System Failure 1

28 Dec 2019
System Failure Issue 1
System Failure Issue 1
                         ___________      /\  __________ 
____________\\ \ / \/ //_________/\_
\\ \ / //
__|__ ____________ \/ _____ ________ __|_____
___\ _/_________| / __/____/\__\\ |___ __//______| _ /
\ \_____ / | /________ / _// _) | _ | / /
|_____ / /__ __/_____ \| |________| | | \_/___/
|_____/ |_____| \______| \__________|____|
________ ___/\__ ____ _______ ______ _____/\__________
__\ ___//__\\__ /_\\___)__ __/______| //__\\__ / __ /___
\ _______/ _/ | / \ / | | __/ __/__ /____/ |
\______| |____|_______/____\ /_________|____\ /__________|
\_______| \/ \_____/sh! |
| ______ ..system failure.. __/\__ |
| \ // \ 0o / |
\\________\\//_______________//______oOOo(____)oOOo______//
\/ /___\ U
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ System Failure: Issue #1 ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
HI@#$!#@!$#@%$#%^#%^$#!%!@#! Welcome to the first issue of System Failure.
We've spent quite a while making this zine and making it as informative as
possible. To all those who have been waiting for it for a while now: sorry for
the long-ass delay in releasing it. A lot of it is my fault (yeah, I'm a
flake), but some blame does go to others who were extremely late getting their
articles to me (you know who you are). Let me know what you think of this zine
so far, and please submit if you think we have a shot in hell of sticking
around. Find me on IRC in #rock or #peng (that goes for most of the writers as
well). FLAP.
--Logic Box [6/22/97]
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ http://www.penguinpalace.com/sysfail/ ³
³ [system.failure@usa.net] ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ CONTENTS ³
³ ³
³ AT&T Teleconferences by Pinguino ³
³ How to Make Social Engineering Work for You by Saint skullY the Dazed ³
³ The Defcon Experience by Pinguino ³
³ US-West Field-Accessed Service Tools by Mr. SoniK ³
³ Everything in a Nutshell by Andrax ³
³ Setting Up Call Home America 800's by Dark Hour ³
³ Abusing Your Education by Pinguino ³
³ Preventing Computer Viruses by Colaytion ³
³ Five-Finger Discounts by Pinguino, Dark Hour, and Netmask ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
AT&T Teleconferences
by Pinguino (pinguino@uix.com)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
<sargon> Set up a conf.
<sargon> Do a conf tonight.
<sargon> Go set up a conf.

Are you sick of people asking for confs all the time? Are you the
person begging?? Here is an easy way to set up your conf, and it doesn't
involve credit cards, real inpho, or sacrificing sheep.

1. Find a payphone. It's not too hard. Most look like payphones, are labeled
"Phone" and have dial tones. It needs to be a COCOT though.. so not like
a US West or PacBell or NYNEX phone. Get the number to the phone before you
start.

2. Dial 1-800-232-1234

3. Follow this conversation:
Op : Hello, AT&T Teleconferencing, how may I help you tonight?
You: I'd like to set up a teleconference please
Op : Can I have the names and numbers of your party?
You: No, I'd like a dial-in
Op : Your name?
You: Diane Smith
Op : How many participants?
You: 11
Op : When do you want this for?
You: 8:30pm pacific
Op : Duration?
You: four and a half hours
Op : Can I have the number to your location?
You: 619-598-7128
Op : Alright, I'll call you back with the host and participant pins

4. Hang up. Wait for like 5-10 minutes. It's cool to have a friend with you
so you're not totally bored. You can beat up local shrubbery while you wait
or something.

Riiiiiiiiing riiiiiinng

5. Answer it. You're a company.

You: Hello, Datatek, how may I help you?
Op : Hello Diane, this is Mary with AT&T
You: Hi
Op : Your 800 number is 800-403-1021. Your host pin is 738 846. Your user pin
is 539 427
You: Alright, let me verify those numbers. 800-403-1021. Host 738 846 and user
539 427?
Op : Yes, have a nice day. Thank you for using AT&T

*click*
You: Yeah, thank you for abusing AT&T =)

6. Some important things to remember:
a. Don't let warez pups on. They'll tone it to death.
b. Don't give the info to people you don't know.
c. Don't call on the host pin from home.
d. Set the conf to run past 12:30 am so it autoextends.

Have fun.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
How to Make Social Engineering Work For You
by Saint skullY the Dazed (ibaiba@dnsi.net)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Ok, so you're sitting there, wondering just how you can learn those
evasive little telco secrets. You've read every text file you can get your
hands on, but none of them cover things useful for your area. Well get off
your lazy ass and collect the info yourself!

To get that ereet 0-day telco info, you have several options. You
can go to your local bell yard and do some looting/trashing. You can also
just try to figure it out on your own. But by far the easiest (And safest)
way is to Social Engineer the info using your phone.

It's actually pretty easy to get a lot of telco info over the phone.
All ya gotta do is get your local billing office number. Let's say you want
to get your local CN/A number. You call your billing office. Explain to them
that you're So and So in Bumfuck, Egypt, and you lost the CN/A number for your
city. Here's an example.

*Dials 1-800-244-1111*
*Punches in keys until he gets a live operator*
Operator: May I help you?
Phreak: Hello? CN/A? I need the name for 541-555-1212
Operator: I'm sorry sir, this is *some bullshit department*
Phreak: Ohh, I'm sorry. I must have dialed the wrong number. Just to make sure
I have the right number, can you verify the CN/A number I have?
Operator: It's 800-555-3333
Phreak: Uhh, yeah, that's what I have. I must have misdialed. Sorry for
mistake.
Operator: No problem.

Yes, it really is that easy. You can do that for other numbers
too. CN/A, FACS, RCMAC (only if you're smart enough to know *how* RCMAC
works though). You can also pretend to be a tech from another area and
tell them your local directory is outdated. Here's an example script:

*Dials 1-800-244-1111*
*Hits keys for op again*
Operator: May I help you?
Phreak: Yeah, this is Roy here in Boise, ID. My listing for the CN/A
number for Oregon seems to be out of service. Could you please give
it to me? It should be in your handbook.
Operator: Ok, the number is 800-555-6666
Phreak: Thank you
Operator: You have a nice day

Sometimes they will act confused. Just insist they have the
information you need and that it is in their HANDBOOK. If one operator is
too dumb to give it to you, just call back and get a different operator.
It won't work every time, but it should work enough of the time for you
to get the info you're looking for.

Be sure not to make these calls from your own phone or one that can
be traced to you. If you do, make sure you op divert your call. To op
divert, you pick up your phone, dial the operator, and say "My 8 key isn't
working right, could you please dial this number for me?" This will make it
harder for Ma Bell to track you.

To contact skullY, just email ibaiba@dnsi.net or go see his page at
http://www.dnsi.net/~ibaiba/
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
The Defcon Experience
by Pinguino (pinguino@uix.com)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
In the widely accepted sense of the word, I am not a hacker. I don't
know UNIX as well as I do DOS. I don't break into systems. I don't crack
password files. I fit in the category as a person with an abnormally high
intrest in computing and telecommunications. As one who is not a regular on
#hack, #phreak, or #2600, I was unsure of who I would meeting or what to
expect.
Tymat originally offered to take me to Defcon, and the offer was
extended by my good friend Teklord. Curious as a cat, I decided to drive,
splitting the chore with Teklord's friend and business associate Cheshire.
Teklord also invited this really annoying weird chick named Cathy, but I'm
sure she's described in other files. We also had to drive Tymat there
*getting him out of San Diego and removing him from my life* I invited my
friend Shadow Dancer to go. Teklord and his other friend HiVoltage flew in
the comfort and coolness of an airconditioned plane.
I have the best of luck. My car ran out of gas in the middle of the
friggin desert, with the gas gage reading a good quarter tank. We walked
forever to a gas station in the middle of buttfuck Egypt, and solved the
problem with a nervous mindset.
Las Vegas was nothing like what I expected. The glitter, the glam,
the lines of people... it was all a facade. Fake. A front for the greed and
corruption that makes only a few become wealthy and the many poor. It was
also way too hot (I thought that San Diego was hot) like the temperature was
120 average and 90 at night. Dust blew into your eyes, blinding you from the
glittering lights and forcing you to stop all activity to brush it from
yourself. Vegas sucks.

:p :( :) :D :) :P gUi H/\X0r! :) :( :D :P :) :( #etc..

Las Vegas also has a rather large problem with SPAM (SYNTHETIC PORK
AIN'T MEAT!). They were everywhere... and we only saw 5 cops the entire 6
days we were in Vegas, thats less than 1 cop a day.. and in a downtown area!
The SPAM there have all the power. I personally hate SPAM, it leaves a bad
taste in my mouth -cHeSHiRe!
** ** ** ** ** ** ** ** ** ** ** ** ** **
Defcon was a large banquet hall lined with tables and computers.
Hackers stood in groups, some looking quite confused. The next room was a
speaking hall with room for about 100 people. The actual convention was
boring, but it was the people who made it interesting. I met Holy Cow,
Steggan, BinHi, Elfguard, Tekgirl, Knarph, Lefty, Biohazard, and some others.
We ran aaaround the hotel stealing phones and creating general chaos.
By the end of the week, there were 3 curtosy phones, 6 handsets, stacks of
level 23 room keys, free soda, and trashing treasure info. We had bought cell
phones and elite pagers (From Elite Cellular, $7/mo). We partied, beiged
multiple lines to the hotel rooms, and got harassed by SPAM. We trashed
Sprint and got caught by SPAM, so we left really really fast.
At the end of the trip, Knarph had to carry a payphone out to the
parking structure. He accidently got off the elevator on level 2, where
Defcon was held. It was 5 am. We got caught by SPAM hardcore. They claimed
that the phone was stolen and what we were doing was wrong, even though Monte
Carlo phones were gold and white, and this one was a regular cocot.
Additionally, this cocot was from 714 (L.A., California) and 10 years old.
They took names and ID, and some of us got to leave. There was a guy named
Slappy whose parents got called in because he had lied to the SPAM about his
age twice.
We broke into the maids room at the Monte Carlo. That was interesting,
since we didn't know if anyone would walk in. The carts had the keys slipped
under bottles of shampoo and stuff, and the walls were lined with interesting
things to steal. We couldn't get the room keys to work, but have some ideas
about reprogramming them <g>
Even though a lot of bad stuff happened and Vegas as a whole sucked,
Defcon was totally worth going to. I highly recommend it, especially if you
want a safe place to just go agro on everything. It's an event that goes on
every year, where people with similar interests gather and share ideas. It's
a place where you can wear your Free BSD or Qualcomm shirt that you wouldn't
be caught dead in at school, and feel accepted. It's a place that wakes up at
night. It's a place where curiousity isn't condemned.
Paging Kevin Mitnik...
** ** ** ** ** ** ** ** ** ** ** ** ** **
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
US-West Field-Accessed Service Tools
by Mr. SoniK (zigy@teleport.com)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
I first learned about Field-Accessed Service Tools (FAST) one day
while I was playing with a lineman's handset I had recently stolen from a Bell
truck. I was dialing the speed dial numbers from the handset's memory, and one
number that I dialed rang and asked me to enter a six-digit security code. I
was wondering what this thing was and what it did and who owned it. I figured
it was US-West, because I had stolen a US-West handest, but it still didn't
say what RBOC operated it when I called it. I tried entering random numbers
at first and found that if it wasn't a valid number, it would read it back to
me. At first I used this as a poorman's DTMF decoder to decode the rest of the
speed dials in my handset. After I had decoded all the numbers, I had two
six-digit numbers from the speed dial. I called FAST again and entered the
six-digit number, and BINGO, it was a valid badge number of a lineman. Now I
had to get past the second step to get into the system.

One day I was bored so I decided to hack the FAST system, so I started
entering random six-digit numbers. I got one valid badge number by guessing
numbers, but since I was on my home phone, I didn't want to go any further.
Once I got to a payphone I decided to enter the password I had guessed, but
instead of asking for a password it told me that it had expired and I had to
choose a new one. One Major fault of the system was that it failed to ask me
for the old one before I changed it. I realized that this was a major security
hole so I shoved it into the back of my head to remember. Anyway, after I
changed some poor lineman's password, I messed around with the voice prompts.
I found out about all the neat stuff I could do, like change the status of a
cable pair and other neat things like make LFACS inquiries, which means
basically the same stuff as regular FACS offices but completely automated. I
decided I was onto some big shit and wanted to know as much as I could about
this thing.

One day I got my big break when I learned that skullY, one of my good
friends from 541, had looted a truckyard a couple of weeks after I first
learned about FAST. skullY had scored a little peice of paper that had a neat
little menu thing that documented all of FAST's features. I was really happy
when he showed me this and I realized what it was and what the system was
capable of. The paper looked like a map of directories you might see on a
Winbloze 3.1 machine when you open the File Manager and get a map of the hard
disk's directory structure.


Field-Accessed Service Tools
Security Code: (6 digit Employee Badge#)
Password: (4-7 digits)
NOTE: Your first "Temporary" expired password is the same as your security
code. After entring an expired password, you are asked to choose a new one (4
to 7 digits). Passwords expire every thirty days.

FAST Main Menu: (There is no 6, I don't know why)
1 Facilities Inquiry
2 MLT Test
3 Cut to new Facilities
4 Change status of Cable-pair
5 Test Caller ID
7 Cable Transfer (for splicers)
8 Administrative
9 News and Documentation
0 Connect to call help line

I'm not going to list all the little details of every menu, it's too much
information. I am just listing the main menu and the contents of each
sub-menu.

*** Section 1: LFACS Inquiry
1. by phone number
2. by cable-pair
*** Section 2: MLT test
1. quick
2. loop
3. full
4. add tone
5. remove tone
*** Section 3: Cut to new facilities
1. Service order
2. trouble ticket
3. soft dial tone
4. cut to new OE
*** Section 4: Cable-pair status
1. change status of cable pair to defective/non defective
2. clear defective pair for order
3. LFACS shows as working status
*** Section 5: Test Caller ID
1. enter seven digit telephone number to test ID
*** Section 7: Cable splicers only
*see quick refrence for cable splicers*
*** Section 8: Administrative
1. change password
2. change area code
3. make area code permanent
4. results by voice
*** Section 9: FAST news
*** Section 0: FAST help line

FAST TIPS:
if you are entering variable-length data, like a cable name or your password,
you must end your entry with a # sign. If you are not asked to enter the #,
FAST expects a fixed number of digits (e.g. 3-digit area code or 7-digit
telephone number). Don't enter a # after these.

To enter one or more characters that are not numbers, press the * key then use
the following codes:

- =11, . =12, + =13, a =21, b =22, c =23, d =31, d =31, e =32, f =33,
g =41, h =42, i =43, j =51, k =52, l =53, m =61, n =62, 0 =63, p =71,
q =01, r -72, s =73, t =81, u =82, v =83, w =91, x =92, y =93, z =03.

Press * to return to number entry. For example, to enter the cable name IPG42,
you would press *437141*42#. You may hang up at any time without creating a
problem. Whenever you are given a menu of choices, pressing 9 will return you
to the main menu.

US-West Communications Confidential QuickRef 09/27/96
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Everything in a Nutshell
by Andrax (e-mail system.failure@usa.net to contact)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

There are a good number of reasons that the human situation is
currently at its level of dysfunction, one is simply that we are too much for
our level of ignorance, but that isn't a problem, it's a symptom.
We love to ignore the things which most affect us, in order that we
may pay attention to a mock-up of our idealized models of our view on a
situation. We look at the shadow of a facsimile of a reflection on reality
and apply it in such a way that makes it seem to be the all-important factor
of realizing our activities. So far removed from what is, we can alter our
perceptions to what we think should be instead. In this way we exert control
over all things. We see something how we believe we want to, and act upon it
accordingly. A fine temporary system, as, it allows for guidance of those who
do not understand the situation immediately so that there can be motion
toward the goal of those enlightened few who can control the masses, while
the timely explanation of the goal is slowly forthcoming as the activities
culminate. However, if the goal is too far, and the machine too large, the
explanation may never become apparent enough for the machine's little
individual parts to understand the purposes of going toward it, and the goals
shall change.
This is the current state of existence that we as a species are
experiencing. The overall meaning of the system is so lost to its parts that
they can now actually quibble over where they think it should be put on
course for. The machine itself has awakened to its own very existence, and
like any of its parts, wants more than it needs, or even could have. It has
understood its own death, and that inevitability has frightened it, so it
clambers to escape its own ending, and we, being tiny far removed reflections
of it, and it, being a distorted abstract reflection of ourselves, do the
very same. That which we fear, we seek to disbelieve. If it is insistent on
making itself seen, we seek to destroy it, and it is this very instinct that
forms the system to begin with.
The beginnings of society were much like an animal pack, the most fit
to lead naturally rose to the top and lead. The group needed a leader, not
because they were interested in following anyone, but because if everyone got
their own way, and many did, the group would become unstable with the
bickerings of it's members. If one member had an object, and wanted to keep
that object, and another also wanted the object, there would be a fight, as,
the extremely emotional nature of simple survival assures that those who act
in appropriate during a given situation are more likely to continue to exist,
and thus pass on their traits. Emotions were the simplest and probably
earliest expressions of the internal condition to even the least cogniscient
of conscious creatures. The dominant member was able to hold the most power
over the finality of the situation, however it may present itself. Often this
meant that the member of the pack who had the most highly developed system
with the most diverse capabilities, would, one way or another, become the
"Alpha" or leader of the group.
It is this micro-evolution system that began the ever-diversifying
complexities of the social order. The more desire an individual has for some
object, the more willing they are to alter their level of complexity in order
to get that object. The more diverse your arsenal of abilities, the more
complex the order becomes. The human animal has risen to the top of the
species hierarchy, and within human society there is a steadily changing
complexity of hierarchy as well. The rich, charismatic, handsome,
intelligent, perceptive, quick-witted liar is the current top of the crop,
and it is the ultimate goal of this creature to do nothing more than
constantly gain power.
It has become a desirable trait, in human society, to be able to
alter ones perceptions so that the system seems to be the devine object in
the semi-conscious mind of the individual. You accept your role and squeeze
yourself into the common mold that your precise levels of diversifications
are worked perfectly into it, that it may gain all or most of that
individuals powers over the world, and over other individuals. Nature
displays its most complex design in one of the simplest acts observed, and to
this I deduce, we can trust uniformity.
Just as simply as all things seperate each other by order of ability
to manipulate, they also live and die. All things that are, once were not,
and must some day return to not being, as, it is the death of a thing that
allows, by evolution, the birth of the next. Also, as nature shows, that
which is the most diverse, and the most dominant, will pass on its traits to
the next generation. In this way, one day, the entire system will culminate
into complete efficiency, if nature is allowed to take its course. I, in the
natural cycle of things, and being a part of the nature machine, am terrified
of absolute efficiency, and wish to postpone reaching that point forever, if
possible, and if all else fails, destroy the possibility of reaching it at
all. To do so means stopping the machine by giving it a new task, but this
means I must ignore the truth of my situation, which, being a part of nature,
limits my diversification, thus disallowing the very thing I strive for,
causing myself to fail rather than the nature machine, it would beat me in
the very way I would beat it, ironically.
Instead I must use its own fate against it. I have to accept the
impossible task of enlightening all the individual parts as to the goal of
the machine, and, ironically, have them split the machine apart in chasing
its own goal. For, if all the parts seek the goal of the whole, the spell of
the machine's existence is undone as it dies while passing on its traits in
the final feat of diversification. After that, it begins again, in multitude,
as the nature must do, else it never have existed. For, to thwart it is only
to default it. Pure irony.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Setting Up Call Home America 800's
by Dark Hour (darkhour@underworld.net)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Making Call-Home America numbers is very easy. It's just a matter of
finding information and talking to an operator. You'll need a valid
name/address/phone number. You also need an SSN, but you can make this up,
it doesn't have to be valid. After you get this information, call
1-800-594-3000. This is how a usual conversation with the Call-Home operator
goes:

Oper: Thank you for calling Call-Home America, this is Twee, how may I help
you?
You : Yes, I'd like to set up an account with Call-Home America.
Oper: And do you have a Call-Home brochure?
You : Yes, but I seem to have lost it. I did, however, read all of the
information from the brochure.
Oper: We can still set up an account..
You : Good.
Oper: I'll need your home telephone number, area code first..
You : Sure. That would be 501-834-2043.
Oper: And your name is?
You : Mike Hunt
Oper: Ok, Mike, and your address is?
You : It's 1721 ibaiba rd.
Oper: The city?
You : West Roy
Oper: The state?
You : Arkansas..
Oper: And the zip code?
You : 31337
Oper: Which major credit card would you like to place this on?
You : Would it be possible to direct bill?
Oper: Certainly, I'll need your social security number, for security and
verification.
You : Sure. It's XXX-XX-XXXX.
Oper: I'll need to enter this information. If you have any questions, please
ask.. <clickclick>
[after a second or two you say:]
You : Oh yea.. I read that I can set up additional pins to other numbers.
Oper: Yes. I'll take those numbers when I'm done taking down this information.
You : I'll wait..
[wait until she's done..]
Oper: Ok, I need the first other number, area code first..
You : Sure. The number is 501-794-0123.
Oper: I'll need a short description for this number.
You : Sure. That will go to a Chris.
Oper: are there any others?
[If so, say yes, and give her the others. You can have up to nine.]
You : No, that's all of em.
Oper: Do you have a pen or pencil?
You : Sure. Here it is..
Oper: I'm going to give you your account number.
You : Ok, I'm ready.
Oper: It's 0202-XXX-XXX.
You : Ok, got that..
Oper: Here's your 1-800 number. It's 1-800-XXX-XXXX.
You : Thanks..
Oper: This is your home pin. It's XXXX.
You : Ok, got that.
[The operator will proceed to give you any other pins you have set up.]
Oper: Finally, should you have any other problems, the customer service
number is 1-800-594-5900. Your 1-800 number will become active within
72 hours, not including weekends.
You : Thanks very much. You've been very helpful.

Note: Even though the operator says it'll be 48 or 72 hours, the numbers will
be up within 10 minutes of the completion of the call.


The Callnet Card
----------------
Call-Home America also offers a calling card, called the Callnet card.
This is a calling card, which also has some advanced features. Some of these
are news&weather, teleconferencing, speed-dialing, and message-delivery.
Getting the number is a two-step process. First, call the Call-Home
customer-service number, and talk to the operator.

You : Hi. My name is Mike Hunt. I recently set up a Call-Home account, but I
forgot to tell the operator that I wanted to order a calling card. Can
you possibly place the order for me?
Oper: Sure. How many cards do you need?
You : Oh, just one card.
Oper: I need your account number.
You : Sure. It's 0202-XXX-XXX.
Oper: I've placed the order. Your card should arrive within 7 to 10 business
days.
You : Thanks a lot. Bye.
Oper: Thanks for using Call-Home America.

Now, call the customer service number (1-800-594-5900) again. Make
sure you get a different operator. Your conversation should go something like
this:

Oper: Thank you for calling Call-Home America Customer Service. My name is
Betsy, how may I help you?
You : Hi, my name is James. I ordered a CallNet card about two weeks ago, but
it never came. Can I possibly get my card number?
Oper: Oh. Sure. Can I have your account number?
You : Sure. It's 0202-XXX-XXX.
Oper: Your calling card number is XXXX-XXX-XXXX.
You : Thanks a lot.. Have a nice day.
Oper: Good Bye..

Should you wish to use your calling card, dial 1-800-594-5001. You
will hear one tone. Enter the number you wish to call. Next, you'll hear a
double-tone. Enter your calling-card number.


Flagged Numbers
---------------
If a number is used to many times, it will become flagged. Flagged
numbers have a tendency to go down. If you must set up a flagged number,
don't plan on your account being up very long. Below are some common flagged
numbers:

Defcon..............(801)855-3326
8 Ball..............(702)748-7448
Hotel California....(607)252-6000


Closing
-------
That's how to set up a Call-Home America number. Remember that
often-used numbers become flagged. I.E. You can set up a number to Defcon,
but it'll only stay up for ten minutes or so. If you have questions, comments,
or find any of this information to be false then email Dark Hour at:
darkhour@underworld.net
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Abusing Your Education
by Pinguino (pinguino@uix.com)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
I've been in Journalism for years. I've been an office aide in High School.
Here's an easy way to get info if you get into those positions, or meet people
who are.

Most people don't realize that you can use the Journalism phone during school
hours from any classroom. Find an empty classroom and call the main office.
Look in the newspaper for a name, and then tell the person you're Blah from
the Journalism class (preferrably an editor that you sound like) and you need
to place a long distance call. They transfer your call, and only listen for
like half a second. If it's an office aide, they usually don't listen.

Both Journalism and office aides have free access to school info, which is
printed out. Every student. It's not uncommon to be missing a file. Nuff said.
These files have the kid's number and name, address, parents' names, parents'
work number, birthday, and social security number.

Office aides have it easy. After a while, the secretaries really stop watching
you. Secretaries are oftentimes clueless, and you have access to keys to
cabinets. I'm sure that a lot of locked cabinets have info, as well as
supplies.

Journalism kids can get mail sent to them. Just tell your editor that you
might need to get mail sent to the school cuz your parents are mean and look
through all your stuff.

Secretaries are notorious gossips. Good blackmail-worthy info is gathered in
the office while the important people are gone.

You can also steal passes to get out of class, and get people out of class for
"interviews."

My last year of school was soo cool cuz I was never in class, legit. =) These
classes can be pretty promising.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Preventing Computer Viruses
by Colaytion (civilwarfreak@hotmail.com)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
What is a computer virus? A virus is a program that, unbeknowest to
you, enters your system and begins to feast on the files you have worked
painstakingly to develop. To watch you computer slow down, get buggy, start
crashing, and then go kaput has to be one of the worst feelings in the world.
In the following article, I will endeavour to explain the virus, and teach you
how to prepare yourself for an eventual attack by one.

Computer viruses and other malicious software all basically affect the
computer in the same way, and one must know how they perform this to get a
better understanding of what they do. Computer viruses affect computers by
first infecting the computers, and then detonating programs to cause damage.
The infector portion of viruses replicate so that they can spread via floppy
disks to floppy disks, or networks to networks. Viruses can only infect
executable programs or the area of disks called the boot sector. The boot
sector on the disk is the program and data area. It contains a small program
essential to the initial boot-up or login process of the computer. Executable
programs are those with COM, EXE, SYS, BIV, or OVC extensions. An example is
COMMAND.COM: the .COM at the end of the program makes it an executable
program for the virus. The detonator is the part of the virus that does the
actual work, setting the virus in motion and causing the damage. The detonator
goes into action once the computer is infected.

The hardest part of dealing with computer viruses is not getting rid
of them, but preventing them. Viruses can be prevented by being more careful
with software and by using antiviral programs.

Software management, more control of what software computer users buy
and use can prevent many viral attacks. Computer users should not use programs
when they do not know where they came from. It is the same as when your
mother tells you not to touch something because you do not know where it has
been. Use the same philosophy with your computer software. These programs
could be infected with computer viruses, and users should not risk getting
infected with them. In addition, computer users should not let others run
their programs on their computers, since users do not know where others'
disks have been. Such disks could have been infected in other computer
systems. Backing up hard disks and storing them in safe places is also a good
preventive measure. This can save computer users, because if their disk does
become infected, back-up disks will contain unharmed information that was lost
on infected disks. Generally, you should do a major back up of your system
once a month, and back up your important files at least weekly. These are just
a few of the numerous ways that we as computer users can protect ourselves
from getting infected with viruses.

There are computer programs out there that can help prevent a user's
computer from being infected, and that is through antiviral programs.
Antiviral programs are used as preventive measures against viruses and gets
rid of them also. There are three different types of antiviral programs:

- Infection prevention
- Infection detection
- Infection identification

Infection prevention programs prevent the replication process and keep
viruses from infecting the computer. Infection prevention programs remain in
the computer's memory at all times. They monitor the computer's systems, watch
for signs of replication, and check all requests for operating system
services. They even monitor the loading of programs in and out of the
computer's memory. In essence, virtually every aspect of the system's
activities is monitored and checked as it occurs. However, some normal
computer functions can cause some viral programs to think that a virus is
present, sounding a false alarm. Another problem with infection prevention
programs is that they cannot keep boot sector virus infections from happening.
Because boot sector viruses act as the system is booted up, the infection
prevention program has not even been loaded yet, and therefore is powerless.

Infection detection programs detect virus infections, and identify
what specific area of the system has been infected. The programs identify
what specific area it is in by tracing the changes in the system made by the
virus during the infection process. The infection detection programs work in
one of two ways: through vaccination or through the snapshot technique.

Vaccination works by modifying the programs in the computer to include
a self-test mechanism within each program. This self-test runs each time the
program runs and checks the program to see if any changes have been made since
the last time the program has run. If it is any way different a warning will
be given.

The other way that an infection detection program works is through the
snapshot technique. The snapshot technique works by logging all critical
information in the system at the time of initial installation. Periodically, a
check routine is run and is compared to the original snapshot of the computer
system. If traces of infection are detected, the area of the computer is
identified and the user is notified. To date, infection detection programs are
the most protective guard against viruses. Norton AntiVirus runs in this
manner.

The last type is the infection identification antiviral program. It
identifies the specific viral strain already infecting a system, and usually
removes that virus. These programs scan the system for the infecting virus
and, when the virus is found, it is tracked down and removed. However, this
system fails to keep up with the ever-changing computer virus field. Infection
identification programs just can not keep up with the number of virus strains
out there.

All of the viruses that I have spoken about above are for PCs and
compatibles. You apple users don't need to worry to much about viruses,
because there are only about 5 known Apple viruses. This is because of how
difficult it is to program for a Macintosh in the first place. Unix users, I
have yet to hear of a virus for you, most likely because people who are using
Unix just aren't that kind of person and are usually quite intelligent.

So, computer viruses and other malicious software can be harmful but
they can be kept under control if computer users take the time to find out
what computer viruses are, how they affect computers, and how to prevent them.
There are numerous antiviral programs out there and now many computers have
antiviral programs pre-installed when you purchase them. Antiviral programs
can be very useful, but can be used to their fullest only if users take the
time to prevent the transmittance of the viruses on their own. One must still
be careful with their disks, computer systems, and who uses their things, so
they will not be infected with computer viruses and other malicious software.
So remember:

YOUR DISK WILL BE MIXING WITH EVERY OTHER DISK THAT
HAS BEEN IN CONTACT WITH THAT HARD DRIVE. THINK ABOUT IT!

Check out these sites to outfit yourself with anti-virus software:

http://www.symantec.com/avcenter/index.html :: Symantec anti-virus center
http://www.hitchhikers.net/av.shtml :: The anti-virus resource center
http://www.mcafee.com/prod/av/av.html :: McAfee Anti-Virus Software
http://www.drsolomon.com/ :: Virus info & More
http://www.eliashim.com/ :: Computer Security & AntiVirus
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Five-Finger Discounts
by Pinguino (pinguino@uix.com)
Dark Hour (darkhour@underworld.net)
Netmask (andy.scott@omn.com)
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Old people clip coupons. Cool people get the special five-finger discounts.
"How do I get one? I'm ooberelite!" Listen, it's not as easy as clipping
something from a newspaper, or anything. There's a technique to it. We'll also
give you a list of easy stuff to steal.

The "Innocent" look
Are you young and clean cut? Do you wear tighter clothing than most people?
Take smaller items and pocket them, or hold them in your hand. When you snag,
pull the item from its wrapping. Slip stuff into your purse or backpack; since
you're so squeaky clean, you won't be suspected.

The "Bad Kid" look
Do you LOOK like a thief? You either need to have sleight of hand, or you get
to be the distraction while your friends raid the place. You can also go to
the less populated areas of the store, and fill your many pockets. You
might need to try to look like an "Innocent" kid as well.

The "I Belong Here" look
Going to a Star Trek con? Ren Faire? Those places always jack up the prices.
You and a friend need to dress up (not too well) and go to one, then have
your friend talk to the dealer (old Star Trek vs. new Star Trek or some other
hot topic) while you steal.

Barnes and Noble
Get books here. Info. Books, books, lots of books, and 2600! =) Slip them
under your shirt, front and back, and arms. Carry a notebook and put magazines
in it. Sometimes you can put stuff into a backpack.

I've been able to have a large book, put my notebook over it, and walk quickly
out the door. With B&N you sometimes need to watch out for those tags, they're
inside the book, and will fall out. Leave them in and the alarm will go off.
We stuck one to Insight's butt and the alarm went off, and the cashier looked
up and said "It must be your beeper, sir."

Best Buy
You know, off the top of my head, I can't think of a better store to steal
from than Best Buy. They have small, easy-to-steal items that are worth a lot
of money. You can get a couple of movies, CD's, and N64 games all from the
same store!

One of the best things about Best Buy is they don't put those damned plastic
things on their CD's and tapes. There is only one security measure you need to
get past. On the outside of most all items at Best Buy is a small white
rectangle thingie. What you need to do is get a magnet. Pick up all the items
you need and head back to the refrigerator/kitchen appliances section (there
usually aren't too many people around here, you could also try the bathroom)
and rub the magnet on the white thing. Now you can walk out the door without
being caught by the false alarm things (I'm not sure about everywhere else,
but around here the alarm malfunctions often anyway, so what you might want to
do is buy a small item and walk out, the alarm goes off almost every time I go
through but I haven't been searched once).

Small, Independently-Owned Stores
This should be self explanatory. Unless you are a complete m0r0n you can steal
from these mom-and-pop places. They usually have no type of security at all.
Just pick it up and hide it. If you want, have a friend talk to the cashier
while you do it.

Natural Disasters
If you are ever in a store during a fire/earthquake/tornado, don't be among
the stupid little people running about. Use the chaos to your advantage. Grab
everything you can and run. w00p.

Sears Roebuck and Co.
Ok, what can I say? Sears, this 124 year old company, is a bunch of stupid
fucks. Most of the older stores have no cameras and no security. The new
stores have some cameras, but most (90%) do not have any kind of Gate
Security. All the glass cases (like in almost any store) are a sinch to open
without the key. There are two kinds that are mainly used. The first is the
one where the lock piece slides onto the rigid piece of metal attached to the
bottom inside piece of glass. On these, either get a good hold of the glass
section WITHOUT the lock on it, lift up, and take it out of the grooves. If
that's too hard, pull the one WITHOUT the lock out about 1/2 an inch and push
the other one in 1/2 an inch, then slide it open. For the ones where the lock
is built into the metal piece on the bottom of the glass, just do the same as
the last idea for the first kind. Pull one piece out, push the other in, and
voila, it's open. Also, If you find a register that is nowhere near anyone....
walk up to it, hit Return to get the screen saver off, then hit "5" (NO SALE).
When it asks for your Associate Number, type in "75" (this is a # that is
used by ALL sears nationwide). This is the one that returns are done on; all
the commission fraud happens with that #. Anyway, open it up and take the
cash. If you wanna have fun with phones, pick one up, hit 80, and start
talking (intercom). Here's how to crack the default code on all locked doors
(been the same at 8 Sears I've been to): there is a round circle of buttons.
Here is a ascii diagram..

X
X 1

1 2

X

You hit both 1's at the same time, then while holding those, hit the 2, then
turn the diamond-shaped knob. Most of these are unlocked anyway. The cameras
you often see sitting on top of the TVs, displaying their output to the TVs,
do not record; these are measures employees use to see if managers are coming
down the halls. If you actually want to purchase something, always ask if
there are any returns or anything on major markdowns. Also ask if there is
anything in the stockrooms over 2 years old. The computers there mark down
prices every month. I bought a 32-inch TV for $200. Sears is an easy place to
fuck over. After ripping it off, get a job there.

Food
Well, if you live in a big city, as I do, you will never have to pay for food
again. There are over 300 fast food restaurants around Denver, such as
McDonalds, Burger King, Wendy's, and lots of place with a drive-up that are
busy as hell (most everything I say here works better if you go inside). For
McDonalds, You can usually just cruise up to the drive-thru, and say "I came
through here yesterday at lunch time, and I ordered a Arch Deluxe with bacon,
supersized. You guys gave me a Arch Delux without bacon, and didnt supersize
my fries OR my drink." And they almost ALWAYS say "Just pull up to the second
window, and they will give it to you there." Burger King and Wendy's are
pricks about this, so what you do is this: call down there before you go, and
tell the manager that same story, but dont say Arch Deluxe, becuase they don't
have it!@#@!# Hehe.. anyway, they will say just come in and ask for -manager's
name here-. Also, in your local supermarket (King Sooper's, Market Basket,
Gerbes), if you just need milk or something, go to customer service and say "I
bought milk here yesterday, and it tastes disgusting, so I threw it out. Can I
get that replaced?" and they will usually say "Go get another gallon and come
back here." You can also make up stories for bread and all perishable items.

Office Supply Stores
Not the small ones with like paper and stuff, think Office Depot and Staples.
Chances are, you really have never been in one, but they have a ton of cool
computer stuff. They have NO security. You can also get a large item and put
a receipt on it, and walk out.

Wal-Mart
You know those domes on the ceiling? Half don't have cameras in them (if you
look carefully, they have 2 screws) and half are real (4 screws). They go to
one monitor at customer service and the logs are kept for 30 days and recorded
over.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-E-O-F-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
next →
1
3 Aug 2022
Now with the image for the first 10 Issues! Enjoy :)
sending ...
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you accept the Terms of Service and Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OKREJECT