Copy Link
Add to Bookmark
Report

National Security Anarchists 01

  


--=] National Security Anarchists [=--
--=] Volume 1, Issue 1 [=--
--=] Date Released: 06/21/91 [=--



== NSA Introduction ==

Welcome to National Security Anarchists (NSA) first Newsletter. We are
pretty much unlike other groups out there in that H/P wasteland. We are more
interested in providing new ideas, and new information. Now everyone can
scan, hack codes, hack unix. Now in order to further these abilities we must
take a look at the new technology that most of you have overlooked. From
just looking at these new ideas and concepts, you can develop you H/P skills
even more. Now the release of NSA Newsletter will come out when damn ready
to. Rush a newsletter, expect a shitty newsletter. Plain and simple.
Enjoy.

-- Your Editor --

-------------------------------------------------------------------------------
Table of Contents

Section Subjects
-------- -----------------------------------------------------
1.0 NSA Introduction
1.1 Table of Contents
1.2 Teleos Access Server, The Missing Switch?
1.3 Teleos Escort
1.4 Teleos Virtual Networking
1.5 Advanced Communication Architectures and Techniques
1.6 Network Facility Planning
1.7 NSA World News
1.8 Telco Briefs
1.9 NSA Information

-------------------------------------------------------------------------------

--=] National Security Anarchists [=--
--=] Volume 1, Issue 1 [=--
--=] Presents [=--

== Teleos Access Server, The Missing Switch? ==


The Access Server is Customer Premises Equipment (CPE) located in the
position formerly occupied by a T1 multiplexor. The Access Server is a
switch that allows simultaneous Bandwidth-On-Demand access to each of the 23
64 Kbps B channels on the PRI interface.
The Teleos Access Server was designed to add value through switched access
to those emerging switched digital network services. Specific interface
cards are then added to the Access Server for each type of access (premises
or netowrk) desired. End users no longer need to provision T1 channels among
voice, data, image, and videoconferencing. Currently, network interfaces are
available for T1 and PRI in all the protocol formats used by North American
Inter-Exchange and Local Exchange Carriers. Premises-side interfaces are
availbable for T1, PRI, BRI, IBM token Ring and V.35 (through the Teleos
Escort PRI TA).

A Teleos Access Server will serve as the single point of switched digital
network access from teh store. Older PBXs will be connected to the Access
Server via a Teleos T1 interface. An IBM 3174 Controller and a workstation
will be attached to the Token Ring. All access from the store with the
exception of local voice and local data calls will be via PRI.

CICS applications such as Inventory, Pricing, Payroll, etc. willl run on an
IBM Series 1 processor. Both the Series 1 and the Token Ring will connect to
a modem sharing device for access to a 9.6 Kbps leased line for SDLC access
to an IBM 3090 host processor. Credit card verifications for business
customers will be directed to the Series 1 which permits access to the host.

A key application driving the network architecture involes image transfer
technology, which could lead to the presentation of high resolution images to
the store's merchandiser to assist in selecting styles and colors of
merchandise to make available in their stores. The images can reside on the
file server or the mainframe at the data center. They are accessed using a
high-resolution PC workstation with a graphical user interface. In trails
thus far, the call setup time through the IAP6000 Access Server hs been less
then two seconds.

The IAP6000 Access Server at the data center haso nly a Token Ring
interface on the premises side, and is connected on the network side over a
direct access PRI to MCI's DMS-250.

Teleos Communications has forecast that using switched digital services
rather than dedicated T1 network will save about 27% in recurring monthly
network operating charges for this netowrk.

Note:
Teleos, together with Network Software Associates (NSA), is pleased to
announce the availabbility of a PC-based 3270 emulation application. This
product is compatible with IBM's new 3174 Establishment Controller
equipped with the recently announced Basic Rate Interface (BRI) adapter.

When used with these new IBM products, the Teleos/NSA soution allows
ISA bus PCs to achieve 3270 terminal access and printer in an IBM S370 or
S390 environment via local or remote cluster controllers. The product
solution consists of AdaptSNA 3270 Emulator software form NSA and Teleos'
B101PC Terminal Adapter.

-------------------------------------------------------------------------------

--=] National Security Anarchists [=--
--=] Volume 1, Issue 1 [=--
--=] Presents [=--

== Teleos Escort ==
== Switching Interface ==

The Teleos Escort is a Primary Rate Interface Terminal Adapter (PRI TA)
that lets you leverage the power of the switched digital network by offering
access to a wide variety of high-speed switches services. These include AT&T
ACCUNET Switched Digital Services (56,64,336,384, and 1536Kbps), MCI Vnet
Switched 56, and U.S. Sprint VP 56.

The Escort's unique Bandwith-On-Demand feature allows you to dial up
network bandwidth for applications on an "as needed" basis. You pay only for
the bandwidth you use and access it only when you need it, resulting in a
reduction in overall transmission costs. This feature makes the Escort
ideally suited for applications such as videoconferencing.

The Escort supports dual standard RS366 dialing interfaces that let you
access the direct dialing capabilities of video codecs. The Escort also
provides an interface for serial, synchronous host communication via dual
V.35 or dual RS449/RS530. Thus, by using the codec's keypad, you can easily
establish a videoconference with a remote video codec.

Escort options include an intergrated T1 Channel Service Unit (CSU), which
allows direct connection to the T1 line without additional external
equipment, and a Multi-Channel Synchronization feature, which provides the
capablity to bundle 56/64 Kbps channels into n X 64 increments

Simply put, the Escort allows you to link customers, suppliers, and
strategic partner over Switched Digital Networks with the flexibility and
cost efficiency of Bandwidth-On-Demand.

-------------------------------------------------------------------------------

--=] National Security Anarchists [=--
--=] Volume 1, Issue 1 [=--
--=] Presents [=--

== Teleos Virtual Networking ==
== Combining Private & Public Networks ==


Teleos Access Servers give corporate end users the "best of both worlds":
Virtual Private Networks (VPNs) and Hybrid Private Networks (HPN). These
networks deliver advance services over the more flexible and cost-effective
public switched digital network.

This emerging networking environment allows small and medium size
businesses, as well as large corporations, to leverage the full menu of
switched services for intra-and inter-enterprise networking applications.
Among the advance virtual networking features enabled by an IAP6000 Access
Server are multi-point. Token Ring LAN bridging, distributed image
communications, video conferencing services, intra/inter-bulk file transfer,
and multi-vendor PBX interconnection.

For companies considering switched networking or phasing out cumbersome,
expensive private networks, the new features allow users to define a virtual
networking environment, mixing both public and private leased lines to
optimize network management resources, costs, and network traffic for more
competivite decisions-making based on information access, flow, and
distribution. Virtual Networking offers the following advantages:


o Just-In-Time Bandwidth Optimization

Customers want dynamic bandwidth allocation on demand and want to pay
for it when they need it. "Just-In-Case" based private networks do not
offer this flexibility.

o Information Sharing
Virtual networking provides true information sharing with partners and
customers by enabling simple and flexible network topologies for either
vice, data networking, image, or videoconferencing.

o Unlimited Network Redundancy
Customers can use the built-in-redundancy of public Switched Digital
Networks eliminating the need for building backup routes as required by
proprietary private networks.

o Choice of Carriers
All major carriers offer Switched Digital Network services with an open
standard switched access (i.e., ISDN PRI) enabling a global networking
perspective for the first time.


-------------------------------------------------------------------------------

--=] National Security Anarchists [=--
--=] Volume 1, Issue 1 [=--
--=] Presents [=--

== Advanced Communication Architectures and Techniques ==
== Advanced MSE Architectures ==
== GTE Project 534 ==


This GTE Government Systems project has the broad, year 2000 objective
to develop an advanced military tactical communication system
architecture and software/hardware prototypes based on the most advanced
field-qualified technologies. The first year of this multiyear project
effort was in the year 1990.

First, a set of preliminary operational requirements was put together.
The original objective for this project was for a MSE (mobile subscriber
equipment) replacement, using the most modern technology, suitable for
deployment in European terrain. However, the most changes in the
world's geopolitical scence required a more general perspective. The
first operational requirements considered were the following:


@ Radio access only --- no wirelines required.

@ Moveability --- near-instantaneous take-down, set-up

@ Security, privacy.

@ Low probability of detection --- no radiation hotspots to reveal presence

@ Jamming resistant.

@ Ubiquitous low and medium band switching. Selective broadband switching.

@ Interoperability with other communication systems

@ Survivability/reliability.

@ Minimal size and weight.

@ Position location.

