Professional Documents
Culture Documents
".
From: Corporate S..curlty D~e: September 21, 1988
To: Distribution Sft/
subject attachment.
~Cqu\s\t\on
01
soviet S\ gn\1\ cant
tJ\\\\ta r\\'/
western 1'echno\Og,/:
update
2600 (ISSN 0749·3851) is published quarterly by 2600 Enlerprises inc, 7 Strong's
Lane, Setauket, NY 11733. Second class postage permit paid at Setauket, New York,
POSTMASTER: Send address changes to
26()(), P.O. Box 752, Middle Island, NY 11953-0752,
REMEMBER....
Why should we remember Abbie fought the Vietnam War, got arrest
Hoffman? What relationship did he ed so many times that nobody could
have with 2600? really keep track, and wound up
Abbie was, of course, the founder pissing off Richard Nixon to no end.
of the Yippies, and the founder of He became a fugitive from the law
YIPL, which turned into TAP. TAP after being accused of dealing drugs,
was the first publication to look at a charge he vehemently denied to
technology through hacker eyes. It's his closest friends right up to the
doubtful 2600 would exist in its pre end. And even under a disguise,
sent form were it not for the inspira Abbie accomplished a lot under the
tion TAP offered. name of Barry Freed, leading an
But apart from that, Abbie environmental group called Save
Hoffman was, for all intents and The River in upstate New York.
purposes, a hacker of the highest Abbie gained a reputation for
order. No, he didn't go around outsmarting the FBI. It's reported
breaking into computers, although that the FBI gathered more infonna
we know the subject interested him. tion on Abbie Hoffman than on any
Abbie hacked authority, which is one else in their entire history. That's
what a lot of us unwittingly do something to be proud of.
whenever we play with phones and Like a computer hacker, Abbie
computers. Abbie, of course, was Hoffman was thought of as a pest by
much more direct. He stood up to some. His presence was inconve
the ultimate computer system nient and he made people uncom
known as Society. He was relentless fortable because he wasn't afraid to
in his attack on the status quo. He point out the flaws.
(continued on page 45)
Summer 1989 2600 Magazine Page 3
A GUIDE TO
User id? user And on a very few other Primes you can
Password? <not echoed> do a full lOGIN nest, as such:
Invalid user Id or password; please login user password
try again. You might not wish 10 use full-nesting
Login please. capability when other hackers are lurking
ERr about, as they might decide to practice
Well, that sure didn't work. Notice how shoulder surfing (grin).
PRIMOS didn't echo your password to you. If a User 10/password combination
The above example is from a non (hereafter referred to as an 'account') is
PRIME NET Prime. After this bad entry you valid, you will receive the following login
are probably still connected, so you can herald from PRIMOS:
have another go at it. A non-PRIMENET USER (user 87) logged in Sunday, 22
system generally has a high bad-login Jan 8916:15:40.
threshold, so you can make many attempts Welcome to PRIMOS version 21.0.3
per connect. A PRIMENET system on the Copyright (e) 1988, Prime Computer,
other hand is more of a bitch to hack as it Inc.
will disconnect you after the first incorrect Serlaltserial number (company
login. Here's another example (assuming name)
you are hacking a PRIMENET system from Last login Wednesday, 18 Jan 89
the TElENET X.25 network): 23:37:48.
@214XXX 'serial number' and 'company name' will
be replaced by the actual serial number
214 XXX CONNECTED and company name of the company that
PRIMENET 20.0.0 VOID owns the Prime computer site.
login user Just one more small thing I need to
Password? <not echoed> cover about the 'LOGIN' command right
Invalid user id or password; please now, and that is login troubles. Troubles?
try again. You bet'cha. The first trouble occurs when
the account you login to exists and is valid,
214 XXX DISCONNECTED 00 00 but it doesn't have an initial ATTACH point
00:00:00:08 9 7 (in other words, you cIon't seem to have a
As you can see, one chance is all you 'home' directory). This is no fun, since this
gel with a PRIMENET system. A minor account cannot be logged into. Bah. The
note is in order here regarding all the myri other trouble is remote user passwords.
ad of X's in the above example. I have This is definitely no fun. The prompt for
masked the last three digits of the system's such are generally different from one
NUA (Network User Address), for I do not another, as they run both commercial and
wish all you eager PRIMOS hackers to start custom written software to handle this.
banging on my system's front door (grin). I When you come upon a remote password,
have also edited the system's nodename try the User 10 and, if that doesn't work,
from its actual nodename to a more appro then try the system's nodename. If both of
priate one (grin). I will continue to mask all these attempts fail, you can either keep try
system identification from my examples. So ing passwords (brute-force hacking) or you
far you are accustomed to typing in 'LOGIN' can give it up and move on to the next
and pressing RETURN to start logging in. account or system. A popular commercial
On all Primes you can nest the 'LOGIN' front-end security package is "LOGINSEN
command and your User 10 in the same TRY" from Bramalea Software Systems,
line, as is illustrated in the follOWing exam· Inc. "lOGINSENTRY· is an excellent pack·
pie: age, so good luck when you go up against
login user
it. It supports remote passwords, password
Password? <not echoed>
aging, old-password databasing etc.
7'UJm
~~, - ~
~ _PHONE ~k>; . . -;"l~
-"
POLICE
The reason for internal and external that you are sale. The first of these actions
commands is twofold. The PRIMOS files is to turn off all COMO files. COMO is the
(usually located in the DOS directory) take abbreviated form of the COMOUTPUT
up a tot of memory. Not all Prime systems command. COMOUTPUT turns on a buffer
have whopping loads of memory, so Prime much like your terminal program's copy
made sure that PRIMOS was able to be buffer. From the time a COMO file is turned
executed flawlessly (memory constraint on everything you type and everything PRI
wise) on all system models. Only the most MOS says to you will be logged to a SAM
important commands were built inside of (sequential access method) file (a lexl file).
PRIMOS. Less vital (yet still vastly impor To turn off a COMO file you will type this al
tant) commands were made to be external the system prompt:
commands. Secondly, different sites have OK, como-e
different needs. Prime recognized this need The "-E" argument means "END" and
and their command structure allows for the will end any COMO processes. If you can't
easy customizing of PRIMOS commands see what you are typing then perhaps the
(adding, changing, removing, creating). Irs initiating COMO command turned off ali ter
an ideal setup, really. minal output. You can turn it back on by
Making Your Stay Last Longer typing:
Now that you have logged in, there are OK, como -tty
a few things that you should do immediate To save time, nest the arguments as
ly to ensure a nice long visit. You should such:
make this procedure routine and do it every OK, como -e -tty
time you login. The next thing you should do IS make
Once logged in you will see the login sure that you are the only person using the
herald and then, assuming the account is account you logged in to (we don't want
not captive (more on captive accounts any irate users on our hands. now do we?).
later), get the system prompt (generally an Do this by typing:
·OK:). You are now using PRIMOS and OK, stat-me
the prompt signifies that you are at the PRI Assuming you are logged in as user
MOS command line. Most Primes use the PRIME, PRIMOS will output the following
standard "OK: prompt, but some do not.
For this series, I shall assume that your Une
Prime uses the "OK: prompt. Now, type User No oct( dec) Devices
some nonsensical command. Try arl. Here PRIME 87 125 (85) cUSER05>
is what should happen: The "User" column displays your User
OK, arf 10. The "No· column lists your user num
Not found. ARF (std$cp) ber. The ·Une" column indicates the AMLC
ER! line you are using (the physical modem
Notice that when you enter an invalid line) in both octal and decimal notation. The
command you get a new prompt. On all "Devices· column displays the current disk
standard systems, it is "ERI". Again, this partition that you are attached to. In this
prompt can be changed and, throughout case, we are attached to the <USER05>
this series, I shall assume that it is set to disk partition.
"ER!". If you lind that there is more than one of
NOTE. std$cp means Standard you logged in. then you should make a
Command Processor. Sometimes instead hasty exit and logout There is a correct
of std$cp you will get a (processcommand) way to logout and an incorrect way to
error. They are the same thing, just differ logout. The correct way to logout is listed
ent names for different revision levels. below. Never hang up on a Prime Always
Now that you are in, you are going to logout in the illustrated fashion.
want to perform a few actions to make sure OK, rsterm
Line number is the physical line's identi mands, but they are not too Important at
fication name. Line use indicates how the the present moment. I'll let you learn about
line is assigned (free. assigned, login). Line them on your own via Prime's excellent
speed indicates the speed of the physical online help facility. To use the PRIMOS
line. Line protocol indicates the line factor online HELP facility, just type HELP. Or, if
(either TTY or TIVNOP). TTYNOP means you know what you need help with, type
TTY not operational. User number indicates HELP commandname. Really quite simple
the user number associated with the AMLC User-to-User Communication
line. User name is the actual name of any It is always useful to know how to send
user/phantom using that line. I am not too and receive messages when on a computer
sure about the Auto speed enabled column. system, whether you are communicating
LIST_COMM_CONTROLLERS displays with other hackers online, or attempting to
information on aU the communication con social engineer a legitimate user or system
trollers present in a system, excluding the operator. Any user on a Prime may send or
Prime Node Controller. Information is given receive messages, Messages may be sent
for each controller and includes the con from any user terminal to any other user
trolier name, ils type, ils device address, terminal, any user terminal to the system
the number of synchronous lines attached, console, the system console to all user ter
and the number of asynchronous lines minals, the system console to any specific
attached. user terminal, or the system console to any
L1ST_CONFIG displays the current sys system console on another node of the net
tem configuration. work (PRIMENET-equipped systems only).
L1ST_LAN_NODES displays all nodes Sending messages to users on a Prime
on a Prime LAN300 system. Be aware that is very easy. The message command for
this external command works only with mat is as follows:
Prime's LAN300 system (so far as my MESSAGE [username] [-NOW]
experience goes). [-ON nodename]
LIST_SYNC displays all synchronous [-usernumber]
lines on a Prime system. The abbreviation for MESSAGE is M.
LIST_PROCESS displays the environ So instead of typing MESSAGE all the
ment of a specified user process. The time, you can type M instead
user's process identity is displayed, togeth Notice [usernamej and [-usernumber].
er with details of its environment which When sending messages to a user you
include: attach points; abbreviation file; need only specify one or the other. If you
active COMI and COMO files; connect, were to send a message to user SYSTEM
CPU and 110 times and limits; the user's you would type:
ACL groups; and all active remote identi OK, m system
ties. That would enable you to send a mes
There are several more LlST_ com sage to user SYSTEM. Be aware that the
TABLE A
It has come to my attention that a few boxers are having difficulties with
their toy. in that. some [very few) of the 1.5 million pay phones (not in
cluding private) are not reg!stering your -beeps' as a deposited coin. The
culprit is the magnet within the mouthpiece of the pay phone your using.
When one tries to use the red box the magnet in the mouthpiece interferes
with the speaker (which is also a magnet) by absorbing the sound, So. if you
thought that your box was on the blink or the phone company has imple
mented some new technique to stop red >boxing. don't worry.
Try holding the red box speaker a 1/2" to an inch away from the mouth
piece as you play your lune (if quarters don't work try dimes or nickelsl. al
though this may cause the already curious guy in the neighboring booth to
wonder what's gOing on. it should work. If not. find another pay phone or
try a full proof radical method and rip out the handset. so repair service
can put a new one in. This should work lOO"k of the time and it keeps peo
ple employed I
Remember,
message you send will be displayed to ALL receive state of all users with the name of
users logged in under the User io of SYS "usemame"
TEM. In the case that there are more than Message -STATus usernumber: Lists
1 user with the same User 10 logged in at receive state of all users with the number of
the same time, you might want to use the [ 'usemumber"
usernumberJ argument It works like this: Me. .age -STATus ME: Lists the
OK, m·2 receive state of your own terminal/process.
That would send a message to the user NOTE: Capital letters in the above
with the user number of 2. The message forms of the message status commands
you send in this case would only be sent to indicate the legal PRIMOS abbreviations
the user with the user number of 2. Use lor the commands.
either the user name or the user number, When first initiating a session in which
but not both, for using both will cause an you fool you might be doing some user-to
error to be displayed by PRIMOS. user communication you should issue the
If you omit the [username] and [ "Message -STATus· command. This will
usemumber] arguments then the message display the message receive state of all
will be sent to the system console. Be care users presently online. Here is an example
ful about this! of the output you might receive'
The -NOW argument is .optional. If it is OK, m -stat
specified then the message wilt be sent to
the user immediately. Otherwise the mes User No State
sage will be put into a queue and sent only SYSTEM 1 Accept
when the target user has returned to PRI PRIME 13 Defer
MOS command level. PRIMOS 24 Accept
The -ON argument need only be speci HACKER 37 Reject
fied if you wish to send a message to a RAGE 42 Accept
user that is logged in on a remote site. This In the above example you notice that
argument will not be required at all if the there are five processes logged in. one of
Prime you are on is not equipped with them being the physical system console,
either the PRIMENET or the LAN300 net The "No" column denotes the user's user
working software packages (by Prime number, while the "State" denotes their
Computer, Inc., of course). In order to use message receive state.
this argument you need to know the remote Notice how there are three message
system's nodename. An example of send receive states listed, accept, defer, and
ing a message to a remote system user is: reject. In theory, these states are defined
OK, m hacker -on sys.c as such:
This would send a message to User 10 ACCEPT: Enables reception of all mes
"HACKER" on the networked Prime system sages
called "SYS.C". Remember, you need to DEFER: Inhibits immediate messages
know the correct nodename of the remote REJECT: Inhibits a/l messages
. system. If you are set to accept, all messages
Just like in real-life situations (people-to sent to you will be displayed on your termi
people), PRIMOS users mayor may not nal immediately. In defer mode, messages
wish to speak to you. So before sending a will not appear until what you are doing is
message, you should make sure that the done (i.e., a message will not appear while
user you wish to communicate with is in the middle of a currently executing com·
accepting messages. There are several mand). In reject mode no messages will be
ways to obtain this information. received by you.
Message -STATus: Lists receive state Setting a receive state is useful when
of ALL users you do not wish to be disturbed. It is espe
Message -STATus username: Lists cially useful to use receive states whon
using any of the PRIMOS editors or utilities. on Prime networking. There will be a host
Sending messages while in reject mode of information regarding the advanced
and sending immediate messages while in snooping tactics used in order to snoop
defer mode is not permitted as the user you about PR1MENET-based systems and their
are attempting to communicate with will not respectille Token-RinglLAN300 networks,
be able to respond. Internal Security
To set your message receive state, sim Before you can really start exploring
ply type: your new Prime, you need to understand
Message -state how PRIMOS inlernal security is imple
'-slate' is either accept, defer, or reject. mented and how to get around it As you
Quite simple. have seen from the section on basic PRI
You are advised to avoid sending mes MOS commands, PRIMOS utilizes access
sages to the system console as that could conlrOl lists (ACL's). Getting around ACL's
be potentially hazardous to your stay on a is almost an impossibility,
Prime computer system. Pestering legiti Also you will occasionally run into pass
male users is also not desired, Use your worded directories, To attach to a pass
common sense. worded directory, you would type
Inlernal Snooping Tactics something similar to this:
Once inside a Prime, your paths are OK, 8 'dlrn8me password'
many. Some lead to glory, others 10 dele Nolice how you followed the directory
tion of your account (gulp). To aid you in name with the password and enclosed the
choosing the correct paths, you must snoop entire deal with quotes, If you were going to
about your newfound host. By doing this, attach to a passworded sub-UFO you might
you can leam many things, some of which type something like this:
include: who owns the Prime and what they OK, a 'prlmenet*>info>source
are doing on iI, more accounts on the sys password'
tem, or more accounts on different Prime Passworded directories can be a pain in
systems. the ass, but, unlike ACL's, they can be got
There is plenty for you to do, I strongly ten around. Look inside CPL programs (by
urge that you make the snooping procedure SUSTing them) for occurrences of
a routine and that you do it immediately ATTACH statements enclosed in single
upon obtaining an account, as you never quotes. Thars about all the internal security
know how long it might last. in PRIMOS up to the current revision level
Finding out who owns the Prime and (22.0.0).
what they do on it is always rewarding. The ExplOring the Vast Reaches
best systems I have been on were Prime ofa Prime
Computer, Inc, development systems, 3rd When looking around a Prime, always
party development systems, and Primes start in your initial attach UFO. Check out
belonging to certain telephone companies ellery file in it and every file in sub-UFO's
(which shall, of course, remain nameless). under it. When finished there, cruise on up
Oepending upon who owns the host, you to MFO 0 and start down-attaching to the
may obtain a bit more information that you many UFO's there and look at everything.
had expected. SLIST all SAM files, read all mail, look al
More accounts on the system is what everything. Leave no UFO un-attached to!
you are really afler, however. Many users Lealie no file un-read,
are exceedingly lax. A brief inspection of all Understandably it will take a good few
mail in the queue can sometimes yield hours (sometimes as many as 12) to fully
accounts, as can individual programs investigate a Prime, but believe me, it is
(source code) and documents. worth it. Capture ellery thing that looks valu
As for more accounts on different sys able to your buffer. When done looking, fol
tems, I am saving that for the future section low up everything you captured
__-_._--
..
737 Rahway 622
Su.mmer /989
Madison 893
2600 Magazine
Btoom! leld
Page 21
SCANNING
necting the computer from the since the pattern can be tracked. If
color TV, the disk drive, and your pattern is tracked, the system
modem. The screws must have might anticipate the next number
confused him. He ended up rip you will try, and if it is a valid
ping apart the connections, no account, turn it off for the time you
doubt damaging pins and wires. try it only. They will also print out a
The Sprint executive then put the card with your phone number. In
equipment into garbage-type bags no way am I implying or suggest
and hauled it to their dark blue ing that it is proper to commit any
Cadi"acs. On the way, the execu type of fraud. If you decide, how
tive dropped the disk drive onto ever, to commit fraud, heed my
the ground. Mike told the Sprint warnings. Now Mikey has some
fellow if he damaged it he would things to say:
pay for it. What was his reply? "Don't mess with Sprint'" Wise
"See ya in court, kid!" Laughter folwords indeed.
lowed. "To Phreak and be safe, keep
They then took Mike to the your disks and notebook out of
police station and booked him your room and well hidden some
under a lower class felony for ille where else. They will only look in
gal access to lines of a telephone your room or near the computer."
service. Mike hopes it will be They charged Mike with a
downgraded to a misdemeanor, felony. A felony! They don't charge
and it may be since they have rapists or muggers with felonies.
such little evidence, except for his Why did they take his TV and tele
TV, his computer, and his game phone away? What did they
disks. They took Mike home at that expect to find hidden in it? Hitler's
point. The next day in school, brain? Why did they disconnect his
Mike's popularity soared as people phone for two days? Doesn't it
learned he was a felon. make you feel secure with such
Mike and I want to leave you competent law enforcement offi
with a bit of advice. First of all, cials handling things?
don't hack your codes at night. I will keep in touch with Mike
That is when the fewest people and let everyone know if anything
use the network. Instead, do it else turns up.
between 7 am and 10 pm. Also,
use multiple target "dummy" num CHINESE SNITCH NUMBERS
bers. Don't hack the codes To dial from U.S., preface with 011·86-1.
• I
I
1
I
......
I I
11111
I I
II
I II I
liefa d. .'trdiOi
OIl • ifU COltUttf'
'1IIon)"),
ltv.lintCS1,
S.I.toUn},
I
•• I I I I I I 1.,1..., .. ly tM hlJI.. (·3 (mlru , _ _ ,
-.-.-- . .. I
I I I I
II
I I
I I
1"'11
I I-
, I
I II
I
•
I
I
I
I
~illllf1Uta• •
•• til. wl 4!Mit 01
t .•. SoHlUn JIh,/Ai•••
•
St'_C,IUlI,
h'.lIJI,t 4 11 J
St'J,H1I1,
•• I I I' "I,
,
"I,
, ',':U"C'I
St'.C.HII'!
I I II II
'"
Pvt.lIJl.(·. • t • I
mill ..
~""'" ",1 '"
-.-.
j ht. tUtl frOiltU hf,.r'SILOOI, 141.1 1t'_C'HlII,
1tv.1Ift'U),
-. " . . . ta tt_"I, ,,"Ua, III tIlCl•• ia .It.., .. _1 frlft' hl.lhtC- I 1 fI III II II a A "I
..... ...itt'.
-
-- • til 111ft' etM art 1M ."aiUH lfitHv:t VflU.. cOUllI .1 till S.I..ttHICl,
'" lI.."
St.:,.11I1I1
", lI.,C' I I
, "! !
I !
mlSSSS",
S",
ht UN(f 1 I S'lt
ltff .,,' Stt:c.tnOt
- •
.
-. .- •
-- .
r••, "fUn.,
1m itUi'lft ...
&I. hIlt IV M.
Vid.,-il ...
"'JIMC"
....lI..UlI
St'_Colllllll
P.'.lhlff".t • ..", In
". 'h,t..,.tnfl
'fI,l~r'},
SilSSSSS' I,
,"Uftt. C"tdJtfll"~ I
,UC"I 1MS I .... OItti fint . . litH loot; '" ,r.t CI" .. t UMUI.t1lII tu' f d nilla~I.,
~......i.","., if th H(lIIIt u, aln." .,'" illfKin:, It will "tltlt
.... W. l' tlle
h tow. tAfectill.
Ii•• ,recMurI dl,. shUt "1 ""I 01 It, "'UM ,U' ~~ • hoI... ~.'" 011 _"HI U 31, ,_ i",d" or ....
_. S,nH t lIAS.
~ .....un 1 a..c.~nfl..... t au._...~lotll.Cot, ltul.JopaJ:-,
t._
I' "Ur..CluJ.
,rOURU Ckd}lnt)"UI'vtf t ..t 100110) is
'"' I Shh,U•• 1Jl1 - Ntl. fl,.:t lin. 0' lOl".COft.
lnt tal"." ... ,f Hnt liM lit lotII.CtJI.
,--------_.------------ i
""I._...n.,i.,laJU" ·UIIII.ctM·lr
-- lin' IIICh,.... II",
1ii,1I lO1" t_
- 1\, followi .. MeIUI tn nnOld lOl"I' mtt i.,t Jr. . . . . . . . It
tlett{lottlt,
leti. t fU.)""
... ill
l41~ 1 fU')"'l
It(l,ti.
Wttttlw,lI}
~~ Error Un"" I
lot0fl2 I fU')"'1
- ~tfol patH' itt. if itO
SIlJ I 'iI•• T""
.....,:- h'-I lOlll.CtI' fu.h. nit ,_icat"
T..,: Shlll,fI •• ." -.. Ur,t tl" wort "1(8"_
hlt~til'lt I Sbin.n....'.
tnt 1 IntqtfJ
lit I hot'''l
-.. IIfIIfttt.,
110ft I, first ISttltH ......rlie-II" 1((otlIt, \"'11 pICKHan
~* it uU" h cdtr t. Cfttt. I "" lOlIW.ttlI. III, olf tOStl.cr. II Mt
-- m.,,,",
-- l1Ih ,t..h Jf«'"'' dran tltt 1('''' •• VT-'M .... ttMM .'"_'''
_. , 'tn,.,I, I....... 1ft,., 1\h h 41,,1,... 1ft" ••• wor••••
~- S.r". : tMM.
-- fbttltH n. h,ttll'l" ,fOCHutt 'tt.)ftilJOftIlJOI it
iltit
-- Stnn t IIIAS.
I..,
.- SU, ,II'
_••,l_.teII ...
I'" )101 I. III.NI
-- Iltl .Ior" win
MJia'tLOIh, '. '" MIIS·'1
IttJht.fHt "lr.U., hill)
"'.U..'l"... I'
"1U11I11ISI;1 SlIIOIfmIIIlIJ.IAI'),
",I.."
I..,
~- "AIJ\IfIJ t.tlndh'... •
-- ... "I It I.. Ilu' K'.....
Oftk'I••• ,
ifrn: Ituu...
J'<Ktftt' ..'Jotot....t It
•• fA U. ,'I<tli.. n...
SElI.IIlltl_
l~it: Ot " " . . . "I<ml..... t.,
'nU.. tI
Ntl.
Itffjtfltt' ,••,
o,.,tlOfOlll.I.JI1',"ta...·)'
"U; .h,",",
... II,
CloHtSII!)1
.ltdlt<lfll;
tlotf(UliDI'r
ne"ll.,Ofttll
,titl
fII''''._.
~. o..tl .til tf,t t. '"
tf tit, untnt
hot .N' 11 .IFlli, t. tN UM • •
.et_' .... 1II.lrt"
~.I.,
"'a, 'Ot. hOI i.. . . . .
-- lUff "'. It: tltt,t.. aM tMhol nhut " lotll.elll. , Itt mt
tu '"to
If".'
0-
-- n "t•••• Iott... )UN .. t~. 'Hilt If -. h .."ltH ..... l_.tfaI!. l\" ulll , ..U.... 'N' Htltl
--1tfnf. I !MS.
-+~ Ittt i '"' It I fl••' .\1(\ ktlt 'liit II• • f eM ""... I(tlllt "".......n•.l.....Cao I •
Nth
,.,,
........ f,., ~w '.I(..
t ..1m ,t....,..1It_"'H••.
..,.t........,
--~:~--.---..-..----..--.------.---..----.-....-.-.---.... --.--..----.
for t I. I ••hlt J",tll -- l ... II.... If. ., " ,,<1,1..10. -- .,..1. I'" l_.1M 1110 to I~" II It • 10 ••" ,11_ ... ...
I..,
""'...lhUII·I... ' ....
MSWff ,-hln,
.... If ..... an.,. ,_
. lI, .ht..,. ""
~
t. UllllCt....
I.'.d"~ Itt "'ltM
..- ,,-centl I.f.dttl t"t If" fwd"'fI •• '~J.
.... 11'
t...t.Il....Z, IIII}II•• ~.IM'I,
... 1""
... t>fttl
'or
1",
I I. 1.. _.l..,I' -'l.., II.... NU" "'IJ,
tl...lt...."1
.. ~ ".01, tl, IOtt l-whllt 'f«....". .nt (ltc' ••U' KC_ lINt
tl .....U._l...._CN!
-- Iff'" , ..n.J.....coo.
"oc.....
.,,1• ~.h
.,..
"'K·hat_ 'HI
- 1ft lllll.tIt t. ,bft ""..atl.... Chec'firsl.Ru. will deCIde if Ihe ,Orl is .Iro"y ,ctivaled ir.
iII...~...J ..'I~t..1 . ltd."
~ Ifi. this o"vunl. II a<c ••pli,hes Ih•• by ,itw.n, Ih. lOSIN.COII fil,•
..'U.I.....tOll ~. It 'lffUr b"dH, t_
c....n ,,1("'
-..- t. ".4,ltt t••uu 'au' I__.111.
Th. lOGIN. ton hIe is • spocid Itle under YMS Ihli CiA be lJltntd
10 Ih. ~UlDEIEC.BAT file in "S·DOS. Uh.. Ih, user hlSl logs In,
v~S .111 fI.euil tho.. DeL iOiI..llio., ,ontlined In LOGIN. COlI.
- All.. 11,1, ",I I. _ . "'" 11.,1.,
A.....' 51gnil i. attached h • n•• lOSIN.(OI! 01 an 1.1"led
··1l1li "HH"••
"count. CltedJirst_Run .ill r.I... i 80~h.n Vilu. based on
""M!i, •• ..,,, 1101110,,' the pre••nce 01 this ... kor •
PC using R.R. Software" JANUS/Ad •• Alhr prell.i,,'! h,ts the h •• Ih•• u,ulib1e IS ,dIe•. rhlS .tll dl'pl'l .......ily
codt vas Ihon ..Vld 10 • YAX and eo.pi Ird .ith DEC Ma. Sev.ral i.n.".1 "'509' long .fIer Ih. '0" hu'pertor..d lis dul",.
THE GALACTIC HACKER PARTY best of TAP, over 100 pages of their
will be held 8/2,3,4 at the Cultural best, $40. Computer crime, over 400
Center in Amsterdam. Look for 260m pages from the best of government
Info: 011-31-20-6001480. publications, prosecutors' guides, doc
2600 MEETINGS. First Friday of the uments, case studies, etc., including
month at the Citicorp Center--from 6 how it's done, $60. Include S3 han
to 8 pm in the Market, 153 E 53rd St., dling per book. Make payment to Tim
NY. Except 8/4 when we'll be in 5., PO Box 2511, Bellingham,
Amsterdam. Special meeting 7/28 in Washington 98227-2511.
London at Covent Garden by the INCARCERATED COMPUTER
London Transport Museum. Come by, TECHNO-DROID would like to hear
drop off articles, ask questions. Call from anyone interested in computer
516-751-2600 for still more info or to technology and its unusual applica
request a meeting in your city. tions. Would like to receive (from
WAN TED: those willing
Technical/oper Do you have something to sell? Are to donate)
ations manual photocopies of
or any technical you looking for something to buy? Or i n t ere s tin g
data on North trade? This Is the place! The 2600 com put (' r
east Electronics Marketplace is free to subscribers! s c hem a tic s,
Corp's TTS Send your ad to: 2600 Marketplace, articles, and
2762R MF & P.O. Box 99, Middle Island, NY 11953. how-to in
Loop Signaling Include your address label. structions for
Display. Will Only people please, no businesses. exotic projects,
gladly pay for etc. Write to:
copying and mailing costs, or reason Robert Joe Jackson, Jr., Memphis U
able price for genuine manual. Does 32875-019, Memphis Federal
anyone know anything about this Correctional Inst., P.O. Box 34330,
machine? Bernie S., 144 W. Eagle Rd., Memphis, TN 38184.
Suite 108, Havertown, PA 19083. WILL TRADE: My knowledge of
FOR SALE: DEC VAXlVMS manuals beating the game of Blackjack for
for VMS 4.2. All manuals are in mint information into hacking and phrcak
condition, some still in the shrink- ing. J. Klein, 2558 Valley View #111,
wrap. This is the best source for VMS Las Vegas, NV 89102.
knowledge anywhere! Contact me for TUNE IN TO "OFF THE HOOK", the
more info. Kurt P., POB 11282, telephone program, Tuesday, 7/25 at
Blacksburg, VA, 24062-1282. 7:30 pm on WBAI New York 99.5FM.
diagram for G.E. TDM-114B-13 data FOI, PSTN, ANAC, are you lost in
set. John B. Riley, 914 N. Cordova St., telephone acronyms? Don't be con
complete set, volumes 1-91, $80. acronyms, only 54. Jay H., 2722
ping - a nuts and bolts guide, $15. The Deadline for Fall Marketplace: 911189.
The 1989 Pirate Radio Directory 6240 KHz and listen for the
by Paul Estev sounds of a howling wolf over a
When it comes to free commu drum beat (no fooling), On
nications, nothing comes close to September 10, you could have
the power of radio. And when it caught "WFIX, where we fix your
comes to radio, nothing is more radio over the air" and listened to
free than Pirate Radio. In The Fix-It Bob and Fix-It Bill from Lake
1989 Pirate Radio Directory, Erie. Other stations included are:
George Zeller provides another Radio Garbanzo, Radio Lymph
useful publication from Tiare Node International, Radio Comedy
Publications (makers of various Club International, Radio
handy shortwave/OX guides and Clandestine, CBOR (busted by the
directories) to aid in the search for FCC last November), The Crooked
truth. Here Zeller provides a com Man (a sort of Dr. Gene Scott of
pendium of the pirates of 1988, as shortwave), Voice of Bob (repre
well as a brief history of each one. senting the satirical "Church of the
Details include where and when Subgenius"). Many of the stations
they were last found as well as listed are small fly-by-night opera
their most recent mail drop. This tions, that may have provided only
catalog of about 50 pirate radio one broadcast in 1988. Others,
broadcasters is meant only for the like Radio New York International,
patient OX'er -- these broadcasters have had a more notorious history.
are only on the air for a few hours The 1989 Pirate Radio Directory
at a time and frequently change provides a good start in the search
their frequencies. for new, unlicensed voices from
We know where Zeller spends beyond.
his holidays and weekends: listen The 1989 Pirate Radio
ing to "KNBS, Cannabis 41, the Directory, 55pp. from Tiare
station with your mind in mind," the Publications, P.O. Box 493 Lake
shortwave station of the California Geneva, WI 53147. $6 plus ship
Marijuana Cooperative. Illegal sta ping (1$ US, $2 Foreign),
tions like this have been getting Also available from Tiare: Los
out their word through the power Numeros, The Numbers Stations
of radio waves which may now be Log by Havana Moon. This is an
passing through your body as you extensive list of frequencies of the
read these words. The directory mysterious numbers stations from
covers the not-50-secret Voice of around the world. Tune in to hear
Tomorrow, which promises a cryptic sequences of numbers
tomorrow without Blacks, Jews, or being read aloud in German,
capitalists, and praises the work of Spanish, English, FrenCh, and
Nazis. To catch them try 7410 or Russian.
(continued from page 33) dumpster, and told him I was look
cap on my head. On the hygiene ing for food. He was convinced,
side, I do not shower or shave 16 and told me to get on my way.
hours before I start my planned I realize that some of these pre
activities. I do not comb my hair cautions may seem like a bit
before I leave. I use a ratty torn much. It does take some effort to
backpack to put my material in. In following them faithfully. But I have
the backpack I carry a half pack of heard countless tales of phreaks
cigarettes (even though I don't getting into trouble for bragging to
smoke), a tin cup, and some beef their friends, getting careless with
jerky. I might also take some other their activities, relaxing their reflex
items to complete my disguise, es, or feeling too comfortable and
depending on what is handy at the letting down their guard. In my
time. With this, my outfit is com observations, the majority of
plete. That way, if I'm caught, I'm phreaks have gotten into trouble
more likely to be recognized only by their own shortcomings -- not
as a derelict looking for food, not a through smart cops and aggres
phreak looking for information. sive prosecutors. I have a college
When traveling to the target, I career, and in no way do I wish to
always park my car at least three jeopardize it. So, go out there and
blocks from the scene, sometimes thrash around, within reason. The
more depending on geography information to be gained is infinite
and conditions. It is not unusual for ly valuable. Good luck!
me to park six blocks away. I hide
my wallet underneath the seat,
and hide the keys in a magnetic STAFF
lock key set stored under the car.
In over two years of thrashing Edltor-In-Chlef
caught, I had taken a half eaten, Violence, Mike Yuhas, and the
(THE SNI'.L'CBBCJUU)
718-358-9209
2600 BBSt6
many ways, The Private Sector was (l'AlU£R PE'l'I: I S)
an extension of his ever-present 412-829-2767
quest to learn and explore. We all
benefitted from that. ALL OPII:N 24 BOORS
David was shocked along with
INDIVIDUAL SUBSCRIPTION
CORPORATE SUBSCRIPTION
OVERSEAS SUBSCRIPTION
LIFETIME SUBSCRIPTION
a guide to primos
--- --
ra----
I 201 exchange list
20
22
I
letters 24 I
I tips on trashing
a sprint story
32
34
I spanish phones
36 I
I a summer worm
2600 marketplace
38
41
I reVIews
L. _____
42 I
--- -- .J
2600 Magazine
SECOND CLASS POSTAGE
PO 80K 752
East Setauket N Y.
ISSN 0749·3851