876 lines
44 KiB
Plaintext
876 lines
44 KiB
Plaintext
|
||
Genghis Khan Presents....
|
||
|
||
|
||
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³ ³ ³ ³
|
||
³ ³ ³ ³
|
||
Û³ ³ Û³ ³
|
||
Û³ ³ Û³ ³
|
||
Û³ ÀÄÄÄÄÄÄÄÄÙ ÃÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
Û³ ³ À¿
|
||
Û³ ³ À¿
|
||
Û³ ³ À¿
|
||
Û³ ³ À¿
|
||
Û³ ³ ÚÄÄÄ¿ À¿
|
||
Û³ ³ ³ÛÛÛÀ¿ À¿
|
||
Û³ ÚÄÄÄÄÄÄÄÄ¿ ³ ³ ÛÀ¿ ³
|
||
Û³ ³ÛÛÛÛÛÛÛÛ³ ³ ³ Û³ ³
|
||
Û³ ³ Û³ ³ ³ ÛÚÙ ³
|
||
Û³ ³ Û³ ³ ÀÄÄÄÄÙ ÚÙ
|
||
ÛÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ÛÀÄÄÄÄÂÄÄÄÄÄÄÄÄÙ ÚÙ
|
||
ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛÛÛÛÛÛ ÚÙ
|
||
ÚÄÄÄÄÄÄÄÄ¿ ÚÄÄÄÄÄÄÄÄ¿ Û³ ÚÄÄÄÄÄÄÄÄÙ
|
||
³VOLUME 1³ ³ ISSUE 1³ Û³ ³ÛÛÛÛÛÛÛ
|
||
ÛÀÄÄÄÄÄÄÄÄÙ ÛÀÄÄÄÄÄÄÄÄÙ Û³ ³
|
||
ÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛÛ Û³ ³
|
||
Û³ ³
|
||
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ Û³ ³
|
||
³WRITTEN AND EDITED BY³ Û³ ³
|
||
³ GENGHIS KHAN ³ Û³ ³
|
||
Û³ TERM INAL ³ ÛÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
Û³ CIRCUIT BREAKER ³ ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ
|
||
ÛÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ
|
||
|
||
|
||
|
||
HP MAGAZINE (C)1991 ALL RIGHTS RESERVED
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
ÚÄÄÄÄÄÄÄÄÄÄ¿
|
||
³DISCLAIMER³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
All Information Contained In This File Is Intended For Informational
|
||
Purposes Only. Any Other Use Of The Information Is the Product Of The Reader.
|
||
HP Magazine, Genghis Khan, Circuit Breaker, Term Inal, Nor Anyone Else
|
||
Responsible For The Writing Of This Magazine Condone Hacking, Phreaking, Or
|
||
Any Other Illegal Activities. Although, This Magazine Is Protected Under The
|
||
Freedom Of The Press. Information Printed In This Magazine Is Protected By
|
||
The Constitution. Just A Word Of Advice For Those Intending On Pursuing
|
||
Material Contained Heirin.
|
||
|
||
|
||
|
||
-Genghis Khan, Circuit Breaker, Term Inal
|
||
-HP Staff
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
|
||
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³WHY ANOTHER MAGAZINE?³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
In the underground, there can never be enough magazines.
|
||
I have read a large majority of them, with the best being
|
||
Phrack, LOD Technical Journal, and Phun to just name a few.
|
||
I have also read total flops, magazines that a little kid
|
||
could write and probably did. My intentions, for this
|
||
magazine is to cover some of the topics that others magazines
|
||
have not, in a clear, easy to understand format.
|
||
I have been in the underground for a while now. I am
|
||
not new, but no one ever knows everything and I am always
|
||
open to people's ideas. The underground needs to go through
|
||
a reform in the 90's. It is really ludicrous that we fight
|
||
against ourselves when that anger could and SHOULD be
|
||
directed towards law enforcement. If people spent the time
|
||
they use fighting amongst themselves, and directed that
|
||
energy and time to a fruitful cause such as scanning,
|
||
hacking, or writing text files, the underground would be a
|
||
much more advanced place.
|
||
|
||
|
||
-Genghis Khan
|
||
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³LAW & LEGISLATION³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
Due to an increasing amount of law and legislation
|
||
designed to deter hackers, I will ask that anyone who comes
|
||
across any new legislation to please send it to us. I would
|
||
also like to keep tabs on the status of Caller ID. Which
|
||
states have it? Which states is it pending?
|
||
It seems as though the government has declared war on
|
||
the underground. Let's try and stay one step ahead of them.
|
||
I would also like to hear from anyone who was busted in
|
||
Operation Sundevil. In a future issue I hope to spotlight
|
||
that.
|
||
|
||
-Genghis Khan
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
|
||
|
||
ÚÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³IN THE NEWS³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
This will probably be your favorite section. If you
|
||
have been out of the scene for a while, this section will
|
||
tell you what is going on.
|
||
I would like to compile a list for H/P, of all the
|
||
groups in the United States and Canada. The groups must be
|
||
HP though. I will NOT spotlight warez groups although if
|
||
your group combines the two then fine. Please include what
|
||
type of people you are looking for, modem speed,
|
||
headquarters, NuP, specialtys, etc.
|
||
I am including in this issue a magazine article that
|
||
everyone should be interested in about TymNet and Credit
|
||
Card Fraud. I'll let you make up your mind on it, but
|
||
some of you had better watch who you are trading with
|
||
on QSD and Lutzifer.
|
||
Speaking of TymNet, let's face it. NUI's are pretty
|
||
scarce. I read an article that said Microwire received a
|
||
$350,000 fone bill. the T.HONxxx nuis go up and down. If
|
||
anyone has a NUI hacker I would be VERY interested.
|
||
I have also included some articles from the book John McAfee
|
||
wrote titled, "Computer viruses, worms, trojan horses, and
|
||
other threats to your system", or something like that.
|
||
If you aren't familiar with John McAfee, he is the one who
|
||
writes and publishes the SCAN, CLEAN, MDISK type of anti-virus
|
||
utilities.
|
||
If anyone has ever dealt with the EFF, (Electronic
|
||
Frontier Foundation), please send me any information
|
||
possible. I know that have helped a lot of people and if
|
||
anyone tries to say anything about this magazine, well first
|
||
off, they can kiss my ass, second, if it's some 3-letter
|
||
agency, I would like to be prepared. It is my right by
|
||
freedom of the press to publish whatever I damn want to. If
|
||
you have something to say about this magazine or any
|
||
magazine, you should listen to yourself and then write a
|
||
better one. Until you do that, you have no room to talk.
|
||
|
||
|
||
-Genghis Khan
|
||
|
||
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
|
||
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³Computers Feed International Credit Card Fraud³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
By Joe Abernathy
|
||
Houston (Texas) Chronicle
|
||
May 19, 1991
|
||
|
||
|
||
A new international den of thieves linked by computer may be going to town
|
||
with your credit card.
|
||
Stolen credit card and other account information is both currency and
|
||
commodity in this technological underworld, which is giving rise to the
|
||
specter of offshore "data havens" outside the ready grasp of the U.S. law.
|
||
"Once the hackers get some live numbers, they trade," said Jim Steele,
|
||
Mastercard's director of security for the central United States. "It's a real
|
||
problem."
|
||
|
||
Secret Service Agent Tom Moyle agreed, calling the potential for public
|
||
harm, "tremendous."
|
||
|
||
The new data havens represent a kind of hacker's bazaar, where many
|
||
participants don't even share a language. But words aren't needed when
|
||
numbers do the talking.
|
||
|
||
In a home near you, a hacker may be staring at a monitor with a list of
|
||
pseudonyms and nationalities. At the touch of a key he can excahnge purloined
|
||
credit card information with a comrade in Finland.
|
||
|
||
"MasterCard 5424 1800 2674 5624 exp 9/91 Thomas Wright," read one recent
|
||
message, typical of the lot.
|
||
|
||
(The phrase "computer hacker" originally was a characterization proudly
|
||
claimed by computer hobbyists, with its roots in the hacked together nature of
|
||
early computer exploration. It is still used in some computer circles, but in
|
||
the law and popular vernacular it is now usually understood to describe people
|
||
who gain unauthorized access to computer systems for fraudulent purposes.)
|
||
|
||
One overseas gathering point offers over 400 megabytes of software for
|
||
copying, representing hundreds or thousand of stolen titles.
|
||
|
||
Each of the data havens is actually a computer in somebody's home or
|
||
business. They have names - QSD, Lutzifer - and serve as electronic
|
||
communities.
|
||
|
||
The "citizens" are physically located continents apart, while
|
||
communicating in an electronic forum that has been convened in a third world
|
||
country. Calls may even be routed through a fourth nation for additional
|
||
security, with each step in the process making law enforcement's job more
|
||
difficult.
|
||
|
||
"Try getting Israel to cooperate with an Arab country for an
|
||
investigation," said one hacker, laughingly describing the logistical
|
||
nightmare authorities face. "Or go through South Africa and try to get anyone
|
||
to cooperate with them."
|
||
|
||
Authorities must get a search warrant or permission to conduct
|
||
surveillance at each step in the communications link. And that may not even
|
||
be possible - not every nation has a legal structure designed to respect
|
||
credit ratings and intellectual property.
|
||
Those making use of the data havens are doing so through the commercial
|
||
communiations network designed specially to link computers around the world.
|
||
To customers, these networks are known as Telenet, Sprintnet, EasyLink
|
||
(Southwestern bell) or TymNet; generically, they are called "x.25 networks"
|
||
for the technical standard describing details of their operation.
|
||
"Those systems are set up simply as a vehicle to communicate," said Moyle,
|
||
supervisor at the Secret Service fraud devision. "If you sign up, get an
|
||
account and pay your monthly bill, you've got very clean data transmission
|
||
lines and you can talk to a variety of places for a variety of reasons.
|
||
"You've got business folks using those lines, folks involved in research.
|
||
That's the legitimate use for them, messaging. You're connecting up to
|
||
bulletin boards, is all you're doing."
|
||
Most of those calling the overseas fraud boards via the x.25 networks are
|
||
stealing air time from service providers and their customers - a fact that has
|
||
helped attract investigative agencies to the scene. One company had to pay a
|
||
$350,000 bill recently for hacker phone calls. (GK-That had to be Microwire!)
|
||
"A lot of the three-letter agencies are there," said Don Murtaugh, chief
|
||
of security for British Telecom International, the parent of TymNet. "Because
|
||
we're still pursuing it, you hate to say too much."
|
||
Using a variety of plays, hackers created user accounts and hacked into
|
||
accounts of legitimate users. Account names and passwords were passed around
|
||
for others to use.
|
||
"Many of the IDs were IDs that customers had and had stopped using or
|
||
failed to cancel," said Murtaugh, explaining that the customer is liable for
|
||
the bills run up by using x.25 phone accounts. "If you look at the number of
|
||
those (stolen accounts) it was in the hundreds. We found ourseles being
|
||
violated."
|
||
Murtaugh confirmed that federal agencies making inquiries include the
|
||
Secret Service, Central Intelligence Agency, FBI and National Security Agency.
|
||
The CIA, FBI and NSA refused to comment.
|
||
So many agencies are interested. The Secret Service specializes in fraud
|
||
investigations, for example, and the CIA worries with external security.
|
||
The NSA, an ultrasecret agency nominally charged with decrypting
|
||
intercepted foreign communications, is widely believed in the computer science
|
||
community to engage in routine monitoring of communications throughout the
|
||
world's computer networks.
|
||
"It's a felony to possess 15 or more credit card or telephone access
|
||
numbers," said Moyle, explaining the law most likely to be invoked for
|
||
trafficking in access device numbers - the name collectively given to such
|
||
things as credit card numbers and computer passwords.
|
||
"Simple possession is a felony, let alone actually using them. If you
|
||
traffic in or use one or more and the aggregate value of loss is $1,000 of an
|
||
access number, then that meets the black and white statute also."
|
||
The only problem with the rule of 15, Steele said, is that it only applies
|
||
in the United States. The data havens operate overseas.
|
||
He added that the $1,000 threshold can be reached by one typical
|
||
merchandise order placed on a stolen credit card number by one computer
|
||
hacker. And each stolen number may be used repeatedly by any number of
|
||
hackers over a period of weeks.
|
||
"It's not like a person was mugged," he said, in which case a stolen card
|
||
would be canceled quickly, typically taking a maximum hit of only $1,500.
|
||
"If somebody posts your number on a bulletin board, you're not going to
|
||
know until the next billing cycle. That's why the significance of the dollar
|
||
loss can be greater for that kind of crime."
|
||
Computer hackers have trafficked in credit cards and other access device
|
||
numbers for as long as there have been hacker bulletin boards. Often, the
|
||
information they trade in their high-tech haunts comes from a tool as low-tech
|
||
as "dumpster diving" - rummaging through a store's trash for credit card
|
||
carbons.
|
||
Because stolen account numbers are so easy to obtain by these less
|
||
sophisicated means, hackers are only a part of the overall problem, Steele
|
||
said. Precisely how much is difficult to measure.
|
||
Of the $301 million MasterCard lost to fraud in 1990, $26 million occurred
|
||
through telephone sales, which is the most common technique hacker's emply.
|
||
"Counterfeiting" of cards, another popular ploy in which a stolen number is
|
||
usually superimposed over an old card, accounted for $33 million is losses.
|
||
And, of course, MasterCard is only one credit card company. Visa is
|
||
nearly twice its size.
|
||
"There are some real scam artists who use the bulletin boards as a way to
|
||
get live access devices," said Steele, a former Secret Service agent. "There
|
||
are others who look at penetrating any system as a challenge - they post some
|
||
information just to say, hey look, I can do it.
|
||
"But of course when you post that information, you've got proprietary
|
||
information that can be financially damaging, military records, things like
|
||
that."
|
||
The electronic mail and other documents of at least one Secret Service
|
||
employee were allegedly compromised by a TymNet hacker. He used an internal
|
||
network management tool to monitor this agency employee while he was using a
|
||
computer either at home or one the job.
|
||
The inspector's office of the Secret Service launched an internal
|
||
investigation after being informed by the Houston Chronicle of the apparent
|
||
breach. Inspectors would not comment on the investigation.
|
||
Information concerning the credit card trafficking and abuse of the x.25
|
||
networks came to the attention of the Chronicle during a series of telephone
|
||
conversations and meetings with members of the computer underground in
|
||
Houston, San Francisco and New York. The information was used to parlay
|
||
further details from security officials and others.
|
||
Activities within the data havens were monitored by a reporter online.
|
||
MasterCard security officials and the issuing institution were alerted to the
|
||
stolen credit card number printed in this story.
|
||
"The individuals who are involved in this world, are very bright and very
|
||
inquiring by nature," said Moyle of the Secret Service. "There's an
|
||
attraction to dealing with folks in different countries because it provides a
|
||
different perspective, a different learning base, a different knowledge base
|
||
to inquire about."
|
||
"We certainly have no objection to normal sharing or learning. Where they
|
||
come to our attention and invoke our wrath, if you will, is when they cross
|
||
over the border - the legal border not the geographic border."
|
||
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³THE HACKER PROFILE³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
By John McAfee
|
||
|
||
|
||
The intellectual skills of the hackers invite respect, and most of them would
|
||
not dream of acting maliciously. But there are many who may be regarded as
|
||
social misfits because of the dominant role that computers play in their
|
||
isolated lives. This isolation and inevitable introversion in personality
|
||
appear particularly prevalent among hackers operating on the dark side, who
|
||
irresponsibly break into systems for personal gain or to spread viruses. They
|
||
often shun conventional human contact and tend not to make friends or have
|
||
social interchanges apart from interaction on electronic bulletin boards.
|
||
One programmer - call him Joe - was recruited through the National
|
||
Bulletin Board Society, and he typifies this hacker reclusiveness. Joe
|
||
stipulated in his contract that he would never meet or discuss his work
|
||
person-to-person with his client, even by telephone. Joe's programming was
|
||
extremely elegant and precise, and he could complete even complex tasks within
|
||
days when average programmers might take weeks. He was obviously a name of
|
||
extreme intelligence and ability, but he just could not cope with human
|
||
contact in the conventional sense. However, he relates strongly to computers
|
||
because, like many hackers, they have become animate things, more satisfactory
|
||
and dependable in many respect than humans.
|
||
The complexities of these extreme relationships between hackers and their
|
||
machines mirror the complexities and intensities to be found in conventional
|
||
interpersonal relationships. Joe, for example, despite his extreme antisocial
|
||
attitude, loved computers and would never consider planting a virus that might
|
||
compromise a system's integrity. Indeed, he was so precise in everything to
|
||
do with computing that he could not tolerate the fact that the internal clock
|
||
on one of his client's systems was not absolutely accurate, and he felt
|
||
compelled to leave his own keyboard to fix it.
|
||
After another hacker, Kevin Mitnick, was arrested and charged with
|
||
breaking into Digital Equipment Coporation's system, the Los Angeles Times
|
||
reported that when the investigator for the Los Angeles County district
|
||
attorney's office accused him of harming a computer, tears came into his eyes.
|
||
The investigator, Robert Ewen, described Mitnick as having an umbilical cord
|
||
from the computer to his soul, becoming a giant when he got behind a keyboard.
|
||
Hackers with such personalities who spread viruses do not consider
|
||
themselves to be attacking computers per se, but the people and organizations
|
||
using them are the ones they perceive to be the real enemies. The potential
|
||
threat from a reclusive personality obsessed with computing - indeed, addicted
|
||
to it - when coupled with a real or imagined gradge against big business, the
|
||
government, or against the computing community establishment as a whole is
|
||
similar to that of the snipers who take revenge by indiscriminately firing on
|
||
crowds. A virus give the maverick hacker a powerful weapon against perceived
|
||
enemies.
|
||
There are indications from the monitoring of bulletin board activity that
|
||
some of the lonely hackers are striking up somewhat formalized relationships
|
||
with other of their kind to develop ever-more potent virus programs. The
|
||
viruses show a distinct trend toward becoming more malicious, dangerous, and
|
||
hostile. However, it is still unclear whether the primary perpetrators of the
|
||
worst viruses are mainly individuals or groups. There are underground hacker
|
||
organizations that bring together antisocial individuals who pool their skills
|
||
to create viruses. Such collaboration became a feature of hacking in the late
|
||
1970s and the early 1980s, before virus programs were being written on any
|
||
scale and when the prime interest was simply breaking into secure systems.
|
||
But the main threat at this stage of the virus epidemic still appears to be
|
||
from individuals hostile to society who work entirely alone, alienated from
|
||
direct contact with others, who write viruses as an extension of the hacking
|
||
activites that form their substitue for conventional social intercourse.
|
||
These lone hackers are almost impossible to identify.
|
||
There is a schism opening up between different types of hackers as a "good
|
||
guy versus bad guys" situation develops. The malicious hackers find it
|
||
creative and exciting to write viruses and to spread them; however, others are
|
||
finding it even more stimulating to try to thwart their evil intentions. It
|
||
is becoming thrust and parry as the virus writers come up with new techniques
|
||
and the "good hackers" counter with ways to combat them. Increasingly, the
|
||
good guys are counterattacking, making preemptive strikes with programs
|
||
containing protection features that anticipate the next phase of virus
|
||
offensives.
|
||
Generally, hackers do not fit into any of the traditional social grouping
|
||
or psychological stereotypes, which make it difficult for the security
|
||
specialists, for whom they have become serious adversaries, to understand they
|
||
motivations. Hacking is not just a hobby or area of interest, but often
|
||
becomes a dominant lifestyle to which its participants make a strong
|
||
commitment. Many spend all night, alone at their computer, devising fiendish
|
||
programs and trying to break into other people's systems. Their activities
|
||
seem incomprehensible to those not fascinated by computers or who simply use
|
||
them as the tools of their trades.
|
||
Hacking is now so widespread that there is a hacker in nearly every
|
||
neighborhood. A seemingly innocent teenager, who appears to be working late
|
||
on a school project while the rest of the family is watching television or has
|
||
gone to bed, may well be creating a malicious virus program and trying to run
|
||
it in a system at IBM, General Motors, or the Pentagon.
|
||
Hacking is predominantly a male activity which parallels intellectually
|
||
the physical excitement of big game hunting - tracking a quarry, pursuing it
|
||
until it is cornered and then - with the virus a new and powerful weapon -
|
||
making a kill. The main difference in the electronic expression of basic
|
||
hunting urges is that one has much more control of the odds, and losing out to
|
||
an adversay involves little physical risk. As with video games, a player can
|
||
be zapped out, yet immediately rise to do battle again. There is a merging of
|
||
fantasy and reality, typified by the macho pseudonyms that some hackers adopt
|
||
through bulletin boards. Mitnick, for example, called himself Condor, after
|
||
the title role played by Robert Redford in the movie Three Days of the Condor,
|
||
a character that symbolized the isolated loner fighting a corrupt political
|
||
establishment. James Bond and his 007 "licensed to kill" status frequently
|
||
crop up in aliases; Mitnick allegedly used Bondian pseudonyms for one of his
|
||
hacked telephone accounts.
|
||
What really sets hackers apart is their joy in the process of computing,
|
||
reported Harvard University sociologist and psychologist Dr. Sherry Tuckle
|
||
after studying the hacking phenomenon at the Massachusetts Institute of
|
||
Technology. She wrote perceptively about it in her book The Second Self -
|
||
Computers and the Human Spirit.
|
||
"Though hackers would deny that theirs is a macho culture, the
|
||
preoccupation with winning and subjecting oneself to increasingly violent test
|
||
smakes their world peculiarly unfriendly to women," she wrote. "There is,
|
||
too, a flight from relationship with people to relationship with the machine -
|
||
a defensive maneuvre more common to men than to women."
|
||
Dr. Turkle found that the MIT hackers engaged in what they called "sport
|
||
death," finding in computer programming an addiction to control similar to
|
||
that found among some racing drivers and test pilots. In each case, the
|
||
participants push their resources beyond what seems possible, with the hackers
|
||
concentrating on giving themselves ever more demanding mental, rather than
|
||
phsycial, challenges. This is why viruses are so facinating to them - and why
|
||
the hackers must be understood better as adversaries by those wishing to
|
||
protect their systems from invasion. The hackers' motiviation for
|
||
manipulating other people's systems is usually very different from the
|
||
motivations for personal gain or revenge involved in other computer crimes.
|
||
"It is a culture of people who have grown up thinking of themselves as
|
||
different, apart, and who have a commitment to what one hacker described as
|
||
'an ethic of total toleration for anything that in the real world would be
|
||
considered strange'," Dr. Turkle wrote. "The people who want to impost rules,
|
||
the inhabitants of the 'real world,' are devalued, as is the 'straight'
|
||
computer science community . . . . The hackers have to keep changing and
|
||
improving the system. They have built a cult of prowness that defines itself
|
||
in terms of winning over ever-more complex systems."
|
||
|
||
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
|
||
ÚÄÄÄÄÄÄÄÄ¿
|
||
³SCANNING³
|
||
ÀÄÄÄÄÄÄÄÄÙ
|
||
|
||
Of the many things I have done. Scanning has to be one of the more
|
||
lucrative things to do. With everything you can find when scanning, it is
|
||
hard to believe that ANYONE would not scan. Someday, I'll have to publish a
|
||
fone book of scans..ehhee. Joke maybe, but, we'll see. I would like to get a
|
||
scanning group together to scan directly for HP magazine. If there is anyone
|
||
who would like to be in my scanning group, contact me.
|
||
The below scans are for the 1.800.444.xxxx prefix. I jumped around a
|
||
little bit, but should have TONS more scans by the next issue. This should
|
||
last you a little why though...
|
||
|
||
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
ÃÄÄÄÄÄÄÄÄScans for 800.444.xxxxÄÄÄÄÄÄÄÄ´
|
||
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
|
||
³ 0000 VMB ³
|
||
³ 0003 VMB ³
|
||
³ 0005 VMB ³
|
||
³ 0029 MESSAGE CENTER VMB ³
|
||
³ 0048 VMB ³
|
||
³ 0050 VMB ³
|
||
³ 0060 DIVERTER? MAYBE D.D. VMB ³
|
||
³ 0063 WEIRD RING THEN BUSY ³
|
||
³ 0071 VMB ³
|
||
³ 0073 WEIRD RING THEN BUSY ³
|
||
³ 0075 WEIRD ³
|
||
³ 0078 DIAL TONE ³
|
||
³ 0081 VMB (Audix) ³
|
||
³ 0083 VMB ³
|
||
³ 0084 FONMAIL VMB ³
|
||
³ 0088 VMB ³
|
||
³ 0089 FAX ³
|
||
³ 0091 WEIRD RING THEN BUSY ³
|
||
³ 0096 ASK FOR AN OUTSIDE LINE ³
|
||
³ 0100 VMB ³
|
||
³ 0106 VMB ³
|
||
³ 0107 VMB ³
|
||
³ 0112 CARRIER ³
|
||
³ 0118 WEIRD RING THEN BUSY ³
|
||
³ 0119 WEIRD RING THEN BUSY ³
|
||
³ 0112 WEIRD RING THEN BUSY ³
|
||
³ 0123 VMB?? ³
|
||
³ 0141 FONMAIL ³
|
||
³ 0143 VMB?? ³
|
||
³ 0144 DIAL TONE (CODEð6079) ³
|
||
³ 0155 WEIRD RING THEN BUSY ³
|
||
³ 0171 FAX ³
|
||
³ 0182 DIAL TONE ³
|
||
³ 0202 DIVERTER ³
|
||
³ 0210 DIRECT DIAL VMB ³
|
||
³ 0219 FAX ³
|
||
³ 0223 VMB ³
|
||
³ 0231 VMB ³
|
||
³ 0240 CARRIER ³
|
||
³ 0242 AFTER HOURS VMB ³
|
||
³ 0273 FAX ³
|
||
³ 0274 VMB ³
|
||
³ 0275 DIRECT DIAL VMB ³
|
||
³ 0279 VMB ³
|
||
³ 0507 CARRIER ³
|
||
³ 0511 RINGS THEN BUSY ³
|
||
³ 0520 RINGS THEN BUSY ³
|
||
³ 0523 RINGS THEN BUSY ³
|
||
³ 0534 AUTHORIZATION CODE FAILURE ³
|
||
³ 0539 FAX ³
|
||
³ 0547 EXTENDER ³
|
||
³ 0549 EXTENDER ³
|
||
³ 0553 EXTENDER ³
|
||
³ 0560 VMB ³
|
||
³ 0567 VMB ³
|
||
³ 0607 RINGS THEN BUSY ³
|
||
³ 0608 RINGS THEN BUSY ³
|
||
³ 0609 RINGS THEN BUSY ³
|
||
³ 0615 RINGS THEN BUSY ³
|
||
³ 0617 RINGS THEN BUSY ³
|
||
³ 0618 RINGS THEN BUSY ³
|
||
³ 0624 RINGS THEN BUSY ³
|
||
³ 0625 RINGS THEN BUSY ³
|
||
³ 0626 RINGS THEN BUSY ³
|
||
³ 0627 RINGS THEN BUSY ³
|
||
³ 0628 RINGS THEN BUSY ³
|
||
³ 0630 RINGS THEN BUSY ³
|
||
³ 0631 RINGS THEN BUSY ³
|
||
³ 0633 RINGS THEN BUSY ³
|
||
³ 0635 RINGS THEN BUSY ³
|
||
³ 0636 RINGS THEN BUSY ³
|
||
³ 0638 RINGS THEN BUSY ³
|
||
³ 0646 RINGS THEN BUSY ³
|
||
³ 0649 RINGS THEN BUSY ³
|
||
³ 0653 RINGS THEN BUSY ³
|
||
³ 0654 RINGS THEN BUSY ³
|
||
³ 0655 RINGS THEN BUSY ³
|
||
³ 0656 RINGS THEN BUSY ³
|
||
³ 0658 RINGS THEN BUSY ³
|
||
³ 0660 RINGS THEN BUSY ³
|
||
³ 0662 RINGS THEN BUSY ³
|
||
³ 0668 CREDIT CARD CHECKER ³
|
||
³ 0678 CREDIT CARD CHECKER ³
|
||
³ 0684 VMB ³
|
||
³ 0693 VMB ³
|
||
³ 0709 FAX ³
|
||
³ 0712 MCI CODE ³
|
||
³ 0720 MCI ³
|
||
³ 0722 MCI ³
|
||
³ 0723 MCI ³
|
||
³ 0731 MCI ³
|
||
³ 0744 MCI SECURITY ³
|
||
³ 0747 EXTENDER ³
|
||
³ 0748 EXTENDER ³
|
||
³ 0751 WEIRD TONE ³
|
||
³ 0787 WEIRD BELLS(Extender) ³
|
||
³ 0797 FAX ³
|
||
³ 0803 FAX ³
|
||
³ 0806 EXTENDER ³
|
||
³ 0809 LOVE CONNECTION ³
|
||
³ 0815 RINGS THEN BUSY ³
|
||
³ 0816 EXTENDER ³
|
||
³ 0817 VMB ³
|
||
³ 0830 WEIRD BEEPS ³
|
||
³ 1503 DIVERTER ³
|
||
³ 1510 ANSWERING MACHINE ³
|
||
³ 1511 VMB (LIMO SERVICE) ³
|
||
³ 1513 WEIRD BEEPS ³
|
||
³ 1514 VMB ³
|
||
³ 1521 VMB ³
|
||
³ 1534 AUTHORIZATION CODE FAILURE ³
|
||
³ 1539 CELLULAR FONE? ³
|
||
³ 1543 VMB (12 HOUR) ³
|
||
³ 1546 VMB ³
|
||
³ 1553 VMB ³
|
||
³ 1563 AUTHORIZATION CODE FAILURE ³
|
||
³ 1571 WEIRD ³
|
||
³ 1575 AUTHORIZATION CODE FAILURE ³
|
||
³ 1579 VMB ³
|
||
³ 1583 CARRIER ³
|
||
³ 1585 WILLOW PERIPHERALS? ³
|
||
³ 1587 FONMAIL VMB ³
|
||
³ 1588 FONMAIL ³
|
||
³ 1592 ANSWERING MACHINE-HACKABLE ³
|
||
³ 1596 FAX? ³
|
||
³ 1599 FAX ³
|
||
³ 1602 VMB ³
|
||
³ 1608 AUTHORIZATION CODE FAILURE ³
|
||
³ 1613 VMB ³
|
||
³ 1615 STRANGE RING ³
|
||
³ 1621 DIAL TONE ³
|
||
³ 1634 AUTHORIZATION CODE FAILURE ³
|
||
³ 1635 VMB ³
|
||
³ 1636 VMB ³
|
||
³ 1642 ANSWERING MACHINE ³
|
||
³ 1645 FAST BUSY ³
|
||
³ 1646 FAST BUSY ³
|
||
³ 1654 VMB ³
|
||
³ 1673 FAST BUSY ³
|
||
³ 1674 VMB ³
|
||
³ 1679 FAX ³
|
||
³ 1690 DIAL TONE ³
|
||
³ 1701 DIAL TONE ³
|
||
³ 1705 FAST BUSY ³
|
||
³ 1720 VMB (MESSAGE CENTER) ³
|
||
³ 1723 FAST BUSY ³
|
||
³ 1726 FAX ³
|
||
³ 1729 VMB ³
|
||
³ 1730 FAST BUSY ³
|
||
³ 1731 FAST BUSY ³
|
||
³ 1737 FAST BUSY ³
|
||
³ 1738 STRANGE VMB ³
|
||
³ 1739 FAST BUSY ³
|
||
³ 1748 DIAL TONE ³
|
||
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
|
||
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
Here is a handy printout to use when scanning.
|
||
|
||
ÄÄÄÄÄÄÄ¿
|
||
cut here \³/
|
||
-----------------------------------------------------------------------------
|
||
|
||
-----------------------------------------------------------------------------
|
||
| Scan Sheet for Prefix _____ (C)1991 HP Magazine |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
| | | | |
|
||
-----------------------------------------------------------------------------
|
||
|
||
-----------------------------------------------------------------------------
|
||
cut here /|\
|
||
ÄÄÄÄÄÄÄÄ|
|
||
The smallest block on the left is for the 4 digits at the end of the
|
||
prefix..here's an example
|
||
-----------------------------------------------------------------------------
|
||
| 1602 | vmb | 1750 | Dial Tone |
|
||
-----------------------------------------------------------------------------
|
||
That's a pretty easy way of keeping track of everything.
|
||
|
||
Genghis Khan
|
||
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
ÚÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³LOOZER LIST³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
There have arisen in the Underground and the entire Computer world as a whole,
|
||
a group of people, that I can not think of much more of a name for them. The
|
||
simplest thing to call them, are LOOZERS. I have already recieved threats of
|
||
lawsuits and the sort for posting peoples name in the loozer list. But, I am
|
||
not telling anyone to do anything. It is your choice what you do. I am
|
||
mearly spotlighting those few people, who well, make it tough for all of us to
|
||
go forward. And of everything, I am mearly stating facts. Home addresses,
|
||
fone numbers, entire names, bulletin boards, and what they do. There is NO
|
||
law against that, and if you have something to say about it, say it. I'm
|
||
ready.
|
||
|
||
Allen Lee
|
||
116 Spinning Rd
|
||
Dayton Ohio 45414
|
||
Our Place BBS - 513-252-1928 - 24oo
|
||
Distrubutes McAfee Anti-Virus Files and Tracks Down Hackers.
|
||
Running WildCat 2.55n
|
||
|
||
|
||
Joeseph Caplinger
|
||
J&Js BBS Node 1 - 513-236-4788 - 24oo
|
||
J&Js BBS Node 2 - 513-236-3087 - 24oo
|
||
J&Js BBS Node 3 - 513-236-1229 - 96oo
|
||
Locked Many of the Underground Out of the BBS for stating an opinion
|
||
My what a democracy we live in..
|
||
Running WildCat 3.0
|
||
|
||
|
||
Marc Younkin
|
||
Yorktown BBS - 513-434-8024 - 24oo
|
||
TransAmiga
|
||
Stated he was out to take down the entire IBM underground.
|
||
Captures and other data have been recovered from his board
|
||
that make this statement true.
|
||
|
||
|
||
Joey Evans
|
||
Blazing BBS ð 513-878-6014
|
||
SuperBBS
|
||
This guy (?) is accused of turning classified underground information to
|
||
certain Public Doman Sysops including Allen Lee. Was in the underground for a
|
||
short time. Believes himself to be the best hacker in the world. Has a habit
|
||
of thinking he is superior to the rest of the world. Very Obnoxious.
|
||
|
||
|
||
|
||
That ends the list of loozers. I hope to make this section a LOT bigger
|
||
in the next issue. Keep the names and numbers coming. What you do to these
|
||
people/boards is strictly a product of you. The writer/s and or editors of HP
|
||
magazine take no responsibility for any actions taken. Please read the
|
||
beginning disclaimer for further information
|
||
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
|
||
ÚÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³QUICK NOTES³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
Spicoli was busted. Answers are vague. Information is being held until
|
||
either a court case or questioning comes. What Spicoli was busted on is still
|
||
a mystery. Hopefully, we will soon know what it was. I warn all to stay away
|
||
from the bridges that Spicoli was calling. If you know what I'm talking
|
||
about, you know what to do.
|
||
|
||
-Genghis Khan
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
I have talked to two people now that have been called or visited because of
|
||
hacking 748-9200. Just a warning.
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
Do not call the 713 CBI dialup. It is being monitored.
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
It is illegal for anyone, including government agencies to put a tap on your
|
||
line. If you think your line is being tapped, call your operator. Then have
|
||
her connect you to repair service. Tell them you think you are being tapped
|
||
and that you would like to have the line checked. They will usually give you
|
||
the number for that Telco's Security Department. Call them, and they will
|
||
check out the line for any sort of tap. Then give you the option to press
|
||
charges, if it can be discovered who is tapping it.
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
ÚÄÄÄÄÄÄÄÄÄÄÄ¿
|
||
³BBS REVIEW?³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
Well, I must admit, I did run out of time on this magazine. Therefore my
|
||
BBS Review and VMB Review will have to wait till next issue. But I will list
|
||
a few good boards that I can think of right off hand. If I leave you out,
|
||
which I probably will, please excuse me, and I will try and get you in the
|
||
next issue.
|
||
|
||
Dragon's Keep
|
||
Home of HP Magazine
|
||
513.277.6oo6
|
||
12oo/24oo
|
||
NuP OPTIONS
|
||
SysOp-Term Inal aka Dragonlord
|
||
CoSysOp-Genghis Khan
|
||
Running Telegard
|
||
|
||
I am Co-SysOp on this board, give it a call. I have some innovative ideas
|
||
in effect on this board including a message base called Phreak Klass. We have
|
||
had a great response for the Phreak Klass Base and hopefully we are producing
|
||
some good New Phreakers. Unlike some I have seen recently who think they know
|
||
everything and don't.
|
||
|
||
|
||
High Voltage
|
||
513.898.8768
|
||
12oo/24oo/96oo/14.4/38.4
|
||
NuP CourierHst
|
||
SysOp-Circuit Breaker
|
||
CoSysOp-Genghis Khan
|
||
|
||
I also have co-sysop status on this board. More oriented towards the
|
||
usage part of phreaking and not the fundamentals. Still a good board to call.
|
||
Message bases galore. But the Circuit Breaker has a past of being a warez
|
||
d00d. I converted him, and he is now half half. Give it a call. Well worth
|
||
it. Running Telegard.
|
||
|
||
|
||
Gonzo's Gabanza
|
||
513.89o.o655
|
||
12oo/24oo/96oo/14.4/38.4
|
||
NuP GATE*WAY
|
||
SysOp-Gonzo Merkazoid
|
||
|
||
Pretty good H/P board. Specializes in just about everything. Many files
|
||
to choose from. Overall, one of the better boards. Running Telegard.
|
||
|
||
|
||
Crow Technologies
|
||
513.433.861o
|
||
12oo/24oo
|
||
NuP CORAL
|
||
SysOp-Crow Meister
|
||
|
||
Specializes in Virii and Trojans. If I can remember right, has at least
|
||
400 viruses. And I'm sure that is an old count. Getting access is difficult.
|
||
Easy for me, easy for some. Those who do not know there stuff need not apply.
|
||
Running TcH 3.0. Very nice board.
|
||
|
||
|
||
These boards are all local to me. If you have something you would like to
|
||
see in HP Magazine or would like to comment on the mag, please leave you
|
||
messages on these boards. Thank you.
|
||
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
|
||
ÚÄÄÄÄÄÄÄÄÄÄ¿
|
||
³CONCLUSION³
|
||
ÀÄÄÄÄÄÄÄÄÄÄÙ
|
||
|
||
|
||
I feel somewhat bad about the content of this magazine. Being the first
|
||
issue I hoped to make it great. But I didn't anticipate how long it would
|
||
take. I am sorry if I let some of you down. The next issue will be much
|
||
better. Time was ticking down and I had to get this baby out. So, use what's
|
||
in here while you wait another month, till January 6th, 1992. I will include
|
||
AT LEAST 2 Interviews/profiles. Scans galore, Complete BBS Review. A VMB
|
||
Review. More Loozers. More News. Don't miss it.
|
||
|
||
And to all who are reading this. Merry Christmas and a Happy New Year to
|
||
you. Let's make the headlines in 1992.
|
||
|
||
|
||
|
||
|
||
|
||
-Genghis Khan
|
||
Editor In Chief
|
||
|
||
|
||
|
||
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ |