57 lines
3.5 KiB
Plaintext
57 lines
3.5 KiB
Plaintext
|
||
_______________________________________________________________________________
|
||
|
||
Telecom Computer Security Bulletin Volume One, Issue 1
|
||
_______________________________________________________________________________
|
||
|
||
An Introduction by Doctor Cypher and Necrovore
|
||
|
||
Welcome to the premier issue of TCSB, the no-bullshit technical journal. We
|
||
aren't into politics, info-hoarding, or any of that rot. We are into learning.
|
||
Since the demoralization of the underground there has been a rash of inform-
|
||
ation hoarding and a b;atant disregard of hacker ethics -- this must stop if
|
||
the underground is to survive. Our groups, Bellcore and Xtension, are almost
|
||
misplaced in this day and age of the underground. We believe not in politics
|
||
and images as do other groups, but rather in learning and sharing of knowledge.
|
||
You may or may not have heard of our groups, but that is irrelevant. You see,
|
||
we don't call many boards any more. It churns our stomachs seeing what has
|
||
become. TCSB is our way of emphasizing our beliefs and our solution to the
|
||
problem. Hopefully the information provided in this and future issues of TCSB
|
||
will prompt new happenings in the computer underworld. We can only hope.
|
||
|
||
TCSB is currently a fairly "closed" publication. The articles are brought
|
||
to you from the combined efforts of the members of Bellcore and Xtension. But
|
||
we are not arrogant people. We will accept contributions as long as they are
|
||
in character with the general style and format of TCSB. But you must contact
|
||
either Doctor Cypher or Necrovore, and, as said previously, that can be poten-
|
||
tially difficult. But good luck. Also, TCSB is not on any sort of regular
|
||
release schedule (such as other hacker mags are). We feel that if we begin to
|
||
place deadlines on our releases then we will be stressed and will resort to
|
||
releasing any file. That, in the end, affects the quality of the information
|
||
and we want all information released in TCSB to be of the highest caliber
|
||
possible. As such, the next issue of TCSB will be released when enough good
|
||
files have been written. Hey, it makes sense to us.
|
||
|
||
Enough of all this. In this issue you will find:
|
||
|
||
FILE SIZE AUTHOR DESCRIPTION
|
||
-------- --------- -------------- --------------------------------------------
|
||
TCSB.01 Cypher/Necro An Introduction to TCSB Volume One, Number 1
|
||
TCSB.02 Doctor Cypher There is Gold in Those Silver Boxes
|
||
TCSB.03 28666 Blade Runner An Introduction to ItaPac
|
||
TCSB.04 11483 Necrovore PRIMOS CPL Directives Reference
|
||
TCSB.05 30374 Blade Runner Introduction to Packet Switched Nets Part I
|
||
TCSB.06 27101 Blade Runner Introduction to Packet Switched Nets Part II
|
||
TCSB.07 The Usurper Digital Transmission Techniques
|
||
TCSB.08 Byte Man Guide to Safe Blue Boxing in the Late 80's
|
||
TCSB.09 Line Shadow A Tutorial on the VAX/VMS Authorize Utility
|
||
TCSB.10 12071 Necrovore PRIMOS RECV Parameters and DMSTK Formats
|
||
|
||
COMING NEXT ISSUE (Whenever that may be):
|
||
|
||
Look forward to more informative technical documents in the next issue of
|
||
the Telecom Computer Security Bulletin. Some of the future highlights will be:
|
||
Network Transmission, A Beginner's Guide to PRIMOS, Electronics in the Central
|
||
Office, and more. Look for it!
|
||
-- Doctor Cypher and Necrovore 09/10/88
|
||
_______________________________________________________________________________
|
||
$ |