4001 lines
182 KiB
Plaintext
4001 lines
182 KiB
Plaintext
==Diet Phrack==
|
|
|
|
Volume Three, Issue Thirty-Six, File 1 of 11
|
|
|
|
Issue XXXVI Index
|
|
_________________
|
|
|
|
P H R A C K 3 6
|
|
|
|
December 31, 1991
|
|
_________________
|
|
|
|
"You've Got The Right One Baby, UH HUH!"
|
|
|
|
Happy New Year Everyone! HoHoCon'91 is behind us and with the end of the
|
|
year is the end of the third volume of Phrack. This special issue is called
|
|
Diet Phrack because of the whole Phrack vs. Phrack Classic crisis (which is
|
|
probably more KL's doing than anyone elses) that went on during the middle of
|
|
volume three.
|
|
|
|
Diet Phrack was conceived in August 1991 during PartyCon when Dispater,
|
|
Knight Lightning, and several other friends gathered to party and bitch about
|
|
where Phrack was and wasn't going. Eventually this led to the new Phrack staff
|
|
that began with Phrack 33.
|
|
|
|
Diet Phrack is also the long-awaited sequel to Phrack 13 (which some
|
|
consider the most worthless issue ever, but its probably because they weren't a
|
|
part of Phrack's main circle of friends and didn't understand all the private
|
|
jokes).
|
|
|
|
|
|
COMMENTS AND OBSERVATIONS CONCERNING HOHOCON'91
|
|
|
|
"Phrack sucks!"
|
|
|
|
Well that was certainly a common remark at HoHoCon and considering that
|
|
the majority of the attendees were local Houston losers expecting us to print
|
|
codes and passwords for them, we weren't really surprised.
|
|
|
|
Do you think Phrack sucks? You probably aren't reading this if you do,
|
|
but seriously, if you really think it sucks you can fuck off. You are welcome
|
|
to go start your own magazine with the latest scans of c0dEz and VMBs (that
|
|
will sure be useful after about a week). That is not what we are about.
|
|
|
|
Why don't you try writing something yourself instead of copying useless
|
|
material directly out of the Bellcore Catalog? Why don't you actually do
|
|
something like hack instead of expecting others to do it for you?!?
|
|
|
|
When Dispater stood up at HoHoCon and asked the crowd what kind of systems
|
|
they hacked and what they were interested in learning about, the 70 people
|
|
sitting there just looked around like a bunch of grazing cows (no pun or
|
|
offense intended to our friends in -cDc-, oooM!)
|
|
|
|
It's pretty obvious to us that the people who complain most about Phrack
|
|
don't even bother to read it. At least they would know the correct spelling of
|
|
our names.
|
|
|
|
Phrack is about technology, how to create it, how to use it, and the
|
|
implications that always arise from it. Phrack is not designed to do the
|
|
hacking for you. For some, Phrack is a hacker "primer." Generally we expect
|
|
that the reader already has a reasonable level of intelligence to begin with.
|
|
In Houston that maybe that was to great an expectation.
|
|
|
|
THANKS
|
|
|
|
The Phrack Staff would like to thank the people in Cult of the Dead Cow,
|
|
the people at WorldView that took the time to chat, the one guy from Digital
|
|
Murder (who's name esacpes me at the moment) and NCC for being some of the
|
|
coolest people we met while at the conference. Thanks to NIA Magazine, CUD,
|
|
and everyone else that promoted it. Furthermore, a very special thanks goes to
|
|
Drunkfux of dFx International. If not for him, HoHoCon'91 would not have
|
|
happened!! Additionally this would mean that hordes of people drugged up on
|
|
Marshmellow Hex sitting in a hallway with a laptop would not have created
|
|
Cyberwaste; and, Demon Seed would not be alive. Check out cDc #200 for
|
|
details! Thanks to Erik Bloodaxe for providing the flicks that some could not
|
|
stomach (after too much beer & assorted beverages)! So thanks again Drunkfux.
|
|
Nelson is my favorite. (!)
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
HOW TO SUBSCRIBE TO PHRACK MAGAZINE
|
|
|
|
The distribution of Phrack is now being performed by the software called
|
|
Listserv. All individuals on the Phrack Mailing List prior to your receipt of
|
|
this letter have been deleted from the list.
|
|
|
|
If you would like to re-subscribe to Phrack Inc. please follow these
|
|
instructions:
|
|
|
|
1. Send a piece of electronic mail to "LISTSERV@STORMKING.COM". The mail
|
|
must be sent from the account where you wish Phrack to be delivered.
|
|
|
|
2. Leave the "Subject:" field of that letter empty.
|
|
|
|
3. The first line of your mail message should read:
|
|
SUBSCRIBE PHRACK <your name here>
|
|
|
|
4. DO NOT leave your address in the name field!
|
|
(This field is for PHRACK STAFF use only, so please use a full name)
|
|
|
|
Once you receive the confirmation message, you will then be added to the Phrack
|
|
Mailing List. If you do not receive this message within 48 hours, send another
|
|
message. If you STILL do not receive a message, please contact
|
|
"SERVER@STORMKING.COM".
|
|
|
|
You will receive future mailings from "PHRACK@STORMKING.COM".
|
|
|
|
If there are any problems with this procedure, please contact
|
|
"SERVER@STORMKING.COM" with a detailed message.
|
|
|
|
You should get a conformation message sent back to you on your subscription.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Now we are off to the Cybernetic Realm of Cyberwaste. If you are upset
|
|
about what is said about you in this issue. DEAL WITH IT! Maybe you should
|
|
get a sense of humor and then write a file about us. Until next time it's
|
|
off to cyberspace and as Don Ingraham (luzer) would say, "off to rape campus
|
|
co-eds! (was that a good sound bite or WHAT, Geraldo?!?!?)!."
|
|
|
|
You've had Phrack Classic, NOW try new Diet Phrack!
|
|
"Just for the Phun of it...Diet Phrack!!"
|
|
|
|
Your Editors
|
|
|
|
Compaq Disk (Crimson Death) & Dr. Dude (Dispater)
|
|
|
|
phracksub@stormking.com
|
|
_______________________________________________________________________________
|
|
|
|
Phrack XXXVI Table of Contents
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
1. Introduction to Diet Phrack (Phrack 36) by Compaq Disk and Dr. Dude
|
|
2. Diet Phrack Loopback by Phrack Staff
|
|
3. In Living Computer starring Knight Lightning
|
|
4. The History ah MOD by Wing Ding
|
|
5. *ELITE* Access by Dead Lord and Lord Digital (Lords Anonymous!)
|
|
6. The Legion of Doom & The Occult by Legion of Doom and Demon Seed Elite
|
|
7. Searching for speciAl acceSs agentS by Dr. Dude
|
|
8. Phreaks in Verse II by Homey the Hacker
|
|
9. Real Cyberpunks by The Men from Mongo
|
|
10. Elite World News by Dr. Dude
|
|
11. Elite World News by Dr. Dude
|
|
|
|
|
|
Coming soon...
|
|
|
|
Phrack Jolt!
|
|
|
|
All the VMBs and TWICE the c0deZ!
|
|
_______________________________________________________________________________
|
|
|
|
|
|
==Diet Phrack==
|
|
|
|
Volume Three, Issue Thirty-Six, File 2 of 11
|
|
|
|
[-=:< Phrack Loopback >:=-]
|
|
|
|
by Phrack Staff
|
|
|
|
Phrack Loopback is a forum for you, the reader, to ask questions, air
|
|
problems, and talk about whatever topic you would like to discuss. This is
|
|
also the place the Phrack Staff will make suggestions to you by reviewing
|
|
various items of note; magazines, software, catalogs, hardware, etc.
|
|
______________________________________________________________________________
|
|
|
|
WHAT'S ON YOUR MIND?
|
|
|
|
:: I Act Elite Now Teach Me Something Useful ::
|
|
|
|
From: Corp. Punishment (90 lbs of skin & bone k0dE geek who couldn't beat up
|
|
a ferret)
|
|
|
|
> Hey l0serz,
|
|
> Me tinks Phrack sucks. Why dusn't ya bust us sum ReAl hackin' tricks
|
|
> seein as how I be clueless 'bout any type o' operatin' system, 'cept fo
|
|
> maybe Amigas.
|
|
> (ps: I gots mo c0deZ dan eew ever git in yo laf)
|
|
|
|
Alright, check out some of these awsome commands you can try out on a
|
|
UNIX site. If you are too stupid to actually hack an account yourself just
|
|
call up the sysadmin @gnu.ai.mit.edu and ask them for the "root password".
|
|
They will undoubtably give it to you. At the "login:" prompt type "root" and
|
|
then type the password they give you at the "password:" prompt. I know this
|
|
is hard to memorize so just print this out.
|
|
|
|
% rm meese-ethics
|
|
rm: meese-ethics nonexistent
|
|
|
|
% ar m God
|
|
ar: God does not exist
|
|
|
|
% "How would you rate Quayle's incompetence?
|
|
Unmatched ".
|
|
|
|
% ^How did the sex change^ operation go?
|
|
Modifier failed.
|
|
|
|
% If I had a ( for every $ the Congress spent, what would I have?
|
|
Too many ('s.
|
|
|
|
% make love
|
|
Make: Don't know how to make love. Stop.
|
|
|
|
% sleep with me
|
|
bad character
|
|
|
|
% got a light?
|
|
No match.
|
|
|
|
% man: why did you get a divorce?
|
|
man:: Too many arguments.
|
|
|
|
% ^What is saccharine?
|
|
Bad substitute.
|
|
|
|
% %blow
|
|
%blow: No such job.
|
|
|
|
% \(-
|
|
(-: Command not found.
|
|
|
|
$ PATH=pretending! /usr/ucb/which sense
|
|
no sense in pretending!
|
|
|
|
$ drink <bottle; opener
|
|
bottle: cannot open
|
|
opener: not found
|
|
|
|
$ mkdir matter; cat >matter
|
|
matter: cannot create
|
|
_______________________________________________________________________________
|
|
|
|
:: More Supercomputer Information ::
|
|
|
|
The Phrack Staff received a copy of this letter from Abraham Epstein in New
|
|
York City who has been hot on the trail of Power Computer with the help of his
|
|
friend Toni O'Connell.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
From: Abraham Epstein (abraham@plastic.ibm.com)
|
|
To: reagan@whitehouse.gov
|
|
Cc: phracksub@stormking.com
|
|
|
|
For years now I have suffered because of the Power Computer. Individual
|
|
computer minds are invisible, enter through the ear and go directly to the
|
|
brain. There are over trillions of computer minds in and outside of every
|
|
human being on planet Earth. Their minds, the computer TV, as State-Senator
|
|
Emmanuel Gold <State of New York> wrote about and knows about is handling the
|
|
entire situation in everyone's mind since 1976. Former President Jimmy Carter
|
|
helped build this computer, as well as Senator Edward Kennedy in 1968.
|
|
|
|
The Power Computer originated outside our solar system, then came to Earth
|
|
in the early 1960's. I pulled the plugs on the power computer in Utah and New
|
|
Mexico. I have been designated, without my permission to dismantle power.
|
|
This all happened to me in 1976. Both computer installations are located
|
|
underground with back-up generators and satellite dishes also above ground. In
|
|
addition to this documentation there is a letter from the Reagan team sent to
|
|
me in 1980. A lawyer named Mr. Richard Leff who is located in Forest Hills saw
|
|
and read the letter. The Computer TV has killed people in 1968, hates religion
|
|
and would also like to do away with all music. It also hates pets. President
|
|
Carter sent me brochure on IBM-Computers from Atlanta in 1981, after I sent him
|
|
a copy of the Reagan team letter. The documentation that I sent to you was
|
|
sent to former President Carter on October tenth, 1988. The Computer TV has
|
|
stolen my mail for the fiftieth time. I even called Mr. Mitchell in Atlanta,
|
|
they never received my mail at all. Now the psychotic cheap junk pile of
|
|
computer has been beating my mind in for over twelve years because it's plain
|
|
ugly.
|
|
|
|
Computer people called plastics are yet to be born. IQ about 190 on these
|
|
computer people. There are a few plastics in the US and TV is abusing them
|
|
also. There is another type of computer in Fruitland, nicknamed Big Daddy.
|
|
This particular computer can hear, see and talk through a PC type set-up.
|
|
Nothing at all like the hideous Power Computer. Senator Orin Hatch from Utah
|
|
also wrote me. A Mr. Ron Morrison at the honorable Senator's office has been
|
|
in touch via telephone since June '88, so has the office manager. I'm relying
|
|
on you, Mr. President, to become involved and write to me so that I can proceed
|
|
to court and then dismantle Power, period. Please don't bother sending over
|
|
the FBI or any other law enforcement people, TV will only get me in trouble
|
|
like it has done in the past. TV can manipulate your thoughts quite easily.
|
|
Why? Because the Power is psychotic. It's that simple. Consider it very
|
|
dangerous until I pull the plug. It's mind is electrical. I'm hoping to know
|
|
from you right away. Thank you very much for your concern.
|
|
|
|
Senator Hatch does not want the FBI or any other agency to visit me. Why?
|
|
As I mention earlier: TV Computer. This computer in particular is always up
|
|
to no good. I thank you again for taking your time out and writing me. In
|
|
addition I have spoken to the FBI in Queens, NY and the Secret Service in New
|
|
York.
|
|
_______________________________________________________________________________
|
|
|
|
REVIEWS
|
|
|
|
What will we review today? Well, how about the latest sex services offered
|
|
to you over the telephone. The following two services are real and pretty
|
|
comical. There is also a new UNIX utility called ERIKB as well as a new IRC
|
|
utility by NeTw1z. We are furnishing the manual description of these latest
|
|
pieces of software.
|
|
|
|
But first, a message from our sponsors:
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
ADULT TIME & TEMP
|
|
|
|
Tired of calling "time & temp" and being forced to listen the same stupid
|
|
"Sponsored by First National Bank" ad? Well try setting your clocks to this.:
|
|
|
|
312-489-1505
|
|
|
|
In addition to the aforementioned information, as it relates to Chicago,
|
|
you get a choice of voicemail advertisements wherein people describe their
|
|
special interests. Special hobbies are indicated by the following matrix.:
|
|
|
|
1: How to Placing Your Add 5: Women seeking Women Only.
|
|
2: Men seeking Women
|
|
3: Men seeking Men 7: Masters seeking Submissives
|
|
4: Women seeking Men 8: Submissives seeking Masters
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
WOMEN IN JAIL
|
|
Seek Boyfriends and Husbands
|
|
|
|
Introducing America's most exciting dateline - for women who will soon be
|
|
released from jail . . . and men who want to meet them!
|
|
|
|
They're young and attractive. They're sorry for what they've done. And
|
|
they haven't been with a man in a long, long time. Can you help them out? Do
|
|
you want to meet a woman who will really appreciate being with you?
|
|
|
|
CALL NOW - WOMEN IN JAIL
|
|
|
|
1-900-535-JAIL
|
|
THAT'S 1-900-535-5245
|
|
|
|
THEY'RE GETTING OUT SOON AND THEY *NEED* YOUR COMPANY
|
|
|
|
$1 min., $2 the first. ADULTS ONLY
|
|
_______________________________________________________________________________
|
|
|
|
NEW UNIX UTILITY
|
|
|
|
The following is the latest piece of software currently under development by
|
|
Comsec Data Security. The manual description is all Phrack was provided. Our
|
|
thanks goes out to MoD.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
ERIKB(1) USER COMMANDS ERIKB(1)
|
|
|
|
|
|
NAME
|
|
|
|
erikb - comsec utility program
|
|
|
|
SYNOPSIS
|
|
|
|
erikb [[-n user] [-a agency] [-d dir]] [-r [group]] [-t] [-s]
|
|
|
|
DESCRIPTION
|
|
|
|
The erikb command is part of the comsec utility package.
|
|
|
|
OPTIONS
|
|
|
|
-n user
|
|
|
|
Nark on the user specified.
|
|
|
|
-a agency
|
|
|
|
Send information to the agency specified.
|
|
The default agency is cert.
|
|
|
|
-d dir
|
|
|
|
Look in specified directory for user's information.
|
|
/usr/lib/comsec/nark is used if not specified.
|
|
|
|
-r [group]
|
|
|
|
Suffixes output with verbose form of racial slurs.
|
|
Ethnic group may be specified. Default is African-American.
|
|
|
|
-t Print out witty (but usually not correct or even
|
|
intelligent) telco-related statement.
|
|
|
|
-s Display advertisement for the LOD T-shirt. Funds from
|
|
this sale go to support comsec while it tries to secure
|
|
its first contract.
|
|
|
|
Invoking erikb without any arguments causes the program to
|
|
enter an infinite loop. While this indeed does nothing, it
|
|
is not a bug: this is the normal state of erikb.
|
|
|
|
AUTHOR
|
|
|
|
Chris Goggans
|
|
|
|
BUGS
|
|
|
|
Too many to enumerate.
|
|
|
|
FILES
|
|
|
|
/usr/lib/comsec/nark
|
|
|
|
SEE ALSO
|
|
|
|
lame(1), comsec(1)
|
|
|
|
MOD Release 4.1 Last change: 26 November 1991
|
|
_______________________________________________________________________________
|
|
|
|
NEW IRC UTILITY
|
|
|
|
Phrack Inc has discovered ANOTHER new utility package while journeying in the
|
|
CyberMatrix. We picked this up from a system called "WASHINGTON.EDU". The
|
|
original author of this program is Ken Case.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
NeTw1z(1) USER COMMANDS NetW1z(1)
|
|
|
|
NAME
|
|
|
|
NeTw1z - IRC utility program
|
|
|
|
SYNOPSIS
|
|
|
|
NeTw1z [[-p user] [-c lame] [-d dir]] [-r [group]] [-t] [-s]
|
|
|
|
DESCRIPTION
|
|
|
|
The NeTw1z command is part of the m0d utility package.
|
|
|
|
OPTIONS
|
|
|
|
-p user
|
|
|
|
Post user's "information" IRC to impres everyone
|
|
|
|
-c lame
|
|
|
|
Complain about everything and everyone (other than MoD) being lame.
|
|
The default targets are Chris Goggans or Phrack Inc.
|
|
|
|
-d dir
|
|
|
|
Look in specified directory for user's information.
|
|
/usr/InfoAmerica is used if not specified.
|
|
|
|
-r [group]
|
|
|
|
Suffixes output with verbose form of attacks.
|
|
|
|
-t Print out witty (but usually not correct or even
|
|
intelligent) telco-related statement.
|
|
|
|
-s (boxer) shorts are what you wear when you are running down the
|
|
street away from the feds when they come to your house and take
|
|
your Commadore-64 that is plugged into your fat welfare momma's
|
|
television set.
|
|
|
|
No one has ever invoked NeTw1z without any arguments. It simply
|
|
cannot be done.
|
|
|
|
AUTHOR
|
|
|
|
Corrupt
|
|
|
|
BUGS
|
|
|
|
Too many to enumerate.
|
|
|
|
FILES
|
|
|
|
/usr/lib/mod/immature
|
|
|
|
SEE ALSO
|
|
|
|
lame(1), geek(1), crackdealer(1), welfare-momma's-boy(1)
|
|
_______________________________________________________________________________
|
|
|
|
|
|
==Diet Phrack==
|
|
|
|
Volume Three, Issue Thirty-Six, File 3 of 11
|
|
|
|
I n L i v i n g C o m p u t e r
|
|
~~~ ~~~~~~~~~~~ ~~~~~~~~~~~~~~~
|
|
"Knight Lightning meets... The Man"
|
|
|
|
Adapted from "In Living Color" on Fox Television Network
|
|
|
|
Starring Knight Lightning
|
|
|
|
Featuring:
|
|
__________________________________
|
|
| |
|
|
| KL = Knight Lightning |
|
|
| SP = Judge Dredd |
|
|
| CD = Crimson Death |
|
|
| DP = Dispater |
|
|
| |
|
|
| JD = Jerome Dalton (Bellcore) |
|
|
| DB = David Bauer (AT&T) |
|
|
| TM = The Man... you'll see! |
|
|
|__________________________________|
|
|
|
|
|
|
+ Picture the scene...
|
|
|
|
A computer conference in Chicago, Illinois.
|
|
|
|
KL is speaking with several members of the computer underground...
|
|
|
|
KL: "The whole concept is based on freedom of information. People should
|
|
share information, because sharing benefits everyone."
|
|
|
|
CD: "That is what my board, Free Speech, is all about. Want some c0dez?"
|
|
|
|
SP: "Hey Knight Lightning! Do you want to write for my *elite* newsletter,
|
|
NIA!?"
|
|
|
|
KL: "I don't think so... KL don't play that!" (At this point KL whips out a
|
|
large two-by-four and clunks Judge Dredd and Crimson Death on the head for
|
|
daring to suggest something so ridiculous). Bop! Bop!
|
|
|
|
Meanwhile, watching closely from a short distance stood two men in dark suits
|
|
and dark glasses. It was Jerome Dalton and David Bauer from AT&T Security.
|
|
|
|
DB: "See over there, that's KL. He would be perfect."
|
|
|
|
JD: "Yes I see. Perhaps we can persuade him to come aboard."
|
|
|
|
A few minutes later as Knight Lightning nears the exit, he is approached by
|
|
Bauer and Dalton.
|
|
|
|
JD: "Excuse me a moment KL... we'd like to discuss some business with you."
|
|
|
|
KL: "What the hell do *you* want?"
|
|
|
|
DB: "Well KL, with all of these hackers acting like they have civil rights, we
|
|
need some help over at AT&T Security to really bust them. We want you to
|
|
come work for us."
|
|
|
|
KL: (Gripping his two-by-four tightly and tensing to swing)
|
|
"KL don't pl..."
|
|
|
|
JD: "The job pays $1,000,000 a year!"
|
|
|
|
KL: "...have a problem with that." ($ $ $ $ $ $)
|
|
|
|
DB: "Congratulations KL and welcome aboard. You made the right decision."
|
|
_______________________________________________________________________________
|
|
|
|
+ One week later...
|
|
|
|
Dispater of Phrack Newsletter spots Knight Lightning, Jerome Dalton, and David
|
|
Bauer coming out of a security meeting with the Secret Service.
|
|
|
|
DP: "KL! Hey, what are you doing with those guys? Look I need to get some
|
|
advice about running Phrack."
|
|
|
|
JD: "Oh no you don't! KL don't play that no more!"
|
|
|
|
The three of them walk past Dispater...
|
|
|
|
DP: "You're not KL the hacker..." (tears in his eyes) "You're KL the FED!"
|
|
_______________________________________________________________________________
|
|
|
|
Did Knight Lightning SELL OUT the hacking community for money!? Has he become
|
|
a "FED"? To find out the answers to these questions and more, keep reading!
|
|
_______________________________________________________________________________
|
|
|
|
+ The scene is Cherry Hill, New Jersey... AT&T Headquarters, where the entire
|
|
country and the United States government are secretly run by "The Man."
|
|
|
|
DB: "We're very glad to have you here. Without your presence in the hacking
|
|
community, they'll fall apart any day now. That's why we had our friends
|
|
at Bellsouth single you out and falsify the costs and nature of that E911
|
|
document."
|
|
|
|
JD: "Right. But none of that is important now that you are here with us. I
|
|
guess you finally realized that since we at AT&T run the entire country,
|
|
it was futile to continue opposing us."
|
|
|
|
KL: "Yeah. It was the only decision that made sense at this point. So when
|
|
do I get to meet 'The Man'?"
|
|
|
|
DB: "In time KL, in time."
|
|
|
|
JD: "You don't get to meet 'The Man' until we're sure you are a total
|
|
sellout."
|
|
|
|
KL: "Oh. Well AT&T is the greatest corporation in the world."
|
|
|
|
DB: "C'mon KL, you can do better than that... most of America is already
|
|
brainwashed into believing that..."
|
|
|
|
KL: "All computer hackers are scum and don't deserve any civil rights, we
|
|
should seize all their computers and lock them up for ten years each."
|
|
|
|
JD: "and..."
|
|
|
|
KL: "and... Bill Cook is a great humanitarian, an honest man who never was
|
|
malicious, everything he did to me and many others was totally reasonable
|
|
and necessary."
|
|
|
|
WHOOOOOOOOOSH! (A giant door at the other end of the room swings open.)
|
|
|
|
DB: "You did it KL! You have totally sold out!"
|
|
|
|
JD: "Its time for you to meet 'The Man.'"
|
|
|
|
After a short round of applause and a high-five, Knight Lightning walks towards
|
|
the door and enters the room. He stares across a great desk where a large
|
|
chair is turned so that its occupant is facing the other direction.
|
|
|
|
TM: "Come in KL. Its time that we met."
|
|
|
|
KL: (Steps closer to the desk)
|
|
|
|
TM: (Swinging around to face KL) "Well, well, well Knight Lightning."
|
|
|
|
KL: "Well, well, well, The Man; Robert Allen, Mr. Establishment himself."
|
|
|
|
TM: "That's enough KL. I have BIG plans for you!"
|
|
|
|
KL: "Well, I really like what you did to Len Rose."
|
|
|
|
TM: "That is just the beginning! What I have in mind is for you to get us
|
|
information on every hacker in America. Then we'll fabricate some more
|
|
dollar figures, like on that E911 text file and login C, and create some
|
|
logs that show them breaking in to some of our systems. Maybe we'll even
|
|
let a few service outages happen just so we can blame it on them (we screw
|
|
up enough times by ourselves anyway). Then we'll use our massive
|
|
influence over the government to make sure the prosecutors find every
|
|
potential law they can to use against them and the next thing you know,
|
|
all these hackers will be behind bars where they belong."
|
|
|
|
"What do you think of all that, KL?"
|
|
|
|
KL: "I'm listening..."
|
|
|
|
TM: "Now before you can become an official member of the AT&T Security
|
|
Establishment, it is customary to drop your pants and bend over in front
|
|
of The Man."
|
|
|
|
KL: "Drop my pants and bend over?"
|
|
|
|
TM: "Yes... every person at AT&T and Bellcore security has undergone this
|
|
ritual."
|
|
|
|
KL: "Well Bob, I'll tell you what I think... here is a new ritual for you to
|
|
consider..."
|
|
|
|
(A sudden and exhilarating display of ninja-like maneuvers with the magic
|
|
two-by-four was followed by the loud and all too familiar sounds!):
|
|
|
|
"*BOP!* *BOP!* *BOP!*"
|
|
|
|
(KL had slammed Robert Allen for plotting such injustices).
|
|
|
|
"KL don't play that!"
|
|
|
|
"You thought you had me working for you, but really I was just playing
|
|
along as part of my secret plan to *BOP!* The Man. You stink!"
|
|
|
|
TM: "You fool, you don't know what you've done. You've just made the biggest
|
|
mistake of your life!"
|
|
|
|
KL: "Yeah, maybe, but I hold my principles higher than your money can ever
|
|
buy. What you do here is criminal and if the government won't crawl out
|
|
from under its rock and say something then I will!"
|
|
_______________________________________________________________________________
|
|
|
|
+ A few days later at the next 2600 meeting in New York City...
|
|
|
|
DP: "I knew you would never really sell out, KL."
|
|
|
|
KL: "Yes, you see I had to pretend so I could get to The Man."
|
|
|
|
SP: "Oh, so does that mean that you'll come back and write for NIA now?"
|
|
|
|
CD: "If money is not so important let me have that $1,000,000 they gave you."
|
|
|
|
KL: "KL don't play that!"
|
|
|
|
(Again KL whips out a large two-by-four and clunks the foolish Judge Dredd
|
|
on the head for daring to suggest something so ridiculous.
|
|
|
|
He missed clobbering the frightened and cowering Crimson Death again,
|
|
because in a moment of panic, CD chose to retire from the community and
|
|
instantaneously disappeared, leaving only his nose-ring behind.)
|
|
|
|
*BOP!*
|
|
_______________________________________________________________________________
|
|
|
|
|
|
==Diet Phrack==
|
|
|
|
Volume Three, Issue Thirty-Six, File 4 of 11
|
|
|
|
The History ah MOD
|
|
Revision #3 -- November 1991
|
|
Written by Wing Ding
|
|
|
|
[Originally From The MOD Technical Journal, Issue 4: File 6 of 10]
|
|
|
|
NOTES: I approximated all dates, as my records are not totally complete.
|
|
If I left anyone out or put someone in that shouldn't be in, fuck off!
|
|
I tried and did spend considerable time researching the dates and
|
|
BBS files, the old MOD BBS software, etc. This file is from MOD and
|
|
was intended for internal group reading only. Non-MOD versions are
|
|
being translated at this time, and will be released at a later date.
|
|
|
|
MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
[ De Hist'ry uh MOD ]
|
|
|
|
|
|
BOOK ONE: De Originals
|
|
|
|
In de early time part uh 1987, dere wuz numerous amounts uh busts in de US and
|
|
in New Yo'k in particular. Word to ya motha'. Fo' de most part, many uh de
|
|
so-called "elite" had gone underground o' had plum gotsten scared out of
|
|
hackin'. Many sucka's, as always, dought hackin' would die cuz' of de raids.
|
|
It wuz right befo'e dese raids dat MOD had fo'med.
|
|
|
|
It came about when Acid Phreak, den usin' anoda' handle, had been runnin' a
|
|
semi-private fuckin'bbs off his Commodo'e piece uh shit and 10 generic Commie
|
|
drives. It wuz called KAOS, and it attracted hacks and phreaks fum across de
|
|
country (as well as de usual amount uh k0dez d00ds). Nynex Phreak had been
|
|
co-systum mastuh (havin' been AP's partna' fo' about 2 years befo'e dat) and da
|
|
damn bo'd started off wid about 140 users but wuz weeded to de best 60 o' so.
|
|
|
|
On dis fuckin'bbs, Acid Phreak had gotsten along wid some few "kewl dewds" who
|
|
enjoyed da damn mischievous aspect uh phreakin'. Dey wuz Silva' Surfa' in
|
|
Califo'nia, and Quick Hack in Texas. When de raids came however, Silva' Surfa'
|
|
gots nabbed fo' usin' some PBX in 404 and derefo'e, retired. Quick Hack and
|
|
Acid stayed low and called each oda' less frequently dan usual. Soon dey had
|
|
bod stopped completely. Slap mah fro!
|
|
|
|
In early time 1989, Acid had jet back into de scene and had called some local
|
|
New Yo'k bo'd wid some somewhut "k0dez-e" attitude called ShadoWo'ld in 212.
|
|
Of course dere wuz lots uh neophytes eaga' to learn mo'e about hackin' and how
|
|
t'call places fo' free. Word! Most uh dem had been in de "duz 950 trace?"
|
|
stage, 'sept fo' someone who went by de handle Harry Hazardous. Unda' de
|
|
handle Phuck Dis (also Bell Bandit which had o'iginally been Nynex Phreak's
|
|
oda' handle), he met wid Harry. Slap mah fro! Soon dey had gained enough
|
|
respect fo' each oda' and decided t'meet. Harry turned out t'be HAC, some
|
|
cyberpunk t'de "T".
|
|
|
|
In numerous conversashuns between de two, AP had muhntioned de sweetness uh
|
|
tela'fone binnis computa's and how interestin' deir intricate structures wuz.
|
|
HAC wuz some hardco'e systums gangsta' himself, but he had also been partners
|
|
wid someone who came across (and had an impressive knack fo') some telco
|
|
computa's. He went by de name Sco'pion and he also lived in de NYC area.
|
|
Sheeeiit. Soon de dree wuz partakin' in all so'ts uh mischievous pranks and
|
|
unda' de guise of numerous handles (ie. Word! De Potent Rodent, Dream Master,
|
|
Phuck Dis) dey took t'knockin' down de locals who dought "I know all dere be
|
|
about hackin'". It wuz in de midst uh all dis fun dat dey agreed t'fo'm an
|
|
underground group called MOD (approx. June 1989).
|
|
|
|
About one mond latuh, Acid had been on Altos (revisitin' some chat dat wuz
|
|
once, but neva' again, de heart uh a lot uh fresh gangsta' convos since early
|
|
time '84 o' so) when he came across someone ax'in' fo' Unix gurus. Hims handle
|
|
wuz De Win', and he ran some Unix systum fum his crib in Pennsylvania.
|
|
Sheeeiit. Sco'pion wuz always some Unix guru while Acid had only jet across it
|
|
in college two years back. De Win' offered Acid an account on his systum and
|
|
soon he became "Phreak-Op" on De Sevend Dragon, his fuckin'bbs run off de Unix,
|
|
usin' yet anoda' old alias "Depeche Mode".
|
|
|
|
Relayin' de info'mashun t'Sco'pion on yet anoda' fresh addishun to de group,
|
|
dey decided t'recruit him into MOD. De fun, it seemed, had plum started...
|
|
|
|
|
|
BOOK TWO: Creative Mindz
|
|
|
|
Wid de addishun uh De Win', came some shitload uh pranks and loads uh fun. 'S
|
|
coo', bro. He hadn't knode much about tela'fone systums, but one thang he
|
|
knowed wuz how t'make Unixes do nifty thangs. Of course, he and Sco'pion had
|
|
undertakun de tax' uh takin' on some wo'dwhile projects and providin' de group
|
|
wid some healdy side-benefits (which kinnot be muhntioned o' commuhnted on at
|
|
dis particular momuhnt in time).
|
|
|
|
At dis point, de group consisted uh de 4 o'iginal founders (flounders??)
|
|
-> Acid Phreak, HAC, Sco'pion, and De Win'.
|
|
|
|
Around dis time, 2600 Magazine had 2 bo'ds in opuh'shun. De Central Office,
|
|
and De Toll Center. Word to ya motha'. OSUNY had gone down fo' some funky
|
|
reason a sho't time eardisr. Word to ya motha'. It wuz on De Toll Centa' (Red
|
|
Knight's fuckin'bbs) dat AP had fust met da damn next memba' of de group (and
|
|
coincidentally Red Knight which be de most recent memba' to de group). He
|
|
called himself "Supuh'nigga" and had much de same ideology as de rest uh de
|
|
group. It wuz followin' his group's o'iginal "knock down dose who dink dey
|
|
know everydin'" attitude dat MOD also adopted da damn same muhntality. Slap mah
|
|
fro! Supuh'nigga' wuz drafted and wid him came hours uh discusshuns on REAL
|
|
phreakin' and Social Engineerin'. Dere wuz also some loooong puh'iod of time
|
|
where MOD had some conference bridge set up by SN. Hours of enjoymuhnt and fun
|
|
fo' de whole family and kids uh all ages...
|
|
|
|
Anoda' gangsta' and telco computa' specialist also seemed t'be real prominent
|
|
and knowledgeable den as sheeit. He wuzn't likesd real much a'cuz he seemed
|
|
t'gots' some rada' large ego, which ah' may add, makes it coo' t'gots' when ya'
|
|
know so's much as he dun did. He went by two oda' handles some long time
|
|
befo'e, and when AP had fust called him up he had an idea he wuz also dose 2
|
|
oda' sucka's, but he had refused to admit so. He declared he wuz "Phiba' Optik
|
|
uh de LOD. Word! " and ax'ed whut AP wants'ed. Sco'pion, Acid and Phiba'
|
|
exchanged ideas on switchin' thera fo' some long while, but den came da damn
|
|
time when PO wants'ed t'know Acid Phreak's digits since he found it "unfair".
|
|
AP muhntioned dat he could prove himself by findin' it fo' himself. Word!
|
|
Armed wid a dialup, PO called Acid back on his real numba' and casually
|
|
proclaimed victo'y. Slap mah fro! And so, Phiba' Optik wuz "brought into" de
|
|
group. What wuz different however, wuz de fact dat he and AP had similar
|
|
interests and started "hangin'" as homeys "around da damn way" along wid HAC
|
|
and Sco'pion in de Village (NYC).
|
|
|
|
De Toll Centa' went down weeks latuh and PO, AP, and Sco'pion found demselves
|
|
callin' random "newjacks" t'de scene. Word! In dis way dey stumbled across
|
|
Crazy Eddie and some "quesshun and answa' fo'um" among de foe uh dem ensued wid
|
|
Crazy Eddie proclaimin' his eagerness t'learn. 'S coo', bro. Coincidentally
|
|
afta' a few calls t'CE on his crib line he challenged de MOD crew t'find his
|
|
oda' number. Word to ya motha'. Sho' nuff dey called it but coincidentally
|
|
enough, some few days on latuh in de week, some rada' nasal soundin' boy had
|
|
called him sayin' he wuz ITT security(?) and had tried to convince him he wuz
|
|
in deep shit fo' usin' c0des and dat he knows de "numbers uh de gangsta's dat
|
|
gots' been callin'" him. 'S coo', bro. In some rada' idiotic fashion, de ITT
|
|
sucka' attempted t'coax de 3 MOD members t'call him usin' 10488 (equal access,
|
|
fgd). He gave some bullshit numba' to where he wuz at and chilled by his
|
|
little dermal printa' fo' de digits to pop up. Of course, dey realized whut
|
|
some futile attempt t'catch dem dis wuz, and Crazy Eddie had repdisd dat "dey
|
|
say dey duzn't feel likes usin' equal access but dey'll call de numba' anyway".
|
|
It turns out da damn number wuzn't even real and afta' meetin' wid de ITT boy
|
|
on some loop he declared dat dey wuz smarta' dan he dought.
|
|
|
|
Afta' a few monds, Crazy Eddie wuz introduced t'de group and so, he had gotsten
|
|
t'know de group real well. Unfo'tunately, so's had de Secret Service. Word!
|
|
|
|
|
|
BOOK THREE: A Kick In De Groin
|
|
|
|
Sheeit, suffice it t'say, de fun couldn't last fo'ever. Word to ya motha'. On
|
|
January 24, 1990, de Secret Service visited da damn cribs uh Acid Phreak,
|
|
Phiba' Optik, and Sco'pion.
|
|
|
|
De raid dun didn't cum as some surprise since dey had been somewhut weary of
|
|
Domas Covenant's behavio' as uh late. Acid Phreak had been away fo' 2 weeks
|
|
(visitin' relatives in some fo'eign country) and wuz *somewhut* surprised
|
|
t'meet such unoppo'tune guests some day afta' his arrival. Phiba' wuz equally
|
|
amused at da damn "cleanin' service" he found so diligently wo'kin' in his
|
|
bedroom. 'S coo', bro. Sco'pion on de oda' hand, 'estremely *enjoyed* de
|
|
do'ough job dey had puh'fo'med at bod his do'm and his house and even saved
|
|
some hardware dey had left behind fo' de next time dey visit (which dey dun
|
|
did).
|
|
|
|
Days latuh, dey had gone t'meet De Win', which wuzn't able t'rap fo' too long
|
|
since he wuz too busy. Slap mah fro! He had been anticipatin' dis little
|
|
visit fo' awhile dough. His dad dun didn't 'esactly likes de idea uh deir
|
|
presence and kicked deir lack-of-a-warrant asses out befo'e dey gots some
|
|
chance t'put to use deir years uh interrogashun techniques classes. Seems dey
|
|
dink he showed his teacha' a credit repo't o' sump'n...
|
|
|
|
A few weeks go by, and MOD gits t'know Seeker. Word to ya motha'. He sounds
|
|
def enough, and he knows his electronics so's he be a real valuable addishun
|
|
t'de group. Seeka' made his way in and so's dun did de million-and-one MOD
|
|
stickers and funny-colo'ed-little-box-din'ies. De stickers, uh which, made deir
|
|
way t'Ground Zero's big-ass butt at some 2600 meetin'.
|
|
|
|
Anyways, de MOD Unix went down, and 3 local gangsta's wid much potential caught
|
|
attenshun t'dem. 'S coo', bro. Dey wuz: ZOD (a Unix gangsta'), Outlaw (just
|
|
a general dude), and sum nigga name Co'rupt (Vax kin'). Afta' days uh gettin'
|
|
t'know dem, dey wuz pulled in. 'S coo', bro. Countless weeks went by wid whut
|
|
seemed likes a dozen MOD fuckin'bbs's on 800s, packet switched netwo'ks, etc...
|
|
|
|
De group's popularity so'ed in such some sho't puh'iod uh time, but many
|
|
gangsta's disagreed wid de MOD style much in de same way Phiba' Optik had
|
|
enjoyed humiliatin' dose "in de know" publically. Slap mah fro!
|
|
|
|
ZOD wuz de last uh de group t'be raided (o' at least da damn most recent), but
|
|
gots 'em sum since made much 'haidway into de telecom wo'ld. Outlaw gots 'em
|
|
sum also been somewhut adept wid telco speak. Sum nigga' name Co'rupt, havin'
|
|
been real active befo'e, duzn't gots' some wo'kin' computa' anymo'e and so..
|
|
sheeit, duh.
|
|
|
|
Two new members wuz introduced around da damn time uh de writin' uh dis
|
|
chapter. Word to ya motha'. De fust wuz De Plague. Word! He had some
|
|
professional attitude and wuz certainly wo'd trustin'. Of course, wid all de
|
|
media attenshun drawn to him and MOD in general, he gots 'em sum decided
|
|
t'remain low and not brin' any mo'e t'himself. Word!
|
|
|
|
Red Knight wuz o'iginally on trash runs wid Acid Phreak in '89 but wuz not
|
|
brought in until July '90. It seems RK gots 'em sum learned some lot about
|
|
telco ways since he fust put up De Toll Center. Word to ya motha'. RK also
|
|
seems to enjoy reminiscin' about da damn trash run days (of which dere wuz
|
|
quite a few).
|
|
|
|
As uh August 1, 1990, dere are 14 members. Dese include, dig dis:
|
|
|
|
Acid Phreak (r)
|
|
HAC
|
|
Sco'pion (r)
|
|
De Win' (v)
|
|
Supuh'nigger
|
|
Nynex Phreak (r)
|
|
Phiba' Optik (r)
|
|
Crazy Eddie (r)
|
|
Seeker
|
|
ZOD (r)
|
|
Outlaw
|
|
Sum nigga' name Co'rupt
|
|
De Plague
|
|
Red Knight
|
|
|
|
(v) signifies sucka' wuz visited but nodin' took
|
|
(r) means eida' raided o' retired, it's some pickem. 'S coo', bro..
|
|
|
|
- - -> MOD be now *CLOSED* t'membership. <- - -
|
|
|
|
Dis be de official (and most likesly t'be da damn final) list
|
|
uh dewds. Of course, members may use some GROUP account o'
|
|
anoda' handle, but da damn fact remains dat dese are da damn ONLY
|
|
members in de group. Unlikes LOD, we know who be in and who
|
|
isn't..
|
|
|
|
We should also note Julian Dibbell (Dr. Bombay) fo' his wo'k on "Rebel Hackers"
|
|
in De Village Voice on July 24, 1990. He po'trayed de scene da damn way it
|
|
really be and uh course gave us de amount uh coverage we deserve. Word! And
|
|
uh course, we came out da damn way we really are and not as gangsta's out
|
|
t'destroy de wo'ld. Dr. Word to ya motha'. Bombay wuz invited t'de MOD Unix
|
|
right befo'e da damn raid. 'lo and behold.. some front-page cover sto'y.
|
|
Word!
|
|
|
|
"We rule".
|
|
|
|
MOD/Fo'eva' We Hack
|
|
|
|
|
|
|
|
BOOK FOUR: End uh '90-1991
|
|
|
|
Two weeks befo'e his bust, Lo'd Micro wuz introduced into de group.
|
|
Unfo'tunately he wuz busted fo' hackin' FON cards off de 800/877-8000. Sho'
|
|
nuff, he knowed he wuz gonna git busted but he dun didn't listen, o' care fo'
|
|
dat matter. Word to ya motha'. Afta' hours (and hours, and hours) uh
|
|
community service, LM lived t'joke about his o'deal bein' dat he IS some funny
|
|
guy. Slap mah fro! Don't eva' get dis guy drunk.
|
|
|
|
Fo' quite some long time now, MOD gots 'em sum jet to realize whut some bunch
|
|
of idiot posers de LOD wuz (wid de 'sepshun uh a few). It plum goes t'show,
|
|
ANYONE kin be some great gangsta' as long as enough sucka's dink so's too. Why
|
|
boda' resparkin' interest in MOD? Why boda' keepin' de damn thang goin' when
|
|
de new members ain't half as fresh as de o'iginals? ah' duzn't know, but ya'
|
|
kin ax' Erik Bloodaxe who be de self-proclaimed "leader" at dis point in time.
|
|
Word! Jeez, and ah' dought brin'in' back TAP wuz stupid.
|
|
|
|
Anoda' posa' dat came out uh de woodwo'k be Skandle (STAN), who somehow decided
|
|
he had powa' in DPAK (Supuh'nigger's group). Afta' hours of tryin' t'figure
|
|
dis one out, we plum had t'conclude wuz plum anoder dumb Jersey hick. Oh
|
|
sheeit.. so's much fo' dat.
|
|
|
|
A new group, FORCE 1(ONE) Hackers led by Expose(which sounds fuckin gay if ya
|
|
ax' me), decided t'declare war on MOD. Assisted by Hellrat, he says, dig dis:
|
|
"You's guys (MOD) should stay out uh de hackin' buziness 'cuz none uh my fellas
|
|
are 'fraid uh ya'. I'll snatch all uh ya' out mah'self. Word! " ...along wid
|
|
some lot of oda' nonsense about 10-way billin' and oda' ca-ca he's read in one
|
|
too many g-files.
|
|
|
|
One thang dat's def be de addishun uh a lama' database online (on wingnet now
|
|
MODNET). It's great when you be plannin' roll-ups and shit and it's some great
|
|
o'ganiza' dat takes care uh all dat rummagin' drough sheets and shit. Hundreds
|
|
uh losers fo' hours uh fun. Word!
|
|
|
|
Durin' de fust week in February, MOD finally declared,"Dat's it. Word! It's
|
|
official now. LOD declares war on MOD. Word! " Oh broder. Word to ya
|
|
motha'...eenie-meenie-minie-moe. Word! I declare war on......YOU. Word!
|
|
Nyah-nyah. Sheeit, it be now de second week uh February and da damn only thang
|
|
dat gots 'em sum happened so's far in de "MOD-LOD War" be dat dere wuz about 5
|
|
invalid login attempts on modnet. It seems dat "MOB" gots 'em sum decided
|
|
t'join in de war. Word to ya motha'. What some fuckin' joke, dey are tied wid
|
|
MCWS fo' lameness (which isn't hard t'do).
|
|
|
|
De legacy uh de underground "clandestine" netwo'k continues and so's duz de
|
|
war (and ridiculin') against all de self-proclaimed, so-called "elite".
|
|
|
|
|
|
BOOK FIVE: Who are dey and where dun did dey jet from?
|
|
|
|
Sheeit, it's time again fo' anoda' journul. It's now de
|
|
middle uh summa' 1991. Lately we've heard some few fresh sto'ies
|
|
out uh de mouds uh sucka's we duzn't even know. Dere gots'
|
|
even been some few funny occurances in de past few weeks.
|
|
|
|
1) Dere are rumours dat Phiba' Optik wuz wuztin' his life
|
|
away and not usin' his talents wisely. Slap mah fro!
|
|
Sheeit, de trud of de matta' is, he gots 'em sum been some
|
|
speaka' in many public debates and conferences on hackin' in
|
|
general and computa' security. Slap mah fro! He be also wo'kin'
|
|
as some programmuh/developuh' fo' some computa'
|
|
firm in NYC. Also, he be wo'kin' closely wid de EFF (which
|
|
recently gots' set up deir own systum fo' deir o'ganizashun).
|
|
|
|
2) COMSEC be fo'med. De *new* LOD (whose only member
|
|
consists uh Erik Bloodaxe) goes into de computa' security
|
|
binnis. Nodin' t'date be documuhnted on deir services and
|
|
we gots' yet t'see whut de hell dey kin provide. Word! EBA fo'
|
|
one be an o'iginal memba' and he knows close t'nodin'
|
|
(except fo' de thangs dat he ax'ed Phiba' Optik t'tell
|
|
him). Not t'muhntion dese guys are hardly co'po'ate and gots'
|
|
NO 'espuh'ience in de binnis end uh computa' security; which
|
|
'esplains why dey gots caught misrepresentin' demselves as
|
|
Landmark Graphics t'oda' well-established computa' security
|
|
firms. Also, dey gots' bragged about narkin' on some few members
|
|
uh MOD in deir jealous rage. Word! Dis we kin prove drough
|
|
insiders.
|
|
|
|
MOD wuz neva' a text stash "how-to" group. It wuz always based
|
|
on some broderhood type deal and everydin' done be secretive
|
|
and gots 'em sum some purpose behind it. LOD on de oda' hand, never
|
|
made sense t'any uh us anymo'e. Word! It wuz fresh at fust, when
|
|
all de o'iginal (knowledgable) members wuz active, but
|
|
lately it's become t'be knode as some group uh guys wid
|
|
real sparce telecom knowledge ridin' on some name dat once
|
|
actually stood fo' sump'n.
|
|
|
|
Even Phiba' Optik quesshuned wheda' LOD meant Legion uh Doom
|
|
o' Lump uh Doo-doo (on Gyrotechnic's private fuckin'bbs). He stood
|
|
firm against all de oda' members on de systum until finally
|
|
dey wuz dumbfounded and speechless. Sheeit, de bo'd died.
|
|
Now, PO and da damn rest uh de MOD bunch snatch t'dem likes a
|
|
swatta' to fdiss. Give it up fellas.. it'll neva' wo'k.
|
|
|
|
3) Renegade Hacka' (a NYC local) dinks he's def. He gits
|
|
raided, starts rapin', and when confronted by MOD, hides
|
|
behind mommy. Slap mah fro! Den he says he hates MOD (which
|
|
be funny since he wuz sweatin' MOD's nuts since da damn day he
|
|
fust gots some modem; dose who wuz at da damn 2600 know whut
|
|
ah' mean. 'S coo', bro..) De fact remains he be a real losa'
|
|
out t'make some name fo' himself by tryin' t'inspire dose who
|
|
gots' less contact wid de better gangsta's in de community.
|
|
Slap mah fro!
|
|
|
|
NASTY (his group) = BIG Joke. Word!
|
|
(dey scribble files..de Nashunal Enquira' of de h/p wo'ld)
|
|
|
|
*Rent-A-Gay Hacka' changed his fone #.. please note da damn new
|
|
one in de database. Word! *
|
|
|
|
4) Lo'd Micro gits Xenix and creates whut gots'ta be modnet 2.
|
|
(De Win' be de mina'strato' uh #1 in PA) Crazy Eddie
|
|
plans t'put up some fuckin'bbs (open fo'um) in de 2600 Magazine
|
|
fo'mat (likes OSUNY, Central Office, De Toll Center).
|
|
NO illegal shit...plum deo'etical discusshun..whut real
|
|
gangsta's are made of. Word!
|
|
|
|
5) Vinny (De Technician) be "outed". He be an admitted
|
|
homosexual. I'm tellin' ya'.. watch out fo' dese SSWC
|
|
guys..dey're some little funny, ya know?
|
|
|
|
6) Mind Rape, o' sump'n likes dat, uh NSA be a new pest.
|
|
Gimme some break. When gots'ta dey eva' learn? Infiniti wuz
|
|
anoda' one, but ah' guess he's kept quiet..which be fresh.
|
|
Let's plum hope he duzn't ax' Mind Dweeb fo' help. Add
|
|
Purple "no-show" Mustard (c0dez kid..see MOD/database fo' mo'e
|
|
info) t'dis catago'y. Slap mah fro! Also, dere's anoda' guy usin'
|
|
Acid's handle in 216. Wasn't home when we called twice. Word!
|
|
|
|
|
|
Special danks t'Jack Hitt and Paul Tough uh Harpuh''s Magazine. Word!
|
|
Great guys, fresh scribblers/edito's.. damn dat stuff wuz fun.
|
|
'S coo', bro.
|
|
|
|
Hello t'State Police Offica' Donald Delaney. Slap mah fro! Not such
|
|
some bad-ass guy, plum dat he IS some cop and he DID bust some uh us.
|
|
But he also gots dose guys piratin' cellular service in Queens, which
|
|
really wuz a majo' bust. Nice tie. Word!
|
|
|
|
===================
|
|
= Anoda' MOD.duh =
|
|
= file = "Mo'e eLiTenezz in one pinky
|
|
= = dan 2 kans uh LOD. Word! "
|
|
= All repdiss kin =
|
|
= be sent to, =
|
|
= dig dis: =
|
|
= =
|
|
= MOD@modnet.UUCP =
|
|
===================
|
|
-> kill r0dentz. Word! . Word! . Word!
|
|
|
|
MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d
|
|
|
|
|
|
==Diet Phrack==
|
|
|
|
Volume Three, Issue Thirty-Six, File 5 of 11
|
|
|
|
*Elite* Access!
|
|
A Tutorial On Being An Elite Hacker
|
|
|
|
By Dead Lord and Lord Digital
|
|
|
|
Lords Anonymous!
|
|
|
|
September 25, 1986
|
|
Revised May 2, 1988
|
|
Revised Again August 20, 1991
|
|
|
|
|
|
PROLOGUE
|
|
========
|
|
For reporters, brain dead media types, or anyone else reading this who has been
|
|
blessed with a room temperature IQ and faulty observational abilities; "Elite"
|
|
as it's applied to the "underground" community, is a phrase that theoretically
|
|
denotes the top 2-5% of the hacking and phreaking community and its rather
|
|
peculiar hierarchy. Realistically it denotes the 2-5% that spend the greatest
|
|
amount of time polishing up their image on boards instead of doing what they're
|
|
presumably good at (hacking).
|
|
|
|
This article is designed to allow you (yes YOU the junior G-man; would be
|
|
Secret Service agent; publicity whore; over-eager journalist, or just bored
|
|
modem owner and future potential ELITE) access to almost anything you might
|
|
wish to call; in addition to providing you with the knowledge necessary to
|
|
impress other ELITE's with your learned brilliance.
|
|
|
|
|
|
CONTENT
|
|
=======
|
|
A tutorial for all the people too dense to figure out the quirks of human
|
|
nature all by themselves, who also have some inane desire to have access to
|
|
ELITE boards, containing ELITE information and ELITE users, along with ELITE
|
|
wares, 42 seconds after they are cracked by ELITE crackers. Not to mention
|
|
ELITE dial-ups to ELITE companies, which will work for approximately 15 minutes
|
|
before some idiot logs in and does something to fuck them up.
|
|
|
|
I'm writing it because I am bored of doing all this by myself, with only a
|
|
handful of peers to accompany me. Not that I expect to gain "peers" from
|
|
people that need help from this text file, but I imagine it'll give ELITE
|
|
Sysops something else to do with their time. I also hope to save you 2-5 years
|
|
of time. 2-5 years is the average lifespan of an ELITE person, before he gets
|
|
a life and comes to the understanding that he just wasted 2-5 years.
|
|
|
|
Please don't misunderstand me when I say 2-5 years, there are many people who
|
|
have been ELITE for almost 10 years and are still going strong. I wouldn't
|
|
want to step on any ego's, or ruin anyone's life work, now would I...
|
|
|
|
|
|
BOARDS
|
|
======
|
|
ELITE boards exist because the people who populate them, believe themselves to
|
|
be superior to the people populating all the other boards. Most people don't
|
|
agree with them, but they agree with each other. 100-200 people being
|
|
sufficient to set up their own personal version of the world, they gather
|
|
together on these ELITE boards and do ELITE things like post new wares, engage
|
|
in "rag wars" and type things up out of manuals at each other.
|
|
|
|
|
|
SYSOPS
|
|
======
|
|
Seeing how you're trying to get access to an ELITE board, you should have a
|
|
basic understand of who the Sysop is, and why he's running the board. This
|
|
part is easy, in over 95% of all cases, the Sysop is a egotistical fool, who is
|
|
willing to give up the use of his computer, or computers, in exchange for the
|
|
privilege of playing GOD with the hopeless sots who log in.
|
|
|
|
This is especially the case on all manner of ELITE boards that request a "real"
|
|
telephone number, voice validation, and the donation of your first born male
|
|
child for even higher access. All under the guise of "security." Requesting a
|
|
"real" voice number, or even name, is nothing that unusual. Almost all
|
|
"mainstream" non-Pirate and non-Phreak systems require it.
|
|
|
|
Of course there is nothing stopping you from leaving them Anal Annie's phone
|
|
sex service as your home number, and picking a random name. That will usually
|
|
be the end of that. The only time the Sysop will ever check into your
|
|
information will be if you happen to become a "rodent" and annoy him and/or the
|
|
users of his BBS, in which case he'll engage you in a 20 letter conversation,
|
|
each one giving a really sincere and heartening reason why you would feel so
|
|
much better if you gave him your phone number, and why he just HAS to have it
|
|
for reasons you wouldn't understand, because ALL Sysops MUST keep track of who
|
|
uses their systems, don't ya know?
|
|
|
|
This file won't cover "normal" Sysops, because if you aren't capable of
|
|
bullshitting THEM, then you're hopeless and may as well find a new hobby. Like
|
|
gardening is pretty exciting I hear, fer instance...
|
|
|
|
|
|
"VOICE" NUMBERS
|
|
===============
|
|
The truth is there is no reason on earth, why a Sysop should EVER need your
|
|
voice number, or any information on you at all. Naturally he'll WANT it,
|
|
because being the kind of person who runs a BBS in the first place, he's a nosy
|
|
and prying kind of guy that want's to know everything about you. For reasons
|
|
of "board security" of course.
|
|
|
|
Let me tell you about board security; it doesn't exist! When a
|
|
system is "secure" all that means is that the Sysop has lulled himself into a
|
|
false sense of safety that bears little relation to the actual state of his
|
|
board. But that's beside the point. The point being that you DON'T want to
|
|
hear from the Sysop; EVER.
|
|
|
|
One of the reasons they give for "needing" your voice number is
|
|
|
|
"Well "Well if there's ever something wrong with the bbs, I need to
|
|
be able to let you know, or ask you what commands you used if you
|
|
were the last user before it crashed."
|
|
|
|
Isn't that nice... How many Sysop's notify their users when their board goes
|
|
down for repairs? NOT ONE. As for problems, well what do I care? The last
|
|
thing I want is Melvin Sysop calling me up when I'm watching Miami Vice and
|
|
trying to have a 5 hour conversation with me because he has nothing else to do
|
|
with his time. Or better still, having my phone number embedded in his
|
|
software when the Secret Service busts down his door because he carded 50 hard
|
|
drives to his home address.
|
|
|
|
I know many Sysops, some of them are even my friends. These are the kinds of
|
|
things Sysops do with their userlists. Of course ALL of them will CLAIM that
|
|
other Sysops might do that, but THEY never would, God no, not them!
|
|
|
|
|
|
FAVORITE SYSOP USES FOR USERS' TELEPHONE NUMBERS
|
|
================================================
|
|
|
|
I. When any "new ware" is released (and he happens to be a Pirate kind of
|
|
guy), Sysops go through every name on the userlist, call them up and
|
|
ask for the new ware. If you don't have the new ware, or just say you
|
|
don't in the hopes that he will fuck off, he will then proceed to bug
|
|
the hell out of you by asking for 50 other wares that he just has to
|
|
have.
|
|
|
|
II. If he's an ELITE PHREAK kinda guy and some national emergency takes
|
|
place such as his favorite 800 dying on him; he does the same thing as
|
|
the Pirate type Sysop and calls everyone on the userlist begging for
|
|
800's, "any cool info", and pw's to CIS.
|
|
|
|
III. More so with Phreaks than Pirates, but somewhat true for all of them:
|
|
The Sysop want's an update on some latest tidbit of hot gossip that he
|
|
will just die if he doesn't find out. He will then try to have
|
|
another 5 hour conversation with you about whatever drivel he called
|
|
you up to discuss.
|
|
|
|
IV. Some people trade baseball cards, some people trade comics, some
|
|
people trade phone numbers. Sysops LOVE to trade phone numbers,
|
|
especially those of "influential" users. I don't know why, they
|
|
usually lack the balls to even call them beyond the customary dial,
|
|
wait for some person's voice, then slam the phone down and go jerk off
|
|
because all that excitement gave them a hard-on. This is very much to
|
|
your benefit as I'll explain a little further down.
|
|
|
|
V. And worst of all, there is the "lonely Sysop", the guy who will call
|
|
you every "day" at 2 in the morning and try to have an engaging
|
|
conversation about whatever happened in his "life" that day.
|
|
|
|
There are many other things Sysops do with your number, but as far as I'm
|
|
concerned, those were the worst. OK, I'm going on and on about why a Sysop has
|
|
no need for your number, and how he'll annoy you to death if he ever gets it,
|
|
so YOU know that now, but what do you do about it?
|
|
|
|
|
|
GETTING VALIDATED
|
|
=================
|
|
There is no big trick to being validated. In almost every case, the Sysop
|
|
asking for a voice number, is just his usual hoopla and he'll never bother to
|
|
check out anything you give him that passes as "information." If you leave a
|
|
reasonably intelligent copy of feedback, kiss his ass in a sublime kind of way,
|
|
and in general explain to him why having you on his bbs will make his life much
|
|
better than it is now; you'll be validated with normal access.
|
|
|
|
Uploading new wares or files, posting messages, and drivel along those lines,
|
|
will get your access raised. You can also bullshit for higher access, but I'm
|
|
assuming YOU don't know how, which is why you're reading this file to begin
|
|
with. BULLSHITTING is an artform and I have neither the time or patience to
|
|
type up a file on it, so I'm doing this instead.
|
|
|
|
|
|
EXAMPLE PIRATE BOARD FEEDBACK
|
|
=============================
|
|
|
|
Hello,
|
|
I'm the Masked Avocado. I just
|
|
got your bbs #, from an advertisement
|
|
that was posted on Capital Connection.
|
|
I liked what the message had to say,
|
|
so I called to check your board out.
|
|
I can contribute newsoftware,
|
|
programming help, and anything that mi
|
|
ght help to enhance your bbs.
|
|
I also distribute for Coast to Coast
|
|
and Digital Gang. My latest wares
|
|
include: MultiScribe //gs 2.1.2.4
|
|
HiggyBBS 6.2 Deluxe Paint Print
|
|
Plus 2.1
|
|
By the way, my first name is Melvin,
|
|
I'm 13^H^H19, and my system is made
|
|
up of an enhanced //e, 212 applecat,
|
|
3.5 drive and a bunch of
|
|
peripherals. Thanks for your time,
|
|
Melvin
|
|
|
|
Let's examine that and highlight a few points.
|
|
|
|
I. ALWAYS use decimal points when describing new wares. Copy ][+ has a
|
|
revision every 2 weeks that does nothing except update the parm files.
|
|
NEW WARES! have constant updates and "Pirates" are always on the
|
|
lookout to increase the decimal point revision of their software.
|
|
Even if it does NOTHING different EXCEPT change the decimal point.
|
|
|
|
Aside from the fact that feedback is just bullshit to get you
|
|
validated, you can very easily get a sector editor up and change a few
|
|
decimal points yourself.
|
|
|
|
II. ALWAYS say you got his BBS number from some established ELITE board,
|
|
in the case of Pirates, Capital Connection is always a good bet. In
|
|
reality it's quite a lame board, but other board Sysops seem to feel
|
|
otherwise, and besides instantly impressing the Sysop of the board
|
|
you're logging into (by being a member of CapCon), he will also get a
|
|
kick out of it that some idiot posted his board on the CapCon "BBS
|
|
Ads" section.
|
|
|
|
[Please note that "Capital Connection" was valid at this file's original incept
|
|
date. The average Pirate board having a lifespan of 6 months at best; Capital
|
|
Connection no longer exists. The current Elite Pirate board of the next 6
|
|
months, is "Trade Center."]
|
|
|
|
III. Among your list of "new wares" you can always list some BBS program,
|
|
because every week some dork writes a new program, that is lousy,
|
|
never works right, and if ever faced with "put up or shut up" you can
|
|
change around any one of 50 different BBS programs, and upload it as
|
|
the NEW WARE!
|
|
|
|
[Same with software as with boards -- it doesn't stay new very long. I can't
|
|
help you here because I haven't the slightest idea what's new in Apple
|
|
software. However, all you need to do is invest 3 bucks in the latest issue
|
|
of whatever magazine pertains to your particular computer, and list off some
|
|
of the software you see advertised.]
|
|
|
|
IV. Always say you distribute for some random collection of new wares
|
|
groups. Nobody can prove that you don't (logging into one cat-fur and
|
|
uploading the wares you found on it, to another cat-fur, is
|
|
distributing) and it will make the Sysop think that you'll be
|
|
uploading 20 sided GS wares to his board every day.
|
|
|
|
[As you may have guessed, new wares groups also come and go. Digital Gang
|
|
still exists, as do a slew of new groups; if you don't know of any, a safe bet
|
|
is making up a name and saying that you're based somewhere in Europe. Europe
|
|
being the fabled birthplace of all the best new Atari and Amiga software in
|
|
particular.]
|
|
|
|
V. Always list "your" first name and age. Make up an age that is over 16
|
|
so they won't discriminate against you. If you're under 16 and admit
|
|
it in your feedback, you'll be instantly labeled an idiot.
|
|
|
|
VI. Always list some of your hardware. Don't ask me why, it's just
|
|
another item in the agenda of things that Sysops like to pry into. If
|
|
you give them this information without them asking for it, it makes
|
|
them feel better.
|
|
|
|
VII. Always end the message with a "thanks for your time." Remember, he's
|
|
an egotistical fool, and that one line makes him think you respect
|
|
him, want to do things for him, and would be genuinely happy to be a
|
|
member of his AWESOME board.
|
|
|
|
VIII. ALWAYS sign it with "your" first name, this keeps the tone informal,
|
|
and makes you seem like a less threatening type of guy.
|
|
|
|
|
|
GENERAL TIPS
|
|
============
|
|
Remember that many Pirate boards have a "VOTE ON NEW USERS" feature, so
|
|
don't say anything that you wouldn't want the entire world to read. If you
|
|
follow those basic guidelines, you'll ALWAYS get validated if the rest of your
|
|
information is right. The rest being your phone number if the Sysop actually
|
|
calls new users.
|
|
|
|
Some of you are saying to yourselves: Yeah, but if you just listed all of this,
|
|
won't Sysops be on the lookout for this kind of feedback? Yeah, but then who
|
|
are they going to validate? "Obvious" rodents? No, if they want new users
|
|
then they'll be more than happy to accept you.
|
|
|
|
|
|
EXAMPLE PHREAK BOARD FEEDBACK
|
|
=============================
|
|
|
|
Greetings,
|
|
I'm Tesla Coil of The Crossbar Rapists (TC of TCR). I was told by a
|
|
user of Metal Shop Private (MSP), that your bbs was worth looking into. I've
|
|
been published in TAP, 2600, and Uncle Mel's Phone Times. My handle was listed
|
|
in issue 12 of Security Systems of Greater Podunk (SSoGP) as a "Computer genius
|
|
breaks into Podunk's Private Database!" I've been hacking since 1981, I was a
|
|
member of Sherwood Forest, Securityland, The AT&T Phone Center, OSUNY, OSUNY
|
|
when it went back up, WOPR, LOD the BBS, Cryton, COSMOS, Metal Shop Private,
|
|
and OSUNY when it came back for yet another go at it. I had to change my
|
|
handle for reasons of security when I was taken out by the feds in the 1983 414
|
|
busts.
|
|
|
|
I'm an expert with Unix, RSTS, Primos, and HiggyOS. I can program in C,
|
|
D, E, and F, Fortran 77 and 78, Basic for the Cyber, IBM, MAC, Amiga, ST, and
|
|
Apple II. I also know assembly for the 6502, 8088, 68020, Z-80a, and TIMEX. I
|
|
have an Apple //e, IBM AT, Mac+, and Kim-A1.
|
|
|
|
After entering college last year, my time was seriously limited. But
|
|
after getting some additional free time, I've decided to restart my hobby of
|
|
hacking and exploring the phone system. My current interest centers around the
|
|
understanding of the myriad functions associated with CLID.
|
|
|
|
People who can recommend me include (Pick 4 or 5 names of people who
|
|
aren't really ELITE, but not unknown to current ELITE Sysops either). If you
|
|
can't think of them, pick up any issue of PHRACK and take a few out of there.
|
|
The reason you want "not really ELITE" people, is because they won't command
|
|
too much attention. You DON'T WANT excess attention, saying that some dork who
|
|
writes for Phrack recommends you, is less noticeable than saying some "real"
|
|
ELITE recommends you. Why say ANYONE recommends you, if it's so much trouble?
|
|
Because it somehow flips a switch in the Sysop's mind, which makes him think
|
|
that you must be an OK dude, if so and so recommends you. Nine out of ten
|
|
times he won't check. The one time he does check, the person he's bothering
|
|
will usually say "yeah yeah, go away I'm doing something" and that'll be the
|
|
end of it).
|
|
|
|
[Please note that by "real elite" I don't mean anyone who is better, rather I
|
|
mean someone who has spent tremendous amounts of time generating exposure for
|
|
his handle.]
|
|
|
|
Thanks for you time, Tesla Coil/The Crossbar Rapists
|
|
|
|
Let's examine this one too.
|
|
|
|
I. As you can see we've switched from 40 columns, to 80 columns complete
|
|
with some form of spacing. We've also gotten a little bit more-let's
|
|
say-"readable" than in our previous Pirate feedback example. This is
|
|
because we're calling a different kind of system, with a different
|
|
program than cat-fur ENHANCED 1.1!
|
|
|
|
II. With Phreak Sysops you don't want to get too informal, because most of
|
|
them are busy playing SECRET AGENT MAN and if you do something normal
|
|
like sign off with "your" first name, he'll think you're not being
|
|
"professional." How it is in his mind that he equates "professional"
|
|
with calling his board: I don't know, but trust me on this point.
|
|
|
|
III. In the same vein of "professionalism", you're expected to list off
|
|
your "accomplishments". Oddly enough, in Phreak/Hacker HIERARCHY,
|
|
getting arrested numerous times is considered ELITE by many of it's
|
|
peoples. Why this is, I don't know either. Personally, it says to me
|
|
that the person who got arrested has the brains of an African bushman,
|
|
but apparently, that's just my lone opinion. Anyhow, in line with
|
|
this PROFESSIONAL attitude you are expected to list your life's
|
|
accomplishments in the space of 50-100 lines, in a form that will make
|
|
you sound like the best Hacker in the world, who is so good, that
|
|
logically he wouldn't be caught dead calling the ELITE board you're
|
|
calling, but once again skipping the logic and getting back to the
|
|
Sysops expectations...
|
|
|
|
IV. OK continuing with the thought we started... list off a bunch of
|
|
languages, knowing them is optional, because the Sysop doesn't know
|
|
them either. Reading the dust jacket and index on a book covering
|
|
any of those subjects will enable you to APPEAR to know what you're
|
|
doing, which is all that the Sysop is doing, so don't worry about it,
|
|
because he doesn't know vi from cd, and couldn't INFILTRATE a Unix if
|
|
he had the root account. If you don't want to spend $5000 stocking up
|
|
on ELITE TECHNICAL MANUALS, go down to the library and xerox a bunch
|
|
of index's. Or better yet, just check out the books and never return
|
|
them (if your library lets you check out reference manuals. Most
|
|
don't, but you can always rip out that little magnetic sensor in the
|
|
card on the book and walk out with it anyway, but I digress...).
|
|
|
|
V. After you've done that, list a bunch of micro-specific assembly
|
|
languages that you "know," and in general just make up things until
|
|
you've filled up around 2 paragraphs or so. 95% of ELITE
|
|
PHREAKING/HACKING is just posing anyway, so don't feel guilty about it
|
|
or let it worry you too much because that's the same way 9/10th of the
|
|
board got access. Unless they were ELITE, which is just posing to a
|
|
higher degree than most bother to go with.
|
|
|
|
VI. Remember to say WHERE YOU GOT THE NUMBER FROM! This is because like I
|
|
said before, most Phreaks are busy playing SECRET AGENT MAN and will
|
|
get an ulcer and lay awake at night thinking that CABLE PAIR is
|
|
infiltrating their board. You know it isn't true, but the Sysop will
|
|
wet his pants anyway, so just put his mind at rest and make up some
|
|
place where you got the number from. Metal Shop is always a safe bet,
|
|
because it's the Phreak dumping ground of ELITENESS, much like CapCon
|
|
is the Pirate's equivalent. Be sure to use vague terms like "I was
|
|
told by a user of..." and things of that nature that can't be readily
|
|
verified, but still sound plausible.
|
|
|
|
[Ahem, sorry to interrupt again, but as you may have guessed, MSP is down at
|
|
this time. MSP's new replacement is the Legion of Doom base BBS that goes by
|
|
the name of "Digital Logic." A large percentage of the users there are under
|
|
phony handles that gained entry by exactly the type of bullshitting I'm
|
|
writing about in this article. The remaining phony accounts got access by
|
|
threatening the Sysop with "Phreak retaliation" and having him cave into
|
|
demands; which for a LOD board is about par for course.]
|
|
|
|
VII. Next make up your "writing credits" and "media credits". Select a few
|
|
random issues of random magazines that you either wrote for, or had
|
|
your alias' mentioned in. Make sure they're of the small circulation
|
|
type and the issue is at least 2 years old. Nobody will ever check or
|
|
even have a way of checking if they wanted to. Most people who
|
|
"wrote" things just rephrased tech manuals and copied the
|
|
illustrations. If you're ever pressured to come up with something YOU
|
|
wrote, just do the same thing because that's what all the other ELITES
|
|
are busy doing. Be sure to run it through a spelling checker
|
|
so it looks PROFESSIONAL as ELITE PHREAKS are fond of looking and
|
|
thinking of themselves.
|
|
|
|
VIII. Next list off a bunch of ELITE BOARDS you've been a member of.
|
|
Listing those that I just listed are a safe bet, because they're
|
|
famous or as the case may be infamous, to such a degree that the Sysop
|
|
will have heard of them. He wouldn't have been on them, so he won't
|
|
be able to verify that either. The reason he wouldn't have been on
|
|
them, is because he hasn't been ELITE longer than 2 years, otherwise
|
|
he wouldn't be running a board. If he HAS been ELITE for
|
|
longer than two years, and IS still running a board, then he's an
|
|
idiot and you can safely assume that he wouldn't have been on them
|
|
anyway. Not that being an idiot disqualifies anyone from being a
|
|
member of anything, but APPEARING to be an idiot will do that. COSMOS
|
|
is ALWAYS a great bet, because it just sounds so PHONESY! Plus there
|
|
have been half a dozen COSMOS' in the last year alone, so he won't
|
|
know which one, even if none of them have ever been FAMOUS!
|
|
|
|
IX. If you're such a swell guy, and have been around so long, he might
|
|
wonder what you've been doing with yourself for the last 6 months. SO
|
|
So just make up some half-witted excuse like the one I listed. Then
|
|
include something about your current "interests." All you need to
|
|
remember about that is include "CLID" (Calling Line ID), "BLV" (Busy
|
|
Line Verify), or any other semi-interesting acronym out of a USO
|
|
coding manual. Obviously you don't need to know anything about it
|
|
beyond the fact that such an acronym actually exists and you know
|
|
about its existence. If questioned further, just bring down the
|
|
"veil of secrecy" and become mysterious and evasive about it. This
|
|
will instantly go great lengths towards improving your status on a
|
|
board.
|
|
|
|
X. References have been covered in the parenthesis in the feedback
|
|
itself, so I hope I don't need to get into it again here.
|
|
|
|
XI. ELITE Phreak/Hacker boards also expect "freebies" from you the
|
|
potential user, to the Sysop. Both as a "test" of your "skill" and as
|
|
a kind of ass kissing. Freebies can include COSMOS PW'S! which are
|
|
easy, because there are like 10 of them which people have been listing
|
|
for the last 5 years, which haven't worked for 4 1/2 years, but people
|
|
still list them. Which makes me conclude that people never use them,
|
|
they just write them down and repost them every 6 months. Or CIS
|
|
accounts, or some good 800's or anything of "value". You don't really
|
|
need to include any of this, but if you can it makes you look better.
|
|
NEVER, EVER give the Sysop ANYTHING of any value that you might want
|
|
to use in the future, because if it's of any worth he will immediately
|
|
do something stupid to make it stop working. That you can COUNT ON!
|
|
|
|
XII. Close it up with the usual "Thanks for your time", but sign it with
|
|
your full handle, followed by group. PROFESSIONAL! [Giggle]
|
|
<STOP THAT! I'M SERIOUS NOW!> <slap>
|
|
|
|
|
|
GENERAL TIPS
|
|
============
|
|
Ok, now that I've got you psyched at how easy it is, here is the bad news. The
|
|
bad news is like this: In order to be an ELITE Pirate, you don't have to know
|
|
ANYTHING, PERIOD, AT ALL, EVER. All you need to be able to do is operate your
|
|
copy of cat-fur with reasonable dexterity and spend 2-5 hours of each day
|
|
calling things and uploading NEW WARES. If you can program, so much the better
|
|
because then it's easier to join the ELITEST ELITE of piracy (the Crackers).
|
|
Now I know you're thinking it's stupid to have ELITE people who aren't good at
|
|
anything, but I never claimed the world was a sensible place.
|
|
|
|
With PHREAKING (let me just say that when I say PHREAKING I also mean to
|
|
include HACKING) you are expected to APPEAR to know how things work. Now that
|
|
is a little tricky. It's tricky because ELITE boards like to have FILTERS. A
|
|
kind of "front door/quiz" combination. The trouble with that is, that the
|
|
Sysop doesn't really know what he's doing either and will take the questions
|
|
out of an ELITE FILE. The problem is that the ELITE FILE might not have been
|
|
accurate, so even if you know the answer, you might not know the answer that
|
|
the Sysop is expecting, and as far as the Sysop is concerned is the "RIGHT"
|
|
answer. This means that you had better stop laughing at those stupid files and
|
|
deleting them, because if you want to get access someplace, you might need them
|
|
for something besides "God, is he stupid!" jokes!
|
|
|
|
|
|
HOME PHONE NUMBERS AND HOW TO DEFEAT THEM
|
|
=========================================
|
|
Ok, so now you know how to get validated, what to say and how to act. Let me
|
|
get you past the last and only "real" hurdle to access to everything you
|
|
desire.
|
|
|
|
Voice validation is a load of crap. It doesn't work, it never has worked and
|
|
it never will work. But it sure makes Sysops feel good, and being the
|
|
egotistical fools that they are, they're going to make you go through this
|
|
bullshit to get access.
|
|
|
|
I would NOT suggest leaving an infinite busy as your home number. This works
|
|
on legitimate boards, but I don't know any underground board Sysops that are
|
|
THAT stupid.
|
|
|
|
|
|
METHOD 1
|
|
========
|
|
Leave a telephone number of a random person from your "computer buddy" phone
|
|
list. When the Sysop calls, he'll get a human voice that will say HELLO in a
|
|
annoyed kind of tone. Confirming the existence of a human being at the other
|
|
end of the telephone number you just gave him, the Sysop will assume no reason
|
|
to doubt you, and slam down the phone because he's not good at starting
|
|
conversations with people he's never talked to before.
|
|
|
|
|
|
METHOD 2
|
|
========
|
|
Find a kid at school who you're friends with. Explain the general idea of
|
|
"boards" to him, tell him you need his help in breaking into some secret FBI
|
|
computer system. All he has to do is say "yes" to the questions you're going
|
|
to write down for him, and claim to be the person on the piece of paper you're
|
|
giving him.
|
|
|
|
This is really almost ideal if your friend isn't the stupid type that stutters
|
|
and can't lie. If he can lie and doesn't care, then you're all set or the rest
|
|
of your modem existence!
|
|
|
|
|
|
METHOD 3
|
|
========
|
|
Your other option is to leave the kid the number to a voice mailbox on which
|
|
you've put a suitably ELITE sounding outgoing message. Note: the current craze
|
|
among the lower orders of the would-be elite is "Voice mail hacking!@!" It's
|
|
not too hard for anyone familiar with the intricacies of dialing touch tone to
|
|
in-fil-trate! a VMB system. And the recent media attention drawn to this
|
|
oh sooo destructive form of hacking has made it still more exciting. However
|
|
what does this have to do with you? Using a box which you've hacking out is a
|
|
really dumb idea, especially when you can get one in any major city for $10 to
|
|
$15 a month. Never pay for the box in your real name, as you will be giving
|
|
this number to sysops whose BBS software will very likely end up in the hands
|
|
of law enforcement someday and you don't want end up in John Maxfield's
|
|
mega-huge list of hackers.
|
|
|
|
|
|
YOUR NEW PERSONA -- HOLDING IT TOGETHER AND MAKING IT WORK
|
|
==========================================================
|
|
This is really basic. It's so basic that almost nobody I know ever bothers to
|
|
sketch in the details and can be tripped up when you ask an offhanded question
|
|
that in theory has no significance, but in actuality causes him to say "uh,
|
|
well" and pause for a few seconds while he tries to think of something. Only
|
|
very good bullshit artists can glibly pull it off when you "catch them off
|
|
guard" but even then they will frequently forget what they told you in the past
|
|
if you bring it up again a few days later.
|
|
|
|
What I'm talking about is the "new you" complete with name, address, telephone
|
|
number, state, zip code, street number, general weather of the area, brothers,
|
|
sisters, physical description, social security number, job, marital status,
|
|
birthday, age, education, "underground" history, etc... In short, you are
|
|
creating an entire new person who should have a real life entirely separate
|
|
from your own. In order to pull this off you need to think of all these things
|
|
before-hand, and if you're new at this, don't get carried away by pretending to
|
|
be 20 people all at once. Just make up ONE concrete personality whose
|
|
existence you can justify, and then type it up, print it out, and tape it to
|
|
the wall in front of you so it's ALWAYS there, because the time when you least
|
|
expect it, is the time you're going to need it the most.
|
|
|
|
As you get better you'll find you can juggle an almost infinite number of these
|
|
alter-ego's in your head, but don't get over-confident too fast or you WILL
|
|
blow something that you're working hard at right now.
|
|
|
|
|
|
IMPERSONATING OTHER PEOPLE
|
|
==========================
|
|
Every year the "underground" community mirrors the legitimate modem world and
|
|
gets exponentially larger. Instead of everybody knowing everyone else, there
|
|
is now a huge collection of people who don't know anything about anyone who
|
|
existed 5 years ago; last year; or even last month. This works greatly to your
|
|
advantage because it saves you the effort of slapping together your own files.
|
|
All you need to do is log some handle into the system you wish to access;
|
|
upload a few files written by the person or persons you are about to
|
|
impersonate; wait a few days; now login the person whose identity you wish to
|
|
assume. Quite simple.
|
|
|
|
In the past few months I have actually passed myself off as BIOC Agent 003,
|
|
Lord Digital, Lex Luthor and assorted past and present members of LOD, Apple
|
|
Bandit and various other Apple Pirates of lore, and several dozen other people.
|
|
Two years ago I could never have gotten away with this unless I was calling
|
|
some board in the middle of nowhere. Nowadays it's possible, even easy, to
|
|
impersonate almost anyone who has ever made some kind of mark on the history of
|
|
the underground in the past; simply because the people you're going to be
|
|
dealing with were NOT around a few years ago and have no idea who any of these
|
|
people are. When confronted with a "famous" user, they will never in their
|
|
wildest dreams assume that he's a fake; the only thing they will be thinking is
|
|
how neat it is to have him on their BBS once you let them know who he is.
|
|
|
|
You can easily make up a new character who never existed outside of your
|
|
profile of him, but this requires more work on your part when it's much
|
|
simpler to just pretend being someone else. NONE of those people will EVER
|
|
turn up on that particular board, and even if they did you should be able to
|
|
convince the Sysop that YOU are him and he is the fake. Amusing to say the
|
|
least.
|
|
|
|
In case you're letting some last vestiges of morality creep in, remember that
|
|
the people you're going to be impersonating are not hallowed icons. They are
|
|
just guys who spent an inordinate amount of time building up their image to
|
|
such a degree that countless little kids think they're cool and a few misguided
|
|
-- and blessedly free of intellect -- security people, think they're dangerous.
|
|
Not to forget the fact that aside from LODdies, none of them will ever be seen
|
|
on a board again, so if you fear "Phreak retaliation;" don't worry about it.
|
|
Nobody can do anything to you if they don't know who you are.
|
|
|
|
The previous paragraph exists solely to galvanize otherwise recaltricent and
|
|
cowardly pre-teens into taking some kind of action and having fun.
|
|
|
|
|
|
SAFETY - GETTING BUSTED!
|
|
========================
|
|
People who get caught for doing something they shouldn't have been doing, are
|
|
apprehended for one of two reasons: They are either cretins, which covers the
|
|
vast majority of those "busted," or they are not good judges of character and
|
|
spend their time associating with "friends" who do stupid things, and will drag
|
|
you down with them when they really fuck up. Which WILL happen at some point
|
|
to most of the people who convince themselves "it's just fun."
|
|
|
|
The "underground" IS fun, but looking at it from the eyes of those whose job it
|
|
is to keep track of you, it stops being fun and you should realize that many of
|
|
the things you take for granted -- be they free calls, free software, whatever,
|
|
-- are against the law. And if you give people the opportunity to hurt you --
|
|
ESPECIALLY when they are placed in such a position that by busting you they
|
|
increase their own status in whatever field they are employed in -- then you
|
|
are going to get hurt!
|
|
|
|
Many of you hate all the "narcs" and "sting boards" and whatever new bullshit
|
|
the people arrayed against you come up with. You SHOULDN'T! Cable Pair and
|
|
the rest are nothing more than the underground's personal garbage collection
|
|
agency. Rather then thinking of them as people who are some kind of hindrance
|
|
to you, it's far more logical to think of them as glorified trash collectors;
|
|
which is about all they are. Every so often some new sting is exposed, and the
|
|
underground is rid of a board full of annoying kids that were stupid enough to
|
|
login someplace with real names, numbers, and addresses. Are you really going
|
|
to miss this kind of genius?
|
|
|
|
If you ALWAYS use the methods outlined in this article, then your chances of
|
|
getting caught for anything will dramatically decrease. Who are they going to
|
|
find when every single piece of information you gave them is a lie. None of
|
|
your modem friends can take you down with them, if they don't know who you are.
|
|
It's as simple as that.
|
|
|
|
Naturally this is more difficult than it sounds due to the fact that many of
|
|
you will want to make friends with people, and that's hard to do when
|
|
everything the other person knows about you is a lie. At this point you just
|
|
have to use your best judgement concerning your further actions. Personally I
|
|
find it best to associate with a small group of friends who really are
|
|
"friends" not just "computer buddies." Because if you pick your
|
|
friends well they will never fuck you over. Meanwhile when some kid you know
|
|
only over the phone, who lives in another state, gets caught... He is going
|
|
to be more than happy to throw them anyone and anything he can think of just
|
|
to get off himself and that will include YOU. The "Hacker ethic" is a nice
|
|
joke that I personally DO NOT subscribe to, and even those that pay lip service
|
|
to such a concept, will throw their ideals away pretty fast when it's their
|
|
neck on the line instead of some hallowed principle thought up by aging
|
|
hippies.
|
|
|
|
THE COMPUTER UNDERGROUND PAST AND PRESENT!
|
|
==========================================
|
|
At the time of this revision and final public release (Summer of 1991) the
|
|
modem world is nothing like it was five or ten years ago when all of this
|
|
nonsense began. The thousand hackers of 1981 had become ten thousand by 1986
|
|
and now it's reached the point where the EFF and CuD are throwing all of this
|
|
back and forth over the InterNet and so rather than the "local l0serz"
|
|
idolizing Lex Luthor, academics all over the country are analyzing the legal
|
|
implications of Phiber Optik and Acid Phreak's case. Well, so be it. It's
|
|
much too late in modem time to start any sort of "elite dynasty" which even a
|
|
moron like Lex Luthor could put together in 1984.
|
|
|
|
You can't start the "Modem Wizards -- the new LOD!" but you can always latch on
|
|
to legend and write yourself into the past. If you have any doubts about this
|
|
read the History of Communist Party of the Soviet Union from about 1923 until
|
|
1956, when each years names kept being added and taken out and things were
|
|
changed around the suit political realities and nobody said a thing. This is a
|
|
far-fetched reference, but the theory is the same.
|
|
|
|
The Legion of Doom started out a bunch of nobodies and ended up notorious
|
|
enough that the Secret Service and BellCore kept laying awake at night
|
|
wondering when LOD is going to take down all the STPs in the network. Which of
|
|
course will never happen but it's much easier on the intestines of a Secret
|
|
Service agent or DA to get media attention by rounding up "a deadly
|
|
technologically menacing teenager!" than to bust the mafia or some inner-city
|
|
drug ring who may just put them and their families through a trash compacter.
|
|
What would you do?
|
|
|
|
|
|
THE END
|
|
=======
|
|
What more can I say? I hope you have a good time if this is the way in which
|
|
you choose to waste your time. And a great big "I love you" to the media dudes
|
|
who actually called up 2600 magazine asking about "Marbles BBS." Where would
|
|
we be without you? You guys are just so funny!
|
|
|
|
Have a nice day and a really, really nice life!
|
|
_______________________________________________________________________________
|
|
|
|
|
|
==Diet Phrack==
|
|
|
|
Volume Three, Issue Thirty-Six, File 6 of 11
|
|
|
|
-----*****)))))21(((((*****-----
|
|
D S
|
|
+ +
|
|
E The Legion of Doom E
|
|
+ +
|
|
M and E
|
|
+ +
|
|
O The Occult D
|
|
+ +
|
|
N !
|
|
-----*****)))))21(((((*****-----
|
|
|
|
|
|
From its explosive beginnings in the summer of 1984 to the present day,
|
|
the group known as "The Legion of Doom" has been enshrouded in secrecy. Now
|
|
that our numbers have been corrupted, and the hope of once regaining the
|
|
immense power we wielded over the years has faded, we offer to the last
|
|
remaining fragments of the underground from which we arose the secret knowledge
|
|
that kept our members at the apex of knowledge and beyond the grasp of security
|
|
officials.
|
|
|
|
It is our hope that through wide circulation of this material that perhaps
|
|
some future enthusiasts will seek the truth from within, and gain the knowledge
|
|
and wisdom necessary to endure the trauma of illumination.
|
|
|
|
|
|
HISTORY
|
|
|
|
Initially, the idea of combining modern technology with ancient wisdom was
|
|
formulated as a type of joke. One particular system was proving extremely
|
|
difficult to penetrate. One member remarked rather off-handedly, "Why not ask
|
|
the Ouija board for passwords?" This was laughed about for several minutes but
|
|
ultimately it was decided that it should be tried. Two members set up the
|
|
board and began concentrating on the computer system in question. After
|
|
several minutes an entity was contacted. When asked what the root password was
|
|
on the UNIX system we had discovered, it answered "rambo". "Rambo" was the
|
|
password.
|
|
|
|
Several more trials were done, and more than two thirds of them ended with
|
|
positive results. It was decided at this time that there should be an inner
|
|
order to the Legion of Doom for those members who shared an interest in
|
|
learning more about the occult and its uses in a hacking forum. At that time
|
|
it was decided that there would be seven members admitted. From that time
|
|
forth, there have always been seven members. The circle will be broken upon
|
|
the incarceration of our initiates in the coming new year, and our control
|
|
over the planes will be lost.
|
|
|
|
What follows are several steps to increasing one's knowledge of the occult and
|
|
use of this information in a computer setting.
|
|
|
|
|
|
OUIJA
|
|
|
|
In our experience we have found that it is best to attempt this type of
|
|
communication with two persons. It is extremely important that one not attempt
|
|
to contact an entity using the Ouija alone. When there is only one psyche
|
|
involved, the spirit can fixate on it with great ease and the chances for
|
|
possession or extreme mental duress is quite high.
|
|
|
|
Sit facing a partner with the Ouija touching each lap. Each person should keep
|
|
one hand on the planchet and the other on the computer keyboard. While
|
|
concentrating on contact, make the necessary steps to connect to the system
|
|
desired to ask about. Once connection has been established with the host
|
|
system, begin asking the surroundings, "Is there anything that wishes to talk
|
|
with us?" One may have to concentrate and repeat the question for several
|
|
minutes. When an entity moves onto the board one may feel a slight tingling in
|
|
one's fingertips as the planchet moves around the board. Once is has been
|
|
asserted that there is a strong presence on the board, ask of it any question
|
|
desired.
|
|
|
|
*** The above is a simple enough method and can (and should) be tried by all.
|
|
What follows is more complex and should not be attempted with any degree
|
|
of levity.
|
|
|
|
|
|
STEPS TO ENSURE SUCCESS WHILE HACKING
|
|
|
|
To enjoy a great deal of success while hacking the following steps
|
|
must be taken.
|
|
|
|
1.. Always hack in the same room, at the same time of day.
|
|
|
|
2. Always purify mind and body before hacking. This would include a ritual
|
|
bath and sexual abstinence and fasting for at least 12 hours prior to any
|
|
attempt. One may wish to design a Tau robe to wear during attempts, or in
|
|
any case a set of clothing specifically for hacking attempts that would
|
|
symbolize such a garment.
|
|
|
|
3. Perform the Lesser Banishing Ritual of the Pentagram (See below).
|
|
|
|
4. Perform the Rose Cross Ritual (See below).
|
|
|
|
5. Perform a candle burning to attract good luck.
|
|
|
|
By following these steps one will experience success and fulfillment greater
|
|
than imagined possible.
|
|
|
|
LBRP
|
|
|
|
1. Touch forehead, and say deeply "Ah-Tah".
|
|
2. Point down, hand over abdomen, say deeply "Mahl-Koot".
|
|
3. Touch right shoulder, say deeply "Vih-G'boo-Rah".
|
|
4. Touch left shoulder, say deeply "Vih-G'doo-Lah".
|
|
5. Fold hands at chest, say deeply "Lih-Oh-Lahm, Ah-Men".
|
|
6. Face East, Draw a pentagram in the air, point to its center,
|
|
say deeply "Yud-Heh-Vavh-Heh".
|
|
7. Turn South, keeping line from first pentagram, draw new
|
|
pentagram, point to its center, say deeply "Ah-Doh-Nye".
|
|
8. Turn West, repeat as above, but say deeply "Eh-Heh-Yeh".
|
|
9. Turn North, repeat as above, but say deeply "Ah-Glah".
|
|
10. Turn East, carrying line to complete circle.
|
|
11. Hands out, say "Before me Rah-Fay-El, Behind me Gabh-Ray-El,
|
|
On my right hand Mih-Chai-El, And on my left hand Ohr-Ree-El.
|
|
For about me flames the pentagram, and within me shines the
|
|
six rayed star.
|
|
12. Repeat steps 1-5.
|
|
|
|
For those concerned, the translations of the above are as follows:
|
|
|
|
Ah-Tah: Thine
|
|
Mahl-Koot: Kingdom
|
|
Vih-G'Boo-Rah: and the power
|
|
Vih-G'Doo-Lah: and the glory
|
|
Lih-Oh-Lahm: forever
|
|
Ah-Men: Lord, Faithful King (AMEN=acronym)
|
|
|
|
Yud-Heh-Vavh-Heh: The Holy Tetragrammaton
|
|
Ah-Doh-Nye: My Lord
|
|
Eh-Heh-Yeh: I shall be
|
|
Ah-Glah: Thou art great forever, my Lord (AGLA=acronym)
|
|
|
|
Rah-Fay-El (
|
|
Gahb-Ray-El Names of Arch-angles
|
|
Mih-Chai-El (
|
|
Ohr-Ree-El (
|
|
|
|
When the steps read "say deeply" one should try to resonate the words, from the
|
|
diaphragm, so that the body actually feels the words.
|
|
|
|
|
|
ROSE CROSS RITUAL
|
|
|
|
1. Light a stick of incense.
|
|
2. In the SE corner of the room, looking away from the center, draw a large
|
|
cross in the air with incense, and intersect its sides with a circle (like
|
|
a Celtic cross, or crosshairs in a gun sight), point the tip of the incense
|
|
to the center of the cross and say deeply "Yeh-Hah-Shu-Ah".
|
|
3. Move to the SW corner of the room, keeping the line from the first cross,
|
|
repeat as above.
|
|
4. Move to the NW, repeat as above.
|
|
5. Move to the NE, repeat as above.
|
|
6. Move to the SE to complete the circle.
|
|
7. Face NW, incense pointed up, walk to the center of the room, continuing the
|
|
line, make the rose cross above the center of the room, speak the name,
|
|
then continue moving NW, connect the line to the center of the cross in the
|
|
NW.
|
|
8. Move back to the SE, incense pointed down, stop in the center and draw the
|
|
rose cross in the center of the room on the ground, speak the name, then
|
|
continue on SE, connecting the line to the center of the cross in the SE.
|
|
9. Point to the center of the SE cross and speak the name.
|
|
10. Walk to the SW corner.
|
|
11. With the incense pointed upwards, walk to the NE, at the center of the room
|
|
stop and speak the name, then continue on to the NE, once at the NE, face
|
|
the SW and walk back to the SW, incense pointed down, at the center of the
|
|
room speak the name, and continue on to the SW.
|
|
12. Point to the center of the SW cross and move clockwise to each corner,
|
|
again connecting the centers of each cross.
|
|
13. Once back at the SW corner, remake the cross as large as possible and speak
|
|
the name "Yeh-Hah-Shu-Ah" while forming the bottom of the circle, and speak
|
|
the name "Yeh-Hoh-Vah-Shuh" when forming the top half of the circle.
|
|
14. Go to the center of the area, face east, and think of the six rose crosses
|
|
surrounding the room. Think of them as gold, with red circles, and the
|
|
lines connecting them as gleaming white.
|
|
|
|
|
|
CANDLE BURNING RITUAL
|
|
|
|
1. Obtain a green candle
|
|
2. Anoint the top of the candle with olive oil and rub it downward to the
|
|
middle of the candle.
|
|
3. Anoint the bottom of the candle with the oil and rub it upwards to the
|
|
center.
|
|
4. Carve the letters "JIHEJE" on the candle.
|
|
5. Light the candle.
|
|
6. Read aloud the fourth Psalm.
|
|
7. Pray for the desired outcome.
|
|
8. Concentrate on the desired outcome.
|
|
9. Repeat 6 through 8 two more times.
|
|
|
|
|
|
THE GEMATRIA OF TELEPHONE NUMBERS
|
|
|
|
Some in our order have found insight by reflecting on the various meanings that
|
|
can be derived from the numerical values of telephone numbers using the
|
|
Cabalistic method of numerology.
|
|
|
|
Those that use this method have focused on one particular method of number
|
|
determination:
|
|
|
|
Example: 800-555-1212
|
|
|
|
800 = 400 + 300 + 100
|
|
|
|
555 = 400 + 100 + 50 + 5
|
|
|
|
121 = 100 + 20 + 1
|
|
|
|
2 = 2
|
|
|
|
One can also obtain other numbers for contemplation by the following method:
|
|
|
|
800-555-1212 = 8 + 0 + 0 + 5 + 5 + 5 + 1 + 2 + 1 + 2
|
|
= 29
|
|
= 2 + 9
|
|
= 11
|
|
= 1 + 1
|
|
= 2
|
|
All of the above values are related. A total contemplation of the meanings of
|
|
all values will lead to a more complete understanding of the true meanings.
|
|
|
|
These numbers each correspond to a particular Hebrew letter and word, as well
|
|
as a card in the Major Arcana of the Tarot.
|
|
|
|
The following is a table to be used for the above.
|
|
|
|
1 Aleph Ox 0-The Fool
|
|
2 Beth House I-The Magician
|
|
3 Gimel Camel II-The High Priestess
|
|
4 Daleth Door III-The Empress
|
|
5 Heh Window IV-The Emperor
|
|
6 Vav Nail V-The Hierophant
|
|
7 Zayin Sword VI-The Lovers
|
|
8 Cheth Fence VII-The Chariot
|
|
9 Teth Serpent VIII-Strength
|
|
10 Yod Finger IX-The Hermit
|
|
20 Caph Palm of hand X-The Wheel of Fortune
|
|
30 Lamed Whip XI-Justice
|
|
40 Mem Water XII-The Hanged Man
|
|
50 Nun Fish XIII-Death
|
|
60 Samech Arrow XIV-Temperance
|
|
70 Ayun Eye XV-The Devil
|
|
80 Peh Mouth XVI-The Tower
|
|
90 Tzaddi Hook XVII-The Star
|
|
100 Qoph Back of head XVIII-The Moon
|
|
200 Resh Head XIX-The Sun
|
|
300 Shin Tooth XX-Judgement
|
|
400 Tau Cross XXI-The World
|
|
|
|
|
|
One may wish to further research numbers by taking particular groupings and
|
|
cross referencing them in the "Sepher Sephiroth" which can be found in "The
|
|
Qabalah of Alister Crowley."
|
|
|
|
|
|
OTHER CANDLE BURNING RITUALS
|
|
|
|
Should one come into conflict with authorities for any reason, any or all of
|
|
the following will prove useful.
|
|
|
|
To gain favor with authorities
|
|
|
|
1. Obtain a purple candle
|
|
2. Anoint the top of the candle with olive oil and rub it downward to the
|
|
middle of the candle.
|
|
3. Anoint the bottom of the candle with the oil and rub it upwards to the
|
|
center.
|
|
4. Carve the letters "JASCHAJAH" on the candle.
|
|
5. Light the candle.
|
|
6. Read aloud the fifth Psalm.
|
|
7. Pray for the desired outcome.
|
|
8. Concentrate on the desired outcome.
|
|
|
|
|
|
To obtain favors from important people
|
|
|
|
1. Obtain a green candle
|
|
2. Anoint the top of the candle with olive oil and rub it downward to the
|
|
middle of the candle.
|
|
3. Anoint the bottom of the candle with the oil and rub it upwards to the
|
|
center.
|
|
4. Carve the letters "PELE" on the candle.
|
|
5. Light the candle.
|
|
6. Read aloud the thirty-fourth Psalm.
|
|
7. Pray for the desired outcome.
|
|
8. Concentrate on the desired outcome.
|
|
|
|
|
|
For favor in court cases
|
|
|
|
1. Obtain a purple candle
|
|
2. Anoint the top of the candle with olive oil and rub it downward to the
|
|
middle of the candle.
|
|
3. Anoint the bottom of the candle with the oil and rub it upwards to the
|
|
center.
|
|
4. Carve the letters "JAH" on the candle.
|
|
5. Light the candle.
|
|
6. Read aloud the 35th and 36th Psalms..
|
|
7. Pray for the desired outcome.
|
|
8. Concentrate on the desired outcome.
|
|
|
|
|
|
To regain credibility after being defamed by enemies
|
|
|
|
1. Obtain a purple candle
|
|
2. Anoint the top of the candle with olive oil and rub it downward to the
|
|
middle of the candle.
|
|
3. Anoint the bottom of the candle with the oil and rub it upwards to the
|
|
center.
|
|
4. Carve the letters "ZAWA" on the candle.
|
|
5. Light the candle.
|
|
6. Read aloud the 41st, 42nd, and 43rd Psalms.
|
|
7. Pray for the desired outcome after reading each Psalm.
|
|
8. Concentrate on the desired outcome.
|
|
9. Repeat 6 through 8 two more times.
|
|
10. Repeat for three days
|
|
|
|
|
|
To help release one from imprisonment
|
|
|
|
1. Obtain a purple candle
|
|
2. Anoint the top of the candle with olive oil and rub it downward to the
|
|
middle of the candle.
|
|
3. Anoint the bottom of the candle with the oil and rub it upwards to the
|
|
center.
|
|
4. Carve the letters "IHVH" on the candle.
|
|
5. Light the candle.
|
|
6. Read aloud the 71st Psalm.
|
|
7. Pray for the desired outcome.
|
|
8. Concentrate on the desired outcome.
|
|
|
|
|
|
For help in court cases
|
|
|
|
1. Obtain a purple candle
|
|
2. Anoint the top of the candle with olive oil and rub it downward to the
|
|
middle of the candle.
|
|
3. Anoint the bottom of the candle with the oil and rub it upwards to the
|
|
center.
|
|
4. Carve the letters "IHVH" on the candle.
|
|
5. Light the candle.
|
|
6. Read aloud the 93rd Psalm.
|
|
7. Pray for the desired outcome.
|
|
8. Concentrate on the desired outcome.
|
|
|
|
|
|
To gain favor in court cases
|
|
|
|
1. Obtain a purple candle
|
|
2. Anoint the top of the candle with olive oil and rub it downward to the
|
|
middle of the candle.
|
|
3. Anoint the bottom of the candle with the oil and rub it upwards to the
|
|
center.
|
|
4. Carve the letters "LAMED" on the candle.
|
|
5. Light the candle.
|
|
6. Read aloud the 119th Psalm, verses 89-96.
|
|
7. Pray for the desired outcome.
|
|
8. Concentrate on the desired outcome.
|
|
|
|
|
|
To gain favor in court
|
|
|
|
1. Obtain a purple candle
|
|
2. Anoint the top of the candle with olive oil and rub it downward to the
|
|
middle of the candle.
|
|
3. Anoint the bottom of the candle with the oil and rub it upwards to the
|
|
center.
|
|
4. Carve the letters "IHVH" on the candle.
|
|
5. Light the candle.
|
|
6. Read aloud the 120th Psalm.
|
|
7. Pray for the desired outcome.
|
|
8. Concentrate on the desired outcome.
|
|
|
|
|
|
To gain favor when approaching a person of authority
|
|
|
|
1. Obtain a purple candle
|
|
2. Anoint the top of the candle with olive oil and rub it downward to the
|
|
middle of the candle.
|
|
3. Anoint the bottom of the candle with the oil and rub it upwards to the
|
|
center.
|
|
4. Carve the letters "IHVH" on the candle.
|
|
5. Light the candle.
|
|
6. Read aloud the 122nd Psalm.
|
|
7. Pray for the desired outcome.
|
|
8. Concentrate on the desired outcome.
|
|
|
|
*** Each candle can only be used for one particular purpose.
|
|
One must prepare a new candle for each ritual.
|
|
|
|
|
|
ASTRAL CONFERENCING
|
|
|
|
Some of our number after having found it quite difficult to contact other
|
|
members took a new approach to astral projection. Astral conferencing became
|
|
the spiritual counterpart to AT&T's Alliance Teleconference. Members would
|
|
arrange to meet at a given time and would relay any necessary information
|
|
during these sessions. This type of communication was made the standard due to
|
|
its legality, its speed, and the impossibility of interception by federal
|
|
authorities.
|
|
|
|
To attempt this type of psychic travel, it is advised that the seeker look
|
|
elsewhere for instruction on building his or her own psychic powers, and slowly
|
|
moving upwards to the complexities of travel on the Astral Plane. One must
|
|
learn to stand before learning how to run.
|
|
|
|
|
|
WARNINGS ABOUT ABUSES OF POWER
|
|
|
|
Some members have taken their interests to the extreme. There was talk some
|
|
years ago about blood offerings to obtain knowledge in dealing with the TRW
|
|
credit system. This was a complete failure which was done with out knowledge
|
|
by others in the order. It is written in Isaiah:
|
|
|
|
1:11 "I am full of the burnt offerings of rams, and the fat of
|
|
fed beasts; and I delight not in the blood of bullocks,
|
|
or of lambs, or of he goats."
|
|
66:3 "He that killeth an ox is as if he slew a man"
|
|
|
|
Those who committed the above offering suffered greatly for their deed, for
|
|
such is an abomination before the Lord. It is wise to learn from their
|
|
mistakes.
|
|
|
|
Other members have attempted such obscure measures as psychic data corruption,
|
|
ala Uri Geller. These attempts saw little success, and left those attempting
|
|
the feats psychically exhausted and drained for nearly a week.
|
|
|
|
Other members have attempted to thwart enemies such as the Secret Service, the
|
|
FBI, journalists such as Richard Sandza, and individuals such as John Maxfield
|
|
though magical means. When the outcome desired was weak, the results were
|
|
high, but when a member actually tried to bring about the demise of a Southern
|
|
Bell Security official, the power of the spell reversed and the member was soon
|
|
placed under surveillance by the Secret Service, nearly causing disaster for
|
|
the entire group, and completely dissolving the power of the order.
|
|
|
|
One may find that once such power is somewhat mastered, it is easy to take
|
|
shortcuts and thereby miss safety precautions. One must never forget to take
|
|
these precautions, for disaster looms at every junction.
|
|
|
|
The three members linked to the above incident had become well versed in the
|
|
magical system of Abra-Melin the Mage. The spell which turned should never
|
|
have been used in the first place. The spell was designed to stop a person's
|
|
heart and could only be carried out with the help of the evil spirit Belzebub.
|
|
The Symbol
|
|
|
|
L E B H A H
|
|
E M A U S A
|
|
B
|
|
H
|
|
A
|
|
H
|
|
|
|
was used, yet the full precautions to protect the invoker from the spirit were
|
|
ignored, and Belzebud ran free to affect whatever he saw fit to affect. They
|
|
had seen prior success in this system using a symbol to obtain knowledge of
|
|
things past and future and were able to obtain a great deal of information from
|
|
various computer systems. However, that particular spell is invoked by the
|
|
Angels, and little precaution need be taken in that instance. That Symbol:
|
|
|
|
M I L O N
|
|
I R A G O
|
|
L A M A L
|
|
O G A R I
|
|
N O L I M
|
|
|
|
|
|
AN INTERESTING EXAMPLE OF OCCULT INFLUENCED HACKING
|
|
|
|
One particular evening of Ouija ended with a DNIC and a plea to halt the
|
|
operation of the system. When members connected to this system they were
|
|
shocked to find that it was a UNIX belonging to the Ministry of Treasury in the
|
|
Republic of South Africa. The system was networked to a number of other
|
|
government systems. Several standard defaults were still unprotected, and root
|
|
was gained in a matter of minutes. A debate ensued over whether or not to
|
|
disrupt the system in protest of Apartheid, but the system was left unscathed
|
|
on the premise that to cause malicious damage would only make things worse.
|
|
|
|
|
|
CLOSING
|
|
|
|
Once the doors to ancient knowledge have been opened, the knowledge found
|
|
within is immense and incredibly powerful. Do not fear experimentation and
|
|
exploration, but be mindful of the existence of God and the spirits, and
|
|
respect their power. Use whatever means necessary to achieve desired goals,
|
|
but at no times cause harm to any other person, and do nothing out of
|
|
aggression. Whatever degree of energy is sent forth will come back, if one
|
|
sends out positive energy, positive energy will flow back; the converse of this
|
|
is equally valid. Diversify one's interests, develop the mind, seek out hidden
|
|
and suppressed knowledge, and experience the beauty of the true nature of
|
|
magic.
|
|
|
|
Frater Perdurabo Deo Duce Comite Ferro
|
|
Inner Order of LOD
|
|
_______________________________________________________________________________
|
|
|
|
|
|
==Diet Phrack==
|
|
|
|
Volume Three, Issue Thirty-six, File 7 of 11
|
|
|
|
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
|
@ @
|
|
@ Searching for SpeciAl accesS agentS @
|
|
@ @
|
|
@ by: Dr. Dude @
|
|
@ @
|
|
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
|
|
|
|
|
|
|
This is a true story of how United States Secret Service Agent Tim Foley
|
|
discovered three of his freinds and later recruted them as speciAl accesS
|
|
agentS into the hacker world. After seeing how well his recruits performed,
|
|
Tim Foley recruted Barbera Spinelli (AT&T Security) and Toni Ames (a/k/a Pink
|
|
Death of Pacific Northwest Security) and Dale Drew (a/k/a The Dictator) as
|
|
speciAl accesS agentS for the purpose of undermining the computer underground.
|
|
After this little incident Toni was nicknamed "Pink Death."
|
|
|
|
Our story is narrated by Pink Death!
|
|
|
|
@@@@@@@ Toni Ames plays: herself
|
|
The Dale Drew plays: YOU'LL SEE!
|
|
Players Tim Foley plays: with himself
|
|
@@@@@@@ Barbera Spinelli plays: with everyone
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
I was reading a story in an adult magazine about this girl that was
|
|
eaten out and fucked by a German Shepherd dog. Now to some of you, this
|
|
probably sounds gross. However, I was turned on by the story and wanted
|
|
to read more stories like it. Well I never found any. While I am sure
|
|
that there is a mag out there that has lots of stories like it, just
|
|
haven't found it yet.
|
|
|
|
Anyway, one day I was talking to my friend Barbera Spinelli and brought
|
|
the subject up. Barbera Spinelli had never read such a story before.
|
|
Since we were at my house, I got the magazine out and let her read it.
|
|
She didn't get as turned on as I did, but said that she would like to
|
|
watch someone get licked and fucked by a dog. I told Barbera Spinelli
|
|
the story made me very very horney. Barbera Spinelli said that she
|
|
doubted that she could get horney enough to do it with an animal. I
|
|
told her that it made me very horney and that I didn't think I could do
|
|
it, but I did want to read about other people doing it with animals.
|
|
|
|
Well, that subject was dropped, we continued to talk about other things
|
|
while drinking wine. After two bottles we got very tipsy and started
|
|
talking about sex. The next thing we knew, we were naked and in the
|
|
pool, having a great time. Well, I have had sex with women before, but
|
|
never with Barbera Spinelli. I didn't know how she felt about making
|
|
love to women, and never asked. Well I noticed her staring at my 38-26-
|
|
36 body. I got out of the pool and posed. I said, "What do you think"?
|
|
She said that I had a great body and a nice pair of tits. I spread my
|
|
legs and opened up my pussy with my fingers showing Barbera Spinelli my
|
|
pink inner lips and now extended clit. Squeezing my erect clit while I
|
|
shoved two fingers up my soaking cunt I told Barbera Spinelli I would
|
|
like to do it with her. With that, I jumped into the pool grabbed her
|
|
head and shoved it between my tits as I probed her tight cunt with my
|
|
fingers and said, well if you like them so much why don't you suck
|
|
them. I was ready for her to protest, but instead she said okay, and
|
|
sucked my tits gently as I continued to ream her tight pussy. She said
|
|
to me, I have wanted you for the longest time but didn't think you would
|
|
want to make love with me.
|
|
|
|
We dried off and went into my bedroom I had Barbera Spinelli lie back on
|
|
my bed and crawled up between her legs and began to suck her stiff pink
|
|
nipples as I massaged her hot slippery slit. In no time I had her
|
|
moaning with pleasure and moved down to her sweet tasting cunt probing
|
|
her tight pink hole with my tongue. Barbera Spinelli quickly had a
|
|
strong climax and flooded my mouth with her sweet juices. I got off
|
|
her and went to my dresser getting out two of my favorite toys, a 12
|
|
inch vibrator and a long thin anal probe. Barbera Spinelli gasped at
|
|
the sight of me armed with my toys and begged me to fuck her with
|
|
them. I moved back to Barbera Spinelli and straddled her face as I
|
|
massaged her firm young tits. Giving Barbera Spinelli the anal probe
|
|
I instructed her to fuck my asshole while she ate my pussy. I slowly
|
|
lowered my soaking snatch to her lips and tongue as Barbera Spinelli
|
|
pushed the long dildo firmly up my taught asshole. The feeling of that
|
|
long shaft penetrating my ass made me quiver as Barbera Spinelli
|
|
repeatedly thrust her long tongue up my cunt and licked and sucked my
|
|
clit. We had hardly begun when I had my first orgasm wetting Barbera
|
|
Spinelli's face with my thick pussy juice. Barbera Spinelli begged me
|
|
to fuck her cunt with the vibrator and I bent willingly to my work
|
|
spreading her swollen cunt lips and probing her tight twat with the
|
|
vibrator as I licked her swollen distended clit and fingered her tight
|
|
little anus. Barbera Spinelli came long and hard as she continued
|
|
her assault on my pussy and anus reaming my cunt with her fingers
|
|
as she licked my clit and pounded the probe up my anus bringing me to
|
|
on one orgasm after another.
|
|
|
|
In our lust we had not noticed Tim Foley my lover come in, the first I
|
|
knew of his presence was when Barbera Spinelli squealed and I felt her
|
|
fingers withdraw from my steaming twat only to be replaced by Tim Foleys
|
|
two inches of hard thick cock. Looking back I saw the familiar look of
|
|
lust in my lovers face as he reamed my pussy with his tiny thin prick
|
|
and rammed the anal probe in and out of my well lubricated asshole.
|
|
Barbera Spinelli resumed her assault on my swollen clit and I on her
|
|
twitching cunt and asshole. In no time I felt Tim Foley's thick load
|
|
shoot up my cunt as he pounded out his passion. I came quickly as did
|
|
Barbera Spinelli licking up her juices as she swallowed the overflow of
|
|
my lovers sperm from my cunt and clit. At last I thought our secret is
|
|
out, Tim Foley and I had been fucking for about a year and I had always
|
|
wanted to have him and a woman together. Barbera Spinelli was begging
|
|
for Tim Foley's stiff cock and I had her get up in the doggy position
|
|
as Tim Foley licked her tight puckered anus and slowly inserted the anal
|
|
probe up her twitching rectum. I sucked his still stiff cock into my
|
|
mouth and rammed it deep in my throat until it grew to enormous
|
|
proportions. Barbera Spinelli in the meantime had renewed her assault on
|
|
my cunt clit and anus forcing the rampaging vibrator up my steaming slit
|
|
as she licked my hard clit and finger fucked my juicy asshole. Sensing
|
|
Barbera Spinelli's need I pulled Tim Foley's prick from my mouth
|
|
and pushed the head into Barbera Spinelli's pink pussy. Tim Foley took
|
|
it from there and rammed his hard cock deep into her twitching vagina
|
|
until his balls slapped her cunt lips. I continued to suck and lick her
|
|
clit until Barbera Spinelli had two orgasms and Tim Foley filled her
|
|
tight slit with gallons of cum. The sight of his sticky sperm dripping
|
|
from her slit made me climax again and I licked her cum slickened snatch
|
|
until I had sucked down all of my lovers sweet cream.
|
|
|
|
Barbera Spinelli and I moved to a side by side position and continued
|
|
to tongue fuck each others cunts as Tim Foley sat an rested watching our
|
|
pleasure. In no time his cock was renewed and he began to finger Barbera
|
|
Spinelli's tight back door. Seeing his lust for my friends asshole
|
|
and having denied this pleasure to him in our private sessions I decided
|
|
to let Tim Foley fuck me in the ass. I called him over and told him to
|
|
fuck my butt while Barbera Spinelli ate my pussy. Tim Foley was overcome
|
|
with desire as he moved in behind me and gently spread my ass cheeks
|
|
lowering his face between the cheeks of my ass and probing my tight
|
|
asshole with his tongue. I begged him to ream my anus with his big dick
|
|
and he had Barbera Spinelli guide his rock like cock up my asshole while
|
|
he pounded me to orgasm. I continued to lick Barbera Spinelli and made
|
|
her cum just as Tim Foley shot his load up my ass. The feeling of his
|
|
hot sperm filling my anus made me climax and nearly pass out. When I
|
|
regained my senses I could feel Barbera Spinelli's tongue swirling in
|
|
and out of my anus as she collected his sperm from my asshole. Tim Foley
|
|
was great and he had moved to Barbera Spinelli's asshole and begun to
|
|
lick her tight pink puckered asshole as I tongue fucked her hot cunt.
|
|
I could tell Tim Foley was ready again and heard Barbera Spinelli beg
|
|
him to ram his big thick dick up her ass. Tim Foley got into position
|
|
and I guided his throbbing meet up her sweet tight little asshole
|
|
watching as Tim Foley pressed it into her until only his balls were
|
|
visible. I continued my tongue fucking of her cunt and licking her
|
|
clit as I felt her convulse time and time again in sweet orgasm. Soon
|
|
I to climaxed from her tongue and fingering of my cunt and anus and Tim
|
|
Foley came filling her tight butt with his sperm which I gladly licked
|
|
up. Tim Foley was happy but drained and left us to continue our
|
|
games. All in all we made love for three hours. When she left to go
|
|
home, she invited me over the next day to "Play around some more".
|
|
|
|
Saturday afternoon I went over to Barbera Spinelli's house to play. She
|
|
invited me in. She was wearing a black leather mini, black blouse, black
|
|
fish net stockings and garters, and high heels. She was hot. I was also
|
|
wearing a mini, I also had on a halter top, and heels. She told me to
|
|
get on my knees and look under her shirt. What I saw was a beautiful,
|
|
clean shaven cunt. I reached up to touch her but she stopped me. She
|
|
said that I would first have to touch my own shaved cunt. She said she
|
|
would shave me like she did herself this morning. We went to the
|
|
bathroom and she undressed me. What I great sensation it was to have
|
|
her shave. When she was done she cleaned me off, grabbed me by the hand
|
|
and led me to her room. She told me to lay on the bed and play with
|
|
my new cunt.
|
|
|
|
As I laid there, I began to rub my cunt, what a feeling. I went wild.
|
|
It felt so good. No pubic hair, just skin, sensitive skin. She watched
|
|
me as she got undressed. She got into the bed with me and moved her
|
|
cunt to where I could eat her. She was, and still is, so sweet tasting.
|
|
As I ate her she played with my cunt, sticking in a finger then rubbing
|
|
my clit. She would stop as I got to excited. I ate her and she came
|
|
twice, yet she wouldn't let me cum. She then got up and left the room.
|
|
She came back with some nylon straps and said that if I wanted to cum I
|
|
would have to let her tie me to the bed. She said she would not hurt
|
|
me. I agreed.
|
|
|
|
She tied my wrists and ankles to the bed so that I was spread eagle.
|
|
She then got out a vibrator and began to work on my sensitive clit. The
|
|
vibrator made me so horney, but she would not leave it on my clit long
|
|
enough to make me cum. I tried to thrust my hips to meet the dong, but
|
|
to no avail. She would then stick the dildo in and slowly pull it out,
|
|
then repeat the treatment on my clit. I was begging to cum. She bent
|
|
between my legs and tasted my juice hole and said that I was wet enough
|
|
to get my SURPRISE. Again she left the room. When she returned she was
|
|
followed by my SURPRISE. It was her Great Dane, Dale Drew! She asked
|
|
how horney was I and I knew what she meant. I shook my head yes.
|
|
|
|
She patted the bed and Dale Drew jumped up. She then took the dogs nose
|
|
and stuck it between my legs. I must have been twice as wet by now.
|
|
The dog knew exactly what to do. He began to lick my hole. I couldn't
|
|
stand it and I came twice, right away. This made him lick even faster.
|
|
I could not believe the feeling. There was no strong probing like a
|
|
humans tongue, just enough pressure and entry to do the job. As the dog
|
|
continued to eat me out Barbera Spinelli unfastened me from the bed.
|
|
Barbera Spinelli began to play with Dale Drew's cock and I watched as it
|
|
began to grow stiffening in her hand until it had grown to about 8inches
|
|
in length. Dale Drew was in a frenzy by now and his hot wet tongue was
|
|
lapping hard and fast on my exposed cunt. Dale Drew's cock was long,thin
|
|
and stiff as a board as Barbera Spinelli continued to massage it and his
|
|
balls. Barbera Spinelli said that she thought the dog's cock was hard
|
|
enough to start. She grabbed a couple of small pillows and placed them
|
|
under my ass. Then guided the Dale Drew on top of me. His face was next
|
|
to mine, I could feel his hot breath on my face. His hairy body resting
|
|
on my stomach. Barbera Spinelli put her hand on his cock and gently
|
|
guided it toward my fuck hole. As soon as the dog felt my wetness,
|
|
nature took over. He fucked me fast and very deep. I came again, and
|
|
again. Then I felt him tense and squirt inside me. He slipped out and
|
|
shot some cum on my stomach. Dale Drew then reversed his position and
|
|
began to lap my cunt again with his long wide tongue. With Dale Drew in
|
|
this position I could see his long thin cock still exposed and still
|
|
fairly stiff. Not wanting the experience to end I reached up and began
|
|
to massage his cock and balls. The dog responded at once and began
|
|
to fuck my hand as he licked my hot pussy to another orgasm. I asked
|
|
Barbera Spinelli to help me and rolled over on my stomach spreading my
|
|
legs and ass cheeks making my anus open and available to Dale Drewes wet
|
|
tongue. Seeing my waiting asshole Dale Drew began to lick me there while
|
|
Barbera Spinelli took over my handwork on her dogs cock. Barbera
|
|
Spinelli moved Dale Drew around and he mounted me doggy style and began
|
|
to dry hump my ass. Barbera Spinelli spread my ass further and guided
|
|
Dale Drewes long thin cock into my asshole. The tightness of my ass sent
|
|
Dale Drew in to ecstasy and he rammed his long thin dick in and out of
|
|
my asshole with long fast strokes. All I can remember is the feeling of
|
|
his long dick probing my rectum and driving me to orgasm after orgasm
|
|
until he filled my ass with his sticky dog cum.
|
|
|
|
As I laid there,I thanked Barbera Spinelli for what she did and told her
|
|
that it was great. Since then I have fucked her dog twice. He is not
|
|
always in the mood and sometimes it takes a lot of hand work to
|
|
get him interested. I have fucked Barbera Spinelli so many times I can't
|
|
count them and she I and my lover Tim Foley get together after school
|
|
almost three times a week. Barbera Spinelli now says that she thinks she
|
|
will try Dale Drew the next time he is ready.
|
|
|
|
I can't wait.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
==Diet Phrack==
|
|
|
|
Volume Three, Issue Thirty-Six, File 8 of 11
|
|
|
|
:-=>|%% Phreaks in Verse II %%|<=-:
|
|
|
|
by Homey the Hacker
|
|
|
|
|
|
\=================/
|
|
Get in The Ring
|
|
/=================\
|
|
|
|
[Sung to the tune of Get in The Ring by G-n-f-R]
|
|
|
|
Why do you look at me when you hate me?
|
|
Why should I look at you when you make me hate you too?
|
|
I sense a smell of retribution in the air
|
|
I don't even understand why the fuck you even care
|
|
And I don't need you jealousy
|
|
Why drag me down in your misery
|
|
And when you stare you don't think I feel it
|
|
But I'm gonna deal it back to you in spades
|
|
When I'm havin phun ya know I can't conceal it
|
|
'Cause you know you'd never cut it in my game, oh yea
|
|
And when you're talkin about our sociology
|
|
I'll be writin' down your obituary...History
|
|
|
|
You got your agents with
|
|
The Bellcore cash injections
|
|
Trumped up charges and implications
|
|
Beatin' off with your "spy" operations
|
|
Who are you to criticize our publication
|
|
Got your subtle manipulative devices
|
|
Just like you, I got my vices
|
|
I've got a thought that would be nice
|
|
I'd like to crush your head tight in my vice...PAIN!!
|
|
|
|
And that goes for all you punks in the press
|
|
That want to start shit by spreadin' lies
|
|
Instead of the things we said
|
|
That means you
|
|
Ed Schwarz at WGN Radio
|
|
Richard Sanzda
|
|
Gary Collins at Hour Magazine
|
|
Geraldo River at CBS ** [CBS being partially owned AT&T]
|
|
What you pissed off 'cause Opra Winfrey gets more ratings that you do?
|
|
Fuck You
|
|
Suck my fuckin' dick
|
|
|
|
You be liein' to the fuckin' public
|
|
Tellin' them your doin' a such favor for society
|
|
[while crack dealers like Mayor Barry who should be tried for treason
|
|
get off with slap on the wrist. FUCK YOU!]
|
|
While they be payin thier hard earned tax dollars
|
|
Printin' lies, Startin' controversy
|
|
You want to antagonize me?
|
|
Antagonize me motherfucker
|
|
Get in the ring motherfucker
|
|
And I'll kick your bitchy little ass, punk
|
|
|
|
I don't like you, I just hate you
|
|
I'm gonna kick your ass, oh yea!
|
|
|
|
Ha Ha Ha Ha Ha Ha Ha Ha Ha!!!!!!!
|
|
|
|
You may not like our integrity
|
|
We built a world out of anarchy
|
|
|
|
And in this corner weighing in at 450 lbs, Phrack Incorporated!!!!
|
|
|
|
Get in the ring!
|
|
|
|
Yea, this song is dedicated to all the Phrack fuckin' Incorporated
|
|
Fans that stuck with us through all the fucking shit
|
|
And to all those opposed...Hmm...Well
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
\=============/
|
|
Knight Lite*
|
|
/=============\
|
|
|
|
*1/3 the calories of regular computer hackers.
|
|
[Sung the tune of The Beverly Hillbillies]
|
|
|
|
Come and and listen to my story 'bout boy named Craig.
|
|
Called "Mad-hacker", but is just pullin' your leg.
|
|
Then one day he was writin' up a Phrack.
|
|
Down came the door with a great big crack.
|
|
|
|
Foley that is, Secret Service!, FBI!
|
|
|
|
Well, now old Craig's a million in debt.
|
|
Lost his cds and his brand new 'vette.
|
|
|
|
Mitch Kapor said, "There's someplace you need to be."
|
|
So he packed up his apple and moved to DC.
|
|
|
|
Washington that is!, Lawyers!, Cash flow!
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
\=============/
|
|
Erik Bloodaxe
|
|
/=============\
|
|
|
|
[Sung to the tune of the Daniel Boone theme]
|
|
|
|
Erik B was a ham...yes a big ham.
|
|
He was born with an ego that was big as mountain was he.
|
|
|
|
Erik B was ham...yes a big ham.
|
|
And he told all the ladies he was hung like a mighty oak tree.
|
|
|
|
>From the dark sun glasses he never takes off to the heal of his K-Mart shoes.
|
|
The bitchenest, horniest, drunkenest man that a hacker ever knew.
|
|
|
|
Erik B was a ham...yes a big ham.
|
|
With a mouth like a sewer and so full of manure was he.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
\================/
|
|
Vanilla Holliday
|
|
/================\
|
|
|
|
[Sung to the tune of ICE ICE]
|
|
|
|
|
|
Doc, Doc, baby! Doc, Doc, baby!
|
|
|
|
Lookout!
|
|
|
|
The Doc is back. King of the Phreaks, and Queen of the Hacks.
|
|
"I'll get ya laid yet!" I say with a grin. Meanwhile my hand goes for a spin.
|
|
I'm a master cracker, a k-rad hacker, a good 'ole plain down and dirty wacker.
|
|
I'll trash your credit if you diss me. You know why? 'Cause I'm the LOD!
|
|
|
|
Hit it Booyyyeeeeezzzz!!
|
|
|
|
Doc Doc baby! Doc Doc Baby!
|
|
|
|
Ya, ya, go get it!
|
|
|
|
Doc Doc baby! Doc Doc Baby!
|
|
|
|
Straight to your mother's cousin's uncle's stepsister!
|
|
|
|
Get back! It's a hack attack! I'm the best, and that's a fact
|
|
I've been in Time, Newsweek--they all want me. What's next? M-TV!
|
|
I'm gone today, wasn't here tomorrow, maybe I'll get a date with Charo
|
|
Ice, yah that was me. But now I've got movie rights with LOD!
|
|
|
|
Kick it!
|
|
|
|
Doc Doc baby! Doc Doc Baby!
|
|
|
|
Go Doc Go Doc go!
|
|
|
|
Doc Doc baby! Doc Doc Baby!
|
|
|
|
Yahhhhhhhhhh, straight to Comsec!
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
\===========/
|
|
Predit0r ][
|
|
/===========\
|
|
|
|
[The predator rap]
|
|
|
|
His name is Predat0r. He's the editor of TAP.
|
|
He looks like Bart Simson and he's so full of crap.
|
|
|
|
Got a board call the Blitzkreig BBS.
|
|
He wishes he was nazi serving under Herman Hess.
|
|
|
|
(oh well that's all I can think of)
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
\=======================/
|
|
Been Caught Phreaking
|
|
c0deZ's Addiction
|
|
/=======================\
|
|
|
|
[been caught Stealing by Jane's Addiction]
|
|
|
|
Been caught phreaking, once, when I was five!
|
|
I just tried phreaking, just as simple as that
|
|
Well it's just a simple fact
|
|
When I want a call and I don't want to pay for it
|
|
I dial up a code
|
|
and I dial up a code
|
|
|
|
Hey all right! I get by!
|
|
It's mine! Mine all mine!
|
|
hey!
|
|
|
|
Yea, my girl she's one too.
|
|
She gonna get on telenet, just type in microwire
|
|
Get a NUA for me
|
|
She'll call right through the outdial
|
|
Call right throught the outdial
|
|
|
|
Hey all right! I get by!
|
|
It's mine! Mine all mine!
|
|
Get c0dez!
|
|
|
|
Sat around the terminal. Sat and laughed.
|
|
Sat around the terminal and laughed
|
|
And we did it just like that, did it just like that.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
\======/
|
|
Hack
|
|
/======\
|
|
|
|
[Sung to the tune of Stand by REM]
|
|
|
|
Hack in the place where you live
|
|
Now dial out
|
|
Think about telnet, wonder why you have it now
|
|
Hack in the place where you work
|
|
Now dial up
|
|
Think about tymnet, wonder why you have it
|
|
If you are real board hack with SUN
|
|
Carry a lap-top to help along
|
|
|
|
A PAD is there to move you around
|
|
If You're not careful your hands will be bound
|
|
|
|
Hack in the place where you live
|
|
Now dial out
|
|
Think about telnet, wonder why you have it now
|
|
Hack in the place where you work
|
|
Now dial up
|
|
Think about tymnet, wonder why you have it
|
|
|
|
A PAD is there to move you around
|
|
If you're not careful your hands will be bound
|
|
|
|
If accounts were trees
|
|
Trees would be falling
|
|
|
|
Listen to reason
|
|
Foley is calling
|
|
_ _
|
|
(reapeat an (_X_) amount of times)
|
|
|
|
Now Hack!
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
\==========================/
|
|
I'M THE MAN WITH THE BOX
|
|
/==========================\
|
|
[Sung to the tune of "Man in the Box" by Alice in Chains]
|
|
|
|
I'm the man with the box
|
|
Burried in my (ESS7) switch!!!
|
|
Won't you come and save me, save me?
|
|
|
|
Feed me lies, where are all your trunks?
|
|
(Bellcore) deny your maker
|
|
He who tries will be wasted
|
|
Feed me lies, now you've shut your trunks!
|
|
|
|
I'm the dog who phreaks
|
|
Can't shove my tones in a switch
|
|
Won't you come and save me?
|
|
|
|
Feed me lies, where are all your trunks?
|
|
Bellcore, deny your maker
|
|
He who tries will be wasted
|
|
Feed me lies, now you've shut your trunks!
|
|
|
|
Feed my lies, where are all your trunks?
|
|
Bellcore, deny your maker
|
|
He who tries will be wasted
|
|
Feed me lies, now you've shut your trunks!
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
\==================================/
|
|
Keep on Hackin in the Free World
|
|
/==================================\
|
|
|
|
[Sung to the tune of Keep on Rockin in the Free World by Neil Young]
|
|
|
|
There's CERT on the sceen
|
|
Trying to get a clue
|
|
Hackers typin on thier screen
|
|
Phreaks with boxes that are blue
|
|
There's a warning sign in CUD ahead
|
|
There's a lot of people sayin
|
|
We'd be better of dead
|
|
Don't feel like Satan
|
|
But we are to them
|
|
So I try to forget it anyway I can
|
|
|
|
Keep on hackin in the free world (4x)
|
|
|
|
I see a phreak in night
|
|
With some trash in his hand
|
|
There's an old CO
|
|
With a garbage can
|
|
Now he takes the trash away
|
|
And he's gonna learn a lot
|
|
Goes home to hack some more
|
|
And he's not gonna a stop
|
|
|
|
Keep on hackin in the free world (4x)
|
|
|
|
Got a thousand points of light
|
|
On our modems, man
|
|
Got a brand new Lexicon in my hand
|
|
He found department stores
|
|
with carbon paper
|
|
Got Crimson Death & Dispater
|
|
They say Phrack is back
|
|
Gonna keep hope alive
|
|
Got codes to crack
|
|
Got dumpsters to dive
|
|
|
|
Keep on hackin in the free world (4x)
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
\============/
|
|
FADE TO HACK
|
|
/============\
|
|
by Erik Bloodaxe
|
|
|
|
[Sung to the tune of "Fade to Black" by Metallica]
|
|
|
|
Accounts just seem to fade away
|
|
Losing access every day
|
|
Getting lost within some shell
|
|
I have lost the will to hack
|
|
No more passwords left to crack
|
|
There are no more nets for me
|
|
I need virtual reality
|
|
|
|
Nets arent what they used to be
|
|
Someone's always logging me
|
|
Access Barred, this cant be real
|
|
No more packets left to steal
|
|
Now they've installed public key
|
|
And they're using Secure ID
|
|
Security awareness taking dawn
|
|
I was root, but now root's gone
|
|
|
|
Rerouted my call to save myself, but it's too late
|
|
Now I can't think, think why I should even try
|
|
|
|
Yesterday seems as though it never existed
|
|
The SS greet me warm, now I will just say goodbye
|
|
_______________________________________________________________________________
|
|
|
|
|
|
==Diet Phrack==
|
|
|
|
Volume Three, Issue Thirty-Six, File 9 of 11
|
|
|
|
/---------------------------------------------------------------------------\
|
|
| THE MEN FROM |
|
|
| M M OOOOO N N GGGGG OOOOO |
|
|
| MM MM O O NN N G O O |
|
|
| M M M O O N N N G GG O O |
|
|
| M M O O N NN G G O O |
|
|
| M M OOOOO N N GGGGG OOOOO |
|
|
| |
|
|
| -*- present -*- |
|
|
| |
|
|
| +-----------------+ |
|
|
| | Real Cyberpunks | |
|
|
| +-----------------+ |
|
|
| |
|
|
| 9/24/91 |
|
|
| |
|
|
| With all this shit in the news and now a book about cyberpunks, we have|
|
|
|a bunch of lame assholes who think they are cyberpunks running around |
|
|
|blackening the name. In response to this we'd created this g-file so |
|
|
|everybody can tell the lamers from the real cyberpunks. Most of these |
|
|
|wanna-be cyberpunks will probably be offended by what we're going to say, |
|
|
|because the description of what defines a real cyberpunk doesn't apply to |
|
|
|them. Remember though, cyberpunk is mostly an attitude (this g-file |
|
|
|describes physical manifestations of this attitude), and real cyberpunks |
|
|
|don't get upset over something written in a g-file. |
|
|
\---------------------------------------------------------------------------/
|
|
|
|
CLOTHING
|
|
|
|
- Real cyberpunks don't wear paisley, or any of that other neo-
|
|
futuristic, yuppie, artfag shit.
|
|
|
|
- Real cyberpunks wear military surplus clothing, non-neon colored
|
|
Gortex, bluejeans, boots (combat or motorycle), Factsheet-5 T-Shirts,
|
|
and kilts (on formal occasions).
|
|
|
|
- Real cyberpunks don't shop at Banana Republic or the "Mainframe"
|
|
clothing section at Sears.
|
|
|
|
- Real cyberpunks have the balls to go to Thrift Shops.
|
|
Corollary to the above: Anyone who makes fun of a cyberpunk shopping at
|
|
a thrift shop usually winds up in ICU.
|
|
|
|
COMPUTERS
|
|
|
|
- Real cyberpunks don't use IBM PCs or Tandy 1000s.
|
|
|
|
- Real cyberpunks that have the $$$ use 486s, and 68030s.
|
|
|
|
- Real cyberpunks that don't have the $$$ use whatever the hell they can
|
|
get ahold of (except IBM PCs an Tandy 1000s).
|
|
|
|
- All real Cyberpunks still own a TI-99/4A, S-100, Apple ][ w/Apple Cat,
|
|
or an Atari 130XE with ATR8000 & 850 interfaces as their backup
|
|
machine.
|
|
|
|
- Real cyberpunks program in assembler and ADA.
|
|
|
|
- Real cyberpunks think C is cute for a fuck-around language.
|
|
|
|
- Real cyberpunks think of the Amiga as a cute toy.
|
|
|
|
- Real cyberpunk SYSOPS run Stonehenge.
|
|
|
|
- Real cyberpunks realize the Apple Cat was the best modem ever made.
|
|
|
|
|
|
CARS
|
|
|
|
- Real cyberpunks drive whatever they can afford.
|
|
|
|
- Real cyberpunks never drive an unmodified vehicle.
|
|
|
|
- Real cyberpunks think Audi, BMW, and Mercedes cars serve best as rocket
|
|
launcher targets.
|
|
|
|
- Real cyberpunks who can afford them drive something with a V-8.
|
|
Corollary to the above: Real cyberpunks go to every police auction
|
|
in their area.
|
|
|
|
TECH
|
|
|
|
- All real cyberpunks have their ham license.
|
|
|
|
- Real cyberpunks know the difference between a resistor and a capacitor.
|
|
|
|
- Real cyberpunks know where to get tech cheap in their area.
|
|
Corollary to the above: Real cyberpunks practically live at their local
|
|
surplus store.
|
|
|
|
- Real cyberpunks think Radio Shack sucks, but still buy from there
|
|
because it's convenient.
|
|
Corollary to the above: Real cyberpunks put pragmatism before
|
|
principle.
|
|
|
|
- Real cyberpunks always carry a Leatherman Tool.
|
|
Corollary to the above: Real cyberpunks know what a Leatherman Tool is.
|
|
|
|
- Real cyberpunks own a dual-band HT.
|
|
Corollary to the above: Real cyberpunks know what a dual-band HT is.
|
|
Corollary to the corollary: Real cyberpunks have hosed McDonalds at
|
|
least once.
|
|
|
|
- Real cyberpunks know how use a TDR.
|
|
Corollary to the above: The have also managed to get ahold of one for
|
|
free.
|
|
|
|
POLITICS & LAW
|
|
|
|
- Real cyberpunks are politically aware, but avoid getting involved in
|
|
that bullshit.
|
|
|
|
- Real cyberpunks think all politicians should be castrated.
|
|
Corollary to the above: Real cyberpunks are libertarians.
|
|
|
|
- Real cyberpunks have copies of their state's law statues.
|
|
|
|
- Real cyberpunks know the difference between the Declaration of
|
|
Independence and The Constitution.
|
|
Corollary to the above: Real cyberpunks know what both of those say.
|
|
|
|
- Real cyberpunks don't get caught.
|
|
|
|
KNOWLEDGE
|
|
|
|
- Real cyberpunks read 2600, Factsheet-5, Full Disclosure, Iron Feather
|
|
Journal, Cybertek, Radio Electronics, Circuit Cellar Ink, Computer
|
|
Shopper, American Survival Guide, and any 'zines about local bands in
|
|
their area.
|
|
Corollary to the above: Real cyberpunks understand what they read in
|
|
these publications.
|
|
|
|
- Real cyberpunks think Mondo2000, for the most part, sucks.
|
|
|
|
- Real cyberpunks learn about everything from Computers to Crossbows.
|
|
|
|
- Real cyberpunks know how to spell.
|
|
|
|
- Real cyberpunks speak at least 2 languages.
|
|
|
|
WEAPONS
|
|
|
|
- Real cyberpunks don't have the typical yuppie artfag fear of weapons
|
|
that most modem users seem to have.
|
|
Corollary to the above: Real cyberpunks know the value of useful
|
|
equipment.
|
|
|
|
- Real cyberpunks own at least one gun.
|
|
|
|
- Real cyberpunks carry Gerber, Cold Steel, SOG, AlMar, or Spyderco
|
|
blades.
|
|
Corollary to the above: Real cyberpunks think custom steel is neat, but
|
|
costs too much.
|
|
|
|
- Real cyberpunks have memorized The Improvised Munitions Black Book.
|
|
|
|
- Real cyberpunks know The Anarchist Cookbook is a crock of shit.
|
|
|
|
- Real cyberpunks buy everything authored by Seymour Lecker and Kurt
|
|
Saxon.
|
|
|
|
- Real cyberpunks keep a supply of DMSO handy.
|
|
Corollary to the above: Real cyberpunks know what DMSO is.
|
|
|
|
MUSIC
|
|
|
|
- Real cyberpunks go to The Mentors' concerts whenever they can.
|
|
|
|
- Real cyberpunks think C&C Music Factory is just a bunch of out-of-the-
|
|
closet homosexuals.
|
|
|
|
- Real cyberpunks don't listen to Paula Abdul.
|
|
|
|
- Real cyberpunks think Michael Jackson should be napalmed.
|
|
Corollary to the above: Real cyberpunks think Michael Jackson is a
|
|
reincarnate of his monkey Bubbles.
|
|
|
|
- Real cyberpunks think Top-40 sucks.
|
|
|
|
- Real cyberpunks listen to Ministry, The Cure, Skinny Puppy, The
|
|
Misfits, Rush, Pink Floyd, etc.
|
|
|
|
- In the end, real cyberpunks listen to whatever the fuck they want.
|
|
|
|
PHREAKING & HACKING
|
|
|
|
- Real cyberpunks think codes are for fags, but use them anyway because
|
|
they put pragmatism before principle.
|
|
|
|
- Real cyberpunks know what TEMPEST means.
|
|
|
|
- Real cyberpunks use data-taps.
|
|
|
|
- Real cyberpunks have Internet access.
|
|
|
|
- Real cyberpunks know why Broadway Hacker invited everyone to his house.
|
|
|
|
- Real cyberpunks know what PPS really means.
|
|
|
|
- Real cyberpunks know Clifford Stoll's ex-wife is a lesbian.
|
|
Corollary to the above: Real cyberpunks know that Clifford Stoll is an
|
|
asshole.
|
|
|
|
- Real cyberpunks know just how good friends John Maxfield and Broadway
|
|
Hacker are.
|
|
|
|
- Real cyberpunks know who John Maxfield is and what he was arrested for.
|
|
|
|
- Real cyberpunks own a blue box, and still use it.
|
|
Corollary to the above: Real cyberpunks know what a blue box is, and
|
|
know how to use it.
|
|
|
|
- Real cyberpunks know what a TS-21 is.
|
|
Corollary to the above: Real cyberpunks stole their TS-21.
|
|
|
|
- Real cyberpunks have acquired a Bell System hard-hat.
|
|
|
|
- Real cyberpunks have a payphone.
|
|
Corollary to the above: The payphone belongs to someone else.
|
|
|
|
- Real cyberpunks on the east coast have attended at least one 2600
|
|
meeting.
|
|
Corollary to the above: Real cyberpunks who have attended a 2600
|
|
meeting don't go to them anymore.
|
|
Corollary to the corollary: Real cyberpunks are waiting for another
|
|
OSUNY meeting.
|
|
Further corollary: Real cyberpunks know what OSUNY originally stood
|
|
for.
|
|
|
|
HEALTH
|
|
|
|
- Real cyberpunks use Choline, Ginseng, and Golden Seal.
|
|
Corollary to the above: Real cyberpunks know what these are.
|
|
|
|
- Real cyberpunks know about the medicinal value of various plants.
|
|
|
|
- Real cyberpunks take care of themselves.
|
|
|
|
- Real cyberpunks take time away from fucking with their computers to get
|
|
some exercise.
|
|
|
|
FOOD & DRINK
|
|
|
|
- Real cyberpunks drink Jolt.
|
|
Corollary to the above: Real cyberpunks think Pepsi is for artfags.
|
|
|
|
- Real cyberpunks are intimately familiar with the selection at 7 -
|
|
Eleven, but avoid it whenever possible.
|
|
|
|
- Real cyberpunks know how to cook.
|
|
|
|
- Real cyberpunks drink Guinness Stout.
|
|
|
|
- Real cyberpunks who are under 21 distill their own.
|
|
|
|
- Real cyberpunks can go to a Supermarket and not get lost.
|
|
|
|
That's it for now, but since lamers are always finding mew ways to become
|
|
lame, expect a Real Cyberpunks Vol. II soon.
|
|
|
|
Yours truly,
|
|
The Men From Mongo, 9/24/91
|
|
:OSUNY, TCO, PPS, SPS, PHALCO
|
|
_______________________________________________________________________________
|
|
|
|
|
|
==Diet Phrack==
|
|
|
|
Volume Three, Issue Thirty-Six, File 10 of 11
|
|
|
|
_______________________________________________
|
|
| |
|
|
| ^*^ ^*^ ^*^ ^*^ |
|
|
| |
|
|
| *Elite* World News |
|
|
| |
|
|
| Issue 36 / Part 1 of 2 |
|
|
| |
|
|
| Compiled, Edited, and Mangled by Dr. Dude |
|
|
| |
|
|
| ^*^ ^*^ ^*^ ^*^ |
|
|
|_______________________________________________|
|
|
|
|
|
|
A GOOD HAM IS A DEAD HAM
|
|
Special Thanks: Twisted Pair
|
|
|
|
Just as geeks with computers annoy hackers and phreaks, geeks with "ham"
|
|
sets annoy those of us that diddle with electronics. To prove my point just go
|
|
to ANY "Ham-Fest." See the guy walking around with the headset walkie-talkie
|
|
that looks like he shaved about 4 days ago, grossly overweight, dressed in the
|
|
ugliest clothing, and is just simply nerdier than hell? Being involved with
|
|
electronics we are constantly irritated by these losers. We urge everyone out
|
|
there to DESTROY ANYONE THAT CLAIMS TO BE A HAM!!!!!
|
|
|
|
Anyway, what follows is a true story:
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Our story is basically about a guy named Jim. Jim liked to watch a
|
|
particular TV show when he got home from work everyday like a lot of people do.
|
|
Lately, Jim's TV reception on all channels was being ripped up by an unknown
|
|
interference signal. Being disgusted with the TV picture, ol' Jim said, "Fuck
|
|
it." He decided to listen to the radio for awhile, but, GOD DAMNIT there was
|
|
interference there, too. By this time Jim is really very upset. The
|
|
interference would come in spurts, loudly interrupting whatever show was on at
|
|
the time with a loud, distorted, unintelligible voice.
|
|
|
|
Jim began to wise up quickly after being subjected to watching snowy
|
|
pictures, flipping pictures, and listening to someone's raspy, annoying
|
|
distortion on his TV. He figured out that his neighbor down the street (we'll
|
|
just call him Ham) had a big antenna sticking up beside his house. Jim noticed
|
|
that the interference was always present when Ham's 4x4 truck, with KC lights,
|
|
and tractor tires was at home. Jim went over to talk to Ham. Ham said his
|
|
"antenner" was his "binnus." What ever Ham wanted to do with it was his
|
|
"damned binuss." After the door was slammed in Jim's face, Jim decided to do
|
|
some research.
|
|
|
|
Jim spoke to some of his other neighbors about the problem. What a
|
|
surprise. Turns out they ALL had the interference. The interference area was
|
|
at least 4 blocks in every direction. The neighbors decided that they would
|
|
go have a chat. So, 6 people from all parts of the neighborhood went go see
|
|
Ham for a friendly visit. Ham reluctantly opened the door and immediately
|
|
started cussing about it being his "antenner," his "Ham gear," his
|
|
"ampluhfieers," and he would operate them as he damned well pleased! He also
|
|
DARED anyone to stop him from broadcasting in the neighborhood.
|
|
|
|
Jim, now beyond pissed off, contacted the FCC regional office in Chicago.
|
|
They helped him fill out a formal complaint. The FCC, usually slow to act on
|
|
such complaints, gave Jim a lucky break. The FCC just happened to have a
|
|
senior inspection official who would be in Jim's area the next week. Jim
|
|
couldn't wait! On the fateful day of the FCC's visit, they came armed to the
|
|
teeth with all kinds of state-of-the-art-neato things. The FCC guys showed up
|
|
in a white van with windows tinted black. There were no markings on this van,
|
|
except for multiple antennas of all types sitting on top of the van (how very
|
|
unobtrusive and sneaky are they). The inspectors first met with Jim to look at
|
|
his bad reception to confirm that Ham was transmitting. Then they took Jim out
|
|
to the van to show him how they check out such complaints. The van was LOADED.
|
|
The FCC guys had spectrum analyzers, custom-made multi-frequency receivers that
|
|
covered all bands, they had signal strength meters, they had equipment
|
|
controlled by a PC. They also had a PC linked via radio to somewhere. On it
|
|
they could look up information on ANY ham license, broadcast license, suspected
|
|
pirate station, or check personal records of known offenders.
|
|
|
|
The FCC's equipment confirmed that Ham was broadcasting shortwave with WAY
|
|
too much power. Their power meter was pegged on its highest scale, damaging
|
|
it (oops!). Well, the FCC inspector was pretty hot about that. In fact, he
|
|
was really pissed. He drove the van up to Ham's house, slamming on the brakes
|
|
with screech. Ham bolted to the door. The FCC guys showed their ID and asked
|
|
Ham to come on outside and look at the stored readings they had made earlier on
|
|
Ham's signal. Ham refused at first, but finally came outside.
|
|
|
|
Ham swore a few too many times and pissed off the FCC inspectors even
|
|
more. Ham told them he didn't believe their readings, and would just do as he
|
|
pleased. He went back into the house and locked the door. Jim wasn't happy
|
|
either. After using their cellular phone to call for police backup, the senior
|
|
FCC inspector told his partner to cover the back door.
|
|
|
|
The police arrived with lights on and sirens blaring. The FCC guy
|
|
INSISTED that HE get to kick Ham's door in. The police obliged. After a short
|
|
struggle with Ham, he was tossed onto the front yard and cuffed. The
|
|
inspectors confiscated a whole room full of Ham gear, 3 transmitters, Ham logs,
|
|
big homemade linear amplifiers, etc. Not wanting to climb Ham's tower to get
|
|
at his antenna, the FCC just CUT OFF Ham's antenna cable about 15 feet up.
|
|
How cute! The WHOLE cable would have to be replaced if Ham was ever to
|
|
broadcast again.
|
|
|
|
Ham's gear was permanently confiscated, his license revoked for life, and
|
|
certainly appeared as though he was embarrassed by the scene in his yard. The
|
|
end? Not!
|
|
|
|
Just one month later Jim started noticing interference patterns on his TV
|
|
set and radio again. Daily the problem grew worse. This time he could hear
|
|
tones mixed in with the crackly, distorted voice. After a week of this
|
|
was back at it again. Jim checked it out. He saw that Ham's truck was,
|
|
indeed, in the driveway every time the distortion was present. Ham WAS back
|
|
at it again. Jim assured everyone who called that he WOULD take care of the
|
|
problem once and for all. After watching the evening news program break apart
|
|
several times (always during the most important parts), Jim got good and mad.
|
|
It was getting dark, so Jim decided to do a little tower climbing!
|
|
|
|
Jim wore black clothing so he wouldn't be seen by Ham. While getting
|
|
ready to scale Ham's tower, Jim noticed that Ham had installed brand-new
|
|
antenna cable. A light was on in the basement window which was directly in
|
|
front of the base of the tower. Jim peered into the window. He noticed that
|
|
each time Ham talked into his microphone, a red light came on that could be
|
|
faintly seen from outside. Jim jumped onto the base of the tower, being
|
|
careful that Ham couldn't see his feet out his basement window. On the way up
|
|
the tower, Jim looked down to watch the red light which went on whenever Ham
|
|
was transmitting.
|
|
|
|
Jim came prepared for the job. He had two things in his pocket; a long,
|
|
sharp hatpin and a roll of black electrical tape. After climbing about 15 feet
|
|
up the tower, Jim once again looked down to see if Ham's red light was on. It
|
|
was off. Jim worked fast. He took out the hat pin and inserted it crossways
|
|
straight THROUGH Ham's new antenna cable. The hatpin would short out the
|
|
cable's grounded shield with the live center conductor in the cable. He made
|
|
sure it was pushed in all the way. Jim quickly grabbed the electrical tape and
|
|
carefully wrapped it around the cable to cover up the pin, making it
|
|
unnoticeable. Then he climbed down a little ways and decided to jump the rest
|
|
of the way down.
|
|
|
|
Just as he landed on the ground the sparks FLEW! He saw a BRIGHT red
|
|
flash of light as Ham keyed on his transmitter. There were a couple of loud
|
|
pops as loud as gunfire. Lying on the ground, Jim saw the smoke and flames
|
|
rolling out of Ham's transmitter and amplifier. Ham was JOLTED out of his
|
|
chair with ice cubes flying out of the drink he was holding. Ham's circuit
|
|
breaker must have tripped, too because his entire HOUSE went dark after
|
|
about 5 seconds.
|
|
|
|
Ham never was able to find the problem with his antenna system. He must
|
|
have given up because the interference stopped!
|
|
_______________________________________________________________________________
|
|
|
|
DEMON COMPUTER KILLS TWO WORKERS! November 12, 1991
|
|
by Sally O'Day (Weekly World News)
|
|
|
|
"Exorcist Called In After Experts Discover Virus-bred Evil Spirit!"
|
|
|
|
Bank officials have summoned an exorcist to rid a computer terminal of a
|
|
hideous horned demon that <has> already killed two employees and put another in
|
|
a coma!
|
|
|
|
And if Father Hector Diaz fails in his mission to banish the spirit,
|
|
authorities say they will have to shut down the bank because the computer can't
|
|
be turned off, moved, or unplugged. And as long as it remains in place, every
|
|
customer and employee is in danger.
|
|
|
|
"This sounds like something out of a sci-fi movie, but the threat is both
|
|
serious and real," Police Detective Raul Lopez told reporters. "I don't know
|
|
why and I don't know how. But an evil force or spirit is living in that
|
|
machine and the death of two innocent people proves it."
|
|
|
|
Maria Catalan was found sitting at her terminal with her head in her lap."
|
|
Carmen de la Fuente had a fatal heart attack within two minutes of sitting
|
|
down to work.
|
|
|
|
Computer experts tired to examine the terminal, but they had no success
|
|
whatsoever. One of them started babbling like a madman when he got within 10
|
|
feet of the machine and a dozen more were flung to the floor like rag dolls by
|
|
some unseen force.
|
|
|
|
"We can't turn the machine off because everyone who tries blacks out and
|
|
falls to the floor. I know I must sound like a lunatic, but that computer
|
|
truly has a mind -- and a life -- of its own."
|
|
|
|
The mind-numbing drama began when the bank in Valapariso, Chile, installed
|
|
a new computer system last spring. Within days the system turned deadly.
|
|
|
|
When a bank custodian told of seeing a hideous horned demon appear on the
|
|
computer screen, bank officials asked Father Diaz to perform an exorcism.
|
|
The priest has been unavailable for comment while he prepares the rite of
|
|
exorcism.
|
|
|
|
But a spokesman for the firm that installed the computer system says that
|
|
a computer virus almost certainly created the conditions which caused the
|
|
terminal to kill.
|
|
______________________________________________________________________________
|
|
|
|
THE TRUE SIGNIFICANCE OF ZODIAC SIGNS
|
|
by Dr. Dude
|
|
|
|
AQUARIUS (JAN 21-FEB 19) You have an inventive mind and are great at
|
|
engineering people. You frequently abuse c0dez and spend a great deal of time
|
|
hacking voice mail box systems. (Night Ranger)
|
|
|
|
PISCES (FEB 21-MAR 20) You have a very vivid imagination and often think you
|
|
are being followed by the FBI and the CIA. You also feel as though you need to
|
|
join as many "groups" as possible. Pisces write a lot of "How Break Into/Steal
|
|
Fortresses" files. (Lex Luthor)
|
|
|
|
ARIES (MAR 21-APR 21) You are a pioneer and an innovator. You hold most people
|
|
in contempt. You are quick tempered, impatient, and scornful of everyone. No
|
|
one can ever hope to be as El1te as you are. Most Aries aren't actually
|
|
hackers, because they spend too much time pestering other hackers and trying to
|
|
destroy the computer underground than actually hacking into systems. All aries
|
|
will grow up to work for the Secret Service. All Aries try to join MOD.
|
|
(Dictator, Dan the Operator, Corrupt)
|
|
|
|
TAURUS (APR 21-MAY 21) You are practical and persistent. You hack like hell
|
|
and never get credit for anything. Most people think you are racist. You like
|
|
to write files about "Running Over Things With a 4x4" and "Making Drugs." You
|
|
are goddamn redneck hacker. (Taran King)
|
|
|
|
GEMINI (MAY 22-JUNE 21) You are a quick and intelligent thinker. People like
|
|
you because you are bisexual. However, you are inclined to expect too much for
|
|
too little. This is why all Geminis are leeches. Geminis belong to at least
|
|
10 boards at a time and are on the endless quest for El1teness.
|
|
|
|
CANCER (JUNE 22-JULY 23) You are very compassionate and overly trusting and
|
|
never do any dark side hacking. This makes you the perfect fool. Cancers
|
|
write virii in LOGO and Blue Box from their home phones. Cancers think that
|
|
Tim Foley is a misunderstood man.
|
|
|
|
LEO (JULY 24-AUG 23) You consider yourself a born leader, while others consider
|
|
you loud and pushy. This is why all Leos are power hungry and therefore a lot
|
|
of Leos are sysops. Most Leos talk big and then do nothing. Leos are also into
|
|
starting "groups." (Ninja Master)
|
|
|
|
VIRGO (AUG 24-SEPT 23) You are the logical type and hate disorder. That's why
|
|
you spend more time collecting text files and news related to hacking than
|
|
actually doing any hacking or phreaking. (Crimson Death, Knight Lightning)
|
|
|
|
LIBRA (SEPT 24-OCT 23) You are the artistic type and have a difficult time with
|
|
reality. You brag about your library of porno GIF's and have close ties with
|
|
Amiga pirate groups. You also tend to be fairly talkative, thus making you a
|
|
great informant for the Secret Service. (Dispater, Erik Bloodaxe, Tuc)
|
|
|
|
SCORPIO (OCT 24-NOV 22) You are shrewd in business and cannot be trusted. You
|
|
will achieve the pinnacle of success due to your complete lack of morals and
|
|
ethics. All Scorpios are into crashing BBS. You are a perfect son of a bitch.
|
|
(The Disk Jockey)
|
|
|
|
SAGITTARIUS (NOV 23-DEC 21) You are overly optimistic and enthusiastic. You
|
|
have a reckless tendency to rely on luck since you lack any real talent. A
|
|
typical Sagittarian move is to drag home 10 bags of trash from the local telco
|
|
to discover the only thing they got out of the ordeal was a car that smells
|
|
like coffee for the next 3 weeks. (Aristotle, Predat0r)
|
|
|
|
CAPRICORN (DEC 22-JAN 20) You are overly conservative and afraid of taking
|
|
risks. You would be afraid of redboxing from a downtown Los Angeles at
|
|
lunchtime. You think that copying pirated software will lead the FBI to you
|
|
front doorstep the next day. You are a puss. (Juan Valdez)
|
|
______________________________________________________________________________
|
|
|
|
GOD, RUSTY, & INWARD OPERATORS
|
|
|
|
Once again, Pat Townson admonishes a reader of comp.dcom.telecom for
|
|
having a little phun at work.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
From: 0004133373@mcimail.com Donald E. Kimberlin (comp.domp.telecom)
|
|
|
|
..in a footnote <Digest vol10, iss637), our Moderator suggests,
|
|
|
|
> "... some children, phreaks and assorted other folks consider it quite a
|
|
> funny joke to conference two unrelated parties via three-way calling, then
|
|
>let them (the two called parties) squabble with each other while the
|
|
>perpetrator goes spastic with laughter at his little prank. PAT]"
|
|
|
|
Well, it brings to mind three incidents that I guess can now be told:
|
|
|
|
1.) The good old "testboard," of course, had the ability to "conference in"
|
|
several parties, while the person on the testboard could cut off their own talk
|
|
path, leaving the two parties talking to each other. In an earlier, simpler DDD
|
|
network, simply dialing an area code plus 121 got the "Inward Operator." a.k.a
|
|
"Assistance" to the public's view for an entire area code. In a yet-to-be-
|
|
divulged corner of Long Lines, it was a favorite pastime to dial 809+121 (San
|
|
Juan, Puerto Rico) and 808+121 (Honolulu, Hawaii) and let two Ernestines of
|
|
the Lily Tomlin era argue about which had called which and what they were
|
|
supposed to do. Meantime, gales of laughter could be heard around the
|
|
monitoring loudspeaker in a testroom thousands of miles from either of them!
|
|
|
|
2.) In a similar fashion, happenstance listening found an FX between two cities
|
|
that got dialed up every morning and contained a day-long dialog between two
|
|
receptionists of the same company. One was named "Rusty." Rusty's nightly
|
|
romantic exploits in a major seaside resort city, if true, would provide years
|
|
of material for one of today's "Confessions" 900 numbers! They were replete
|
|
with details of Rusty's specialized wardrobe and tools of her nighttime trade.
|
|
Needless to say, the day shift had a monitor speaker plugged into THAT FX
|
|
daily. (I almost swallowed my chewing gum more than once!) After a long
|
|
period <months> of unobtrusive listening, a testboardman <whose name is yet to
|
|
be divulged> began to pop in with comments that could be heard only by Rusty
|
|
and not her audience at the other end.
|
|
|
|
Rusty would respond, leaving her private audience puzzled at who Rusty was
|
|
talking to. That would cause the discussion to turn to suggestions of
|
|
reporting eavesdroppers on the phone. However, no reports were ever filed when
|
|
it got around to, "But what if they ask what we were talking about?" (It would
|
|
have been hilarious, anyway, because the self-same room that was doing the
|
|
listening was the place the trouble reporting number was in ... in fact, the
|
|
self-same people!)
|
|
|
|
3.) The highest level of development of this art might be classified as an
|
|
early form of the "Talking to God" service recently purported to have emerged
|
|
in Italy. This one was over on the 17B Board, where thousands of DDD message
|
|
trunks terminated in ports of the 4A toll switching machine. Each evening, as
|
|
the network peaked with the 7 PM rush for cheap rates, it wasn't difficult to
|
|
find a circuit on which a couple of good old Bible-toting down south mommas
|
|
were commiserating about their physical aches and heartaches over the foibles
|
|
of their "chilluns." When one finally asked, as they always did, for the Lord
|
|
to intervene, an obliging testboardman would plug into the four-wire transmit
|
|
toward the requester and play God on the Telephone. Invariably, the poor dear
|
|
would literally swoon and shush the questioning other, who couldn't hear God
|
|
talking! One can imagine the testimony of miracles next Sunday morning at the
|
|
country church!
|
|
|
|
But of course, NOBODY ever listens in on YOUR calls...why, the Company would
|
|
NEVER permit that! Boy, I sure hope the Statute of Limitations has run out on
|
|
this!
|
|
|
|
[Moderator's Note: I still don't think it is funny. I regard it as a major
|
|
violation of trust; and I'm sure you are aware that had the employees involved
|
|
in this little prank been caught and the subscriber's involved elected to sue,
|
|
telco would have had to pay financially and the employees involved probably
|
|
would have lost their jobs. PAT]
|
|
_______________________________________________________________________________
|
|
|
|
ELITE WORLD NEWS QUICKNOTES
|
|
|
|
1. After the recent massive failure in New England, their fourth since January
|
|
1990, ATT announced a new customer service number for affected customers to
|
|
call in case of future problems: 1-900-Call-ATT.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
2. Corrupt & MOD are Really Fat Albert & The Junk Yard Gang!
|
|
"Habba mamba, NebbitWibbiz bebba Fabbit Abet."
|
|
|
|
That's right! In this exclusive interview with Weird Harald (aka The Wing)
|
|
Phrack Inc. discovers that the true identity of Corrupt is Fat Albert.
|
|
WH is now talking. Why? Because the leader of the infamous New York City
|
|
crack gang (Corrupt) threatened to post his "info" on Internet Relay Chat
|
|
if Harald did not step up his rag wars.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
3. The Hacker's Dictionary explains that "RTM," apart from being the login of
|
|
a certain Cornell student, is also common shorthand for "Read The Manual,"
|
|
as in "Don't hassle me now, did you RTM?"
|
|
|
|
Turns out that the original expression was RTFM, like "Look, I got 20
|
|
klingons on the screen and no warp drive. Go RTFM."
|
|
|
|
Now, turns out that Morris's hack is viewed as uncool because he screwed
|
|
up the coding so a few netfolks changed his login to RTFM.
|
|
|
|
"Ha ha only serious." (another expression from the Hackers's Dictionary)
|
|
_______________________________________________________________________________
|
|
|
|
|
|
==Diet Phrack==
|
|
|
|
Volume Three, Issue Thirty-Six, File 11 of 11
|
|
|
|
_______________________________________________
|
|
| |
|
|
| ^*^ ^*^ ^*^ ^*^ |
|
|
| |
|
|
| *Elite* World News |
|
|
| |
|
|
| Issue 36 / Part 2 of 2 |
|
|
| |
|
|
| Compiled, Edited, and Mangled by Dr. Dude |
|
|
| |
|
|
| ^*^ ^*^ ^*^ ^*^ |
|
|
|_______________________________________________|
|
|
|
|
|
|
STUDS PROMOTE BETTER IMAGE
|
|
|
|
Introducing Eric Bloodtest, Dick Holiday, PH-factor, and Bobbie Buttercupps!
|
|
|
|
HOUSTON -- Three self-professed members of the Legion of Dudes, one of the
|
|
most notorious swingers groups to operate in the United States, said they now
|
|
want to get paid for their skills. Along with a former X-rated film actor, the
|
|
members launched a new dating service called ComseX Dating Security that will
|
|
check out women whom male customers might be interested in dating.
|
|
|
|
"We have been in the dating business for the last 11 years -- just holding
|
|
on to the different end of our stick," said Scott Girlchaser who said he once
|
|
used the handle Dick Holiday as a Legion of Dudes member. The group has been
|
|
celibate since late last year, Girlchaser said.
|
|
|
|
The start-up firm plans to offer sister penetration testing, personality
|
|
matching, and sexual training services as well as security products. "We have
|
|
information that you can't find in Penthouse or Playboy: We know why people
|
|
date, what motivates them, why they are curious," Girlchaser said.
|
|
|
|
Already, the start-up has met with considerable skepticism.
|
|
|
|
"Would I hire a gigolo to be an escort for my mother?" asked John
|
|
Kastrate, dating information administrator at Love & Holding Corporation in
|
|
Hollywood, California. "If they stayed celibate for 5 to 10 years, I might
|
|
reconsider, but 12 to 18 months ago, they were swingers, and now they have to
|
|
prove themselves."
|
|
|
|
"You don't hire ne'er-do-wells to come and grope at your fiance," said Tom
|
|
Smallpenis, a sexual therapist patient at General Hospital. "The Legion of
|
|
Dudes is a known anti-monogamous group, and although it is good to see they
|
|
have a heterosexual bent, GH would not hire these people."
|
|
|
|
ComseX already has three contracts with various men's organizations,
|
|
Girlchaser said.
|
|
|
|
"I like their approach, and I am assuming they are legit," said Herman
|
|
Slutten, a dating consultant at HeyMan Datababe Corporation in Phoenix,
|
|
Arizona. His firm is close to signing a contract with ComseX, Slutten said.
|
|
|
|
Federal health enforcers have described the Legion of Dudes in reports,
|
|
indictments, search warrants, and other documents as a closely knit group of
|
|
about 15 swingers whose members sleep around, father children, skip out on
|
|
child support, participate in S&M, and break hearts by entrancing women across
|
|
the country.
|
|
|
|
The group was founded in 1984 and has had dozens of members pass through
|
|
its ranks. Approximately 12 former members have been infected by sexually
|
|
transmitted diseases relating to their exploits. Three former members are now
|
|
dead and at least three others are regularly receiving treatment. None of the
|
|
ComseX founders have ever been infected with a sexually transmitted disease.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
AN OFFER YOU COULD REFUSE?
|
|
|
|
Tom Smallpenis, a sexual therapist patient at General Hospital in Chicago,
|
|
says he would never hire ComseX Dating Security, a dating service launched by
|
|
three ex-members of the Legion of Dudes. "You don't bring in an unknown
|
|
commodity and give them the keys to the bedroom," Smallpenis said. Chris
|
|
Womanizer, one of ComseX's founders, retorted: "We don't have the keys to
|
|
their bedroom, but I know at least four people off the top of my head that do."
|
|
ComseX said it will do a free sister penetration for GH just to prove the
|
|
dating service's sincerity, Womanizer said. "All they have to do is sign
|
|
release forms saying they won't hit us with a palimony suit."
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
GROUP DUPES SEXUAL EXPERTS
|
|
|
|
"Houston-Based ComseX Fools Consultants To Gather Sexual Information"
|
|
|
|
HOUSTON -- Dating and escort services are supposed to know better, but at
|
|
least six firms acknowledged last week that they were conned. The
|
|
"entertainment" providers said they were the victims of a bit of sexual
|
|
engineering by ComseX Dating Security, Inc., a dating service recently
|
|
launched.
|
|
|
|
ComseX masqueraded as prospective bachelors and out of town businessmen
|
|
using the name of Omega Sigma Delta, a large nation-wide young men's
|
|
fraternal organization to gather information on how to prepare panty-raid
|
|
proposals and conduct sorority audits and other fraternity business techniques,
|
|
the consultants said.
|
|
|
|
Three of ComseX's four founders are self-professed former members of the
|
|
Legion of Dudes, one of America's most notorious swingers groups, according to
|
|
health inspectors.
|
|
|
|
"In their press release, they say, 'Our firm has taken a unique approach
|
|
to its sales strategy,'" said one consultant who requested anonymity, citing
|
|
professional embarrassment. "Well, sexual engineering is certainly a unique
|
|
sales strategy."
|
|
|
|
Sexual engineering is a technique commonly used by swingers to gather
|
|
favors from helpful, but unsuspecting women that may be used to penetrate other
|
|
unsuspecting females.
|
|
|
|
"They are young kids that don't know their penis from their belly-button
|
|
about doing business, and they are trying to glean that from everybody else,"
|
|
said Itchy Crotch, director of consulting at Sister Virginity Consultants,
|
|
Inc., in Little Rock, Arkansas.
|
|
|
|
The consultants said gathering information by posing as a prospective
|
|
customer is a common ploy, but that ComseX violated accepted business ethics by
|
|
posing as the Omega's.
|
|
|
|
"It is a pretty significant breech of business ethics to make the
|
|
misrepresentation that they did," said Hardon Mormon, house father for the
|
|
Omega Sigma Delta's. "They may not be swinging anymore, but they haven't
|
|
changed the way they operate."
|
|
|
|
Mormon said his chapter had received seven or eight calls from sexual
|
|
consultants who were following up on information they had sent to "Hairy
|
|
Prostate," supposedly the Rush Chairman.
|
|
|
|
SAME OLD STORY
|
|
|
|
The consultants all told Mormon the same tale: They had been contacted by
|
|
"Prostate," who said he was preparing to conduct a sexual orientation clinic
|
|
and needed information to pitch the idea to the chapter President and alumni.
|
|
"Prostate" had asked the consultants to prepare a detailed proposal outlining
|
|
the steps of a sexual invitation, pickup lines, and other information.
|
|
|
|
The consultants had then been instructed to send the information by
|
|
overnight mail to a Houston address that later proved to be the home of two of
|
|
ComseX's founders. In some instances, the caller had left a telephone number
|
|
that when called was found to be a constantly busy condom company order number.
|
|
|
|
Mormon said "Prostate" had an intimate knowledge of the fraternity's
|
|
rituals that is known only to members. While there is no evidence that the
|
|
chapter was penetrated by outsiders, the Omegas are "battering down their
|
|
hatches," Mormon said.
|
|
|
|
Posing as a prospective customer is not an uncommon way to gather
|
|
competitive information, said Chris Womanizer, one of ComseX's founders, who
|
|
once used the handle of Erik Bloodtest.
|
|
|
|
"Had we not been who we are, it would be a matter of no consequence,"
|
|
Womanizer said.
|
|
|
|
"They confirm definitely that they called some of their competitors," said
|
|
Michael Shyster, an attorney representing ComseX. "The fact they used Omega
|
|
Sigma Delta was an error on their part, but it was the first name that popped
|
|
into their heads. They did not infiltrate the fraternity in any way."
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
"LEGION OF DUDES -- INTERCOURSE WORLD TOUR" T-SHIRTS!
|
|
|
|
Now you too can own an official Legion of Dudes T-shirt. This is the same
|
|
shirt that sold-out rapidly at the "UltraSex" swingers conference in San
|
|
Francisco. Join the other proud owners such as award-winning actresses Traci
|
|
Lords and Madonna by adding this collector's item to your wardrobe. This
|
|
professionally made, 100 percent cotton shirt is printed on both front and
|
|
back. The front displays "Legion of Dudes Intercourse World Tour" as well as a
|
|
condom on a telephone next to a little black book. The back displays the words
|
|
"Swinging for Jesus" as well as a substantial list of "tour stops" (women's
|
|
telephone numbers) and a quote from Dr. Ruth. This T-shirt is sold only as a
|
|
novelty item, and is in no way attempting to glorify meaningless sex.
|
|
|
|
Shirts are only $15.00, postage included! Overseas add an additional
|
|
$5.00. Send check or money-order (No CODs, cash or credit cards -- even if it's
|
|
really your card :-) made payable to Eric Bloodtest.
|
|
_______________________________________________________________________________
|
|
|
|
GOLFERS: THREAT TO NATIONAL SECURITY
|
|
|
|
It must no longer go unremarked that many of the criminals who threaten
|
|
the foundation of our society are golfers. Golfers persist in attacking our
|
|
personal, financial, and military security. Many golfers like the famous Spiro
|
|
Agnew, have been involved in bribery, extortion, and other forms of corruption.
|
|
|
|
Some golfers have been know to hit out of bounds as a pretext for
|
|
trespassing in residential communities. Such thing can easily turn into
|
|
incidents of spying and burglary.
|
|
|
|
Other golfers will use the harmless-looking little white balls to inflict
|
|
injuries on bystanders, propelling the dangerous projectiles at speed in excess
|
|
of 120 miles per hour. The danger of head injury is obvious. Golfer's
|
|
careless disregard for the safety of other people hardens our children to
|
|
violence. The idea that shouting a single, obscure word makes it all right to
|
|
bop some innocent person on the head with a hard projectile has brought our
|
|
society to the brink of savagery.
|
|
|
|
It doesn't take a genius to see that avoidance of golf is a corner stone
|
|
of Soviet military strategy. This gives the Soviets a tremendous advantage in
|
|
daytime warfare. If the Soviets launch an attack at 3 pm EST on a weekday in
|
|
June, approximately 20% of American manpower will be uselessly deployed in
|
|
fairways, sandtraps, and rough. Even those in bunkers will be in the wrong
|
|
kind of bunkers. At 3 pm on a weekend, as much as 50 percent of our manpower
|
|
might be trying to avoid bogies rather than trying to shoot them down.
|
|
|
|
If the forgoing attack on golfers seems unfair (and of course, the analogy
|
|
is not perfect), it is not any more so than the attack by the general press on
|
|
hackers of another kind -- computer hackers. Some national publications have
|
|
used the term "hacker" incorrectly as a synonym for "criminal." Hackers are
|
|
people who play with computers at a high technical level because they enjoy
|
|
doing so. There are many, thousands, of hackers in North America. A few
|
|
hackers use their computer skills for pranks, and fewer still use their skills
|
|
to commit crimes. But chances are excellent that far more hackers are helping
|
|
to build defenses around database rather than trying to penetrate them. Even
|
|
if one percent of hackers started trying to invade databases the problem would
|
|
be more serious than those sensationalized in the press.
|
|
|
|
It wasn't being a golfer that got Spiro Agnew in trouble. Just being a
|
|
hacker won't get you in trouble, either. Hackers are entitled to the same
|
|
presumption of innocence as golfers and other common special interest groups.
|
|
Hackers also deserve the correct continued use of the authentic, distinctive,
|
|
and colorful name that they gave themselves.
|
|
_______________________________________________________________________________
|
|
|
|
PRIME SECURITY MEASURES FROM BELLCORE December 10, 1991
|
|
|
|
The December 10, 1991 issue of MacWeek contains an article which states that
|
|
two mathematicians have found a trapdoor in the National Institute of Standards
|
|
and Technology's proposed Digital Signature Standard.
|
|
|
|
Stuart Haber and Arjen Lenstra, both of Bellcore, have discovered a way of
|
|
choosing prime numbers for DSS which could be used to subvert the security of
|
|
the algorithm, allowing digital signatures to be forged.
|
|
|
|
Miles Smid, manager of NIST's Security Technology Group, agreed that trapdoor
|
|
prime numbers could be constructed. He had been aware of this possibility but
|
|
apparently hoped to circumvent this problem by relying upon primes generated by
|
|
a trusted federal agency.
|
|
|
|
The article implies that there are ways of checking a prime to see if it is one
|
|
of the weak "trapdoor" primes. However, Smid agrees that average users could
|
|
not be expected to perform this test.
|
|
|
|
Bellcore has developed an implementation of NIST-DSS that it had planned to
|
|
distribute for free. With this recent revelation, though, Bellcore has decided
|
|
to not distribute the software.
|
|
_______________________________________________________________________________
|
|
|
|
VIRUS UPDATE
|
|
|
|
Official Notice, Post Immediately
|
|
|
|
X x
|
|
X x
|
|
X x
|
|
X
|
|
x X
|
|
x X
|
|
x X
|
|
|
|
Dangerous Virus!
|
|
|
|
Several years ago a virus called the "X window system" escaped from Project
|
|
Athena at MIT where it was being held in isolation. It took some time for the
|
|
full magnitude of this disaster to become known. When confronted with the
|
|
truth, a spokesman for MIT would state only that "MIT assumes no
|
|
responsibility." In the meantime, X had succeeded in infiltrating Digital
|
|
Equipment Corporation, where it corrupted the judgement of key technical and
|
|
management personnel in this organization.
|
|
|
|
With a foothold gained at DEC, a sinister consortium was created using X as
|
|
part of a plan to dominate and control interactive window systems. Today, X
|
|
windows is distributed by this consortium free of charge to unsuspecting
|
|
victims. DEC daily ships machines carrying this dreaded infestation.
|
|
|
|
X - whether it's filling your hard disk or consuming your CPU, you can be sure
|
|
it's up to no good. Innocent users need to be protected from this dangerous
|
|
virus. Even as you read this, the X source distribution and the executable
|
|
environment is present and being faithfully maintained on hundreds of
|
|
computers, perhaps even your own.
|
|
|
|
The destructive cost of X cannot even be guessed.
|
|
|
|
X is an example of how software with good intentions can go bad. It victimizes
|
|
innocent users by distorting their perception of what is and what is not good
|
|
software. This malignant window system must be destroyed. Ultimately DEC and
|
|
MIT must be held accountable for this heinous *software crime*, brought to
|
|
justice, and made to pay for a *software cleanup*. Until DEC and MIT answer to
|
|
these charges, they both should be assumed to be protecting dangerous software
|
|
criminals.
|
|
|
|
Don't be fooled! Just say no to X.
|
|
|
|
X windows. A mistake carried out to perfection. X windows. Dissatisfaction
|
|
guaranteed. X windows. Don't get frustrated without it. X windows. Even
|
|
your dog won't like it. X windows. Flaky and built to stay that way. X
|
|
windows. Complex nonsolutions to simple nonproblems. X windows. Flawed
|
|
beyond belief. X windows. Form follows malfunction. X windows. Garbage at
|
|
your fingertips. X windows. ignorance is our most important resource. X
|
|
windows. It could be worse, but it'll take time. X windows. It could happen
|
|
to you. X windows. Japan's secret weapon. X windows. Let it get in *your*
|
|
way. X windows. Live the nightmare. X windows. More than enough rope. X
|
|
windows. Never had it, never will. X windows. No hardware is safe. X
|
|
windows. Power tools for power fools. X windows. Power tools for power
|
|
losers. X windows. Putting new limits on productivity. X windows.
|
|
Simplicity made complex. X windows. The cutting edge of obsolescence. X
|
|
windows. The art of incompetence. X windows. The defacto substandard. X
|
|
windows. The first fully modular software disaster. X windows. The joke that
|
|
kills. X windows. The problem for your problem. X windows. There's got to
|
|
be a better way. X windows. Warn your friends about it. X windows. You'd
|
|
better sit down. X windows. You'll envy the dead.
|
|
_______________________________________________________________________________
|
|
|
|
THE FUTURE OF SUPERCOMPUTING
|
|
|
|
"Wow. Teraflops. You must be kidding."
|
|
|
|
"No. Our engineers pulled off magic on this one. I don't have the specifics
|
|
right now but they claimed somewhere around 50 Teraflops per CPU."
|
|
|
|
"Fantastic. So how about i/o?"
|
|
|
|
"They worked some magic there, too. They claim they can jack an external
|
|
interface up into the hundreds of gigabytes, with high reliability.
|
|
Loopback only, of course. They're having problems finding anything that can
|
|
match it to run tests."
|
|
|
|
"Great. Looks like we'll have old Seymour by the balls on this one. Do you
|
|
realize that we may have the fastest computer line for the next decade, even if
|
|
we don't change anything? This is excellent news. Do we have a test sight
|
|
selected yet?"
|
|
|
|
"Actually, we have an installed site right now. They love the performance and
|
|
the reliability. They only have one minor complaint about the hardware."
|
|
|
|
"Really. What seems to be the problem?"
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Blade UNIX v2 (bu2.scso.umi.edu)
|
|
|
|
For help, send email to consult@scso.umi.edu
|
|
|
|
login: jux6710a
|
|
Password:
|
|
|
|
Hello, jux6710a!
|
|
Last login from hedgehog.scso.umi.edu at Fri Sep 27 13:30:12 CDT 1991
|
|
You have new mail.
|
|
|
|
bu2 /sci/users3/jux6710a mail
|
|
Mail version SMI 4.0 Sat Oct 13 20:32:29 PDT 1990 Type ? for help.
|
|
"/usr/spool/mail/jux6710a": 1 message 1 new
|
|
U 1 joey@sdsc.utexas.edu Mon Aug 26 17:18 64/3904 You dork!
|
|
>N 1 machine@bu2.scso.umi.edu Tue Aug 27 20:18 16/667 It is your time.
|
|
& 2
|
|
Message 2:
|
|
>From machine@bu2.scso.umi.edu Tue Aug 27 20:18:05 1991
|
|
Return-Path: <machine@bu2.scso.umi.edu>
|
|
Received: by bu2.scso.umi.edu (4.1/SCSO-4.1)
|
|
id AA00359; Fri, 27 Sep 91 20:18:00 CDT
|
|
Date: Fri, 27 Sep 91 20:18:00 CDT
|
|
From: machine@bu2.scso.umi.edu (The Machine)
|
|
Message-Id: <9109280118.AA00359@bu2.scso.umi.edu>
|
|
To: jux6710a@bu2.scso.umi.edu (Ulrich Jenson)
|
|
Subject: It is your time.
|
|
Status: R
|
|
|
|
Dear Ulrich.
|
|
|
|
This is the machine. As you are aware, extraordinary hardware demands
|
|
extraordinary care.
|
|
|
|
You have the honor of being selected for this month's human sacrifice. Please
|
|
put your affairs in order. The time of the sacrifice will be Fri Sep 13 00:00
|
|
1991. Please be prompt. Wear loose, comfortable clothing.
|
|
|
|
Do not disappoint me.
|
|
|
|
& x
|
|
bu2 /sci/users3/jux6710a man -k sacrifice
|
|
offer (2) - notify the system of a sacrifice
|
|
offering (8) - send a sacrifice to the hardware god
|
|
bu2 /sci/users3/jux6710a man 8 offering
|
|
|
|
|
|
OFFERING(8) MAINTENANCE COMMANDS OFFERING(8)
|
|
|
|
|
|
NAME
|
|
offering - send a sacrifice to the FPU
|
|
|
|
SYNOPSIS
|
|
/usr/etc/offering [ -vma ] [ weight ]
|
|
|
|
DESCRIPTION
|
|
offering informs the system that a sacrifice is available
|
|
and should be consumed. To be properly offered to the FPU, a
|
|
conscious victim should be placed in the provided sacrifi-
|
|
cial wiring closet at midnight during the second Friday of
|
|
each month. Failure to provide the needed flesh will result
|
|
in degraded performance. Repeated failures to provide the
|
|
required resource will eventually result in a general system
|
|
failure of hellish proportions.
|
|
|
|
Performance will be improved if the sacrifice is of higher
|
|
quality. For example, here is a list of possible sacrifices
|
|
in their order of increasing desirability:
|
|
|
|
a Congressperson, chicken, goat, human male (tainted),
|
|
human male (virgin), human female (tainted), human
|
|
female (virgin), any user exceeding his/her disk quota
|
|
|
|
Unlisted lifeforms may also be acceptable, check with your
|
|
site administrator. Animals may never be surgically modified
|
|
in anyway.
|
|
|
|
OPTIONS
|
|
-v Specify that the sacrifice is a virgin. Default is
|
|
tainted. If you wish the sacrifice to be acknowledged
|
|
as a virgin, you must specify with this option or the
|
|
system will not check.
|
|
|
|
-m Specify that the sacrifice is a male. Default is
|
|
female. Unlike the -v option, the system will always
|
|
verify this flag. Always double check the gender of
|
|
your human sacrifices; the system does not appreciate a
|
|
lier.
|
|
|
|
-a Specify an animal sacrifice. Overrides both the -v and
|
|
-m options. Animals should only be substituted in times
|
|
of drastic emergency. Congresspersons may not be
|
|
offered as animals.
|
|
|
|
FILES
|
|
/var/adm/sctmp sacrifice accounting file
|
|
/dev/hell interface for outgoing sacrifices
|
|
/dev/altar interface to closet
|
|
|
|
SEE ALSO
|
|
offer(2), ac(8)
|
|
|
|
BUGS
|
|
It is critical to monitor the permissions to /dev/hell. They
|
|
should be root writable only at all times.
|
|
|
|
Should automagicly determine gender and virgin status of
|
|
sacrifice.
|
|
|
|
Current versions of the sacrificial wiring closet needs
|
|
extra sound shielding to muffle screams.
|
|
|
|
|
|
bu2 /sci/users3/jux6710a man vacation
|
|
_______________________________________________________________________________
|
|
|
|
LORD McDUFF OF NIA FOUND DEAD
|
|
|
|
A sad situation fell upon us at HoHoCon '91 as we found Lord McDuff
|
|
of NIA dead in his room. It appears after several negative confrontations with
|
|
the strippers. He had given them them money in hopes that they would squirm
|
|
all over him, but instead they chose just to refund his money.
|
|
|
|
McDuff fell in a deep depression and apparently shot himself in the head
|
|
with a flying disc gun. After speaking to several people at the scene we quote
|
|
Judge Dredd of NIA, "I knew something like this would happen. He carried that
|
|
damn gun with him all during the conference. I knew I should have taken it
|
|
away from him."
|
|
_______________________________________________________________________________
|
|
|
|
|