Copy Link
Add to Bookmark
Report

The Syndicate Report Issue 21

eZine's profile picture
Published in 
The Syndicate Report
 · 26 Apr 2019

  

_______________________________________________________________________
_______________________________________________________________________


THE SYNDICATE REPORT

Information Transmittal No. 21
(Part 1 of 2)

Released March 2, 1989
Featuring:

Editor's Note
"PCP Hacking Statistics"

AT&T Works on Making Unix Less Vulnerable
MCI Mail Rates and Info Change

AT&T Bellcore & Tiniest Semiconductors Ever

Common Unix Passwords

Briefs notes from The Report

Vocabulary Tonic

by The Sensei
Editor Syndicate Report Magazine

_______________________________________________________________________
_______________________________________________________________________

EXPOSITION: TSR

Once again, The Report accepts outside sources. Anybody can
write/provide information to The Syndicate Report.
Articles/Information may be provided through RADIO WAVES Bulletin Board
System 612-471-0060. Any info such as Busts, Phreaking, Hacking, Data /
Telecommunications, and new developments on any the previous mentioned
specialties will be: accepted, labeled, and given full actual credit to
the article/info provider(s), or writer(s). --

** All articles have been presented by me unless shown at the end of
the article as the information provider(s), or writer(s). **

_______________________________________________________________________
_______________________________________________________________________

EDITOR'S NOTE: TSR

" PC PURSUIT HACKING STATISTICS "

PCP password hackers are welcome tools for virtually all types of
users: Phreaks, Pirates, Terrorists, system Hackers, etc. PCP has
become the perfect way to dial long distance with low error ratios,
flexibility with ID codes/passwords used on other networks and most
importantly, safety. Telenet is because of the huge number of calls
that are handled every day by the big networks, keeping track of where
every call and connection is made from is financially impractical. It
is also very easy to disguise your location using the network, which
makes dial LD even more secure.

As time and technology interface, code abusing slowly becomes past-time
reminiscence for busted hackers. In response, PCP becomes the only
resource for paranoid hackers, alike. Along these lines of paranoia,
the need for PCP password hackers increases.

After all the years that PCP has existed, I've only seen 5 PCP password
hackers. And of the 5 hackers, 3 of these devices were totally
useless for obvious reasons, upon execution...

Some of the obvious
problems indicated : No online modem configuring.

Incomplete documention & Technical Information.
These apply to the anti-user friendly hacks.

Inaccurate response detecting positive completion
of passwords.

Ineffective random variable password generating.

...and with all beta programs -- minor bugs.

With this in mind, I'd like to add some PCP Statistics. PCP ID's and
Passwords are not easy to get. Format area: PCP12345 and ABCD6789.

The first thing a hacker considers when using a hacker is, what? PCP
ID to use. Most are between 10,000 and 40,000. I have never seen an
ID over 40,000. PCP doesn't disclose annual PCP profits, nor the number
of subscribers they currently have. Although the number by many
hackers is approximated around 5,000 to 6,000. Keep in mind that
businesses use PCP accounts too, in case your criticizing that you've
never seen 5,500 subscribing hackers. Therefore, the change of gaining
a valid ID are significantly good.

Of course, the PCP IDs do not bug hackers. The complexed password
scheme is the brain parasite. First there is the 4 random letters,
then the 4 random numbers - joined. In essence, what a hacker is
dealing with is 2 passwords beyond 1. The LETTERS, and the NUMBERS
must match up - not the entire string as a whole since the letters stop
after 4, then take on an entire new syntax.

I've seen some passwords that had numbers in the letter positions, and
vise verse for the letters. Majority however stay in the above listed
format.

If interested in a PC Pursuit password hacker, consider using Phry Code
Pro., by The Exciter / 612. Latest version can be found on RADIO
WAVES.

;The Sensei / Editor TSR
_______________________________________________________________________
_______________________________________________________________________

AT&T WORKS ON MAKING UNIX LESS VULNERABLE: TSR (iw 2\11)

Enhanced security features are being developed for Unix System V.4.1.
AT&T's vice president stated. His keynotes to the Usenix Tech.
Conference in California insisted that open, multivendor networks are
not centrally more susceptible to security violations than proprietary
systems.