@ Dialing by spoken name or unit or number.


A baseline architecture was conceived to meet these requirements.
This architecture has the following capabilities:

@ Phased array antennas permitting electronic variation of the
number of beams and their gains.

@ An all-radio interface using Spread Spectrum/Code Division
Multiple Access (SS/CDMA) for the line side and trunk side signals.

@ A single size Electronics Vehicle (EV) containing all system
eletronics; radio transceivers, antennas, and switches.

This architecture, in the principle, meets all the operational
requirements. The universal SS/CDMA meets those requirements
relating to the radio interface. The great mobility of this
architecture allows communication to begin as soon as the vehicle
stops. The system self-configures, without prior planning. The
Electronic Vehicle nodes (Look at diagram below) seek EV identifies
itself; The mobile station's presence in the coverage zone of the
new EV automatically promulgates to all other system nodes; any
mobile station found can receive calls.

In 1991, further definition of this baseline architecture, the
consideration of different architectures, and the continuing
assessment of applicable technologies, will continue.



__________
____ / * \
_________ / \ / ? \
(EV) Electronic Vehicle / \ \ \/ ? |
/ / \ >(EV) \
@ Personal Stations \ *>>> \ /*< >>>> ? \
/ >>(EV)>>> | < > ? >>* |
>,?,< Radio Waves \ ? \ >> | < > ? > |
/ *>>? / >>>> | <> ? > /
\_________/ >>>>>>>(EV)>>> ] |
\ >>>>(EV) /
\_____________ /
\/

-------------------------------------------------------------------------------

--=] National Security Anarchists [=--
--=] Volume 1, Issue 1 [=--
--=] Presents [=--

== Network Facilities Planning ==
== GTE Project 446 ==


The objective of this multiyear project is to develop advanced network
planning systems that will assist planners in producing cost-effective
facility expansion plans for the cellular networks used by GTE mobilnet
and the interoffice networks used by the telcos. The project aims to
develop graphical, easy to use systems that employ state-of-the-art
optimization algorithms, allowing the planners to use them interactively
to evaluate several alternatives and generate cost-effective plans.

During 1990, the research effort focused mainly on developing a
facilities planning system for the cellular networks used by GTE
Mobilnet. This system comprised optimization algorithms for determining
minimum-cost facility plans for the rapidly growing networks and
cost-effective network topologies that provide a desired level of
reliability. The graphical interface for these algorithms is currently
being developed using X-windows/Motif presentation graphics and the Unix
operating system to ensure the portability of the tools to alternative
hardware platforms, and the future compatibility with other planning
systems.

A related task, that originated in response to a request from the GTE
Government Systems staff working on the Airfone ][ project, focused on
the design of the terrestrail facility network that connects the ground
stations to the Airfone switches.


INTERCONNECT FACILITIES PLANNING SYSTEM FOR GTE MOBILNET

Mobile telephone services are expected to be one of the fastest
growing areas of telecommunications over the next decade, and this rapid
growth in the customer base will require a corresponding growth in the
network facilities. A fundamental problem that arises in designing the
facilities network for a cellular system is to determine how to expand
the capacity of the facilities over a given planning time horizon to
meet projected demand at minimum cost. The transmission facilities used
in the cellular systems are either privately owned (e.g. microwave) or
leased from the local telcos (T1s, fiber). The capacity expansion plan
has to determine where and when to place concentrators in the network,
what type of concentrators to use, which cell sites to connect to each
of the hubs, which cells to connect directly to the Mobil Telephone
Switching Office, and what facilities to use on each of the links.
Optimizaion algorithms were developed to address these questions, and
the graphical interface for the system is currently under development.
In addition, preliminary work was completed on alogorithms to determine
the network topology that should be deployed to survive any single link
failure. A prototype system was presented to the Mobilnet staff for
feedback and is currently under revision. The transfer of the
alpha-version to Mobilnet is expected in the first half of 1991.

Figure Below illustrates the output of the prototype system. This is
the final design toplolgy for a representative network; it shows where
the concentrators should be located and how the cell sites should be
connected to the hubs and to the Mobil Telephone Switching Office
located at Warrensville Heights, Ohio.



Final design topology for a representative cellular network
-------------------------------------------------------------

o
o o o_ | /---o
\_ / o \_|_/
\__/_/ _/- O_ Pine Ridge
_O/ Cleveland _/ / \_
_/ \_ o / o
_/ \_ /
_/ \_ / o_ o o
o \_ / \_ | /
\_ o_ o / \_ | /
o \_ \_ \ / \_|/
\_______ \______\ \ / /------------O Bainbridge
\_ \ \ //-------- |
o-----------O---------------@/ Warrensville Heights |
_/ Lakewood _/ |\\-----\_ |
_/ _/ | \_ \ o
_/ _/ | \-------O Chardon
o _/ | \_
_/ | \_
_/ | o \_
_O Berea | / \_ o
_/ | / \_ |
_/ |/ \_ o
/ o-----O Shaker Heights o \_ |
o _/ \_ \ \ |
_/ o \---_O_ South Russell
/ _/ | \_
o _/ o \_
o o

Key
-----------------------------
@ - Main Switch Distributor
O - Inner Switch Distributor
o - Outer Switch Distributor


FACILITIES PLANNING FOR THE TERRESTRIAL NETWORK FOR AIRFONE ][

Due to the advent of new technology and the expected increase in
demand for air-to-ground telecommunications services, GTE Airfone is
currently considering the design and implementation of a new system,
called Airfone ][. One of the questions that arises in the design of
the new system is, given the locations of the ground stations and their
busy-hour traffic forecast, where should switches that provide the
connection to the public-switches in order to minimize the overall cost
of the switches and the interconnect facilities.

To evaluate the impact of increasing the number of switches on the
cost of the interconnect facilities, this study considered five design
scenarios: 2, 4, 6, 8, and 10 switches, with one switch always fixed at
Chicago. The study was carried out in two stages. In the first stage,
a mathematical model was used to determine the optimum locations for the
switches, assuming that the ground stations would be connected directly
to the switches (i.e., a star topology). Given a switch location and
the ground stations it will serve, the second stage determined a
minimun-cost topology to connect the ground stations to this swtich.
This topology allowed multiplexing and took advantage of the economies
of scale offered by the structure of the DS0 and DS1 tariffs and was
determined using a private network design tool, CAPT1N, developed at GTE
Laboratories during 1989 as part of Network Facilities Planning project.
The results of the second stage indicated the cost saving that result
from multiplexing for each cluster of switch and gorund stations to be
served by the switch. The results of this study can now be used to
evaluate the tradeoff between the cost of the swithces and the cost of
the interconnect facilities to determine the number of switches that
should be placed in the network. Figure below illustrates the network
topology with multiplexing for the four-switch scenario and the switch
at Chicago, transimiting to cells.


Minimum-cost network: Four-Switch scnario/Chicago as a Hub
------------------------------------------------------------

o o_
| \_
| \_
| \_
| \_
| o---------------o----------------------o
| _/ |
| _/ |
| _/ |
| o Minneapolis _/ |
| _/ _/ |
| _/ Chicago / o Detroit |
| _/ _/-----@______ \ o
|/ _/ _//|\_ \------o Cleveland
o-------/ _/ / | \_
_/ | | \_
_/ _| |_ \_
_/ | |_ \_ Dayton
Kansas City / | |_ \_ o
o / |_ |_ \_ _/ o Cincinatti
\_ / o |_ \_ _/ _/
\/ \_ |_ \__/ /
o o |_ o ----
St. Louis |
|
| o Nashville
o-/
_/
_/
_/
o

Key
-----------------------------
@ - Main Switch Distributor
o - Distribution Switches


-------------------------------------------------------------------------------

--=] National Security Anarchists [=--
--=] Volume 1, Issue 1 [=--
--=] Presents [=--
--=] World News [=--

Welcome to NSA World News. The next few articles tell of some of the more
recent Hack/Phreak and other activities as well. I wish for you all to sit
back and have a few laughs on how the media portrays our society. Funny,
hackers didn't get a bad name until, well until media got involved. Hmmmm,
makes you wonder doesn't it. Read on.

-------------------------------------------------------------------------------

--=] National Security Anarchists [=--
--=] Volume 1, Issue 1 [=--
--=] Presents [=--
--=] World News [=--

"Nazi Video Games Circulating"
Written by
Los Angeles Times


LOS ANGELES ---- Undergound computer-video games circulating among
Austrain and German students test the ability to manage a Nazi death
camp and to distinguish between Aryans and Jews, a Holocaust study
center says.
Eight copies of the programs, designed for home computers, were
obtained by the Simon Wiesenthal Center in Los Angeles. The center
demonstrated two of the programs for The Associated Press on Monday.

Rabbi Abraham Cooper, the center's associate dean, said the
programs are based on the Holocaust but often substitute Turks, many
of whom work in Germany, for Jews.

In one program, "KZ Manager", the player must sell gold fillings,
lampshades and labor to earn enough money to buy gas and add gas
chambers to kill Turks at the Treblinka death camp. "KZ" is an
abbreviation of the German word for con- centration camp.

The player must correctly answer questions about Turks or be taken
by a Grim Reaper figure to the Buchenwald death camp.

What yo uwant to do now if you love playing computer games, you
want to go right back in adn you want to win," Cooper said. "It's a
very shrewd psychology in terms of the design of the game"

Reports of the games have circulated for several years, but they
were not believed to be widespread until a recent surge of reports in
the Austrian media, he said.

Newspapers reported that a poll of students in one Austrian city
said that nearly 40 percent knew of the games and more than 20
percent had seen them, Cooper said.

The game "Aryan Test" says it is by Adolf Hitler Software Ltd. The
game "Anti-Turk Test" says it was made in Buchenwald by Hitler & Hess.

Distribution has been by electronic mail, under-the-counter sales, word
of mouth and in deceptive packaging on store shelves. Cooper said the
packaging of the "KZ Manager" game resembles "some sort of money game."

Cooper believes the games are the work of neo-Nazi propagandists (*** Yea
it's probably out own fucking gov't too ***) seeking youthful followers
through a technology largely unfamiliar to their parents.

"Not shocking to anybody, the kids are way ahead of the adults, and this
is one area where the Nazis, the fascists, have found a way in," he said.

-------------------------------------------------------------------------------

--=] National Security Anarchists [=--
--=] Volume 1, Issue 1 [=--
--=] Presents [=--
--=] World News [=--

"Nazi-Games Maker Target of Reward Offer"
Written by
Associated Press


LOS ANGELES --- The Simon Wiesenthal Center offerd a $25,00 reward
Friday in hopes of finding the maker of neo-Nazi video games that
have been circulating in Europe. It asked the German government to
match the sum.

"We believe that this would demonstrate a seriousness to finally
bringing these culprits to justice," said Rabbi Marvin Hier, dean of
the Los Angeles-based Holocaust research center. The reward was
offered for information leading to a conviction.

The underground games, which are in German, have strong anti-Jewish
and anti-Turkish themes. In one program, KZ Manager, the player must
sell gold filings, lampshades and labor to earn money to buy gas and
gas chambers to kill Turks at the Treblinka death camp. "KZ" is an
abbreviation of the German word for concentration camp.

The reward was triggered by a telegram sent by German Chancellor
Helmut Kohl to Sen. Alfonse D'Amato, R-N.Y., on Thursday and
forwarded to the Wiesenthal Center.

D'Amato last week wrote to Kohl and Austrain President Kurt
Waldheim, asking them to prevent distribution of the games after the
center publicized their apparent spread in Germany, Austria, and the
Netherlands. D'Amota's letters cited provisions of the Austrain and
German criminal codes that forbid inciting racial hatred.

Word of the games has circulated for several years, but reports in
the Austrain media indicate they are becoming more widespread, said
Rabbi Abraham Cooper, the center's associate dean.

In a translated copy of the telegram, Kohl told D'Amato that he is
disgusted by the games but indicated that the problem has already
passed.

"As far as can be ascertained, these products have not appeard
since early 1990," Kohl said. "Before that, some of these evil items
had emerged, but they were not sold over the counter in normal
stores."

He said that the games were confiscated when found but that the
manufactuer has not been identified.

--------------------------------------------------------------------------------

--=] National Security Anarchists [=--
--=] Volume 1, Issue 1 [=--
--=] Presents [=--
--=] World News [=--

"'Cracker' Speaks Out"
Written by:
UNIX Today!


New York--A man identifying himself as as one of the Dutch crackers
who was filmed breaking into U.S. computers by Dutch television said
last week he found the break-ins to be easy to do. He also said he
doesn't believe he did anything wrong. "A guest account is a guest
account. I considered myself a guest on the system," said a man who
identified himself only as "Hank." Last Wednesday, Hank, who said he
was 24 years old, gave a telephone interview to Emmanuel Goldstein,
editor of the cracker journal 2600. The interview aired on
Goldstein's radio program "Off the Hook," on WBAI-FM, a publicly
funded New York alternative radio station.

There was no conclusive evidence to indicate whether Hank was
genuine, though some details he gave matched those given out by
victims of the Dutch crackers and by people with contacts in the
cracker community. Hank spoke English with a slight accent.

He would not discuss specifics of sites broken into, how he got in
or what he found once he was there.

Hank said the cracking is its own reward, and when he's logged
into a system, he's interested only in the system itself, not the
data on it. One radio caller asked whether he'd ever gained access
to politicaly interesting information. "When i get onto a system,
I'm not interested in the stuff there," he said. "I'm not
interested in going throught love letters or anything else."

He said if he had access to classified information---something
authorities say he did not have--it's the user's fault. "I think
it's pretty stupid to put classified data on a public network," he
said.

Hank said he believes computer laws will not control cracking. "I
think it's not a solution to prohibit hacking, because the people
will go underground," he said.

Hank said he has been cracking about three years, and specializes
in breaking into Unix systems.

At first, he contacted systems administrators of systems he
cracked to alert them to problems. Some of them seemed to want to
use the information to correct the problem, but many seemed more
interested in hunting him down, he said. And those were the ones
most likely to leave security holes uncorrected, he added.

He said he searched for default log-ins that were shipped with
systems by the manufacturer, and often not changed by users.
Goldstein would not comment on how he got in touch with Hank. "I run
a hacking publication, and there's one in Holland," he said. He said
he believes Hank to be authentic. "Holland isn't that big a place.
Everybody knows what everybody else is doing.

-------------------------------------------------------------------------------

--=] National Security Anarchists [=--
--=] Volume 1, Issue 1 [=--
--=] Presents [=--
--=] Teleco Briefs [=--

These are brief bits of Teleco information. You may say so fucking what,
let's learn how to hack this and that. Well go ahead and do that, you won't
get anywhere. Well unless you take the time to realize the dangers that
Ma Bell is doing to stop us.

-------------------------------------------------------------------------------

------------------------------------
Teleos Acquires Vadis Technology
------------------------------------

Teleos Communicaitons, Inc., the leading manufacturer of PC-based terminal
adapters (PC TA) for ISDN connectivity, has purchased the technology of
Vadis, Inc. of Richardson, Texas. The agreement includes a complete
technology transfer of Vadis' Microchannel PC TA architecture. Teleos' own
PC TA product, the B101PC, is an IBM PC XT/AT-compatible adapter. The
acquistion will stregthen Teleos' leading market position and will enable
Teleos to broaden its offerings in the low end ofthe PC TA marketplace.



--------------------------------------------------
ISDN Products to Reach Eastern European Market
--------------------------------------------------

Teleos has appointed Internet its exclusive distributor in Hungary to
market the full line of Teleos ISDN customer premises equipment products in
that country. Teleos intend to provide global corporate networking solutions
to multinational companies by leveraging the public switched environment,
such as ISDN. In 1990, Teles demonstrated internation ISDN links with Japan
and France. Internet is Teleos' first European distributor.



-------------------------------------
Teleos Leasing Corporation Formed
-------------------------------------

Users of the emerging ISDN now have the opportunity to finance ISDN Access
Server Systems supplied yb Teleos Communications, Inc., through Teleos
leasing Cororation (TLC), a joint venture captive finace company recently
formed by Teleos and Communication Financial Corporation (CFC). Teleos and
CFC are the sole shareholders of Teleos Leasing Corporation. CFC will
provide funding and management services for TLC, which operates as a Teleos
affiliate and CFC subsidiary.

-------------------------------------------------------------------------------

National Security Anarchists
"Plagurism is the Basis of Creativity"

## ## ###### ######
### ## ## ## ##
###### ###### ######
## ### ## ## ##
## ## ###### ## ##

-------------------------------------------------------------------------------
National Security Anarchists
"Plagurism is the Basis of Creativity"
All Rights Reserved
Any modifications to this text file is a violation of copyright
- (c) 1991 -
--------------------------------------------------------------------------------
Downloaded From P-80 Systems 304-744-2253

Downloaded From P-80 International Information Systems 304-744-2253 12yrs+

next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT