modular
|
|||
|
jacks...this is a direct invitation to take what (what could be easier?) When
|
|||
|
most maids are done cleaning they will leave the doors to rooms open. Walk
|
|||
|
right in and take a phone from that room. I would not advise that you take
|
|||
|
your own phone (for obvious reasons.)
|
|||
|
|
|||
|
There is of course the tried and true method of walking over to a hotel pay
|
|||
|
phone to carry out your business. This also brings up an interesting point.
|
|||
|
Most hotel phones are indoors on hotel walls. The strongest support they have
|
|||
|
to the wall is some plaster and a few wood screws. It would be a bit risky to
|
|||
|
take one from this location, but it's always an option.
|
|||
|
|
|||
|
Upon looking around many hotels, you may notice that the power switches for
|
|||
|
ENTIRE hallways are left in the open, unlocked. This could bring about a quite
|
|||
|
chaotic situation, making it quite easy for you to enter someone's room and
|
|||
|
take what you please. Be weary of the emergency power lights that are ALWAYS
|
|||
|
in hotels. I would not suggest you do this, it is only proving that hotel
|
|||
|
management is not always the smartest class of people in the world.
|
|||
|
|
|||
|
If the hotel is of any good quality, it will have a restaurant somewhere on the
|
|||
|
premisis. Walk in and eat until you burst, upon paying your bill politely ask
|
|||
|
if you can bill it to your hotel room. Be sure to ask if these arrangements
|
|||
|
can be made before-hand. All they will want is a name and room number. Make
|
|||
|
any room and name up as they will not usually verify it. (What hotel would
|
|||
|
want to harrass and 'honest' customer?)
|
|||
|
|
|||
|
Finally, when checking in and out, keep your eyes on the computer. As stated
|
|||
|
earlier, hotel management is not too smart. Not smart enough to remember logon
|
|||
|
procedures and passwords that is. It is not unlikely that the whole procedure
|
|||
|
will be written stamped on the terminal. Keep this for future reference!
|
|||
|
|
|||
|
If you are not impressed with this file, stop complaining. Request something
|
|||
|
next issue, or take whatever you get. You're not PAYING for this!
|
|||
|
|
|||
|
(A Mishandled Magazine Production!)
|
|||
|
|
|||
|
================================?==============================
|
|||
|
Merit destinations---
|
|||
|
|
|||
|
Autonet CMU-Cyber Datapac Dial1200-AA
|
|||
|
Dial300-AA Internet ITI MAGNET
|
|||
|
MSUnet-CLSI MSUnet-EGRNET MSUnet-IBM MSUnet
|
|||
|
MTU MTUS5 OU-SECS RPI
|
|||
|
RUAC SDSC Telenet UM-CAVAX
|
|||
|
UM-CLINFO UM-CVVAX UM-DSC UM-EnginHarris
|
|||
|
UM-MMVAX UM-QuickSlides UM-RAVAX umix
|
|||
|
UMLIB UMLIB-300 WMU-CAE WMU-Kanga
|
|||
|
WMU-Pooh WMU-Puff WMU-Tigger WSU-CSVAX
|
|||
|
WSU-ET ZOOnet-KCollege Zoonet-KVCC
|
|||
|
|
|||
|
Here are some additional destinations that are accessable via merit.....
|
|||
|
|
|||
|
ABA/NET ACP ADPNS-261 ADPNS-3
|
|||
|
ADPNS-446 ADPNS-9 Alberta ARTFL
|
|||
|
Automail-23 Automail-297 Boeing British-Columbia
|
|||
|
BRS Cal-Berkeley Calgary Caltech-HEP
|
|||
|
Carnegie-DEC-20 Carnegie-MICOM Carnegie-11/45 CompuServe
|
|||
|
Comshare Cornell Dalhousie DatapacInfo
|
|||
|
Dialcom Dialog-Index Dialog-V1 Dialog-V2
|
|||
|
Dow-Jones Guelph Illinois Illinois-Cyber
|
|||
|
LEXIS Manitoba Maryland-Unix McGill
|
|||
|
MGH Minnesota-Cyber Minnesota-VAX MIT-Multics
|
|||
|
MIT-VM Montreal Natl-Lib-Med NCAR-Telenet
|
|||
|
New-Brunswick Newsnet NJIT-EIES NLM
|
|||
|
NLM-MCS Notre-Dame NRC NYTimes
|
|||
|
OAG Queens Rice RLIN
|
|||
|
SDC SFU Simon-Fraser Source
|
|||
|
Source-11 Source-12 Source-13 Stanford
|
|||
|
STN Sumex Telenet-Cust-Serv Telenet-Mail
|
|||
|
Telenet-Telemail Toronto TUCC UBC
|
|||
|
UBC-CS UBC-EAN UBC-VISION UQV
|
|||
|
Press RETURN to continue
|
|||
|
Victoria VMShare Vutext-Can Vutext-Freep
|
|||
|
Vutext-other Washington Waterloo-TSS Waterloo-VM
|
|||
|
WestLaw Wilsonline Wisconsin-MACC Wisconsin-VAX
|
|||
|
Yale
|
|||
|
|
|||
|
This is the best list that I could get a hold of. Hacking Merit is very
|
|||
|
interesting as you can reach telenet via merit as well as all these adresses
|
|||
|
that are listed above. If you know telenet, you know that this makes Merit
|
|||
|
practically unlimited. I hear from Bellcon that there is a UNIX out there with
|
|||
|
the uucp account and password uucp but it needs a core dump to get to the
|
|||
|
prompt. If you are into that sort of thing, go for it! If not, there are
|
|||
|
still quite a few other destinations that you may wish to hack. I am sure that
|
|||
|
that UNIX is wide open seeing that uucp's pw was uucp. Try the other default
|
|||
|
accounts. Merit is down at this time due to extensive hacking and a friend of
|
|||
|
mine got a little note on his MTS account about this so be carefull not to do
|
|||
|
this from MTS or anywhere where it can be tied to you. To get to MERIT just
|
|||
|
|
|||
|
type:
|
|||
|
%call 999900009999
|
|||
|
|
|||
|
when you are connected to the 266-8989 dialup or any dialup of ISNET. I hear
|
|||
|
that the 266 prefix will be soon changed to 276 but the last 4 digits of ISNET
|
|||
|
will remain the same 8989. I hope you enjoyed this file. It took no great
|
|||
|
intelligence to write but can be used as a reference for serious hackers who
|
|||
|
have not tried MERIT yet. This is a way for you to get started and I wish you
|
|||
|
the best of luck on getting accounts in all your travels and hope you never
|
|||
|
choose to destroy any data or system anywhere. Remember, the greatest sence of
|
|||
|
power comes from holding the power to destroy a system, and choosing not to..
|
|||
|
T$
|
|||
|
===============================================================================
|
|||
|
|
|||
|
.......................................
|
|||
|
. The HOW TO File .
|
|||
|
. On Making .
|
|||
|
. The Ring-Busy Device .
|
|||
|
. Designed And Written By .
|
|||
|
. ]>itto AKA Shlomo .
|
|||
|
.......................................
|
|||
|
|
|||
|
|
|||
|
Introduction
|
|||
|
------------
|
|||
|
Well this is the How To file on The Ring-Busy Device. This is very simple to
|
|||
|
construct and is also very simple to connect on someones fone line. It is
|
|||
|
probably the easiest thing you will ever do what is actually worth what little
|
|||
|
effort you put in. Now your probably saying to yourslef:
|
|||
|
|
|||
|
|
|||
|
What The Hell Is A Ring-Busy Device?
|
|||
|
------------------------------------
|
|||
|
A Ring-Busy Device is of course a device that when connected on to you enemys
|
|||
|
fone line will make it so that when you call this persons fone you will get a
|
|||
|
Ring-Busy. A ring-busy is exactly what it says, A ring and then a busy, That
|
|||
|
is One ring and from then on busy. Also the pathetic person who has the fone
|
|||
|
that this device is being used on will not have his fone ring. This means he
|
|||
|
will not even know that anyone is calling. Your probably saying BIG DEAL, why
|
|||
|
not just cut his line! Well this is better because he can still use his fone,
|
|||
|
thats right, if he wanted to he could pick up his fone and he would get a dial
|
|||
|
tone, he could then dial out not knowing of this device. This is especially
|
|||
|
useful for those r0dent BBS's that are pissing you off. If someone has a BBS
|
|||
|
and this device is on the line then they wont get any calls for their BBS
|
|||
|
(hehe), and they wont know why either!
|
|||
|
|
|||
|
|
|||
|
How the Ring-Busy Device Was Conceived
|
|||
|
--------------------------------------
|
|||
|
It all started one morning at 4am when I went out special to steal this
|
|||
|
emergency police/fire fone. Once I got it home I hooked it up to my line and
|
|||
|
noticed that whenever someone called me they would get a ring-busy, this was
|
|||
|
extremely odd, so I tried to figure out why the hell that was happening, and I
|
|||
|
did, and now we have the Ring-Busy device. It is also useful if dont want to
|
|||
|
talk to someone but you dont want to put the fone off the hook, just put this
|
|||
|
little device on and those leeches that keep bothering you for games wont be a
|
|||
|
problem anymore.
|
|||
|
|
|||
|
|
|||
|
Ring-Busy Device Plans
|
|||
|
----------------------
|
|||
|
As I said before this is very very simple to construct.
|
|||
|
|
|||
|
Parts Needed:
|
|||
|
(1) 7k resistor (7000 OHMS)
|
|||
|
(1) Fone line
|
|||
|
(1/2) a brain (at least)
|
|||
|
|
|||
|
Procedure:
|
|||
|
Now all you have to do is connect up this 7k resistor to the fone line on the
|
|||
|
red and green terminals, Here is an easy diagram of how to add it onto someones
|
|||
|
fone line. The diagram represents the nice little box that the fone line comes
|
|||
|
through on the side of your house.
|
|||
|
|
|||
|
NOTE: This is for a 1 fone line configuration. If they have two I think you'd
|
|||
|
figure it out? If not too Bad...
|
|||
|
|
|||
|
Diagram:
|
|||
|
#########
|
|||
|
# #
|
|||
|
# G-7-R #
|
|||
|
# #
|
|||
|
#########
|
|||
|
G - Green terminal
|
|||
|
R - Red Terminal
|
|||
|
7 - 7k resistor
|
|||
|
|
|||
|
Now if they have 2 fone lines then connect another 7k resistor to the
|
|||
|
black and yellow terminals.
|
|||
|
|
|||
|
Its That Simple....
|
|||
|
|
|||
|
7k resistors might be a some-what hard to get, try your local electronics store
|
|||
|
and dont bother with Rat Shack, I already checked, they dont sell them.
|
|||
|
|
|||
|
If you must, a 6.5k or maybe 7.5k resistor will work, but Ma Bell uses 7k so I
|
|||
|
do the same.
|
|||
|
|
|||
|
|
|||
|
Suggestions
|
|||
|
-----------
|
|||
|
Here are a few ways to use or misuse this device.
|
|||
|
|
|||
|
1) Connect it on to your fone: Simple just cut off the modular end of your
|
|||
|
fone cord and connect it to the red and green wires, then connect the modular
|
|||
|
plug you cut off to the resistor too, and then just plug the fone in and you
|
|||
|
have a permanent Ring-Busy Device, Another way of doing it would be to put a
|
|||
|
SPST switch in there so you can turn it on or off, thats what I do and it works
|
|||
|
great (Especially when r0dents start bothering me)
|
|||
|
|
|||
|
2) Connect it to your favorite enemys fone line, and enjoy while watching him
|
|||
|
try to figure out why he isn't getting any fone calls, BUT if the luser has 2
|
|||
|
fone lines I suggest that you connect one Ring-Busy Device onto each fone so he
|
|||
|
doesn't get calls on the other fone from people telling him that his fone is
|
|||
|
phucked.
|
|||
|
|
|||
|
|
|||
|
Conclusion
|
|||
|
----------
|
|||
|
Well as this file comes to an end, I would like to tell you to call some of the
|
|||
|
best boards around:
|
|||
|
|
|||
|
|
|||
|
Disclaimer
|
|||
|
----------
|
|||
|
This file is for informational purposes only, it is not meant for small
|
|||
|
children or the mentally unbalanced. In no way is the author liable for use or
|
|||
|
misuse of this device. Also note that the author can not and will not take any
|
|||
|
responsiblity for any actions as a result of this file.
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|||
|
.......................................
|
|||
|
. The HOW TO File .
|
|||
|
. On Crashing A C-Net .
|
|||
|
. Part Two .
|
|||
|
. By ]>itto .
|
|||
|
. AKA Shlomo .
|
|||
|
.......................................
|
|||
|
|
|||
|
|
|||
|
Introduction:
|
|||
|
-------------
|
|||
|
In this file on Crahing a C-Net I will discuss methods of making, using, and
|
|||
|
getting backdoors on C-Net, I will also show some C-Net programming and how to
|
|||
|
make your very own backdoor!
|
|||
|
|
|||
|
First I will discuss ways to get SysOp access on a cnet...There are a few ways
|
|||
|
and most are effective.
|
|||
|
|
|||
|
|
|||
|
Method 1
|
|||
|
--------
|
|||
|
Now this method is quite simple BUT a certain access level is needed. This
|
|||
|
works like this:
|
|||
|
|
|||
|
First: you must try and convince the SysOp to give you SubOp access of one of
|
|||
|
the UD sections, this is the only thing stopping you from complete control of
|
|||
|
his board. If you dont have a commie then try to convince him to have maybe a
|
|||
|
g-philes section or a UD section of your computer type and for him to make you
|
|||
|
a subop, this won't be too hard if you are an expert in the art of
|
|||
|
bullshitting.
|
|||
|
|
|||
|
Second: (This is the easy part) Log on the board real late at night (somewhere
|
|||
|
between 2-4am) and go into your sub in the UD section, then hit Z for subop
|
|||
|
maintenance and once in there hit 2, once you are at this menu change the name
|
|||
|
of the UD section to: name/e (where the name is the name of the UD). Then
|
|||
|
leave the subop maintenance and leave the UD section, then go back into the UD
|
|||
|
section and you will see that your UD section is now a ENTIRE DISK EXCHANGE
|
|||
|
MODE which means you can kill/upload/download anything on the disk.
|
|||
|
|
|||
|
Third: Now you must make for yourself backdoor, and then upload it to the
|
|||
|
board in place of the a prg. file already on the disk (making a backdoor for
|
|||
|
yourself will be discussed later)
|
|||
|
|
|||
|
Fourth: Now just execute the prg. file you replaced with your backdoor and
|
|||
|
your set!!
|
|||
|
|
|||
|
|
|||
|
Method 2
|
|||
|
--------
|
|||
|
Now this method is simple and you dont need subop access BUT the sysop of the
|
|||
|
BBS you want to install this backdoor on has to be either:
|
|||
|
|
|||
|
1) a Lazy bum
|
|||
|
or
|
|||
|
2) a completely stupid asshole
|
|||
|
|
|||
|
This is how it works...
|
|||
|
|
|||
|
First: You must go into the p-files section and see if there are any games in
|
|||
|
there, if not then funs over, this method wont work. Dont get your hopes up
|
|||
|
just because there are online games, now what you have to do is execute each
|
|||
|
one and make sure that each one is there and make sure you dont see: 'Error
|
|||
|
reading "name of game"', if you dont get any errors and all the games are there
|
|||
|
then your out of luck.
|
|||
|
|
|||
|
Sorry, but the reason why it would say error reading the game is because that
|
|||
|
game isn't on the disk (or maybe it is just that the sysop misspelled the name
|
|||
|
, in any case...If there is an error than you now have the ability to install a
|
|||
|
backdoor.
|
|||
|
|
|||
|
Second: This is easy from now on, now all you have to do is go into the UD
|
|||
|
section and upload a game with the name prg.name of game missing. Example:
|
|||
|
game missing is wrestling, so you upload a game called prg.wrestling.
|
|||
|
|
|||
|
Get it? Well anyways this prg. that you upload must be you very own backdoor
|
|||
|
(this will be discussed later) Third: Just execute that game after you have
|
|||
|
uploaded it and you in control.
|
|||
|
|
|||
|
|
|||
|
Method 3
|
|||
|
--------
|
|||
|
This is probably the most worthless method and the hardest to do, but what the
|
|||
|
hell. In this method you must:
|
|||
|
|
|||
|
First: Get ahold of an online game that the sysop does not have and is
|
|||
|
somewhat a good game, then install a backdoor (discussed later) and then upload
|
|||
|
it to the UD section, if the sysop is an idiot he will add it to the p-files
|
|||
|
section without even checking it, if he is smart he will check it for backdoors
|
|||
|
and if he is a complete idiot or you are good at hiding back doors than he'll
|
|||
|
add it to the p-files section.
|
|||
|
|
|||
|
Second: Once it's in the p-files section just execute it and go with your
|
|||
|
backdoor. That simple!
|
|||
|
|
|||
|
|
|||
|
Method 4
|
|||
|
--------
|
|||
|
Do the same as method 3 BUT do not install a backdoor in the game, and wait
|
|||
|
till he puts it in the p-files section, once he does go into the UD section you
|
|||
|
uploded it to and check if its still there, if so then since you uploaded it,
|
|||
|
just kill it and then upload your backdoor, then execute the game and Ta Da!
|
|||
|
|
|||
|
|
|||
|
Making A Backdoor For Yourself
|
|||
|
------------------------------
|
|||
|
NOTE: It always helps to have a commie at hand when editing or making games or
|
|||
|
backdoors for CNET but I'm sure any computer will do.
|
|||
|
|
|||
|
Here I will discuss some of the variables needed and some sub-routuines need to
|
|||
|
make a backdoor or game.
|
|||
|
|
|||
|
Well first of all to start out all CNET games MUST be between the lines of
|
|||
|
512-580, and you can not skip lines.
|
|||
|
|
|||
|
---------------------
|
|||
|
Important Variables:
|
|||
|
---------------------
|
|||
|
a$ - used to print out things on the BBS, goes with a gosub 40, for example if you wanted to print out 'axeman is
|
|||
|
an asshole' you could do that by doing:
|
|||
|
a$="axeman is an asshole":gosub40
|
|||
|
ac% - this is your access level, the access levels of cnet go from 0-9 (9
|
|||
|
being sysop, and 0 being new user) I will discuss access levels in detail
|
|||
|
in a later file.
|
|||
|
NOTE: one easy way to make a backdoor would be to but somewhere in the game
|
|||
|
a line like this:
|
|||
|
ac%=9, that would give you sysop access an$ - the response of an input, (in
|
|||
|
other words what the luser typed in)
|
|||
|
b$ - current board # your in.
|
|||
|
cm$ - prompt (example=MAIN:)
|
|||
|
id - your id
|
|||
|
d1$ - last call date
|
|||
|
d2$ - current time and date
|
|||
|
pw$ - your password
|
|||
|
------------------------
|
|||
|
Important Sub-Routines:
|
|||
|
------------------------
|
|||
|
gosub 2100 - like input.(an$=the inputs response)
|
|||
|
gosub 40 - to print something out to the modem,(Example: a$="hello":gosub40
|
|||
|
will print out 'hello')
|
|||
|
goto 6000 - logoff the user
|
|||
|
goto 1300 - the main menu
|
|||
|
goto 512 - execute a p-file(game)
|
|||
|
goto 16000 - read a file
|
|||
|
gosub61000 - do this 1st before going
|
|||
|
to 512 for loading in a game example:
|
|||
|
to load 'dumb game' do this:
|
|||
|
a$="dumb game":goto61000:goto512
|
|||
|
Well those are some of the real neccesities.
|
|||
|
|
|||
|
NOTE: When printing something out to the modem a ctrl-k will act as a
|
|||
|
carriage return. Example:
|
|||
|
a$="<ctrl-k>hello<ctrl-k>":gosub40 that will print a return then hello and
|
|||
|
then another return.
|
|||
|
|
|||
|
|
|||
|
Backdoor Example:
|
|||
|
-----------------
|
|||
|
Here is a very simple example of a backdoor file for cnet, if you want you can
|
|||
|
use this, or your very own backdoor.
|
|||
|
|
|||
|
Here goes:
|
|||
|
|
|||
|
512 a$=" a stupid backdoor ":gosub40
|
|||
|
513 ac%=9:goto1300
|
|||
|
|
|||
|
As you probably know the example i've given will print out' a stupid backdoor '
|
|||
|
and will then give you sysop access, and then return you to the main menu. The
|
|||
|
above is ofcourse a lame example, I dont have time for a complicated one. But
|
|||
|
I think you got the idea...If not then leave me mail on any board I'm on. Also
|
|||
|
try contacting your local commie user, he might be able to supply you with some
|
|||
|
nice ones, If you need one real bad, let me know and I'll make a few for you.
|
|||
|
|
|||
|
|
|||
|
C-Net Trick
|
|||
|
-----------
|
|||
|
This isn't much but it is a simple way to find out who posted a anonymous msg
|
|||
|
on a CNET, this only works with the main message not the responses. What you
|
|||
|
do is read the message and then privately reply to the idiot who posted the
|
|||
|
message(Ooops I forgot to tell ya that you have to have a good idea of who the
|
|||
|
hell posted it...) then once you have done that go into the e-mail section by
|
|||
|
hitting M at the main menu and then type V to verify someones mail then all you
|
|||
|
do is enter that persons name and if it says that guy has a msg from you that
|
|||
|
you know it's him... Not so great a trick eh?
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|||
|
-----------------
|
|||
|
/ / BY
|
|||
|
/ HAVE SOME /
|
|||
|
/ / THE
|
|||
|
/ FUN WITH /
|
|||
|
/ / FASCIST
|
|||
|
/ CALDOR PHONES! /
|
|||
|
/ / PLATE
|
|||
|
-----------------
|
|||
|
|
|||
|
So, you are walking through your local Caldor, you see a phone sitting there,
|
|||
|
there are no clerks around, and nobody is watching you, it is now time to use
|
|||
|
the phone. Yes, you too can make calls to lots of different and strange places
|
|||
|
in your Caldor! In this first issue of Caldor Phone Numbers, I will give you
|
|||
|
some neat numbers to mess around with. To use these numbers, pick up the
|
|||
|
phone, dial a 7, then wait for a louder dial tone, then you can put in the
|
|||
|
number of your choice. Here are the numbers you could use:
|
|||
|
|
|||
|
SPECIAL NUMBERS
|
|||
|
------- -------
|
|||
|
|
|||
|
Accounts Payable 6235
|
|||
|
Accounts Payable Adjustments 6234
|
|||
|
Admore Distribution 7186
|
|||
|
Advertisement Department 6161
|
|||
|
Cafeteria 6269
|
|||
|
Charge Sales 6219
|
|||
|
Central Delivery 6129
|
|||
|
Check Authorization 6401
|
|||
|
Check Control 6211
|
|||
|
Co-op Advertisement 6253
|
|||
|
Computer Room 6025
|
|||
|
Conference Room I 6244
|
|||
|
Conference Room II 6356
|
|||
|
Conference Room III 6388
|
|||
|
Conference Room IV 6337
|
|||
|
Construction Department 6266
|
|||
|
Consumer Affairs 6004
|
|||
|
Controller 6008
|
|||
|
Data Processing 6365
|
|||
|
Distribution Center 3020
|
|||
|
Duplicating 6158
|
|||
|
Executive Benefits 6003
|
|||
|
Expense Department 6215
|
|||
|
Gym 6196
|
|||
|
Help Desk 6667
|
|||
|
Internal Audit 6083
|
|||
|
Inventory Control 6222
|
|||
|
Legal Department 6242
|
|||
|
Leisure Line Toys 7300
|
|||
|
Mailroom 6159
|
|||
|
Maintenance Department 6678
|
|||
|
Operations Supervisor 6230
|
|||
|
Payroll 6251
|
|||
|
Personnel 6174
|
|||
|
Personnel Benefits 6317
|
|||
|
Printshop 6272
|
|||
|
Purchasing 6203
|
|||
|
Ralar Distribution 7195
|
|||
|
Real Estate 6242
|
|||
|
REceptionist 6240
|
|||
|
Sales Audit 6217
|
|||
|
Security Department 6256
|
|||
|
Security REgionals 6256
|
|||
|
Telelcommunications 6339
|
|||
|
Traffic Accounts Payable 6663
|
|||
|
Traffic Hauling 6315
|
|||
|
TWX Message Center 6152
|
|||
|
|
|||
|
Those are all the numbers for this first file on Caldor Phone System.
|
|||
|
|
|||
|
One last thing you might want to do is to dial 0, then ask the operator to page
|
|||
|
customer assistance to hardware or some other department, it might be
|
|||
|
interesting...remember, these numbers are for informational purposes only, I do
|
|||
|
not approve of you using them. Be sure to look for the next file on Caldor
|
|||
|
Phone Systems!
|
|||
|
|
|||
|
TFP
|
|||
|
|
|||
|
|
|||
|
Some neat telephone numbers to call on a boring day.
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
NATIONAL STATES' RIGHTS PARTY 404-427-0283
|
|||
|
NAZIS IN ARLINGTON 703-524-2175
|
|||
|
NAZIS IN CHICAGO 312-863-8700
|
|||
|
NAZIS IN CLEVELAND 216-631-6448
|
|||
|
LIBERTY LOBBY 703-546-5611
|
|||
|
NATIONAL ALLIANCE 703-525-3223
|
|||
|
|
|||
|
KU KLUX KLAN CHAPTERS:
|
|||
|
|
|||
|
DAVID DUKE 404-835-7959
|
|||
|
HAROLD COVINGTON 919-834-0063
|
|||
|
BILL WILKINSON 504-665-1018
|
|||
|
FRED WILKINS 303-232-8114
|
|||
|
FALLBROOK, CALIFORNIA 714-728-0280
|
|||
|
SAN DIEGO, CALIFORNIA 714-563-4555
|
|||
|
ANAHEIM, CALIFORNIA 714-750-7848
|
|||
|
LAKEWOOD, COLORADO 303-232-8373
|
|||
|
|
|||
|
OTHER REACTIONARY LOWLIFES:
|
|||
|
|
|||
|
PHYLISS SCHLAFFLY 618-462-5415
|
|||
|
G. GORDON LIDDY 301-567-3607
|
|||
|
DAVID ATLEE PHILIPS 301-365-2238
|
|||
|
PETER BOURNE 202-462-7266
|
|||
|
WILLIAM COLBY 301-320-4646
|
|||
|
RICHARD HELMS 202-686-1560
|
|||
|
BERNARD BARKER 305-266-2220
|
|||
|
L. PATRICK GRAY 203-535-1685
|
|||
|
|
|||
|
I am not too sure if these numbers are all still correct, these people might
|
|||
|
have moved since these were compiled. It is a little bit old. Oh well, have
|
|||
|
fun with them anyways...and remember...phone harassment is against the law!
|
|||
|
|
|||
|
One little address you might want to write to...
|
|||
|
|
|||
|
THE CROSS & THE FLAG
|
|||
|
P.O. BOX 27895
|
|||
|
L.A., CALIFORNIA 90027
|
|||
|
|
|||
|
Remember, this stuff is just informational, and the author of this file can not
|
|||
|
take responsibility for what the readers do with this information!
|
|||
|
|
|||
|
|
|||
|
This information was taken from the book GETTING EVEN 2.
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
"Commies" -- To the tune of "Fight For Your Right"
|
|||
|
by the Beastie Boys.
|
|||
|
|
|||
|
|
|||
|
Yeah! Boot it!
|
|||
|
|
|||
|
Turn your commie on, and it don't wanna go...
|
|||
|
Ask your mom for an ST, but she still says no...
|
|||
|
|
|||
|
You blow three power packs, and it still won't work...
|
|||
|
So you boot up Zaxxon like some kinda jerk...
|
|||
|
|
|||
|
You gotta fight, to get it right, on commies-----!
|
|||
|
|
|||
|
You saw your drive smokin' and you said no way...
|
|||
|
Some dude crashed your board and it's been spinnin' all day...
|
|||
|
|
|||
|
Those 1541's are such a drag...
|
|||
|
It just set fire to your best Commodore mag...
|
|||
|
|
|||
|
You gotta fight, to get it right, on commies-----!
|
|||
|
|
|||
|
<guitar solo here>
|
|||
|
|
|||
|
You're not leavin' this board unless you u/l k00l warez...
|
|||
|
I'll trace this call and I bet you'll be scared...
|
|||
|
|
|||
|
You're mom bust's in and says what that smell?
|
|||
|
Mommie don't worry my system's shot to hell...
|
|||
|
|
|||
|
You gotta fight, to get it right, on commies-----!
|
|||
|
|
|||
|
On commies--------!
|
|||
|
On commies--------!
|
|||
|
On commies--------!
|
|||
|
|
|||
|
Yeah!
|
|||
|
|
|||
|
This file brought to you by the Beastly Boyz.......
|
|||
|
Bellcon & The Surge
|
|||
|
5/87
|
|||
|
|
|||
|
Well, that was the first issue of the Mishandled Information Publication! If
|
|||
|
you would like to talk with any of the writers of this magazine, please call
|
|||
|
these fine BBS's:
|
|||
|
|
|||
|
TSD 24 HOURS 518/377-6487
|
|||
|
ANARCHIA 24 HOURS 518/869-6035
|
|||
|
|
|||
|
If you would like to submit an article for upcoming issues of MIP, please
|
|||
|
contact me on TSD or Anarchia, I am on them as The Fascist Plate.
|
|||
|
|
|||
|
I hope you have enjoyed reading the Mishandled Information Publication, if you
|
|||
|
have any comments or questions, contact me on the boards listed above.
|
|||
|
|
|||
|
The Fascist Plate
|
|||
|
|
|||
|
|