734 lines
36 KiB
Plaintext
734 lines
36 KiB
Plaintext
Chaos presents:
|
|
|
|
|
|
|
|
Anarchy!!
|
|
|
|
Vol I # 1
|
|
-------------------------------------------------------------------------
|
|
|
|
Welcome to Anarchy!, a new mag from Chaos. As a person who wrote the
|
|
terrormag series, I wanted to continue to write such mags but expand
|
|
them. Joining Chaos was the best thing I could have done for this. When I
|
|
looked at 2 mags called Phun and Phrack, hacking mags, I liked their
|
|
format and decided to do a newsfile that was more like that. This mag is
|
|
currently looking for 1 more editor and several writers for the mag and
|
|
we are looking for submissions to this mag. I don't care what your
|
|
article is about. If its on hacking, phreaking, the pirate world, a BBS
|
|
review, I don't care. I would like to see it computer related but that is
|
|
not neccessary. Things such as incendiary devices explained easily or
|
|
"How to sabatoge a bridge" or things of that nature are acceptable.
|
|
Editorials <about this mag, the group, the group's activities or BBS's or
|
|
sysops or any BBS related topic> are more than welcome. And now, on to
|
|
the show.
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
Table of Contents
|
|
|
|
1) Introduction
|
|
2) Operation Sun Devil- What happened
|
|
3) Operation Sun Devil- New Twists in the case
|
|
4) The truth about Caller ID (ANI)
|
|
5) Begining Lockpicking
|
|
6) General BBS news
|
|
7) Chaos News
|
|
8) BBS reviews
|
|
9) Networking
|
|
10) The Conscience of a Hacker
|
|
|
|
-------------------------------------------------------------------------
|
|
Anarchy!!
|
|
Article 2 of 10
|
|
by Iys Kyewb
|
|
What happened with Sun Devil
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
Unless you have been in a cave or your modem broke, preventing you from
|
|
logging on any BBS's, there was a national raid on hackers in mid May.
|
|
This raid, dubbed Operation Sun Devil, resulted in at least 28 search
|
|
warrants in 14 cities and 7 arrests according to the police. I estimate
|
|
that more than 20 people have been arrested as a direct result of Sun
|
|
Devil. One teenager in long island was arrested, supposedly using the
|
|
handle "Crazie Eddie" and was charged with "Computer tampering and
|
|
trespass, and unlawful use of a computer and theft of services." The 1st
|
|
two charges are felonies while the other two are misdemenor charges. All
|
|
in all, over 24,000 disks were confiscated, as well as dozens of computer
|
|
systems. This operation made arrests in early april on some hackers in
|
|
the Legion of Doom <LOD> because the feds believed they posed a
|
|
"frightening threat" to individuals and institutions. It was alleged that
|
|
they were capable of disrupting 911 emergency phone service in at least 6
|
|
states. <911 is a joke, btw.>
|
|
Much of my information came from New York Newsday and other newspapers
|
|
but we all know the press is hardly fair in its treatment of hackers and
|
|
in reporting anything dealing with computers. I should subscribe to 2600
|
|
and get the real truth, or at least attend one of their meetings. I think
|
|
its funny how the feds go all out to bust hackers, but don't seem this
|
|
agressive to do anything in our war against drugs, or to fight
|
|
homelessness or to help improve education. Here's a quote from NY Newsday
|
|
and assistant secret service director Garry M. Jenkins: "Today, the
|
|
secret service is sending a clear message to those hackers who have
|
|
decided to violate the law of this nation." According to various phone
|
|
companies and other companies, the fraud perpetrated by some of the
|
|
hackers who were busted <and other hackers not yet caught> cost them more
|
|
than $50 million in telephone services.
|
|
|
|
-------------------------------------------------------------------------
|
|
Anarchy!!
|
|
Article 4 of 10
|
|
by Iys Kyewb
|
|
More on Sun Devil
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
As I purchased the Sunday newspapers as I do every week, I rarely
|
|
purchased the NY Times. However, I scanned the headlines and noticed this
|
|
headline on page 1:
|
|
|
|
"Drive to Counter Computer Crime Aims at Invaders"
|
|
"Legitimate Users Voice Worries Over Rights"
|
|
|
|
I looked at it harder and promptly purchased the Times. With Sun Devil
|
|
over, and certainly newer investigations into hacking activities, there
|
|
are some questions that needed answers. Are these hackers really a threat
|
|
to comerce, research and national security? Is the government violating
|
|
these alleged hacker's civil rights or anyone's for that matter in their
|
|
attempts to stop this "threat" to security? Some civil liberties experts
|
|
say that the crackdown on hackers is affecting computer users who are not
|
|
breaking the law. These users are being intimidated and searched
|
|
illegally and other violations of their civil liberties, such as the
|
|
freedom of speech. It is parallel to the campaign against drugs, where
|
|
minorities are always subject to questioning by police and youths
|
|
assaulted by cops under the pretense the youths were arrested for drug
|
|
usage.
|
|
|
|
Stephen McNamee, the US Attorney for Arizona and a central figure in the
|
|
government's efforts against computer crime, says "It's a whole new era.
|
|
Computers are providing a new avenue for criminal activities. It is
|
|
possible to transmit computer information for an illegal purpose in the
|
|
blink of an eye." Fortunately, some people think the government is going
|
|
too far, like a California Democrat named Don Edwards. He says "Every
|
|
time there is a percieved crisis, law-enforcement agencies and
|
|
legislators overreact, and usually due process and civil liberties
|
|
suffer. The Fourth Amendment provides strict limits on rummaging through
|
|
people's property."
|
|
|
|
A tradgedy of this operation, and an example of innocent people suffering
|
|
from government actions is a computer game maker. he has not been
|
|
charged, yet investigators have seized his equipment and have not
|
|
returned it as of yet. He is on the verge of going out of business as a
|
|
result. The secret service surreptitiously eavesdropped on BBS's and
|
|
telephone conversation in weeks prior to Sun Devil and have entered these
|
|
networks as legitimate users to trade information. The FBI interrogated
|
|
dozens of experts and hobbyists in an investigation of a theft of an
|
|
important program from Apple Computer Inc. last year. (I don't recall
|
|
what exactly it was, however, there was a protest of Apple's policy not
|
|
permiting macintosh clones from being built, and could have been related.
|
|
I also think this program was related to Macintosh's DOS or the windows
|
|
or Icons it uses.>
|
|
|
|
Civil libertarians and some business executives have begun to organize
|
|
defenses. Mitchell D. Kapor, creator of Lotus 1-2-3, is planning a
|
|
defense fund of several hundred thousand dollars for some of the accused
|
|
in Operation Sun Devil. Harvey Silvergate, a Massachusetts lawyer and
|
|
civil liberties expert working with mr. Kapor, said "You have innocent
|
|
people who are being terrorized as well as investigations of people who
|
|
have broken the law." He termed the government's actions as "typical
|
|
American [and Chinease by the way] solution: throw your best and
|
|
brightest in jail."
|
|
|
|
Some officials of the secret service, which has been the primary federal
|
|
enforcer of computer fraud laws since 1984, believe that an alarming
|
|
number of bright, young computer enthusiasts are using computers
|
|
illegally. "Often, a progression of criminal activity occurs which
|
|
involves telecommunication fraud, unauthorized access to other computers,
|
|
credit card fraud, and then moves on to other destructive activities like
|
|
computer viruses." said gary M. jenkins, secret service assistant
|
|
director.
|
|
|
|
Mr Kapor of Lotus said he believed the danger posed by the computer joy
|
|
riders had been greatly exagerated. "Now that the Communists aren't our
|
|
enemies anymore, the American psyche has to end up inventing new ones,"
|
|
he said. He and other experts are also alarmed by new investigative
|
|
techniques that employ computers. The power of advanced machines
|
|
multiplies the risk of search and seizure violations, these experts say,
|
|
because they can perform so many simultaneous tasks and absorb and
|
|
analyze so much information. Added to this problem is that legal
|
|
precedents are not clear on how the 1st amendment protects speech and the
|
|
4th amendment protects against searches and seizures in the electronic
|
|
world. My question is, is saying how to hack out a system, or codes for
|
|
examples illegal? Is my freedom of speech protected when I talk about how
|
|
to hack out codez, or distribute them? Having a 10 digit number suddenly
|
|
becomes illegal, and similar confusion exists. I thought using a code was
|
|
illegal. Computer Email could be swept up in a raid that is totally
|
|
unrelated to anything illegal, or at least to that investigation.
|
|
|
|
Updates on Sun Devil will come in future issues. If anyone has any
|
|
information about "The Hacker's Conference" which meets somewhere on the
|
|
west coast, please send correspondence to myself, Iys Kyewb on one of the
|
|
Chaos BBS's.
|
|
-------------------------------------------------------------------------
|
|
Anarchy!!
|
|
Article 4 of 10
|
|
by Iys Kyewb
|
|
The Truth to Caller ID (or Automatic Number Identification, ANI)
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
Is it big brother when you call someone and they know your phone number
|
|
before you can even say "hello"? I'm upset over the phone company's total
|
|
apathy over my right to privacy. What if I hadan unlisted number? What is
|
|
the purpose of unlisting your number when its readily avaiable to people
|
|
you call or businesses? It's hard to convince the phone company when you
|
|
call BBS's and don't necessarily want the sysop to know your phone
|
|
number, if you're poor like me and have only 1 line. I can imagine any or
|
|
all of you saying either "if you can't trust the sysop, don't call their
|
|
system" or "I hate getting out of the shower to find out its a sales
|
|
pitch" or whatever lame excuses. Just because I can't trust a sysop <who
|
|
can you really trust these days?> doesn't mean the sysop runs a terrible
|
|
BBS. Also, you need to get out of your shower or wake up or get away from
|
|
relaxing just to see what the phone number is of the person calling you .
|
|
And suppose its a call from your spouce or sibling or child and its from
|
|
a public phone? Are you not going to pick it up because the phone number
|
|
could be that of an organization? If you don't want to be bothered with
|
|
the ringing of the phone, turn off the ringer or unplug the phone. Your
|
|
right to privacy is not violated when someone calls your phone number. If
|
|
you truly feel it is, then talk to the phone company about getting a line
|
|
that cannot recieve calls, only make them. You could save some money and
|
|
your misconception of privacy is not violated. Of course, no one could
|
|
get through to you. Its like having a pager. Is getting a page a
|
|
violation of your rights? if you don't want to be bothered, turn it off,
|
|
ignore it or stop subscribing.
|
|
|
|
Now, there is the question of prank phone calls. ANI is a deterrent to
|
|
it, but so is a less costly and more private alternative. Call Blocking
|
|
and Call trace are 2 features that New Jersey Bell offers. Call blocking
|
|
prevents someone from making a call to your phone number from a specific
|
|
number. Example: joe from 555-1234 calls jane at 555-2345 to harass her.
|
|
With call blocking, she dials a code and the number she wants to block
|
|
<555-1234 in this case> and when joe calls, he gets a recording "This
|
|
number is no longer accepting phone calls." Joe would then assume her
|
|
phone is disconnected and obviously cannot prank her anymore. Of course
|
|
he could always try from another phone and she can only block 6 phone
|
|
numbers. But that is effective in reducing prank calls. Call trace is the
|
|
kicker. Rather than waiting for months for the phone company to put a
|
|
tracer on your line, dialing a simple code will initiate a trace of the
|
|
last phone call made to that number. Example: joe calls jane from
|
|
555-1234 100 times. jill calls jane from 555-1122 and tells her about
|
|
call trace. joe calls back at, say 8 am. jane leaves, goes to work and
|
|
comes home around 5pm. she has NOT recieved any phone calls. she presses
|
|
a few digits on the phone and call trace is initiated. It is assumed this
|
|
service will be used immediately after joe pranks her but that is not
|
|
necessary. Lala Land bell then traces the call to 555-2345 and will do
|
|
whatever they think is necessary to stop the calls, usually give the # to
|
|
the local police or something of that sort. With call trace costing $1
|
|
per trace and call block $6/month, its alot cheaper than ANI, costing at
|
|
$60 for the lousy unit and $6/month. It would take 60 traces initiated to
|
|
make up for the money lost in ANI which explains whi the companies hype
|
|
ANI instead of call block or call trace. My recommendation would be to
|
|
stop wasting money and take your phone # off the unlisted status because
|
|
once a company finds your number and address <compiled in a database>
|
|
they sell your addresses to other companies as a mailing list and you
|
|
will still recieve those annoying calls with a sales pitch. I personally
|
|
have never recieved one but I don't do much mail ordering myself.
|
|
|
|
-------------------------------------------------------------------------
|
|
Anarchy!!
|
|
Article 5 of 10
|
|
by Iys Kyewb
|
|
Begining Lock Picking
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
Ever get locked out of your room/house and wished you could get in
|
|
because your keys were sitting on your desk? Or wanted to enter someone
|
|
else's room to surprise them but you didn't have a key? Or just merely
|
|
wanted to know how to pick locks? Well, this is a begining guide to
|
|
lockpicking. I will make some recommendations. They are:
|
|
|
|
Do Not even try to pick Medeco locks unless you have ALOT of experience
|
|
with lock picking. These locks are extremely hard to pick because of the
|
|
way the lock is designed. Notice locksmiths charge more to duplicate them
|
|
than other, normal keys? Well, take a look at one. If you look at the top
|
|
of the notches, you will notice they are not all arranged in a straight
|
|
line. They are curved. With the pick I will show how to build, I even
|
|
doubt it is possible to pick this kind of lock. If it is possible, you'd
|
|
have to spend hours trying to pick it, and that defeats the whole purpose
|
|
of lockpicking.
|
|
|
|
The Pick I will show you does not work with Tubular locks, "skeleton key"
|
|
locks or other types like the fitchet kind. It is for basic, 1 slot keys.
|
|
Padlocks are good locks to try to pick with this.
|
|
|
|
First, you need to find a thin and somewhat long piece of metal that is
|
|
somewhat stiff but pliable enough to shape. How long? Judgement tells you
|
|
what length but if its really long, you can make 2 or even 3 tools. it
|
|
should be at least 13 inches so you can make 2 such tools, a pick and
|
|
torque bar. Now where do you find such a metal? Well, Oil Dipsticks, and
|
|
Automatic Transmission dipsticks are usually good, but try to find one
|
|
thinner and not so flexable. The best kind are from the brushes of the
|
|
street sweepers. Ever see them clean the streets? The brushes are made of
|
|
hundreds of metal strips that sweep debris from the gutter and supposedly
|
|
into the machine I guess. These metal pieces break off and are very much
|
|
suitable for this task. I think it is the easiest type of metal to use.
|
|
Where do you find them? Well, a friend told me to check out the gutters
|
|
where the machines sweep the streets. I checked out my neighborhood in
|
|
the Bronx and looked on 1 block and found nothing so I figured I'd have
|
|
to look elsewhere. However, when I was in Bayside, Queens recently, I
|
|
decides to look and I found over 20!!! pieces of these brushes, some
|
|
metal pieces were long enough to make 2 tools. I recommend looking nearby
|
|
sanitation depots. You could also approach the sweeper and pry off some
|
|
pieces but I don't know how hard that is.
|
|
|
|
Next, find a stone grinder. You can attach one to a drill but it works
|
|
best if you have one mounted on a desk or something. Its alot like the
|
|
ones used to sharpen axes or other such equipment. If you don't have one,
|
|
check out the machine shops in your school, or in colleges. Ask other
|
|
students where any machine shops exist and you should be able to find a
|
|
grind stone. I don't recommend asking everyone, just some students who
|
|
are into such things.
|
|
|
|
Now, after fou have found a metal piece or two and a grinder, you're
|
|
ready to build a lock pick or torque bar, or Ideally both. The torque bar
|
|
is easy. Take a pair of pliars or similar instrument, grip the metal
|
|
strip and bend it until its bent into a 90 degree angle. It should look
|
|
like an L when looked at from the side. Do not twist it, unless you have
|
|
alot of metal strips, or many torque bars, since that can do different
|
|
things and make it easier or harder to pick some locks. For a basic set,
|
|
i don't recommend that. The torque bar should be about 7 inches in length
|
|
and the little "stub" of the L part should be no more than 1/2 an inch.
|
|
Now you need a pick. You need the grinder to shape the metal strip into
|
|
something like this shape:
|
|
-----------------------------
|
|
/\ <---A---> / |
|
|
/ \--------------------/ |
|
|
c------------------------------------------------------|
|
|
|
|
for you commodore users, \ is a diagonal opposite of / <an X without "/">
|
|
and | is a straight, verticle line
|
|
|
|
The front should be rounded <the "c" part> and the part labeled "A"
|
|
should be somewhat long but no longer than 1/3 the size of the whole
|
|
stick. The edges should be somewhat smooth but not necessarily perfectly
|
|
round. Also, make the narrower part narrow, but not too narrow, as that
|
|
makes the pick brittle, and your pick will break inside of the lock,
|
|
which will fuck shit up. For locks that have longer keys, the part
|
|
labeled <---A---> should be longer but for regular locks, that isn't
|
|
necessary. Torque bars should be long enough to maximize torque but not
|
|
too long since it becomes brittle.
|
|
|
|
After making the above tool, you can paint it, put rustoleum on it or
|
|
whatever. Since it is steel, it can rust but as long as it isn't brittle,
|
|
thats ok. If you find a rusted strip, you can cand off the rust if you
|
|
wish, but thats personal taste. As long as <repeated for the last time>
|
|
it isn't brittle, anything is ok. Just don't twist or bend it, since it
|
|
needs to be very straight! Bending any of it is not a good idea for an
|
|
inexperienced lock picker.
|
|
|
|
So where do you start? Simple things like padlocks or the locks to your
|
|
disk storage things <the 1st thing I picked and it took 15 seconds> or
|
|
similar things. How is picking done? Well, the pick enters the lock and
|
|
the bar is used to twist the cylinder much like when you twist your key
|
|
through the lock. Fiddle with the pick enough and you'll figgure out how
|
|
to open locks up. Some locks may take up to half an hour for even
|
|
experienced lock pickers, <again regular locks, not Medecos> but do the
|
|
easy, non-trouble getting into stuff 1st. And most of all, amaze your
|
|
friends by entering their lockers and stealing jackets, walkmen, etc.!
|
|
Steal next weeks mid term! Break into payphones! Enter an office and
|
|
steal equipment!!! heh, I'm getting abit carried away here but with these
|
|
two tools, you are on the road to becoming an expert lock picker. Also, I
|
|
recommend getting an L-slide or 2. An L slide is an L shaped piece of
|
|
metal <usually> that enables you to open doors that are usually double
|
|
doors. Some doors have "card" blocks and those blocks usually prevent
|
|
these doors from being L-Slided, but I can't say for sure. Having
|
|
L-slides of different sizes is a tremendous advantage since some bolts
|
|
are not easily gotten to easily. Some doors are "blocked" from the front
|
|
and with a long L-slide, you can slip it through anyway. Notice the way
|
|
that door bolt on every door with a knob is sloped on one side, usually
|
|
away from you but sloped towards you? Well you need to pull the slide
|
|
onto that so the door can open. Unfortunately, many doors have a blocker
|
|
that, ugh its hard to explain. I need better graphics than ASCII to show
|
|
you. Maybe next time I talk about lock picking I can explain further.
|
|
|
|
|
|
Disclaimer- the above was written for general purposes and was not
|
|
intended for illegal purposes. Remember, picking a lock to enter a room
|
|
without the room's occupant knowledge is Breaking and Entering and is a
|
|
felony. The author of this text or file, members of Chaos and owner of
|
|
the BBS this file is on is not responsible for any actions of anyone
|
|
diretly resulting from this file, nor are we responsible for anyone's
|
|
getting caught.
|
|
|
|
-------------------------------------------------------------------------
|
|
Anarchy!!
|
|
Article 6 of 10
|
|
by Iys Kyewb
|
|
General BBS News
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
Well, This is a review of news in the NYC BBS world since aproximately
|
|
May 1st, 1990. There is no guarantee the information occured before or
|
|
after that date, but I'm telling you what I know. I can guarantee that
|
|
the information is acurrate and true.
|
|
|
|
Shadoworld went Public Domain, as Sun Devil hit the nation. E><el
|
|
apparantly decided it was too risky to maintain a pirate BBS with such
|
|
taking place, and considering he used to have a h/p sub <which the Sage
|
|
copied onto his BBS but took it 1 step further by having a h/p UD area>
|
|
it WAS indeed risky to have anything illegal, in case a hacker that used
|
|
to call SW got busted and the feds called shadoworld to see if they were
|
|
involved in hacking or phreaking. Unfortunately, Shadoworld is down,
|
|
because of the phone bill. Its down indefinately but I expect it to be up
|
|
soon.
|
|
|
|
The Shelter went down for good. No news on whether or not the technician
|
|
will put it up again or put up a new system or whatever. It was the 1st
|
|
multiplexing commodore BBS in New York City. Not a bad BBS in my opinion.
|
|
|
|
Camelot left RAID and Mysticore's Rhadmanthus decided not to join. This
|
|
wasn't a blow to RAID as they did grow to 4 canadian BBS's and several
|
|
more out of state BBS's.
|
|
|
|
Boot Camp BBS went Image 1.2 and added Turbo Rels, which made this once
|
|
slow BBS into a superfast system. Calling it at 2400 is like calling a
|
|
Cnet 128 V4.0 at 2400, or very close in speed.
|
|
|
|
Harry Hazardous, hitman of RAID, has decided to go legit and stop hacking
|
|
and phreaking. I don't know if he left RAID or is merely no longer Hitman
|
|
for RAID. I do know he changed his handle, to something that I forgot and
|
|
was told not to reveal, which I do not plan to.
|
|
|
|
Nynex Ninja returned early this year but it was revealed he was actually
|
|
Renegade hacker, who claimed to me in Email that he had joined BTI but
|
|
then changed his mind about joining, or something as ridiculous as that.
|
|
in addition, Jimmy <Nynex Ninja> gave him permission to do all of that,
|
|
for what reason I don't know. There is a Nynex Ninja in NEC but it is
|
|
unknown if it is the same one of BTI fame.
|
|
|
|
And speaking of NEC, NEI has cropped up, NEI standing for North East
|
|
Importers. It appears NEI will take over where NEC left since many NEI
|
|
members are in NEC, and I saw a realease with NEI on it but not NEC.
|
|
|
|
NASA, another graphics group, has grown somewhat in New York and
|
|
nationwide. It is unknown how many BBS's are actually NASA bbs's since
|
|
the number was "Inflated" E><el, leader of RAID, tells me. I do know
|
|
Commodore Conextions is a NASA bbs, and I saw the word NASA on a graphic
|
|
done on an out of state BBS I once called.
|
|
|
|
Paradise warez was down. Rumors flew around that Renegade Hacker
|
|
disconnected his phone in the latest "skirmish" in their loooooooooooong
|
|
laaaaaaaaaaaaaaaame "war". However, PK's mother disconnected it for
|
|
unknown reasons, possibly over the phone bill or he was merely grounded
|
|
for something lame. There are rumors that it is back up as of 6/7/90 but
|
|
at a different number. I tried his number and it was busy. I assume it is
|
|
back up at (212)/888-4773.
|
|
|
|
In addition to getting 1.2, many image BBS's are now getting Networking,
|
|
something that allows for posts to be shared among numerous BBS's.
|
|
Unfortunately, Terrordome and Boot Camp plan on only networking with each
|
|
other and Shadoworld, which is redundent since all of them have
|
|
essentially the same users and are in the same city. I called Gear
|
|
Jammers ][ in Philly (215)/487-0463 and saw their Network and it looked
|
|
awesome. They were networked with many BBS's all over the country and I'd
|
|
like to see Boot Camp network with a BBS like that, or a BBS on that
|
|
network.
|
|
|
|
The Sage's Hut, that bastion of new UD's, Posts and kewl cosysops was
|
|
supposedly down as of 6/6/90 but appeared to be up and running the next
|
|
day! More on this story next time.
|
|
|
|
As if that wasn't enough, Johnny and The Sage's Hut was booted out of
|
|
RAID. Johnny was left in charge of allowing new users to join RAID but he
|
|
got too big of a head and was saying shit that pissed off Incubus, so
|
|
Incubus booted him! Hopefully, more in the Combat mag on this topic.
|
|
|
|
Look for T00n T0wn, a new BBS in the 718 area code. Bebop was posting
|
|
this. I don't know if he's the sysop but i know it will be:
|
|
2400
|
|
20+megs
|
|
And either Image 1.2 or Cnet 4.0
|
|
|
|
Mystiore initiated a "No Groups in Signature" rule on their BBS and,
|
|
personally, i think it sucks. This is a foolish and annoying move. There
|
|
is no purpose in this at all. He feels it is annoying to see:
|
|
|
|
<handle>/group1/group2/group3/group4/etc...
|
|
|
|
yet does nothing about the people who use MCI in non MCI subs and uses
|
|
commands like \s9 or \p4 or \w8 or any of the variable commands. <for
|
|
those not familiar with MCI, \p# is a printing mode, allowing you to
|
|
print a character and then do something like move to the end of the line
|
|
and come back to type the next character, or something lame like that;
|
|
\s# is the # of tenths of a second the computer waits before printing the
|
|
next character. It is very annoying since 2400 can look suddenly like 110
|
|
baud; and \wn tells the computer to wait # seconds before doing anything
|
|
<usually printing the next character> and is very annoying. The variable
|
|
commands print the user's handle, name, phone number, password or other
|
|
things and can confuse many people.>
|
|
|
|
-------------------------------------------------------------------------
|
|
Anarchy!!
|
|
Article 7 of 10
|
|
by Iys Kyewb
|
|
Chaos! News
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
Chaos has grown considerably! We now have 17 members as of 6/6/90 and 4
|
|
BBS's. They are:
|
|
|
|
Demoniac Chairman
|
|
Comwood Chairman
|
|
Iys Kyewb Chairman
|
|
Thrasher Prezident
|
|
Dr. Who Veep
|
|
Highlander Grx. Dewd
|
|
Ture Seven Hitman/Sysop
|
|
Throgmorton Hitman!
|
|
Second Site Hitman!
|
|
Exploited Member
|
|
Havok Member
|
|
Golden Dragon Member
|
|
Diabolic Member
|
|
E><el Sysop
|
|
Slasher Sysop
|
|
Kingsx Sysop
|
|
|
|
Shadoworld HQ#1 (212)/942-5059
|
|
Boot Camp HQ#2 (718)/464-8189
|
|
Terrordome HQ#3 (718)/922-4654
|
|
Defcon 3 HQ#4 (718)/934-2273
|
|
|
|
Boot Camp has a Gfile contest in Empire. Call for more details.
|
|
|
|
Phazer wanted to join Chaos after he decided to try to form a group
|
|
called "Justice", a BBS "police force". Demoniac should tell more in
|
|
Combat mag #10 <or 11?>
|
|
|
|
We visited Chris's house on 6/6/90 and 6/7/90. Details in Combat mag
|
|
|
|
Former HiFi leader Ice Cube changed his handle to Iys Kyewb since there
|
|
were many Ice Cube's all over. Iys Kyewb and Comwood, also of HiFi, then
|
|
joined Chaos. They were named Co-Chairs because of their vast experience
|
|
<bewtween us, we have about 10 years experience compared to Demoniac's 2
|
|
or 3, and none of the other Chaos members have more than 2 other than
|
|
maybe Exploited> As a result, HiFi disbanded with Great Golem somewhere
|
|
and Crusader on the Sage's hut. Crusader, if you're reading this: We did
|
|
HiFi to do something but I did everything and you did nothing. My not
|
|
being near a computer does not and should not prevent you from doing
|
|
anything for the group such as getting us a HiFi BBS or something to that
|
|
effect. Considering you are cosysop on at least 2 BBS's, thats really
|
|
lame. Comwood was in the group for a shorter period of time, yet he wrote
|
|
a terrormag and compiled codes for magic candle with Dr. Who.
|
|
|
|
Chris has been discovered to use many handles, among them Chris,
|
|
Bumrusha/er, Scope and now, Abadox. Many sysops are tired with our war
|
|
with him, and I can't really blame them but they have been reacting a bit
|
|
too harsh, deleting people for mentioning chris, for example. I say we
|
|
leave him alone after the next combat mag.
|
|
|
|
More news available in the Combat! mag.
|
|
|
|
-------------------------------------------------------------------------
|
|
Anarchy!!
|
|
Article 8 of 10
|
|
by Iys Kyewb
|
|
BBS reviews
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
Sage's Hut
|
|
(212)/928-2406
|
|
3/12/2400
|
|
image 1.2
|
|
20+ megs
|
|
|
|
The BBS used to be good but Johnny (Sage) deleted Demoniac. Since then,
|
|
the BBS slid downhill but survived, until a galacticomm went up called
|
|
"Advacomm" and Johnny called it every day. While calling it, the BBS
|
|
number was busy, but noone posted, sub obs and UD-ops couldn't do their
|
|
work, like validate warez, and cosysops couldn't do anything. The BBS got
|
|
lame and now when you call, you see dozens of unvalidated wares and maybe
|
|
10 new posts/responses on the whole subboard area.
|
|
|
|
On a 1-10 rating, used to be 8.3 but now a dismal 2.3. Only reason why I
|
|
call is because I have unlimited credits.
|
|
|
|
|
|
Defcon 3
|
|
(718)/984-2273
|
|
3/1200
|
|
Chaos!! HQ#4
|
|
DMBBS
|
|
|
|
I haven't really called this BBS much, its gotten lukewarm reviews. The
|
|
posts appear to be okay. The speed is good for a DMBBS but kingsx should
|
|
go Cbase instead.
|
|
|
|
On a 1-10 rating it gets a 4.6 but only because I made 1 call to it and
|
|
wasn't terribly impressed by what I saw. However, since it IS a chaos
|
|
BBS, it can't be that bad. If I like what I see, I will raise the rating
|
|
in the next issue of Anarchy!
|
|
|
|
|
|
Mysticore
|
|
(718)/837-4710
|
|
3/12/2400
|
|
Cnet 4.0
|
|
20+megs
|
|
|
|
The sysop is getting annoying. Once a good bbs, its gotten bogged down by
|
|
some wierd rules. He wants us all to be a "family" yet bans group names
|
|
in user's sigs. Dr. Who said he thought Black Magic was bullshit and was
|
|
told not to post anymore on Mysticore, to shut up and a few other things.
|
|
I assume Demoniac will go into this in more depth in the Combat mag.
|
|
|
|
Once a 8.6, now its a 5.4 and rapidly declining.
|
|
|
|
|
|
Boot Camp
|
|
(718)/464-8189
|
|
3/12/2400
|
|
Image 1.2 with TurboRels!!!!
|
|
105 megs!!!!!!!!!!!!!!!!!!!!
|
|
Chaos HQ#2!!!!!!!!!!!!!!!!!!
|
|
|
|
Once a dreadfully slow BBS, now with the turbo RELS and the CMD drive
|
|
hooked up in an unknown way, this Image is almost as fast as a Cnet 4.0
|
|
in 2400. The subs have improved. The UD's get an INC since I didn't see
|
|
them but there is alot of space to upload and I guess the UDs are good.
|
|
With an Empire contest <and Empire "wall" and MP command> the BBS is
|
|
eternally busy! Very hard to get through!
|
|
|
|
One a 5.3, now a 9.1 rating
|
|
|
|
|
|
Terrordome
|
|
(718)/984-2273
|
|
3/12/2400
|
|
Image 1.2
|
|
Chaos HQ#3
|
|
20+ Megs
|
|
|
|
Was named Elm street and used 1.0 Image, dreadfully slow then. Now its
|
|
quicker but could use those neat turboRels to speed things up a notch.
|
|
1.2 was a significant change, as was "Terrordome" from Elm Street BBS.
|
|
The subs are ok but the Chaos sub is forever getting posts! Dudes! Post
|
|
in the Boot Camp when you get through!
|
|
|
|
Once a dismal 3.5, now a 9.0
|
|
|
|
Thats all for now. Here are some BBS's to try out. I'll review them next
|
|
issue:
|
|
Gear Jammer's ][ (215)/487-0463
|
|
Lahnkmar's (609)/858-2033 or 2003, i have to correct this
|
|
Just Say Yes (415(/922-2008
|
|
|
|
-------------------------------------------------------------------------
|
|
Anarchy!!
|
|
Article 9 of 10
|
|
by Iys Kyewb
|
|
Networking
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
Networking is the hottest thing around but this isn't so much about the
|
|
aspects of networking but merely a request for:
|
|
|
|
docs of networking on Cnets and Images
|
|
a listing of the networking BBS's and names of networks, especially how
|
|
to join the networks.
|
|
|
|
Please send correspondence to Iys Kyewb on either:
|
|
Lahnkmar BBS <number above>
|
|
GearJammers ][ <see above>
|
|
Boot Camp
|
|
Terrordome
|
|
|
|
Thank you.
|
|
|
|
-------------------------------------------------------------------------
|
|
Anarchy!!
|
|
Article 10 of 10
|
|
by The Mentor, dated 1/8/86
|
|
The Consience of a Hacker
|
|
Entered by Iys Kyewb
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
I found this in Phrack inc. volume one, issue 7. Phile 3 of 10. Its cool,
|
|
I should mail it to Dear Abby/Ann, heheh.
|
|
|
|
|
|
The following was written shortly after my arrest. I am currently
|
|
groupless, having resigned from the Racketeers, so ignore the signoff...
|
|
|
|
|
|
The Consience of a Hacker... by The Mentor 1/8/86
|
|
|
|
|
|
Another one got caught today, it's all over the papers. "Teenager
|
|
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank
|
|
Tampering"...
|
|
|
|
Damn kids. They're all alike.
|
|
|
|
But did you, in your three-piece psychology and 1950's technobrain,
|
|
ever take a look behind the eyes of the hacker? Did you ever wonder what
|
|
made him tick, what forces shaped him, what may have molded him?
|
|
|
|
I am a hacker, enter my world...
|
|
|
|
Mine is a world that begins with school... I'm smarter than most of
|
|
the other kids, this crap they teach us bores me...
|
|
|
|
Damn underachiever. they're all alike.
|
|
|
|
I'm a junior in High School. I've listened to teachers explain for
|
|
the 15th time how to reduce a fraction. I understand it. "No Ms. Smith, I
|
|
didn't show my work. I did it in my head..."
|
|
|
|
Damn kid. Probably copied it. They're all alike.
|
|
|
|
I made a discovery today. I found a computer. Wait a second, this
|
|
is cool. It does what I want it to. If it makes a mistake, it's because I
|
|
screwed it up. Not because it doesn't like me...
|
|
|
|
Or feels threatened by me...
|
|
|
|
Or thinks I'm a smart ass...
|
|
|
|
Or doesn't like teaching and shouldn't be here...
|
|
|
|
Damn kid. All he does is play games. They're all alike.
|
|
|
|
And then it happened... A door opened to a world... rushing through
|
|
the phone line like heroin through an addict's veins, an electronic pulse
|
|
is sent out, a refuge from the day-to-day incompetencies is sought... A
|
|
board is found.
|
|
|
|
"This is it... This is where I belong..."
|
|
|
|
I know everyone here... even if I've never met them, never talked
|
|
to them, may never hear from them again... I know them all...
|
|
|
|
Damn kid. Tying up the phone line again. They're all alike...
|
|
|
|
You bet you're ass we're all alike... We've been spoon-fed baby
|
|
food when we hungered for steak... the bits of meat that you did let slip
|
|
through were pre-chewed and tasteless. We've been dominated by sadists,
|
|
or ignored by the apathetic. The few that had something to teach found us
|
|
willing pupils, but those are like drops of water in the desert.
|
|
|
|
This is our world now... the world of the electron and the switch,
|
|
the beauty of the baud. We make use of a service already existing without
|
|
paying for what could be dirt-cheap if it wasn't run by profiteering
|
|
gluttons, and you call us criminals. We explore... and you call us
|
|
criminals. We seek after knowledge... and you call us criminals. We exist
|
|
without skin color, without nationality, without religious bias... and
|
|
you call us criminals. You build atomic bombs, you wage wars, you murder,
|
|
cheat, and lie to use and try to make us believe it's for our own good,
|
|
|