Copy Link
Add to Bookmark
Report

Anarchy Vol 1 No 1

eZine's profile picture
Published in 
Anarchy
 · 25 Apr 2019

  

Chaos presents:



Anarchy!!

Vol I # 1
-------------------------------------------------------------------------

Welcome to Anarchy!, a new mag from Chaos. As a person who wrote the
terrormag series, I wanted to continue to write such mags but expand
them. Joining Chaos was the best thing I could have done for this. When I
looked at 2 mags called Phun and Phrack, hacking mags, I liked their
format and decided to do a newsfile that was more like that. This mag is
currently looking for 1 more editor and several writers for the mag and
we are looking for submissions to this mag. I don't care what your
article is about. If its on hacking, phreaking, the pirate world, a BBS
review, I don't care. I would like to see it computer related but that is
not neccessary. Things such as incendiary devices explained easily or
"How to sabatoge a bridge" or things of that nature are acceptable.
Editorials <about this mag, the group, the group's activities or BBS's or
sysops or any BBS related topic> are more than welcome. And now, on to
the show.

-------------------------------------------------------------------------

Table of Contents

1) Introduction
2) Operation Sun Devil- What happened
3) Operation Sun Devil- New Twists in the case
4) The truth about Caller ID (ANI)
5) Begining Lockpicking
6) General BBS news
7) Chaos News
8) BBS reviews
9) Networking
10) The Conscience of a Hacker

-------------------------------------------------------------------------
Anarchy!!
Article 2 of 10
by Iys Kyewb
What happened with Sun Devil

-------------------------------------------------------------------------

Unless you have been in a cave or your modem broke, preventing you from
logging on any BBS's, there was a national raid on hackers in mid May.
This raid, dubbed Operation Sun Devil, resulted in at least 28 search
warrants in 14 cities and 7 arrests according to the police. I estimate
that more than 20 people have been arrested as a direct result of Sun
Devil. One teenager in long island was arrested, supposedly using the
handle "Crazie Eddie" and was charged with "Computer tampering and
trespass, and unlawful use of a computer and theft of services." The 1st
two charges are felonies while the other two are misdemenor charges. All
in all, over 24,000 disks were confiscated, as well as dozens of computer
systems. This operation made arrests in early april on some hackers in
the Legion of Doom <LOD> because the feds believed they posed a
"frightening threat" to individuals and institutions. It was alleged that
they were capable of disrupting 911 emergency phone service in at least 6
states. <911 is a joke, btw.>
Much of my information came from New York Newsday and other newspapers
but we all know the press is hardly fair in its treatment of hackers and
in reporting anything dealing with computers. I should subscribe to 2600
and get the real truth, or at least attend one of their meetings. I think
its funny how the feds go all out to bust hackers, but don't seem this
agressive to do anything in our war against drugs, or to fight
homelessness or to help improve education. Here's a quote from NY Newsday
and assistant secret service director Garry M. Jenkins: "Today, the
secret service is sending a clear message to those hackers who have
decided to violate the law of this nation." According to various phone
companies and other companies, the fraud perpetrated by some of the
hackers who were busted <and other hackers not yet caught> cost them more
than $50 million in telephone services.

-------------------------------------------------------------------------
Anarchy!!
Article 4 of 10
by Iys Kyewb
More on Sun Devil

-------------------------------------------------------------------------

As I purchased the Sunday newspapers as I do every week, I rarely
purchased the NY Times. However, I scanned the headlines and noticed this
headline on page 1:

"Drive to Counter Computer Crime Aims at Invaders"
"Legitimate Users Voice Worries Over Rights"

I looked at it harder and promptly purchased the Times. With Sun Devil
over, and certainly newer investigations into hacking activities, there
are some questions that needed answers. Are these hackers really a threat
to comerce, research and national security? Is the government violating
these alleged hacker's civil rights or anyone's for that matter in their
attempts to stop this "threat" to security? Some civil liberties experts
say that the crackdown on hackers is affecting computer users who are not
breaking the law. These users are being intimidated and searched
illegally and other violations of their civil liberties, such as the
freedom of speech. It is parallel to the campaign against drugs, where
minorities are always subject to questioning by police and youths
assaulted by cops under the pretense the youths were arrested for drug
usage.

Stephen McNamee, the US Attorney for Arizona and a central figure in the
government's efforts against computer crime, says "It's a whole new era.
Computers are providing a new avenue for criminal activities. It is
possible to transmit computer information for an illegal purpose in the
blink of an eye." Fortunately, some people think the government is going
too far, like a California Democrat named Don Edwards. He says "Every
time there is a percieved crisis, law-enforcement agencies and
legislators overreact, and usually due process and civil liberties
suffer. The Fourth Amendment provides strict limits on rummaging through
people's property."

A tradgedy of this operation, and an example of innocent people suffering
from government actions is a computer game maker. he has not been
charged, yet investigators have seized his equipment and have not
returned it as of yet. He is on the verge of going out of business as a
result. The secret service surreptitiously eavesdropped on BBS's and
telephone conversation in weeks prior to Sun Devil and have entered these
networks as legitimate users to trade information. The FBI interrogated
dozens of experts and hobbyists in an investigation of a theft of an
important program from Apple Computer Inc. last year. (I don't recall
what exactly it was, however, there was a protest of Apple's policy not
permiting macintosh clones from being built, and could have been related.
I also think this program was related to Macintosh's DOS or the windows
or Icons it uses.>

Civil libertarians and some business executives have begun to organize
defenses. Mitchell D. Kapor, creator of Lotus 1-2-3, is planning a
defense fund of several hundred thousand dollars for some of the accused
in Operation Sun Devil. Harvey Silvergate, a Massachusetts lawyer and
civil liberties expert working with mr. Kapor, said "You have innocent
people who are being terrorized as well as investigations of people who
have broken the law." He termed the government's actions as "typical
American [and Chinease by the way] solution: throw your best and
brightest in jail."

Some officials of the secret service, which has been the primary federal
enforcer of computer fraud laws since 1984, believe that an alarming
number of bright, young computer enthusiasts are using computers
illegally. "Often, a progression of criminal activity occurs which
involves telecommunication fraud, unauthorized access to other computers,
credit card fraud, and then moves on to other destructive activities like
computer viruses." said gary M. jenkins, secret service assistant
director.

Mr Kapor of Lotus said he believed the danger posed by the computer joy
riders had been greatly exagerated. "Now that the Communists aren't our
enemies anymore, the American psyche has to end up inventing new ones,"
he said. He and other experts are also alarmed by new investigative
techniques that employ computers. The power of advanced machines
multiplies the risk of search and seizure violations, these experts say,
because they can perform so many simultaneous tasks and absorb and
analyze so much information. Added to this problem is that legal
precedents are not clear on how the 1st amendment protects speech and the
4th amendment protects against searches and seizures in the electronic
world. My question is, is saying how to hack out a system, or codes for
examples illegal? Is my freedom of speech protected when I talk about how
to hack out codez, or distribute them? Having a 10 digit number suddenly
becomes illegal, and similar confusion exists. I thought using a code was
illegal. Computer Email could be swept up in a raid that is totally
unrelated to anything illegal, or at least to that investigation.

Updates on Sun Devil will come in future issues. If anyone has any
information about "The Hacker's Conference" which meets somewhere on the
west coast, please send correspondence to myself, Iys Kyewb on one of the
Chaos BBS's.
-------------------------------------------------------------------------
Anarchy!!
Article 4 of 10
by Iys Kyewb
The Truth to Caller ID (or Automatic Number Identification, ANI)

-------------------------------------------------------------------------

Is it big brother when you call someone and they know your phone number
before you can even say "hello"? I'm upset over the phone company's total
apathy over my right to privacy. What if I hadan unlisted number? What is
the purpose of unlisting your number when its readily avaiable to people
you call or businesses? It's hard to convince the phone company when you
call BBS's and don't necessarily want the sysop to know your phone
number, if you're poor like me and have only 1 line. I can imagine any or
all of you saying either "if you can't trust the sysop, don't call their
system" or "I hate getting out of the shower to find out its a sales
pitch" or whatever lame excuses. Just because I can't trust a sysop <who
can you really trust these days?> doesn't mean the sysop runs a terrible
BBS. Also, you need to get out of your shower or wake up or get away from
relaxing just to see what the phone number is of the person calling you .
And suppose its a call from your spouce or sibling or child and its from
a public phone? Are you not going to pick it up because the phone number
could be that of an organization? If you don't want to be bothered with
the ringing of the phone, turn off the ringer or unplug the phone. Your
right to privacy is not violated when someone calls your phone number. If
you truly feel it is, then talk to the phone company about getting a line
that cannot recieve calls, only make them. You could save some money and
your misconception of privacy is not violated. Of course, no one could
get through to you. Its like having a pager. Is getting a page a
violation of your rights? if you don't want to be bothered, turn it off,
ignore it or stop subscribing.

Now, there is the question of prank phone calls. ANI is a deterrent to
it, but so is a less costly and more private alternative. Call Blocking
and Call trace are 2 features that New Jersey Bell offers. Call blocking
prevents someone from making a call to your phone number from a specific
number. Example: joe from 555-1234 calls jane at 555-2345 to harass her.
With call blocking, she dials a code and the number she wants to block
<555-1234 in this case> and when joe calls, he gets a recording "This
number is no longer accepting phone calls." Joe would then assume her
phone is disconnected and obviously cannot prank her anymore. Of course
he could always try from another phone and she can only block 6 phone
numbers. But that is effective in reducing prank calls. Call trace is the
kicker. Rather than waiting for months for the phone company to put a
tracer on your line, dialing a simple code will initiate a trace of the
last phone call made to that number. Example: joe calls jane from
555-1234 100 times. jill calls jane from 555-1122 and tells her about
call trace. joe calls back at, say 8 am. jane leaves, goes to work and
comes home around 5pm. she has NOT recieved any phone calls. she presses
a few digits on the phone and call trace is initiated. It is assumed this
service will be used immediately after joe pranks her but that is not
necessary. Lala Land bell then traces the call to 555-2345 and will do
whatever they think is necessary to stop the calls, usually give the # to
the local police or something of that sort. With call trace costing $1
per trace and call block $6/month, its alot cheaper than ANI, costing at
$60 for the lousy unit and $6/month. It would take 60 traces initiated to
make up for the money lost in ANI which explains whi the companies hype
ANI instead of call block or call trace. My recommendation would be to
stop wasting money and take your phone # off the unlisted status because
once a company finds your number and address <compiled in a database>
they sell your addresses to other companies as a mailing list and you
will still recieve those annoying calls with a sales pitch. I personally
have never recieved one but I don't do much mail ordering myself.

-------------------------------------------------------------------------
Anarchy!!
Article 5 of 10
by Iys Kyewb
Begining Lock Picking

-------------------------------------------------------------------------

Ever get locked out of your room/house and wished you could get in
because your keys were sitting on your desk? Or wanted to enter someone
else's room to surprise them but you didn't have a key? Or just merely
wanted to know how to pick locks? Well, this is a begining guide to
lockpicking. I will make some recommendations. They are:

Do Not even try to pick Medeco locks unless you have ALOT of experience
with lock picking. These locks are extremely hard to pick because of the
way the lock is designed. Notice locksmiths charge more to duplicate them
than other, normal keys? Well, take a look at one. If you look at the top
of the notches, you will notice they are not all arranged in a straight
line. They are curved. With the pick I will show how to build, I even
doubt it is possible to pick this kind of lock. If it is possible, you'd
have to spend hours trying to pick it, and that defeats the whole purpose
of lockpicking.

The Pick I will show you does not work with Tubular locks, "skeleton key"
locks or other types like the fitchet kind. It is for basic, 1 slot keys.
Padlocks are good locks to try to pick with this.

First, you need to find a thin and somewhat long piece of metal that is
somewhat stiff but pliable enough to shape. How long? Judgement tells you
what length but if its really long, you can make 2 or even 3 tools. it
should be at least 13 inches so you can make 2 such tools, a pick and
torque bar. Now where do you find such a metal? Well, Oil Dipsticks, and
Automatic Transmission dipsticks are usually good, but try to find one
thinner and not so flexable. The best kind are from the brushes of the
street sweepers. Ever see them clean the streets? The brushes are made of
hundreds of metal strips that sweep debris from the gutter and supposedly
into the machine I guess. These metal pieces break off and are very much
suitable for this task. I think it is the easiest type of metal to use.
Where do you find them? Well, a friend told me to check out the gutters
where the machines sweep the streets. I checked out my neighborhood in
the Bronx and looked on 1 block and found nothing so I figured I'd have
to look elsewhere. However, when I was in Bayside, Queens recently, I
decides to look and I found over 20!!! pieces of these brushes, some
metal pieces were long enough to make 2 tools. I recommend looking nearby
sanitation depots. You could also approach the sweeper and pry off some
pieces but I don't know how hard that is.

Next, find a stone grinder. You can attach one to a drill but it works
best if you have one mounted on a desk or something. Its alot like the
ones used to sharpen axes or other such equipment. If you don't have one,
check out the machine shops in your school, or in colleges. Ask other
students where any machine shops exist and you should be able to find a
grind stone. I don't recommend asking everyone, just some students who
are into such things.

Now, after fou have found a metal piece or two and a grinder, you're
ready to build a lock pick or torque bar, or Ideally both. The torque bar
is easy. Take a pair of pliars or similar instrument, grip the metal
strip and bend it until its bent into a 90 degree angle. It should look
like an L when looked at from the side. Do not twist it, unless you have
alot of metal strips, or many torque bars, since that can do different
things and make it easier or harder to pick some locks. For a basic set,
i don't recommend that. The torque bar should be about 7 inches in length
and the little "stub" of the L part should be no more than 1/2 an inch.
Now you need a pick. You need the grinder to shape the metal strip into
something like this shape:
-----------------------------
/\ <---A---> / |
/ \--------------------/ |
c------------------------------------------------------|

for you commodore users, \ is a diagonal opposite of / <an X without "/">
and | is a straight, verticle line

The front should be rounded <the "c" part> and the part labeled "A"
should be somewhat long but no longer than 1/3 the size of the whole
stick. The edges should be somewhat smooth but not necessarily perfectly
round. Also, make the narrower part narrow, but not too narrow, as that
makes the pick brittle, and your pick will break inside of the lock,
which will fuck shit up. For locks that have longer keys, the part
labeled <---A---> should be longer but for regular locks, that isn't
necessary. Torque bars should be long enough to maximize torque but not
too long since it becomes brittle.

After making the above tool, you can paint it, put rustoleum on it or
whatever. Since it is steel, it can rust but as long as it isn't brittle,
thats ok. If you find a rusted strip, you can cand off the rust if you
wish, but thats personal taste. As long as <repeated for the last time>
it isn't brittle, anything is ok. Just don't twist or bend it, since it
needs to be very straight! Bending any of it is not a good idea for an
inexperienced lock picker.

So where do you start? Simple things like padlocks or the locks to your
disk storage things <the 1st thing I picked and it took 15 seconds> or
similar things. How is picking done? Well, the pick enters the lock and
the bar is used to twist the cylinder much like when you twist your key
through the lock. Fiddle with the pick enough and you'll figgure out how
to open locks up. Some locks may take up to half an hour for even
experienced lock pickers, <again regular locks, not Medecos> but do the
easy, non-trouble getting into stuff 1st. And most of all, amaze your
friends by entering their lockers and stealing jackets, walkmen, etc.!
Steal next weeks mid term! Break into payphones! Enter an office and
steal equipment!!! heh, I'm getting abit carried away here but with these
two tools, you are on the road to becoming an expert lock picker. Also, I
recommend getting an L-slide or 2. An L slide is an L shaped piece of
metal <usually> that enables you to open doors that are usually double
doors. Some doors have "card" blocks and those blocks usually prevent
these doors from being L-Slided, but I can't say for sure. Having
L-slides of different sizes is a tremendous advantage since some bolts
are not easily gotten to easily. Some doors are "blocked" from the front
and with a long L-slide, you can slip it through anyway. Notice the way
that door bolt on every door with a knob is sloped on one side, usually
away from you but sloped towards you? Well you need to pull the slide
onto that so the door can open. Unfortunately, many doors have a blocker
that, ugh its hard to explain. I need better graphics than ASCII to show
you. Maybe next time I talk about lock picking I can explain further.


Disclaimer- the above was written for general purposes and was not
intended for illegal purposes. Remember, picking a lock to enter a room
without the room's occupant knowledge is Breaking and Entering and is a
felony. The author of this text or file, members of Chaos and owner of
the BBS this file is on is not responsible for any actions of anyone
diretly resulting from this file, nor are we responsible for anyone's
getting caught.

-------------------------------------------------------------------------
Anarchy!!
Article 6 of 10
by Iys Kyewb
General BBS News

-------------------------------------------------------------------------

Well, This is a review of news in the NYC BBS world since aproximately
May 1st, 1990. There is no guarantee the information occured before or
after that date, but I'm telling you what I know. I can guarantee that
the information is acurrate and true.

Shadoworld went Public Domain, as Sun Devil hit the nation. E><el
apparantly decided it was too risky to maintain a pirate BBS with such
taking place, and considering he used to have a h/p sub <which the Sage
copied onto his BBS but took it 1 step further by having a h/p UD area>
it WAS indeed risky to have anything illegal, in case a hacker that used
to call SW got busted and the feds called shadoworld to see if they were
involved in hacking or phreaking. Unfortunately, Shadoworld is down,
because of the phone bill. Its down indefinately but I expect it to be up
soon.

The Shelter went down for good. No news on whether or not the technician
will put it up again or put up a new system or whatever. It was the 1st
multiplexing commodore BBS in New York City. Not a bad BBS in my opinion.

Camelot left RAID and Mysticore's Rhadmanthus decided not to join. This
wasn't a blow to RAID as they did grow to 4 canadian BBS's and several
more out of state BBS's.

Boot Camp BBS went Image 1.2 and added Turbo Rels, which made this once
slow BBS into a superfast system. Calling it at 2400 is like calling a
Cnet 128 V4.0 at 2400, or very close in speed.

Harry Hazardous, hitman of RAID, has decided to go legit and stop hacking
and phreaking. I don't know if he left RAID or is merely no longer Hitman
for RAID. I do know he changed his handle, to something that I forgot and
was told not to reveal, which I do not plan to.

Nynex Ninja returned early this year but it was revealed he was actually
Renegade hacker, who claimed to me in Email that he had joined BTI but
then changed his mind about joining, or something as ridiculous as that.
in addition, Jimmy <Nynex Ninja> gave him permission to do all of that,
for what reason I don't know. There is a Nynex Ninja in NEC but it is
unknown if it is the same one of BTI fame.

And speaking of NEC, NEI has cropped up, NEI standing for North East
Importers. It appears NEI will take over where NEC left since many NEI
members are in NEC, and I saw a realease with NEI on it but not NEC.

NASA, another graphics group, has grown somewhat in New York and
nationwide. It is unknown how many BBS's are actually NASA bbs's since
the number was "Inflated" E><el, leader of RAID, tells me. I do know
Commodore Conextions is a NASA bbs, and I saw the word NASA on a graphic
done on an out of state BBS I once called.

Paradise warez was down. Rumors flew around that Renegade Hacker
disconnected his phone in the latest "skirmish" in their loooooooooooong
laaaaaaaaaaaaaaaame "war". However, PK's mother disconnected it for
unknown reasons, possibly over the phone bill or he was merely grounded
for something lame. There are rumors that it is back up as of 6/7/90 but
at a different number. I tried his number and it was busy. I assume it is
back up at (212)/888-4773.

In addition to getting 1.2, many image BBS's are now getting Networking,
something that allows for posts to be shared among numerous BBS's.
Unfortunately, Terrordome and Boot Camp plan on only networking with each
other and Shadoworld, which is redundent since all of them have
essentially the same users and are in the same city. I called Gear
Jammers ][ in Philly (215)/487-0463 and saw their Network and it looked
awesome. They were networked with many BBS's all over the country and I'd
like to see Boot Camp network with a BBS like that, or a BBS on that
network.

The Sage's Hut, that bastion of new UD's, Posts and kewl cosysops was
supposedly down as of 6/6/90 but appeared to be up and running the next
day! More on this story next time.

As if that wasn't enough, Johnny and The Sage's Hut was booted out of
RAID. Johnny was left in charge of allowing new users to join RAID but he
got too big of a head and was saying shit that pissed off Incubus, so
Incubus booted him! Hopefully, more in the Combat mag on this topic.

Look for T00n T0wn, a new BBS in the 718 area code. Bebop was posting
this. I don't know if he's the sysop but i know it will be:
2400
20+megs
And either Image 1.2 or Cnet 4.0

Mystiore initiated a "No Groups in Signature" rule on their BBS and,
personally, i think it sucks. This is a foolish and annoying move. There
is no purpose in this at all. He feels it is annoying to see:

<handle>/group1/group2/group3/group4/etc...

yet does nothing about the people who use MCI in non MCI subs and uses
commands like \s9 or \p4 or \w8 or any of the variable commands. <for
those not familiar with MCI, \p# is a printing mode, allowing you to
print a character and then do something like move to the end of the line
and come back to type the next character, or something lame like that;
\s# is the # of tenths of a second the computer waits before printing the
next character. It is very annoying since 2400 can look suddenly like 110
baud; and \wn tells the computer to wait # seconds before doing anything
<usually printing the next character> and is very annoying. The variable
commands print the user's handle, name, phone number, password or other
things and can confuse many people.>

-------------------------------------------------------------------------
Anarchy!!
Article 7 of 10
by Iys Kyewb
Chaos! News

-------------------------------------------------------------------------

Chaos has grown considerably! We now have 17 members as of 6/6/90 and 4
BBS's. They are:

Demoniac Chairman
Comwood Chairman
Iys Kyewb Chairman
Thrasher Prezident
Dr. Who Veep
Highlander Grx. Dewd
Ture Seven Hitman/Sysop
Throgmorton Hitman!
Second Site Hitman!
Exploited Member
Havok Member
Golden Dragon Member
Diabolic Member
E><el Sysop
Slasher Sysop
Kingsx Sysop

Shadoworld HQ#1 (212)/942-5059
Boot Camp HQ#2 (718)/464-8189
Terrordome HQ#3 (718)/922-4654
Defcon 3 HQ#4 (718)/934-2273

Boot Camp has a Gfile contest in Empire. Call for more details.

Phazer wanted to join Chaos after he decided to try to form a group
called "Justice", a BBS "police force". Demoniac should tell more in
Combat mag #10 <or 11?>

We visited Chris's house on 6/6/90 and 6/7/90. Details in Combat mag

Former HiFi leader Ice Cube changed his handle to Iys Kyewb since there
were many Ice Cube's all over. Iys Kyewb and Comwood, also of HiFi, then
joined Chaos. They were named Co-Chairs because of their vast experience
<bewtween us, we have about 10 years experience compared to Demoniac's 2
or 3, and none of the other Chaos members have more than 2 other than
maybe Exploited> As a result, HiFi disbanded with Great Golem somewhere
and Crusader on the Sage's hut. Crusader, if you're reading this: We did
HiFi to do something but I did everything and you did nothing. My not
being near a computer does not and should not prevent you from doing
anything for the group such as getting us a HiFi BBS or something to that
effect. Considering you are cosysop on at least 2 BBS's, thats really
lame. Comwood was in the group for a shorter period of time, yet he wrote
a terrormag and compiled codes for magic candle with Dr. Who.

Chris has been discovered to use many handles, among them Chris,
Bumrusha/er, Scope and now, Abadox. Many sysops are tired with our war
with him, and I can't really blame them but they have been reacting a bit
too harsh, deleting people for mentioning chris, for example. I say we
leave him alone after the next combat mag.

More news available in the Combat! mag.

-------------------------------------------------------------------------
Anarchy!!
Article 8 of 10
by Iys Kyewb
BBS reviews

-------------------------------------------------------------------------

Sage's Hut
(212)/928-2406
3/12/2400
image 1.2
20+ megs

The BBS used to be good but Johnny (Sage) deleted Demoniac. Since then,
the BBS slid downhill but survived, until a galacticomm went up called
"Advacomm" and Johnny called it every day. While calling it, the BBS
number was busy, but noone posted, sub obs and UD-ops couldn't do their
work, like validate warez, and cosysops couldn't do anything. The BBS got
lame and now when you call, you see dozens of unvalidated wares and maybe
10 new posts/responses on the whole subboard area.

On a 1-10 rating, used to be 8.3 but now a dismal 2.3. Only reason why I
call is because I have unlimited credits.


Defcon 3
(718)/984-2273
3/1200
Chaos!! HQ#4
DMBBS

I haven't really called this BBS much, its gotten lukewarm reviews. The
posts appear to be okay. The speed is good for a DMBBS but kingsx should
go Cbase instead.

On a 1-10 rating it gets a 4.6 but only because I made 1 call to it and
wasn't terribly impressed by what I saw. However, since it IS a chaos
BBS, it can't be that bad. If I like what I see, I will raise the rating
in the next issue of Anarchy!


Mysticore
(718)/837-4710
3/12/2400
Cnet 4.0
20+megs

The sysop is getting annoying. Once a good bbs, its gotten bogged down by
some wierd rules. He wants us all to be a "family" yet bans group names
in user's sigs. Dr. Who said he thought Black Magic was bullshit and was
told not to post anymore on Mysticore, to shut up and a few other things.
I assume Demoniac will go into this in more depth in the Combat mag.

Once a 8.6, now its a 5.4 and rapidly declining.


Boot Camp
(718)/464-8189
3/12/2400
Image 1.2 with TurboRels!!!!
105 megs!!!!!!!!!!!!!!!!!!!!
Chaos HQ#2!!!!!!!!!!!!!!!!!!

Once a dreadfully slow BBS, now with the turbo RELS and the CMD drive
hooked up in an unknown way, this Image is almost as fast as a Cnet 4.0
in 2400. The subs have improved. The UD's get an INC since I didn't see
them but there is alot of space to upload and I guess the UDs are good.
With an Empire contest <and Empire "wall" and MP command> the BBS is
eternally busy! Very hard to get through!

One a 5.3, now a 9.1 rating


Terrordome
(718)/984-2273
3/12/2400
Image 1.2
Chaos HQ#3
20+ Megs

Was named Elm street and used 1.0 Image, dreadfully slow then. Now its
quicker but could use those neat turboRels to speed things up a notch.
1.2 was a significant change, as was "Terrordome" from Elm Street BBS.
The subs are ok but the Chaos sub is forever getting posts! Dudes! Post
in the Boot Camp when you get through!

Once a dismal 3.5, now a 9.0

Thats all for now. Here are some BBS's to try out. I'll review them next
issue:
Gear Jammer's ][ (215)/487-0463
Lahnkmar's (609)/858-2033 or 2003, i have to correct this
Just Say Yes (415(/922-2008

-------------------------------------------------------------------------
Anarchy!!
Article 9 of 10
by Iys Kyewb
Networking

-------------------------------------------------------------------------

Networking is the hottest thing around but this isn't so much about the
aspects of networking but merely a request for:

docs of networking on Cnets and Images
a listing of the networking BBS's and names of networks, especially how
to join the networks.

Please send correspondence to Iys Kyewb on either:
Lahnkmar BBS <number above>
GearJammers ][ <see above>
Boot Camp
Terrordome

Thank you.

-------------------------------------------------------------------------
Anarchy!!
Article 10 of 10
by The Mentor, dated 1/8/86
The Consience of a Hacker
Entered by Iys Kyewb

-------------------------------------------------------------------------

I found this in Phrack inc. volume one, issue 7. Phile 3 of 10. Its cool,
I should mail it to Dear Abby/Ann, heheh.


The following was written shortly after my arrest. I am currently
groupless, having resigned from the Racketeers, so ignore the signoff...


The Consience of a Hacker... by The Mentor 1/8/86


Another one got caught today, it's all over the papers. "Teenager
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank
Tampering"...

Damn kids. They're all alike.

But did you, in your three-piece psychology and 1950's technobrain,
ever take a look behind the eyes of the hacker? Did you ever wonder what
made him tick, what forces shaped him, what may have molded him?

I am a hacker, enter my world...

Mine is a world that begins with school... I'm smarter than most of
the other kids, this crap they teach us bores me...

Damn underachiever. they're all alike.

I'm a junior in High School. I've listened to teachers explain for
the 15th time how to reduce a fraction. I understand it. "No Ms. Smith, I
didn't show my work. I did it in my head..."

Damn kid. Probably copied it. They're all alike.

I made a discovery today. I found a computer. Wait a second, this
is cool. It does what I want it to. If it makes a mistake, it's because I
screwed it up. Not because it doesn't like me...

Or feels threatened by me...

Or thinks I'm a smart ass...

Or doesn't like teaching and shouldn't be here...

Damn kid. All he does is play games. They're all alike.

And then it happened... A door opened to a world... rushing through
the phone line like heroin through an addict's veins, an electronic pulse
is sent out, a refuge from the day-to-day incompetencies is sought... A
board is found.

"This is it... This is where I belong..."

I know everyone here... even if I've never met them, never talked
to them, may never hear from them again... I know them all...

Damn kid. Tying up the phone line again. They're all alike...

You bet you're ass we're all alike... We've been spoon-fed baby
food when we hungered for steak... the bits of meat that you did let slip
through were pre-chewed and tasteless. We've been dominated by sadists,
or ignored by the apathetic. The few that had something to teach found us
willing pupils, but those are like drops of water in the desert.

This is our world now... the world of the electron and the switch,
the beauty of the baud. We make use of a service already existing without
paying for what could be dirt-cheap if it wasn't run by profiteering
gluttons, and you call us criminals. We explore... and you call us
criminals. We seek after knowledge... and you call us criminals. We exist
without skin color, without nationality, without religious bias... and
you call us criminals. You build atomic bombs, you wage wars, you murder,
cheat, and lie to use and try to make us believe it's for our own good,

loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT