Copy Link
Add to Bookmark
Report

The midnight raid issue 8

eZine's profile picture
Published in 
the midnight raid
 · 18 Jun 2023

!:rAIDEd::rAIDEd::rAIDEd::rAIDEd::rAIDEd::rAIDEd::rAIDEd::rAIDEd::rAIDEd::rAIDEd::rAIDEd:! 

**THE MIDNIGHT RAID ISSUE EIGHT:
**Destruction of mind, body, and spirit.
**10January2000

!eight brings hate!
,}a%$$$$$$$$$$$$$$$$$$$$$$gyi.
ip$$$$$$$$$$$$$fate$$$$$$$$$$$$$Z!
g$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$p;
y$$$$$$$$$$%ZX(<:``````^>ic#@$$$$$$$$$$t
F$$$$$$$$DX".>tsND$$$$$@g#y[; _y%$$$$$$$$t
1$$$$$$$@}.^y%$$$$$$$$$$$$$$$$DX`.n$$$$$$$$^
g$$$$$$%" t$$$$$$$$$$$$$$$$$$$$$%_ i$$$$$$$s
^$$$$$$$1 [$$$$$$$$NFuccuZD$$$$$$$@^ s$$$$$$%
<$$$$$$@. D$$$$$$c. ^P$$$$$$y _$$$$$$$`
;$$$$$$D $$$$$$g sl4y3r .$$$$$$a ;$$$$$$$.
`$$$$$$$, D$$$$$%. ;$$$$$$y i$$$$$$p
s$$$$$$u t$$$$$$P, >D$$$$$$" H$$$$$$1
:%$$$$$$I a$$$$$$$pssssssg$$$$$$$} n$$$$$$#
"D$$$$$$t X@$$$$$$$$$$$$$$$$$$D!.F$$$$$$p.
`y$$$$$$N>:c%$$$$$$$$$$$$$$g[.ID$$$$$%t
,uD$$$$$P!._cPPPPPPPPPPt".1H$$$$$gt.
<a$$$$DX:`([[[[[[[[[[>."y@$$$$n^
,u%$$$$HI`[p$$$$$$$$$$$$$@aI.t%$$$$g1.
X@$$$$@1.X@$$$$$$$$$$$$$$$$$$D1.u$$$$$g<
a$$$$$D^:H$$$$$$$$$$$$$$$$$$$$$$a.!@$$$$$i
f$$$$$@< N$$$$$$s!^::::::^_F$$$$$$n [$$$$$@"
.%$$$$$Z >$$$$$$1 of n$$$$$$: %$$$$$P
_$$$$$$X }$$$$$$; the [$$$$$$< #$$$$$$`
}$$$$$$s I$$$$$$F. m4y0r `H$$$$$$" g$$$$$$"
1$$$$$$D :@$$$$$$%Znuuuuuuy#$$$$$$$D.:$$$$$$$^
"$$$$$$$1 f$$$$$$$$$$$$$$$$$$$$$$$$i y$$$$$$%.
Z$$$$$$%> i%$$$$$$$$$$$$$$$$$$$$%I f$$$$$$$t
:D$$$$$$$c:.iFg@$$$$$$$$$$$$%HFI.>p$$$$$$$P.
:N$$$$$$$$Pf!;:::::::::::::`"!ug$$$$$$$$F.
[D$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$N_
(a@$$$$$$$$$$$$$$$$$$$$$$$$$$$$%y>
._XPD$$$$$$$$$$$$$$$$$$$$gat<
.d0m1n4710N!@@!#!$%

"it slipped, mutha fuckah"

DISCLAIMER:

As you poke me, mock me, possibly
try to eat me, I do not resist. I wait.
As you try and try, i make no move.

-r-r-r-r-r-r-r--r-r-r-r-r-r-r-r-r-r--r-r-r-----rrr-r--rr-r-raid...jo0r infect3d

http://www.countzeero.net/raid/
hotline://raid.dyndns.org:666

the warning of the werd starts. here. FOREPLAY.

raid3D [•]caste system hierarchy[•] rAIDEd

ev0l
h1tman
countz33ro
seti
alienbinary

[•]----------------[•]


r41d----------------------!@!@#$POET WARRIORS##!@#----------------------r41d
deadlymuffin h1tman the child that's black as a raisin
sEÑ0R r10T!@ bac0n ender pr0tist
countz33ro lupus seti nulltone
evilentity the jewish assassin alienbinary
kARN@! shroom teflon lemonFetish
error type 11 gray freak


!.......!...............TEXT VERSION CONDUCTED BY ev0l...............!.......!
PDF VERSION REMASTERED BY countz33ro




--!!-----[table of torture]
title page
disclaim the idea
laying on the table face down you're quite content
about the juarez
sadness, madness and more
05.the herd
06.scans
07.prankcalling
08.cellfone fear
09.untitled self portrait
10.electronic explosions
11.interference/the satan box
12.blackhole sun
13.the security of PGP
14.hex and such
15.rebirth
16.why i went vegan
17.SS7 signal units
18.nortel phone systems
19.norstar integrated communications system
20.hacker's insomnia
links
outro




.--------------.
#@------------#-----------#--aboutthejuarez--#-----------#-------------@#
'--------------'



multiplex;

server code that allows
multiple connections
at once. By seti.

multiplex.c

#@------------#-----------#--!@*(@#%#$)(*@(--#-----------#-------------@#

virtual ghetto craps;

what mo' is dere ta
say, white boi?!

vgc.cpp



...........................................@!#@!#!@#$@!#$..............



three for the show...

MR BEGIN MAN TAKE ME TO ANOTHER PLACE RIGHT THIS NOW
* has led my mind wandering hell.
now i meditate in a remainder of 10 divided by three
x666x.5=25.80697something.. who the fuck ...
cares?
whether up or down i always fucking dont control it.
alice in this land
alice in that land
it doesnt mean a thing when everything's the same.
maybe this IS lame. maybe this is the trend.
maybe it's just destruction of thought.
it's probably nothing.
fuckit.
another day another nothing.
another dAY.
another.
Next (time) just dont read it. Chew your left arm off to make
an escape.








i meant start here.







mindwentblank
representing the suppressed mind that has enables to resume in a place that we
found miles into yesterdays steel cage. repeat escape plus minus x rays that
graze in pastures with exotic crows. fr0s surrounding this submissive
atmosphere gleaming in the heat of The Natural Force. These crows. theSE
BASTARD CROWS THAT BOTHER ME IN THE MIDST OF WRITING in fright i crawl under
the shield called DIE/.mas3dsvcx zasxxcvdead fetuses resume reverbial
consonants pronounced backwards by say this that and more. the powerwhore who
controls my m1nd and my TV set has subsided and allowed me through the gateway
of drone humor and bullshit propaganda. buttons to press less to mess/fuck up
my mind behind the lactating breast they call the beginning of the skinning of
life....................&
the
knife
that
you
possess
is
one
of
salvation

--- begin tranmission ---

turn off

any electonic devices, including cell f0ns, lapt0ps, radi0z, or 0ther devices
which might _interFJEAR_ with the lil spiny thingies that go round-round and
point at where to fl4p. oh, k; then... one moment please while i transfer your
call. &&&SM 0 A9F4ÂG 0" EXACTLY AS IT IS TYPED
(do not include the quotation marksa;slksl)

muahahahaha. as if it were posch day anymore, well at least act int-arrested,
plz. thanks in advance for your help, officer friendly? and no- well, yes, but,
that's not why, unless it is, i dunno. it's
a joke. ha. &sigh)
applaud or be sh0ck3d.
applaud or be sh0cked.
applaud or be shock3d.
applaud or be 5hocked.
applaud or be 5h0cked.
^%reCON-figure-ing the para(kilo(meters &takyerpic and dumping buffer overfl0
to scrn..^1-GN-0-R-3
the ignoraNt
..egap
..bmodMODn/m




applaud or be shocked.
_____________________________________________NOW -em+intmsxzr0tmsxuu=^%ie2^NOW
&p4ra^%for\bolic..^

do you ?
understand, that isssnakes and the tired is not really what is there but it's
not mine and the weight needs to be checked a i nedeed to sl0w down and stop
tinker jst sit and but that is nott nott nott
thwhat i shold hold cold wulod.
you dullard..
w0anta0n elektrik kar^%n^.








[rp-fuvyoboyu ^%pr0duce-tiviti make h00 smile&youmeit
it's still a ..lie



axjeguidchtnmbrl'poygk,qf;v or yd.p.v
xcyjdv c ig.oo c odrgne n.apb urp y.an ydco
ycm.vv

^%a a a a a ba oeb be abab aand YES YES EYSSYESY mty ses eys eys eyes are
meaning something s, just l00k cl0ser, bu t t t t not t nbut not there. t yeah
he there. her present to you is now and forever, n0t objective but limitlesss.
sos no that's the the point you the fool 0h where oH h00t hh0 hh0 h00. aga ain
aia again ge gia gai gia yesh; so d e e t e4lask deal now and make my move e
the e rr a a eleven a move go gto to the dingin dingindin dining room now.








it make s d ed mad sense too; so me thubbti it^%toung^..





~~




really for four im' a it hit what fcop reack-t beat the choke unfare and pusssh
quite et spike
the punker pze
de[end fbum again hit-n-rUn son nas fer a t00.. weeeerm..


dd0d, ei think i'm goin g crazy and whiy is tha/jhim ? . nose hit on the fire
extenquis her bu t i adon't awa nt a to k ok aliright all the ppl awho i thouchg
ght wer eexistant andn ^%fire them to te and ane end ^ dont and its athr3 makin my
wuite mad, or ipolar o r ,dmib nkno w i asont esx epesct jfoo to eunderstan so how
ian mi alreddy spoosed to end it of konsume/timues aargh -piraeet) i cant say wjust
when it baegn bu its prollu teh whole in m y head time byut not see it by enin anyp
iepip one selse i see thhnkgs that arenor ther nietheer her why can it /back find
theward s rght and lef
koneencton trying ito orime
cash crime
i wankt nothing for me for free and the there thing whick aaed are i donot men la it
all scukes how does it me feelma mkekea and you fjoo ackenat avoid it mink fjoor
buisnedds and illl be spared gunhhgjf whowhy +pain smokitintiger iam dgum gettin
ing it shanke ke akesh the flying snakekes and flipping leave nows are nt n t even
there ehr hree yet you dont nt take the advide i can say i now what is m saying by
t llzplz so i cut it and hoped the y yowont fall off of ht eexit wyh and theyd ie
wubt we alredi godough +- prniaaaod tye do get brighter and its racist mbut changing
would ^%not^ amke it betta gbet on ti i say i think it scna it try liek i sayd
tckryazi so i cnat nt fokust can se
ui sownt sotp
stop
dont thaks nobody and i wont pretend so you won tnnton pretend to carrs
order and cold war yesfifteen but thats not to sayd that its not already time i just
want to shake aor ta sopttoopstopman i could use some hardtm thats nt hard tryit for
rh e firtst 3imte so what ig tott a go do tehh thi3fds who ne by do that doy ou.. oh
i dontnt nt sknowk wk sk ga sk tyr tio savoid the main str33dmnot com prysical maybe
tomorrow iwll be gbett are you no.. ^%quwse kqiwitz^ whoat does it matta her h e r
eebil nkow it dsoenst nt event workd like that it sis itn nt that ever either than
and deth grrl wont make it ebtter unsless nkow bu+/minus one t h e r doesn nt evevm
iexst wso soehwy do i keep seeing it ^%quezst^ that im 3ye not really noff)yes i
canvab bnacked so wheat if drives me kraksz why) i m agm togota go or itll exploesde
studpicd and i am a slave to mpules too show whoat time or f day should i ghave the
right ot accuse/give it


p r n i ; a a o d
alright?^5^%weud^





--- end transmixxon ---


~~



so you want a paperkut hehe, i see your bloodshot eyes, and although your number
is unlisted, i will always know where to find you.. first of all you better watch
not wher you re walking byt wgher you are vecause it is NOT what you have heard,
but rather what you are hearing.. i do nt know whether to
give you space and remain alone or smother the smoke.. thanks for the genuwine,
that was prolly the best complie i have heard in a long time.. you leave me
speechless, but maybe you will understand.. not that it is tu late, but watch
where you re walking and who you re calling because it is ten and im expecting..
oh maybe a month or tow, you see the doctors were not evry suspiciouis or
predictable or specifically precise..

what you think about that in the long run, i am hoping for a memorable five0R..
you understood.. i can feel yer star (on my neck)..


originality people originality.. the feeling is mutual obviously not on the same
level, though. you fjear what you cannot see /what you cannot understand /what you
cannot define /what you refuse i lik my star.. i want in in your eye.. i read it
many a time and each it made me smile, but it scares you.. my wishes came tru and
i realized how petite and unreal i was driven by..


later, ok??

how bout n_o_w..

_

~~



binary paper (they scared to tlak about it)

y4y.
at least it s accecptableie rationaol..



my wallas were flashing redn ot blu at me tru st me just once.. theres a blkack
ring in my sink and i do nt know where it came from.. my toung^&thubbbyt^ is
trungin blut tru tu, yet mie ribcage should be fine.. that s pr0p0sterous like
the just drugs sex connections relate *cunf0(kung-fu) zing* shawn ships and piracy
on high waters.. chaos tru, yet bet i don nt end up createing.. why would i want to
you aught to arske, f00l.. your dead child is coming to life and there s tension in
the air just letit pass morning will be fine.. how a-bouts some paxil so i can find
the ded foetus inside miesleuf,
pac ^&wrinkle faktor^
why you use the same things over and over agin, i cant see but ou are just as
predictable as you used to be i bet if i went up onstage and did the how to be a
west coast poseur and bobbed my head and folded my arms, you would look as if i
was craszy, would ntn j00r sorry arse is hollow and sleepy.. if you had the change
for mister peabody s way-back machine would you go back and stay on l00kout you
west coaset poseur?? the same chorssd released into the air i fiorgot, hehehe
oops.. brb..


no, you are too old and it is too late last time it was a different sit yer ass
down and listen to me situation ok my globe spins with the blu lightning left and
up as though you know what i am hiding(thinking).. cut the big talk, let s get to
the chase and i ll focus not on the physis as though it spins when i can think,
but the soul *click* (cr/h) cr0n phf.. da mellon dicatedion/tion isnt nt a porllly
good idea, but its the decision of hte council to represent god so im m there now..
ohe well maybe i ll be back later

hehe

*Karn"* smiles

cyakk==ll
cyall when the sun doesn nt rise again
cyall in hell

peace
to
kids

thanks for the advice, y all keep on growin k??

*Karn"* looks uneasy.
pr0sterity is non-evitable.


a b o r t


~~



something died today. i can hear it bleeding. piggly wiggly came, but that was
earlier. maybe he killed it. i was just as careful as always, but perhaps i lost
something. the dog stopped to listen, too. time to hoard. the end is not near. the
end is here. we have tapeworms, but don't know it yet. i thought i forgot, but then
i remembered. i counted, see? misunderstood
misinterpreted
misinformed
misguided
sorry about your image. sorry about your hair. hire me. i refuse to work for who
cunfused us. i won't call him that either. he has a name, you know (what is it again?).
how can you claim or expect or negate? hypocrites you are, all. so much for catchy
slogans and pretty logos and loud commercials. glad i/you share something with you/me.
should we focus on that or wait to find ourselves in each other? an answer would be
nice.

y0.

~~




editor's gn-0te: CRACKROCK? eye_totally condone_ the use of crack in any f0rm. it's
really neat-0. jeeehehe. if j00 see me in fifteenyears, favor me, kille me, k
^&questwualst^ ?? y4y!@#



DIE CONFORMIST BOY SCOUT MASTER BASTARDS. YOU MAY RESIDE IN THE COLD LAND OF NO
RETURN WITH SANTAA#EWsdsafdxzczxczzzzzzzzxczcxzxxzczcx


asf. RrAGe

the anarchist/socialist militariless farm-city repetition is an idea which will
lead to our completion of the cycle. the rebirth of man and freedom.

YET WE REMAIN NOTHING.

YOU DONT MATTER.


I DONT MATTER
fLATT3r3d
only.....
The heroine and the blood.



The lines are cut, the cocaine is put into lines. The heroin is lined up,
the codiene is crushed. The television would probably show the familiar
terrorist scenario, featuring this week's 15th y2k warning. The armageddon
may become the self fulfilling prophecy of the christ killers, the religious.
I remember that Marx called religion the opiate of the people. If that is true,
then government is the barbituate of the poeple. It calms them down, and tells
them everything will be okay. It claims to protect them from the monsters under
the bed. It lulls them to sleep with legislation and judiciary shit, and bills
and ammendments. It shreds the constitution to make a pillow. The yuppies of
my town talk about they're stocks and they're cars. They talk until it becomes
ambient noise, and then resurfaces and enrages me. I put the heroine on the spoon
and light it. The razor blade cuts deep. I soak up the blood with a qtip. It
fills the cotton with blood. I hate my life. But the drugs aren't that bad. I
love my powder. It's the poeple that suck.

ITS FUCKING RATIONAL

reigning 5 eyes something about dying in fields of blue and green/amazing
monkeys battle dinosourz i mean naked wax models of cannibals TRAPPED IN A HOUSE
OF MIRRORS

glass
green
orange
yellow
black
purple

!BLUE!
y2k disaster y2k r10t y2k murder y2k crucifix running
through the town terrorizing the beautiful people that
make me sick in bed and the head maybe a little dead y2k
give me some fucking head bled for fucking y2k



where is thisgetting ..,. . .

The night before, he had smashed one of the bulbs on a string of christmas lights he
had hanging on the wall behind him while leaning back in his chair. As he tipped his
chair back, leaning against the wall with a smirk his knuckle briefly made contact
with two little white wires. His body jerked and twitched, his heart tensed and
failed. Two days later, the neighbors complained about an awful odor eminating
from the side window of his house. And there was Bob, lying there with a twisted
scream etched accross his pocked and pimpled face, his left hand clutching at his
chest. A sad way to go.

Don't fuck with karma.

we have designed this issue of the raid to become more expensive as
the
thirst for IT rises..
capitalist justice
asf
asfd
zxvc
$

I NEED A PLACE WHERE NO MONEY IS SPENT

we reside in a pool of cash money hoes.
dignitfucking y
digital chain gangs wreak havokk on local charities.
NO MORE LOVE
how many rivers do we have to cross...until we can talk to the boss?

it doesn't matter: proceed.









xa0o0o0o0o0o0o0o0o iT aLL sTARTS rIGHT hERE o0o0o0o0o0o0o0o0oax





















http://www.countzeero.net/raid
hotline://24.8.182.77:666
mailto:phear@countzeero.net





...but then again..i'm a man of substance!


















xa0o0o0o0o0o0o0o0o here.. o0o0o0o0o0o0o0o0oax




five @! 5 !@ five
@! the herd !@
five @! by ender !@ five




Today I thought I would take time to write about the Herd. As with many things
about which I write, I feel strongly about this topic. When I refer to the Herd,
I refer to the Human Herd. The 'masses,' if you will. Of course, we've all heard
the term 'masses' used before, but I think that it bears much more meaning than
people want to attribute. People generally hate being called part of the Herd, and
often times try to pretend that they are totally indifferent to the opinion of
other humans. This, to me, appears to be one of the greatest defects in the human
machine. Generally speaking, humans hate being called an animal of the Herd, but
frankly love being part of it nonetheless. They say ignorance is bliss. I say
ignorance is ignorance, bliss is bliss; maybe I'm just more intelligent -- I don't
know. But I will say this, I believe in defying the trend and subverting the
paradigm.

So let's look at what it means to be part of the herd. For ages, politcal
leaders and philosophers have reffered to the people of their land (or earth) as
the massed, the mobs. What is meant by this? Well, let's look at the definition of
herd from Webster's dictionary. I like this one: "a number of animals of one kind
kept together under human control." But I also think it is important to note this
definition as well: "the undistinguished masses." I think this says it all. It appears
to me that those people who refuse to think for themselves, to think freely are only
contributing to the herd. They are becoming part of it. And it seems the more members
in the herd there are, the more new members it gets. Often times we refer to the
masses as people who all look and act the same. But what is important here is
understanding the reason that they act the same. Much of this I attribute to Faith,
religion and belief. Not to mention that fact that popular culture today leans
towards conformity, closed-mindedness and a retardation of mental and intellectual
growth.

I don't consider myself to be part of the herd. And I don't go out of my way to
prove to people that I'm not part of the herd. Being part of the herd is a state
of mind (if you can say these people think at all...). It is the outward
expression of this mentality that one notices most. But let me ask you a
question. Say I was a Christian who preferred to wear Tommy Hilfiger and
Abercrombie and Fitch clothing (I'm not.) Would you say that I am part of the
herd? Most people who are outside of the herd would say yes, those part of the
herd would say no because humans don't like to acknowledge that they're stupid.
But appearances are usually decieving. THe person described above might not be
part of the herd at all, as his outward expression may not reflect his
mentality. It is perfectly possible that he is a Christian and wears trendy
clothes because he sincerely believes they are the best. Does this constitude a
member of the herd? It depends on why he believes what he believes. People have
a habit of deluding themselves into thinking the best of their beliefs. If he is
a Christian because it answers life's hardest questions for him and requires him
to do no extra thinking and if he wears trnedy clothes in order to better fit,
then I would say this poor animal is part of the herd.

But let's think about something even more interesting. The definition of herd
included that the animals were controlled by some human. I love this. But it is
also a hard thing to try to answer. Who or what controlls the human masses? I
think the root of all herd instinct comes from religion and morality. That is,
after all, the root reason why these people all come together. It is a common
belief in ignorance and the evilness of man which causes these people to become
like a flock to the rest of man. That's right. The masses are the flock, and we
few freethinkers are the shepards. Unfortunately, it seems, someone had the dumb
idea of creating the flock in the first place, and the world has never been the
same.









6
rAID3d 666 rAID3d
6


-----
SCANS
-----








180034599xx/180034500xx
by h1tman

****************
*1+8oo 345 99xx*
****************

00 - dirty wh0re lady
01 - busy
02 - Decision1
03 - Decision1
04 - Decision1
05 - Answering Machine (10:15 Est)
06 - busy
07 - carrier
08 - some corp
09 - busy
10 - cannot be completed as dialed
11 - Some Medical Service
12 - carrier/fax?
13 - at&t easy reach 800
14 - some guy
15 - Answering Machine
16 - Cannot be completed as entered
17 - MTR
18 - Some guys VoiceMail
19 - some chick
20 - changed
21 - invalid/blocked
22 - VMB
23 - did not activate his voice mail
24 - forwarded to some VMS
25 - cannot be completed as dialed
26 - please enter your 4 digit pin
27 - please enter your 4 digit pin
28 - VMB
29 - VMB*
30 - Continous ringing
31 - busy
32 - disconnected
33 - some guy
34 - at&t easy reach 800
35 - Answering Machines (cuz im calling on a sunday)
36 - VMB
37 - not active
38 - busy
39 - loud ass black woman woman
40 - invalid/blocked
41 - some guy
42 - pulsating tones
43 - Continous ringing
44 - Call cannot go through
45 - Cannot be completed as enterd
46 - Continous ringing
47 - please enter your 4 digit pin
48 - Cannot process my custom caller request
49 - Cannot be completed as dialed
50 - busy
51 - VMB
52 - Continous Ringing
53 - VMB
54 - disconnected
55 - not in service
56 - HealthPlus(VMB)
57 - not in service
58 - VMB
59 - some shoemaker
60 - VMB
61 - Continous Ringing
62 - Continous Ringing to Recording
63 - carrier/fax
64 - Child Support
65 - nationwide messaging
66 - Answering Machine(7:27 EST)
67 - cannot be completed as entered
68 - some guy
69 - recording
70 - Answering Machine
71 - some lady
72 - Some Rehab
73 - inventor of total gym.
74 - disconnected
75 - Continous Ringing
76 - Child Support Office
77 - Recording (cuz im calling on a sunday)
78 - at&t easy reach 800
79 - Please enter your employee id #
80 - some place
81 - Child Support Shit
82 - " "
83 - VMB
84 - Same Child Support thing
85 - pager
86 - Cannot be completed as dialed
87 - Answering Machine (cuz im calling on a sunday)
88 - Recording (cuz im calling on a sunday)
89 - Continous Ringing...Answering Machine(cuz im calling on a sunday)
90 - BellAtlantic h0h0h0
91 - busy
92 - busy
93 - Continous Ringing
94 - Continous Ringing
95 - some reservations
96 - disconnected
97 - changed
98 - busy
99 - Graphics place



****************
*1+8oo 345 00xx*
****************
by h1tman

00 - Continous Ringing
01 - cannot process cutsom caller request
02 - Continous Ringing
03 - some lady
04 - some chix0r w4ng
05 - VMB
06 - cannot be completed as dialed
07 - carrier/fax
08 - cannot be reached from my calling area
09 - some guy
10 - Continous Ringing
11 - weird tones
12 - ed
13 - something associate
14 - blarg
15 - disconnected
16 - busy
17 - at&t easy reach 800
18 - some lady
19 - some lady's answering machine
20 - Some Highschool, you can listen to hw assignments =) ext.235
21 - some guy
22 - not available from my calling area
23 - something Medical
24 - busy
25 - Cellular 1 VoiceMail
26 - PhoneMail
27 - cannot be completed as dialed
28 - cannot process custom caller request
29 - cannot connect my call
30 - blah blah blah and Expressions
31 - Some Motor Systems
32 - carrier/fax?
33 - busy
34 - cannot be connected
35 - not active
36 - busy
37 - VMB
38 - Answering Service
39 - busy
40 - carrier
41 - at&t easy reach 800
42 - busy
43 - Continous Ringing
44 - Patty speaking
45 - Customer Service Operations
46 - french?spanish?ahhh!!tricky bastards
47 - not in service
48 - some lady
49 - invalid/blocked
50 - please enter your four digit pin
51 - a recording
52 - recording(after hours)then music
53 - Continous Ringing
54 - Conference Calling Center
55 - Continous Ringing
56 - answering machine (8:09PM EST)
57 - disconnected
58 - please enter your four digit pin
59 - cannot be completed as dialed
60 - unable to connect mah call
61 - Continous Ringing (8:13PM EST)
62 - Continous Ringing...to Answering Machine(8:13PM EST)
63 - disconnected
64 - Some Billing Service's VMS
65 - some lady
66 - VMB
67 - not in service
68 - some lady
69 - cannot be completed as dialed
70 - Continous Ringing
71 - strange tones
72 - disconnected
73 - Continous Ringing
74 - cannot be completed as dialed
75 - cannot be completed as dialed
76 - 76 performance problems (answering machine 8:04PM EST)
77 - cannot be completed as dialed
78 - this account is currently inavailable
79 - call did not go through
80 - Law Office's Answering Machine(called after hours)
81 - some security place (vmb) where you can dispatch police
82 - a paging and message center
83 - invalid/blocked
84 - some lady
85 - cannot be reached from my calling area
86 - disconnected
87 - s0me ch1ck
88 - some guy
89 - cannot process custom caller request
90 - cannot be completed as dialed
91 - Towing place,(Answering Machine)
92 - non working 800 number
93 - disconnected
94 - not available from my calling area
95 - disconnected
96 - Excess Publisher's Network(VMB)
97 - Nothern(?) Sales
98 - disconnected
99 - cannot be completed as dialed


1-800-345-0020 x
232 252 411 309 255 206 306 253 212 414 421 409 402 260 243 247 404 201
254 245 200 406 304 308 217 246 319 408 228 241 311 211 228 243 303 413
403 256 259 410 456 257 403 248 314 312 407 249 230 226 316 240 244 250
202 233 315 218 210 213 204 310 302 401 320 220 242 400 234 203 214 227
301 307 317 422 412 312 251 313 405 225 420 300 236 222 415 239 237 258
318


@!$@@$@!$@@!$@!$@!
@!
@! scans...by ev0l
@!
!@#$@$@#@$#$@!$!@!

180034511xx

11:37pm 11/22/99

00 - audix
01 - Andrew's Publications
02 - not active
03 - some chamber of commerce (AM)
04 - Allen Shermanhough (VMB)
05 - General Findings
06 - Disconnected
07 - some wh0re
08 - con't ringing
09 - not active
10 - travelmax
11 - audix
12 - not active
13 - didnt get thru
14 - some bitch named suzie
15 - con't ringing
16 - voyager extended warranty
17 - silly spanish talk
18 - insurance co (vmb)
19 - not active
20 - some personal guy's tech support line
21 - some medical co
22 - insurance co
23 - getgo interactive recruitment center
24 - final dermatology
25 - very wierd...try again from another line
26 - sexx
27 - sex
28 - not in service
29 - wood working place (AM)
30 - executive health co
x 31 - carrier
32 - nationwide messaging
33 - not active
34 - not active
35 - sex
x 36 - carrier
37 - psychic
38 - access tech co (VmB)
39 - vision realty
40 - come back to this
41 - not active
42 - lubricat costomer service
43 - dental healthway
44 - con't ringing
45 - person
46 - ring ring ring ring
47 - whore
48 - whore
49 - some long distance shizt
50 - wierd as hell...come back to
51 - audix
52 - some long distance shizt
53 - attEZreach
54 - some long distance shizt
55 - dumb whore
56 - realty co (VMB)
57 - some long distance shizt
58 - not active
59 - con't ringing
60 - dayton tire costomer service
61 - some automated sys
62 - busy
63 - kind of like 61
64 - not active
65 - some long distance shizt
66 - hospital like place (after hours)
67 - some packaging place
68 - busy
x 69 - carrier
70 - some long distance shizt
71 - some long distance shizt
72 - www.vanguard.com--bank/funds
x 80 - carrier
85 - very odd
91 - jefferson city chamber of commerce
93 - odd...like 85

12xx

00 - inverter whores
01 - not active
02 - busy
03 - michael smith (VMB)
04 - dumbass co
05 - ringing...
06 - busy
07 - forward to book whore
08 - oddd....like 1185
09 - m&m's..HEH!@
10 - not active
11 - slow busy signal
12 - JVC's auto order
13 - the Partycat
14 - like 85 again..
x 15 - carrier/fax
x 16 - carrier/fax
17 - spanish auto sys
18 - -337
19 - -337
20 - not complewted
21 - -337
22 - -337
23 - -337
24 - -337
25 - gay sex@!
26 - some guy
27 - error lady..not the normal lady..
28 - guy's vmb
29 - guy's vmb
30 - busy
x 31 - fax prolly
32 - busy
33 - -337
34 - gn0t active
35 - EZ reach eight hunnid
36 - land brokers (VMB)






*****************
** SCANS
** s..eti...
*****************
1-800-777-1235 - Order your bible today

1-800-555-6666 - YES!!! babiewabbywabbyzulu talk!
1-800-555-6659 - hot girls love fone sex too, only 69 cents a minute, haha
1-800-555-6654 - carrier
1-800-555-6665 - weird ring....sounds like my fone is on drugs
1-800-555-6689 - carrier - dialed back
1-800-555-6682 - Qualtitech Business Machines
1-800-555-6677 - Dial password and press #
1-800-555-6266 - hey big guy...gay sex...vukasins personal #!
1-800-555-6283 - hot sex
1-800-555-6284 - strange tone...
1-800-555-6286 - Fiber Net customer service
1-800-555-6287 - Quaker Oats CO.
1-800-555-6288 - same strange tone....
1-800-555-6289 - Attack Line
1-800-555-6291 - carrier
1-800-555-6294 - carrier
1-800-555-6296 - hick saying call did not go thru..HEH!@$
1-800-555-6298 - some chick...guthen residence, chick didn't know she had
an 800 #
1-800-555-6304 - Attack Line
1-800-555-6308 - carrier
1-800-555-6314 - WestWind Group, * to enter UID
1-800-555-6315 - Ron Plant from Idaho Security
1-800-555-6318 - someone's pager, be ready to leave message RIGHT AWAY
1-800-555-6319 - Fortress Surveylence - uhh like the cops, don't call,
lady seemed pissed
1-800-555-6320 - somone's pager
1-800-555-6321 - Voice Mail, * to enter security code
1-800-555-6322 - Reliant Energy, emergency gas leak line
1-800-555-6325 - Automated Authorization Center - enter bank #
1-800-555-6326 - David Robinson's Pager
1-800-555-6327 - someones pager
1-800-555-6328 - hot sex
1-800-555-6331 - Attack Line
1-800-555-6337 - Talk line
1-800-555-6338 - hot sex
1-800-555-6339 - Enter 4 digit pin now, or * to enter calling card #













se7en @! 7 !@ seven
@! prank calls !@
seven @! alienbinary !@ seven













öÄŸÖŸÄö intr0 öÄŸÖŸÄö

Alot of people beleive that prank calling is a childish and immature..but
it's an art. Given that there are always people that will call up, say
"penis" and hang up it gets a bad reputation. However, the art of prank
calling is this. how do you keep it interesting for both parties, so that
no one is bored, how do you keep it funny, yet not rude, and how do you
find out whether the operator you're talking too is cool with it? I have
some rules for calling:

1) try to keep the vulgarity to a minimum because some assholes get offended
and will hang up.
2) how do you get a good intro so that the operator doesn't hang up.
3) how do you not offend the operator, so that they don't call back, and
trace you.
4) always be clever. It's not only irritating for the operator to get asked
about their refridgerator, but it's also stupid.
5) keep up the conversation, and try and act like you are serious.
6) the operator only gets into it if you do.
7) if there is a pause, then hang up; it is possibly a trace. I know from
experience.
8) if you get the impression that the operator is a dick right off the bat,
then hang up.

öÄŸÖŸÄö b0dy öÄŸÖŸÄö

.
.´\ / \ .------------------------ <begin hax0r conversation>
\/ '

Alien talks to the nynex operator (411)
by alienbinary

*** tone, and then james earl jones says "welcome to bell atlantic"

Recording: What city?
alienbinary: Mars
Recording: What listing?
alienbinary: Marvin

*** tone, then "hold please"

Operator: Is that local?
alienbinary: uh... yes...
Operator: In massachussetts?
alienbinary: uh, yeah, sure, it's near belmont...
Operator: I don't see it...
alienbinary: *amused* oh, it's there...
Operator: I really don't see it, are you sure?
alienbinary: It's also near springfield.
Operator: I'm looking at all the possible listings, I don't see it.
alienbinary: you don't have it on a map?
Operator: no, sorry, sir.
alienbinary: shit, that sucks. They should give you one.
Operator: yeah.
alienbinary: alright, well thanks anyway. *clik*

Alien Calls Gateway
by alienbinary

Operator: Hello, and thank you for calling gateway, my name is XXXXX, what's
your's?
Alien: My name's XXXXX.
Operator: Ok, sir, and how may I help you?
Alien: Do you sell microwaves?
Operator: As in microwave ovens?
Alien: Yeah, like those.
Operator: No, gateway is a computer company.
Alien: And you don't make microwaves?
Operator: No.
Alien: You can't put popcorn in computers, can you?
Operator: No.
Alien: Do you know of any places that sell microwaves?
Operator: Try an appliance store.
Alien: Alright, thanks. *clik*

Alien Talks to SNET employees (CT telco)
by alienbinary

Some SNET guys came to a therapeutic boarding school I'm locked up in (surprise,
surprise.. lotta hackers, more pirates, though). They came to fix the phones. ShaShi
and I walked up and started talking to them. I asked them if I could play with the
handset, they said sure. I was like, oh shit, it's got int'l codes! The guys gave me
a look like I had pubic hair on my forehead, then they asked me what that was. I told
them that their handset ruled, and I wanted it. Unfortunately, the ten bucks I offered
didn't compare to ShaShi's $250. Oh well, at least they told me I could have any extra
trucks... I think they were kidding. I don't care, I already picked the one I want out.
It has cat five and ISDN cable too. Fucking dedicated lines... I only have a 56k...
That means it has crimping tools. That means more toys! I like toys... When I was
younger people had action figures. I had a modem... oh well...

Alien Calls SNET's low rates operator
by alienbinary

I was going to call SNET, but as I waited for the operator to pick up, I heard
the guy say "I'm going to kill someone if this is another damn kid". I think I
pushed him too hard previously. Oh well.. if he jumps out the window, I'll steal
his headset.

Alien Fuqz with Microcock
by alienbinary

I once went into a Staples, it's an office supply chain if you don't know. I
went to the computer section and stole all the microsoft mail-in rebate forms,
the microsoft customer service forms, the windoze 98 pamphlets and everything else
and I walked to the aisle with the paper shredders. I shredded all the microdick
shit. Next, I printed "hack the planet" on those label makers, and put them all
over the computers. They sort of flipped out...

Alien hax0rz an AirTouch Pager
by alienbinary

*** dialtone
*** 1800XXXXXXX (note: this was the number of the payphone I used with the
1800 prefix instead. It just happened to be a pager.)
pager: beep beep beep
alien: (wtf?! it's a pager) *clik*

*** I get an idea

phone: dialtone
alien: 1800XXXXXXX
pager: beep beep beep
alien: 918509 (gibson, with a 9 for an "n")
alien: #
pager: thank you for using airtouch paging!

*** speed kicks in again! !#(&@(#&(@&(*##$@#@!#@@#@$^$*&!@^!&@

Alien Does Some Scanning
by alienbinary

1-800-7672676 ; left obscene voicemails
1-800-BLOWJOB ; can't be called from payphone
1-800-POKEMON ; busy signal
1-800-333FILM ; got modem signals
1-800-HOOKERS ; voiceprompt, then CC# request.
1-800-SEXLINE ; can't be called from payphone
1-800-FUCKYOU ; got new number: 1478328223 (?!)
1-800-LOVEGOD ; got voice menu, ordered shit I don't
; need to some other fucker.
1-800-6541234 ; not toll free
1-800-BEAVERS ; pbx for "dial-800" (gay?!)
1-800-HOTMAMA ; not payphone reachable
1-800-ASSGRAB ; payphone shit
1-800-2459896 ; some fag in china rikey my airtouch pagey skillz
1-800-HACKERS ; consumer resource center (?!)
1-800-4652851 ; pager, includes functions. hax0r3d!
1-800-GETLAID ; payphone shit
1-800-9999999 ; the covenent house crisis center
1-800-8417456 ; modem
1-800-FALWELL ; medical center, voice menu
1-800-GAYPORN ; fag sex line
1-800-HOTTITS ; payphone bullshit
1-800-FEM4FEM ; I think it said home castration.... and bluebox products...
WTF?!

Alien asks random person if they fear the raid
by alienbinary

ab: do you phear the raid?
rp: huh?
ab: it's just a question, do you phear the raid.
rp: if I was a bug... (nervous laugh)
ab: shut up, and answer the question. Do you phear it?
rp: what the fuck is the raid?
ab: well?! (I tormented him for a while)

he phears it now...

Alien and Cheezi tell off some bitchass fag
by alienbinary

ab: did you hear? ben wants to learn c/++!
cz: yeah, I gave him like 8 books from the basement.
ab: hehe
cz: I gave him visual basic too.
ab: yeah, he needs to start low.
cz: that's what I told him.
ab: he's gonna hang himself when he starts c.
cz: I know.
ab: I think he's a great kid, but he will kill himself.
fg: he's gonna...
cz: shut up fag! at least he wants to learn.
fg: unlike me. (he gives out a nervous laugh, because it's true)
ab: you peice of shit.

he phears.

Alien calls radison hotels
by alienbinary

guy: Hello, my name is luke, and how may I help you?
alien: I'm looking for a hotel on jupiter?
guy: and what state is that in?
alien: I beleive it's in the milky way, I don't believe it's in any states.

*** long pause, it occurs to me that he's trying to trace. (*clik* I hang up)

I guess someone failed astronomy and geography.

Alien Calls Taco Bell
by alienbinary

*** voice menu
*** I select 3 for taco bell plush toy inquiries

taco bell operator: hello, how may I help you?
alien: how much does the plush dog cost?
taco bell operator: in stores it's $3.99.
alien: does it vibrate?
taco bell operator: no, it talks.
alien: can you get it to talk dirty?
taco bell operator: no, is that all?
alien: yeah. *clik*

Alien calls 1-800-DEMOCRAT
by alienbinary

voice message: you have reached the office of XXXX XXXXX, please
leave your name and address and we'll call you back.
alienbinary: yeah, I was thinking of becoming a democrat, and I was
wondering if I get a cigar if I do. Yeah, a wet one,
and a cute little intern as well. I hope you get my
voicemail.
*** pound key

voice message: recording stopped.
alienbinary: *clik*

Alien calls 1-800-MATTRESS
by alienbinary

slut who sells furniture: hello, and thank you for calling 1-800-MATTRESS,
how may I help you.
alienbinary: yeah, well you see... STOP FUCKING ADVERTISING ON MY
FUCKING TV! *clik*













eight @! 8 !@ eight
@! cell fone mirth !@
eight @! überphuck !@ eight












So here's the thing... you get two cell phones. Both should have the three way
calling service on them. Call one cell phone using the other. Now each cell
phone has an open line. Switch both phones over to that line, leaving them
connected to each other on the other line.

What you can do with this:
Use one phone to call a (gay?) porno number, then hit send again (or whatever
you have to do to start three way calling). You now have a cell phone with two
lines coming into it; one from the porno number, and the other from the other cell
phone. Use the other cell phone to call some random person, or some shithead you
don't like. When he/she answers, press send and initiate three way calling on that
cell phone. You will have successfully connected that person through the two cell
phones to the porno number. It will appear to that person as if he/she picked up
the phone to hear the porno number. You could also call two random people and
connect them together, causing mass confusion, although timing is difficult.

Here's a nice lil figure...

_ _
| |
| |
| |
| |
| |
/-------\ /-------\
| ----- | | ----- |
||Nokia|| ||Nokia||
Other Person or --->||_____||<--->||_____||<----Person to fuck with
porn number --->| 1 2 3 | | 1 2 3 |
| 4 5 6 | | 4 5 6 |
| 7 8 9 | | 7 8 9 |
| * 0 # | | * 0 # |
\_______/ \_______/
Cell 1 Cell 2

Hence, each person thinks the other called them.
Oh shit, endless fun. Lemme tell ya...

über connecting asshole to 1-800-GAYLOVE:

asshole: "hello?"
other end: "Hey men, feelin horny?..."
asshole: "uhhh... hey, yeah..."
...
<me hanging up VERY quickly>

über connecting high school principal to vice principal (at school):

(both parties): "hello?"
<awkward pause>
vp: "Uhh, Brian?"
p: "Yeah, what's up?"
vp: "I don't know, you called me... what..."
p: "What's this, a joke?"
<I put mic of one phone to speaker of other causing massive feedback>
p: "What the hell?"
vp: Something's wrong with the phones or something..."
<me screaming into both phones and hanging up>











nine @ 09 @ nine
@untitled self portrait@
nine @ gray @ nine













Anchor: In other news, Strong Thurman High School in Greenbow, Alabama was
ground zero in a massive nuclear explosion caused by teens in California. We go
live to Polly Esther who is on the scene. Polly?

Polly Esther: Greenbow, Alabama. A quiet, southern town of 120. Every morning
the milkman drives down the quiet, suburban streets and the paperboy delivers
the Greenbow Enquirer. Who could have imagined that it's High School phone
system could lead to tragedy?

<cut to principal>

Principal: Well, ya see, we got this here telephone thing so them there kids can
call us and get there homework, see? Whooooeee, ain't it something?

Polly Esther <voiceover while walking through rubble>: But that phone system
attracted the attention of several communist computer criminals across the
country. Upon calling for the 423rd time in a day, these "Hackers" shorted out
the Private Branch Exchange and caused a thermonuclear reaction equal to that of
a 10 megaton nuclear device.

<cut to lame hick>

Lame Hick: What I actually heard was that those dang'ole kids was callin' to
hear that man's voice. Why oh why did this have to happen? That dang microwave
explosion scared my cows away, and I have to build a new chicken coop!

Polly Esther <voiceover>: After much investigation, the FBI has come to the
conclusion that the culprits are a subgroup of the Trenchcoat Mafia and have
members in the KGB, CIA, NSA, KKK, KFC and, most frighteningly, the NBA. They
are also members of a nascent group of "hackers", or radical political criminals
whose crimes involve manuvering sattelites to make illegal phone calls and
placing pornography on the screens of computer users in the Vatican.

<cut to FBI honcho>

FBI honcho: We're not sure at this point how many of the so-called "hackers" are
involved, however at last estimate we had at least 2348 suspects that we're
taking a look at. Hackers are a growing problem in the US and abroad, especially
now that the little pukes have learned about vulnerable "small towns" as we like
to call them here at the Buerau

Polly Esther <voiceover>: But the citizens of Greenbow say that isn't enough.
They have taken a bill to congress which, if ratified, will ban the use of
computers across the nation.

<cut to lame hick>

Lame hick: Yup, this would'a never happened if we hadn't let them kids play with
those damned computers. We need to ban this Windowsill 20 thing and make sure
that nobody else has to rebuild their chicken coop.

Polly Esther <voiceover>: In addition, one family's death is being blamed on the
hackers' persistance in calling the 800 number. An instructor at Strong Thurman
High School was driven to suicide after several calls criticizing his "angry
voice". Investigators are puzzled as to the hackers' motives, however it is
clear that this man was indeed angry.

<cut to weeping wife>

Weeping wife: He just up and died one day! Up and died! I can't express my rage
towards those damned kids! What is it they were doing, some Compuserving or one
of them electro-technology gadgets? I want them on a pitchfork, ya hear? A
pitchfork in my cotton fields!

Polly Esther <voiceover>: No one in Greenbow has yet to hear the words of those
involved. However, by using one of their devices of torture, IRC, we contacted
one of the hackers involved. He wouldn't tell us is real name, but he invented
the pseudonym "Natas". He says he is a 400 year old elf living in the "Enchanted
Wood east of Remulack".

<cut to boy shrouded in darkness while sitting in a conference room.>

Polly Esther: Glad you could make it, Natas.

Natas: fuck you! I'm the dictator!!

Polly Esther: What was motivating these devious criminals?

Natas: stop using more than one name!

Polly Esther: I see. Did you have any input on the 800 number in question?

Natas: heil natas

<cut to farmland>

Polly Esther: After it all, there is still hope. The local church has organised
a book burning in which all computer-related books will be burned. The locals
believe this event will raise the spirits of those who have lost family and
friends to the hackers involved.

<cut to Reverend>

Reverend: Yep, we're gonna have an old fashion revival. I believe that the
disciples said it best in John 4:54 when they said, "So let it written, so let
it be done, thou shalt not make null pointers. And, ye verily, thou shalt not
partake in the pagan tapping board ritual."

<cut to Anchors>

Anchor: Wow that sure is something. Was that something Jennifer?

Anchor^2: That definitely was something John.

Anchor: If you would like to dedicate some of your time to Strong Thurman High
School, the number to call is 1-800-345-0020.

Anchor^2: In other news...

<both anchors smile, vaguely interested.>











ten @ 10 @ ten
@electric explosions@
ten @ astrosmurf @ ten











1 - explosions

There are a few electronic components that make nice explosions under certain
conditions. The most common are:

Transistors
These are quite easy to kill, especially the puny ones. Just wire a high voltage
(30v or more) across any 2 legs and they pop quite nicely.

Diodes
These explode about like transistors, and are usually cheaper.

Resistors
If you double the voltage across a resistor the current will double, so the power
dissapated will increase fourfold. It works especially well with small resistors
which will give a higher current. They generally tend to heat up a lot and start
to smoke a lot, but sometimes they fizzle and even make popping noises.

741s
A 741 is a basic operational amplifier - quite common and cheap. They can handle
30v(+15v to pin 8 and -15v to pin 4), but if you wire these up the wrong way round
the poor little things can't cope. you'll either get some nice smoking and a cracked
chips, or they will go bang and fly off in a few hot shards.

555s
A 555 is a timer chip that can be used to make oscillators and other useful things.
They also make quite loud bangs. They run with up to an 8v power supply, but if you
increase this they pop. It's best if you reverse the polarity, giving louder bangs
than a 741.

Capacitors
By far the best for exploding. The type you need to use are electrolytic capacitors,
which are polarised. Obviously you have to wire them in the wrong way round, and
about 30v should do (this depends on the specs of the capacitor...some are built
to withstand a lot of damage) for a small capacitor. A few µFs is the kind of size
you're looking for. The capacitor has some wierd chemicals inside to help it work,
but when it's wired in the wrong way with too much voltage the capacitor heats up
very fast. So fast that the chemicals vaporise almost instantly and rip the whole
thing apart with the insides flying everywhere, leaving nasty (and probably toxic)
fumes in the air. Bigger capacitors give bigger explosions (just like more dynamite
gives bigger explosions) but are harder to kill. If it's a bit hard going, just wire
it across the mains and it'll make a nice loud bang, and probably trip some circuit
breakers somewhere.

note: if you plan on doing any of this, stand well back (this can be done easily
by leaving a gap in the circuit and 2 long wires running to where you are, so you
can touch them together and you'll be safely round a corner or in the toilet or
whatever). Another thing to watch out for is that some of these things take time,
especially capacitors. I've known them to look harmless for half a minute before
exploding in your face when you look to see what's wrong.

eleven                  @!     11      !@                   eleven 
@!interference !@
eleven @! alienbinary !@ eleven











---------------------[ PHUN WITH INTERFERENCE ]------------------

I was sitting in physics class, and I began skimming through my "Conceptual
Physics" textbook. Well, I figured it would be interesting to read about waves.
So I got to the section about interference, and I started thinking...

Later, in math class, I began typing out this phile on my laptop.

Well, anyway, interference is a source of great phun. It is highly underrated,
and rarely mentioned. This is the first of it's kind as far as I know.

…………………………………………………………………………………………………………………………………………………………………………………

the contents of this article:

I..........................................................THE SATAN BOX
II...............INTERFERENCE UNDERSTANDING THROUGH CREATIVE PROGRAMMING
III................................................EVERYDAY INTERFERENCE


…………………………………………………………………………………………………………………………………………………………………………………



XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

THE SATAN BOX



MATERIALS:

A REMOTE CONTROL CAR
A SET OF SCREW DRIVERS
10 ALLIGATOR CLAMPS
AN OSCILLATOR, OR FREQUENCY ADJUSTER
A PHONE
PLENTY OF 9v BATTERIES
PRIVACY

PURPOSE:

Have you ever wanted to piss off your parents, or sister; etc.? Have you ever
wanted get out of a goddamned phonecall but your grandparents won't shut the hell
up? Have you ever felt the need to screw with someones head? Well, here is the key.
*THE SATAN BOX*.

PRINCIPLES:

Well basically, we all know that transmitters, cellphones, radiostations, police
scanners, and such cause interference. Well on that basic premise, I designed
the satan box. By adjusting the frequency of the wave being transmitted, you
are able to change the pitch and sometimes signal of your interference. The fact
is, you have a little ball of static you want to
throw at a phone or radio. So you, well, do. ;)

STEPS:

1. Unscrew your R/C Car Controller, and remove the chip, the transmitter, the
antennae and everything you need to recreate the remote.

2. Then take apart an old stereo, or a radio, maybe even a walkman. Remove
the oscillator.

oscillators look like this:

_____.._____
((((((()))))))
| |
¯¯¯¯¯¯¯¯¯¯¯¯¯¯
| |
| |
|____________|

3. remove the antennae and put the oscillator between it, in a way that adjusts
the frequency
(may vary from the materials)


(((( o ))))
|a
|n
|t. -+-
| ______[ OSC.]______[board]
| |/
---------------

4. Next, hook up as many 9v batteries as possible (see diagram)

(+)-(+)-(+)-(+)-(+)----------I/O(+)|...remote
--------(-)-(-)-(-)-(-)-(-) _____I/O(-)|...control
/ /
\______________________________/


5. There you go. You have a satan box. Really easy, to be honest.

batts.
\ \ o
| | | <---- antenna
+ - |
i/o |
board------osc-----_


HOW TO USE:

Pick a target. A good target would be a relative. When they are on a phone
(preferable cordless), press the switches on the board.

switches probably look something like this:

______ <------press down
__/ '
¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯

Their should be a signal being emmitted from the box. You will know by how pissed
off your target is. ;).

In order to adjust the signal's frequency and strength, play with the oscillator.

PHONES THAT HAVE WORKED:

CORDLESS PHONE 900MHz
Old Bell Pushbutton cordphone
TIME life phone (AT&T)

RADIOS THAT HAVE WORKED:

WALKMAN
VARIOUS OTHERS


INTERCEPTION:

It is possible to intercept calls and police frequencies by turning on
the satan box, without transmitting. If your'e lucky, you get police
frequencies, radio stations, and of course... cellphones.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

PART II: "UNDERSTANDING INTERFERENCE"

MATERIALS:

TI-86 CALC or 85
BASIC KNOWLEDGE OF THE CALCULATOR
AN UNDERSTANG OF TI-86 BASIC

WHAT IS THE POINT:

The reason you want to understand interference is that the only way to know
how to cause it, is to know how it works.

HOW TO DO IT:

Well, create a new program. Title it interference. Enter source code.

TWO DIFFERENT PROGRAMS:

PICTOGRAPHIC) this one just draws a picture of a chaotic day (wave wise).
INTERACTWAVE) this one let's you adjust coordinates

PICTOGRAPHIC SOURCE CODE:

:CLDrw
:AxesOff
:Zsqr
:Circl(0,0,1) :Circl(0,0,2) :Circl(0,0,3) :Circl(0,0,4) :Circl(0,0,5)
:Circl(0,0,6) :Circl(0,0,7) :Circl(0,0,8) :Circl(0,0,9) :Circl(0,0,10)
:Circl(0,0,11) :Circl(0,0,12) :Circl(0,0,13) :Circl(0,0,14) :Circl(0,0,15)
:Circl(0,0,16) :Circl(0,0,17) :Circl(0,0,18) :Circl(0,0,19) :Circl(0,0,20)
:Circl(9,9,1) :Circl(9,9,2) :Circl(9,9,3) :Circl(9,9,4) :Circl(9,9,5)
:Circl(9,9,6) :Circl(9,9,7) :Circl(9,9,8) :Circl(9,9,9) :Circl(9,9,10)
:Circl(9,9,11) :Circl(9,9,12)
:Circl(9,9,13) :Circl(9,9,14) :Circl(9,9,15) :Circl(9,9,16) :Circl(9,9,17)
:Circl(9,9,18) :Circl(9,9,19) :Circl(9,9,20) :Circl(-9,-9,1) :Circl(-9,-9,2)
:Circl(-9,-9,3) :Circl(-9,-9,4)
:Circl(-9,-9,5) :Circl(-9,-9,6) :Circl(-9,-9,7) :Circl(-9,-9,8) :Circl(-9,-9,9)
:Circl(-9,-9,10) :Circl(-9,-9,11) :Circl(-9,-9,12) :Circl(-9,-9,13)
:Circl(-9,-9,14) :Circl(-9,-9,15) :Circl(-9,-9,16) :Circl(-9,-9,17)
:Circl(-9,-9,18) :Circl(-9,-9,19) :Circl(-9,-9,20)
:Circl(9,-9,1) :Circl(9,-9,2) :Circl(9,-9,3) :Circl(9,-9,4) :Circl(9,-9,5)
:Circl(9,-9,6) :Circl(9,-9,7) :Circl(9,-9,8) :Circl(9,-9,9) :Circl(9,-9,10)
:Circl(9,-9,11) :Circl(9,-9,12)
:Circl(9,-9,13) :Circl(9,-9,14) :Circl(9,-9,15) :Circl(9,-9,16) :Circl(9,-9,17)
:Circl(9,-9,18) :Circl(9,-9,19) :Circl(9,-9,20) :Circl(-9,9,1) :Circl(-9,9,2)
:Circl(-9,9,3) :Circl(-9,9,4)
:Circl(-9,9,5) :Circl(-9,9,6) :Circl(-9,9,7) :Circl(-9,9,8) :Circl(-9,9,9)
:Circl(-9,9,10) :Circl(-9,9,11) :Circl(-9,9,12) :Circl(-9,9,13) :Circl(-9,9,14)
:Circl(-9,9,15) :Circl(-9,9,16)
:Circl(-9,9,17) :Circl(-9,9,18) :Circl(-9,9,19) :Circl(-9,9,20)


INTERACTWAVE SOURCE CODE:

:Input A :Input B :Input C :Input D
:Circl(A,B,1) :Circl(A,B,2) :Circl(A,B,3) :Circl(A,B,4)
:Circl(A,B,5) :Circl(A,B,6) :Circl(A,B,7) :Circl(A,B,8)
:Circl(A,B,9) :Circl(A,B,10) :Circl(A,B,11) :Circl(A,B,12)
:Circl(A,B,13) :Circl(A,B,14) :Circl(A,B,15) :Circl(A,B,16)
:Circl(A,B,17) :Circl(A,B,18) :Circl(A,B,19) :Circl(A,B,20)
:Circl(C,D,1) :Circl(C,D,2) :Circl(C,D,3) :Circl(C,D,4)
:Circl(C,D,5) :Circl(C,D,6) :Circl(C,D,7) :Circl(C,D,8)
:Circl(C,D,9) :Circl(C,D,10) :Circl(C,D,11) :Circl(C,D,12)
:Circl(C,D,13) :Circl(C,D,14) :Circl(C,D,15) :Circl(C,D,16)
:Circl(C,D,17) :Circl(C,D,18) :Circl(C,D,19) :Circl(C,D,20)

ABOUT THESE PROGRAMS AND INTERFERENCE COMPREHENSION:

These programs will illustrate longitudinal waves, and will show were they overlap.
The overlapping are is the "standing wave". It is the interference. Sometimes,
depending on the wave, they interference will block the transmission, causing a
lapse in sound. Other times you will hear the static noise chime in over the
transmission.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

PART III: "THE INTERFERENCE IS ABROAD"

Look around your house. You might not have given it much thought, but an arsenal
of radiowave weapons are at you fingertips.

KNOWN INTERFERENCE CAUSING OBJECTS: KNOWN OBJECTS SUSCEPTIBLE TO PHUN:
•walkie talkies
•phones
•ham radios
•radios
•remote control cars
•tvs
•cordless phones
•shortwave rads.
•radiation (microwave)
•shortwave radios
•police radios

ON A SIDE NOTE, SOME ANIMALS (IE: DOGS) CAN PICK UP THESE INSANE FREQUENCIES.
HEHE, PHUN WITH FIDO.











twelve 12 twelve
! Blackhole Sun !
twelve by Ender twelve












I woke up early that morning, only to feel the blistering heat that was plaguing
our planet. I slowly got to my feet, put on a pair of shoes, and strolled over
to the thermostat. It was set at 20° Celsius, but the temperature indoors was
still 37°. I remembered the promise I made myself a few weeks ago to fix it, but
my studies had taken most of my time.

I walked into the bathroom near my room. I flipped the switch to activate the
water cooler and laid back in bed for about twenty minutes. Afterwards I took a
shower and brushed my teeth. I flipped my personal telepathic unit (PTU) to
*6800, the news station. The middle-aged reporter blurted out something to the
extent of a spur of the moment International Congress meeting. He proceeded to
say that talks on proposed plans for earth's people would be discussed. Who knew
then that one day I would be delivering a speech to the International Congress.

"The sun has grown an additional 1.37% closer to earth today," announced a
clean-scrubbed young female reporter. "As you remember, the sun swallowed
Mercury only two years ago after it began to use its hydrogen supplies at a
vigorous pace. Our sun is now considered a radical K class star. Each day the
sun is expanding in size by an additional .5 - 2%. At the current rate, the sun
will swallow the earth in only a few short years."

What she said was true. Our sun had almost spontaneously become a K class,
expanding supergiant. Almost a year ago the heat from our sun dried up all the
liquid water on earth. Great floods first swept over the earth, then over a six
month period, most of the water on earth dried up. All that was left behind was
sand filled plains and hills of salt. Scientists scrambled to make a device to
combine hydrogen and oxygen chemically, even though a beta version of the device
was already designed for such an emergency. Each community got a water making
machine to combine the hydrogen and oxygen in the air into water that was suited
for human consumption.

I turned off my PTU after getting a sickly feeling in my stomach. Our world was
about to be scorched by the heat of our sun, and we were all here waiting for it
to happen. I thought that it was about time the world met as one to try to find a
way to prevent us all from extinction. I had my own idea of how we should get our
species off this planet, but, then who was I? I was a poor scientist barely making
ends meet on my studies of space-time.

I was working at MIT at the time in the study of the relationship of space-time.
Much was already known about the curvature of space time, and the possibility of
wormholes. I was conducting experiments in which I created a mini-universe inside
a perfect vacuum. The vacuum was only one cubed centimeter, but I learned more from
that centimeter than any books could tell me. I created an additional space-time
inside the vacuum. In effect, it was like a complete separate dimension in a box.
I studied the curvature of space-time, which basically states that the universe has
hills and cliffs like on earth. But, unlike on earth, where the hills are on a flat
plain, the space-time curvature is on a three-dimensional plane.

I was seeking proof for the theory that a person could take shortcuts through
the universe. I was suggesting that the quickest way to go somewhere was not by
going in a straight line there. This was difficult for many people to
comprehend, especially myself. Unlike on earth, where the quickest way to get
from one part of the planet to another is on a great circle connecting the two
places, I was suggesting that we go down.

How would this be done? With the help of space-time, of course. Think of it as
it would apply on earth. You were at the top of a hill. You want to go to the
top of an adjacent hill. It would take you longer to walk down one hill and up
another than it would to fly to the other hill. Because of the hills in
space-time, we can go across or down, rather than around.

I was also theorist in time travel. Although we knew it was possible to travel
in time, we could not create the technology ourselves to do so. I thought that
we could use the energy from a blackhole to propel us fast enough to travel in
time and skip to other side of the universe. The black hole would pull us in at
such as rate that we might be able to repel the other way, while gaining speeds
faster than light, right into the pit of the blackhole, and then out the other
side.

I finished eating my breakfast by about seven o'clock. It was then that I
received the call that I would later find would change my life, and the fate of
the world. It was one of my old friends from college. He had become a
politician, and he was one of the 1000 something people that represented the
world regions in the International Congress. He knew of my studies of space-time
and my proposed theory on how to save the earth. He asked me to join him that
afternoon in London, and I somewhat reluctantly agreed.

I was not a politician, nor did I have any connection with the North American
Federation (formerly the U.S., Canada, and Mexico/Central America). I could not
understand why he had wanted me to come along with him. Still pondering the
issue, I jumped into my StarKar and took off for Jonathan's house in New York. I
flipped my PTU to *6800 once again to listen to the air traffic reports.

The same middle aged reporter that I had heard earlier that day was reporting
again. The biggest news of the hour was that space-time specialist Clayton
Berlin was to be present at the Congress this afternoon to propose a plan to
save the earth from the ever expanding sun. "A source has confirmed that Clayton
Berlin, a world renowned space time specialist will be present at the
International Congress today. As you will recall, one of his greatest
achievements is the 'mini-universe' that he created."

Just great, I thought to myself. The media knew I was going to be speaking on
saving the earth before I did. I felt like killing my friend for a slight
moment, but then, I thought that maybe now I would be recognized to the world as
a brilliant individual. I pretended that he merely forgot to tell me that I was
to speak, so I flipped my PTU to an alternative music frequency.

I arrived in New York just a little after nine o'clock in the morning. I met
Jonathan at his house, and I asked him about the news report I heard. He said
that he had forgotten to mention it earlier. "I thought you would know exactly
why we needed you, Clayton. The whole world knows your views about saving the
earth with the help of space-time."

I was so flattered for a moment that I almost forgot that I was still
disgruntled with him. "No matter," I replied, "I should have known that I would
get my chance one day to show the world." He sort of chuckled at this, and
motioned toward his kar. "We have to go immediately," he announced
authoritatively.

Only a few short hours later I found myself seated in a large room filled with
people of various nationalities. I found it quite strange that everyone was
speaking different languages, growing up in America makes you think that English
ought to be spoken everywhere. A large man of about 50 stood up to the
microphone and motioned for every one to sit.

"We are gathered here today to discuss the impending danger on our world from
the sun. As you all know, the sun is growing in capacity by about one percent
each day. Several people from various countries are here to discuss courses of
action that we could take to save the earth. Mr. Edward's, would you please step up?"

"Thank you, Mr. Wellbanks. I have a proposed theory that could help stop the
expansion of our sun. According to my studies, if a series of nuclear bombs were
launched at the sun, the explosion would cause a delay in the usage of hydrogen.
The sun would shrink down to a smaller size and prevent earth from being destroyed."

"We could have the nuclear arsenal ready at 1.75 galactic time tomorrow," the
prime minister of Greater Japan explained. "Exactly how many bombs are we
looking at, Mr. Edwards?"

"Approximately 10 bombs that will be launched in 30 minute intervals."

"Very good," the prime minister replied.

"Very good indeed, Mr. Edwards," stated Mr. Wellbanks. "Could I ask for Steven
Thompson to come up please."

"Thank you," said Dr. Thompson. "You all remember the alien attack of 2047,
correct? In that war we produced a magnetic force field around the earth by
using a specialized magneto-electricity unit. The force field was designed to
repel alien fire power and any other objects entering the atmosphere. I propose
that we make a temporary magnetic field around earth until we can stop the
expansion of the sun."

"Very interesting, indeed Dr. Thompson," noted a minister from a middle eastern
region. "Have you actually tested this device on heat exposure, much less on the
plasma from the sun. How do we know this will do any good? It could waste
billions of currency units and not do a thing."

"I believe that it will but the earth enough time to make a plan to escape or
something. May I remind you that I am the expert in this field."

"Gentlemen, gentlemen," complained Mr. Wellbanks. "I think we have heard enough
from both of you. We do not have time to argue. Your suggestion will be noted,
Dr. Thompson. Now, if I may, will Yamuri Hamashito please come up to propose his
plan?"

"Thank ya very much, Mr. uh... Wellbanks. I think that the people of earth
should get into space craft and fly to a near by station for the time being. We
have cargo ships that we can easily turn into passenger uh... freighters. We can
send off about 5 ships at a time that carry two uh... thousand people each. The
return trip would be about uh... 5 months to take a ship to nearby start Alpha
Centuri."

I almost jumped out of my seat in protest. "Are you insane!" I screamed. "There
is no possible way that we could get every person off this planet with your
method. There are over 5 billion people on the earth. Each five months we maybe
be able to ship one hundred-thousand people. But our sun is going to fry us all
in just over a year!"

"How will you decide who gets to live?" I complained. "And you, Mr. Edwards,
don't you think that when you drop those bombs on the sun that it may shrink,
yes, but that it might collapse onto itself! Don't you even understand the basic
concepts of science? This is totally crazy....all of you!"

"Please settle down sir! What would you do instead, may I inquire?" sneered Mr.
Wellbanks. I never did care for that man. Neither did I care for anyone in that
room for a moment. They were all crazy.

"I propose that we change the earth's orbit."

"Uh huh...and this will do what for us?"

"Well, if we set of a series of explosive outside the earth, we could push it
out of it's current orbit. We would push it back to intersect with Jupiter's
orbit. From there, we could use Jupiter's gravity to sling us out toward the
Oort Cloud."

"You must be bloody insane! We all know that there is a small blackhole found
beyond the Oort Cloud!"

"That is exactly what I am aiming for. We can use the blackhole's own gravity to
repel us around and through it at speed faster that those of light. With the
help of space-time curvature, we should be able to speed across to the other
side of the universe. Another dimension, if you will."

"That's impossible!" someone shouted. "We know that the ides of time travel and
dimensional travel are preposterous!"

"That, is where you are wrong. Back in the late twentieth century, the ideas of
space-time curvature were first brought up. They did much research and found
that it is very possible. Then in 2032, a professor by the name of Edward Clantz
issued a report saying that time travel was impossible. He said that space-time was
nothing, and that it could not possibly exist. In studying his data, I have learned
that he made many faults in the data."

"Are you trying to say that Clantz was a phony?" cried out another voice from
the crowd. "He was one of the most respected scientists of his time!"

"Yes, damn well I believe that Professor Clantz was a fraudulent, cheating,
S.O.B." I had just about enough of this man.

"Uhmm Hmmgh. What is your name sir?" asked Mr. Wellbanks somewhat impatiently.

"My name is Clayton Berlin."

"Thank you Mr. Berlin. Guards, will you please help Mr. Berlin to his kar?" I
saw some guys with big guns give Wellbanks a nod. Oh, I wanted them to see that
they were going to screw up our only chance of living. Damn him!

"Now, gentlemen, I say that we vote on this matter." sad Mr. Wellbanks. He was
so good at looking polite and being so nice to everyone. "You all have a voting
computer on the seat in front of you. Please select your plan; 1 being to drop
bombs on the sun; 2 being to make an electromagnetic force field around earth;
and 3 being taking space ships to shuttle people to near by stations. You will
have about 5 minutes until we tally the results."

"All right, gentlemen, popular vote tells us that we are going to nuke the sun.
Prime Minister Yiltamito, you have permission to strike the sun at 'o eight
hundred hours. Meeting adjourned."

At eight o'clock the next morning, Japan launched a full scale nuclear attack on
the sun. I had a gut feeling that something would go incredibly wrong. I watched
out through the window of my house to see if I could see the bombs explode. I saw
about 3 large inflammations of the sun in about an hour. I assumed that the bombs
were doing their job.

The next morning the sun's size had lost about 20% capacity. It was almost the
size that it was before its radical change. I knew it was all too good to be
true, and in a week I was proved right.

What happened from the time of the launch to a week after can only be described
as disastrous. The sun continued to shrink throughout the week. When it was
about the size of a white dwarf star, it had a mini supernova. Although the
remnants of the star never touched the surface of the earth, the heat did. The
heat was worse than anything imaginable. And, worst of all, we were moving
closer toward the black hole created by the sun.

As could be expected, the International Congress held another meeting. This time
I decided to stay in my home and wait for the earth to come to an end. I got a
somewhat expected, unexpected phone call again. But this time it was Mr.
Wellbanks of the International Congress.

He apologized for his temper and that he now recognized that I was a man of
great brilliance. He never would have thought that I would be right, but I was.
He begged for me to come to the meeting again. This time the world would take me
seriously.

The vote was 647 to 498 in my favor. Only two methods were actually treated as
good plans that time. Mine, and the shuttling people off the earth. I vigorously
argued, and I apparently convinced enough people.

At 'o nine hundred hours the next day, the first of several strategically placed
bombs went off. The earth was pushed further and further away from our blackhole
sun, but ever closer to another.

I do not need to describe in detail what happened after that. My plan worked as
a I expected it to. Of course, if it didn't I wouldn't be writing this part of
my autobiography. I figure that any person who goes down in history as the
person who served the earth should have his own autobiography. We eventually
found a perfect sun to use. With the help of our explosives, we blasted toward
the sun we wanted. It's nice to be able to pick any solar system in the
universe. With the help of our oxygen-hydrogen combining devices we eventually
rebuilt the earth and filled the oceans with water once again.











thirteen @ 13 @ thirteen
@the security of PGP@
th1rteen @ iShroom @ thirteen












In this paper we will discuss the feasibility of breaking Pretty Good
Privacy-encrypted plain texts.(I assume that the reader is not entirely new to
cryptography.) PGP is composed of four different cryptographic modules: the
Pseudo-Randon number generator, the MD5 One-Way Hash, the IDEA symetric block
cipher, and the RSA Public-key Algorithm. We will focus on the encryption ones:
the IDEA algorithm, and the RSA algorithm.

IDEA IDEA was finished in 1992 by foreign cryptographers. It works with data
hunks 64 bits in size. There have been no breakthroughs in the cracking of IDEA
so far. The only known way of breaking IDEA is by brute force, or trying all
possible keys. It is believed to be one of the most secure secret-key
algorithms around. The key size of idea is 128 bits. On average, you must search
through half of the keys to find the right one. That is 127 bits or
170,141,183,460,469,231,731,687,303,715,884,105,728 keys on average that you
must search before the correct one is found. If all the computers in the world
were devoted to this (if pancakes were sentient=) it would take more than the
estimated lifespan of the universe to crack one IDEA key. All this could change
of course, with the advent of quantum computers, but we will leave that aside
for now.

RSA RSA was developed by Rivest, Shamir, and Adleman in the year of 1997. It was
the first public-key cryptography known an available to the public, (GCHQ had it
before, but it was top secret) and it is the main component of PGP. Public-key
cryptography is the only cryptography algorithm that you can freely distribute
your key in and not compromise your security. They say that the security of RSA
depends on the difficulty of factoring very large prime numbers. So in this
case, brute force would be the factorization of primes. Actually, this has never
been proven, so there may be a way to get the secret key other than brute-force.
To public knowledge today, however, there is no other way to attack the
algorithm than brute-force. With a large enough key-space, RSA today is probably
safe. There are other papers which discuss key-size, so we will skip this for
now. To give an example, though, a 1024 bit key would take an estimated 3 * 10 E
7 years on a 75mhz VAX. Thats 30,000,000 years for those of you who need it in
base-10.

Conclusion

If even one of PGP’s cryptographic modules is compromised, than the whole system
is compromised. however, all of the pieces have been exstensively tested and
subjected to public scrutiny and found to be secure. PGP is safe for today’s
standards if you have a big enough key size. I personally use a 4096-bit key,
but that is just my paranoia. If you would like to learn more about PGP or
anything related to encryption, I reccomend you pick up a copy of Bruce
Schiener’s Applied Cryptography.















fourteen @ 14 @ fourteen
@ hex and such @
fourteen @ ProZaq @ fourteen















Are you a "newbie"? As long as you're interested in not only computers but also in
what's making computers work the way they do, then you'll definitely need to learn
and master the meaning of a couple of basic expressions/ terms/ concepts. Take, for
example, the hexadecimal number system; it doesn't matter if you want to learn the
basics of programing or if you want to write programs for Macs or PC's or you just
wanna cheat on some computer games; you have to learn and master it in order to be able
to "exploit" it. And as you learn more you will notice that all these concepts are
interrelated and one can be manipulated to change the other.

In this file I shall try to explain the following topics: binary and hexadecimal numbers,
bytes/words/longs, ASCII characters, strings, HexEditors, the hardware components of a
computer, and debuggers. If you find that you are not familiar with an expression, then
take a look in the "The Computer's Hardware Components" chapter.


--==< Binary, Decimal, and Hexadecimal Numbers >==--

Oh boy! Where do I start? Well, at the very, very, very beginning...
If I remember my IT classes well, the whole fame about binary numbers and calculations
with binary numbers goes to an English fellow named George Boole. He developed amongst
others Boolian Algebra. Remember all those horrible hours you had to spend in algebra
class learning formulas like: a(b+c) = a*b + a*c? Well you have him to thank for it.
e also developed a type of logic where he used ones and zeros to represent the logical
flow of an operation, which is the kind of logic that every personal computer chip uses
today.

You know how everyone is always saying that computers are all about ones and zeros?
Well that's because everything in computers narrows down to being a one or a zero (an
electronic current or the lack of it).

But what on earth is the binary number system? Well, let's try to define the decimal
number system first (the one we use in every day mathematics) since we're more familiar
with it.

The decimal number system is based on the number 10. Twas the name "Decimal"; which
means "tenth" in Latin (doesn't "mal" mean "multiply" in German?). You have the numbers
zero through nine. When you start counting from zero up, you hit nine. And what happens
when you hit ten? You reset the value of the rightmost column (set it to zero), and
carry a one into the next column. At one hundred you reset the two rightmost columns
and carry a one into the next one. And so on. So as you notice you carry numbers at the
powers of ten. Like 10^1 =10 (^ means raised to the power), 10^2 = 100, 10^3 = 1000, 10^4
= 10 000, 10^5 = 100 000, 10^6 =1 000 000 etc.

Let's break the number "9876" into columns representing the numbers at which the carrying
occurs. The "thousands", "hundreds", "tens", and "ones" column.

| Thousands | Hundreds | Tens | Ones |
| (10^4) | (10^3) | (10^2) | (10^1) |
| 9 | 8 | 7 | 6 |

As you might have noticed, in order to get the number nine thousand eight hundred and
seventy six you multiply the value of each column with the appropriate multiple of ten
then add the values together (9*10^4 + 8*10^3 + 7*10^2 + 6*10^1).

In the binary number system we only have two numbers to work with instead of ten as we
had in decimal. One and zero. So this means, that instead of carrying numbers at the
powers of ten we carry numbers at the powers of two; namely: 2^1 = 2, 2^2 = 4, 2^3 = 8,
2^4 = 16, 2^5 = 32, 2^6 = 64, 2^7 = 126 and 2^8 = 256.

When dealing with binary a lot of times the value of all eight columns of numbers are
shown even if it is zero. Makes the calculations easier. For example, one in binary has
the value 1 but can also be written as 00000001.

Here is a little chart showing the numbers one to sixteen in binary:

Value of column:
126 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | = value of each column added up
0 0 0 0 0 0 0 0 = 0
0 0 0 0 0 0 0 1 = 1
0 0 0 0 0 0 1 0 = 2
0 0 0 0 0 0 1 1 = 3
0 0 0 0 0 1 0 0 = 4
0 0 0 0 0 1 0 1 = 5
0 0 0 0 0 1 1 0 = 6
0 0 0 0 0 1 1 1 = 7
0 0 0 0 1 0 0 0 = 8
0 0 0 0 1 0 0 1 = 9
0 0 0 0 1 0 1 0 = 10
0 0 0 0 1 0 1 1 = 11
0 0 0 0 1 1 0 0 = 12
0 0 0 0 1 1 0 1 = 13
0 0 0 0 1 1 1 0 = 14
0 0 0 0 1 1 1 1 = 15
0 0 0 1 0 0 0 0 = 16

Here's an other approach in trying to explain how binary works. Try adding up the values
of the columns where there is a one. In ten for example (00001010) there is a one in the
two's and the eight's column. Thus when these values are added together (two plus eight)
we get ten. The same goes for fifteen, there's a one in each column so, eight plus four,
plus two, plus one equals fifteen.

OK, now we've reached the hexadecimal numbers. Well, for these suckers we carry at powers
of sixteen. With other words we count from zero to fifteen before reseting the first
column and increasing the next. The slight problem of only having ten numbers in our
everyday number system is compensated by using six alphabetical letters to represent the
numbers ten through fifteen. Thus the numbers used in the hexadecimal number system have
the following notation:
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F.

Once fifteen is reached, the next number (as always) is represented by reseting the first
column and increasing the next. Meaning that sixteen in hex is "10".

If you have managed to get this far you've done a good job. And if you still have
difficulties understanding what the different number systems are all about then I'll let
you in on a big secret. Only a very few people convert between number systems in their
head. Most of us mortals rely on something called the "Scientific calculator". This
makes life a lot simpler! I always use a calculator simply because it's just so much
faster. I believe that if you know the principles behind the different number systems
and you have access to a calculator that converts between these then you're set.

So now you know what different number systems are. But when it comes to writing them down
some difficulties may arise. It's obviously easy to distinguish numbers represented in
binary. Just to be on the safe side, however, it's a convention to put a "%" sign in
front of binary numbers. On the other hand "123" can be a number represented in both hex
and decimal form. If it's a decimal number it's simply one hundred twenty three. But if
it's a hexadecimal number then it has the decimal value of 291, two hundred ninety one.
Big difference there! So how do you distinguish between hex and decimal numbers? Well
the most common way is to represent hex numbers by putting a dollar sign, "$" in front of
the number. In the programing language C you represent decimal numbers using the "0x"
prefix. In assembly language it is common practice to use the "#" sign when representing
decimal numbers. I tend to be very lazy so when I want to represent decimal numbers I
just don't bother using any signs, but for hex numbers I always use the "$" sign. For
example: #12345 (decimal) is $3039 (hexadecimal); and $ABCDEF (hexadecimal) is 11259375
(still decimal if no sign is used). Through the course of this file I will use this
method of notation. I might, however, refer to hexadecimal numbers without the $ sign
if I think that it's obvious what I mean.


--==< Bytes, words, and longs >==--

Now that you know what hex is, there is a need to discuss the length of a number. The
length of numbers have a large part when it comes to writing programs. By using numbers
with different lengths the programmer can manipulate data much more easily. Another
benefit of numbers with different lengths is that a small numbers will occupy a small
place in the memory instead of occupying an unnecessarily large one. This is not much of
a problem now with the increase of of both RAM and HardDisk sizes, but back in the days
of C-64's and before, when programmers only had so much RAM to work with, it was very
important wether a number took up 1 or 4 bytes.

Anyway, in assembly language for the 68k Macintosh processors we talk about bytes, words
and longs. A byte is two digits long and is between 00 and FF (0 to 255 in dec). A word
is 4 digits long and is between 00 00 and FF FF (0 to 65535 in dec). Finally a long is
made up of 8 digits and is between 00 00 00 00 and FF FF FF FF (0 to 4294967295 dec).

With other words:

byte: $00 - $FF #0 - #255
word: $00 00 - $FF FF #0 - #65535
long: $00 00 00 00 - $FF FF FF FF #0 - #4294967295

As you can see a byte takes up one fourth of the memory a long does. This principle will
be discussed further in the chapter dealing with HexEditors. I think it might be a good
thing for you to learn how many digits a byte, a word and a long has. I will use these
expressions later on. I chose to use these expressions (and not including floats and
doubles) because I feel that even an experienced person can get far with only these three
length-notations.

For those interested, the programing language C uses the following expressions to refer
to the length of numbers:

char c = 'A'; // 1-byte long by definition (in C++).
short int si= 1; // minimum range +/-32767.
short s = 2; // short same as short int.
int i = 3; // minimum range +/-32767.
long int li= 4; // minimum range +/-2147483647.
long l = 5; // long same as long int.
float f = 10.1; // min 6 digits (decimal) precision.
double d = 11.2; // min 10 digits (decimal) precision.
long double ld= 12.3;

unsigned char uc; // unsigned integers can only store
unsigned short int usi; // positive numbers.
unsigned int ui;
unsigned long int uli;

signed char sc; // signed integers can store positive
signed short int ssi; // or negative numbers.
signed int si2;
signed long int sli;
(Information taken from "C Reference Card" by Argus Software Engineering)


--==< ASCII Characters >==--

With the arrival of networks reaching from one country to the other arose the problem of
character mapping. When you push the letter "a" on your keyboard, the hardware components
of the computer send a number value to the processor which represents the letter "a". But
how on earth would a computer in Yugoslavia, configured to deal with the Yugoslavian
alphabet, be able to interpret letter "ä" which is fairly common in the Swedish language.
To eliminate the problem a new standard for keyboards, the American Standard Code for
Information Interchange (ASCII) was adopted in most places. What this means is that (in
theory at least) all alphabetical characters will appear the same way no matter where you
are in the world. Unfortunately this only works in theory, since different keyboards have
different mapping of different keys and have different ways of showing different letters
etc... The good news is that just like you didn't have to know how to convert hex numbers
in your head, it's enough that you know that ASCII refers to the numerical values of the
different characters on your keyboard that the computer can interpret as such.

Now you know that when you push a key on the keyboard, the corresponding number value is
sent to the processor (well in reality it's interpreted by the OS and sent to the active
application). So, what is this number value? Well, every character on the keyboard is
represented by a different number. For example the English lowercase alphabetical
characters range from $61 to $7A (a-z). Notice that when it comes to computers there's a
define difference between lowercase and uppercase letters. Thus the uppercase English
letters are represented by the numbers $41 to $5A (A-Z).

It is important to realize that every ASCII character (every character on the keyboard)
can be represented by a number that's the size of a byte. Meaning a number between 1-255,
$1-FF. Thus the current standard of keyboard maps can only handle 255 characters.

But that's of no real importance either. The most common ASCII characters and their
values in both hex and decimal form are available in the included file "ASCII.txt"

Now then, we know that ASCII characters are represented by numbers. For example the
capital letter "A" is represented by 65 ($41). "B" is 66 ($42) and "C" is 67 ($43). So
the letters "ABC" could be represented by the ASCII values 65 66 67 (or in hex 41 42 43).
And this brings us to our next topic, strings.


--==< Strings >==--

The expression "string" refers to a sequence of keyboard characters. For example "Hello
world!" would be a string. Notice that the computer doesn't care about the space between
the two words, it looks upon the sentence as only one string of characters. This leads to
the problem of representing strings. Imagine how a string would look like in the
computer's point of view. It would be a sequence of numbers stored somewhere in the
memory. And unless you inform the computer how to interpret the beginning or end of the
string, it will not know where the string ends.

There are currently two standard ways of representing strings. The C way and the Pascal
way. I'll start with the C way, it's easier. Basically after the last character in the
string there is a zero-byte. This means that a value of zero marks the end of the string.
For example:

H E L L O _ W O R L D ! •
72 69 76 76 79 95 87 79 82 76 68 33 00
$48 $45 $4c $4c $4f $5f $57 $4f $52 $4c $44 $21 $00

Keeping in mind that the size of an ASCII character is that of a byte (max 255) we notice
that using the C method the length of the string is actual increased by one byte; the
zero-byte on the end. When a program is in need of using the above string, it needs to
know the memory address of the first character, and it knows that it has hit the end of
the string when the value of the character is zero.

The Pascal method is a bit different. It stores the number of characters in the string
as the first byte. The example above would be portrayed like this in Pascal notation:

• H E L L O _ W O R L D !
12 72 69 76 76 79 95 87 79 82 76 68 33
$0c $48 $45 $4c $4c $4f $5f $57 $4f $52 $4c $44 $21

As you might have noticed there are 12 characters in the string (including the "_" and
the "!" signs). So using the Pascal method, the program would read the first byte of the
string and thus determine the lenght of it.

This whole concept will be developed further in the next chapter.


--==< Hex Editors >==--

NOTICE: When dealing with hex editors you are going to be changing real files on your
computer. By changing just one byte in a file you can corrupt it to the extent that it
will not be usable any more! So always make sure that you are working on a BACKUP of the
file. The easiest thing to do is to create a folder where you copy all the files that you
want to change with the HexEditor.

Remember how all data processed by the computer is made up of a one or a zero? Well, the
same principle holds true for files stored on the hard disk, on a floppy disk, on a CD-ROM,
or on any other storage media. But because hexadecimal numbers are easier to deal with
than binary numbers, we have programs that can read the content of any storage media as
pure hexadecimal data. These programs are called HexEditors. Using the above idea, any
file containing data that is stored on a media can be opened and it's contents will be
represented as hexadecimal numbers. And it does not matter whether the file is an
application program or just a simple text file, since ALL files are at their "lowest
level" made up of binary numbers and can thus be viewed by a HexEditor.

The first thing you have to do is to find yourself a HexEditing program. It doesn't matter
which computer platform you have. HexEditors exists for PC's, Mac's, Unix's, even C-64's
Once you've found a HexEditor open up any backup file with the program. I have a Mac and I
use HexEdit 1.0.7, a freeware program by Jim Bumgardner. If I open an application file I
get something like this:

(See the picture "HexEdit.jpg")

Please note that you WILL get something completely different, since the chances of us
opening the same file is very slim, and different HexEditors present the information in
different ways.

Let me explain the above picture. To the left you have the Offset column. "Offset"
refers to the distance of a data from the first byte in the file. Since the offset here
starts at zero we know that we are dealing with the beginning of the file. Also notice
that the offsets are displayed as hex values. A good HexEditor should be able to display
the offset as decimal numbers as well.

In the middle you have the Hex column. This is where all the hexadecimal data can be
found. If you converted all these numbers to binary, you'd have a representation of the
binary information of the file as you would find it on the Hard Drive.

Finally on the right side is the ASCII column. This is an ASCII representation of the Hex
values. This means that each hex number is looked up on an ASCII table and it's ASCII
value is displayed in this column.

OK, now what? Well, as an example I'll describe the use of HexEditors as a way to cheat
on computer games.

Off course you can not use a HexEditor to cheat on a game while you are playing it. Those
situations will be dealt with in the next chapter. What you can do with a HexEditor,
however, is to change saved games. I mean, think about it. What is the program actually
doing when it is saving a game? It saves all the data about the game to a file. Like
where you are positioned on the map, what items you carry, how many monsters are gonna
attack you etc... In this example I will use Realmz, a shareware game for the MacOS.

The first thing you have to do is to find where on the HardDrive the game saves it's
files. Some games allow you to save wherever you want, while others will only allow you
to save into a certain set of game folders (usually 1-10 or something like that). So
search through the game's folders (directories as they are also called), and look for a
file that has the same name as your saved game.

The next step is to find the document in which the game stores the information you want
to change. For example Realmz is a Dungeons & Dragons game for the Mac where you can
create your own characters. The attributes of the characters, such as it's strength or
stamina, are saved in a file that has the same name as the character.

Let us presume that I have a character called Pro. His attributes are stored in the file
called "Pro". I want to change my character's strength. I want to make him stronger so
that he can cause more damage with each hit. The first thing I would do is to run the
game and see how strong he is at that particular time. This will be the value that the
game stores in the "Pro" file. He has a strength of 105. So I convert this number to
hex, which gives me $69. And then I set out to look for the hex byte $69 in the saved file.
To make things easier I look for the hex word "00 69" since the possibility of the string
"00 69" appearing several times in the file is smaller than that of the string "69". (Read
"Note on HexEditors and numbers" for more information regarding this.) When I've found
this value I change it to whatever I want it to be and then I save my work.

The problem might arise that "00 69" appears in more than one places in the file. The
easiest (and most dangerous way) is to change all the values to the value you want. By
doing this, however, you might have changed values which are very important to the program
and might cause it to freeze. By using a trial end error method you can try to change a
different value every time and see if the value you changed was the correct one. The most
effective method, however, is to look at "00 69" in a context. Meaning, look at the other
numbers around it. For instance, if you recognize the number after "00 69" as the movement
points of the character then there's a good chance that you're on the right track.

