1432 lines
73 KiB
Plaintext
1432 lines
73 KiB
Plaintext
|
||
|
||
T t 07-01-92
|
||
h h Issue #1
|
||
e e of
|
||
|
||
ßßßßß ßßßßß ßß ßß ßßßßßß ßßßßßß ßßß ßß ßßßßß
|
||
ßß ßß ßß ßß ßß ßß ßß ßßßß ßß ßß ßß
|
||
ßßßßßßß ßßßßß ßßßßß ßß ßß ßß ßß ßß ßßß
|
||
ßß ßß ßß ßß ßß ßß ÜÜ ßß ßß ßßßß ßß ßß
|
||
ßß ßß ßßßßß ßß ßß ßßßßßß ßÛ ßßßßßß ßß ßßß ßßßßß
|
||
s p n n
|
||
s r o f
|
||
o e w o
|
||
c a l m
|
||
i d e a
|
||
a d t
|
||
t o g i
|
||
i f e o
|
||
o n
|
||
n &
|
||
|
||
f
|
||
o
|
||
r
|
||
|
||
|
||
|
||
|
||
. .
|
||
.......................
|
||
........ Index ........
|
||
.......................
|
||
. .
|
||
1. Opening Comments...
|
||
2. What is ASKI?
|
||
3. -=ðCrosstalkð=-
|
||
4. Hackers Manifesto: The rest of the story...
|
||
5. Cryptography, Government and Privacy: Part I
|
||
6. Real Hackers Unite!
|
||
7. FCC ATTACKS MODEMERS! PHIGHT BACK NOW!!
|
||
8. Box of the Month: The Silver Box <--
|
||
9. Virus Corner | Anarchist Section
|
||
10. Phun at OM!! <--
|
||
11. Reviews
|
||
12. News from Cyberspace
|
||
13. Coming Soon
|
||
14. Laid Her
|
||
------------------------------------------------------------------------------
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
ASKI Phile #1
|
||
Opening comments from
|
||
the editors of ASKInews!!
|
||
|
||
Well, this is the first issue of ASKInews and we hope you guys
|
||
enjoy it. This magazine is dedicated to providing information of interest
|
||
to the online community. Some of this information can be used for illegal
|
||
purposes, but it also teaches you something about telecomputing. We have
|
||
made sure that this mag is clear of codes, credit card numbers, and other
|
||
illegal information in the hopes that this info will be used positively,
|
||
to help the online community, instead of furthering it's destruction.
|
||
LONG LIVE FREEDOM OF SPEECH!!!!!!!!!!!!!!!!!!!
|
||
|
||
ASKI Phile #2
|
||
What is ASKI?
|
||
|
||
ASKI is an organization that has been formed to help fight for freedom
|
||
of speech on electronic bulletin board systems. Public information systems
|
||
provide the ultimate medium for communications. Any piece of information can
|
||
be spread, uncensored, across the globe, in a matter of seconds. This power
|
||
scares many people, people who don't want the truth heard and people who
|
||
believe they have the right to control what everyone else sees, hears, and
|
||
thinks. They have tried numerous times to control or destroy the BBS industry.
|
||
Just when we think it is over, a new group of self-righteous SOBs attack us
|
||
again. ASKI has been formed to protect the rights and interests on the online
|
||
community and to spread information that has been suppressed by those who fear
|
||
the power of knowledge. Join ASKI today, and help us fight for freedom in this
|
||
information age! Once we have the membership information worked out we will be
|
||
accepting members. We will have regular meetings where BBSers can meet in
|
||
person and socialize. Also, when needed, we can discuss various actions that
|
||
need to be taken to protect our rights. We hope you enjoy the first issue of
|
||
ASKInews and we hope you join us in our fight for freedom!!
|
||
|
||
ASKI Phile #3
|
||
-=ðCrosstalkð=-
|
||
|
||
This is the letters section. Every month we will be printing letters
|
||
from readers and trying to answer their questions or commenting on their
|
||
views. Are you against what we are doing here? WHY? Do you support us? WHY?
|
||
Is there something you would like to see here or something you would like our
|
||
group to work on? WRITE IN!!!! We are accepting not only letters, but also
|
||
articles, news, and rumors. Write a news note, write a letter, write an
|
||
article, send anything in!!! Voice your opinions and spread what you have
|
||
learned!! We can be reached on The Ninja's Domicile (370-8805) or any of
|
||
the ShadowNET boards (send messages to The White Ninja). WRITE IN TODAY!
|
||
|
||
ASKI Phile #4
|
||
The Hackers Manifesto
|
||
|
||
|
||
The Hacker's Manifesto is a very famous file in which The Mentor
|
||
expressed his anger after his arrest. However, most people STILL don't
|
||
understand. This article will be an attempt to expand on The Mentor's
|
||
comments and respond to arguments the IS community has brought up about the
|
||
file. But first:
|
||
The Hackers Manifesto
|
||
By: The Mentor
|
||
|
||
It's all over the papers! Another one got caught today!
|
||
|
||
"TEENAGER ARRESTED IN COMPUTER CRIME SCANDAL"
|
||
|
||
"HACKER ARRESTED AFTER BANK TAMPERING"
|
||
|
||
Damn Kids...They're all alike!
|
||
|
||
But did you, in your three-piece psychology and 1950's
|
||
techobrain, ever take a look behind the eyes of the hacker? Did
|
||
you ever wonder what made him tick? What forces shaped him?
|
||
What may have molded him?
|
||
|
||
I am a HACKER, enter my world...
|
||
|
||
Mine is a world that begins with school. I'm smarter than
|
||
most of the other kids. This crap they teach us bores me...
|
||
|
||
Damn Underachiever...They're all alike!
|
||
|
||
I'm in high school. I've listened to teachers explain for
|
||
the fifteenth time how to reduce a fraction. I UNDERSTAND IT!
|
||
"No, Ms. Smith, I didn't show my work. I did it in my head..."
|
||
|
||
Damn Kid...Probably Copied it...They're all alike!
|
||
|
||
I made a discover today. I found a COMPUTER! Wait a second,
|
||
this is COOL! It does what I want it to. If it makes a mistake,
|
||
it's because I screwed it up! Not because it doesn't like me...
|
||
or feels threatened by me... or thinks I'm a smart ass... or
|
||
doesn't like teaching and shouldn't be here.
|
||
|
||
Damn Kid...All He Does is Play Games...They're all alike!
|
||
|
||
And then it happened! A door opened to a world! Rushing
|
||
through the phone line like heroin through an addict's veins, an
|
||
electronic pulse is sent out, a refuge from the day-to-day
|
||
incompetencies is sought. A board is found....
|
||
|
||
"This is it...This is where I belong...I know
|
||
everyone here...Even if I've never met them,
|
||
never talked to them, may never hear from them
|
||
again...I know you all..."
|
||
|
||
Damn Kid...Tying Up the Phone Line...They're all Alike...
|
||
|
||
You bet you ASS we're all alike. We've been spoon-fed baby
|
||
food at school when we hungered for steak. The bits of meat that
|
||
you did let slip through were pre-chewed and tasteless. We've
|
||
been dominated by sadists, or ignored by the apathetic. The few
|
||
that had something to teach found us willing pupils, but those
|
||
few are like drops of water in the desert.
|
||
|
||
This is our world now... The world of the electron and the switch,
|
||
the beauty of the baud. We make use of a service already
|
||
existing without paying for what could be dirt-cheap if it wasn't
|
||
run by profiteering gluttons, and you call us criminals. We
|
||
explore...And you call us criminals. We seek after
|
||
knowledge...And you call us criminals. We exist WITHOUT skin
|
||
color, without nationality, without religious bias...And you call
|
||
us criminals. You build atomic bombs, you wage wars, you murder,
|
||
cheat, and lie to us and try to make us believe it's for our own
|
||
good...Yet we're the criminals.
|
||
|
||
Yes, I am a criminal. My crime is that of curiosity. My
|
||
crime is that of judging people by what they say and think, not
|
||
what they look like! My crime is that of outsmarting you!
|
||
Something that you will never forgive me for...
|
||
|
||
I am a hacker, and this is my manifesto. You may stop this
|
||
individual, but you can't stop us all! After all, we're all
|
||
alike.
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
The Mentor is not the first person to criticize our nations school
|
||
system, and he will not be the last! Everyone seems to agree that the current
|
||
system is not working. It used to be good, but too many teachers got tenure
|
||
and too many administrators got sick of closely examining students to choose
|
||
what course levels they should be taking. So, in the name of progress of
|
||
course, the school system was destroyed. At my school there are 2 to 4 levels
|
||
of courses for students who are at or below the average, however there is NEVER
|
||
more than 2 levels for those who are above the average, and these courses are
|
||
HARD to get into. They just got rid of an English level that consisted of
|
||
800 above average students. All 800 are being moved to a level below there
|
||
intelligence or a level that will be to difficult for them to handle. In the
|
||
name of progress. Bull shit! It was done to make our administrator's job
|
||
easier!! Now we have 800 kids who, if they where not bored enough with school,
|
||
are now even more sick of it, either to much pressure of too little challenge.
|
||
OOOHHH, YES we fought it! We signed petitions and gave speeches and got
|
||
parents on our side, but we are just kids! What do we know? We are stupid
|
||
idiots who can't drive, can't vote, can't even get medical assistance without
|
||
parental consent and do not deserve to voice our worthless opinions!!! No one
|
||
listened, and everyone lost.
|
||
There are a group of kids in EVERY school who are advanced computer
|
||
students. How does someone under 18 get to this level? With years of study and
|
||
experimentation that is often illegal. Copyrights, patents, licence agreements,
|
||
and anti-piracy laws are all broken, but it is all worth it. The student
|
||
becomes a computer systems and programming expert!! Most people refuse to
|
||
believe that one of "today's kids" would spend the time and work required just
|
||
for the sake of learning. They tell us we are playing games or that we have
|
||
some ulterior motive, and they listen to little news stories about hackers.
|
||
The kids turn to their schools for more information, but most find an
|
||
environment somewhat like my school. My school has more than 50 computers, do
|
||
you think there is even one programming course!? NO!! Just a bunch of worthless
|
||
courses on out of date word processors and old spreadsheet programs. What about
|
||
colleges? Yes, colleges do offer some courses to high school students, but they are
|
||
little better than the high school's. And the universities will not allow us
|
||
access to their systems!! You have to be a student there! Another option gone.
|
||
Where should these kids turn for information?? Businesses? I don't care how
|
||
many IS managers tell you they would hire a high school student, IT NEVER
|
||
HAPPENS!!!!!!! Who would hire a kid with no high school diploma, not to mention
|
||
a college degree, no work experience, and no computer knowledge other than what
|
||
he has taught himself! Most people think the kid is lying when he describes
|
||
the experience he has. They would not think twice about hiring a person like
|
||
this!! A person with this kind of background would have a hard time getting a
|
||
job at Mcdonald's!! These kids are left with no other option. They must again
|
||
break the law in order to gain the knowledge everyone seems to deem them
|
||
unworthy of having.
|
||
They call us "The first generation that will do worse than their
|
||
parents!" The "Baby Boomers" came up with this Bull Shit. Not surprising. The
|
||
generation that has spent the last ten years calling itself the best generation
|
||
that has ever been has now proclaimed itself the best generation that WILL EVER
|
||
BE!!!!! What does this statement mean?? Many people think that it means that
|
||
our generation will not be able to advance technology as far as they have, or
|
||
that technology will stop here. Not true. Many people believe think that we
|
||
will destroy the earth because we will not be able to keep up with our parents.
|
||
Not true. Many people believe that our generation is somehow collectively less
|
||
intelligent than theirs. This, also, is not true. What DOES this statement
|
||
mean? It means that the average student today will learn less in school than
|
||
the average student 30 years ago. Who get's the blame for this? WE DO!
|
||
Although they will not accept our opinions on the school system, they blame
|
||
US for it's fallacies! They tell us we are lazy, that all we want to do is go
|
||
out with friends or play "games" on the computer. They say we all go out at
|
||
night at commit crimes, do drugs, steal thousands of dollars from companies
|
||
and the government. They do not even attempt to learn the truth, the just
|
||
form a biased opinion and go with it. Here we have a group of kids who want to
|
||
learn, but their schools deny them the information they seek and no one else is
|
||
willing to provide it. So, they take things into their own hands and steal the
|
||
knowledge require. In return they are arrested and prosecuted. If they where
|
||
allowed to learn they would be able to use this information to help the
|
||
computer community, but instead they join the thousands of people crowding
|
||
up our nation's prisons. Sad. It is sad when a nation forces their children to
|
||
break the law in order to learn.
|
||
|
||
ASKI Phile #5
|
||
|
||
Cryptography, Government and Privacy: Part I
|
||
|
||
The Cryptography, Government and Privacy section will be a continuing
|
||
section in ASKI's newsletters. One can only obtain pure privacy by
|
||
cryptography in this electronic community we live in. One day we might have
|
||
to send you the newsletter cryptographed!
|
||
Since the beginning of time we, as humans, have made equalizers to fight
|
||
off the oppression. We have invented the constitution vs. government,
|
||
radar detectors vs. radar, and cryptography vs. violation of privacy to
|
||
name a few. The government certainly uses technology to oppress, a good
|
||
example: The Bomb. The evil lies not in the tool but the wielder
|
||
of the tool.
|
||
We installed in the United States the Constitution to limit what the
|
||
government can do to Americans. We have invented radar detectors because
|
||
the government uses radar for military and non-military use. If the government
|
||
can make the anti-radar SR-71 Blackbird then surely Ford, for example, can make
|
||
an anti-radar car. The reason Ford has not made such a car: the same
|
||
governmental oppression that is destroying the BBS community. Now "We the
|
||
People" are fighting back with cryptography.
|
||
Last year, the Federal Bureau of Investigation (FBI) proposed to congress
|
||
a stipulation in the crime-bill package would require vendors to provide
|
||
decrypting technology with on all encrypted data sent over U.S. networks. But,
|
||
Congress did drop that proposal. Why did the FBI propose such measures? So they
|
||
could eavesdrop on everything we say and thus increase their control over our
|
||
lives!!
|
||
There has been intense criticism and debate ever since the Digital
|
||
Encryption Standard (DES), based on an algorithm developed by IBM, was approved
|
||
by the National Bureau of Standards. The National Security Agency made
|
||
modifications to the algorithm that seemed weaken it. Did our government
|
||
weaken the standard so a mass parallel processor could break it? DES can be
|
||
broken if all of the 2^56 (said 2 to the 56th power) possible keys are
|
||
attempted. Biham and Shamir have succeeded in breaking of certain
|
||
implementations of DES using only 2^47 encryption steps. This is a
|
||
big strike against the DES!
|
||
I personally use an encrypter with an enhanced version of DES.
|
||
The pseudo-random number generator used has a period of greater
|
||
than 1.98E+233 or 1.98 times ten raised to the 233th power.
|
||
By comparison the National Bureau of Standards DES algorithm
|
||
has a period less than 7.21E+16 (or about 2 to the 56th power).
|
||
It is illegal for one to use DES outside of the United States. This
|
||
violates the National Security Act. If you want your information to be unseen
|
||
by prying eyes then you can pick up a copy of my encrypter on an ASKI support
|
||
BBS. I HIGHLY suggest it. I recommend that you also download the password
|
||
program. This program will randomly pick a password that will chose over 3
|
||
trillion different passwords. It is great for making encryption keys!!
|
||
In 1976 Diffi and Hellmand changed cryptography. They produced the
|
||
Public-key Cryptography (PKC). This has two keys, one public and one private.
|
||
It is almost impossible to deduce the private key from the public key. A
|
||
person with the public key can only encrypt a message - while as a person with
|
||
the private key can decrypt it. The PKC has implications far beyond
|
||
simple data encryption. It allows people to do things securely over the
|
||
computer networks that are impossible any other way.
|
||
I will go into more detail in the next issue about the key system and RSA
|
||
algorithm in the next issue, I will also give an example of a PKC program.
|
||
The best way to have something sent these days is have it compressed then
|
||
cryptographed and finally CRC checked. This takes care of a couple of matters:
|
||
size, encryption, validation. This bugs the hell out of ALL government
|
||
agencies. So DO IT! You can also encrypt your voice communications!
|
||
People don't trust our government and local phone company. We can
|
||
trust our phone company to have our phones working, most of the time, but after
|
||
their endless price and censorship wars against the online community, that is
|
||
ALL we can trust them for!! And we can trust our government will intercept
|
||
our information. There were only 2000 court authorized wire tapping incidents
|
||
last year. It is illegal for anyone to tap any line without a court order, yet
|
||
there is a HUGE wire tapping industry! How can an entire industry be supported
|
||
on 2000 sales a year. Quite simply, it can't. The government and other parties
|
||
ARE tapping people's lines illegally! THERE IS NO QUESTION ABOUT IT!! It is sad
|
||
that we live in this type of society. Ever since the Roman times we have been
|
||
scrambling information. This shows how important your information is to
|
||
someone else.
|
||
At the Domicile you can find the File encrypter, Password Generator,
|
||
File Verification CRC and Compression Utilities that will protect you against
|
||
outsiders! Long live the Freedom of Speech! (They will be up about Aug 1st.)
|
||
|
||
|
||
ASKI Phile #6
|
||
Real Hackers Unite
|
||
|
||
|
||
This Phile was submitted by Chris Faulkner and is targeted towards REAL
|
||
Hackers, those who want to learn. Today there are too many rodents, who
|
||
are in it just to be cool and to get a good reputation, and too many
|
||
Cyberpunks who are out to crash just about everything they can get their
|
||
hands on. No one seems to understand that real hackers are not out to
|
||
destroy the world, just to learn about systems and gain information that
|
||
today's decrepit school system doesn't provide. For those people, this is
|
||
how to go about it.
|
||
|
||
|
||
Message #1716 - ASKI (Private) (Received)
|
||
Date: 07-02-92 00:44
|
||
From: Dr.Arkane Madness
|
||
To: The White Ninja
|
||
Subject:: Text Phile
|
||
-------------------------------------------------------------------------------
|
||
@PID: RA 1.11 2890
|
||
@MSGID: 10:615/5 4ff0eef0
|
||
|
||
Hackers Unite
|
||
-------------
|
||
|
||
Submitted by: Chris Faulkner
|
||
|
||
The information in this text is for your safety and the safety of
|
||
others, and if there is something you do not like in this file, please take it
|
||
as an opinion and carry on.
|
||
|
||
From my point of view, I'm starting to notice a new "breed" of hackers
|
||
uprising from the ashes of the old age(1980-1986 era). And I think the time
|
||
is a little late for most, but just right for the people interested. I will
|
||
spend most time in this article not telling you about me, but about my
|
||
experiences and hope that this article will help you understand how enormous
|
||
this is and can be.
|
||
|
||
Back in the old era, you had your hacking groups,clubs,etc. A small
|
||
band of computer renegades, not actually tyrants, but kids wanting to learn,
|
||
investigate, and try new and exciting things. You could rate these people to
|
||
being Secretive to Instigator. Meaning, you had your hackers that worked
|
||
arcanely and then there were your "Rumor Starters". Which is
|
||
fine......but...the fact is now, in this era, a new "breed" of hackers has
|
||
arisen, and the thing about it is, is that now, it's harder to do things than
|
||
it was 6 years ago.
|
||
|
||
Things have not gotten out of hand.....yet. But then you have people
|
||
that listen, and the other side thinking they know. It doesn't pay to think
|
||
anymore. I, on the otherhand, have gotten away with just about murder on the
|
||
computer. Some I will not say about. But I watched my back, kept my mouth
|
||
shut, and listened to everyone else that was more knowledgeable.
|
||
|
||
With this in mind, instead of "Hackers" working against each other, work for
|
||
each other. And also, I present to you some simple guidelines, that are in
|
||
no way complete, but are common sense to remind you of what you are doing;
|
||
|
||
1> A good hacker never tells his secrets
|
||
2> A good hacker never boasts or brags
|
||
3> A good hacker always watches his back and/or someone watches his back
|
||
4> A good hacker never sequentially war dials (grin)
|
||
5> A good hacker never uses his own phone line
|
||
6> A good hacker uses his mind, not his computer
|
||
7> A good hacker never hacks something worthless
|
||
8> A good hacker has a "crew"
|
||
9> A good hacker always has backups
|
||
10> A good hacker never writes anything down on paper or electronically.
|
||
|
||
Consider these your "10 Commandments". Although they are not complete, abide
|
||
by this, common sense, and you'll be well on your way.
|
||
|
||
|
||
|
||
ASKI Phile #7
|
||
|
||
Did you know there are four other tones on the phone. The function of a
|
||
silver box is to bring you the four extra DTMF (dual-tone multi-frequency)
|
||
tones that are not used normally. It is easy to generate these DTMF tones
|
||
because the standard 16 tone format is used in many popular DTMF tone
|
||
generator's IC's. These DTMF tones are known as A, B, C, and D. This article
|
||
shows two ways to modify telephone equipment on the market to make silver box
|
||
tones. Schematics are also provided which illustrate the modifications
|
||
required in the construction of a silver box.
|
||
You may already own a silver box! The DTMF encoder IC inside your
|
||
touch tone phone may be capable of producing silver box tones. If your
|
||
phone is a newer touch tone and does NOT have features such as call storage
|
||
or redial, the modifications will work if the chip is right.
|
||
There are many DTMF chips but the one you want is for phones using
|
||
the 16 pin TCM5087 tone encoder. This chip is designed to generate
|
||
eight different tones used in dual tone telephone dialing systems.
|
||
Figure 1 and 2 represent a list of tones and associated frequencies.
|
||
|
||
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄ¿ ÚÄÄÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³ ³ Freq ³ ³ ³ ³
|
||
³ Tone ³ (Hz) ³ ³ ³ 1 2 3 4 ³
|
||
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄ´ ÃÄÄijÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
|
||
³ Row 1 ³ 697 ³ ³ 1³ 1 ³ 2 ³ 3 ³ A ³
|
||
³ Row 2 ³ 770 ³ ³R ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
|
||
³ Row 3 ³ 852 ³ ³ 2³ 4 ³ 5 ³ 6 ³ B ³
|
||
³ Row 4 ³ 941 ³ ³O ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
|
||
³ Column 1 ³ 1209 ³ ³ 3³ 7 ³ 8 ³ 9 ³ C ³
|
||
³ Column 2 ³ 1336 ³ ³W ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
|
||
³ Column 3 ³ 1477 ³ ³ 4³ * ³ 0 ³ # ³ D ³
|
||
³ Column 4 ³ 1633 ³ ³ ³ ³ ³ ³ ³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÙ ÀÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
|
||
Figure 1 Figure 2
|
||
|
||
The 5087 works when a key is pressed, it connects two pins on the IC
|
||
together. One is a row pin and one is a column pin. For instance, if a
|
||
6 is pressed, the row 2 pin is connected to the column 3 pin on the 5087.
|
||
This causes a 770Hz and a 1477Hz tone to be emitted. For normal use,
|
||
the column 4 pin, which is used to make the A,B,C,and D tones, is unused.
|
||
Before you start this simple modification you must have a phone with
|
||
a 5087 chip. In the new trimline style phones this chip is located in
|
||
the center of the larger printed circuit board (PCB) in the hand set.
|
||
The chip should have the numbers 5087 on the back along with some other
|
||
numbers, so it will read something like "T95087" or "TCM5087".
|
||
Once you have identified the chip, you must gain access to the solder
|
||
side of the PCB.
|
||
The four tones are enabled by installing three wires and a switch.
|
||
First, cut the trace on the PCB going from pin 5 of the 5087 to the keypad.
|
||
Use a razor blade or a small file. (On an IC the first pin is the one in
|
||
the lower left corner when you hold the chip so the letters are right side up.
|
||
There may also be a dot on the case above pin 1) Next, solder separate
|
||
wires to pin 5, pin 9, and to column 3 of the keypad. This is the point
|
||
on the keypad that was connected to pin 5 of the IC before you cut the trace.
|
||
See Figure 3.
|
||
|
||
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³ TCM5087 ³
|
||
ÚÄ¿ ÚÄ¿ ÚÄ¿ 14 ³ ³
|
||
³1ÃÄij2ÃÄij3ÃÄÄÄÄÄÄÄÄÄÄ´Row 1 ³
|
||
ÀÂÙ ÀÂÙ ÀÂÙ ³ ³
|
||
³ ³ ³ ³ ³
|
||
ÚÁ¿ ÚÁ¿ ÚÁ¿ 13 ³ ³
|
||
³4ÃÄij5ÃÄij6ÃÄÄÄÄÄÄÄÄÄÄ´Row 2 ³ 16
|
||
ÀÂÙ ÀÂÙ ÀÂÙ ³ Tone ÃÄÄÄÄÄÄÄÄÄ
|
||
³ ³ ³ ³ Out ³
|
||
ÚÁ¿ ÚÁ¿ ÚÁ¿ 12 ³ ³
|
||
³7ÃÄij8ÃÄij9ÃÄÄÄÄÄÄÄÄÄÄ´Row 3 ³
|
||
ÀÂÙ ÀÂÙ ÀÂÙ ³ ³
|
||
³ ³ ³ ³ ³
|
||
ÚÁ¿ ÚÁ¿ ÚÁ¿ 11 ³ ³
|
||
³*ÃÄij0ÃÄij#ÃÄÄÄÄÄÄÄÄÄÄ´Row 4 ³
|
||
ÀÂÙ ÀÂÙ ÀÂÙ 9 ³ ³ Figure 3
|
||
³ ³ ³ /oÄÄÄÄÄÄÄÄ´Col 4 ³
|
||
³ ³ Ào 5 ³ ³ Note switch between
|
||
³ ³ 4 oÄÄÄ´Col 3 ³ pins 5 and 9
|
||
³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´Col 2 ³
|
||
³ 3³Col 1 ³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
On a trimline type phone it is easiest to make all connections to the solder
|
||
side of PCB. Be sure you have identified the pins on the IC correctly before
|
||
you start soldering. Now, solder the wire from the keypad to the middle tab of
|
||
an SPDT switch. Solder the wire from pin 9 to one side of the switch and the
|
||
wire from pin 5 to the other. The modification is now complete. For normal
|
||
DTMF tones the switch simply connects the keypad to pin 5, the column 3 pin.
|
||
For silver box tones, the switch connects the previously unused pin 9, the
|
||
column 4 pin, to the keypad. The keys 3, 6, 9, and # now become A, B, C, D
|
||
respectively.
|
||
Before you put everything back together double-check your work. Toggle
|
||
the switch and make sure all the tones work. Make sure the wires you
|
||
installed don't cause any shorts. Lastly, find a place to securely install
|
||
the switch.
|
||
Another modification if the above modifications won't work on any of your
|
||
phones you can do on a product sold by Radio Shack. Their "economy pocket tone
|
||
dialer" ($15.95) uses a 5087 chip and can be converted for silver box tones.
|
||
The same product can be used to make a nice red box, more on this in the
|
||
future! The modification uses three wires and a switch, as before. Once
|
||
completed, you will have a nice portable 16 tone DTMF generator.
|
||
The first step of this modification is to remove the PCB. Carefully
|
||
pop off the back of the unit and remove the power switch and the six screws
|
||
in the PCB. You may also want to remove the keypad and the keys. Now look
|
||
at the keypad side of the PCB (not the component side). Cut the trace
|
||
going from pin 5 of the IC column 3 of the keypad. This is the most
|
||
outermost of the three traces going from the IC to the keypad. Now the switch
|
||
must be installed. Find a tinned round pad marked C3 in the upper left of the
|
||
component side of the PCB and solder a wire from here to the middle tab
|
||
of an SPDT switch. This switch must be a very small toggle or slide switch.
|
||
Also on the component side, solder a wire from pin 9 to one side of the switch
|
||
and a wire from pin 5 to the other. As before, be sure to identify the pins
|
||
correctly. There is room to install a switch inside the enclosure in the
|
||
gap to the left of the diode at the top of the PCB. As usual check for
|
||
shorts caused by the wires or the switch. The switch will operate exactly
|
||
as described in the previous modification.
|
||
Now what can you do with a silver box? A silver box isn't a toll avoidance
|
||
device like a blue or red box; it is another tool with which to explore
|
||
the phone system. And that means you have to do the experimenting. Try
|
||
beeping silver box tones into voice messages systems, cellular VMS, test
|
||
exchanges, loops, pay phones, 10NXX and 950 numbers, answering machines,
|
||
MILnet ports, etc... Try a silver box tone or two down your local exchange or
|
||
through different long distance carriers. If you experiment and keep records
|
||
you will discover something interesting.
|
||
Call directory assistance (eg. XXX-555-1212). While it is ringing,
|
||
hold down the "D" key on your silver box. This will disconnect you from
|
||
the operator and put you into the ACD (Automated Call Distributor). If
|
||
you are successful you will hear a pulsing dial tone. From here you have
|
||
ten selections to choose from your telephone's keypad.
|
||
1. Rings the toll test board.
|
||
2. Sometimes dead circuit, sometimes milliwatt test.
|
||
3. Sometimes milliwatt test, sometimes 1000hz tone.
|
||
4. Dead Circuit.
|
||
5. Dead Circuit.
|
||
6. Loop - low end.
|
||
7. Loop - High end.
|
||
8. 600 ohm termination.
|
||
9. Dead Circuit.
|
||
10.Dead Circuit.
|
||
The loop is very useful. To use the loop, have someone call the same
|
||
directory assistance number you will be using and press 6, which will put
|
||
him on the low side of the loop. You then call the same number and press
|
||
7 for the high end of the loop and you are connected!!
|
||
Next month we will have an in-depth article on Beige Boxes! Tell us about
|
||
anything you find with the Silver Box, everyone will love the info!!
|
||
|
||
|
||
|
||
|
||
|
||
ASKI phile #8
|
||
FCC ATTACKS MODEMERS!
|
||
|
||
|
||
|-------- /------------
|
||
| / /----------
|
||
| | / -- THE FCC HAS ATTACKED THE MODEM COMMUNITY!!
|
||
|------------| | | |
|
||
| | | -- - --
|
||
| | | | | We must phight back!!
|
||
| | \ --
|
||
| \ \----------
|
||
| \------------
|
||
|
||
---------------------------------------------------------------------------------
|
||
|
||
In a move that has shocked the modem community, the FCC has launched
|
||
another price battle against the SysOps!!! New rules will increase the
|
||
telephone costs for "information services providers" by 300%!!!!!! The
|
||
following are 3 files downloaded from Compuserve concerning this situation. It
|
||
is unclear from these files whether these new rules will affect only online
|
||
services, online services and pay BBSs, or ALL BBSs, but whatever the case, I
|
||
would recommend sending in the letter below! State that you are a member of
|
||
ASKI at the end of your letter whether you are one or not. We need to act fast
|
||
on this, so there is no time to round up some members and make a formal members
|
||
only action against the FCC. Hopefully we will defeat this ruling before it
|
||
comes into effect.
|
||
|
||
PHILE #1--
|
||
|
||
FCC ACCESS CHARGES(FREE)
|
||
|
||
THE FCC IS ONCE AGAIN CONSIDERING ACCESS CHARGE PROPOSALS THAT COULD
|
||
INCREASE COMPUSERVE'S COSTS FOR LOCAL ACCESS
|
||
|
||
|
||
In July 1991, the Federal Communications Commission adopted rules
|
||
which could increase by up to 300 percent the price of local
|
||
telephone lines which employ new network features and which are used
|
||
by information service companies like CompuServe to provide its
|
||
services to customers. In addition, at least one FCC Commissioner
|
||
recently suggested that the Commission likely would reexamine
|
||
whether various "modem fees" or "modem taxes" ought to be imposed on
|
||
all information services. Consideration of any proposed "modem
|
||
tax" would revive proposals made back in 1987 and 1989 to impose
|
||
usage-sensitive common carrier-type access charges on information
|
||
service companies. It is important that you understand the genesis
|
||
of the FCC's latest rules, and how you can help to fight back.
|
||
|
||
THE FCC'S PRICE INCREASE PROPOSAL WAS ORIGINALLY DEFEATED IN 1987
|
||
THANKS TO THE EFFORTS OF COMPUSERVE MEMBERS LIKE YOU
|
||
|
||
The ability of CompuServe to offer advanced information services to
|
||
its members on a reasonably-priced basis is dependent upon being
|
||
able to obtain cost-based access to local telephone lines. To
|
||
date, information service companies have been able to use
|
||
non-usage- sensitive local business lines, obtained from the local
|
||
telephone company's state tariffs, for distributing their on-line
|
||
information services to customers. Under this arrangement,
|
||
CompuServe has been able to provide its customers with hundreds of
|
||
services at affordable prices that promote widespread usage.
|
||
|
||
However, you may recall that in 1987 the FCC issued a proposal
|
||
which, if adopted, would have required information service providers
|
||
(ISPs) like CompuServe to abandon their flat-rated, state-tariffed
|
||
access arrangements. Instead, ISPs would have been required to pay
|
||
usage- sensitive common carrier access charges, which were
|
||
originally designed solely to be paid by long distance companies.
|
||
After a massive letter writing campaign by CompuServe members, the
|
||
FCC decided not to adopt its carrier access charge proposal.
|
||
|
||
WHY YOUR HELP IS NEEDED NOW
|
||
|
||
CompuServe and other information service providers have filed
|
||
petitions with the FCC asking the agency to reconsider its July 1991
|
||
access charge decision. Congress also may consider legislation
|
||
shortly which would prevent the FCC from imposing usage-sensitive
|
||
carrier access charges on information providers as a condition of
|
||
obtaining new network features.
|
||
|
||
CompuServe believes that cost-based access to advanced telephone
|
||
network functionalities and features will be crucial in bringing the
|
||
"Information Age" to all consumers. Members like you can help
|
||
assure that the federal government does not impose what in effect
|
||
are enormous financial penalties on information service providers
|
||
and their members simply for attempting to use advanced network
|
||
functionalities and services.
|
||
|
||
We have drafted a suggested letter to various United States Senators
|
||
which objects to the FCC's new access charge rule and any new "modem
|
||
tax" proposal, and asks the Congress to pass legislation which would
|
||
once and for all prevent the FCC from imposing any usage-sensitive
|
||
common carrier access charges on information service providers.
|
||
Please write to the indicated members of Congress, and send copies
|
||
to FCC Chairman Alfred Sikes and the other FCC Commissioners. With
|
||
your help, we can convince the FCC to change its mind regarding new
|
||
ONA access charge rules which would only hurt the ability of
|
||
CompuServe to provide consumers with advanced information services
|
||
at reasonable prices.
|
||
|
||
PHILE #2--
|
||
|
||
|
||
FCC ACCESS CHARGES(FREE)
|
||
|
||
Please note that it is important for you to personalize your letter
|
||
as indicated. Your message will be more effective if it is not
|
||
perceived as simply a form letter, but instead gives your individual
|
||
reason for opposing modem fees.
|
||
|
||
SUGGESTED LETTER TEXT
|
||
|
||
Dear Senator _____________:
|
||
|
||
I have read that an FCC Commissioner has stated that the
|
||
FCC may look once again at whether the FCC should require
|
||
CompuServe and other information services to pay usage-sensitive
|
||
carrier access charges or "modem fees" for the local telephone
|
||
lines they use to distribute their services to customers. If
|
||
such higher fees for using local telephone lines were to be
|
||
imposed and passed on to information service subscribers, this
|
||
likely would have the effect of severely curtailing the use of
|
||
information services just as the mass market for such services
|
||
is beginning to develop.
|
||
|
||
I urge you to pass legislation which would prevent the
|
||
imposition of any new usage-sensitive carrier access charges or
|
||
"modem fees" on information services. The legislation also
|
||
should allow CompuServe and other information service providers
|
||
to use new and more efficient technologies without having to
|
||
become subject to higher access charges.
|
||
|
||
[At this point:
|
||
|
||
State that you use CompuServe and other information
|
||
services and describe how you use them;
|
||
|
||
State that you will curtail your use of information
|
||
services if the FCC's access charge rules cause price
|
||
increases.]
|
||
|
||
Thank you for your consideration.
|
||
|
||
Sincerely,
|
||
|
||
|
||
PHILE #3--
|
||
|
||
|
||
FCC ACCESS CHARGES(FREE)
|
||
|
||
ADDRESS INFORMATION FOR RECIPIENTS
|
||
|
||
The letter should be sent to the following members of the Senate
|
||
Communications Subcommittee. A copy of the letter may also be sent
|
||
to Congressman Edward Markey, who is Chairman of the House
|
||
Telecommunications Subcommittee. In addition, a copy of the letter
|
||
should be sent to the FCC Commissioners.
|
||
|
||
Letters to Senate members may be addressed to:
|
||
|
||
The Honorable _________________
|
||
United States Senate
|
||
Washington, D.C. 20510
|
||
|
||
Senator Lloyd Bentsen
|
||
Phone: 202-224-5922
|
||
Fax: unpublished
|
||
|
||
Senator John Breaux
|
||
Phone: 202-224-4623
|
||
Fax: 202-224-4268
|
||
|
||
Senator Conrad Burns
|
||
Phone: 202-224-2644
|
||
Fax: 202-224-8594
|
||
|
||
Senator James Exon
|
||
Phone: 202-224-4224
|
||
Fax: unpublished
|
||
|
||
Senator Wendell Ford
|
||
Phone: 202-224-4343
|
||
Fax: 202-224-0046
|
||
|
||
Senator Albert Gore
|
||
Phone: 202-224-4944
|
||
Fax: 202-224-0580
|
||
|
||
Senator Slade Gorton
|
||
Phone: 202-224-3441
|
||
Fax: 202-224-9393
|
||
|
||
Senator Ernest Hollings
|
||
Phone: 202-224-6121
|
||
Fax: unpublished
|
||
|
||
Senator Daniel Inouye
|
||
Phone: 202-224-3934
|
||
Fax: 202-224-6747
|
||
|
||
Senator John Kerry
|
||
Phone: 202-224-2742
|
||
Fax: unpublished
|
||
|
||
Senator John McCain
|
||
Phone: 202-224-3004
|
||
Fax: 202-224-8938
|
||
|
||
Senator Bob Packwood
|
||
Phone: 202-224-5244
|
||
Fax: 202-224-2050
|
||
|
||
Senator Ted Stevens
|
||
Phone: 202-224-3004
|
||
Fax: 202-224-2354
|
||
|
||
Representative Markey
|
||
Chairman, Subcommittee on Telecommunications and Finance
|
||
U.S. House of Representatives
|
||
2133 Rayburn House Office Building
|
||
Washington, D.C. 20515
|
||
Phone: 202-225-2836
|
||
Fax: 202-225-8689
|
||
|
||
Chairman Alfred C. Sikes
|
||
Federal Communications Commission
|
||
1919 M Street, N.W., Room 814
|
||
Washington, D.C. 20554
|
||
Phone: 202-632-6600
|
||
Fax: 202-632-0163
|
||
|
||
Commissioner Andrew C. Barrett
|
||
Federal Communications Commission
|
||
1919 M Street, N.W., Room 844
|
||
Washington, D.C. 20554
|
||
Phone: 202-632-7116
|
||
Fax: 202-632-5168
|
||
|
||
Commissioner Ervin S. Duggan
|
||
Federal Communciations Commission
|
||
1919 M Street, N.W., Room 832
|
||
Washington, D.C. 20554
|
||
Phone: 202-632-6996
|
||
Fax: 202-632-5171
|
||
|
||
Commissioner Sherrie P. Marshall
|
||
Federal Communications Commission
|
||
1919 M Street, N.W., Room 826
|
||
Washington, D.C. 20554
|
||
Phone: 202-632-6446
|
||
Fax: 202-632-5172
|
||
|
||
Commissioner James H. Quello
|
||
Federal Communications Commission
|
||
1919 M Street, N.W., Room 802
|
||
Washington, D.C. 20554
|
||
Phone: 202-632-7557
|
||
Fax: 202-632-5173
|
||
|
||
|
||
|
||
Please, sending hate mail or prank calls/faxes is not the way to go
|
||
about this. It will only hurt our situation. Send in the letter proposed above
|
||
(With the addition of stating that you are a member of ASKI, and stating that
|
||
ASKI is a group of users who are fighting for modemer's rights and interests.)
|
||
to as many people as you can. If we loose this battle it could very well mean
|
||
the end of modeming as we know it!!!!!!!!!!!
|
||
|
||
|
||
|
||
ASKI Phile #9 C
|
||
o
|
||
Virus
|
||
n
|
||
Many people have asked, why publish info on viruses?? e
|
||
In fact, there is a growing amount of bad publicity going r
|
||
around about my board because of the fact that it carries
|
||
virus related info (not that it is hurting me any hahahaha)!!
|
||
One guy actually called up, leeched almost 60 files off me,
|
||
and then proceeded to bitch on other boards about it and began
|
||
telling people not to call!! I have had enough of this shit so
|
||
I am going to explain it right here and now. Virus info is VERY
|
||
interesting, knowledge about viruses can help you defend yourself,
|
||
and if this information is suppressed, new defences will never be
|
||
found!!!!!!! Also, if this info becomes main stream, someone might
|
||
figure out how to use these things to increase productivity! Sure,
|
||
there will be little fagots who run around, spreading these things,
|
||
but the same is also true with AIDS!! Why should computer virus info
|
||
be suppressed, when AIDS, a virus that is 100 times more problematic
|
||
than, say, the stoned virus, is talked about openly??? Knowledge
|
||
is your best line of defence. Know thy enemy...
|
||
|
||
|
||
IMPORTANT NOTES TO EVERYONE!:
|
||
There are at least 2 confirmed copies of Scan90 floating around
|
||
with viruses in the code!! I would recommend that NO ONE DLs THIS FILE!!
|
||
There is also a copy of WOLF3DCHEAT with a nasty trojan in it! As
|
||
always, SCAN EVERYTHING YOU DOWNLOAD!!!!!!!!!!
|
||
|
||
Subject: COMMENT: MarketPlace Article Increases Paranoia
|
||
From: sophist (Phillip McReynolds)
|
||
Message-ID: <k8mmkB1w164w@brainiac.raidernet.com>
|
||
Date: Mon, 11 May 92 15:38:55 CDT
|
||
|
||
MarketPlace Article Increases Paranoia, Impedes Networking, &
|
||
Is Based on Ignorance [Commentary on FILE 3 (BRAIN1.1)]
|
||
|
||
by sophist
|
||
|
||
So what was the point of "Computer Viruses Are Really Dangerous?"
|
||
The conclusions drawn in the piece by Bill Zeeble of APR's _MarketPlace_
|
||
radio show (May 9, 1992) seem to be the following:
|
||
|
||
o Virus writers are a public menace and could endanger people's
|
||
health, not just their computers
|
||
|
||
o You should avoid trading software or downloading it off of
|
||
public networks (including BBSes)
|
||
|
||
o You should be paranoid whenever connecting with a public
|
||
computer network (or BBS)
|
||
|
||
o You should only buy Commercial ($$$) Software, especially
|
||
for virus protection.
|
||
|
||
Are these conclusions valid? I think not. Let's examine them.
|
||
|
||
While virus writers do generally wreak havoc upon the unwary and I
|
||
suppose it is possible that a virus could find its way into a
|
||
health-care or hospital system, what it is not mentioned that virus
|
||
writers, like all hackers (not just the *bad* kind) are experimenters
|
||
and are interested in pushing the limits of technology. Furthermore a
|
||
virus is an excellent way of measuring the level of connectedness on the
|
||
net. Imagine a Bulgarian (sic.) virus-writer's delight at seeing his
|
||
program show up on the New York Times computer system in only a matter
|
||
of days! It is only with the advent of the almost-instantaneous data
|
||
communications offered by the net that things like computer viruses
|
||
really become an issue. Now certainly destructive viruses are a nuisance,
|
||
but with a few simple precautions one can generally avoid them.
|
||
More on those precautions later. Lets first say a few words about
|
||
terminology.
|
||
|
||
Zeeble didn't do his research when he just started reporting on
|
||
viruses. What he should have called these destructive and
|
||
semi-destructive programs was "Trojan-Horses". A trojan horse program
|
||
is one which does something that you didn't expect it to do. Some
|
||
trojan horses are just buggy programs. Others do deliberate mischief
|
||
like slowing your system down and printing "Your computer is stoned" up
|
||
on the screen. A virus is a special type of trojan horse that copies
|
||
itself into other programs on the disk. Not all trojan-horses are
|
||
viruses but all viruses are trojan horses. Another type of
|
||
trojan-horses, one that should be of particular interest to net citizens
|
||
is a "worm". A worm is like a virus in that it spreads from system to
|
||
system infecting them as it goes, but it differs to the degree that it
|
||
is a network phenomenon. A typical worm is the "Internet Worm" created
|
||
by Robert Morris. This program exploited holes in the security on
|
||
Internet systems and sent copies of itself to other machines on the
|
||
network, creating literally hundreds of copies of itself on machines
|
||
throughout the internet in only a matter of hours. This worm did not
|
||
destroy any data, but it did increase bandwidth on the network to such a
|
||
degree that the Internet was effectively shut down while everything was
|
||
sorted out. Even though the worm did no actual damage to the data on
|
||
the systems Morris was convicted of computer crime and sentenced to some
|
||
odd hours of public service. Morris did not intend to do any harm, only
|
||
to experiment with the net and to exploit security holes that existed
|
||
there. Furthermore, Morris actually did network security people a
|
||
service by pointing out severe flaws in net security.
|
||
|
||
The main thrust of the article was not evil hackers, however, and
|
||
zeeble is to be commended for this. Rather the point seemed to be that
|
||
you should keep your computer as isolated as possible to prevent
|
||
infection. This is just bogus. A computer is nowhere near as powerful
|
||
a tool in isolation as it is when networked with other systems. Where
|
||
would USENET, for example, be today if the UUCP & other networks did not
|
||
exist for net traffic to pass through. Also, it is *not* the case that
|
||
you can avoid viruses by only buying commercial software. The Novell
|
||
Netware Encyclopedia program was recently infected and many units were
|
||
sold to unsuspecting customers who thought they were safe. And there
|
||
are many other example of supposedly "safe" infected commercial software
|
||
being distributed to unsuspecting users. Not to mention bugs...
|
||
|
||
The implication of all this that any self-respecting user should
|
||
really take exception to is that we should avoid contact with others,
|
||
either by diskette transfer, bbs connection, or packet-switching
|
||
network. The effect of this kind of thinking is to keep us isolated and
|
||
to render us helpless and subject to the caprices and excesses of
|
||
commercial software manufacturers. (They call us "pirates", but we
|
||
might well call the "bandits" for charging inordinate prices for buggy
|
||
software and for being unresponsive to the needs of users.) While I
|
||
doubt that Allen Gwin is on the payroll of a Microsoft or an IBM, his
|
||
claim that we should never
|
||
|
||
download a virus-disinfectant program from a public bulletin
|
||
board system because it's kind of like sharing a needle...
|
||
|
||
definitely serves their interests. The comparison between
|
||
free/shareware collecting and drug abuse is absurd, to say the least,
|
||
not to mention offensive. Some of the *best* virus protection software
|
||
available is Shareware (e.g. McAffee's Scanv and Cleanv series) and the
|
||
shareware concept seems to be the only way to keep up with current virus
|
||
developments. With commercial-ware, you spend on average $30-60 on a
|
||
program that is more or less useless in a matter of weeks because of
|
||
new strains of viruses.
|
||
|
||
Furthermore, the claim that such software is likely to be infected
|
||
merely demonstrates the ignorance of the speaker. Programs like
|
||
PKware's zip program provide CRC protection and authenticity
|
||
verification that is very difficult to hack. You can be reasonably sure
|
||
of publicly available (free/shareware) virus protection software and of
|
||
free/shareware generally if you take the following precautions:
|
||
|
||
o Don't download software from a network or BBS where you've
|
||
gotten infected software in the past.
|
||
|
||
o Always run your shareware through a virus checker program.
|
||
|
||
o Use a CRC-checking program like LZEXE to compress your
|
||
software (after you've scanned it). That way if any
|
||
code modifying program tampers with it, LZEXE will detect
|
||
the difference in CRC sums and let you know.
|
||
|
||
o Get the latest virus scan/clean software and use it regularly.
|
||
|
||
o Get your shareware from recognized sources like SIMTEL20.
|
||
The moderator at SIMTEL checks all of the software he
|
||
gets for viruses.
|
||
|
||
To sum up, the Marketplace article plays into the hands of the
|
||
commercial software manufacturers by increasing paranoia about
|
||
information/program sharing and instilling a false sense of security
|
||
about commercially available software. While there are some excellent
|
||
commercially available virus protection programs out there (Symantec's
|
||
Anti-Virus, for example) they generally aren't any better than other
|
||
free/shareware version. The best rule, though, is to generally be aware
|
||
of your computer system, what it does, and how it operates. This is
|
||
better than any protection you can buy and while it won't render you
|
||
impregnable to the (very real) virus threat, it will give you the
|
||
ability to adequately asses the risks and take precautions when
|
||
necessary. And to the lamers out there who just stick the disk in the
|
||
drive and play your games or run your spreadsheets, you're probably
|
||
getting what you deserve. Be informed.
|
||
|
||
sophist
|
||
|
||
p.s.
|
||
|
||
I am not aware of any inaccuracies in the above-commentary, but
|
||
there may well be some. If so, I do apologize and please let me know.
|
||
I'm always ready and willing to learn more.
|
||
|
||
-end-
|
||
|
||
|
||
ASKI Phile #10
|
||
Phun at OM!!
|
||
BOOM!!
|
||
|
||
My Odyssey of the Mind team needed a neat effect for our skit, so we
|
||
did some experimentation with model rocket engines and learned some interesting
|
||
things. And thus I bring you: THE MODEL ROCKET SMOKE BOMB!!
|
||
|
||
Get a few D sized model rocket engines and rip the paper off.
|
||
Crush these up into a fine black power (this is done best in a wooden bowl with
|
||
a baseball bat or similar object, DO NOT USE ANYTHING METAL!!!). When lit, the
|
||
powder will flare up with a little flame and a BUNCH of smoke. The more powder
|
||
the more smoke. NOTE: If you don't crush them up, they will explode when lit.
|
||
The amount of noise it produces depends on how you package it. Put it in toilet
|
||
paper with just a little tape and it will make almost no noise at all, however,
|
||
if you pack it in writing paper and cover it in a few layers of tape, you will
|
||
successfully get everyone's attention!! For a cool fireworks effect, you pack
|
||
one of these and put it in the coffee can, then fill the can with little pieces
|
||
of ripped up paper and light the fuse. When the thing goes off there will be a
|
||
shower of flaming paper pieces! The good thing about these is that they are
|
||
relatively safe and you can create some neat effects with them, but don't be
|
||
stupid. Another thing we used for effect in our skit was dry ice, but after the
|
||
skit we had tons of ice left so we made: THE DRY ICE BOMB!!
|
||
|
||
Fill the bottom of a gallon milk jug or plastic Coke bottle with dry
|
||
ice (DON'T USE TOO MUCH!!!!!) and crush it. Then fill it up with water and cap
|
||
it. Put it in an open area and get away. The dry ice will boil and from a gass
|
||
that will un-crush the bottle, when the pressure gets high enough the bottle
|
||
will explode with a noise that is louder than a gun!!!!!!!!!!!!!!! It will take
|
||
1 to 5 minutes for the bottle, once capped, to blow, so leave it for a good
|
||
1/2 hour if it doesn't go off, just to be safe. We did have one go off in one
|
||
guy's face with no permanent damage, but he was lucky. HAVE PHUN!!
|
||
|
||
|
||
ASKI Phile #10
|
||
Reviews
|
||
|
||
We were pressed for time so there is only one short review this issue,
|
||
however, next issue this section will be much larger and will include an
|
||
in-depth review of Hacker: The Computer Crime Card Game from Steve Jackson
|
||
Games.
|
||
|
||
Best hacking portable: The Handbook by Gateway 2000.
|
||
Weighing in at 2.75 pounds with a 4 1/2 hour battery life
|
||
with 3MB of ram and 40MB of HD space for $1200. This 286 classed
|
||
performance can come with a mouse, 2400 baud modem (but hell
|
||
why not use the USR Courier v.32bis?), battery pack, portable
|
||
printer and a 3.5" floppy. I think John Dvorak will love this
|
||
system, the 3.5 drive isn't standard!!!
|
||
|
||
ASKI Phile #12
|
||
|
||
ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
|
||
ºNews from Cyberspaceº
|
||
ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
|
||
By:
|
||
The White Ninja
|
||
and
|
||
Wild Child
|
||
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
MOD BUSTED!!!!!!!!!!!!!
|
||
Phiber Optik, Acid Phreak, Outlaw, Corrupt, and Scorpion, the members
|
||
of the hack group MOD (The Masters of Disaster (Deception)), where busted by
|
||
the FBI last week. The FBI admits that the bust IS a scare tactic and hopes the
|
||
indictments will cause a wide spread drop in hacking (READ HERE: The FBI is
|
||
looking to scare the shit out of everyone in the BBSing community, increase
|
||
censorship and fear among SysOps, and is going to push for a ridiculously
|
||
oppressive sentencing just short of the death penalty.). Among the crimes the
|
||
defendants (victims?) are accused of are a number of cases in which the systems
|
||
where completely destroyed!!!! One case listed was the destruction of nearly
|
||
all the data in the Learning Link computer run by the Educational Broadcast
|
||
Corp., WNET (NY). Apparently the message left on the system to the SysOp was
|
||
"Happy Thanksgiving you turkeys, from all of us at MOD." First off, the
|
||
language used in this statement is EXTREMELY odd for a bunch of teenagers!!! I
|
||
would expect something like "PHUCK YOU!!" When was the last time YOU heard a
|
||
teenager call someone else a "Turkey?" GIVE ME A BREAK!!!!!!!!! Also Phiber
|
||
Optik has spoken out MANY times AGAINST destruction of data on computers (see
|
||
related story below). It hurts the SysOp, it gives hackers a bad name, and it
|
||
destroys the information so that no one else can learn from it! An action of
|
||
this kind would be quite out of character for that group. Another important
|
||
note, the FBI stated that they have been investigating this case for 2 years!
|
||
THEY SHOULD HAVE MADE THE BUST THE MINUTE THE FIRST LAW WAS BROKEN!!! They
|
||
waited for the group to cause even more damage so they could get a bigger
|
||
sentence! THEY WOULD PREFER A BIG BUST ON THEIR RECORD THAN AN ONLINE COMMUNITY
|
||
FREE FROM HACKERS!!!!!!! They also waited until the youngest member of MOD had
|
||
turned 18! Why? So they could ALL be tried as adults! Mike Godwin of the EFF
|
||
stated "This whole indictment could very well be an attempt to frame some
|
||
people who the authorities believe glorify hacking." The authorities refuse to
|
||
release ANY information as to who they worked with in the investigation of
|
||
these crimes. I expect to hear a GREAT DEAL more about this in the coming
|
||
months. We'll keep you posted...
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
Piracy and Humility:
|
||
The FBI and the SPA raided the Davy Jones Locker BBS of Millbury, Mass.
|
||
last month. BJL BBS was allegedly distributing more than 200 various pirated
|
||
programs. This was the first time the government has raided a BBS for piracy.
|
||
Mike Godwin of the EFF has stated that there isn't much BBS based piracy,
|
||
and many believe that this will prove to be more of a scare tactic than a
|
||
deterrent to crime. However, Ken Wasch of the SPA stated that many raids are
|
||
being planned and the SPA will begin concentrating on pirate boards. The SPA
|
||
has not yet decided whether it will prosecute those who DLed the warez. We will
|
||
keep you posted as to how this story develops.
|
||
In related news, we attempted to contact our favorite Humble Guy in
|
||
Nashville this week but we have been informed that he has skipped the country.
|
||
Candyman, of Candyland BBS, is being hunted by our finest in the USA.
|
||
As someone famous probably said one day: "This is only the beginning..."
|
||
|
||
¨Quien haste este noche?
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
Mr. Security meets Cyberpunk:
|
||
Phiber Optik makes it big in this month's issue of PC Computing.
|
||
On one side of the table sits Donn Parker, a legendary security expert, and
|
||
on the other side sits Phiber Optik, member of the Legion of Doom who was
|
||
charged with illegal computer access, fraud, conspiracy in 1990 and has just
|
||
recently been busted again by the FBI (see above story). These men met at
|
||
the first Computers, Freedom, and Privacy conference. The purpose was for
|
||
hackers and privacy advocates to meet Feds and system administrators. Weeks
|
||
before the conference Phiber Optik's laptop computer was seized by state police
|
||
in an investigation started by the Secret Service known as Operation: Sun
|
||
Devil. (Editors note: the following extracts were taken out of a conversation
|
||
between Parker and Optik.)
|
||
Parker: How do you view the ethics of getting into someone's computer
|
||
system?
|
||
P.Optik: I know what your point of view is because I've read your papers
|
||
and I've listened to you talk. I know that you think any entry,
|
||
you know, any unauthorized entry, is criminal.
|
||
I can't say I agree with that. I do agree that anyone who's an
|
||
impressionable teenager, who's on the scene and wants to break
|
||
into as many computers as is humanly possible to prove a point,
|
||
has the potential to do damage, because they're juveniles and have
|
||
no idea what they're doing, and they're messing around in
|
||
places that they have no business being.
|
||
At the time, I was 17 years old and still a minor. There was no
|
||
way I was going to be able to buy a Unix, a VAX, and my own
|
||
switching system. These are the systems I'm interested in
|
||
learning how to program. It would not have been possible to access
|
||
this type of computer development environment had I not learned
|
||
how to break into systems. That's the way I see it.
|
||
Parker: It seems to me that the people I have talked with that have been
|
||
convicted of malicious hacking, and have overcome and outgrown
|
||
that whole thing have gone into legitimate jobs where there is
|
||
great challenge, and they're very successful.
|
||
P.Optik: I certainly hope to get a challenging job in computer technology.
|
||
but I just feel that where I live, and the way the school system
|
||
is where I am, it doesn't cater to my needs of wanting to learn
|
||
as much about technology as fast as I want to learn.
|
||
|
||
Parker spent the conversation telling Optik to get a formal education and
|
||
defending the current school system; Optik wanted to learn at his own speed,
|
||
without waiting for the rest of the world to catch up. Parker came off as a
|
||
"stick in the mud", while Optik came off as a "Cyberpunk". Parker wants
|
||
hackers to go to school to learn the theory of computer programming and
|
||
operating systems at the school's speed, Optik wants people to learn computer
|
||
programming and operating systems at their own speed. Both men experts in
|
||
there own back yard.
|
||
Note: Parker has written "Fighting Computer Crime" and "Crime by
|
||
Computer" for computer ethnics, which has established him
|
||
as the foremost authority on the hacker psyche. We will
|
||
review his books later. Phiber Optik has helped write
|
||
Phrack, LOD Journals and referred for technical expertise
|
||
in 2600 magazine.
|
||
Everyone should check out the latest issue of PC/Computing! Phiber brings
|
||
up some good points, but the SS man just does not understand!! The only thing I
|
||
didn't get was why the article is being printed now. The debate took place at
|
||
the 1st Conference on Computers, Privacy, and Freedom, over a year ago!!!!!
|
||
And just last month, they published an article on piracy. The CU being fazed
|
||
back into the media? Hmmmmmmm...
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
EFF:
|
||
Is Mitch Kapor trying to take over the Internet???? Inquiring minds
|
||
want to know! Mitch Kapor's Electronic Frontier Foundation is well know in
|
||
the CU because of it's commendable work in bringing realistic legislation to
|
||
Cyberspace. ASKI supports the actions of this organization, but there is
|
||
one thing that bothers me, the commercialization of the Internet. The
|
||
Internet is one of the few networks that allows free international discussion.
|
||
Why commercialize it? I think Al Gore's plan for an international data
|
||
freeway system is a better way to bring communications to the masses. This
|
||
way it remains free and out of the control of the major cooperation. I
|
||
also believe that if the Internet is given to a company, and prices are high,
|
||
it will just lead to an increase in illegal hacking. This will be another
|
||
area in which kids will be forced to break the law in order to learn. However,
|
||
I would like to hear Mr. Kapor's side of this debate. He told Info-world
|
||
that it is a natural evolution for the network, WHY? Why commercialize the net?
|
||
What benefits would be wrought from such an action that would be impossible
|
||
under government control? If Mr. Kapor, or anyone in the EFF would please
|
||
come forward and answer these questions, we would be happy to hear you out.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
FBI and Restrictions:
|
||
The FBI is attempting to put restrictions on digital communication. Their
|
||
proposal states that all digital communications systems sold in the United
|
||
States should be rigged for federal monitoring. This isn't the KGB, but the
|
||
FBI we are talking about! Congress rejected two similar proposals in the past
|
||
two years. This proposal is the best FBI has come up with on this issue, so it
|
||
is more palatable to legislators. This recent proposal hasn't been presented
|
||
yet but the Electronic Frontier Foundation (EFF) is already fighting against it.
|
||
If this proposal is passed you will loose your privacy. The officials of
|
||
the FBI dismiss such civil liberties concerns. They cite a 1968 statute
|
||
that allows them to tap standard analog telephone communications. This
|
||
conflicts with the Privacy Act! If they can't pass the tapping of lines,
|
||
then they are going to go after stiff regulations on communications.
|
||
No senator supported the FBI's federal-certification plan earlier this
|
||
year. Congress shot down an FBI stipulation in the crime-bill that
|
||
vendors provide decryption devices for all the encrypted data sent
|
||
over the US networks.
|
||
Please note: "It is a federal crime with severe punishment and/or fines to
|
||
1) divulge what you hear to anyone who is not a party to the broadcast;
|
||
2) to make use of any broadcast information for your own personal gain;
|
||
3) to make use of any broadcast information for illegal purposes or to
|
||
commit a crime. Any such violations may be investigated by the FBI
|
||
and prosecuted by the US Department of Justice.
|
||
Lets take these three statues to case: 1) You don't want the FBI listening
|
||
in on what you are doing after school/work. The FBI would have to "divulge"
|
||
some of the information to someone. This is a violation. 2) Everyone
|
||
gains in a deal. The FBI would use this information against you and/or
|
||
to counter what they have heard. This is a violation. 3) The FBI doesn't
|
||
make crime they merely enforce the US Code. Yea right! Who investigates
|
||
the FBI when they are bad? Who would prosecute the US Department of Justice?
|
||
I propose no one but "We the People....".
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
Companies:
|
||
Lotus is coming out with 123/W (no surprise there) that can handle
|
||
neural networking. Why can't they make a communications program that
|
||
has neural networking in it? Neural Networking on a LAN! You could keep
|
||
adding systems and easily upgrade the power of the compu-mind!! In other
|
||
news, Compu-com, the company responsible for the price drop in 9600+ baud
|
||
modems is out of business!! No word yet what will be done to fulfill the
|
||
service contracts held by Compu-com modem owners.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
Local BBSs:
|
||
Gridpoint BBS went down, and The Bomb Squad BBS is going through some
|
||
MAJOR changes after a few assorted problems and increasing paranoia among the
|
||
SysOps. (Who can blame them nowadays!?!) It will be back up soon with some
|
||
new software and some big improvements, but it will be a lot less public.
|
||
(ED: It is back up under the name The Fencing Post, but it is still undergoing
|
||
many changes. It is now a private BBS. Talk to the SysOp about access.). Keith
|
||
Gordon's modems where destroyed in a lightning storm and thus Mondo Gordo will
|
||
be down until he can get another modem. BTW Keith Gordon puts out a free print
|
||
mag called Rý about Rock & Roll and Cyberpunks, and also 'lectronic Liver, an
|
||
electronic mag about socio-political issues. Both are worth checking out!
|
||
(MONDO GORDO just went back up as this file went out!) Braniac BBS, well known
|
||
for it's Usenet connection and great files section is down due to the fact that
|
||
the dude's computer has gone haywire. Hopefully it will be back up soon.
|
||
The Baud Walk BBS is also down, someone called my BBS and asked me to post
|
||
this here because the person who lives there is sick of getting calls in the
|
||
middle of the night!
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
Copyright law deluted:
|
||
In a shot that will be heard around the computer industry for years
|
||
to come, copyright protection of programs has been lessened!!!!!! The US Court
|
||
of Appeals for the Second Circuit in Manhattan has ruled that the behavior of
|
||
a software program is not copyrightable. It is believed that companies will
|
||
again turn to patents and secrecy for protection of software programs. However,
|
||
this ruling opens the door for code hackers, some of whom learn new techniques
|
||
by studying other peoples work.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
FCC:
|
||
The FCC has given telephone companies to go ahead to transmit video
|
||
signals and to produce their own TV shows. This could lead to services such as
|
||
interactive cable TV and video phones. BBSing on the tube!? This ruling also
|
||
promises to be a booster for ISDN and fiber optics, 2 technologies that will be
|
||
a big boost to the power of visiphony.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
ShadowNet and ASKInet merge:
|
||
ShadowNet is a new Nashville area network that is growing fast. There
|
||
are many good echos and discussion is getting better every day. Now they have
|
||
added TND and ASKI. ASKI is working on adding a few new echos and promoting
|
||
the net in Nashville. If you are interested, get online with the net!!
|
||
The net nodelist will be listed in ASKInews every month and we will keep
|
||
looking for more members. All of you will be interested to know that
|
||
Shadow/ASKInet promotes free speech, allows aliases, and does not allow
|
||
censorship of messages on the net!!!! All shadownet member boards will
|
||
receive this mag every month and will get the ASKI.ANS/ASC/AVT for posting
|
||
on their board. (We are still working on the membership package for users, we
|
||
will have it ready next issue. We know it will include a T-shirt and access to
|
||
ASKI meetings.) Here is the Shadow/ASKInet echo and node list!!!!!
|
||
|
||
Current Shadowechos:
|
||
|
||
TagLine: Description:
|
||
|
||
CURRENT Current Events
|
||
GENERAL General Discussion
|
||
TESTECHO Test for new users
|
||
SYSOP SysOps and Co-sysops
|
||
MUSIK Music and Concerts
|
||
ELECT Campaign Elections
|
||
AD-D Role Playing
|
||
CPUNK "
|
||
FORSALE Barter and Trade
|
||
STARTREK ST:TOG ST:TNG ST:TFG
|
||
VIRTUAL Virtual Reality
|
||
TIME Time travel
|
||
ELECTRON Electronics
|
||
MOVIES Think about it.
|
||
|
||
Echos proposed by ASKI:
|
||
|
||
MODEMING BBSing, etc.
|
||
WHEELS WHEELS and BABES!!!!!!!!!!!!
|
||
WARES New files and Technology
|
||
SWINGERS Perversion and Joking
|
||
GOVERN Debate about the Government
|
||
1STAMNT Free Speech
|
||
FLAMES Bitching, Flames, and other shit that pisses you off!
|
||
UNDER Computer Underground discussion
|
||
ASKIGEN ASKI annoucments and general discussion
|
||
ASKINEWS For sending articles to the Editors of ASKInews
|
||
GENROLE General Roleplaying discussion
|
||
PHIL Philsophy
|
||
|
||
Shadow/ASKInet
|
||
Nodes online as of 07/01/92
|
||
|
||
Zone 10: North America, Nashville, TN
|
||
HUB -- Zachary Patten @ 370-4010
|
||
Region 900: South East (US of) America (AL FL GA MS NC SC TN PR)
|
||
HUB -- Zachary Patten @ 370-4010
|
||
Net 516: Middle Tennessee Area, Nashville, TN --
|
||
HOST -- Zachary Patten @ 370-4010
|
||
HUB -- 1, The Fencing Post, Brentwood, TN, Zachary Patten @ 370-4010
|
||
2, The Edge, Goodletsville, TN, Andrew Greeno @ 851-1772
|
||
3, The Wasteland BBS, Galatin, TN, Randy Jones @ 451-0739
|
||
5, The Ninja's Domicile, Brentwood, TN, Tom Cross @ 370-8805
|
||
|
||
Talk to The White Ninja or The Fluffy Death Bunny for more info on how to
|
||
join the net!!!!
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
Our PHUCK YOU of the month goes too:
|
||
The Dallas police and related parties who have instated and are
|
||
strictly enforcing a 10:30PM curfew for kids under 18. This kind of
|
||
unnecessary, discriminatory, and ageist policy really pisses us off. They say
|
||
many kids are involved in crime after 10:30, but one could say the same is
|
||
true for BLACKS. A 10:30 curfew for all black people would not be any more
|
||
disgusting than what these people are doing here!!
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
APPLAUSE:
|
||
We would like to applaud Time-Warner for not cancelling Body Count's
|
||
controversial LP. LONG LIVE FREE SPEECH!!
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
More News:
|
||
Well thats about it for this issue. If you have any rumors or news tidbits
|
||
to share, send them to us!!!!! We are looking for more info to improve this
|
||
column!!!!!
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
|
||
ASKI Phile #13
|
||
Coming Soon to a text file near you
|
||
|
||
We are already working on the second issue of the ASKI newsletter.
|
||
It will consist of Telnet info, scanner frequencies, how to build your
|
||
own x.25 Packet Network and more about your rights as Americans.
|
||
And last but not least the Anarchy section: Boxes, Bombs, Viruses and
|
||
whatever we can distributively think of.
|
||
|
||
|
||
|
||
|
||
ASKI Phile #14
|
||
Disclaimer
|
||
|
||
ASKI, Inc. does not advocate, participate in, or conspire in the
|
||
violation of any law--no matter how oppressive, unconstitutional or simply
|
||
stupid such law may be. ASKI, Inc. and the writers and editors of ASKInews do
|
||
not take ANY responsibility for the use of the information provided. Though we
|
||
do give credit where credit is due! ASKI, Inc. does engage in description (for
|
||
educational and informational purposes only) of technological processes, and
|
||
some of these processes (like manufacturing a death device or constructing
|
||
software/hardware) may well require appropriate licensing to perform legally.
|
||
Fortunately, no license is needed for the distribution or receipt of
|
||
information itself! This information is compiled from various sources and
|
||
persons as well as personal experiences of the author, and in NO WAY
|
||
implicates ANY person in ANY crime.
|
||
|
||
|
||
|
||
ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸
|
||
³ Have a happy phreaking day! ³
|
||
ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ;
|
||
|
||
Quote of the Mag:
|
||
|
||
"Congress shall make NO law respecting an establishment of
|
||
religion, or prohibiting the free exercise thereof; or
|
||
abridging the freedom of speech, or of the press; or the
|
||
right of the people peaceably to assemble, and to petition
|
||
the Government for a redress of grievances."
|
||
|
||
PD says:
|
||
"The road to hell is paved with good intentions."
|