Copy Link
Add to Bookmark
Report

The Havoc Technical Journal 12

  

ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸
³The HAVOC Technical Journal - http://www.thtj.com - ³±
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ±
±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±±

Vol. 1 | No.12 | July 1st, 1997 | A HAVOC Bell Systems Publication

<AnonymousLammah> wHuTz UnIx? iS tHeRe A vErSiOn fOr wInDoWz 95?
_____________________________________________________________________________

-[The HAVOC Technical Journal Issue 12]-
Editorial..............................Scud-O
Bringing Back The Old School...........Revelation
Basic Crypto...........................Scud-O
Meridian Mail..........................grinchz
Breaking into BCTel vans & Get Away....eclipse
Nokia Cellular Programming Info........Keystroke
Little Crypting System.................memor [HBS]
A Story................................discore
Slacking and not getting caught........SpookyOne
Phreaking for some europeans...........memor [HBS]
[ C Tutorials: Introduction to C ].....Fucking Hostile
Oddville, THTJ.........................Scud-O
The News...............................KungFuFox
Phonecalls.............................THTJ
Logs...................................THTJ

-------------------------------------------------

[ thtj.com has arrived! ]
Ok, after the closing of antionline, i decided that it was time to
move up and get out own domain name. I am still formulating the site, and we
are still waiting for the Majordomo for subscribers to use to get thtj setup,
but by next month, subscribe@thtj.com should be up. Now i just need to set up
a CGI and a form for the webpage.

[ A Note for HBS members ]
Ok, since the majordomo is not up, and we are never all on IRC, and
im busy as shit working, you all need to e-mail me at scud@thtj.com and tell
me what you want for an e-mail at thtj.com . also tell me if you need web
space on thtj.com.
_____________________________________________________________

The HAVOC Technical Journal - Information
- Editor in Chief : Scud-O, scud@thtj.com
- Assitant Editor : KungFuFox, mazer@cycat.com
- Submissions Editor: Keystroke, keystroke@thepentagon.com
- THTJ email address: thtj@thtj.com
- THTJ website: http://www.thtj.com
- THTJ mailing address: PO BOX 448 Sykesville, MD 21784

The HAVOC Technical Journal Vol. 1, No.12, July 1st, 1997.
A HAVOC Bell Systems Publication. Contents Copyright (©)
1997 HAVOC Bell Systems Publishing. All Rights Reserved.
No part of this publication may be reproduced in whole or
in part without the expressed written consent of HAVOC
Bell Systems Publishing. [No copying THTJ, damnit.]

The HAVOC Technical Journal does in no way endorse the
illicit use of computers, computer networks, and
telecommunications networks, nor is it to be held liable
for any adverse results of pursuing such activities.
[Actually, to tell you the honest to goodness truth, we
do endorse that stuff. We just don't wanna get in trouble
if you try it for yourself and something goes wrong.]


For infomation about using articles published in THTJ, send mail to:
e-mail: thtj@thtj.com
mail: THTJ
c/o HBS
PO Box 448
Sykesville, MD 21784
_____________________________________________________________
[Editorial : by Scud-O] The Old School

During the past month, on #sin, Revelation had a long talk with me
about the old school. Rev is a great person, and with his connections, power,
and skills, i believe that he can help bring back the 'old school'. Right
below this editorial, is Revelation's mission, and i want you all to read it.
His look into the 'underground' is so true. Last month I almost brought to you
all 'state of the underground' editorial, but after the offer from some people,
i felt that it was time to first denounce selling out. i was going to publish
my little state of the underground speech this month, but after Rev gave me
his article on bringing back the underground, well i killed my state of the
underground speech since his covers everything i wanted to talk about, and
more.
Revelation does provide so many revelations into the underground that
so many people can not, or do not see. Many of the so called hackers,
phreakers, anarchists, warez d00ds that are just so k-R4d 3reet should be
ashamed of themselves. hacking and phreaking are not about messing with
innocent people's lives, it is about helping the system, about telling
sysadmin's about thier's problems, it is about shutting down a child porno
site like Rev talks about. It is until we do things like this that we can
regain respect for ourselves. Until then we will continue to go further and
further down the hole until we can no longer see the light, the light towards
honor, and respect and trust, those things which do not exist in today's
underground. Until we become ethical, we will continue to be arrested in
record numbers. And as for anarchists, well i will not even begin to talk
about them, since i could spend hours rambling about anarchists.
Hacking and phreaking were started to expand one's mind, and with
the standard of today's hackers and phreakers, we are not expanding our minds,
we are simply following cookbooks with step by step instruction on how to
achieve our ends. Minds ARE being closed, and that is something that can not
happen, for once we close our minds we are done for. closing our minds allows
for people to control us, like Ingsoc and Big Brother ( read 1984 by George
Orwell if you dont know what I am talking about ) , and this can not happen,
for if it does, we are all doomed.
In closing, i hope i have not depressed to too much, and I would like
to thank Revelation and all of AS for thier goal of bringing back the old
school, and i wish them well, they are a fine bunch of people, and they will
succeed in thier goal. And if they ever need any help from me, or thtj/hbs,
just let us know, we will be glad to help.

Scud-O , Founder, and Editor in Chief of THTJ


+----------------------------------------+
Scud-O and HBS would like to hear your views on this issue.
Please feel free to e-mail us at: scud@thtj.com

----------------------------------------------
/ ---/ --/ / / | /------/ / /
/--- /-----/------/-----/ / / /
/----------/ /--------/
-of HAVOC Bell Systems-

scud@thtj.com | http://www.thtj.com

_____________________________________________________________
In other news, FREE lurk3r, and
e-mail Scud-O on you idea if he should expose Wal-Mart's computer
and communication systems, since Wal-Mart is the ruiner of cities
small and large, and they care nothing about the small business
person. e-mail scud@thtj.com with a yes or no.
_____________________________________________________________


ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ°°
Û Û°°
Û BRINGING BACK THE OLD SCHOOL Û°°
Û By: Û°°
Û Revelation Û°°
Û LOA - AS Û°°
Û www.hackers.com Û°°
Û Û°°
ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ°°
°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°



Ah, yes...the Old School. Those of us who have been around for a little
while remember it well. The time where knowledge gatherer's were respected
because of their hard work and skills. We weren't dishonered by virii
spreaders and e-mail bombers...we were free...freedom. Has a nice ring to
it doesn't it? Well, these days freedom is becoming less important, and
crashing the government is taking priority. Why? I'll tell you why...
because of hype, plain and simple. People are no longer interested in
expanding their minds...they're interested in closing it. What ever happend
to the belief in Utopia...the freedom that unites us all? We're losing it...
that's what happend. We're losing it...the only damn thing that made me get
involved in the Underground is slipping away. Of course, there will always
be, no matter what, ways to expand your mind. But why are we letting the one
thing that we all care about get away? This I cannot I answer...but I can
provide a solution...a means to bring back the old school ethics of non
destruction, Utopia, and freedom. We still have the power to return the
Underground to what it was originally meant to be...free, ethical, and
informative.

Bringing back the old school ways will be by no means easy. It will take
long, hard work from each of us...but it will be worth it. Let's return the
Underground to its' original form, let's bring back the old school. In this
article I am take one step toward this freedom of the old school ways. This
step will be AS (Axis Security). A group of people who want to return the
respect and honesty back to the hacker name. A group of people who aren't
interested in spreading virri, e-mail bombing, carding, and software piracy.
We simply want to expand our own minds, and the minds of others'...while
bringing about a return to the old school ways of the Underground.
Our organization is made up of 8 members, no more, no less.

These members are:

Revelation - revelation@mail.hackers.com
Ed Wilkinson - ed.wilkinson@mail.hackers.com
Hyper Viper - hv@mail.hackers.com
Phreaked Out - phreakedout@mail.hackers.com
Phreak Show - phreakshow@mail.hackers.com
Brimstone - brimstone@mail.hackers.com
Fallout - fallout@mail.hackers.com
Samurai7 - samurai7@mail.hackers.com

This hand-picked group of hackers will begin the long awaited first step
towards the New School...a return of the Old School. We propose and
challenge you to follow in our footsteps with ethical hacking. Be the kind
of hacker that makes people respect you, not be afraid of you. No more
destructive virri spreading, e-mail bombing, and software piracy. Begin this
first step with us and follow us. The New School era has begun...help us
push it forward. Help us promote ethical hacking, by promoting it yourself.
It is only by your will that we will enter this New School era...no one
person can do it, we all must do it.

Ask yourself what you want to accomplish by being a hacker? Do you want to
make the "ultimate hack"? Do you want to hack a government web page? Well,
try this instead...hack a child pornography page if your going to hack a
web page...notify System Administrator's of their security flaws...write
programs and text files that describe how to protect from attacks, not how to
accomplish the attack. That is how we are going to expand our minds. By
fixing current problems and security flaws we bring about new standards, and
with these new standards comes new problems. It's a neverending circle that
will make us all wiser and more helpful to society, instead of being
destructive to it. All we ask is for your support...help us bring back the
Old School...welcome to the new era...the era of ethics and greatness among
hackers...welcome to the New School...

In closing I would like to thank The Havoc Technical Journal for publishing
this article...we are now one step closer to our goal because of them. I
would also like to thank Scud-O for his support of my views and of those of
the Old School. I would also like to thank the man who made all of this
possible, the man who is the very definition of "true hacker"...Ed Wilkinson.
Without Ed and his aid in the creation of AS, this wave of ethics may never
have taken place. I would also like to thank Hyper Viper for being of
termendous help and support. Shoutouts to everyone at AS, L0pht, S.I.N.,
GkOS, THTJ, OTRiCS, Silicon Toad (for all your help and support),
Phreaked Out, VC, Teknopia, Haknet, Stealth, #psychotic, LOA, LOD, Phrack
(for being a terrific magazine), 2600 (for believing in freedom and having
the guts to publish it), and everyone I forgot.

If your leaving this article still believing in the destructiveness that
nearly consumed the Underground...believe what you will...but the Old School
is back, and badder than ever.


Written By:

Revelation (AS)
Axis Security - www.hackers.com
"Bringing Back The Old School...One Hacker At A Time."


[ EOF ]
_______________________________________________
[ Basic Crypto ] by Scud-O

--------------------------------------------
-_Basic Cryptology_-
--------------------------------------------
Information and Pascal (yuck) Code by Scud-O
--------------------------------------------

I. Introduction

This article is made to present you, the reader with the beginnings
of cryptology. This is not made to fully describe every aspect of crypto. I
am mainly dealing with very, very basic crypto such as substitution or
transposition. For details on encryption methods such as idea, des, blowfish,
etc. look for it in other future articles.
I plan for at least 2-3 articles on basic crypto, this month covering
beginning crypto such as substitution or transposition, next month to cover
bit manipulation ( NOT, AND, OR, XOR, etc) and after that, maybe get into
blowfish, idea, and other algorithms.

II. Types of Ciphers

First off, there are about a million different forms of ciphers and
encryption methods that can be made, but for this month, the 2 methods i will
discuss are substitution and tranpositition. substitution ciphers replace one
character with another character, but leaves the message in the same order.
However, transposition ciphers scramble the characters of a message according
to some rule. These types of ciphers can be used at whatever level you feel
like, and can also be intermixed. Another technique, which will be covered
next month is bit manipulation, which has become popular with the use of
computers.
All three of these methods use a key. The key, of course is used to
'unlock' the message that is encrypted.

III. Words to remember

ciphertext : the encrypted text, for example: MJQQT, YMNX NX F YJXY.

plaintext : the decrypted text, ie: HELLO, THIS IS A TEST.

-------------------subs1.pas
PROGRAM Subs1;
(* simple substitution cipher. *)

type
str80 = string[80];

var
inf, outf : str80;
start : integer;
ch: char;

PROCEDURE code(inf, outf: str80; start: integer);

VAR
infile, outfile: file of char; (* should just use text instead.. *)
ch: char;
t: integer;

BEGIN
assign(infile, inf);
reset(infile);
assign(outfile, outf);
rewrite(outfile);

while not eof(infile) do
begin
read(infile, ch);
ch := upcase(ch);
if (ch>='A') and (ch<='Z') then
begin
t := ord(ch)+start;
(* Wrap around *)
if t > ord('Z') then t := t-26;
ch := chr(t);
end;
write(outfile, ch);
end;
Writeln('File coded');
close(infile);
close(outfile);
end;

PROCEDURE decode(inf, outf: str80; start: integer);

VAR
infile, outfile: file of char; (* should just use text instead.. *)
ch: char;
t: integer;

BEGIN
assign(infile, inf);
reset(infile);
assign(outfile, outf);
rewrite(outfile);

while not eof(infile) do
begin
read(infile, ch);
ch := upcase(ch);
if (ch>='A') and (ch<='Z') then
begin
t := ord(ch)-start;
(* Wrap around *)
if t < ord('A') then t := t+26;
ch := chr(t);
end;
write(outfile, ch);
end;
Writeln('File decoded');
close(infile);
close(outfile);
end;

begin
write('enter input file: ');
readln(inf);
write('enter output file: ');
readln(outf);
write('starting position (1-26): ');
readln(start);
write('code or decode (C or D) ');
readln(ch);
if upcase(ch)='C' then code(inf,outf,start)
else if upcase(ch)='D' then decode(inf,outf,start);
end.


input: hello, this is a test. i hope it works.
output: MJQQT, YMNX NX F YJXY. N MTUJ NY BTWPX.
output2: HELLO, THIS IS A TEST. I HOPE IT WORKS.


Now while this may fool the casual reader, it would not fool anyone
with some knowledge of crypto, and this code would be broken in a few minutes.
One problem with this cipher is that it leaves the spaces in place. To make
this more 'secure' we should include the space. ( We should also include all
punctuation and numbers, as well as uppercase letters, but i am going to leave
that to you do to if you want to. )

For example, take the alphabet:

abcdefghijklmnopqrstuvwxyz<space>

and change it to:

qazwsxedcrfvtgbyhnujm ikolp


Now while this may not seem to make this cipher more secure, it does
since now there are 27 factoral ( 27! ) instead of only 26! ways for this
cipher to use. In case you did not know, 6! would be 6*5*4*3*2*1 which equals
720, therefore, 26! is a larger number, and 27! is an even greater number.

example:
meet me at sunset

would become
tssjptspqjpumgusj

now, would you like to have to break that code? i dont think so.


-------------------subs2.pas
program subs2;

type
str80 = string[80];

var
inf, outf : str80;
alphabet,sub : str80;
ch: char;


{ this function returns the index into the substitution cipher. }
function find(alphabet: str80; ch: char): integer;

var
t:integer;

begin
find:= -1; { error code }
for t:= 1 to 27 do if ch=alphabet[t] then find := t;
end; { find}

{ just like the c function, isalpha() }
function isalpha(ch: char): boolean;

begin
isaplha := (upcase(ch)>='A') and (upcase(ch)<='Z');
end; { isalpha }

procedure code(inf, outf: str80);

var
infile, outfile: file of char; { should just use text instead..}
ch: char;

begin
assign(infile, inf);
reset(infile);
assign(outfile, outf);
rewrite(outfile);

while not eof(infile) do
begin
read(infile, ch);
ch := upcase(ch);
if isalpha(ch) or (ch=' ') then
begin
ch := sub[find(alphabet, ch)];
{ find substitution }
end;
write(outfile, ch);
end;
Writeln('File coded');
close(infile);
close(outfile);
end; {code}

procedure decode(inf, outf: str80);

var
infile, outfile: file of char; { should just use text instead.. }
ch: char;


begin
assign(infile, inf);
reset(infile);
assign(outfile, outf);
rewrite(outfile);

while not eof(infile) do
begin
read(infile, ch);
ch := upcase(ch);
if isalpha(ch) or (ch=' ') then
ch := alphabet[find(sub, ch)];
{ replace with real alphabet again }
write(outfile, ch);
end;
Writeln('File decoded');
close(infile);
close(outfile);
end; { decode }

begin {main }
alphabet := 'ABCDEFGHIJKLMNOPQRSTUVWXYZ ';
sub := 'QAZWSXEDCRFVTGBYHNUJM IKOLP';
write('enter input file: ');
readln(inf);
write('enter output file: ');
readln(outf);
write('code or decode (C or D) ');
readln(ch);
if upcase(ch)='C' then code(inf,outf,start)
else if upcase(ch)='D' then decode(inf,outf,start);
end.

Now, while this is a harder code to break, this is still easily
breakable by a frequency table of the english language. Looking for the most
common letter in the ciphertext will show you which letter is 'e' , since e
is the most common letter in the alphabet.
To make this just a little bit more confusion, lets throw in another
round of subsititution. If you are really bored you can take this to the next
step, and keep adding more and more levels of subsitution, but if you do end
up doing that, there is seriously something wrong with you!

-------------------subs3.pas
program subs3;

type
str80 = string[80];

var
inf, outf : str80;
alphabet,sub : str80;
ch: char;


{ this function returns the index into the substitution cipher. }
function find(alphabet: str80; ch: char): integer;

var
t:integer;

begin
find:= -1; { error code }
for t:= 1 to 27 do if ch=alphabet[t] then find := t;
end; { find}

{ just like the c function, isalpha() }
function isalpha(ch: char): boolean;

begin
isaplha := (upcase(ch)>='A') and (upcase(ch)<='Z');
end; { isalpha }

procedure code(inf, outf: str80);

var
infile, outfile: file of char; { should just use text instead..}
ch: char;
change : boolean;

begin
assign(infile, inf);
reset(infile);
assign(outfile, outf);
rewrite(outfile);

change := TRUE;
while not eof(infile) do
begin
read(infile, ch);
ch := upcase(ch);

{ switch alphabets with each space }
if ch=' ' then change := not change;
if isalpha(ch) then
begin
if change then
ch := sub[find(alphabet, ch)];
{ find substitution }
else
ch := sub2[find(alphabet, ch)];
{ second sub }
end;
write(outfile, ch);
end;
Writeln('File coded');
close(infile);
close(outfile);
end; {code}

procedure decode(inf, outf: str80);

var
infile, outfile: file of char; { should just use text instead.. }
ch: char;
change : boolean;

begin
assign(infile, inf);
reset(infile);
assign(outfile, outf);
rewrite(outfile);

change := TRUE;
while not eof(infile) do
begin
read(infile, ch);
ch := upcase(ch);
{ switch alphabets on a space }
if ch=' ' then change := not change;
if isalpha(ch) then
begin
if change then
ch := alphabet[find(sub, ch)];
{ replace with real alphabet again }
else
ch := alphabet[find(sub2, ch)];
{ second sub }
write(outfile, ch);
end;
Writeln('File decoded');
close(infile);
close(outfile);
end; { decode }

begin {main }
alphabet := 'ABCDEFGHIJKLMNOPQRSTUVWXYZ ';
sub := 'QAZWSXEDCRFVTGBYHNUJM IKOLP';
sub2 := 'POI UYTREWQASDFGHJKLMNBVCXZ';
write('enter input file: ');
readln(inf);
write('enter output file: ');
readln(outf);
write('code or decode (C or D) ');
readln(ch);
if upcase(ch)='C' then code(inf,outf,start)
else if upcase(ch)='D' then decode(inf,outf,start);
end.

Ok, so before i go, this multi-encryption makes it much harder since
at each space, the sub is changed, making frequency tables somewhat
useless. I hope you enjoyed this article, and tune in next month for
transpostion ciphers and bit-manipulation. cya.

Scud-O






-[ Meridian Mail : by grinchz ]-----------------------------------------------

- Forew0rd -

After a few weeks of searching for any info on phreaking the Meridian
Mail system I realized there was basiclly none to be found. So
natuarlly I went to work on my skoolz system and discovered what tha
menus where and some other lil' neeto tid bits of info on what tha
system it self is. ( i stole a little bit of the menuing system info
and info on hacking it from some lil' thing i happened to find on da
web )

- About The Merdian Mail System -

Meridian Mail is not just a stand alone system. Its actually and add
on for Meridian switches made by Northern Telecom and also from
British Telecom (UK Only). Tha system is very expensive averaging
2000 UK Pounds for a low end model.


- Spoting a Meridian Mail System -

Well spoting an MM is kinda hard but not to hard. The easiest to spot
is the mail collection setup. This is when you dial the system and a
digitized womens voice sez, " Welcome To Meridian Mail". And then
followed by "Mail Box #?" and of course "Password?". The second setup
is sounds just like an answering machine. When called it picks up and
plays a msg for u. To get out of the recording simply hit "*" then
press "#" and u will get a list of all options. To get to the login
prompts press "81". Next is call routing which basiclly gives you a
menu like "Press 1 For Butt sex" , "Press 2 For Sex w/ Muppets" , etc.
Some these are pains in tha ass and u have to wait for the msg to end
before u can get into tha fun but others will let u hit "*" and then
press "#" to get the options and "81" to get to tha Login prompt. The
last type of system is outgoing msg only. They Really Suck Stay Away
From Them! U cannot use anything on them.... (probably cuz someone else
already got to it :P).


- The Guess 'n' Check -

So u found an MM somewhere and u wanna get into it? Well here are a few
things I learned while fucking around with my skoolz setup:

+there is no set mail box #
but is usually 4 digits

+default passwd is the msg #
also try mail box # backwards

+passwd's are 4-16 digits in length

+if u get in its kewl :P

- The Menu's -

From a mail box

0 - Operator Assistance
1 - Rewinds the current message about 10 seconds
2 - Play message
3 - Fast Forwards the current message by 10 seconds
4 - Previous Message
5 - Record, used when composing or forwarding a message.
6 - Next Message
7 - Message Commands(Sub Menu)

0 - Message Options (Sub Menu, can only be used on outgoing
messages)

1 - Urgent, tag a message for urgent delivery.
2 - Standard, tag a message for standard delivery.
3 - Economy, tag a message for economy deliver.
4 - Private, tag a message private (private messages cannot
be forwarded to other users)
5 - Acknowledgement, tag a message for acknowledgement,
you'll be send an acknowledgement message when the message
is received.
6 - Timed Delivers, specify a time and date for delivery.

1 - Reply, sends a message to the sender of the message. Can only
be used on incoming messages from mailboxes on the same system.
2 - Play envelope - Gives all the details of the messages, such
as who its from, time, if it was urgent, attached messages etc.,
etc.
3 - Forward, forward the message to another user. 4 - Reply All,
record a message to all the senders of the messages in your
mailbox.
5 - Compose, compose a message to other users, either just one, a
distribution list, or several boxes.
6 - Delete, deletes message, or if used on an deleted message
restores it.
9 - Sends a message you've just recorded.

8 - Mail Box Commands (Sub Menu)

0 - Mailbox Options (Sub Menu) (Not always available on earlier
versions of the software)

1 - Change Operator Assistance Number

1 - Login, enters the login process.
2 - Greeting (Sub Menu)

1 - External, record a greeting to be played to external
callers.
2 - Internal, record a greeting to be played to internal
callers.

3 - Log-off
4 - Password Change, change your password, enter your new
password twice and your old password.
5 - Distribution Lists, create distribution lists.
6 - Goto, goto a message number in your mailbox.
9 - Personal Verification, record a personal verification which
will be played instead of your mail box number to message
recipients.

9 - Call Sender, when used on an incoming message will dial the
extension of the sender, if the number is known.

- Fun Stuff -

Once you work your through the system if your allowed to Change
Operator Assistance Number you will rool. Then you can change that #
to wut eva u want say you wanna call Keystroke for instance ( :P~~~ )
change tha # to XXX-XXX-XXXX and then go back into your box and hit
"0" and voila! you have a dial-out to abuse and call ur friends.

- Final Notes -

Phew! I hope this satisfies you peoples fer muh first article.... I
want to thank some guy named substance ( i unno who he is :P ) for
writing out the menus so I didnt have to go thru and type all of
them.... and thats about it see ya'll in #phreak.... latez

grinchz@hotmail.com
supplier of fine meats
UIN: 1441903

-[ EOF ]--------------------------------------------------------------------

Breaking Into the BCTel Van - By eclipse.

Ok, I'm sure you all heard about the first time cind3r and I broke
into a Bctel Van, but I don't know if you heard about the time I did
just a week ago. It's pretty lame, but its 1:30 am, and I can't get to
sleep. Well, here's the story.

So, It was about, 11 at night, and my friends had just gone home, and
my other 2 friends were at a party. So, I went to the fence, which had
some shitty aluminum linking from the last time it got victimized. In
about 5 minutes, it was completely gone, and there was a hole in the
fence from top to bottom. It was about 11:30 now, and I knew my friends
would be out of the party at about 12. I decided to wait outside for
them to pass my house, and they did. They wanted to help me with the van,
but they had to go home, so me, trying to be all 31337 in front my my
friends, got some porcelin and tried to break the window. That didn't
work, so before they left, I got my crowbar. One hit, and *Bang*, a
second, and *smash*. The window was broke, and I bolted across the street,
and back to my house. I laid low for an hour or so, and then went back. It
was all dark and quiet, so I figured it was safe. I looked in... one
lineman's, one cb radio, and a box with assorted little goodies. I took the
linemans and dumped it off at my house. Then, I went back and grabbed the
box. It had 10 dollars in quarters in it, some BCTel stickers, and some phone
boxes and shit. I sat under the lights of the store across the street from my
house and looked over my findings, putting them in a bag. Then, knowing it was
quality, and not quantity that I wanted, I went back for one more thing: the
cb radio. I ripped it out of the van and was on my way out of the van when
another linemans caught my eye. It was in the back of the van, so I had to
reach across the van, with all that broken glass, and open the sliding door.
I went back, and got the linemans, along with a nice, new telephone. I went
home and went to sleep.


Get away - By Eclipse.

Tonight, while trying to start up a conf, I got a little more exercise
than I had expected and wanted. I had already been there before: the store
with 10 phone lines, 4 rural (8 city) blocks away from my house. I had
unsuccessfully tried to start a conf, and not wanting to end the night without
one, I decided I would go back. So, I got back, just as the sun had gone down
over the mountains. It was fairly dark out, and I was safe with my linemans.
I had JUST hooked it up, and called cind3r, expecting to start my 3,4,5,6,
and eventually 10 way call. About 5 seconds (literally) into the call, a car
pulls up, high beams on and everything. A male driver and a female passenger.
"What are ya doin?" he asks. "Nothing" i say to him as i swear at cind3r and
hang up on him. Paniked, I yanked my phone cord, and stuck it in my bag. "Oh,
I know what you're doing, you little shit!"
he yells, as i take off on my
rollerblades, probably faster than I have ever gone in my life. I look back,
and see him chasing after me on foot, but he was still a good 20 feet back,
so I kept on going full tilt. I saw him run back to his car, and I knew I had
some time to hide, but, bah, I was on a stretch with all houses. No bush. I
saw him creep up behind me, following back in his car, about 5 feet behind me.
He picked up a cell, he called the police, I would imagine. I turned down a
street to get onto the slower street that wasn't on the highway. He was
following me, close enough he could have probably reached out of his window
and grabbed me. I was going fairly slow now, very out of breath from booting
it 4 blocks already. I was one block away from my house, but I was at the
other end of the street. I saw a car trying to turn onto the road, and I went
in front of it, which turned down the road, giving me just a few seconds, but
at the same time, a long time to get ahead of the guy. So I blade up the road,
and turn off down the dirt and rock path. It was about 20 feet long, running
the whole way on rollerblades. I almost fell a couple times. I looked back
behind me, and saw the guy chasing after me. I laughed at him, and kept going.
I was only 1 house away from my house. I got around the corner, and I saw him
turn around and head back to his car. I was safe. I ran into my house and down
the stairs, hot, sweaty and out of breath, while trying to explain why "i had
to come home from James's house."
Thats my story, the closest I have ever
gotten to getting caught for phreaking. Thank god I didnt. I had more then
enough shit with me for a possible stay in Juvy :). Including the linemans I
had stole a week earlier from BCTel.




_____________________________________________________
Nokia Cellular Programming Info - Brought to you by Keystroke

FOR AUTHORIZED DEALER USE ONLY

NOKIA 2160 SERIES CELLULAR TELEPHONE NAM PROGRAMMING INSTRUCTIONS

The Nokia 2160 Series handportable CMT uses an EEPROM NAM that can be programmed directally from the standard keypad. In order to
access the NAM, you must enter the special access code currently programmed into the phone. Once the programming mode is accessed, NAM
parameters are loaded by entering them into the display and "storing" them to selected memory locations. Be sure to obtain all parameters before
proceeding.

EASY NAM PROGRAMMING
1. Turn the phone on.
2. Enter the NAM access code. Access code is: *#639#
3. Verify the display now reads "Cellular number" and enter the 10 digit MIN for the phone.
4. Press the softkey under the word "OK" in the display. If less then 10 digits are entered an error message will prompt you to reenter
the number
5. Verfit the display reads "Enter code" and enter the five digit SID followed by four zeros. (Example 001750000 is a SID of 175 followed
by four zeros.) An error message will display if an incorrect entry is made. Do not add more than four zeros to the code.
NOTE: Change the Lock code by adding a pound sign and new lock code after the code. (example: 001750000#7788. Lock code=7788)
Change the Language by adding a pound sign and new language code after the code (example: 001750000#2. Language = 2)
Language code: 0 (default) = English, 1 = French, 2 = Spanish, 3 = Portuguse
Change the Lock code and Language code by seperating each set of numbers by a pound sign. (example: 001750000#7788#2) The
SID =00175, Lock code = 7788, Language = 2 (Spanish)
6. Press the softkey under the word "OK" in the display.
7. The display will tell you that the activation was OK and instruct you to power off, then on again. When the phone powers back
up, it will automatically select the correct system (A or B)

ACCESS NAM PROGRAMMING MODE:
1. Turn the phone on.
2. Enter the NAM access code. Factory default is: * 3 0 0 1 # 1 2 3 4 5
3. Enter the softkey [Menu]
4. If this screen appears, ----------------- you have entered the access code correctly.
| Field Test |
| > NAM 1 |
| NAM 2 |
-----------------
SELECTION FROM THE MAIN LEVEL MENU (FIRST LEVEL OF NAM MENU):
5. Press the scroll key up or down repeatedly until the desired main menu selection is displayed. Select from:

NAM 1 NAM 2 NAM 3 Security Code Emergency Number SW version
Serial No. Programmed Field Test

6. Press softkey [Select] to access the level menu for the your main selection. {Note from Key: They made that typo :P!}

PROGRAMMING NAM'S 1 THROUGH 3 (SECOND LEVEL NAM MENU):
7. Press the key up or down to scroll through the selected NAM information list. Select from:

HOME SYSTEM OWN NUMBER PSID/RSID LISTS (Note 1) CHANGE DEFAULTS
CHANGE DEFAULTS"
NAM STATUS ACCESS METHOD LOCAL OPTION PRIMARY PAGING CH
SECONDARY PAGING CH DEDICATED CCH A DEDICATED CCH A NBR DEDICATED CCH B
DEDICATED CCH B NBR OVERLOAD CLASS GROUP ID REAMING STATUS
A-KEY

8. If the value is incorrect, press the softkey [Select] and use the numeric keypad or key to make any needed changed.
9. Enter softkey [OK] to save the value.
10. Repeat steps 7 through 9 for the remaining NAM info items to be viewed and/or changed.
11. To program NAMs, press [Quit] to return to the Main Menu list. Select NAM 2 or NAM 3. Once the Home System ID and Own
number are programmed, the phone will automatically set the NAM Status to enabled.

PROGRAMMING THE SECURITY CODE:
12. From Main Level Menu use the key to select the "
Security" menu, press [Secect] and the current 5-digit security code will appear in the
display. Default is 12345
13. If you wish to change the Security code at this time, use the numeric keys to change the value.
14. Press the softkey [OK] to store changes.

PROGRAMMING EMERGENCY NUMBERS:
15. From Main Level Menu use the scroll key to select the "
Emergency" menu, press the softkey [Select] to enter the emergency numbers.
EMERGENCY NUMBER 1 (911) EMERGENCY NUMBER 2 (*911) EMERGENCY NUMBER 3 (None)
16. If you wish to change the displayed value, use the numeric keys to make
changes. Use the scroll key to select the emergency number you wish to
change and press [Select].
17. To change the value, press softkey [OK].
18. Press [QUIT] to exit the menu.

<OTHER SIDE OF PAGE>

2160 Programming Continued:
SW VERSION:
19. From the Main Level Menu use the scroll key to display the "
SW version" menu, press [Select] to view software version, date, and product
type.
20. Press [Quit] to exit the menu.

SERIAL NUMBER (ESN):
21. From the Main Level Menu, use the key to display the "
Programmed" menu.
24. Press [Select] and enter a four digit number that corrispondes to the month and year the phone is sold. Example (mmyy)
0197 = January 1997, 0996 = September 1996.
NOTE: This menu location can be programmed only one time. Once that date had been entered it cannot be changed, Any attempt to enter the
menu once it had been programmed will receive a short beep and the message "
DATE ALREADY STORED".

EXIT NAM PROGRAMMING:
25. To exit the NAM programming mode, turn off the phone and leave it off for five seconds.

FIELD TEST:
26. The FIELD TEST MODE is used to investigate how the phone is reacting to the cellular system. The FIELD TEST
information covers signal strength, battery changing status, cellular state and encryption status. The information is organized
to display information relating to Analog Control Channels, Digital Control Channels, Analog Voice Channels, and Digital
Voice channels. All the information provided in the FIELD TEST display is in accordance with IS136.
For further information about the FIELD TEST mode, contace Nokia Customer Service at 1-800-456-5553 and ask for Nokia
Field Service Bulletin ?????.
27. To activate the FIELD TEST mode you must first be in NAM programming. Instructions for entering NAM programming are on
the opposite side of this page. Use the following steps to enable the FIELD TEST mode.

28. From the main menu use the scroll key to display the "
FIELD TEST" menu and press the softkey [Select]. Use the
key to select Enable and press the softket [OK].

29. Turn 2160 off then back on. Once the power up self test is complete, the FIELD TEST display will begin automatically.
Scroll through the different displays using the scroll key.

30. To disable the FIELD TEST mode. Return to NAM programming and disable the function under the FIELD TEST menu.


PROGRAMMING PSIDS AND RSIDS:
The Nokia 2160 provides the option to program Private (PSIDs) and Residential (RSIDs) System ID's as perscribed by IS-136.
The PSID/RSID list is programmed to support selection/reselection processes, system selection and SID display functions. Programming the
PSID/RSID list is part of the NAM programming menu. All three NAMs have their own PSID/RSID list. Follow these instructions to program
the PSID/RSID lists.

1. Enter the NAM programming menu and select NAM 1 (or the desired NAM). (Note: PSID/RSID is currently only avilable in the NAM 1
location. PSID/RSID is included in NAM 2 and 3 for future use.)
2. Use the scroll key to display "
PSID/RSID LISTS" and press [SELECT].
3. Use the scroll key to select the P/RSID 1 or the desired P/RSID (1 through 5). Press the [SELECT] softkey.
4. Each list contains:
System type Select Private or Residential system type.
PSID/RSID System ID for the Private or Residential system. Indicates which PSID/RSID the mobile will respond to.
System ID Connected System ID. The SID the PSID/RSID is connected to.
Alpha Tag The name of the Private or Residential SID.
Operator Code (SOC) This is the System Operator Code. (US-McCaw Cellular = 001 (dec), Canada - Rogers Cantel Inc. = 002 (dec),
and McCaw Cellular Communications (for international) = 2049 (dec).
Country Code Enter the country code of the PSID/RSID.

Keystroke


_____________________________________________________________

************************
*Little Crypting System* memor [HBS]
************************ ***********

1 / Why that little cryptography system
***************************************

Well a few years ago, i was studying cryptography systems (Hill, Rabbin,
Rsa ,Des, Vigenere..) and i thought it was funny to make my own "
little"
and easy crypting system in that country nammed France where the encoding
systems are forbidden when the key and method you use for it arent given
to the french governement.. i called it Random Routines, because its a
stupide system using a random string as key to crypt.

2 / How it werks?
*****************

It only uses that key composed for instances of 26 caracters:
AZERTYUIOPQSDFGHJKLMWX CVBN

caracters with a cursor position:

AZERTYUIOPQSDFGHJKLMWX VBN
1 5 1 1 2 2
0 5 0 6

for making that caracters string that is as long as you want it can
go from 26bytes to .. hm (the longest i did was 32kbytes).

a little programm using C++ random functions or basics rnd can do it
i guess that one can work (i didnt tryed it)

#include <stdio.h> /* for presentation shit */
#include <time.h> /* for a Borland C++ random command use */

void makekey()
{
printf("
Making da key\n");
unsigned char key[32000];
for(int i=0;i<32000;i++)
key[i]=random(255);
printf("
Key made\n");
}

the second thing to have is of course the original text to crypt:

the string to crypt here will be for instance "
HELLO"

using a rotating method on the key i'll first crypt the H:

AZERTYUIOPQSDFGHJKLMWX VBN
1 5 1 1 2 2
0 5 0 6

1
6

H is the pos 16.. the first crypted thing will be the number 16
after from that H, i'll crypt the e (pos will move and the pos1 will start
on the H)

AZERTYUIOPQSDFGHJKLMWX VBN /* note that its a rotating position at the
1 1 2 21 5 11 string end, it continues on the string
2 5 0 6 01 begining */

from the H, i'll go to the E .. i'll get pos 14..
the begin of the "
brute" crypted thing is 16,14..
i'll continue to crypt now from the E to the L

AZERTYUIOPQSDFGHJKLMWX VBN
221 5 1 1 2 2
56 0 5 0 4

from the E, i'll go to the L .. i'll get pos 17..
the begin of the "
brute" crypted thing is 16,14,17..
i'll continue to crypt now from the L to the L

AZERTYUIOPQSDFGHJKLMWX VBN
9 1 1 2 221 5 8
2 5 0 56


from the L, i'll go to the L .. i'll get pos 1..
the begin of the "
brute" crypted thing is 16,14,17,1..
i'll continue to crypt now from the L to the O

AZERTYUIOPQSDFGHJKLMWX VBN
9 1 1 2 221 5 8
2 5 0 56


from the L, i'll go to the L .. i'll get pos 17..
the begin of the "
brute" crypted thing is 16,14,17,1,17..
i'll continue to crypt now from the L to the O

well finally, the crypted "
numerous" string will be
16,14,17,1,17

well next step is to use only a little "
decalage" crypting system from
"
hidding" like +1,+1,+1,+2 on all the numbers we get

16,14,17,1,17
+ + + + +
1 1 2 2 1
-------------
17,15,19,3,18

the next step will be to crypt thoses numbers in letters will a 2nd
key like.. hmm..

ABCDE FGHIJKLMNOPQRSTUVWXXZ0123456789
1 5 1 1 2 2 3 3 3
0 5 0 5 0 5 7

16 will be O
15 will be N
19 will be R
3 will be C
18 will be Q

so the finally crypted string will be "
ONRCQ"

now tell me how to found without knowing that crypting method that
"
HELLO" == "ONRCQ" ?
and the keys are of course easy to find when they are of 26 30 bytes, but
imagine that the key are 32000bytes.. i guess its a bit harder to find
the right key and the good crypting method..

for 32000 bytes.. hmm .. lucks are 1/(255^32000) == really little!

crypting ratio is 1:1.. for 1 uncrypted byte, you get 1 crypted byte.
but of course you need 2 keys.

3 / Making that system a bit more complex :
*******************************************

well i will include in it the Source coming and the destination , thoses
are in 2 caracters that the spies will choice..

Kevin who is sending the crypted message "
HELLO" to Oscar choose the "name"
KN .. he knows Oscar name which is "
FK".

for that, i'll separate the crypted text with RN caracters.
it will be RNxRNxRNxRNxRNxRNxRN <- x are the crypted bytes.
so the crypted "
HELLO" will be now RNORNNRNRRNCRNQRN

we will put the first letter of Kevin "
name" before the first RN , it
will gives:

KRNORNNRNRRNCRNQRN

we will now put the second letter of Oscar "
name" just after that one,
it will gives :

KKRNORNNRNRRNCRNQRN

we will put the first letter of Oscar "
name" just after the last RN , we
will get

KKRNORNNRNRRNCRNQRNF

and we will put finnaly the 2nd letter of Kevin name just at the end of
the string, we will finnaly have :

"
KKRNORNNRNRRNCRNQRNFN" is the final crypted string.

that RN and name thing will be like a checksum, because if you
receive a msg without crypted letters under RN and with a bad source and
destination name, i guess that the crypted text is not for you and that
your keys wont work for decrypting it.

another little checksum will be the 1st key string lenght at the end of
the crypted text. Our 1st key is 26 bytes long.

2nd key :

ABCDE FGHIJKLMNOPQRSTUVWXXZ0123456789
1 5 1 1 2 2 3 3 3
0 5 0 5 0 5 7

2 is the B and 6 is the space.. so now the crypted string will be:

"
KKRNORNNRNRRNCRNQRNFNRNB "

4 / so now, for a spy how to guess that "
KKRNORNNRNRRNCRNQRNFNRNB "
*******************************************************************
== "
HELLO" ?
************

well i'll use that thing nammed "
Crypt-Analysis"

"
KKRNORNNRNRRNCRNQRNFNRNB "
--**x**x**x**x**x**--**--

i'll see that "
RN" are repeated.. especially in the middle string,
so i'll know that the letter upper to the x will be crypted letters.

i'll think probably that the letters uppers to the -- will be some
checksum thing or key making shit..

so i wont be really advanced, i'll only know that:

"
KKFNB " <- its checksum or keymaking shit.. maybe KK are checksum and
"
FNB " are key making shit, or "KK" key making and "FNB " checksum , or
no checksum and only key making, or checksum without key making... i'll
be damn LOST!

i'll know that ONRCQ will be some crypted text with a key, maybe 2 keys,
maybe 3 keys??! here too, i'll be totally lost.

the only thing i'll really know is that RN are only here for separating
the crypted thing parts... but how all that thing works? LOST LOST LOST!

well i made that cryptography system for fun, if u have any question,
i coded it a few years ago on AtariSt systems with 256 bytes key ,
it was nammed rndrt.lzh if u have C coding questions too..
mail me in memor@mygale.org

memor [HBS]

_____________________________________________________________
§§§-Slacking and not getting caught-§§§

I'm going to murder all of you. Now that I got that out of the way on
with the article. Are you like me, do you go to a high school (or any school)
that has computer lab using Novell netware and some windows companion like
"
USERNET"?. If you do then good, but if you don't here is what USERNET, or
other similar Novell windows companion's are about. The idea behind "
USERNET"
is that once the user is logged in he/she can not execute any other program
besides those that are available (ones that have icons). But if your like me
and are tired of hearing the instructor telling you run Microsoft windows tour
or make a Pascal program that adds integer's then I have got a great way of
slacking and not being caught. First off, all the things I'm going to tell
you are good for doing what you want on a "
USERNET" system, but is no
substitute for just hacking the admin, or booting up without "
USERNET" into
DOS prompt, but both of these ways run the risk of you being caught slacking.
So here we go. You have logged into "
USERNET" and are doing whatever pathetic
thing the instructor told you to do, now most school's have courses in HTML
or just have web access, so Netscape navigator is available to run. RUN IT.
Now once your in, go to options/general preferences and then to the APPS
section. Once there look for a dialog box called "
Telnet Application".
Obviously this box is used to point to the external Telnet program the
Netscape calls on when it is requested by the user. Now put any executional
that you want into the box and it can be run simply by exiting options(OK)
and typing "
telnet://" then Enter in the URL box of Netscape. This tells
Netscape to run the Telnet program, or in this case any program you have put
into that dialog box. Now I know your saying "
THAT IS THE DUMBEST THING I
HAVE EVER HEARD IN MY INTIRE LIFE YOU FUCKHEAD", but it works and more you can
easly switch between whatever program you ran, back to whatever your suppose
to be doing (ALT+TAB) in a second and avoid being caught. My suggestions of
program's to run are "
C:\WINDOWS\DOSPROMT.PIF" or FileManager. If you
thought this article was a waste of time and taught you nothing new then you
should not have read it!

So have fun, slack and take it easy.
SpookyOne

_____________________________________________________________
A Story, by discore
-------------------------

listen kiddies!
i have a story of mass porportions
a garbling gaggle of great somethings
hi! discore speaking, i got a great story to tell cause its time to piss
some ppl off, and thats what i do best.
it all started in a land far far away (salt lake city) about 2 months ago
when my friend who we will call jeff started getting a slight drug
problem. he ended up getting busted every week or so when he stole bottles
of alchohol from his parents or something like that. then he was downtown
at a crackhouse on like... the 15th of june, and he had a gun on him, and
of course the crackhouse got raided, him being caught with the gun and in
a shitnitz of trouble. so right after he was fingerprinted, all his infoz
pulled etc he went immdiatly to my house to find me tiffany and shaun
taking down this tent we were playing with. and he totally 100% freaks out
at my house all starts crying and shaking. then his mom came and picked
him up. the stupid slut that she is let him go and do what he wants the
next day, so he is fucking durnk out of his mind and has a go kart
(something you dont want jeff to have). so anyways, later in the day his
mom offers me to stay up at his house that night, something that doesnt
happen very often, of course i take the offer and me and jeff do something
that night. in the morning im awakend by his clueless dad and 4 ppl from a
detox program. they take jeff away that morning, on his best friends
birthday (june 20th).
so now the story is his m0m thinks i have a gun here, so tells my mom that
and of course she shits a brick, i tell her to fuck off and to get out of
my room. now heres the fun part
the detox program that jeff is in tapped my phone line for unknown
reasons. i cant name anything cause i plan on sue'ing the living shit out
of this detox facility.
the point of my story is to realize this isnt a free world anymore. you
are owned by your law enforcement and your government. the have the power
to kill you for no reason or lock you up in jail for the rest of your
life. and i dont fucking like it, so you know what i say? i say fuck the
system be yourself and listen to the doors instead of going to church!

AND A BIG FUCK YOU TO JEFF'S MOM

discore!
btw... although nothing illegal is here dont rage anarchy because of this
article, its not my fucking fault if you get shot im simb0lia or something
because of this!

_____________________________________________________________
*****************************************
***Phreaking for some europeans *** memor [HBS]
*****************************************

French and european people, all thoses barbars want to phone without paying their call,
but they HAVE NO skills in electronics , so they always, mostly ask lame questions.. so their
is some methods that doesnt needs thoses "
electronician" skills.

Well the first method if u dont want to pay yer bills is blueboxing.
---------------------------------------------------------------------------------------------------------


Remember thoses two mf frequencies 1st:
---------------------------------------------------------------------
they are composed of two basics frequencies (its do the mf) ,a lenght of that frequencie playing and
a little delay before playing the next frequencie.

Frequencie n°1:
--------------------------
frequencie a:usually 2600 Hertz
frequencie b:usually 2400 Hertz
lenght : 150ms (random lenght)
delay : 10ms

Frequencie n°2:
--------------------------
frequencie a:usually 2400 Hertz
frequencie b:usually 2400 Hertz
lenght : 300ms (random lenght)
delay : 10ms

Some goodies for frenchz now:
--------------------------------------------------

anyways, their is for the french phreakers that old coloumbia local bluebox.. (only call drugs sellers in bogotta and
others doodz in columbia ONLY)

Number :
---------------
0800909000 (old 05909000)

Frequencie n°1:
--------------------------
frequencie a:usually 2650 Hertz
frequencie b:usually 2350 Hertz
lenght : 170ms
delay : 10ms

Frequencie n°2:
--------------------------
frequencie a:usually 2450 Hertz
frequencie b:usually 2350 Hertz
lenght : 320ms
delay : 10ms

interest
------------
well find a friend or a local provider in columbia, really clean line.. its an inexistant number in
columbia (el numero no es blahblah..)

and well there is another local one if u want to call a little dude in malaysia in normal 2600 2400 for the first
frequencie.

Number :
---------------
0800909140 (old 05909040)

Frequencie n°1:
--------------------------
frequencie a:usually 2600 Hertz
frequencie b:usually 2400 Hertz
lenght : 170ms
delay : 10ms

Frequencie n°2:
--------------------------
frequencie a:usually 2450 Hertz
frequencie b:usually 2350 Hertz
lenght : 320ms
delay : 10ms

interest
------------
well find a friend or a local provider in columbia, clean line.. operator answers.

Warning:
---------------

Don't bluebox too much , remember NHP/HI (great dude) in besançon city who got busted for month agos for
blueboxing and carding.(for french : but well anyways if u want to bluebox, scan 0800906000 to 0800909999 number,
its like a bunch of foreign lame countries operators, nonexistant , busy , carding, vmb numbers.) , beforer thoses ones,
its "
industrialized countries" like USA , Britain or others..


Well another method is the use of PBX :
-----------------------------------------------------------------

It is the thing i use mostly now, bluebox is not really secure i think and i really prefer using thoses little lame thing
(in france) with only a little 4 digits password.
like that one 0800901234 (easy to remember eh?) , a foreign country PBX with only 4 digits.. only 10 000 attempts and
u'll find it.. it doesnt have fake tones or shit.. protection level : 0.
scanning method..well easy as HELL:

ATDT 0800901234,,,0000,,3336431515 to ATDT 0800901234,,,9999,,3336431515
-------------------- ------- -------------------- --------
\ \ \ \
PBX number Scan is french number end of
begining to call and to see scanning
if the passwd works

ATDT is the Dial Tone prefix for compatible Hayes modems.
well easy to script or to programm is u have some skills of course.. i YOU don't have any skill .. well
OR learn programming , lame scripting
OR use ure favorite fone and dial 0800901234 , wait 6 seconds, dial 0000 wait 4 seconds, dial 3336431515
TO
dial 0800901234 , wait 6 seconds, dial 9999 wait 4 seconds, dial 3336431515

Well another method is the use of Calling Card (YUCK):
-----------------------------------------------------------------------------------------

Uhm.. if you use windows95, if you use Compudaze or AoHell.. i guess u have the correct iq (25) to use that method
calling card.. well i dont have to talk a lot about that.. its easy as hell..
1st step: go in a WAREZ channel and ask for it (dont go in #phreak because you will get banned)
2nd step: dial your favorite ATT or France Telecom operator
3rd step: a) get an american voice if u are french and say:
------------------------------------------------------------------------------
"
Hello i would like an international call"
- Card Number Please?
Dial on your phone pad or tell it "
My card number is blahblahblah"
- Phone number to call?
"
i want to call 33 36431515" and then prepare your modem with an ATD to connect the french teletel
network and prepare to play on ure favorite lame game servers on it (mud in 1200 bauds, imagines yuck).
(Dangerous, if u are suspected on the server you are to fraud, the system operator will call
0800361415 and tells that someone is frauding on his server your id on his server )

b) you use a France telecom paster card.
------------------------------------------------------------------
its only a device, dial your card digits and the number to call without the 33 if its in France cause u are damn
calling local in france (Really dangerous, get busted if you dont do it from a Payfone)


Well for easy use, only that method for you lazy people,next time i'll talk about some methods for experienced people
i guess.. write me and ask me questions in memor@mygale.org

memor [HBS]

-----=====[ C Tutorials: Introduction to C ]=====----------------------------

Well here it is. My Attempt to help people learn programming in C.
Thanks to Scud-O I will be releaseing a new tutorial in each issue of THTJ.
If you already know C then this first tutorial will not be much help to you,
I plan on starting off with the very basics and I assume the reader has no
current knowledge of the C language.

First some basic things. You need to understand that you are not
going to be able to write Windows programs by reading this, and there is
no quick way to it. Windows programming is not easy and you will *not* find
a quick guide to it. All the applications you learn to write thru this will
be text-mode. Depending on how long I keep releaseing tutorials thru THTJ
things will pick up the pace. You also need to know that what I tell you here
is no different then what you would find in a beginners guide to C book. What
is the main differnce then? Well

  
from me it is free and if you want to go
buy a book it about 50 dollars. Also you can communicate with me. Any
questions you have you can always e-mail me and I will help you out.

Also if I refer to certain compiler I will be refering to Microsoft
Visual C++, because this is the compiler I use. It really doesn't matter tho
because I have used Borland C++ and there is basically no differnce accept
for certain options.

When you write a program it always starts out with the source. You
open up your editor and write the source for the program. The source is what
tells your program what you want it to do. The traditional first c program
is usually hello.c, well here is my version of it... fuckyou.c

#include <stdio.h>

void main()
{
printf("Fuck you, world!@!\n");
}


Now what does all that do? I will explain that in a moment. First off just
write that in you editor. And go to build and you should see the following:

--------------------Configuration: fuckyou - Win32 Debug--------------------
Compiling...
fuckyou.c
Linking...
fuckyou.exe - 0 error(s), 0 warning(s)

Pretty easy huh? Now on to the next step. Compiling the program. Go to compile
and you will see the following:

--------------------Configuration: fuckyou - Win32 Debug--------------------
Compiling...
fuckyou.c
fuckyou.obj - 0 error(s), 0 warning(s)

Now you have done it. Your first program. All this program does is it will
open up a DOS window and print the words "Fuck you, world!@!" If you didn't
get this then you most likely messed up the source somewhere. That is no
problem tho. Suppose you left out the ; after \n"). Then you would get
this as the result of compiling:

--------------------Configuration: fuckyou - Win32 Debug--------------------
Compiling...
fuckyou.c
C:\Windows\Desktop\fuckyou.c(6) : error C2143: syntax error : missing ';' before '}'
Error executing cl.exe.
fuckyou.obj - 1 error(s), 0 warning(s)

The compiler tells you where the error is. [C:\Windows\Desktop\fuckyou.c(6)]
The (6) tells you that the error occured on line 6 of the program. And it tells
you what the error is, missing ';' before '}'. So all you do is go back to
the source and insert ; where it belongs in the source and try again. This time
it should work.

So now back to the original source..

#include <stdio.h>

void main()
{
printf("
Fuck you, world!@!\n");
}

What does all this mean? Well I am just gonna put what each part means in the
order they occur:

#include - This is what tells the compiler to include another file along with
your source.

<stdio.h> - This is the included file with the program you just wrote. The
file stdio.h has standard input/output commands that most programs need.

void main - This has two parts. Void identified the type of function and what
it produces. This would be main, and since main does not produce anything in
this program you have void.

() - Right now this doesn't matter. Just know that you do it. You occasionaly
may have something in them but not now.

You then have {. Everything between the first { bracket and the last } bracket
is a function. The {} show that everything between them is a function of main().

printf - This tells the program what to do. This is also one of the reasons
you need to include stdio.h with this program. With out it the compiler does
not understand printf.

After printf you have a string (the text you wrote) include in parentheses.
When you want to print words on the screen you will use the following:
("
Blah blah blah \n") The \n is just showing its the end of the string and
that you start a new line after that.

The whole line ends with ; which tells the compiler that the statement ends.
Then you finish the whole thing off with the last } bracket.

So there you have it. Like I said this first one was going to be very
basic but in following issues of THTJ I plan to move along faster and not
get very technical with things you don't really need to know. But this is
it for now.

- Fucking Hostile (fh@sinnerz.com)

_____________________________________________________________
Oddville, THTJ - From the Mailboxes of Scud-O

Ok, I think it is time for you all to read some of the lame ass and
wierd ass mail i get from month to month. Anyway, all names have been changed
to hide the lame ass or crazy ass people. However, next month, if you send
ANY lame mail to my old address i will post your name, since my old address is
no longer for h/p mail, use scud@thtj.com for h/p mail.
My replies are inside the brackets.

---

Subject:
Starting a elite realm
Date:
Fri, 4 Jul 97 20:04:13 +0000
From:
xxx xxxxxx <xxxxxxx@xxxx.net>
To:
my old e-mail address


Hey. My name is Xxx Xxxxxx and I am a Anarchist/Hacker/Phreaker
and was wondering if you guys would like to start a club,a realm of
Anarchists,hackers,phreakers,crackers and such if you will.The wanna be
members would fill out a form and we would review it and then decide to
let them in or not.If you agree to what I am proposing I would gladly be
the Memebership reviwer and a hard working memeber.Write Back Asap

[ five minutes of uncontrolable laughter... ]

[ One word : NO. Gee i just love this 'great' idea of yours. First of, i have
no fucking clue who you are, and 2, i told people to leave my old e-mail the
fuck alone! ]

---

Subject:
[Fwd: Shotgun rules]
Date:
Wed, 2 Jul 97 22:19:53 +0000
From:
psych0

just passing stuff along.....
for reference, section II, #6... all i have to say is: "
jabba"

-psych0
----------------------------


Subject:
Shotgun rules
Date:
Wed, 2 Jul 97 08:20:15 +0000
From:
disantis@fr.com
To:
comedy@fatboy.geog.unsw.edu.au


The rules listed below apply to the calling of Shotgun (the passenger seat) in
an automobile. These rules are definitive and binding.

Section I
The Basic Rules

1. In order to call Shotgun, the caller must pronounce the word "
Shotgun" in a
clear voice. This call must be heard and acknowledged by the driver. The other
occupants of the vehicle need not hear the call as long as the driver verifies
the call.

2. Shotgun may only be called if all occupants of the vehicle are outside and
on the way to said vehicle.

3. Early calls are strictly prohibited. Shotgun may only be called while
walking toward the vehicle and only applies to the drive immediately
forthcoming. Shotgun can never be called while inside a vehicle or
stilltechnically on the way to the first location. For example, one can not get
out of a vehicle and call Shotgun for the return journey.

4. The driver has final say in all ties and disputes. The driver has the right
to suspend or remove all shotgun privileges from one or more persons.


Section II
Special Cases

These special exceptions to the rules above should be considered in the order
presented; the case listed first will take precedence over any of the cases
beneath it, when applicable.

1. In the instance that the normal driver of a vehicle is drunk or otherwise
unable to perform their duties as driver, then he/she is automatically given
Shotgun.

2. If the instance that the person who actually owns the vehicle is not
driving, then he/she is automatically given Shotgun, unless they decline.

3. In the instance the the driver's spouse, lover, partner, or hired prostitute
for the evening is going to accompany the group, he/she is automatically given
Shotgun, unless they decline.

4. In the instance that one of the passengers may become so ill during the
course of the journey that the other occupants feel he/she will toss their
cookies, then the ill person should be given Shotgun to make appropriate use of
the window.

5. In the instance that only one person knows how to get to a given location
and this person is not the driver, then as the designated navigator for the
group they automatically get Shotgun, unless they decline.

6. In the instance that one of the occupants is too wide or tall to fit
comfortably in the back seat, then the driver may show mercy and award Shotgun
to the genetic misfit. Alternatively, the driver and other passengers may
continually taunt the poor fellow as they make a three hour trip with him
crammed in the back.


Section III
The Survival of the Fittest Rule

1. If the driver so wishes, he/she may institute the Survival of the Fittest
Rule on the process of calling Shotgun. In this case all rules, excepting I-4,
are suspended and the passenger seat is occupied by whoever can take it by
force.

2. The driver must announce the institution of the Survival of the Fittest Rule
with reasonable warning to all passengers. This clause reduces the amount of
blood lost by passengers and the damage done to the vehicle.

Please follow the above rules to the best of your ability. If there are any
arguments or exceptions not covered in these rules, please refer to rule I-4.

-----------------------------------------------------------------------------

END OF ARTICLE
**************

To join the comedy list, send the command:

subscribe comedy

in the body of a message to "
majordomo@fatboy.geog.unsw.edu.au".

[ Im not sure why i posted this, but who cares, its pretty funny. ]

---

Subject:
Proggie
Date:
Sat, 28 Jun 97 02:46:56 +0000
From:
XxxxXxxx@aol.com
To:
my old e-mail address


hey i have a question
do you have any proggies or programs that actually tos someone off
line....the reason i ask is because soemone tossed me and i want that program
if you have on. What happed was he IMed me very fast and it made aol mess
up! Can you send that program to me?

Please
Xxxxx

[ Look, im not going to waste my time looking for some program for you, and
i do not have any icmp or other type of nuking programs on my hard drive. go
do a search on yahoo or lycos or something. and, you might not get tossed off
line so much if you got off of aol. ]
---

Subject:
http://www.sinnerz.com/scud-o/ [ <- old address, thtj.com now ]
Date:
Tue, 24 Jun 97 01:57:46 +0000
From:
xxxxxxx@xxxxxxx.xxxxxxx.xx
To:
my old e-mail


wondering how to subscribe your zine

[Ok, this is for you and the countless others who have asked for info on how
to subscribe, go to http://www.thtj.com in a few days, and scroll down to the
form that should be up and enter your e-mail address this will add you to the
majordomo e-mail list, if my hosting server ever decides to set up the
majordomo. if there is no form, there should be instructions next to the
picture of the guy with the coffee maker in his car. ]
---

Subject:
THTJ
Date:
Sun, 22 Jun 97 13:04:46 +0000
From:
"
xxxxxx xxxxxx" <xxxxxxxx@xxxxxxx.com>
To:
old e-mail address


Scud-O

Just thought i'd drop you a line and say how great THTJ is.
I've read every edition and spent many a happy hour playing with toys.
Keep up the good work :)

BTW What's the deadline for submitting articles for each issue?

Do you have any cool contacts in the UK?

[ Ok, once again, for you and all the people who have asked, the deadline for
aritcles for each issue, is around the 23rd to the 25th of each month, and the
issue will be released on the 1st of the folling month. We do like to get
articles in ASAP, so send it in when it is done, and we will add it in right
away. ]

---
From: xxxxxxxxxxxxxxxxxxx
To : hellcore@juno.com
Sup:


Where can I find your tech. manuals?

bye

[ Once again, to the number of people who have asked me, hellcore is not going
to publish any manuals for a LONG time, since we are so damn busy with thtj.
so quit bugging me! ]


---
From: xxxxxx@aol.com
To: hellcore@juno.com

do u have the password for havoc

[ What the FUCK? ]

---------------
Well this is it for this month's installment of Oddville, THTJ , which is
in no way related to Oddville, MTV.
---------------
----------------------------------------------
--------------
--=[The News]=--
Compiled & edited by KungFuFox
--------------

1 : Bellcore signs MOU with World Communication Group to explore...
2 : AT&T CEO to argue merits of Baby Bell tie-up
3 : U S West pulls high-speed, low-cost service, angers ISPs...
4 : AOL "
Snoops On Members' Privacy"
5 : Netscape bug illustrates risky world of Net security
6 : Netscape fixes flaw, foils blackmail threat
7 : McNealy Injects Java With $150 Million
8 : NTT Gets Carved Up Into Three Carriers
9 : Spy Agency Wants To Sell Advice
10: Hacker Vows 'Terror' for Child Pornographers
11: The Ultimate Caller ID
12: Poll: U.S. hiding knowledge of aliens
13: Computer group unites to break computer code But it took 4 months
14: Senate Votes to Outlaw Bomb-Making Info
15: AT&T, Baby Bell Knot "
Unthinkable"
16: Hackers' Dark Side Gets Even Darker

Serpentor (rlb@ts60-06.tor.iSTAR.ca) has joined #phreak
<Serpentor> Is it true that all teenagers who use irc
regularly are virgins who can't get laid
<Serpentor> Well, stud that I am, I often find it
necessary to go for months, no, years, without a date
or even talking to girl - but instead choosing to sit
at a computer screen 18 hours a day - my head growing
out of my neck at a 90 degree angle, personal hygiene
and a social life sacrificed for the purpose of finding
somem new pbx's.
<Serpentor> But other than that I women basically
consider me to be a sex symbol.
[#phreak - home of the studliest guys on IRC!]
_____________________________________________________________

Bellcore signs MOU with World Communication Group to explore wireless local
loop opportunities in China
June 9, 1997

SINGAPORE -- Bellcore International and World Communication Group announced
today that they signed a Memorandum Of Understanding (MOU) to explore the
possibilities of deploying wireless local loop and mobility networks
throughout China. The two companies announced this during Asia Telecom 1997.

Under the terms of the memorandum, WCG would serve as system integrator and
general contractor. Bellcore would provide consulting services to WCG on a
variety of issues, including planning and engineering, integration testing
and training. Bellcore would also supply software products such as mobility
and network management products.

"
We have every expectation that Wireless Local Loop (WLL) service and
technology will help meet unmet demand for telephone services throughout
China," said Peter Wang, WCG's president and CEO. This MOU with Bellcore, a
world-class provider of communications software with in-depth network
knowledge, is a very important first step. Now we look forward to increasing
the number of signed agreements with hardware suppliers and winning numerous
new deployment contracts.

At the basis of the memorandum is Personal Access Communications System, or
PACS, an outgrowth of Bellcore Technologies. PACS services are a low-cost,
wireline-quality alternative to conventional wireless services. They are
particularly well-suited to densely populated areas, such as urban and
suburban environments.

"
We believe our MOU with WCG marks a great beginning," said Kevin Connolly,
president of Bellcore International. "
Our wireless telecommunications
software and consulting expertise is complemented by WCG's system integration
strengths, on the ground sales, service and engineering staff, and track
record in China. We're excited about working with them to make PACS WLL and
mobility services available in China, arguably the world's largest potential
telecom market."

Bellcore International is a wholly owned subsidiary of Bellcore. Bellcore,
based in Morristown, New Jersey, USA, is a leading provider of communications
software, engineering and consulting services based on world-class research.
Bellcore provides business solutions that help information technology work
for telecommunications carriers, businesses and governments worldwide. On
November 21, 1996 SAIC (Science Applications International Corporation)
announced it had agreed to purchase Bellcore when the requisite regulatory
approvals had been obtained. More information about Bellcore is available on
the Web at www.bellcore.com.

WCG is a fast growing wireless telecommunication company headquartered in
Hazlet, New Jersey. It is a leading distributor of wireless telephony (fixed
wireless) equipment and also a major service provider in China. The majority
of its products and services focus on wireless local loop technology and
wireless payphones.

©Business Wire
_____________________________________________________________

AT&T CEO to argue merits of Baby Bell tie-up
June 9, 1997
By Eric Auchard

NEW YORK (Reuter) - AT&T Corp Chairman Robert Allen plans to defend a
possible merger between AT&T and a Baby Bell local phone carrier in a
luncheon speech Tuesday before an exeuctive group in Boston, the company
said.

An AT&T spokeswoman said Allen's comments on such a potential merger will be
"
hypothetical" and that he will not comment on recent media reports that AT&T
is in talks to merge with SBC Communications Inc., a leading U.S. Baby Bell.

Sources familiar with those talks have confirmed that the two companies have
been holding substantive talks in recent months on a combination that could
be valued at more than $50 billion, in what would be the largest merger in
history.

Both companies have declined to comment on the reports.

A union of SBC and AT&T would combine a mighty provider of local phone
services with the nation's leading long-distance powerhouse in the first such
merger since the 1982 federal order breaking apart the Bell phone system
monopoly.

Allen is set to deliver the speech before the Chief Executives Club at the
Boston Harbor Hotel.

He will discuss the pros and cons that a merger with a regional local phone
operator might give AT&T, the spokeswoman said.

Among the questions he will address are whether there is any way in which a
merger could be in keeping with the spirit of recent efforts to deregulate
the phone industry, and the U.S. Telecommunications Act of 1996 in
particular, she said.

He will confront widespread antitrust concerns such a mega-merger might raise
by arguing that a combination with a regional Bell company could actually act
to spur greater competition in U.S. telecommunication markets, she said.

"
Is such a hypothetical merger that unthinkable? Is there any way in which
it could actually function to spur local competition?" the spokeswoman said,
referring to topics to be raised by Allen in his speech.

"
The main thing will be to firmly reiterate our commitment to competition
and set the record staight on that," she said. "He certainly is going to
address how significant we consider entry into the local service market."

Jeffrey Kagan, an industry analyst based in Atlanta, speculated, "
Tomorrow
will probably be an effort to soften the criticism that reports of AT&T's
merger talks with SBC have inspired."

Critics have argued an AT&T merger would delay the advent of increased
competition in local U.S. phone markets and note that SBC retains
near-monopoly status in seven states in the Southern, central and Western
United States, including the region served by SBC's recently acquired Pacific
Telesis Group unit.

"
Everybody is thinking of every reason why it can't happen," Kagan said of
the initial public reaction to AT&T's reported merger talks. "
Allen will
argue everything that could possibly go right with such a merger."

He said Allen may sketch a potential plan to open up local phone markets to
competition by splitting Baby Bell operators into separate wholesale and
retail operations.

The wholesale unit would then sell its services to both competitors and to a
combined AT&T-Baby Bell local service retail operation, Kagan said.

The plan would be designed to answer U.S. regulators' concerns that the
market be "
irreversibly open" to competition before Baby Bells are allowed
into the U.S. long-distance phone market, he said.

©Reuters Ltd. All rights reserved.
_____________________________________________________________

U S West pulls high-speed, low-cost service, angers ISPs, according to
'Inter@ctive Week'
June 6, 1997

GARDEN CITY, N.Y. -- U S West Communications, the $13 billion communications
giant, is discontinuing a service that allows competing telephone companies
and Internet service providers to offer high-speed services at low prices,
according to a story posted on the Website of Inter@ctive Week.

The move is drawing the ire of the Internet community.

U S West, which does business in 14 Great Plains and Pacific Northwest
states, has stoped leasing "
dry copper" lines in seven or eight of its
states, and is working to pull the plug in its remaining service areas,
according to the Inter@ctive Week report.

Dry copper lines -- also known as Local Area Data Service, or LADS -- are
standard twisted pair copper lines that are in place but aren't hooked up to
provide telephone service. The lines, which use a low-powered signal are used
for such things as security alarms and are relatively cheap to lease from U S
West -- as low as $20 per month.

In recent months, however, Internet service providers, or ISPs, and
competitive local exchange carriers, or CLECs, have bought dry copper lines
to resell to business customers equipped with Digital Subscriber Line, or
xDSL, modems, devices that allow for fast Internet access.

By cutting off the low-cost resale of dry copper lines, however, U S West
effectively cuts off competitive provision of xDSL service at prices below
what the telephone company wants to charge. U S West's Interprise Networking
Services group, meanwhile, is slated to offer its own xDSL service this
summer.

Ray Guadia, director of AZAP Inc., a Las Vegas-based company that specializes
in secure store and forward data transfers sees the move as an effort by U S
West to protect artificially high prices for other services, such as its T-1
service at 1.5 Mbps.

"
It is not in the telcos' advantage to allow that wide bandwidth access under
the 1996 telecommunications law because customers who are currently leasing
(dedicated) T-1 for $2,000 can lease (dry copper) T-1 lines for under $100 a
month, literally hundreds of millions of profits can switch from the telcos
to the business community at large," Guadia told Inter@ctive Week.

U S West said, however, that it's concerned about network degradation because
these dry copper connections weren't intended to support high-speed services.

XDSL signals can disrupt other services, when wires carrying both sets of
service are bundled together within the telephone network.

"
The (dry copper connections) were intended to be just a signaling channel,
like burglar alarm companies use," said Jeremy Story, spokesman for the U S
West Interprise Networking Services group. "
Essentially ISPs have latched on
to this to create their own circuits and are providing (lots of) bandwidth
across them. What that's doing is messing up the network," he said.

Having high-bandwidth connections ruining in two directions within a central
switching office results in what is known as cross-talk, said Joe Glynn,
director of product marketing for megabit services, including xDSL services,
at Interprise.

Cross talk is caused by electromagnetic fields surrounding xDSL circuits that
causes degradation on nearby cable bundles, he said.

U S West is grandfathering in existing companies that are using the copper
connections for high-bandwidth services. But that's a very limited group at
this time, Story said.

Inter@ctive Week, with a circulation of 100,000 is the leading publication
for the Internet-involved business professional. Inter@ctive Week is
published by Inter@ctive Enterprises LLC.

©Business Wire.
_____________________________________________________________

AOL "
Snoops On Members' Privacy"
06/09/97
By David Braun, TechInvestor

WASHINGTON – America Online snoops into its subscribers’ incomes and details
of their children, selling the information aggressively through a broker to
third parties, a consumer watchdog group charged Monday.

At a press conference to coincide with this week’s hearings by the Federal
Trade Commission on online privacy issues, the editor of Privacy Times, Evan
Hendricks, said he had spoken to at least 10 members of AOL, "
and not one of
them was aware this could be happening to them."

While AOL users may be in the dark, the company has made it quite clear to
investors that it expects to market its members. And AOL shares have surged
recently on stronger-than-expected earnings and speculation that the company
would be announcing more marketing deals to profit from its members.

Hendricks published a front-page article in the latest edition of Privacy
Times which said Reston, Va.-based AOL had turned to traditional direct
marketing techniques to learn about its 8 million subscribers’ incomes,
length of residence, age and children.

"
Then it aggressively sells its subscriber list through a broker, which can
break it out into various segments."

Consequently, Hendricks added, AOL members increasingly are targeted by junk
mailers. "
The practices raise questions about the adequacy of notice that AOL
provides its members about marketing practices."

Privacy Times quoted AOL spokesperson Tricia Primrose saying the online
service provider was not willing to give details of how much money the
company made selling members’ lists.

Hendricks said AOL recently put on the market a specialized list of 1.4
million AOL members who purchase books, CD Roms, software games, AOL apparel
from the AOL Store, direct mail and marketing. "
The vast majority of AOL
members on this specialized list are married with children living at home,
are between the ages of 35-54, own their home, have income over $55,000, are
at their home addresses and are credit worthy – over 90 percent pay by credit
card," he said.

The lists, which are said to be selling well, go for $110 per thousand names.
They are marketed through a company called List Services Corp.

Primrose said Monday she would comment later on Hendricks’ allegations.

AOL members interested in learning about the company’s list practices are
told to enter "
marketing preferences" into a key-word search. The company
tells members it "
occasionally makes our membership list available to select,
reputable companies whose products and services may be of interest to you AOL
carefully screens all offers to its mailing list to ensure they are
appropriate." Members are invited to list hobbies and interests they can
check-off so they can receive information about those interests. According to
Hendricks, none of the lists sold by List Services Corp. referenced the 15
hobbies and interests on AOL’s marketing preferences screen.

Hendricks said personal details, such as income levels and information about
children, are added to AOL’s profiles by means of marketing research.

AOL members are given the option to check a box on the marketing preferences
screen to request that they do not receive any junk mail.

©CMP Media, 1996.
_____________________________________________________________

Netscape bug illustrates risky world of Net security
June 15, 1997
BY DAVID L. WILSON
Mercury News Staff Writer

Fifteen-year-old Tim Howe of Milpitas did millions of Internet users a favor
in March when he identified a security hole in Microsoft's Internet Explorer
Web browser, a flaw that might have let outsiders view data on someone
else's computer. He says he had trouble getting the software giant to take
him seriously, but eventually Microsoft agreed there was a problem.

"
I was hoping for maybe a thank you," the 10th grader said, laughing, "but
at least they fixed it, and that was the point."

It's the point for a legion of Internet bug finders these days. They range
from self-taught youngsters to computer science professionals. Howe worked
solo, and didn't spend a great deal of time looking for the bug. Others work
in teams, sometimes knowing teammates only by code names, and devote many of
their waking hours to the task. And among the teams, some have malevolent
aims.

The bug finders' work matters because your electronic privacy matters, as was
made clear again last week with the discovery of a bug in the Netscape
browser. Computer security is a growing issue as more and more of our
computers become connected via networks. Bugs that leave security holes in
Internet software can be a threat to data on all kinds of computers,
including the ones at home.

Competitive pressures, meanwhile, have led software developers to push their
products out the door sooner than ever. There have always been bugs in
software, but the rush to market has made them more common, experts say. In
addition, today's programs are much larger, with more capabilities, and are
therefore more likely to conflict with each other in ways that cause
problems.

Like many bug finders, Howe went immediately to the company with his
findings. But some bug-hunting teams first share their findings via the Net,
banding together to explore the severity of the problem and to cobble
together a solution. They are hackers in the original sense of the word,
exploring and testing new systems just for fun. Some people, including
Eugene H. Spafford, associate professor of computer science at Purdue
University, call those who work to repair computer security holes the
"
White Hats."

Also looking for bugs -- but in ways that Spafford and other experts find
alarming -- are more malevolent hackers, known as "
crackers" or "Black
Hats." They don't want to plug the security holes, however. They want to use
those bugs to snoop, spy, steal and often harass. (The precise definition of
"
hacker" or "cracker" depends largely on who's using the terms; many
crackers insist they're hackers.)


Formality shunned

In keeping with the anarchic nature of the Net itself, the White Hats have
no formal organization. They shun the semi-official Internet security system
that revolves about the Computer Emergency Response Team Coordination
Center, based at Carnegie Mellon University in Pittsburgh.

The White Hats and security teams are often in direct conflict, with the
official teams trying to keep a lid on knowledge about bugs until a fix is
available. At the same time, the White Hats publicly pool their knowledge,
racing to stay ahead of the Black Hats who, they assume, have as much
information as they do.

Black Hats and White Hats -- the crackers and the hackers -- both win status
points from peers for solving tough problems, and enjoy the intellectual
challenges presented by computer security. But White Hats work on security
problems to make the Net a little safer for everyone, including themselves.

White Hats and Black Hats rarely engage in the work for direct monetary
profit, however, and that's one of the things that made last week's incident
with Netscape Communications Corp. so unusual. In that case, a man who
appears to represent a Danish computer consulting company called Cabocomm
told Netscape that he wanted a large payment or else he would distribute the
information publicly, with obvious risks to the company's stock price.


Question of reward

The consultant said Netscape's $1,000 bounty for significant bugs wasn't
close to what the information was worth; most other companies provide
something like a T-shirt for such information.

Netscape announced last week that it had developed a patch for the problem
itself.

Offering money for bug discoveries has drawn contempt from some hackers.

"
We had a standing offer of $10,000 to anybody who could break into our
site, but we stopped offering money when people in the community told us it
was insulting," said Brett Nelson, firewalls product marketing manager for
Secure Computing Corp., a computer security company with headquarters in
Roseville, Minn. "
Now we just offer things like nice leather jackets."

Nelson said no one has successfully broken into the site, and he calls the
Netscape incident unusual.

"
To a certain degree, what happened with Netscape -- you pay me what I want,
or I hurt you -- is extortion, and right now it's not extremely common," he
said. "
But if somebody like Netscape caved in, I think it could become
common."

Already common are concerted efforts to test security systems by hackers and
crackers alike. At any time, on any computer system, the odds are good that
software written by the "
intruder community," as law enforcement calls it,
is probing for unplugged holes.

If a vulnerable computer is found, word quickly spreads throughout the Black
Hat community, whose members then rifle through files for anything useful.
They sometimes use the machine to hide data, but nearly always use it as a
jumping-off point to stage more attacks and better conceal their identities.


Shared solutions

The White Hats also constantly run such software through the paces, and
whenever anybody finds something troubling, they post it to one of many
electronic mailing lists or bulletin boards that deal with the topic. Other
list members study the bug and try to re-create it on different systems.
Then they proffer temporary solutions while working on more permanent fixes.

One of the most respected security mailing lists is BUGTRAQ, administered by
a man whose nom de guerre is Aleph One. He says his real name is Elias Levy,
and that he is a computer security expert employed by a major Silicon Valley
company. (Levy agreed to an interview on condition that his company remain
unnamed.)

Levy doesn't get paid for administering the list, which can suck up free time
the way a black hole sucks in light. "
If we didn't do this, you'd never see
fixes for problems, because only the bad guys would know about them," he
said.

Levy and others deride the concept of not telling people about bugs until
you've got a fix for them -- a policy they call "
security through
obscurity." It doesn't work because the intruder community already knows
about the flaws, they insist.

Many members of the teams that don't announce bugs before fixes acknowledge
the system's potential flaws. "
I can see both sides to it," said William J.
Orvis, a member of the U.S. Energy Department's Computer Incident Advisory
Capability, which, along with the other nearly 60 members of the
international Forum of Incident Security Response Teams, keeps its lips
zipped about problems until finding a solution.


`A hard call'

"
I would love to involve everybody in the process, on the assumption that
the bad guys already know about it, but the wannabes might not know about
it," he said. "This is a hard call to make, but we don't put out a
bulletin until we have a fix."

A member of another security team, commenting on condition of anonymity, said
this policy has won reasonably good cooperation from some major software
vendors who know that their product lines won't be damaged by a public
announcement of a security problem with no solution.

"
But some of these companies have had significant problems with their
products for years, and have made no attempt to patch them," said the team
member. "
Oftentimes, the only way to get these guys to act is when something
gets publicized."

In that sense, the official security community and the unofficial White Hat
community work with each other. Often, the mailing lists identify a problem,
and the security teams -- members read the lists religiously -- squeeze the
software vendor to build a patch. And many corporate computer security
administrators wait for an official release from a security team before using
a fix the White Hats have created.

There's not likely to be any lack of work for members of either group any
time soon.

"
The bad guys are just looking for a machine to break into," said Orvis.
"
They don't care what's in the machine. If you've got 1,000 computers
connected to the Internet, it's a good bet that somebody is banging on your
door daily."

©1997 San Joes Mercury News
_____________________________________________________________

Netscape fixes flaw, foils blackmail threat
June 14, 1997
BY TOM QUINLAN
Mercury News Staff Writer

A trans-Atlantic cyber scandal reached a rapid resolution Friday as Netscape
Communications Corp. said it had fixed a serious security problem in its
widely used Internet browser products, thus ending the get-rich-quick scheme
of the Danish computer consultant who had notified Netscape of the problem
and sought a reward.

The Mountain View company plans to post early next week the solution for the
browser bug -- which in rare cases would let a Web site operator grab files
stored on a personal computer.

The company said that, after testing the solution, it will first post to its
Web site the fix for Netscape Communicator, its newest browser. Software
fixes for Netscape Navigator's 2.0 and 3.0 series, which represent the
overwhelming majority of current Netscape users, will be posted "
shortly
thereafter," a spokeswoman said, although no specific time frame was given.

The bug affects all systems supported by Netscape's browsers, including
computers running the Windows, Macintosh and Unix operating systems.

Although software glitches are common, the Netscape bug drew attention
because of the way it unfolded late Thursday, with Netscape characterizing
the Danish company as behaving outrageously in its efforts to extract a big
payment rather than cooperate in fixing the flaw.

In e-mail correspondence, the consulting company told Netscape, using
increasingly threatening tones, that it would publicly reveal the flaw's
existence if Netscape didn't pay more than its standard $1,000 bounty to bug
finders.

The Danish outfit -- identified as Cabocomm and represented by Christian
Orellana in e-mail exchanges obtained Friday from Netscape -- did indeed
arrange for media coverage Thursday, at the time Netscape was holding its
developer conference in San Jose and was preparing for the imminent shipment
of Communicator.

The messages to Netscape began several days ago, with Orellana at first
seeming exasperated that he hadn't received a response and then asking for
unspecified but significant amounts of money. Early on, providing only a
bare-bones description of the flaw, Orellana asked that Netscape respond by
the time of the developers' conference.

"
I think the person most suited for handling this is somebody in charge of
the company checkbook," Orellana wrote.

In later messages, Orellana informed Netscape that he was prepared to release
the information to news organizations if the two companies could not reach an
agreement.

After detailing the effects of the bug, "
...I think all pre-Communicator
versions of Navigator... would be pretty worthless," Orellana said. "I'll
leave it to you to estimate what impact that would have on Netscape stocks."

Cable News Network's vehicle for financial news, CNNfn, and PC Magazine both
reported the problem Thursday, and Netscape's stock dropped Friday, by $1.06
to $32.25.

During the week, senior engineers and programmers at Netscape talked to
Cabocomm engineers in an effort to determine exactly what the problem was,
said company spokeswoman Jennifer O'Mahony. "
(Cabocomm) wasn't very
forthcoming," she said. "They felt if they said too much, they'd be giving
everything away."

While Netscape was talking with Cabocomm, a separate Netscape team of
programmers tried to track down the problem independently.

Although Netscape wouldn't identify details of the glitch Friday, or where in
the program it resided, "
in the end Cabocomm wasn't any help," O'Mahony
said. "
We ended up knowing a lot more about it than they did."

Efforts by the Mercury News to contact Orellana by telephone Friday were
unsuccessful.

Netscape said Friday it was determining whether it would seek legal action
against the Danish firm.

Although the idea of threatening to go public with the information could be
seen as a form of extortion under California's criminal code, extortion could
be a very difficult point to prove, said Alan Ruby, a San Jose attorney who
is a criminal law specialist.

"
It's a fine line, sometimes," Ruby said. "Things that corporations say
everyday in the course of normal business dealings sometimes come close. It
really depends on how something is said, and the context it's said in."

An increasing number of security breaches have come to light in recent
months, even as the Internet takes shape as a key global medium for business
and personal communications. Financial transactions and other sensitive
information frequently travel across the Net.

In the case of the Netscape browser flaw, a person who was aware of it could
develop a Web site that could read files directly off a user's hard drive.
The Web site would have to know the exact name of the files it wanted to
read, as well as the location on the user's hard disk.

That's not as hard as it might appear because file names share a lot of
similar characteristics. Someone seeking to read those files would probably
be able to successfully guess file names, at least occasionally.

Netscape downplayed the seriousness of the flaw, pointing out that apparently
only one Web site had been created that took advantage of the bug, even
though the problem has been in Netscape's products for at least 17 months.
And Netscape was able to fix the problem in a matter of days after it learned
of it.

Microsoft Corp. recently acknowledged that Web-based applications written
with the two most popular Internet software development environments -- known
as Java and ActiveX -- can be written to damage or change information stored
on a user's computer, something that Java users had been told would be
impossible. Microsoft has said that all known problems in its Web browsing
software have been fixed.

Also, special software can read e-mail messages or determine what someone is
looking at on the Web if the data are flowing through certain cable modems,
which are expected to be one of the most commonly used ways for consumers to
surf the Internet.

©1997 San Jose Mercury News
_____________________________________________________________

McNealy Injects Java With $150 Million
06/13/97
By Malcolm Maclachlan, TechWire

SAN JOSE, Calif. -- Sun Microsystems CEO Scott McNealy is not known for
holding back his opinions. True to form, McNealy delivered some zingers
Friday on why Java is better than Windows.

Delivering the final keynote at the Netscape Developer Conference here,
McNealy attacked Microsoft on areas such as scalability and compatibility. He
also outlined a vision of the future in which Java is embedded in computers
from the mainframe down to the smart card.

"
When you hear the word `thin client,' you may think of this," he said,
pulling a smart card out of his wallet. "
See how thin this is? Now can you
imagine any Windows technology on a smart card? If you wanted to put it in
your wallet, you'd have to redesign every pair of trousers on the planet."

The tools exist today, he said, to embed Java in everyday items such as wrist
watches, which could then communicate the information to the level of
mainframes. The result, he said, could be a world in which a watch, with an
antennae in the hand, could act as a debit card, car key and airplane
boarding pass.

This is the kind of scalability Microsoft is still trying to reach, he said,
with its multiple versions of Windows, ranging from the handheld version, Win
CE, up to the server software, Win NT.

Sun is investing $150 million in R&D in Java in the next year, McNealy said.
Among these projects: a default Java user interface for NCs, PCs and other
devices; new chips that will make Java run faster; the new Java Developer Kit
1.2 Security Manager; and an Active X "
bridge" for encapsulating Active X
code into a Java-type bean.

McNealy pointed to his company's close relationship with Netscape
Communications, in Mountain View, Calif. Most of Netscape's Web hosting and
databases run on SunSoft's Solaris, he said, and the company uses 700 Sun
Stations. Sun, in the meantime, hosts numerous Netscape engineers working on
joint development.

This meeting of Netscape and the Solaris development offers the greatest hope
for open standards for Internet development, he said, and for continued
opportunities for small developers.

"
When is the last time you heard of a Windows start-up?," he asked. "Do a
Windows business plan, submit it to a venture capitalist and see if you get a
call back."

©CMP Media, 1996.
_____________________________________________________________

NTT Gets Carved Up Into Three Carriers
06/13/97
By Douglas Hayward, TechWire

TOKYO -- Japan's expensive and heavily regulated telecommunications market
came closer to U.S.-style competition Friday, when the Japanese parliament
passed legislation restructuring the country's dominant carrier, Nippon
Telegraph and Telephone.

The upper house of Japan's legislature gave final approval to a government
provision that will divide NTT into three carriers -- two regional companies
and an international carrier -- controlled by a single holding company. NTT,
which has sales of 8 trillion yen ($70 billion), will also be allowed to
compete in the international market for the first time.

Friday's passage of the law will put the company into direct competition with
KDD, Japan's dominant international carrier, in both international and
domestic markets. In return for NTT being allowed to compete in the
international market, KDD will be allowed to compete with the former
state-owned NTT when the law goes into effect, probably in late 1999.

KDD is said to be talking to regional Japanese utilities about plans to
establish a second national telecom infrastructure.

Japan's Ministry of Posts and Telecommunications said the reforms will
increase the competitiveness -- and reduce the costs -- of Japan's huge but
expensive telecom industry. The Japanese government said it is committed to
letting foreign telecom carriers -- such as AT&T -- enter the domestic
market, though legislation deregulating the Japanese market has not yet been
passed.

The new law and the planned deregulation measures would create "
a new era of
competition" in the Japanese telecom market, said Hisao Horinouchi, the
minister for posts and telecommunications.

©CMP Media, 1996.
_____________________________________________________________

Spy Agency Wants To Sell Advice
06/11/97
By Douglas Hayward, TechWire

LONDON -- The computer services arm of Britain's largest spy agency wants to
sell security advice to private utility companies facing hacking attacks
from terrorist organizations.

But utilities fearing imminent attacks from terrorist hackers will have to
wait for advice -- the British government has been pondering the proposal for
more than two years and has yet to give a date for any decision.

The Communications Electronic Security Group said it wants British government
officials to grant it the right to advise utilities -- such as electricity,
gas and telephone companies -- on defense against so-called "
information
warfare" attacks by terrorist groups.

Information warfare involves crippling military and civil information
networks in pursuit of political and military objectives. The group has the
right only to sell advice to government organizations.

"
Government systems are potential targets for information warfare attacks --
that is clear, and it's in our charter," said Tim Webb, head of policy in the
group, which is part of the giant Government Communications Headquarters
communications interception organization. Webb's public appearance Wednesday
at the "
Delivering Security To The Desktop" seminar here was one of the first
by an officer of the spy agency.

But, Webb added, the vulnerability of a nation does not lie in just
government systems. "
Recently the Irish Republican Army was attempting to
blow up all the [electricity] power sub-stations in London with explosives,"
he said. "
Another way to stop the power supply is to hack into the
appropriate computers and bring the whole lot down."

The computer group of the spy agency is responsible for the security of
British government networks. As part of its mission, it develops security
hardware and software, including encryption algorithms.

The Cabinet Office, the government unit that controls the civil service, is
considering whether to apply some of the group's knowledge about information
security to protect the national infrastructure, Webb said.

The desire to break into the utilities consulting market stems from reforms
introduced by the free-market Conservative government of John Major, under
which the agency was forced for the first time to sell its services to
government departments to generate operating revenues.

©CMP Media, 1996.
_____________________________________________________________

Hacker Vows 'Terror' for Child Pornographers
by Steve Silberman

2:32pm 13.Jun.97.PDT -- After 17 years in the hacker underground, Christian
Valor - well known among old-school hackers and phone phreaks as "
Se7en" -
was convinced that most of what gets written in the papers about computers
and hacking is sensationalistic jive. For years, Valor says, he sneered at
reports of the incidence of child pornography on the Net as
"
exaggerated/over-hyped/fearmongered/bullshit."

Now making his living as a lecturer on computer security, Se7en claims he
combed the Net for child pornography for eight weeks last year without
finding a single image.

That changed a couple of weeks ago, he says, when a JPEG mailed by an
anonymous prankster sent him on an odyssey through a different kind of
underground: IRC chat rooms with names like #littlegirlsex, ftp directories
crammed with filenames like 6yoanal.jpg and 8&dad.jpg, and newsgroups like
alt.binaries.pictures.erotica.pre-teen. The anonymous file, he says,
contained a "
very graphic" image of a girl "no older than 4 years old."

On 8 June, Se7en vowed on a hacker's mailing list to deliver a dose of
"
genuine hacker terror" to those who upload and distribute such images on the
Net. The debate over his methods has stirred up tough questions among his
peers about civil liberties, property rights, and the ethics of vigilante
justice.

A declaration of war

What Se7en tapped into, he says, was a "
very paranoid" network of traders of
preteen erotica. In his declaration of "
public war" - posted to a mailing
list devoted to an annual hacker's convention called DefCon - Se7en explains
that the protocol on most child-porn servers is to upload selections from
your own stash, in exchange for credits for more images.

What he saw on those servers made him physically sick, he says. "
For someone
who took a virtual tour of the kiddie-porn world for only one day," he
writes, "
I had the opportunity to fully max out an Iomega 100-MB Zip disc."

Se7en's plan to "
eradicate" child-porn traders from the Net is "advocating
malicious, destructive hacking against these people." He has enlisted the
expertise of two fellow hackers for the first wave of attacks, which are
under way.

Se7en feels confident that legal authorities will look the other way when the
victims of hacks are child pornographers - and he claims that a Secret
Service agent told him so explicitly. Referring to a command to wipe out a
hard drive by remote access, Se7en boasted, "
Who are they going to run to?
The police? 'They hacked my kiddie-porn server and rm -rf'd my computer!'
Right."

Se7en claims to have already "
taken down" a "major player" - an employee of
Southwestern Bell who Se7en says was "
posting ads all over the place." Se7en
told Wired News that he covertly watched the man's activities for days,
gathering evidence that he emailed to the president of Southwestern Bell.
Pseudonymous remailers like hotmail.com and juno.com, Se7en insists, provide
no security blanket for traders against hackers uncovering their true
identities by cracking server logs. Se7en admits the process of gaining
access to the logs is time consuming, however. Even with three hackers on the
case, it "
can take two or three days. We don't want to hit the wrong person."

A couple of days after submitting message headers and logs to the president
and network administrators of Southwestern Bell, Se7en says, he got a letter
saying the employee was "
no longer on the payroll."

The hacker search for acceptance

Se7en's declaration of war received support on the original mailing list. "
I
am all for freedom of speech/expression," wrote one poster, "but there are
some things that are just wrong.... I feel a certain moral obligation to the
human race to do my part in cleaning up the evil."

Federal crackdowns targeting child pornographers are ineffective, many
argued. In April, FBI director Louis Freeh testified to the Senate that the
bureau operation dubbed "
Innocent Images" had gathered the names of nearly
4,000 suspected child-porn traffickers into its database. Freeh admitted,
however, that only 83 of those cases resulted in convictions. (The Washington
Times reports that there have also been two suicides.)

The director's plan? Ask for more federal money to fight the "
dark side of
the Internet" - US$10 million.

Pitching in to assist the Feds just isn't the hacker way. As one poster to
the DefCon list put it, "
The government can't enforce laws on the Internet.
We all know that. We can enforce laws on the Internet. We all know that too."

The DefCon list was not a unanimous chorus of praise for Se7en's plan to give
the pornographers a taste of hacker terror, however. The most vocal dissenter
has been Declan McCullagh, Washington correspondent for the Netly News.
McCullagh is an outspoken champion of constitutional rights, and a former
hacker himself. He says he was disturbed by hackers on the list affirming the
validity of laws against child porn that he condemns as blatantly
unconstitutional.

"
Few people seem to realize that the long-standing federal child-porn law
outlawed pictures of dancing girls wearing leotards," McCullagh wrote -
alluding to the conviction of Stephen Knox, a graduate student sentenced to
five years in prison for possession of three videotapes of young girls in
bathing suits. The camera, the US attorney general pointed out, lingered on
the girls' genitals, though they remained clothed. "
The sexual implications
of certain modes of dress, posture, or movement may readily put the genitals
on exhibition in a lascivious manner, without revealing them in a nude
display," the Feds argued - and won.

It's decisions like Knox v. US, and a law criminalizing completely synthetic
digital images "
presented as" child porn, McCullagh says, that are making the
definition of child pornography unacceptably broad: a "
thought crime."

The menace of child porn is being exploited by "
censor-happy" legislators to
"
rein in this unruly cyberspace," McCullagh says. The rush to revile child
porn on the DefCon list, McCullagh told Wired News, reminded him of the
"
loyalty oaths" of the McCarthy era.

"
These are hackers in need of social acceptance," he says. "They've been
marginalized for so long, they want to be embraced for stamping out a social
evil." McCullagh knows his position is a difficult one to put across to an
audience of hackers. In arguing that hackers respect the property rights of
pornographers, and ponder the constitutionality of the laws they're
affirming, McCullagh says, "
I'm trying to convince hackers to respect the
rule of law, when hacking systems is the opposite of that."

But McCullagh is not alone. As the debate over Se7en's declaration spread to
the cypherpunks mailing list and alt.cypherpunks - frequented by an older
crowd than the DefCon list - others expressed similar reservations over
Se7en's plan.

"
Basically, we're talking about a Dirty Harry attitude," one network
technician/cypherpunk told Wired News. Though he senses "
real feeling" behind
Se7en's battle cry, he feels that the best way to deal with pornographers is
to "
turn the police loose on them." Another participant in the discussion
says that while he condemns child porn as "
terrible, intrinsically a crime
against innocence," he questions the effectiveness of Se7en's strategy.

"
Killing their computer isn't going to do anything," he says, cautioning that
the vigilante approach could be taken up by others. "
What happens if you have
somebody who doesn't like abortion? At what point are you supposed to be
enforcing your personal beliefs?"

Raising the paranoia level

Se7en's loathing for aficionados of newsgroups like alt.sex.pedophilia.swaps
runs deeper than "
belief." "I myself was abused when I was a kid," Se7en told
Wired News. "
Luckily, I wasn't a victim of child pornography, but I know what
these kids are going through."

With just a few hackers working independently to crack server logs, sniff IP
addresses, and sound the alarm to network administrators, he says, "
We can
take out one or two people a week ... and get the paranoia level up," so that
"
casual traders" will be frightened away from IRC rooms like
"
#100%preteensexfuckpics."

It's not JPEGs of clothed ballerinas that raise his ire, Se7en says. It's
"
the 4-year-olds being raped, the 6-year-old forced to have oral sex with cum
running down themselves." Such images, Se7en admits, are very rare - even in
online spaces dedicated to trading sexual imagery of children.

"
I know what I'm doing is wrong. I'm trampling on the rights of these guys,"
he says. "
But somewhere in the chain, someone is putting these images on
paper before they get uploaded. Your freedom ends when you start hurting
other people."

©1993-97 Wired Ventures, Inc.
_____________________________________________________________

The Ultimate Caller ID
by David J. Wallace

9:07am 13.Jun.97.PDT -- Move over, GPS. British astronomer Peter
Duffett-Smith has invented a technology that can pinpoint a digital cellular
phone's location within a few hundred feet. The system, called Cursor,
tracks a handset by radio triangulation - a method similar to the use of
radio telescopes to chart distant galaxies.

Using a ping-and-reply system, a transmitter network relays the handset's
location on the same 900-MHz phone frequencies. When the technology becomes
commercially available in 1998, marketer Cambridge Positioning Systems
envisions GPS-like uses such as regional mapping and enhanced 911 tracking.

Privacy advocates have another take on it. "
This is likely to be used by law
enforcement to trace signals," says Marc Rotenberg, director of the
Electronic Privacy Information Center. Under current law, telcos don't reveal
call locations. But the FBI is petitioning to change this. "
In the old days,"
notes Rotenberg, "
the phone didn't move."

©1993-97 Wired Ventures, Inc.
_____________________________________________________________

Poll: U.S. hiding knowledge of aliens

(CNN) -- Nearly 50 years since an alleged UFO was sighted at Roswell, New
Mexico, a new CNN/Time poll released Sunday shows that 80 percent of
Americans think the government is hiding knowledge of the existence of
extraterrestrial life forms.

While nearly three-quarters of the 1,024 adults questioned for the poll said
they had never seen or known anyone who saw a UFO, 54 percent believe
intelligent life exists outside Earth.

Sixty-four percent of the respondents said that aliens have contacted humans,
half said they've abducted humans, and 37 percent said they have contacted
the U.S. government. The poll has a margin of error of plus or minus 3
percentage points.

But only 9 percent said they believed there were any aliens near the
Hale-Bopp comet, which recently passed close enough to Earth to be seen with
the naked eye.

Some "
ufologists" believed a spacecraft was hidden near the comet, and
members of the Heaven's Gate cult committed suicide, believing that they
would be taken aboard the craft and returned "
home."

What happened in Roswell?

As for the Roswell incident, nearly two-thirds of the respondents to the poll
said they believed that a UFO crash-landed in a field outside the New Mexico
town 50 years ago next month.

In one of the most famous UFO "
sightings" in U.S. history, Roswell residents
in 1947 saw lights in the night sky, followed by a loud explosion. A rancher
found the "
crash site" and removed a large piece of debris, storing it in his
shed.

A few days later, Air Force officials from nearby Roswell Air Force Base
inspected the site and the debris, and issued a press release announcing the
recovery of a "
flying disc." The Air Force quickly retracted that statement,
and claimed the debris was from a weather balloon.

But countless statements -- some from military personnel -- appeared to
contradict the Air Force's revised position. And several "
witnesses" claimed
to have seen bodies of dead aliens whisked away by the military.

Roswell today capitalizes on its fame as a UFO crash site -- whether or not
it actually happened -- and is hosting a 50th anniversary celebration the
first week of July. Friend or foe?

Most people -- 91 percent -- told the pollsters that they had never had
contact with aliens or known anyone who had. A similar number -- 93 percent
-- said they had never been abducted or known anyone whisked away by beings
from another planet.

But if they do meet someone from a galaxy far, far away, 44 percent said they
expect to be treated as friends, while 26 percent think they'll be treated as
enemies.

Thirty-nine percent don't expect aliens to appear very humanoid, although 35
percent said they probably look "
somewhat" human.

©1997 Cable News Network
_____________________________________________________________

Computer group unites to break computer code But it took 4 months
June 19, 1997

SAN FRANCISCO (AP) -- Using the Internet to harness the combined power of
their machines, thousands of computer users broke a government-endorsed code
that protects electronic money transfers.

The group, organized by programmer Rocke Verser, took four months to read a
message that had been scrambled using the code, known as the Data Encryption
Standard. The code was finally broken Tuesday.

The national standard, or DES, was considered almost unbreakable when
introduced in 1977. It is required in most federal agencies but not the
military, and is also widely used in the private sector.

Critical information in computers is protected by the national standard and
other encryption programs that use very large numbers to scramble
information. Only the correct "
key" can unlock the encrypted information. The
longer the key, the harder it is to crack.

Given the fact that it took four months to

  
break through the standard code,
experts say the nation's financial institutes are hardly at risk. Most of
them use what it known as dynamic key exchange, which changes the keys almost
constantly during a transaction. Taking months to crack the code wouldn't do
thieves much good.

Verser and his group were responding to a $10,000 challenge offered in
January by RSA Data Security Inc., a Redwood City, California, company that
sells encryption programs.

The actual attack on the code was quite simple. Verser wrote a program that
ran through every possible combination that might unlock the coded message --
72 quadrillion of them in all.

Then he put a copy of the program on his Web site and invited others to work
on cracking it. Anyone could download the program, which would then run in
the background as they went about their work.

The project began with 20 computers and ended with 14,000 working on the
problem. All told, they used 10 million hours of computer time. Had they
started with 14,000 computers it would have taken about 30 days, Verser said
from his Loveland, Colorado, home.

While the code-cracking doesn't have much practical uses, it's a harbinger of
things to come, said David Weisman, director of money and technology
strategies for Cambridge, Massachusetts-based Forrester Research.

"It's not something to cause a panic. But people have known that as computing
power increases, key lengths have to increase," he said.

The incident is likely to prompt more calls for relaxing U.S. laws that
restrict the export of longer codes.

©1997 Associated Press.
_____________________________________________________________

Senate Votes to Outlaw Bomb-Making Info
by Rebecca Vesely

12:09pm 20.Jun.97.PDT -- The Senate has voted 94-0 to tack onto a Defense
Department spending bill an amendment that would prohibit the distribution
of bomb-making instructions in the United States.

Although the word "Internet" is not mentioned in the four-page amendment, the
legislation would outlaw Web sites, newspapers, zines, and books that publish
instructions on how to make a bomb - such as The Anarchist's Cookbook and The
Terrorist Handbook. Violators would face fines and prison sentences of up to
20 years.

Sponsored by Senator Dianne Feinstein (D-California), who has been trying to
get the legislation on the books since 1995, the amendment passed Thursday is
narrowly written to include only the distribution of material that has an
"intent to harm."

In April, the Justice Department released a study that found there indeed is
a connection between the availability of bomb-making instructions and the
actual making of bombs. It also concluded that legislation criminalizing the
publication of such information, if narrowly written, would not be a
violation of the First Amendment. The Justice Department determined that the
distribution of such materials is not a basic free-speech right, but an
obstruction of justice.

The Senate will vote on the defense bill early next week. The bill - and the
amendment - will then go to a House conference committee.

©1993-97 Wired Ventures, Inc.
_____________________________________________________________

AT&T, Baby Bell Knot "Unthinkable"
06/19/97
By David Braun, TechInvestor

WASHINGTON -- Any combination between No. 1 long-distance company AT&T and
a Baby Bell would be "unthinkable," Federal Communications Commission
chairman Reed Hundt said Thursday.

In a speech to the Brookings Institution in Washington, Hundt, who recently
announced his intention to resign as FCC chief, attempted to put a spoke in
the wheels of the merger being negotiated between AT&T and SBC
Communications.

The deal, which if approved will be the largest corporate marriage in US
history, is expected to be announced formally within weeks. It will have to
be cleared by federal regulators, including the FCC.

"We are at a watershed point in the evolution of the telecommunications
industry. Whether we have competitive or monopolized markets depends on the
interactive and complex decisions of private firms, investors, Congress,
agencies and courts. At stake is the possibility of billions of dollars of
economic growth and astounding feats of innovation only achievable through
competition," Hundt said in his speech.

Combining the long distance market share of AT&T in any RBOC (regional bell
operating company) region, even as it may be reduced by RBOC entry, with the
long distance market share that reasonably can be imputed to the RBOC would
yield a resulting concentration that was unthinkable, the FCC chief said.

AT&T slapped back Thursday, saying all the FCC needed to do was to evaluate
any merger proposal, "when and if it is made," on whether or not it
accelerates competition in all local markets.

"AT&T and the other long distance companies have documented the RBOC's
foot-dragging with enough paper to fill an FCC hearing room," said Mark
Rosenblum, AT&T vice president -- law and federal government affairs. "All we
have suggested is that partnership transactions should not be an unthinkable
way of breaking the logjam and accelerating the process of bringing real
competition to local markets.

"If a partnership between a long distance company and a local RBOC can be
structured to increase competition both in the RBOC's home territory and in
the states it does not currently serve, then it ought to be considered.

"The chairman of the FCC said that if a merger between a long distance
company and an RBOC is presented in the future, he will judge it on the law
and the specific facts that are placed on the record. That's exactly what the
FCC should do."

Hundt had said that in analyzing an AT&T-RBOC hypothetical merger in terms of
the local market, "Every RBOC is, in its region, by far the dominant firm in
the provision of in-region local exchange service. Only a tiny fraction of
customers choose any other local service provider."

One of the best positioned entrants in the local exchange market was AT&T,
Hundt said. "It is the largest telecommunications company in the country. It
already has a business relationship with presumably about half the customers
in any given Bell region. It has extensive network assets, a powerful brand,
customer information, and sales force expertise. AT&T has already publicly
set the goal of taking one-third market share in Bell markets.

"Indeed, it's difficult to imagine that any other firm will be a more
effective broad-based local entrant than AT&T as long as the market-opening
provisions of the Telecom Act are fully implemented and enforced. It seems
unreasonable to assert that AT&T cannot obtain at least some meaningful entry
in Bell markets if it seeks to enforce all the rights of entry given to it
under the new law and our rules.

"Imputing to AT&T even a modest percentage of market share taken from the
existing Bell incumbent in that Bell's region, as we must do under our
potential or precluded competitor doctrine, then under conventional and
serviceable antitrust analysis, a merger between it and the Bell incumbent is
unthinkable. It would be exactly the type of horizontal combination that
antitrust law frowns upon," he said.

Hundt said the concerns created by an AT&T-RBOC merger were not confined to
in-region combinations. Many of the RBOCs have expressed intentions to
compete out-of-region in long distance and, eventually, local markets. They
could be formidable competitors of AT&T, among others, in all out-of-region
markets. This would be particularly true if the RBOCs supported and used the
pro-competitive rules written by the FCC.

Hundt stressed that because the Bell Atlantic-NYNEX merger was currently
before the FCC, "I cannot and will not comment on that merger or how I think
it should be categorized. Nothing in this speech should be read as any kind
of communication on the topic of that merger."

Meanwhile, Lehman Brothers lowered its rating Thursday on a range of
telephone concerns to hold from outperform: U S West Communications, SBC
Communications, GTE, BellSouth, Bell Atlantic, and Ameritech.

The brokerage said it expected slower revenue growth in the sector.

Earlier this week, A. G. Edwards lowered its ratings on Sprint, Ameritech,
Nynex, SBC, and U S West, due to valuation.

At market close Thursday, most of the RBOC’s shares were down. Nynex [NYN]
was off 3/8 to 58 3/8; Bell Atlantic [BEL] was down 1/2 to 76 5/8; SBC [SBC]
added 3/8 to 60 5/8; U S West [USW] was up 3/8 to 37 5/8; Ameritech [AIT]
slipped 5/8 to 70 3/4; and BellSouth [BLS] retreated 3/8 to 46 1/ 4.

AT&T [T] was up 3/8 to 37 7/8. Other long-distance companies were mixed. MCI
International [MCIC] was up 1 to 39 5/8. Sprint [FON] was off 3/4 to 51 1/8.

©CMP Media, 1996.
_____________________________________________________________

Hackers' Dark Side Gets Even Darker
06/19/97
By Douglas Hayward, TechWire

LONDON -- The hacker community is splitting into a series of distinct
cultural groups -- some of which are becoming dangerous to businesses and a
potential threat to national security, an official of Europe's largest
defense research agency warned Thursday.

New types of malicious hackers are evolving who use other hackers to do their
dirty work, said Alan Hood, a research scientist in the information warfare
unit of Britain's Defense Evaluation and Research Agency (DERA).

Two of the most dangerous types of malicious hackers are information brokers
and meta-hackers, said Hood, whose agency develops security systems for the
British military. Information brokers commission and pay hackers to steal
information, then resell the information to foreign governments or business
rivals of the target organizations.

Meta-hackers are sophisticated hackers who monitor other hackers without
being noticed, and then exploit the vulnerabilities identified by these
hackers they are monitoring. A sophisticate meta-hacker effectively uses
other hackers as tools to attack networks. "Meta-hackers are one of the most
sinister things I have run into," Hood said. "They scare the hell out of me."

DERA is also concerned that terrorist and criminal gangs are preparing to use
hacking techniques to neutralize military, police and security services, Hood
said.

Other cultural groups evolving within the hacker community include gangs
known as elites, who form closed clubs and look down on those ordinary
hackers who employ commonly used attack tools, Hood said. "These guys
[elites] develop their own tools," Hood said. "They get a camaraderie and an
appreciation of their prowess from their peers."

Another group -- known as "darksiders" -- use hacking techniques for
financial gain or to create malicious destruction. They reject the classic
motivation for hackers, which is to gain a feeling of achievement and
authority, Hood said. "Hackers don't see electronic trespass as wrong per se,
but the important thing about darksiders is that they cross the line [drawn
by hackers] and start to be bad guys," he said. "That generally means they do
it for gain or to cause harm."

Users should stop believing they can build security systems capable of
repelling any attack from hackers, Hood added. Instead, organizations should
concentrate on minimizing the damage caused by attacks, and on deterring
hackers.

"I don't believe you can stop every hacker forever," Hood said. "All they
need is one new technique you haven't heard about. But what you can do is
minimize the target, by using knowledge and resources."

According to DERA, users should divide their anti-hacker strategies into
deterrence, protection, detection and reaction.

Deterrence means making it so difficult for hackers that most give up and try
another target, Hood said. Protection means more than installing firewalls
and security software and procedures; it also means getting to know your
system and removing all but essential content. "Everything you have on your
system is at risk -- you should strip out anything you don't need," Hood
said.

"Make sure your system does what you want it to do -- no more and no less --
and make sure you have procedural policies to stop social engineering. If
someone rings up and says they have forgotten their password, the person at
the other end of the phone shouldn't automatically say OK and give them a new
one," Hood said. Social engineering is the term used by hackers to describe
how they obtain passwords, confidential information and credit by deception.

Users should install monitoring software, preferably with the ability to
detect attacks in real time, and should react to everything that looks out of
place. DERA employs 14,00 staff and has a budget of $1.5 billion. Hood's
division, the command and information systems division, is responsible for
secure communications and information warfare and employs more than 500
scientists and engineers.

©CMP Media, 1996.
_____________________________________________________________

_____________________________________________________________
LOGS
1. telnet log from memor
2. #phreak log from psych0
3. #hacking log from Optima

--- 1 - telnet log from memor

%TELNET-I-SESSION, Session 01, host mail.pratique.fr, port 25
220-prat.iway.fr Sendmail 8.6.12/8.6.12 ready at Thu, 5 Jun 1997 00:19:05 +0200
220 ESMTP spoken here
helo a
250 prat.iway.fr Hello clp2.clpgh.org [192.204.3.2], pleased to meet you
mail from:hbs@hbs.org
250 hbs@hbs.org... Sender ok
rcpt to:root@skypub.com
250 root@skypub.com... Recipient ok
data
354 Enter mail, end with "." on a line by itself
hi,
You finished by finding that .phf in cgi-bin of www.skypub.com , good job,
dont forget a ls -a in /htdocs .. we didnt do bad things, only little hacking
for making that group known.. HBS HAVOC BELL SYSTEMS.. talk a bit about us in
yer magazine hm? :) that would make a big ads for us, please.. anyways.. phf
is boggus, php.cgi is too, webdist.cgi, wievsource, wrap.. lots of cgi scripts
are bogus.. so.. be carefull when ya intall one ;)
bye

memz [HBS]
.
250 AAA06509 Message accepted for delivery


--- 2 - a log from #phreak ( i think )
Subject:
just a lamer to brighten your day
Date:
Sat, 14 Jun 97 16:14:32 +0000
From:
psych0
To:
Scud-O

name: Rebel_Log (phraud@ip203-126.cc.interlog.com)

proof:
[12:11] *** Rebel_Log (phraud@ip203-126.cc.interlog.com) has joined
#phreak
<psych0> heh... /list again =)
[12:11] <KungFuFox> the amount of scroll he got must've given him a
heart attack
[12:12] <Rebel_Log> sup poin dexter's
<psych0> hey guys.. type /whois * ... =)
[12:12] *** Rebel_Log has quit IRC (Max Sendq exceeded)


--- 3 - a long in #hacking on Undernet

This log is of a really stupid person who thinks that if they scroll
jiberish in the channel that it will flood people off (rarely happens). You
have done a great job on THTJ and keep it up the good work.


This log is from #hacking on Undernet

[14:41] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
[14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:42] Quits: CrazyPooh (Excess Flood)
<Optima> haha
[14:42] Joins: Ocnty (FireIce@sdn-ts-005cacoviP03.dialsprint.net)
[14:42] <fubar> lol
[14:42] <fubar> what a lamer
[14:42] <fubar> haha
[14:42] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
[14:42] <Ocnty> hi
[14:42] Quits: CrazyPooh (Excess Flood)
<Optima> Heh
[14:42] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
[14:42] <fubar> so crazypooh
[14:42] <fubar> i stil havnt died
<Optima> CrazyPooh: You are lame as hell!
[14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<Optima> HAHAHA
[14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:42] <fubar> lol
[14:42] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <C
[14:42] <fubar> oh my god
[14:42] <CrazyPooh> what
[14:42] Parts: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
[14:42] <fubar> i`m gonna piss myself
[14:43] <fubar> haha
[14:43] <fubar> now he`s message flooding me
[14:43] <fubar> haha
[14:43] <fubar> i love my bitchx...
[14:43] Ocnty is now known as \JamesBon
[14:43] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
[14:43] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPoo h> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:43] <fubar> haha
[14:43] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:43] <fubar> wb CP
[14:43] Quits: CrazyPooh (Excess Flood)
[14:43] <fubar> lol
<Optima> shit...How Stupid is he?
[14:44] <fubar> oh my god
[14:44] <fubar> 2 lines and he floods himself off
[14:44] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
[14:44] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:44] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:44] <fubar> haha
[14:44] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:44] Quits: CrazyPooh (Excess Flood)
<Optima> heh
[14:44] Joins: CrazyPooh (~crazypooh@alawan5-asl.ala.net)
[14:44] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:44] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:44] <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
<CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh> <CrazyPooh>
[14:44] <fubar> fuck he`s dumb
[14:44] Quits: CrazyPooh (Excess Flood)


This log has been provided by Optima




_____________________________________________________________

------------------------ ----------------------
-[HAVOC Bell Systems]- -[Acknowledgements]-
------------------------ ----------------------

ArcAngl : Just joined up
Agrajag : Back from the dead btm : Elite (MIA?)
darkcyde : #phreak old-schooler digipimp : Co-conspirator
Digital_X : Nemesis (MIA?) dr1x : It's 420!
disc0re : Thinks were on NBC ec|ipse : Hysterical bastard
Keystroke : Submissions Editor shamrock : nice hair
KungFuFox : Helped Reform #phreak RBCP : Funniest man alive
memor : Ueberleet French phreak shoelace : FINALLY has ops
psych0 : Lame ass mofo WeatherM : anarchist
REality : Owns Own3r darc : Left #phreak
Scud-O : Has a new car! JP : killed Antionline.com
Redtyde : #phreak not so old-schooler tombin : phear!
theLURK3R : Out Clubing antifire : NT security guru
UnaBomber : Tired of IRC (MIA?) ChiaPope : sniff, we miss wrath!
FH : want scud to have ICQ
------------------- TMessiah : Likes PGP
-[ Channels ]- Revelation: old schooler
------------------- Modify : Lives near Scud-O
#phreak : Newly Reformed |Banshee| : Also lives near Scud-O
#sin : SIN Home mC : infected.com - nuff said!
silitoad : Did ya like thtj?


_____________________________________________________________

This Month's Question:
_____________________________________________________________

Next Month:
Look, we can predict the future about as well as a weatherman, so
just chill out until july 1st to see what is going to be in thtj13!

Issue 13 is out August 1st!

Send all articles for issue 13 to Keystroke at: keystroke@thepentagon.com

Tune in next time, Same Bat Time, Same Bat Channel!

==========================================================
= Is this copy of The HAVOC Technical Journal skunked? =
= If this file doesn't read at 152009 bytes, it probably =
= doesn't have a born on date! Get a fresh copy from our =
= NEW site at: http://www.thtj.com =
==========================================================

-[End of Communique]-

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT