878 lines
38 KiB
Plaintext
878 lines
38 KiB
Plaintext
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
= =
|
||
- WELCOME TO THE FOURTH ISSUE OF -
|
||
= =
|
||
- -=>PHANTASY<=- -
|
||
= =
|
||
- A MONTHLY PUBLICATION AND NEWSLETTER OF -
|
||
= =
|
||
- THE -
|
||
= INTERNATIONAL =
|
||
- INFORMATION -
|
||
= RETREIVAL =
|
||
- GUILD -
|
||
= =
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Volume Number Two,Issue Number Four Dated 01/20/91
|
||
|
||
Table of Discontents:
|
||
|
||
[1] Errata in Phantasy Three
|
||
Written By: Phantasy Magazine
|
||
|
||
[2] Explosive Bullets
|
||
Written By: Saint Anarchy
|
||
|
||
[3] Completely Useless Trivia Knowledge (PART 1)
|
||
Written By: Knight Hack
|
||
|
||
[4] ConnNet Information
|
||
Provided By: ConnNection
|
||
|
||
[5] Scanner Frequencies of the Government
|
||
Provided By: Unknown
|
||
Edited By: Mercenary
|
||
|
||
[6] Installing a Smoke Screen on your Car
|
||
Written By: Saint Anarchy
|
||
|
||
[7] PHANTASY TIDBITS
|
||
|
||
[8] Listing of PHANTASY Distribution Sites
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
OFFICIAL DISLAIMER...
|
||
|
||
All information in PHANTASY is from USER contributed material
|
||
The Publishers and Editors of PHANTASY and THE IIRG disclaim
|
||
any liability from any damages of any type that the reader or
|
||
user of such information contained within this newsletter may encounter
|
||
from the use of said information. All files are brought to you for
|
||
entertainment purposes only! We also assume all information infringes
|
||
no copyrights and hereby disclaim any liability.
|
||
|
||
PHANTASY is (C) 1990 by The IIRG
|
||
IIRG and INTERNATIONAL INFORMATION RETREIVAL GUILD is (C) 1982
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [1]: Errata
|
||
|
||
In Phantasy Three-Section Four, The Article on Chlorine Bombs was written
|
||
by THE DETH VEGETABLE. His article was submitted without his name and we
|
||
assumed he wanted to remain Anonymous. We apologize for any inconvience this
|
||
may have caused to him or our readers.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [2]: Explosive Bullets
|
||
Article Written By: Saint Anarchy
|
||
|
||
|
||
Greetings fellow anarchists and hackers. This bullet is an explosive type
|
||
of bullet, but not in the technical sense which would make it illegal.
|
||
This bullet contains no real explosives, but never the less it explodes
|
||
with equal the violence as if it did contain them.
|
||
It can be used in all calibers, both in rifles and handguns.
|
||
|
||
Before we undertake this little project, I'd like to state that in no
|
||
way do I condone the use of this type of bullet, but provide it here in
|
||
this periodical for your enlightenment and entertainment only.
|
||
Some old timers have used this bullet for years, especially Cajuns and
|
||
some more of the radical elements in the United States and abroad.
|
||
|
||
The secret of this bullet is WATER, yes H20, But how can water make a
|
||
bullet explode you ask? Simply put, when an ordinary lead or soft point
|
||
bullet type enters tissue, the tissue builds up in front of the nose,
|
||
pushing the nose rearward causing the lead to mushroom.
|
||
The less pointed the nose and the greater the velocity, the greater the
|
||
mushrooming effect. With a hollow-point bullet, a certain amount of soft
|
||
tissue enters the hollow and causes expansion, but not much can enter
|
||
because of the cushion of air trapped in the hollow. But in the bullet we
|
||
will create, it works on the principle of hydraulics.
|
||
Water is incompressible and according to physical laws, when it is
|
||
trapped in a container and pressure is exerted on any portion of it, that
|
||
same pressure is exerted on the inside surface of the container.
|
||
If you have a glass bottle completely filled with water with no trapped
|
||
air and you tryed to stopper it by tapping in the glass stopper with your
|
||
hand, you could shatter the container.
|
||
Lets say the bottom area of the glass stopper is one square inch in
|
||
surface area and you tap it with a force of two pounds. The inside surface
|
||
may have an area of one hundred square inches. This means that the total
|
||
expanding force exerted on the inside surface of the bottle is 200 pounds!
|
||
The force on the gas-check in the bullet upon impact is also transmitted
|
||
undiminished to every portion of the inside surface of the hollow.
|
||
The result is enough force for the bullet to literally explode!!!
|
||
But since the nose is hollow-pointed, only the nose of the bullet will
|
||
explode. The main body of the bullet continues to penetrate as a lead
|
||
cylinder.
|
||
I must explain however, that the hollow point isn't the usual size.
|
||
Experiments have shown that in order to obtain sufficient hydraulic
|
||
pressure, the diameter of the cavity must be 38% or 40% of the bullet
|
||
diameter. The depth of the cavity does not control the rate of expansion,
|
||
it simply determines the degree of explosion. Obviously a deeper cavity
|
||
means more internal surface which the impact pressure can use, and
|
||
therefore a greater explosion with a greater portion of the bullet being
|
||
disintegrated.
|
||
It is generally considered that the fragmentation of a bullet is
|
||
undesireable because its energy is wasted in its disintegration and there
|
||
can be no further penetration of tissue except by small particles of the
|
||
bullet held together and mushroomed until it stops moving. All its
|
||
kinetic energy would be exausted against the tissue covering an area
|
||
approximately the size of the mushroom.
|
||
This bullet is different in that it penetrates first and then
|
||
disintegrates violently from internal pressures, like a bomb!! Creating its
|
||
own shock-wave which affects all tissue in the immediate area.
|
||
One of the nice features about this bullet is that it's a home-brew,
|
||
The principle items you need are a special bullet mold in the caliber of
|
||
your gun,with an extra large hollow-point, a gas checker, and an
|
||
eye-dropper.
|
||
Theres no trick to making the bullet, its cast in the usual way.
|
||
the water is added with the eye-dropper to completely fill the hollow
|
||
point cavity. The gas-checker, with its concave side outward, is then
|
||
seated over the water with a punch of a bullet lubricator-sizer.
|
||
Since the gas-check is over-sized, it seals the the water filled cavity
|
||
like the cap on a bottle.
|
||
Now some of you may not have a re-loader,dies,and molds. Your saying
|
||
"OK what about me?". Well heres a quick fix for you.
|
||
Purchase a box of hollow points in your caliber. Enlarge the cavity with
|
||
a round file or use a taper like myself.
|
||
Fill the cavity with water,(I prefer to use a needle for this), stolen
|
||
from my local Dr. on my last visit.
|
||
Then seal the hollow with silicon or preferably teflon and allow to dry.
|
||
Its not as good as the molded type but works 1/2 as well.
|
||
|
||
Some quick Notes:
|
||
|
||
The bullet will only work on fleshy material,(Humans,animals,watermelons)
|
||
It will not work if shot at a rock,board,wall or police cruiser.
|
||
Have phun folks!!
|
||
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [3]: Completely Useless Trivia Knowledge (Part 1)
|
||
Written by: Knight Hack
|
||
|
||
In an effort to alleviate the everyday strain of life and mostly
|
||
because at some point and time, someones going to force you into a game
|
||
of Trivial Pursuit or some similar game of stupidity, we offer these facts
|
||
to you so you don't look like an idiot in front of the wife or girlfriend.
|
||
|
||
1. To travel across the Soviet Union by train takes 8 days.
|
||
2. Soldiers in Ancient Greece went into battle, Naked from the waste down.
|
||
3. At latitude 60' South, you can sail all the way around the world.
|
||
4. If goldfish are left in the dark for a long time, they turn white.
|
||
5. When he was six, Mozart wrote short harpsichord pieces and a piano
|
||
concerto.
|
||
6. Bricks soaked in paraffin are said to be a good bait for catching
|
||
lobsters.
|
||
7. A sheep once survived for fifty days buried in a snowdrift.
|
||
8. In 1979, Snow fell in the Sahara Desert.
|
||
9. During the American Civil War, the King of Siam offered Abe Lincoln
|
||
the use of his War Elephants. Abe politely declined.
|
||
10. On average, a person loses 312 grams (11oz) of weight overnite..
|
||
|
||
I hope to make this a running article with 10 new facts in every issue
|
||
Any trivia facts you'd like to send me can be sent to, The Rune Stone BBS
|
||
The numbers listed at the End of the Magazine.
|
||
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [4]: ConnNet Information
|
||
Provided By: ConnNection
|
||
|
||
In this article I'd like to show How ConnNets Online help files and
|
||
tutorials can provide you with a wealth of Information about moving
|
||
around on there network. (All Info provided here was from there free
|
||
help database)
|
||
Information such as the following provided on there free database
|
||
should not be ignored. They provide Log-on Sequences and Password lengths.
|
||
|
||
|
||
|
||
Databases Accessible via ConnNet
|
||
|
||
1. Dow Jones News/Retrieval
|
||
2. CompuServe
|
||
3. Dialcom
|
||
4. GEnie
|
||
5. Delphi
|
||
6. Eaasy Sabre
|
||
7. NewsNet
|
||
8. PeopleLink
|
||
9. National Library of Medicine
|
||
10. BIX
|
||
11. A listing of ConnNet Access Numbers
|
||
|
||
|
||
Dow Jones News/Retrieval
|
||
|
||
Dow Jones News/Retrieval offers timely and authoritative business
|
||
and financial news as well as a broad selection of general interest
|
||
services.
|
||
|
||
From your home or office you can check a stock, follow the news,
|
||
find a fact, plan a trip, select a college, and much, much more.
|
||
|
||
Logon instructions using ConnNet...
|
||
|
||
Dow Jones News/Retrieval: Logon instructions using ConnNet:
|
||
|
||
NOTE: Please be sure to enter all logon information in capital letters.
|
||
|
||
1. Dial your local ConnNet access number.
|
||
|
||
2. Terminal will respond: Welcome to ConnNet
|
||
Please login: *
|
||
|
||
Enter NDJONES-. and press <Carriage Return>
|
||
|
||
3. Terminal will respond: WHAT SERVICE PLEASE?
|
||
|
||
Enter DJNS and press <CR>
|
||
|
||
4. Terminal will respond: ENTER PASSWORD
|
||
|
||
Enter your 10-character personal password and press <CR>
|
||
|
||
CompuServe
|
||
----------
|
||
|
||
CompuServe is an easy-to-use service designed especially for the
|
||
personal computer user. Subscribers get a wealth of information
|
||
like national news wires, electronic banking and shop-at-home.
|
||
|
||
Electronic special interest groups communicate and exchange ideas;
|
||
students can access an electronic encyclopedia and travelers can
|
||
check the latest airline schedules and fares.
|
||
|
||
CompuServe Logon Instructions using ConnNet:
|
||
|
||
NOTE: Please be sure to enter all logon information in capital letters.
|
||
|
||
1. Dial your local ConnNet access number.
|
||
|
||
2. Terminal will respond: Welcome to ConnNet / Please log in:*
|
||
|
||
Enter .CPS and press return <CR>
|
||
|
||
3. Terminal will respond: Host Name:
|
||
|
||
Enter CIS and press <CR>
|
||
|
||
4. Terminal will respond: User ID:
|
||
|
||
Enter your personal CompuServe User ID and press <CR>
|
||
|
||
5. Terminal will respond: Password:
|
||
|
||
Enter your personal CompuServe Password and press <CR>
|
||
|
||
Dialcom
|
||
|
||
Are you looking for a powerful yet easy-to-use source of timely
|
||
information? Dialcom's comprehensive family of services may be the
|
||
solution.
|
||
|
||
If you need access to announcements made by federal government
|
||
agencies, Fedwire can keep you informed of political developments
|
||
as they happen.
|
||
|
||
Simplifying the federal government procurement process is one of
|
||
Dialcom's specialties: instead of keeping a bookshelf full of Federal
|
||
Acquisitions, Regulations and Updates, you can search the FAR Online.
|
||
|
||
Dialcom's Newswire brings you AP, UPI, and Business Wire news even
|
||
before it makes the papers.
|
||
|
||
NOTE: Please be sure to enter all logon information in capital letters.
|
||
|
||
1. Dial your local ConnNet access number.
|
||
|
||
2. Terminal will respond: Welcome to ConnNet
|
||
Please log in: *
|
||
|
||
Enter .DI and your unique computer system number assigned
|
||
by Dialcom and press <CR>
|
||
|
||
3. Terminal will respond: Please sign on
|
||
|
||
Enter ID (space) and your 6-digit alphanumeric code and
|
||
press <CR>
|
||
|
||
4. Terminal will respond: Password:
|
||
|
||
Enter your Dialcom password and press <CR>
|
||
|
||
GEnie
|
||
|
||
General Electric Information Services Company (GEISCO) offers
|
||
a micro computer consumer oriented service called GEnie.
|
||
|
||
Subscribers access a variety of entertainment services,
|
||
information and software exchanges, communication and shopping
|
||
services after prime time hours at a very reasonable rate.
|
||
|
||
Meet new people, join a RoundTable, post classified ads, schedule
|
||
a trip, trade stock market quotes and more.
|
||
|
||
GEnie logon instructions using ConnNet:
|
||
|
||
NOTE: Please be sure to enter all logon information in capital letters.
|
||
|
||
1. Dial your local ConnNet access number.
|
||
|
||
2. Terminal will respond: Welcome to ConnNet Please login:*
|
||
|
||
Enter .GE and press <Carriage Return>
|
||
|
||
3. Terminal will respond: "U#=".
|
||
|
||
Enter your User ID and password separated by a comma
|
||
and press <CR>
|
||
|
||
4. Terminal will respond: WELCOME TO GEnie
|
||
|
||
DELPHI
|
||
|
||
Delphi provides the services you need to stay on top of your
|
||
business and personal world, all in one proven, easy-to-use
|
||
utility that works with any computer or terminal.
|
||
|
||
Get the latest news, business, and financial stories as well
|
||
as stocks, commodities and money markets. Access a 20,000
|
||
entry encyclopedia and an enormous research library. Join
|
||
user groups with programs and support for MacIntosh, Apple II
|
||
and III, Commodore, Atari, Wang, Tandy, TI, Amiga, and MS DOS
|
||
computers like the IBM PC.
|
||
|
||
DELPHI Logon Instructions using ConnNet
|
||
|
||
NOTE: Please be sure to enter all logon information in capital letters.
|
||
|
||
|
||
1. Dial your local ConnNet access number.
|
||
|
||
2. Terminal will respond: Welcome to ConnNet
|
||
Please login:*
|
||
Enter .DELP and press return <CR>
|
||
|
||
3. Terminal will respond: USER NAME:
|
||
|
||
Enter your personal DELPHI user name and press <CR>
|
||
|
||
4. Terminal will respond: PASSWORD:
|
||
|
||
Enter your personal DELPHI password and press <CR>
|
||
|
||
EAASY SABRE
|
||
|
||
Would you like to check the schedules of 650 airlines worldwide from your
|
||
home or office?
|
||
|
||
Do you need to make travel, hotel, and rental car reservations for business
|
||
or pleasure?
|
||
|
||
American Airlines' EAASY SABRE connection to ConnNet gives you access to
|
||
all of this information whenever you want it - at an extremely low cost.
|
||
Now you can research all of your travel requirements, tailor you travel
|
||
plans to your needs and even make your own reservations.
|
||
|
||
EAASY SABRE: Logon instructions using ConnNet:
|
||
|
||
|
||
NOTE: Please be sure to enter all logon information in capital letters.
|
||
|
||
1. Dial your local ConnNet access number.
|
||
|
||
2. Terminal will respond: Welcome to ConnNet
|
||
Please log in: *
|
||
|
||
Enter N followed by your 6 character personal password and
|
||
then -.EZSB and press <CR>
|
||
|
||
3. Terminal will respond: Welcome SNET user to EAASY SABRE
|
||
|
||
NewsNet
|
||
|
||
NewsNet offers the full text of more than 300 specialized
|
||
business newsletters and databases as well as wire services,
|
||
credit reports, stock quotes, and airfares.
|
||
|
||
NewsFlash, an electronic clipping service, scans 6,000 new
|
||
articles each day, giving you custom reports on the topics
|
||
you specify. Much of this information is updated daily or
|
||
hourly, and 70% is not available from any other online vendor.
|
||
|
||
NewsNet logon instructions using ConnNet:
|
||
|
||
NOTE: Please be sure to enter all logon information in capital letters.
|
||
|
||
1. Dial your local ConnNet access number.
|
||
|
||
2. Terminal will respond: Welcome to ConnNet Please login:*
|
||
|
||
Enter .NET and press <Carriage Return>
|
||
|
||
3. Terminal will respond: PLEASE SIGN ON.
|
||
|
||
Enter your ID number, password, and press <CR>
|
||
|
||
PeopleLink
|
||
----------
|
||
Available since 1983 and serving over 35,000 subscribers nationwide,
|
||
American PeopleLink (PLink) offers its members the ability to share
|
||
ideas, news and viewpoints. Now PeopleLink is available via ConnNet
|
||
through the TYMGATE connection to TYMNET. New users join a club and
|
||
meet other "plinkers" who share special interests -- entertainment,
|
||
sports, hobbies, philosophies or lifestyles.
|
||
|
||
For computer enthusiasts, there are clubs devoted to the most popular
|
||
computer brands with thousands of programs in the data libraries ready
|
||
for downloading.
|
||
|
||
PeopleLink: Log-on instructions using ConnNet:
|
||
|
||
NOTE: Please be sure to enter all log-on information in capital letters.
|
||
|
||
1. Dial your local ConnNet access number.
|
||
|
||
2. Terminal will respond: Welcome to ConnNet
|
||
Please login: *
|
||
|
||
Enter .T and press <Carriage Return>
|
||
|
||
3. Terminal will respond: Tymnet: please log in:
|
||
|
||
Enter PLINK and press <Carriage Return>
|
||
|
||
4. Follow your normal PeopleLink log-on procedure from here on.
|
||
|
||
|
||
National Library of Medicine
|
||
----------------------------
|
||
The National Library of Medicine (NLM) is one of the oldest online database
|
||
services in America. NLM offers one of the widest ranges of information
|
||
available in the medical profession. Now this information is accessible via
|
||
ConnNet through the TYMGATE connection to TYMNET.
|
||
|
||
NLM provides doctors, nurses, medical researchers and others interested in
|
||
medical information, with a seemingly limitless array of information sources.
|
||
Operated by the United States Department of Health and Human Resources, NLM
|
||
provides the highest quality medical information available online.
|
||
|
||
National Library of Medicine: Log-on instructions using ConnNet:
|
||
|
||
NOTE: Please be sure to enter all log-on information in capital letters.
|
||
|
||
1. Dial your local ConnNet access number.
|
||
|
||
2. Terminal will respond: Welcome to ConnNet
|
||
Please login: *
|
||
|
||
Enter .T and press <Carriage Return>
|
||
|
||
3. Terminal will respond: Tymnet: please log in:
|
||
|
||
Enter NLM and press <Carriage Return>
|
||
|
||
4. Follow your normal NLM log-on procedure from here on.
|
||
|
||
BIX
|
||
---
|
||
|
||
The Byte Information Exchange (BIX) is now available via ConnNet through
|
||
the TYMGATE connection to TYMNET. BIX is offered to subscribers of BYTE
|
||
magazine (a McGraw-Hill publication) and other micro computer enthusiasts,
|
||
to facilitate the exchange of computer-related information and engage in a
|
||
continuing dialogue on hundreds of computer-related topics.
|
||
|
||
BIX users communicate with their pc's on topics like: artificial intelligence,
|
||
graphics, semiconductors, operating systems, and languages. Upon log-in,
|
||
users are greeted by any pending electronic mail before entering into online
|
||
conferencing. A unique feature allows subscribers to track specific ideas,
|
||
arguments and responses.
|
||
|
||
BIX: Log-on instructions using ConnNet:
|
||
|
||
NOTE: Please be sure to enter all log-on information in capital letters.
|
||
|
||
1. Dial your local ConnNet access number.
|
||
|
||
2. Terminal will respond: Welcome to ConnNet
|
||
Please login: *
|
||
|
||
Enter .T and press <Carriage Return>
|
||
|
||
3. Terminal will respond: Tymnet: Please log in:
|
||
|
||
Enter BIX and press <Carriage Return>
|
||
|
||
4. Follow your normal BIX log-on routine from here on.
|
||
|
||
ConnNet Access Numbers
|
||
----------------------
|
||
Note: All are area code 203
|
||
|
||
No Parity No Parity Odd/Even Parity
|
||
City 2400 Bps 300-1200 Bps 300-1200 Bps
|
||
---- ---------- ------------- ---------------
|
||
Bridgeport . . . . . . 366-6972 . . . . 368-3282 . . . . . 335-2650
|
||
Bristol . . . . . . . 589-5100 . . . . 589-8200 . . . . . --
|
||
Canaan . . . . . . . . 824-5103 . . . . 824-0775 . . . . . --
|
||
Clinton . . . . . . . 669-4243 . . . . 669-3282 . . . . . --
|
||
Danbury . . . . . . . 743-2906 . . . . 798-8282 . . . . . 791-0947
|
||
Danielson . . . . . . 779-1880 . . . . 774-0141 . . . . . --
|
||
Hartford . . . . . . . 724-6219 . . . . 724-3282 . . . . . 560-1469
|
||
Meriden . . . . . . . 237-3460 . . . . 631-3282 . . . . . 634-8171
|
||
Middletown . . . . . . 347-5665 . . . . 346-4500 . . . . . 347-1262
|
||
New Haven . . . . . . 776-1142 . . . . 777-3282 . . . . . 777-0281
|
||
New London . . . . . . 443-0884 . . . . 442-3282 . . . . . 442-9236
|
||
New Milford . . . . . 355-0764 . . . . 355-3282 . . . . . --
|
||
Norwalk . . . . . . . 866-5305 . . . . 866-5155 . . . . . 838-7124
|
||
Old Greenwich . . . . 637-8872 . . . . 637-5552 . . . . . --
|
||
Old Saybrook . . . . . 388-0778 . . . . 388-1461 . . . . . 388-1471
|
||
Seymour . . . . . . . 881-1455 . . . . 888-3211 . . . . . 888-0681
|
||
Stamford . . . . . . . 324-9701 . . . . 326-3282 . . . . . 324-1907
|
||
Storrs . . . . . . . . 429-4243 . . . . 429-3282 . . . . . --
|
||
Torrington . . . . . . 482-9849 . . . . 482-3282 . . . . . 489-4510
|
||
Waterbury . . . . . . 597-0064 . . . . 755-0255 . . . . . 574-2738
|
||
Willimantic . . . . . 456-4552 . . . . 456-3282 . . . . . --
|
||
Windsor . . . . . . . 688-9330 . . . . 688-8181 . . . . . --
|
||
Windsor Locks . . . . 623-9804 . . . . 623-0361 . . . . . 627-5917
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
Section [5]: Scanner Frequincies of the Government
|
||
Provided By: Unknown
|
||
Edited By: The Mercenary
|
||
|
||
The following frequencies were provided to us and are Known to work in
|
||
Connecticut as I,ve tried them on My scanner. I believe they'll work in
|
||
other areas as well. Please contact us and let us know.
|
||
|
||
|
||
B.A.T.F.-166.5375
|
||
B.A.T.F.-165.2875
|
||
D.E.A.-416.0500
|
||
D.E.A.-416.3250
|
||
D.E.A.-416.2000
|
||
D.E.A.-417.4000
|
||
D.E.A.-418.6250 CH.A-1
|
||
D.E.A.-418.9000 CH.A-2
|
||
D.E.A.-418.6750 CH.A-3
|
||
D.E.A.-418.7500 CH.A-4
|
||
D.E.A.-418.8250 CH.A-5
|
||
D.E.A.-418.9500 CH.A-6
|
||
D.E.A.-417.4500 CH.B-1
|
||
D.E.A.-417.5000 CH.B-2
|
||
D.E.A.-417.5500 CH.B-3
|
||
D.E.A.-419.0000 CH.B-4
|
||
F.B.I.-162.6375
|
||
F.B.I.-162.7625
|
||
F.B.I.-162.9500
|
||
F.B.I.-162.9750
|
||
F.B.I.-163.0500
|
||
F.B.I.-163.7250
|
||
F.B.I.-163.7500
|
||
F.B.I.-163.8625
|
||
F.B.I.-163.9375
|
||
F.B.I.-163.8875
|
||
F.B.I.-163.9125
|
||
F.B.I.-163.9375
|
||
F.B.I.-163.9750
|
||
F.B.I.-164.1250
|
||
F.B.I.-164.1500
|
||
F.B.I.-167.3375
|
||
F.B.I.-167.3750
|
||
F.B.I.-167.5375
|
||
F.B.I.-167.4250
|
||
F.B.I.-167.1500
|
||
F.B.I.-167.5250
|
||
F.B.I.-167.2125
|
||
F.B.I.-167.5625
|
||
F.B.I.-167.7875
|
||
F.B.I.-414.3000
|
||
F.B.I.-419.2000
|
||
F.B.I.-419.2250
|
||
F.B.I.-419.3500
|
||
F.B.I.-414.1000
|
||
F.B.I.-414.3500
|
||
F.B.I.-413.6250
|
||
F.B.I.-419.4750
|
||
F.B.I.-414.4000
|
||
F.B.I.-414.0750
|
||
I.R.S.-418.1750
|
||
I.R.S.-414.7000
|
||
I.R.S.-418.2250
|
||
I.R.S.-415.0000
|
||
I.R.S.-167.0000 (INVESTIGATORS)
|
||
I.R.S.-165.9500 (INVESTIGATORS)
|
||
U.S.ATTY.-116.1750
|
||
U.S.ATTY.-410.8750
|
||
U.S.ATTY.-416.1750
|
||
U.S.Marshal-163.2000
|
||
U.S.Marshal-163.8125
|
||
U.S.Marshal-417.7000
|
||
Secret Service-165.2125
|
||
Secret Service-165.3750
|
||
Secret Service-165.5125
|
||
Secret Servive-165.7875
|
||
Secret Service-166.4000
|
||
Secret Service-166.6375
|
||
Secret Service-166.5125
|
||
Secret Service-167.0250
|
||
Secret Service-165.5125
|
||
Secret Service-164.8875
|
||
Secret Service-164.4000
|
||
Secret Service-164.6500
|
||
Secret Service-162.6875
|
||
Secret Service-171.2875
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
Section [6]: Installing a Smoke Screen on your Vehicle
|
||
Written By: Saint Anarchy
|
||
|
||
The plans for my smoke screen will work especially well on older vehicles
|
||
and moderately well on newer vehicles. On some cars, you will be unable to
|
||
install this device.
|
||
|
||
[1] Obtain the nozzle of a paint sprayer.
|
||
|
||
[2] Drill a hole in the exhaust manifold about the size of the nozzle.
|
||
|
||
[3] Weld the nozzle in place, attach a length of gas line to it.
|
||
|
||
[4] Take the length of gas line and run it up to your drivers compartment
|
||
|
||
[5] Hook up the spray container after you've filled it with CASTOR OIL,
|
||
to the gas line you just ran up
|
||
|
||
[6] When you need the smoke screen, send the oil to the nozzle, the manifold
|
||
will heat it creating a thick dense cloud of black smoke making
|
||
pursuit of your vehicle almost impossible.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
Section [7]: Phantasy Tidbits
|
||
Written By: Mercenary,Knight-Hack, and the IIRG Staff.
|
||
|
||
-------------------------------------------------------------------------------
|
||
Dateline: Jan 91
|
||
-------------------------------------------------------------------------------
|
||
FBI TO INVESTIGATE ANTI-WAR MOVEMENT
|
||
|
||
FBI Agent Steve Sterrit, legal adviser to the FBI in Las Vegas, annonced that
|
||
the agency was actively investigating those who oppose Bush's war in the
|
||
Middle East.
|
||
The inquiry was launched after a complaint by Abraham Foxman, national
|
||
director of the Anti-Defamation Leauge (ADL). In a statement issued in N.Y.,
|
||
the ADL complained the Anti-war movement "is a brazen attempt to dishearten
|
||
and create a disunity among American troops". The ADL is the largest Israeli
|
||
lobby in the US. Foxman further requested Secretary of Defense Richard B.
|
||
Cheney to "identify and intercept" letters to american serviceman that oppose
|
||
the Middle East War.
|
||
|
||
IIRG NOTE: We here at the IIRG have only THree Things to State on this
|
||
topic of interest.
|
||
|
||
1. No BLOOD for OIL in the Middle East!!
|
||
2. Whatever happened to First Amendment Rights???
|
||
3. Let Israel fight her own Enemies, and leave us out of it!!
|
||
-------------------------------------------------------------------------------
|
||
DateLine: Dec 90
|
||
-------------------------------------------------------------------------------
|
||
Tap Magazine is once again available, Subscription rates are:
|
||
|
||
$10.00 a year US
|
||
$20.00 a year overseas
|
||
$15.00 a year in Canada
|
||
|
||
Tap Magazine
|
||
Post Office Box 20264
|
||
Louisville, Kentucky
|
||
40250-0264
|
||
|
||
-------------------------------------------------------------------------------
|
||
Dateline: Nov 90
|
||
-------------------------------------------------------------------------------
|
||
DIGITAL ANNOUNCES INTEGRATED SECURITY PROGRAM
|
||
|
||
MAYNARD, Mass. -- November 30, 1990 -- Digital Equipment Corporation
|
||
today announced an Integrated Security Program, which formalizes the
|
||
corporation's commitment to information security and an integrated
|
||
security architecture for distributed, multi-vendor systems.
|
||
|
||
Digital's announcement introduces a series of security
|
||
enhancements that package security technology for single systems,
|
||
local area networks, and management services to assist organizations
|
||
implement effective security controls.
|
||
|
||
"Security is a critical issue for many organizations as they
|
||
migrate to new information technology," said Digital Vice President
|
||
Harvey L. Weiss. "This program establishes Digital as the leader in
|
||
providing security products and capabilities to address expanding
|
||
information systems environments."
|
||
|
||
"We believe it is the 'management' of security technology - not
|
||
the technology itself - which is the key to providing computer
|
||
security for customers," Weiss said. "Digital now provides customers
|
||
with the best technology, comprehensive service and training to help
|
||
manage this technology and make it truly effective."
|
||
|
||
In support of its corporate commitment to help customers
|
||
implement and manage enterprise-wide secure solutions, Digital
|
||
announced major enhancements to its Integrated Security Program
|
||
which include:
|
||
|
||
o Major additions to VMS password management - to deter attacks
|
||
based on guessing user or system account passwords.
|
||
|
||
o New management features in the Ethernet Enhanced-Security
|
||
System - providing node authentication, access control and
|
||
encryption in a multi-vendor environment LAN.
|
||
|
||
o The development of a Compartmented Mode Workstation (CMW)
|
||
designed to be evaluated at the B1 and CMW level of trust.
|
||
CMW is based on RISC and VAX architecture, ULTRIX operating
|
||
system and X-Windows/MOTIF.
|
||
|
||
o The availability, through Digital, of Sybase's Secure SQL
|
||
Server - a Multi-Level Secure RDBMS software for VAX ULTRIX
|
||
systems.
|
||
|
||
o Digital's Distributed System Security Architecture (DSSA)- a
|
||
comprehensive specification for implementing information
|
||
security in a distributed, multi-vendor environment.
|
||
|
||
o The creation of a Secure Solutions Integration Center
|
||
|
||
- to provide security consulting and solution design.
|
||
|
||
o The availability of Next Step Services VMS Security
|
||
|
||
- a packaging of security courses and consulting to train a
|
||
customer's Information Systems organization.
|
||
|
||
The new integrated security products, capabilities and services
|
||
are designed to allow customers to choose the levels of security
|
||
appropriate for their applications and organizations while
|
||
maintaining systems investments. In addition, Digital also has a
|
||
program to encourage software vendors to develop complementary
|
||
security products.
|
||
|
||
The program addresses such things as: verification of identity
|
||
of systems and users; integrity of software and data shared across
|
||
networks, and provides confidentiality for sensitive information
|
||
stored or transmitted across networks.
|
||
|
||
By taking advantage of the integrated security controls in VMS,
|
||
ULTRIX, DECnet/OSI, Rdb/VMS and Secure SQL database software,
|
||
Digital customers can reduce training time required to install
|
||
security measures. Digital's participation in the National Computer
|
||
Security Center (NCSC) security evaluation program guarantees a high
|
||
level of assurance that the security controls in VMS are effective.
|
||
|
||
In the open systems environment, Digital has undertaken several
|
||
R & D initiatives to provide security for ULTRIX systems, Digital's
|
||
UNIX-based operating system. ULTRIX already has features designed
|
||
to meet NCSC's C2 requirements.
|
||
|
||
Digital is also developing a Compartmented Mode Workstation
|
||
(CMW) based upon RISC and VAX architecture, ULTRIX and X-Windows/
|
||
MOTIF for the Defense Intelligence Agency (DIA). This workstation is
|
||
designed to meet the NCSC's B1 and DIA's CMW security requirements
|
||
for multi-level workstation.
|
||
|
||
"It is important for customers to understand that it is easier
|
||
to manage security when the basic security co s are part of the
|
||
system," Weiss said. "The new program combines Digital's basic built
|
||
in security products with a comprehensive set of security services,"
|
||
he added.
|
||
|
||
Digital Equipment Corporation, headquartered in Maynard,
|
||
Massachusetts, is the leading worldwide supplier of networked
|
||
computer systems and services. Digital offers a full range of
|
||
computing solutions and systems integration for the entire
|
||
enterprise -- from the desktop to the data center.
|
||
-------------------------------------------------------------------------------
|
||
VAX, VMS, ULTRIX, DECnet and RDB/VMS are trademarks of Digital
|
||
Equipment Corporation.
|
||
UNIX is a trademark of AT&T.
|
||
Secure SQL Server is a trademark of Sybase Inc.
|
||
Motif is a trademark of Open Software Foundation, Inc.
|
||
-------------------------------------------------------------------------------
|
||
Dateline: Dec 90
|
||
-------------------------------------------------------------------------------
|
||
Vail, Colorado.- A Secret Service Agent assigned to Vice-President
|
||
Dan Quayle was arrested for shoplifting after allegedly trying to steal a
|
||
ski jacket.
|
||
Secret Service Agent Joyce Fletcher,39 of Washington was released after
|
||
posting bond. Police said Fletcher was arrested after allegedly stuffing the
|
||
jacket into a shopping bag in a changing room.
|
||
Allan Cramer, a Secret Service agent in Vail, said the Agency would begin
|
||
an internal investigation of the incident.
|
||
|
||
IIRG NOTE: Gee, no wonder the Secret Service wants to bust innocent
|
||
hackers and confiscate equipment. They're probably selling
|
||
the stuff out a backdoor of there headquarters and using
|
||
the profits to run there illicit drug-smuggling operation.
|
||
Oh well, divert attentions away from your own I guess...
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [8]: Phantasy Distribution Sites
|
||
|
||
Phantasy's Distribution Site's have changed,we apologize if you called a
|
||
board and didn't find the Mag. But were organized a little better now and
|
||
these will be the permanent sites as long as these systems are up and
|
||
operating.
|
||
|
||
1. IIRG Headquarters - The Rune Stone BBS -
|
||
1200/2400 Baud, 24 Hours a day
|
||
Call for the Earliest possible releases of Phantasy and other IIRG files.
|
||
(203) 485-0088.
|
||
|
||
2. Lightning Systems
|
||
19,200-1200 BAUD, 24 hours a day
|
||
(414) 363-4282
|
||
|
||
3. Sycamore Elite
|
||
19,200-1200 Baud HST, 24 Hours a day
|
||
(815) 895-5573
|
||
|
||
4. BlitzKrieg BBS
|
||
Home Of TAP Magazine
|
||
1200/2400 Baud, 24 Hours a day
|
||
(502) 499-8933
|
||
|
||
5. The Works BBS at (617-861-8976)
|
||
Largest Text Files BBS in the world, 3500+ text files online.
|
||
2400-300 Baud, 24 Hours a day
|
||
|
||
6. Pipers Pit BBS
|
||
19,200-9600 HST ONLY!!
|
||
24 Hours a Day
|
||
Over 370 Megs of Amiga and IBM
|
||
(203)229-3251
|
||
|
||
To get PHANTASY by mail on a 1.2 meg or 360K floppy mail the following
|
||
to this address:
|
||
|
||
Mail 12 Disks and $5.00 in stamps to
|
||
|
||
The I.I.R.G.
|
||
862 Farmington Ave
|
||
Suite-306
|
||
Bristol,Ct. 06010
|
||
|
||
Specify Format of Disk Please!
|
||
We will include any of the IIRG's releases for that month on disk
|
||
(Space Permitting)
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
(C) IIRG 1991
|
||
May Odin Guide Your Way!
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- |