You are on page 1of 48

2600

The Hacker Quarterly VOLUME SIX, NUMBER TWO


SUMMER,1989
GRUMMAN SECURITY BULLETIN

".
From: Corporate S..curlty D~e: September 21, 1988
To: Distribution Sft/

SUbj«t: Soviet Acquisit'l on of Western Technology

There has been a tremendous


fa increase in the past f ew years by the

Soviet Union and its Warsaw ct Alliu in obta.in· .


• lng m,litarily significant

wester n technology and eq' both 1e8al and illegal means.


order to m Ulpment through
subsequently combat th e problem, read Inthe
ore fully understand and

subject attachment.

, Please indicate the number copies needed for


dlStribution ' . of additional
forward this further
w,th,n your grou information to Corporate
Security of . p and
flee (Hail Stop A02-IS).

~Cqu\s\t\on
01
soviet S\ gn\1\ cant
tJ\\\\ta r\\'/
western 1'echno\Og,/:
update
2600 (ISSN 0749·3851) is published quarterly by 2600 Enlerprises inc, 7 Strong's
Lane, Setauket, NY 11733. Second class postage permit paid at Setauket, New York,
POSTMASTER: Send address changes to
26()(), P.O. Box 752, Middle Island, NY 11953-0752,

Copyright (c) 1989,2600 Enterprises, Inc.

Yearly subscription: U.S. and Canada -- $18 individual, $45 corporate,

Overseas $30 individual, $65 corporate.

Back issues available for 1984,1985,1986,1987,1988

at $25 per year. $30 per year overseas.

ADDRESS ALL SUBSCRIPTION CORRESPONDENCE TO:

2600 Subscription Dept., P.O. Box 752. Middle Island. NY 11953-0752,

FOR LETTERS AND ARTICLE SUBMISSIONS, WRITE TO:

2600 Editorial Dept., P.O. Box 99. Middle Island. NY 11953-0099.

1600 Office Line: 516-751-2600,1600 FAX Line: 516·751·2608

REMEMBER....

Why should we remember Abbie fought the Vietnam War, got arrest­
Hoffman? What relationship did he ed so many times that nobody could
have with 2600? really keep track, and wound up
Abbie was, of course, the founder pissing off Richard Nixon to no end.
of the Yippies, and the founder of He became a fugitive from the law
YIPL, which turned into TAP. TAP after being accused of dealing drugs,
was the first publication to look at a charge he vehemently denied to
technology through hacker eyes. It's his closest friends right up to the
doubtful 2600 would exist in its pre­ end. And even under a disguise,
sent form were it not for the inspira­ Abbie accomplished a lot under the
tion TAP offered. name of Barry Freed, leading an
But apart from that, Abbie environmental group called Save
Hoffman was, for all intents and The River in upstate New York.
purposes, a hacker of the highest Abbie gained a reputation for
order. No, he didn't go around outsmarting the FBI. It's reported
breaking into computers, although that the FBI gathered more infonna­
we know the subject interested him. tion on Abbie Hoffman than on any­
Abbie hacked authority, which is one else in their entire history. That's
what a lot of us unwittingly do something to be proud of.
whenever we play with phones and Like a computer hacker, Abbie
computers. Abbie, of course, was Hoffman was thought of as a pest by
much more direct. He stood up to some. His presence was inconve­
the ultimate computer system nient and he made people uncom­
known as Society. He was relentless fortable because he wasn't afraid to
in his attack on the status quo. He point out the flaws.
(continued on page 45)
Summer 1989 2600 Magazine Page 3
A GUIDE TO

by Violence You substitute the appropriate numerical or


Introduction text value.
This is the first in a series of articles Braces { } indicate a choice of arguments
dealing with Prime computers (both mini's and/or keywords. At least one must be
and supermini's) and their respective oper­ selected.
ating system, PRIMOS. PRIMOS is one of Brackets [] indicate that the word or argu­
the several operating systems that the gen­ ment enclosed is optional.
eral hacker community has avoided due to Hyphens - indicate a command line option
unfamiliarity. In all actuality, PRIMOS is a and must be entered literally.
very user-friendly operating system and as Parentheses ( ) must be entered literally.
such, demands respect. In this series of Ellipses ... indicate that the preceding
articles I will cover everything that is impor­ argument may be repeated.
tant to the aspiring PRIMOS hacker. Angle Brackets < > are used literally to
This series is largely based on exten­ separate the elements of a pathname.
sive on-hands use, and all the information options: The word 'options' indicates that
provided herein is guaranteed to be 100% one or more keywords and/or arguments
accurate in regards to Revisions 19.xx can be given and that a list of options for
through 22.xx of PRI MOS. I do occasionally the command follow.
address pre-revision 19.xx systems, but All examples throughout this text will be
only in passing as they are extremely indented so that they will be easily identifi­
uncommon. In addition, all sample pro­ able. All text typed by the user in these
grams included herein have been fully test­ examples will be completely displayed in
ed. All PRIMOS output samples were taken lowercase characters. PRIMOS output will
from a Revision 22.0.0 PRIMOS system. then be easy to identify.
I chose to write this series in a technical System Identification
manner, but not like a typical AT&T docu­ PRIMOS is Prime's uniform operating
ment (grin). All in all, this series does not system for their extensive line of mini and
equal or even come close to the actual supermini computers. A few years back,
PRIMOS documentation, but since such the Prime model 750 was all the rage. No
documentation is generally unavailable to longer is that the case, however. Nowadays
the hacker community, I have tried my best there are many models of Primes and cor­
to create a series that is an acceptable porations and governments (the two main
alternative. Prime owner classes) purchase the models
I have opted to remain purposefully that best suit their individual needs. Thusly,
vague in some areas due to potential you will find Prime 250's (ancient) and
abuse. This seems to be the rage these 750's (also ancient, but still in use) to Prime
days and I'm sorry if that upsets you, but I 4150's (a mid-range system) and the huge
have no wish to compromise any of Prime Prime 9550's (high-end mini's). On the
Computer, Inc. 's trade secrets. high-end of this you will also find Prime
MCXL's (super-mini's) and Prime worksta­
Conventions tion clusters. As you can see. the army of
All command references in this series Primes is astoundingly large.
will follow the conventions put forth in the Equally large in number are the revi­
PRIMOS reference manuals and online sions of PRIMOS that they run. About all
help facilities. Conventions follow: that you will see these days are Rev. 20.xx
WORDS-IN-UPPERCASE identify com­ and greater but you will. on occasion. find a
mand words or keywords and are to be revision 17.xx, 18.xx, or 19.xx system.
entered literally. All command abbreviations About the only places you will find 17.xx
will be listed following the actual full com­ and 18.xx systems are on foreign packet­
mand name. switched networks (PSN's) (like on Brazil's
Words-in-Iowercase identify arguments. Interdata or Renpac networks and Japan's

Page 4 2600 Magazine Summer 1989


PRIMOS

Venus-P/NTII or DDX-P/KDD networks). A C2 security rating. To give you an idea of


scant few 18.xx and 19.xx systems are still what that means, VAXen are also classed
operating in the United States. As said pre­ as C2 systems. However, that C2 rating
viously, however, you will most likely find sort of 'fluctuates' about External security
from Rev's 20.xx through 22.xx systems should really be a bit higher, as Prime
here (and in most other countries). Computer, Inc, tells their administrators to
To understand how PRIMOS interfaces remove all defaults. Not very nice, eh? On
with users you need to have a good work­ the other hand, internal security is not so
ing grasp of what the standard PRIMOS hot. I'll discuss internal security more fully
operating system model looks like. To do later on,
this you need a decent abstract model. The front door is Similar to PRIMOS
Identifying a Prime mini or supermini command level in that it utilizes the com­
computer is not very difficult. Primes gener­ mand line (the prompting and 1/0 sub-sys­
ally behave in one of two ways when con­ tems). The only command which you can
nected to. They either sit there, echoing enter at this level of operation is the LOGIN
nothing to your screen or, in the case of a
PRIMENET-equipped system, display their
PRIMENET nodename.
In the former case, try this simple test
"PRIMOS is a very user­
upon connecting. Type a few random friendly operating system
keystrokes followed by a RETURN and
take note of what the host system responds and as such, demands
with. If it responds with a battery of error respect."
messages followed with the rather distinc­
tive 'ER!' prompt, then it is a Prime. Here is command. There is no 'who' command
an example: available to you prior to system login. As
asdf Evil Jay pointed out in his "Hacking PRI­
Invalid command "ASDF". MOS" files (volumes 1·111), there is no easy
(processcommand) way to get into a Prime computer, as its
Login please. front-door security is excellent.
ER! At this point only one option lies avail­
Any Prime that just sits there waiting for able, unless, of course, you know someone
you to login is not running PRIMENET and on the inside (grin). This option is default
generally lacks inter-system communica­ accounts, How nice of Prime Computer,
tions capability. On the other hand, those Inc. to install so many default accounts at
systems that are equipped with PRIMENET their factories. As I have said, however,
jump right out and yell "Hey! I'm a Prime!", they tell their administrators to remove
as they display their revision of PRIMOS these default accounts after the system has
and their system nodename upon connect. been installed. Not a few administrators lail
Here is an example: to remove these defaults, however, and
PRIMENET 21.0.3 VOID that is good for us. Also, never lorget that
That's all there is to Prime system iden­ Prime users are people and people like to
tilication Like I said, it's a rather trivial task. use easy-to-remember passwords But
Front-end Security before I go any further, let me explain the
and System Penetration LOGIN command in greater detail (patience
Now that we have located a Prime, how is a virtue, you know). \
do We bypass the front-end security and Typically you will type 'LOGIN' and
get in? Well, before I can begin to answer press RETURN, You will then be requested
that question a little discourse on the secu­ first for User ID and then your password
rity itself is required, Here's yet another example:
The government has granted Primes a login
____.__ Summer 1989 2600 Magazine Page 5
HACKING AROUND ON

User id? user And on a very few other Primes you can
Password? <not echoed> do a full lOGIN nest, as such:
Invalid user Id or password; please login user password
try again. You might not wish 10 use full-nesting
Login please. capability when other hackers are lurking
ERr about, as they might decide to practice
Well, that sure didn't work. Notice how shoulder surfing (grin).
PRIMOS didn't echo your password to you. If a User 10/password combination
The above example is from a non­ (hereafter referred to as an 'account') is
PRIME NET Prime. After this bad entry you valid, you will receive the following login
are probably still connected, so you can herald from PRIMOS:
have another go at it. A non-PRIMENET USER (user 87) logged in Sunday, 22
system generally has a high bad-login Jan 8916:15:40.
threshold, so you can make many attempts Welcome to PRIMOS version 21.0.3
per connect. A PRIMENET system on the Copyright (e) 1988, Prime Computer,
other hand is more of a bitch to hack as it Inc.
will disconnect you after the first incorrect Serlaltserial number (company
login. Here's another example (assuming name)
you are hacking a PRIMENET system from Last login Wednesday, 18 Jan 89
the TElENET X.25 network): 23:37:48.
@214XXX 'serial number' and 'company name' will
be replaced by the actual serial number
214 XXX CONNECTED and company name of the company that
PRIMENET 20.0.0 VOID owns the Prime computer site.
login user Just one more small thing I need to
Password? <not echoed> cover about the 'LOGIN' command right
Invalid user id or password; please now, and that is login troubles. Troubles?
try again. You bet'cha. The first trouble occurs when
the account you login to exists and is valid,
214 XXX DISCONNECTED 00 00 but it doesn't have an initial ATTACH point
00:00:00:08 9 7 (in other words, you cIon't seem to have a
As you can see, one chance is all you 'home' directory). This is no fun, since this
gel with a PRIMENET system. A minor account cannot be logged into. Bah. The
note is in order here regarding all the myri­ other trouble is remote user passwords.
ad of X's in the above example. I have This is definitely no fun. The prompt for
masked the last three digits of the system's such are generally different from one
NUA (Network User Address), for I do not another, as they run both commercial and
wish all you eager PRIMOS hackers to start custom written software to handle this.
banging on my system's front door (grin). I When you come upon a remote password,
have also edited the system's nodename try the User 10 and, if that doesn't work,
from its actual nodename to a more appro­ then try the system's nodename. If both of
priate one (grin). I will continue to mask all these attempts fail, you can either keep try­
system identification from my examples. So ing passwords (brute-force hacking) or you
far you are accustomed to typing in 'LOGIN' can give it up and move on to the next
and pressing RETURN to start logging in. account or system. A popular commercial
On all Primes you can nest the 'LOGIN' front-end security package is "LOGINSEN­
command and your User 10 in the same TRY" from Bramalea Software Systems,
line, as is illustrated in the follOWing exam· Inc. "lOGINSENTRY· is an excellent pack·
pie: age, so good luck when you go up against
login user
it. It supports remote passwords, password
Password? <not echoed>
aging, old-password databasing etc.

Page 6 2600 Magazine Summer 1989


A PRIME SYSTEM

Student account (only on schools)


Here is a listing of default PRIMOS
• SYSADM
accounts along with some other accounts I SYSADM, ADMIN
Administrator account
lind that work occasionally (I.e, more than
just once): • SYSTEM SYSTEM
NOTE: The '+' and ,•• symbols are not
Administrator account
parts of the User 10. + TELENET TELENET
User ID Password GTE Telenet account
Comments • TEST TEST
+ ADMIN Test account
ADMIN, ADMINIS'rRATOR
Administrator account + TOOLS TOOLS
+ CMDNCO CMDNCO Tool maintenance account
External command UFD maintenance Several 01 these combinations will not
• DEMO DEMO, GUEST work, as they are initial system setup
Demo account accounts and the administrator, after setup.
+DIAG DIAG changes them or completely removes them
Diagnostic account (Prime Computer, Inc. advises this), I have
+ FAM FAM denoted these accounts with a '+' symbol.
File Access Manager The accounts marked by a ,.' are the
+ GAMES GAMES ones that I find work most commonly, More
Games account (only on schools)often than not they have good privileges
• GUEST GUEST, VISITOR (with exception to GUEST).
Demo account Notice SYSAOM, Say. isn't that a UNIX
+ HELP HELP default? Sure it is but I have found it to
Help subsystem account work so many times that I just had to
+ INFO INFO assume it was a default 01 some sort
Information account As for TELENET I have yet to see it
+JCL JCL work, but Carrier Culprit states in the LOO
Job Control Language account Hacker'S Technical Journal file on PRIMOS
+ LIB LIB, LIBRARY (LOO T/J Issue 2) that it works sometimes
Library maintenance account Lastly, unlike UNIX, the PRIMOS
+ NETMAN NETMAN LOGIN subsystem is not case-dependent
Network controller account This is good, as case dependency gets bor­
+ NETPRIV NETPRIV ing at times, User ID "system" is the same
Network priv account as "SYSTEM", PRIMOS maps all command
+ NEWS NEWS line input to upper case prior to processing
News account it. This is true for logins and commands.
+ NONETPRIV NONETPRIV Although your typing appears in lower
Network noprlv account case, PRIMOS interprets it in upper case,
* PRIME PRIME
No big deal. Just thought I'd mention it
Prime account
The PRIMOS Command Line
+ PR1ME PR1ME
Before I go on any further some discus­
Prime account
sion on the PRIMOS command line is in
+ PRIMOS PRIMOS
order, The command line is the agent that
Prime account
accepts your input and then transports the
+ PRIMOS CL PRIMOS CL
input to the command processor (known
Prime account ­ affectionately as '(processcommand),) for
+ REGIST REGIST
parsing.
User registration account
The PRIMOS command line is interest­
+ RJE RJE
ing in the fact that it utilizes two prompts in
Remote Job Entry account
its execution, These prompts are 'OK' and
+ STUDENT STUDENT, SCHOOL 'ER!', There is no difference in the two,

Summer 1989 2600 Magazine Page 7


HACKING PRIMOS

save that the 'ER!' prompt is displayed only TREEWALKING @.@@.+,"


after you make a mistake and are given an In any intermedillte position of
error message. After successful execution psthnllme
of a command, however, you will see the W1LDCARDING @.@@.+."
'OK,' prompt again. You can alter these In flnlll position of pllthnllme
prompts with a special command, but I will NAME GENERATION =.==,"=,"==.+
save that for the section I have planned on When these special characters are
customizing your environment found, the PRIMOS command processor
Of all the most popular command lines substitutes the value of the item for the item
(PRIMOS, UNIX, VAXNMS) I like the PRI­ itself. This is 'one-to-one' substitution.
MOS command line the most. You can Iteration lists cause the command pro­
have separate commands on the same cessor to create one command for each
command line (just separate them with a item found or matched on the iteration lists.
semicolon). and so forth. In the case of wildcard or treewalk names,
No command (along with all options and the user sets the pattern and the command
arguments) can be longer than 160 charac­ processor searches the specific directory or
ters. If you should enter a command line directories for all file system objects that
longer than 160 characters then it will be "match" that pattern. These features can be
rejected by the command processor and thought of as creating "many·to-one"
you will get the following error message: matches.
Command line longer than 160 Name generation patterns can be used
characters. to create matching names either for simple
The PRIMOS command line has several filenames or for whatever number of file­
special features. and some of these are: names resulting from a wildcard or treewalk
user-defined abbreviations, command line name,
syntax suppression. multiple commands on NOTE: All commands support all the
one line, user-defined global variables. features listed above. The general rule is
PRIMOS command functions, command as follows: if a feature is not useful in con~
iteration, wildcard names. treewalk path­ nection with a particular command, then
names, and name generation pattems. that command will not recognize it.
The PRIMOS command processor iden­ PRIMOS Command Types
tifies these features by searching for spe­ There are two kinds of PRIMOS com­
cial characters entered in the command mands, internal and external, Internal com­
line. These special features. in the order
that they are searched for, are given in the
follOwing table (this table reproduced from "The army of Primes
the Revision 19.xx Command Reference
Manual, still pretty current in this regard). is astoundingly
Be aware that user-defined functions
are always processed first and 1.Ise no spe­ large. "
cial characters of any sort.
FEATURE Special Character mands are built right inside of PRIMOS (i.e,
Comments in the compiled programs that make up
ABBREVIATIONS PRIMOS). External commands are pro­
No speellll characten grams located in the CMDNCO directory,
SYNTAX SUPPRESSOR When an external command's filename is
In flnt position on line only typed (the name of the command, less the
COMMAND SEPARATOR
GLOBAL VARIABLES

%%
file extension) then the program IS invoked .
Of course, you may add the file's extension
FUNCTIONS [] if you wish, as it will work, but that is
ITERATION () defeating the purpose.

Page 8 2600 Magazine Summer 1989


A l1teJJag e

7'UJm

~~, - ~
~ _PHONE ~k>; . . -;"l~

-"

POLICE

:': .......ployee. carry ,cornpanr

. ,ldenUficatlon'c·.rda: .. , .,. ": ~


<Jr Y9~ l)ave·i~.~ t~:que~tioti~""...·~tlh'
. our employees .seeklng to enler your .
.place of busln~sS. ~leaSe 'ask'tosee'

Summer 1989 2600 Magadlle Page 9


A BEGINNER'S GUIDE

The reason for internal and external that you are sale. The first of these actions
commands is twofold. The PRIMOS files is to turn off all COMO files. COMO is the
(usually located in the DOS directory) take abbreviated form of the COMOUTPUT
up a tot of memory. Not all Prime systems command. COMOUTPUT turns on a buffer
have whopping loads of memory, so Prime much like your terminal program's copy
made sure that PRIMOS was able to be buffer. From the time a COMO file is turned
executed flawlessly (memory constraint­ on everything you type and everything PRI­
wise) on all system models. Only the most MOS says to you will be logged to a SAM
important commands were built inside of (sequential access method) file (a lexl file).
PRIMOS. Less vital (yet still vastly impor­ To turn off a COMO file you will type this al
tant) commands were made to be external the system prompt:
commands. Secondly, different sites have OK, como-e
different needs. Prime recognized this need The "-E" argument means "END" and
and their command structure allows for the will end any COMO processes. If you can't
easy customizing of PRIMOS commands see what you are typing then perhaps the
(adding, changing, removing, creating). Irs initiating COMO command turned off ali ter­
an ideal setup, really. minal output. You can turn it back on by
Making Your Stay Last Longer typing:
Now that you have logged in, there are OK, como -tty
a few things that you should do immediate­ To save time, nest the arguments as
ly to ensure a nice long visit. You should such:
make this procedure routine and do it every OK, como -e -tty
time you login. The next thing you should do IS make
Once logged in you will see the login sure that you are the only person using the
herald and then, assuming the account is account you logged in to (we don't want
not captive (more on captive accounts any irate users on our hands. now do we?).
later), get the system prompt (generally an Do this by typing:
·OK:). You are now using PRIMOS and OK, stat-me
the prompt signifies that you are at the PRI­ Assuming you are logged in as user
MOS command line. Most Primes use the PRIME, PRIMOS will output the following
standard "OK: prompt, but some do not.
For this series, I shall assume that your Une
Prime uses the "OK: prompt. Now, type User No oct( dec) Devices
some nonsensical command. Try arl. Here PRIME 87 125 (85) cUSER05>
is what should happen: The "User" column displays your User
OK, arf 10. The "No· column lists your user num­
Not found. ARF (std$cp) ber. The ·Une" column indicates the AMLC
ER! line you are using (the physical modem
Notice that when you enter an invalid line) in both octal and decimal notation. The
command you get a new prompt. On all "Devices· column displays the current disk
standard systems, it is "ERI". Again, this partition that you are attached to. In this
prompt can be changed and, throughout case, we are attached to the <USER05>
this series, I shall assume that it is set to disk partition.
"ER!". If you lind that there is more than one of
NOTE. std$cp means Standard you logged in. then you should make a
Command Processor. Sometimes instead hasty exit and logout There is a correct
of std$cp you will get a (processcommand) way to logout and an incorrect way to
error. They are the same thing, just differ­ logout. The correct way to logout is listed
ent names for different revision levels. below. Never hang up on a Prime Always
Now that you are in, you are going to logout in the illustrated fashion.
want to perform a few actions to make sure OK, rsterm

Page 10 2600 Magazine Summer 1989


TOPRIMOS
OK,lo AL133
The RSTERM command empties your PRO 131 phan. <COMDEV,.
terminal read (input) and write (output) PR2
buffers. This throws away anything in your BATCH
type-ahead buffer and gets rid of all output SERVICE 132 phant <COMDEV,.
pending. The LO command logs you out of SYSTEM 133 phant <USER01>
the system. When you logout you will see a <COMDEV,.
message similar to this: SYSTEM 134 phant <USER01>
PRIME (user 87) logged out Sunday, <COMDEV..
22 Jan 8916:23:56. SYSTEM 135 phsnt <USER01>
Time used: OOh 08m connect, OOm <COMDEV,.
03s CPU, oom OOs 110. SYSTEM 136 ph an! <USER01>
Everything listed in this message should <COMDEV..
be sell-explanatory by now, but in case you Notice how the STAT US command's
are still bewildered, the connect time is how user display procedure is identical to that of
long your session lasted in hours and min· STAT ME. Let me explain these users now.
utes, the CPU time indicates how much What's there to explain about users, you
actual time you manipulated the central ask? Why, lots. Some 01 the users listed
processing unit (CPU) listed in minutes and above aren't actual people, but rather phan­
seconds, and the 110 time indicates how tom users, processes that execute on their
much actual disk 110 (access) you per­ own.
formed in minutes and seconds. Look at SYSTEM. See how this User ID
Assuming that no one else is using the doesn't have a line listing? Instead of the
account you are logged into, take a look familiar octal and decimal AMLC line listing,
and see who else is on the system. Do this it says "asr·. Also notice how TIMER_PRO­
by typing' CESS is listed as "kernel" The list goes on
OK. stat us too, as you can see. LOGIN_SERVER is
The Prime will display the following to "LSr·, DSMSR and DSMASR are "DSM",
you: and SYSTEM_MANAGER is "SMSr" Also
Line notice all those users listed as "phan!"
User No oct( dec) Devices Basically, all User \D's that lack
SYSTEM 1 asr <COMDEV.. octalfdecimal AMLC line notation are not
SMITH 5 3( 3) <USER05 .. actual people and cannot harm you with the
<COMDEV .. exception of SYSTEM_MANAGER and
JOHNSON 70 104( 68) <USER05 .. SYSTEM. These users, while not people,
<COMDEV.. are consoles, terminals if you will, that are
PRIME 87 125( 85) <USER05.. logged in aU the time. One monitors the
<COMDEV.. system's front door and logs to screen and
disk (and occasionally printer) all logins
TIMER (successful and unsuccessful) and logouts.
PROCESS 123 kernel <COMDEV .. The other just sits there, waiting for the sys­
LOGIN tem manager to do whatever he likes. A
SERVER 124 LSr <COMDEV.. good way to tell if either of these User 10'5
(3) is active is to look and see where they are
DSMSR 125 DSM <COMDEV .. attached to (I.e., the info displayed in the
DSMASR 126 DSM <COMDEV .. "Devices' column). If you see it attached to
SYSTEM an MFO (Main File Directory) other than the
MANAGER 127 SMSr <COMDEV.. root MFO, then cruise and come back later.
LIB 129 phant <COMDEV.. LSr is the login server. It is what you
AL132 "talk to' (in a manner of speaking) when
LOP 130 phan. <COMDEV .. you connect to the Prime initially "kernel" is

Summer 1989 2600 Magazine


HACKING ON

the heart of the PRIMOS operating system. ATTACH pathname


When you have logged in, you are talking To attach to an MFO you would type
directly to it. 'phant" users are phantom OK, amfd'
processes (batch jobs) that are executing Where # is the logical device number of
independent of a system terminal. They the MFO you wish to attach to. MFD num­
perform rudimentary tasks such as running bers always start out at 0 and increment
the printers, backing up the system, run­ sequentially. If you are attached to an MFO
ning the RJE and Batch Job managers, etc. or a UFO you simply need to use the UFO
They perform many activities, almost name you wish to attach to as the path­
always geared towards the system's needs. name. If you wish to attach to sub-UFO's
OSM users are Oistributed System then you will need to use the full pathname
Management utilities running as phantoms. Here are some examples
The OSM utilities are present to help the OK, amfd 0
System Admin administrate his system. OK, a prlmenet*
There will be more on the OSM utilities later OK, a Info
in this series. Top-level directory not found or
Basic PRIMOS Commands and Inaccessible, INFO (ATIACH)
Information About PRIMOS Files OK, a prlmenet*>info
We're all ready to start covering the first Notice how when you tried to attach to
PRIMOS commands to add to your new info you got an error. Well, that was
repertoire. In this section you will learn how because info is a sub-UFO and you need to
to move around PRIMOS directory struc­ supply the full pathname when you attach
tures, how to view files, how to get full sta­ to sub-UFO's. Notice that when you
tus on the Prime system, and how to get attached to info in the correct manner you
further help. used the ">" character to separate the ele­
First off, let me tell you a little bit about ments of the pathname.
directories and how they are set up. On Locating all the available MFD logical
each logical disk on a Prime, there is a root device numbers is easy Just type
directory called the MFO (Main File OK, stat disk
Oirectory). Each MFO on a system has a PRIMOS retums this output to you:
unique number after it. In this manner all Disk Ldev Pdev System
logical disk MFO's are separate from one COMDEV 0 1460
another. Below the MFO's are directories USER01 1 31460
called UFO's (User File Oirectories). It is USER02 2 32462
the UFO's that users login to. Not all UFO's, USER03 3 462
however, are login directories. All directo­ USER04 4 11062
ries below the UFO level are called sub­ USER05 5 62060
UFO's (subdirectories). Not all UFO's have USER06 6 101062
sub-UFO's. Sub-UFO's can also have sub­ "Disk" indicates the actual disk parti­
UFO's under them. It's set up a lot like most tion's root pathname. "Ldev" is the logical
microcomputer Disk Operating Systems. device number of a given partition. "Pdev"
When you login you will be attached to is the physical device number. The
your account's initial attach point (i.e., your "System" column will be blank unless a
"home" directory). This will most likely be a given disk partition is located on another
UFO, but in some cases you will attach to system. What? Impossible? Not at all. With
an MFO. In any case, to move from directo­ PRIMENET, Prime's networking software,
ry to directory you'll use the ATTACH com­ disk partitions on system B can be
mand. You can abbreviate ATTACH with accessed from system A. If you are not on
an A. PRIMOS understands ATTACH and a system equipped with PRIMENET then
A as being the same command. The basic the ·System" column will be blank More on
format of ATTACH is: this in the PRIMENET section

Page 12 2600 Magazine Summer 1989


PRIMES
What is important to us immediately is .PL1 Y PU1, Subset G
the data in the "Disk" and "Ldev" columns. source code
Each of these disk partitions is an MFD. .PLP Y PLP source code
On some systems you will find two use­ .PMA Y Prime Macro
ful utilities. UP and DOWN. These are Assembler source code
external commands. They simplify moving .RUN N Prime-written pro­
around directories in PRIMOS. Here is how grams; Int cmds (complied)
to use them. .SAVE N Prime- and user-writ­
UP In] ten programs (complied)
UP allows you to move up a specified NOTE: The ·SLlSTable" column indi­
number of levels. The specification of "n° is cates that the file type in question is a SAM
optional. If you do not specify a value for it, file (Sequential Access Method a text file)
it will have a default value of 1. and can be viewed normally by the SLiST
DOWN directory_name
DOWN allows you to move down one
directory in the tree. You must specify the "Prime users are
name 01 the directory that you wish to move
down into. You need only specify the UFD people and people
or sub-UFD name. There is no need to
specify the entire pathname. like to use easy-to­
If these utilities are not on the Prime you
are on then you can upload them to the remember pass­
Prime's CMDNCO directory (where external
commands are stored). There will be more words. "
information on this later on.
Viewing files in PRIMOS is as easy as
can be. You simply use the SLiST (sequen­ (Sequential List, like the TYPE command
tiallist) command. The format is as follows: found on most PC's) command. You can
S LIST filename SLiST non-SAM files, but they will come
You must include the file extension of out as garbage and that can be a pain In
the file that you are SLiSTing. Here is a list the ass. If you should SLIST a non­
of file types and what they mean. SLiSTable file type then use BREAK or
Extension SLlSTable? Description CONTROL-P to abort the listing.
A very important command is the LD
.ABBREV N Abbreviation flies command (List Directory). LD will display
.BAS YBASIC source code the contents of the current attach directory .
.BIN N BINARY Image file To use it just type:
.CBL Y
COBOL source code OK,ld
.CC Y CCompller The LD command supports wildcarding,
source code too. If you should want to display all the
.COMI COMMAND INPUT CPL files in a directory, use LD in this man­
Y
data files ner:
.COMO Y COMMAND OUTPUT OK, Id @@.cpl
data files Notice the "@@" in the above com­
.CPL Y CPL (Command mand, It tells LD to do a wildcard search for
Procedure Language) programs all files ending with the extension ".CPL"
.Fn Y FORTRAN·n Just experiment with this aspect of LD. It's
source code really quite simple.
.FTN Y FORTRAN IV Getting more information about the
source code Prime you are on is easy. Just use the
.GVAR N Global variable files STATUS (abbreviated STAT) and LIST
commands.
Summer 1989 2600 Magazine Page 13
PRIME

Remember the STAT US and STAT ME


commands I mentioned earlier? Well, as ACL protecting "<Current
you probably guessed, there are several directory....:
other options to the STATUS command. STEVE.SYS ALL
Here are the other options and what they SYSTEM ALL
do: $REST: NONE
NOTE: Capitalized letters indicate the The above command example displays
option's abbreviation. all of the ACL's (Access Control Lists)
ALI: Displays all info available through regarding your UFD. Notice that you,
STATUS. STEVE.SYS, have all rights to your UFD
DEvice: Displays physical and logical (naturally). Also notice that SYSTEM has
device numbers of any assigned mag tape all rights too. Why? Most likely backup pur­
drives. poses. Also notice that $REST (meaning all
NEtwork: Displays the status of other other user ID's) has no rights. Now, let's
systems to which your system is attached assume you ATTACHed to another user's
by PRIMENET. UFO, Say, JOHN. Here is what you might
PROJect: Displays the Project 10 of all get:
users logged in. OK, sJohn
SEmaphores: Displays the value of OK, list_access
user semaphores that have been set on the
system. A semaphore is a flag used for ACl protecting "<Current
synchronizing processes. It is used by directory>":
cooperating user processes to control JOHN ALL
access to a single shared resource. SYSTEM ALL
SYstem: Shows the system nodename SIMSON DALURW
and revision of PRIMOS. $REST LUR
UNits: Shows you what file units you Quite a different story here. Again
have open. JOHN and SYSTEM have ALL rights here.
Remember, I did not mention the But wait, SIMSON has DALURW access
USers, ME, or Disks options here, as they and $REST (everyone else) has LUR.
were fully detailed earlier. What do these cryptic phrases mean? This,
If the STATUS command is issued with­ I would gather, would be a good time for
out any options, information is provided on me to explain the PRIMOS access codes
the following options in this order: SYS­ So glance over at Table A.
TEM, UNITS, DISK, SEMAPHORE, NET­ As illustrated there, the ALL and NONE
WORK, and ME. mnemonics are also PRIMOS access
That pretty well sums up the STATUS codes, ALL indicates YES to ALL of the
command. But is that all? Hell no. There is above and, as you can full well guess,
also the LIST command. If you thought NONE indicates that all access is denied.
STATUS had a lot of options then wait until Also be aware that file systems (groups
you check this lovely command out. I will of files) can be protected by an access cat­
only cover the useful options. egory, To list the access of an access cate­
First in the syllabus is the LIS­ gory type the following command.
T_ACCESS command. This command will UST_ACCESS [category-filename]
show you what User ID's have access to Next is the LIST_GROUP command. II
the UFO that you are currently attached to. lists all of the ACL groups to which you
Assume that you are attached to your initial belong. These groups may govern access
login UFO. Also assume that your User 10 to some files on the system. If you don't
is STEVE.SYS. Here is an example of what belong to any groups then PRIMOS will
LIST_ACCESS would display: reply with:
OK, list_access No groups. (list_group)

Page 14 2600 Magazine Summer 1989


HACKING
Otherwise PRIMOS will respond in the number.
following format: Back to the LIST commands Next up is
Groups are: .HELP .ADMINISTRA­ LIST ASSIGNED OEVICES. This com­
TORS .ETCETERA mandinvokes a utility in CMDNCO that will
The LIST_GROUP command can be display all devices hooked up to your
abbreviated to LG. Prime, such as printers, etc. Disk partitions
LIST PRIORITY ACCESS (abbrevia­ are not listed by the LIST
tion LPAC) is used to display your priority
access on any given disk partition. While
normally you would use LIST_ACCESS to "If you find that there
examine all access rights and priority ACL's
on file system objects, LPAC is available is more than one of
since a priority ACL can prevent you from
accessing directories and from using the you logged in, then
LIST_ACCESS command. Command for­
mat is as follows: you should make a
LIST PRIORITY ACCESS [pathname]
- [-brief] ­ hasty exit and
The LIST_QUOTA command (abbrevi­
ated LQ) is, in my opinion pseudo-worth­ logout. "
less since file quota information is
displayed when the LD (List Directory) ASSIGNED DEVICES command
command is issued. The LQ command dis­ You can-use the -USER {option] argu
plays current disk quota and storage intor­ men! to specify a list of users. by name or
mation for the current (or specified) number. Assigned devices whose assign­
directory. To issue this command, you need ing user is not in this list are not displayed
to have L (list) access to the target directo­ The default is all users The format IS
ry and U (use) access to all higher directo­ either:
ries. The proper command format is: LIST ASSIGNABLE DEVICES­
LIST_QUOTA [pathname] [-brief] - USER {user name}
Executed without pathname, or
LIST_QUOTA returns information regarding IJST ASSIGNABLE DEVICES -USER
the current directory you are ATTACHed to. - {user numbers}
Quotas are storage space constraints Remember, the -USER argument IS
set on a directory. The limits are listed in optional, and no! required. It is just useful
disk records. A 0 quota is great (indicates for listing assigned devices that were
no quota). A quota 01 1 is absolutely lousy assigned by a particular user
A quota of 1000+ is ok. If a directory has a L1ST_ASYNC is another good one. ThiS
quota of, say, 1000, then the total number command displays ali of the system's hard­
of disk records used in that directory and wired lines and what they are doing. There
all sub-UFO's below that may not exceed are three types of assignments that a line
the quota. can have, and these are
If you have P (protect) access on the FREE: Line is free to be assigned.
current UFO then you can use the ASSIGNED: Line is assigned to a hard­
SET QUOTA command to change the ware device (printer/etc).
UFOquota constraints. The format is: LOGIN: Une is available for login (ter­
SET_QUOTA palhname [-Max N] minal or remote).
The abbreviation for SET QUOTA is The header for the display is as follows
SQ. The argument -MAX indicates the Line number, Une use, Auto speed
maximum number of quotas that the speci­ enabled, Line speed, Line protocol,
fied pathname can store. N is a decimal User number, User name.

Summer 1989 2600 Magazine I'age /5


PRIMOS GUIDE

Line number is the physical line's identi­ mands, but they are not too Important at
fication name. Line use indicates how the the present moment. I'll let you learn about
line is assigned (free. assigned, login). Line them on your own via Prime's excellent
speed indicates the speed of the physical online help facility. To use the PRIMOS
line. Line protocol indicates the line factor online HELP facility, just type HELP. Or, if
(either TTY or TIVNOP). TTYNOP means you know what you need help with, type
TTY not operational. User number indicates HELP commandname. Really quite simple
the user number associated with the AMLC User-to-User Communication
line. User name is the actual name of any It is always useful to know how to send
user/phantom using that line. I am not too and receive messages when on a computer
sure about the Auto speed enabled column. system, whether you are communicating
LIST_COMM_CONTROLLERS displays with other hackers online, or attempting to
information on aU the communication con­ social engineer a legitimate user or system
trollers present in a system, excluding the operator. Any user on a Prime may send or
Prime Node Controller. Information is given receive messages, Messages may be sent
for each controller and includes the con­ from any user terminal to any other user
trolier name, ils type, ils device address, terminal, any user terminal to the system
the number of synchronous lines attached, console, the system console to all user ter­
and the number of asynchronous lines minals, the system console to any specific
attached. user terminal, or the system console to any
L1ST_CONFIG displays the current sys­ system console on another node of the net­
tem configuration. work (PRIMENET-equipped systems only).
L1ST_LAN_NODES displays all nodes Sending messages to users on a Prime
on a Prime LAN300 system. Be aware that is very easy. The message command for­
this external command works only with mat is as follows:
Prime's LAN300 system (so far as my MESSAGE [username] [-NOW]
experience goes). [-ON nodename]
LIST_SYNC displays all synchronous [-usernumber]
lines on a Prime system. The abbreviation for MESSAGE is M.
LIST_PROCESS displays the environ­ So instead of typing MESSAGE all the
ment of a specified user process. The time, you can type M instead
user's process identity is displayed, togeth­ Notice [usernamej and [-usernumber].
er with details of its environment which When sending messages to a user you
include: attach points; abbreviation file; need only specify one or the other. If you
active COMI and COMO files; connect, were to send a message to user SYSTEM
CPU and 110 times and limits; the user's you would type:
ACL groups; and all active remote identi­ OK, m system
ties. That would enable you to send a mes­
There are several more LlST_ com­ sage to user SYSTEM. Be aware that the

TABLE A

~ Ri9b! ~12 AI12wJ.lIH[ 12


P Protect Directories Change accesses and attributes
o Delete Directories Delete directory entries
A Add Directories Add directory entries
L List Directories List directory entries
U Use Directories ATTACH to directories
R Read Files Read file contents
W Write Files Change file contents

Page 16 2600 Magazine Summer 1989


SUPPLEMENT:

RED BOX PROBLEMS

Facts About Public


Phones
--A red box is not a dangerous
toy; however, one should exer­
size common sense, as this
gentlemen is so doing.

It has come to my attention that a few boxers are having difficulties with
their toy. in that. some [very few) of the 1.5 million pay phones (not in­
cluding private) are not reg!stering your -beeps' as a deposited coin. The
culprit is the magnet within the mouthpiece of the pay phone your using.
When one tries to use the red box the magnet in the mouthpiece interferes
with the speaker (which is also a magnet) by absorbing the sound, So. if you
thought that your box was on the blink or the phone company has imple­
mented some new technique to stop red >boxing. don't worry.
Try holding the red box speaker a 1/2" to an inch away from the mouth­
piece as you play your lune (if quarters don't work try dimes or nickelsl. al­
though this may cause the already curious guy in the neighboring booth to
wonder what's gOing on. it should work. If not. find another pay phone or
try a full proof radical method and rip out the handset. so repair service
can put a new one in. This should work lOO"k of the time and it keeps peo­
ple employed I

Remember,

Phone Phreaks never die;

they just build different color boxes.

Micro Surgeon 9 1989

Summer 1989 2600 Magazine Page 17


HACKING AWAY

message you send will be displayed to ALL receive state of all users with the name of
users logged in under the User io of SYS­ "usemame"
TEM. In the case that there are more than Message -STATus usernumber: Lists
1 user with the same User 10 logged in at receive state of all users with the number of
the same time, you might want to use the [­ 'usemumber"
usernumberJ argument It works like this: Me. .age -STATus ME: Lists the
OK, m·2 receive state of your own terminal/process.
That would send a message to the user NOTE: Capital letters in the above
with the user number of 2. The message forms of the message status commands
you send in this case would only be sent to indicate the legal PRIMOS abbreviations
the user with the user number of 2. Use lor the commands.
either the user name or the user number, When first initiating a session in which
but not both, for using both will cause an you fool you might be doing some user-to­
error to be displayed by PRIMOS. user communication you should issue the
If you omit the [username] and [­ "Message -STATus· command. This will
usemumber] arguments then the message display the message receive state of all
will be sent to the system console. Be care­ users presently online. Here is an example
ful about this! of the output you might receive'
The -NOW argument is .optional. If it is OK, m -stat
specified then the message wilt be sent to
the user immediately. Otherwise the mes­ User No State
sage will be put into a queue and sent only SYSTEM 1 Accept
when the target user has returned to PRI­ PRIME 13 Defer
MOS command level. PRIMOS 24 Accept
The -ON argument need only be speci­ HACKER 37 Reject
fied if you wish to send a message to a RAGE 42 Accept
user that is logged in on a remote site. This In the above example you notice that
argument will not be required at all if the there are five processes logged in. one of
Prime you are on is not equipped with them being the physical system console,
either the PRIMENET or the LAN300 net­ The "No" column denotes the user's user
working software packages (by Prime number, while the "State" denotes their
Computer, Inc., of course). In order to use message receive state.
this argument you need to know the remote Notice how there are three message
system's nodename. An example of send­ receive states listed, accept, defer, and
ing a message to a remote system user is: reject. In theory, these states are defined
OK, m hacker -on sys.c as such:
This would send a message to User 10 ACCEPT: Enables reception of all mes­
"HACKER" on the networked Prime system sages
called "SYS.C". Remember, you need to DEFER: Inhibits immediate messages
know the correct nodename of the remote REJECT: Inhibits a/l messages
. system. If you are set to accept, all messages
Just like in real-life situations (people-to­ sent to you will be displayed on your termi­
people), PRIMOS users mayor may not nal immediately. In defer mode, messages
wish to speak to you. So before sending a will not appear until what you are doing is
message, you should make sure that the done (i.e., a message will not appear while
user you wish to communicate with is in the middle of a currently executing com·
accepting messages. There are several mand). In reject mode no messages will be
ways to obtain this information. received by you.
Message -STATus: Lists receive state Setting a receive state is useful when
of ALL users you do not wish to be disturbed. It is espe­
Message -STATus username: Lists cially useful to use receive states whon

Page 18 2600 Magazine Summer 1989


ATPRIMOS

using any of the PRIMOS editors or utilities. on Prime networking. There will be a host
Sending messages while in reject mode of information regarding the advanced
and sending immediate messages while in snooping tactics used in order to snoop
defer mode is not permitted as the user you about PR1MENET-based systems and their
are attempting to communicate with will not respectille Token-RinglLAN300 networks,
be able to respond. Internal Security
To set your message receive state, sim­ Before you can really start exploring
ply type: your new Prime, you need to understand
Message -state how PRIMOS inlernal security is imple­
'-slate' is either accept, defer, or reject. mented and how to get around it As you
Quite simple. have seen from the section on basic PRI­
You are advised to avoid sending mes­ MOS commands, PRIMOS utilizes access
sages to the system console as that could conlrOl lists (ACL's). Getting around ACL's
be potentially hazardous to your stay on a is almost an impossibility,
Prime computer system. Pestering legiti­ Also you will occasionally run into pass­
male users is also not desired, Use your worded directories, To attach to a pass­
common sense. worded directory, you would type
Inlernal Snooping Tactics something similar to this:
Once inside a Prime, your paths are OK, 8 'dlrn8me password'
many. Some lead to glory, others 10 dele­ Nolice how you followed the directory
tion of your account (gulp). To aid you in name with the password and enclosed the
choosing the correct paths, you must snoop entire deal with quotes, If you were going to
about your newfound host. By doing this, attach to a passworded sub-UFO you might
you can leam many things, some of which type something like this:
include: who owns the Prime and what they OK, a 'prlmenet*>info>source
are doing on iI, more accounts on the sys­ password'
tem, or more accounts on different Prime Passworded directories can be a pain in
systems. the ass, but, unlike ACL's, they can be got­
There is plenty for you to do, I strongly ten around. Look inside CPL programs (by
urge that you make the snooping procedure SUSTing them) for occurrences of
a routine and that you do it immediately ATTACH statements enclosed in single
upon obtaining an account, as you never quotes. Thars about all the internal security
know how long it might last. in PRIMOS up to the current revision level
Finding out who owns the Prime and (22.0.0).
what they do on it is always rewarding. The ExplOring the Vast Reaches
best systems I have been on were Prime ofa Prime
Computer, Inc, development systems, 3rd When looking around a Prime, always
party development systems, and Primes start in your initial attach UFO. Check out
belonging to certain telephone companies ellery file in it and every file in sub-UFO's
(which shall, of course, remain nameless). under it. When finished there, cruise on up
Oepending upon who owns the host, you to MFO 0 and start down-attaching to the
may obtain a bit more information that you many UFO's there and look at everything.
had expected. SLIST all SAM files, read all mail, look al
More accounts on the system is what everything. Leave no UFO un-attached to!
you are really afler, however. Many users Lealie no file un-read,
are exceedingly lax. A brief inspection of all Understandably it will take a good few
mail in the queue can sometimes yield hours (sometimes as many as 12) to fully
accounts, as can individual programs investigate a Prime, but believe me, it is
(source code) and documents. worth it. Capture ellery thing that looks valu­
As for more accounts on different sys­ able to your buffer. When done looking, fol­
tems, I am saving that for the future section low up everything you captured

Summer 1989 2600 Magazine Page 19


EXCHANGE LIST:

by n.1nIideI 273 Summil 363 lakewood 455 Morristown


EDITOR'S NOTE: nu/tt 274 Monmouth Jet 364 lakewood 456 Newark
an.tof valitlell~ 276 Cranford 365 Passaic 457 Bound Brook
In 'M 201 (Northern 277 Summil 366 Daller 456 Point Pleasam
New ./«My) _ code. 278 Palanlon 367l.akewood 459 Hope
ThItt la _fullor tho. . 279 Paterson 368 Hackensack 460 Rutherford
of you Irylnll to find 280 Belmar 369 Neshanic 461 Leonia
-hjdden~ ellchengea, 281 Belle Mead 370 lakewood 462 Freehold
1_ ANI numb/mt, rllIf/­ 263 Matuchen 371 Newark 463 New Brunswick
backa, or t.lco le.t 284 Nutley 372 Newark 464 Summ~
numbe,.. Note: We 285 Morristown 373 Newark 465 Newark
reCfHltly Ieemed thet In 286 TOmll River 374 Newark 467 Millburn
June of ,,,,, the eoufh. 287 Metuchen 375 N_ark 468 Newark
em plITf of 201 Will be 286 Hasbrouck HIs. 376 Milburn 469 Bound Brook
apllf
__ IntocodtIelnclude
1108. Othar 289 Elizabeth 377 Madleon 470 Passaic
290~ 378 South Orange 471 Passaic
" . (a apIII of 312) Ie.., 291 Allantic Highlands 379 Mllbum 472 Passaic
Ihla yaM, IH13 (e apIiI of 292 Morristown 381 Rahway 473 Passaic
214) In INO, Md 5'0 f. 293 Montague 382 Rahway 474 Linden
aplitof415}1n ,,,,. 295 Point Pleasant 383 Newlon 475 Belvidere
204 Ber!llV'devlle 297 Frankln Park 384 OUmont 477 Poim Pleasant
208 Newfomdland 298 RoeeIIe 385 OUmont 478 Passaic
209 Franklin Boro 299 Boonton 386 Whippany 479 Bloomsbury
214 New Brunswick 3M Hawthorne 387 OUmont 481 Newark
218 Somerville 306 SomervHIe 368 Rahway 482 Newark
221 Bernardsville 3IJ7 Park Ridge 389 Eatontown 493 Newark
222 Long Branch 30B Freehold 390 South River 484 Newark
223 Manasquan 309 Jersey City 391 Park Ridge 485 Newark
224 Cliffside 316 Boonton 392 Union City 486 Linden
225 Metuchen 318 Newark 393 Hasbrouck HIs. 487 Hackensad<
226 Ca1cIweIi 319 UnionCIty 394 Hackensack 468 Hackensack
227 Caldwell 321 Matuchen 398 Ra'-y 489 Heckensad<
228 Ca1cIweIi 322 Fanwood 397 Morristown 492 Butler
229 Long Branch 323 Lakehul'lll 398 Hopatcong 493 Deal
231 SometVille 324 Penh Amboy
399 Newark 494 Metuchen
232 Wes1fleld 325 Orange
402 Boonton 495 Keansburg
233 Westfield 326 Morristown
403 Caldwell 496 Columbia
234 Peapack 327RarTII8)'
405 Oakland 499 Rahway
235 Nutley 328 Dover
414 Orange 502 Asbury Park
236 Lebanon 329 Monmouth Jet.
417 Metuchen 503 Wh!Rlany
238 South River 330 Union City
418 New Brunswick 505 Toms River
239 Verona 332 Jersey City
420 Jersey CIty 506 Toms River
240 Torna River 333 Jersey City
422 Franklin Park 507 Rutherford
241 Roeeile 334 Boonton
423 Hawthorne 509 Bioomieid
242 Newark 335 Boonton
427 Hawthorne 513 F_hold
244 Toma River 337 OaKland
428 Whippany 514 Madison
245 RoeeIIe 338 Bloomfield
429 BIoon'IieId 515 Wh!RlanY
246 New Brunswick 339 Bayonne
430 Newl!II1< 517 Deal
247 N_ Brunswick 340 Passaic
431 Freehold
519 New Brunswick
248 Metuchen 341 TOfl'lllRlver
432 Jersey City
521 Jamesburg
249 New Brunswick 342 Hackensack
433 Jersey Chy
522 Summ~
251 South River 343 Hack8l'lllack
434 Jersey Chy
523 PaletSon
254 South River 344 Newark
435 Jersey Chy
524 New Brunswick
255 Tofl'lll River 345 Paterson
438 Bayonne
525 South Amboy
256 Little Falls 347 Netcong
437 Bayonne
526 Somerville
257 South River 348 Union City
438 Rutherford
527 Eliz!lbe!h
259 Newark 349 Toma River
439 Oldwick 528 Manasquan
261 Oradell 350 laKehUI'lll
440 Hackensack
529 Cragmere
262 Oradell 351 Elizabeth
441 Hackensack
530 Red Bank
263 Boonton 352 Elizabeth
442 Penh Armoy
531 Deal
264 Keyport 353 Elizabeth
444 RidlJewood 532 Eatontown
265 Oradell 354 Elizabeth
445 Ridgewood
533 Livingston
266 Orange 355 Elizabeth
446 Englishtown
534 Whitehouse
267 Morristown 356 Bound Brook
447 Ridgewood
535 livingston
266N_ark 358 Westwood
449 Spring Lake
536 Englishtown
269 Toma River 359 Belle Mead
450 BelIevNIe
537 HaJ'T1)ton
270 Tofl'lll River 360 South River
451 Jersey Chy
538 Morristown
271 Bound Brook 361 Dover
453 Oxford
539 Morristown
272 Cranford 362 Blaln!town 454 Phillipsburg
540 Morristown

Page 20 2600 Magazine Summer 1989


201 AREA CODE

541 Cartete! 646 Had<ensad< 738 Penh Amboy 823 Bayonne


542 Eatontown 647 Millington 739 Keyport 824 Newark
543 Mendham 648 Newark 740 Uvings!on 825 Ramsey
544 Eatontown 649 Newark 741 Red Bank B26 Perth Amboy
545 New Brunswk:k 652 Ridgewood 742 Palel1lOn B27 Franklin Boro
546 Passaic 653 Jersey City 743 BloorrIieid B2B New BrunswICk
547 Jersey City 654 Westfield 744 Bloorrlieid 829 Morristown
54BMeluchen 656 Jersey C~y 745 New Brunswick 830 Seaside Park
549 Meluchen 657 lakehurst 746 Bloorrlieid 831 Po"llton Lakes
55B Elizabeth 65B Somerville 747 RedBank 832 Califon
560 Bound Brook 659 Jersey City 748 Bloorrlieid 633 Teaneck
561 Plainfieid 661 Nutley 750 Woodbridge 834 Holmdel
562 Dunellen 662 Union C~y 751 Belleville 835 Po~on Lakes
563 Bound Brook 663 Hopatcong 752 Dunellen B36 Teaneck
564 Milburn 664 Westwood 753 Plainfield 837 Teaneck
565 Newark 665 Summrt 754 Plainfield 838 Buller
566 Matawan 666 Westwood 755 Plainfieid 839 PO"llton Lake,
567 Englewood 667 Nutley 756 Plainfield 840 Point Pleasam
568 Englewood 668 Plainfield 757 Plain/ieid 841 Stroudsoorg
569 Englewood 669 Orange 758 Red Bank 842 Red Bank
570 Hac.:i<ensac.:i< 670 Ridgewood 759 Be41ev~1e 843 Hackensad<
571 long Branch 671 Middielown 760 Rahway B44 Bound Brook
572 New Brunswick 672 Orange 761 South Orange 845 Hackensad<
573 Park Ridge 673 Orange 762 South Orange 646 New BrunSWICk
574 Rahway 674 Orange 763 South Orange 848 Wyckolf
575 Caldwell 675 Orange 764 Vernon 649 Lakehurst
576 Red Bank 676 Orange 765 Madison 850 Hackettstowc
577 Freehold 677 Orange 766 Bernardsville 851 Unionville
578 Newark 678 Orange 767 Closter 852 Hackettstown
579 Newton 679 South Arrboy 768 ClosTer 853 Upper Grnwd Lk
580 Millington 680 Bloomfield 769 Plainfield 854 Union Crty
581 Whippany 681 Belmar 770 Hopatcong 855 Woodbridge
582 Summit 682 Morristown 771 Summn 857 Verona
583 Matawan 664 Paterson 772 Passaic 858 Bayonne
584 Succas unna 685 Somerv~1e 713 Passaic 859 Phill.,sburg
585 leonia 686 Unionville 774 Asbury Park 860 Jersey City
586 Rockaway 667 Unionville 775 Asbury Park 861 Union Cqy
587 Hackensad< 686 Unionvitle 776 Asbury Park 862 linden
589 Newark 669 Washington 777 Passaic 863 Union Clly
591 Matawan 690 Newark 778 Passaic 864 Union Cny
592 leonia 691 Metcong 779 Passaic 865 Union Cny
593 Madiwn 692 Teaneck 780 Freehold 866 Union City
595 Paterson 694 Mountain View 781 Peapack 867 Union Crty
596 Newark 695 Had<ensac.:i< 782 Flemington 668 Union Crty
599 Oradell 696 Mounlain View 783 Bloorrlield 869 Union City
604 Millington 697 Newioundland 784 Clost'" 870 Long Branch
613 South Rivet 699 New Brunswick 785 LiMIe Falls 871 Englewood
615 Middletown 701 Chatham 786 Andover 972 ATlantiC Highlands
621 Newark 705 Newark 787 Keansburg 873 East Millstone
622 Newark 706 Middletown 788 Flemington 874 Belle Mead
623 Newark 707 Somerville 789 Westfield 875 Sussex
624 Newark 709 Cranfotd 790 Paterson 976 Long Valley
625 Rockaway 712 Hackensack 791 Fa~ Lawn 977 N_arl,
626 Jersey Cny 714 Jersey City 792 Jersey City 878 New BrUl'5w,<.k
627 Rod<away 715 Penh Amboy 793 Seaside Park 879 Chester
628 Mountain View 721 South Arrboy 794 Fair Lawn S80 NENIi Brunswlc" """"'
\Q
631 Morristown 722 Somerville 795 Jersey City 881 Paterson ~
632 Meluchen
633 Mountain View
723 South River
724 Oover
796
797
Fair Lawn
Fait Lawn
882
883
Caldwell
New Brunsw'c'
""eo
~
634 Woodbridge 725 Somerville 798 Jersey City 884 WhIppany "'­
635 Chatham 727 South Arrboy BOO Flemington I::
885 Bound Broo'. \)
636 Woodbridge 728 West Millord 807 Hackensad< 886 CliffSIde "<:l
637 Great Meadows 729 lake Mohawk 808 Caldwell 887 Whippany
638 High Bridge
841 Had<ensad<
730 Clinton
731 Orange
812
815
little Falls
Rahway
SS8
889
Keyport
Fanwood
.5i:!""
842 Newark 733 Newark 819 New Brunswick 890 little Falls ~
643 Newark 735 Clinton 820 Elizabeth 891 Wyd<oIf ~
644 MOI'ristown 736 Orange 821 Franklin Par1< 892 Point Pleasan!
645 Newark

__-_._--
..
737 Rahway 622

Su.mmer /989
Madison 893

2600 Magazine
Btoom! leld

Page 21
SCANNING

by Mr. Upsetter phone and you want to fmd hiS


A radio scanner is a fun and frequency, program the fre
useful tool for anyone interest­ quencies I've listed into your
ed in eavesdropping on phone scanner, then call your neigh­
calls. This article will be pri­ bor. When he answers (hopeful­
marily concerned with receiving lyon the cordless l, scan the
two types of telephone calls' frequencies and you shOUld hear
cordless and cellular. your own conversatlor:
Although some of the old It is obvious that anyone's
cordless phones operated on cordless phone conversatlon
1.6-\ .7 MHz, the new ones oper­ could be receIved with ease. If
ate on 46 and 49 MHz. Usually you use a cordless phone, you
the base transmits both sides of shOUld be concerned about secu­
the conversation on 46 MHz and rity. It is not unlikely that
the handset transmits only one someone near you has a scanner
side on 49 MHz. There are also Uniden CorporatIOn. a major
phones which operate only on 49 manufacturer of scar:ners,
MHz. reports that there are scanners
The following is a list of cor­ in over four millIon Amertcan
responding base and handset homes. Think twice before you
frequencies: use that cordless phone
Cellular phone transmiSSIOns
base (MHz) handset (MHz) are also easy to receive The fre­
46.610 49.670 quencies allocated to cellula.r
46.630 49.845 phones are in the 500 MHz band.
46.670 49.860 Scanners that receive tr.e 800
46.710 49.770 MHz band are much more exper:­
46.730 49.875 sive than other scanners With
46.770 49.830 standard coverage Some manu­
46.830 49.890 facturers also block out cellular
46.870 49.930 phone reception m theIr scan­
46.930 49.990 ners However, in my locatIOn
46.970 49.970 (San Diego) I discovered a cellu­
Jar servIce tha t operates
The cordless phone transmIs­ between 451 and 459 MHz.
Sions on these frequencies have These frequencies are covered
a range of about 1000 to 2000 by virtually all scanners on the
feet. That's plenty of range to market. The company usmg thiS
eavesdrop on all your neighbors. system is cal1ed Vectoror:e
The longest range I've gotten is Cellular. They use the fOllOWIng
about 3000 feet with an indoor frequencies.
telescopic antenna. If you know
your neighbor has a cordless

Page 22 2600 Magazine Summer 1989


FOR CALLS

451.2875.4527625. 454.4375, transmits continuously on 4983


451.400. 4528625. 454.650,
451.500. 453.2875. 454.8625. MHz. People in effect bug their
451600. 453.600. 4549625, own houses by using an "elec­
4517125,453.8125. 454.175, tronic babysitter". I would estI­
4518125,4539125. 4553875. mate the range of these units to
451925. 454.025, 4554875.
452125. 454050. 457200. be short. about 500 to 1000 feet.
4522375,454225. 457.5125. Scanners have many other
4523375.454.275. 458.775. uses beSIdes eavesdroppmg on
452550, 454325,
452.650. 4543375 phone calls. If you happen to be
If you own a scanner I would a criminal. you can keep track
suggest searching the 450 MHz of the police With one. You can
band to see If there is a Similaralso hear air, manne, fire. bUSI­
cellular service in your area. ness, military. and countless
Needless to say. I was surprised other transmiSSlOns. Scanners
to fmd a cellular service oper­ are pretty cheap. A decent one
atmg on this band. I finally can be bought for about $100.
found out the name of the com­ Scanner World in Albany has a
pany after hearing the trans­ good selection and prices. Their
miSSion of a recorded message address IS 10 New Scotland
which said "the Vectorone user Ave., Albany, New York. 12208
you called is not available' Catalog is two bucks. Also, CRB
which is played when on'e Research has qUIte a few fre­
moblle user tries to call anotherquency directOries Their
unavailable mobtle user. A address is Box 56. Commack, NY
quick check in the phone book 1 1 725. RadiO Shack also sells a
verified the company's exis few scanners and frequency
lence. gUides.
While we're on the subject of
snooping, I would like to point GOT SOMETHING TO
out another interesting method.
Some people use an "electronic SEND US? NOW
babysitter" to keep track of YOU CAN fAX ITt
theIr kIds. An "electronIc
babysItter" IS basically a radiO OUR ULTRA-COOL
(usually FM) transmitter that is fAX MACHINE WIU
placed in the child's room so the
mother can hear the kid cry or ACCEPT YOUR DOCS
whatever from another part of AND DATA 24

the house using the matching HOURS A DAY.

receiver. Some of these "elec­


tronic babysitters· transmit on CAU 516-751-2608

46 and 49 MHz along with cord­


less phones. One near my house
Summer 1989 2600 Magazine Page 23
The Voice

The South African Systems such as voice recogni­


tion banking services are only
Phreak Crisis just beIng started. Overseas
Posted on one of our BDS's: calls are expensive and the
By the time you read this, charges are the same at all
the South African post office. times. Only approved equip­
which controls our sole telecom ment may be used on the lines
company. and which is directly (heh-hehl. although there are
controlled by the government. various places where we can
will have changed their method buy U.S. stuff (until they are
of charging. Instead of the pre­ closed down anyway).
sent method of not metering Because I don't have much
local calls, they will now work experience in the phreaking
on a pay-for-time basis as used area (I'm more into the use of
on out trunk calls. So instead systems on the end of the line),
of being able to stay online for I need information on possible
as long we want. we will now ways to get back onto the net.
either have to work out a way Should we not succeed in
of phreaking or find dedicated "breaking" our disgusting tele­
"unprotected" terminals in phone system, there will be a
order to stay on the interna­ lot of networkers who will be
tional computer networks. forced to stop.
South Africa's telephone sys­
tem is in its most vulnerable We should pOint out that
stage. We are in the process of many people throughout the
moving from the mechanical worldface the problem of timed
exchange system to the digital calls. i.e. the Zonger you stay
system. This means we are on, the more you're billed. Over
running on a dual system -­ here. businesses pay timed
hopefully easier to phreak. rates for local calls no matter
About 55 percent of the coun­ how close they are. But' we're
try is digital and 45 'percent certain that there is a way out
mechanical. for SAP's (South African
Our system is nothing like Phreaksl. considering that it's a
the U.S. We have just been new system with a potential
introduced to toll-free numbers for bugs. The most obviOUS
(we call them 0100's). solution lies in the 0100 num­
ConferenCing systems are con­ bers. just as many phreaks in
trolled by the post office. and this country use 800 numbers
are expensive as well as small. to bypass baling.

Page 24 2600 Magazine Summer 1989


of Our Readers

Payphone Query database that tells them what


numbers are screened. So if
Dear 2600: you place a collect call through
Great magazine! Just got my them. it could go through to
first issue and am going to ANY payphone, not Just a
order more back issues when COCOT. And there are still
I've got the money. If you could instances where a local opera­
focus a bit more on phreaking tor or an AT&T operator will
instead of hacking. us country screw something up and send
boys would appreciate it. a collect call to a payphone.
In regards to your Spring '89 The key is to keep trying. By
fortress phone article. I ask the way. the "real" payphones
you this: since private pay­ are now considered to be the
phones are put on normal cus­ ones operated by the BOC's
tomer lines. wouldn't it be (Bell Operating Companies):
possible to receive a collect call Nynex. Southwestern Bell. U.S.
from someone USing an AT&T West. Pacific TeleSiS. Amerit­
payphone elsewhere? The echo Bell South. and Bell
AT&T operator wouldn't know AtlantiC. AT&T is currently
it's a payphone. right? I've making payphones that are
heard of this working before. used as COCOT's. In other
Uncle Ho words. using an AT&T phone is
The key here is screening. no guarantee thai you are not
Any telephone number can be using a COCOT. The only guar­
screened to prevent collect calls antee is whether or not one oj
Jrom being processed. This the BOC names appears some­
includes your home number. where on it.
COCOr's (Customer Owned
Coin Operated Telephones. i.e. UNIX Made Easy
private payphones) are sup­ Dear 2600:
posed to be registered with the Thank you for printing Red
local phone company so they Knight's excellent series of arti­
can charge the payphone cles about hacking UNIX! Too
owner more Jar what is really much of your magazine is of an
Just a regular phone line. We arcane, technical nature and it
assume the phone company was a great relief to see an arti­
would install the screening cle written by a beginner and
automatically at that point. But for the rest of us beginners
that's not to say it won't work. about the basics of using
Some long distance companies UNIX. I do not have any expen­
still don't have access to the sive UNIX manuals. and Red
Summer 1989 2600 Magazine Page 25
You Too Can

Knight's summary saved me The ANI for parts of the 215


the trouble of buying these (Philadelphia) metro area is
manuals from my bookstore. 410-4100. For parts of the 717
Remember. information doesn't area code. it's 311. The ring­
have to be secret or complicat­ back for parts of 717 is 511 fol­
ed to be useful! lowed by the number you are
Thanks again and keep up calling from. Also in 717. dial­
the good work! ing 711 from a payphone will
The Micron disconnect it for five minutes.
Did You Know? Finally. from J.C. Whitney:
cat. #14YE8543N Security Torx
Dear 2600: drivers ($Il.00) -- these babies
There is good reason to put will remove the singe bolt that
return addresses on the back holds blue credit -card phones
of mail. While snooping in first to the wall!
class mail goes on all the time, S.Fox
any information obtained in Dear 2600:
this manner would be lnad­ The ANI for 619 is 211-2111.
missable in court. There is no Also the ringback for parts of
restriction on copying the out­ San Diego is 1-332-xxxx. where
side of the envelope. however. xxxx is the last four digits of
If the return address Is on the the phone number. Hang up
back, there is no proof that it quickly until a steady tone
was on the same envelope as comes on, then hang up. The
the "to" address. phone will ring.
Name Withheld Mr. Upsetter
Not until someone invents a Dear 2600:
two-sided copying machine.... The Spring 1989 issue was
Notes and Info the best in a long while! Glad
Dear 2600: to see you getting back to YOllr
Some quick reference notes: roots: phones!
Specialized System Consul­ PG
tants (P.O.B. 55549. Seattle. Crossbar Trick
WA 98155) produces very com­ Dear 2600:
plete qUick-reference guides for If your telephone line's cen­
UNIX. C, Fortran, and other tral office equipment is #5
high-level languages/operating crossbar, here is a way to tell if
systems. For $6. they will send an incoming call is coming
a qUick-reference guide for from within the same office
UNIX to you.
equipment or a different office.

Page 26 2600 Magazine Summer 1989


Write A Letter

Somewhere between 0 to 4 ences concerning Jerry


seconds beJore the first ring on Schneider, Stanley Mark
an incoming call. the telephone Rifkin. Neil Patrick. Harold
equipment's completing marker Rossfields Smith. Robert
will release the incoming call's Morris. or Kevin Mitnick.
trunk onto the line. When this Please address any responses
occurs. the phone line voltage to Buck BloomBeeker. 2700 N.
will momentarily drop to 0 Cahuenga Blvd .. Los Angeles,
volts. If you are monitoring the CA 90068 or call .213-874­
line with a high impedance test 8233.
set. you will hear a loud "click". JJ Buck BloomBecker. Esq.
If the phone line voltage was at Director
o volts for approximately 250 National Center
ms. then the incoming call is for Computer Crime Data
coming from within the same Tuning In Calls
office eqUipment. If the voltage
was at 0 volts for a much Dear 2600:
shorter time (approximately 80 I received your Winter 88-89
ms), then the call is coming issue and found the
from a distant office. "Overhearing Phone Calls" very
informative. Concerning short­
It is possible to build a cir­
cuit that would sense the 0 wave radiO listening. I thought
voltage level time and indicate your readers might· like some
the type of incoming call (same hints on tuning them in. First,
office eqUipment or distant sweep through the band with
office eqUipment) when the first the beat frequency ose. on. If
ring occurs. you leave it off, then you could
JWC miss the entire band. Second.
Since we happen to be on a only try to adjust the BFO
#5 crossbar Jor at least another when the stronger of the two
year, we could use such a voices is speaking. If you only
device, if someone would care receive the base station. think
to design one Jor us. of this: you may be out of
range of the ship at sea. Also
Stories Wanted note that the eqUipment is not
Dear 2600: really fancy. I got a surplus
For an upcoming book on receiver for $3 and use it with
computer crime in the 80's and a piece of wire duct taped
beyond. I would welcome corre­ around my room. I can receive
spondence from anyone with signals from around the globe
anecdotes or personal experi­ on it. From Washington DC I
.--______ Summer 1989 2600 Magazine Page 27
Summertime

receive ship to shore calls that Just Say No


must be coming from
Annapolis (39 miles) or Dear 2600:
Baltimore (36 miles). This Here's a note of possible
assumes the ships I listened to interest.
were in the Chesapeake Bay. Congressman Kweisi Mfume
CyberPunk (O-MOl introduced a bill (H.R.
1504) that would make it a
Austrian Phreaking criminal offense for persons
Dear 2600: under the age of 21 to possess
In Austria we have a very a beeper. Presumably, this is
sad situation concerning the because many drug dealers use
phone system. Our system beepers to keep in touch with
uses pulse dialing only and their customers. But banning
dates back to the fifties. the use of an innocent piece of
Charging is being done by telephone technology by the
hand every month (!!). They young is a pretty screwy way to
photograph the charge coun­ deal with the drug problem.
ters (mechanical of course) Also, why age 21 instead of 18?
every month and the clerk What happens to college st u·
types them into their 15-year­ dents and others trying to earn
old computer that prints the a living as messengers. field
phone bills. technicians, or some other Job
Collect calls or any of the requiring the use of a beeper?
other features you "enjoy" in Maybe we should lobby against
the U.S. don't exist in Austria. this bill. (H.R. 1504 was
However. they started intro­ referred to the House Commit·
ducing an MF-system in some tee on Energy and Commerce.)
parts of Vienna recently and Phil
blue boxing seems to be safe as We certainly should lobby
far as I know. The situation is against this bill. It's another
improving. crystal clear example oj high
Hacking in Austria is pretty tech phobia. This time. instead
boring because phone costs are oj trying to figure out why
astronomically high (1 minute drugs have become such an
local: 50 centsl1!). Most sys­ essential crutch to so many oj
tems do not use direct-dial but us, the authorities think that
leased lines for communica­ making a small bii oj technolo­
tions. gy Ulegal will somehow solve
WM the problem. For one thing,
beepers don't make drug deals.

2600 Magazine Summer 1989


Letters

People do. Beepers are a tool. some in-depth telephony infor­


like telephones. notepads. mation that I can't quite grasp.
pocketbooks. and automobiles. Subsequently. I halfway built a
Should all of these be made blue box. but became disinter­
illegal to certain people who ested for a while. When it came
might use them to deal drugs? time for me to leave my job. I
More importantly. these well­ decided I'd better finish the
meaning clods are overlooking thing while I had the facUlties. I
a grossly obvious jact. Dealing almost did. but some of the
drugs is illegal. So how can final pot tuning was left out.
they expect anyone whQ illegal­ Fortunately. an electrical engi­
ly deals drugs to suddenly neer (and satellite pirate) at my
honor the law and not carry a new job had a complete elec­
beeper? The only people who tronics lab and. ironically. your
wUl be inconvenienced by this address. So. here I am with a
law will be the law-abiders. completed blue box (that won't
who obviously are not the tar­ work in most places. I am told).
gets oj the lawl Because I am so terribly far
A Myriad oJ behind the times, I wonder if
you might answer some ques­
Questions tions that are probably laugh­
Dear 2600: ably simple to most of your
My path to you has been readers? Here goes:
long and twisting. beginning 1) Why don't blue boxes
with me reading the book work anymore. and if a place
"Hackers". From there. I can be found where they do.
tracked down the infamous why are they so easUy traced?
1971 Esquire article, "The 2) One of the guys at your
Secrets of the Little Blue Box". office alluded to the fact that
I became interested in blue free phone call1ng is still done.
boxes and began searching for How?
plans with which to build one. I 3) Do red boxes stIlI work?
finally turned up a chief engi­ 4) Have there been any
neer at a television station who recent arrests for phone
had a 1975 CQ magazine con­ phreaking? If so, was the pun­
taining red box and blue box ishment severe?
plans along with the MF tone 5) What parts of the U.S.
listing. I also found the tone and Canada are hotbeds for
listing in "Reference Data for phreakers?
Radio Engineers". along with 6) Could you suggest addi-

Summer 1989 2600 Magazine Page 29


The Letters

tionaI reading on subjects (grounding the mouthpiece to


addressed by 260m (I.e., hack­ the chassis) would work. He
ing. phreaking. petty th1every. seemed to think it would. Was
and the like.) Maybe even mag­ he right?
azine articles which are more 15) I downloaded an IBM PC
contemporary than the ones I program which was supposedly
have. a newer generation of the dialer
7) Are the original phreakers program used in 'War Games"
and hackers that I have read (same author as that program).
about still active? It supposedly only worked on
8) The 1971 Esquire article an IBM PC (no compatibles. no
made reference to numbers XT. no AT). On my Wyse 386. it
that could be called for free actually went through a set
that set up cross-continent range of exchanges. but it
conferencing. Fact or fantasy? wouldn't selectively log any
Are these numbers still in exis­ computers that it found. Do
tence? you know of a program which
9) What is "TAP"? (in refer­ will do the task on other com­
ence to the Autumn 1988 puters?
Marketplace) 16) Are there any sources for
10) Are there other publica­ IBM PC compatible hacker soft­
tions like 2600 which are ware?
devoted to things that the gen­ Well. I am truly an amateur
eral public isn't supposed to in this field, aren't I? I thank
know? you in advance for your help. I
11) What is the favorite com­ have enclosed some postage for
puter used by the modern-day your reply. Please don't print
hacker? I saw much reference this letter. because it will just
to the C64. which I thought advertise my ignorance.
was a kid's computer.
12) Do you guys have a large Not if we don't print your
following? How big? name and location. it won't!
13) I understand that eaves­ BeSides. we believe there are
dropping on cellular transmis­ many readers who have these
Sions is pretty simple. What same questions. Let's go
about calling out for free? through them one by one.
14) I remember asking a 1) The reason blue boxing is
telco friend of mine if the trick gradually grinding to a halt is
the kid pulled with the pay­ because oj Common Channel
phone in "War Games" Inter-oifice Signaling (CCIS).

Page 30 2600 Magazine Summer 1989


Never Stop!

Simply put, this system sends strated in the Spring issue.


the signaling over a data line, 5) Phreakers are linked by
separateJrom the voice line the telephone lines. not by location.
caller is using. So it becomes 6) Look through this issue
impossible Jor the caller to and you'll Jind some reIer­
send his own signals (blue box ences. We print them as we get
tones) because he is unable to them.
access the separate data line. 7) If you're talking about the
If you can Jind a terminating 1971 Esquire article. we'd like
point where eelS has not yet to assume that t hose people
been implemented. blue box have done more in IUe than
tones will still have an effect. Just make Jree phone calls. We
But it's easy to be caught consider anybody to be still
because oj detection devices "active" who believes that what
that sense 2600 hertz tones they did in the past contributed
being transmitted. (You need a to what they do now.
2600 hertz tone to seiZe the 8) You can bet your bottom
trunk line and gain control oj dollar that those l;umbers are
it.) It's also possible Lo be no longer in existence. Bul
caught making a very long call there are plenty oj alhers to
to directory aSSistance, which take their place. B!/ ilwesUgat­
is something there really isn't ing the sources. !/OU too shall
any good excuse Jor. Many find them.
phreaks use directory assis­ 9) TAP was I he original
tance to start a blue boxing phone phreak newsletter thal
adventure. Our 1985 issues started ouL as a Yippie publica­
have more inJo on this. tion. It slopped publishing in
2) Free phone calls can still 1984. although Ihere haue
be made by Jiguring out access been attempts to revive il.
codes to the various long dis­ 10) There are plenty oj mag­
. tance companies, making third azines thaifocus on things that
party calls, or using extenders you're not supposed to knOll)
(usually 800 numbers that give about Since we began in 1984.
you an outgoing dialtone). however. we have !Jel to see
3) Yes, red boxes still work one that conststenll!J covers
quite well. what we cover.
4) There are always busts oj 11) The beauty of hacking
some sort in the news. The lies in the jacl that it doesn't
punishments appear to be get­ matter what kind oj comput er
ting more severe as we demon­
(continued on page 4fi)
Summer 1989 2600 Magazine Page 3/
tips
by Dr. WIlliams local and regional picture. Then,
The phone company will indeed publications like 2600, Telephony,
go to extremes. Or so they say. and Telecommunications help tie
I've been told that they will prose­ up the loose ends and fill in the big
cute anyone who goes rummaging picture. Indeed, as far as tele­
through their garbage bins. I don't phone information is concerned,
know; even though by now I practi­ the world is a gold mine!
cally make regular rounds through My general rule for deciding
their garbage bins, I've never been which bins to raid is this: the big­
charged. That's not to say I've ger the telco building, the more
never been caught -- just never people work there, the bigger the
been charged. By using common brass working there, the more I
sense and discretion, I've never stay away from it. I like buildings
gotten into trouble. I want to first that are small, have a lot of grunts
tell you the benefits of exploring working within, and are out of the
your local phone company's mainstream. I let these rules guide
garbage, and then how to do it my raiding activities.
without getting into trouble. In my area, there are some big
Thrashing though the telco's telco buildings with art deco deco­
garbage bins is hardly a revolu­ rating that have parking lots the
tionary notion. Articles on the sub­ size of malls and have special
ject have appeared in both TAP
and 2600. I hear tales off and on
about the rewards other phreaks "The majority of
gain from trollopping though their
local telco's garbage bins. I also
phreaks have gotten
see text files on various BBS's into trouble by their
about trashing.
As far as I'm concerned, there own shortcomings. "
is no equal when it comes to the
potential payoff of my telco's
refuse bins. Where else would you teams of workers assigned just to
go to gain valuable information think of the next excuse they can
about the phone company other use to get the state utility commis­
than to the phone company itself? sion to raise the phone rates. As
I would estimate that about 80 per­ far as I'm concerned, these are
cent of what I pull out is rather poor targets security-wise. First,
mundane, boring, not practical for some of these buildings have a
my purposes, or useless. But, oh, private security force working for
that other 20 percent really pays them, day and night. I'm sure
off! It gives me a sound idea of the these minimum wage workers

Page 32 2600 Magazine Summer 1989


on trashing

have nothing better to do than to a warehouse-type of exterior, and


make an international incident of have a lot of company vans or
finding someone going through trucks in the parking lot (as
their garbage. The information that opposed to company cars). These
comes out of here is likely to be buildings may house switching
more sensitive; hence, a more equipment, maintenance equip­
developed security system (which ment. computer operations, or
also may include shredding of doc­ storage facilities. These building
uments). Second, the access are an attractive target for several
holes into the dumpsters may be reasons. First. there is usually no
limited. The chute to the dumpster security presence at these loca­
may be located on the inside of tions. This is a definite plus!
the building. Or, it may be the case Second, little or no people tend to
that the dumpster is a king-sized work at these locations late at
one, which requires a semi-tractor night. No people means no chance
to haul it away. This may translate of being caught, almost. Third, the
into a more difficult entrance into police presence is not as strong.
the dumpster. Some of these Fourth, the garbage containers are
dumpsters also have compactors easier to access and do not usual­
located inside of them, destroying ly have any shredded material
a lot of documentation. Third, typi­ inside. Although the information
cally more people work the mid­ may not be as good, I'm not
night shifts, so your chance of greedy; the potential payoff justi­
being spotted by an employee is fies the risk.
also increased. Fourth, these Equally important to me is my
buildings tend to be located in the dress. Simply put, I try to dress
business districts of town. This like a transient rummaging for
may mean a more overt police food. That way, if I'm caught, I'm
presence; at the very least, a more likely to be told to hit the
faster response time. Fifth, they're road and never come back. I have
more likely to prosecute people a special outfit I use just for this
going through their dumpsters for purpose. I went to Goodwill and
"trespassing". So, as tempting as it bought the scummiest jacket they
is (I'm positive a lot of good docs had there. I also bought a pair of
could be found). the reward versus Levi's that had enough holes in it,
risk ratio is too high for me. The including the rear, and a pair of
increased chance of being caught worn out, out of style slacks. I use
does not payoff. a pair of worn out tennis shoes
My target lies in the smaller that I've used for two seasons to
buildings. These buildings are usu­ mow the lawn with. I also wear a
ally physically smaller in size, have (continued on page 44)

Summer 1989 2600 Magazine Page 33


THE SPRINT GESTAPO

by Larry P. The Sprint guy took pictures. The


Yes, Sprint has nailed another detective and the cops looked
one of us. Hopefully, this article through drawers in a random fash­
will help you know what to do if ion, missing over half of them.
you happen to get nailed by the They only cast a brief glance at
evil telcos and maybe even get a the papers on top of the desk.
laugh or two when you hear how They never looked in the waste
clumsy those types are. Some paper basket or behind or under or
information has been omitted to below or in things. Only part of the
protect the identity of the busted desk. In fact. Mike remarked to me
one, since his case is still pending that they looked bored and
and this information could jeopar­ seemed to only want to get the job
dize his current status as a free finished. What a professional atti­
man. So, I'll call him "Mike" for tude for law enforcement agents.
simplicity's sake. Here is his The Sprint executive then said,
story.... "Load your hack program. kid!" to
One night, Mike decided to boot Mike. Mike claimed not to know
up his Sprint FON (a trademark of what disk it was on and said that
US Sprint Corporation) hacker and he had to find it first. So while he
dig up some codes. After a while, was pretending to find the right
he had several of them. While he disk, he formatted the disks with
was hacking them out, he was the hacker programs. Right under
being traced by US Sprint, who, the noses of the dumb feds. After
after getting poor Mike's phone formatting a disk. Mike said,
number, notified state and local "Oops, wrong disk" and proceeded
authorities who proceeded to get a to format another, until all disks
search warrant. The very next day with functional hack programs
they went to his house before he were deleted. Mike then claimed to
got home. Ringing the doorbell, have found it and loaded a crash­
Mike's dad opened the door. They prone, nonfunctional program and
asked his dad if Mike owned a said, "See, I didn't hack your
computer and he said yes, a stupid system." They had no evi­
Commodore. Mike got home at dence, since he had formatted the
that pOint, and they showed him disks with the codes on them.
the search warrant and entered What clumsy cops. They didn't find
the house. his notebook hidden in the base­
Once inside, these five men ment.
(one local Forgery Squad person, The IBM specialist then pro­
some Secret Service agents, a ceeded to attempt to dismantle the
U.S. Sprint executive and his IBM Commodore. I say "attempt"
specialist) went to Mike's room. because he had trouble discon-

Page 34 2600 Magazine Summer 1989


STRIKE AGAIN!

necting the computer from the since the pattern can be tracked. If
color TV, the disk drive, and your pattern is tracked, the system
modem. The screws must have might anticipate the next number
confused him. He ended up rip­ you will try, and if it is a valid
ping apart the connections, no account, turn it off for the time you
doubt damaging pins and wires. try it only. They will also print out a
The Sprint executive then put the card with your phone number. In
equipment into garbage-type bags no way am I implying or suggest­
and hauled it to their dark blue ing that it is proper to commit any
Cadi"acs. On the way, the execu­ type of fraud. If you decide, how­
tive dropped the disk drive onto ever, to commit fraud, heed my
the ground. Mike told the Sprint warnings. Now Mikey has some
fellow if he damaged it he would things to say:
pay for it. What was his reply? "Don't mess with Sprint'" Wise
"See ya in court, kid!" Laughter fol­words indeed.
lowed. "To Phreak and be safe, keep
They then took Mike to the your disks and notebook out of
police station and booked him your room and well hidden some­
under a lower class felony for ille­ where else. They will only look in
gal access to lines of a telephone your room or near the computer."
service. Mike hopes it will be They charged Mike with a
downgraded to a misdemeanor, felony. A felony! They don't charge
and it may be since they have rapists or muggers with felonies.
such little evidence, except for his Why did they take his TV and tele­
TV, his computer, and his game phone away? What did they
disks. They took Mike home at that expect to find hidden in it? Hitler's
point. The next day in school, brain? Why did they disconnect his
Mike's popularity soared as people phone for two days? Doesn't it
learned he was a felon. make you feel secure with such
Mike and I want to leave you competent law enforcement offi­
with a bit of advice. First of all, cials handling things?
don't hack your codes at night. I will keep in touch with Mike
That is when the fewest people and let everyone know if anything
use the network. Instead, do it else turns up.
between 7 am and 10 pm. Also,
use multiple target "dummy" num­ CHINESE SNITCH NUMBERS

(used tor turning In "counter-revolullonaries")

bers. Don't hack the codes To dial from U.S., preface with 011·86-1.

sequentially. Have them done ran­ 512-4848 512-5666


443-292 256-3483
domly, but also have the program 256·7220 372-316
automatically reseed the random 664·215 665-088
number generator occasionally 371-554 8734314 872-179
Summer 1989 2600 Magazine Page 35
The following article ;s reprinted/rom of its rolings.
Eng/anJ's Financial Times. It originally The Spanish service costs double the
appeareJ last summer, so please lake French and even the West German
that into account when coming across ones, the Brussels report said, and its
relerences to "this year", "next year", rate of wrong connections was the
ek. We appreciate it. highest in the Ee. Last week, it emerged
Ity Peter Bruce that the Government had appointed a
As the Spanish summer gets hoHer, commission fa study Telefonica's invest­
so do Spanish tempers. And with good ment plans for next year -- an extraor­
reason. dinary move, considering that
In the space of just a few months, it Telefonica is a private company.
seems that Spain's telephone system, 'rhere seems little doubt that the
once one of the most efficient in head of Telefonica's affable chairman,
Europe, has all but collapsed. Mr. Luis Solana, is on the block.
Spaniards lucky enough fa have tele­ Although a member of the governing
phones find themselves unable to moke Socialist party, a friend of the Prime
calls or are frequendy cut off when they Minister, and the brother of the
do. Education Minister, Mr. Solana has
On average last week, it was taking seemed desperately short of support as
nine or ten at1empts fa call London from the public outcry over Telefonica's ser­
Madrid. Getting through is only half the vice has risen.
problem -- domestic and international Opposition politicians have had
lines crackle and rasp constandy. great fun with a retort attributed to
Some 350,000 people in Spain are him, to the effect that "perfection is fas­
wailing for Telefonica, the once-vaunt­ cist" •
ed telephone monopoly, to install tele­ A colleague recently arrived in
phones. Most will wait at least six Madrid and trying to order a home
months. About 25,000 Spanish villages telephone from his office failed to find
do not yet have a public telephone, anything democratic in being told by
according to some reports. the Telefonica functionary at the other
A European consumers group in end of the line: "Sorry, I can'f hear a
Brussels, in a recent study, said thing you're saying."
Telefonica was now taking roughly ten "So whose fault is that?" he wailed.
times as long as its French, Dutch, or Mr. Solana, confronted with fadure,
Danish counterparts to install tele­ has not tried to disguise the scale of the
phones. problem. The waiting list for telephones
Other than Greece, Ireland, and will probably grow, he has said, to
Portugal, the study said, Telefonica 430,000 this year.
appeared most frequendy at the bottom He has promised that more new

Page 36 2600 Magazine Summer 1989


lines will be in place by September. ated there. The Russians have also just
Spain has about 15.5 million tele­ signed a deal with Telefonica under
phones and 10 million lines. Telefonico which the Spanish are to install a rural
plans to install 1.5 million new lines telephone network 600 miles from
this year and 2.5 million more next Moscow and a public phone system in
year. But there is no saying whether the Soviet capital itself.
that will improve matters. Mr. Solana's comfort in the short
Telefonica has been caught wholly term at least, is that even worse trouble
unawares by the explosion in tele­ at the Post Office diverts some frustra­
phone demand in Spain. In the past tion oway from Telefonica. The Spanish
two years, applications for telephones postal service estimates that up to 2
have grown by close to eight percent a million letters and parcels are, effective­
year, a huge leap on the average two ly, stuck at post offices around the
percent growth a year since 1970. country.
Mr. Solana has said things will be The postal unions say this is non­
more normal next year but some sense -- there are at least 11 million
Telefonica officials suggest it could take pieces stuck in Madrid alone.
five years. As Spain approaches its first presi­
Appearing on Spanish television this dency of the European Community next
weekend, Mr. Solana said: "My main January, the chaos in many of its insti­
mistake was not having believed that tutions is going to become embarrass­
the Spanish economy would be going ing. Europeans who want to complain
as well as it is now. I did not believe about it may, however, have to fly or
statistics forecasting Spain's economic drive to Madrid to do so.
boom." The service was not a catastro­
phe, he insisted, but it was "improv­ 150 Manuals, Software. Services on
Computers, Electronics, Energy, SecUrity
able" . Weaponry, Rocketry, Financial. Medical
What irks Spanish consumers .. and some very controversial! By John Williams.
as seen on CBS "60 MINUTES", Send $3
in Barcelona, business groups are for both catalogs. CONSUMERTRONICS,
warning that the state of the telephones 2011 Crescent Dr .. PO Drawer 537,
Alamogordo, NM 88310. WANTED: IBM
is damaging to competitiveness -- is PC ATiXT/Compatibles, hard drives. laser
printers, electronIc components; and contro·
that this trouble has arrived along with versiai, survival and computer information.
record profits for Telefonica last year etc. Please send descriptions, condItions,
prices. ALSO WANTED: T,ght-lipped, free·
and higher-than-ever investment this lance technicians and mission specialists to
year and next year. design/build/do SPECIAL PROJECTS,
other eye-popping equipment (mostly elec­
What hurts even more is that Mr. tronic particularly corl'puter, TV and phone
Solana is about to spend some of that types). Send resume (don't phone). We've
got more business than we can
in Argentina, where Telefonica wants to would like to farm projects OUl
buy 40 percent of a new PIT being cre­
Summer 1989 2600 Magazille Page J7
,,,i• 1I",.,.c.,. h
'rot....'
,.HASCn.nt.,
.
•••••tt..........................H .... t ....... Ult...." ...t ...............

• I
I
1
I
......
I I
11111
I I
II
I II I
liefa d. .'trdiOi
OIl • ifU COltUttf'
'1IIon)"),

ltv.lintCS1,

S.I.toUn},

I
•• I I I I I I 1.,1..., .. ly tM hlJI.. (·3 (mlru , _ _ ,

-.-.-- . .. I
I I I I
II
I I
I I
1"'11
I I-
, I
I II
I

I
I
I
I
~illllf1Uta• •
•• til. wl 4!Mit 01
t .•. SoHlUn JIh,/Ai•••

St'_C,IUlI,

h'.lIJI,t 4 11 J
St'J,H1I1,

•• I I I' "I,

,
"I,

-- .......................n ........................................., ...... t •••


'''U..". • • I
St(coum, '"
.... ,.,t..... *f I I tel '",t'tllt I . , I," JIU it.,
-.-...........................................................................
--I MJ'''''. • I
St, e"UI',
I ruml tlttltll ........
" "1

, ',':U"C'I
St'.C.HII'!
I I II II
'"
Pvt.lIJl.(·. • t • I
mill ..
~""'" ",1 '"
-.-.
j ht. tUtl frOiltU hf,.r'SILOOI, 141.1 1t'_C'HlII,

""Jh.c·! WnlEt • • 'II

1tv.1Ift'U),

-. ""hll, hMiIl.... "lnUII ., t., ~ ... IflU, tit Ifl_t.'"fll


... • iatlltt.. • 1 i"htMU" .. 'Utll il I (",,'If IfI'" (II 'rt..litltt"J SS!mSS'I,

- • H: I (f'I1Nt I t t _ !!!! rul " .., .. il lit.... undll St,_,.HI4',

- t 'Of' •.,., ..... l . , KI..tiUe ,...JMII, .._,


tit "'fIllh.. ,., Lb,,· I II " "" II "I

- • .f .... t. e. .tw apt. . hn --.. .f yh...... """ tilts St':'o'II4I,

-. " . . . ta tt_"I, ,,"Ua, III tIlCl•• ia .It.., .. _1 frlft' hl.lhtC- I 1 fI III II II a A "I

..... ...itt'.
-
-- • til 111ft' etM art 1M ."aiUH lfitHv:t VflU.. cOUllI .1 till S.I..ttHICl,

- • cntili! ew.... bt win_ ,.,IIW.


It t......t .t I .i.t,UM; I , ....,. tu ,iJilt •• hl'
cM H .,.UN for "
lfICifJi.. t.. ,.....1 ..., til, _. sMt1. ~•• i.U,iktH.

'" lI.."
St.:,.11I1I1

", lI.,C' I I
, "! !

I !
mlSSSS",

S",

-. tItC.tH If "'IU" II, ,ntt.. h tit f,UOWllI _ I I I ~


Stt:,.HlIII

ht UN(f 1 I S'lt
ltff .,,' Stt:c.tnOt

- •
.
-. .- •
-- .
r••, "fUn.,
1m itUi'lft ...

&I. hIlt IV M.

Vid.,-il ...
"'JIMC"
....lI..UlI
St'_Colllllll

P.'.lhlff".t • ..", In
". 'h,t..,.tnfl

'fI,l~r'},

SilSSSSS' I,

- .........H ...............................H •••I ......H .........U ...III.H

,"Uftt. C"tdJtfll"~ I

,UC"I 1MS I .... OItti fint . . litH loot; '" ,r.t CI" .. t UMUI.t1lII tu' f d nilla~I.,
~......i.","., if th H(lIIIt u, aln." .,'" illfKin:, It will "tltlt
.... W. l' tlle
h tow. tAfectill.
Ii•• ,recMurI dl,. shUt "1 ""I 01 It, "'UM ,U' ~~ • hoI... ~.'" 011 _"HI U 31, ,_ i",d" or ....

_. S,nH t lIAS.
~ .....un 1 a..c.~nfl..... t au._...~lotll.Cot, ltul.JopaJ:-,

t._
I' "Ur..CluJ.
,rOURU Ckd}lnt)"UI'vtf t ..t 100110) is
'"' I Shh,U•• 1Jl1 - Ntl. fl,.:t lin. 0' lOl".COft.
lnt tal"." ... ,f Hnt liM lit lotII.CtJI.
,--------_.------------­ i

""I._...n.,i.,laJU" ·UIIII.ctM·lr
-- lin' IIICh,.... II",
1ii,1I lO1" t_
- 1\, followi .. MeIUI tn nnOld lOl"I' mtt i.,t Jr. . . . . . . . It

111M of JOe lI..tI ,. tM

•• 'fit" . . U.,. _... iatK,tf. toIlliftt .f 3M ••, III"" to be ..it...

"'~lIfI'(lotil, tnt, lHUf

tlett{lottlt,

tf Ttlt \I " . " ; . UfttI4 t,,,

t", 'u, Jht.,f". It MU,U . . . . . r Ittl"tI ••')f


,h. MHIT :- raj"" - «eM .b•.., ll1l1dtd.
,j,flJht I htr.lhtJJff'

l1\" .llll,UI I .,tlfflt '" tt


Utvtf ,II: T,.,.

leti. t fU.)""
... ill

l41~ 1 fU')"'l
It(l,ti.
Wttttlw,lI}
~~ Error Un"" I
lot0fl2 I fU')"'1
- ~tfol patH' itt. if itO
SIlJ I 'iI•• T""
.....,:- h'-I lOlll.CtI' fu.h. nit ,_icat"
T..,: Shlll,fI •• ." -.. Ur,t tl" wort "1(8"_
hlt~til'lt I Sbin.n....'.

tnt 1 IntqtfJ

lit I hot'''l

-.. IIfIIfttt.,
110ft I, first ISttltH ......rlie-II" 1((otlIt, \"'11 pICKHan
~* it uU" h cdtr t. Cfttt. I "" lOlIW.ttlI. III, olf tOStl.cr. II Mt
-- m.,,,",
-- l1Ih ,t..h Jf«'"'' dran tltt 1('''' •• VT-'M .... ttMM .'"_'''
_. , 'tn,.,I, I....... 1ft,., 1\h h 41,,1,... 1ft" ••• wor••••
~- S.r". : tMM.
-- fbttltH n. h,ttll'l" ,fOCHutt 'tt.)ftilJOftIlJOI it

iltit

-- Stnn t IIIAS.

Page 38 2600 Magazine Summer 1989


- IK1 CllHlliJ ",ldIM iill tnt •••
,.t~U"fl"OII, '. IUt8(
"'.U..tl..... '. . . . lII.tA"I,
t_.,·), _. £'....11 'lit ICC."",,"
".IA!.

',ut,(b,tll, ht}U" "l.Gln,a:II"),

,.. 110 I..'

I..,
.- SU, ,II'
_••,l_.teII ...
I'" )101 I. III.NI
-- Iltl .Ior" win
MJia'tLOIh, '. '" MIIS·'1
IttJht.fHt "lr.U., hill)
"'.U..'l"... I'
"1U11I11ISI;1 SlIIOIfmIIIlIJ.IAI'),

ht.UI.(LotU. '. SII Utll

",I.."
I..,

~- "AIJ\IfIJ t.tlndh'... •
-- ... "I It I.. Ilu' K'.....

Ptt.U..(lOlu t '11M 1...·)1


If _tt £,oj " rll.tSlllI ,"'"

"",UH(Lotit, '. tuI6Or~, IttJ1MiSHi, ..I,_UIt, l..U,


-. lit • 1ft '((_' .... b_

1.., I- "tltJI.U.. 9l1


..- ....... It." ,. t"'~

Oftk'I••• ,
ifrn: Ituu...

CI...Rot,a); II lis" _h_,lh ( lot I"",

... JIlait.."'Jottll*CMJ Utlf Jtqt. 1- "ff


J ..." • 1J
lMf_lhtflJutJ....fI) til '..,1
- If I(c...t ja T., !Ill air'."
-. i.'ed., .. w 41' ftt t1cttl
.. ~ " " Un IfU,. t...... 'li.
hUt...., '. nn lMS.m ')1 -- .",..1 I, IN 1111 Ii ..
-- 1.1,,10. " ~.!IIIL
lot. \14 ,'OfUHIJtt It,l. of
-. flit ¥Of.
it tlft,ttC tid: H.. tH .'" ' . i •• 1. "fHftt t.. WI, -- lIlfCcoltA1 til, (tltt.at: ••
- t.,in HiAt Hftt t. UIIt Kcoul, eu UII:I.t. it "" t. i", tndm, --lUt ttt•••
-- Ii . . tf(th" tit 'Iff'
fret' prUnltt Knill. It _ill ••t _ tilt
-- .v.
--1._." ,..18 to t*, f..-, ,a LM.".•
m. it «Iff.,.. t
"Oll...lith it t'.t
'ot
.ltt! Htwt, H ",hinH t. t.n.
.It'
-- for lllt ..,. 't ",t ".,.,IJ. ..1 ,,,tH' lIlT ,UII t

J'<Ktftt' ..'Jotot....t It
•• fA U. ,'I<tli.. n...
SElI.IIlltl_
l~it: Ot " " . . . "I<ml..... t.,
'nU.. tI
Ntl.

Itffjtfltt' ,••,

o,.,tlOfOlll.I.JI1',"ta...·)'

-- ...t, '"' tlilt tit. . . . . . . . -.t


nil
-- Ita" tOld"" tut if Itt IMlf t t.l. trut. Me ,t."
lI. ttl ltft1. Aft... Inti",. I

-- ... ",In m•.---" 111'1" ,_,n.' .... 11.. ,,,.1. wli.


''''
H fI,t (l'IiJIfJU,ttot;otJ} , ... ..- hurt ttl om t_
-- , dtldon tMt,.ltU.. 'ut (0I1i tUIf "" 'wUtff .1Ift'.
Utt,_l.. ,t_ "u.."..
l tfl,tk • 11 UllaI.WI.I,I...
-- . " . KCMftt ItIf to to .1
IttJh,tl..1I,.1, IfhoI'Jtn" LnOJ tlf,' trU,.
--9(.. ,....,••

.,,, U'" ~lI,tt\ktr J,ffltt"l " hh~lh'tI ..IJJ


,nC if I

"U; .h,",",
... II,
CloHtSII!)1
.ltdlt<lfll;
tlotf(UliDI'r

ne"ll.,Ofttll
,titl

'IC"UM (tn, holltr I

.....th,n -) MIll, It IttMOlt.W nhtttl ",d••lr, thttt


" •• '1

-- ....., ."e",l" la'_*".,. """"


IIc.,tloa
-- [n., ••••11t 1

vIltllt''',,-)"II, -- I. Uti of .,., 'f'" Uti .n.".

fII''''._.
~. o..tl .til tf,t t. '"
tf tit, untnt
hot .N' 11 .IFlli, t. tN UM • •
.et_' .... 1II.lrt"

~.I.,
"'a, 'Ot. hOI i.. . . . .
-- lUff "'. It: tltt,t.. aM tMhol nhut " lotll.elll. , Itt mt

tu '"to
If".'
0-

-- n "t•••• Iott... )UN .. t~. 'Hilt If -. h .."ltH ..... l_.tfaI!. l\" ulll , ..U.... 'N' Htltl

- tM mi. fH -"Ud, ted tUtn •.,h"tU• •1 Itt. (...... ',",

-- h.,flh I ..'..l......at, Itt._.

--1tfnf. I !MS.

-+~ Ittt i '"' It I fl••' .\1(\ ktlt 'liit II• • f eM ""... I(tlllt "".......n•.l.....Cao I •

•,1.., ,,1ltKIf rr_ ".N'. n 11 '''I,," t. ttt__•


Nth
,.,,­
........ f,., ~w '.I(..
t ..1m ,t....,..1It_"'H••.

..,.t........,

--~:~--.---..-..----..--.------.---..----.-....-.-.---.... --.--..----.
for t I. I ••hlt J",tll -- l ... II.... If. ., " ,,<1,1..10. -- .,..1. I'" l_.1M 1110 to I~" II It • 10 ••" ,11_ ... ...

I..,
""'...lhUII·I... ' ....
MSWff ,-hln,
.... If ..... an.,. ,_
. lI, .ht..,. ""
~
t. UllllCt....
I.'.d"~ Itt "'ltM
..- ,,-centl I.f.dttl t"t If" fwd"'fI •• '~J.

-- 101. 1...1 .1. l _ . " II ,..," 'J '" ~.teII. II _ h i...


Iff.,
-••f fU, .... t . . tnn ytt.

f'U, t. ".,., Iht,.

.... 11'
t...t.Il....Z, IIII}II•• ~.IM'I,

... 1""

... t>fttl

'or
1",
I I. 1.. _.l..,I' -'l.., II.... NU" "'IJ,

*- l.dMI", Nt ..hiu Int

"1.U..Il....I ......It.lml' '-111."', ... ,1... I .... I •


... 1..,1 -- , .... l_.IM.

tl...lt...."1

.. ~ ".01, tl, IOtt l-whllt 'f«....". .nt (ltc' ••U' KC_ lINt
tl .....U._l...._CN!

-- I.... It 1lIJ.'" ......


II Illot u" ,... ,.1.<1.. " ..III.. ,.......
..- Cti:t<:t. It .IU t... • Hi .,htf,dt4 ..... II tH Itt' tlft.l_ til
-- l_.tlt "'I" will ,..,... I"" ""...11... _. IItrt ttt,b t.. (oft for WI .•• ,
........II.tI!.<I.

-- Iff'" , ..n.J.....coo.

"oc.....
.,,1• ~.h

.,..I!MI, I'Jllt, 'R.IAT'.,

t"It.tl....., ... J' ••, '1._.totI~),

Summer 1989 2600 Magazi"e Page 39


,,,I.
a.,dJh.t.t_nHII .... Qld t. '" It .h•..., 1_'l(t8_
~. If 1'1..... laft(tn' 'Of'. "iI' Th. 1i,,1 step in l"AS is 10 c,11 Ih. mulino Chtcl_rirsl.Ru••

.,..
"'K·hat_ 'HI
- 1ft lllll.tIt t. ,bft ""..atl.... Chec'firsl.Ru. will deCIde if Ihe ,Orl is .Iro"y ,ctivaled ir.
iII...~...J ..'I~t..1 . ltd."
~ Ifi. this o"vunl. II a<c ••pli,hes Ih•• by ,itw.n, Ih. lOSIN.COII fil,•
..'U.I.....tOll ~. It 'lffUr b"dH, t_
c....n ,,1("'
-..- t. ".4,ltt t••uu 'au' I__.111.
Th. lOGIN. ton hIe is • spocid Itle under YMS Ihli CiA be lJltntd
10 Ih. ~UlDEIEC.BAT file in "S·DOS. Uh.. Ih, user hlSl logs In,
v~S .111 fI.euil tho.. DeL iOiI..llio., ,ontlined In LOGIN. COlI.
- All.. 11,1, ",I I. _ . "'" 11.,1.,
A.....' 51gnil i. attached h • n•• lOSIN.(OI! 01 an 1.1"led
··1l1li "HH"••
"count. CltedJirst_Run .ill r.I... i 80~h.n Vilu. based on
""M!i, •• ..,,, 1101110,,' the pre••nce 01 this ... kor •

Afler ,oturn .. g fro. CbeckJlIst.Ru., I"AS ..,I lakt • 6"ui••


biS.d on the recelvod iool ..n Cill.d Yes. 11 tb. WOII has n..er
Lasl »o..Ntr/Doc..b.. Ih. P"55 beg•• ,.,orllng ••.•• ,~ il b••n ,",la11.d, ...,.11 •• i, trillsf.rrei 10 ft"IJIe'Jogin.co •
.... k•••n t. bt tho .ork .f ~obo·t T. "mho Aft~r att.,d,ng , which 'Ulies the iaporhnt new LDGIN.tOll Ii Ie. If thl 8001 ...
I.ct." loiluring his ••,., I bel.n thinking ho. other o,e,'lIn9 Y., is f.1 .. the•• ,h.in 01 ...nts f.1l0••hiCh ruult 10 Ih.
sy,t..., besid., Uni., 'OS! ,ecu',ly ,robl ... (i.e. VKS). V"S i5 •
,op.hr .,er.tin, 5ysl.. f.,
DEC', vAl haily of {GJpul'r£. l~"
"ntion ul .noUff DCl fil. ulled LOGON.tO".
"licit .fl.... (Od.d .. lIph 01 an eI .... tny •• r. that .orks Th. lOIlON.CO" begins to be ".fted .,lh • (Ill fro. lllAS to
und., I'IIS. Tn••or. do" .01 IIlach itself to a ho.t p,og' a. II •• a.lld)0900.'." 8u.ld)090n_C"••ill uk. the nu....ry ,all,
a Virus, but Plop.g.tn by up,olucing •• tir. copies to other n••ded 10 bUII~ lOGO~.CO". lOut,N.tOM .ill o..nmlly be • oCt
acco••h. Thi. vor••ilI not att!.pl to I.produc. its,lf oth.r 0' file thai dOl5 the act.,1 prop_gill an as upl.inod hler.
nftvorks. It is only con(f'~.d Vllh Ih, local (",uter on which it Pl .... ,e. code , ••unts for .cr •••tilled .,pl ..~.lIon 01 the ioo,e
i, .. Iustd. process.
FliT uftty rnsons, thE! uJOt ity of tn. code W~'i cH~ated ~n a ftn.l1y, the I"AS procedu, ••111 .mule Dlspl.1.C.,•••try

PC using R.R. Software" JANUS/Ad •• Alhr prell.i,,'! h,ts the h •• Ih•• u,ulib1e IS ,dIe•. rhlS .tll dl'pl'l .......ily

codt vas Ihon ..Vld 10 • YAX and eo.pi Ird .ith DEC Ma. Sev.ral i.n.".1 "'509' long .fIer Ih. '0" hu'pertor..d lis dul",.

vesligill inslr.eli........in Ihat .... i.pl.nnt.d \? the v.'.


Il0\l1 d not .pnad dur i'9 IfSti ng.

Th. Ad. hng.'9' ... chosen flr tvo r".o.,. firsl,


••nl•• 10 "p•• d .y .till .n Ad. ~nd Ihough! Ih.1 Ihi' w•• ld
b•• profitable ,m(lU. SeceRd, 1 h.v••ever seen I 1
lIOn docu•• nhd anywh... Ih,t ....,iit.n in Ad •• So it co.ld
,i,..
b••af. to u.nl Ihal this i. Ih. firsl .orl vnH.n in Ad ••
Hopefully an t.hdded 'yshts prog....., using Ad. WIll nol
insfTl a .odili.d •• "ion 01 this .0Tl inlo any ...ponry ,y'le",~
Ad.,tINly :11", ii' liny fl •• , .ilh Ihis WOII IIplea.nlal,e•.
Cod. ElpI.ution Ymous lutures eo.ld b. ,dd.d to l.pr". on the .ucce" 'allO.
====:~=::==~::::::.:= nffe .ho 15 • challce Ih,t eloedOod Dug' '"5\ becau.. ctna,n
lralts could not ~ •• cequ.tel, 1m... n .. ,u'po,., ho••ver, ... to
Th. lain procod.ff is .o ••d IIIAS. II has •• "n nesl.d
procedurn • D"pl.y.cud, Ch.ck}irs!}U., ""e.N••.logi,.Col,
crUI! , won th.1 oll ...a eduCihonal· Vilu, by ,II
!ofllng the
0"" sleps "udeo for propaglhon. if the cod. e.pliniliioo ....5
S.t.LogOll).k, ell.d, 6.I.5HU, "d BuildJogo.Jo•• Each p,oeeduff conluslng, ploy co.~uh' a.d ,Iuoy the flo. 01 ""Ullen. lh. Ada
p~rforlS various functions as the VOTI loves frt:l. ,w:ount to cl}de is SOft"l'I.t 10glca! and should 11Vt ~ffar senous prcblus.
.ccounl. Also i. XMAS, belore Ih...,I.d procedur •• , on. ran nole
.everal declarations. The.. dedaralions .ill tab (0" 01 t~ ••a.y 511ple .orls, sutla'( to :ne one ~re5entl!d, an be crUt!C1 for
logical Iii. 'i.U ,"quir.d, as ••Il is Ih. various struclun, P1.1ctic: ... Ily every O~irH;l'lg ~lstel tha~ ,aUovs SCII! -sort o~
needed to (anhin Ihe uur nne, of ,,(<)Unts. ~ollu!lica.hon Jet-een lisers ;~ae :he SEND co.uno. or a Iil!lpMr,e
uhhty>' An Op!rl~l!lg systU t.,.t b~4~!1 ~iladed ,agal1it
Vh.n Ih. vorl is o,isinilly r.I ....d il .ill propagate ihelf worls/vlruus by l~.lhng ;.lser ~cllun;.,.hiH'l .ould proiUllly De
to users only on tht 51Sh. at Ihd particular ti ••• It will app ... use;es5. ~n effective as SMU~~ allow '>~.llJlH(dttOn oehte'!'i ,ts
is • TrojiA Ho,n 10 • noi .. user. Once I'" Cillo. u50r receive, varlOUS userS. A C!ftQ.~t\ uoun; jf trust .,,::1 rZii)OnSlOlll ty 'ieees
Ih, ••r., • serie, of adion! OWIf. Curiosity will h'pl th.. t. to be fone~ ;or SUL'! ilS~<:&:; :0 5iJ~(~S~;\.;:tl (:,1ti~i.ie e~.::tl,1~.
emule Ihe prog'lI <all,d I"AS. Thi, WOrl p"ys on Ih. n,ive user
who would Iry 10 run I"~$. Its ujor d...blC' i. i~ the ••thed of
propag.lion, esp.d.lly if il is senl t •• us...h. would susp.ct
a Troja. Horse.

Page 40 2600 Magazine Summer 1989


2600 Marketplace

THE GALACTIC HACKER PARTY best of TAP, over 100 pages of their
will be held 8/2,3,4 at the Cultural best, $40. Computer crime, over 400
Center in Amsterdam. Look for 260m pages from the best of government
Info: 011-31-20-6001480. publications, prosecutors' guides, doc­
2600 MEETINGS. First Friday of the uments, case studies, etc., including
month at the Citicorp Center--from 6 how it's done, $60. Include S3 han­
to 8 pm in the Market, 153 E 53rd St., dling per book. Make payment to Tim
NY. Except 8/4 when we'll be in 5., PO Box 2511, Bellingham,
Amsterdam. Special meeting 7/28 in Washington 98227-2511.
London at Covent Garden by the INCARCERATED COMPUTER
London Transport Museum. Come by, TECHNO-DROID would like to hear
drop off articles, ask questions. Call from anyone interested in computer
516-751-2600 for still more info or to technology and its unusual applica­
request a meeting in your city. tions. Would like to receive (from
WAN TED: those willing
Technical/oper­ Do you have something to sell? Are to donate)
ations manual photocopies of
or any technical you looking for something to buy? Or i n t ere s tin g
data on North­ trade? This Is the place! The 2600 com put (' r
east Electronics Marketplace is free to subscribers! s c hem a tic s,
Corp's TTS­ Send your ad to: 2600 Marketplace, articles, and
2762R MF & P.O. Box 99, Middle Island, NY 11953. how-to in­
Loop Signaling Include your address label. structions for
Display. Will Only people please, no businesses. exotic projects,
gladly pay for etc. Write to:
copying and mailing costs, or reason­ Robert Joe Jackson, Jr., Memphis U
able price for genuine manual. Does 32875-019, Memphis Federal
anyone know anything about this Correctional Inst., P.O. Box 34330,
machine? Bernie S., 144 W. Eagle Rd., Memphis, TN 38184.
Suite 108, Havertown, PA 19083. WILL TRADE: My knowledge of
FOR SALE: DEC VAXlVMS manuals beating the game of Blackjack for
for VMS 4.2. All manuals are in mint information into hacking and phrcak­
condition, some still in the shrink- ing. J. Klein, 2558 Valley View #111,
wrap. This is the best source for VMS Las Vegas, NV 89102.
knowledge anywhere! Contact me for TUNE IN TO "OFF THE HOOK", the
more info. Kurt P., POB 11282, telephone program, Tuesday, 7/25 at
Blacksburg, VA, 24062-1282. 7:30 pm on WBAI New York 99.5FM.

WANTED: Schematic and/or block Hosted by Emmanuel Goldstein.

diagram for G.E. TDM-114B-13 data FOI, PSTN, ANAC, are you lost in

set. John B. Riley, 914 N. Cordova St., telephone acronyms? Don't be con­

Burbank, CA 91505-2925. fused anymore! Send for my list of

UNDERGROUND BOOKS: TAP, over 300 phone and communications

complete set, volumes 1-91, $80. acronyms, only 54. Jay H., 2722

Electronic surveillance and wiretap­ Glenwick Pl., La Jolla, CA 92037.

ping - a nuts and bolts guide, $15. The Deadline for Fall Marketplace: 911189.

Summer 1989 2600 Magazine Page 41


REVIEWS

The 1989 Pirate Radio Directory 6240 KHz and listen for the
by Paul Estev sounds of a howling wolf over a
When it comes to free commu­ drum beat (no fooling), On
nications, nothing comes close to September 10, you could have
the power of radio. And when it caught "WFIX, where we fix your
comes to radio, nothing is more radio over the air" and listened to
free than Pirate Radio. In The Fix-It Bob and Fix-It Bill from Lake
1989 Pirate Radio Directory, Erie. Other stations included are:
George Zeller provides another Radio Garbanzo, Radio Lymph
useful publication from Tiare Node International, Radio Comedy
Publications (makers of various Club International, Radio
handy shortwave/OX guides and Clandestine, CBOR (busted by the
directories) to aid in the search for FCC last November), The Crooked
truth. Here Zeller provides a com­ Man (a sort of Dr. Gene Scott of
pendium of the pirates of 1988, as shortwave), Voice of Bob (repre­
well as a brief history of each one. senting the satirical "Church of the
Details include where and when Subgenius"). Many of the stations
they were last found as well as listed are small fly-by-night opera­
their most recent mail drop. This tions, that may have provided only
catalog of about 50 pirate radio one broadcast in 1988. Others,
broadcasters is meant only for the like Radio New York International,
patient OX'er -- these broadcasters have had a more notorious history.
are only on the air for a few hours The 1989 Pirate Radio Directory
at a time and frequently change provides a good start in the search
their frequencies. for new, unlicensed voices from
We know where Zeller spends beyond.
his holidays and weekends: listen­ The 1989 Pirate Radio
ing to "KNBS, Cannabis 41, the Directory, 55pp. from Tiare
station with your mind in mind," the Publications, P.O. Box 493 Lake
shortwave station of the California Geneva, WI 53147. $6 plus ship­
Marijuana Cooperative. Illegal sta­ ping (1$ US, $2 Foreign),
tions like this have been getting Also available from Tiare: Los
out their word through the power Numeros, The Numbers Stations
of radio waves which may now be Log by Havana Moon. This is an
passing through your body as you extensive list of frequencies of the
read these words. The directory mysterious numbers stations from
covers the not-50-secret Voice of around the world. Tune in to hear
Tomorrow, which promises a cryptic sequences of numbers
tomorrow without Blacks, Jews, or being read aloud in German,
capitalists, and praises the work of Spanish, English, FrenCh, and
Nazis. To catch them try 7410 or Russian.

Page 42 2600 Magazine Summer 1989


The New "TAP" old logos. "It's time to move on and
by Emmanuel Goldstein do something different," he said.
Ever since we began printing Other hackers say that Cheshire
2600, people have been asking us has no exclusive right to TAP and
whatever became of TAP, the tele­ that anybody can start it up again if
phone/anarchy newsletter founded by they want to. That's just the way it is
the Yippies in 1971. After five years, with a newsletter like TAP.
we finally seem to have convinced But had the publishers simply cho­
people that TAP is defunct and that sen a new name. a lot of the doubts
we had nothing at all to do with them. being expressed in the hacker com­
Now it appears another chapter in the munity simply wouldn't be there.
saga is unfolding. Considering that nobody involved in
Since TAP stopped publishing in the new TAP appears to have been
1984, there have been at least a involved in the old TAP, are they jus­
dozen attempts to take over or restart tified in using the same name? What
the former Yippie publication. Now, about those people who lost money
out of Kentucky, an organization has to the old TAP? They're likely to pin
emerged that calls itself TAP and has the responsibility for this on the peo­
actually put out an issue. They claim ple of the new TAP. By taking on the
to have a new staff and a new lease name of TAP, the publishers may
on life. It's up to the hackers of the actually be putting their newsletter at
world to decide whether this is really a disadvantage.
TAP reborn or just another oppor­ There's plenty of room in the hack­
tunistic attempt to cash in on the er community for innovative newslet­
name. ters and magazines, An electronic
A glance at the first issue reveals hacker newsletter called Phrack is
a format practically identical to the old one that built a strong following by
magazine. Two sheets of paper doing something different: collecting
{unattached} with the old TAP logo, a hacker files and articles and distribut­
couple of news clippings, a brief ing them in a "package" to bulletin
explanation on how to make an boards all over the world. One of their
unstable explosive in three steps (for regular articles, Ph rack World News,
the "home anarchist"), and an article is a must-read for many hackers.
explaining Bitnet. The article takes up The best publications are the ones
about hall of the issue. that tread on new ground and make,
Yes, it looks like the old TAP. And not take, a name for themselves. We
it even reads like the old TAP. But a hope to see the new TAP succeed for
lot has happened since TAP last being new and different.
came out. Can this new newsletter At press time, there was one issue
simply pick up where the old one left of the new TAP known as #92.
off? We'll know soon enough. However, the old TAP also had an
Cheshire Catalyst, the old TAP's issue #92 which was its last and was
last editor, says he would have pre­ not widely distributed. To get a sam­
ferred it had TAP been allowed to ple of the new TAP, just send them a
rest in peace. He complained of a 25 cent stamp. Their address is TAP,
lack of imagination in the new TAP, PO Box 20264, Louisville, KY 40220.
particularly in the way they use the

Summer 1989 2600 Magazine Page 43


tips on trashing

(continued from page 33) dumpster, and told him I was look­
cap on my head. On the hygiene ing for food. He was convinced,
side, I do not shower or shave 16 and told me to get on my way.
hours before I start my planned I realize that some of these pre­
activities. I do not comb my hair cautions may seem like a bit
before I leave. I use a ratty torn much. It does take some effort to
backpack to put my material in. In following them faithfully. But I have
the backpack I carry a half pack of heard countless tales of phreaks
cigarettes (even though I don't getting into trouble for bragging to
smoke), a tin cup, and some beef their friends, getting careless with
jerky. I might also take some other their activities, relaxing their reflex­
items to complete my disguise, es, or feeling too comfortable and
depending on what is handy at the letting down their guard. In my
time. With this, my outfit is com­ observations, the majority of
plete. That way, if I'm caught, I'm phreaks have gotten into trouble
more likely to be recognized only by their own shortcomings -- not
as a derelict looking for food, not a through smart cops and aggres­
phreak looking for information. sive prosecutors. I have a college
When traveling to the target, I career, and in no way do I wish to
always park my car at least three jeopardize it. So, go out there and
blocks from the scene, sometimes thrash around, within reason. The
more depending on geography information to be gained is infinite­
and conditions. It is not unusual for ly valuable. Good luck!
me to park six blocks away. I hide
my wallet underneath the seat,
and hide the keys in a magnetic STAFF
lock key set stored under the car.
In over two years of thrashing Edltor-In-Chlef

through the telco's garbage bins, I Emmanuel Goldstein

have been caught twice. Both


times, I was told to beat it. I got off Artwork

because first, I dressed for the Ken Copel

part. Second, I practiced what I


would say if I got caught. When I Writers: Eric Corley, John Drake,

Paul Estev, Mr. French,

actually did get caught, it was easy


The Glitch, The InfideL

for me to ramble off a convincing Red Knight, Bill from RNOC,

excuse. One time when I was David Ruderman, Lou Scannon,

caught, I had taken a half eaten, Violence, Mike Yuhas, and the

browned apple in my backpack. growing anonymous bunch.

When an employee caught me, I


showed him my "gain" from their

Page 44 2600 Magazine Summer 1989


(continued from page 3)
REMEMBER
On the personal level, Abbie had the rest of us when The Prj va te
a sharp mind and a great sense of Sector was seized by the authorities
humor. He had a terrific enthusiasm in July of 1985. He played a major
for life's Ii ttle pleasures and his role in publicizing the action and
friends compared him to a little kid setting up a support network.
who loved toys. Throughout this rather trying time,
We're sorry he never really he never lost sight of our ideals:
seemed to reach the younger genera­ freedom of speech and the quest for
tion. That upset him quite a bit. But knowledge.
when you consider how Abbie OUf sadness over David Flory's
turned the world on its side, a lot of loss won't disappear soon. We
what we do today would probably gained much from him and he
be done quite differently if he hadn't enjoyed the work he did for 2600.
been around. Like Abbie, we intend to keep his
So the next time you're playing spirit alive.
with a computer somewhere and
you feel that little rush of excitement
as you realize the endless possibili­
ties, say hello to Abbie. He'll be right
there.
". ".". 2600 BBSt2
(CEN'l'JiIAt OIi'I'ICZ)
On yet another sad note, one of 914-234-3260
2600's most knowledgeable and
articulate writers died on June 4,
*
2600 BBStl
1989 at the age of 22. (Y(mX>lNE)
David Flory was known in these 402-564-4518
pages as The Shadow and, most *
2600 BBSt4
recently, as Dan Foley. On bulletin (BEEHIVE)
board systems, David was known as 703-823-6591
Shadow 2600. (fidonat 1:109/134)
In the days of The Private Sector ..

BBS, Shadow 2600 would always be 2600 BBSt5

(THE SNI'.L'CBBCJUU)

the person to take charge of a techni­


cal discussion and explain things so
that everyone could understand. In
.

718-358-9209

2600 BBSt6
many ways, The Private Sector was (l'AlU£R PE'l'I: I S)
an extension of his ever-present 412-829-2767
quest to learn and explore. We all
benefitted from that. ALL OPII:N 24 BOORS
David was shocked along with

SummerJ989 2600 Magazine Page 45


(continued from page 31 )
2600 Letters

you have. Hacking involves clones. Every XT and every AT


using other computers over the is considered a PC. in addition.
phone lines. So you can be a 16) Make some friends in the
hacker on a dumb terminal field and you will see.
that has no computer attached.
Commodore 64's are popular There, that wasn't so bad,
because they're cheap. It says was it? U anyone out there
nothing oj the ability oj the per­ would like to send us a let­
son behind the keyboard. ter, address it to: 2600
(Incidentally. we like to say Letters, PO Box 99, Middle
that EVERY computer is a kid's Island. NY 11953.
computer!)
12) It's big. Believe us. So
big that sometimes it's frighten­
ing.
201
(continued from page 2 J)

13) Eavesdropping is simple


if you have access to the Jre­
quencies. That is not dUfU:ult at 894 Englewood 946 Branchville
895 Moun! Freedom 949 Holmdel
all Making free calls on cellu­ B96 Rutherford 952 Whippany
lar is probably a lot more trou­ 898 Morristown 953 BernardsvUIe
899 Point Pleasant 954 Franklin Park
ble than it's worth. IJ any 902 Union Chy 955 Kearny
905 Lakewood 956 Paterson
readers have experiences here. 906 Metuchen 957 Middlelown
let us know. 907 Teaned! 960 Hackensack
913 Rahway 961 Newarll
14) Sure. But you'd have to 915 JerseyChy 962 Erskine Lakes
916 Passaic 963 Jersey C~y
Jind one oj those old-fashioned 918 Asbury Pall\ 964 Unionville
phones that don't give you a 920 Point Pleasant
922 Asbury Pall\
965 Elizabeth
966 Madison
dial-tone until you put money 923 Newark 967 Oradell
925 linden 968 Dunellen
in. The trick works on the 926 Newark 969 Carteret
newer phones in a slightly dif­ 927 Succasunna 972 Englishtown
928 Lakewood 974 Spring Lake
Jerent way and is detailed in 929 Toms River 975 Holmdel
930 PafII Ridge 977 Paterson
our Spring issue. 931 Cranford 9BO Bound Brook
15) It sounds like you 932 New Brunswick
933 Rutherford
98 I Dunellen
983 Rockaway
already have a program that 934 Ramsey 984 Morristown
935 Rutherford 995 New Brunswick
just needs some debugging. 937 New Brunswick 988 Asbury Park
93B Farmingdale 989 Dover
We suggest you get a manual 939 Rutherford 991 Kearny
or a programmer andfrgure out 941 Cliffside
942 Paterson
992 Livingston
993 Morristown
what's wrong. By the way. any 943 Cliffside 994 Livingston
944 Leonia
program that works on an IBM 945 Cliffside
995 Frer,chtown
995 Milord
PC should work on a clone -­ 946 Holmdel
947 Leonia
997 Kearny
99B Kearny
that's why they're called

Page 46 2600 Magazine Summer 1989


NOW HEAR THAT

At 2600, we don't exactly go out of our way to


nag you about when your subscript is going
to stop. You won't find yourself ing those
glossy reminders with free pens and digital
quartz clocks and all that junk. We bel
our subscribers are intelligent enough to look
at their address label and see if their sub
scription is about to conclude. If it is or if
you want to extend it, just 11 out the form
below (your label should be on the other side)
and send it to our address (also on the other
page). You don't get self addressed stamped
envelopes from 2600. But the time and money we
save will go towards making 2600 as good and
informative as it can get.

INDIVIDUAL SUBSCRIPTION

o 1 year/$18 0 2 years/$33 0 3 years/$48

CORPORATE SUBSCRIPTION

CJ 1 year/$45 0 2 years/$85 0 3 years/$125

OVERSEAS SUBSCRIPTION

o 1 year, individual/$30 0 1 year, corporate/$65

LIFETIME SUBSCRIPTION

o $260 (you'll never have to deal with this anymore)

BACK ISSUES (never out of style)

o 1984/$25 0 1985/$25 0 1986/$25 J 1987/$25


o 1988/$25
TOTAL AMOUNT ENCLOSED: 11...-___----1
Guide of Contents

a guide to primos
--- --
ra----­
I 201 exchange list

I scanning for calls

20

22
I

letters 24 I

I tips on trashing
a sprint story
32
34

I spanish phones
36 I

I a summer worm

2600 marketplace

38
41

I reVIews
L. _____
42 I

--- -- .J

2600 Magazine
SECOND CLASS POSTAGE
PO 80K 752

Middle Island, NY 11953 U.S.R. Permit PAID at

East Setauket N Y.

Forwarding and Rddress Correction Requested


11733

ISSN 0749·3851

You might also like