830 lines
38 KiB
Plaintext
830 lines
38 KiB
Plaintext
____________________________________________________________________
|
||
| ___ __ __ | | |
|
||
| |___) | | | | (_ | Rhode Island Computer | Volume 2, Issue 1 |
|
||
| | \ | |__ |__| __) | Underground Society | January, 1993 |
|
||
|______________________|_______________________|_____________________|
|
||
|
||
|
||
=======================================================
|
||
RICUS Vol. 2, Iss. 1 Table of Contents
|
||
=======================================================
|
||
1 .. Opening to RICUS 2.01
|
||
2 .. Introduction to the UNIX OS (Part 1)
|
||
3 .. Definition of 'Hacker'
|
||
4 .. How to By-Pass Callback Verifiers
|
||
5 .. Idiotic Submission: What to do w/the Homeless
|
||
6 .. Update: List of RI Fido Systems
|
||
7 .. PedoFile.Txt - Fake BBS Ad - A Fine Squinky File
|
||
8 .. Radio Scanners
|
||
9 .. OMNI-Net NodeList/Conference Tags
|
||
10 . Closing/Submitting Articles to RICUS
|
||
=======================================================
|
||
|
||
|
||
---------------------------------------------------------------------
|
||
1: Introduction
|
||
---------------
|
||
|
||
Hey there! Welcome to RICUS 2.01! In this issue, we provide
|
||
you with some interesting information. Information can be good or bad,
|
||
it is up to the individual user of such information to ensure that it
|
||
is used properly. Info can also be amusing... use it wisely...
|
||
|
||
Remember, cyberspace can be fun. It can also be dangerous, excercise
|
||
caution at all times.
|
||
|
||
CyNom/RICUS Editor
|
||
|
||
|
||
You may have noticed a change in the editing alias. Alas, we must change
|
||
the editor alias from time to time, whether the editor changes or not!
|
||
|
||
--------------------------------------------------------------------------
|
||
2: Introduction to UNIX
|
||
----------------------
|
||
|
||
1.1 What is UNIX?
|
||
-------------
|
||
UNIX is an OS developed by AT&T in the 1970's. It's not really a
|
||
mainstream OS like MS-DOS, though I'm sure some people will disagree
|
||
with me on that. It is primarily used in colleges/universities and by
|
||
businesses with the need for multiuser support.
|
||
|
||
UNIX is multiuser, meaning more than one person can use the same
|
||
computer at the same time. This is done through terminals hooked to a
|
||
main CPU. Modems (of course) can also be attached, to allow multiple
|
||
users to dial-in. Many UNIX systems are also on networks.
|
||
|
||
It is also multitasking. This means each user can run more than one
|
||
program and switch between them.
|
||
|
||
1.2 How do I identify a UNIX system?
|
||
--------------------------------
|
||
The easiest way to identify a UNIX system is by its login screen.
|
||
Upon accessing a UNIX system, either by remote or by local terminal,
|
||
you will see the following display (assuming you are not already
|
||
logged on):
|
||
|
||
|
||
generic.unix
|
||
|
||
Welcome to the Generic Unix with Computer People who
|
||
don't have a clue what they're doing!
|
||
|
||
The System will be backed up around 2 pm Monday!!!
|
||
|
||
login:
|
||
|
||
|
||
You may also see 'Login:' in place of 'login:' (notice the caps.)
|
||
The login prompt makes it easy to distinguish a UNIX system.
|
||
|
||
The login: prompt is asking you for a username. There are frequently
|
||
default logins that come with a UNIX system, and these are sometimes
|
||
left unpassworded, due to the incompetance of most system administrators.
|
||
|
||
Some common default UNIX login names:
|
||
|
||
backup
|
||
demo
|
||
demos
|
||
guest
|
||
help
|
||
lp
|
||
news
|
||
tutor
|
||
bin _
|
||
uucpa \
|
||
nuucp >--|These will not give you a shell (Unless you're lucky!!)
|
||
uucp _/ |They will usually give you the uucico program, part
|
||
|of UUCP which will be covered in future chapters of
|
||
|RICUS UNIX tutorials.
|
||
|
||
If the account has a password, it will give you a Password: prompt.
|
||
Otherwise, you will be logged in.
|
||
|
||
There are sometimes also other defaults, like 'games' or something,
|
||
that the users may have installed for one reason or another.
|
||
|
||
There is also sometimes another way to identify a unix system and/or
|
||
get more info on that particular UNIX. Login as "sync" (without
|
||
the quotes.) If it is a valid account, the system will print a message
|
||
like this:
|
||
|
||
login: sync
|
||
SunOS Release (386STD) 4.1.3 on node generic
|
||
|
||
[...and then logs you out...]
|
||
|
||
Smart Admins will have gotten rid of this account, since it makes
|
||
it really easy to make sure that a computer is, indeed, a UNIX!
|
||
|
||
2.1 The Shell
|
||
--- ---------
|
||
|
||
After you have somehow logged into a UNIX. You will be at a Shell
|
||
prompt. The prompt will be something like:
|
||
|
||
%
|
||
nodename %
|
||
/usr/user %
|
||
etc...
|
||
|
||
Whatever it is, you are most likely at a UNIX shell. Type 'pwd'
|
||
at the shell prompt, and it'll Print your current Working Directory
|
||
^ ^ ^
|
||
|
||
By the way, UNIX is entirely case sensitive. 'pwd' is NOT the same
|
||
as 'PWD', '
|
||
|
||
Entering 'pwd' is the same as entering CD on an MS-DOS system, without
|
||
any options.
|
||
|
||
The 'cd' command allows you to change directories.
|
||
Some common UNIX commands:
|
||
|
||
Command Description
|
||
============== ============================================
|
||
ls lists files, UNIX equivelant of MS-DOS 'DIR'
|
||
cd change dir, UNIX equiv of MS-DOS 'CD'
|
||
pwd Prints current Working Directory (like MS-DOS
|
||
'CD' without any args!)
|
||
set lists/sets environment vars
|
||
echo prints text
|
||
cat views a textfile (like MS-DOS 'TYPE')
|
||
kermit start kermit front end (for downloading
|
||
files) -- Not present on all UNIX systems
|
||
sz send ZModem, sends a file FROM the UNIX
|
||
(Not on all UNIXes)
|
||
rz recieve ZModem sends a file TO the UNIX
|
||
(Not on all UNIXes)
|
||
man obtain help on a command
|
||
rm delete/remove file
|
||
mv move/rename file
|
||
|
||
Note: Certain commands, such as sz, rz, and kermit, may not be found
|
||
on particular UNIXes.
|
||
|
||
Those are some of the more common/useful commands, which will
|
||
allow you to obtain text, navigate directories, list them, etc.
|
||
You can get help on a command (usually) by typing 'man command'
|
||
without the quotes, where "command" is the command you want help
|
||
with.
|
||
|
||
Most commands provide a short summary of there arguments. Type
|
||
"command -?" (without the quotes, of course!) to see this short
|
||
arg summary.
|
||
|
||
You can redirect the output of commands using the '>','<', and
|
||
'>>' operators, just like MS-DOS.
|
||
|
||
To write the output of ls /bin to a file, you could use:
|
||
ls /bin >file
|
||
|
||
To view this output, you could then type
|
||
cat file
|
||
|
||
To see a list of many other commands type "ls /bin" The directory
|
||
/bin contains many system binaries/commands. You can also try
|
||
"ls /usr/bin" which possibly lists additional commands.
|
||
|
||
Try fooling around with commands and experiment. If you're reading
|
||
this, you probably have some type of intelligence in that brain of
|
||
yours!
|
||
|
||
However, please remember that if you are 'borrowing'
|
||
someones account (with their permission, of course), *never* delete
|
||
(or modify) any files that aren't yours! This is just common courtesy.
|
||
|
||
|
||
2.2 UNIX Directory Structure
|
||
--- ------------------------
|
||
|
||
UNIX utilitizes a file system. At the top of this filesystem is the root
|
||
directory. Under this root dir, there are subdirectories, subdirs within
|
||
subdirs, files within subdirs, etc.
|
||
The root dir is represented by a '/' (slash)
|
||
An example unix directory tree:
|
||
|
||
/ (root dir)
|
||
____ ____ __|__ ____ ____
|
||
| | | | | |
|
||
usr bin dev etc var tmp (dirs)
|
||
____|__ _____
|
||
| | | |
|
||
jon mat guest games (sub-dirs... etc)
|
||
|
||
In the sample directory tree above, the root dir has 3 subdirs under
|
||
it (usr, bin, and dev.) Within usr, the 'home directories' of users
|
||
jon, mat, and guest exist. The home directories are the dirs that the
|
||
user is initially logged into. You can change back to your home dir
|
||
using cd $HOME. To find out your home dir, type echo $HOME. Both at shell
|
||
prompts.
|
||
|
||
The current directory can be represented by a . (a single dot), the
|
||
previous dir can be represented with a .. (double dot), just like
|
||
MS-DOS! For example, say you were in directory /usr/guest. To move back
|
||
to /usr, you could type cd /usr OR type cd .. Obviously, cd .. is
|
||
preferable, since it requires less typing!
|
||
|
||
That's the end of RICUS Intro to Unix, Article 1. In future issues
|
||
of RICUS, we will continue to provide you with more UNIX information.
|
||
Article 2 will probably have information on networking, one of the most
|
||
interesting and fun use of a UNIX.
|
||
|
||
It is important to note that the BEST source of UNIX info is actual
|
||
experience in use of Unixes!
|
||
|
||
* UNIX is a trademark of Unix Systems Laboratories. (We think.)
|
||
|
||
[Disclaimer: RICUS does not promote the hacking of any type of computer,
|
||
UNIX or otherwise, for malicious and destructive purposes.
|
||
Mis-application of the above information is your responsibility, not ours!]
|
||
|
||
----------------------------------------------------------------------------
|
||
3: Definition of 'Hacker'
|
||
-----------------------------
|
||
|
||
[Editor's Note: The "RISA jihad" was in RICUS 1.03. This is a response to
|
||
that file.]
|
||
|
||
I just noticed that inane RISA jihad against "hackers".
|
||
|
||
I'm a hacker, I do nothing wrong, and this sort of bullshit annoys me.
|
||
|
||
A hacker is basicly a programmer who programs out of love for the
|
||
machine/environment. Programming for its own sake. Programming as
|
||
the ends, means, *and* justification. One who leads an e-life instead
|
||
of an r-life. (Users don't count. Users are morons.)
|
||
|
||
Granted, most people who perpetrate illegal computer-related activities
|
||
are hackers, merely because few others are qualified. Out of the set of
|
||
{hackers} there is a sub-set of {criminals}. This is true of any professional
|
||
or cultural group, even sets like {LA-cops} or {Past-Mayors-of-Providence}
|
||
or even {Sysops-of-"ligit"-public-BBSs}. The software all you sysops are
|
||
so worried about being broken into or abused was writen by hackers.
|
||
|
||
(For reference, the following is from "the jargon file", a monster
|
||
list of hacker slang & culture that circulates the net, and is
|
||
available in hardcopy as: _The_New_Hacker's_Dictionary_.)
|
||
|
||
hacker: [originally, someone who makes furniture with an axe] n.
|
||
1. A person who enjoys exploring the details of programmable
|
||
systems and how to stretch their capabilities, as opposed to most
|
||
users who prefer to learn only the minimum necessary. 2. One who
|
||
programs enthusiastically (even obsessively), or who enjoys
|
||
programming rather than just theorizing about programming. 3. A
|
||
person capable of appreciating {hack value}. 4. A person who
|
||
is good at programming quickly. 5. An expert at a particular
|
||
program, or one who frequently does work using it or on it; as in
|
||
`a UNIX hacker'. (Definitions 1 to 5 are correlated, and people
|
||
who fit them congregate.) 6. An expert of any kind. One might
|
||
be an astronomy hacker, for example. 7. One who enjoys the
|
||
intellectual challenge of creatively overcoming or circumventing
|
||
limitations. 8. (deprecated) A malicious meddler who tries to
|
||
discover sensitive information by poking around. Hence
|
||
`password hacker', `network hacker'. See {cracker}.
|
||
|
||
|
||
That's all. Now go back to sleep.
|
||
|
||
-dav
|
||
|
||
-----------------------------------------------------------------------------
|
||
4: Call Back Verifiers
|
||
----------------------
|
||
|
||
|
||
By-Passing Those Darn Call Back Verifiers!
|
||
==========================================
|
||
|
||
Over the past few years, BBS software has matured and Call Back Verifiers
|
||
have become common place.
|
||
|
||
Initially, one would think CBVs would put an end to fake accounts. Afterall,
|
||
they have to disconnect, dial YOUR number, and connect to you, right?
|
||
And once your number is divulged, it isn't much trouble to find out
|
||
who you are, right?
|
||
|
||
Wrong. Over the past few months, certain modemers of the demented
|
||
persuasion have figured out how to avoid these horrid devices.
|
||
|
||
The key is to keep the BBS modem (that's SUPPOSEDLY going to disconnect
|
||
and call you back) from disconnecting.
|
||
|
||
In order to do this, you need to have an actual phone as an extension
|
||
on your data line, and relatively close to the modem.
|
||
If your voice line IS your data line, this shouldn't be much of a problem.
|
||
|
||
Step 1) Create the account, use an alias, whatever. If the Sysop is
|
||
watchful (in other words: always by the computer), make sure
|
||
your account appears to have a real name.
|
||
|
||
2) (Fairly obvious :) Use _fake_ phone numbers. Give it a real
|
||
prefix (first 3 digits) and area code, however. IE: 401-273-xxxx,
|
||
location Providence, would satisfy a quick glance by most sysops.
|
||
|
||
3) The system will say something like. "I am now going to hang up
|
||
and call you back."
|
||
Quick! Before the BBS can disconnect, *pick up your phone*
|
||
and *shut off your modem*, with the phone still off hook,
|
||
turn the modem back on.
|
||
|
||
Now, listen to the phone. You will either here the BBSes
|
||
modem trying to disconnect, or dead silence.
|
||
|
||
Wait a few seconds. You will either
|
||
1) Hear kind of LOUD clicks.
|
||
2) Hear the BBSes modem dialing out.
|
||
3) Hear a "That call can not be completed.."
|
||
"You need more digits.."
|
||
<dialtone>, etc.
|
||
|
||
In case 3, you have failed. This BBS most likely has a
|
||
good phone line (or something) and won't allow these tricks
|
||
to work. Move onto another BBS.
|
||
|
||
In case 1, the BBS is LOOKING for a dialtone. Hold down
|
||
"1" on the touchtone pad. This usually fools dumb modems
|
||
into thinking there is a dialtone. You should then hear
|
||
the BBSes modem dialing "your" number.
|
||
|
||
In case 2, the BBS thinks it has a dialtone, and is trying
|
||
to dial you. Wait til it finishes.
|
||
|
||
4) Type ATA, your modem will answer (as if it had been called
|
||
by the BBS) and the BBS will procede, thinking it has, indeed,
|
||
"verified" and called you back, when it never really disconnected!
|
||
Enter your password and all that, you are validated.. with a
|
||
seemingly legit fake account! Congratulations!
|
||
|
||
It has yet to be determined which systems are vulnerable/which are
|
||
not. It has been noted that E-Nest BBS is *NOT* vulnerable to
|
||
such tricks. :( How sad.
|
||
|
||
The key to this trick is keeping the connection. The majority of
|
||
phone calls can not be hung up on unless the *Caller* hangs up
|
||
first, or the person being called hangs up for about 90 seconds.
|
||
|
||
This trick works for around 2 out of 3 BBSes.
|
||
|
||
|
||
This trick is primarily useful for gaining access to message networks
|
||
(ie, NE-Net, Fido-323, etc.) that are not tolerant of aliases, and
|
||
watching them bitch, cry, and moan about how we are all no-brainers
|
||
and stuff.
|
||
|
||
This trick is also useful, of course, for obtaining more download
|
||
credits, more game time, etc.
|
||
|
||
Be smart! DON'T log in with your "fake" account after you immediately
|
||
use up the time on your real one! It doesn't take a genius to notice
|
||
that they're _probably_ the same person! Especially since they're
|
||
calling at the same baud rate!
|
||
|
||
Many 401 systems are vulnerable -- A list of these systems would be
|
||
released, but it places certain sysops at an unfair advantage.
|
||
|
||
Because of this vulnerability, every local network, that doesn't
|
||
"want" aliases, is open to alias postings.
|
||
|
||
Have fun guys...
|
||
|
||
CyNom
|
||
|
||
-----------------------------------------------------------------------------
|
||
5:Idiotic Text Files Section: What to do with the Homeless
|
||
----------------------------------------------------------
|
||
How to move the homeless population out of your comunity.
|
||
|
||
Step (1)
|
||
|
||
Find All the homeless in your community.
|
||
|
||
Step (2)
|
||
|
||
Set half of them on fire..
|
||
|
||
Step (3)
|
||
|
||
Now employ the other half as Fighters of Homeless person Fires
|
||
|
||
Step (4)
|
||
|
||
Now enjoy your homeless free community.
|
||
|
||
[Editors Note: Yes, that *was* idiotic! I wouldn't normally put that in,
|
||
but in the intererest of free expression... no matter how
|
||
tasteless!]
|
||
|
||
-----------------------------------------------------------------------------
|
||
6:RI Fido Systems
|
||
---------------
|
||
Here's a list of all the Fido Systems in RI, their node #'s, and their
|
||
phones. Have fun, kiddies. All Phone #'s are 401, unless otherwise stated.
|
||
|
||
Node# BBS Name Comment Phone#
|
||
1:323/1 - The Bloom Beacon - Echo Coordinator - 751-3831
|
||
1:323/2 - AMPR.ORG Gate - packet radio gw? - Unpublished
|
||
1:323/105 - Prometheus - Head Fascist ;) - 397-7522
|
||
1:323/106 - Horses Head BBS - - 726-8186
|
||
1:323/107 - IEEE BBS - - 454-2977
|
||
1:323/108 - Data Express - - (508) 336-3868
|
||
1:323/109 - Art of the Poss. - Easy fake accts - 421-2218
|
||
1:323/110 - Cerebral Babylon - not on FidoNet - 435-3576
|
||
1:323/111 - Prime Cut BBS - - 334-3096
|
||
1:323/112 - Mise en Place - - 461-2605
|
||
1:323/113 - Adv. Voice/Data - - 782-6692
|
||
1:323/115 - ImageNet - - 822-3060
|
||
1:323/116 - FleetHQ - doesn't xfer often- 823-0176
|
||
1:323/118 - Connections - - 658-3465
|
||
1:323/119 - Bloom Beacon - see 1:323/1 - 751-3831
|
||
1:323/120 - ChowdaNet - easy fakes/no fido- 331-0907
|
||
1:323/121 - GAYtway - - 739-1380
|
||
1:323/122 - Nite Moves - - 528-5796
|
||
1:323/123 - 95th Floor - not on FidoNet - 941-7851
|
||
1:323/124 - Signals - - 823-3038
|
||
1:323/126 - ENest - - 732-5292
|
||
1:323/128 - CommPort USA - - (508) 761-9812
|
||
1:323/131 - Behind En. Lines - - 463-6973
|
||
1:323/132 - IBM World II - always watching!! - 397-5146
|
||
1:323/133 - CyberZone - - 732-1641
|
||
1:323/201 - BlackStone Valley- - 769-2055
|
||
1:323/202 - Comp Exchange - - 762-4293
|
||
1:323/203 - Gambit - - 333-6424
|
||
1:323/204 - RI Telecomm - an original name! - 658-2033
|
||
1:323/205 - EyeStrain BBS - - 765-6205
|
||
1:323/206 - DataLine - another original! - 568-6641
|
||
1:323/302 - EarthWorld - - 254-1262
|
||
1:323/401 - Razors Edge - - 364-6343
|
||
1:323/402 - Studio II - - 539-0627
|
||
|
||
By "No Fidonet", we mean that the BBS doesn't seem to be actively
|
||
participating in the FidoNet-323 echoes, and isn't really worth
|
||
terrorizing.
|
||
|
||
Special thanks to Squinky for abusing FrontDoor and acquiring a
|
||
new Nodelist for us, at 14,400 bps, no less!
|
||
|
||
Note: What use is this? I thought they passworded most of the Fido
|
||
links! Well, yes! They did! Hint: Even *with* PWs, FD technology
|
||
is _still_ not secure.
|
||
|
||
-----------------------------------------------------------------------------
|
||
7: PedoFile.Txt
|
||
---------------
|
||
[Editor's Note: RICUS and the RICUS Editor are not responsible for the abuse
|
||
represented by the following text. If you have any problems, take them up
|
||
with the author, it is quite obvious who it is. I wouldn't normally put
|
||
that in, except (again) in the interest of free expression. ]
|
||
|
||
Call The Beagle's Breast BBS -
|
||
Home TO PENET(Pedophile Net)!1!
|
||
Over 900 Megs of Child Porn!
|
||
Just look at some of the .gifs we have!
|
||
|
||
5 year old boy with 29 year old fat guy!
|
||
5 year old boy with TWO(yes, TWO) 20ish guys!
|
||
|
||
PedoPhile BBS, When you want to fuck and suck little kids, you know where
|
||
to call.
|
||
|
||
Kids welcome, we always need new people to take pictures of.
|
||
|
||
Also, Available, A list of BBS'ers under 12!1!, yes, you too can make them
|
||
give head, just like the owner's have in the past, and will do in the future.
|
||
------------------------------------------------------------------------------
|
||
I know you are saying, "How Do I register? I want access to little kid's bung
|
||
holes too!". Well, to keep up the candy we have to buy to offer to little
|
||
kids in exchange for sexual favors/sexual acts, we charge each user the small
|
||
sum of $50 a year.
|
||
|
||
I know you must be thinking, "50 Dollars? That's a lot just to slam little
|
||
kids up the ass!", but wait, there's more! Beagle's Breast Staff will
|
||
PERSONALLY set up Molestation dates between you and your victims, all as part
|
||
of the service. And if you are ever lonely, we will come over and give you
|
||
head, just like little "Johny" did!
|
||
------------------------------------------------------------------------------
|
||
|
||
Now, You must be thinking, "Oh dear, what if I get caught?". Well, don't
|
||
worry, Child Molestation is not a huge crime! Why, our own sysop got a seven
|
||
year suspended sentance simply for saying he has mental problems!
|
||
|
||
Also, as part of the Beagle's Breast service, we will help find you a good
|
||
"Pedophile Defense" lawyer! With any luck, he will twist it around into
|
||
making it sound like the child FORCED you to slam your cock into their anal
|
||
passage!
|
||
------------------------------------------------------------------------------
|
||
|
||
Yes, the Beagle's Breast, PedoPhile BBS, is the bbs for all of your devient
|
||
sexual behaviors. We will be happy to help you in your quest for 12 years
|
||
and under dick.
|
||
|
||
Remember our motto, "The Beagle's Breast BBS, We Care about fuckin small boys!"
|
||
------------------------------------------------------------------------------
|
||
|
||
[ Note: Any similiarity to BBSes, people, things, networks, living, dead, or
|
||
mythical, are *purely* coincidental.
|
||
|
||
Child Molesters are very sick individuals, and such crimes should
|
||
not be taken lightly. ]
|
||
|
||
|
||
-----------------------------------------------------------------------------
|
||
8: Radio Scanning
|
||
-----------------
|
||
|
||
First off: What *is* a scanner? A radio scanner is a radio reciever that
|
||
allows you to scan a range of frequencies and pick out 'active' ones, and
|
||
recieve/listen to them.
|
||
|
||
We're not talking about your FM radio here, folks! We are talking about
|
||
scanners that let you pick up police, fire, medical, taxi cab, amateur
|
||
radio, cordless phone, and even cellular phone transmissions.
|
||
|
||
According to a Privacy Act (1974? 1986? One of those, anyways.) It
|
||
is illegal to listen to cellular phones. However, we here at RICUS
|
||
embrace the policy that any frequency passing through your home and
|
||
through your *body* (doing who knows WHAT to it! ;) should be allowable to
|
||
listen to. These laws are unenforcable, however, since unless you go
|
||
open your window and shout "I listen to cellular..." no ones going to
|
||
know. Just remember, it IS illegal to listen to cellular frequencies
|
||
(infact, many scanners do not allow these frequencies to be entered),
|
||
so if (however unlikely!) you do get caught doing it for some idiotic
|
||
reason, RICUS and it's editor(s) are not responsible.
|
||
|
||
Well, first off: Get a radio scanner. You can find them in your
|
||
local electronics store, Rat Shack, etc. or you can go mail order.
|
||
Take a look in some of the Amateur Radio Magazines like Popular
|
||
Communications and 73 for some mail order places.
|
||
|
||
There are many different types of scanners to choose from. There are
|
||
portable/battery powered (most, if not all portables, use rechargable
|
||
batt. packs.) There are also "base" models, that plug into the wall. There
|
||
are also mobile models that go permanantely in a car.
|
||
|
||
I recommend the portable/handheld models... since you can carry them
|
||
with you, put them in your car, etc. Note that in some states it's against
|
||
the law to have scanners in your car. One could argue that it's
|
||
unconstitutional, idiotic, moronic, etc. but from one of the Popular
|
||
Communications mags, this isn't the case in RI... you can have a scanner
|
||
in your car without any problems. PopComm is a fine magazine, if your
|
||
interested in HAM radio, shortwave, scanners. Also, try to find a scanner
|
||
that's able to pick up many different bands (ranges of frequencies), the
|
||
more frequencies a scanner can pick up, the cooler the stuff you can listen
|
||
to.
|
||
|
||
|
||
Personally, I have a BearCat 200XLT, a handheld scanner. It has 200
|
||
memory channels. Most modern scanners have anywhere from 20 to over 1000
|
||
memory areas. These memories allow you to store a frequency you like into
|
||
them, for quick/easy access. Once you store all the active freqs you find in
|
||
the memories, you can tell the scanner to only scan the channels stored in
|
||
the memories, which allows you to keep up with all the activity in your
|
||
area quite easily. If listening to weird things isn't your style, well...
|
||
what can I say... you must be a normal person or something!!
|
||
|
||
Once you have a scanner, you're going to want to do something with it.
|
||
You can either read the manual and figure out how to scan ranges of
|
||
frequencies, or you can enter frequencies from a frequency list right into
|
||
the memories, avoiding the laborous search process. I do, however, recommend
|
||
searching for some frequencies yourself, since I defininately don't have a
|
||
list of ALL the freqs in use in RI, just some of them.
|
||
|
||
You could buy a book with a list of radio frequencies in it and blow
|
||
15 or 20 bucks. You'll also get a bunch of frequencies for areas all over
|
||
the nation, most of which you'll never even use. Instead, we'll give you
|
||
a list of some of the local RI frequencies. Here you go:
|
||
|
||
------------------------------------------
|
||
Rhode Island Area Frequency List (Partial)
|
||
------------------------------------------
|
||
[All Frequencies are listed in Mhz]
|
||
|
||
---------------------------
|
||
City Police/Law Enforcement
|
||
---------------------------
|
||
Barrington 155.490, 158.970
|
||
Burrillville 154.725, 156.090, 158.970
|
||
Central Falls 155.430, 158.970, 156.210, 155.655, 155.760
|
||
Charlestown 154.710, 154.815, 155.190, 45.100
|
||
Chepatchet 156.090
|
||
Coventry 154.725, 158.970, 154.695
|
||
Cranston 155.250, 155.970, 158.970, 482.4125, 482.4625
|
||
482.5825, 485.4125, 485.4625, 485.5625
|
||
Cumberland 158.970, 155.430, 156.210, 155.655, 126.210
|
||
East Greenwich 154.725, 155.625, 158.970
|
||
East Providence 154.770, 155.010
|
||
Esmond 156.090
|
||
Exeter 154.815
|
||
Foster 154.725, 155.190, 155.535
|
||
Glocester 156.090
|
||
Jamestown 39.040, 158.970
|
||
Johnston 154.725, 155.535, 158.970, 155.185
|
||
Lincoln 158.970, 156.210, 155.430, 156.060, 155.655
|
||
Middletown 155.790, 158.970
|
||
Narragansett 154.815, 154.875, 155.190
|
||
Newport 155.730
|
||
North Kingstown 154.815, 155.190, 155.580, 158.970
|
||
North Providence 154.725, 156.090, 156.450, 158.970, 154.800
|
||
Pawtucket 154.830, 155.430, 155.655, 158.970
|
||
Portsmouth 45.940 , 158.970, 155.850, 154.845
|
||
Providence 460.275, 460.100, 460.200, 460.425, 460.325
|
||
Scituate 39.140 , 154.725, 155.535, 156.090, 158.970
|
||
South Kingstown 154.880, 154.815, 154.875, 158.970, 155.190
|
||
Warwick 154.890, 155.130, 155.190, 158.970
|
||
West Warwick 154.725, 155.190, 155.625, 156.150, 158.970
|
||
Westerly 154.815, 155.190, 156.210
|
||
Woonsocket 155.430, 155.655, 156.030, 158.970, 156.330
|
||
482.8375
|
||
------------
|
||
State Police
|
||
------------
|
||
RI State Police 155.610, 158.970, 155.505, 154.935,
|
||
154.905, 155.190, 155.445, 159.150
|
||
|
||
|
||
Listen to the frequencies in your city and neighboring ones.
|
||
Obviously, if the city is far away you're not going to be able recieve
|
||
it very well.
|
||
|
||
----------------
|
||
Fire Departments
|
||
----------------
|
||
Barrington 153.950, 154.280
|
||
Central Falls 154.280, 154.415
|
||
Coventry 45.200, 45.480
|
||
Cranston 154.010, 154.280
|
||
East Greenwich 154.010, 154.310, 154.280
|
||
East Providence 154.070, 154.280
|
||
Esmond 154.190
|
||
Foster 154.190, 154.290
|
||
Jamestown 153.950, 154.190, 154.280
|
||
Johnston 154.175, 154.190, 154.280
|
||
Narragansett 46.420, 46.500, 154.280
|
||
North Kingstown 154.235
|
||
North Providence 154.250, 154.400, 33.420
|
||
Pawtucket 154.445, 154.280
|
||
Portsmouth 46.060
|
||
Providence 154.370
|
||
Scituate 154.190
|
||
South Kingstown 46.420
|
||
Warwick 154.310
|
||
West Greenwich 46.380
|
||
West Warwick 154.280, 154.430
|
||
Westerly 46.380, 46.360, 46.500
|
||
Woonsocket 154.130
|
||
|
||
-----------------------
|
||
Amateur Radio Repeaters
|
||
-----------------------
|
||
Cranston 146.700 (Ocean State Amateur Radio Group)
|
||
Providence 146.940
|
||
Scituate 147.300
|
||
|
||
The Cranston repeater seems to be the most active. We're not sure
|
||
of the status of the others, since the reference I'm getting these
|
||
frequencies from is probably out of date.
|
||
|
||
-----------
|
||
Other Stuff
|
||
-----------
|
||
Misc. Taxi Cab Cos 152.420, 152.390, 152.450, 35.120, 152.360
|
||
152.330, 152.270, 152.420, 452.300, 142.150
|
||
31.200
|
||
|
||
NOAA Weather 162.400
|
||
|
||
6 Meter HAM Band 50 - 54
|
||
2 Meter HAM Band 144 - 148
|
||
1 1/4 Meter HAM Band 220 - 225
|
||
3/4 Meter HAM Band 420 - 450
|
||
|
||
Cordless Phones 46.0 - 49.0
|
||
*Cellular Phones 806 - 821
|
||
851 - 866
|
||
|
||
The HAM bands are sometimes fun to listen to. Might be fun to get
|
||
myself a HAM license one of these days!
|
||
|
||
* Many scanners can't pick up the cellular bands.
|
||
However, some are able to pick up frequencies above 900 Mhz. Many
|
||
scanners have electronics that produce "image" frequencies of
|
||
frequencies below them.
|
||
For instance, my scanner lets you listen to frequencies in the 851
|
||
to 866 Mhz cellular range by listening to frequencies in the 900
|
||
to 915.. mhz range. You have to find out the "IF" frequency of your
|
||
scanner (it has to be a "2 stage scanner" or something, this does
|
||
NOT work for all scanners) and add 2 x IF to the frequency you
|
||
want.
|
||
Say you want freq 864 and your scanner's IF is 27 Mhz you would do
|
||
864 + 2x27 = 918. You tune to 918 Mhz, and you will hear a slightly
|
||
degraded version of the convo on 864. Remember: This ONLY works
|
||
for certain types of scanners and you have to find out the IF
|
||
frequency!
|
||
|
||
|
||
There you go! And if you can't figure out how to get going with
|
||
scanning, ask around on the local boards, and some one'll chime in and
|
||
help you! Make sure you mention RICUS and those cool RICUS dudes...
|
||
|
||
----------------------------------------------------------------------------
|
||
9: Omni-Net Information
|
||
-----------------------
|
||
OmniNet is a network based on FrontDoor/FidoNet technology, originating
|
||
from southern RI. Someone though it would be cool to get the nodelist,
|
||
conference tag names, etc. So, here they are:
|
||
|
||
Node List:
|
||
----------
|
||
|
||
Zone,132,Omni-Net_Central,North_Kingstown_RI,Scott_Glynn,1-401-295-2725,9600,CM,FD,TG,V32B,V42B,MNP
|
||
Region,200,N.Eastern_USA,NEUS_Control,Scott_Glynn,1-401-295-2725,9600,CM,TG,FD,V32B,V42B,MNP
|
||
Host,401,Rhode_Island_Host,North_Kingstown_RI,Scott_Glynn,1-401-295-2725,9600,CM,TG,FD,V32B,V42B,MNP
|
||
Hub,10,Omega_Concern,North_Kingstown_RI,Scott_Glynn,1-401-295-2725,9600,CM,TG,FD,V32B,V42B,MNP
|
||
,11,Mystic_Illusion,Kingston_RI,Isaac_Rodman,1-401-782-4264,9600,CM,RG,FD,V32B,V42B,MNP
|
||
Hub,20,Morlock's_Tower,East_Greenwich_RI,Paul_Sharpe,1-401-885-2390,2400,CM,FD,RG
|
||
,21,The_95th_Floor,Cranston_RI,Paul_Mallett,1-401-941-7851,9600,CM,FD,LD,V32B,V42B
|
||
,22,Soth's_Domain,Cranston_RI,Marshall_Votta,1-401-785-0347,2400,CM,FD,TG
|
||
Hub,30,Necropolis_BBS,Charlestown_RI,Frank_Faubert,1-401-364-0524,9600,CM,FD,XA,RG,V32B,V42B
|
||
,31,The_Razor's_Edge,Richmond_RI,Chris_Arnold,1-401-364-6343,2400,CM,FD,RG
|
||
Hub,40,Death's_Doorstep,Jamestown_RI,Ed_Beaulieu,1-401-423-2964,9600,WW,V32B,V42B
|
||
|
||
|
||
Conference Tag Names:
|
||
----------------------
|
||
|
||
Short Description Echo Tag
|
||
---------------------------------------------------------------------------
|
||
*General Discussion ON_GENERAL
|
||
*Office ON_OFFICE
|
||
#Administration ON_ADMIN
|
||
SysOp Support ON-SYSOP
|
||
Poetry ON-POETRY
|
||
Music ON-MUSIC
|
||
Telecom ON-TELECOM
|
||
Programming ON-PROGRAM
|
||
RI Local News ON-RILOCAL
|
||
Literature ON-LIT
|
||
Your Ad Here ON-BBSADS
|
||
ANSI Art ON-ANSI
|
||
Entertainment ON-ENTRTN
|
||
Shadowrun ON-SRUN
|
||
Spelljammer ON-SJAM
|
||
Robotech ON-ROBO
|
||
IBM Discussion ON-IBM
|
||
Amiga Discussion ON-AMIGA
|
||
For Sale/Want Ads ON-SALE
|
||
Top Fives ON-FIVE
|
||
Rhode Island BBS Users Group ON-RIBUG
|
||
Internet Discussion ON-INTERNET
|
||
Polical Discussion/Debate ON-DEBATE
|
||
Firearms ON-ARMS
|
||
Womens Issues ON-WOMEN
|
||
---------------------------------------------------------------------------
|
||
* - All members MUST carry # - Omni-Net Board Members ONLY
|
||
---------------------------------------------------------------------------
|
||
|
||
[ We're not sure if the nodes use passwords or not. I see no reason to
|
||
do anything with this info, I just put it in here cause I was asked to.
|
||
However, if you feel the sudden urge to use this info for something,
|
||
the same frontdoor tricks will work, of course. There will probably be
|
||
an article on these "tricks" in a future RICUS.]
|
||
|
||
----------------------------------------------------------------------------
|
||
10:Submissions to RICUS
|
||
-----------------------
|
||
|
||
Anyone can submit an article to RICUS. Most likely, it will get distributed
|
||
with the next issue.
|
||
|
||
We'd also like to see letters to the RICUS editors. Inflammatory messages
|
||
are always welcome!
|
||
|
||
Leave public mail to "RICUS" in either Fido/323 or NE-Net, since that is
|
||
where we primarily wait and watch the locals. <grin>
|
||
|
||
We are _very_ interested in any info you may have on the CLAN library
|
||
computer system. That's the one you see in the libraries, that you look
|
||
books up on, that the librarians check books out on, etc.
|
||
|
||
Also, contact us on one of those "evil subversive user" boards. If you
|
||
don't know where they are by now, you probably never will.
|
||
|
||
Seeya next issue,
|
||
CyNom
|
||
(Naturally, that's just my 'pen' handle ;)
|
||
|
||
Note: The next issue will probably be out around March... Celebrating
|
||
RICUS' first birthday! ONE full year of RICUS! And _atleast_
|
||
one more to come.
|
||
|
||
____________________________________________________________________
|
||
| ___ __ __ | | |
|
||
| |___) | | | | (_ | Rhode Island Computer | Volume 2, Issue 1 |
|
||
| | \ | |__ |__| __) | Underground Society | January, 1993 |
|
||
|______________________|_______________________|_____________________|
|
||
|
||
|
||
|
||
|