3766 lines
167 KiB
Plaintext
3766 lines
167 KiB
Plaintext
|
|
*******************************************************
|
|
** **
|
|
** PPPPP I RRRRR AAAAA TTTTT EEEEE **
|
|
** P PP I R RR A A T E **
|
|
** PPP I RRR AAAAA T EEEEE **
|
|
** P I R R A A T E **
|
|
** P I R R A A T EEEEE **
|
|
**keepin' the dream alive **
|
|
*******************************************************
|
|
|
|
-=> VOLUME 3, ISSUE 4, February, 1989 <=-
|
|
|
|
**** WELCOME ****
|
|
|
|
To the fourth issue of -=* PIRATE *=-!
|
|
Special thanks for getting this issue out go to:
|
|
Chris Robin
|
|
Gene & Roger
|
|
Hatchet Molly
|
|
Hot Mix #1
|
|
Jedi
|
|
Knight Lightning
|
|
Maxx Cougar
|
|
Nicodemus Keezarvexius
|
|
Pru Dohn
|
|
Taran King
|
|
The California Zephyr
|
|
Ty Rexx
|
|
|
|
Any comments, or if you want to contribute, most of us can
|
|
be reached at one of the following boards:
|
|
BOOTLEGGER'S >>> PIRATE HOME BOARD
|
|
RIPCO (Illinois)
|
|
SYCAMORE ELITE (815-895-5573)
|
|
COMPANY OF WOLVES (301-791-1595)
|
|
THE ROACH MOTEL (California)
|
|
PACIFIC ALLIANCE (818-280-5710)
|
|
|
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
Dedicated to sharing knowledge, gossip, information, and tips
|
|
for warez hobbyists.
|
|
|
|
** CONTENTS THIS ISSUE **
|
|
|
|
File 1. Introduction and contents issues 1-4
|
|
File 2. Editorial: Defense of pirating
|
|
File 3. PHRACK BUST
|
|
File 4. Zipfile Tips
|
|
File 5. Company of Wolves Unprotects
|
|
File 6. PTL Cracking Primer
|
|
File 7. What Makes a Good Board
|
|
File 8. BBS Symbols and Faces
|
|
File 9. Gene and Roger at the BBS: *EURO-AMERICAN CONNECTION*
|
|
File 10. Some of our favorite numbers
|
|
|
|
------------------------------------------------
|
|
|
|
** WHO ARE WE? **
|
|
|
|
We've been asked "who are you guys?" Well, the guys are not all guys, and
|
|
sexism sucks. The people who put out pirate are mostly IBMers with some apple
|
|
and ST influences. We're a loose collective, mostly from the midwest, but with
|
|
contributors from around the country. Collectively, we're on probably all of
|
|
the good national boards, and those listed as "contact points" are not
|
|
necessarily those we frequent the most, but those we like a lot and where we
|
|
check in at least once every few weeks. Our goal is to try to provide news of
|
|
general interest to *all* BBS enthusiasts, share information and gossip, and to
|
|
give newcomers tips on how not to be lame. We hope this will improve BBSing for
|
|
everybody. We are committed to keeping information free to the people, and we
|
|
oppose control of knowledge by an elite few. As warez hobbyits, we believe that
|
|
knowledge of current software is of benefit to the software industry despite
|
|
their claim that sharing is unethical. We also believe that informed consumers
|
|
make for better products, and that sharing information on warez is a patriotic
|
|
and democratic duty.
|
|
|
|
As some may notice, the format of *PIRATE* changes each issue, for the better,
|
|
we hope. We have noticed some *PIRATE* files listed as g-philes on some boards,
|
|
so we thought it might be helpful to include an index periodically of previous
|
|
issues:
|
|
|
|
PIRATE INDEX (Issues 1-4)
|
|
|
|
*PIRATE* Index to Issue #1 (June, 1989)
|
|
|
|
File 1. What's a Pirate?
|
|
File 2. Pirate Do's and Don'ts
|
|
File 3. Pirate tips
|
|
File 4. Why Software ownership is bad for society
|
|
File 5. Copyright Law
|
|
File 6. Computer laws in Wisconsin
|
|
File 7. Editorial: Big Brother in the Computer Room?
|
|
File 8. Sysop's corner
|
|
File 9. What's hot, what's not
|
|
File 10. Wants and Needs
|
|
File 11. Board Review of the Month: THE GREAT ESCAPE
|
|
File 12. A few decent boards
|
|
-=-=-=-=-=-=-
|
|
|
|
*PIRATE* Index to Issue #2 (September, 1989)
|
|
|
|
File 1. Introduction, editorial, and general comments
|
|
File 2. Whither the World of Pirates?
|
|
File 3. How to get things running
|
|
File 4. Sysops and the Law -- Sysops' Legal Liability
|
|
File 5. Hackers in the News
|
|
File 6. Illinois and Texas Computer Laws
|
|
File 7. Is Teleconnect Dangerous? They're after our rights!
|
|
File 8. Viruses
|
|
File 9. BBS NEWS: Review (ATLANTIS) and APPLE #s
|
|
-=-=-=-=-=-=-
|
|
|
|
*PIRATE* Index to Issue #3 (January, 1990)
|
|
|
|
File #1. Introduction, editorial, and general comments
|
|
File #2. News Reprint: Who's the REAL software threat??
|
|
File #3. Unprotects and cracking tips (part 1)
|
|
File #4. Unprotects and cracking tips (part 2)
|
|
File #5. Unprotects and cracking tips (part 3)
|
|
File #6. Unprotects and cracking tips (part 4)
|
|
File #7. Unprotects and cracking tips (part 5)
|
|
File #8. Unprotects and cracking tips (part 6)
|
|
File #9. Gene n' Roger's "review of the month" (DEAD ZONE)
|
|
-=-=-=-=-=-=-
|
|
|
|
*PIRATE* Index to Issue 4 (March, 1990)
|
|
|
|
File 1. Introduction and contents issues 1-4
|
|
File 2. Editorial: Defense of pirating
|
|
File 3. PHRACK BUST
|
|
File 4. Zipfile Tips
|
|
File 5. Cult of Wolves Unprotects
|
|
File 6. PTL Cracking Primer
|
|
File 7. What Makes a Good Board
|
|
File 8. BBS Symbols and Faces
|
|
File 9. Gene and Roger at the BBS: Euro-American Connection
|
|
File 10. Some of our favorite numbers
|
|
|
|
>--------=====END=====--------<
|
|
|
|
|
|
|
|
***************************************************
|
|
*** Pirate Magazine Issue IV / File 3 of 10 ***
|
|
*** PHRACK/LoD bust of January, 1990 ***
|
|
***************************************************
|
|
|
|
|
|
As most of you know, PHRACK is down for awhile. It seems that in doing the good
|
|
deed of sending out back issues across e-mail lines, some eyebrows were raised.
|
|
|
|
----
|
|
The following newspaper accounts and commentary come from Dr.Ripco.
|
|
-----
|
|
|
|
(From the CHICAGO SUN-TIMES 2/7/90)
|
|
|
|
Two students with reputations as master computer hackers were
|
|
indicted here Tuesday on charges of stealing and publishing highly sensitive
|
|
information about the 911 emergency phone system in nine southern states. The
|
|
indictment alleges Robert J. Riggs, 20, a student at DeVry Institute in
|
|
suburban Atlanta, is a member of "The Legion of Doom," a nationwide group of
|
|
hackers said to be involved in illegal activities. His co-defendant is Craig
|
|
M. Neidorf, 19, a University of Missouri student who publishes Phrack, a
|
|
hacker magazine transmitted by computer. The indictment charges Riggs gained
|
|
unauthorized access to computers of the Bell South Telephone Co. in Atlanta in
|
|
December, 1988, and obtained the 911 file. It was sent to Neidorf via a
|
|
computer bulletin board in Lockport.
|
|
|
|
* * * * * * * * * * * * * * *
|
|
|
|
2 STUDENTS CHARGED IN COMPUTER FRAUD
|
|
------------------------------------
|
|
|
|
(from the Chicago Tribune 2/7/90)
|
|
|
|
Two college students who were members of a nationwide network of
|
|
computer hackers called the Legion of Doom were charged Tuesday with
|
|
breaking into the BellSouth Corp. 911 emergency system and publishing the
|
|
system through a hackers' "bulletin board."
|
|
|
|
Robert J. Riggs, 20, a DeVry Institute student in Atlanta, and Craig
|
|
Neidorf, 19, a University of Missouri student from Chesterfield, Mo., were
|
|
charged with wire fraud, interstate transportation of stolen property and
|
|
computer fraud and abuse.
|
|
|
|
The indictment, announced in Chicago by U.S. Atty. Ira Raphealson,
|
|
charges that Riggs broke into the BellSouth system in December 1988 "by using
|
|
a computer outside the telephone company to break into the telephone company's
|
|
computer system in which the computer file was stored."
|
|
|
|
The computer program for the BellSouth 911 system, valued at $79,449,
|
|
controls emergency calls in nine Southern states - Alabama, Mississippi,
|
|
Georgia, Tennessee, Kentucky, Louisiana, North Carolina, South Carolina and
|
|
Florida.
|
|
|
|
Riggs then transfered the BellSouth 911 information to the computer
|
|
"bulletin board" in Lockport. At this point, Neidorf loaded it into his
|
|
computer in Missouri and edited it for publication in a computer hacker
|
|
publication known as "Phrack," the indictment charges.
|
|
|
|
Assistant U.S. Atty. William Cook, who prepared the indictment,
|
|
declined to say if the police or fire departments in any of the affected citie
|
|
|
|
If convicted of all charges, Riggs would face a prison sentence of
|
|
32 years and a fine of $220,000. Neidorf faces 31 years in prision and a
|
|
fine of $122,000. Riggs faces similar charges in Atlanta, Cook said.
|
|
|
|
--------------------------------------
|
|
|
|
Whats interesting about this is what they are charging Craig (Knight Lightning)
|
|
with. it appears publishing the information (based on prision time) is nearly
|
|
as criminal as breaking in and getting the program. its unlikely that either
|
|
one will serve much time if any at all but it does present a crimp into what
|
|
can be 'published' and what cannot on bulletin boards.
|
|
|
|
what the article did not mention or name is the board in Lockport. i take it
|
|
they are taking about Lockport Illinios which i'm unfamilar with which board
|
|
this could be. although they have indicted 2 people, one who sent the info and
|
|
one who took it, does that mean the bbs used for the transfer is out of the
|
|
picture so to speak?
|
|
|
|
much food for thought....
|
|
|
|
Dr. Ripco
|
|
|
|
* * * * * *
|
|
|
|
As of this writing, nobody is completely certain what has happened or what will
|
|
happen, but we obtained the following from the major board where the crowd
|
|
hangs out.
|
|
The names were changed to protect the, uh, innocent.
|
|
|
|
--------------------
|
|
|
|
31/53: phrack...
|
|
Name: Magnum Guru
|
|
Date: Sat Jan 20 02:58:54 1990
|
|
|
|
Welp, Phrack magazine is dead. Those of you who pay attention to BITNET know
|
|
that the phrack accounts at U of M have been shut down. The story is as
|
|
follows...
|
|
|
|
Government agents (not sure of the dept., probably SS) have apparently been
|
|
monitoring the e-mail of the Phrack kids (Night Thunder & Prince Tarzan) for
|
|
some time now. Apparently, a portion of a file sent to them (and subsequently
|
|
published) contained copyrighted information. This is all they needed. They
|
|
have now seized the entire Phrack net mailing list (over 500 accounts), plus
|
|
every piece of information that Andar & Geric have (and they have a *LOT*) on
|
|
real names, addresses and phone numbers. This is evolving directly out of the
|
|
busts of three LOD members (Urvile, Leftist & Prophet). The Prophet (who is on
|
|
probation) is apparently being threatened with a prison term if he doesn't
|
|
cooperate. We don't know for sure if he cooperated or not, but what would you
|
|
do in the same position? The same officials are apparently *VERY* interested
|
|
in our co-sys, Mr. BA. His net account is being watched, etc. I'll let
|
|
him tell the story.
|
|
|
|
Anyone wishing to communicate with E or myself should do so through the
|
|
board only. I will be adding a secure (and I mean fucking secure) encryption
|
|
routine into the e-mail in the next 2 weeks - I haven't decided exactly how to
|
|
implement it, but it'll let two people exchange mail encrypted by a password
|
|
only know to the two of them. Hmmmm... carry this conversation to the
|
|
programming board.
|
|
|
|
Anyway, I do not think I am due to be busted, but then again, I don't do
|
|
anything but run a board. Still, there is that possibility. I assume that my
|
|
lines are all tapped until proven otherwise.
|
|
|
|
There is some question to the wisdom of leaving the board up at all, but I have
|
|
(have) personally phoned several government investigators and invited them to
|
|
join us here on the board. If I begin to feel that the board is putting me in
|
|
any kind of danger, I'll pull it down with no notice - I hope everyone
|
|
understands.
|
|
|
|
It looks like it's sweeps-time again for the feds. Let's hope all of us are
|
|
still around in 6 months to talk about it.
|
|
|
|
32/53: hmm
|
|
Name: Ashman
|
|
Date: Sat Jan 20 07:50:12 1990
|
|
|
|
this is getting truly annoying..
|
|
|
|
Phoenix
|
|
|
|
33/53: Phrack, etc...
|
|
Name: Phobos Kutter
|
|
Date: Sat Jan 20 09:30:10 1990
|
|
|
|
RE: phrack...
|
|
|
|
I sounds to me as though the "SS" was really reaching. I mean, to get them on
|
|
"copyright" violations is sort of like that had such a hard on for the
|
|
Phrack boys it was as though they went after gangsters with income tax evasion!
|
|
|
|
What is the legality of them spreading all of this information that they have
|
|
obtained throughout the world? I mean, if they got names, etc.., isn't that
|
|
private information? Do they or wl they publish all of it to the maniacs out
|
|
there?
|
|
|
|
35/53: Phrack and Pac*Hell
|
|
Name: Rip Torn
|
|
Date: Sat Jan 20 21:05:55 1990
|
|
|
|
Well-
|
|
|
|
A copyright infringement isn't all that major that the SS would bust them for
|
|
just that. I'm willing to bet they intercepted something bigger than a simple
|
|
copyright piracy case. Although they would be interested since the information
|
|
is being transported across state (and quite likly) national boundries.
|
|
|
|
About the San Jose case, sounds like they just got access to the TAN (Technical
|
|
Access Network), and went from there. Along with their other antics, they'll
|
|
prob get a prison term, because they are really strict on the wiretap bit. I
|
|
don't get the part about the false names and addresses. The courts have said
|
|
in the past, you can just pick a name out of the blue and use it, and you can
|
|
give any kind of information (like a false address or phone number for
|
|
instance) as long as the documentation is not for an official purpose and is
|
|
not intended to defraud someone.
|
|
|
|
I noticed Peter Neumann in there, he's a guy to listen to, and many of you
|
|
might reconize him from the Risks forum on the net. He is one of the few
|
|
public figures involved in computers that knows which way is up.
|
|
|
|
Recap-
|
|
|
|
Phrack will most likly get a slap on the wrist, but will have a sober look at
|
|
the world, and won't be inclined to be as high profile as they were.
|
|
|
|
The San Jose case, I'm betting it'll turn high profile, and there will be alot
|
|
of pressure for a nice long lock up.
|
|
|
|
Most of this is based on my dealings with local, state, and federal law, as
|
|
well as experience I gain while working for the County of San Diego.
|
|
|
|
|
|
36/53: phrack
|
|
Name: Midnight Star
|
|
Date: Sat Jan 20 21:36:56 1990
|
|
|
|
I would think they knew of dealings between phrack & hackers/phreakers, but
|
|
they had to have some real evidence in order to get in, once they did, they
|
|
found much info that would make for a good prosecution... As any hacker knows,
|
|
its the little things that matter
|
|
|
|
37/53: The Bottom line.
|
|
Name: The Rap Master
|
|
Date: Sun Jan 21 10:05:38 1990
|
|
|
|
The bottom line is..a crackdown. We can now expect a crackdown because of
|
|
the shit with the virus,the boys in cali, and the phrack kids.... The phrack
|
|
boys were just the start, i'm sure of it.. Unfortunately with all of this in
|
|
the news now, they will be able to get more government money to combat hackers.
|
|
And thats BAD fucking news for us. I think they are going after all the
|
|
"teachers" etc/.. people who educate others into this sort of thing.. (which i
|
|
didn't need to say because it's obvious after what happened to Andar & Geric) i
|
|
wonder if they think that maybe these remote cases are linked in any way.. The
|
|
only way they can probably see is that we are hackers.. And so that is where
|
|
their energies will be put.. To stop ALL hackers..and stop people BEFORE they
|
|
can become a threat.. After they wipe out the educators that is. Just a
|
|
theory.
|
|
|
|
38/53: Phrack
|
|
Name: Phobos Kutter
|
|
Date: Sun Jan 21 13:09:20 1990
|
|
|
|
It's a scary thought... - How did the intercept the information?? -
|
|
|
|
An information, ok, that's legal.... but how private is electronic mail? Per
|
|
haps we need a sub board to discuss some of these LEGAL issues...
|
|
|
|
39/53: ripper
|
|
Name: Magnum Guru
|
|
Date: Sun Jan 21 17:12:22 1990
|
|
|
|
Well, I know PT & NT pretty well, and they've been paranoid about doing
|
|
*anything* illegal. I think the SS just had a hard-on to hassle them and this
|
|
was the only excuse that they could come up with...
|
|
|
|
41/53: Phrack
|
|
Name: The Mogul
|
|
Date: Mon Jan 22 01:19:32 1990
|
|
|
|
I'm not sure what to make out of the Phrack. I think the SS, FBI, and whoever
|
|
has been waiting to bust them so long on ANYTHING that they waiting untill PT
|
|
NT crossed the line in any way. I mean, hell..PT and NT were paranoid, and
|
|
they suspected everything..so they stopped..and the SS, FBI and whoever had
|
|
nothing to go on...
|
|
|
|
Rap Master was right, PT and NT were "educators"..a lot of hacks/phreaks looked
|
|
up to them..maybe the SS and FBI thought that maybe if they couldn't get the
|
|
little guys, then to go for "the big guys"..(same philosophy of the drug war,
|
|
eh? Get the dealers, not the users?) Oh well..
|
|
|
|
I dunno..thats just my opinion... Shit, the public doesn't understand us enough
|
|
for the government to declare war on us... Maybe if you collect everyones
|
|
opinion on this, we can come to ONE conclusion..
|
|
|
|
|
|
42/53: Phrack
|
|
Name: Viking Warrior
|
|
Date: Mon Jan 22 02:40:13 1990
|
|
|
|
Geric was very upset when I talked to him a few days ago.
|
|
|
|
The Secret Service had been to their school and had taken all information off
|
|
of their public accounts through the university...this included the ENTIRE
|
|
phrack internet mailing list, future files, old issues, various lists of info
|
|
on people they knew, etc...
|
|
|
|
Geric assured me that they didn't go through his room, or even mess with his
|
|
pc, but that didn't matter, as they got enough from the system at school.
|
|
|
|
The problems stem from various articles published through Phrack, most
|
|
specifically an article dealing with E911 that was written by The Prophet.
|
|
They have said that this was stolen from a computer system, and was accepted
|
|
and distributed knowing that it was illegally obtained propriatary information.
|
|
|
|
(The Prophet was one of the 3 LOD members busted this summer in Atlanta) This
|
|
led to various questions dealing with LOD in general and a great deal of hazing
|
|
towards Geric.
|
|
|
|
For the most part, they pulled the same crap: "We know what you did, so if
|
|
you're smart you'll talk, or we'll make your life shit." And the other
|
|
approach, "Look, we know you're a smart kid with a bright future and we really
|
|
wouldn't want to see you fuck things up." Basic cop bullshit.
|
|
|
|
Geric was visited first by 3 agents, and Andar was supposedly to be visited the
|
|
following day. (They are at different schools now)
|
|
|
|
They were interested in the Telenet Directory, The EFT Files, which by now,
|
|
everyone knows that I wrote, since they had been grabbing the boys e-mail.
|
|
|
|
That pisses me off greatly, as Electronic Mail is supposed to be covered under
|
|
the same protection as regular mail now, or so I understood. I thought it was
|
|
a felony to interfere with peoples mail. Can you commit a felony, to stop a
|
|
suspected one from occurring? I hope not...hell, maybe Noriega is in charge
|
|
now...
|
|
|
|
In any case, I think I'm in for a world of shit...
|
|
|
|
43/53: MY feelings about this fucked up situation
|
|
Name: Viking Warrior
|
|
Date: Mon Jan 22 03:31:01 1990
|
|
|
|
I do not live in a fascist country...or so I thought.
|
|
|
|
INformation is withheld, people are threatened daily by an elite group of
|
|
Government thugs who operate above the law, hell, what do you call that kind of
|
|
bullshit?
|
|
|
|
I'm growing more and more pissed by the minute...if I do get nabbed, which I
|
|
semi-expect to, so you SS boys take a good look at this, I am dangerous. Maybe
|
|
not in a physical manner, although I'm kinda suicidal, and don't know how I'll
|
|
be on any given day, and I've only tried to kill my roommate once with a big
|
|
knife, and I've only broken wine bottles over two people...
|
|
|
|
But, I am dangerous in that I'm quite eloquent and VERY outspoken on topics
|
|
about which I feel strongly. Guess what? I kinda have a personal leaning
|
|
towards computer crime. Think carefully about reprocussions world-wide when
|
|
reporters find out just how insecure your precious Internet is, or think about
|
|
the stock fluctuations on Fortune 500 companies when their shareholders find
|
|
out just how easily the company could be shut down for a few days with a few
|
|
keystrokes, or consider the implications following just a few choice comments
|
|
about the lack of security at large banking institutions...hell, How fucking
|
|
skilled does someone have to be to sit on a nua and capture every fucking Saudi
|
|
Visa? (No offense P) but that shit is totally ridiculous. Security is
|
|
pathetic, and the ones who can fix it, or at least point it out are suppressed,
|
|
and placed in jail.
|
|
|
|
Fuck that. If that's what you expect to do to me, then you had better be
|
|
prepared to blow my fucking head off when you kick in the door, because I will
|
|
be heard.
|
|
|
|
|
|
47/53: well
|
|
Name: Ashman
|
|
Date: Mon Jan 22 09:21:39 1990
|
|
|
|
as long as nothing illegal is not posted.. the board is ine.. well... All i
|
|
have to say is that i ss/eds/or in my case CIA start playing dirty.. we have
|
|
been very nice in general about everything.. In act I cannot think o any time
|
|
when i have bought a system down.. But i it comes to it... we can fight ire
|
|
with ire.. <add f's where chars are missing.. i gotta get a new keyboard..> coz
|
|
i seriously agree with erik.. and when you guys start breaking the law to get
|
|
at us... well.. what the hell is the law or... i never liked the damn thing
|
|
anyway.. jesus.. as a final note... i will set up some sort of insurance... not
|
|
just or myself... but or anyone who needs it... and cant provide it or
|
|
themselves.. we can play below board just as much as any authorities can... so
|
|
there
|
|
|
|
49/53: dumb feds
|
|
Name: Silver Hawk
|
|
Date: Mon Jan 22 14:11:13 1990
|
|
|
|
Kill 'em all..as I like to say. Seriously, what can they prove if you are a
|
|
safe hacker? (hacking via outdials, phreaking with divertors only..no codes
|
|
etc. nothing traceable) They can't prove a damn thing. So what do they do,
|
|
but nail you on something trivial like copyright violation. All that shows is
|
|
that they have such a weak case that there is nothing solid to bust on. Enough
|
|
rambling for this paragraph...
|
|
|
|
What we need to do is set up a hackers network where everyone has their hands
|
|
in a few systems. That way, we have this sort of insurance that Phoenix talked
|
|
about: if one hacker gets busted 2 systems _die_. 2 hackers get busted 4
|
|
systems bite the dust. 3 hackers...9 systems. They need to quit messing with
|
|
people who wouldn't otherwise be harmful to the computer world. I know there
|
|
are freeloaders around that get their kicks from trashing Apple][ boards and
|
|
unixes, but this doesn't represent the majority of the hacker population. It
|
|
sure doesn't represent me!
|
|
|
|
50/53: busts
|
|
Name: Midnight Star
|
|
Date: Mon Jan 22 15:33:56 1990
|
|
|
|
I don't think that would be a very wise idea... It would just cause the
|
|
"authorities" and the general public to look toward us as destroyers, not
|
|
explorers... The ONLY times I have killed a system is when I really get pissed
|
|
off that the sysop keeps changing all the operator passwords (well... so maybe
|
|
i am a little malicious at times, but not like some people on this board)
|
|
|
|
51/53: Arg...
|
|
Name: Viking Warrior
|
|
Date: Mon Jan 22 18:22:55 1990
|
|
|
|
Wiping out systems as a means of retribution, or vengeance for a fellow
|
|
hacker's bust is NOT a good idea. You cannot take a bully approach when
|
|
dealing with the world biggest bully (The US Government) you will lose.
|
|
You have only one manner of defense, and that is to outsmart your opponent, or
|
|
to publicly humiliate him when faced with immediate danger.
|
|
|
|
|
|
Numb ->117 (51u7u2k2-117)
|
|
Sub ->busting hackers
|
|
From -> (#227)
|
|
To ->
|
|
Date ->02/08/90 08:58:00 PM
|
|
|
|
|
|
Reading the previous msgs. about the legion of doom and the possible prison
|
|
term of 32 years infuriates me. sure, what those dudes did is not right, but
|
|
lets keep their crime in perspective. they stole some shit off of a computer
|
|
system which was online and available to the public. ok, most of the public
|
|
doesn't know how to get stuff like that, but the fact that they did get it
|
|
means it could be considered available. the phone company surely knows of
|
|
phreakers, and that these people can be quite clever, therefore they knew the
|
|
information could be had.
|
|
|
|
30 years in jail for a fucking program, come on!!! people are killed and the
|
|
murderers get less. i realize that they probably won't get 30 years, but just
|
|
the possibility of getting it is outrageous.
|
|
|
|
f/h
|
|
|
|
Numb ->117 (51u7u2k2-117)
|
|
Sub ->Reply to: busting hackers
|
|
From -> (#321)
|
|
To ->all
|
|
Date ->02/09/90 02:59:00 AM
|
|
|
|
32 years for printing a publication. Hey you guys think there is some
|
|
issues of freedon of press or speech here. No probabably not because of the
|
|
subject matter but anyway It does seem kind of harsh considering there are alo
|
|
of other more important things to bust assholes for like murder and drug
|
|
smuggling. Its just another waste of tax payers money just like trying to
|
|
eleminate abortion. Who gives a fuck if you can't bring a kid into this world
|
|
right then there should be a choice. Too many people in this world anyway.
|
|
|
|
Numb ->118 (51u7u2k2-118)
|
|
Sub ->Reply to: Reply to: busting hackers
|
|
From -> (#70)
|
|
To ->J CRAZY
|
|
Date ->02/09/90 03:12:00 AM
|
|
|
|
A CLASSIC EXAMPLE OF "NOT COMPLAINING UNLESS YOUR OX IS GORED"! NOW I AGREE
|
|
WITH YOU THAT 32 YEARS, OR ANY YEARS FOR PUBLISHING IS RIDICULOUS...PER THE
|
|
FIRST AMENDMENT, BUT THEN YOU GO ON ABOUT MURDER AND "DRUG SMUGGLING" IN THE
|
|
SAME BREATHE. SINCE WHEN DOES THE GOVERNMENT HAVE THE RIGHT TO TELL US WHAT
|
|
WE CAN AND CAN'T DO WITH OUR BODIES IN PRIVATE? SINCE WHEN DOES THAT
|
|
PROHIBITION JUSTIFY JAIL? COMPLAIN ABOUT VIOLENT CRIMES PER SE, DON'T BE A
|
|
GOVERNMENT CONTROLLED STOOGE AND BUY INTO THEIR LATEST DEMAGOGUERY.
|
|
|
|
Numb ->119 (51u7u2k2-119)
|
|
Sub ->Reply to: busting hackers
|
|
From -> (#450)
|
|
To ->
|
|
Date ->02/09/90 06:58:00 AM
|
|
|
|
The prison sentence..or the one that they face is quite high! That is more
|
|
than they give murderers/rapists and any other hard crime! I'm not saying that
|
|
they should go scot free,but lets be realistic and give a sentence that does
|
|
fit the crime. Whatever 31 years is way to long.
|
|
|
|
|
|
Numb ->120 (51u7u2k2-120)
|
|
Sub ->stuff
|
|
From -> (#75)
|
|
To ->folks
|
|
Date ->02/10/90 03:00:00 AM
|
|
|
|
I don't think they're actually being PROSECUTED for publishing the information
|
|
they just play up the fact that the information was distributed in their cop
|
|
press releases to build public antipathy towards the suspects... Generic peopl
|
|
tend to think very highly of things like 911 that shouldn't be "monkeyed with"
|
|
so when they hear that kids are spreading "confidential" information about
|
|
those systems around, they get afraid and are sympathetic to prosecution. The
|
|
only charges I can imagine are related to 'breaking and entering' into the
|
|
Bellcore computer.
|
|
|
|
To the best of my knowledge, there is no precedent for a "clear and present
|
|
danger" prosecution against publication of information on law enforcement
|
|
procedures. A successful one, anyway.
|
|
|
|
* * * * * * *
|
|
|
|
The following came across the wires from a member of LoD explaining his view,
|
|
which contrasts remarkably from "official" media descriptions. The bottom line
|
|
is that it seems like the pheds are engaging in a witch hunt of sorts and
|
|
whether they can make charges stick is irrelevant for the Heavy Hasslers with
|
|
the power.
|
|
|
|
|
|
--------------------
|
|
|
|
|
|
-< Life, The Universe, & LOD >-
|
|
|
|
|
|
To set the record straight, a member of LOD who is a student in Austin and who
|
|
has had his computer account at UT subpoenaed by the DA out of Chicago because
|
|
of dealings with the above happenings:
|
|
|
|
My name is {deleted}, but to the computer world, I am Erik Bloodaxe. I have
|
|
been a member of the group known as Legion of Doom since its creation, and
|
|
admittedly I have not been the most legitimate computer user around, but when
|
|
people start hinting at my supposed Communist-backed actions, and say that I
|
|
am involved in a world-wide consipracy to destroy the nations computer and/or
|
|
911 network, I have to speak up and hope that people will take what I have to
|
|
say seriously.
|
|
|
|
Frank, Rob and Adam were all definately into really hairy systems. They had
|
|
basically total control of a packet-switched network owned by Southern Bell
|
|
(SBDN)...through this network they had access to every computer Southern Bell
|
|
owned...this ranging from COSMOS terminals up to LMOS front ends. Southern
|
|
Bell had not been smart enough to disallow connections from one public pad to
|
|
another, thus allowing anyone who desired to do so, the ability to connect to,
|
|
and seize information from anyone else who was using the network...thus they
|
|
ended up with accounts and passwords to a great deal of systems.
|
|
|
|
This was where the 911 system came into play. I don't know if this system
|
|
actually controlled the whole Southern Bell 911 network, or if it was just a
|
|
site where the software was being developed, as I was never on it. In any
|
|
case, one of the trio ended up pulling files off of it for them to look at.
|
|
This is usually standard proceedure: you get on a system, look around for
|
|
interesting text, buffer it, and maybe print it out for posterity. No member
|
|
of LOD has ever (to my knowledge) broken into another system and used any
|
|
information gained from it for personal gain of any kind...with the exception
|
|
of maybe a big boost in his reputation around the underground. Rob took the
|
|
documentation to the system and wrote a file about it. There are actually two
|
|
files, one is an overview, the other is a glossary. (Ray has the issue of
|
|
PHRACK that has the files) The information is hardly something anyone could
|
|
possibly gain anything from except knowledge about how a certain aspect of the
|
|
telephone company works.
|
|
|
|
The Legion of Doom used to publish an electronic magazine called the LOD
|
|
Technical Journal. This publication was kind of abandoned due to laziness on
|
|
our part. PHRACK was another publication of this sort, sent to several
|
|
hundred people over the Internet, and distributed widely on bulletin boards
|
|
around the US. Rob sent the files to PHRACK for the information to be read.
|
|
One of PHRACK's editors, Craig, happened to be the one who received the files.
|
|
If Rob had sent the files to one address higher, Randy would have been the one
|
|
who would probably be in trouble. In anycase, Craig, although he may have
|
|
suspected, really had no way to know that the files were propriatary
|
|
information and were stolen from a Southern Bell computer.
|
|
|
|
The three Atlanta people were busted after having voice and data taps on their
|
|
lines for 6 months. The Phrack people were not busted, only questioned, and
|
|
Craig was indicted later.
|
|
|
|
What I don't understand is why Rob and Craig are singled out more often than
|
|
any other people. Both of them were on probation for other incidents and will
|
|
probably end up in jail due to probation violations now. Frank and Adam still
|
|
don't know what is going on with their cases, as of the last time I spoke with
|
|
them.
|
|
|
|
The whole bust stemmed from another person being raided and rolling over on
|
|
the biggest names he could think of to lighten his burden. Since that time,
|
|
Mr. William Cook, the DA in Chicago, has made it his life's goal to rid the
|
|
world of the scourge of LOD. The three Atlanta busts, two more LOD busts in
|
|
New York, and now, my Subpoena.
|
|
|
|
People just can't seem to grasp the fact that a group of 20 year old kids just
|
|
might know a little more than they do, and rather than make good use of us,
|
|
they would rather just lock us away and keep on letting things pass by them.
|
|
I've said this before, you cant stop burglars from robbing you when you leave
|
|
the doors unlocked and merely bash them in the head with baseball bats when
|
|
they walk in. You need to lock the door. But when you leave the doors open,
|
|
but lock up the people who can close them for you another burglar will just
|
|
walk right in.
|
|
|
|
If anyone really wants to know anything about what is going on or just wants
|
|
to offer any opinions about all this directly to me, I'm
|
|
|
|
erikb@walt.cc.utexas.edu
|
|
|
|
but my account is being monitored so don't ask anything too explicit.
|
|
|
|
--------------------
|
|
|
|
>--------=====END=====--------<
|
|
|
|
|
|
|
|
***************************************************
|
|
*** Pirate Magazine Issue IV / File 4 of 10 ***
|
|
*** >Zipping and Archiving< ***
|
|
***************************************************
|
|
|
|
|
|
Swapping warez requires considerable zipping, unzipping, and rezipping, and we
|
|
offer the following tips to help assure that we get the most out of our ZIP
|
|
programs and procedures. ALthough most boards will accept any reputable
|
|
compression, there's not much disagreement on which compression method is the
|
|
best: Phil Katz's PKZIP is the standard. It's fast, tight, and offers many
|
|
options. Although some, such as ICE 1.14, may have higher compression ratios,
|
|
no other program has the all around power and utility as PKware.
|
|
Unfortunately, too many warez hobbyists don't use PKZIP to it's full potential,
|
|
and this can result in lost files, confused archives, or incomplete files on
|
|
uploading. We offer the following tips to improve zipping procedures.
|
|
|
|
1. Always zip from the original disks or programs when possible rather then do
|
|
a file dump and then rezip. In a file dump, it is easy to forget to include
|
|
subdirectories.
|
|
|
|
2. *ALWAYS* put a zip comment in each zip file so you (or others) know what
|
|
that file is. If you are zipping up a program called "LAWRITE" that has 6
|
|
disks, with the first being the program disk, type this command:
|
|
PKZIP LRT21-1 (for "Law Rite, ver. 2.1, disk 1). Then, type: PKZIP -Z
|
|
LRT21-1 (this will allow a zip comment) and type at the prompt something
|
|
like: "LAWRITE BY MACON, VER. 2.1, PROGRAM DISK (1/6). This lets you (or
|
|
whoever) know what the program is, what the disk is should the installation
|
|
procedure ask for the specific disk, and give you the version so it won't
|
|
be confused with an upgrade.
|
|
|
|
3. Experienced hobbyists keep their backup zip files as they come
|
|
off the disk, and this means *KEEPING SUBDIRECTORIES INTACT AND SEPARATE FROM
|
|
OTHER FILES.** There are two ways to do this. The first is to INSTALL a
|
|
complete program, including all options, so a complete program exists on hard
|
|
disk. Then, we go into each subdirectory and zip the files. For example, if
|
|
LAWRITE has a main directory called LAWRITE and three subdirectories called a)
|
|
FILES, b) LAW, and c) DICTNRY, you first go into each of the three
|
|
subdirectories and zip the the files with the command: PKZIP -M FILES (or LAW
|
|
or DICTNRY). This will zip all the files in that directory and remove them
|
|
after zipping. This saves the need to delete files individually. THEN: Go into
|
|
the LAWRITE directory and type the command:
|
|
PKZIP -m -P -r LRT21 (note lower case m & r and UPPER case P)
|
|
This will zip the entire program, Law Rite 2.1. The -m command
|
|
removes individual files, the -P switch retains the file's original
|
|
path, and the -r recurses the subdirectories. For a helpful article on
|
|
this, even for experienced users, see Steven J. Vaughan-Nichols:
|
|
"Zippity PKzip" in PC COMPUTING, Feb., 1990 (p. 96-99).
|
|
|
|
When finished, you should have one main zip file that contains all the files
|
|
from the LAWRITE directory and three additional zip files from the three
|
|
subdirectories. BE SURE TO ADD A "README.NOW" note and explain that, when
|
|
unzipping, these directories and subdirectories should be created, unzipped in
|
|
the LAWRITE directory (with the PKUNZIP command). If you have a large program
|
|
with several zip files in it (ALWAYS RUN THE PKUNZIP -v *.zip command to see
|
|
what's in a zip file before unzipping), you might first create subdirectoriese
|
|
named after those zip files just to be safe, and keep your fingers crossed that
|
|
whoever zipped it knew what they were doing. That's why it is crucial to name
|
|
those other zip files exactly as the subdirectory appears.
|
|
|
|
The disadvantage of this kind of zipping for hobbyists is that when unzipping,
|
|
the files will be from an installed program and not the original disk. This
|
|
means that if unzipped on a different computer, some needed files may be
|
|
missing. Besides, it's always helpful to have a second backup that
|
|
doesn't take much space that is complete. That's why we prefer
|
|
to keep zips off the original disks, because you never know what
|
|
kind of system it will be unzipped on, and installation programs
|
|
rarely copy over all files, but only those needed during the
|
|
initial configuration.
|
|
|
|
We suggest creating a test directory with a few subdirectories and placed some
|
|
short, unneeded files in them and then spending an hour practicing with the
|
|
PKzip/UNzip commands until you are familiar with them. You might also consider
|
|
experimenting with various batch commands, and use wildcards to create an
|
|
auto-zip program that saves typing time.
|
|
|
|
There have been reports that ICE 1.14 is a hacked version of LHarc, but this
|
|
does not appear true. A nice summary of other compression programs appeared in
|
|
PC COMPUTING (see above):
|
|
|
|
----------
|
|
FOUR OTHER DATA COMPRESSORS PKzip stands above other data-compression shareware
|
|
in terms of overall performance. Here are some more very popular utilities:
|
|
|
|
ARC 5.02. Long the industry standard, Arc 6.02 has deteriorated into a
|
|
middle-of-the-road performer in terms of speed and compression ratios. It has
|
|
the bad habit of aborting a job and leaving a file half-compressed if it
|
|
doesn't have enough disk space to complete the operation....
|
|
|
|
ICE .14. One of the newest entries in the data-compression arena, Ice (also
|
|
known as LHarc) emerged as a popular shareware program in Japan. It has the
|
|
highest compression ratio of any program mentioned here, but it's painfully
|
|
slow--and very difficult to use, in part because of its limited documentation.
|
|
Ice .14 is currently available on GEnie.
|
|
|
|
PAK 2.1. Though it's been around for a while, Pak has never had the prominence
|
|
of either Arc or PKzip, mostly because its performance lags behind that of the
|
|
other two programs. Pak excels at handling multiple file specifications and can
|
|
create and convert files read by Arc.
|
|
|
|
Zoo 2.01. Neither the fastest nor the most efficient compression utility
|
|
available, Zoo offers some advantages. This shareware program allows you to
|
|
selectively extract multiple generations of the same file--a terrific feature
|
|
for programmers and writers. It also spans several operating systems, including
|
|
Xenix, VAX/VMS, and Amiga DOS, so that you can archive files across platforms.
|
|
It's a difficult program to master, and the documentation isn't much help in
|
|
figuring it out.
|
|
|
|
|
|
>--------=====END=====--------<
|
|
|
|
|
|
|
|
***************************************************
|
|
*** Pirate Magazine Issue IV / File 5 of 10 ***
|
|
*** Cracking Tips by NICODEMUS KEEZARVEXIUS ***
|
|
*** (and Company of Wolves) ***
|
|
***************************************************
|
|
|
|
|
|
Company of Wolves and ace cracker Nicodemus Keezarvexius will appear here
|
|
|
|
|
|
|
|
periodically in their own corner. A few of the following were printed last
|
|
issue but we thought we'd reprint them to keep CoW's work in a single file. Any
|
|
suggests or requests, you can reach NK at PC-EXEC (414-789-4210) or the CoW
|
|
board (301-791-1595).
|
|
|
|
In this file: Unprotects for
|
|
|
|
BOP'N WRESTLE
|
|
KARATEKA
|
|
IMPOSSIBLE MISSION II
|
|
MIGHT AND MAGIC
|
|
POOL OF RADIANCE
|
|
GAUNTLET
|
|
|
|
|
|
FROM:
|
|
THE COMPANY OF WOLVES
|
|
|
|
----------------------------------------------------------------
|
|
MINDSCAPES BOP'N WRESTLE
|
|
----------------------------------------------------------------
|
|
NEEDED:
|
|
1. Norton Utilities (or similar program)
|
|
2. A copy of the file Bop.exe from your original disk.
|
|
3. A bit of your time
|
|
----------------------------------------------------------------
|
|
|
|
1. HOW TO UNPROTECT BOP'N WRESTLE:
|
|
First load one of the above file into Norton.
|
|
Then search for the string B8 00 19 CD.
|
|
Change these bytes to 31 C0 EB 2F.
|
|
Save the changes
|
|
|
|
2. FOR ALL OF YOU DEBUG FANS:
|
|
Rename Bop.exe to Bop.try
|
|
type E CS:96D [return] 31 [space] C0 [space] EB [space] 2F
|
|
[return]
|
|
Save the changes with the W command
|
|
Exit debug
|
|
Rename Bop.try back to Bop.exe
|
|
Enjoy the game on any drive you choose to.
|
|
|
|
The program will now skip the check for copy protection all together. The first
|
|
change (31 C0) is an xor ax,ax. The Second (EB 2F) jumps to a return. (just in
|
|
case you wanted to know)
|
|
|
|
If you have any problems with any of the patches above check the date of the
|
|
file BOP.EXE on your original disk A for the date 11/06/87. If your file has a
|
|
different date then they probably changed the copy protection method and your
|
|
out of luck with this patch.
|
|
|
|
----------------------------------------------------------------
|
|
|
|
|
|
----------------------------------------------------------------
|
|
**KARATEKA**
|
|
----------------------------------------------------------------
|
|
NEEDED:
|
|
Norton Utilities (or simular program).
|
|
A copy of the file Karateka.exe from your original disk.
|
|
A bit of your time.
|
|
----------------------------------------------------------------
|
|
|
|
|
|
1. HOW TO UNPROTECT BRODERBUND'S KARATEKA:
|
|
First load KARATEKA.EXE into Norton.
|
|
Then search for the string E8 81 14.
|
|
Change the string to 90 90 90.
|
|
Skip ahead 4 bytes to the string 75 2D.
|
|
Change the 75 to EB.
|
|
Search for the string E8 74 14.
|
|
Change the string to 90 90 90.
|
|
Once again skip ahead 4 bytes to the string 75 20 and Change the
|
|
75 to EB.
|
|
Write the changes.
|
|
The program will now skip over the part where it looks for the copy protection
|
|
but you aren't done yet.
|
|
Now search for the string B2 00 B4 0E CD 21.
|
|
Change all of these bytes to 90.
|
|
Write the changes.
|
|
Now the program will play on whatever drive you want.
|
|
|
|
|
|
----------------------------------------------------------------
|
|
|
|
If you have any problems with any of the patches above check the date of the
|
|
file KARATEKA.EXE on your original disk for the date 07-01-87. If your file has
|
|
a different date then they proabably changed the copy protection method and
|
|
your out of luck with this patch.
|
|
|
|
---------------------------------------------------------------
|
|
MISSION IMPOSSIBLE II
|
|
----------------------------------------------------------------
|
|
|
|
|
|
FROM:
|
|
THE COMPANY OF WOLVES
|
|
----------------------------------------------------------------
|
|
NEEDED:
|
|
Norton Utilities (or simular program).
|
|
A copy of the game file from your original Manhunter disk.
|
|
IM2_CGA.EXE if you have CGA graphics,IM2_TAN.EXE for Tandy,
|
|
IM2_EGA.EXE for EGA, or IM2_MGGA.EXE for MCGA.
|
|
A bit of your time.
|
|
----------------------------------------------------------------
|
|
|
|
|
|
1. HOW TO UNPROTECT IMPOSSIBLE MISSION II:
|
|
First load the appropiat file into Norton.
|
|
Search for the string A2 CA 99 A2 28 9C.
|
|
Change these 6 bytes and the next 6 bytes (total of 12) to 90's.
|
|
Write the changes.
|
|
Then search for the bytes CD 21 B9 01 14.
|
|
Change the CD 21 to 90 90.
|
|
Write the changes.
|
|
Now search for F6 C4 10.
|
|
Change the byte immediatly following the 10 (75) to EB.
|
|
Write the changes.
|
|
Next search for the bytes BB 09 9A 8B CD.
|
|
Change the 2 bytes before this string (72 xx (xx is different for
|
|
some of the above files)) to 90 90.
|
|
Write the changes.
|
|
Now search for B9 10 00 F3 A7.
|
|
Change the 2 bytes following this string (75 xx) to 90 90.
|
|
Write the changes.
|
|
Now search for B9 04 00 F3 A7.
|
|
Change the 2 bytes following this string (75 xx) to 90 90.
|
|
Write the changes.
|
|
Now search for B8 09 02 CD 13.
|
|
Change the CD 13 to 90 90, and the byte following it (73) to EB.
|
|
Write the changes.
|
|
|
|
Now the check for the copy protection (a bad sector on disk A) is disabled. If
|
|
you don't intend to use the game on your hard disk you can now play the game
|
|
from and DISKCOPYed disk. If you want to play this game from a single directory
|
|
on any fixed disk follow the procedure below.
|
|
|
|
2. FIXING THE PROGRAM TO PLAY FROM 1 DIRECTORY: Once again load the appropiate
|
|
EXE file into Norton. Search for the string CHARSf. Basicly you will type
|
|
the file name after the CHARSf over CHARSf. For example if the full string is
|
|
CHARSfTHISFILE.A to THISFILE.A(00) (Note. the end of the file name is denoted
|
|
by a 00) hex). Be sure to look to see if the . after the file is indeed a . or
|
|
a 00 hex because some files have extentions and some don't and make sure that
|
|
you end the name you just typed over ends with a 00.
|
|
Write the changes.
|
|
Repete the prodcedure until you reach the end of the file.
|
|
Next do the same thing exept look for the string ROOMSf.
|
|
|
|
Now when you copy the game just copy all of the files from all directories from
|
|
your original disks to the directory on the hard drive you intend to use. You
|
|
can now enjoy the game without flipping thru floppy disks.
|
|
|
|
-------------------------------------------------------------------
|
|
MIGHT AND MAGIC
|
|
------------------------------------------------------------------
|
|
|
|
|
|
----------------------------------------------------------------
|
|
NEEDED:
|
|
1. Norton Utilities (or similar program)
|
|
2. A copy of the file MM.EXE from your original disk.
|
|
3. A bit of your time
|
|
----------------------------------------------------------------
|
|
|
|
|
|
1. HOW TO UNPROTECT MIGHT AND MAGIC:
|
|
First load the file MM.EXE into Norton.
|
|
Then search for the string CD 13 72 EE.
|
|
Change these bytes to 90 90 90 90.
|
|
Write the changes.
|
|
Next search for the string CD 13 72 05.
|
|
Change these bytes to 90 90 90 90.
|
|
Write the changes.
|
|
Next search for the string CD 13 72 05.
|
|
Change the CD 13 to 90 90 and the 72 05 to EB 05.
|
|
A few bytes after this is a 75 F6, change these bytes to 90 90.
|
|
you will have to do this 4 more times here are the jumps to look
|
|
for: 75 20, 75 18, 75 10, 75 08. These will all be 7 bytes apart,
|
|
change them all to 90's.
|
|
Once again their will be another jump 7 bytes after the last one
|
|
you changed (74 03), change it to EB 03.
|
|
Write the changes.
|
|
|
|
----------------------------------------------------------------
|
|
The program will now skip the check for copy protection all
|
|
together.
|
|
|
|
If you have any problems with any of the patches above check the
|
|
date of the file MM.EXE on your original disk 1 for the date
|
|
11/18/87. If your file has a different date then they probably
|
|
changed the copy protection method and your out of luck with this
|
|
patch.
|
|
|
|
------------------------------------------------------------------
|
|
HOW TO FIX COPY PROTECTION FROM
|
|
AND SUPERCHARGE CHARACTERS
|
|
FOR POOL OF RADIANCE.
|
|
|
|
|
|
----------------------------------------------------------------
|
|
NEEDED:
|
|
Norton Utilities (or similar program)
|
|
A copy of the file start.exe from your pool of radiance disk
|
|
A bit of your time
|
|
----------------------------------------------------------------
|
|
|
|
|
|
1. HOW TO UNPROTECT POOL OF RADIANCE:
|
|
First load START.EXE into Norton
|
|
Then search for one of the key words from the code disk
|
|
Change the 6 letters of each word to whatever you want (make then
|
|
all the same for convince)
|
|
Save the changes
|
|
|
|
|
|
11/08/89
|
|
I just completed a new fix which will completely skip over the part where the
|
|
program asks you for the word from the code disk. For Norton Utilities users
|
|
search for the string 9A 25 00 1D 00, change all of these bytes to 90's. For
|
|
all of you Debug fans out there rename the file START.EXE to say 123.AAA (or
|
|
whatever), then type S cs:100 900 9A 25 00 1D 00. It should show a match at
|
|
xxxx:05D7. Change the bytes by typing the following: E 05D7 EenterL, 90 EspaceL
|
|
90 EspaceL 90 EspaceL 90 EspaceL 90 EenterL. Then write the file with the W
|
|
command and quit Debug. Now rename the file you just fixed to START.EXE and
|
|
your done.
|
|
|
|
01/03/90
|
|
I have just been made aware of another version of start.exe dated 12/12/88. To
|
|
get around the copy protection for this version with Norton search for the same
|
|
string listed above, with this version change the first four bytes to 90's and
|
|
leave the 00 alone.
|
|
|
|
Thanx Karl.
|
|
|
|
----------------------------------------------------------------
|
|
|
|
2. SUPERCHARGING YOUR CHARACTERS:
|
|
Copy the file CHARFIX.EXE (included in this fix) into the directory where your
|
|
saved games reside. Change to that directory. Run the program, it is self
|
|
explanatory.
|
|
----------------------------------------------------------------
|
|
|
|
If you have any problems with any of the patches above check the
|
|
date of the file START.EXE on your original disk A for the date
|
|
10-26-88. If your file has a different date then they probably
|
|
changed the copy protection method and your out of luck with this
|
|
patch.
|
|
|
|
-------------------------------------------------------------
|
|
MINDSCAPE'S GAUNTLET
|
|
------------------------------------------------------------
|
|
|
|
|
|
NEEDED:
|
|
1. Norton Utilities (or similar program)
|
|
2. A copy of the file's gintro.exe and gprog.exe from your
|
|
original disk.
|
|
3. A bit of your time
|
|
-----------------------------------------------------------------
|
|
|
|
|
|
1. HOW TO UNPROTECT GAUNTLET:
|
|
First load one of the above files into Norton.
|
|
Then search for the string F3 A7.
|
|
Change the byte immediately following (74) to EB.
|
|
Continue the search and once again change the 74 to EB.
|
|
Save the changes
|
|
Repeat the steps above for the other .EXE file.
|
|
|
|
For you Debug fans rename each of the two files to 1.aaa and 2.aaa
|
|
respectivaly. Search (the S command) for F3 A7, you should get at least 3
|
|
matches. You will need to unassemble each of the matches, the first copy
|
|
protection match should read REPZ CMPSW, JZ 2D96, ect..., and the second REPZ
|
|
CMPSW, JZ 2DB1, ect... With the E command using the FULL address of the JZ
|
|
commands change the 74's to EB's. Write the files with the W command and
|
|
repeat the process for the other file. When finishes erase Gintro.exe and
|
|
Gprog.exe and rename 1.aaa gintro.exe and 2.aaa gprog.exe.
|
|
|
|
In this version of the program will still look for the copy protection (which
|
|
is a sector at the end of the hard disk that the install program writes then
|
|
marks bad to prevent overwriting to that sector) but will continue the program
|
|
as if the comparison (F3 A7) was successful.
|
|
-----------------------------------------------------------------
|
|
|
|
If you have any problems with any of the patches above check the date of the
|
|
file GINTRO.EXE on your original disk A for the date 03/25/88. If your file has
|
|
a different date then they probably changed the copy protection method and your
|
|
out of luck with this patch.
|
|
|
|
----------------------------------------------------
|
|
How to fix copy protection from
|
|
Mindscape's Paperboy.
|
|
-----------------------------------------------------
|
|
|
|
1. Norton Utilities (or similar program)
|
|
2. A copy of the file's papercga.exe, papercgt.exe, and
|
|
papercg2.exe from your original disk.
|
|
3. A bit of your time
|
|
-----------------------------------------------------------------
|
|
|
|
1. HOW TO UNPROTECT PAPERBOY:
|
|
First load one of the above files (whichever applies to your graphics, papercga
|
|
for cga graphics, papercgt for tandy graphics , or papercg2 for ega graphics)
|
|
into Norton. Then search for the string 3D 33 00 75 FE. Change the 74 FE to
|
|
90 90. Save the changes
|
|
|
|
The program will still look for the copy protection files DEMAA.COM and
|
|
DEMAB.COM but will skip the instruction that locks up the system (74 FE (jump
|
|
back two bytes if comparison is not zero)).
|
|
|
|
If you have any problems with any of the patches above check the date of the
|
|
file PAPERxxx.EXE on your original disk A for the date 06/17/88. If your file
|
|
has a different date then they probably changed the copy protection method and
|
|
your out of luck with this patch.
|
|
|
|
|
|
>--------=====END=====--------<
|
|
|
|
|
|
|
|
|
|
***************************************************
|
|
*** Pirate Magazine Issue IV / File 2 of 10 ***
|
|
*** Response to a U's Anti-Piracy Policy ***
|
|
***************************************************
|
|
|
|
|
|
---------
|
|
The following response to a University anti-piracy announcement was downloaded
|
|
from a midwest BBS. We reprint it without permission, and it is apparently a
|
|
draft. We thought the comments were sufficiently interesting to pass on.
|
|
---------
|
|
|
|
|
|
SOFTWARE PIRACY: AN ALTERNATIVE VIEW
|
|
|
|
Jim Thomas and Gordon Meyer
|
|
(February, 1990)
|
|
|
|
|
|
|
|
%Jim Thomas is an associate professor in Sociology.
|
|
Gordon Meyer received his M.S. in Sociology in
|
|
1989. They are currently researching the
|
|
computer underground from which the data for this
|
|
note are drawn.%
|
|
|
|
---------------
|
|
Draft copy: Uploaded to PC-EXEC for comments. Not to
|
|
be cited without permission
|
|
----------------
|
|
|
|
The university policy against computer software piracy has been widely
|
|
publicized, including in a recent issue of Computing News (December, 1989).
|
|
There is no question that the university must protect itself against actions
|
|
of the NIU community for which it could be held legally accountable.
|
|
However, based on our current research of the "computer underground" and the
|
|
activities of "phreaks, hackers, and pirates," we find no evidence to
|
|
support the many value judgments offered in the rationale circulated by the
|
|
university.
|
|
|
|
Our intent here is neither to justify software piracy nor to challenge
|
|
University policy. However, because the area of copyright and "computer
|
|
abuse" law is so new, and because these laws tend to rely on media and other
|
|
depictions of "computer underground" activity as criminally sanctionable, it
|
|
is important to counter conceptions of underground activity that seem
|
|
unsubstantiated by evidence.
|
|
|
|
The university's normative justification of the University policy can be
|
|
summarized in three broad principles:
|
|
|
|
1. Software piracy shows disrespect for the intellectual work and property
|
|
of others and subverts the mission of higher education.
|
|
|
|
2. Software piracy deprives authors of a "fair return" for their work.
|
|
|
|
3. Software piracy is unethical.
|
|
|
|
The data from our research do not support these judgments for several
|
|
reasons.
|
|
|
|
First, software pirates make a clear distinction between "pirates," persons
|
|
who collect and share software as hobbyists akin to stamp collectors,
|
|
and "bootleggers." Bootleggers are persons who distribute software for
|
|
material gain. Pirates may copy and install programs, but generally their
|
|
goal is to collect, and they derive satisfaction from running programs for
|
|
which they have no need and that they will rarely, if ever, use.
|
|
|
|
Second, software pirates, despite the claims of the SPA (Software Publishsers
|
|
Association) report spending considerably more money purchasing software than
|
|
the average user. Many of these purchases are for trading, and there is a
|
|
strong ethos in the pirate world that if one uses a program, one purchases
|
|
it. Reasons for purchasing include documents, information and discounts on
|
|
updates, and online technical support. It is quite common for pirates to
|
|
purchase programs identical to those they have already obtained.
|
|
|
|
Third, the "no return" policy of most software merchandisers makes it
|
|
difficult for potential buyers to assess the ability of a program to meet
|
|
their needs or work adequately on their system. Piracy creates an informed
|
|
public by assuring that programs are available for pretesting, by providing
|
|
a pool of reasonably literate users to publicly discuss whether Word
|
|
Perfect is better than XYwrite or WordStar, and to even offer
|
|
technical assistance to those who have purchased a program. In this sense,
|
|
the "unauthorized" copying of software can be seen as contributing to the
|
|
university mission of expanding knowledge, of preventing exploitation of
|
|
consumers through education, and above all, for expanding computer literacy
|
|
by contributing to the free flow of information.
|
|
|
|
Fourth, pirates spend a considerable sum on their hobby. One of the most
|
|
active topics of discussion among pirates is that of the need to continually
|
|
upgrade, the continual purchase of diskettes on which to store programs,
|
|
and with the popularity of 9600 baud modems to invest between $600-900 for
|
|
telecommunications hardware. Because most pirates exchange software across
|
|
telephone lines, piracy has benefitted telephone companies because of the
|
|
growth of Bulletin Board Systems (BBSs). Our data indicate that an average
|
|
monthly phone bill of $200 or more is common, and active pirates easily
|
|
double that cost.
|
|
|
|
Fifth, there is simply no evidence to corroborate that piracy deprives
|
|
authors of revenue. Our data suggest that pirates annually purchase no less
|
|
than three times the 1.5 programs the SPA estimates for the "average" user.
|
|
Further, few students or faculty could afford the price of Dbase 4 and
|
|
other large programs, and few people could afford to spend several thousand
|
|
dollars a year on computer games. Programs would simply remain unpurchased.
|
|
However, piracy creates an interest, expands consumer literacy, and
|
|
contributes to a "user culture" that benefits the industry as a whole. We
|
|
suggest that without such a culture, there would be less interest in software
|
|
and, consequently, less revenue for authors.
|
|
|
|
Sixth, the claim that piracy is unethical is usually a glib one made without
|
|
a strong rationale. Although we make no metaphysical claims here, we do
|
|
suggest that piracy and current attempts to criminalize it are far to serious
|
|
to be so glibly stigmatized, and the issues require far more research and
|
|
debate.
|
|
|
|
The rapid growth of computer and telecommunications technology brings with
|
|
it new questions of the nature of "private property," free and open access to
|
|
information and resources, and definitions of "authorship." Few among us
|
|
condone any form of predatory behavior. However, we find equally disturbing
|
|
the tendancy to perpetuate claims and definitions that should be brought into
|
|
a public forum for debate rather than simply asserted from the position of
|
|
authority that leads to criminalization.
|
|
|
|
|
|
>--------=====END=====--------<
|
|
|
|
|
|
***************************************************
|
|
*** Pirate Magazine Issue IV / File 6/10 ***
|
|
*** PTL Cracking tips (reprinted) ***
|
|
***************************************************
|
|
|
|
{This file has been around for awhile, but it's sufficiently good
|
|
that it deserves reprinting (eds.)}
|
|
|
|
IN THIS FILE: Unprotects for:
|
|
Title: Case Study: A Colorful CLS
|
|
Title: Cracking On the IBM PC Part I
|
|
Title: Cracking On the IBM PC Part II
|
|
Title: MEAN-18 UnProtect For CGA/EGA Version
|
|
Title: Space Station Oblivion Crack
|
|
Title: F-15 Unprotect
|
|
Title: BATTLEHAWKS-1945 Doc Check Crack
|
|
Title: Yeager's Advanced Flight Trainer
|
|
Title: Microsoft Flight Simulator 1.00 Unprotect
|
|
|
|
|
|
Version 1.3
|
|
By
|
|
Specular Vision
|
|
|
|
Special Thanks to:
|
|
Mr. Transistor
|
|
Ironman
|
|
The Grand Elusion
|
|
Banzai Buckaroo
|
|
|
|
Another fine PTL Production
|
|
Call The Myth Inc. BBS
|
|
------------------ (Page Numbers will be aprox. until
|
|
final version is finished)
|
|
i. Table of Contents 2
|
|
|
|
ii. Introduction 3
|
|
|
|
I. How to Crack 4
|
|
Debugging DOS 4
|
|
Cracking on the IBM PC Part 1 7
|
|
Cracking on the IBM PC Part 2 11
|
|
|
|
II. Example Cracks 14
|
|
Mean-18 by Accolade 14
|
|
Submarine by Eypx 18
|
|
Space Station Oblivion by Eypx 22
|
|
|
|
III. Removing Doc Check Questions 23
|
|
F-15 Strike Eagle by MicroProse 23
|
|
Battlehawks 1945 by Lucasfilms 25
|
|
A - Interrupt Tables 36
|
|
(This will be an add-on file)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
01 90 FE C5 80 FD 0C
|
|
|
|
04. After modifying the bytes, write the modified file
|
|
E1 90 CD 20
|
|
|
|
|
|
2
|
|
|
|
Comments Key:
|
|
-------------
|
|
|
|
Comments in the following material will be made by one of the
|
|
following and the lines that enclose the comments show who
|
|
made the comment.
|
|
|
|
Specular Vision = -------------
|
|
Mr. Transistor = +++++++++++++
|
|
Ironman = |||||||||||||
|
|
|
|
|
|
Special thanks to Mr. Transistor, for coming out of "Retire-
|
|
ment" to help compose this document.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3
|
|
|
|
-------------------------------------------------------------
|
|
Let's start with a simple introduction to patching a program
|
|
using the DOS DEBUG program. The following article will in-
|
|
troduce you to the basic ideas and concepts of looking for a
|
|
certain area of a program and making a patch to it.
|
|
-------------------------------------------------------------
|
|
|
|
|
|
By: Charles Petzold / Specular Vision
|
|
Title: Case Study: A Colorful CLS
|
|
|
|
This article originally appeared in the Oct. 14,1986 Issue
|
|
of PC Magazine (Vol 15. Num 17.). Written by Charles Petzold.
|
|
|
|
The hardest part of patching existing programs is determin-
|
|
ing where the patch should go. You really have to make an
|
|
intelligent guess about the functioning of the program.
|
|
|
|
As an example, let's attempt to modify COMMAND.COM so that
|
|
is colors the screen on a CLS command. As with any type of
|
|
patch try it out on a copy and NOT the original.
|
|
|
|
First, think about what we should look for. CLS is differ-
|
|
ent from all the other DOS internal Commands, It is the only
|
|
internal command that does something to the screen other than
|
|
just write to it with simple teletype output. CLS blanks the
|
|
screen and homes the cursor. Since it can't do this through
|
|
DOS Calls (unless ANSI.SYS is loaded), it is probably calling
|
|
the BIOS Directly. The BIOS Interrupt 10h call controls the
|
|
video, and so the CLS command probably uses several INT 10h
|
|
instructions. The machine code for INT 10h is CD 10.
|
|
|
|
(While this same method will work under any version of
|
|
PC-DOS, Version 2.0 and later, the addresses I'll be using
|
|
are from PC-DOS 3.1. Other versions of PC-DOS(or MS-DOS) will
|
|
have different addresses; you should be absolutely certain
|
|
that you're using the correct addresses.)
|
|
|
|
Load COMMAND.COM into DEBUG:
|
|
|
|
DEBUG COMMAND.COM
|
|
|
|
and do an R (Registers) command. The size of COMMAND.COM is
|
|
in register CX. For DOS 3.1's COMMAND.COM, this value is
|
|
5AAA.
|
|
|
|
Now do Search command to look for the CD 10 bytes:
|
|
|
|
S 100 L 5AAA CD 10
|
|
|
|
You'll get a list of six addresses, all clustered close to-
|
|
|
|
4
|
|
gether. The first one is 261D. You can now pick an address a
|
|
little before that (to see what the first call is doing) and
|
|
start disassembling:
|
|
|
|
U 261B
|
|
|
|
The first INT 10 has AH set to 0F which is a Current Video
|
|
State call. The code checks if the returned value of AL
|
|
me to get started. Next we'll look at two other articles,
|
|
both written by Buckaroo Banzi. These two articles CRACK-1
|
|
and CRACK-2 give you an introduction to the different copy
|
|
protection schemes used on IBM PC's, and how to find and by-
|
|
pass them.
|
|
-------------------------------------------------------------
|
|
|
|
|
|
|
|
By: Buckaroo Banzai
|
|
Title: Cracking On the IBM PC Part I
|
|
|
|
|
|
Introduction
|
|
------------
|
|
For years, I have seen cracking tutorials for the APPLE
|
|
computers, but never have I seen one for the PC. I have de-
|
|
cided to try to write this series to help that pirate move up
|
|
a level to a crackest.
|
|
|
|
In this part, I will cover what happens with INT 13 and how
|
|
most copy protection schemes will use it. I strongly suggest
|
|
a knowledge of Assembler (M/L) and how to use DEBUG. These
|
|
will be an important figure in cracking anything.
|
|
|
|
|
|
INT-13 - An overview
|
|
--------------------
|
|
|
|
Many copy protection schemes use the disk interrupt
|
|
(INT-13). INT-13 is often use to either try to read in a il-
|
|
legally formatted track/sector or to write/format a
|
|
track/sector that has been damaged in some way.
|
|
|
|
INT-13 is called like any normal interrupt with the assem-
|
|
bler command INT 13 (CD 13). [AH] is used to select which
|
|
command to be used, with most of the other registers used for
|
|
data.
|
|
|
|
INT-13 Cracking College
|
|
-----------------------
|
|
Although, INT-13 is used in almost all protection schemes,
|
|
the easiest to crack is the DOS file. Now the protected pro-
|
|
gram might use INT-13 to load some other data from a normal
|
|
track/sector on a disk, so it is important to determine which
|
|
tracks/sectors are important to the protection scheme. I
|
|
have found the best way to do this is to use LOCKSMITH/pc
|
|
(what, you don't have LS. Contact your local pirate for it.)
|
|
|
|
Use LS to analyze the diskette. Write down any track/sector
|
|
that seems abnormal. These track are must likely are part of
|
|
the protection routine. Now, we must enter debug. Load in
|
|
|
|
7
|
|
the file execute a search for CD 13. Record any address
|
|
show.
|
|
|
|
If no address are picked up, this mean 1 or 2 things, the
|
|
program is not copy protected (right...) or that the check is
|
|
in an other part of the program not yet loaded. The latter
|
|
being a real hassle to find, so I'll cover it in part II.
|
|
There is another choice. The CD 13 might be hidden in self
|
|
changing code. Here is what a sector of hidden code might
|
|
look like
|
|
|
|
-U CS:0000
|
|
1B00:0000 31DB XOR BX,BX
|
|
1B00:0002 8EDB MOV DS,BX
|
|
1B00:0004 BB0D00 MOV BX,000D
|
|
1B00:0007 8A07 MOV AL,[BX]
|
|
1B00:0009 3412 XOR AL,12
|
|
1B00:000B 8807 MOV [BX],AL
|
|
1B00:000D DF13 FIST WORD...
|
|
|
|
In this section of code, [AL] is set to DF at location
|
|
1B00:0007. When you XOR DF and 12, you would get a CD(hex)
|
|
for the INT opcode which is placed right next to a 13 ie,
|
|
giving you CD13 or INT-13. This type of code can't and will
|
|
not be found using debug's [S]earch command.
|
|
|
|
|
|
|
|
Finding Hidden INT-13s
|
|
----------------------
|
|
|
|
The way I find best to find hidden INT-13s, is to use a
|
|
program called PC-WATCH (TRAP13 works well also). This pro-
|
|
gram traps the interrupts and will print where they were
|
|
called from. Once running this, you can just disassemble
|
|
around the address until you find code that look like it is
|
|
setting up the disk interrupt.
|
|
|
|
An other way to decode the INT-13 is to use debug's [G]o
|
|
command. Just set a breakpoint at the address give by
|
|
PC-WATCH (both programs give the return address). Ie, -G
|
|
CS:000F (see code above). When debug stops, you will have
|
|
encoded not only the INT-13 but anything else leading up to
|
|
it.
|
|
|
|
|
|
What to do once you find INT-13
|
|
-------------------------------
|
|
|
|
Once you find the INT-13, the hard part for the most part
|
|
is over. All that is left to do is to fool the computer in
|
|
to thinking the protection has been found. To find out what
|
|
the computer is looking for, examine the code right after the
|
|
INT-13. Look for any branches having to do with the
|
|
|
|
8
|
|
ny CMP to the AH register. If a JNE or JC
|
|
(etc) occurs, then [U]nassembe the address listed with the
|
|
jump. If it is a CMP then just read on.
|
|
|
|
Here you must decide if the program was looking for a pro-
|
|
tected track or just a normal track. If it has a CMP AH,0
|
|
and it has read in a protected track, it can be assumed that
|
|
it was looking to see if the program had successfully com-
|
|
plete the READ/FORMAT of that track and that the disk had
|
|
been copied thus JMPing back to DOS (usually). If this is
|
|
the case, Just NOP the bytes for the CMP and the correspond-
|
|
ing JMP.
|
|
|
|
If the program just checked for the carry flag to be set,
|
|
and it isn't, then the program usually assumes that the disk
|
|
has been copied. Examine the following code
|
|
|
|
INT 13 <-- Read in the Sector
|
|
JC 1B00 <-- Protection found
|
|
INT 19 <-- Reboot
|
|
1B00 (rest of program)
|
|
|
|
The program carries out the INT and find an error (the il-
|
|
legally formatted sector) so the carry flag is set. The com-
|
|
puter, at the next instruction, see that the carry flag is
|
|
set and know that the protection has not been breached. In
|
|
this case, to fool the computer, just change the "JC 1B00" to
|
|
a "JMP 1B00" thus defeating the protection scheme.
|
|
|
|
NOTE: the PROTECTION ROUTINE might be found in more than just
|
|
1 part of the program
|
|
|
|
|
|
----------------------------
|
|
00 - Successful
|
|
01 - Bad command given to INT
|
|
*02 - Address mark not found
|
|
03 - write attempted on write protected disk
|
|
*04 - request sector not found
|
|
08 - DMA overrun
|
|
09 - attempt to cross DMA boundary
|
|
*10 - bad CRC on disk read
|
|
20 - controller has failed
|
|
40 - seek operation failed
|
|
80 - attachment failed
|
|
(* denotes most used in copy protection)
|
|
AH=2 Read Sectors
|
|
|
|
input
|
|
DL = Drive number (0-3)
|
|
DH = Head number (0or1)
|
|
CH = Track number
|
|
CL = Sector number
|
|
AL = # of sectors to read
|
|
ES:BX = load address
|
|
output
|
|
AH =error number (see above)
|
|
[Carry Flag Set]
|
|
AL = # of sectors read
|
|
|
|
AH=3 Write (params. as above)
|
|
AH=4 Verify (params. as above -ES:BX)
|
|
AH=5 Format (params. as above -CL,AL
|
|
ES:BX points to format
|
|
Table)
|
|
|
|
------------------------------------------------------------
|
|
For more information on INT-13 refer to appendix A.
|
|
------------------------------------------------------------
|
|
|
|
END.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10
|
|
In part II, Buck cover's Calls to INT-13 and INT-13 that are
|
|
located in different overlays of the program. This is a
|
|
method that is used often.
|
|
-------------------------------------------------------------
|
|
|
|
|
|
Cracking Tutorial II.
|
|
|
|
By: Buckaroo Banzai
|
|
Title: Cracking On the IBM PC Part II
|
|
|
|
|
|
Introduction
|
|
------------
|
|
|
|
OK guys, you now passed out of Copy Class 101 (dos files)
|
|
and have this great new game with overlays. How do I crack
|
|
this one. You scanned the entire .EXE file for the CD 13 and
|
|
it's nowhere. Where can it be you ask yourself.
|
|
|
|
In part II, I'll cover cracking Overlays and the use of
|
|
locksmith in cracking. If you haven't read part I, then I
|
|
suggest you do so. The 2 files go together.
|
|
|
|
|
|
Looking for Overlays
|
|
--------------------
|
|
it can mean
|
|
4 things.
|
|
|
|
1: The .EXE (though it is mostly .COM) file is just a
|
|
loader for the main file.
|
|
|
|
2: The .EXE file loads in an overlay.
|
|
|
|
3: The CD 13 is encrypted &/or hidden in the .EXE file.
|
|
|
|
4: Your looking at the WRONG file.
|
|
|
|
|
|
I won't discuss case 1 (or at least no here) because so
|
|
many UNP files are devoted to PROLOCK and SOFTGUARD, if you
|
|
can't figure it out with them, your stupid.
|
|
|
|
If you have case 3, use the technique in part I and restart
|
|
from the beginning. And if you have case 4, shoot your self.
|
|
|
|
You know the program uses overlays but don't see and on
|
|
disk? Try looking at the disk with good old Norton's. Any
|
|
hidden files are probably the overlays. These are the ones
|
|
we are after. If you still can't find them, use PC-WATCH
|
|
(this program is a must!!! For all crackists. Traps ALL in-
|
|
terrupts).
|
|
|
|
11
|
|
|
|
Using PC-Watch to Find Overlays
|
|
-------------------------------
|
|
Start up PC-Watch and EXCLUDE everything in the left Col..
|
|
Search the right Col. until you find DOS21 - OpnFile and
|
|
select it.
|
|
|
|
Now run the program to be cracked.
|
|
Play the game until the protection is checked.
|
|
Examine you PCWatch output to see what file was loaded
|
|
right before it.
|
|
This probably is the one holding the check.
|
|
If not, go through all the files.
|
|
|
|
|
|
You Have Found the Overlays
|
|
---------------------------
|
|
Great, now just crack the overlay as if it was a DOS file.
|
|
You don't need to worry about .EXE file, debug can write an
|
|
overlay file. Part I explains the basics of cracking. I
|
|
suggest that you keep a backup copy of the overlay so if you
|
|
mess up, and you will, you can recover quickly. Ah, and you
|
|
I find it useful, before I even start cracking, to analyze
|
|
the protected disk to find and id it's protection. This
|
|
helps in 2 ways. First, it helps you to know what to do in
|
|
order to fake out the protection. Second, it helps you to
|
|
find what the program is looking for.
|
|
|
|
I suggest that you get locksmith if you don't already have
|
|
it. Check your local pirate board for the program. I also
|
|
suggest getting PC-Watch and Norton Utilities 3.1.(Now 4.1)
|
|
All of these program have many uses in the cracking world.
|
|
|
|
END.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
12
|
|
|
|
|
|
|
|
-------------------------------------------------------------
|
|
OK, now let's put some of this information into practice by
|
|
examining a few cracks of some common programs. First we'll
|
|
look at a Crack for Mean-18 Golf by Accolade. Accolade has
|
|
been one of those companies that has a fervent belief in Copy
|
|
Protection.
|
|
-------------------------------------------------------------
|
|
|
|
|
|
|
|
|
|
Title: MEAN-18 UnProtect For CGA/EGA Version
|
|
|
|
This crack works by eliminating the code that tests for known
|
|
bad sectors on the original diskette to see if it is the
|
|
genuine article or an illegal copy. The code begins with an
|
|
INT 13 (CD 13 HEX), a DOS BIOS disk service routine followed
|
|
a few bytes later by another INT 13 instruction. The program
|
|
then checks the returned value for the bit configuration that
|
|
signifies the bad sectors and, if all is as expected, contin-
|
|
ues on with program execution.
|
|
|
|
The code that needs to be patched is in the GOLF.EXE file and
|
|
in the ARCH.EXE file. It is identical in both files and lies
|
|
near the end of each file.
|
|
|
|
In the following steps, you'll locate the start of the test
|
|
code and patch it by replacing it with NOP instructions (HEX
|
|
90). The method described uses the DOS DEBUG utility but
|
|
Norton's Utility (NU) works too.
|
|
|
|
Copy all of the files from the MEAN-18 disk onto a fresh
|
|
floppy using the DOS COPY command and place your original
|
|
diskette out of harm's way.
|
|
|
|
Assuming DEBUG is in the A: drive and the floppy containing
|
|
the files to be unlocked is in the B: drive , proceed as fol-
|
|
lows:
|
|
|
|
First REName the GOLF.EXE file so it has a different
|
|
EXTension other than .EXE.
|
|
|
|
REN GOLF.EXE GOLF.DEB
|
|
|
|
|
|
Next load the file GOLF.DEB into DEBUG and displays the "-"
|
|
DEBUG prompt.
|
|
|
|
A:> DEBUG B:GOLF.EXE
|
|
|
|
13
|
|
Search for the beginning of the code to be patched by typing:
|
|
|
|
|
|
- S CS:100 FFFF CD 13
|
|
|
|
Searches the file for the two byte INT 13 instruction. If
|
|
all goes well, two addresses should appear on the screen.
|
|
|
|
XXXX:019C
|
|
XXXX:01A8
|
|
|
|
XXXX indicates that the numbers preceeding the ":" vary from
|
|
system to system but the numbers following the ":" are the
|
|
same on all systems.
|
|
|
|
The next step is to use the "U" command as indicated to
|
|
un-assemble a few bytes in order to verify your position in
|
|
the file)
|
|
|
|
- U CS:019C
|
|
|
|
(Un-assembles 32 bytes of code. Verify the following se-
|
|
quence of instructions:
|
|
|
|
INT 13
|
|
JB 01E9
|
|
MOV AL,[BX+01FF]
|
|
PUSH AX
|
|
MOV AX,0201
|
|
INT 13
|
|
POP AX
|
|
JB 01E9
|
|
CMP AL,F7
|
|
JNZ 01B5
|
|
|
|
These are the instructions you'll be patching out in the fol-
|
|
lowing step)
|
|
|
|
- A CS:019C
|
|
|
|
This command assembles the new instructions you enter at the
|
|
keyboard into the addresses shown. Beginning at CS:019C, and
|
|
for the next 21 bytes, ending with and including CS:01B0, en-
|
|
ter the no op command "NOP" (90h) followed by a <return> or
|
|
<enter>. Just hit <enter> at address XXXX:01B1 to end the
|
|
assemble command.)
|
|
|
|
XXXX:019C NOP <enter>
|
|
XXXX:019D NOP <enter>
|
|
.
|
|
.
|
|
.
|
|
XXXX:01AE NOP <enter>
|
|
XXXX:01AF NOP <enter>
|
|
|
|
14
|
|
XXXX:01B0 NOP <enter>
|
|
XXXX:01B1 <enter>
|
|
|
|
This just wipes out the section of code containing the INT 13
|
|
check.
|
|
|
|
Now do a HEX dump and verify that bytes 019C through 01B0
|
|
have been set to 90 HEX.
|
|
- D CS:019C
|
|
|
|
If they have, write the patched file to the disk as follows)
|
|
|
|
- W
|
|
|
|
This writes the patched file back to the
|
|
|
|
but
|
|
now, it can be run from any drive, including the hard
|
|
drive)
|
|
|
|
Now just [Q]uit or exit back to DOS. This command can be ex-
|
|
ecuted at any "-" DEBUG prompt if you get lost. No modifica-
|
|
tion will be made to the file on the disk until you issue the
|
|
"W" command.
|
|
|
|
- Q
|
|
|
|
The process is the same for the ARCH.EXE file but because it
|
|
is a different length, the segment address, (XXXX part of the
|
|
13 instruction at address XXXX:019C and the second one at
|
|
XXXX:01A8 as before.
|
|
|
|
You will again be patching 21 bytes and you will start with
|
|
019C and end with 01B0 as before. After doing the HEX dump
|
|
starting at address 019C, you again write the file back to
|
|
|
|
RCS<cr>
|
|
|
|
|
|
16
|
|
Debug will prompt you for the new value of CS with:
|
|
|
|
CS:27FC:
|
|
|
|
You respond by typing the value of DS you saw when you
|
|
dumped the registers the first time. For example, I typed
|
|
"12CE<cr>". The value you type will be different. Debug
|
|
will again respond with the "-" prompt which means we are
|
|
ready to do our search. Type in the following after the "-"
|
|
prompt:
|
|
|
|
S CS:0 FFFF CD 13<cr>
|
|
|
|
The computer should respond with three lines of information
|
|
which are the addresses of the three Interrupt 13 calls built
|
|
into the program. The first four digits are the segment ad-
|
|
dress and will equal to the value of CS you have just set.
|
|
The second four digits following the colon are the offset ad-
|
|
dresses which are of primary interest to us. On my machine
|
|
they came back as follows:
|
|
|
|
12CE:4307
|
|
12CE:431F
|
|
12CE:4335
|
|
|
|
The segment addresses will be identical and the three off-
|
|
set addresses should all be relatively close together. Now
|
|
look at the first offset address. (As you can see, mine was
|
|
"4307".) Write it down. Now we do a bit of Unassembly.
|
|
|
|
Type "U4307<cr>" which is the letter "U", followed immedi-
|
|
ately (with no blank spaces) by whatever your first offset
|
|
address turned out to be, followed by a carriage return. If
|
|
you are not familiar with unassembled machine code, it will
|
|
look like lines of gibberish as follows:
|
|
|
|
12CE:4307 CD13 INT 13
|
|
12CE:4309 4F DEC DI
|
|
12CE:430A 744C JZ 4358
|
|
.
|
|
.
|
|
12CE:431F CD13 INT 13
|
|
12CE:4321 4F DEC DI
|
|
.
|
|
.
|
|
12CE:4324 BF0400 MOV DI,0004
|
|
12CE:4326 B80102 MOV AX,0201
|
|
|
|
In my computer, Unassemble will automatically output 16
|
|
lines of code to the screen. Yours may differ. Note, in the
|
|
(INT 13) correspond to the first two addresses we found in
|
|
our search. Now we continue the unassemble, and here comes
|
|
|
|
17
|
|
another tricky part. Just type in "U<cr>" after the "-"
|
|
prompt.
|
|
|
|
You'll get sixteen more lines of code with the third Inter-
|
|
rupt 13 on a line which begins with the address (CS):4335 if
|
|
you have the same version of Submarine as I do. It's not
|
|
terribly important to this exercise, but it will at
|
|
least show you that things are proceeding okay. Now type in
|
|
"U<cr>" again after the prompt. You are now looking for
|
|
three key lines of code. On my program they appear as fol-
|
|
lows:
|
|
|
|
12CE:4335 07 POP ES
|
|
12CE:4356 5D POP BP
|
|
12CE:4357 CB RETF
|
|
|
|
The true key is the instruction "POP ES". This instruction
|
|
begins the normal return sequence after the program has ex-
|
|
ecuted its Interrupt 13 instructions and accompanying checks.
|
|
If Debug on your machine prints fewer than 16 lines of code
|
|
at a shot, you may have to type in "U" more than twice at the
|
|
"-" to find these instructions. (If you haven't found any of
|
|
this stuff, either get help on the use of Debug or go back to
|
|
A4307<cr>
|
|
|
|
This first bit tells Debug that new Assembler code will be
|
|
inserted at the address of the first Interrupt 13. If your
|
|
first Interrupt 13 is at an address other that "4307", use
|
|
the correct address, not mine. The computer will prompt you
|
|
|
|
with the address:
|
|
|
|
12CE:4307
|
|
|
|
After which you will immediately type:
|
|
|
|
JMP 4354<cr>
|
|
|
|
This instruction jumps the program immediately to the normal
|
|
return code instructions. Again, at the risk of being redun-
|
|
dant, if your "POP ES" instruction is at a different address,
|
|
use that address, not "4354"!
|
|
|
|
The computer will prompt you with the address of the next in-
|
|
|
|
18
|
|
struction if all went well. MAKE SURE you just hit the
|
|
carriage return at this point. Debug will then return the
|
|
familiar "-" prompt.
|
|
|
|
Now it's time to examine your handiwork. Let's do the
|
|
unassemble again starting at the address of what had been the
|
|
first Interrupt 13 instruction, but which is now the Jump in-
|
|
struction. Type in "U4307<cr>" or "U" followed by the appro-
|
|
priate address and a carriage return. The first line begin-
|
|
ning with the address should appear as follows:
|
|
|
|
12CE:4307 EB4B JMP 4354
|
|
|
|
The key here is the four bytes immediately following the ad-
|
|
dress. In my example they are "EB4B". Yours may not be.
|
|
But, they are VERY IMPORTANT because they represent the ac-
|
|
tual machine code which is the Jump instruction. WRITE THESE
|
|
FOUR BYTES DOWN AND MAKE SURE THEY ARE CORRECT.
|
|
|
|
Now if you want to have some fun before we go on, reset
|
|
register CS to its original value by first typing "RCS<cr>"
|
|
and execute your program. If you have followed my instruc-
|
|
tions, it should run fine. Get help if it doesn't. Now, you
|
|
should be all set. You can load onto your hard disk, if you
|
|
haven't already. You can run it from a RAM disk using a BAT
|
|
file if you really want it to hum. Or, if you have the fa-
|
|
cilities, you can copy it from 5-1/4" floppy to 3-1/2" dis-
|
|
kette and run it on machines which accept that medium if you
|
|
upgrade to a new computer.
|
|
|
|
END.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
20
|
|
Now let's take a look at a newer crack on the program, Space
|
|
Station Oblivion by Eypx. At a first [S]earch with Debug and
|
|
Norton's Utility no CD 13's could be found, and yet it was
|
|
using them... So a different approach had to be taken...
|
|
-------------------------------------------------------------
|
|
|
|
|
|
By: PTL
|
|
Title: Space Station Oblivion Crack
|
|
|
|
|
|
First of all, you must determine which file the INT 13's are
|
|
in, in this case it had to be the file OBLIVION.EXE since it
|
|
was the main program and probably contained the INT 13's. So
|
|
then rename it to a different EXTension and load it into De-
|
|
bug.
|
|
|
|
Then do a [S]earch for INT 13's.
|
|
|
|
-S 100 FFFF CD 13
|
|
|
|
Which will promptly turned up nothing. Hmmm...
|
|
|
|
Next you might decide that, maybe, the code was modifying it-
|
|
self. So quit from Debug and load up PC-Watch, include all
|
|
the INT 13 Calls. For those of you not familiar with
|
|
PC-Watch, it is a memory resident program that can be set to
|
|
look for any type of BIOS call. When that call is made
|
|
PC-Watch prints to the screen the contents of all the regis-
|
|
ters and the current memory location that the call was made
|
|
from.
|
|
|
|
After PC-Watch is initialized, then run the OBLIVION.EXE file
|
|
from the hard disk, leaving the floppy drive door open, and
|
|
sure enough, when the red light comes on in the diskette
|
|
drive, PC-Watch will report the address's of some INT 13
|
|
calls. Which you should then write down.
|
|
|
|
From there, quit the game, reboot, (To dump PC-Watch from
|
|
memory) and load the OBLIVION.EXE into Debug and issue a [G]o
|
|
command with a breakpoint. What address should you use for a
|
|
breakpoint? You guessed it, the same address PC-Watch gives
|
|
you.
|
|
Well, it locked up did'nt it? Which is quite common in this
|
|
line of work so don't let that discourage you. So next re-
|
|
loaded it into debug and this time [U]nassemble the address
|
|
that you got from PC-Watch. But instead of finding the INT
|
|
13's you'll find harmless INT 21's.
|
|
|
|
Hmm... could it be that the program was converting the CD
|
|
21's to CD 13's during the run? Well, to test the idea as-
|
|
semble an INT 20 (Program Terminate) right after the first
|
|
|
|
21
|
|
INT 21. Then I run the program, and yes immediately after the
|
|
red light comes on the drive, the program will terminate nor-
|
|
mally.
|
|
|
|
Then [U]nassemble that same area of memory, and low and be-
|
|
hold, some of the INT 21's have magically turned into INT
|
|
13's. How clever...
|
|
|
|
So, then it is just a matter of locating the address of the
|
|
routine that it jumped (JMP) to if the correct disk was found
|
|
in drive A:. Once you have that address, just go to the
|
|
start of all this nonsense and [A]ssemble a JMP XXXX command.
|
|
Where XXXX was the address to jump to if the original disk
|
|
was in drive A:.
|
|
|
|
Then just [W]rite the file back out to the disk and [Q]uit
|
|
debug, and then REName the file back to OBLIVION.EXE
|
|
afterwhich it should work fine.
|
|
|
|
|
|
END.
|
|
|
|
22
|
|
|
|
-------------------------------------------------------------
|
|
A new fad has recently started up with software vendors, it
|
|
involves the use of "Passwords" which are either stored in
|
|
the documentation or are actually the documentation itself.
|
|
Then when you reach a certain part of the program (Usually
|
|
the beginning) the program will ask for the password and you
|
|
have to look it up in the Docs before being allowed to con-
|
|
tinue. If the wrong password is entered, it will usually
|
|
drop you to DOS or take you to a Demo version of the program.
|
|
|
|
This new form of copy protection is very annoying, but can
|
|
usually be cracked without too much effort, and the files
|
|
and the disk are usually in the standard DOS format. So now
|
|
we'll take a look at cracking the Doc check questions.
|
|
|
|
First of all we'll crack the startup questions in F-15
|
|
Strike Eagle by MicroProse.
|
|
-------------------------------------------------------------
|
|
|
|
|
|
By: JP ASP
|
|
Title: F-15 Unprotect
|
|
|
|
|
|
|
|
Make a copy of the original disk using the DOS DISKCOPY pro-
|
|
gram.
|
|
|
|
>DISKCOPY A: B:
|
|
|
|
Then insert the copy disk in the A drive and invoke DOS DE-
|
|
BUG.
|
|
|
|
>DEBUG
|
|
|
|
Now we'll [F]ill an area of memory with nothing (00).
|
|
|
|
-F CS:100 L FEFF 0
|
|
|
|
Next we will [L]oad into address CS:0100 the data that is on
|
|
the A: disk (0) from sector 0 to sector 80.
|
|
|
|
-l cs:100 0 0 80
|
|
|
|
Now lets [S]earch the data we loaded for the area where the
|
|
copy protection routine is.
|
|
|
|
-s cs:100 l feff FA EB FD
|
|
|
|
Then for each of the occurences listed, use the address DEBUG
|
|
returned in the [E]nter command below.
|
|
|
|
23
|
|
|
|
-e xxxx 90 90 90
|
|
|
|
-------------------------------------------------------------
|
|
Here's the part we are interested in, it's where you change
|
|
all the autorization codes to a space. Notice how you can
|
|
use the [S]earch command to look for ASCII text.
|
|
-------------------------------------------------------------
|
|
|
|
-s cs:100 l feff "CHIP"
|
|
|
|
Then for each occurance of "CHIP" use the address DEBUG re-
|
|
turned in the [F]ill command below.
|
|
|
|
-F XXXX L F 20
|
|
|
|
Write out the modified data
|
|
|
|
-W CS:100 1 0 80
|
|
|
|
Quit DEBUG
|
|
|
|
-Q
|
|
|
|
|
|
You should now be able to DISKCOPY and boot from all copies
|
|
also just press the space bar when it ask for ANY authority
|
|
code and then press "ENTER". Now there is no need to remember
|
|
(or look up) any codes that are so finely tucked away in the
|
|
manual!
|
|
|
|
END.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
24
|
|
-------------------------------------------------------------
|
|
Here is a similar method that was used break the passwords in
|
|
the program BATTLEHAWKS 1945 by Lucasfilms. However Norton
|
|
Utilities is used to search for the passwords and change
|
|
them.
|
|
-------------------------------------------------------------
|
|
|
|
By: PTL
|
|
Title: BATTLEHAWKS-1945 Doc Check Crack
|
|
|
|
|
|
In keeping in line with their previous programs, Lucasfilms
|
|
has released yet another program which uses Doc Checks for
|
|
its means of copy protection, Battlehawks 1942.
|
|
|
|
When you run this program, it first goes through a series of
|
|
graphic displays, then it goes through a series of questions,
|
|
asking what type of mission you want to fly, such as Train-
|
|
ing, Active Duty, or which side of the war you want to be on.
|
|
|
|
Then right before the simulation begins, it shows you a pic-
|
|
ture of a Japanese Zero and ask you for a password which you
|
|
|
|
are then supposed to get by looking up the picture of the
|
|
Zero in the User Manual and typing the corresponding password
|
|
in. After which it enters the simulation, in the event you
|
|
enter the wrong password, it puts you into a training mis-
|
|
sion.
|
|
|
|
Removing the Doc Check in a program like this is usually
|
|
pretty easy. The ideal way to do it is to remove the Doc
|
|
Check routine itself, but if you don't have all day to debug
|
|
and trace around the code this might not be the best way.
|
|
For instance if you only have your lunch hour to work on it
|
|
(Like I did), then you need to use the standard Q.D.C.R.S.
|
|
(Quick Doc Check Removal System).
|
|
|
|
How do you do a QDCRS? Well first of all, play around with
|
|
the program, find out what it will and will NOT accept as a
|
|
password. Most programs will accept anything, but a few
|
|
(Like Battlehawks) will only accept Alpha characters.
|
|
|
|
Once you've learned what it likes, make an educated guess as
|
|
to what program the Doc Check routine is in. Then load that
|
|
program into Norton's Utility (NU).
|
|
|
|
At this point, take a look at the passwords, and write down
|
|
the most unusual one that you can find (I'll explain later).
|
|
Now type that password in as the search string, and let NU
|
|
search through the file until it finds the password. Now a
|
|
couple of things can happen.
|
|
|
|
1. It only finds one occurrence
|
|
2. It finds more than one occurrence
|
|
3. It doesn't find any occurrence
|
|
|
|
In the event of case 2 then YOU have to determine where the
|
|
passwords are stored, you can do this by opening your eyes
|
|
and looking.
|
|
|
|
In the event of case 3, go to the kitchen and start a pot of
|
|
coffee, then tell you wife to go to bed without you, because
|
|
you have a "Special Project" that you have to finish tonight.
|
|
And by the way, Good Luck. You'll need it.
|
|
|
|
Hopefully case 1 will occur, now you have to take a look at
|
|
the data and ask yourself 2 questions:
|
|
|
|
1. Are all the passwords the same length?
|
|
2. Is there a set number of spaces between each pass-
|
|
word?
|
|
3. Does the next password always start a certain number
|
|
of characters from the first character of the previ-
|
|
ous password?
|
|
|
|
If you can answer yes to any of the above questions, you in
|
|
luck. All you have to do is change the passwords to spaces
|
|
|
|
(If the program allows that, Battlehawks doesn't) or change
|
|
them to you favorite character. The letter X works good, it's
|
|
easy to type and easy to remember.
|
|
|
|
If you can't answer yes to any of the questions then you ei-
|
|
ther need to bypass the Doc Check routine itself or you need
|
|
to be adventurous and experiment. Battlehawks will not follow
|
|
any of the above patterns, and your quickly running out of
|
|
time, so you'll have to try something, fast...
|
|
|
|
So just wiped out all of the data area with X's, all the
|
|
passwords and associated "garbage" between them. Then saved
|
|
the changes and drop out of NU and into BH. Then when it ask
|
|
for the password, just filed the area with X's. Next thing
|
|
you know, you'll be escorting a bombing run on a Japanese
|
|
carrier.
|
|
|
|
So, this one turned out to be fairly simple. Where you may
|
|
run into trouble is on Doc Checks that use a graphic system,
|
|
such as Gunship by MicroProse. When it comes to this type of
|
|
Doc Check, you almost have to bypass the routine itself. And
|
|
again, a good way to do this is with setting break points and
|
|
using the trace option in Debug.
|
|
|
|
END.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
25
|
|
|
|
-------------------------------------------------------------
|
|
That was the easy version Doc Check crack, however there a
|
|
"Better" way to crack Doc Checks, is to bypass the routine
|
|
completely so the user can just press enter and not worry
|
|
about spaces. Let's take a lot at this method by looking at
|
|
a crack for the program, Yeager's Advanced Flight Trainer, by
|
|
Electronic Arts.
|
|
-------------------------------------------------------------
|
|
|
|
|
|
By: PTL
|
|
Title: Yeager's Advanced Flight Trainer
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
|
-------------------------------------------------------------
|
|
Now we'll take a look at cracking self booters. A few compa-
|
|
nies have found this to be the best copy protection scheme
|
|
for them, one of which is DataEast, makers of Ikari Warriors,
|
|
Victory Road, Lock-On, Karnov, etc... This posses a special
|
|
problem to the Amateur Cracker, since they seldom use stan-
|
|
dard DOS formats. So let's jump right in!
|
|
-------------------------------------------------------------
|
|
|
|
|
|
This is the area where a "Higher than Normal" knowledge of
|
|
Assembly Language and DOS Diskette structures, so first of
|
|
all, the Basic's.
|
|
|
|
|
|
The Disk's Physical Structure
|
|
|
|
Data is recorded on a disk in a series of concentric circles,
|
|
called Tracks. Each track if further divided into segments,
|
|
called Sectors. The standard double-density drives can
|
|
record 40 tracks of data, while the new quad-density drives
|
|
can record 80 tracks.
|
|
|
|
However, the location, size, and number of the sectors within
|
|
a track are under software control. This is why the PC's
|
|
diskettes are known as soft-sectored. The characteristics of
|
|
a diskette's sectors (Their size, and the number per track)
|
|
are set when each track is formatted. Disk Formatting can be
|
|
done either by the operating system or by the ROM-BIOS format
|
|
service. A lot of self booters and almost all forms of copy
|
|
protection create unusual formats via the ROM-BIOS diskette
|
|
services.
|
|
|
|
The 5 1/4-inch diskettes supported by the standard PC BIOS
|
|
may have sectors that are 128,256,512, or 1,024 bytes in
|
|
size. DOS, from versions 1.00 through 4.01 has consistently
|
|
used sectors of 512 bytes, and it is quite possible that this
|
|
will continue.
|
|
|
|
Here is a table displaying 6 of the most common disk formats:
|
|
_____________________________________________________________
|
|
|
|
Type Sides Sectors Tracks Size(bytes)
|
|
_____________________________________________________________
|
|
|
|
S-8 1 8 40 160K
|
|
D-8 2 8 40 320K
|
|
S-9 1 9 40 180K
|
|
D-9 2 9 40 360K
|
|
QD-9 2 9 80 720K
|
|
QD-15 2 15 80 1,200K
|
|
_____________________________________________________________
|
|
|
|
|
|
|
|
S - Single Density
|
|
D - Double Density
|
|
QD - Quad Density
|
|
|
|
Of all these basic formats, only two are in widespread use:
|
|
S-8 and D-9. The newer Quad Density formats are for the 3
|
|
1/2" and 5 1/4" high density diskettes.
|
|
|
|
|
|
* SIDES.PER.DISK
|
|
|
|
And here are the formulas for converting sequential sector
|
|
numbers to three-dimensional coordinates:
|
|
|
|
BIOS.SECTOR = 1 + DOS.SECTOR.NUMBER MOD SECTORS.PER.SIDE
|
|
BIOS.SIDE = (DOS.SECTOR.NUMBER f SECTORS.PER.SIDE)
|
|
MOD SIDE.PER.DISK
|
|
BIOS.TRACK = DOS.SECTOR.NUMBER f (SECTORS.PER.SIDE
|
|
* SIDES.PER.DISK)
|
|
|
|
(Note: For double-sided nine-sector diskettes, the PC's
|
|
most common disk format, the value of SECTORS.PER.SIDE
|
|
is 9 and the value of SIDES.PER.DISK is 2. Also note
|
|
that sides and tracks are numbered differently in the
|
|
ROM-BIOS numbering system: The sides and tracks are num-
|
|
Diskette Space Allocation
|
|
|
|
The formatting process divides the sectors on a disk into
|
|
four sections, for four different uses. The sections, in the
|
|
order they are stored, are the boot record, the file alloca-
|
|
tion table (FAT), the directory, and the data space. The
|
|
size of each section varies between formats, but the struc-
|
|
ture and the order of the sections don't vary.
|
|
The Boot Record:
|
|
|
|
This section is always a single sector located at sector
|
|
1 of track 0, side 0. The boot record contains, among other
|
|
things, a short program to start the process of loading the
|
|
operating system on it. All diskettes have the boot record
|
|
on them even if they don't have the operating system. Asisde
|
|
from the start-up program, the exact contents of the boot
|
|
record vary from format to format.
|
|
|
|
The File Allocation Table:
|
|
|
|
The FAT follows the boot record, usually starting at
|
|
sector 2 of track 0, side 0. The FAT contains the official
|
|
record of the disk's format and maps out the location of the
|
|
sectors used by the disk files. DOS uses the FAT to keep a
|
|
record of the data-space usage. Each entry in the table con-
|
|
tains a specific code to indicate what space is being used,
|
|
what space is available, and what space is unusable (Due to
|
|
defects on the disk).
|
|
|
|
The File Directory:
|
|
|
|
The file directory is the next item on the disk. It is
|
|
|
|
-------------------------------------------------------------
|
|
Here is a simple routine to just make a backup copy of the
|
|
Flight Simulator Version 1.0 by Microsoft. I know the latest
|
|
version is 3.x but this version will serve the purpose of
|
|
demonstrating how to access the data and program files of a
|
|
selfbooter.
|
|
-------------------------------------------------------------
|
|
|
|
|
|
By: PTL
|
|
Title: Microsoft Flight Simulator 1.00 Unprotect
|
|
|
|
|
|
This procedure will NOT convert the Flight Simulator disk to
|
|
files that can be loaded on a hard drive. But... it will
|
|
read off the data from the original and put it onto another
|
|
floppy. And this should give you an idea of how to read data
|
|
directly from a disk and write it back out to another disk.
|
|
|
|
First of all take UNFORMATTED disk and place it in drive B:.
|
|
This will be the target disk.
|
|
|
|
Now place your DOS disk (which has Debug) into drive A:, or
|
|
just load Debug off you hard disk.
|
|
|
|
A>DEBUG
|
|
|
|
Then we are going to enter (manually) a little program to
|
|
load the FS files off the disk.
|
|
|
|
-E CS:0000 B9 01 00 BA 01 00 BB 00
|
|
01 0E 07 06 1F 88 E8 53
|
|
hexadecimal which is location 17,415 decimal in the
|
|
|
|
|
|
>--------=====END=====--------<
|
|
|
|
|
|
|
|
***************************************************
|
|
*** Pirate Magazine Issue IV / File 7 of 10 ***
|
|
*** Good Boards and BBS Ethics ***
|
|
***************************************************
|
|
|
|
|
|
What makes a BBS a *GOOD BOARD*? Here's a discussion logged from a good BBS. We
|
|
think the *USERS* make a good BBS, and we like Steve King's "BBS ETHICS," so
|
|
reprint it here. It appears on most TELEGARD systems, and in case you haven't
|
|
read it, you should.
|
|
|
|
--------------------------------------------------------
|
|
|
|
Date: 6:19 pm Wed Dec 27, 1989 Public 17/53
|
|
From: Sparkplug General Messages
|
|
To: Potato Man
|
|
Title: Good BBS
|
|
|
|
A good BBS is not only having all files online (as the phringe used to do) but
|
|
also! having a good user base that is helpfull and not worring about petty
|
|
problems. There aren't many real good boards among the many boards available
|
|
here locally, but a board that comes to mind that you should try to emulate and
|
|
exceed is winplace's old board wasteland I, This is just my opinion and I hope
|
|
that this board becomes as good as you hope it to be!
|
|
Sparky
|
|
|
|
|
|
Date: 1:33 pm Wed Dec 27, 1989 Public 15/53
|
|
From: Potato Man General Messages
|
|
Title: What makes a BBS a "GOOD" BBS?!
|
|
|
|
Well I had this chat talk with a user and he referred to few BBSs as the "GOOD"
|
|
BBSs and I stopped him to ask him why are those the good BBSs and if there's
|
|
anything the matter with this one so the answer to that was that I should'nt
|
|
even "DARE" to compare my BBS with those "GOOD" ones! The question is WHY?
|
|
What am I missing in this BBS that the others don't or what the A or B bbs is
|
|
missing (not mine in particular). So that brings up another very INTERESTING
|
|
topic that I expect to hear some views on...WHAT MAKES A BBS TICK???
|
|
Is it the users?
|
|
Is it the file section?
|
|
Is it the Message section?
|
|
Is it the mass storage?
|
|
etc etc....
|
|
If you want my opinion, I think that the users make a BBS tick and thats the
|
|
bottom line, a BBS with no users or dorky users or users that are just there
|
|
and they just exist without offering anything is just NOT a BBS... This guy
|
|
also said that the BIG BBSs (the ones with mass storage, and lots of phone
|
|
lines and stuff!) are BAD! he says that "you rich guys! (without even knowing
|
|
me or my W2) think you can put 300 or 600 megs online and have a BBS" well I
|
|
personally think that a BBS with most of the files being ONLINE and not OFFLINE
|
|
has a TREMENDOUS advantage over the BBS that has every file in the world but
|
|
all of them are OFFLINE!... What good would it do me if I need a file right now
|
|
and I call my supporting BBS to take it down but due to the lack of space the
|
|
sysop has it OFFLINE and then I kinda have to beg for the file to be online and
|
|
call back till he or she decides to put it up for me (not necessarily the case
|
|
always!). I was also reffered to as "a snobish guy"! (again without knowing
|
|
me)..Now please really tell me if (and this is your best chance to get back at
|
|
me!) I seemed snobish or not willing to help any and all of you outthere... I
|
|
wanna make this BBS work and try to make it (if not the BEST in the MIDWEST) at
|
|
least one of the best, I want it to have a unique look I want it to have
|
|
respect for its users and I want its users to have respect for it..
|
|
|
|
Please FEEL FREE to respond to this message and I do expect you to FREELY
|
|
express your opinions and let us know WHAT MAKES A BBS TICK?!
|
|
|
|
|
|
|
|
Date: 12:58 am Sat Dec 30, 1989 Public 22/54
|
|
From: Gil Fish General Messages
|
|
Title: Good BBS's
|
|
|
|
Well, I feel what makes a good BBS is a friendly attitude between the users and
|
|
the sysop('s). I just logged off the Melting Point and felt verbaly abused.
|
|
That board bombards you with demands that you participate in every aspect of
|
|
his bbs. This is not an attack on him, as I'm sure he isnt attacking me
|
|
personally, but I dont like to have demands thrown at me in mass e-mail. And
|
|
this post or die attitude many boards are getting is putting me off too. I dont
|
|
know, mabey the majority of us pirates are a bunch of assholes that need to be
|
|
screamed at, but I like to think not.
|
|
|
|
|
|
Date: 5:26 pm Sat Dec 30, 1989 Public 24/54
|
|
From: Rocky Roccoco General Messages
|
|
To: Gil Fish
|
|
Title: Melting Point
|
|
|
|
i think people should contribute to a board,there are those of you who log on a
|
|
bbs,look through the board,then log off!.....thats just wasting the time of the
|
|
sysop (trying to provide a quality bbs not a library book) and wasting the time
|
|
of other user that are probably autodialing like mad to get on and contribute.
|
|
i have a few users that do it and i get fed up with it. ....also the sysop go's
|
|
out and spends MULTI THOUSANDS OF DOLLARS makeing a bbs buying the equipment
|
|
and so forth.....i think the sysop has a right to know who's using his bbs and
|
|
what the user has to offer him in exhchange for the privelige of haveing time
|
|
on the system......so all you out there that read this and dont abide by "the
|
|
way it is" shouldnt bitch about it.....just dont call anymore.....its not good
|
|
to lose people on a board but if u look at it this way.......there are alot
|
|
more people out there to take your user number! replies are always encouraged
|
|
in the constant effort of keeping users happy with the systems they
|
|
call........SO LETS SEE SOME POSTS!!!!!!
|
|
|
|
|
|
Ethics for BBS users - By Steve King
|
|
|
|
The following are a few points of general BBS etiquette. If you wish to
|
|
maintain your welcome on whatever system you happen to call, it would be to
|
|
your advantage to observe these few rules. (Sysops - feel free to download
|
|
this & display it on your BBS)
|
|
|
|
1. Don't habitually hang up on a system. Every Sysop is aware that
|
|
accidental disconnections happen once in a while but we do tend to get
|
|
annoyed with people who hang up every single time they call because they are
|
|
either too lazy to terminate properly or they labor under the mistaken
|
|
assumption that the 10 seconds they save online is going to significantly
|
|
alter their phone bill. "Call Waiting" is not an acceptable excuse for
|
|
long. If you have it and intend to use the line to call BBS systems, you
|
|
should either have it disconnected or find some other way to circumvent
|
|
it.
|
|
|
|
2. Don't do dumb things like leave yourself a message that says "Just
|
|
testing to see if this thing works". Where do you think all those other
|
|
messages came from if it didn't work? Also, don't leave whiney messages that
|
|
say "Please leave me a message". If ever there was a person to ignore, it's
|
|
the one who begs someone to leave him a message. If you want to get
|
|
messages, start by reading the ones that are already online and getting
|
|
involved in the conversations that exist.
|
|
|
|
3. Don't use the local equivalent of a chat command unless you really have
|
|
some clear cut notion of what you want to say and why. Almost any Sysop is
|
|
more than happy to answer questions or offer help concerning his system.
|
|
Unfortunately, because about 85% of the people who call want to chat and
|
|
about 99% of those people have absolutely nothing to say besides "How old are
|
|
you?" or something equally irrelevent, fewer Sysops even bother
|
|
answering their pagers every day.
|
|
|
|
4. When you are offered a place to leave comments when exiting a system,
|
|
don't try to use this area to ask the Sysop questions. It is very rude to
|
|
the other callers to expect the Sysop to carry on a half visible
|
|
conversation with someone. If you have a question or statement to make and
|
|
expect the Sysop to respond to it, it should always be made in the section
|
|
where all the other messages are kept. This allows the Sysop to help many
|
|
people with the same problem with the least amount of effort on his part.
|
|
|
|
5. Before you log on with your favorite psuedonym, make sure that handles
|
|
are allowed. Most Sysops don't want people using handles on the system.
|
|
There is not enough room for them, they get silly games of one-upmanship
|
|
started, it is much nicer to deal with a person on a personal basis, and
|
|
last but not least, everyone should be willing to take full responsibility
|
|
for his actions or comments instead of slinging mud from behind a phoney
|
|
name.
|
|
|
|
6. Take the time to log on properly. There is no such place as RIV, HB, ANA
|
|
or any of a thousand other abbreviations people use instead of their proper
|
|
city. You may think that everyone knows what RIV is supposed to mean, but
|
|
every BBS has people calling from all around the country and I assure you
|
|
that someone from Podunk, Iowa has no idea what you're talking about.
|
|
|
|
7. Don't go out of your way to make rude observations like "Gee, this system
|
|
is slow". Every BBS is a tradeoff of features. You can generally assume
|
|
that if someone is running a particular brand of software, that he is
|
|
either happy with it or he'll decide to find another system he likes
|
|
better. It does nobody any good when you make comments about something that
|
|
you perceive to be a flaw when it is running the way the Sysop wants it to.
|
|
Constructive criticism is somewhat more welcome. If you have an alternative
|
|
method that seems to make good sense then run it up the flagpole.
|
|
|
|
8. When leaving messages, stop and ask yourself whether it is necessary to
|
|
make it private. Unless there is some particular reason that everyone
|
|
shouldn't know what you're saying, don't make it private. We don't call
|
|
them PUBLIC bulletin boards for nothing, folks. It's very irritating to other
|
|
callers when there are huge blank spots in the messages that they can't read
|
|
and it stifles interaction between callers.
|
|
|
|
9. If your favorite BBS has a time limit, observe it. If it doesn't, set
|
|
a limit for yourself and abide by it instead. Don't tie up a system until it
|
|
finally kicks you off and then call back with another name. This same rule
|
|
applies to downloading or playing games. Only one person at a time can be
|
|
logged on to a BBS and it isn't fair to everyone else if you overstay
|
|
your welcome. Remember, a BBS is best when it can be left wide open. If you
|
|
try and cheat the rules you just hurt everybody by forcing the Sysop to adopt
|
|
more strigent policies. I can't count the number of systems that are now
|
|
locked tighter than a drum because of people who cheat and abuse.
|
|
|
|
10. Don't call a BBS just to look at the list of other BBS numbers.
|
|
Most especially don't call a system as a new user and run right to the other
|
|
numbers list. There is probably very little that's more annoying to any
|
|
Sysop than to have his board completely passed over by you on your way to
|
|
another board.
|
|
|
|
11. Have the common courtesy to pay attention to what passes in front of
|
|
your face. When a BBS displays your name and asks "Is this you?", don't say
|
|
yes when you can see perfectly well that it is mispelled. Also, don't start
|
|
asking questions about simple operation of a system until you have
|
|
thouroghly read all of the instructions that are available to you. I assure
|
|
you that it isn't any fun to answer a question for the thousandth time when
|
|
the answer is prominently displayed in the system bulletins or instructions.
|
|
Use some common sense when you ask your questions. The person who said
|
|
"There's no such thing as a stupid question" obviously never operated a BBS.
|
|
|
|
12. If by some chance you should encounter an error while you are online
|
|
(Heaven forbid!), ALWAYS take the time to leave the Sysop a message
|
|
describing the circumstances. Don't just say "There was an error". That is
|
|
not helpful in the least. Chances are that he knows there was an error. What
|
|
he needs to know is what you were doing when the error occurred so that he
|
|
can have some chance of finding and correcting it. If the error happened
|
|
after you input something, tell him what it was. Remember that a BBS can't
|
|
improve unless you're willing to help.
|
|
|
|
13. Don't be personally abusive. It doesn't matter whether you like a Sysop
|
|
or think he's a jerk. The fact remains that he has a large investment in
|
|
making his computer available, usually out of the goodness of his heart. If
|
|
you don't like a Sysop or his system, just remember that you can change the
|
|
channel any time you want. Calling a Sysop names or making uninformed
|
|
comments about his lifestyle only shows you for the child you really are.
|
|
|
|
14. Keep firmly in mind that you are a guest on any BBS you happen to
|
|
call. Don't think of logging on as one of your basic human rights. Every
|
|
person that has ever put a computer system online for the use of other people
|
|
has spent a lot of time and money to do so. While he doesn't expect
|
|
nonstop pats on the back, it seems reasonable that he should at least be
|
|
able to expect fair treatment from his callers. This includes following any
|
|
of the rules for system use he has laid out without grumping about it.
|
|
Every Sysop has his own idea of how he wants his system to be run. It is
|
|
really none of your business why he wants to run it the way he does. Your
|
|
business is to either abide by what he says, or call some other BBS where
|
|
you feel that you can obey the rules.
|
|
|
|
Steve King is Sysop of Commnet-80 Riverside (714 359-3189) as well as the
|
|
author of the Commnet-80 Bulletin Board System
|
|
|
|
***************
|
|
|
|
We've sen a lot of boards with great potential that don't live up to their
|
|
promise because of sysop laziness. So, here's what the contributors to PIRATE
|
|
see as a good board:
|
|
|
|
1. The files are well organized into sections or topics so you don't have to
|
|
hunt for everything. TAKE NOTE SYSOPS!! You shouldn't have to search all files
|
|
to find the telecom program you're looking for.
|
|
|
|
2. There is a wildcard function so files can be found between directories and
|
|
uploaders can quickly check for duplicates by typing a "S" or "F" and then, if
|
|
looking for a program called first choice, the keyword "CHOI*.*" We especially
|
|
like TELEGARD.
|
|
|
|
3. A good board should support 9600 or higher.
|
|
|
|
4. Users should not be allowed in at 300, and even 1200 should be discouraged.
|
|
|
|
5. Programs *MUST BE* complete, properly labeled (to include version), and
|
|
sorted in some coherent fashion.
|
|
|
|
6. The users should not be lamerz who upload junk for upload credits and users
|
|
should participate regularly in message sections. Most users on good boards
|
|
call long distance and can't afford to hang out on message bases for too long.
|
|
The way around this is to capture message logs and respond after logging up by
|
|
tying out the responses and then uploading the ascii text as a message
|
|
response the next time logging on.
|
|
|
|
6. Sysops *MUST* be friendly, knowledgeable, and willing to put the files in
|
|
order, change descriptions, and weed out good/bad users. Sysops should also
|
|
be patient and help nurture novices.
|
|
|
|
7. Batch up/down loading should be available, and so should bimodem.
|
|
|
|
>--------=====END=====--------<
|
|
|
|
|
|
|
|
***************************************************
|
|
*** Pirate Magazine Issue IV / File 8 of 10 ***
|
|
*** BBS Symbols ***
|
|
***************************************************
|
|
|
|
|
|
Good users are informed users, and informed users know the symbols that are
|
|
used in messages.
|
|
The following was sent via BITNET by Ruth Hanschka (RHANSCHK@HARTFORD)
|
|
|
|
"THE IMFAMOUS SYMBOL LIST" {With Additions}
|
|
|
|
:-) humorous, joking
|
|
:-( sad, this is no joke even though it looks like one
|
|
:-') tongue in cheek
|
|
:-0 shout
|
|
;-) say no more, nudge nudge
|
|
=:-0 scares me too
|
|
:-! foot in mouth
|
|
:-$ put your money where your mouth is
|
|
0:-) don't blame me, I'm innocent
|
|
%-/ don't blame me, I'm hung over
|
|
<:-) don't blame me, I'm a dunce
|
|
C:-) don't blame me, I'm an egghead
|
|
[:-|] sent by a robot
|
|
:-)8 sent by a gentleman
|
|
8:-) sent by a little girl
|
|
(8-) sent by an owl
|
|
(:\/ sent by a duck
|
|
:-)=== sent by a giraffe
|
|
(-:|:-) sent by siamese twins
|
|
d:-) I like to play baseball
|
|
q:-) I am a baseball catcher
|
|
:-| I play the harmonica
|
|
:-8 I just ate a pickle
|
|
|
|
"In printed communications (in this case bulletin boards), it is tough
|
|
to get the idea across that you are being sarcastic etc. Scott Fahlman, with
|
|
the help of other participants on FIDONET, might just have the answer..." This
|
|
appears at the top of the original. There are probably more of them by this
|
|
time, but I do not have them. The original notice asks FIDONET contributors
|
|
to send more in. My copy of this came from a photocopy of a printout in the
|
|
University of Hartford Computer Resource Library, so blame them :-') not me.
|
|
|
|
And now the additions. These came from a VAX discussion line.
|
|
these really were [:-|].
|
|
|
|
:-) joking or sarcastic face
|
|
:-} fiendish grin
|
|
;-) wink
|
|
:-( sad or angry face
|
|
|-( late night
|
|
|
|
|
|
>--------=====END=====--------<
|
|
|
|
|
|
|
|
***************************************************
|
|
*** Pirate Magazine Issue IV / File 9 of 10 ***
|
|
*** Gene and Roger at the BBS ***
|
|
***************************************************
|
|
|
|
|
|
----------
|
|
REVIEW OF: EURO-AMERICAN CONNECTION (708) 296-0242 (Chicago Suburbs)
|
|
----------
|
|
|
|
GENE: Hey, Rog' -- here's a new board, just started up in December, and I
|
|
think it has the potential to be one of the best boards in the country.
|
|
You go in at 9600 and get 1550+ CPS, all the warez on on-line, and they
|
|
all work. Can't beat that. You've seen the nearly 1 gig of space, and
|
|
there's plans to go multi line. The users are a nice mix of
|
|
instate/outstate. We've both read the message logs, and even you agree
|
|
that there's not a lamer in the bunch. The files are well ad says, it's
|
|
sure about the friendliest board I've been on. If you're having
|
|
problems, Hot Mix is usually around to help, and he doesn't hide like a
|
|
lot of sysops do. And I like the feature that *ALL* users only get 60
|
|
minutes a day, not counting upload time, and that time returned for
|
|
uploads is a straight one-to-one. Keeps users from hogging or from
|
|
uploading garbage just for more time. And don't forget that HST
|
|
14,400!! One meg in 10 minutes!
|
|
|
|
ROGER: I dunno, Gene. I've seen lots of new boards, even good ones, come and
|
|
go, and too often they don't live up to their promise. The sysops get
|
|
lazy, the good users upload all their stuff, mooch what they can, then
|
|
move on. You're NAIVETE amazes me! Yeh, yeh, the messages are good, but
|
|
they're mostly about prolems with warez. I personally like the
|
|
occasional flame and political discussion, and I didn't see any of that
|
|
there. I agree that all the fixin's are there for a super board, but
|
|
we'll see what it looks like in a year. But I'll admit that it's one of
|
|
the best new ones I've seen, and in just looking a file dates, it looks
|
|
like people are putting stuff up consistently.
|
|
|
|
GENE: You're just jaded because Stealth went down and Berserker is still at
|
|
2400. C'mon! You *know* in your heart of hearts this is a darn good
|
|
board. And you can't beat the small user's fee--just a couple of bucks
|
|
a month--to store backup copies of stuff. And have you ever seen such a
|
|
generous u/d-load ratio as five-to-one?
|
|
|
|
ROGER: Look, I'm not knocking the board. But I've just seen to many fast
|
|
starts and quick stumbles. If Hot Mix and the users can keep it up,
|
|
I'll eat my words. I hope they do. I'll even call it. I'll bet you
|
|
didn't know that the sysop's handle, "hot mix," is from his DJ days as
|
|
a hot mixer of records, did you?
|
|
-----RATING: -----
|
|
GENE: An enthusiastic 10!! THIS IS A GREAT BOARD!
|
|
ROGER: Yeh, ok, I'll concede. I give it a 9+ -- but ask me again next year
|
|
|
|
Here's what you see when you look on, Rog' -- there's lots of different areas
|
|
and something for everybody. It's running TELEGARD, and that's about the
|
|
hottest sysem around right now, and when 3.0 comes out, nothing will touch
|
|
it!!
|
|
|
|
zddddddddddddddddddddddddddddddddddQ
|
|
3 cdQ
|
|
3 EuroAmerican Connection BBS 3 3
|
|
3 Niles, IL 3 3
|
|
cdddddddddddddddddddddddddddddddddd4 3 ATTENTION: ALL NEW USERS !!!
|
|
cdddddddddddddddddddddddddddddddddd4 3 > Use 10 for User Number >
|
|
cdddddddddddddddddddddddddddddddddd4 3 > Use 1111 for User Phone # >
|
|
cdddddddddddddddddddddddddddddddddd4 3
|
|
3 SHUTTLE LOGON MENU 3 3
|
|
|
|
|
|
|
|
Enter BBS Password:
|
|
|
|
Telegard BBS Version 2.4 Standard - Copyright 1988,89,90
|
|
Eric Oman, Martin Pollard, and Todd Bolitho - All Rights Reserved.
|
|
|
|
Display ANSI logon? No
|
|
;;;;;;;;;;;;;;;;;;;;;;;; ;;;;;;;;;;;;;;;;;;;;;;;; ;;;;;;;;;;;;;;;;;
|
|
1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;;;;;;;;;;;;;;;
|
|
1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;;;;;;;;;;;;;;;
|
|
1;;;;;;11111111111111111 1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;1111111111111
|
|
1;;;;;; 1;;;;;;111111111111;;;;;; 1;;;;;
|
|
1;;;;;; 1;;;;;; 1;;;;;; 1;;;;;
|
|
1;;;;;;;;;;;;;;;;;; 1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;
|
|
1;;;;;;;;;;;;;;;;;; 1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;
|
|
1;;;;;;11111111111 1;;;;;;111111111111;;;;;; 1;;;;;
|
|
1;;;;;; 1;;;;;; 1;;;;;; 1;;;;;
|
|
1;;;;;; 1;;;;;; 1;;;;;; 1;;;;;
|
|
1;;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;; 1;;;;;; 1;;;;;;;;;;;;;;;;;;;;;;;
|
|
1;;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;; 1;;;;;; 11;;;;;;;;;;;;;;;;;;;;;;
|
|
1;;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;; 1;;;;;; 11;;;;;;;;;;;;;;;;;;;;;
|
|
1111111111111111111111111 111111 111111 111111111111111111111
|
|
|
|
> > > > > ;;;;;;;; ;;;;;;;; ;;;;;;;;;
|
|
> hmn hmn ;;FFFFFF;; ;;FFFFFF;; ;;FFFFFFFF;
|
|
> >? > ;;;;;;;;F ;;;;;;;;F ;;;;;;;;; F
|
|
;;FFFFFF; ;;FFFFFF; FFFFFFF;;
|
|
; ; ?FFF?FF;FF ;; F;; ;; F;; ?; F;;
|
|
;FFF; FF? ; ;;;;;;;;;;F ;;;;;;;;;;F ;;;;;;;;;;F
|
|
; ; F???F ; ;;;;;;;;; ;;;;;;;;; ;;;;;;;;Enter your User # or you
|
|
Logon :90
|
|
|
|
User password :
|
|
Complete phone #: ###-###-
|
|
|
|
Welcome to EuroAmerican Connection BBS,
|
|
|
|
Please wait .... thank you.
|
|
|
|
Last few callers:
|
|
2511: Sp. Fly #34 from Waukegan, IL
|
|
2512: Jay Cepe #63 from Arlington Hts, IL
|
|
2513: The Untouchable #53 from Chicago, IL
|
|
2514: Captain Sir Henry Morgan #38 from Ann Arbor, MI
|
|
|
|
3 O | ------------------------------------------------------------ | O 3
|
|
3 O | NEWS FLASH from EuroAmerican Connection BBS | O 3
|
|
3 O | Sent by HOT MIX on 02/03/90 at 08:30am | O 3
|
|
3 O | | O 3
|
|
3 O | New News! | O 3
|
|
3 O | | O 3
|
|
3 O | Well I hope everyone noticed that we now have 660 Megs of | O 3
|
|
3 O | very fast ESDI storage! I still have an extra 300 Megs to | O 3
|
|
3 O | install and I'm waiting for some answers, (it may not be | O 3
|
|
3 O | possible) but I did promise a gigabyte and I keep my | O 3
|
|
3 O | promises so the gigabyte is NOT far fetched! | O 3
|
|
3 O | Anyway..I would like for everyone to be a total part of | O 3
|
|
3 O | this BBS and help it grow in every direction! We do have a | O 3
|
|
3 O | great FILE base but we also need a great MESSAGE base and | O 3
|
|
3 O | that can only happen with your participation! | O 3
|
|
3 O | Please make sure that you DO read your mail (and don't just | O 3
|
|
3 O | see it and delete it) and make sure that you delete it | O 3
|
|
3 O | after you carefully read it! If it's there it's serves a | O 3
|
|
3 O | purpose...Alot of you ask me things that I already | O 3
|
|
3 O | mentioned in mail but you didn't take time to read it! | O 3
|
|
3 O | Thats all...Enjoy the BBS | O 3
|
|
3 O | HOT MIX | O 3
|
|
3 O | | O 3
|
|
3 O | ------------------------------------------------------------ | O 3
|
|
|
|
Oooops it seems that it's me and you now! Teddy is out...Let's Party
|
|
|
|
|
|
Now the EuroAmerican Connection supports High Speed Transfers of over 1500 cps
|
|
All HST users PLEASE read message in the General Messages area with same title
|
|
Always striving to be the BEST (and proving it!)...Coming soon 1.5 GigaBytes!!
|
|
|
|
You are caller #2515,
|
|
|
|
Time allowed - 60 minutes
|
|
Mail waiting - 1 letter
|
|
You have called - 64 times
|
|
Last on - 02/24/90
|
|
Account limits - 7 calls, using a maximum of 60 minutes, per day.
|
|
|
|
Read your mail now? Yes
|
|
|
|
You have no mail waiting:
|
|
|
|
.----------------------------------------------------.
|
|
: AVAILABLE BULLETINS :
|
|
: :
|
|
: :
|
|
: :
|
|
: :
|
|
: :
|
|
: :
|
|
`----------------------------------------------------'
|
|
|
|
|
|
The EuroAmerican Connection BBS
|
|
SysOp : HOT MIX
|
|
Co-Sys : MAD COOK
|
|
|
|
List of Users by User Name in Ascending Order
|
|
Total Number of Users Listed = 147
|
|
|
|
User Name City & State Last Logon
|
|
========= ============ ==========
|
|
AGENT 007 Lombard, IL 02/23/90
|
|
AMBER Lyons, IL 01/21/90
|
|
ANDY COOPER Mcgaw Park, IL 01/15/90
|
|
BAD SECTOR Leyden Township, IL 02/15/90
|
|
BADGER Gilbert, AZ 02/19/90
|
|
BARCLAY Henry, IL 02/11/90
|
|
BIG MAN Chicago, IL 01/03/90
|
|
BILLY THE KID Elmhurst IL 01/14/90
|
|
BLACK KNIGHT Naperville, IL 01/13/90
|
|
BLACKHAWK River Grove, IL 01/06/90
|
|
BONG HITS River Forest, IL 02/20/90
|
|
BOOMER Chgo., IL 01/25/90
|
|
BRIAN So.Holland, IL 02/23/90
|
|
BRIAN SMITH Wildwood, IL 02/08/90
|
|
BRYAN ALLISON Wheaton, IL 02/08/90
|
|
CAPT'N JACK Morgantown, WV 02/23/90
|
|
CAPTAIN COOK Hoover, AL 02/10/90
|
|
CAPTAIN DEATH Columbia, MO 02/18/90
|
|
CAPTAIN SIR HENRY MORGAN Ann Arbor, MI 01/31/90
|
|
CHLORINE SHARK Chattanooga, TN 01/14/90
|
|
CONSOLE COMMANDER Buffalo Grove, IL 02/19/90
|
|
COSTA SAPUNTZAKIS Hinsdale, IL 02/04/90
|
|
DARKSTORM Lemont, IL 01/03/90
|
|
DIRTY HARRY Wheeling, IL 02/21/90
|
|
DOCTOR CRACK Richton Park, IL 02/23/90
|
|
DOCTOR DOS Naperville, IL 02/11/90
|
|
DON JARVIS Chicago, IL 02/08/90
|
|
DON RIEB Glenview, IL 02/24/90
|
|
DON STIEN Chicago, IL 02/22/90
|
|
DOUG TAPP Schaumburg, IL 01/11/90
|
|
DR. FEELGOOD Greatlakes Il, IL 01/25/90
|
|
EGGHEAD DUDE Sesame Street, HI 01/07/90
|
|
ELVIS PRESLEY Elgin, IL 02/09/90
|
|
EPEIOS Dekalb, IL 02/13/90
|
|
ETHAN GRIGGS Chicago, IL 02/03/90
|
|
FAST FREDDIE Glenview, IL 02/04/90
|
|
FATSO Schaumburg, IL 02/23/90
|
|
FELIX FELLNER Skokie, IL 02/22/90
|
|
GANDALF Buffalo Grove, IL 02/23/90
|
|
GILGAMESH OF URUK Itasca, IL 02/15/90
|
|
GLENN ROSE Westmont, IL 02/09/90
|
|
GOLDEN MEDUSA~ Northbrook, IL 01/29/90
|
|
GORDON THOMPSON Dekalb, IL 02/21/90
|
|
GRAFFIX MAN Lisle, IL 02/11/90
|
|
GREG KLIMA Chicago, IL 01/21/90
|
|
GUEST USER Your Town 02/17/90
|
|
HACKMAN Downers Grove 02/11/90
|
|
HI-FI Glenview, IL 01/23/90
|
|
HOT MIX Niles, IL 02/24/90
|
|
JAEGERMECH Wheeling, IL 02/21/90
|
|
JAMMER Oslo Norway, NO 02/22/90
|
|
JAY CEPE Arlington Hts, IL 02/21/90
|
|
JAY CHEN Chicago, IL 01/20/90
|
|
JEDI Chicago, IL 02/24/90
|
|
JEFF YANG Wheaton, IL 01/20/90
|
|
JERRY CLAXTON Huntley, IL 01/27/90
|
|
JIM MCMAHON Baltimore, MD 02/23/90
|
|
JIM RICHARDS Sycamore, IL 01/20/90
|
|
JIM SHOE Chgo Il, IL 01/28/90
|
|
JIM VANATOR Chicago, IL 02/21/90
|
|
JOE CHARLIER Elk Grove Il, IL 02/03/90
|
|
JOE MARTIN Chicago, IL 02/22/90
|
|
JOHNNY Morton Grove, IL 01/06/90
|
|
JULIUS CAESAR Skokie, IL 01/25/90
|
|
KAT Niles, IL 02/20/90
|
|
KEITH DOERING Schaumburg, IL 02/18/90
|
|
KENNY JASON Chicago, IL 01/13/90
|
|
KING LEECH Chicago, IL 02/23/90
|
|
LORD HAVOC Chicago, IL 01/05/90
|
|
LORD SHIVA Joliet, IL 02/22/90
|
|
LORD X Chicago, IL 02/03/90
|
|
MAC Willowbrook, IL 02/07/90
|
|
MAD COOK Des Plaines, IL 02/21/90
|
|
MADMAN Mount Prospect, IL 02/13/90
|
|
MAMOMAN VAKAMAN Rolling Meadows Il, IL 02/15/90
|
|
MASTER BLASTER Waukegan, IL 02/10/90
|
|
MASTER NINJA Schaumburg, IL 02/24/90
|
|
MAVERICK Lincolnwood, IL 02/24/90
|
|
MEDIEVAL KNIGHTMARE Chicago Heights, IL 02/21/90
|
|
MERLIN Hinsdale, IL 02/23/90
|
|
METAL GODS Waukegan, IL 02/22/90
|
|
MIKE REED Palatine, IL 02/02/90
|
|
MIKE YOUNG Elgin, IL 01/21/90
|
|
MISTER MONOCHROME Chicago, IL 02/21/90
|
|
MR Z Tulsa, OK 02/23/90
|
|
MR. HARDWARE Skokie Il, IL 02/23/90
|
|
NICE PERSON Deerfield, IL 02/23/90
|
|
NIGHTOWL Wheeling, IL 01/12/90
|
|
NUN TUCKET Wheeling IL 01/16/90
|
|
OL' YELLER Arlington Hts. IL 02/17/90
|
|
OLD GUY Northbrook, IL 02/17/90
|
|
OLIVER WENDELL JONES Chicago, IL 02/15/90
|
|
PIG KILLER Cicero, IL 01/27/90
|
|
PINK PANTHER Chicago, IL 02/21/90
|
|
POWER BREAKER Chicago, IL 02/18/90
|
|
PUNKY STAR Chicago, IL 02/24/90
|
|
QUICK SILVER Mt. Prospect Il, IL 01/28/90
|
|
RAINMAN Evanston, IL 01/21/90
|
|
RAISTLIN MAJERE Barrington, IL 01/17/90
|
|
RAZZMATAZZ CHAZ Oak Park, IL 02/23/90
|
|
REEGADE Wheaton, IL 01/18/90
|
|
RICHARD STANALAND Tulsa, OK 02/15/90
|
|
ROADRUNNER Chicag0, IL 02/03/90
|
|
ROBOCOP Des Plaines, IL 01/08/90
|
|
ROCCO Park Ridge, IL 02/22/90
|
|
ROCKET Chicago, IL 02/24/90
|
|
RODNEY CLINGERMAN Maywood, IL 02/23/90
|
|
RON EARL Dekalb, IL 02/20/90
|
|
RON TOCCO Grayslake Il, IL 01/28/90
|
|
RONALD GOLZ Midlothian, IL 01/14/90
|
|
RONALDGOLZ Midlothian, IL 01/12/90
|
|
SAM HOUSTON Chgo, IL 02/17/90
|
|
SCHATTEN Desplaines, IL 02/04/90
|
|
SINISTER EXAGGERATOR Chicago, IL 02/24/90
|
|
SLADE Grayslake, IL 02/15/90
|
|
SP. FLY Waukegan, IL 02/23/90
|
|
SPANKY Skokie, IL 02/23/90
|
|
SPARKY Schaumburg, IL 01/09/90
|
|
SPEED DEMON Brookfield, IL 02/20/90
|
|
STARBUCK Sycamore, IL 01/17/90
|
|
STARSHIP Glen Ellyn, IL 02/09/90
|
|
STASH Park Ridge, IL 02/22/90
|
|
STEEL RAT Great Lakes, IL 01/05/90
|
|
STEVE Oak Park, IL 01/21/90
|
|
SUB ZERO Hinsdale, IL 01/28/90
|
|
SWITCH BLADE Chicago Il, IL 02/13/90
|
|
TED KOPPEL Chicago, IL 02/24/90
|
|
THE COUNSEL Mt. Prospect, IL 02/23/90
|
|
THE HEAD ZOOKEEPER Lhfjkl'F, IL 02/19/90
|
|
THE MAD CELT Glenview, IL 02/24/90
|
|
THE MAN Dekalb, IL 02/20/90
|
|
THE MISFIT Wheeling, IL 02/16/90
|
|
THE ONE AND ONLY SQUID Marengo, IL 02/18/90
|
|
THE REPORTER Niles, IL 02/21/90
|
|
THE SEEKER Chicago, IL 02/01/90
|
|
THE SPIDER Glenview, IL 02/22/90
|
|
THE UNTOUCHABLE Chicago, IL 02/24/90
|
|
THUNDER STICK Elgin, IL 02/23/90
|
|
TIM CHAPMAN Warrenville, IL 02/22/90
|
|
TONY WALLS Hometown, IL 02/05/90
|
|
TORA TORA Lombard, IL 02/22/90
|
|
TYPHON Glen Ellyn, IL 02/16/90
|
|
VIC RODELL Wheeling, IL 01/22/90
|
|
WHIZ KID Joliet, IL 02/23/90
|
|
WINPLACE Greshaam, OR 01/25/90
|
|
ZACH HARRIS Skokie, IL 02/23/90
|
|
ZEUS Niles, IL 02/24/90
|
|
|
|
|
|
Listing of Top 20 Downloaders:
|
|
|
|
Downloads Uploads UL/DL
|
|
User name and number Num KB Num KB Ratio
|
|
------------------------------------------ --- ----- --- ----- -----
|
|
1 Punky Star #30 270 -19012 96 28004 60.
|
|
2 Gandalf #137 260 -18393 9 1778 3.
|
|
3 Jedi #90 180 -29927 164 24695 69.
|
|
4 Mr. Hardware #21 139 14182 133 24610 173.5
|
|
5 Felix Fellner #14 130 27041 66 16961 62.7
|
|
6 Maverick #40 85 15758 24 7815 49.5
|
|
7 Sam Houston #56 76 16566 37 8653 52.2
|
|
8 Spanky #3 70 18043 174 -22438 -124
|
|
9 Fatso #96 66 14839 23 3735 25.1
|
|
10 Mr Z #47 63 13958 31 6288 45.0
|
|
11 Zeus #16 60 10023 22 2171 21.6
|
|
12 King Leech #15 59 14619 22 4259 29.1
|
|
13 Jim Mcmahon #119 55 12777 18 5469 42.8
|
|
14 The Untouchable #53 52 6985 73 19360 277.1
|
|
15 Golden Medusa~ #72 48 8473 13 1602 18.9
|
|
16 Hackman #8 45 7980 82 23054 288.8
|
|
17 Nice Person #42 41 6707 8 1643 24.4
|
|
18 Merlin #17 36 7657 13 2006 26.1
|
|
19 Richard Stanaland #60 29 6934 12 2315 33.3
|
|
20 Captain Sir Henry Morgan #38 27 5319 17 4755 89.3
|
|
------------------------------------------ --- ----- --- ----- -----
|
|
19 Power Breaker #12 20 4671 18 4028 86.2
|
|
20 Speed Demon #51 16 5085 18 3843 75.5
|
|
|
|
------------------------------------------ --- ----- --- ----- -----
|
|
|
|
EuroAmerican Connection BBS
|
|
immmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm<
|
|
Thu Feb 23, 1990 >
|
|
Wed Feb 22, 1990 >
|
|
Tue Feb 21, 1990 >
|
|
Mon Feb 20, 1990 >
|
|
Sun Feb 19, 1990 >
|
|
Sat Feb 18, 1990 >
|
|
Fri Feb 17, 1990 >
|
|
Thu Feb 16, 1990 >
|
|
Wed Feb 15, 1990 >
|
|
Tue Feb 14, 1990 >
|
|
Mon Feb 13, 1990 >
|
|
Sun Feb 12, 1990 >
|
|
Sat Feb 11, 1990 >
|
|
Fri Feb 10, 1990 >
|
|
hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm#
|
|
Average system activity = 62%.
|
|
Each block represents 2% of usage.
|
|
|
|
|
|
|
|
Date: 3:10 am Sat Feb 24, 1990 Public 4/5
|
|
From: Hints and Tips!
|
|
Title: 386 and an Epson lq1000
|
|
>> This message has 1 reply
|
|
|
|
Can ANYONE help me on this:
|
|
I had an IBM (True Blue) XT with an Epson LQ1000 which worked fine all of the
|
|
time. Well now I have upgraded to a 386 and when I plugged in my epson and try
|
|
to print anything all I get is alot of $ > mixed into the file and it doesnt
|
|
even look like the file I am trying to print. Can anyone help me out to get
|
|
this working properly? Is there anything you have to include in the
|
|
config.sys/autoexec.bat to get the printer to recognise the files properly?
|
|
Thanks alot to anyone for any help.......I will try anything to get it to work
|
|
with the 386.
|
|
|
|
|
|
Date: 2:36 pm Sat Feb 24, 1990 Public 5/5
|
|
From: Hints and Tips!
|
|
To:
|
|
Title: well
|
|
>> This message is a reply
|
|
|
|
First of all, is the printer serial or parallel? (or both), if u are using
|
|
the parallel setup, the u might want start by checking your cables on a diff
|
|
machine (but u said it worked on your xt, so that's not the culprit), second,
|
|
if it is parallel setup, u want to try slowing your cpu down (if your computer
|
|
allows it.....the computer could be shooting out the data too fast, and
|
|
there's not enuf time to do handshaking, so you're getting shit printer
|
|
out)...if it's serial, make sure your serial port is set at the same baud rate
|
|
as the printer is....if it is, make sure u'r cable has its handshaking signal
|
|
enabled (make sure the cable is wired properly).....(the first thing i would
|
|
try is slowing the computer down, cuz high speeds usually do cause errors
|
|
(especially at 33 MHZ!!!))
|
|
|
|
|~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
|
|
| ELITE ACCESS ONLY Message ... |
|
|
| I want to remind you that if you 're planning to upload something NEW |
|
|
| make sure that you upload it to the ELITE section ! |
|
|
| Thank you for your support |
|
|
| HOT MIX |
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
0* PD ONLY UPLOADS 1* ** NEW UPLOADS **
|
|
2* Miscellaneous 3* DOCs, Cheats & Solves!
|
|
4* Music/MIDI 5* DOS Utilities
|
|
6* Hard Disk Utilities 7* Cracking/Unprotect Utilities
|
|
8* VGA Graphics etc 9* ANSI/Graphic Programs
|
|
10* Telecommunications 11* Printer Utilities
|
|
12* Word Processing 13* DeskTop Publishing
|
|
14* DataBases 15* Spreadsheets
|
|
16* Financial 17* Integrated
|
|
18* OCR/SCAN utilities 19* CAD/CAM programs
|
|
20* 386 Utilities 21* Programming Languages
|
|
22* Operating Systems 23* XENIX/UNIX/VpIX
|
|
24* Entertainment 25* Older Games
|
|
26* Telegard BBS software! 27* Other BBS software!
|
|
28* PD IBM Games 29* PD Utilities
|
|
30* ELITEs! 31* FREEWARE <NR>
|
|
|
|
|
|
|
|
>--------=====END=====--------<
|
|
|
|
|
|
***************************************************
|
|
*** Pirate Magazine Issue IV / File 10 of 10 ***
|
|
*** Numbers to Call ***
|
|
***************************************************
|
|
|
|
Area Code 201 - (NJNEW) Newark
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Soft Board 228-5862
|
|
Realm 335-9586 Forum
|
|
Eastern Telecom 402-1772 Dr. Null Ptr.Forum 12/24
|
|
Underground II 502-9115 Rambone Emulex/II 12/24
|
|
Joe's Garage 661-4327 Joe WWIV 12/24
|
|
Al's Cabin 827-7815
|
|
Metal AE 879-6668 Emulex/II 12/24
|
|
Runaway Train 927-1154 GBBS
|
|
|
|
Area Code 203 - (CTHAR) Hartford
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Stairway Heaven 393-0899 Emulex 12/24 Home of PHUCK
|
|
DSC Inc. 456-3531 Rengd. Chem. TCS 12/24 Phortune 500
|
|
|
|
Area Code 205 - Alabama
|
|
Byte Me 979-2983 Omega Ohm WWIV 12/24
|
|
Firebase Eagle 554-0480 Shamus Power Plus 12/96
|
|
|
|
Area Code 206 - (WASEA) Seattle
|
|
BBS Name Number Sysop Software Baud Comments
|
|
The Void 232-4941 1200
|
|
Society of Sin 234-2777
|
|
Thieves Guild 235-6779 Monarch 1200
|
|
Ethernal Dimension 255-1282 Jhereg Monarch 12/24
|
|
Alternate Reality 352-4606 Mr. Classic Emulex/II 12/24
|
|
Agnostic Front 432-6904 Emulex/II 12/24 Home of WASP
|
|
Dark Tangent 454-3552 12/24
|
|
Gateway 588-5239
|
|
Neutral Zone 839-5865 Emulex/II 12/24
|
|
|
|
Area Code 212 & 718 - (NYNYO) New York
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Alternate Universe 326-0720 TCW 12/24 Area Code (718)
|
|
Hackers Den 358-9209 Red Knight Emulex/II 12/24 Area Code (718)
|
|
Adventure's Guild 591-0925 Realm Keeper Monarch 12/24 (718), TSAN
|
|
|
|
Area Code 213 - (CALAN) Los Angeles
|
|
Best of Both 325-3237 WWIV 12/24 New Users 2400
|
|
Mystic Knights 426-6490 The Sniper Emulex/II 12/24 TSAN
|
|
The Archives 545-0707 Mac ONLY
|
|
Insomnia 833-8309 Emulex/II 12/24
|
|
The Manor 865-3826 WWIV 12/24
|
|
Freakers Den 941-1534 Black Jack WWIV 12/24
|
|
|
|
Area Code 214 & 817 - (TXDAL) Dallas
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Oblivion 221-4638
|
|
Far Side 231-7920 The Molester Emulex/II 12/24
|
|
Redlight Inn. 393-0156 Emulex/II 12/24
|
|
Mentality Distrup. 258-4935 TNW 12/24
|
|
Dead Zone 522-5321 12/24
|
|
Ice Dimensions 641-7085 Emulex/II 12/24
|
|
Pub & Tavern 690-4634 Jolly Bard. Emulex/II 12/24
|
|
D.U.N.E. 733-0568 Fred Kruuger WWIV 12/24
|
|
|
|
Area Code 216 - (OHCLE) Cleveland
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Rich's BBS 482-6079 Rich Little PCB 12/24
|
|
Walden Pond 792-0981 Brooksie Forum 12/24
|
|
|
|
Area Code 217 - (ILCHA) Champaign
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Golf City BBS 332-4019 Egghead Dude WWIV 12/24
|
|
Realm of Darkness 359-2071 Dark Shadow Emulex/II 12/24
|
|
|
|
Area Code 301 - Maryland
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Speakeasy 358-0849 WWIV 12/24
|
|
Black Box BBS 360-2018 WWIV 12/24
|
|
Gates of Dawn 384-2938 Pho. Apollo Apex 12/24 NAPPA #1
|
|
Salsbury Hill 428-3269 Laughing Gas WWIV 12/24
|
|
Devil's Courier 437-7017 Lord Omar WWIV 12/96
|
|
Anarchy Inter. 464-7023 Anthrax Angel Emulex/II 12/24
|
|
The Future World 486-4515 The Killer WWIV 12/24
|
|
The Gallows 486-5073 Prank Call WWIV 12/24
|
|
Just Another BBS 551-2583 Jack Cassidy Forum 12/96
|
|
Ram Free 557-6841 Monarch 12/24
|
|
Clendestine Corner 647-6631 WWIV 1200
|
|
Courier's Annex 666-2077 Aragon WWIV 12/96
|
|
The Free World 668-7657 Major Havoc WWIV 12/24
|
|
Jolly Roger BBS 675-2566 Emulex/II 12/24
|
|
The First Sector 679-3394 WWIV 12/24
|
|
Corner Pocket 823-5710 WWIV 1200
|
|
The New Republic 828-8291 The Nark WWIV 12/24
|
|
The Iron Curtain 843-5052 Agent Orange WWIV 12/24
|
|
Fun House 924-1543 Emulex/II 12/24
|
|
Surf Shop 990-1715 Emulex/II 12/96
|
|
|
|
Area Code 303 - (CODEN) Denver
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Late Night BBS 399-8811 Emulex/II 12/24
|
|
Ace's Place 421-1380 1200
|
|
Fajita Republic 431-2931 Cap't Blood Monarch 12/24
|
|
Insane Asylum 447-2691 Live Wire Monarch 12/24 CIA Home, Inv.
|
|
Altered Plane 526-0801 Monarch 12/24 9pm-6am Mtn.
|
|
Vulgar Unicorn 680-8622 One Thumb Monarch 12/24
|
|
Most Composers 771-5937 Monarch 12/24
|
|
Distillery 797-1330 Monarch 1200
|
|
Discordian Society 969-8195 Organ Grinder Monarch 12/24
|
|
Radio KAOS 979-9533 British Spectrum 12/24
|
|
|
|
Area Code 305 -
|
|
BBS Name Number Sysop Software Baud Comments
|
|
|
|
Area code 312 & 815 - (ILCHI) Chicago
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Dragon's Lair 215-4937 Dirty Harry Monarch 12/24
|
|
Custom Software 246-7705 Steve Merenkov PCboard 12/96 Join Conf. 3
|
|
Alcatraz 256-0422 Black Guardian Pcboard 12/24
|
|
Zoo 350-9346 Zoo Keeper SBBS 12/96
|
|
Snarf's Music Std. 351-0288 Snarf Monarch 12/24
|
|
Fox River Valley 426-3279 George Krueger PCBoard 12/96 400 MEGZ
|
|
Shop 426-8228 Bud PCboard 12/96 NO HANDLES!
|
|
Truckstop 478-3045 The Dispatcher Forum 12/96
|
|
GGS 530-2209 Pedro Gomez Wild, Form.12/24 open door 15
|
|
Bootleggers BBS 535-2761 Megz Diamond PCboard 12/96 400 MEGZ
|
|
E.T.'s Home 537-3463 Nightowl Telegard 12/24
|
|
Rasputin's Dungeon 653-1765 Rasputin RBBS 12/96 300 MEGZ
|
|
Great Cavern 683-3666 Gary Nelson PCboard 12/96 NO HANDLES!
|
|
O'hare Oasis 693-2904 Pinball Wiz. Telegard 12/24
|
|
New World 749-8137 Virgin Dest. Telegard 12/24 Private
|
|
NIU Connection 753-1800 12/24 (815)
|
|
Jousting Fields 756-3023 Med. Knight. Spectrum 12/24
|
|
M. Lapse of Reason 759-2699 Pink Floyd PC Board 12/24
|
|
Defiant Sceptor 885-1237 The Dealer PCB, Telg. 12/24 Ask for Club
|
|
Sycamore ELITE 895-5573 12/24 (815)
|
|
Aquila BBS 898-5672 898-5806 12/24
|
|
Anonymous Wonder 935-4339 Brown Bomber Telegard 12/24
|
|
|
|
Area Code 313 - (MIDET) Detroit
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Seitch Tabr 255-2767 12/24
|
|
Genesis II 291-2520
|
|
The Ballroom 295-7279 T.A.G. 12/24
|
|
Mission Compatible 295-7308
|
|
007's VIP Lounge 348-8535
|
|
Dungeon of Doom 352-3666 12/24
|
|
GLBBS 360-0106 WWIV Pwd: POWERUP
|
|
The Nuthouse 381-2931 12/24
|
|
Spider's Web 381-5244 12/24
|
|
PC Playhouse 381-8633
|
|
Dude Man Dude HQ 420-4624 12/24
|
|
Crash Landing 455-5821 12/24 Private
|
|
Unlimited Reality 489-0747 QBBS 12/24
|
|
Ariel System 569-3194 T.A.G. 12/24
|
|
Slipped Disk 585-8315
|
|
Starship Enterprise 843-1581
|
|
Get Serious 846-0731
|
|
Tin Pan Alley 939-6339 Monarch 12/24 NAPPA #10
|
|
Beyond Reality 995-0754 12/24
|
|
|
|
Area Code 314 - (MOSOL) St. Louis
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Brewery 394-8259 WWIV 12/24
|
|
Parthenon 522-1460 WWIV
|
|
Enterprise 664-7148
|
|
Hellfire Club 772-3153
|
|
Pinball Place 863-2954 WWIV 12/24
|
|
|
|
Area Code 404 - (GAATL) Atlanta
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Revo Emag 435-5737 Black Star TCE BBS 12/24 TCE Home
|
|
Blueberry MUFF 458-7696 WWIV 12/24
|
|
The Pit 487-7829 Dispater WWIV 12/24
|
|
Duck Board Elite 564-3592 Mad Gator Pcboard 12/24
|
|
923-3870 Mad Gator PcBoard 12/24
|
|
Planet X 591-1620 Emuexl/II 12/24
|
|
Iron Sheath 594-0086 T.A.G. 12/24
|
|
CIA 676-0900 Emulex/II 12/24
|
|
Sun Bane Inc. 921-4635 Lord Foul Emulex/II 12/24
|
|
New Silicon Guild 985-1321 T.A.G. 12/24
|
|
Yellow Jacket 985-8244 Simon Emulex/II 12/24
|
|
Tammy Hall 991-6604 Mad Max WWIV 12/24
|
|
|
|
Area Code 407 -
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Thrash BBS 631-4601 12/24
|
|
|
|
Area Code 408 - (CASJO) San Jose
|
|
BBS Name Number Sysop Software Baud Comments
|
|
The Pubb 251-4689 The Bartender Monarch 12/24
|
|
Billion Boys Club 268-6692 Wind Walker PCboard 12/24
|
|
Nuclear Wasteland 268-7793 12/24
|
|
The BELL Board 297-8383 Gold Finger Emulex/II 12/24
|
|
TCH Trading Post 358-3273 12/24
|
|
Underground I 426-2576 The Enforcer Monarch 12/24
|
|
The Pentagon 426-7228
|
|
*.* 429-8312 Baby Eagle WWIV 12/24
|
|
Mt. Olympus 438-3349
|
|
Atlantis 475-2729
|
|
Dragon's Heaven 735-8685 Master Ryu Monarch 12/24
|
|
Snake Bytes 997-6399 12/24
|
|
|
|
Area Code 412 - (PAPIT) Pittsburgh
|
|
BBS Name Number Sysop Software Baud Comments
|
|
The Eagles Nest 539-1965 Emulex/II 12/24 NAPPA #12
|
|
|
|
Area Code 415 - (CASFA) San Francisco
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Vector One 221-5033 WWIV 12/96
|
|
Leecher's Paradise 234-4588 12/24
|
|
Lunatic Labs 278-7421 Mad Alchem Monarch 12/24
|
|
The Skull 341-1362 Forum 12/24
|
|
Ojai 341-7564 Matrix 12/24
|
|
Strictly Business 583-1673
|
|
Mordor 673-8670
|
|
U.C.I. 770-0140
|
|
Playboy Mansion 851-4368 1200
|
|
Camelot 887-0983
|
|
House of Solitude 948-4925 Forum 12/24
|
|
Wild West 968-4717 Sidewinder Wild West 12/24
|
|
|
|
Area Code 416 - Toronto, Ontario, CANADA
|
|
BBS Name Number Sysop Software Baud Comments
|
|
The lost Souls 241-2119 Dark Spirit Matrix 12/24 Matrix Home
|
|
The High Command 247-4491 Emulex/II 12/24
|
|
Thieve's Guild 267-3938 Master Thief Forum 12/24
|
|
Time Tunnel 283-6765 Time Master USSR 12/24
|
|
Life After Death 431-9265 Jack Daniels USSR 12/24
|
|
Air Academy 439-8374 Top Gun FCP 12/24
|
|
Euphoria 467-6387 RJ MacReady Monarch 12/24 FiRM dist.
|
|
467-6998
|
|
Saucerful/Secrets 756-3467 Angel Heart Monarch 12/24
|
|
Warez R Us 769-3189 Capt. Caveman USSR 12/24
|
|
Hunting Grounds 823-9439 Huntsman Monarch 12/24
|
|
Canadian Tech. 846-7528 Bit Splice Emulex/II 12/24
|
|
Swashbucklers II ???-???? Desert Foxx Emulex/II 12/24 Emulex/IIHome/PTL
|
|
|
|
Area Code 502 -
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Rasputen's Playgrd 782-0260 12/24
|
|
Pirate's Chest 926-2857 12/24
|
|
|
|
Area Code 503 - (ORPOR) Portland, Oregon
|
|
|
|
Area Code 504 - (LANOR) New Orleans
|
|
BBS Name Number Sysop Software Baud Comments
|
|
TMOZ 272-9633 Bulldog Telegard 12/24
|
|
|
|
Area Code 507 - (MNROC) Rochester
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Electric Ocean 281-0275 Brand-X 12/24
|
|
Didactic Gallery 282-5063 Purl. Illus. Brand-X 12/19.2 Brand-X Home
|
|
|
|
Area Code 508 - (MAWOR) Worchester
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Country Morgue 250-8098 Undertaker TBBS 12/24
|
|
Eternal War 285-5325 Warlord QBBS 12/24
|
|
Inf. Intoxication 750-8035 Invi. Stalker TCS 12/24
|
|
|
|
Area Code 513 - (OHCIN) Cincinatti
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Psychedelic Sanct. 451-6188 Emulex/II 12/24
|
|
Ultimate Empire 896-4550 Sax Pistol Fcp V3.0 12/24
|
|
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Rock'in Ranch 249-7248 Ranger Rick Emulex/II 12/24 TSAN
|
|
Knights Rnd. Tbl. 281-3214 DarkMage Emulex/II 12/24
|
|
The Prism 678-1642 Monarch 12/24
|
|
Junkyard BBS 932-7394 Junkman Emulex/II 12/24 TSAN
|
|
|
|
Area 517 - (MILAN) Lancing
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Hades BBS 259-4641 12/24
|
|
Nite Line 477-9315 Black Jack Emulex/II 12/24
|
|
Mission Compat. 5 529-4287 Energy Wave Fcp 12/24
|
|
The Magick Link 592-2741 Emulex/II 12/24
|
|
|
|
Area Code 519 - London, Ontario, Canada
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Bopper Land 660-1960 Big Bopper Monarch 12/24
|
|
The Coffee Shop 679-2696 Monarch 12/24
|
|
|
|
Area Code 602 - (AZPHO) Pheonix
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Boss BBS 242-3935 Sysop Pokey Emulex/II 12/24
|
|
Beta Cygnus 274-8917 Mastermind Forum 12/24 FiRM Dist.
|
|
Radio Free Europe 866-7864 12/24
|
|
Vahalla Islands 942-0087 Pharigm God Tcs 12/24
|
|
ESP Headquarters 942-2111 Mr. Peace Forum 12/24 ESP Club Home
|
|
2001 Odyssey 953-1893 ABBS 12/24
|
|
Temple of Doom 996-8002 WWIV 12/24
|
|
|
|
Area Code 606 - Eastern Kentucky
|
|
BBS Name Number Sysop Software Baud Comments
|
|
The Vortex 331-5133 Terminator Forum 12/96 PTL Dist.
|
|
|
|
Area Code 607 - (NYBIN) Binghamton
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Ahab's Abbey 729-7019 12/24
|
|
Wizards Workshop 754-2950 Pirate Master Forum 12/96
|
|
|
|
Area Code 612 - (MNMIN) Minneapolis
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Avenger's Island 439-9782 Forum
|
|
Radio Waves 471-0060 The Sensei Forum 1200
|
|
Playdo Land II 522-3959 Heavy Metal Emulex/II 12/24
|
|
Playdo Land 557-1489 Emulex/II
|
|
The Establishment 559-8289
|
|
|
|
Area Code 615 -
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Syd's Place 691-9073 Syd Womack PC Board 12/96
|
|
|
|
Area Code 617 - (MABOS) Boston
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Country Morgue 250-8098 12/24
|
|
Swift's Ridge 364-3304 Sir Swift Gen. Delux 12/24
|
|
Forgotten Dimension421-6755 Monarch 12/24
|
|
Player's Guild 455-8154 The Outlaw Spectrum 12/96 FiRM dist.
|
|
Spinward Marches 474-0602 12/24
|
|
Edge of Insanity 484-4921 12/24
|
|
The Realm 527-6567 The Enchanter Emulex/II 12/24
|
|
Taster's Choice 868-5731 Emulex/II 12/24
|
|
Jabba's PC Hut 884-9498 Genesis 12/24
|
|
Lion's Den 889-0777 12/24
|
|
|
|
Area Code 619 - (CASAD) San Diego
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Private Sector 353-0970 The Spy WWIV 12/24
|
|
Somewarez 436-9861 Jon Emulex/II 12/24
|
|
Convent 475-6187 Emulex/II 12/24
|
|
Starhelm Greystaff 479-3006
|
|
Parallax 486-2858 WWIV 1200
|
|
dBORED 748-3644 PCboard
|
|
Knavery 942-0408 WWIV 12/24
|
|
|
|
Area Code 703 - Arlington, Virginia
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Treasure Island 442-6653 Monarch 12/24
|
|
The Daily Exchange 466-2120 12/24
|
|
Gathering Gods 641-0190 The Noid Monarch 12/24
|
|
Star Pirates II 644-2347 Darkstar Apex 12/24
|
|
Pirates Island 759-3979 Monarch 1200
|
|
Figment/Imagination759-6579 Monarch 12/24
|
|
Cornerstone 971-7874 The Maestro Forum 12/96 FiRM Home
|
|
|
|
Area Code 713 - (TXHOU) Houston
|
|
BBS Name Number Sysop Software Baud Comments
|
|
?? 356-2042
|
|
Sperical Planes 358-2683 12/24
|
|
London at Midnight 373-1769 12/24
|
|
General Electric 438-3156 Pheonix 12/24
|
|
Crystal Orbe 488-3744 12/24
|
|
Alternate Mindlink 489-7779
|
|
Ultimate Revolution492-1179 Celtic Phrost Emulex/II 1200 NAPPA #4
|
|
Hellfire 497-5547 Damian Emulex/II 12/24
|
|
Lighthouse 556-5652 T.A.G. 12/24
|
|
Optical Illusion 578-0722 SYS-PC 1200
|
|
Killer's Domain 578-1455 12/24
|
|
Shadow's Realm 578-1527 12/24
|
|
Celestial Woodlands 580-8213 The Ranger SYS-PC 12/24 SYS-PC & BSP Home
|
|
Super Dimension 586-9721 SYS-PC
|
|
Anarchist's Realm 774-0767 1200
|
|
Smash Palace Mac 821-3901 12/24
|
|
Anarchist's Under. 890-0561 Shadow Walker SYS-PC 12/24
|
|
Fantasy World 933-0062
|
|
Round Table 980-3977 Emulex/II 12/24
|
|
|
|
Area Code 714 - (CAANA) Anaheim
|
|
BBS Name Number Sysop Software Baud Comments
|
|
CopyWorks Inc. 496-7069 12/24
|
|
The Wish List 831-6235 12/24
|
|
Zero Gravity 860-5779 Emulex/II 12/24
|
|
Focal Point 946-9234 Enforcer Emulex/II 12/24
|
|
Area Code 716 - (NYBUF) Buffalo, New York
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Stoney Man's Farm 439-3269 Emulex/II 12/24 UnderGr. Home
|
|
Plutonium Mines 636-4540 Jenetic Bytm. Neuromancer 12/24 PTL dist.
|
|
636-5185 Jenetic Byte. Nueromancer 12/24 PTL dist.
|
|
Land of Fa 773-7526 WWIV 1200
|
|
Heaven or Hell 832-0118 Master Blaster Neuromancer12/96 NAPPA #7
|
|
|
|
Area Code 719 - Colorado Springs, Colorado
|
|
BBS Name Number Sysop Software Baud Comments
|
|
The Edge (718) 631-8135 12/24
|
|
Playdo Land 260-8472 Mr. Bill Emulex/II 12/24 NAPPA #15
|
|
Insane Asylum II 597-3973 12/24
|
|
Forbidden Passage 774-0449 Mr. X Monarch 12/24 NAPPA/FiRM Dist.
|
|
|
|
Area Code 801 - Utah
|
|
BBS Name Number Sysop Software Baud Comments
|
|
The Kingdom 292-8118 Xavier WWIV 12/24
|
|
Plutocrazy 295-7522 WWIV 12/24
|
|
Berserker 485-7646 Earl Smith PC Board 12/24
|
|
Stealth 521-3837 12/24 Private
|
|
|
|
Area Code 805 - (CABAK) Bakersfield
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Sherwood Forest 255-2850 Robin Hood WWIV 12/24
|
|
Theebbs 324-9239 12/24
|
|
Unknown World 373-0574 The CooZ Monarch 12/24 TSAN
|
|
West World 379-1616 Monarch 12/24
|
|
Mage's Lair (804) 451-3551 The Mage Monarch 12/24
|
|
|
|
Area Code 813 - (FLTAM) Tampa
|
|
BBS Name Number Sysop Software Baud Comments
|
|
The Trading Post 544-2108 WWIV 12/24
|
|
Mission Compat. 3 647-2580 Paladin Emulex/II 12/24
|
|
Dungeon of Dread 689-2103 12/24
|
|
Arabian Knight BBS 871-2189 Sinbad WWIV 12/24
|
|
Point Blank 875-5153 Brian Hart Monarch 12/24
|
|
Faw or Foad 962-2937 Wendle WindlesWWIV 12/96 TSAN
|
|
Sentry's Post 980-2447 The Sentry WWIV 12/24
|
|
|
|
Area Code 818 - (CAGLE) Glendale
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Land of Warlord 280-4065 Shogun WWIV 12/24
|
|
Night Industries 2 281-4587 Air Wolf WWIV 12/24
|
|
Night Undustries 1 284-5946 Space Kid WWIV 12/24
|
|
ACC 287-0408 WWIV 12/24
|
|
Phantom's Domain 368-2945 Phantom Emulex/II 12/24 Pwd: ZERO GROUND
|
|
Roach Motel 369-2083 Black Flag Emulex/II 12/96 WHOA
|
|
Stranger Eye 409-9472 Jagged Edge Emulex/II 12/24 TSAN
|
|
Land of Illusion 447-9049 Maurader Monarch 12/24
|
|
Burial Grounds 571-8389 Emulex/II 1200
|
|
Cemetery Gates 575-1887 Holy Grenade WWIV 12/24 FiRM Dist.
|
|
Project Genesis 706-8167 One Monarch 12/24
|
|
Gotham City 718-8227 Batman WWIV 12/24
|
|
Krypton 773-0461 Superman WWIV 12/24
|
|
Influx 799-3589 WWIV 12/24 Real names only
|
|
Hecker 912-4183 WWIV 12/24
|
|
ANI Systems 912-7848 The Tracer Emulex/II 12/24 Home of WHOA
|
|
Crys. Strike Force 965-1580 Battlehawk Emulex/II 12/24
|
|
|
|
Area Code 904 - Northern Florida
|
|
BBS Name Number Sysop Software Baud Comment
|
|
Pool Hall 757-3578 WWIV 12/24
|
|
South East. Coil. 779-9152 Emulex/II 12/24
|
|
|
|
BBS Name Number Sysop Software Baud Comment
|
|
City Limits 357-0316 Tuf Dog Monarch 12/24
|
|
|
|
Area Code 914 - White Planes, New York
|
|
BBS Name Number Sysop Software Baud Comment
|
|
Phortress 221-0035 Forum 12/24
|
|
Ninja's Place 297-0334 The Ninja Emulex/II 12/24
|
|
Time Zone 354-1185 The Watcher Forum 12/24 TSAN
|
|
Inner Sanctum 683-6926 Seadough Gen. Delux 12/24
|
|
Software Cellar 795-5092 Forum 12/24
|
|
Hacker's Hideout 838-2319 Forum 12/24
|
|
|
|
Area Code 919 - (NCRTP) Research Triangle Park
|
|
BBS Name Number Sysop Software Baud Comments
|
|
Park Place 460-9441 Joe Isuzu WWIV 12/24
|
|
Boinger Board 846-3734 WWIV
|
|
|
|
|
|
>--------=====END=====--------<
|
|
|