93 lines
3.3 KiB
Plaintext
93 lines
3.3 KiB
Plaintext
|
||
|
||
|
||
|
||
Space aborts, ^S pauses
|
||
|
||
|
||
|
||
=======================================
|
||
|
||
======= =======
|
||
|
||
======= HACKING TIPS #2 =======
|
||
|
||
======= =======
|
||
|
||
======= by Hoe Hopper =======
|
||
|
||
======= REBEL ALLIANCE CATSEND =======
|
||
|
||
======= (615) 942-6670 =======
|
||
|
||
======= =======
|
||
|
||
=======================================
|
||
|
||
|
||
|
||
|
||
|
||
1. When running hacking programs seeking phreaking codes, make it a practice
|
||
|
||
to start out with a number that is
|
||
|
||
approximately half way between the
|
||
|
||
highest and lowest possible numbers.
|
||
|
||
This will insure the greatest number
|
||
|
||
of 'hits' as well as avoid most of
|
||
|
||
the obvious 'trap' numbers. Trap
|
||
|
||
numbers are generally low numbers
|
||
|
||
where a hack program may begin.
|
||
|
||
Never start at the lowest and work
|
||
|
||
up. Far better to start higher....
|
||
|
||
|
||
|
||
2. Slow your hacking down. The object
|
||
|
||
is to obtain working codes and not
|
||
|
||
to discover every possible code.
|
||
|
||
Putting a delay loop in the hacker
|
||
|
||
is an extremely good idea since if
|
||
|
||
anyone is getting wary of your calls
|
||
|
||
they will be looking for you. If the
|
||
|
||
calls do not come in rapid order, it
|
||
|
||
is much more difficult to detect any
|
||
|
||
unusual activity.
|
||
|
||
|
||
|
||
3. Never reveal a code. Ever. To anyone. You risked your backside for them.
|
||
|
||
Don't be a chump and give them away!
|
||
|
||
|
||
|
||
4. NEVER USE A CODE THAT IS ON ANY BOARD EVER!!! This is the surest way I can
|
||
|
||
think of to get caught. If I were the security director, I would post 'trap numbers' on every loser board I could find. It is a sucker play for sure.
|
||
|
||
|
||
|
||
5. Rotate your stock. In one night, you
|
||
|
||
should capture four or five good
|
||
|
||
codes at a minimum. STOP HACKING!
|
||
|
||
Use these new codes for two weeks and then hack more codes. Use the codes
|
||
|
||
in rotation. This really makes it
|
||
|
||
hard to detect unauthorized use. Also it may in fact make the unauthorized
|
||
|
||
use go by unnoticed. For example,
|
||
|
||
few people use a telephone log book
|
||
|
||
and they simply don't notice a couple of calls that they didn't make. Any
|
||
|
||
business of any size falls prey to
|
||
|
||
this.
|
||
|
||
|
||
|
||
6. Keep written records to a minimum. It is impossible to prove you have the codes if you keep them in your head.
|
||
|
||
|
||
|
||
7. KEEP YOUR MOUTH SHUT. Really smart
|
||
|
||
people let others think they aren't
|
||
|
||
necessarily too bright. Lulls them
|
||
|
||
to sleep mentally. Don't tell every-
|
||
|
||
thing you know. If you do, then you
|
||
|
||
have lost you advantage. Blend into
|
||
|
||
the woodwork!
|
||
|
||
|
||
|
||
8. Your only friend is your computer.
|
||
|
||
Trust no one else. If you tell your
|
||
|
||
friends about your codes, you have
|
||
|
||
put them and yourself in danger of
|
||
|
||
being caught, and under pressure
|
||
|
||
they may reveal where the codes
|
||
|
||
came from and that is why you don't
|
||
|
||
talk EVER period.
|
||
|
||
|
||
|
||
9. Move around. By that, I mean don't
|
||
|
||
always use the same service. Metro
|
||
|
||
today, Sprint tommorow.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
By following these simple guidelines,
|
||
|
||
you sould never have a problem. The onlytwo ways to get caught are by 1) runningyour mouth and 2) being nabbed by newer
|
||
|
||
improved hardware.
|
||
|
||
|
||
|
||
=======================================
|
||
|
||
R.A. PUBLICATIONS [April 12, 1985]
|
||
|
||
=======================================
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
[Now on volume 27] [?/Help]: |