Security is on the mind of every Unix user, particularly when
Unix-based systems are to be used for mission-critical and strategic
applications, like running a high end workstation.

The new version, on Unix, will achieve the National Security Agency's
B2 level of security, and will actually also have some features of the
B3 level as well. Powerful security tools exist in the current version
of Unix V, but have often gone unused by administrators because of a
lack of quality documentation and training. AT&T will also be adding
surreal security features to System V.4.1., the first revision of the
sill unreleased system V.4.0. Procrastination seems to be top priority
for many software vendors - just look at Lotus. Well, Unix won't be
very welcome for the Hacking Community, and myself. The
features/improvements include:

Access methodology beef up
Maintenance of Data Integrity
The denial of service
Hacker/Intruder/Terrorist containments
...and the execution of the "superuser" status.

About the "superuser" chop. This is the most popular status,
especially for hackers, and AT&T takes it out. It did more good than
bad in the long run. In its place will be a finer distinction in
status. There will be a status of "superuser" that is only used for
mounting the systems. That user will not be able to access other
"superuser" privileges.

Control of the front end of system access - password security - will be
enhanced by the use of "shadow" password files. The files containing
the password (etc/passwd) have been far to easy to access. So,
restricted access to files, along with a form of activity audit, which
will be used in System V.4.1. Actually, the greater sense within the
system, including user and group IDs, aging information, and a command
and log-in audit.

Editor's suggestions:

Keeping systems resources in locked rooms/shells, to prevent shaking of
the shielding of shells/rooms, which can reveal information to external
devices. AT&T should also use a dedicated printing resource to each
high level of security - a printer on each label page? Well, that
would code a lot of money, but LD services do it all the time, along
with personal supervision. Then theres Fiber-Optics, and the security
advantage there. As printed in THE SYNDICATE REPORT #20 (part 2),
where an article explains the procedures in Tapping Fiber Optic cables.
Then again, it's hard to break into a FO cable without bringing the
system down, with a nice alarm response.

:::::::::::: Information written by The Sensei (TSR Editor) :::::::::::
_______________________________________________________________________
_______________________________________________________________________


MCI MAIL RATES AND INFO CHANGE: TSR (u.t 2\15)

Beginning early February 1989 MCI Mail will LOWER the cost of Instant
Messages and domestic Fax Dispatch. In addition, we will offer FREE
800 Access, FREE Advanced Service and FREE Shared Lists. MCI's new
retail prices are as follows:

:: Instant Messages ::

0-500 Characters $ .45
501-2500 Characters $ .75
2501-7500 Characters $1.00
Each Additional 7500 Characters $1.00

:: Domestic Fax Dispatch ::

First Half Page $ .50
Each Additional Half Page $ .30

:: Access ::

800 Access No Charge
U.S. tymnet Access $ .25/ Per Minute
International tymnet Access $ .30/ Per Minute

:: MCI Mail's new 800 numbers will be ::

Access Speed 800 Telephone Number

300, 1200 bps...........................800-234-MAIL
2400 bps............................... 800-456-MAIL
Lotus Express & Desktop Express.........800-825-1515
(up to 2400 bps)

_______________________________________________________________________
_______________________________________________________________________

AT&T BELLCORE & TINIEST SEMICONDUCTORS EVER: TSR (b.w 2\27)

As the transistors on computer chips steadily shrivel away toward
nothingness, scientists are faced with a task much like figuring out
how many atoms can dance on the head of a pin. Researchers as AT&T
Bell Laboratories are closing in. They have devised a method of
producing the tiniest semiconductor crystals ever: clusters containing
as few as 100 atoms. They are so far too tiny to 'print' with even the
wispiest microcircuit. Still, they may have practical applications.

That's because a young polymer chemist, has developed a way to keep the
clusters from combining into larger clumps, as they otherwise would
do. He grows each microcrystal inside a minuscule water droplet a
thousand times smaller than the diameter of a human hair, then replaces
the water with organic molecules. "It's like putting the cluster in a
little plastic bad," he says. The clusters can be 'tuned' for specific
jobs because they absorb different wavelengths of light as they
decrease in size. So they could be used for optical switches in future
"optoelectronic" chips.
_______________________________________________________________________
_______________________________________________________________________

COMMON UNIX PASSWORDS: TSR (p.p 2\21)

The subsequent list of words are a list of commonly used passwords,
use on Unix computer systems. The list also contains syntax from the
illustrious UNIX Internet Worm on November, 1988. Combine them into a
favorable Unix Hacker.

_____________________________________________________________

:::::::::::::::::::::::::::: Unix Passwords :::::::::::::::::::::::::::
_____________________________________________________________

aaa daniel jester rascal
academia danny johnny really
ada dave joseph rebecca
adrian deb joshua remote
aerobics debbie judith rick
airplane deborah juggle reagan
albany december julia robot
albatross desperate kathleen robotics
albert develop kermit rolex
alex diet kernel ronald
alexander digital knight rosebud
algebra discovery lambda rosemary
alias disney larry roses
alpha dog lazarus ruben
alphabet drought lee rules
ama duncan leroy ruth
amy easy lewis sal
analog eatme light saxon
anchor edges lisa scheme
andy erenity angerine scott
arrow elizabeth maggot sex
arthur ellen magic shark
asshole emerald malcolm sharon
athena engine mark shit
atmosphere engineer markus shiva
bacchus enterprise marty shuttle
badass enzyme marvin simon
bailey euclid master simple
banana evelyn maurice singer
bandit extension merlin single
banks fairway mets smile
bass felicia michael smiles
batman fender michelle smooch
beauty fermat mike smother
beaver finite minimum snatch
beethoven flower minsky snoopy
beloved foolproof mogul soap
benz football moose socrates
beowulf format mozart spit
berkeley forsythe nancy spring
berlin fourier napoleon subway
beta fred network success
beverly friend newton summer
bumbling george osiris tape
cardinal gertrude outlaw target
carmen gibson oxford taylor
carolina ginger pacific telephone
caroline gnu painless temptation
castle golf pam tiger
cat golfer paper toggle
celtics gorgeous password tomato
change graham pat toyota
charles gryphon patricia trivial
charming guest penguin unhappy
charon guitar pete unicorn
chester hacker peter unknown
cigar harmony philip urchin
classic harold phoenix utility
coffee harvey pierre vicky
coke heinlein pizza virginia
collins hello plover warren
comrade help polynomial water
computer herbert praise weenie
condo honey prelude whatnot
condom horse prince whitney
cookie imperial protect will
cooper include pumpkin william
create ingres puppet willie
creation innocuous rabbit winston
_____________________________________________________________

Paean : The Merc V.4.1. passwd!locator
Shooting Shark Gfiles : Unix hacker
The Mentor LOD/H : Pheonix Project 512-441-3088
TSR Dedicated Field users

::::::::::::::::::: Information provided Multiformly ::::::::::::::::::
_______________________________________________________________________
_______________________________________________________________________
::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES:::::::::::::::::::::

// Bell 900 Battles //

AT&T, MCI and US Sprint are arming themselves for a new round of
competition in interactive 900-call services, according to TSR sources.
AT&T has been hoping for FCC approval of its interactive 900 tariff.
MCI has been testing and plans to offer a 900 service next month. And
US Sprint plans to begin customer testing of its service in April '89.

:::::::::::: Information provided by MPhone / 203 :::::::::::
_____________________________________________________________

// NSA Chooses Its Security //

The National Security Agency has chosen the AT&T security code
algorithm called Code Excited Linear Predicted. NSA will propose the
algorithm be adopted as a government-wide standard. Production is
shared by AT&T, Motorola and GE RCA. The algorithm is a 4,800
bits-per-second coder that checks speech patterns.
_______________________________________________________________________
_______________________________________________________________________

::::::::::::::::::::::::: TSR Vocabulary Tonic ::::::::::::::::::::::::

What "Vocab. Tonic" is, is a list of acronyms and definitions to help
education the ignorant hacker. With an extensive vocabulary, there is
virtually nothing one can't learn. Study on...

DS - Digital Switch. A switch in which connections are established by
operations on digital signals without conversion to analog.

DSX - A digital cross connect field which can be utilized for DS1
(Digital Switch), DS2 or DS3 level cross connections at a digital level

RPOA - Registered Private Op. Agencies (ID of online system).

SCC - (or SCCS), Switch Control Center. SCC has overall
responsibility for the administration and maintenance of BOC Central
Offices. Responsibilities include installation and maintenance Control
Office for FG B, C, and D. SCC also handles specific trouble reports.

TAMS - System where NUIs are checked by a central database when you
try to connect to an address, on GTE Telenet.

TD - Terminating Direction. The use of Access Service for the
completion of a call from an IC (Interexchange Carrier) location to an
end user.
_______________________________________________________________________
_______________________________________________________________________

:::::::::::::::::::::::: TSR "Quote of the Month" :::::::::::::::::::::

"They [Hackers] have this need to find the answer."

To subscribe to the 2600 Magazine send 15$ to:
2600 Magazine
P.O. BOX 752
Middle Island N.Y. 11953

Corley, Editor 2600 Magazine
_______________________________________________________________________
_______________________________________________________________________

TSR will accept additional sponsor/support Systems. If you have a
certain interest in the Report, and wish to provide support to TSR --
Leave your BBS number -- and any other information on RADIO WAVES
Bulletin Board Systems.
_______________________________________________________________________
_______________________________________________________________________

Pheonix Proj. LODH :: 512-441-3088 ----- Lunatic Labs :: 415-278-7421
At Login: Any UNIX Default PW P/H System

HackersDen 2600 #5 :: 612-522-3959 ----- Hack Shack @ :: 214-422-4307
P/H-Files BBS Login: Any UNIX Default Pass

RADIO WAVES System :: 612-471-0060
- Syndicate Report Support BBS -
_______________________________________________________________________
_______________________________________________________________________

This concludes this Transmittal No. 21
(Part 1 of 2)

Released March 2nd, 1989

by The Sensei
Editor of The Syndicate Report

_______________________________________________________________________
_______________________________________________________________________

_______________________________________________________________________
_______________________________________________________________________



THE SYNDICATE REPORT

Information Transmittal No. 21
(Part 2 of 2)

Released March 2, 1989
Featuring:

Editor's Note

"Cyberpunks" Vs. The Media



Telecommunications Events, Conferences, Seminars, and Shows

Software Links Unix System to Atomic Clock

Briefs notes from The Report
" Hackers Fail Raiding ATMs "

by The Sensei
Editor Syndicate Report Magazine

_______________________________________________________________________
_______________________________________________________________________

EXPOSITION: TSR

Once again, The Report accepts outside sources. Anybody can
write/provide information to The Syndicate Report.
Articles/Information may be provided through RADIO WAVES Bulletin Board
System 612-471-0060. Any info such as Busts, Phreaking, Hacking, Data /
Telecommunications, and new developments on any the previous mentioned
specialties will be: accepted, labeled, and given full actual credit to
the article/info provider(s), or writer(s). --

Special Editor, TS, comments are placed between brackets.
Example: [ Hi. ]

** All articles have been presented by me unless shown at the end of
the article as the information provider(s), or writer(s). **
_______________________________________________________________________
_______________________________________________________________________

EDITOR'S NOTE: TSR

Just a quick note. Just in case many of you don't know...I distribute
an introduction package at least 3 days every month before actually
releasing The Syndicate Report. These can be found on the systems
listed at the end of this part of TSR.

;The Sensei / TSR!612
_______________________________________________________________________
_______________________________________________________________________

"CYBERPUNKS" VS. THE MEDIA: TSR (s.t 2\27)

The following article can from a newspaper local to myself. The
newspaper is the "Star and Tribune." I, The Sensei, usually don't
print up verbatim copies of articles, but this articles was very
interesting and entertaining.

Some of the information presented in insulting to most Hackers/Phreaks,
etc., so I'm going to comment on parts of the article. Comments will
be in designated brackets, like this: [ Blah, Blah...Har Har -TS ]

_____________________________________________________________

Silicon Valley -- A local Cop patrolling after midnight witnessed an
unusual sight, even for this center of high technology: Two teenagers
wedged in a phone booth, laboring over the keyboard of a laptop
computer clipped into the telephone line.

[ This is very humorous for me...I can't help wondering what technique
these guys are using to access Bell Fone's, heh. ]

The youths, who were arrested for telephone fraud and computer abuse,
belong to a shadowy culture of computer vandals committed to illegally
entering and frequently tampering with the computer networks on which
society has come to rely.

Those in this expanding underground -- known as CYBERPUNKS to
themselves and some social scientists -- have broken into corporate and
military computers and tampered with telephone billing switching
equipment, sometimes altering services and monitoring telephone lines.
Some have boasted of illicitly entering computer used in stock-market
trading.

[ First of all, I protest to the term, "Cyberpunks." No hacker I know
of as called themselves Cyberpunks. If anyone reading this does, your
probably not a considered a hacker by most. Second, Social Scientists
don't know anything about hackers -- they're just another worthless
clan of scientists trying to shape society as they wish. ]

[ The newspaper then goes on to refresh our memories about the Morris
Jr. Unix WORM, haven't we heard enough about his guy. And it was a
really complicated set of code he set for his so-called CSci Project. ]

Articles describing how to write viruses have appeared in several
publications that are widely circulated within the underground.
Writing in the journal 2600, which says it speaks for the computer
underground, an author using the pseudonym "The Plague" described how
to create a virus.

"If people's data is destroyed, then so be it," he wrote. "If people
are stupid enough to accept pirated software, then they deserve to be
punished," says Plague.

[ Well, The Plague has it all wrong. Viruses are not ONLY in pirated
software, my friend, they creep within all types of programs. Your
just adding to the problem. It's goes against 'Hacker Ethics,' but the
information should not to suppressed from the hacking community. ]

The term CYBERPUNK is a reference to a popular science fiction genre
that deals with an intersecting world of high technology and outlaw
society. "This is the case of art driving reality," said one Social
Scientist at the Institute for the Future, Calif. "You have a small
group who is actually going it, and a large pool that is buying into
what they are doing and redefining reality."

[ Yet another scientist from a corrupt institution, making conclusions
based on a small fraction of neo-hackers. ]

Cyberpunks often are called HACKERS, but computer scientists are
careful to note that not all hackers are malicious. The term
originally referred to researchers who were committed to designing
advanced computer hardware and software.

[ This is the first decent statement I've read. ]

Another often-heard term is "PHREAKING," which is the illegal use of
telephone systems.

"Phreaking is moral," said an 18 year-old hacker who calls himself,
"Frank Drake" in messages on the bulletin boards. "There is no theft
involved. It's not theft of services, because this equipment would
otherwise be idle."

[ It's about time these Media-Types informed the public of my favorite
hobby, Phreaking. And about the definition Frank Drake gave.
"Illegal use of Fone System." ? Sorry, not all of the uses by phreaks
is illegal. More than anything, phreaking is basically composed of
"Learning about the Bell system, along with illegal use." ]

Computer experts working in the industry who have become involved with
malicious hackers see them as computer addicts possessed by an
antisocial obsession. "They're misfits, losers or troubled individuals
lacking a sense of duty or morals," said a computer researcher at a
Silicon Valley institution.

[ Misfits? Losers? Antisocial individuals? This is another scientist
shooting his mouth off with little support. The idea of hackers being
social outcasts, or losers is a common misconception by many. Most
malicious computer hackers are party animals when given the right
conditions. And if one was told he is labeled an, "Outcast, Loser
etc.", the person talking would get an entire new face of the word
MALICIOUS. Namely a 99e99 dollar fone bill, credit check and
unchecked, and maybe a subscription to every magazine on the face of
the Earth. ]

In recent years this researcher has offered four underground hackers
programming jobs to try to channel their energy away from destructive
use of computers. In each case the experiment ended in failure, the
scientists said.

The researcher asked not to be indentified, and his reason is
revealing. He fears that the CYBERPUNKS/Hackers are so skilled at
tampering with computers that they might be able to alter his credit
rating or have his electricity turned off.

[ Oh my. Will these guys never learn? Hackers are not stupid "Lab
Rats." They want a challenge, away from sitting at a computer
programming for another person. And this scientist is concluding his
entire experiment on just a few hackers. Yes, his fear of hackers is
valid. I am now thinking of ways to find out who this guy might be.
The credit rating would be no problem, same with the electricity. A
scientist without electricity, is like a hacker without Telenet. ]

"Every single one of them had deep psychological problems," he said.
Some members of the hacker underground appear to agree with this
psychological assessment.

[ Hah! No comment...for obvious reasons. ]

"They have this crazed need to find the answer," said Eric Corley, edit
of 2600 Magazine.

Corley, whose personal hacking resulted in three brushed with the law
before he started the publication in 1984, said: "They keep exploring
where they know they shouldn't go. A true hacker won't stop just
because he gets in trouble."

[ Corley is totally correct here, of course. But I think some hackers
don't stop hacking, because some are just over powered with the need to
learn. I never stopped hacking after by bust for many reasons. I the
primary reason was because I'm not a quitter, and I looked back on how
much had I learned. With the learning, fun followed. ]

Although computer experts believe the number of outlaw hackers is
growing, the behavior they exhibit is not new to the high-tech world.
For example, a computer programmer, John Draper, spent six months in
jail during the 1970s for illegal use of the telephone network.

Draper's nickname, "Captain Crunch," derived from his discovery that a
whistle that came as a prize in a cereal box was tuned to the correct
frequency to unlawfully manipulate fone company switch gear.

[ Hmmm. Every hacker knows all this already. At least a true hacker
should know his/her past. But the thing I can't help wondering is,
what was Captain Crunch doing with a whistle from the "Captain Crunch
cereal" box? And why was he blowing it into the fone. Makes me laugh
if you think about it. Another thing, anyone with two front teeth can
blow a 2600 Hz tone whistle. ]

;The Sensei / TSR!612
_______________________________________________________________________
_______________________________________________________________________

BUSTING TELEPHONE SOLICITORS: TSR (st.cit 2\27)

Join to fight telephone solicitors! How you ask? Read on...

:::: Illustration, Exampling ::::

"Have you ever off and had a fantasy of going to the library and
finding out who owns the companies that call YOU, interrupt you, and
calling THEM back? It makes you happy for a while. Particularly when
working 11 to 7 shift, you'd think of the companies that had awoken you
(using YOUR private fone) at noon."

"One nurse I know did something like that to a persistent insurance
salesman. One day she got awake and alert enough to get his name and
number and promised to call back. She did. At 2 AM, announcing that
it was HER working day, and she was now awake and would like to discuss
the policy....He never called her back." -TS

:::: Tips Offs to a Fone Scam ::::

If it sounds too good to be true, it's probably a scam. Some of the
most popular promotions among telephone con artists include prize
offers to get you to buy water purifiers or vitamins, magazine
subscriptions, PENNY STOCKS, precious metals, travel and cellular
telephone lottery applications.

Be skeptical of says such as, "This is the best deal you'll ever
find," or "Double your money, no risk!"

The government, Federal Trade Commission estimates that Americans lose
1$ billion a year from the deceptive peddling of goods and services
over the fone. Other organizations say it's much higher. One might
suggest lobbying for stricter FED laws governing 'telemarketing
businesses.'

:::: Striking Back at 'The Solicitor' ::::

o Do NOT hang up on telephone solicitors. This just allows them to
make another call 200 milliseconds later. Listen to them. Ask
stupid questions. Drag out conversation. Contemplate placing an
order, then don't. Or start to place an order, then change your
mind.

o Try wasting their time as much as possible, cackle insanely and
hang up. Or give them the raspberry and yell, "Only
f00ling!121!!&!"

o Remember always, that these twits are partially paid on commission.
The more of their time you waste, the less they are gonna earn.
Eventually they may quit, and if we're persistent enough, maybe
someday nobody will WANT to work for these cretins.

o Why not add "May I speak to your supervisor?" for no good reason...

o "Just a sec., I'll get my wife, she's really interested in this
sort of thing..." and leave the phone on the table for 10
minutes...

o Blow him some nice tones. 1000 Hz is nice.

o If it's a girl, start to BS with her. Ask her out. Even better,
make like to you who she is, and your going to strange things to
her body. 90% are ugly college chics, so you might not be able to
hang up on one with this approach. Use your own judgement.

o Turn the bell off on the phone, and hook up an answering machine,
and sleep, sleep.

:::: Ethics one should abide by ::::

o Don't go after the lower echelons of the company by terrorizing the
telemarketer. They have no effect on the company. All you do is
ruin somebody else's night. With few exceptions, he is just as
unhappy about bothering you as you are about being interrupted.

o Lash back at the company, not the peon. He's paid to do that. 4
out of 5 people wouldn't do that unless they were paid.

:::: REMEMBER ::::

The organizing principal of modern society is, "The only people in
contact with the public are the ones with no authority". Keeps we,
the people, fighting with each other while leaving the Bosses free to
play power games with lives.

:::::::::::: Information written by The Sensei / TSR Editor :::::::::::
_______________________________________________________________________
_______________________________________________________________________

TELCOMMUNICATIONS EVENTS, TSR (c.c 2\28)
CONFERENCES, SEMINARS, and SHOWS:

This is a list of meetins and show in the up coming month. I'm
providing this list for you and your friends to rob, cheat, and
swindle the angered companies that participate in there events. You
are likely to find your dreams come true in telephone accessories and
other wonderful equipment. Many things will be on show, so take items
as you please. There could be butt sets, testing equipment, and other
stuff at your disposal. Remember, their parking lots are usually
filled with BELL trucks, just waiting for you to clean them out.

________________________________________

Mar. 3-4
Exchange Carriers of Utah St. George, UT
Holiday Inn Phone: 801-298-4242

Mar. 6-8
Voice '89 Santa Clara, CA
Convention Center Phone: 713-974-6637

Mar. 6-10
MFOC '89 Washington, DC
Hyatt Crystal City Phone: 800-323-1088

Mar. 7-9
REA Telecomm. Eng. & Mgmt. Seminar Minneapolis, MN
Marriott City Center Phone: 202-382-8663

Mar. 8-15
Hannover Fair CeBit '89 Hannover, West Germany
Hannover Fairgrounds Phone: 609-987-1202

Mar. 12-15
Minnesota Telephone Bloomington, MN
Radisson South Hotel Phone: 612-291-7311

Mar. 13-16
Interface '89 New York City, NY
Javits Conention Center Phone: 617-449-6600

Mar. 14-17
Carolina-Virginias Spring Mtg. Releigh, NC
Marriot Hotel Phone: 919-592-5751

Mar. 15-16
InterCom '89 Miami, FL
Hyatt Regency Hotel Phone: 305-446-5150

Mar. 19-22
South Carolina Telephone Charleston, SC
Omni Hotel Phone: 803-722-4900

Mar. 19-22
Entelec '89 New Orleans, LA
Louisiana Superdome Phone: 504-561-4530

Mar. 28-30
TBT West '89 Long Beach, CA
Long Beach Convention Ctr. Phone: 800-243-6002

Mar. 29-Apr. 1
Communications Indonesia Jakarta, Indonesia
Jakarta Fairgrounds Phone: 301-656-2942

Well all that's all for this month. For more, read up coming Reports!

::::::::::::::::::::::::: Seymour Lecker / TWA :::::::::::::::::::::::
_______________________________________________________________________
_______________________________________________________________________

SOFTWARE LINKS UNIX SYSTEM TO ATOMIC CLOCK: TSR (i.w 2\28)

Precision Standard Time Inc. recently placed in the public domain
software that synchronizes nodes on a Unix TCP/IP network to the
atomic clock that U.S. Government uses to keep official time.

On Unix networks, a number of time-sensitive applications require
careful synchronization, both between network elements and in relation
to an absolute time standard.

Now inconsistencies need not occur. The software continually
synchronizes nodes on a network to within 100 milliseconds on the
atomic clock at the National Institute for Standards and Technology.

US NO 202-653-0351.

The software consists of University of Maryland's Time Demon, "ntpd,"
which implements the Network Time Protocol and synchronizes the host
computer to Coordinated Universal Time, the international time
standard. The software can be operated with or without a Time Source
radio receiver sold by Precision ST. Without an external time
standard, however, no provision exists to correct inaccuracies caused
by the drift of computer calendar clocks or by errors introduced in
manual clock setting.

_______________________________________________________________________
_______________________________________________________________________

::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES:::::::::::::::::::::

// Callers Must be Told the Cost //

The FCC yesterday ordered 5 companies that charge customers 20% to 80%
more than AT&T, MCI or Sprint to toe the line. The alternative
operators must now tell callers how much the call will cost and which
company is placing it before it goes through. The high rates usually
are placed on hotel, airport or hospital phones.

:: UPDATE ::

As stated above, alternative long-distance operators must: Put a
sticker on the phone with price information or tell the caller the
price verbally; give callers an chance to hang up without any charge;
offer callers a chance to go through AT&T or another phone service.
Right now many alternative operators stop you from using another
carrier.
_____________________________________________________________

// Bell Goes To College //

Bell Atlanticom Systems said yesterday it has signed a contract with
the College of William and Mary in Williamsburg, Va., for a fully
integrated voice and data communications system. The campus-wide system
will provide resale of communications services to students, a
management system, and a universal wiring plan to provide voice and
data transmission.

The communications system obtained by the College of William and Mary
yesterday will provide 300 trunks, 3,800 faculty and student lines, 150
voice/data faculty users and 1,050 host data ports. It includes more
than 5,000 inside wiring runs and several miles of fiber optics. Also
included: A 1,000- user Aspen Voice Mail System and the Alex-IS
Telecommunications Management System.
_____________________________________________________________

// Hackers Fail Raiding ATMs // TSR

If authorities hadn't been tipped, a computer hackers could have
cracked one cash-machine network of more than 14$ million over a single
weekend, of Feb. 18. Charged in the plot were GTE Corp. consultant
Mark Koenig, and 4 other hackers. Federal Agents said the hackers
pulled the personal ATM codes from GTE telephone lines. The lines
transmit transactions from account at Bank of America and thousands of
other banks linked to the Plus System, a national network of shared
ATMs.

The Hackers put the data in magnetic strips on 5,500 pieces of card
board. They planned to use the bogus cards to make withdrawals around
the country. If it were not for a "TIPOFF", authorities wouldn't have
known what hit them.

[ Now this is a sad story. These -hackers- have a chance to break 14
MILLION in tax-free cash, and they blow it. I bet one of them bragged
about it to a girl friend. That's the only way computer hackers get
caught...they have to see some limelight. ] --TS

::::::::: Information provided by John "Scij" / 612 :::::::::
_____________________________________________________________

// Speaking of ATM Heists... //

Recently, a crook used a Security Pacific National Bank ATM master
card, which tapped into virtually all accounts. The heist resulted in
a 237,000$ win for the hacker. The bank reimbursed depositors but
still have not found the culprit. Alarmed by the incident, the
American Bankers Assoc. plans to urge its 13,500 members to strictly
limit access to ATM master cards and personal indentification codes.

_______________________________________________________________________
_______________________________________________________________________

:::::::::::::::::::::::: TSR "Quote of the Month" :::::::::::::::::::::

"They [Hackers] have this need to find the answer."

To subscribe to the 2600 Magazine send 15$ to:
2600 Magazine
P.O. BOX 752
Middle Island N.Y. 11953

--Corley, Editor 2600 Magazine
_______________________________________________________________________
_______________________________________________________________________

TSR will accept additional sponsor/support Systems. If you have a
certain interest in the Report, and wish to provide support to TSR --
Leave your BBS number -- and any other information on RADIO WAVES
Bulletin Board Systems.

_______________________________________________________________________
_______________________________________________________________________

Pheonix Proj. LODH :: 512-441-3088 ----- Lunatic Labs :: 415-278-7421
At Login: Any UNIX Default PW P/H System

Tiamats Temple Pvt :: 612-731-0296 ----- Hack Shack @ :: 214-422-4307
P/H-Files BBS Login: Any UNIX Default Pass

RADIO WAVES System :: 612-471-0060
- Syndicate Report Support BBS -
_______________________________________________________________________
_______________________________________________________________________

This concludes this Transmittal No. 21
(Part 2 of 2)

Released March 2nd, 1989

by The Sensei
Editor of The Syndicate Report

_______________________________________________________________________
_______________________________________________________________________

-= EOF =-


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT