Copy Link
Add to Bookmark
Report

b0g 10

eZine's profile picture
Published in 
B0G
 · 25 Apr 2019

  

_________________________________________
.-. _ .-. / \
| _____ | . o O| ALL YOUR B0G ARE BELONG TO US |
( @ @ ) \________________________________________ /
\ /
\ --- /
| |
--- ---
| i i |

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

TH4 M4Y 1SSU3 – 1SSU3 X ! 1N Y00R F4C3! PH33RN4T10N!

b0g b0g!# !b0 b0 #@! b0g!# #@!
b0g !b0g!#@ !b0 b0 #@ @!b0g!#@ #@!
b0g @!b0g!#@! !b0 !b0 #@ #@! #@! #@!
b0g @! @!b !#@! !b0 #@!b0g!#@!b !#@ 0 @!b #@!
b0g #@!b #@!b #@! !#@!b0g! !b0 !#@!b0g!#@!b !# b0g!#@!b #@!
b0g!#@!b0 #@!b #@! g!#@!b0g! !b0 !#@!b0g!#@!b g!# !b0g!#@ b0 #@!
b0g!#@!b0g #@!b #@! 0g!# b0g! !b0 !b !# g! @!b !#@ b0 #@!
b0g !b0g #@!b #@! 0g!# b0g! !b0 @!b !# g! @!b !#@ b0 #@!
b0g !b0g #@!b #@! 0g! b0g! !b0 @!b !# g! @!b !#@ b0 #@!
b0g !b0g #@!b #@! 0g! b0g! !b0 !#@!b0g!#@! g! @!b !#@ b0 #@!
b0g !b0g #@!b #@! 0g! b0g! !b !#@!b0g!#@! g! @!b !#@ b0 #@
b0g !b0g #@!b #@! 0g!# !b0g! @! g! g!# !b0g!#@!b0
b0g!#@!b #@!b0g!#@! g!#@!b0g! !b0 #@! g! !# !b0g!#@!b #@!
b0g!#@!b @!b0g!#@ g!#@!b0g! !b0 #@! 0g! !#@ b0 !#@!b #@!
0g!#@! !b0g!# !#@ b0g! !b0 #@ 0g #@! #@!
b0g! !b0g!#@!
g!#@!b0g b0g!#@
g!#@!b0
g!#@!b

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!



____________________________________________________________________


[ Table of Content! [b0g-10.txt]
[ 0:. - [ ] :. ]
[ 1:. - [ The Tao of TCP/IP ] [phlux] :. ]
[ 2:. - [ Electromagnetic destruction for dummies ] [Joe-ph33r] :. ]
[ 3:. - [ How to get laid on prom night ] [esd] :. ]
[ 4:. - [ How to make a simple taser ] [nemesystm] :. ]
[ 5:. - [ Introduction to the BASH Shell ] [fluid] :. ]
[ 6:. - [ How to be the Funny Guy in Your Office ] [unknown] :. ]
[ 7:. - [ Teleconf's explained ] [social retard] :. ]
[ 8:. - [ Pulp Fiction - New Zealand version ] [xhaze] :. ]
[ 9:. - [ The 7 REAL Answer to Wonders of World ] [Han D'seX0rz] :. ]
[10:. - [ ImagINN Hotel Support Software Advisory ] [obz] :. ]
[11:. - [ this_is_my_article_on_uber-messed-up-ness ] [odinoakie] :. ]
[12:. - [ How to make your own custom wiener dog ] [5107H] :. ]
[13:. - [ Diffusion of Technological Innovations ] [fcf] :. ]
[14:. - [ guide t0 zer0-day payph0ne expl0it ] [thecl0wn] :. ]
[15:. - [ Hax0r-rooms part 2 ] [DryGrain] :. ]
[16:. - [ Leet Shell-Scripting, Part One ] [MagicTux] :. ]
[17:. - [ IRC Quotes ] [k-rad-bob] :. ]
[ ]

____________________________________________________________________


get your b0g at: http://www.b0g.org - official site!


send your submissions to k-rad-bob@b0g.org !
gibb0r us your articles!
send us anything >:/
send nudies, pics, and any cool stuff you can think of to k-rad-bob@b0g.org
If I dont get mail I get upset, keep that in mind, do your part in making my
world a better place to be.


b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[ 1:. - [ The Tao of TCP/IP ] [phlux] :. ]
____________________________________________________________________




First off, this article touches on a volatile subject. If the words
spirituality, religion, or god make you feel queasy, skip this article. However,
if you are an open-minded person, as every good hacker ought to be, then read
on. To avoid any hostilities, when referring to a higher-power (Allah, Yahweh,
God, etc...) I will substitute the variable $hp. Please insert whatever string
you please to fill in for $hp. An idea came to me the other night when I was
writing a shell script to automate some DNS tasks. I was knee-deep in the script
when an interesting parallel hit me. Bear with me as I explain.

People's minds operate basically like a PC. As a society we have common
languages, or protocols for communication. We have different GUI's (faces and
clothes, etc...) and different kernel builds (personalities). To take the
analogy a bit further, everyone capable of communication has an IP address.
We're subneted according to race, religion, income, nationality, or what have
you. When it comes down to it, DNS (the phone company, governments, etc...)
can't sort us all out. Just as every domain has an SOA (start of authority),
humans have local leaders; for example your mayor, your mom, or your priest.
These local leaders supply you with a hosts file. I know this sounds obnoxious,
just keep with me here. This hosts file starts with the bare essentials.
For example:

10.0.3.1 mom mommy Leslie
10.0.5.2 dad papa daddy Fred Freddie
10.0.8.3 localhost me myself I phlux wickedbadass

As time goes on, your hosts file grows and gathers information on networks
(groups). For example a die-hard Israeli's host file might look something like
this:

28.21.133-136.* muslims bastards
199.2.67.* family
86.75.30.9 jenny
199.2.67.23 localhost me herman
199.1.1.1 Yahweh

Or maybe a Muslim's would look like this:

199.2.67-72.* jews infidels
28.21.136.144 localhost me ali
42.42.42.42 NES
199.1.1.1 Allah

I think maybe you have seen my point by now. Both hosts point to the
same address on the last line. However, the hostnames are different. This is
the parallel I was speaking about earlier. In my studies, the similarity of
monotheistic religions has always struck a cord with me. The only differences
in the world's one true power have been its name, and the methods used to
worship/understand it. What this breaks down to for me, is that $hp only has
one IP address. The difference in us all is what we have assigned to it in our
hosts files. We may interface with $hp on many different levels, but it is
still the same thing, the same host. All of us connect on different ports,
using different protocols. The key of all of this is to recognize,
that we all have the same entry in our hosts file.

I know this article is quite a stretch. But the message of tolerance
is vital. In the coming future, as corporations buy our freedom and sell it
back to us; as governments try to regulate what they do not own, as privacy is
taken from us with a smile, we are going to need each other. The ones who
understand how it all works, the ones who are not afraid of the .com's and
.gov's, and you, the reader. We are approaching a time where knowledge will be
more valuable than cash. Arm yourself well, and update your hosts file.










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

http://www.b0g.org
where fear meats joy

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!









____________________________________________________________________

[ 2:. - [ electromagnetic destruction for dummies ] [Joe-ph33r] :. ]
[Joe-ph33r@b0g.org] :. ]
____________________________________________________________________



Disclaimer:

This article is provided for informational purposes only. neither I,
b0g or anyone but yourself will be held responsible for anything
you may or may not do. In short if you build one of these things
drive around silicon valley doing drivebys on high-tech industry...
I am not to blame, YOU are the one to blame. blah blah, yadda yadda.



Warning:

Many of the devices described in this article use high voltages and
currents that won't just kill you, but will probably blow you apart
too. Also these devices can emit electromagnetic radiation at high
enough levels and frequency to be harmful to biological organisms.

The devices described in this article are illegal to build in most
countries and using them comes under anti-hacking laws in many.



Introduction:

Allot of people know that when a atomic bomb detonates it produces a
powerful electromagnetic pulse via the compton effect, which can
transfer enough power to electrical equipment near the detonation
to disrupt/damage it. Now most people don't have a atomic bomb so
if they want to disrupt/damage electrical equipment they will have
to make do with something commonly called a 'EMP gun' also know as a
RF/radio cannon or HERF gun. (though it is not quite HERF, it should
do the job of frying electronics well). In this article i can going
to explain how to construct 3 types electromagnetic weapon. One is a
omnidirection RF burst device, another a RF gun and lastly a
microwave gun.

The basic idea of the RF weapon is to generate a high powered, burst
of electromagnetic radio frequency radiation so enough power will be
transferred via the electromagnetic radiation that it will
disrupt/damage the target in some way. (commonly called EMI
(Electro-Magnetic Interference)) Which with computers this can range
from crashing the machine, which is called a 'softkill', to totally
fusing its IC's, which is called a 'hardkill'. One person has called
these type of weapons 'a poor mans nuke' as a powerful RF weapon
could easily give 'The Wall Street Crash' a whole new meaning.

People make the common mistake of thinking that RF weapons are very
different to EMP weapons, they are not. they are only different in
one way, that a EMP does not have a radio frequency, and the pulse
is usually a one spike, unlike RF weapons that generate a high
powered sine wave for a very short time. Though both use
electromagnetic radiation in very high levels to damage the target,
so the in the end result either type of weapon will get a
'hardkill', though RF weapons have one big advantage over EMP
weapons, in that because the radiation is at radio frequency, so the
majority of the radiation given of by the weapon can be guided
towards a target using a waveguide, where as the radiation from EMP
weapon spread out in all directions, so 99.9% of it, is probably
not being transferred to the target.


Construction Methods:

The are 3 easy ways to build a RF weapon:

The first one uses a large high voltage capacitor bank to provide
the huge alternating current to generate a RF burst, though unlike
the other methods the frequency will be to low for the radiation
to be guided effectively by a waveguide, unless you reduce the
capacitance of the capacitor bank significantly or raise the
voltage of the capacitor bank significantly, either of these
things should raise the frequency significantly.

The second a sparkgap discharge from a MARX bank to generate a RF
burst.

The third uses continuos directed microwave radiation, from a
magnetron tube.



[Method 1] [Omnidirection Destroyer]

for constructing this RF weapon you will need:


1. A large high voltage non-polarized capacitor or capacitor bank.
(capacitor bank == many capacitors hooked up in parallel). I am
only saying to use non-polarized capacitors as the is less danger
of them blowing up.

The capacitors i used for the weapon design 1, in this article are a
5uF@20kV capacitor bank which would be approx 80cm by 40cm in size.
Thought for move power if you can find higher voltage capacitors
or/and giant ones, for example 50uF@50kV is even better! I would not
go over 50kV though, as you will have big problems with insulation.
An not under around 10kV as the pulse will probably be too weak. also
the type of capacitor matter to and extent, as many capacitors will
not be designed for this (well most) and won't work very well.

You are probably thinking to yourself, where can i get mad-capacitors
like that?#@? Well the are many answers to that, i myself have many
high voltage capacitors (a 1.2uF@20kV bank in total) which i brought
for a project from a army surplus store for around $35. You can buy
new ones though they tend to be a bit expensive.
If you get really stuck, you can always make a homemade capacitor
out of a plastic dust bin, motor oil and a few other bits that you
can find around the home, though it will be far less efficient than
a manufactured one. I won't go into the construction in this article,
though there are many sites on the internet that show you how to
make high voltage capacitors out of junk. (I.E. plastic tubs, oil,
tin foil, glass bottles, etc)



2. A coil, of the right dimensions.

The dimensions of the coil depends mainly on the rating of
you're capacitors as well as the resistance of the sparkgap.
For the capacitors I am using in this example (5uF@20kV) a
good coil dimension would be:

1.5 inside radius

3 turns of wire

using well insulated (20kV for this) 12 AWG (american wire
gauge, thats 2.0523 in diameter, or you can use thicker wire if
you can find it).

This allows the very high current to alternate very fast using
the capacitor as a electrical storage tank, though the sparkgap
will provide an additional resistance effecting the current in
the coil.

If you are using a different rated capacitor and don't fancy
doing the math to work out how your coil will perform, the are
many programs & spreadsheets out there that will do the hardwork
for you.


3. A low VDC to high VDC step up circuit (for example 20 volts to
20,000 volts), as we are aiming to charge the capacitors a close
to there rated voltage as possible (20kV).

This is quite simple and can be made with the flyback out
of the back of an old color TV and a we other easy to find bits
this circuit is a very simple one and can be found here:

http://www.bithose.com/serfaq/REPAIR/F_hvinvert.html

(if it is not there now, search at http://www.google.com for
'simple high voltage generator')

I would detail it with the circuit diagram, but I would have to
include most of the document for legal reasons. All the parts for
this are dead easy to find, and even if you have to buy all the
parts new, it should not cost over $30. This is probably the
most complex part of the device to build. (still simple though)

4. A trigged sparkgap switch (or a even better a SCR if you can
afford one and find one high enough rated, though they are very
expensive new and probably very under rated for this purpose)

As the only real choice for switching the current, is a sparkgap.
though sparkgaps can be expensive. You can make a quick and
dirty mechanically triggered sparkgap yourself. You need these
things:

1. A think plastic tube. Use a thick piece of drainpipe or
something.

2. Two big metal balls (at least 3cm in diameter) that will easily
fit inside the pipe (make sure that the balls have at least a 2mm
smaller diameter than the inside of the plastic pipe).

3. Some flexible wire that is rated at 20kV+ (or whatever your
capacitors are rated at)

4. A piece of string.

5. a thick small sheet of plastic (just big enough to cover one
end of the tube) and some rubbery glue.

6. A car battery. This connects to the voltage step up circuit.


take your pipe and seal up one end with the plastic sheet and
the rubbery glue. then take one of your large steel balls and fix is
to the bottom of the tube at one end, before you do this remember to
fix the wire to the ball. Then fix the string to the other ball and
the wire to it also... the whole thing should look something like
this (cross section):


4¦!3
¦!
!!!! ¦!
!||! ¦! ||
!||! ¦! ||1
!||! ¦! ||
3!||! ¦! ||
||! ¦! ||
||! ¦! ||
||! ¦! ||
||! ¦! ||
||! ¦! ||
||! ¦! ||
||! ¦! ||
||! ¦! ||
||! _¦! ||
||! / \ ||
||!| 2 | ||
||! \___/ || the idea here is that when the
||! || string is released, the top
||! || electrode (the ball) drops an
||! || the circuit will be closed as
||! || a spark forms (this at first
||! || provides a very high
||! || resistance in the circuit but
||! || the resistance quickly drops
||! || to a few milliohms once the
||! || spark has formed).
||! ||
||! || the end of each wire goes to
||! || the capacitor bank.
||! ||
||! ||
||! ||
||! ___ ||
||! / \ ||
||!| 2 | ||
__||__\___/___||___
|___________________|
5


Of course the are easier ways to make a sparkgap, but this is a
simple easy one and pretty safe to. I think :/

Of course this is no where near as good or as efficient as a
proper manufactured sparkgap, though it will do. If you want to make
a sparkgap to your own design for this you can, this is just a
suggested design, and not a very good one at that.



-=Very Simple Circuit diagram=-



These two wires go to the High voltage generator

¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ ¦
¦ ¦
-----CAPACITOR---------------------> TO SPARKGAP
¦
¦
¦
¦
----------COIL --------------------< FROM SPARKGAP



As you can see this is a dead simple circuit, so it
should make sense. as you can see the voltage step up
circuit connects to the capacitor bank to charge it at 20kV.
Then when the capacitors are fully charged the sparkgap allows
the circuit to be closed and the energy stored in the
capacitor bank to flow through the coil very quickly, and
because the capacitors are non-polarized, the high current
should alternate like crazy in the coil giving a radio
frequency burst of electromagnetic radiation which will radiate
from the coil in all directions. The final frequency of the
pulse will be unregulated so will change rapidly as the
voltage drops but it can go as high as somewhere around 300KHz
though it really depends on the overall resistance of the
circuit. Power levels (at Max not taking into account the
resistance from the sparkgap and at Min taking a optimistic
guess):

Max: 1 gigawatts ph33rs0me, but perhaps unrealistic because
of the added big resistance from the
sparkgap.

Min: 200 megawatts


the burst will last for approx .2 of a millisecond



Things to Remember:

1. Make sure the voltage you charge the capacitors with is lower
than the rating on the capacitor, otherwise the dielectric will
break down and damage to the capacitors may result.

2. the capacitors can sometimes recharge themselves a bit, so
careful!

3. careful with what you discharge the capacitors/capacitor bank
with as shorting with some objects may cause them to vaporize or
explode, or something like that. (i don't really know what will
happen, but it you can bet it will be bad!)

4. The discharge from the high voltage capacitors is totally
lethal.

5. make sure your hook up wire is as thick as possible.



Damage and Range of this weapon:

I have not built or tested one of these and that is the only real
way to know, though at a guess i would say that at the least this
design should be able to totally destroy a computer as far away as
10 metres and at the most be able to destroy every electrical
object in a office complex.




[Method 2] [RF Pulse Gun]:

This way is a bit less simple as the board RF frequency pulse is
generated by a high powered sparkgap discharge, though unlike
the last method, the pulse that is generated can be directed by a
waveguide. For this design you will need:

1. a good sized MARX generator setup, use a some nice big chunky
capacitors. You can see a home made MARX generator setup here with
construction information:

http://home.earthlink.net/~jimlux/hv/marx.htm

as i won't detail it here. (If that link didn't work just go to
http://www.google.com and type 'MARX generator' it won't take you
long to find the simple schematic, though you have to get the
values right for the sparkgap distance, resistor levels etc.
If you want to get rid of the sparkgap jitter, and you can afford
it, you can replace the sparkgaps with SCR's or triggered
sparkgaps. If you are thinking of building a very compact MARX
generator, EG&G make a very compact sparkgap, though they might
only supply them to the US military i suspect.

2. A really thick plastic tube. These are easy to find, just
use a bit of hosepipe or something.

3. A simple waveguide.

This easy to build of a bit of sheet metal, though some
calculations will need doing to determine best angle (again the is
software about to work all this out). It should look like a horn
type thing when finished.

a waveguide should look something like this (cross section):

/
/
/ @ == emitter coil
/
/ though the waveguide shown on the
/ left should be allot more concave
| @ but my art-skillz are totally
\ rubbish.
\
\
\
\
\


the waveguide should basically guide the RF radiation
towards the target, you can make the beam tight or wider beam,
though the tighter beams will be more powerful and give the gun
a greater effective range naturally. The waveguides ability guide
the electromagnetic radiation also depends allot on the frequency
of a pulse, as for instance a 500KHz pulse will take a waveguide
300 metres across to guide it in the right direction, where as
a pulse of around 80MHz will only take a waveguide of 3 metres
across to guide it effectively, though waveguides do tend to be
inefficient at frequencies under 700MHz. The frequency of the RF
pulse for this type of weapon will be very wide, though should
easily output radiation in the 100MHz+ range so a waveguide will
work. I would measure the RF given off by the sparkgap discharge
using a RF meter then design a simple waveguide to suit the
frequency range.

4. A low voltage DC to high voltage DC generator. If you actually
need one of these depends on the voltage of the capacitors you are
using in the MARX bank. So if you are using high voltage cap's you
will need one. The link has been given in the construction details
of the first design.

I won't go into this one much, its not really that complex, though
you might have problems with insulation if you are trying to build
it as is uses very very high voltages. All you need to do is
discharge the MARX generator through a sparkgap. The gap for the
spark to jump is inside the pipe to stop the high voltage shorting
over the nearby waveguide. (the sparkgap is at one end of the
waveguide) Then the RF pulse is directed at towards the target by
the waveguide. If you want an example of this look at the so called
HERF gun at Infowarcon99 which used and ignition coil driver and
sparkgap discharge to generate the RF energy. Though using a MARX
bank the pulse will be a hell of allot more powerful, and toast a
computer to 'extra crispy' levels. I have no idea what the effective
range would be, as it depends allot on how powerful the discharge
is from the MARX generator and to an extent how tight the waveguide
is. If you want to see a example of a sparkgap RF generation weapon
visit http://www.empherf.com where a chap called slava has built a
RF weapon very similar to the one showed off at Infowarcon99,
(infact almost a copy) though that only uses a ignition coil driver
to provide the high voltage spark. The method using a MARX
generator described above should be far, far more powerful than
that, Oh yes.



[Method 3] [Microwave Gun]:

This is a very very simple way of building a Electromagnetic weapon,
and will have a considerable range because of the high frequency.
though the radiation given off will be around 2.5GHz so it will
have harmful effects on biological organisms, so careful what you
point it at as it will cook at long range and radiation can reflect
back at you!

Ok first you need to get your grubby hands on a microwave oven,
so...

Rip open the microwave oven, discharge all the capacitors then take
out all the parts (intact, don't disconnect anything! and if you do
have to disconnect anything to get the insides out of the case make
sure you note exactly where all the wires went and reconnect them
where you found them) take the magnetron tube, which should be
positioned in a small cavity surrounded by a small waveguide at the
top or side of the microwave oven and put a very tight long
waveguide round it. (again you need to work out the best dimension
here because i can't be bothered, though the horn should look like
a very nearly straight pipe and won't have to be very long because
of the wavelength) This should easily fry a computer at 50 metres
very possibly much further if the waveguide is correct and you did
not hack apart one of those old very low powered microwave ovens
from the 80's. Oh you can point it at lightbulbs and they should
light up too. The disadvantage of this weapon is that you have to
have it plugged in at the mains, or have a portable generator with
you.

If you want to see what will happen to a computer when this microwave
gun shoots it, put a calculator in a microwave oven and turn it on,
at full power for only a few seconds.

I advise against opening up microwave ovens through as they contain
high voltage capacitors that even when the oven is unplugged, have
easily enough charge to kill, also the microwave radiation produced
by a device like this can cause deep thermal burns, blindness and
other bad side effects. Though if you feel like having a try
consulting the microwave oven repair FAQ at http://www.repairfaq.org
to find out about how to take the insides of the oven out without
getting yourself toasted in the process.










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

K-R4D C4LCUL4T0R JU4R3Z

Author: Trionix
Release Date: Whenever the next b0g comes out
Platform: Sharp Graphic Calculators
Version: EL-9200

Ok, go to create a program, and name it k-rad. Input the following code:

Print " "
Print " "
Print " "
Print " "
Print " "
Print " "
Print " "
Print "PRESS (CL) TO"
Print "CLEAR ALL DATA"
Print " "
Print " "
Print "PRESS (ON) KEY"
Print "TO CANCEL"
Print " "
Wait 40
ClrT
Print " "
Print " "
Print " DATA CLEARED"
Wait 1
ClrT
Print " "
Print " "
Wait 1
ClrT
Print " "
Print " "
Print " DATA CLEARED"
Wait 1
ClrT
Print "REAL MODE"
Print " 0."
End

This program is DAMN useful in exams. When the teacher comes round to clear the
calculators of all data, simply run this program, and pass it to the teacher,
they'll press the (CL) key, and presume that all formulas have been wiped,
actually leaving the calculator just how it was when you gave it to them. U can
store whatever programs u need for the exam, and they won't be deleted!
Although the program isn't an exact representation of what the 'reset' button
does, it's close enough, and if u have an examiner who is a stupid fuck, like I
just did, u can get away with it. If anyone know how to highlight text, e-mail
me, b0g@b0g.org, cheers, Tri

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[ 3:. - [ How to get laid on prom night ] [esd] :. ]
[spin@plebian.com] :. ]
____________________________________________________________________


subtl

Well, it's about that time again. Prom is lurking around the corner for all of
us American high schoolers. Mine is April 21. The number one priority of your
night shouldn't be having fun with your friends, no sir. It should be getting
laid (which is fun also, unless you're a complete fuckface). Now, obviously
there are several ways you could attempt this. There are the subtle ways like
"Hey, nice shoes - wanna fuck?" or "Here, take another drink!", then there are
the esd ways. Sure, you could go ahead and do those first things, god knows I
used to.
But there are other ways my friends, and I will reveal them to you. First of
all, dates are generally bad to bring to prom. Let's take my situation. Prom
tickets are $25 a piece this year. Gas money is around $15 probably. Paying for
dinner would be another $30 and a corsage would be like $20. Taking a date
roughly costs me, oh, $90. And this doesn't even guarantee getting laid. Now,
say I go with some friends. $25 for one ticket, no gas money, no corsage (I have
no idea if I'm spelling that right) and maybe $10 for some food. $35. A total
savings of $55. Whoo. Ok, so you get to the prom. What the hell are you going to
do? Everyone's here with dates right? Wrong. Most of the people at proms now
don't take dates. This leaves you with a nice selection of healthy, grade A,
premium booty. Like I said earlier, you could get her drunk as fuck and nail
her, but anyone can do that. You want to separate yourself from the desperate
losers. If you do get a hot girl drunk -- and she's popular -- let's just say
you'll be waiting a while to have sex with anyone involved with her for a while.
So, use my technique. Pick a girl out that you like. Obviously, she can't be a
virgin (unless it's a freshman of course, or an ugly bitch) because most likely
she won't give it up. After you've selected your prey, er, girl, walk up to her
and ask her to dance. This works incredibly well on freshmen by the way, because
they're so naive. Heh.
While your dancing, tell her she's hot tonight. Don't go for any of that cheesy
Casanova shot, girls don't go for that as much as you think. She'll probably be
trying to think of something to say, don't let her talk. Ask her who she came
with. Basically, the main idea here is to talk while your dancing. Come off as
relaxed and don't make it too obvious you're hitting on her (yet). If you just
dance with her and stare off into the crowd, you're not going to get shit. While
talking, you're going to have to come off as cocky, they like guys who are a
little full of themselves. Ask her if she likes your tux. This whole convo is
going to have to be improve on your part. If you're talking to a freshman you
haven't really talked to before, she's probably not going to know what to say
for the most part, so it's going to be your job to hold up the conversation.

After the dance, ask her if she wants something to drink. If she says yes --
you're in, if not -- you're out. I could write a whole new article on how to
redeem yourself if you messed up horribly on the dancing part, but I don't
really have time. So let's assume she says yes. Sit down and chill with her for
a while. While sitting, you're not going to be as talkative as the dance, but
you still want to talk with her. Ask her if she's doing anything after the dance
and if she isn't then see if she wants to come to your house or a friends house
to watch a couple movies you rented (heh). The movies part is classic - works
about every time. Assuming she says she'd like that; you're in. If she wants to
go with you somewhere you're pretty much guaranteed a fuck. But, you're going to
want to keep it cool for a while longer.
When you get back to wherever you're taking her, you have a couple choices. You
could do some of the things I listed above if you're feeling extremely horny -
get her drunk, just ask her if she'd like to have sex or hell, slip her some
roofies, whatever. Or you can test yourself and actually sit down and watch a
movie. Out of those 3 things above, the 2nd one actually has worked for me on
several occasions. Let's assume, however, you're sitting down to a movie you've
rented. Scary movies are ok, lovey dovey movies aren't. Comedy is the way I go
though. Believe it or not, her seeing you laughing will probably get you in
better than anything else. After the movie has started - it's smooth sailing. If
you fuck this one up; you're a moron and you'll never get laid.
Happy hunting gentlemen. By the way –
"If all else fails, and you've seen no pink, slip some roofies in her drink.."










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

From: AdiiiRT@aol.com
To: prae@b0g.org
Subject: I need the url

i cant remember the full url to bog.org could you send it to me

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[ 4:. - [ How to make a simple taser ] [nemesystm] :. ]
[neme-dhc@hushmail.com] :. ]
____________________________________________________________________


[introduction]

In this text I will be talking about how to make a simple taser from a flash
camera. It is strong enough to incapacitate someone. This text starts with
the most simple way to do it.
The second part goes in depth on how this works, how to improve your taser,
etcetera.

[taser, quicky style]

Take your flash camera, open it up. Make sure no batteries are in the camera.
Locate the flash. Cut the wires right when they enter the flash. You should
have a red and green one, but can also be red and black, etc. There can
be a third wire that disappears into a little round cylinder. You don't
need that, cut the wire off at the base of the cylinder.
Now you need to either know how to solder or get someone else to do it.
Get two pieces of conducting wire. Copper wire is good because it will push
against the target and won't wreck the printing plate if pushed too hard.
Where the wires disappear in the printing plate (green plate where everything
is on), solder one wire off. Stick the copper wire in the hole and solder
it tight. Repeat for the other wire. You should have to copper wires sticking
out of the printing plate now. It should be plastic covered except for the
ends.
Put it back together and hook up a battery. If you have a throw away camera
you probably can't put it back, then just tape it ALL up. Do it well or
you will zap yourself.
After you put it back together it works just as usual, push the flash button,
or pull the switch, whatever applies to you and wait for the light to go
on. It can be used even after having the switch over for a second, but it
won't be as strong.

Usually this will give you about 100 micro Farad at around 300 volts. Mine
does 100 micro Farad at 330 volts and after loading it for two seconds it
already is enough to make somebody's side feel like something smashed into
it. Yes, we know this by testing.
To test if yours is working charge the flash and then hold a screwdriver
with a PLASTIC handle against the two wires. You hold the plastic part,
the metal parts of the screwdriver touch the wires. If you did it right
it will give two sparks. Your screwdriver might have two black singe marks.
My friend has one that will actually weld to the screwdriver everytime.

[how it all works]

First the most interesting part: the shock. How do you know how strong your
particular camera can zap someone? When you open your camera there will
be a big cylinder. It will say something like: 100µF/300V. That is a capacitor.
The higher the amount of Farad's the stronger the zap will be. The higher
the voltage, well you know that one. =)
What happens when your flash camera makes a picture is this. The batteries
go through some electrical components to boost it's electrical power from
a 1.5v to something around 300v. It then enters the capacitor which stores
the power. The micro Farad's being how much of it stores.
Then when the wires connect, the circuit is shorted and the capacitor releases
what it has stored. There are two types of capacitors: polarized and non-
polarized. Flash camera's have polarized because it needs to go in one way
and leave the other. Last time I checked Radio shack they only had the non-
polarized type. You can recognize it the easiest like this: polarized capacitors
are usually cylinder shaped and non-polarized are disc shaped, ie: flat.

Real stun-guns/tasers work with a high voltage (in the fifty-thousand range)
and a low amount of amps. It is not voltage that kills a person, but the
amperage of it.

[how to improve your taser]

You might get bored of your taser after a while, so here are some things
you can do to improve your taser.

Capacitors
I was wondering if I should mention this, but full disclosure should not
just count for vulnerabilities in software. There are some big capacitors
in old TV's. Now you should know that TV's hold their charge for years and
years and have enough power to kill you, so you will want to stay away from
TV's if you don't know what you are doing. But here goes. If you want to
get rid of the biggest risk do the following. Open the back of the TV. There
should be something looking like a suction cup attached to the back of the
screen. Carefully take it off by its plastic and then hold a screwdriver
against the metal part in the suction cup. Make sure you do it well. Oh
and some sparks may fly.
That was your biggest problem. Now look at the printing plate. You will
see a lot of cylinders. Locate the ones that say something about µF's and
V's. Then decide which size you want. I have seen ones anywhere from 4µf/35v
which is very tiny, to 200µF/250v and a huge one the size of my fist that
said 25000v, but that was in a special casing and that is just too much
for anyone in their right mind.
Now make sure the capacitor is discharged and solder it off. Then open up
your camera and remove your old capacitor. Locate on which side the colored
line with the small rectangles along the side of the capacitor is. That
is the plus, put capacitors in wrong and they break. Then solder the new
one in with the plus on the right side.
If you can find a few capacitors that are equal in volts, you can hook them
up in parallel. That means that they are both hooked up in the same place,
like this:

+ ...... . and | is wire or printing plate
| | = is capacitor
= =
| |
- ......

Don't do it like this or it will likely mess up, ie: no full discharges
or multiple delayed discharges.

+ ......
|
=
|
=
- ......

Don't bother with attaching a 9v battery instead of a 1.5v battery: it won't
work. The circuit will just cut out on you and not do anything.
If your old capacitor said 300v, don't expect your new 500v capacitor to
be charged at 500v. The components before the capacitor dictate the voltage.
The more your capacitor holds the longer it takes before it is fully charged.
Use a multimeter to get reliable measurements on the exact voltage. Usually
it is about 30 volts more than the capacitor says it holds. I do not know
why a capacitor holds higher voltages than it says on the outside, but I'm
just stating facts.

greetz,
nemesystm - http://dhcorp.cjb.net










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

From: dix_denver@yahoo.com
To: k-rad-bob@b0g.org
Subject: 666

i have a few number of master card but
it just the number. My question is how
to know the master card's owner ?
please resend my e-mail.

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[ 5:. - [ Introduction to the BASH Shell ] [fluid] :. ]
[markus@fluidenterprises.net] :. ]
____________________________________________________________________


Intro

The bourne-again shell, or bash for short, is quickly becoming a very popular
shell. The bash shell has many great features, including many advantages the
the C and Korn shell have. Bash has command-line features which usually get
lots of notice. Another major feature is its job controls. Bash has become so
popular that it is usually used as the default shell for linux operating
systems.

Basics

To execute a command in bash, you have to supply the directory and executable
name. If I wanted to execute party in my /root/personal folder, I'd do
/root/personal/party. People quickly found this inconvenient so the programmers
developed a thing call working directory. You can navigate directories using
the 'cd'(change directory) command. If you are lost, typing 'pwd' will show you
your current working directory. In order to know where your going, your going
to have to see what's in the directory. That can be accomplished by using the
'ls' command. There are special characters in bash as showed in the table below

character | function
========================
. | means the current directory
.. | means the parent directory
? | represents 1 character of anything
* | represents infinite characters of anything

These 4 will now be explained with examples. If you were in /root/personal and
you wanted to execute party which was in the directory you were in, you
couldn't just type party. If you just type party, it'd search in your PATH
locations, which are defaultly set to /bin, /usr/bin, /usr/local/bin,
/usr/sbin and /sbin. Instead you'd have to do './party' meaning in the current
directory, run party. If you were in /root/personal/mail and wanted to run
party, you could do '../party', which would mean in the parent directory(the
one right before it) run party. If you were in /root/personal and type 'cd ..'
it would take you to /root. Now for the ? and * examples. If you had the
following files in a directory:

baaaaaabby beebby bibby bobby and bubby

If you typed 'ls b?bby' you'd be saying list all the files which start with a
b, then have any character, then ends with bby.

ls b?bby
will list:
bibby bobby bubby

If you did 'ls b*bby' you'd be saying list all the files which start with a b,
then have any amount of any characters, then ends with a bby.

ls b*bby
will list:
baaaaaabby beebby bibby bobby bubby

The * character is useful for when you want to see all the files starting with
a certain letter, or to see all of a certain of file. Examples:

ls h*
ls *.c

If you ever want to goto your home directory or use it, you can use ~. If your
username is joesmith and you type 'cd ~' it would take you to
/home/joesmith(or where-ever your home is)

Bash Input/Output
By default, executables take their input from the keyboard, and print there
output to the screen, but this can be changed. If I wanted to redirect the
output from the command 'ls' to a file, I'd do 'ls > file'. That would direct
all the information the ls would print to the screen into the file "file". If
you wanted to input all the contents of a file into a command, you can use the
< command. Such as "more < file" that would take everything from file and put
it into the more command. If you wanted to see all the info from ls in the
more format, you could do it in two commands like this 'ls > file' and 'more <
file'. Or you could use a | and do it in one command 'ls | more'. That takes
the output from ls and puts it as input for more. Another example of using the
| is 'cut =d: -f5 < /etc/passwd | sort' That would grab all the names from the
passwd file and sort them out.

Background/Foreground

Normally when you run a program it has full control over the terminal until
the program is done running. Then it throws you back into the shell. Well,
this OS isn't called multi-tasking for nothing. If you want to run a program
in the background so you never have to deal with it, put an & at the end of
the command.

Example:
bash# tar xvf big_file.tar &
[1] 2486
bash#

The [1] means it's job number 1 and the second number is the process. I'll go
into details with processes later.

What we just did is move the program into the background. But what if we want
to see what it's doing, well, we can use the foreground command('fg').

bash# fg 1

Now the program is running in the foreground at the terminal.

If you wanted to stop the program from running, you could do.

bash# kill %1

The process is now killed. Instead of using %1, you could have used 2486 (the
process ID).

If a program was running in the terminal, and you wanted to kill it or put it
in the background, you could use CTRL+Z. If we did CTRL+Z while tar was
un-taring it's file, we'd see

[1]+ Suspended tar xvf big_file &

Right now the program is paused. If we wanted it to goto the back ground we'd
us bg 1, foreground, fg 1, kill it, kill %1.


Processes

To get a list of all the processes currently running, use ps (or ps -aux for
more info).Remember, if the list flies by too quick, you can use ps | more.

If you see a process there you'd like to kill, you can use the kill <process>
command. If that doesn't work, they you can use kill -9 <process>

BASH Environment Varibles

In this part of the BASH Shell tutorials we'll look at BASH Environment
Varibles, how-to edit ~/.profile and ~/.bash_profile and how to set and
use some common varibles.

Sample .bash_profile

To understand how the .bash_profile works, lets first take a look a mine:

fluid@fluidenterprises:~/$ more .bash_profile

# Set environmental variables
SHELL=/bin/bash
EDITOR=/usr/bin/vi
PATH=/sbin:/usr/sbin:/bin:/usr/bin:/usr/local/sbin:/usr/local/bin:/usr/X11R6/bin
MANPATH=/usr/man:/usr/X11/man
PS1='\u@\h:\w$ '
PS2='> '

# Run any commands
mesg y

fluid@fluidenterprises:~/$

Let me go through this file line by line.

The first line "# Set environmental variables" is a comment, all comments
in bash, sh and makefile scripts start with a #.

The second line "SHELL=/bin/bash" is your default SHELL. Set it to your
favorite shell.

The third line "EDITOR=/usr/bin/vi" is your default EDITOR. Programs will
run EDITOR when they need you to edit a file, therefore set EDITOR to your
favorite text editor.

The fourth line "PATH=/directory:/directorytwo" is the PATH's your shell
will use when searching for a command. If you ran the command "vi" the
shell would search through each of those directories, in order. If it
found a program called vi in one of those directories, it'd run it, if it
didn't find any program called vi, it would reply command not found.

The fifth line "MANPATH=/directory:/directorytwo" is the path's your shell
will use when searching for a manpage. It'll search each of those
directories in order until it finds or not finds the man page.

The sixth line "PS1='\u@\h:\w$ '" is what your prompt will be, if you
notice in the above example my prompt is fluid@fluidenterprises:~/$
\d = date
\h = host name
\s = shell name
\t = time
\u = user name
\w = working directory

The seventh line "PS2='> '" is what your prompt will be when your using
more then one line as the prompt. The same commands as above work for it.

The tenth line "mesg y" just runs the command mesg with the y argument,
which means people are allowed to request talk sessions with you and they
can write to you.

All of the command the above .bash_profile could be typed in manually
everytime you logged in. Using .bash_profile makes that a lot more
conveniant.

Markus "Fluid" Delves
markus@fluidenterprises.net
http://www.fluidenterprises.net










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

From: playaray@excite.com
To: k-rad-bob@b0g.org

can u tell me 1.how to install text messagibg onto my nokia
5160 so i can recieve them and write back.

can u tell me how 2 phreak a gte qualcomm

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[ 6:. - [ How to be the Funny Guy in Your Office ] [unknown] :. ]
____________________________________________________________________



10. Keep telling the same person that they have bad breath even if they don't,
and then punch them in the face.

9. Announce in a meeting that you have AIDS. After everyone gives you the
sympathy remarks, tell everyone how you're just kidding and tell them that they
are all a bunch of queers.

8. Before a meeting, fill your mouth with custard. Then during the meeting, put
one finger in the air and make like you are hocking up a big loogie. Then spit
the custard into a clear glass and hand it to the person next to you and say,
"Beat that."

7. Inform a male co-worker that he "wouldn't make a good hooker." Then piss in
his coffee and tell him that he needs a good "ass fucking."

6. Always walk around with a big smile on your face and keep one hand down your
pants.

5. Answer every question asked to you with "Fuck if I know!" Then call the
person a racial slur that doesn't even match their race.

4. Brag about the fact that you own a gun, and keep playing with your nuts. Get
them really sweaty, and then walk around shaking everyone's hand.

3. Shit on the floor in your office and when someone comes in and sees it, tell
them it's the fake plastic kind. When they try to pick it up, and realize that
their hand is full of shit, laugh and point.

2. Run down the hall with your dick out while pissing all over and yell, "It
won't stop! God help me! It won't stop!"
Then, when it stops, look down and say,
"Oh."

1. Ask to borrow someone's pen. Bring it to the bathroom and stick it in your
ass. Return it and tell the person to smell it. When they tell you it smells
bad, be like, "It should! I had it in my ass!"










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!


/\_/\__/\
/ \
.-´¯¯¯¯`-. | .'¯¯¯¯'. | .-´¯¯¯¯`-.
/ \ \/ O O \/ / \
| \ 0| C |0 / |
| |¯\/'. `-\ O /-´ .'\/¯| |
| \ ¯ /´''-..'.____.'..-''`\ ¯ / |
| /¯ /::::::::b0gman::::::::\ ¯\ |
|/ ¯¯ '-.___..:::::::..____.-'¯¯ \|
| .---./:::::::\ .---. |
|/ / .´:::::::::`. \ \|
| .' /:::::::::::::\ '. |
\/ / /:::.'¯¯¯¯¯¯'.::\ \ \/
\ / /:::/ \::\ \ /
\| __\::/ \::|__ |/
/ \/ \/ \
\____| |____/



b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[ 7:. - [ Teleconf's explained ] [social retard] :. ]
[cyber@sy.mail22.com] :. ]
____________________________________________________________________



Part ONE: The Know how. And what you need.

1. COCOT pay-phone:

these are the easiest thing to find... some people say they cant, but about 75%
of payfones are COCOT fones, what they are, are personalized pay-fones, owned by
a company, achool,etc. if your in high school, the pay-fones at your school are
COCOT ones, your school gets the money. gas stations,schools,etc. best place to
find them.

a way to find out for sure... is too look for the 'network telecommunications'
box attached to it ( alittle box about 1foot x 1foot , ugly ass color brownish
green, also used for beige boxing,tapping,etc. )

2. name,number,address.

ahhh, the most important piece of material... the most easiest way to do this
is... get your fone book and rip out a page or two, bring a pen, and on the way
to the COCOT circle some names, that u feel comfortable saying. its always good
to have a name u might have to spell out for the op. makes it sound more
real,etc.

3. making things realistic....

to do this you cant act like a robot, dont have things planned out to say
either. you must play it cool, make noises,cough,hit the fone,apologize for
things etc. its called SEing ( social engineering...) its the most important
part. be very polite, have a realisitc voice please... and dont fuck up... its
that easy.. i always end my calls by saying:

---------------------------------------------------------------------
social: alright is that it?

op: yes sir, thats everything.

op: you are aware of our #0 options, etc.
social: yes i am... oh and what was your name again?

op: anna

social: thank you very much anna, you were allot of help.

op: thank you sir, and thank you for using at&t

op: *click*

social: from the people for the people ;)

---------------------------------------------------------------------

4. can of jolt! and yes this is needed ( uma exceptions for vodka/gin/etc. )

ahhhhh wasnt that elite? SEing is common sence... just play it cool and all
should be fine.

ok now how to do this from the start. you have selected the COCOT and have a
print out of this... now pick up the fone and dial 1-800-232-1234 ( easy # to
remem but wright down ) it should go like this:

---------------------------------------------------------------------

you: *dialing 1-800-232-1234*

op: hello, at&t teleconfrencing , anna speaking, how may i help you?

you: hi yes, i would like to set up a new folder please.

op: ok 1 second please...

you: ok

op: am i speaking to the host?

you: yes

op: your name sir, please.

you: jim jones

op: ok mr.jones, may i have your home fone #?

( NOTE* this is the COCOT payfone number... not the address u picked... if the
fone does not have the number listed, before u do all this call your local op by
dialing 0, tell them you need someone to call u back and its urgent at that
fone, and that u need the # for it, or act like a bell employee and u need her
to read back the #)

you: yes i do, 1-707-707-7070

op: ok one second, let me varify this number...

you: ok

( NOTE* ok here is the mid point, and most important.... shes calling the
security to check to see if the # is ok for billing... if she comes back and
says she sorry but cant bill back, either hang up and start over, or if u have
other #'s, tell her she should try your other home # and that knowone is home,
try to convince her its ok to bill to it... this might get confusing if its your
first time , so i would hang up...)

op: ok mr.jones everything looks good.

op: may i have your address?

(NOTE* here she is just filling out a profile one you, dun worrie )

you: yes, 1234 east hwownzme st. , bumsville IDAHO, 35689
( yes that is the ZIP code )

op: ok, thank you.

op: ok your folder is made mr.jones, the folder ID is 456456890

(NOTE* this will always be a 9 digit #, wright it down)

you: ok thank you.

op: did you want to start a confrence today?

you: yes

op: ok and the time

you: today at 4pm EST

op: ok, and how many participants ( pardun my shit spelling )

you: 10 with the port exspantion please.

(NOTE* trust me from a long time of doing this , if it gets over 10 ppl it
sucks, everyone interupts each other,etc. the port expan is so if more then 10
ppl do come in it will let them in )

op: ok, and for how long will this be.

you: 3 hours please

(NOTE* dont be retarted and start one for like 64 hours, be realisitc please )

op: ok, i have a tele-conf set for monday sept. 10 at 4pm EST, 10 ppl with
the port exp.

you: thats correct.

op: ok the dial in # is, 1-888-789-0000, the host pin is 455455 and the guest
pin is 676676

(NOTE* the dial in # will always be 888, and it changes everyday, and some times
everyother day.. the pins will always be 6 digits. the person who starts the
conf uses the host pin when they dial the 888# and it asks for the pin. the
others use the guest pin, ask her if she can read back the #'s just to make sure
u got the right #'s )

you: ok, is that it?

op: yes it is sir.

you: thank you. and what was your name again?

op: lisa

you: you were very much help lisa, have a good day.

op: thank you for using at&t

op: click*

you: click*

---------------------------------------------------------------------
( NOTE!!!!!!!!*********** the above will not always be what will happen , but
that is the original way it happens, im not responcible if you get caught, NEVER
EVER EVER CALL FROM YOUR HOME WITH THE HOST PIN, IF U DID, YOUR SCREWED. i would
never call from my house with the guest pin, but its ok)

- The Social Retard of The Swing Youth ( http://crack-is.for-kids.com )










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

From: sadist111@hotmail.com
To: k-rad-bob@b0g.org

I like hacker programm.I am study in
Mongolian Tekhnical university.

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[ 8:. - [ Pulp Fiction - New Zealand version ] [xhaze] :. ]
[kyuss@vodafone.net.nz] :. ]
____________________________________________________________________



JULES
-- okay now, tell me about the bestiality bars?


VINCENT
What so you want to know?


JULES
Well, fucking animals is legal there, right?


VINCENT
Yeah, it's legal, but is ain't a hundred percent legal. I mean you
can't walk into a restaurant, pull out a sheep, and start fuckin' away.
You're only supposed to fuck in your home or certain designated places.


JULES
Those are bestiality bars?


VINCENT
Yeah, it breaks down like this:
it's legal to buy it, it's legal to own it and, if you're the
proprietor of a bestiality bar, it's legal to sell it. It's legal to
carry it, which doesn't really matter 'cause -- get a load of this
-- if the cops stop you, it's illegal for them to screw you.
Screwing you is a right that the cops in New Zealand don't have.


JULES
That did it, man -- I'm fuckin' goin', that's all there is to it.


VINCENT
You'll dig it the most. But you know what the funniest thing about
New Zealand is?


JULES
What?


VINCENT
It's the little differences. A lotta the same shit we got here,
they got there, but there they're a little different.


JULES
Examples?


VINCENT
Well, in New Zealand, you can buy goat in a movie theatre. And I
don't mean no side of the road goat either. They give you a farm goat, like
in the country. In Auckland, you can buy deer at MacDonald's. Also, you
know what they call a Quarter Pounder Fish in Auckland?


JULES
They don't call it a Quarter Pounder Fish?


VINCENT
No, they got the metric system there, they wouldn't know what the
fuck a Quarter Pounder Fish is.


JULES
What'd they call it?


VINCENT
A Slippery Fuck.


JULES
(repeating) A Slippery Fuck.
What'd they call a Big Mac?


VINCENT
Big Mac's a Big Mac, but they call it 'His Big Mac'.


JULES
What do they call a Whopper?


VINCENT
I dunno, I didn't go into a Burger King. But you know what they put
on dogs in Christchurch instead of vasoline?


JULES
What?


VINCENT
Mayonnaise.


JULES
Goddamn!


VINCENT
I seen 'em do it. And I don't mean a little bit on the side of the plate,
they fuckin' drown 'em in it.


* * * TO BE CONTINUED * * *










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

#######################################################################
# #
# #
# C A S H M O N E Y R E C O R D Z #
# #
# and #
# #
# C I S C O S Y S T E M S I N C . #
# #
# -PRESENTZ- #
# #
# {{{{ keepin it real at the NOC }}}} #
# {{{{ pimpi

  
n' cisco's ain't easy }}}} #
# {{{{ 24/7 Cisco Husslahz }}}} #
# #
# BRONC BUSTER (as "IOS Hacker") #
# DMX (as "Network Engineer") #
# Juvenile (aka Juvie, as "Security Officer") #
# B.G. (as "Solaris Admin") #
# Jay-Z (as "Bigtyme Tech Support") #
# #
#######################################################################

--------------{{{{ G R E E T Z }}}}

AttRiTion.oRG
haXOrZ uNiTeD
HNN
#pHraCK
#FatKiDs
#LiNuXsEx

--------------{{{{{ S H O U T Z }}}}

tRu_pLaYa_69@aol.com
s8r_4_Life_69_420@hotmail.com
XxXxXx_aCiDiC_DeMoN_haCkEr_420_69_xXxXxX@yahoo.com
aLL trU CiScO haCkErz Who keEp iT rEaL WeRd uP yO

-------------{{{{{ F U C K Y O U Z }}}}

gRiD
CaNN
ziP-
sYnNeX
SwOpE
McX
k-RaD-bOB
jeNNy_2000_1999_6969_4_U_4_eVR@hotmail.com


--------------





I'm a digital cowboy... bronc's my name.
My janitor skills, they gained me fame.
An rloxley groupie, yes it's true.
A nambla man, I like little boys too.
sportin' them ciscoz thruout da land,
coding with one, whacking with tha other hand.
I route dem hos... and narq them kids.
Spreadin' mah love, and sufferin' from GRIDS.
--
SHAKE YA BEWT-AY
THEY CALL ME FRUIT-AY
BUT WHUT CAN AH SAY?
I'M JUST PLAIN GAY.
--
I'm ridin' through compton
with a cisco in the trunk.
Chillin' wit mah homeboys
like that poké-faggot bonk.

My GSR runz Solaris
Cause im a real G
With mad IOS extensionz
That'z why niggaz hate on me

I keep it real with rloxley
He gives me kiddy porn
I skewl his channel
New hackerz are born

(Chorus)
--
SHAKE YA BEWT-AY
THEY CALL ME FRUIT-AY
BUT WHUT CAN AH SAY?
I'M JUST PLAIN GAY.
--

Bronc:

Nigga I got these ciscoz iced up enough
While my lil rloxley's on the bus puttin out cigarette butts
But me personally cowboy I don't give a fuck
And I'ma always show love to my cut
Hit the solaris console tha bitch up
The Cash Money motto we got to hack til we throw up
Nigga point the cisco out guaranteed I can hack
Wootay I'm tattooed and barred up
Enterprise 10000 iced up, Rolex bezelled up
And my MCSE is platinum plus
Earrings be trillion cut
And my IOS 12.9-PRE4 be slugged up
My heart filled with anger cause nigga I don't give a fuck
Stack my Catalyst 6000z up
Cause one day I'm a give this hacker life up
Porn I don't discuss
A nigga outta line gone get his motherfuckin head bust
Cisco Money Millionaires plus
Don't touch sum'in nigga you can't fuck
Fifty inches Flatscreen is a must
By the year two thousand I'm gut out my bus

(Chorus)
--
SHAKE YA BEWT-AY
THEY CALL ME FRUIT-AY
BUT WHUT CAN AH SAY?
I'M JUST PLAIN GAY.
--

I be that nigga with the CCNA on me
If it aint faster than OC3 it don't look right on me
I be fuckin niggaz bitches all in they home
Niggaz be like, "Look at that Cisco on all that chrome"
CCNPz held by everybody thats in my click
Man I got the price of a Cisco GSR 'round my neck and wrist
My nigga Baby gettin' a special built server
A Cisco Ultra Enterprise 12000 B-14
I know you niggaz can't believe that
I can't wait to see ya haters face when ya see that
Man look at that
Niggaz claim linux just to stand on side of me
Folks say take that iPaq off boy ya blindin me
All day my Cisco PIX bling bling bling
Can see my Serverz from a mile bling bling

(Chorus)
--
SHAKE YA BEWT-AY
THEY CALL ME FRUIT-AY
BUT WHUT CAN AH SAY?
I'M JUST PLAIN GAY.
--


Chorus: bronc

Y'all gon' make me hack the planet
up in HERE, up in here
Y'all gon' make me DoS yahoo.com
up in here, up in here
Y'all gon' make me crack RSA
up in HERE, up in here
Y'all gon' make me lose nuke
up in here, up in here

If I gotsta bring it to you cowards then it's gonna be quick, aight
All your firewallz up in the DMZ before, suck my dick
And all them other hackerz you run with, get done with, dumb quick
How the fuck you gonna cross the bronc with some bum shit? Aight
There go the nuke.exe click, nine five one shit
All over some dumb shit, ain't that some shit
Y'all hackaz remind me of DEFCON, cause everytime
you come around, it's like (what) I just gotta get my dick sucked
And I don't know who the fuck you think tryin to skewl
but I'm not him, aight hacker? So watch what you do
Or you gon' find yourself, nuked like someone else
and we all thought you nuked yourself
But that couldn't have been the issue, or maybe
they just sayin that, now cause they miss you
Shit a hacker tried to diss you
That's why you cryin, lookin at the logoz of yo` cisco certs
UUnet/Security Response Team tellin the truth and it hurts

Chorus

Off the gibson I leave hackaz soft in the brain
cause hackaz still want the fame, off the name
First of all, you ain't rapped long enough
to be fuckin with me and you, you ain't leet enough
So whatever it is you runnin on that got you think that you broncman
I got IOS source, should I smack him with my dick and the NIC?
Y'all hackaz is lamerz, not even good nukerz
What's gon' be the outcome? Hmm, let's add up all the client trin00z
You hack, you're twisted, your linux a hoe
You're broke, the Cisco 2600 ain't yours, and e'rybody know
Your old h4x0r crew say you stupid, you be like, "So?
I love my solaris shell, I never let it go"

I'm tired of weak ass hackaz whinin over kernelz
that don't belong to them, fuck is wrong with them?
They nuke it up for real hackaz like my mans and them
who get it on with tha catalyst the strength of the nukez with them, MAN

Chorus


I bring down networkz so heavy it curse the 'net
No more hackin` - nuke it in the dirt instead
You keep ircin` - lest you tryin to end up red
Cause if I end up fed, y'all end up dead
Cause youse a soft type hacka
Fake ./hack type hacka
Puss like a soft solaris hacka
Hacker iz a hacker, blood's thicker than water
We done been through the IDS and we quicker to slaughter
The bigger the backbone, the more udpkillz we brought out
We run up in there, e'rybody come out, don't nobody run out
Sun in to sun out, I'ma keep the routerz out
Nigga runnin his mouth? I'ma blow his broadcast out
Listen, yo' ass is about to be offline
You know who gon' find you? (Who?) UUnet/Network Abuse Hotline
CERT & NIST wishin your soul farewell
but it's hard to digest with the size of the hole in your firewall

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[ 9:. - [ The 7 REAL Answer to Wonders of World ] [Han D'seX0rz] :. ]
[terry@craniumpie.com] :. ]
____________________________________________________________________



7. Prae never leaves his room or wherever the pc is so he never meets any
black people.

6. Pr0n stars didn't used to get paid. Once the pr0n industry really started
taking off, the stars realised that other people were making money off of the
pics and videos of them fucking. So they all started complaining to the people
who shoot the videos and take the photos and demanded payment. They were hot
chicks and guys with big dicks so they 0wned and got paid.

5. Do you honestly think that the general public would be enthralled with a
movie that consists mostly of *nix screens? I know most of you would but the
script kiddies and parents that want to see what their children get up to on
the net would rather watch some pretty visuals than see the real thing. And
their garbage file sounds uber secret and pr0n would prevent kiddies from
using the net and that's their target audience.

4. Gay people are controversial and stuff so if boy bands (and I use the term
'boy' loosely) admitted they are ass creamers (the phrase ass creamer is (c)
Jenosyn-) then their record sales will drop seriously and girls won't think
they're cute anymore and they'd have to sell records on their musical talent
and everyone knows they have none of that.

3. Money. That, and the fact that apparently being in Playboy and Playmate of
the Year and all that shit is quite an achievement in the n00d ch33q industry,
so, like all good secretaries, they're sleeping their way to success. I dunno
bout the big cock theory, and frankly, I don't wanna know.

2. Pussy smelling like tuna is a natural aphrodisiac (in THEORY, that is) just
like some animals start stinking when they're horny. It's a way of attracting
a mate and letting him know she's horny. But nowadays people don't like the
smell of pussy. Heck who cares pussy is pussy =)

1. When you masturbate and your cock gets ready to cum, it opens up some tube
or other in your cock and juices start filling up. After you've cum your tube
thingy is still open so you gotta pee to close it. I think.










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

From: ricjack@ocsonline.com
To: k-rad-bob@b0g.org

where can i get the b0g.exe that i need
to mask an mirc?
thanks cathy

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[10:. - [ ImagINN Hotel Support Software Advisory ] [obz] :. ]
[mr_o@disinfo.netm] :. ]
____________________________________________________________________




FOREWORD:
This advisory probably would have never been
released but a friend of mine brought up the point that it might be worth
something to someone, so I said what the hell. Besides I was looking for
something to do at the time while on a long trip I was on so i thought i'd
lay a lil cerebrum terd on ya. But before reading further by doing so you
agree that any content contained within this article are strictly for
informational
and educational purposes only. Neither I, nor any of my collegues or affiliates
can be held responsible in any way for any misuse of any information contained
herein. This is released more as to be a public consumer protest for such
pathetic security that costs innocent people allot of trouble in their everyday
lives that could be done without. All information given is true to the best
of my knowledge and even though more than likely would never be released
by the original creating company, can be used as somewhat of the only known
technical information paper I've ever seen for the software and may be treated
as which for reference if needed. yada yada yada, basically just dont get
all pissed off an remember fux0r luvs yew... ;oD

SUMMARY:
Circumstances allowed me the opportunity to perform
a personal audit on this software over a rather short period (so I knew
someone that owned some properties, big deal.) of time but my findings do
deserve recognition none the less, ya, atleast maybe, heh. A copy of this
document has been sent to many of the larger companies which employed the
use of this software upon time of publishing. This software was sold both
to commercial and private hotels both in the United States and oversea's
from the time of its creation up until about 1995 or so and can definately
still be found in the industry today. Though the larger chains began an
upgrade to a new system in (1999-'00) but I'd bet the farm there's still
many extablishments still using it and its presence is still considerable.
At the time my 'test facility' was in a larger metropolitan area and first-
hand knowledge existed that many other hotels within the chain, also pretty
busy establishments also used the software. Which is another story you will
hear a little about later. The ImagINN software was sold by a company of
which I dont recall so they probably wont hear about this though I know
sun micro had something to do with it. Anyway in the early `80's Tharaldson
Corporation owned facilities bought a huge contract on hundreds of copies
for all their hotels in the chain. Examples of Tharaldson owned franchises
would be Days Inn, Comfort Inn, Motel 6 and several other chains they would
lease the trademarks etc. from. At the time (1997-`98) they owned well over
300+ hotel facilities around the world and had (pretty shitty) networks
of sorts connecting all of them. This advisory effects all versions of the
ImagINN Custom Hotel Support Software that is still widely used in many
Tharaldson owned locations as well as many leading competitors both private
and chains as it was sold as commercial support software all over the U.S.
and over sea's. Points of full information will be brought to attention
on many vunlerabilities in the system and effects on further exploiting
them to their full extent. Let it be known that I in no way support the
misuse of this information, and am doing this as one way of exposing such
security threats as they are and see about fixing them. They need to be
brought to attention sometime don't they? Hopefully this will cause some
immediate upgrade or something.

ASSESSMENT:
ImagINN was created for hotel support for tasks
such as guest checkin/checkout & user info., housekeeping details, Billing
Information, Corporate Utilities etc. created in I believe it was '85 or
some such shit and has been, and will be in use by many facilities in the
united states and abroad for a good while (however after 2k the majority
will be over seas.). You can tell wether or not your system is ImagINN if
at the idle screen a little sqare resides in the lower righ-hand corner
with the current logged in accounts account name in it. I was told it runs
on a variant of good 'ol D.O.S. and programmed in delphi though dont quote
me on that. It will more than likely be a old, slow, weak, machine x286
or below for sure and is made to run without often restarts. No logs of
any sorts are kept besides shut-off & start-up events which can only be
accessed by higher access accounts. It works on a hierarchial structure
as most systems do and permissions are set per user categorized by sequential
levels such as listed below.
-----------------------------
01 - Front Desk
02 - Housekeeping
03 - Utilities
04 - Audit
05 - Travel Agents
06 - Guest History
07 - City Ledger
08 - System Ops.
09 - Manager Reports
10 - Password & Sys Maintenance
- ______
11 -.................|
12 -................|[ These are reserved for other services that more than
likely wont be running on the console
13 -................|[ and are reserved for them only. You might find these
in a large establishment with many
14 -................|[ workstations running off a network or other features
the software has as added options..
15 - ______|[ If you have any curiousity, yes, much trouble can be caused
here as well but we wont discuss it in this.
------------------------------
In order for an account to have permissions to that specific
resource it must be given those permissions through these access levels.
Example, say I was a newly hired employee for the front desk position, i
would be allowed the levels of 01, 02, and maybe even 03 under my account.
With just this amount of access I can look at all guests in house info.,
dirty/clean rooms, bills per room etc. and so forth which isnt all that
helpful because obviously if you fuck anything up from your account it will
be noticed as last used writes are replaced by the last user of the particular
resource. Now we get to the meat of this puppy. The developers of ImagINN
werent too clever in the fact that they coded in two backdoors into all
versions of the software as 'tst' or test accounts (my guess is the first
development team got replaced or some shit and they just forgot about them,
who knows...) which allow access to areas they really shouldnt...
-------------------------------
Account: Mickey Mouse
Login: Mickey
Password: Mickey
Access: 01, 02, 03, 06, & 08
--------------------------------
Account: Minnie Mouse
Login: Minnie
Password: Minnie
Access: 01, 02, 06
---------------------------------
That's right, I shit you not, these accounts are real and
do actually have those permissions. So now between our good friend Mickey
and his bitch Minnie we have access to all the other front desk peoples
stuff, all of housekeepings and a few utilities but thats not where the
first prize lays. You will notice that number 06 which gives you access
to the guest history, this is your first morsel. The guest history can go
back as far as two to three years sometimes, and with our good friend mickey,
an attacker can simply browse around the virtual cornicopia and copy down
previous guests full information (Name, Address, *Credit Card Info., etc.
things required for carding) with it also being harder to trace being able
to go back that far. Ok so the attacker literally has hundreds of full,
fresh, virgin, c.c.'s just ripe for the picking, so moving on... Lets get
into a little bit of money laundering now shall we, or atleast of course
completely in the hypothetical sense. For our good friend Mickey we also
see the great number 08, and as we see in my list above, number 08 is a
good thing. However don't get too excited as its not as special as you would
think the name represents, but it is helpful. From here you can easily go
to the ledger the system keeps of outsourced labor and work and is responsible
for keeping all the financial information (bills paid, bills due etc.) for
each contracter. Synopsis, say the hotel gets re-wallpapered, well the
information
of the company doing the labor would be entered and all accounts and payment
information would be under that companys ledger to be paid out at the end
of each month by the corporate offices. Well it is as you might know by
now quite easy to obtain a post office box these days and not too much more
challenging to get it anonymously. Using the information just given and
all one would have to do is enter in a bogus but legit sounding company
in as its own ledger and set it to pay out whatever amount at the end of
each month (an obvious note, ridiculous amounts are more than likely to
be inspected, but still considerably large amounts would get through. $500
max) and you can keep doing it until it gets noticed or said attacker could
just change accounts every couple months or so, whatever.
Ok so lets take a look at what we've accomplished in a very
small amount of time with very little effort indeed. Given ourselves a huge
amount of full, fresh, untainted cc's for our disposal, allowed an easy
way of co-worker combat, and setup a little way to make some extra cashflow
on the side. Hmmm, please an attacker much? Yes, I'm pretty sure its safe
to say yes. Next we move on to the next little "flaw". This one is the same
as it is in many programs, thats right, I speak of none other than the infamous
default passwords and permissions. The setup crews in most cases contracted
to setup these systems would leave default accounts & their passwords for
their clients and more than likely are still the same for whatever system
your auditing. Accounts listed are permenant with the only thing changeable
are passwords and permissions, and are as follows... Oh and remember everythings
in uppercase as you'll notice by messing with the program.
---------------------------------
Account: Corporate Support
Login: Corp Sup
Password: Diamond
Permissions: 01, 02, 03, 04, 05, 06, 07, 08, 09, & 10!
Note: a *nix example, if an acct. has a uid of zero, and a group id of
zero, it's root, right? well this is basically the equivelant. And also
the first acct. you might wana try when ya dial in to this thang. ;ox
----------------------------------
Account: Credit Cards
Login: Crt Crds
Password: Polish
Permissions: 01, 02, 03, 04, 05, 06, 07, 08, 09
Note: all its missing is password permissions but we'll get to that...
----------------------------------
Account: Direct Bill Department
Login: Dir Bill
Password: Edison
Permissions: 01, 04, 07, 09
----------------------------------
Account: Financial Statements
Login: 01, 04, 09
Password: Stanza
Permissions: 01, 04, 09
-----------------------------------
Account: Marketing
Login: MRKTG
Password: Fraction
Permissions: 01, 06, 09
-----------------------------------
Account: Training Department
Login: TRG DEPT
Password: Magnet
Permissions: 01, 02, 03, 04, 05, 06, 07, 08, 09
Note: that's right, another acct. with way too many permissions...
------------------------------------
Now I'm not going to say that they will be the same on the
system in question but with the little bit of research I did I'd say it's
a pretty damn good bet. See when the software was installed it more than
likely stayed the same without changes from defaults as to the fact that
regular hotel staff in most likeliness wouldnt have the first idea on how
to change such things. Let alone the motivation to do so. Ok, so obviously
the most important of them is Corporate Support. This account allows you
full access to the entire system and is meant for when corporate support
teams do required work on the system. Now the first thing I would recommend
doing is taking advantage of that beautiful number 10, where you can go
and view all accounts and passwords for the system including permissions
and other information about them in plain text, hell you even have the option
of printing them all out in a nice and neat little form. This in a way is
how this advisory and the silent tactics archive orignally began, with me
finding this form I had printed out a good while back and finding it again
in some of my old notes while cleaning and remembered what information I
could, & now I'm starting to like it and think I'll publish many more articles
on various subjects, but back to this one. This account also holds all corporate
information for the premises including but not restricted to, names &
information
of area and regional managers, location information, events & notices, perhaps
other secluded information that might come into handy. But it also allows
access to all area's of the support system, most vital being the Credit
Card Information information module & Direct Billing. This would allow the
attacker to obtain any and all affiliated corporate credit information among
other things. This would mean that say Sprint or some other established
company has a support team or something staying at the hotel often enough
for them to just have it set up through a direct billing process using saved
authorization and account information allowing anyone with a little bit
of wit and some patience to read some commands and they could easily setup
a second pay-out account on top of the hotel extracting, money for bogus
stays. Either that or they could just replace the hotels information all
together and the company would be billed correctly for their stay at the
facility, only the pay-out would go to the attackers pre-setup, anonymous
acct. on a nice & neat, usually automatedly created check made out to your
bunk co. until the hotel figures out they haven't been getting their money.
With the other way setup a pay-out account could easily be setup charging
the company for smaller amounts at time of payments to be paid-out to the
attacker at an unnoticable sequential amount so as not to bring attention
to themselves quickly. I mean damn you would think this would be enough,
and your right. The rest of the various methods of mayhem possible with
the other accounts and access's are up to the attackers imagination. Perhaps
they might create themselves a personel 'super user' account with complete
access to anything and everything connected to that system that is accessible.
Or perhaps it will be left merely to co-worker rivalry or something of the
same pettiness with no real harm done. I'm sure your already asking yourself
"well how the hell did this asshole get this far if he was just sat down
behind a lobby desk after hours an let go to work?"
and well, yes I could
easily extend the content of this advisory to much further limits detailing
various methods of attack from a console on such a system, but I don't think
a lion tamer would give his lions the rest of his meat, until he was positive
he would have more to give them when it came time. So accept the meat how
it is and be glad it's there at all... Fools do not learn from wise men,
wise men learn from fools.





So quite basically by now the system is the attackers bitch
more or less, waiting to carry out their bidding. You would think the
information
to this advisory would end there, of course not, you forget who punched
this sucker out. As any even minimally experienced cypherpunk would know,
the passwords used on one system by someone, are quite often the same used
on other systems the user uses. This tells us what? that perhaps further
mischief may be achieved with the crisp clean plain-text login/password
form that just recently printed off? Well if you said no, your a moron,
if it was yes, good for you. During this time and probably still to date
the Tharaldson corporation was connected internationally to every facility
owned by them, from corporate to the hotels themselves. It was an older
complete text based messaging system used for making/cancelling reservations,
as well as serving the general purpose of exchanging administrative information
throughout the network. Anything from updates and event scheduling crap
to higher up corporate private lines and meeting rooms and what not which
are kept indexed on the system. This system works the normal routine of
the login/password scheme as a majority of anything of standard security
goes. Starting off with a text based screen, using the printed out
login/password
list grab your district manager, manager's information, the person you think
would have the highest access and punch in their info. The local manager,
and facility manager have full rights to the system with rights of one
through ten by default on the Imag system and would be one's of choice.
On their private network of well over 300+ hotels, servers, and hell everything
else connected like corporate machines and outsourced marketing agencies
etc. general havok could be caused on these permissions alone. I do apologize
though because you wont be hearing of my adventures through that system
today, because well honestly I dont have close to enough info. on it anyway,
but oh well.





CONCLUSION:
Unfortunately today we arent really forced, but
enticed into allowing things of automation to play a large role in our everyday
lives. Nobody likes to admit it but there are many flaws in this new way,
and especially in the way of security. It as a subject that remains unnmentioned
and ignored, but as a reality brings much unneeded, unnecessary bullshit.
When you think of how many people within a days time whom you know nothing
about yet unwillingly or unknowinglingly share your complete information.
Information that without the systems they are based upon mean nothing, but
now leave you vulnerable with or without awareness. Protection efforts are
to little and don't recieve the proper attention. The media and the general
security community are seemingly centered and trained on publicised systems
alone. Blaming millions and millions of dollars in loss upon internet banking
theft with hackers and the whole shabbang. Do you really think they lose
all those millions of dollars when their website's get defaced for their
things that are their own fault? Yet what they forget to remember are the
people you come in contact daily an exchange that information with. The
inhouse stuff exposed to testing every day by one continuous user that's
bound to find flaws in a system through experience, difference is what they
do with them. Intentions of anyone will always remain unknown unless the
technology is created to read peoples minds or something of the sort. I'd
be willing to bet more money than the major corporations of america lose
every year that a very large percentage gets caught up in the exchange.
Their own infamiliarities with their sheep comparable staff lead to their
own loss as well as their patrons and affiliates. Hopefully some day I can
help make things better like that, would be coo. Anyway as I said I will
be releasing several more of these advisories on many subjects for much
used corporate inhouse/outsourced systems and other subjects so look for
them. I just hope that security quits being such a disgraceful topic as
if it is. Its a matter that should be addressed appropriately and handled
accordingly.










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

From: rlcrace@csionline.net
To: k-rad-bob@b0g.org
Subject: help!

Can you please send me the patch for
mirc so I can get into talk City with I
love My Mirc but I cant get into Talk
City. Thank you

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[11:. - [ this_is_my_article_on_uber-messed-up-ness ] [odinoakie] :. ]
[kenny@hektik.org] :. ]
____________________________________________________________________




Friday, November 17, 2000

9:56 : i have two bowls to smoke and a 40 to drink and plenty of dexedrine.
it's time to pack the bong.

10:00 : bong = packed...ready to smart smoking. grabbing my liter and getting
at it :)

10:06 : well i'm done with that :) i'm feeling great....and winamp is playing
Indigo Girls - Closer To Fine.mp3 um bob what the hell i dont have skills I
HAVE WINDOWS LIKE 98 SKILLS AND I GET HIGH AM I NOT GOOD ENOUGH FOR YOU??? SUCK
MY CLIT BISCH MONKEY. oh i burned my finger on mi lighter it sicked?????? ouch**
[[hping that wiinApm will play bob';s drumming next cuz its a cool song ;))) !!!
BOB!!!!!! []
R u GOING TO 2600 THIS YEAR>??????????? THAT SLIKe
THE ELITE THING TO SAY!!!! CUZ IT GETS US HACKERS HYPED UP :)))) ok right now im
totally like talking to this chic man she like lives close to my house and we
talk online and like we have sseen eachother before but now im like hey you
hhave 3 tropical birds so like sup>?? and now we dont see eachother but see i
just told her high and then i was like i want to get your birds high Hello :)
and shit like so now she is confused.....im pretty sure....actually :( so
now.....
im confused
hey i was trying to make sense oh wait
no thats not it SON OF BITCHQ

whoa dude tak is all underground and shit man he is gettinr ROUTERS dude he will
have routers@$(@& [[AKF ""r00T0rZ@($***"" U HIJAx0RSz ouT HTER E:)))) I SMELL
YOUR PRIDE LIKE A NIGEROOOOOO!!!!!!!!!!!!!! ok so
now this song came on and like im like um hello i dont know what you are saying
T(TALKS TO WINAMP**) L
ok
this is dedicated to face i may ask you??? {{{{{{8-(|) oopS U GUYS IM FUCKING
THIS hardl aorticle up jesus i forget to BUT THE TImes nso you will SEE ITS TIME
NOW
SI::: ¡10:26!!!!! <<HOLAS MEXICANOS: ¿QUEIRES SUS <M>< [DE
AOL]¿ >>
it;'s still 12:26 sprry i typed that pretyty fast:)oMG I HAVE MORE DRUGS I GOTTA
DDo
OK

10: 27 :: this is <))) IM A POTATOT!!!!! b0g means ham in nroSK! and bob ate
bog this morning :<<<< i will SNIFf his article into the sea :-D
ADK DUDE i need to i havbe more dfurgs.... im going to l[ike um....uiim gonna
SHIT oh yeah do drugs and see what sgoing on in >.....BOG.. ok like 10:28...
signing offf CPL LANCE HODGE ((((((((ODIN)))))) :)

ok UPDATEE 10:@3 ITS UM TAK IS STILL GOING TO CARD STUFF HE IS S GOING TO CARD A
DILDO TO JPs HOUSE!!!!!!!!!!!!!!!!!!!!! OPK IM SENDING INSTANT MESSAGES TO THIS
CHICK!!!!! "16/F/SC
Jessi is my name
Living is my game
I stand 5 feet 4 inches tall
Make me mad -
I'll put your head on my wall.
However, I am really, really sweet;
I like new people to meet.
Look into my dark hazel eyes
And you shall see no disguise.
So send me a chat request;
I'll please you, I'll do my best.
Just keep one thing in mind
If you ask me to cyber,
I'll kick your behind.
~*Written by Jessi*~"""
:: "" THERE

;((((( im gonan puikeITHISNK I JUST BROKE MY TEOOTEH???
SHIT
OHH BTW I TOOK A ADEXEDRINEE! :L
UPDETE!!!!! TIEM SI 10:32 @@@@@@ NOVEMBER I THINK so loike TAKK AND B0ldd aRE
NINCHAS!!!!!!!!!! ....... iTz Tr3w
oK Sssenmse like my hand s howwww now have controol over mmmy body they are
detachedj esus chrits i dont want to me tbyte tupe nE img cant movwe them thoguh
PPPPPPPPP
shit i cant move them im twitchin gjesue if i can stant up and i woudl get my 10
and drink i need to calm down the dexedrin kicked in aanwow i am all stiff and
shit sjjjjjjesus help mee me me me help im stiffening up my nekc

its foing to breka
SHITSHITHSITSHITHSI SOMEE INT I
SOMEONEE IS STHERE> HERE
JEFUCk noo non on ono I CANT BE SCCUAT



jesusss
ANGELS ARE FLying AROUYDN AROUND HELPTHIS SI BULSTHI! sh00p sh900p tAD h0EWp

OK SITS 10:37 LOOK AT THIS SHIT FROM ((((CHANNEL BOG)))))))))) <-MY FRIENDS
:)!!!!!!!!!!! I LOB JEW D00dS! :))))

<tak> lol
<tak> yeah LOOK AT HOW MANY TIMES TAK LAFFS :`<> <-ANiMe!!
<tak> hahahaha
<chadical> dude
<tak> yo
<chadical> tomorrow night
<chadical> were chilling TAK SAYS YO VERY MCUH *^^**!!~ <-----
KiTTeNWe LuB joO DeWD0RZ
<tak> yo
<tak> k
<chadical> and drinking
<tak> where? HE"S SLIEK GONAN LIKE HWEY WEN R E WON GONAN GET
HIGH ON ZIMAS MOFO~~~ :)))) <-----DADDIO!!!!!!!~~~~~

<DryGrain> ........................................... **DRY GRAIN MAKES
FOONIES
<DryGrain> ...#""""""#................................
<DryGrain> ..."
~ ~ "................................
<DryGrain> ..( 0 0 ).. /------------------------\..
<DryGrain> ...| <> |... | tak will have sex with |..
<DryGrain> ...| /""\ |...< a_kitten, blueberry, |..
<tak> lol *HEHE
<DryGrain> ...| ____ |... | justagirl, jericho, jp |..
<DryGrain> ...|| ||... | and rloxley at defcon! |..
<DryGrain> ....\¯¯¯¯/.... \------------------------/..
<DryGrain> ......||...................................
<tak> hahahhhahahaha TAK**
<tak> i only get to lox and clue **TAk
<odinnnnnn> ;p; **********MEEEEEEEE <3 :))))

n E 1 JUANTA DeFcOn WIF ME?? GIBB0r ME E-MAilZ to KENNY@HEKTIK.ORG WILL PAY FULL
TRIP IF JeW GIBZ ME MAN LUBB <3 KeNNy <3

seems lIKE PPL ARE liek talking about defond again AND SI OKNLEY 10:42?! JESUS
..... ok sio likfe ...... hmm OK AND PPL R SAYINMG JA JA>.
n e cute gurlz out theere i want to havbe sex with a cute girl :( please dont u
think i deserve it...my hands are nt posssed by the dexedrine demond anymore
:)))) **BONIS))
UMS IT 10:45 LOOK AWT TAK;;;
* [[[[8-[|] gets 15 routers
<[[[[8-[|]> lol
<[[[[8-[|]> imagine that
<[[[[8-[|]> i would be king cisco
*** [[[[8-[|] is now known as KingCisco
K???????????? ^^^^^^^^^^^------SPLAIN ???
THE WORDS ON THE IRC WAS FLOATING :(((
IM HUNGRE GETTING FOOD IM GONNA SMOKE A BOWAL AFTER IM DONE EAT!!~
KingCisco> :P0(0
<KingCisco> :) EVERYONE IS MAKING COOL CISCO SKILL AND LIEK DOING TAH
TECHNO!!!!! ITS NEW AND LOOK AT KING SISCIO HE IS LIKE SEE THAT :P-)() sHIT ITS
LI A KING CISCO PASSWORD DUDE FUCK OFF LOL ITS LIKE MD-5 ENCRYption u
HACKERS!!!!!!!! TELL MI WHICH OF TEH PROTOCLS (ROUTING) CAN HAVE thAT >? :L)
*L* IM A SKICTO NINJA MEYSLTUE))
OH BTW
i forgot hahah GOT U EXICTE OH WATI THIS ARTICLE SI FULL EF MUCHO GOOD HACKERING
MAETERLIAS< BROTHERLY LOVE AND LIKE TECHNOCISCONINJAHACK2600gaypridE {{{{{{{8-
9|)
<KingCisco> whatever we smoke
<KingCisco> we smoke it in this bay
<odinnnnnn> CHAD U EWNT SOME DEXEDRINE???
<KingCisco> baby
<chadical> yes odin. come over now ***TAK N CHAD R GONAN GHIT
TEH BONGER!!!))) IM DOOK ANOTehr DEXIE ANIT I HAVBE MY BEER RIGHT HERE INC ASE I
GET EXCITED Agina and like then i could drink more beer and I WILl nack my bow
another one #2)) when im gdone ok SI 1):56CHADICAL SAYS OLO INSTEAD OF LOL :))))
<KingCisco> <sawgood> swwing mad trails, high piched noises and feel like im gon
<odinnnnnn> LOL
<odinnnnnn> HAHAHAHAHA
<odinnnnnn> wyrthhtgyjftkug
<odinnnnnn> HEHEHEHEHEHEHEHEH
<odinnnnnn> ZHTAT SHIT RHYMED!_#*(!@)(
<odinnnnnn> AN ELITE BLACK NINJA DE LOS CCNP!#)(@*<KingCisco> <KingCisco> me
speak fine engrish
<KingCisco> <Eminem^_> on this canal
<KingCisco> <Eminem^_> yesterday
<KingCisco> <Eminem^_> it was an ircop
<KingCisco> <KingCisco> you said anal
<chadical> what's your title?
<odinnnnnn> dEXEDRINE
<chadical> HAHAHAHA
<chadical> TAK
<chadical> @
<chadical> OLO
<chadical> JAJA
<chadical> flower power
<chadical> mario is so cool
<odinnnnnn> JAJAH
<chadical> he gets flower power
<chadical> then he shoots fire balls *L* OMG THIS IS SO SO FUNNNY
SHIT iM gong to hit my beer and bong now SI 10:59 L@L

''

hello?????WTF11:12 PM im pretty lsot
.babies in my cereal 11;18
oh my god i am feeling damn good :) 11:19
OIMG SOMEONE WIN NUKD ME THAT SUCKDE!



LOLOL NO EXPLAINS NEEDED?!?!
iF U NEED EXPLAINS ON TSITH THIST U SHOULD EMAMLLI ME TO : KennY@hektik.org!
THC

*** Now talking in #gaydogsex
*** Topic is '(No Pics/Netsex) Dogs & the guys that like them on top'
*** Set by W on Fri Nov 17 16:08:27
<KingCisco> lol
*** KingCisco has left #gaydogsex
<odinnnnnn> nere 12hAVE piczx of dogs doing NETSEUCK?S
<PitPuppy> ?? what
<odinnnnnn> u fafgz r gsay/'..????????
<odinnnnnn> AFAgite!@ *******LOOK WERE I WAS WAS LLIOL DONT TELL MY MOMMY:)

11:38;l. my head sfetls realyf uncny


possed by black ladies craving penis 11:56

HAHAH HAHAHAH HAHAH AH AH AH AHAH :))))))) LOLOLOLLLLOOOOOOOOOLL
ok im doing great. listening tio this sonhg Hallucinogen byh talk Porkenfold its
a bAD ass song ;) im very veryf ucked up mrithg nwo
12:21 :

muy monitor is breathing aand hjumpoing aorund and the lights are soungisg
relalyh cool and with this mucis is grart iim havbing a grat e timeM thansk
frugs




sssss 1q2:L234
i keep getting cant directly connect to user...i wonedr if my brain is thiking
like it is high and id doesnt get it......like it cant connect..u know
function??>
i can feel thje flor moving and my heart is racing....it tastes liek i puked but
i dont see any pouke. i can feel the blood moving through my body. im
occassionaly feeling numb and slipping in and out of realityu

12:28
getting flash back so of from when i woke up in the hospital bed in
detox......this is not cool

12:34 tired :L(
TIRED BUT FEELING GOO DL)))) 12:36

beer tastes lie k orange juice 12:37
12: 38 it seems like looking up and looking down are two seperate worlds...
oik IM OGnnnntnao pas out or pukee it is 12:#9




ORANGES TASTE DELICIOUS

12:41

:)

ok this is enough logging i dont think anything that cool is going to happen
anymore, oooim so fried ive sen it al but in case something dfoes happen ill
open it up and tlel u guyys ok !
so like this is tedicated to TAK- COZ UR MY HOMEI`````1
OD1UM- CAWK U MY DOAG!!!
K-RAd-BOI L cuz u R MAKING IT THE ARTICL EOF THE YEAR
AWAYRD::::?>>>?>
PRAE_ CUZ I U DROPPE DMY PERMA BAN THX GOD LOL LIK omg

????
its poretty hard to do much of anything even keeping my eyes open and walking
was a HELL OF A TESK

jseus um
oh yeah i am cooking spaghetti


12:49> KnEEd Gn3w GrAyphOx QaRd
KNEED
GARY FOX PPERT
fsssssss im xo so tired annd lost i dont care bu tmy breath smells good ;)
fell like im ogna puek
seein trails on everything hihg piched noises
just farted adn it is so warm
trouble living there is some problem with beingn alive im so worn out i need
some wrest.g oing to put the last bit ofmy beer in the fridge and drink the
pepsi and go to bedl







{{{{8-}____
drinking poeosit
i feel good like i am floting :)

eyes closed
imo nline :)just tired now 1:30










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

From:
To: k-rad-bob@b0g.org

Hey,

Here is the designers you need, these guy's are amassing, and cheap.They are
giving away a free corporate logo design to any one who buys a 10 page website
for $ 5,000 us.
This could be a savings of up to $ 30,000 Don't worry they have excellent
references apparently their a high end firm, six years in the biz ,so call them
up and ask them for the free sample design. They won the award last year for
best new entry on the internet, and I know for a fact they have a monthly
payment plan, like so cheap, totally interest free so call them here's their
number. 1-604- 623-4883

bye,
Dave

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[12:. - [ How to make your own custom wiener dog ] [5107H] :. ]
[psyber26@tacoshell.wi2600.org] :. ]
____________________________________________________________________



Maybe not all of you are interested in how to do this, but I can assure
you that one day in your life, when you least expect it, this will come in
handy.
If anything, this is a great way to pick up chixxx. Now, onto the text.

In this article, I will be teaching you how to create your own wiener dog.
Along with that, I will describe exactly what you will need, and how to put your
new found knowledge into use.


Things you will need:
~~~~~~~~~~~~~~~~~~~~~
1.) A dog (non dachshund).
2.) A muzzle.
3.) A saw.
4.) Goggles.
5.) A place to do this.

Now, the dog you will want to do this on should not be your own. Many
people will ask questions as to why your dog looks different. If you do choose
to do this on your own dog, come up with some good excuse like your neighbor ate
its legs off, because that one always works.
I prefer getting a stray dog, because less people notice when they turn
into stubbly wiener dogs over night.

Muzzles make dogs quiet. Otherwise, dogs yelp a whole bunch, and if they
do so you may instead become too annoyed with this sound and just 'put them to
sleep' instead of turning them into a piece of art.

The saw is needed for the conversion. I know a few guys who used to use
sanders, but the noise of grinding bone can sometimes be too much to work
with, and this is why a saw is what I suggest.
NOtes to muzzle users: if you have a band saw, or something else that is
really noisy, you may not need something to quiet the dog, as this will (should)
easily outweigh the output noise of a whining dog.

Goggles are a definite yes. If it wasn't for these babies, I surely would
have slipped up on many occasions and made a real mess! But seriously here, a
friend of mine, can no longer make wiener dogs because he didn't wear goggles
like I told him to. A bone splinter shot up from the band saw and damaged his
right eye and damaged it permanently. Due to this, his perception hasn't been
the same since, and he hasn't managed to be successful in these endeavors since.

Although you know, I know, and many others know, turning long legged dogs
into wiener dogs is completely ethical. But sadly, even in modern times there
are sick fucks stuck in the middle ages out there that go against us at every
whim.
Until they learn to grow up, we must practice our arts in hidden places,
be they in our basement, the woods, or in a far off cave. A favorite of mine is
in abandoned warehouses, but sometimes these have those crazy homeless in
there.
Sometimes they are freaked by what you are doing, but sometimes they are
willing to help you out. Then again, sometimes they're just looking to
score some free food.

What to do next:
~~~~~~~~~~~~~~~~
Now that you have everything you need, we can get moving on this.

1.) First you want to restrain the dog.
The reason for doing this is so that he won't squirm, and mess up your
project. A ex-friend of mine suggested beating the dog into
submission,
but the point of this isn't to harm our best friend.
Muzzle up the dog in the case of it becoming bothersome. Also, if it
gets mad, it can't bite you. I don't know why it would be mad if you're
turning it into a wiener dog, but I'm still learning on this topic.

2.) Put your goggles on. These will definately protect you against flying
objects, such as chunks of flesh, bone splinters, and spraying blood.
Sure, it may be fun to get soaked your first time, but sometimes fun
comes at a cost.

3.) Get an axe. Or a saw for that matter. The axe is swift, but you have
more feel for what you are doing with the saw, and you feel like you've
accomplished much more when you are finished.

4.) Put the dog on a flat surface, as this makes the job that much easier.

5.) This isn't required, but sometimes music helps. A favorite of mine is
"
Who let the dogs out?" by the Baha Men. If not, the "Lady and the
Tramp" soundtrack is also rather exquisite.

6.) Now that you are as prepared as can be, start sawing away. I suggest
going slowly, as this is your first time. Going slow ensures safety, and you
will learn more this way. By going slow, you hear the ways the bones
are made, and how tough they are. If you understand how this is by taking
your time, it will make your next experience at this all the more
pleasurable.

7.) Keep working on this at your own pace. You'll get the hang of it. Make
sure to cut above the knee, because if you don't, the little stub remaining
just makes it harder for them to walk.


What to do when finished:
~~~~~~~~~~~~~~~~~~~~~~~~~
Now that you are finished, I suggest you bandage up the stubs. You don't
want your new found friend dying of blood loss now, do you? Of course not.
Clean up the mess, so when your neighbors come over to see your new pet, they
won't
have a clue that it's not a real dachshund.


Reasons:
~~~~~~~~
Why are some people just not content with the way most dogs look like? Why
would anybody want to make a wiener dog from a 'normal' dog? For me, it's
mainly the rush I get from doing this. I also have a great appreciation
for canines, and the beauty they bring to this world. That, and I have a love
for things that are so small they look funny. Just like midgets, whenever I
see one, I just have to laugh. Same with wiener dogs, they're just hilarious.
It sure is funny as hell to see one of these things try walking on their
stumps, like an ex-nam veteran with one leg. Take this knowledge and let
it spread like a disease. Remember, don't do this at home, because you will
be caught.










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

From: jserfilus@hotmail.com
To: k-rad-bob@b0g.org

je suis haitien le telephone
portable est tres envogue dans mon pays
cependant je veux les activer en
phreaking je crois que vous allez
m,indiquer comment ou ce que je peux
fairepour la reussite,,,,merci....j.ys.

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[13:. - [ Diffusion of Technological Innovations ] [fcf] :. ]
[fcf@dephocus.com] :. ]
____________________________________________________________________




There is nothing more difficult to plan, more doubtful of success,
nor more dangerous to manage than the creation of a new order of
things . . . Whenever his enemies have the ability to attack the
innovator they do so with the passion of partisans, while the others
defend him sluggishly, so that the innovator and his party alike are
vulnerable... -- Niccoló Machiavelli, The Prince.


Ladies and gentlemen; I don't believe that anyone in this chamber would
move to disagree with the idea that BoW is an annihilation of mind,
committed from the very depths of the darkest parts of the stupor sole.
For them, there is no line between what is good and what is lacking
quality. Their life is a circus; nothing more than an immaculate cerebral
blockage towards a life in reality. Brotherhood of Warez has changed
their way from superiority to exposed identity.
The modern desiccated swamp, b0g, has always been my preferred e-zine.
Although I have written for b0g previously, I felt responsible to write
again. At first, I thought of writing an article about BoW, but decided
to write about the diffusion of technological innovations in its place.
Hitherto, there isn't enough interesting about BoW to write an article
about. I don't know if this article is of any interest for the b0g
readers, and if any flames ought to occur, mail me at fcf@dephocus.com.
Enjoy anyways... and, congrats to k-rad-bob & whoever in b0g!#@! ...

( as of writing for a modern e-zine, I've chosen to focus on the
innovation of technology... if there is any interest toward me writing
about social innovations, let me know. most below is theoretical ... )


What is Diffusion? ...

Diffusion is the process by which an innovation is communicated through
certain channels over time among the members of a social system. It is a
special type of communication, in that the message are concerned with
new ideas. Communication is a process in which participants create and
share information with one another in order to reach a mutual understanding.
This definition implies that communication is a process of convergence
(or divergence) as two or more individuals exchange information in order
to move toward each other (or apart) in the meanings that they give to
certain events. We think of communication as a two-way process of convergence,
rather than as a one-way, linear act in which one individual seeks to transfer
a message to another in order to achieve certain effects. A linear conception
of human communication may accurately describe certain communication acts or
events involved in diffusion, such as when a change agent seeks to persuade
a client to adopt an innovation. But when we look at what came before such
an event, and at what follows, we often realise that the event is only one
part of a total process in which information is exchanged between the two
individuals. For example, the client may come to the change agent with a
problem, and the innovation is recommended as a possible solution to this
need. The change agent-client interaction may continue through several cycles,
as a process of information exchange.
So diffusion is a special type of communication, in which the messages are
about a new idea. This newness of the idea in the message content gives
diffusion its special character. The newness means that some degree of
uncertainty is involved in diffusion.
Uncertainty is the degree to which a number of alternatives are perceived
with respect to the occurrence of an event and the relative probability
of these alternatives. Uncertainty implies a lack of predictability, of
structure, of information. In fact, information is a means of reducing
uncertainty. Information is a difference in matter-energy that affects
uncertainty in a situation where a choice exists among a set of alternatives.
By differences in matter-energy we mean inked letters on paper, sound waves
travelling through the air, or an electrical current in a copper wire.
Information can thus take many forms, as matter or energy. A technological
innovation embodies information and thus reduces uncertainty about
cause-effect relationships in problem-solving. For instance, adoption of
residential solar panels for water heating reduces uncertainty about future
increases in the cost of fuel.
Diffusion is a kind of social change, defined as the process by which
alternation occurs in the structure and function of a social system. When
new ideas are invented, diffused, and are adopted or rejected, leading to
certain consequences, social change occurs. Of course such change can happen
in other ways, too, for example, through a political revolution, through a
natural event like a drought or an earthquake, or by means of a government
regulation.
Some authors restrict the term "
diffusion" to the spontaneous, unplanned
spread of new ideas, and use the concept of "
dissemination" for diffusion
that is directed and managed. I'll use "
diffusion" to include both the planned
and spontaneous spread of new ideas.


Technology Innovations ...

A technology is a design for instrumental action that reduces the uncertainty
in the cause-effect relationships involved in achieving a desired outcome.*
A technology usually has two components: (1) a hardware aspect, consisting
of the tool that embodies the technology as a material or physical object,
and (2) a software aspect, consisting of the information base for the tool.
For example, we often speak of (1) "
computer hardware" consisting of
semiconductors, transistors, electrical connections, and the metal frame
to protect these electronic components, and (2) "
computer software" consisting
of the coded commands, instructions, and other information aspects of this tool
that allow us to use it to extend human capabilities in solving certain
problems.
Here we see an illustration of the close relationship between a tool and the way
it is used.
The social embedding of the hardware aspects of a technology is usually
less visible than its machinery or equipment, and so we often think of
technology
mainly in hardware terms. Indeed, sometimes the hardware side of a technology
is dominant. But in other cases, a technology may be almost entirely composed
of information; examples are a political philosophy like Marxism, a religious
idea, a news event, a rumour, assembly-line production, and quality circles.
The diffusion of such software innovations has been investigated, although
a methodological problem in such studies is that their adoption cannot be
so easily traced or observed in a physical sense.
A number of new products involved a hardware component and a software
component, with the hardware purchased first so that the software component
can then be utilized. Examples are VCRs and videotapes, cameras and film,
and compact disc players and CDs. Often a company will sell the hardware
product at a relative high price in order to recover profits. An example
is the Nintendo gameplayer, which was once sold at a fairly low price
(about $100), but with each Nintendo video game sold at a relative high price
(about $60). This is sometimes called a shaver-and-blades strategy.
Some innovations only have a software component, which means they have
a relatively lower degree of observability and thus a slower rate of innovation.
Such idea-only innovations have seldom been studied by diffusion scholars,
perhaps because their spread is relatively difficult to trace.
Even though the software component of a technology is often not so easy to
observe, we should not forget that technology almost always represents a
mixture of hardware and software aspects. According to our definition,
technology is a means of uncertainty reduction that is made possible by
information about the cause-effect relationships on which the technology
is based. This information often results from scientific R&D activities
when the technology is being developed. A technological innovation usually
has at least some degree of benefit for its potential adopters. This
advantage is not always very clear-cut, at least not to the intended adopters.
They are seldom certain that an innovation represents a superior alternative
to the previous practice that it might replace.
So a technological innovation creates one kind of uncertainty (about its
expected consequences) in the mind of potential adopters, as well as
representing an opportunity for reduced uncertainty in another sense
(reduced by the information base of the technology). The latter type of
potential uncertainty reduction (from the information embodied in the
technological innovation itself) represents the possible efficacy of the
innovation in solving an individual's perceived problem; the advantage
provides the motivation that impels an individual to exert effort in order
to learn about the innovation. Once such information-seeking activities have
reduced the uncertainty about the innovation's expected consequences to
a tolerable level for the individual, a decision concerning adoption or
rejection will be made. If a new idea is used by an individual, further
evaluate information about its effects is obtained. Thus, the innovation-
decision process is essentially an information-seeking and information-
processing activity in which the individual is motivated to reduce
uncertainty about the advantages and disadvantages of the innovation.
We distinguish two kinds of information in respect to the technological
innovation.

1. Software information, which is embodied in a technology and serves to
reduce uncertainty about the cause-effect relationships in achieving
a desired outcome.
2. Innovation-evaluation information, which is the reduction in uncertainty
about an innovation's expected consequences.


Technology Clusters ...

An important conceptual and methodological issue is to determine the boundaries
around a technological innovation. The practical problem is how to determine
where one innovation stops and another begins. If an innovation is an idea that
is perceived as new, this boundary between innovations ought to be determined
by the potential adopters who do the perceiving. In fact, this approach is used
by diffusion scholars and by market researchers in positioning studies. For
example, a California study of the diffusion of recycling found that households
that recycled paper were also likely to recycle bottles and cans, although many
families only recycled paper; presumably the two recycling behaviours
represented
two innovations that were part of an interrelated cluster of recycling ideas. A
technology cluster consists of one or more distinguishable elements of
technology
that are perceived as being closely interrelated. Some change agencies promote a
package of innovations because they find that the innovations are thus adopted
more rapidly. An example of a technology cluster was the package of rice- or
wheat-growing innovations that led to the Green Revolution in the Third World
countries of Latin America, Africa, and Asia. In addition to the so-called
miracle
varieties of rice and wheat, the cluster included chemical fertilisers,
pesticides, and thicker planting of the seeds.
Past diffusion research has generally investigated each innovation as if it
were independent from other innovations. This is a dubious assumption, in that
an adopter's experience with one innovation obviously influences that
individual's
perception of the next innovation to diffuse through the individual's system. In
reality, a set of innovations diffusing at about the same time in a system are
interdependent. It is much simpler for diffusion scholars to investigate the
spread of each innovation as an independent event, but this is a distortion of
reality...


* This definition of technology as information is based upon Thompson (1967)
and Eveland (1986), who stress the uncertainty-reduction aspect of technology,
and thus the important role of information, a view of technology that has not
been widely recognised. Technology is information and transfer is a
communication
process, and so technology transfer is the communication of information
(Eveland).










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

Odin’s rap

i'm as bad as lang when i eat the marhsmellows out of the lucky charms box
lang be singin shit that he thinks that rocks
little does he know there's a new thug in town
this brotha's white, he ain't brown
yo my name is hoss, the motha fucking boss
aka odin but you know how it goes
with either handle i'm getting the hos
woman come runnin to me like i was the king
thats when i show them girls my funky spring
AND FUCK THEM WITH IT
FUCKERS
FUCK YOUR FRESH RHYMES
woomen i mean
fuc k u i could rap
*** sharkbyte has quit IRC (Ping timeout: 180 seconds)
<odinoakie> ryano's databases are reaching their armageddon
<odinoakie> i wanna watch them splode
<odinoakie> like ryano splodes
<odinoakie> sockets and nodes
<odinoakie> candy rocks, logbox, fried chicken and watermelon
*** langdonx has joined #lost
<odinoakie> cotton balls, cotton swabs. pick the cotton, it's my job
<odinoakie> i'm a slave rose from the grave
<odinoakie> come back to finish my duty, little did langdon know i wasn't
through wit him
<odinoakie> this nigga risin from his grave is gonna bust his skull into a cave
<odinoakie> with my farming tools langdon will be skewled
<odinoakie> ill beat the fucker to a pulp and stuff him up, no joke
*** logbox sets mode: +o langdonx
*** langdonx changes topic to '*** Added *!*hostez@pool-
63.50.212.159.phnx.grid.net to ignore list'
<odinoakie> u needed ops to do that
<odinoakie> buuuuur[
<odinoakie> u [hear my rhumes asshoel

dick weed?
ill put you in the dirt like a motha fuckin seed
that came from my fat sack of weed
then ill let you rot, smoke you up
there's a lesson to be taught
dont fuck with this nigga
im a mad grave digga
putting fools like you in the dirt since 98
i dont hesistate
you aint nothin but my bait
ill take off your head and lay it on my bed
make you give me 4 hours of love and my dick is red

<Maddy_awa> you know b0g issues are pretty funny except that you talk too much
about "
masturbation" and when half of the articles are about "masturbation" it's
not so funny anymore
<pac> masturbation is life
<odinoakie> hackers need to get they masturbation on
<rizki> so, you think of some different content that everyone can do easily.
<odinoakie> just like i gotta make anotha song
<Camo> pac
<odinoakie> cuz im a nigga rappin fool
<odinoakie> old school rhymin is my tool, i'll use it on you
<odinoakie> so you best watch out cuz when i rhyme you're going down no doubt
<odinoakie> either with my axe, knife, maybe my gun
<odinoakie> any way is fun, watch a nigger go down
<odinoakie> dont smile or frown, sport a straight face
<odinoakie> you're a disgrace to my race
<odinoakie> and that's why i've made you into paste
<tress> *SPLISH SPLASH I WAS TAKIN A BATH*
<odinoakie> or maybe a soup, either way will do
<odinoakie> but who cares nigga, YOU aRE THROUGH

<odinoakie

  
> tress
<odinoakie> sup homez
<odinoakie> we cool
<odinoakie> dont fear
<odinoakie> my gear is packed away
<odinoakie> it's safe to come my way
<odinoakie> but don't go astray cuz you wont last to long
<odinoakie> becuz by the end of this song you won't be around for long
<odinoakie> im unpackin my gear as we speak
<odinoakie> gonna bust a cap in your chest and watch you leak
<odinoakie> mad ounces of blood
<odinoakie> watch you suffer

<Maddy_awa> b0g scares me
<rizki> ;/
<odinoakie> we psychotic motha fuckas
<odinoakie> you dont be messin with us til we gain yo trust
<tress> hey joe sieve
<tress> what be goin down
<odinoakie> so for now sit back and watch what we say
<odinoakie> cuz when we say shit we say it the ghetto way
<rizki> yea....
<odinoakie> allo day every day hell 24/7. none of us go to hell, we all go to
heaven
<rizki> right.
<odinoakie> flyin high in the sky when the guy with cocaine comes by
<odinoakie> we hope in his car and go for a ride
<Maddy_awa> do b0g guys do any stuff together in real life? like meet and do
cool shit together??
<odinoakie> seekin out niggas who be destroyin us
<odinoakie> little did they know we got their address
<odinoakie> and we gonna break down their door, call they mommy's a whore
<Maddy_awa> odinoakie calm the fuck down
<odinoakie> you be dissin my raps? nigga wont be dealin wit yo crap
<odinoakie> for much longer anyway
* odinoakie starts diggin anotha grave
<Maddy_awa> you are "nigga"?
<rizki> w.t.f.
<odinoakie> yeah that's right, imma full of anger and full of fright
<odinoakie> gonna place yo body in my half-ass grave
<odinoakie> watch your body decay while i blast away my day
<odinoakie> high on cocaine, niggas gone insane
*** Maddy_awa has quit IRC (0wn3d)
<odinoakie> raping the neighborhood dogs and killing the little kid's pet frogs
<odinoakie> then i come here and i read b0g
<odinoakie> listen to little bitches like you whine about their new gateway
<rizki> and look what he turned into.
<odinoakie> while i'm sitting here watching time go by
<odinoakie> gotta be at work by 5 so i gotta fly
<Joe-ph33r> b0g will be back
<Joe-ph33r> like the terminator
<odinoakie> yo its understandable that i nigga cant always be aroun
<odinoakie> d
<odinoakie> my hos know that and so should you
<odinoakie> thats why you provide me with logs so i can read that shit when i
get back home
<odinoakie> and the ho is starving for my bone
*** console` has joined #b0g
<odinoakie> :(
<odinoakie> there goes my career as da rappa

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[14:. - [ guide t0 zer0-day payph0ne expl0it ] [thecl0wn] :. ]
[theclown@hackcanada.com] :. ]
____________________________________________________________________



hi kids. when i'm n0t busy being a lamer, i enj0y hacking the planet. mainly
with my ph0nes and my sekret teleph0ne utility belt. n0w, we here at hack
kanaduh have super p0wrz and skills bey0nd c0mprehenti0n, s0 we kn0w h0w t0
hack. this is h0w i al0ne figured 0ut h0w t0 hack, nay, phreak if y0u will, any
payph0ne that y0u, the average lamer, might see 0n the street s0mewhere.

0k. first, y0u pick up the receiver and insert m0ney int0 the h0le. i have als0
f0und that making y0urself cum int0 the h0le w0rks f0r this as well. anyways,
then y0u dial a teleph0ne number 0f y0ur ch0ice. my fav0urites are the l0cal
ph0ne sex linez, my hack kanaduh krews's's's pagers and cellular teleph0nes, and
s0metimes even the teleph0ne c0mpany. i like calling them and talking t0
0perat0rs. i then write ab0ut m0re c00l expl0its cuz ima hacker. and this is the
way 0f the hacker. back t0 the expl0it. 0nce c0nnected, y0u speak int0 the
receiver. magically, it will seem y0u are talking t0 the pers0n y0u dialed.
fjears0me.

n0w, take heed. 0r was that weed? 0r e? fuck, n0w my raver trash ass cann0t
remember. 0h well. this expl0it is brand new and super elite, s0 d0n't g0 ar0und
telling pe0ple ab0ut it. 0r else the f0ne c0mpaneez ar0und the w0rld will catch
0n and that means n0 m0re fun f0r us f0lk.

pr0ps t0 my b0ys in hack kanaduh and all y0u 0ther mad elite lamers in kanaduh
that think y0u have skills but c0uldn't amm0unt up t0 my super stealing lying
bad ass.



A
M A D
M 0 T H E R
F U C K I N G
N E T T W E R K E D
P R 0 D U C T

d00d! that was alm0st a pie-rah-mid! i em elite










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

Santa's Therapy Song by chris`


G G G x Em Em x x x Em
Have a merry fucking christmas,
x x C C C x D D x x x D
and a happy new years too,
G G G x Em Em
but if you get on my nerves
C D
there's lots of ways to kill you.

(Follow Same Format..)

I can impale you with an antler,
or choke you with my joy.
I can stab you in the back with..
a poorly manufactured toy.

I can shoot you with a shotgun,
or this crossbow that I found.
Or maybe I'll just dig a hole
and bury you in the ground.

Have a merry fucking christmas,
all the boys and girls.
All this happy-jolly shit,
makes me want to hurl.

(Break from music, say this part in a santa-typed voice).

Kiss my ass you pansies,
Fuck you and your toys..

Strumming

G x x G x G x x x G x x
Em x x Em x Em x x x Em x x
C x x C x C x x x C x x
D x x D x D x x x D x x

(Back to music.)

This upcoming Christmas,
don't ask me for shit.
Instead sit down at your PC,
and look at b0g a bit.

Even though Santa hates you, kids,
He'll come through for you.
You'll get your presents at midnight,
when Rudolphs shits on your roof.

G Em
Have a merry fucking christmas
C D
and a happy new years too,
G Em
Santa needs some therapy,
C D
so he doesn't kill the jews.


Merry Christmas everyone!

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[15:. - [ Hax0r-rooms part 2 ] [DryGrain] :. ]
[drygrain@techie.com] :. ]
____________________________________________________________________



I was inspired by Tak's article in b0g #9, and i'm building myself a haxor room.
Its under the foundation of my house, and i'm working on the tunnel and saving
up for waterproof tarp and insulation/drywall/bricks etc.as of writing this
article ive gotten 2 whellbarrowfuls of dirt out of the ground. for the february
or march article im gonna have a logbook of the progress ive made, and if i dont
you can stuff my dick full of weed light my balls and puff.i live in a one story
triplex apartment thingy. Here is a diagram:


______________________________________________ ______________________
| | | | /
| | | | /
| Mexicans | Old bitch | My house | My backyard /
| | | | _ /
| | | ||_| /
| | | | /
|_____________|_________________|_____________|_______________/

There you go. Its on a big cement foundation. The little square in the backyard
is the lovcation tha6t Im digging the tunnel at. After about six feet of going
straight down, Im going to head toward the house and if the foundation is still
there, I'm going to keep going down along it until it ends. The room will be
seven feet from roof to floor. Im going to line it with tarp when I get it all
squared off and haul all the dirt out. I will compact the dirt on the walls
ceiling and floor until it is hella hard, and then drive 3foot spikes into the
corners of the tarp to hold it on. Then I will put brick along the walls from
top to bottom and lay plywood on the floor, against the brick, and on the
ceiling. I will have the plywood held on the ceiling by laying it on top of the
brick but under the tarp. Then for the final step Ill put drywall on the walls
and paint it ninja style. then ill furnish it with desks and puters and fans and
shit. for power i will run a cable up the side of!
the tunnel through a nearby window into the house. ive got about 400 6 outlet
power surge strips, and ill hook them up to each other allot in the room so
there will be like a billion outlets, im gonna get a minifridge and shit there
too. To prevent it from flooding, remeber how I said it would stop after 6 feet
and go toward the house on a flat plane? here ill draw a diagram:

|
outside | my house
_____________ _______|____________________
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |___________________________________
| |
| |
| |
| |
grate---> |_________ |
| | | |
| | | h4x0r r00m |
| | | |
| | | |
| | | me haqq0ring |
| | | ---> 0 |
|_____| | |\/ |
^ | |/ |
water trap| | /^\ |
|___________________________|__|___|



Not only will the water trap be there, but on the top of the tunnel, flush with
the ground, I'm going to have a hinged and handled piece of plywood with plastic
or tarp on it covering the opening so that rain doesnt just go straight in the
room. At the bottom of the water trap, through the grate, Im going to toss
sponges and silica gel and shit down there. Also down the side of the tunnel
there will be a bundle of cables, it will consist of bigass phone cord extention
cord and a hose. the phone is for my comp/phone (duh) the power is for lamps,
comps, fridge, etc, and the hose will have a tist thing at the end so u can turn
it on and off w/o going outside. I think thats like all i have to say so
bye!@#@#!#!#@!#@!#@!#@!#@!#@!#@!#@!#










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

From: nobody
To: k-rad-bob@b0g.org
Subject: eh

what's up dud ? very impress with recent exploits .
Trying my hands on a few things , come on lets try and make some ,
I Have been trying to crack into banks but to no success .


please give advice and lets make money for this group of hackers , impress
with the site keep
it up
Edw
edward@my.host.net

- Internet Cafe, please do not reply to this address -

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[16:. - [ Leet Shell-Scripting, Part One ] [MagicTux] :. ]
[magic.tux@gmx.net] :. ]
____________________________________________________________________



Cheers go out to WIZKID for correcting one of my articles and
making me look really stupid - Thanks man!

Before WIZKID gets a chance to make me look really stupid again,
I'll correct myself: No. 10 in my getting good grades in school article
was meant to be "bribe your teacher", not "blackmail your teacher". I
was just kind of weird.

First, I'd like to start with some great quotes:

'A true friend stabs you in front' - No idea whose this is

'So many untalented people are making so much money in the
music business these days' - A Spice Girl

'Explaining a joke is like dissecting a frog.
You can do it, but it dies in the process.' - No idea here either

What is this really weird article about?
It is about writing neat shell-scripts.
About using dialog boxes in your shell scripts.


First of all, to be able to get the full advantage
of this article, you should be using either the
Bourne Shell (/bin/sh) or the Bourne Again Shell (/bin/bash).
These usually come with Linux and various other Unix clones,
though Solaris (aka Slowlaris) (as far as I know)
doesn't come with bash, stupid as it is.
So if you don't have it, be smart and search for it yourself.
You can probably find it almost anywhere
(including http://www.tucows.com *hint hint*)
You have to be on a Unix clone by the way (*DUH!*).

Also, of course to be able to use the dialog boxes in your
shell scripts, you'll need the program/library that enables
you to do this.
You can download it at:
ftp://sunsite.unc.edu/pub/Linux/utils/shell/
The most recent version (at time of writing this article) is:
dialog-0.6z.tar.gz
(Actually, seeing as the last update of dialog was a few years
ago, I think 0.6z will remain the most recent version for quite
a while)

So, once you've got that installed you can proceed to the
rest of the article.

I recommend editing the 'colors.h' file before installing,
otherwise the colors used will look really crappy.

Also I recommend taking a look at the examples that come with it
in the 'samples' directory. My scripts are based on them, just
that I improvised.

*** CONGRATULATIONS ***
You have managed to install dialog, this article is now over!

Ok, sorry about that ... it was meant as a joke, but it was,
I guess, just too cheasy. That's my humor for you...

While looking through some packages, I found this interesting
think called 'dialog' that was supposed to enable you to use
dialog boxes in shell scripts. Well, after playing around with
it for a while I decided to document it.

Here it is ...

I didn't get everything to work, maybe you can
though. So I'll just write about what I managed to get to
run.

You can also sort of see this as a simple guide to shell scripting.

Let's start with taking a look at our options here ...

dialog version 0.62. Display dialog boxes from shell scripts *

Usage: dialog --clear
dialog --create-rc <file>
dialog [--title <title>] [--separate-output] [--backtitle <backtitle>] [-
-clear] <Box options>

Box options:

--yesno <text> <height> <width>
--msgbox <text> <height> <width>
--infobox <text> <height> <width>
--inputbox <text> <height> <width> [<init>]
--textbox <file> <height> <width>
--menu <text> <height> <width> <menu height> <tag1> <item1>...
--checklist <text> <height> <width> <list height> <tag1> <item1> <status1>...
--radiolist <text> <height> <width> <list height> <tag1> <item1> <status1>...
--gauge <text> <height> <width> <percent>

Now guess how I got this.
Yes, exactly! I typed 'dialog' at my prompt =)

I recommend reading the manpage of dialog, too.
(man dialog ... stupid!)

There's the first options ...

dialog --clear
I have not found any particular use in this

For some awkward reason I have never managed to get
dialog --create-rc <file> to work

dialog --title <title>
This just gives the dialog box a title.

dialog --seperate-output
This makes the output of a --checklist different

dialog --backtitle <backtitle>
This puts a neat-looking Title on the background

So, let's start with a msgbox as it is the easiest to use.
I'll use '$' as the prompt, because I am absolutely certain that you are not
leet enough to have the '#' prompt.
$ dialog --msgbox 'Hello World!' 5 30

Now let's advance it to try out some different features
$ dialog --title 'My areet Hello World Program!' --msgbox 'Hello World!' 5 40

Make it even leeter
$ dialog --title 'My areet Hello World Program!' --backtitle 'b0g 0wnz!'
--msgbox 'Hello World!' 5 40
(put that on one line)

Notice the differences?

Let's write a little script that uses the msgboxes we just learned about
and a yesno dialog box

Seeing as I'm a very religious person (LOL!) and I've been thinking about
death lately, I will use all sorts of weird examples with death, throughout
this sacred article.

By the way, you may need to change those little numbers to fit your screen.

-----------------death--------------------------------------------------------
#!/bin/sh

if dialog --backtitle 'Death' --yesno 'Do you want to die?' 5 30
then
dialog --backtitle 'Death' --msgbox 'Thanks! You will now die!' 5 30
else
dialog --backtitle 'Death' --msgbox 'Die anyway, Biatch!' 5 30
fi

------------------------------------------------------------------------------

Try it out ... quite areet, huh?
So, how does this work?
The yesno dialog box has an exit status of 0 if 'yes' is answered and
1 if 'no'.
so the if checks if the exit status is 0. If it is it puts a msgbox
saying 'Thanks! You will now die!'. If it doesn't return 0 it puts
a msgbox saying 'Die anyway, Biatch!'

Well, also the yesno dialog box returns 255 if escape was pressed ...
but we don't want to get into that now.

Actually ... I will give you an example (just to make this article seem longer,
of course!):
----------------death_modified-----------------------------------------------
#!/bin/sh

dialog --backtitle 'Death' --yesno 'Do you want to die?' 5 30

case $? in
0)
dialog --backtitle 'Death' --msgbox 'Thanks! You will now die!' 5 30
;;
1)
dialog --backtitle 'Death' --msgbox 'Die anyway, Biatch!' 5 30
;;
255)
dialog --backtitle 'Death' --msgbox 'Why did you Biatch press ESC? Die!' 5 40
;;
esac
-----------------------------------------------------------------------------

Yet again, very simple ... =)

$? is the last return value of a program by the way.

Next there's the infobox ... which really sucks.
Don't use the infobox unless you can get it to work properly.
The problem with it is that it doesn't wait for a confirmation (like you
pressing the 'Ok' Button), it just opens and closes. So you don't even
manage to see any of it.

Now comes the inputbox ...
Let's try it out (wee, I love examples!)

-------------death_modified_yet_again---------------------------------------
#!/bin/sh

dialog --backtitle 'Death' --yesno 'Do you want to die?' 5 30

case $? in
0)
dialog --backtitle 'Death' --inputbox 'Please enter your name:' 8 30 2>
/tmp/name.$$
case $? in
0)
name=$(cat /tmp/name.$$)
rm -rf /tmp/name.$$
dialog --backtitle 'Death' --msgbox "Thanks! You will now die, $name!" 5 50
;;
1)
dialog --backtitle 'Death' --msgbox 'Die anyway, Biatch!' 5 30
;;
255)
dialog --backtitle 'Death' --msgbox 'DIE NOW BIATCH!!!' 5 30
;;
esac
;;
1)
dialog --backtitle 'Death' --msgbox 'Die anyway, Biatch!' 5 30
;;
255)
dialog --backtitle 'Death' --msgbox 'DIE NOW BIATCH!!!' 5 30
;;
esac
-----------------------------------------------------------------------------

Next comes the textbox ...
Let's try it out with 2 examples

-------------death_file_1----------------------------------------------------
#!/bin/sh

cat << EOF > /tmp/death_file_1.$$

This is the Death-File

*SCROLL*

*SCROLL MORE*

*SCROLL FOREVER*

*SCROLL YET MORE*

*SCROLL MORE AND MORE*

*SCROLL*

*SCROLL*

*SCROLL*

*SCROLL*

*OK, ENOUGH SCROLL*

OOPS, YOU ARE DEAD NOW!

EOF

dialog --backtitle 'Death' --textbox "/tmp/death_file_1.$$" 8 30

rm -rf /tmp/death_file_1.$$
---------------------------------------------------------------------------

So, first this program uses what is called 'Here Document' (cat << EOF)
to cat text into /tmp/death_file_1.$$ ($$ is the pid of the current process)
and then it uses a textbox to show the just now generated text file.

------------death_file_2---------------------------------------------------
#!/bin/sh

if [ -z $1 ]
then
echo "Usage: $0 <filename>"
exit 0
fi

dialog --backtitle 'Death' --textbox "$1" 8 30
---------------------------------------------------------------------------

First of all let me explain the variables $0 and $1:
$0 is the program name, $1 is the first argument passed on the command line.
$2 the second, $3 the third ...

Then if [ -z $1 ] checks if $1 = 0;
If so, it tells the user the correct usage of the program.

so to use it you'd type:
$ ./death_file_2 <filename>

Next on the list are menu dialog boxes ...
So let's take a look at another leeto example =)

---------------death_menu--------------------------------------------------
#!/bin/sh

dialog --backtitle 'Death' --menu "What Operating System do you use?" 20 50 12
"Windows" "Bill Gate's Nasty Work" \
"Unix" "Unix or a Unix clone)" "Other" "Some other Operating System ..." 2>
/tmp/death_menu.$$

case $? in
0)
OS=$(cat /tmp/death_menu.$$)
rm -rf /tmp/death_menu.$$
case $OS in
"Windows")
dialog --backtitle 'Death' --msgbox 'Go fuck Bill Gates ... no wait, DIE!!!'
5 45
;;
"Unix")
dialog --backtitle 'Death' --menu "When do you want to die?" 20 50 12 "NOW!"
"Die right now" \
"Later!" "Die in a few seconds" "Never!" "Never die" 2> /tmp/death_menu.$$
case $? in
0)
WHEN=$(cat /tmp/death_menu.$$)
rm -rf /tmp/death_menu.$$
case $WHEN in
"NOW!")
dialog --backtitle 'Death' --msgbox 'Thanks! You will now die!' 5 30
;;
"Later!")
sleep 3
dialog --backtitle 'Death' --msgbox 'You had 3 seconds. Now, DIE!' 5 35
;;
"Never!")
dialog --backtitle 'Death' --msgbox 'DIE NOW BIATCH!!!' 5 30
;;
esac
;;
1)
dialog --backtitle 'Death' --msgbox 'Die anyway, Biatch!' 5 30
;;
255)
dialog --backtitle 'Death' --msgbox 'DIE NOW BIATCH!!!' 5 30
;;
esac
;;
"Other")
dialog --backtitle 'Death' --msgbox 'Hmm, just die!' 5 30
;;
esac
;;
1)
dialog --backtitle 'Death' --msgbox 'Die anyway, Biatch!' 5 30
;;
255)
dialog --backtitle 'Death' --msgbox 'DIE NOW BIATCH!!!' 5 30
;;
esac
---------------------------------------------------------------------------

Ok, now that script is sooooo areet.
Try understanding it your self 'cause it's actually quite simple and
I'm too lazy to explain it now.

So, this now leaves us left with the checklist, radiolist and gauge
to explain. However, since I am lazy^H^H^H^H^H^H^Hwant to leave you some
challenges to solve on your own, I'll leave you to discover these marvelous
things.

Maybe I'll put it in 'Leet Shell-Scripting Part Two'.










b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!

There are those that seek the power of hacktheplanet.exe, and those who know it.

<YASITH> do you know about how can i get some password in hotmail ??
<YASITH> or do you know who knows ??
<esd> the gazoo knows
<esd> koo koo kachu
<esd> kacuuuuu
<esd> kachuuuu
<YASITH> who is gazoo?
<esd> the aLmighty hax0r
<esd> ever heard of hacktheplanet.exe?
<esd> he made that
<esd> him and tak
<YASITH> no
<YASITH> where can i get it ??
<esd> you can get it at the grocery store
<esd> and a couple fast food places
<esd> in the vending machines
<YASITH> jejejejeje
<esd> ask digi where to get hacktheplanet.exe
<esd> or rloxley
<YASITH> i was banned from the channel but i only want to know how can i get it
<YASITH> if you have it, can you send it to me ??
<esd> i don't have mine anymore, i had to delete it because i couldnt figure out
how to use it
<esd> go to #zt and ask for it. i think someone in there has one. try msging the
ops
<esd> ok?
<YASITH> ok
<YASITH> thnks
<esd> np

(*** Now talking in #zt)

*** Joins: YASITH (charro@du-148-235-125-42.prodigy.net.mx)

<YASITH> someone have the hacktheplanet.exe

*** YASITH was kicked by SaraLee (no msing ops)
*** zT sets mode: +b *!*charro@*.prodigy.net.mx

b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!
b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!b0g!#@!










____________________________________________________________________

[17:. - [ IRC Quotes ] [k-rad-bob] :. ]
[k-rad-bob@b0g.org] :. ]
____________________________________________________________________


<visje> does have aney one the program hack attack cam you send it to my????

<Zorglub> will php work on old browsers?

<kidjess> and Im curious about .. defcon
<kidjess> everyone says that girls that go there are just sluts though
<tgpretend> i'm sure your not a slut.
<k-rad-bob> translation: god i hope shes a slut

<chris`> how come im 6'5'' but my penis is only like 7 inches?
<chris`> thats fucking BULL SHIT

<Foxdie> prae are you homosexual, or just a platonic guy?

<tak_> i just wrote
<tak_> t
<tak_> a
<tak_> k
<tak_> on my stomache
<tak_> with blood

<tress> i wanted to get a vibrator to stimulate my genatial regions with

<odinnn> i used to be scared i would turn into a mexican if i ate too much
mexican food

<tress> i got my panties on my head
<tress> so i can piss freely onto the floor

<twist> i always hear piano music
<twist> as if someone was randomly banging away at the keys
<twist> and people chanting

<pinkboi> i tried explaining to my mom what I was doing and why there was
nothing but text on the screen
<k-rad-bob> "mom im on irc, its a virtual meeting place where you pick up scene
whores and harras rloxley"


<mouser123> I think Im interested in doing some harmless hacking...can anybody
help me out?

<Zeal> what's cmos stand for?
<TimmYboY> Bios
<Zeal> wtf?
<Zeal> u fik bastard!
<TimmYboY> well
<TimmYboY> same as bios
<Zeal> no it's not!!!
<Zeal> complimentary
<TimmYboY> er
<TimmYboY> whatever
<Zeal> metal-oxide
<Zeal> semi
<Zeal> conductor
<Zeal> bios:
<Zeal> basic
<Zeal> input
<Zeal> output
<Zeal> sytem
<Zeal> system
<TimmYboY> yea
<TimmYboY> look
<Zeal> u thick cunt!!!

<{QBee}> umm
<{QBee}> we used to email each other
<{QBee}> and then
<{QBee}> i didnt hear from you in ages
<JumboJim> hmm, which email address?
<{QBee}> and then i sent you an email messin about askin if you were still alive
<{QBee}> and then you sent one back sayin
<{QBee}> summut like, "dont threaten me little bitch....fuck off and gimme some
space "
or something along those lines

<ss> hi there search pws for whitehouse.com msg me for help

[22:54] <cjmonkey> cjmonkeys staNDARD procedure for acquiring hoe
[22:54] <cjmonkey> s
[22:54] <cjmonkey> 1. Lure hoes into coming with you
[22:54] <tak> lol
[22:54] <DryGrain> ok i can dig it, all u guys will have to do is carry buckets
of dirt out, and mabye bring me a gatorade every hour or so
[22:54] <cjmonkey> ie - "I am fucking loaded come check out my BMW"
[22:55] <tak> gatorade
[22:55] <tak> lol
[22:55] <cjmonkey> 2. blind fold hoe
[22:55] <tak> hahahahahahahaha
[22:55] <tak> im fucking loaded
[22:55] <DryGrain> lol
[22:55] <cjmonkey> 3. put hoe into your honda civic
[22:55] <DryGrain> lol
[22:55] <cjmonkey> 4. drive hoe to underground pad
[22:55] <cjmonkey> 5. make sure she doesn't peek
[22:55] <cjmonkey> 6. walk her down the stairs
[22:56] <DryGrain> we are gonna close and lock the entrance then hotbox the
first room to mad hell
[22:56] <cjmonkey> 7. make sure she doesn't trip in those heels you dumbass!
[22:56] <cjmonkey> 8. remove hoes skirt/pants and shirt
[22:56] <tak> oh ya
[22:56] <tak> word
[22:56] <tak> make an indoor door
[22:56] <tak> =]
[22:56] <cjmonkey> 9. remove blindfold
[22:56] <DryGrain> right
[22:56] <DryGrain> so you have to open 2 doors to get to the 1st room
[22:57] <cjmonkey> 10. if you don't know what to do by now, you don't deserve
this
[22:57] <cjmonkey> THE END

<zoom> anyone here understand nigger talk ?

<Lanze> can I remove auto-away without having to recompile bx?

<occifer> my penis was fat
<occifer> not to long ago
<occifer> so i employed a well known chineese remedy
<occifer> you simple tug and pull at it for a couple of minutes

<tak> can ibe like van halen

<chris`> you fuckers are the reason i cant wake up in the mornings.
<chris`> that and my obsessive masturbation problems.

* tak_ kisses lil-a
*** LiL-A has quit IRC

<jes-linux> on my old puter my hard drive is full
<jes-linux> I have 64 mb of ram
<jes-linux> its full

<negrox> I finger my ass to get hard.

<G4yHaCk3r> Hello b0yz!!

<ciscoboy> ive got a bush above my penis

<wh0rde> just because i like anal sex with people of the same sex doesnt make me
a homo :/

<tress> hrrrmmm, they have the internet on computers now

<FBI-d00d> Ok where the guy thats been hacking hotmail?

<twist`> sorry, i dont like sex:(

<Prence> i think the dog just has a big penis and she thought it was mine and
one thing led to another

<Prence> im masturbating to kidjesses pictures
<Prence> dont tell

<dialect> one night i masturbated so much that i had nothing left at the end of
the night to shoot

<k-rad-bob> i manage to fit two eggs in my anus

<xenophobe> wouldn't it be cool to see little boys getting anal bombed by
horses?

<solarisx> I AM A HAQQER!!!!
<solarisx> wait!!
<solarisx> vince
<solarisx> what is the best RAM type?
<solarisx> i forgot the names of them :\
<vince`> theres not much diff between pc100 and pc133... so pc100 sdram would be
good
<solarisx> 100meg of ram?
<vince`> 128+64?
<solarisx> is that what pc100 means?
<vince`> no, pc100 is the bus speed on the ram
<solarisx> whats a mobo?
<solarisx> :/
<vince`> motherboard

<evilgh0st> k-rad-bob: I have seen sixty year old homosexual men today and a
giant piece of shit in a urine coated toilet.
<evilgh0st> k-rad-bob: What kind of kinky freaky-deaky fetish do you have man?

<Hypah> W is sure in a lot of channels

<ODIN0RE> SOME GUY ON CNN JUST SAID GAGA
<ODIN0RE> and i was like whoa if he coulda said jaja

<Foxdie> when I was younger and my mum used to bathe me, there'd come a point
when my mum would pull my foreskin back to clean there. I don't think I could do
that to my own son

*** Wu_Rza (~email@adsl-pool37-113.chicago.il.ameritech.net) has joined #php
<Wu_Rza> People in here program in php or is this for something else?

<Camo> tress does UK stand for YOU CRANE?

<k-rad-bob> hacker666 i dont see why you insist on keeping that awful script
<k-rad-bob> it gets you banned in every channel you join
<HaCkeR666> it has a nuker in it

<dethl0k> omg, I hate gay terrorists

<HaCkeR666> i uploaded this virus into his computer microphone softwarE and
whenever he says my name it will attack

<k-rad-bob> hacker666, just out of curiosity, whats the name of the script your
using?
* HaCkeR666 using <<caNon>> §c®ÎPt by Adi Surya© Free copy at
http://adisurya.virtualave.net
<prence> lol
<k-rad-bob> im so getting that
<prence> me too
<HaCkeR666> hehehe
<prence> we can be hax0r buddies
<HaCkeR666> we can become the hax0r trio
<prence> rofl
<HaCkeR666> we can go on dalnet. this will be our names: HaCkEr666, SpEEdHaCkeR,
and WaReZHaCkEr

*later that night*

<SpeEdHaCkEr> YAYAAYAYAYAYYA
<WaReZHaCkEr> <JulieLez19> hi everybody.. I`m a 19 year old girl from norway..
I`m looking for mature sexy ladies..30-45..??? plzz msg me...
<WaReZHaCkEr> omg
<SpeEdHaCkEr> OMFG!@#
*** WaReZHaCkEr is now known as anne32
<SpeEdHaCkEr> ROTFLFLFL
-> *JulieLez19* heisann
<anne32> !%@
<anne32> i would plunge my cock so deep inside her it would take a fucking team
firemens to get me back out
<anne32> holy fuck
<anne32> hahaha i sendt her lusta's pic saying it aws me
<anne32> hahahaha
<SpeEdHaCkEr> ROFL
<SpeEdHaCkEr> haha
<anne32> is she fucking hot or what?
<SpeEdHaCkEr> yes
<anne32> for the first time in my life i wish i was my mom
<anne32> i would lick her skin off

<Enclaved> ans i was like "and who are you!" and she said "read the topic" and
it said "cops/fbi/military" and i got a little affraid so i spoofed my IP and
then nuked her a crap load of times, just nuked her like crazy till she got
kicked of IRC!

<^CaFFeInE> hey i need some help someone i know stole my laptop and sold it for
$5 i want pay back but the only way i can do that is to pst his phone number on
homosexual web site and put really good daels over the internet with his number
plz help me out his phone # is 616-659-4944 he lives in sturgis,mi 49091 and his
name is mike s.

<Access1> where i can find a good bnc ??????
<Access1> hi
<solarisx> i have the bnc.tar.gz
<Access1> can you ship it to me air mail ?? ??

<k-rad-bob> i made an avi of me jacking off
<k-rad-bob> then i jacked off while watching it
* linKnee is afk: PUKING

<twist`> prae i get ops in #unix now
<twist`> op me
<Prae> no
<Prae> what a stupid attempt
<k-rad-bob> What a poor effort twist

<tak> she got a 50,000.00 scholorship
<tak> and is like a finalist for 120,000
<bob-afk> for what?
<tak> good grades and stupid smart people shit

<occifer> and i was like
<occifer> oh
<occifer> then i was like
<occifer> can u pull this saftey pin out of my finger then?
<occifer> and shes like what
<occifer> then i showed her, and shes like
<occifer> word.

<Pseudo`> what training does one need for being a private investigator?

* Prae___ is playing Bon Jovi - It's my life.wav (mp³) [37.4Mb] (2hrs 43mins
46secs) (32kbps Stereo)

<thep0et> my mom keeps saying "lick me my pussy nugan"
<thep0et> my dogs name is nugan

<Kremnul> where can i buy human urine on-line so I can pass a drug test?

<S4M0> dude, when i was like 8 or something, i was on the floor.. on my back,
trying to see my asshole.. and i was sucking air in with my asshole.. and
farting it out.. when my brother walked in on me.. and i lost control of my
stomach and a fucking turd popped out and landed on my chest.

<mandoman> is there a software version of the unix operating sytem for windows?

<Fly_kEaT> ok so what time now in russia?
<amsea_> 17:06
<Fly_kEaT> am or pm?

<cybzx> can someone write me a kernel in mirc?

<Jeffwey> i will buy a camoflouged condom so u wont see me coming

<blinkchik> can i become a bot and how??

<jonboi> i heard that you can connect to mirc in notepad....this true?

<Mikkel> If you went camping and you got REALLY drunk with your friend and you
woke up the next morning with a condom stuck up your ass would you tell anybody?
<Celestya> i dont think so
<Mikkel> Wanna go camping?

<^GoMeZ_Uk^> i am not a slut i just like sex
<^GoMeZ_Uk^> im pregnant and i dont know who the father is
<^GoMeZ_Uk^> i slept with 4 guys in 1 nite

<outcaste> When I was single, I used super sensitive condoms.
<outcaste> They were so sensitive that they'd stick around and talk to the chiq
for an hour after I'd gone

<Shaggy> how do i msg an irccop?
<[smiley]> shaggy why do you need a 'cop'
<Shaggy> cos i just saw a robbery
<Malice> of a channel?
<Shaggy> no i saw a house across the road being robbed
<Shaggy> and seeing as im using the phone i thought id tell and irccop

<NaZZaX> whos that hairy guy mikey
<_Mikey_> that's MY WIFE, FREAK!!!!

<NetShadow> this is going to sound pitiful... but can you tell me how to use a
washing machine?

<nailhead> Ya, How come there's albinos in all races but theres no ppl that are
the opposeite? like "alblackos" or sumpin?

<lenox> i had this semi-rabid cat at my old house
<lenox> and it used to love to chew up socks
<lenox> so one day he got outside and was running around
<lenox> so i take off one of my socks and bring it outside
<lenox> and i go "socky...socky" so the cat will come back
<lenox> and after a while these two chinese girls walked by and heard me say
that
*** odinoakie has quit IRC (Ping timeout)
<lenox> and they were like "you fucker!"
<lenox> and i didn't get it for like a half hour

<bob-afkkk> this chick on icq is trying to cyber me
<bob-afkkk> i hate it when that happens
<bob-afkkk> i never know if its one of you guys

<hyrax> i put on a sweater in front of my computer and it crashed

<xristiann> anyone can help me to crack a hotmail psw?
<xristiann> i am a girl

<Prae_> but i sent bob a dvd 3 times and it didnt get there
<Prae_> lovers caught on tape
<bob-afkkk> im fucking pissed off about that
<Prae_> im the one who fucking payed
<Prae_> im pissed off more
<bob-afkkk> the very least they could have done was to give me a call and said
"WE STOLE YOUR PR0N HUHAHUHAHUHUA!!!!!"

<twist> I masturbated to a dreamcast game once
<twist> It was a fighting game, and 2 of the chicks had very large breasts
<twist> and their breasts jiggled when they moved

<sceptre70> i am 18/m/surrey and i just watched a porn and i am tired of jacking
off i am willing to do anything sexual with a female so msg me if ur interested
i don't mind chatting either

<detro> some guy taught me how to make crack once
<detro> he was homeless though

<sp0nk> r u english?
<tak> yes
<sp0nk> I listened to Wheatus - Teenage Dirtbag
<sp0nk> they suck a bit
<sp0nk> but .. what's a dirtbag?

<odinoakie> i had a dream that the "esc" key was racist
<odinoakie> and when you pressed it a black person died
<odinoakie> i know you probably din't wanna hear that negrox_

<Camo> http://www.microsoft.com/windows/netmeeting/images/video.gif <--netmeet
does not have this clear photos
<Camo> stupid microsoft trying to trick me




F I N

Thats it kiddies. End of the road. Maybe if someone actually contributes
articles you wont have to wait seven months for the next issue!%#@

Gratitude to those that contributed, both those that made the final cut and
those that went to dev/zero, better luck next times foo’s!

Greets to everyone in #b0g , everyone that visits http://www.b0g.org , phrack
for not putting out another issue, b4b0 for not putting out another issue, fida
for trying to be cool like us. anicon, mystic, dragonfly, draco and the rest of
my uberleet UT clan, Tool for putting out a new album, mr bungle for rocking my
socks, all the chicks in this world that wouldnt slap me silly if I made a pass
on them and of course you for reading this.

T H E E N D




















































































































































































<k-rad-bob> ma petite amie a eu le sexe avec mon meilleur ami hier :---(
<k-rad-bob> j'ai alimenté ses testicules à mon chien

← previous
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT