1079 lines
55 KiB
Plaintext
1079 lines
55 KiB
Plaintext
Computer Down-Under-Ground Digest. Volume 1, Number 3. Sun, 15 Mar 1992
|
|
***************************************************************************
|
|
|
|
Editor: Aaron Schiff
|
|
====================
|
|
|
|
Usenet: aaron@nacjack.gen.nz (International and in NZ)
|
|
FidoNet: Aaron Schiff 3:772/110.0 (In NZ only)
|
|
Demi-Monde: Aaron Schiff 199:310/1.0 (In NZ only)
|
|
|
|
SUPPORT BBS: The Miser's Vault. Phone: 820-2164, 24hrs.
|
|
|
|
IN NORWAY: Digital Express BBS, Phone: +47 7 145032
|
|
|
|
DISCLAIMER: The views presented herein do not necessarily represent the
|
|
views of the editor. Individual authors accept all responsibility for
|
|
ensuring articles submitted do not violate copyright restrictions. This
|
|
publication has no affiliation with the Computer Underground Digest
|
|
published in the USA.
|
|
|
|
Computer Down-Under-Ground Digest is an open publication dedicated to the
|
|
sharing of information and views concerning computer enthusiasts in New
|
|
Zealand. CDUGD articles may be reprinted providing the source and original
|
|
author are cited.
|
|
|
|
Readers are welcome to submit articles to this publication. Please send
|
|
all contributions to the above address.
|
|
|
|
Issues of CDUGD are posted to the Demi-Monde.hack, Fido.nz.communications
|
|
and alt.hackers (usenet) newsgroups. Back issues may be obtained by
|
|
contacting the editor, or by downloading them from the support BBS.
|
|
|
|
CDUGD holds a growing archive of text files that may be of interest to
|
|
users. Complete lists and additions to the archive are published
|
|
regularly. All text files may be downloaded from the support BBS.
|
|
|
|
--------------------------------------------------------------------------
|
|
|
|
|
|
CONTENTS OF CDUGD Volume 1, Number 3
|
|
====================================
|
|
|
|
1. Editor's Report.
|
|
2. Changes to CDUGD.
|
|
3. Response to 'Hacking in NZ'.
|
|
4. Whistleblowers BBS Extremely Successful.
|
|
5. Large Text File Collection.
|
|
|
|
--------------------------------------------------------------------------
|
|
|
|
|
|
1. Editor's Report - By Aaron Schiff
|
|
======================================
|
|
|
|
This third issue has come out much quicker than I thought it would. This
|
|
is mainly due to a large article by Frenchman Jean-Bernard Condat. Also,
|
|
would readers please read the article 'Changes to CDUGD' and comment on
|
|
whether or not they think the changes are a good idea.
|
|
|
|
LAW SPECIAL: Issue #1.05 is to be a 'Law Special'. In this issue I wish to
|
|
focus on the New Zealand and Australian laws regarding computer crime (eg
|
|
Hacking, Fraud etc..) For this I need:
|
|
|
|
* People who have had 'experiences' with the law regarding computer
|
|
issues.
|
|
|
|
* People in the Law profession who may be able to shed some 'legal' light
|
|
on the topic.
|
|
|
|
* People in the Govt who can provide information.
|
|
|
|
* People in law enforcement agencies who can help out.
|
|
|
|
The deadline for submissions to this special issue is March 25th although
|
|
submissions I receive soon after this date will not be rejected.
|
|
|
|
NORWAY: People in Norway can download CDUGD from Digital Express BBS - the
|
|
phone number is at the top of this issue.
|
|
|
|
Enjoy the 3rd issue!
|
|
|
|
--------------------------------------------------------------------------
|
|
|
|
|
|
2. Changes to CDUGD - By Aaron Schiff
|
|
=======================================
|
|
|
|
A few changes are to be made to CDUGD. None of them are major, but I hope
|
|
that they will improve the overall success of CDUGD. The changes are:
|
|
|
|
1) Coverage: CDUGD will still be mostly New Zealand oriented, however, I
|
|
have decided that articles about non - New Zealand computing issues will
|
|
be accepted. I hope that this will broaden the target audience of CDUGD as
|
|
well as raise the number of contributions.
|
|
|
|
2) Australia: This is not yet a definite change, I am thinking of
|
|
including Australian articles as a normal part of the digest. The decision
|
|
as to whether or not to do this has not yet been made. I would like
|
|
readers to comment (in public or privately) on whether or not this should
|
|
be done. If you are reading this in Australia, please contact me if you
|
|
are able to help out with the Australian side of things in any way (eg
|
|
distribution, writing articles etc...)
|
|
|
|
3) CDUGD News: This will be a regular column (similar to 'PHRACK World
|
|
News' and is just short descriptions of events happening in the computing
|
|
world. I need someone to write this column on a regular basis. Any
|
|
volunteers?
|
|
|
|
--------------------------------------------------------------------------
|
|
|
|
|
|
3. Response to 'Hacking in NZ' - By Mark Neely
|
|
================================================
|
|
|
|
** This article is in response to the article 'Hacking in NZ' by The Death
|
|
Pirate and published in CDUGD #1.02 **
|
|
|
|
>6 Hacking In NZ - By The Death Pirate
|
|
>======================================
|
|
>
|
|
>Hacking is basically to break or force your way into a system illegally.
|
|
>Basically connecting to another modem without permission. But if this is
|
|
>so, then isn't connecting to a BBS system without permission illegal??
|
|
|
|
"Hacking" (see arguments re: cracking/hacking...sheesh, everyone bags
|
|
people for confusing the two) essentially means unauthorised access to a
|
|
computer. The more "deviant" the intention behind the intent, then (as a
|
|
general rule - see the decision on appeal in the R T Morris appeal, which
|
|
was as a result of the particular drafting of the legislation) the greater
|
|
the penalty involved.
|
|
|
|
|
|
>This is one point which was heard in the recent trial of a 19 year old
|
|
>hacker in the USA, (refer to your PC World).
|
|
|
|
Robert Tappan Morris Jnr. (son of Robert Morris, NSA scientist). He was
|
|
given a suspended sentence, good behaviour bond and a fair amount of
|
|
community services.
|
|
|
|
|
|
>However, really what it should mean is to force, hack into a system
|
|
>without an account or permission.
|
|
|
|
Not necessarily... the way most legislation is drafted would catch an
|
|
authorised user (i.e. with legitimate account + password) trying to
|
|
execute an unauthorised process/command!
|
|
|
|
|
|
>The Author Deliberately left out details which he thought could have
|
|
>enabled any illegal action.
|
|
|
|
Which "he thought could have enabled any illegal action"...this is hardly
|
|
conclusive!
|
|
|
|
|
|
As a side note, as NZ and Australia appear to be strengthening economic
|
|
ties etc, it is likely that we may see the sharing of services (airlines
|
|
today, maybe telecommunications tomorrow!).
|
|
|
|
Under recent amendments to the Commonwealth Crimes Act (Pt IVA), persons
|
|
who gain unauthorised access to Cth. computers (or computers which the Cth
|
|
government have an interest [defined in the legislation]) can be
|
|
prosecuted under the Act.
|
|
|
|
Of particular note is the section which would appear to provide that
|
|
persons who use a service provided by a Cth authority or body (which one
|
|
would assume would include Telecom??) is also liable for prosecution!!
|
|
|
|
Thus, practically anyone who uses a modem to "hack" into a computer could
|
|
find themselves liable to prosecution under the Cth Act!
|
|
|
|
Should there be sufficient interest, I could look into this matter
|
|
further.
|
|
|
|
Mark N.
|
|
|
|
|
|
------------- Verbose Disclaimer Follows -------------
|
|
|
|
Mark Neely
|
|
|
|
Articled Clerk (Slave) | Tutor
|
|
Messrs Cridlands, | Law School
|
|
Barristers and Solicitors. | Northern Territory
|
|
University
|
|
|
|
Darwin, NT Australia
|
|
neely_mp@darwin.ntu.edu.au
|
|
Disclaimer:
|
|
|
|
The views expressed herein are neither a reflection of the views held by
|
|
my employer nor those of the NTU. They are not to be taken (unless
|
|
otherwise indicated) as a formal legal opinion or advice given in my
|
|
professional capacity.
|
|
|
|
--------------------------------------------------------------------------
|
|
|
|
|
|
Whistleblowers BBS Extremely Successful - By Jean-Bernard Condat
|
|
==================================================================
|
|
|
|
Whistle-blowers may now anonymously report government fraud, waste, and
|
|
abuse via computer to the House Government Operations sub-committee on
|
|
Government Information, Justice, and Agriculture. The number for the
|
|
computer system, which will accept files and messages, is (202) 225-5527.
|
|
Aliases are permitted.
|
|
|
|
The Truelson' PhD published in 1986, draws upon the theorical framework
|
|
of systemic corruption--an organized conspiracy to suppress revelation of
|
|
corrupt practices--to propose a retaliation model to account for organiza-
|
|
tional retaliation against whistleblowers with legitimate protests. This
|
|
study is one basis of this incredible bulletin board.
|
|
|
|
House Government Information Subcommittee's whistleblower computer BBS
|
|
has been "tremendously successful" and has generated about "50 substantive
|
|
leads" in its two months of operation, Subcommittee Chief Counsel Robert
|
|
Gellman said. Board has received 700-800 calls, many from curious browsers
|
|
who want to see what's available and others who want to discuss policy
|
|
matters.
|
|
|
|
But Gellman said board was designed solely to allow whistle-blowers to
|
|
post private notes to alert Subcommittee to instances of waste, fraud and
|
|
abuse, so there isn't much for anyone else to see. There are no files
|
|
available to download or bulletin to read, as there are on most bulletin
|
|
boards. Gellman said message senders often don't use their real names,
|
|
and Subcommittee staff has used electronic mail feature to send message
|
|
back asking for more information.
|
|
|
|
|
|
REFERENCES
|
|
|
|
1. Food Chemical News, December 16, 1991, ISSN 0015-6337;
|
|
|
|
2. Judith Anne Truelson, "Blowing the Whistle on systemic Corruption,"
|
|
University of Southern California (Los Angeles, CA), 1986;
|
|
|
|
3. Communications Daily, February 13, 1992, ISSN 0277-0679.
|
|
|
|
ON-LINE SEARCHING
|
|
|
|
|
|
Welcome to
|
|
|
|
THE FEDERAL WHISTLEBLOWER BBS
|
|
|
|
This bulletin board exists to help the United States Congress identify
|
|
waste, fraud, and abuse in the federal government. You are invited to
|
|
leave messages or upload files that relate to this purpose. There are no
|
|
public files or public messages on this board.
|
|
|
|
Your SYSOP is Congressman Bob Wise from West Virginia.
|
|
|
|
The CONTENTS of all communications are confidential and not accessible to
|
|
other users. However, the name you use to sign on may be visible to
|
|
other users. If this is a concern, please use a pseudonym to protect
|
|
your identity.
|
|
|
|
|
|
What is your FIRST name (pseudonyms okay)? CONDAT JEAN-BERNARD
|
|
|
|
Checking Users...
|
|
User not found
|
|
Are you 'CONDAT JEAN-BERNARD' ([Y],N)? Y
|
|
What is your STATE (any entry acceptable)? LYON IN FRANCE
|
|
Welcome to the FEDERAL WHISTLEBLOWER BULLETIN BOARD.
|
|
|
|
This Board is operated by an investigative subcommittee in the U.S. House
|
|
of Representatives.
|
|
|
|
Your SYSOP is Congressman Bob Wise from West Virginia.
|
|
|
|
GROUND RULES:
|
|
|
|
1. There are NO public files and NO public messages on this board.
|
|
If you are looking for downloads, games, etc., you won't find them here.
|
|
|
|
2. If you have a concern about protecting your identity, please use
|
|
a pseudonym. Because of software limitations, the name you use to sign
|
|
on with may become known to others. You may leave your real name in the
|
|
contents of a message, but this is not required. THE CONTENTS OF
|
|
MESSAGES CAN ONLY BE READ BY THE SYSOP. Messages cannot be read by any
|
|
other user. Use the Comment command to leave messages to the Sysop.
|
|
|
|
CONDAT JEAN-BERNARD from LYON IN FRANCE
|
|
C)hange FIRST name (pseudonyms okay)/LAST name (pseudonyms okay)/STATE
|
|
(any
|
|
ent
|
|
ry acceptable), D)isconnect, [R]egister? R
|
|
Enter PASSWORD you'll use to logon again (dots echo)? ....
|
|
Re-Enter password for Verification (dots echo)? ....
|
|
Please REMEMBER your password
|
|
Welcome to RBBS-PC, Condat. You have 60 mins for this session.
|
|
Logging CONDAT JEAN-BERNARD
|
|
RBBS-PC 17.3C Node 1, operating at 1200 BAUD,N,8,1
|
|
|
|
+--------------------------------------------------+
|
|
| Welcome to the FEDERAL WHISTLEBLOWER BBS |
|
|
+--------------------------------------------------+
|
|
Your SYSOP is Congressman Bob Wise
|
|
BBS Phone: (202) 225-5527
|
|
|
|
REMINDERS:
|
|
|
|
1) Remember your password. If you forget it, you can't read
|
|
your mail and we can't contact you.
|
|
|
|
2) Use mixed case in messages. ALL UPPER CASE IS HARD TO READ.
|
|
|
|
3) If you upload a file, please leave a message so we know who
|
|
provided it. If you don't, the upload will not be acknowledged.
|
|
This is NOT a requirement. Anonymous uploads are acceptable.
|
|
|
|
4) Callers may be deleted after 30 days. If this happens to you,
|
|
just register again. It only takes a second.
|
|
|
|
Checking messages in MAIN..
|
|
Sorry, CONDAT, No NEW mail for you
|
|
|
|
RBBS-PC 17.3C Node 1
|
|
|
|
Caller # 1279 # active msgs: 74 Next msg # 539
|
|
|
|
------*>>> RBBS-PC MAIN MENU <<<*------
|
|
----- MAIL ---------- SYSTEM ---------- UTILITIES ------ ELSEWHERE ---
|
|
|
|
[R]ead Mail to Me [B]ulletins [H]elp (or ?) [F]iles
|
|
[C]omment to SYSOP [I]nitial Welcome [X]pert on/off [G]oodbye
|
|
[Q]uit
|
|
[U]tilities
|
|
|
|
----------------------------------------------------------------------
|
|
Current time: 09:38 AM Minutes remaining: 58 Security: 5
|
|
----------------------------------------------------------------------
|
|
MAIN: 58 min left
|
|
MAIN command <?,B,C,F,G,H,I,K,Q,R,U,X>? B
|
|
|
|
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
|
======[ WHISTLEBLOWER BBS Bulletin Menu ]=======
|
|
|
|
Bulletin Description
|
|
------- -------------------------------------
|
|
1 Description and Purpose of this Board
|
|
2 Upload and Download Policies (NO DOWNLOADS!)
|
|
3 Operating Policies
|
|
4 How to Blow the Whistle
|
|
|
|
Read what bulletin(s), L)ist, S)ince, N)ews ([ENTER] = none)? 3
|
|
|
|
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
|
THE WHISTLEBLOWER BBS: OPERATING POLICIES
|
|
|
|
1. The highest priority on this bulletin board is protecting the
|
|
confidentiality of callers. A caller concerned about confidentiality
|
|
should use a pseudonym.
|
|
|
|
2. There is no Caller-ID service on the bulletin board's incoming
|
|
line. Incoming calls are not traced. Each caller must consider the
|
|
possibility that a call to this board is being recorded or traced at the
|
|
source of the call.
|
|
|
|
3. The Whistleblower BBS is operated by an investigative subcommittee
|
|
in the United States House of Representatives. The purpose of the board
|
|
is to assist the Congress in identifying waste, fraud, and abuse in
|
|
federal agencies, programs, contracts, and grants. No action will be
|
|
taken on any information that does not further this purpose.
|
|
|
|
4. A higher priority will be assigned to matters that involve large
|
|
amounts of federal funds or that affect health or safety. Other matters
|
|
may be pursued to the extent permitted by available resources.
|
|
|
|
5. We cannot provide any type of general assistance to callers. The
|
|
board should not be used for any political purpose or to lobby Congress on
|
|
legislative or policy matters.
|
|
|
|
6. Messages that relate to the purpose of the board will be
|
|
acknowledged. A caller who provides an investigative lead is encouraged
|
|
to call back in the event more information is required. Messages that do
|
|
not relate to the purpose of the board may not be acknowledged. Most
|
|
messages will be erased after they are read.
|
|
|
|
7. General information about investigations that result from
|
|
activities on the Whistleblower BBS may be made public, although no
|
|
information specifically identifying an individual caller will be
|
|
released. Publicity for the board will help to accomplish its purpose.
|
|
However, a caller will not necessarily be informed about the details of
|
|
any investigation that results from his or her message.
|
|
|
|
8. Information obtained on the Whistleblower BBS may be shared with
|
|
other congressional investigators, agency Inspectors General, and the
|
|
General Accounting Office (the audit arm of Congress). INFORMATION THAT
|
|
SPECIFICALLY IDENTIFIES CALLERS WILL NOT BE SHARED. Callers should
|
|
identify any special confidentiality concerns or expressly state if they
|
|
need to place any specific restrictions on the use of the information that
|
|
they provide. Information will not be shared if a caller specifically
|
|
requests.
|
|
|
|
9. Casual visitors to the board may be deleted from the user base at
|
|
any time. If you call a second time and find that you are not recognized,
|
|
just re-register. It only takes a few seconds. Users not engaged in
|
|
current discussions may also be deleted as a security precaution.
|
|
|
|
10. Text files may be uploaded, preferably in ASCII format. Word
|
|
Perfect format is a second choice. Files may be compressed using standard
|
|
compression programs. Files other than text files will be immediately
|
|
deleted.
|
|
|
|
11. If you attempt to use a common pseudonym (e.g., John Doe), you
|
|
may find that it is already in use. When you first enter a name not in
|
|
use, you will receive a message about the board. If you enter a name that
|
|
is known to the board, you will be asked for a password. If this happens,
|
|
you must hang up, call again, and use a different name. Anyone reading
|
|
this has already solved the problem. This paragraph is included as an
|
|
explanation.
|
|
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
|
======[ WHISTLEBLOWER BBS Bulletin Menu ]=======
|
|
|
|
Bulletin Description
|
|
------- -------------------------------------
|
|
1 Description and Purpose of this Board
|
|
2 Upload and Download Policies (NO DOWNLOADS!)
|
|
3 Operating Policies
|
|
4 How to Blow the Whistle
|
|
|
|
Read what bulletin(s), L)ist, S)ince, N)ews ([ENTER] = none)? 4
|
|
|
|
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
|
THE WHISTLEBLOWER BBS
|
|
|
|
How to Blow the Whistle on Fraud, Waste, and Abuse
|
|
|
|
1. You do NOT have to give your name or identify yourself in any way.
|
|
But you should call again after you have left a message. Use the same
|
|
name you used the first time and see if there is an answer for you. Use
|
|
the READ MAIL TO ME command. This permits continuing communications so
|
|
that we can ask you for more information or clarification. Allow a few
|
|
days for your message to be read.
|
|
|
|
2. Remember that we are more interested in conduct involving
|
|
SIGNIFICANT amounts of federal funds or MAJOR instances of wrongdoing. We
|
|
have limited resources, and we are less likely to investigate minor
|
|
matters. When in doubt, we encourage you to report the matter and let us
|
|
decide.
|
|
|
|
3. Provide enough information so we can find and investigate the
|
|
objectionable activity. Whenever possible, tell us WHO, WHAT, WHERE,
|
|
WHEN, WHY, and HOW. Be as specific as possible.
|
|
|
|
4. WHO: Identify the agency, office, program, contract, or grant:
|
|
|
|
Vague: ABC Department
|
|
Okay: ABC Department, Z Bureau
|
|
Good: ABC Department, Z Bureau, Denver Office
|
|
Better: ABC Department, Z Bureau, Denver Office, Contract
|
|
Number 123-456 dated 2/1/89
|
|
|
|
5. WHAT: Describe the conduct:
|
|
|
|
Vague: Wasted Money
|
|
Okay: Bought unnecessary computers
|
|
Good: Bought 200 Personal Computers to use funds at the
|
|
end of the fiscal year
|
|
Better: John Smith authorized the purchase of 200
|
|
unneeded PCs under contract 123-456 on 9/30/91 to
|
|
avoid returning excess funds to the Treasury
|
|
|
|
6. WHERE: State where the activity occurred:
|
|
|
|
Vague: Unnecessary travel
|
|
Okay: Trips to Los Angeles
|
|
Good: Trips from Headquarters to Los Angeles
|
|
Better: John Smith authorized travel for himself from
|
|
Chicago to Los Angeles every Friday before the
|
|
UCLA football team played a game at home so he
|
|
could watch the game
|
|
|
|
7. WHEN: Provide all relevant dates:
|
|
|
|
Vague: Last year
|
|
Okay: 1990
|
|
Good: Starting in May 1990
|
|
Better: Began on May 5, 1990, continued every other week
|
|
until December 14, 1991
|
|
|
|
8. WHY and HOW: Explain the conduct involved:
|
|
|
|
Vague: Broke the law
|
|
Okay: Did not follow procurement rules
|
|
Good: Failed to obtain sole-source contracting
|
|
authority
|
|
Better: Procured 1000 buses from ABC Corp. under contract
|
|
number 123-456, on 5/1/90, under a sole source
|
|
contract that was not approved by the contracting
|
|
officer.
|
|
|
|
* Ctrl-K(^K) / ^X aborts. ^S suspends ^Q resumes *
|
|
======[ WHISTLEBLOWER BBS Bulletin Menu ]=======
|
|
|
|
Bulletin Description
|
|
------- -------------------------------------
|
|
1 Description and Purpose of this Board
|
|
2 Upload and Download Policies (NO DOWNLOADS!)
|
|
3 Operating Policies
|
|
4 How to Blow the Whistle
|
|
|
|
Read what bulletin(s), L)ist, S)ince, N)ews ([ENTER] = none)?
|
|
|
|
------*>>> RBBS-PC MAIN MENU <<<*------
|
|
----- MAIL ---------- SYSTEM ---------- UTILITIES ------ ELSEWHERE ---
|
|
|
|
[R]ead Mail to Me [B]ulletins [H]elp (or ?) [F]iles
|
|
[C]omment to SYSOP [I]nitial Welcome [X]pert on/off [G]oodbye
|
|
[Q]uit
|
|
[U]tilities
|
|
|
|
----------------------------------------------------------------------
|
|
Current time: 09:41 AM Minutes remaining: 55 Security: 5
|
|
----------------------------------------------------------------------
|
|
MAIN: 55 min left
|
|
MAIN command <?,B,C,F,G,H,I,K,Q,R,U,X>? C
|
|
|
|
Type comment 60 lines max (Press [ENTER] to quit)
|
|
|
|
[---------------------------------------------------------------------
|
|
-]
|
|
1: Hallo!
|
|
2: I am a French journalist and will be very please to receive a press
|
|
3: information on this curious BBS.
|
|
4: My e-mail address is MCI Mail #501-3469 or DialMail #24064
|
|
5: Don't hesitate to contact me.
|
|
6: Jean-Bernard Condat
|
|
7: CCCF, B.P. 8005, 69351 Lyon Cedex 08, France (Fax.: +33 1 47877070)
|
|
8:
|
|
|
|
A)bort, C)ontinue adding, D)elete lines, E)dit a line
|
|
I)nsert lines, L)ist, M)argin change, R)evise subj, S)ave msg, ?)help
|
|
Edit Sub-function <A,C,D,E,I,L,M,R,S,?>? s
|
|
Adding new msg # 539.
|
|
Receiver will be notified of new mail
|
|
|
|
------*>>> RBBS-PC MAIN MENU <<<*------
|
|
----- MAIL ---------- SYSTEM ---------- UTILITIES ------ ELSEWHERE ---
|
|
|
|
[R]ead Mail to Me [B]ulletins [H]elp (or ?) [F]iles
|
|
[C]omment to SYSOP [I]nitial Welcome [X]pert on/off [G]oodbye
|
|
[Q]uit
|
|
[U]tilities
|
|
|
|
----------------------------------------------------------------------
|
|
Current time: 09:43 AM Minutes remaining: 53 Security: 5
|
|
----------------------------------------------------------------------
|
|
MAIN: 53 min left
|
|
MAIN command <?,B,C,F,G,H,I,K,Q,R,U,X>? g
|
|
Log off (Y,[N])? y
|
|
|
|
Now: 03-06-1992 at 09:43:54
|
|
On for 7 mins, 5 secs
|
|
60 min left for next call today
|
|
CONDAT, Thanks and please call again!
|
|
|
|
|
|
--------------------------------------------------------------------------
|
|
|
|
|
|
5. Large Text File Collection - By Aaron Schiff
|
|
=================================================
|
|
|
|
I have gained access to a large collection of 'underground' text files.
|
|
These files are available on request from me. Please send mail to the
|
|
address at the top of this issue stating which file(s) you want and the
|
|
address (e-mail) to which they are to be sent.
|
|
|
|
Please note that these files are at an overseas site, and therefore cost
|
|
me money to access. For this reason, there is a charge for each of these
|
|
text files. There is a flat rate of 10c per kilobyte (eg a 20k file would
|
|
cost $2). When you request a file I will tell you the address to send the
|
|
money. CDUGD is only making a slight profit on these charges - and any
|
|
money made will go towards covering the costs of publication (eg Usenet e-
|
|
mail charges).
|
|
|
|
|
|
** FILE LIST BEGINS
|
|
|
|
NAME SIZE DATE DESCRIPTION
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
FREECALL.TXT N 10909 08-01-91 Free Engineer's Test Calls in U.K.
|
|
NOROL.TXT N 4537 08-01-91 Datasvindel mot Norol's datasystem
|
|
VAXBEGIN.TXT N 14589 08-01-91 Beginners guide to hacking VAX's VMS
|
|
SDIAL_10.LZH N 10927 08-01-91 Superdial V1.0 best wardialer prog
|
|
CUD324.TXT N 42910 08-01-91 Computer Underground Digest #3.24
|
|
A-BOMB.TXT N 42893 08-01-91 How to build your own atomic bomb
|
|
CYBERTEK.TXT N 5486 08-01-91 Cyberpunk Tech. Journal press info
|
|
CYBERSPC.TXT N 4444 08-01-91 Cyberspace Manifesto by S.Savitzky
|
|
CUD316.TXT N 41450 08-01-91 Computer Underground Digest #3.16
|
|
ELEKTR_1.TXT N 86025 08-01-91 Elektrix #1 british HPA-magazine 3-
|
|
91SS.TXT N 14823 08-01-91 Subslime Slime newsletter #13.2
|
|
SMART.TXT N 26796 08-01-91 New drugs that make you smart!
|
|
SCAN1.LZH N 26151 08-01-91 0130-Scan V1.0 tollfree # scanner
|
|
TNET-LAD.TXT N 40942 08-01-91 Tymnet Local Access Directory
|
|
- all dial up numbers
|
|
TYMNET.TXT N 2859 08-01-91 List of US-Tymnet dialup ports
|
|
NUA-WORL.LZH N 5960 08-02-91 An italian world list of NUA's
|
|
HACKWWIV.TXT N 6695 08-02-91 How to hack into WWIV-BBSs .
|
|
CODEHACK.EXE N 53944 08-08-91 Code Hacker V5.0 by The Wiz
|
|
CUD327.TXT N 43802 08-08-91 Computer Underground Digest #3.27
|
|
CUD328.TXT N 50781 08-08-91 Computer Underground Digest #3.28
|
|
CUD325.TXT N 38422 08-09-91 Computer Underground Digest #3.25
|
|
CUD326.TXT N 40360 08-09-91 Computer Underground Digest #3.26
|
|
VMBHACK.TXT N 3920 08-10-91 Beginners VMB Hacking by The Knight
|
|
ATI_01.TXT N 8010 08-11-91 Activist Times Inc. Issue #01
|
|
ATI_02.TXT N 10706 08-11-91 Activist Times Inc. Issue #02
|
|
ATI_03.TXT N 10864 08-11-91 Activist Times Inc. Issue #03
|
|
ATI_04.TXT N 15765 08-11-91 Activist Times Inc. Issue #04
|
|
ATI_05.TXT N 13528 08-11-91 Activist Times Inc. Issue #05
|
|
ATI_06.TXT N 8840 08-11-91 Activist Times Inc. Issue #06
|
|
ATI_07.TXT N 13544 08-11-91 Activist Times Inc. Issue #07
|
|
ATI_08.TXT N 14904 08-11-91 Activist Times Inc. Issue #08
|
|
ATI_10.TXT N 15573 08-11-91 Activist Times Inc. Issue #10
|
|
ATI_11.TXT N 7517 08-11-91 Activist Times Inc. Issue #11
|
|
ATI_12.TXT N 11967 08-11-91 Activist Times Inc. Issue #12
|
|
ATI_13.TXT N 14518 08-11-91 Activist Times Inc. Issue #13
|
|
ATI_14.TXT N 11257 08-11-91 Activist Times Inc. Issue #14
|
|
ATI_15.TXT N 11276 08-11-91 Activist Times Inc. Issue #15
|
|
ATI_16.TXT N 10760 08-11-91 Activist Times Inc. Issue #16
|
|
ATI_17.TXT N 11217 08-11-91 Activist Times Inc. Issue #17
|
|
ATI_18.TXT N 10857 08-11-91 Activist Times Inc. Issue #18
|
|
ATI_19.TXT N 11097 08-11-91 Activist Times Inc. Issue #19
|
|
ATI_20.TXT N 11313 08-11-91 Activist Times Inc. Issue #20
|
|
ATI_21.TXT N 10260 08-11-91 Activist Times Inc. Issue #21
|
|
ATI_22.TXT N 10416 08-11-91 Activist Times Inc. Issue #22
|
|
ATI_23.TXT N 9281 08-11-91 Activist Times Inc. Issue #23
|
|
ATI_24.TXT N 10097 08-11-91 Activist Times Inc. Issue #24
|
|
ATI_25.TXT N 10958 08-11-91 Activist Times Inc. Issue #25
|
|
ATI_26.TXT N 3810 08-11-91 Activist Times Inc. Issue #26
|
|
ATI_27.TXT N 10522 08-11-91 Activist Times Inc. Issue #27
|
|
ATI_28.TXT N 5020 08-11-91 Activist Times Inc. Issue #28
|
|
ATI_29.TXT N 9970 08-11-91 Activist Times Inc. Issue #29
|
|
ATI_30.TXT N 12063 08-11-91 Activist Times Inc. Issue #30
|
|
ATI_31.TXT N 12356 08-11-91 Activist Times Inc. Issue #31
|
|
ATI_32.TXT N 19011 08-11-91 Activist Times Inc. Issue #32
|
|
ATI_33.TXT N 17741 08-11-91 Activist Times Inc. Issue #33
|
|
ATI_34.TXT N 20272 08-11-91 Activist Times Inc. Issue #34
|
|
ATI_35.TXT N 26614 08-11-91 Activist Times Inc. Issue #35
|
|
ATI_36.TXT N 30897 08-11-91 Activist Times Inc. Issue #36
|
|
ATI_37.TXT N 23419 08-11-91 Activist Times Inc. Issue #37
|
|
ATI_38.TXT N 22981 08-11-91 Activist Times Inc. Issue #38
|
|
ATI_39.TXT N 18792 08-11-91 Activist Times Inc. Issue #39
|
|
ATI_40.TXT N 9157 08-11-91 Activist Times Inc. Issue #40
|
|
ATI_41.TXT N 22002 08-11-91 Activist Times Inc. Issue #41
|
|
ATI_42.TXT N 10058 08-11-91 Activist Times Inc. Issue #42
|
|
ATI_43.TXT N 20536 08-11-91 Activist Times Inc. Issue #43
|
|
ATI_44.TXT N 21786 08-11-91 Activist Times Inc. Issue #44
|
|
ATI_45.TXT N 21666 08-11-91 Activist Times Inc. Issue #45
|
|
ATI_46.TXT N 8604 08-11-91 Activist Times Inc. Issue #46
|
|
ATI_47.TXT N 24797 08-11-91 Activist Times Inc. Issue #47
|
|
ATI_48.TXT N 24106 08-11-91 Activist Times Inc. Issue #48
|
|
ATI_49.TXT N 21181 08-11-91 Activist Times Inc. Issue #49
|
|
ATI_50.TXT N 22141 08-11-91 Activist Times Inc. Issue #50
|
|
ATI_51.TXT N 19319 08-11-91 Activist Times Inc. Issue #51
|
|
ATI_52.TXT N 20485 08-11-91 Activist Times Inc. Issue #52
|
|
ATI_53.TXT N 31212 08-11-91 Activist Times Inc. Issue #53
|
|
TERROR.LZH N 66766 08-11-91 Terrorists Handbook
|
|
ANAR2.HHF N 9091 08-14-91 Anarchy Activation Issue #2 (Aug-91)
|
|
ANAR1.HHF N 14015 08-14-91 Anarchy Activation Issue #1 (Jul-91)
|
|
CUD329.TXT N 35128 08-16-91 Computer Underground Digest #3.29
|
|
CUD219.TXT N 41422 08-18-91 Computer Underground Digest #2.19
|
|
CUD320.TXT N 45665 08-18-91 Computer Underground Digest #3.20
|
|
CUD321.TXT N 36859 08-18-91 Computer Underground Digest #3.21
|
|
CUD322.TXT N 44607 08-18-91 Computer Underground Digest #3.24
|
|
CUD323.TXT N 42732 08-18-91 Computer Underground Digest #3.23
|
|
NFX#001.TXT N 16392 08-31-91 New Fone Express Issue #001 (Jun-91)
|
|
NFX#002.TXT N 42226 08-31-91 New Fone Express Issue #002 (Jul-91)
|
|
CUD330.TXT N 42195 08-31-91 Comp. Undergr. Digest #3.30 (Aug-91)
|
|
CUD331.TXT N 44013 08-31-91 Comp. Undergr. Digest #3.31 (Aug-91)
|
|
PHONEMAN.LZH N 21671 09-02-91 Phone Man U.S. Scanner
|
|
TOLLFREE.TXT N 10854 09-02-91 1-800 Bulletin Board umbers
|
|
30BOXES.LZH N 46891 09-04-91 30 DIFFERENT BOX PROJECTS
|
|
WP.CAP N 12052 09-06-91 Capture from Washington Post by Fred
|
|
DIGIDIAL N 2360 09-11-91 An enhanced version of digidial with
|
|
longer delays between 2618!2419 pulse
|
|
and 2618 puls
|
|
TONETEST N 736 09-12-91 Tester Norske BB-forhold
|
|
CUD332.LZH N 19975 09-12-91 Computer Underground Digest #3.32
|
|
TONETEST.EXE N 776 09-13-91 Tester norske BB-Forhold
|
|
PHUN1.LZH N 42702 09-15-91 Issue #1 of P/HUN From 1988.
|
|
PHUN3.LZH N 99803 09-15-91 Issue #3 of P/HUN From 1989
|
|
PHRACK24.LZH N 84067 09-15-91 Issue #24 of Phrack. Old...
|
|
OLIVEBOX.TXT N 4250 09-16-91 Olive Box Plans for a phone ringer
|
|
SNOWBOX.TXT N 6025 09-16-91 Snow Box Plans make pirate TV sender
|
|
TAP1.LZH N 67406 09-17-91 Tap Online Newsletter #1 - Dec. 1990
|
|
CUD333.LZH N 17850 09-17-91 Computer Underground Digest Issue
|
|
#3.33
|
|
PHRACK31.LZH N 69257 09-17-91 Phrack Issue #31. Release 28/05/90
|
|
PPP1.TXT N 9758 09-20-91 Phuckin Phield Phreakers Newsletter
|
|
#1
|
|
PPP2.TXT N 21580 09-20-91 Phickin Phield Phreakers Newsletter
|
|
#2
|
|
ATI54.TXT N 13020 09-20-91 Activist Times Incorporated, Issue
|
|
#54
|
|
ALCOR.LZH N 30187 09-20-91 Text from the ALCOR lawsuit.
|
|
PIRATE5.LZH N 47959 09-20-91 Pirate Newsletter Issue #5
|
|
HACKUL2.LZH N 31167 09-20-91 Hackers Unlimited Issue #2
|
|
NIA71.LZH N 106006 09-20-91 Network Information Access Newsletter
|
|
#71
|
|
VAX.TXT N 150591 09-21-91 The complete VAX hacking tutorial
|
|
VAXHACKS.TXT N 5378 09-21-91 Another file on hacking VAX/VMS
|
|
PHUN4.LZH N 83387 09-23-91 P/HUN Issue #4
|
|
PHUN5.LZH N 51918 09-23-91 P/HUN Issue #5
|
|
ANE1.TXT N 22541 09-24-91 Anarchy'N'Explosives Issue #1
|
|
ANE2.TXT N 4576 09-24-91 Anarchy'N'Explosives Issue #2
|
|
ANE3.TXT N 5765 09-24-91 Anarchy'N'Explosives Issue #3
|
|
ANE4.TXT N 5272 09-24-91 Anarchy'N'Explosives Issue #4
|
|
ANE5.TXT N 6867 09-24-91 Anarchy'N'Explosives Issue #5
|
|
ANE6.TXT N 10015 09-24-91 Anarchy'N'Explosives Issue #6
|
|
ANE7.TXT N 116939 09-24-91 Anarchy'N'Explosives Issue #7
|
|
ATI55.TXT N 11829 09-24-91 Activist Times, Inc. Issue #55
|
|
BBPLANS N 12744 09-24-91 BB Construction & Troubleshooting
|
|
ANISPECS.DOC N 11264 09-24-91 MCI Document of ANI specifications
|
|
BLBEXPL N 9353 09-24-91 Blue Boxing - why it works...
|
|
BLUEINFO N 9629 09-24-91 Tabas' Theory of operating BB
|
|
BOLLOX1 N 11488 09-24-91 Total Bollox Issue #1 Part #1
|
|
BOXBUST N 7320 09-24-91 Pacific Bell Blue Box Investigations
|
|
BOXFREQ N 1912 09-24-91 Assorted Bluebox Frequeicies
|
|
0800FREE N 771 09-24-91 Some british 0800 tollfree numbers
|
|
AIO5.LZH N 42749 09-24-91 AIO V5.0 for PC Access Code Finder
|
|
ALTOS N 4226 09-24-91 Hacking Altos Worknet by The Loro'88
|
|
AMIDIAL.LZH N 842 09-24-91 Amidial wardialer incl. source code
|
|
ARPAHACK N 10673 09-24-91 Defence Data Network Blues - Arpanet
|
|
ARPANET N 6817 09-24-91 Hacking Arpanet Part 1 by The Source
|
|
BANKSYS N 0 09-24-91 nothing zero bytes - delete_me_ASAP!!
|
|
BANKSYS2 N 5858 09-24-91 Hacking BOA's Home Banking System 2
|
|
BCS N 2590 09-24-91 Times article to outwit Hackers
|
|
BHAMUNI N 16740 09-24-91 Birmingham Uni. conn to other Ntwk's
|
|
BIG_LIST.ZIP N 93325 09-24-91 <not tested>
|
|
BILL N 8312 09-24-91 Anti Hacking - Emma Nicholson
|
|
BILL2 N 5259 09-24-91 Anti Hacking II - Emma Nicholson
|
|
BILL3 N 4728 09-24-91 Anti Hacking III - Emma Nicholson
|
|
BIOC1 N 16137 09-24-91 The BIOC Files, part 1
|
|
BIOC2 N 18352 09-24-91 The BIOC Files, part 2
|
|
BIOC3 N 8509 09-24-91 The BIOC Files, part 3
|
|
BIOC4 N 15758 09-24-91 The BIOC Files, part 4
|
|
BIOC5 N 19121 09-24-91 The BIOC Files, part 5
|
|
BIOC6 N 14280 09-24-91 The BIOC Files, part 6
|
|
BIOC7 N 9216 09-24-91 The BIOC Files, part 7
|
|
BLUEDIAL.LZH N 17935 09-24-91 <not tested>
|
|
BUSTER.LZH N 1622 09-24-91 Code Hacker/Scanner in pure BASIC
|
|
BUTLER.LZH N 30271 09-24-91 Butler V1.03 for PC <not tested>
|
|
CARDHACK N 1722 09-24-91 How to alter telephone calling cards
|
|
CARRYON N 1352 09-24-91 Carry On Hacking article New Sci.
|
|
CCITT N 3977 09-24-91 The X-series data network types
|
|
CHAOS N 1898 09-24-91 Times article on hackers from Bonn
|
|
CHASE N 3989 09-24-91 WSJ Article on hacking Chase Records
|
|
CHATSYS N 640 09-24-91 Some miscellaneous Chat Systems
|
|
COMLOCK N 1352 09-24-91 Com Lock hacking protection...
|
|
COMPUNET.NUM N 106043 09-24-91 Compunet Numbers complete list
|
|
CRIME N 6133 09-24-91 Article about Credit Card Fraud
|
|
DATABASE.TXT N 319 09-24-91 A few database default backdoors
|
|
DEBATE N 2219 09-24-91 Some jerk defending teenage hackers
|
|
DIALPLUS N 4726 09-24-91 Some capture from PSS Dialplus UK
|
|
ECOHACK N 2986 09-24-91 Hacking Econet Systems Level 3+
|
|
GRADES N 1923 09-24-91 Alternation of College Grades haha
|
|
HACKAID N 5294 09-24-91 WP article about the next Band-Aid
|
|
HACKTUTR N 3820 09-24-91 A hack tutur for precocious children
|
|
HACKWIN N 3786 09-24-91 Times article on Hacker Test Case
|
|
HISTORY N 10390 09-24-91 The HISTORY of HACKING
|
|
HUNTER.LZH N 3112 09-24-91 <not tested>
|
|
MEHLBOX.PBF N 16481 09-24-91 VAX Hacking - some 'C' source code
|
|
NUASCAN.LZH N 68651 09-24-91 NUA Scanner for PC <not tested>
|
|
NUIFIND.LZH N 4688 09-24-91 NUI Finder for C <not tested>
|
|
NUIFIND2.LZH N 4794 09-24-91 NUI Finder II for PC <not tested>
|
|
PABXSCAN.LZH N 2191 09-24-91 PABX Scanner for PC <not tested>
|
|
PFPT111.LZH N 25665 09-24-91 Some util for PC <not tested>
|
|
PORTFIND.LZH N 976 09-24-91 Port Search Program in pure BASIC
|
|
SCANNER.BAS N 6528 09-24-91 Scanner in pure b-a-s-i-c
|
|
SCANNER.LZH N 2873 09-24-91 maybe the same as above
|
|
SEEKER.LZH N 40957 09-24-91 Seeker for PC <not tested>
|
|
THIEF22.LZH N 49068 09-24-91 Code Thief V2.2 for PC
|
|
WARDIAL.LZH N 3072 09-24-91 Wardialer of some kind
|
|
ALARMSEC.PBF N 5356 09-24-91 The Basics About Alarm Security
|
|
ANTIFREE.PBF N 2869 09-24-91 Make explosives from Anti Freeze
|
|
APLUS.TXT N 20654 09-24-91 Article from A-Plus magazine Apr'87
|
|
APPVIRUS.TXT N 1704 09-24-91 Some text about Apple Virus
|
|
ASPIRIN.PBF N 5309 09-24-91 Make Plastic Explosives from Aspirin
|
|
ATM.DOC N 7825 09-24-91 A.T.M. Fraud Made Easy - Count Zero
|
|
ATOMBOMB.DOC N 5850 09-24-91 Article on making the A-Bomb -C.Zero
|
|
PLASTCHA.PBF N 641 09-24-91 Chart of some explosives effects
|
|
BLEACH.PBF N 3744 09-24-91 Make Plastic Explosives from Bleach
|
|
BOLLOX.LZH N 4228 09-24-91 Bollox Magazine Issue 1 Part 1
|
|
already here.
|
|
BTCOSTS.CCF N 3898 09-24-91 British Telecom charges
|
|
CARDSC1.TXT N 2091 09-24-91 Some text about Carding Stuff
|
|
CARDSC2.TXT N 2949 09-24-91 More text about Carding Stuff
|
|
CARSRCH.CCF N 1098 09-24-91 Another file on carding....
|
|
CARSRCH.PBF N 1141 09-24-91 As above: What to look for in a car
|
|
CCN.CCF N 909 09-24-91 Info about CCN direct mail database
|
|
CHEMIST1.DOC N 9459 09-24-91 Chemists Corner #1 - Explosives
|
|
CHEMIST2.DOC N 6895 09-24-91 Chemists Corner #2 - Chemicals
|
|
COMPDIA1.CCF N 5742 09-24-91 Flashbacks in the computer industry
|
|
COMPDIA2.CCF N 2173 09-24-91 Flashbacks in the ... part 2
|
|
COMPSONG.CCF N 1857 09-24-91 That F*CKING computer song. . .
|
|
COOKBOOK.DOC N 36864 09-24-91 Pool Fun & other cookies
|
|
CORDLESS.DOC N 6668 09-24-91 Listen in on Cordless Fone Conv.
|
|
CRAYFUT.CCF N 4421 09-24-91 Text aboyt CRAY & other supercompu's
|
|
FLASH.DOC N 11728 09-24-91 The art of making M-80's and M-100's
|
|
FORDSTEA.PBF N 1763 09-24-91 Text about stealing Ford brand cars
|
|
-> don't steal mine...
|
|
GELATINE.PBF N 2676 09-24-91 Nitro-Gelatin Plastique Explosive
|
|
GOVTCOMP.CCF N 3010 09-24-91 Personal Info Govt Databases in UK
|
|
.CCF means Corrupt Computing File
|
|
.PBF means Palm Beach File
|
|
GRENADE.PBF N 2053 09-24-91 hand-grenade plans Mk.I
|
|
HACK3.CCF N 714 09-24-91 Hack File 3 by Corrupt Computing
|
|
IBMWATER.CCF N 1571 09-24-91 Water Link Destroys Bank Mainframes
|
|
IDDPHONE.CCF N 1936 09-24-91 How to call Corrupt Computing...
|
|
note: the board is dead to H/P/A!
|
|
ITALIAN.TXT N 1061 09-24-91 Italian Plastic Explosives
|
|
JAP-PTQ.PBF N 719 09-24-91 Japanese Plastic Explosives
|
|
LIE1.CCF N 1904 09-24-91 How to get anything bye lieing
|
|
MAKEBOMB.DOC N 2325 09-24-91 Simple Explosive Bombs
|
|
MAKE_C.PBF N 1984 09-24-91 Composition C british explosives
|
|
MAKE_C2.PBF N 483 09-24-91 Composition C continued
|
|
MAKE_C3.PBF N 363 09-24-91 Composition C continued
|
|
MAKE_C4.PBF N 1096 09-24-91 Composition C continued
|
|
MAKE_RDX.PBF N 4228 09-24-91 Cyclotrimethylenetrinitramine (!)
|
|
MILTFREQ.PBF N 4483 09-24-91 <not tested>
|
|
MOBILE.PBF N 3510 09-24-91 Mobile Radio Frequency Allocations
|
|
NEWLAW.CCF N 1295 09-24-91 Loophole lets spies eavesdrop
|
|
NITRO.PBF N 6798 09-24-91 Nitroglycerin plastic explosives
|
|
POLICE_I.TXT N 3436 09-24-91 Police Interrogation Techniques 1
|
|
PROMOTE.CCF N 1040 09-24-91 Commercial for Corrupt Computing
|
|
-forget it this board is DEAD!
|
|
PSS_DDIS.CCF N 2023 09-24-91 Current PSS Dialplus Fone Numbers
|
|
RADARTIN.CCF N 2651 09-24-91 History of Radio Arthur (???:-)
|
|
RADARTSC.CCF N 3977 09-24-91 History of Radio Arthur (???:-)
|
|
RADIAT.CCF N 3996 09-24-91 History of Radio Arthur (???:-)
|
|
RAISE.DOC N 5754 09-24-91 Raising Hell #1 Metal Communications
|
|
SEXRECIP.CCF N 755 09-24-91 Reciepe for Banana Bread
|
|
SHOP_FUN.DOC N 11680 09-24-91 Misc. fun to check out while shoppin
|
|
SLANG.CCF N 5708 09-24-91 London Slang Lexicon
|
|
CUD334.TXT N 34349 09-28-91 Computer Underground Digest Issue
|
|
#3.34 /NSF
|
|
CUINTRO.TXT N 17516 09-28-91 Introduction to the Computer
|
|
Underground/NSF
|
|
DENNING.TXT N 58643 09-28-91 Text on hacking
|
|
NARC1.TXT N 5187 09-28-91 N.A.R.C. Newsletter Issue #1
|
|
NARC10.TXT N 3362 09-28-91 N.A.R.C. Newsletter Issue #10
|
|
NARC2.TXT N 5322 09-28-91 N.A.R.C. Newsletter Issue #2
|
|
NARC3.TXT N 7818 09-28-91 N.A.R.C. Newsletter Issue #3
|
|
NARC4.TXT N 7313 09-28-91 N.A.R.C. Newsletter Issue #4
|
|
NARC5.TXT N 4818 09-28-91 N.A.R.C. Newsletter Issue #5
|
|
NARC6.TXT N 4403 09-28-91 N.A.R.C. Newsletter Issue #6
|
|
NARC7.TXT N 8220 09-28-91 N.A.R.C. Newsletter Issue #7
|
|
NARC8.TXT N 3721 09-28-91 N.A.R.C. Newsletter Issue #8
|
|
NARC9.TXT N 5568 09-28-91 N.A.R.C. Newsletter Issue #9
|
|
SYND14.TXT N 17360 09-28-91 The Syndicate Reports, Issue #14
|
|
SYND15A.TXT N 15543 09-28-91 The Syndicate Reports, Issue #15A
|
|
SYND15B.TXT N 13042 09-28-91 The Syndicate Reports, Issue #15B
|
|
SYND16B.TXT N 15184 09-28-91 The Syndicate Reports, Issue #16B
|
|
SYND17.TXT N 14448 09-28-91 The Syndicate Reports, Issue #17
|
|
SYND20A.TXT N 20071 09-28-91 The Syndicate Reports, Issue #20A
|
|
SYND20B.TXT N 18740 09-28-91 The Syndicate Reports, Issue #20B
|
|
Does anyone have Synd 18/19? Please
|
|
UL!
|
|
LOD4.TXT N 256220 09-28-91 Legion Of Doom Technical Journals #4
|
|
BOOTLEG7.TXT N 101173 09-28-91 Bootlegger Issue #7 - Old but good!
|
|
LOD3.TXT N 167879 09-28-91 Legion Of Doom Technical Journals #3
|
|
BAUDYWOR.TXT N 87090 09-28-91 Baudy.World - Postmodernistic
|
|
interpretation
|
|
of the hacker world
|
|
CIVILDIS.TXT N 63071 09-28-91 civil.disobedience - retype of an
|
|
anti-govt.
|
|
philosopher
|
|
PHA2.TXT N 111125 09-28-91 Phreakers/Hackers/Anarchists Newsl.#2
|
|
0001.FBI N 54977 09-29-91 Freakers Bureau Inc. -Issue 1-
|
|
NIA69.TXT N 353014 10-01-91 Network Information Access Issue #69
|
|
NIA70.TXT N 464389 10-01-91 Network Information Access Issue #70
|
|
PHRACK32.TXT N 345654 10-01-91 Phrack Classic Issue #32
|
|
HACKTOOL.LZH N 423008 10-03-91 Hacking Tools Collection /\/ETWORK
|
|
PHRACK33.LZH N 64676 10-05-91 Phrack Issue No.33
|
|
CUD335.TXT N 42744 10-07-91 Computer Underground Digest Issue
|
|
#3.35<NSF>
|
|
SYND07.TXT N 9658 10-07-91 The Syndicate Reports, Issue #07
|
|
SYND08.TXT N 11583 10-07-91 The Syndicate Reports, Issue #08
|
|
SYND09.TXT N 12207 10-07-91 The Syndicate Reports, Issue #09
|
|
SYND10.TXT N 11598 10-07-91 The Syndicate Reports, Issue #10
|
|
SYND11.TXT N 10593 10-07-91 The Syndicate Reports, Issue #11
|
|
SYND12.TXT N 11534 10-07-91 The Syndicate Reports, Issue #12
|
|
SYND13B.TXT N 15175 10-07-91 The Syndicate Reports, Issue #13B
|
|
SYND13A.TXT N 8407 10-07-91 The Syndicate Reports, Issue #13A
|
|
CYBSPACE.TXT N 21448 10-07-91 Cyberspace: Laws and confusion
|
|
FBISYST.TXT N 5284 10-07-91 Info on FBI's computer systems
|
|
EXPLOSIV.TXT N 6107 10-07-91 Explosives in computer systems -Time
|
|
reprint
|
|
TRIBE.TXT N 48612 10-07-91 Tribe: The constitution in cyberspace
|
|
NIA65.TXT N 8132 10-07-91 Network Access Information Issue #65
|
|
NIA64.TXT N 15487 10-07-91 Network Information Access Issue #64
|
|
V1N4.TXT N 38463 10-10-91 Phantasy Newsletter #4
|
|
PHUN2.TXT N 154760 10-10-91 Phun Newsletter Issue #2
|
|
Has anyone got Phun 6+? Or did they
|
|
stop
|
|
after 5?
|
|
DIAL252.LHA N 10172 10-10-91 Debugged version of Dialer V2.52
|
|
BBDREAL.LZH N 14336 10-13-91 n e w bluebox program <not tested> -
|
|
TAXFREE N 2888 10-16-91 A BlueBoX specified for 020-Numbers
|
|
to USA
|
|
V1N1.TXT N 25513 10-16-91 Phantasy Newsletter Issue #1
|
|
V1N2.TXT N 27488 10-16-91 Phantasy Newsletter Issue #2
|
|
V1N3.TXT N 25752 10-16-91 Phantasy Newsletter Issue #3
|
|
HACKV1.0.DMS N 234995 10-20-91 Hack Master V1.0 - PBX hacker
|
|
HACKM.DOC N 10290 10-20-91 Hack Master V1.0 - documentation
|
|
CUD337.TXT N 34523 10-22-91 Computer Underground Digest Issue
|
|
#3.37
|
|
EFF12.TXT N 28510 10-22-91 EFFector Digest Issue #12
|
|
ATI56.TXT N 30520 10-22-91 Activist Times, Inc. issue #56
|
|
CUD336.TXT N 22252 10-22-91 Computer Underground Digest
|
|
Issue#3.36
|
|
LOD1.TXT N 219478 10-22-91 Legion Of Doom Technical Journals #1
|
|
CUD338.TXT N 40024 10-29-91 Computer Underground Digest #3.38
|
|
0800.TXT N 11136 10-29-91 Some 800 scans.
|
|
AT&T.LZH N 3315 10-29-91 AT&T text
|
|
BB-TRX.LZH N 20216 10-29-91 Bluebox text, listing of 0130-
|
|
numbers.
|
|
BB-XX.TXT N 5114 10-29-91 German Bluebox text.
|
|
CONF2.ZIP N 10508 11-02-91 How to set up conferences with BB.
|
|
The zip
|
|
file is scribbled, so you get only
|
|
the first
|
|
part. It should be enough, though.
|
|
SPINMAG.LZH N 17473 11-06-91 Story about Phreaker/Hackers from
|
|
SpinRite
|
|
magazine
|
|
LOD2.TXT N 148592 11-06-91 Legion Of Doom/Hackers Technical
|
|
Journals 2
|
|
CUD339.TXT N 30386 11-06-91 Computer Underground Digest #3.39 -
|
|
NEW
|
|
PEMO.EXE N 118748 11-07-91 SILENTS ANARCHY CRYSTAL PARTYDEMO
|
|
information/invitation to the
|
|
christmas-
|
|
party in Denmark, be there!
|
|
NASTYJ01.ZIP N 26635 11-08-91 N.A.S.T.Y. Journal Release #1
|
|
Not very interesting, some UNIX
|
|
hacking
|
|
stuff
|
|
NASTYJ02.ZIP N 7284 11-08-91 N.A.S.T.Y. Journal Release #2
|
|
Som fight with MOD. Includes all of
|
|
MOD's
|
|
stuff on som UNIX machine
|
|
NASTYJ03.ZIP N 77937 11-08-91 N.A.S.T.Y. Journal Release #3
|
|
ATI57.LZH N 14565 11-10-91 Activist Times, Inc. Issue 57 - GET
|
|
THIS!
|
|
WB5 N 123224 11-11-91 White Box 5.0
|
|
CUD341.LZH N 15476 11-23-91 Computer Underground Digest #3.41
|
|
CUD340.LZH N 17427 11-23-91 Computer Underground Digest #3.40
|
|
BB-MFD2.LZH N 10833 11-24-91 Multi Frequency Dialer V2.52
|
|
SU-DAIL.LZH N 11423 11-24-91 Super Dial V1.01
|
|
TPB.LZH N 13177 11-24-91 The Phraud Box V1.0
|
|
KCAMIGA.ZIP N 28744 11-24-91 Killer Cracker V7.0 UNIX pw hacker
|
|
_C_DBBOX.ZIP N 40147 11-24-91 Chronos Bluebox Deluxe V1.0 (basic)
|
|
FONE.ZIP N 37816 11-24-91 History of British Phreaking
|
|
HISTORY.ZIP N 5475 11-24-91 Phreakers Phunhouse fone-guide
|
|
INFOTIK.ZIP N 72394 11-24-91 Informatik Magazine Issue No.1
|
|
KP1XXST.ZIP N 4158 11-24-91 AT&T/BOC Routing Codes
|
|
DMSCA95.SFX N 21212 12-01-91 DMS Checker/Text Adder for SYSOP
|
|
BLIEB22.LZH N 7086 12-01-91 Blieb V2.2 bluebox update
|
|
PHRACK35.ZIP N 142566 12-02-91 Issue 35 of Phrack!!!
|
|
FREQS.DOC N 3725 12-06-91 The new CCITT#5 frequencies!
|
|
PRD-KH.DMS N 291025 12-07-91 Killer Cracker V2.0 unix pw hacker
|
|
H-FUTURE.TXT N 0 12-08-91 Hack To The Future - article typed
|
|
in from Compute Mag. by
|
|
MetalliKat/Oracle!!!
|
|
H_FUTURE.TXT N 5229 12-08-91 Hack To The Future - article typed
|
|
in from Compute Mag. by
|
|
MetalliKat/Oracle!!!
|
|
CCITT.ZIP N 1820 12-17-91 Info about the CCITT #5 system and
|
|
some
|
|
other dialling systems. 1380+120*n is
|
|
C5-R2
|
|
C5-R1 is the normal 700+200*n!
|
|
AT&TNEWS.TXT N 2830 12-19-91 Warning letter from AT&T to their
|
|
customers on how to avoid credit card
|
|
abuse... Speak in a soft, clear voice
|
|
HAHA!
|
|
ALLIANCE.AST N 2944 12-22-91 News about Alliance Teleconferencing
|
|
DEFAULT.CAP N 9186 12-22-91 Routing Codes for AT&T/BOC - you can
|
|
bluebox many of these codes!!!
|
|
FASTBOX.EXE N 15784 12-22-91 Easy-To-Use MF Dialer/Bluebox!!!
|
|
BLUEBOX N 2960 12-23-91 A bluebox with editing of timings ->
|
|
now
|
|
with save/load prefs.
|
|
EFF109.TXT N 31970 12-23-91 EFFector Online Issue #1.09
|
|
EFF110.TXT N 40788 12-23-91 EFFector Online Issue #1.10
|
|
EFF111.TXT N 22316 12-23-91 EFFector Online Issue #1.11
|
|
EFF112.TXT N 28932 12-23-91 EFFector Online Issue #1.12
|
|
EFF201.TXT N 29055 12-23-91 EFFector Online Issue #2.01
|
|
FBI101.TXT N 54284 12-23-91 Freakers Bureau Inc. issue #1.01
|
|
FBI102.TXT N 111127 12-23-91 Freakers Bureau Inc. issue #1.02
|
|
NSA101.TXT N 35692 12-23-91 National Security Anarchists #1.01
|
|
NSA102.TXT N 33176 12-23-91 National Security Anarchists #1.02
|
|
KCAH01.TXT N 32758 12-23-91 K.C.A.H. Volume 1
|
|
KCAH02.TXT N 17956 12-23-91 K.C.A.H. Volume 2
|
|
HACK.LZH N 218007 12-31-91 The Official Phreakers Handbook
|
|
Rather nice collection of philes.
|
|
DIALE-26.LZH N 12229 01-01-92 UL DialerV2.60 Not Brand New (dec.91)
|
|
But Useful.
|
|
SPRINT.LZH N 21095 01-01-92 Info About Us Sprint's Datanet
|
|
HACK#1.LZH N 2340 01-02-92 Hack Issue #1 (not too new...)
|
|
HACK#2.LZH N 2213 01-02-92 Hack #2 ...not too new either...
|
|
HACK#3.LZH N 2349 01-02-92 Hack Issue #3 ...just like the
|
|
above ones.
|
|
DIALNUA.TXT N 20127 01-03-92 List of NUA's for PSS Dialplus UK
|
|
(PSS Dialplus UK: ++44-(0)81-6815040)
|
|
EUROTEXTI N 15135 01-04-92 Text by a Possessed guy about BB'ing
|
|
with
|
|
some explenation.
|
|
PHREAK.TXT N 2116 01-04-92 A New DialingMethod, supposed to
|
|
break
|
|
throug the bb filters...! If anyone
|
|
can make
|
|
this work (from norway) please leave
|
|
a msg
|
|
with the settings used!!!!!
|
|
..maybe it only work where there ARE
|
|
bbfilters????? ANYONE KNOW????
|
|
FBI0002.ZIP N 49932 01-05-92 FBI Issue #2
|
|
CRACKER.LZH N 10449 01-05-92 Small UNIX PW hacker (beta version)
|
|
DIAL.DMS P 148611 01-05-92 RamJam's Bootblock Bluebox (lame!)
|
|
IP_KC20G.LZH N 187007 01-05-92 Killer Cracker V2.0G UNIX PW Hacker
|
|
released by Infinite Perfection....
|
|
LBT-WB7.LZH N 56705 01-05-92 White Box V7.0 from Liberty
|
|
PHREAKY2.TXT N 1594 01-05-92 AUSTRALIAN bluebox new freqs
|
|
NEW_PHR.TXT N 1958 01-05-92 A NEW WAY OF PHREAKING - read it!!!
|
|
MCI_DIAL.EXE N 996 01-09-92 Mci Dialer
|
|
WDIAL80.LZH N 11549 01-19-92 Window Dialer V0.80
|
|
WBOX_8.LZH N 62191 01-26-92 WhiteBox V8.0 - More extended 2.0-
|
|
look.
|
|
CPI.LZH N 42875 01-27-92 Corrupt Programmers International,
|
|
parts
|
|
1 - 2.. Viruses etc. sources for PC..
|
|
ULTRA.LZH N 37683 01-28-92 Ultra magazines, 1-15..
|
|
CUD342.TXT N 40026 01-29-92 Computer Underground Digest #3.42
|
|
CUD343.TXT N 39064 01-29-92 Computer Underground Digest #3.43
|
|
CUD344.TXT N 29162 01-29-92 Computer Underground Digest #3.44
|
|
CUD401.TXT N 26882 01-29-92 Computer Underground Digest #4.01
|
|
CUD402.TXT N 38226 01-29-92 Computer Underground Digest #4.02
|
|
EFF203.TXT N 29999 01-29-92 EFFector Online Issue #2.03
|
|
EFF204.TXT N 40906 01-29-92 EFFector Online Issue #2.04
|
|
WORLD9.TXT N 46050 01-29-92 The Worldview Magazine Issue #9
|
|
EFFWASH.TXT N 5980 01-29-92 Electronic Frontier F. Press Release
|
|
PHRACK36.TXT N 187448 01-29-92 PHRACK Issue #36 - 'Diet Phrack'
|
|
DIAL31.LHA N 4956 02-01-92 Dialer 3.1...
|
|
WBOX_9.LZH N 72702 02-02-92 White box v9.0....Now totally V2.0
|
|
compatibl
|
|
RASTABOX.LHA N 22211 02-27-92 A new bb proggy
|
|
SPEEDIT.TXT N 3284 02-28-92 How to get up in 2300cps under OS2.0
|
|
FREQS.DOC N 3725 03-03-92 Complete frequenze list of CCITT#5
|
|
PHRACK35.LZH P 150229 03-03-92 Phrack Issue #35
|
|
NIA73.LZH P 86072 03-03-92 Network Information Access Newsletter
|
|
#73
|
|
-DX&LX- N 6618 03-08-92 Textfile about a lamer hacking
|
|
passwords
|
|
at The Venue (probably Dexter / Cinefex)
|
|
|
|
** FILE LISTING ENDS
|
|
|
|
Most of the executable files will be Amiga files - REQUEST AT YOUR OWN
|
|
RISK! YOU REQUEST - YOU PAY, whether you can use the file or not.
|
|
|
|
--------------------------------------------------------------------------
|
|
|
|
|
|
End of CDUGD Volume 1, Number 2
|
|
|
|
|
|
**************************************************************************
|
|
|
|
|
|
|
|
|