716 lines
31 KiB
Plaintext
716 lines
31 KiB
Plaintext
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
= =
|
||
- WELCOME TO THE NINTH ISSUE OF -
|
||
= =
|
||
- -=>PHANTASY<=- -
|
||
= =
|
||
- A PUBLICATION AND NEWSLETTER OF -
|
||
= =
|
||
- THE -
|
||
= INTERNATIONAL =
|
||
- INFORMATION -
|
||
= RETRIEVAL =
|
||
- GUILD -
|
||
= =
|
||
- Hacking,Phreaking,Anarchy,Survivalism,Commentary -
|
||
= =
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Volume Number Three,Issue Number Nine Dated 8/14/92
|
||
Editor is Mercenary : IIRG@WORLD.STD.COM
|
||
|
||
Article Submissions: The Mercenary/IIRG
|
||
862 Farmington Avenue
|
||
Suite 306
|
||
Bristol,Ct 06010
|
||
|
||
IIRG World Headquarters BBS: Dark Shadows
|
||
19.2/9600 Baud HST
|
||
24 Hours a Day
|
||
1.2 Gigs Online
|
||
(203)-628-9660
|
||
|
||
Table of Discontents:
|
||
|
||
|
||
[1] A Bill to Be Entitled An Act.
|
||
By: Author Unknown
|
||
|
||
[2] PHANTASY Availibility Via Internet
|
||
By: Mercenary
|
||
|
||
[3] Comic Book Review "The Hacker Files"
|
||
Review By: Anubis
|
||
|
||
[4] CAFFEINE: Hackers Drug of Choice or Divine Miracle
|
||
By: Saint Anarchy
|
||
|
||
[5] The Rumor Mill (Unconfirmed rumors from the Underground)
|
||
Edited By: Mercenary
|
||
|
||
[6] IIRG NEWS
|
||
|
||
[7] PHANTASY TIDBITS: News and Views of Interest
|
||
|
||
1. CHICAGO 2600 MEETINGS
|
||
2. TRI-CON: The Tri-State H/P/A Convention
|
||
3. 3rd ANNUAL EICAR CONFERENCE
|
||
4. 6th INTERNATIONAL COMPUTER VIRUS AND SECURITY CONFERENCE
|
||
5. THE NEW RED MENACE
|
||
6. RETURN OF THE KAMIKAZE?
|
||
7. WORD OF WARNING to S.S.?
|
||
|
||
[8] Listing of PHANTASY Distribution Sites
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
OFFICIAL DISLAIMER...
|
||
|
||
All information in PHANTASY is from USER contributed material
|
||
The Publishers and Editors of PHANTASY and THE IIRG disclaim
|
||
any liability from any damages of any type that the reader or
|
||
user of such information contained within this newsletter may encounter
|
||
from the use of said information. All files are brought to you for
|
||
entertainment purposes only! We also assume all information infringes
|
||
no copyrights and hereby disclaim any liability.
|
||
|
||
PHANTASY is (C) 1990 by The IIRG
|
||
IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [1]: A Bill to Be Entitled An Act.
|
||
By: Author Unknown
|
||
|
||
|
||
There has been much ado of late about the need for model legislation. If any
|
||
proposed law fufills this need, it is the one reproduced in this article.
|
||
A Georgia statute for hunting wildlife has been revised to target the most
|
||
carnivorous and vicious of animals - Secret Service Agents - .
|
||
The Bill, the brainchild osf some wise and progressive Georgians, has not
|
||
and never will be introduced in the Georgia Legislature, But it Should!!
|
||
|
||
|
||
A BILL TO BE ENTITLED AN ACT
|
||
|
||
To amend Part 1 of Article 1 of Chapter 3 of Title 27 of the Official Code
|
||
of Georgia Annonated, relating to general provisions applicable to hunting
|
||
wildlife, so as to provide for hunting Secret Service Agents, to provide
|
||
for certain restrictions, to provide for related matters, to repeal
|
||
conflicting laws, and for other purposes.
|
||
|
||
BE IT ENACTED BY THE GENERAL ASSEMBLY OF GEORGIA:
|
||
|
||
Section 1. Part 1 of Article 1 of Chapter 3 of Title 27 of the Official Code
|
||
of Georgia Annotated, relating to general provisions applicable to hunting
|
||
wildlife, is amended by inserting immediately following Code Section 27-3-25
|
||
a new Code Section 27-3-26 to read as follows:
|
||
|
||
27-3-26 (A) Notwithstanding any provision of law to the contrary, any person
|
||
in possession of a valid hunting license issued pursuant to the
|
||
provisions of Code Section 27-3-2 may hunt or trap Secret Service
|
||
Agents,FBI Agents, or any Employee of the SPA for recreational
|
||
noncommercial purposes, subject to the following:
|
||
|
||
[1] The Taking of SS,FBI,SPA Agents by deadfall is permitted; provided that
|
||
the use of currency as bait is tantamount to shooting on a baited field
|
||
and is prohibited.
|
||
[2] The Killing of SS,FBI,SPA agents with a vehicle is prohibited, provided,
|
||
however that such limitation shall not apply to golf carts.
|
||
If accidentally struck, dead agents shall be removed from the right of
|
||
way and the afflicted vehicle taken to the nearest car wash.
|
||
[3] It shall be unlawful to attract SS,FBI,SPA Agents for hunting purposes
|
||
with calls of "PHANTASY","PHRACK", or "FREE SCOTCH" or the use of any
|
||
device mimicking the sight and sound of a Bulletin Board.
|
||
[4] It shall be unlawful to chase,herd, or harvest Agents from an air boat,
|
||
helicopter, or aircraft.
|
||
[5] It shall be unlawful to hunt Agents within 100 yards of a strip bar,
|
||
whore house,or retailer of sunglasses; Including without limitation
|
||
on Wednesday afternoons.
|
||
[6] It shall be unlawful to hunt agents within 200 yards of courtrooms,
|
||
law libraries,health spas,golf courses,computer stores, or hackers
|
||
conference.
|
||
[7] It shall be unlawful for a hunter to stage a hackers conference for
|
||
purposes of enticing Agents for hunting purposes.
|
||
[8] It shall be unlawful for a hunter to wear a disguise as an Editor,
|
||
publisher, or writer for any underground hackers magazine while
|
||
hunting Agents.
|
||
|
||
Section 2. All laws and parts of laws in conflict with this act are repealed.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
It is worthy of observation,that the most imperious masters of their own
|
||
servants,are at the same time, the most abject slaves to the servants of
|
||
other masters.
|
||
Seneca
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [2] PHANTASY Availability Via Internet
|
||
By: Mercenary
|
||
|
||
|
||
Phantasy Magazine is available via anonymous ftp from the following sites,
|
||
all issues can be found on (192.88.144.4) and (128.174.5.50) and all other
|
||
sites that follow are scattered available issues.
|
||
|
||
Host kragar.eff.org (192.88.144.4)
|
||
Last updated 02:32 17 Jul 1992
|
||
|
||
Location: /pub/cud
|
||
DIRECTORY rwxr-xr-x 512 Jun 7 17:18 phantasy
|
||
Location: /pub/cud/phantasy
|
||
FILE r--r--r-- 24971 Oct 30 1990 phantasy-1.1
|
||
Location: /pub/cud/phantasy
|
||
FILE r--r--r-- 27050 Nov 30 1990 phantasy-1.2
|
||
Location: /pub/cud/phantasy
|
||
FILE r--r--r-- 25251 Dec 17 1990 phantasy-1.3
|
||
Location: /pub/cud/phantasy
|
||
FILE r--r--r-- 37567 Feb 26 1991 phantasy-2.4
|
||
Location: /pub/cud/phantasy
|
||
FILE r--r--r-- 29898 Jan 10 1992 phantasy-2.5
|
||
Location: /pub/cud/phantasy
|
||
FILE r--r--r-- 53818 Mar 8 13:21 phantasy-3.6
|
||
Location: /pub/cud/phantasy
|
||
FILE r--r--r-- 55005 Mar 8 13:21 phantasy-3.7
|
||
Location: /pub/cud/phantasy
|
||
FILE rw-r--r-- 52131 Jun 7 17:18 phantasy-3.8
|
||
|
||
Host uxc.cso.uiuc.edu (128.174.5.50)
|
||
Last updated 01:07 9 Jul 1992
|
||
|
||
Location: /pub/phrack
|
||
FILE rw-r--r-- 24971 Jul 2 06:17 phantasy-1.1
|
||
Location: /pub/phrack
|
||
FILE rw-r--r-- 27050 Jul 2 06:17 phantasy-1.2
|
||
Location: /pub/phrack
|
||
FILE rw-r--r-- 25251 Jul 2 06:17 phantasy-1.3
|
||
Location: /pub/phrack
|
||
FILE rw-r--r-- 37567 Jul 2 06:17 phantasy-2.4
|
||
Location: /pub/phrack
|
||
FILE rw-r--r-- 29898 Jul 2 06:17 phantasy-2.5
|
||
Location: /pub/phrack
|
||
FILE rw-r--r-- 53818 Jul 2 06:17 phantasy-3.6
|
||
Location: /pub/phrack
|
||
FILE rw-r--r-- 55005 Jul 2 06:17 phantasy-3.7
|
||
Location: /pub/phrack
|
||
FILE rw-r--r-- 52131 Jul 2 06:17 phantasy-3.8
|
||
|
||
Host capella.eetech.mcgill.ca (132.206.1.17)
|
||
Last updated 18:33 26 May 1992
|
||
|
||
Location: /wuarchive/doc/policy/cud
|
||
DIRECTORY rwxr-xr-x 512 Mar 24 08:37 phantasy
|
||
|
||
Host trantor.ee.msstate.edu (130.18.64.2)
|
||
Last updated 21:49 23 May 1992
|
||
|
||
Location: /files/Text.Phracks
|
||
FILE r--r--r-- 10888 Dec 8 1990 phantasy.v1n1.Z
|
||
FILE r--r--r-- 13368 Dec 8 1990 phantasy.v1n2.Z
|
||
|
||
Host nic.funet.fi (128.214.6.100)
|
||
Last updated 06:28 16 Jul 1992
|
||
|
||
Location: /pub/doc/phrack
|
||
FILE rw-rw-r-- 10888 Aug 24 1991 phantasy.v1n1.Z
|
||
FILE rw-rw-r-- 13368 Aug 24 1991 phantasy.v1n2.Z
|
||
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Men resemble the gods in nothing so much as in doing good to their fellow
|
||
creatures
|
||
|
||
Cicero
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [3]: Comic Book Review "The Hacker Files"
|
||
Review By: Anubis
|
||
|
||
DC Comics has just started publishing a new 12 part mini-series comic about
|
||
computer hackers named, "The Hacker Files",the "A" in hacker is drawn as the
|
||
Anarchy symbol "A",we thought this was a great touch to the cover.
|
||
Writer and creator of the comic is Lewis Shiner, with pencils by Tom Sutton,
|
||
and inks by Mark Buckingham.
|
||
The Series is called "SoftWar 1.0" and the plot idea isn't bad but the story
|
||
does stray away from reality in the hardware department.
|
||
The basic idea of the Plot so far is an aging hacker named Jack Marshall is
|
||
brought in as an emergency consultant for the Pentagon as they've been
|
||
infected by a computer virus.
|
||
Standing in Jacks way are the standard red tape of the government as well
|
||
as his former employer and manufacturer of the computers used in the story,
|
||
"Digitronix".
|
||
Helping Jack with his quest are "The Speed Metal Kids" a group of younger
|
||
hackers potrayed as your stereotypical computer nerds.
|
||
Issues number 1 and 2 are out as of this articles writing and we'd
|
||
recommend you add this series to your files.
|
||
So far except for some typical type-casting, hackers are potrayed in a
|
||
positive light, we hope this trend continues.
|
||
On a scale of 1 to 10, We'd give the story a 6 so far.
|
||
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
For Evil news rides post, while good news baits
|
||
|
||
Milton
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [4]: CAFFEINE: Hackers Drug of Choice or Divine Miracle
|
||
By: Saint Anarchy
|
||
|
||
|
||
Caffeine is an alkaloid, a class of naturally occuring compounds containing
|
||
nitrogen and having the properties of an organic amine base. (alkaline,hence,
|
||
alkaloid).
|
||
Most people ingest caffeine in some form of beverage, mainly Coffee,Tea,or
|
||
soda. The orgins of coffee and tea are so old that they are lost in legend.
|
||
Coffee is said to have been discovered by an Abyssinian goatherder who
|
||
noticed an unusual friskiness in his herd when they ate a certain plant with
|
||
red berries.
|
||
Tea is attributed in the orient to Damura,the founder of Zen. Although
|
||
the legend is complete horse-crap and I won't bore you with it.
|
||
But that "Unusual Friskiness" is what we're interested in as hackers, mainly
|
||
for those all night hacking sessions.
|
||
Members of the IIRG have different tastes in there ingestion of Caffeine,
|
||
I've Noticed Mercenary prefers Mountain Dew or Jolt, and on extremely tough
|
||
nights will mix up High-Octane. Anubis prefers to take his in the form of
|
||
Excedrin tablets, while most others ingest large quantities of Coffee.
|
||
But what is truely the quickest,cheapest and most expedient way to
|
||
a rush out of caffeine? Lets do a little exploring.
|
||
|
||
Substance Dosage Caffeine, in Milligrams
|
||
----------------------------------------------------------------------
|
||
Vivarin one pill 200
|
||
No-Doz one pill 100
|
||
Brewed coffee one cup = 5 ounces 90-125
|
||
Cocoa one cup = 5 ounces 5-100 Depends upon Brand
|
||
Instant coffee one cup = 5 ounces 60-80
|
||
Instant tea one cup = 5 ounces 25-75
|
||
Black tea one cup = 5 ounces 28-75
|
||
Excedrin one pill 65
|
||
Soda 12 oz 32-60
|
||
Anacin one pill 32
|
||
----------------------------------------------------------------------
|
||
|
||
As the chart illustrates Vivarin is the most potent of the pill forms of
|
||
caffeine,although constant ingestion of these tablets will give you a
|
||
wicked case of heartburn if you have a sensitive stomach.
|
||
Brewed coffee is the strongest of readily available liquids, however if
|
||
your like me, this to can bother your stomach in large quantities.
|
||
Teas alright, but without some chinese food to go along with it, I dont
|
||
want it.
|
||
Soda must be selected with care for the maximum content, Coke contains
|
||
3.5 mgs per ounce, hence for a 12 Ounce soda it would contain 42 mgs of
|
||
caffeine. The FDA requires that a cola contain no more than 5 milligrams per
|
||
ounce, thus Jolt has 60 milligrams in a 12 ounce can.
|
||
Thus for your hard earned cash, 1 package of Vivarin or a 6-pack of Jolt
|
||
would be your best investment.
|
||
|
||
MAKING HIGH-OCTANE
|
||
|
||
Ingredients: 1 Package of Vivarin (16 Tablets)
|
||
1 Cup Sugar
|
||
1 Gallon Fruit Juice
|
||
1 Mortar and pestle
|
||
1 Blender
|
||
|
||
Prepare sugar in Mortar by grinding into powder and pour into fruit juice
|
||
Crush down and grind Vivarin into powder and pour into fruit juice
|
||
Pour juice into blender and whip at high speed until frothy
|
||
You now have 1 gallon of High-Octane with 3200 Milligrams of Caffeine
|
||
Drink in small amounts over your hacking session, preferably with one or
|
||
two other people.
|
||
|
||
-WARNING-: Ingestion of High-Octane can be dangerous to your health
|
||
and the recipe is provided here for informational purposes
|
||
only. The Author and Publishers of Phantasy disclaim any
|
||
responsibility for individuals attempting to prepare or
|
||
ingest the recipe.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Coffee, which makes the politician wise,
|
||
And see through all things with half shut eyes.
|
||
|
||
Pope
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [5]: RUMOR MILL
|
||
Edited By: Mercenary
|
||
|
||
There seems to be quite a bit of Rumors flying around in the last several
|
||
weeks, so the IIRG has decided to review the most popular.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
The Following information, (EDITED) has been circulating up in the New England
|
||
area of operations. The file has been validated as legal as the individual
|
||
named is known to have turned in The Purgatory BBS for having semi-legal
|
||
posted material.
|
||
|
||
Real name : Ron Pinz (Ronald Pinz)
|
||
Handles Used : IXOM
|
||
Past Handles : Dr. Disk,Bazooka Bill
|
||
Sex : Male
|
||
Age : 21
|
||
Birthdate : 06/28/71
|
||
Phone Numbers : 203-(EDITED)
|
||
: 203-(EDITED)
|
||
Address : (Edited)
|
||
City/State : Wallingford, Ct.
|
||
Zip code : 06492
|
||
|
||
Biography:
|
||
|
||
After being thrown out of the military service for computer hacking while
|
||
on duty, Its believed that Ronald is now trying to court favors from AT&T
|
||
for a $50,000 job in New Jersey by turning in phreakers and hackers.
|
||
It is already officially confirmed that Ron has turned in one BBS and
|
||
is now setting sites on other BBS's. Its too bad he doesn't know about
|
||
AT&T's policy of not hiring hackers as they figure that an ex-hacker
|
||
employee cannot be trusted,we urge you to delete him from your system
|
||
if you have any files that are not public domain.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Date: 08-11-92 (23:01)
|
||
To: ALL Refer#: NONE
|
||
From: (EDITED) Read: (N/A)
|
||
Subj: PROBLEMS1 Status: PUBLIC MESSAGE
|
||
Conf: (EDITED) Read Type: GENERAL (A) (+)
|
||
|
||
Attention Everyone Please Beware of a User called "Enigma"
|
||
He has been caught uploading a file thats supposed to be an INC BBS Deme
|
||
that contains a Virus.
|
||
He is the sysop of a board called Crackers International, and
|
||
supposed to be member of TSAN.
|
||
He has been fucking with boards in NJ (Mommouth County) and is uploading
|
||
virus's with INC's name. he is also affiliated with a user called SHOEMAN.
|
||
They think they own the NJ BBS scene and have been causing alot of
|
||
problems for GOOD sysops.
|
||
Please dont validate these two if they call your board
|
||
and spread the news!
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
WARNING!----WARNING!----WARNING!----WARNING!----WARNING!----WARNING!
|
||
|
||
This message is no shit! I am about to tell you about a BBS that is a STING
|
||
operation! I HAVE BEEN CAUGHT! Right now I have to go to court, I am
|
||
not even on my own computer! They took it! I uploaded and put a few CC #'s
|
||
on there, I can't tell you my name because the FBI said if I gave them away
|
||
I would do more time, there have been several people busted! So
|
||
I am not worried about who they think wrote this. DO NOT CALL THIS SYSTEM
|
||
PIRATE'S HAVEN BBS 313-383-4520, and 313-383-2116, it has two nodes, and a lot
|
||
of fucking people call it. They have a ANI on his phone line. European users
|
||
WATCH IT! They can catch you too! As of right now me and about 25 others
|
||
have fucking court dates! I am gonna beat this fuckers ass!!!
|
||
I am up for 5 years or possibly a big ass fine! For hacking and uploading
|
||
pirated warez, if you have any fucking brains you won't call this fucking
|
||
system! Later dudes, oh yeah these fucking feds aren't stopping me,
|
||
like Arnie says, I'LL BE BACK!
|
||
|
||
Sysop's handle is NITRO!
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
As the last message points out, Rumors have been flying wild about a new
|
||
Operation like Sundevil, Beginning with the elimination of MOD, which I wont
|
||
go into as CUD has covered it enough. Every bit of evidence points to this
|
||
rumor ringing true. More in Issue 10.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [6]: IIRG NEWS!
|
||
-------------------------------------------------------------------------------
|
||
|
||
CHART #4 RELEASED
|
||
|
||
Greeting's fellow patriots.
|
||
|
||
The IIRG has just released IIRG Acronyms Chart #4 with over 1200 Acronyms
|
||
be sure to grab it at a local hack/phreak BBS near you.
|
||
-------------------------------------------------------------------------------
|
||
|
||
FAKE IIRG BBS's
|
||
|
||
It seems that the IIRG logo is appearing on more BBS's than it should
|
||
If the BBS is not listed at the end of this Issue of PHANTASY, it is NOT
|
||
an IIRG BBS,PHANTASY Distro Site,or an IIRG Affiliate.
|
||
Do not settle for imitations, only call legitimate IIRG BBS's
|
||
If you know of any BBS using the IIRG name or Logos, please contact
|
||
any IIRG BBS and let Mercenary know.
|
||
|
||
WARNING TO FAKE BBS's: Any BBS caught using the IIRG Logo or Name will
|
||
be dealt with accordingly.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
SAINT ANARCHY TO RELEASE IIRG X-RATED SERIES
|
||
|
||
Saint Anarchy will be relaeasing a series of humorous adult stories based
|
||
on some personal experiences and a series of stories based upon some popular
|
||
television series. Be sure to look for them on an adult BBS near you.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
MESSAGE FROM LOUIS CYPHER
|
||
Date:7/31/92 Time:4:21 pm
|
||
|
||
The file areas have been closed due to some, uhhhh, 'legal' problems...I can't
|
||
really say when they will be opened again, or if the board will continue to be
|
||
up....all I can really say is that it is nothing for YOU to worry about. I just
|
||
have recieved some information that is disturbing to ME, and hence the file
|
||
areas have been closed, and the board might go down for an indefinite amount of
|
||
time....If you call, and the number has been disconnected, then you know what
|
||
happened....for those of you that see me on other boards, you can e-mail me
|
||
there and I will try to explain the situation to you, and tell you if the board
|
||
will be going up again or not....
|
||
It was fun while it lasted(already speaking in past-tense...damn)....well, I
|
||
hope to be able to continue running the board, but if things get any more hairy
|
||
then they are now, I am afraid it will be no more...
|
||
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [7]: PHANTASY TIDBITS: News and Views of interest from around the
|
||
Computer World
|
||
-------------------------------------------------------------------------------
|
||
|
||
CHICAGO 2600 MEETINGS
|
||
|
||
Are being held at the Century Mall, 2828 Clark Street in Chicago,Illinois from
|
||
5 pm to 8 pm on the first Friday of every month.
|
||
The meetings are located on the Lower level, by the payphones.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
TRI-CON: The Tri-State H/P/A Convention
|
||
|
||
Will be held on Saturday, August 15, 1992, from 11 AM to whenever at
|
||
Fahnestock State Park, Rt. 301 & Tacnoic Parkway, in Kent N.Y.
|
||
The event will be B.Y.O.B.
|
||
|
||
For more info contact Thomas Icom hereat 914-HAK-VMBS, 914-761-6877
|
||
Please pass the word around about this event.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
3rd ANNUAL EICAR CONFERENCE
|
||
December 7th-9th in Munich,Germany.
|
||
|
||
EICAR (European Institute for Computer Anti-Virus Research) will hold its
|
||
1992 conference on computer viruses and related threats to information
|
||
technology. The conference will be held in the Park-Hilton hotel in Munich.
|
||
|
||
The conference addresses the malicious software aspect of Information
|
||
technology security, topics will include:
|
||
|
||
Virus Trends Anti-Virus Technology
|
||
Testing Antivirus Software Virus Naming
|
||
Network Security Systems Security
|
||
Backup Measures Risk Assessment
|
||
Corporate Strategies Disaster Recovery Plans
|
||
Malware Incident Handling International Cooperations
|
||
Case studies Educational Tasks
|
||
Impact on Technology Legal Aspects
|
||
Social Implications Ethics
|
||
|
||
|
||
For more Information Contact:
|
||
|
||
EICAR
|
||
C/O Siemens Nixdorf AG
|
||
Dr. Ing. Paul Langemeyer
|
||
Otto-Hahn-Ring 6
|
||
D-8000 Muenchen
|
||
Germany
|
||
|
||
Phone: (+49) 89 636 82 660
|
||
FAX: (+49) 89 636 82 824
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
6th INTERNATIONAL COMPUTER VIRUS AND SECURITY CONFERENCE
|
||
|
||
|
||
Will be held on March 10-12 1993 at the New York Ramada and Marriot Marquis.
|
||
Approximately 500 attendees will hear 90 speakers and 53 vendors over the 3
|
||
days.
|
||
Past attendees have represented industry,military, and government,forensic
|
||
and academic settings and creators and users of related software and
|
||
hardware.
|
||
|
||
Topics of interest will include,
|
||
|
||
-Prevention,detection and recovery from viruses and other unauthorized usage.
|
||
-survey of products and techniques available.
|
||
-particulars of LAN,UNIX,cryptography, and military use.
|
||
-computer crime,law,data reliability,related contexts
|
||
-US/International sharing of research and techniques
|
||
-Case studies of mainframe,PC and/or network Security including,
|
||
-Chicago flooding recovery
|
||
-1992 Fire and other natural disaster recovery
|
||
-Recent court decisions
|
||
-Security implementations and user awareness in industry
|
||
|
||
More information to follow as the conference approaches
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
THE NEW RED MENACE
|
||
|
||
China set off a 1-megaton nuclear explosion, the largest underground nuclear
|
||
test it has ever conducted. They are also believed to be selling nuclear
|
||
technology to third world countries like Iran
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
RETURN OF THE KAMIKAZE?
|
||
|
||
Japans Parliiament has voted to create a 2000 man force for United Nations
|
||
peacekeeping duties, And Mitsubishi Heavy Industries has launched an 185 ton
|
||
experimental submarine powered by a magnetohydrodynamic propulsion system
|
||
simaler to the sub in "A Hunt For Red October", the sub is named,
|
||
YAMATO-1
|
||
-------------------------------------------------------------------------------
|
||
|
||
WORD OF WARNING to S.S.?
|
||
|
||
From: len@netsys.netsys.com (Len Rose)
|
||
Newsgroups: comp.org.eff.talk
|
||
Subject: Legion of Doom
|
||
Date: 6 Jun 92 15:57:57 GMT
|
||
Organization: Netsys Inc.
|
||
Lines: 18
|
||
|
||
|
||
My 7 year old son was watching TV this morning,and I
|
||
happened to hear the words "Legion of Doom" .. I went
|
||
to look at the TV and saw some bizarre wrestling types
|
||
("WWF") in makeup , posturing themselves..
|
||
|
||
Maybe we should warn the Secret Servce.
|
||
|
||
Len Rose
|
||
len@netsys.com
|
||
len@cells.uchicago.edu "What a long,strange
|
||
...!rutgers!netsys!len trip it's been.."
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [8]: IIRG Distribution Sites
|
||
(or Gateways to Oblivion)
|
||
|
||
|
||
|
||
////// ////// /////// ////////
|
||
// // // // //
|
||
// // /////// // ////
|
||
// // // // // //
|
||
////// * ////// * // // * /////////
|
||
|
||
|
||
|
||
|
||
IIRG World HQ: Dark Shadows
|
||
19.2/9600 Baud HST
|
||
24 Hours a Day
|
||
1.2 Gigs Online
|
||
Sysop: Anubis
|
||
(203)-628-9660
|
||
|
||
|
||
IIRG Distribution Site 1: Wired World BBS
|
||
INC Europe
|
||
TPC Courier (WHQ)
|
||
THP
|
||
IIRG Distribution Site
|
||
Sysop: Digital Justice
|
||
+39-89-254138
|
||
|
||
IIRG Distribution Site 2: Cyberdyne Network Germany
|
||
United Forces
|
||
Sysop: E605
|
||
+49-5341-59004
|
||
+49-5341-54052
|
||
|
||
|
||
IIRG Distribution Site 3: The Sanitarium
|
||
Sysops: Morbid Angel [INC/ACID]
|
||
Spectral Illusion [ACID/RAZOR]
|
||
IIRG Distribution Site
|
||
ACID Member Board
|
||
INC Courier Board
|
||
RAZOR 1911 Courier Board
|
||
VISA World Headquarters
|
||
(817)PRI-VATE
|
||
|
||
|
||
IIRG Distribution Site 4: CTHH 666
|
||
2400 - 57.6 Baud
|
||
Sysop: Beelzebub
|
||
HAU AB! East Coast Headquarters
|
||
Hackers Alliance Of The Underground Abuse
|
||
I.I.R.G. Distribution Site
|
||
|
||
IIRG Distribution Site 5: The Ware House
|
||
(203)-PRI-VATE
|
||
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [9]: Phantasy Distribution Sites
|
||
|
||
Phantasy's Distribution Site's are continually growing,we apologize if you
|
||
called a board and didn't find the Mag. Network Distribution Sites will
|
||
have the Issues first, we suggest calling one of them if a problem does
|
||
arise.
|
||
|
||
|
||
1. Lightning Systems
|
||
(414) 363-4282
|
||
Sixty Million Bytes OnLine
|
||
USRobotics Dual Standard HST/V.32bis
|
||
2400 thru 14.4k v.32bis/HST
|
||
|
||
2. Sycamore Elite
|
||
19,200-1200 Baud HST, 24 Hours a day
|
||
(815) 895-5573
|
||
|
||
3. The Works BBS at (617-861-8976)
|
||
Largest Text Files BBS in the world, 3500+ text files online.
|
||
2400-300 Baud, 24 Hours a day
|
||
|
||
4. Pipers Pit BBS
|
||
19,200-9600 HST ONLY!!
|
||
24 Hours a Day
|
||
THG Distro Site 1300 Megs
|
||
(203)PRI-VATE [2 Nodes]
|
||
|
||
5. Blitzkrieg BBS TAP Magazine
|
||
(502)-499-8933 P.O. BOX 20264
|
||
Home of TAP MAgazine Louisville,KY. 40250-0264
|
||
|
||
6. The Dickinson Nightlight
|
||
(713)-337-1452
|
||
Der WeltanSchauung Distro Site (World View Magazine)
|
||
Phantasy Distro Site
|
||
|
||
|
||
PHANTASY is also available on:
|
||
|
||
1. RIPCO BBS (312)528-5020
|
||
2. KRACKER BOX (303)438-1481
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
PHANTASY(C) IIRG 1991,1992
|
||
May Odin Guide Your Way!
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- |