1199 lines
46 KiB
Plaintext
1199 lines
46 KiB
Plaintext
-------------------------------------------------------------------------------
|
|
|
|
######### ############ #########
|
|
########### ############ ###########
|
|
#### #### #### #### ####
|
|
#### #### #### #### ####
|
|
#### #### ######## ###########
|
|
#### #### ######## #########
|
|
#### #### #### ####
|
|
#### #### #### ####
|
|
########### #### ####
|
|
######### #### ####
|
|
|
|
DIGITAL FREE PRESS
|
|
-------------------------------------------------------------------------------
|
|
Volume 1.0 Issue 4.0
|
|
-------------------------------------------------------------------------------
|
|
|
|
* A Publication of The Underground Computing Foundation (UCF) *
|
|
|
|
* Send Subscription Requests to: dfp-req%underg@uunet.uu.net *
|
|
|
|
* Send Submissions to: hackers%underg@uunet.uu.net *
|
|
|
|
* Editor: Max Cray (max%underg@uunet.uu.net) *
|
|
|
|
Back issues can be found in the CUD archives at ftp.eff.org
|
|
|
|
[Note: BBS is not currently up. Sorry.]
|
|
------------------------------------------------------------------------------
|
|
|
|
Statement of Purpose and Disclaimer
|
|
|
|
The Digital Free Press is an uncensored forum to document current
|
|
activities in and of the world of modern technology. It is published under the
|
|
premise that it is better to know, rather than not know, so no attempt is made
|
|
to hide any information no matter how dangerous it may be. Information is a
|
|
double edged sword. It is neither good nor bad, and can be used for either
|
|
good or bad. Warning: Some information in this document could be used for
|
|
illegal activities. Use at your own risk. Articles are the opinion of the
|
|
authors listed, and not of the editor (unless of course the editor wrote
|
|
it). Information is not verified for accuracy.
|
|
|
|
------------------------------------------------------------------------------
|
|
------------------------------------------------------------------------------
|
|
|
|
In this Issue:
|
|
|
|
1. Mail to Max
|
|
2. Privacy and Electronic Mail by GodNet Raider
|
|
3. Hardware Destructive Code by The BBC
|
|
4. Invisible Killer Chips by Jean-Bernard Condat
|
|
5. Short Takes:
|
|
- Hacking Remote Access by PeeWee
|
|
- Little Black Book of Viruses Review by PeeWee
|
|
- Where to find Online Library Catalogs, and
|
|
How to get info about DEC's new Alpha chip by Wes Morgan
|
|
- Compiling C programs on a VMS system by Max Cray
|
|
6. Paid Advertisement by UPi
|
|
7. FutureCulture (Condensed) by Hawkeye
|
|
|
|
------------------------------------------------------------------------------
|
|
##############################################################################
|
|
------------------------------------------------------------------------------
|
|
|
|
Mail to Max:
|
|
-----------
|
|
|
|
Date: Tue, 28 Apr 92 14:05 GMT
|
|
From: Jean-Bernard Condat <uunet!mcimail.com!0005013469>
|
|
To: Max Cray <underg!max>
|
|
Subject: RE: DFP #3 Bounce Test
|
|
|
|
Dear Max:
|
|
|
|
The scene in France is very clear: nothing. The police look at what the
|
|
Chaos Computer Club france (CCCF) make... and the secret services work
|
|
on several formations for all the people! A lot of anti-virus softwares
|
|
are available, but some softs are sell with viruses in it (!). I paid
|
|
US$1,000 pro week like Craig Neidorf... because I "have perhaps possess
|
|
one hard-to-find NUI"! I mind that the US hacking market is the same:
|
|
you have some blue box codes available, the French hackers have some
|
|
"Carte Pastel Internationale" codes... and France Telecom don't make any
|
|
thing against that. Only some poor teenagers are arrested, but in 60%,
|
|
they don't found the good people!
|
|
|
|
Can I help you?
|
|
|
|
Jean-Bernard Condat, General Secretary, CCCF
|
|
B.P. 8005
|
|
69351 Lyon Cedex 08, France
|
|
|
|
[Editor's note: Of course you can help! Send all your information to:
|
|
hackers%underg@uunet.uu.net and I will try to edit it
|
|
to make it even more useful, and then I will publish
|
|
it in the DFP!]
|
|
|
|
-----------------------------------------------------------------------------
|
|
|
|
From: Root of all Evil Account <uunet!stormking.com!root>
|
|
Subject: Re: Digital Free Press #3
|
|
To: underg!max (Max Cray)
|
|
Date: Sun, 26 Apr 92 19:38:24 EDT
|
|
X-Mailer: ELM [version 2.3 PL11]
|
|
|
|
Dear Mr. Cray,
|
|
|
|
Recently, 4 users of this system complained about receiving
|
|
copies of your "Digital Free Press". As the distribution site for Phrack,
|
|
I in no way discourage freedom of electronic speech. I do, however,
|
|
discourage "cyber junk-mail". Each of the users mentioned they had not
|
|
specifically asked for this to be sent to them.
|
|
|
|
In the future, please verify any subscriptions of your newsletter
|
|
through me.
|
|
|
|
The Root of all Evil at StormKing.Com
|
|
|
|
[Editor's note: 'Mr. Cray' ... I like that!]
|
|
|
|
------------------------------------------------------------------------------
|
|
##############################################################################
|
|
------------------------------------------------------------------------------
|
|
|
|
From: gnr@tsf.UUCP (GodNet Raider)
|
|
Date: Wed, 26 Feb 92 05:17:53 EST
|
|
Organization: The CyberUnderground
|
|
|
|
|
|
-=[ Privacy and electronic mail ]=-
|
|
|
|
-or-
|
|
|
|
/*************************************/
|
|
/* How to whisper over a crowded net */
|
|
/*************************************/
|
|
|
|
- written by -
|
|
GodNet Raider
|
|
- of -
|
|
The CyberUnderground
|
|
|
|
-=[ "Information is the greatest weapon of power to the modern wizard." ]=-
|
|
|
|
]----------------------------------------------------------------------------[
|
|
|
|
Introduction:
|
|
-------------
|
|
|
|
A while back I was listening to a pro password sysop talk about the
|
|
'evils' of hacking. His biggest point was that 'a hacker could read
|
|
private mail from/to the person whose' account they have accessed. The
|
|
right or wrong of that point I will leave to others to discuss/flame/get
|
|
flamed over. What stuck with me was the fact that he like many other
|
|
sysops and system admin, their friends and whoever else can access the
|
|
system at high level (or in the case of DOS, can pound the local
|
|
keyboard), can also read any text messages they wish. Some even feel that
|
|
it is a god given right to read any mail, strange seeing that the
|
|
government and even ma bell (remember the phone chase from _the_cuckoo_
|
|
nest_ they could not get the phone number for they did not have a valid
|
|
warrant in in that state) must get a search WARRANT to do the same thing.
|
|
Well it seems what they feel god has giveth them, GodNet Raider can
|
|
taketh away.
|
|
|
|
So I thought there must be a simple way to make truly private
|
|
messages to protect all from this 'hacker threat' and nosey sysops
|
|
(etc..) as well (without having to resort to using DES and uuencode,
|
|
for it is slow and a bit of a hassle to use a lot (but it should be noted
|
|
this is the most secure method). Then I remembered an article I read
|
|
in The LOD/H Technical Journal, Issue #3. [Editor's note: The Legion
|
|
of Doom Technical Journals can be found in the CUD archives at
|
|
ftp.eff.org. Highly recommended.] It contained a basic BASIC
|
|
program and explanation to a simple text encryption method using
|
|
cellular automatons by The Mentor (strongly recommended reading for
|
|
understanding the theory behind the method).
|
|
|
|
After converting the BASIC code for the second program to C (under
|
|
Minix) I proceeded to make changes to (hopefully improve) it. What
|
|
I came up with is included at the end of this file (MsgLock.c).
|
|
|
|
Of the changes made:
|
|
|
|
Added the use of stdin/stdout to support a wide extent of I/O
|
|
methods.
|
|
|
|
Used multiple cells in defining shift amount.
|
|
|
|
Allowed the pass though of char.s not in aszValid array (raw
|
|
output) to keep message integrity (returns and tabs that a
|
|
message may gain/lose in some online editors).
|
|
|
|
Added code to expand small key strings to fill out key cells.
|
|
|
|
So I hope you find MsgLock of use and remember...
|
|
|
|
WMIe`H-h(`[ga0)9oW-/V
|
|
|
|
MsgLock wish list/projects:
|
|
---------------------------
|
|
|
|
MsgLock is by no means complete following are some suggestions for
|
|
the obsessed prodigies out there who want to expand on the basic idea.
|
|
|
|
For a more private version one can change:
|
|
|
|
The size of the key cells (#define WIDTH xx).
|
|
|
|
The expansion methods used to fill out the initial key cells.
|
|
|
|
The key cell update method.
|
|
|
|
The order of the char.s in aszValid.
|
|
|
|
Adding/removing char.s from aszValid.
|
|
|
|
Msglock could use a way to know when an encoded area begins and
|
|
ends (like the 'begin'/'end' in uuencoded files) to save post
|
|
processing on net messages.
|
|
|
|
Removal of char.s used in quoted messages so that it will not try
|
|
to process (cook) char.s added to quoted messages.
|
|
|
|
Changes to allow it to be treated like a ASCII Xfer protocol in
|
|
term packages (qmodem, boyan, kermit)/online by bbs packages (RBBS,
|
|
etc..) as an auto encrypt for chat/general online use.
|
|
|
|
Or many others I have not thought of.
|
|
|
|
MsgLock source code:
|
|
--------------------
|
|
|
|
MsgLock was compiled in Minix using the ACK compatible compiler and
|
|
under DOS using Turbo C++ using ANSI C compatible commands.
|
|
|
|
Usage:
|
|
msglock [-d] Key
|
|
|
|
-d(code) : Decode stdin to stdout (MsgLock otherwise
|
|
encodes stdin to stdout. -d is only
|
|
used for decoding if followed by a
|
|
space and is the first parameter following
|
|
the command ('-dKEY' will be used as a key
|
|
to encode stdin, use '-d -dKEY' instead to
|
|
decode)
|
|
|
|
Key : String of char. used to encode/decode stdin
|
|
to stdout. String can contain spaces.
|
|
|
|
Examples:
|
|
|
|
msglock key <file1.txt >file2.txt
|
|
Encode file 'file1.txt' to 'file2.txt' using the key string
|
|
'key'.
|
|
|
|
msglock -d this is the key <foo
|
|
Decode the file 'foo' to the screen using 'this is the key'
|
|
as the key string.
|
|
|
|
msglock knowledge is power >com1 (/dev/tty1 for minix users)
|
|
Encode keyboard input (using the key 'knowledge is power')
|
|
directly to the device/terminal on com port 1.
|
|
|
|
+---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+
|
|
|
|
/*
|
|
MsgLock.c
|
|
by GodNet Raider.
|
|
Based on a program for encrypting using cellular automaton
|
|
by The Mentor
|
|
|
|
Allows encoding of text for transmittal over computer nets and BBSs.
|
|
|
|
This program is not to DES standards and should not be considered 100%
|
|
secure by any means.
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <stdio.h>
|
|
#include <ctype.h>
|
|
|
|
#define TRUE 1
|
|
#define FALSE 0
|
|
#define SPACE 0x20
|
|
#define WIDTH 50
|
|
#define MAX_CELLS (WIDTH + 2)
|
|
|
|
char
|
|
*aszErrMsg [] =
|
|
{
|
|
"Usage: msglock [-d(ecode)] Key",
|
|
"Write error on stdout.",
|
|
"Read error on stdin."
|
|
},
|
|
asCells [2] [MAX_CELLS],
|
|
/* Not using 0 offset to prevent errors caused by the fact that */
|
|
/* (0 % x == x % x). */
|
|
aszValid [] = "\xff\ABCDEFGHIJKLMNOPQRST"
|
|
"yz1234567890!@#$%^&*()-=_+[]{};:'.><,/?\\| \`\"",
|
|
fActive = 0,
|
|
fDecode = FALSE;
|
|
|
|
void
|
|
main (int, char **),
|
|
FatalErr (int);
|
|
|
|
void main (argc, argv)
|
|
int
|
|
argc;
|
|
char
|
|
*argv [];
|
|
{
|
|
char
|
|
sWorkKey [WIDTH],
|
|
cInChar;
|
|
int
|
|
nArgCnt = 1,
|
|
nTmpCnt1 = 1,
|
|
nTmpCnt2 = 0,
|
|
nValidSize;
|
|
|
|
nValidSize = strlen (aszValid) - 1;
|
|
/* Check for missing parameters. */
|
|
if (argc == 1)
|
|
FatalErr (1);
|
|
/* Check if decode, else default to encode */
|
|
if (*argv [1] == '-' && toupper (argv [1] [1]) == 'D' && !argv [1] [2])
|
|
{
|
|
/* Check for missing parameters, again. */
|
|
if (argc < 3)
|
|
FatalErr (1);
|
|
fDecode = TRUE;
|
|
nArgCnt++;
|
|
}
|
|
/* Move key in to encode/decode key cells to the max set by WIDTH. */
|
|
while (nTmpCnt1 <= WIDTH && nArgCnt < argc)
|
|
if (argv [nArgCnt] [nTmpCnt2])
|
|
asCells [1] [nTmpCnt1++] =
|
|
argv [nArgCnt] [nTmpCnt2++];
|
|
else
|
|
if (++nArgCnt < argc)
|
|
{
|
|
asCells [1] [nTmpCnt1++] = SPACE;
|
|
nTmpCnt2 = 0;
|
|
}
|
|
nTmpCnt2 = 1;
|
|
/* Fill unused cells in key cells up to WIDTH. */
|
|
while (nTmpCnt1 <= WIDTH)
|
|
asCells [1] [nTmpCnt1++] = asCells [1] [nTmpCnt2++] ^
|
|
asCells [1] [nTmpCnt1 - 1];
|
|
/* Process stdin. */
|
|
while ((cInChar = (char) getc (stdin)) != EOF)
|
|
{
|
|
/* Check if char. is in aszValid list, if so cook, */
|
|
/* else let it pass though raw. */
|
|
nTmpCnt2 = nValidSize;
|
|
while (nTmpCnt2 && aszValid [nTmpCnt2] != cInChar)
|
|
nTmpCnt2--;
|
|
if (nTmpCnt2)
|
|
{
|
|
/* Update key cells, excluding head and tail. */
|
|
for (nTmpCnt1 = 1; nTmpCnt1 <= WIDTH; nTmpCnt1++)
|
|
asCells [fActive] [nTmpCnt1] =
|
|
asCells [fActive ^ 1] [nTmpCnt1 - 1] ^
|
|
(asCells [fActive ^ 1] [nTmpCnt1] |
|
|
asCells [fActive ^ 1] [nTmpCnt1 + 1]);
|
|
/* Update head of key cells. */
|
|
asCells [fActive] [0] =
|
|
asCells [fActive ^ 1] [WIDTH + 1] ^
|
|
(asCells [fActive ^ 1] [0] |
|
|
asCells [fActive ^ 1] [1]);
|
|
/* Update tail of key cells. */
|
|
asCells [fActive] [WIDTH + 1] =
|
|
asCells [fActive ^ 1] [WIDTH] ^
|
|
(asCells [fActive ^ 1] [WIDTH + 1] |
|
|
asCells [fActive ^ 1] [0]);
|
|
/* Get char shift offset value */
|
|
cInChar = (asCells [fActive] [1] & 0x7f) % WIDTH;
|
|
/* Get char shift value */
|
|
cInChar = asCells [fActive] [(cInChar ? cInChar : WIDTH)];
|
|
/* Switch to updated key cells for next pass. */
|
|
fActive ^= 1;
|
|
/* If decode is TRUE then shift left though aszValid, else */
|
|
/* shift right (negative numbers in cInChar reverses this). */
|
|
if (fDecode)
|
|
{
|
|
/* Needed to bypass warning message (turbo C++ gets */
|
|
/* confused sometimes when it sees a single '=' in */
|
|
/* an 'if' statement, even though it is bracket to be */
|
|
/* evaluated before the 'if'). */
|
|
#ifdef __TURBOC__
|
|
if ((cInChar = nTmpCnt2 - cInChar) != 0)
|
|
#else
|
|
if ((cInChar = nTmpCnt2 - cInChar))
|
|
#endif
|
|
{
|
|
if ((cInChar %= nValidSize) < 1)
|
|
cInChar = nValidSize + cInChar;
|
|
}
|
|
else
|
|
cInChar = nValidSize;
|
|
}
|
|
else
|
|
if (!(cInChar = (nTmpCnt2 + cInChar) % nValidSize))
|
|
cInChar = nValidSize;
|
|
/* Write cooked char. to stdout. */
|
|
if (putc (aszValid [cInChar], stdout) == EOF &&
|
|
ferror (stdout))
|
|
FatalErr (2);
|
|
}
|
|
else
|
|
/* Write raw char. to stdout. */
|
|
if (putc (cInChar, stdout) == EOF && ferror (stdout))
|
|
FatalErr (2);
|
|
}
|
|
/* Check for file error on stdin. */
|
|
if (ferror (stdin))
|
|
FatalErr (3);
|
|
/* End program run. */
|
|
exit (0);
|
|
}
|
|
|
|
void FatalErr (ErrNum)
|
|
int
|
|
ErrNum;
|
|
{
|
|
/* In every life a little rain must fall. */
|
|
/* Complain and bail out. */
|
|
fprintf (stderr, "\n%s\n", aszErrMsg [ErrNum - 1]);
|
|
exit (ErrNum);
|
|
}
|
|
|
|
+---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+
|
|
|
|
]============================================================================[
|
|
|
|
...uunet!underg!tsf!gnr (GodNet Raider)
|
|
-=[ "You gotta learn to listen, before you learn to play." ]=-
|
|
|
|
------------------------------------------------------------------------------
|
|
##############################################################################
|
|
------------------------------------------------------------------------------
|
|
|
|
To: hackers@tsf.UUCP
|
|
Subject: Text phile 5.
|
|
From: bbc@tsf.UUCP (The BBC)
|
|
Organization: The CyberUnderground
|
|
|
|
Da da.. da da dup... Da da.. da da dup... Da da.. da da dup...
|
|
Yes boys and girls... It time once again for your favorite waste
|
|
of humanity... Yes it the BBC's Hackit J. Squirrel and crashwinkel
|
|
The moose show... So put your antlers on and lets now go to the
|
|
magical land of frostbite Falls Min. An see what our heroes are up
|
|
to...
|
|
|
|
Golly gee Hack... Every time I crash a sysops hard drive with
|
|
a trojan... they just reformat the drive and reinstall the
|
|
software and are up and running again... I wish there was a way
|
|
to bring them down that would really give them something to think
|
|
about...
|
|
|
|
Maybe there is lets go see Mr. Woopie and his 3D BBC,
|
|
crashwinkel...
|
|
|
|
So our HEROES went to see Mr. Woopie... But where confronted
|
|
by Tennessee tuxedo and his friend chumly... But a quick squeeze
|
|
of the trigger on their semi automatic weapons and a short thank
|
|
you note to the NRA... An they where in...
|
|
|
|
So you boys want to know how to cause more than just data loss
|
|
with trojans? Well lets ask the 3D BBC...
|
|
|
|
Thank you Mr. Woopie... It sounds like you boys want to hear
|
|
about how to force hardware problems using software... 'Wow
|
|
Hacket.I only thought you could only do major data loss with
|
|
trojans.'... Yes but there are other nasties you could pull if you
|
|
want to...
|
|
|
|
Take this simple bit of code for example:
|
|
|
|
===============================================================
|
|
mov Ax, 0508h
|
|
mov CX, 8001h
|
|
mov DX, 0000h
|
|
int 13
|
|
===============================================================
|
|
|
|
This small bit of codes just moves the disk heads past the inner
|
|
most track... 'But what good is that BBC?'... Well our furry little
|
|
friend... Some disks will lock and the only way to fix it is to open
|
|
the bugger up... An since the only way to be sure this will or won't
|
|
work is to try it... Well...
|
|
|
|
Or how about this bit of code:
|
|
|
|
===============================================================
|
|
xor Al, Al
|
|
NextPass:
|
|
mov DX,ffffh
|
|
NextPort:
|
|
out DX, AL
|
|
dec DX
|
|
jnz NextPort
|
|
inc AL
|
|
jmp short NextPass
|
|
===============================================================
|
|
|
|
We like to call it armageddon... 'Ohhh, Ahhhh'... It simply
|
|
looks for and writes to every port in the system... An based
|
|
on the hardware in the system it can... Toast monitors, Change CMOS
|
|
values, Change stepper rates, Change voltages (to burn/disable cards,
|
|
boards, and memory), Reek havoc on co-processers, Disable networks,
|
|
As well as other nasties too numerous to mention... Seeing that there
|
|
is some time involved in writing all those ports... The poor fool
|
|
has some time to guess what is going on and shut the computer down
|
|
(oh about 4 min.)... 'But we can't test things like that on our
|
|
computers.' 'How will we know if it will work or not.'... Who said
|
|
to test it on your systems... Not that we would suggest you test
|
|
it on others systems... That would make you a wast of humanity
|
|
like...
|
|
|
|
The BBC
|
|
|
|
----------------------------------------------------------------------
|
|
...uunet!galaxia!divinity!tsf!bbc (The BBC)
|
|
-=[ "Anarchy is never HAVING to say you're sorry." ]=-
|
|
|
|
------------------------------------------------------------------------------
|
|
##############################################################################
|
|
------------------------------------------------------------------------------
|
|
|
|
Invisible Killer Chips Now Available
|
|
|
|
|
|
Intelligence Newsletter (10 rue du Sentier, 75002 Paris, France)
|
|
No. 186 (Jan. 29, 1992), page 2, ISSN 0997-7139
|
|
By: Jean-Bernard Condat (CCCF, B.P. 8005, 69351 Lyon Cedex 08, France)
|
|
|
|
|
|
The military use of computer viruses is often overblown, if not just
|
|
simple disinformation as in the recent Iraqi case. But researchers at
|
|
Boston University have developed and patented (U.S. patent 5 049 775)
|
|
an infinitely more offensive and effective anti-computer agent: the
|
|
silicon ant. Micro-electronics has perfected technologies for making
|
|
toys and machines so small that they are invisible.
|
|
|
|
Using piezoelectric ceramics which expand or contract under an
|
|
electric current, the researchers constructed a microscopic ship with
|
|
three "legs" on each side and a "cutter" in front. By alternating
|
|
current in different sides of each "leg", it bends forward or backward.
|
|
|
|
Under remote control the killer chips can be "walked" into a computer
|
|
and cut up other microscopic chips, turn around and "walk" away, leaving
|
|
invisible damage in the computer system. The killer chips could be solar
|
|
powered and therefore have an indefinite life-span.
|
|
|
|
|
|
PATENT DESCRIPTION
|
|
|
|
|
|
008245420 WPI Acc No: 90-132421/17
|
|
XRPX Acc No: N90-102550
|
|
Piezoelectric micro-machine or robot basic operating unit - made by
|
|
covering silicon cantilever beams projecting from frame with
|
|
piezoelectric material when applied voltages cause them to deflect
|
|
Patent Assignee: (UYBO-) BOSTON UNIV
|
|
Author (inventor): SMITS J G
|
|
Number of Patents: 002
|
|
Patent Family:
|
|
CC Number Kind Date Week
|
|
WO 9003665 A 900405 9017 (Basic)
|
|
US 5049775 A 910917 9140
|
|
Priority Data (CC,No,Date): US 251565 (880930);
|
|
Applications (CC,No,Date): WO 89US4129 (890921);
|
|
EP and/or WO Language: English
|
|
EP and/or WO Cited Patents:
|
|
No.SR.Pub
|
|
Designated States (National): JP (Regional): AT; BE; CH; DE; FR; GB; IT; LU
|
|
; NL; SE
|
|
|
|
Abstract (Basic): WO 9003665
|
|
|
|
An electrical micromachine is made by securing films (20,22) of
|
|
piezoelectric material to the top surfaces (16,18) of crystalline
|
|
silicon beams (12,14) projecting from a crystalline silicon body (10)
|
|
to form a bimorph structure. A potential applied across the ends
|
|
(24,26) of the piezoelectric films causes the beams to deflect. The
|
|
piezoelectric material used is zinc oxide.
|
|
A number of such micromachines can be assembled to form a robot,
|
|
and when a foot (30) is provided the machine can move itself along a
|
|
surface by sequential deflecting and straightening of the beams. The
|
|
foot can be associated with a toothed wheel to produce rotary motion.
|
|
The micromachine may be solar powered, and can be associated with
|
|
sensors or a microprocessor with programmable memory.
|
|
USE - Microsurgical tools, and robots for grasping, carrying or
|
|
cutting tasks. @(33pp Dwg.No.1/10)@
|
|
|
|
Abstract (US): 9140 US 5049775
|
|
|
|
The piezoelectric actuation machine comprises two cantilever beams
|
|
extending from a frame. The beams comprise a piezoelectric material
|
|
such that application of an electric potential across the material of
|
|
each beam rotationally diplaces the first and second beams relative to
|
|
each other.
|
|
An actuating member is secured between displaceable surfaces on
|
|
the beams and extends orthogonally from a plane through the beams such
|
|
that relative displacement of the beams displaces a portion of the
|
|
member in a direction orthogonal to beam displacement. A rigid object
|
|
contacting the displaced portion of the member is translated relative
|
|
to the member and the frame.
|
|
USE - For piezoelectric micromachines e.g. small robot or cutting
|
|
tool. @(17pp)@
|
|
|
|
File Segment: EPI
|
|
Derwent Class: S05; V06; X25; R46;
|
|
Int Pat Class: H01L-041/09
|
|
Manual Codes (EPI/S-X): S05-B; V06-M06D; X25-A03E
|
|
|
|
|
|
Jean-Bernard Condat
|
|
General Secretary
|
|
Chaos Computer Club France
|
|
B.P. 8005
|
|
69351 Lyon Cedex 08, France
|
|
Tel.: +33 78 61 15 88
|
|
<uunet!mcimail.com!0005013469>
|
|
|
|
------------------------------------------------------------------------------
|
|
##############################################################################
|
|
------------------------------------------------------------------------------
|
|
|
|
Short Takes:
|
|
-----------
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
From: uunet!uga.cc.uga.edu!ART30275%NUSVM.BITNET (PeeWee)
|
|
|
|
Hey, press alt-200 (on the numberpad) to access the highest level
|
|
menu in Remote Access v1.10. Often lets u shell out to DOS.
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
From: uunet!CUNYVM.CUNY.EDU!ART30275%NUSVM.bitnet (PeeWee)
|
|
|
|
Hey! have you got your copy of The little black book of
|
|
Computer viruses yet?
|
|
|
|
It's very detailed and good! I had to order it and have it
|
|
shipped over here to me, took me about 3 months (worth the wait!)
|
|
The ISBN is 0-929408020 Author: Mark Ludwig, Publisher: American Eagle
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
From: Wes Morgan <uunet!engr.uky.edu!morgan>
|
|
|
|
Obligatory Information Pointers:
|
|
|
|
List of Online Library Catalogs:
|
|
Anonymous ftp from ftp.unt.edu (129.120.1.1) in directory /pub/library.
|
|
Versions are available in plaintext, PostScript, and WordPerfect 5.0.
|
|
|
|
[Editor's note: With these lists of online library catalogs you can find out
|
|
much information by learning what libraries have the info
|
|
that you need, and then requesting it via an inter-library
|
|
loan.]
|
|
|
|
DEC's new Alpha chip (for you hardware fanatics):
|
|
Call 1-800-332-2717 and ask for the "Alpha Packet". They'll send you
|
|
the Architecture Handbook (detailed) and more information about the
|
|
Alpha chip.
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
From: Max Cray <max%underg@uunet.uu.net>
|
|
|
|
On a VMS system you can not simply type 'CC HELLO.C' to compile a C
|
|
program. First you have to define a Link Library. This command will work
|
|
for a generic program that does not need floating point:
|
|
|
|
DEFINE LNK$LIBRARY SYS$LIBRARY:VAXCRTL
|
|
|
|
For more information use the excellent help system in VMS. Simply Type
|
|
'HELP CC'.
|
|
|
|
------------------------------------------------------------------------------
|
|
##############################################################################
|
|
------------------------------------------------------------------------------
|
|
|
|
PAID POLITICAL ADVERTISEMENT
|
|
|
|
UPi has once again returned and it no longer the shit group it used to be in
|
|
the past. UPi is a group that puts out newsletters that deals with the
|
|
H/P/C/A world. In the past, our newsletters averaged only 1 article in length
|
|
(which in size means a range of 25-50k) but now in the all new UPi newsletter
|
|
we have decided to expand it so it will contain more articles (and all quality
|
|
articles which means no more of those little shitty files that contains
|
|
useless information). What we are looking for are quality members and sites
|
|
that are willing to contribute to the group and support the group. We are
|
|
also looking for people who can freelance write for us too. We are looking
|
|
for people who are experienced in electronics and chemistry, and as well as
|
|
any of the P/H/C/A topics. If you would like to join UPi either as a site or
|
|
a member or become a freelance writer for us please send mail to The Lost
|
|
Avenger via internet e-mail to the following address Tla@Maria.Wustl.Edu or
|
|
you can contact him on his voice mail box at 416-402-0788.
|
|
|
|
The Lost Avenger/UPi
|
|
|
|
------------------------------------------------------------------------------
|
|
##############################################################################
|
|
------------------------------------------------------------------------------
|
|
|
|
From: uunet!isis.cs.du.edu!ahawks (floyd)
|
|
Subject: FutureCulture Update
|
|
To: hackers%underg@uunet.uu.net
|
|
Date: Tue, 12 May 92 20:38:20 MDT
|
|
|
|
[Editor's note: This is an edited version of Hawkeye's excellent e-mail
|
|
FutureCulture listing. It is intended to deal with the entire CyberPunk/Rave
|
|
scene and thus is rather large and comprehensive. I edited out most of the
|
|
cultural listings, and left most of the tech listings, since I intend for
|
|
the DFP to be more of a technical journal. However it is highly recommended
|
|
that you send him mail and get on the mail list.]
|
|
|
|
_____________________________________________________________________________
|
|
| |
|
|
| Magazines (hardcopy) of interest: |
|
|
|_____________________________________|
|
|
|
|
Communications of the ACM
|
|
(Association for Computing Machinery, Inc.)
|
|
-sorry, don't have the address or subscription info, but should be
|
|
available at any decent newsstand - also, the ACM has forums
|
|
available on the Internet
|
|
|
|
Cybertek
|
|
OCL/Magnitude
|
|
PO Box 64
|
|
Brewster, NY 10509
|
|
-hacking, cyberpunks, technology, culture
|
|
$10 a year
|
|
|
|
Fact Sheet Five
|
|
6 Arizona Avenue
|
|
Rensselaer, NY 12144-4502
|
|
518.479.3707
|
|
-independently-oriented reviewers of the culture
|
|
$3.50 an issue, $33 a year for 8 issue subscriptions
|
|
(unconfirmed rumors say it's no longer in production)
|
|
|
|
Hac-Tic
|
|
pb 22953, 1100 DL
|
|
Amsterdam, The Netherlands
|
|
ropg@ooc.uva.nl (Internet)
|
|
-published near that hotbed of hackers in holland/amsterdam
|
|
European counterpart to 2600
|
|
$2.30 US an issue
|
|
|
|
[Editor's note: The above is not in English! Is there a translator?]
|
|
|
|
Intertek: The Cyberpunk Journal
|
|
Steve Steingerg
|
|
325 Ellwood Beach #3
|
|
Goleta, CA 93117
|
|
steve@cs.ucsb.edu
|
|
-formerly Frank Drake's W.O.R.M
|
|
hacking, cyberspace, interviews, designer drugs, cryonics, etc.
|
|
$2.50 an issue
|
|
|
|
Iron Feather Journal
|
|
PO Box 1905
|
|
Boulder, CO 80306
|
|
-hacking, anarchy, techno-phun
|
|
$2 an issue
|
|
|
|
Mondo 2000
|
|
PO Box 10171
|
|
Berkeley, CA 94709
|
|
415.845.9018 (phone)
|
|
415.649.9630 (fax)
|
|
mondo2000@mcimail.mci.com
|
|
-your definitive guide to all things cyberpunk and some things not
|
|
should be available at any decent newsstand
|
|
was Reality Hackers and High Frontiers
|
|
$21 for 5 issues (published quarterly)
|
|
|
|
TAP
|
|
PO Box 20264
|
|
Louisville, KY 40250
|
|
-the original phreaker's rag, begun by Abbie Hoffman
|
|
formerly YIPL (Youth International Party Line) and then it was
|
|
Technilogical Assistance Program, now it's
|
|
Technilogical Advancement Party
|
|
hacking, anarchy, some political
|
|
has undergone many publishing changes
|
|
operates Blitzkrieg BBS @ 502.499.8933
|
|
TAP-Online also available on some BBSes / FTP sites
|
|
|
|
2600
|
|
PO Box 752
|
|
Middle Island, NY 11953-0752
|
|
516.751.2600 (office)
|
|
516.751.2608 (fax)
|
|
2600@well.sf.ca.us (Internet)
|
|
-the original infamous hacker's zine
|
|
subscriptions are $21 for 4 issues (published quarterly)
|
|
back issues are $25 / year
|
|
|
|
[Editor's note: They also have meetings on the first friday of the month in
|
|
New York City.]
|
|
|
|
Whole Earth Review
|
|
PO Box 38
|
|
Sausalito, CA 94966-9932
|
|
(Whole Earth runs The Well [Whole Earth Lectronic Link] - well.sf.ca.us)
|
|
-combines new age, techno-culture, california fads, etc.
|
|
should be available at any decent newsstand
|
|
$20 year for subscriptions
|
|
|
|
____________________________________________________________________________
|
|
| |
|
|
| E-Magazines and digests: |
|
|
|_____________________________|
|
|
|
|
[Editor's note: I edited out the listings that did not have references on how
|
|
to get them. Suffice it to say that there are many more journals available
|
|
that are not listed here. See some of the Internet and BBS listings for
|
|
places to find these items.]
|
|
|
|
Activist Times Incorporated
|
|
gzero@tronsbox.xei.com
|
|
-political, hacking, anarchy
|
|
|
|
Computers and Academic Freedom
|
|
listserv@eff.org <add comp-academic-freedom-news>
|
|
-computing freedom, mostly deals with college campuses
|
|
|
|
Computer Underground Digest
|
|
tk0jut2@niu.bitnet
|
|
|
|
Digital Free Press
|
|
dfp-req%underg@uunet.uu.net
|
|
-hacking, information, etc.
|
|
|
|
EFF News (EFFector Online)
|
|
effnews-request@eff.org
|
|
-sends out EFFector Online, the Electronic Frontier foundation's
|
|
e-journal
|
|
|
|
Freaker's Bureau International
|
|
au530@cleveland.freenet.edu
|
|
-anarchy, hacking, cyberpunk
|
|
|
|
Informatik
|
|
inform@doc.cc.utexas.edu
|
|
-hacking, phreaking, computer underground, cyberpunk, etc.
|
|
|
|
Network Information Access
|
|
nia@nuchat.sccsi.com
|
|
-hacking, computer underground, etc.
|
|
|
|
Phantasy
|
|
Mercenary@f515.n141.z1.fidonet.org
|
|
-anarchy, hacking
|
|
|
|
Phrack
|
|
phracksub@stormking.com
|
|
-need we say more - the one, the only hacking e-zine...
|
|
|
|
Pirate Radio
|
|
brewer@ace.enet.dec.com
|
|
-pirate radio
|
|
|
|
RISKS Digest
|
|
risks-request@csl.sri.com
|
|
-the RISKS of computing in our lives
|
|
|
|
Telecom Privacy Digest
|
|
telecom-priv-request@pica.army.mil
|
|
-deals with privacy aspects of telecommunications
|
|
most of the conversation revolves around Caller-ID and such
|
|
|
|
Telecom Digest
|
|
telecom-request@eecs.nwu.edu
|
|
-deals with all aspects of telecommunications
|
|
|
|
Virus-l Digest
|
|
krvw@cert.sei.cmu.edu
|
|
(also virus-l on BITNET)
|
|
-discussion of viruses and all aspects of 'em
|
|
|
|
Worldview - Der Weltanschauung
|
|
fox@nuchat.sccsi.com
|
|
-hacking, computer underground, church of subgenius, political, etc.
|
|
|
|
_____________________________________________________________________________
|
|
| |
|
|
| E-Mail Addresses: |
|
|
|____________________|
|
|
|
|
(please use care and consideration when mailing to these people)
|
|
|
|
Aristotle uk05744@ukpr.uky.edu
|
|
John Perry Barlow barlow@well.sf.ca.us
|
|
Dorothy Denning denning@cs.georgetown.edu
|
|
Peter J Denning pjd@cs.gwu.edu
|
|
Desert Fox dfox@taronga.com
|
|
Dispater dispater@stormking.com
|
|
The EFF eff@eff.org
|
|
Freaker's Bureau Int'l au530@cleveland.freenet.edu
|
|
Gatsby gatsby@ryptyde.tcs.com
|
|
Mike Godwin mnemonic@eff.org
|
|
Emmanuel Goldstein emmanuel@well.sf.ca.us
|
|
Ground Zero gzero@tronsbox.xei.com
|
|
Hactic ropg@ooc.uva.nl
|
|
Hawkeye (put this art. together)ahawks@nyx.cs.du.edu
|
|
Intertek steve@cs.ucsb.edu
|
|
Judge Dredd elisem@nuchat.sccsi.com
|
|
Mitch Kapor mkapor@eff.org
|
|
Knight Lightning (Craig Neidorf)knight@well.sf.ca.us
|
|
kl@stormking.com
|
|
Lord Macduff macduff@nuchat.sccsi.com
|
|
Mentor (Lloyd Blankenship) cs.utexas.edu!dogface!fnordbox!loydb
|
|
Mondo 2000 mondo2000@mcimail.mci.com
|
|
Gordon Meyer 72307.1502@compuserve.com
|
|
Peter G Neumann neumann@csl.sri.com
|
|
Pengo (Hans Heubner) hans@trabant.at
|
|
John S Quarterman jsq@tic.com
|
|
Len Rose len@netsys.netsys.com
|
|
RU Sirius rusirius@well.sf.ca.us
|
|
Cliff Stoll cliff@cfa.harvard.edu
|
|
Michael Synergy synergy@metaphor.com
|
|
Jim Thomas tk0jut1@niu.bitnet
|
|
Tuc tuc@stormking.com
|
|
2600 2600@well.sf.ca.us
|
|
|
|
[Editor's note: How about Eric S. Raymond author of 'The New Hacker's
|
|
Dictionary'? He is at: eric@snark.thyrsus.com.
|
|
|
|
Also Belgorath provides these alternate addresses:
|
|
|
|
Hans Huebner (aka Pengo) is hans@trabant.artcom.de, or
|
|
hans@skoda.vie.artcom.de
|
|
|
|
Cliff Stoll (No known alias) is stoll@earthquake.berkeley.edu]
|
|
|
|
_____________________________________________________________________________
|
|
| |
|
|
| FTP Sites: |
|
|
|______________|
|
|
|
|
(all of these sites carry either computer underground information, information
|
|
on drugs, music, subgenius, etc.)
|
|
|
|
18.26.0.36 lcs.mit.edu
|
|
18.26.0.179 zurich.ai.mit.edu
|
|
128.6.4.15 pyrite.rutgers.edu
|
|
128.6.60.6 quartz.rutgers.edu
|
|
128.8.2.114 sayshell.umd.@edu
|
|
128.83.132.20 ??
|
|
128.95.136.1 milton.u.washington.edu
|
|
128.100.3.6 ftp.cs.toronto.edu
|
|
128.135.46.7 ??
|
|
128.135.252.7 ??
|
|
128.174.5.50 @uxc.@cso.@uiuc.@edu
|
|
128.214.6.100 @nic.@funet.fi
|
|
128.235.33.1 ??
|
|
128.252.135.4 @wuarchive.@wustl.@edu
|
|
129.173.4.5 cs.dal.ca
|
|
130.18.64.2 ??
|
|
130.43.2.3 bric-a-brac.apple.com
|
|
130.56.96.2 ??
|
|
130.71.192.18 stolaf.edu
|
|
130.234.0.1 jyu.fi
|
|
131.188.31.3 faui43.informatik.uni-erlangen.de
|
|
131.210.1.4 cs.uwp.edu
|
|
133.137.4.3 ??
|
|
134.60.66.21 ??
|
|
134.95.132.2 aix370.rrz.uni-koeln.de
|
|
137.39.1.9 uunet.uu.net
|
|
146.169.3.7 ??
|
|
192.88.144.4 eff.org
|
|
192.88.209.5 cert.sei.cmu.edu
|
|
_____________________________________________________________________________
|
|
| |
|
|
| BBSes: |
|
|
|__________|
|
|
201.451.3063 Wrong Number
|
|
203.485.0088 Rune Stone
|
|
203.628.9660 Dark Shadows
|
|
206.454.0075 Manta lair
|
|
209.526.3194 Tequilla Willie's Great Subterranean Carnival
|
|
214.324.3501 KeelyNet
|
|
214.522.5321 Dead Zone
|
|
215.449.1902 Time Enough for Love BBS
|
|
303.438.1481 The Kracker Box
|
|
303.871.4824 Nyx (public access unix)
|
|
312.528.5020 Ripco
|
|
401.847.2603 Underground
|
|
414.789.4210 PC Exec
|
|
415.332.6106 The Well
|
|
415.472.5527 The Cyberden
|
|
502.499.8933 Blitzkrieg
|
|
503.635.2615 Awakening Technology
|
|
512.447.4449 The Illuminati BBS
|
|
517.337.7319 Pure Nihilism
|
|
602.861.3167 Frayed Ends
|
|
617.475.6187 Convent
|
|
617.861.8976 The Works
|
|
618.549.4955 Free Speech
|
|
708.672.5426 World Trade Center
|
|
713.242.6853 Face-2-Face
|
|
718.358.9209 Switchboard
|
|
718.428.6776 Milliways
|
|
806.794.4362 Demon Roach Underground
|
|
914.761.6877 Uncensored
|
|
916.673.8412 Greenpeace's Inverted Granola Bar
|
|
|
|
--
|
|
|
|
[Editor's note: The Underground is no longer up (I moved). Perhaps at a
|
|
later date I will put it back up.
|
|
|
|
Other Boards I know about:
|
|
|
|
408.241.9760 NetCom - Network Access
|
|
|
|
408.245.7726 darkside.com (The Waffle support BBS)
|
|
|
|
408.867.7400 Spies in the Wire
|
|
Most Notorius hangout for hardened Cyber-
|
|
Criminals. Ask for access to 'The Good Stuff'
|
|
and tell them Max sent ya.
|
|
|
|
602.894.1757 Unphamiliar Territory
|
|
NUP (New user Password) 'Bunnylust'
|
|
|
|
717.361.0947 Digital Warfare
|
|
Phalcon-Skism, 40 Hex Mag, Viruses
|
|
(Sorry, forgot the NUP)
|
|
|
|
916.481.2306 Phun Line
|
|
Password 'Darkness has Fallen'
|
|
|
|
359.2.20.4198 Virus eXchange BBS in Sofia, Bulgaria
|
|
Working hours:
|
|
20:00 - 06:00 GMT (in the winter)
|
|
19:00 - 05:00 GMT (in the summer)
|
|
|
|
Also the NUP for Blitzkrieg is 'Columbian Coke'.]
|
|
_____________________________________________________________________________
|
|
| |
|
|
| Merchandise/Companies: |
|
|
|__________________________|
|
|
|
|
(a lot of the companies on this list are on the very edge of the underground,
|
|
and would not exist but for the 1st amendment - please use caution and care
|
|
when dealing with these people, and don't abuse them, otherwise you'll ruin it
|
|
for us all!)
|
|
|
|
Abbie Yo-Yo Inc.
|
|
PO Box 15
|
|
Worcester, MA 01613
|
|
-things related to Abbie Hoffman
|
|
|
|
Amok
|
|
PO Box 861867 Terminal Annex
|
|
Los Angeles, CA 90086-1867
|
|
-hard to find/underground books
|
|
catalog is a whopping $9 (400 pages)
|
|
|
|
Autodesk, Inc.
|
|
2320 Marinship Way
|
|
Sausalito, CA 94965
|
|
-makers of Chaos software. $59.95
|
|
|
|
Books by Phone
|
|
Box 522
|
|
Berkeley, CA 94701
|
|
800.858.2665 (orders)
|
|
510.548.2124 (info)
|
|
-large library of hard-to-find books related to CP, drugs, etc.
|
|
nice resource, but you pay a lot for it :-)
|
|
|
|
Consumertronics
|
|
2011 Crescent Dr.
|
|
PO Drawer 537
|
|
Alamogordo, NM 88310
|
|
505.434.0234
|
|
500.434.0234 (fax - orders only)
|
|
-hacking/phreaking manuals
|
|
|
|
Feral House Productions
|
|
PO Box 861893
|
|
Los Angeles, CA 90086-1893
|
|
-obscure books
|
|
|
|
Further Connections
|
|
Waves Forest
|
|
PO Box 768
|
|
Monterey, CA 93940
|
|
-fringe science
|
|
|
|
Kodak's Center for Creative Imagining
|
|
800.428.7400
|
|
-offers classes in electronic imaging "taught by artists and industry
|
|
experts with state-of-the-art technology"
|
|
anyway, call 'em and ask 'em for their catalogue - might be decent
|
|
(at least the ad in Mondo looks nifty :-)
|
|
|
|
Loopmanics, Ltd.
|
|
PO Box 1197
|
|
Port Townsend, WA 98368
|
|
-carries a large collection of underground/hard-to-find books and stuff
|
|
send for a catalog
|
|
|
|
NewTek, Inc.
|
|
215 SE 8th St.
|
|
Topeka, KS 66603
|
|
800.843.8934
|
|
-makers of the great Video Toaster
|
|
send 'em $4.95 for a demo tape of what the Video Toaster does
|
|
|
|
Paladin Press
|
|
PO Box 1307
|
|
Boulder, CO 80306
|
|
-obscure books
|
|
|
|
Re/Search Publications
|
|
70 Romolo Street #B
|
|
San Franssico, CA 94133
|
|
|
|
Rip Off Press
|
|
PO Box 4686
|
|
Auburn, CA 96504
|
|
|
|
Sense8
|
|
1001 Bridgeway #477
|
|
sausalito, CA 94965
|
|
415.331.6318
|
|
415.331.9148 (fax)
|
|
-vr firm
|
|
|
|
Survival Books
|
|
11106 Magnolia Blvd.
|
|
North Hollywood, CA 91601
|
|
|
|
TOPYUS (Psychic TV)
|
|
PO Box 18223
|
|
Denver, CO 80218
|
|
-Genesis P-Orridge's Psychic TV
|
|
send a SASE for info on Psychic TV, catalogs, albums, t-shirts,
|
|
videos, books, etc.
|
|
|
|
Virtual Research
|
|
1313 Socorro Ave
|
|
Sunnyvale, CA 94089
|
|
408.739.7114
|
|
-a vr firm
|
|
|
|
VPL Research, Inc.
|
|
656 Bair Island Rd. Suite 304
|
|
Redwood, CA 94063
|
|
415.361.1710
|
|
-Jaron Lanier's famous virtual reality firm
|
|
|
|
Zentech
|
|
Box 138
|
|
Morgan Bay Rd.
|
|
Surry, ME 04684
|
|
-cyberpunk, virtual reality merchandise
|
|
|
|
_____________________________________________________________________________
|
|
| |
|
|
| see ya! |
|
|
|___________|
|
|
Welp, that looks like it for now. Have fun!
|
|
|
|
Again, if you have any questions/comments/concerns/criticisms/corrections or
|
|
any additional info, please contact me at ahawks@nyx.cs.du.edu - or on The
|
|
Kracker Box BBS at 303.438.1481.
|
|
|
|
I can be reached at: ahawks@nyx.cs.du.edu, or ahawks@isis.cs.du.edu.
|
|
|
|
------------------------------------------------------------------------------
|
|
##############################################################################
|
|
------------------------------------------------------------------------------
|
|
|
|
Personal Notes: Hello to the RI Hackers from the New Texas Hacker.
|
|
Metacom2 send me mail!
|
|
|
|
Well folks, thats all for DFP #4.
|
|
|
|
Keep that e-mail coming!
|
|
|
|
|
|
|
|
Downloaded From P-80 International Information Systems 304-744-2253
|