Copy Link
Add to Bookmark
Report

HP Magazine 01

eZine's profile picture
Published in 
HP Magazine
 · 26 Apr 2019

  


Genghis Khan Presents....


ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ ³ ³ ³
³ ³ ³ ³
Û³ ³ Û³ ³
Û³ ³ Û³ ³
Û³ ÀÄÄÄÄÄÄÄÄÙ ÃÄÄÄÄÄÄÄÄÄÄÄÄ¿
Û³ ³ À¿
Û³ ³ À¿
Û³ ³ À¿
Û³ ³ À¿
Û³ ³ ÚÄÄÄ¿ À¿
Û³ ³ ³ÛÛÛÀ¿ À¿
Û³ ÚÄÄÄÄÄÄÄÄ¿ ³ ³ ÛÀ¿ ³
Û³ ³ÛÛÛÛÛÛÛÛ³ ³ ³ Û³ ³
Û³ ³ Û³ ³ ³ ÛÚÙ ³
Û³ ³ Û³ ³ ÀÄÄÄÄÙ ÚÙ
ÛÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ÛÀÄÄÄÄÂÄÄÄÄÄÄÄÄÙ ÚÙ
ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛÛÛÛÛÛ ÚÙ
ÚÄÄÄÄÄÄÄÄ¿ ÚÄÄÄÄÄÄÄÄ¿ Û³ ÚÄÄÄÄÄÄÄÄÙ
³VOLUME 1³ ³ ISSUE 1³ Û³ ³ÛÛÛÛÛÛÛ
ÛÀÄÄÄÄÄÄÄÄÙ ÛÀÄÄÄÄÄÄÄÄÙ Û³ ³
ÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛÛ Û³ ³
Û³ ³
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ Û³ ³
³WRITTEN AND EDITED BY³ Û³ ³
³ GENGHIS KHAN ³ Û³ ³
Û³ TERM INAL ³ ÛÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
Û³ CIRCUIT BREAKER ³ ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ
ÛÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ



HP MAGAZINE (C)1991 ALL RIGHTS RESERVED
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ








ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
ÚÄÄÄÄÄÄÄÄÄÄ¿
³DISCLAIMER³
ÀÄÄÄÄÄÄÄÄÄÄÙ

All Information Contained In This File Is Intended For Informational
Purposes Only. Any Other Use Of The Information Is the Product Of The Reader.
HP Magazine, Genghis Khan, Circuit Breaker, Term Inal, Nor Anyone Else
Responsible For The Writing Of This Magazine Condone Hacking, Phreaking, Or
Any Other Illegal Activities. Although, This Magazine Is Protected Under The
Freedom Of The Press. Information Printed In This Magazine Is Protected By
The Constitution. Just A Word Of Advice For Those Intending On Pursuing
Material Contained Heirin.



-Genghis Khan, Circuit Breaker, Term Inal
-HP Staff
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ

ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³WHY ANOTHER MAGAZINE?³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ

In the underground, there can never be enough magazines.
I have read a large majority of them, with the best being
Phrack, LOD Technical Journal, and Phun to just name a few.
I have also read total flops, magazines that a little kid
could write and probably did. My intentions, for this
magazine is to cover some of the topics that others magazines
have not, in a clear, easy to understand format.
I have been in the underground for a while now. I am
not new, but no one ever knows everything and I am always
open to people's ideas. The underground needs to go through
a reform in the 90's. It is really ludicrous that we fight
against ourselves when that anger could and SHOULD be
directed towards law enforcement. If people spent the time
they use fighting amongst themselves, and directed that
energy and time to a fruitful cause such as scanning,
hacking, or writing text files, the underground would be a
much more advanced place.


-Genghis Khan

ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³LAW & LEGISLATION³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ

Due to an increasing amount of law and legislation
designed to deter hackers, I will ask that anyone who comes
across any new legislation to please send it to us. I would
also like to keep tabs on the status of Caller ID. Which
states have it? Which states is it pending?
It seems as though the government has declared war on
the underground. Let's try and stay one step ahead of them.
I would also like to hear from anyone who was busted in
Operation Sundevil. In a future issue I hope to spotlight
that.

-Genghis Khan
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ


ÚÄÄÄÄÄÄÄÄÄÄÄ¿
³IN THE NEWS³
ÀÄÄÄÄÄÄÄÄÄÄÄÙ

This will probably be your favorite section. If you
have been out of the scene for a while, this section will
tell you what is going on.
I would like to compile a list for H/P, of all the
groups in the United States and Canada. The groups must be
HP though. I will NOT spotlight warez groups although if
your group combines the two then fine. Please include what
type of people you are looking for, modem speed,
headquarters, NuP, specialtys, etc.
I am including in this issue a magazine article that
everyone should be interested in about TymNet and Credit
Card Fraud. I'll let you make up your mind on it, but
some of you had better watch who you are trading with
on QSD and Lutzifer.
Speaking of TymNet, let's face it. NUI's are pretty
scarce. I read an article that said Microwire received a
$350,000 fone bill. the T.HONxxx nuis go up and down. If
anyone has a NUI hacker I would be VERY interested.
I have also included some articles from the book John McAfee
wrote titled, "Computer viruses, worms, trojan horses, and
other threats to your system", or something like that.
If you aren't familiar with John McAfee, he is the one who
writes and publishes the SCAN, CLEAN, MDISK type of anti-virus
utilities.
If anyone has ever dealt with the EFF, (Electronic
Frontier Foundation), please send me any information
possible. I know that have helped a lot of people and if
anyone tries to say anything about this magazine, well first
off, they can kiss my ass, second, if it's some 3-letter
agency, I would like to be prepared. It is my right by
freedom of the press to publish whatever I damn want to. If
you have something to say about this magazine or any
magazine, you should listen to yourself and then write a
better one. Until you do that, you have no room to talk.


-Genghis Khan


ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ

ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³Computers Feed International Credit Card Fraud³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ

By Joe Abernathy
Houston (Texas) Chronicle
May 19, 1991


A new international den of thieves linked by computer may be going to town
with your credit card.
Stolen credit card and other account information is both currency and
commodity in this technological underworld, which is giving rise to the
specter of offshore "data havens" outside the ready grasp of the U.S. law.
"Once the hackers get some live numbers, they trade," said Jim Steele,
Mastercard's director of security for the central United States. "It's a real
problem."

Secret Service Agent Tom Moyle agreed, calling the potential for public
harm, "tremendous."

The new data havens represent a kind of hacker's bazaar, where many
participants don't even share a language. But words aren't needed when
numbers do the talking.

In a home near you, a hacker may be staring at a monitor with a list of
pseudonyms and nationalities. At the touch of a key he can excahnge purloined
credit card information with a comrade in Finland.

"MasterCard 5424 1800 2674 5624 exp 9/91 Thomas Wright," read one recent
message, typical of the lot.

(The phrase "computer hacker" originally was a characterization proudly
claimed by computer hobbyists, with its roots in the hacked together nature of
early computer exploration. It is still used in some computer circles, but in
the law and popular vernacular it is now usually understood to describe people
who gain unauthorized access to computer systems for fraudulent purposes.)

One overseas gathering point offers over 400 megabytes of software for
copying, representing hundreds or thousand of stolen titles.

Each of the data havens is actually a computer in somebody's home or
business. They have names - QSD, Lutzifer - and serve as electronic
communities.

The "citizens" are physically located continents apart, while
communicating in an electronic forum that has been convened in a third world
country. Calls may even be routed through a fourth nation for additional
security, with each step in the process making law enforcement's job more
difficult.

"Try getting Israel to cooperate with an Arab country for an
investigation," said one hacker, laughingly describing the logistical
nightmare authorities face. "Or go through South Africa and try to get anyone
to cooperate with them."

Authorities must get a search warrant or permission to conduct
surveillance at each step in the communications link. And that may not even
be possible - not every nation has a legal structure designed to respect
credit ratings and intellectual property.
Those making use of the data havens are doing so through the commercial
communiations network designed specially to link computers around the world.
To customers, these networks are known as Telenet, Sprintnet, EasyLink
(Southwestern bell) or TymNet; generically, they are called "x.25 networks"
for the technical standard describing details of their operation.
"Those systems are set up simply as a vehicle to communicate," said Moyle,
supervisor at the Secret Service fraud devision. "If you sign up, get an
account and pay your monthly bill, you've got very clean data transmission
lines and you can talk to a variety of places for a variety of reasons.
"You've got business folks using those lines, folks involved in research.
That's the legitimate use for them, messaging. You're connecting up to
bulletin boards, is all you're doing."
Most of those calling the overseas fraud boards via the x.25 networks are
stealing air time from service providers and their customers - a fact that has
helped attract investigative agencies to the scene. One company had to pay a
$350,000 bill recently for hacker phone calls. (GK-That had to be Microwire!)
"A lot of the three-letter agencies are there," said Don Murtaugh, chief
of security for British Telecom International, the parent of TymNet. "Because
we're still pursuing it, you hate to say too much."
Using a variety of plays, hackers created user accounts and hacked into
accounts of legitimate users. Account names and passwords were passed around
for others to use.
"Many of the IDs were IDs that customers had and had stopped using or
failed to cancel," said Murtaugh, explaining that the customer is liable for
the bills run up by using x.25 phone accounts. "If you look at the number of
those (stolen accounts) it was in the hundreds. We found ourseles being
violated."
Murtaugh confirmed that federal agencies making inquiries include the
Secret Service, Central Intelligence Agency, FBI and National Security Agency.
The CIA, FBI and NSA refused to comment.
So many agencies are interested. The Secret Service specializes in fraud
investigations, for example, and the CIA worries with external security.
The NSA, an ultrasecret agency nominally charged with decrypting
intercepted foreign communications, is widely believed in the computer science
community to engage in routine monitoring of communications throughout the
world's computer networks.
"It's a felony to possess 15 or more credit card or telephone access
numbers," said Moyle, explaining the law most likely to be invoked for
trafficking in access device numbers - the name collectively given to such
things as credit card numbers and computer passwords.
"Simple possession is a felony, let alone actually using them. If you
traffic in or use one or more and the aggregate value of loss is $1,000 of an
access number, then that meets the black and white statute also."
The only problem with the rule of 15, Steele said, is that it only applies
in the United States. The data havens operate overseas.
He added that the $1,000 threshold can be reached by one typical
merchandise order placed on a stolen credit card number by one computer
hacker. And each stolen number may be used repeatedly by any number of
hackers over a period of weeks.
"It's not like a person was mugged," he said, in which case a stolen card
would be canceled quickly, typically taking a maximum hit of only $1,500.
"If somebody posts your number on a bulletin board, you're not going to
know until the next billing cycle. That's why the significance of the dollar
loss can be greater for that kind of crime."
Computer hackers have trafficked in credit cards and other access device
numbers for as long as there have been hacker bulletin boards. Often, the
information they trade in their high-tech haunts comes from a tool as low-tech
as "dumpster diving" - rummaging through a store's trash for credit card
carbons.
Because stolen account numbers are so easy to obtain by these less
sophisicated means, hackers are only a part of the overall problem, Steele
said. Precisely how much is difficult to measure.
Of the $301 million MasterCard lost to fraud in 1990, $26 million occurred
through telephone sales, which is the most common technique hacker's emply.
"Counterfeiting" of cards, another popular ploy in which a stolen number is
usually superimposed over an old card, accounted for $33 million is losses.
And, of course, MasterCard is only one credit card company. Visa is
nearly twice its size.
"There are some real scam artists who use the bulletin boards as a way to
get live access devices," said Steele, a former Secret Service agent. "There
are others who look at penetrating any system as a challenge - they post some
information just to say, hey look, I can do it.
"But of course when you post that information, you've got proprietary
information that can be financially damaging, military records, things like
that."
The electronic mail and other documents of at least one Secret Service
employee were allegedly compromised by a TymNet hacker. He used an internal
network management tool to monitor this agency employee while he was using a
computer either at home or one the job.
The inspector's office of the Secret Service launched an internal
investigation after being informed by the Houston Chronicle of the apparent
breach. Inspectors would not comment on the investigation.
Information concerning the credit card trafficking and abuse of the x.25
networks came to the attention of the Chronicle during a series of telephone
conversations and meetings with members of the computer underground in
Houston, San Francisco and New York. The information was used to parlay
further details from security officials and others.
Activities within the data havens were monitored by a reporter online.
MasterCard security officials and the issuing institution were alerted to the
stolen credit card number printed in this story.
"The individuals who are involved in this world, are very bright and very
inquiring by nature," said Moyle of the Secret Service. "There's an
attraction to dealing with folks in different countries because it provides a
different perspective, a different learning base, a different knowledge base
to inquire about."
"We certainly have no objection to normal sharing or learning. Where they
come to our attention and invoke our wrath, if you will, is when they cross
over the border - the legal border not the geographic border."

ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³THE HACKER PROFILE³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ

By John McAfee


The intellectual skills of the hackers invite respect, and most of them would
not dream of acting maliciously. But there are many who may be regarded as
social misfits because of the dominant role that computers play in their
isolated lives. This isolation and inevitable introversion in personality
appear particularly prevalent among hackers operating on the dark side, who
irresponsibly break into systems for personal gain or to spread viruses. They
often shun conventional human contact and tend not to make friends or have
social interchanges apart from interaction on electronic bulletin boards.
One programmer - call him Joe - was recruited through the National
Bulletin Board Society, and he typifies this hacker reclusiveness. Joe
stipulated in his contract that he would never meet or discuss his work
person-to-person with his client, even by telephone. Joe's programming was
extremely elegant and precise, and he could complete even complex tasks within
days when average programmers might take weeks. He was obviously a name of
extreme intelligence and ability, but he just could not cope with human
contact in the conventional sense. However, he relates strongly to computers
because, like many hackers, they have become animate things, more satisfactory
and dependable in many respect than humans.
The complexities of these extreme relationships between hackers and their
machines mirror the complexities and intensities to be found in conventional
interpersonal relationships. Joe, for example, despite his extreme antisocial
attitude, loved computers and would never consider planting a virus that might
compromise a system's integrity. Indeed, he was so precise in everything to
do with computing that he could not tolerate the fact that the internal clock
on one of his client's systems was not absolutely accurate, and he felt
compelled to leave his own keyboard to fix it.
After another hacker, Kevin Mitnick, was arrested and charged with
breaking into Digital Equipment Coporation's system, the Los Angeles Times
reported that when the investigator for the Los Angeles County district
attorney's office accused him of harming a computer, tears came into his eyes.
The investigator, Robert Ewen, described Mitnick as having an umbilical cord
from the computer to his soul, becoming a giant when he got behind a keyboard.
Hackers with such personalities who spread viruses do not consider
themselves to be attacking computers per se, but the people and organizations
using them are the ones they perceive to be the real enemies. The potential
threat from a reclusive personality obsessed with computing - indeed, addicted
to it - when coupled with a real or imagined gradge against big business, the
government, or against the computing community establishment as a whole is
similar to that of the snipers who take revenge by indiscriminately firing on
crowds. A virus give the maverick hacker a powerful weapon against perceived
enemies.
There are indications from the monitoring of bulletin board activity that
some of the lonely hackers are striking up somewhat formalized relationships
with other of their kind to develop ever-more potent virus programs. The
viruses show a distinct trend toward becoming more malicious, dangerous, and
hostile. However, it is still unclear whether the primary perpetrators of the
worst viruses are mainly individuals or groups. There are underground hacker
organizations that bring together antisocial individuals who pool their skills
to create viruses. Such collaboration became a feature of hacking in the late
1970s and the early 1980s, before virus programs were being written on any
scale and when the prime interest was simply breaking into secure systems.
But the main threat at this stage of the virus epidemic still appears to be
from individuals hostile to society who work entirely alone, alienated from
direct contact with others, who write viruses as an extension of the hacking
activites that form their substitue for conventional social intercourse.
These lone hackers are almost impossible to identify.
There is a schism opening up between different types of hackers as a "good
guy versus bad guys" situation develops. The malicious hackers find it
creative and exciting to write viruses and to spread them; however, others are
finding it even more stimulating to try to thwart their evil intentions. It
is becoming thrust and parry as the virus writers come up with new techniques
and the "good hackers" counter with ways to combat them. Increasingly, the
good guys are counterattacking, making preemptive strikes with programs
containing protection features that anticipate the next phase of virus
offensives.
Generally, hackers do not fit into any of the traditional social grouping
or psychological stereotypes, which make it difficult for the security
specialists, for whom they have become serious adversaries, to understand they
motivations. Hacking is not just a hobby or area of interest, but often
becomes a dominant lifestyle to which its participants make a strong
commitment. Many spend all night, alone at their computer, devising fiendish
programs and trying to break into other people's systems. Their activities
seem incomprehensible to those not fascinated by computers or who simply use
them as the tools of their trades.
Hacking is now so widespread that there is a hacker in nearly every
neighborhood. A seemingly innocent teenager, who appears to be working late
on a school project while the rest of the family is watching television or has
gone to bed, may well be creating a malicious virus program and trying to run
it in a system at IBM, General Motors, or the Pentagon.
Hacking is predominantly a male activity which parallels intellectually
the physical excitement of big game hunting - tracking a quarry, pursuing it
until it is cornered and then - with the virus a new and powerful weapon -
making a kill. The main difference in the electronic expression of basic
hunting urges is that one has much more control of the odds, and losing out to
an adversay involves little physical risk. As with video games, a player can
be zapped out, yet immediately rise to do battle again. There is a merging of
fantasy and reality, typified by the macho pseudonyms that some hackers adopt
through bulletin boards. Mitnick, for example, called himself Condor, after
the title role played by Robert Redford in the movie Three Days of the Condor,
a character that symbolized the isolated loner fighting a corrupt political
establishment. James Bond and his 007 "licensed to kill" status frequently
crop up in aliases; Mitnick allegedly used Bondian pseudonyms for one of his
hacked telephone accounts.
What really sets hackers apart is their joy in the process of computing,
reported Harvard University sociologist and psychologist Dr. Sherry Tuckle
after studying the hacking phenomenon at the Massachusetts Institute of
Technology. She wrote perceptively about it in her book The Second Self -
Computers and the Human Spirit.
"Though hackers would deny that theirs is a macho culture, the
preoccupation with winning and subjecting oneself to increasingly violent test
smakes their world peculiarly unfriendly to women," she wrote. "There is,
too, a flight from relationship with people to relationship with the machine -
a defensive maneuvre more common to men than to women."
Dr. Turkle found that the MIT hackers engaged in what they called "sport
death," finding in computer programming an addiction to control similar to
that found among some racing drivers and test pilots. In each case, the
participants push their resources beyond what seems possible, with the hackers
concentrating on giving themselves ever more demanding mental, rather than
phsycial, challenges. This is why viruses are so facinating to them - and why
the hackers must be understood better as adversaries by those wishing to
protect their systems from invasion. The hackers' motiviation for
manipulating other people's systems is usually very different from the
motivations for personal gain or revenge involved in other computer crimes.
"It is a culture of people who have grown up thinking of themselves as
different, apart, and who have a commitment to what one hacker described as
'an ethic of total toleration for anything that in the real world would be
considered strange'," Dr. Turkle wrote. "The people who want to impost rules,
the inhabitants of the 'real world,' are devalued, as is the 'straight'
computer science community . . . . The hackers have to keep changing and
improving the system. They have built a cult of prowness that defines itself
in terms of winning over ever-more complex systems."


ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ

ÚÄÄÄÄÄÄÄÄ¿
³SCANNING³
ÀÄÄÄÄÄÄÄÄÙ

Of the many things I have done. Scanning has to be one of the more
lucrative things to do. With everything you can find when scanning, it is
hard to believe that ANYONE would not scan. Someday, I'll have to publish a
fone book of scans..ehhee. Joke maybe, but, we'll see. I would like to get a
scanning group together to scan directly for HP magazine. If there is anyone
who would like to be in my scanning group, contact me.
The below scans are for the 1.800.444.xxxx prefix. I jumped around a
little bit, but should have TONS more scans by the next issue. This should
last you a little why though...

ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
ÃÄÄÄÄÄÄÄÄScans for 800.444.xxxxÄÄÄÄÄÄÄÄ´
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ 0000 VMB ³
³ 0003 VMB ³
³ 0005 VMB ³
³ 0029 MESSAGE CENTER VMB ³
³ 0048 VMB ³
³ 0050 VMB ³
³ 0060 DIVERTER? MAYBE D.D. VMB ³
³ 0063 WEIRD RING THEN BUSY ³
³ 0071 VMB ³
³ 0073 WEIRD RING THEN BUSY ³
³ 0075 WEIRD ³
³ 0078 DIAL TONE ³
³ 0081 VMB (Audix) ³
³ 0083 VMB ³
³ 0084 FONMAIL VMB ³
³ 0088 VMB ³
³ 0089 FAX ³
³ 0091 WEIRD RING THEN BUSY ³
³ 0096 ASK FOR AN OUTSIDE LINE ³
³ 0100 VMB ³
³ 0106 VMB ³
³ 0107 VMB ³
³ 0112 CARRIER ³
³ 0118 WEIRD RING THEN BUSY ³
³ 0119 WEIRD RING THEN BUSY ³
³ 0112 WEIRD RING THEN BUSY ³
³ 0123 VMB?? ³
³ 0141 FONMAIL ³
³ 0143 VMB?? ³
³ 0144 DIAL TONE (CODEð6079) ³
³ 0155 WEIRD RING THEN BUSY ³
³ 0171 FAX ³
³ 0182 DIAL TONE ³
³ 0202 DIVERTER ³
³ 0210 DIRECT DIAL VMB ³
³ 0219 FAX ³
³ 0223 VMB ³
³ 0231 VMB ³
³ 0240 CARRIER ³
³ 0242 AFTER HOURS VMB ³
³ 0273 FAX ³
³ 0274 VMB ³
³ 0275 DIRECT DIAL VMB ³
³ 0279 VMB ³
³ 0507 CARRIER ³
³ 0511 RINGS THEN BUSY ³
³ 0520 RINGS THEN BUSY ³
³ 0523 RINGS THEN BUSY ³
³ 0534 AUTHORIZATION CODE FAILURE ³
³ 0539 FAX ³
³ 0547 EXTENDER ³
³ 0549 EXTENDER ³
³ 0553 EXTENDER ³
³ 0560 VMB ³
³ 0567 VMB ³
³ 0607 RINGS THEN BUSY ³
³ 0608 RINGS THEN BUSY ³
³ 0609 RINGS THEN BUSY ³
³ 0615 RINGS THEN BUSY ³
³ 0617 RINGS THEN BUSY ³
³ 0618 RINGS THEN BUSY ³
³ 0624 RINGS THEN BUSY ³
³ 0625 RINGS THEN BUSY ³
³ 0626 RINGS THEN BUSY ³
³ 0627 RINGS THEN BUSY ³
³ 0628 RINGS THEN BUSY ³
³ 0630 RINGS THEN BUSY ³
³ 0631 RINGS THEN BUSY ³
³ 0633 RINGS THEN BUSY ³
³ 0635 RINGS THEN BUSY ³
³ 0636 RINGS THEN BUSY ³
³ 0638 RINGS THEN BUSY ³
³ 0646 RINGS THEN BUSY ³
³ 0649 RINGS THEN BUSY ³
³ 0653 RINGS THEN BUSY ³
³ 0654 RINGS THEN BUSY ³
³ 0655 RINGS THEN BUSY ³
³ 0656 RINGS THEN BUSY ³
³ 0658 RINGS THEN BUSY ³
³ 0660 RINGS THEN BUSY ³
³ 0662 RINGS THEN BUSY ³
³ 0668 CREDIT CARD CHECKER ³
³ 0678 CREDIT CARD CHECKER ³
³ 0684 VMB ³
³ 0693 VMB ³
³ 0709 FAX ³
³ 0712 MCI CODE ³
³ 0720 MCI ³
³ 0722 MCI ³
³ 0723 MCI ³
³ 0731 MCI ³
³ 0744 MCI SECURITY ³
³ 0747 EXTENDER ³
³ 0748 EXTENDER ³
³ 0751 WEIRD TONE ³
³ 0787 WEIRD BELLS(Extender) ³
³ 0797 FAX ³
³ 0803 FAX ³
³ 0806 EXTENDER ³
³ 0809 LOVE CONNECTION ³
³ 0815 RINGS THEN BUSY ³
³ 0816 EXTENDER ³
³ 0817 VMB ³
³ 0830 WEIRD BEEPS ³
³ 1503 DIVERTER ³
³ 1510 ANSWERING MACHINE ³
³ 1511 VMB (LIMO SERVICE) ³
³ 1513 WEIRD BEEPS ³
³ 1514 VMB ³
³ 1521 VMB ³
³ 1534 AUTHORIZATION CODE FAILURE ³
³ 1539 CELLULAR FONE? ³
³ 1543 VMB (12 HOUR) ³
³ 1546 VMB ³
³ 1553 VMB ³
³ 1563 AUTHORIZATION CODE FAILURE ³
³ 1571 WEIRD ³
³ 1575 AUTHORIZATION CODE FAILURE ³
³ 1579 VMB ³
³ 1583 CARRIER ³
³ 1585 WILLOW PERIPHERALS? ³
³ 1587 FONMAIL VMB ³
³ 1588 FONMAIL ³
³ 1592 ANSWERING MACHINE-HACKABLE ³
³ 1596 FAX? ³
³ 1599 FAX ³
³ 1602 VMB ³
³ 1608 AUTHORIZATION CODE FAILURE ³
³ 1613 VMB ³
³ 1615 STRANGE RING ³
³ 1621 DIAL TONE ³
³ 1634 AUTHORIZATION CODE FAILURE ³
³ 1635 VMB ³
³ 1636 VMB ³
³ 1642 ANSWERING MACHINE ³
³ 1645 FAST BUSY ³
³ 1646 FAST BUSY ³
³ 1654 VMB ³
³ 1673 FAST BUSY ³
³ 1674 VMB ³
³ 1679 FAX ³
³ 1690 DIAL TONE ³
³ 1701 DIAL TONE ³
³ 1705 FAST BUSY ³
³ 1720 VMB (MESSAGE CENTER) ³
³ 1723 FAST BUSY ³
³ 1726 FAX ³
³ 1729 VMB ³
³ 1730 FAST BUSY ³
³ 1731 FAST BUSY ³
³ 1737 FAST BUSY ³
³ 1738 STRANGE VMB ³
³ 1739 FAST BUSY ³
³ 1748 DIAL TONE ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ

Here is a handy printout to use when scanning.

ÄÄÄÄÄÄÄ¿
cut here \³/
-----------------------------------------------------------------------------

-----------------------------------------------------------------------------
| Scan Sheet for Prefix _____ (C)1991 HP Magazine |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------
| | | | |
-----------------------------------------------------------------------------

-----------------------------------------------------------------------------
cut here /|\
ÄÄÄÄÄÄÄÄ|
The smallest block on the left is for the 4 digits at the end of the
prefix..here's an example
-----------------------------------------------------------------------------
| 1602 | vmb | 1750 | Dial Tone |
-----------------------------------------------------------------------------
That's a pretty easy way of keeping track of everything.

Genghis Khan

ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
ÚÄÄÄÄÄÄÄÄÄÄÄ¿
³LOOZER LIST³
ÀÄÄÄÄÄÄÄÄÄÄÄÙ

There have arisen in the Underground and the entire Computer world as a whole,
a group of people, that I can not think of much more of a name for them. The
simplest thing to call them, are LOOZERS. I have already recieved threats of
lawsuits and the sort for posting peoples name in the loozer list. But, I am
not telling anyone to do anything. It is your choice what you do. I am
mearly spotlighting those few people, who well, make it tough for all of us to
go forward. And of everything, I am mearly stating facts. Home addresses,
fone numbers, entire names, bulletin boards, and what they do. There is NO
law against that, and if you have something to say about it, say it. I'm
ready.

Allen Lee
116 Spinning Rd
Dayton Ohio 45414
Our Place BBS - 513-252-1928 - 24oo
Distrubutes McAfee Anti-Virus Files and Tracks Down Hackers.
Running WildCat 2.55n


Joeseph Caplinger
J&Js BBS Node 1 - 513-236-4788 - 24oo
J&Js BBS Node 2 - 513-236-3087 - 24oo
J&Js BBS Node 3 - 513-236-1229 - 96oo
Locked Many of the Underground Out of the BBS for stating an opinion
My what a democracy we live in..
Running WildCat 3.0


Marc Younkin
Yorktown BBS - 513-434-8024 - 24oo
TransAmiga
Stated he was out to take down the entire IBM underground.
Captures and other data have been recovered from his board
that make this statement true.


Joey Evans
Blazing BBS ð 513-878-6014
SuperBBS
This guy (?) is accused of turning classified underground information to
certain Public Doman Sysops including Allen Lee. Was in the underground for a
short time. Believes himself to be the best hacker in the world. Has a habit
of thinking he is superior to the rest of the world. Very Obnoxious.



That ends the list of loozers. I hope to make this section a LOT bigger
in the next issue. Keep the names and numbers coming. What you do to these
people/boards is strictly a product of you. The writer/s and or editors of HP
magazine take no responsibility for any actions taken. Please read the
beginning disclaimer for further information

ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ

ÚÄÄÄÄÄÄÄÄÄÄÄ¿
³QUICK NOTES³
ÀÄÄÄÄÄÄÄÄÄÄÄÙ

ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
Spicoli was busted. Answers are vague. Information is being held until
either a court case or questioning comes. What Spicoli was busted on is still
a mystery. Hopefully, we will soon know what it was. I warn all to stay away
from the bridges that Spicoli was calling. If you know what I'm talking
about, you know what to do.

-Genghis Khan
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
I have talked to two people now that have been called or visited because of
hacking 748-9200. Just a warning.
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
Do not call the 713 CBI dialup. It is being monitored.
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
It is illegal for anyone, including government agencies to put a tap on your
line. If you think your line is being tapped, call your operator. Then have
her connect you to repair service. Tell them you think you are being tapped
and that you would like to have the line checked. They will usually give you
the number for that Telco's Security Department. Call them, and they will
check out the line for any sort of tap. Then give you the option to press
charges, if it can be discovered who is tapping it.
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ

ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
ÚÄÄÄÄÄÄÄÄÄÄÄ¿
³BBS REVIEW?³
ÀÄÄÄÄÄÄÄÄÄÄÄÙ

Well, I must admit, I did run out of time on this magazine. Therefore my
BBS Review and VMB Review will have to wait till next issue. But I will list
a few good boards that I can think of right off hand. If I leave you out,
which I probably will, please excuse me, and I will try and get you in the
next issue.

Dragon's Keep
Home of HP Magazine
513.277.6oo6
12oo/24oo
NuP OPTIONS
SysOp-Term Inal aka Dragonlord
CoSysOp-Genghis Khan
Running Telegard

I am Co-SysOp on this board, give it a call. I have some innovative ideas
in effect on this board including a message base called Phreak Klass. We have
had a great response for the Phreak Klass Base and hopefully we are producing
some good New Phreakers. Unlike some I have seen recently who think they know
everything and don't.


High Voltage
513.898.8768
12oo/24oo/96oo/14.4/38.4
NuP CourierHst
SysOp-Circuit Breaker
CoSysOp-Genghis Khan

I also have co-sysop status on this board. More oriented towards the
usage part of phreaking and not the fundamentals. Still a good board to call.
Message bases galore. But the Circuit Breaker has a past of being a warez
d00d. I converted him, and he is now half half. Give it a call. Well worth
it. Running Telegard.


Gonzo's Gabanza
513.89o.o655
12oo/24oo/96oo/14.4/38.4
NuP GATE*WAY
SysOp-Gonzo Merkazoid

Pretty good H/P board. Specializes in just about everything. Many files
to choose from. Overall, one of the better boards. Running Telegard.


Crow Technologies
513.433.861o
12oo/24oo
NuP CORAL
SysOp-Crow Meister

Specializes in Virii and Trojans. If I can remember right, has at least
400 viruses. And I'm sure that is an old count. Getting access is difficult.
Easy for me, easy for some. Those who do not know there stuff need not apply.
Running TcH 3.0. Very nice board.


These boards are all local to me. If you have something you would like to
see in HP Magazine or would like to comment on the mag, please leave you
messages on these boards. Thank you.

ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
ÚÄÄÄÄÄÄÄÄÄÄ¿
³CONCLUSION³
ÀÄÄÄÄÄÄÄÄÄÄÙ


I feel somewhat bad about the content of this magazine. Being the first
issue I hoped to make it great. But I didn't anticipate how long it would
take. I am sorry if I let some of you down. The next issue will be much
better. Time was ticking down and I had to get this baby out. So, use what's
in here while you wait another month, till January 6th, 1992. I will include
AT LEAST 2 Interviews/profiles. Scans galore, Complete BBS Review. A VMB
Review. More Loozers. More News. Don't miss it.

And to all who are reading this. Merry Christmas and a Happy New Year to
you. Let's make the headlines in 1992.





-Genghis Khan
Editor In Chief



ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ

loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT