338 lines
16 KiB
Plaintext
338 lines
16 KiB
Plaintext
/\###############/\/\/###################/\/\/\/\/\/\/\/####/\/\/\/\/\
|
|
/###############/\/\/\/#################/\/\/\/\/\/\/\/######/\/\/\/\/
|
|
###############/\/\/\/\/###############/\/\/\/\/\/\/\/########/\/\/\/\
|
|
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\/\#####/\#####/\/\/\
|
|
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\/#####/\/\#####/\/\/
|
|
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/\#####/\/\/\#####/\/\
|
|
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\/#####/\/\/\/\#####/\/
|
|
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\
|
|
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\
|
|
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\
|
|
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\####################/\
|
|
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\
|
|
#####/\/\/\/\/\/\/\/\/\/\/\/\#####/\/\/\/\/\/\/\#####/\/\/\/\/\#####/\
|
|
###############/\/\/\/\/###############/\/\/\/\/#####/\/\/\/\/\#####/\
|
|
/###############/\/\/\/#################/\/\/\/\#####/\/\/\/\/\#####/\
|
|
/\###############/\/\/###################/\/\/\/#####/\/\/\/\/\#####/\
|
|
Center of Intelligent Anarchists
|
|
Issue #2 Release date: April 3, 1994
|
|
|
|
<><><><><><><><><>
|
|
Table of Contents>>>>>>>>>.
|
|
<><><><><><><><><>
|
|
Introduction
|
|
Subscription Information
|
|
Writing for CIA
|
|
Misconceptions of Computer Hacking
|
|
Tips for The New Hacker
|
|
Where to Get Information
|
|
|
|
|
|
|
|
><><><><><><>
|
|
Introduction>>>>>>>
|
|
><><><><><><>
|
|
Hello, to all of you that acutally downloaded my last issue, thanks
|
|
for taking interest. I don't know if this will work out or not, but I am
|
|
trying to put out one a month and am uploading to as many bbs as possible.
|
|
In this issue I will cover probably more hacking than anything, because that
|
|
is what I have really been getting into the past few weeks. I go through
|
|
phases from phreaking, to hacking, to anarchy, etc. Right now I am in a
|
|
hacking/phreaking stage. Well, thanks to those that downloaded the last one,
|
|
spread it around. Upload to all your local Bulletin Boards. Give to your
|
|
friends. If anyone is on internet, send a copy to Computer Underground
|
|
Digest and give them this message for me:
|
|
-------
|
|
Dear CUD,
|
|
I am now an avid collector of your publication. I am missing most of the
|
|
issues, but I am building up my collection. I am also going to attempt to
|
|
build up a collection of Phrack. Anyway, I thought that you might be
|
|
interested in my new publication. If so, then send me a letter (U.S. Mail)
|
|
and I can arrange for you to get a copy each month. My address is:
|
|
Center for Intelligent Anarchits
|
|
c/o Totally Destroyed
|
|
2400 Derby Drive
|
|
Fallston, MD 21047
|
|
Thanks.
|
|
Sincerely,
|
|
Totally Destroyed
|
|
-----------
|
|
Well, on with the files.
|
|
|
|
><><><><><><><><><><><><>
|
|
Subscription Information>>>>>>>>>
|
|
><><><><><><><><><><><><>
|
|
To receive the Center of Intelligent Anarchist's publication monthly
|
|
by mail then send me a letter including Name, Address, and Where you get
|
|
your copies of CIA (BBS name, Person, etc.). Prices are as follows:
|
|
Hard Copy $15.00 12 issues
|
|
Soft Copy Disks Supplied (specify size) $25.00 12 issues
|
|
Soft Copy, you supply disks $20.00 12 issues
|
|
|
|
Sample copies are available at $2.00 for hard copy and $3.50 for soft copy
|
|
with the disk supplied (specify size). Send your name, address, phone number (Optional),
|
|
and check, money order, or cash (Not Responisble for Lost Mail).
|
|
|
|
Mail orders to:
|
|
Center of Intelligent Anarchist's
|
|
c/o Totally Destroyed
|
|
2400 Derby Drive
|
|
Fallston, MD 21047
|
|
|
|
<><><><><><><><>
|
|
Writing for CIA>>>>>>>>>
|
|
<><><><><><><><>
|
|
If you wish to write for the Center of Intelligent Anarchist's publication
|
|
submit article to:
|
|
Center of Intelligent Anarchist's
|
|
c/o Totally Destroyed
|
|
2400 Derby Drive
|
|
Fallston, MD 21047
|
|
Include your address, name, where I can get in touch with you (Mailing
|
|
address U.S. Mail is fine), and the article. If you wish to become a
|
|
regular writer tell me that as well.
|
|
|
|
|
|
><><><><><><><><><><><><><><><><><>
|
|
Misconceptions of Computer Hacking>>>>>>>>>
|
|
><><><><><><><><><><><><><><><><><>
|
|
I am here to point out many of the misconceptions of computer
|
|
hacking. I am astonished as to the amount of ignorance there is on the
|
|
subject. Many people are under the impression that we are here mainly to
|
|
destroy, modify, and make life miserable to all computer users. This is
|
|
obviously a lie. Lets take a look at the Hacker Ethics in the book Hackers
|
|
by Steven Levy.
|
|
1. Access to computers--and anything which might teach you something
|
|
about the way the world works--should be unlimited and total. Always
|
|
yield to the Hands-On Imperative!
|
|
|
|
2. All information should be free.
|
|
|
|
3. Mistrust authority--Promote Decentralization.
|
|
|
|
4. Hackers should be judged by their hacking, not bogus criteria
|
|
such as degrees, age, race, or position.
|
|
|
|
5. You can created art and beauty on a computer.
|
|
|
|
6. Computers can change your life for the better.
|
|
|
|
Hackers also strictly believe that no information should be modified or
|
|
destroyed. If you wish to change something, make sure it is easily detected
|
|
and fixed. Then only do it if it will make the system better or inform
|
|
people about their system.
|
|
ex. Once I heard of a hacker who logged onto a system "illegally" and
|
|
put an user specific logon screen on the system. It read:
|
|
Hello <Name>, I see that your password is <password>.
|
|
You should consider the password "Carriage Return" instead,
|
|
as this helps promote Free Information.
|
|
|
|
No damage was done, the only problem was that anyone in the room saw the
|
|
users password on the screen. Therefore all the users changed their
|
|
passwords. And the System Operator had a small ten minute task to do,
|
|
removing the message. It demonstrated that the security system was week.
|
|
A smart sysop would have added more security or taken the messages advice
|
|
and gotten rid of the security all together. This would work.
|
|
ex. ITS (Incompatible Time-sharing System) was written for the PDP-6
|
|
back in the sixties at MIT (Mass. Institute of Technology). It was
|
|
a system that allowed full access to any user file by any user. It
|
|
also supported no passwords and was more user friendly than any other
|
|
system in use that day. It had up to date technology in the
|
|
programming. Any user could enter a command to find out who else was
|
|
online and could even get their screen on their terminal to watch what
|
|
they were doing. The purpose, to simulate the old effect of everyone
|
|
crowding around one terminal. Their was also a command called Kill
|
|
System, which would Kill the System. The idea was to take the fun out
|
|
of crashing the system and the above mentioned features took the fun
|
|
out of hacking into other peoples files. Now all information in that
|
|
particular computer was FREE!! Users could also modify the code of the
|
|
system. This added to it and soon it became the best system around at
|
|
the time, with every user working on it a little bit at a time. Making
|
|
improvements, it grew. Yet no one crashed the system and files weren't
|
|
lost. Why, because that required no skill on this system. People turned
|
|
to more productive things like improving the system, because this
|
|
required skill.
|
|
|
|
So obviously the hacker ethic makes things better and we do no harm. It is
|
|
against hacker ethics and morales to crash a system, let lose a virus, or
|
|
damage a system in any other way.
|
|
Now, here are some of the misconceptions of hacking by the general
|
|
population. I will not mention names here and am in no way putting down
|
|
this fine student who does quite well in school and is overall an intelligent
|
|
and caring person. This is a list of the fallacies in his research project
|
|
on hacking. His thesis is to prove that hacking should be illegal.
|
|
1. He defines hacking as follows:
|
|
Computer hacking - the process of using a computer with a
|
|
modem and connecting to another computer with a modem, then
|
|
breaking passwords, in search of information and services
|
|
[electronic trespasing], and/or make trouble.
|
|
|
|
2. He says the following about cyperpunks, computer enthusiasts, and
|
|
hackers:
|
|
Most work in gangs and gave secret code names to identify
|
|
themselves.
|
|
|
|
No girl cyperpunks, computer entusiasts, or hackers.
|
|
|
|
Many come from broken homes or have pyschological problems.
|
|
|
|
3. He does define the Hacker Ethic correctly though. He defines it
|
|
as follows:
|
|
Hacker Ethic - It is ok to search, but never destroy.
|
|
|
|
4. We never transmit viruses as he says.
|
|
5. We don't delete hard drives neither, unless of course they're ours.
|
|
6. Yeah we crack passwords, and copy info., but only for educational
|
|
purposes.
|
|
|
|
The common betrayal of hackers as Charles Manson with a computer is totally
|
|
bogus and a stereotype made by the mass media of today's world. I myself
|
|
don't come from a broken home and many of us have no pyschological problems.
|
|
Unless searching for information is considered a problem. And of course, we
|
|
all know that hackers do not discriminate. There have been female hackers.
|
|
And what he calls gangs, I don't have a clue as to what he means. Yet, we
|
|
make no trouble, we delete no files, we don't damage a thing, and we don't
|
|
crash systems and upload viruses. Yes, I know how to write destructive
|
|
programs, but I don't use them. I merely posess the knowledge, I don't use
|
|
it for any reason. This illustrates the common misconception of hackers
|
|
and other computer enthusiasts. Lets be glad he didn't include phreakers in
|
|
the paper too.
|
|
|
|
<><><><><><><><><><><><>
|
|
Tips for the New Hacker>>>>>>>>>>
|
|
<><><><><><><><><><><><>
|
|
Hopefully this will become a regular section in CIA magazine. In it
|
|
you will find tips and hints for the new hacker. I know when I was starting
|
|
I loved finding files on New Hacker Hints. Well, on with the premiere of
|
|
this section.
|
|
This is a long list of tips to avoid being caught, some include
|
|
"hacker ethics".
|
|
|
|
1. Don't ever maliciously hack into a system. Do no damage and
|
|
don't delete or modify files unless neccesary to cover your tracks.
|
|
|
|
2. Don't give out your voice phone number. Many famous phreaks or
|
|
hackers have turned Narc when they got busted. If it gives them a
|
|
chance they may turn you in.
|
|
|
|
3. Don't attempt to hack into Military or Government computers. They
|
|
will almost definately bust you as they have all the time, money, and
|
|
resources in the world.
|
|
|
|
4. Don't use codes from your house. You WILL almost always get
|
|
busted. Most PBX/950/800 have ANI and will trace you.
|
|
|
|
5. Don't ever rat out someone. It will come back to you later.
|
|
|
|
6. Use only your own codes, never one given to you by anyone. They
|
|
are almost always overused.
|
|
|
|
7. Be paranoid. Use a encryption program to encode all the files on
|
|
your computer. Don't keep written notes. If you must write something
|
|
down, burn it when your done. The fed's do trash, just like us.
|
|
|
|
8. If you get busted don't say anything. Refuse to speak without a
|
|
lawyer.
|
|
|
|
9. If the police arrive at your house with a warrant. Look it over
|
|
and know what they can and can't do. If they try something they can't
|
|
do, stop them.
|
|
|
|
10. Try not to hack off your own line. Splice your neighboors, or
|
|
call from a fortress phone. If you hack long enough you'll sooner
|
|
or later get ANI'd. And Packet Switched Networks aren't entirely
|
|
safe.
|
|
|
|
11. Make it tough to track you. Bounce the call off several outdials.
|
|
If your on a PSN (Packet Switched Network) go through several pads,
|
|
before you reach your destination. It will make more trouble for the
|
|
investigators and make it easier for you to get away.
|
|
|
|
That's all for this issue. More info next time. For all of you interested in
|
|
a data encryption program, I can mail one to you (Shareware) and one other
|
|
(PC Magazine, batch/asm routine) on the same disk. Cost is only $4.00.
|
|
Send Name, Address, Phone (Optional), and check, money order, or cash (I am
|
|
not responisble for lost mail) to:
|
|
Center for Intelligent Anarchist's
|
|
c/o Totally Destroyed
|
|
2400 Derby Drive
|
|
Fallston, MD 21047
|
|
|
|
><><><><><><><><><><><><>
|
|
Where to Get Information>>>>>>>
|
|
><><><><><><><><><><><><>
|
|
Hacking/phreaking material is hard to obtain and often quite
|
|
expensive. This will become a regular section with magazine/catalog/book
|
|
Companies that sell materials on hacking/phreaking/etc. Here goes the list:
|
|
|
|
Delta Press Ltd.
|
|
P.O. Box 1625
|
|
215 South Washington Street
|
|
El Dorado, AR 71731
|
|
-explosives, improvised munitions, survival, espionage,
|
|
survival, revenge, guns
|
|
|
|
Palidan Press
|
|
P.O. Box 1307
|
|
Boulder, CO 80306
|
|
-explosives, improvised munitions, survival, espionage,
|
|
privacy, revenge, guns
|
|
|
|
Eden Press
|
|
11623 Slater "E"
|
|
P.O. Box 8410
|
|
Fountain Valley, CA 92728
|
|
-privacy, protection, jobs, credit, espionage, buisness ideas
|
|
offshore finace, personal independance
|
|
|
|
Books By Phone
|
|
P.O. Box 522
|
|
Berkeley, CA 94701
|
|
1-800-858-2665
|
|
-drugs, criminology, cyberpunk, occult, rock & roll, sex,
|
|
underground labs, survival
|
|
|
|
There are many more, that I will include in later issues. I have a
|
|
list of about thirty, but none are verified (old list) and as I receive info.
|
|
you will receive info.
|
|
|
|
_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-
|
|
Well that wraps it up for issue number two. Should have been released
|
|
April 3,1994. If anyone is interested in speaking with me I can be reached
|
|
on prodigy at GSTD79B. Name is Totally Destroyed. I will be canceling Prodigy
|
|
soon and getting Compuserve, so I will post my CompuServe I.D. when I get it.
|
|
Continue writing me on prodigy if you wish, I will be there. Some letters
|
|
will be posted in a letters to editor section. You can reach me at:
|
|
Center for Intelligent Anarchist's
|
|
c/o Totally Destroyed
|
|
2400 Derby Drive
|
|
Fallston, MD 21047
|
|
|
|
Selected letters will be placed in a letters to the editor section. Well,
|
|
until next month. Happy Hacking (Happy Easter too!!)
|
|
______________________________________________________________________________
|
|
This just in, for some reason CUD has been ended. It will no longer be
|
|
available!!!
|
|
|
|
|
|
|
|
|
|
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|
|
APRIL FOOLS!!!!!!!!!!!
|