Note for Macintosh users: The MacOS divides up a file into two parts, the data fork and
the resource fork. Without getting too much into programing, here's what the purpose of
these two forks are. The resource fork should contain information such as how a window
looks like, where it is located, how the menus look like etc. With other words
information used by the Operating System. The data fork should be used to store the
information used by the user's. For example, in a word processor file the resource fork
might contain information regarding the size of the window, while the data fork might
contain the actual text written by the user. However, the programmer is not obliged to
follow these criterias. They are only suggestions made by Apple. So, when you are
looking at a file with a HexEditor on a Mac, be sure to check both forks of the file for
the information you are looking for.


--==< Note On HexEditors And Numbers >==--

I find it appropriate to give a bit of a revision of numbers and strings.
To use the example from above, let's presume that my character had the strength of $69.
What we don't know is how the program stores this number. It might store it as a byte, a
word, or a long (see chapter about bytes, words and longs for more info about this).
Using common sense, if my character has a strength of $69 and is considered very very
strong than the program will probably save the value as a byte or a word. It's completely
useless for it to store it as a long (although it might happen). If, however, we regard
the characters experience point, its obvious that it is a lot larger than the range of a
word, so it HAS to be stored in a long (or something larger). So instead of searching
for "ABCDE" you can search for "00 0A BC DE" which should narrow down the number of
occurrences of that number.

Another thing that needs to be discussed is that the length of a number has to be even.
A programmer deals with blocks (units) of memory. The program then reserves these blocks
once it's launched. The smallest block a programmer deals with is a byte. This means
that no matter how much the programmer wants it, he/she can never store the number "1"
just like that. If it is to be stored in the memory it will be stored as "01". However,
if the programmer assigned the number to be a word it will be stored as "00 01". And if
it was assigned to be a long it will be stored as "00 00 00 01". The computer doesn't
care what number is stored in the variable. It only cares about the length of the
variable. Thus if the computer stores three longs with the values $1, $22 and $333
respectively then it will look like this once you open the file with a HexEditor:

00 00 00 01 00 00 00 22 00 00 03 33

Lets say you want to change the $333 part to $433. A good HexEditor might allow you to
search for "333" but remember that the smallest unit is a byte. When you are changing
"00 00 03 33" to "00 00 04 33" it's pointless to change all 8 digits. It's enough if you
change the 3'rd byte ("03" to "04"). Notice, however, that you can't just change 3 to 4.
You have to change "03" to "04". A good HexEditor should actually not allow you to change
one digit at a time. It should require you to change one byte, 2 digits, at a time. If you
are confused then re-read this chapter, and the previous chapter dealing with lengths of
numbers. This is important stuff, and it's very important that you know it well!


--==< The Computer's Hardware Components >==--

Now we have covered a lot of track. You should know what the different number systems are,
you should have an understanding of different programing expressions and you should know
how to use a HexEditor. In order to understand how a Debugger works, however, we need to
dive into the hardware components of a computer. Do not worry, I will keep it simple. I
will only talk about the most important parts of the computer. As a matter of fact you
will most likely recognize and already know the function of some of these components.

- The Motherboard - This is that green board within your computer covered with circuits
where all the hardware is placed. Everything from the diskdrive to the microphone is
somehow connected to the Motherboard.
- Memory - The part of the computer where data is stored.
- RAM (Random Access Memory) - This is the temporary storage facility of the computer.
It is loaded full with information when you turn on the computer and it is emptied when
you turn your computer off.
- PRAM (Parameter RAM) - Very much like ordinary RAM with the exception that there is a
special battery in the computer providing the PRAM with enough electricity to keep the
information in it even when the rest of the computer is turned off.
- ROM (Read Only Memory) - This is a storage unit where information can only be read from.
With other words the computer can read anything in the ROM but it can not change anything
there. Thus the ROM usually stores all the information the computer needs to be able to
start when you press the "On" button. When you think about it, a compact disk (CD) is
also a read-only unit. The computer can read the information on it, but it can't store
stuff on it. Thus the name CD-ROM.
- Storage Media - For example, the HardDrive, a floppy disk, a Zip disk, etc. These
are accessories to the computer on which information is stored "indefinitely". That is
"indefinitely" in the sense that the information will still be there, even when the
computer off. This does, however, not keep the computer from replacing the information on
the media. So it can freely read from it and write to it. It can even replace existing
data with new data.
- The Processor - This is the brain of the computer. All data is sent to be calculated in
the processor.
- Registers - These are blocks of memory within the processor where data is stored for a
brief period of time, waiting to be processed.
- Busses - Circuits, on the motherboard, where the information travels from one component
of the motherboard to the other.
- The Sound Card - This is like a small mother board with it's own processor, busses and
registers capable of converting binary information to sound waves.
- The Graphics Card - Same as the sound card except it displays information as the
graphics on the monitor.

And that's all you need to know for now.


--==< Debuggers >==--

I gave this whole chapter a lot of thought and decided on the following. I will only give a
general description of a debugger, and some theoretical uses for it. There are a lot of
different debuggers out there, for all computer platforms. I use a Macalong with Apple's
own free debugger called MacsBug. For those interested I have included a file called
"MacsBug". I wrote this file a while back and it is not designed to be read by beginners.
However, some people might find it handy. There are a quite a lot of other files dealing
with MacsBug that might be a lot more useful. So if you are really interested, read a few
of those as well!

A debugger is a program that allows you to take control of the complete computer. This is
done, by "stoping" the processor. When you activate a debugger, it stops the processor
from executing any commands of the program that is running at the moment. The whole
concept of a debugger is to help software developers look for mistakes in their programs or
to see if it executes in a proper way.

As you may know, when a program is launched, the Operating System loads the program from
the HardDrive to the RAM. This is done because the RAM is a lot faster than the HardDrive
and most other storage medias. Then the processor jumps to the part of the RAM where the
code of the program is stored, and it starts executing each of the commands. So, when the
debugger is started the processor stops executing these commands. It then allows the user
to check the values of the certain hardware components. This way the user can detect any
mistakes in the program or just check the current state of the hardware components. The
user can even step through the code of the program. This means that they can look at each
command that makes up the program and see what it does. As I said before, debuggers are
largely used by programmers trying to figure out why their program won't work properly.

For you, the main advantage of a debugger will be that it allows you to change the data in
most hardware components, including the RAM. Since the program is loaded into the RAM when
launched, and it does all the calculations in the RAM all the data/variables/information it
may use will most likely be stored somewhere in the RAM. Thus the debugger can be used to
change any of these.

Since this file has had a general undertone of being an aid for cheating on computer games
I decided to include a way to use MacsBug to cheat on games while you are actually playing
them. I will first summarize the theory and then go into the specifics. In order for you
to be able to follow it through you will have to know at least the basic commands and
functions of MacsBug. If you are using a different debugger, then the theory will most
likely be the same but the commands will be different.

WARNING: When you are changing memory contents or changing anything in a debugger for
that matter, you CAN cause very large damages to your computer! The incorrect use of a
debugger can cause the computer to freeze and cause information to be lost! Several other damages
can also occur. Thus I advise you to become familiar with your debugger before you
attempt to change anything with it. Read any related files, read the manuals and do some
minor experimenting before you try to change stuff directly in the memory!

So first, the theory. I launch the game as a start. By opening up any saved games, I
force the game to load anything it might have saved on the HardDrive (and that is of use
to me) to the RAM. Then I stop the game by starting the debugger, I find where in the
RAM the game is stored, I find the information I want to change and then I change it.

OK, and now for practice:

Here's the scenario: I'm playing Heroes of Might & Magic II and I want more creatures in
my armies. I open up the hero's preference window and see that my hero has 25 Minotaurs,
53 Dwarfs, 32 Griffins, 9 Skeletons and 2 Dragons. Thus I know that the computer keeps
track of how many creatures I have and that means that the number of creatures must be
stored somewhere in the RAM.

The first thing I have to do is to find out where in the RAM the game is located. The
first step is to drop into MB (this is done by holding down the apple key and pressing
the power button on the keyboard).

The second step is to issue the "hz" (heap zone) command that lists all the currently
active applications and their locations in the RAM. I got this:

Heap zones
#1 Mod 7206K 00002800 to 0070C34F SysZone^
#2 Mod 6K 00008D60 to 0000A88F ROM read-only zone
#3 Mod 48K 001301F0 to 0013C1EF
#4 Mod 128K 004475B0 to 004675AF
#5 Mod 29560K 0070C350 to 023EA69F Process Manager zone
#6 Mod 9737K 010A6830 to 01A28EFF “Heroes II” ApplZone^ TheZone^ Targ

As you can see Heroes II starts at memory location 010A6830 and ends at 01A28EFF (all in
hex of course).

The next step is to use the "find" command and find the number of creatures that make up
my army. See, it is very likely that a game stores relevant data close to each other. So
I presume that the program stores the number of creatures I have, in a specific block of
memory in the RAM. If I can find this block of memory, I will be able to change it's
content, thus changing the number of creatures. In some ways it's like finding
information with a HexEditor. Except you're looking for data in the RAM and not in a
file.

In order to be able to use the "find" command I have to be able tell the following things: 
the start of the memory address, how many bytes the debuggers should search for, and what
to search for. Unfortunately I don't have all the criteria. I have to find out how many
bytes Heroes II occupies. This can easily be done by subtracting $010A6830 from
$01A28EFF. This subtraction gives me $009826CF. If you want you can do this calculation
directly in MB, just type "01A28EFF-009826CF". Now I have all the stuff I need to use
the find command.

In this example I issue "f 010A6830 009826CF 00190035"

The "f" stands for "find". This tells MB to use the find command.
"010A6830" is the address of the memory where Heroes II starts.
"009826CF" stands for the number bytes Heroes II occupies in the memory. It tells MB the
number of bytes I want to search for, from the initial address.
"00190035" stands for 25 Minotaurs and 53 Dwarfs. #25=$19 and #53=$35. Since I've done
this before I know that Heroes II stores the the number of creatures in word sized blocks
of memory. If I didn't know that I would have had to search for "0019" first (or "19")
and look at it in it's context. When I issued the find command I got this:

Searching for 00190035 from 010A6830 to 01A28EFE
0118EE3E 0019 0035 0020 0009 0002 0000 0003 0100 •••5•••••••••••

The first hex long represents an address in the memory. The following four longs (16
bytes) are the values of the data contained in the RAM starting from that address. The
following 16 characters are the ASCII representations of these values.

Now, if I convert the first five words to decimal numbers I get: 25, 53, 32, 9 and 2.
That's a perfect match of the number of creature I have in my army. Thus there is a
fairly good chance that HeroesII keeps track of my army starting at address 0118EE3E.
When you are doing something like this on your own and you don't think that this is the
location of the memory that you are looking for, you can continue searching by hitting
return until you get a message saying that it could not be found.

Then comes the dangerous part, I have to change the value in the memory. I issue the
following command, "sw 0118EE3E 00ff" (sw stands for set word). This changed the word at
the memory address 0118EE3E from "0019" to "00ff". If I now issue the "dm 0118EE3E"
command (dm stands for display memory) I see that the value at address 0118EE3E has
changed to:

0118EE3E 00FF 0035 0020 0009 0002 0000 0003 0100 •••5•••••••••••

So I return to the game by issuing the "g" command. Apparently nothing has changed. But
if I close the preferences window and force the game to actually check how many Minotaurs
my army has (by checking the variable stored in the RAM), then I can see that the game in
fact thinks that I have 255 Minotaurs! Cheat accomplished. Now I just have to repeat the
above procedures for all the other creatures.

NOTE: when you are changing the contents of the memory, make sure that you use the
appropriate addresses, meaning the ones you get when you issue "hz" and the find command.
Do NOT use the memory addresses I used! They are purely examples and WILL NOT work on
your computer!



--==< End Notes >==--

In conclusion I hope to have given an insight to how different principles of computer
technology work. I'd like to point out to some more advanced readers that I am aware of
the fact that I have generalized and simplified some concepts. I did this only when I
felt that the theory was more important than a detailed explanation. I also hope to have
made some of you interested in learning about programing and more advanced topics of IT
and computer technology. If you have any questions or comments you can reach me at
prozaq@usa.net.

Good luck

ProZaq
1999.12.31

Werd to mSEC, and everyone else who's ever helped me out! It's people like you who make
it worthwhile!





The most common ASCII characters (to be viewd in Monaco)

32 ' ' $20 33 '!' $21 34 '"' $22 35 '#' $23 36 '$' $24
37 '%' $25 38 '&' $26 39 ''' $27 40 '(' $28 41 ')' $29
42 '*' $2A 43 '+' $2B 44 ',' $2C 45 '-' $2D 46 '.' $2E
47 '/' $2F 48 '0' $30 49 '1' $31 50 '2' $32 51 '3' $33
52 '4' $34 53 '5' $35 54 '6' $36 55 '7' $37 56 '8' $38
57 '9' $39 58 ':' $3A 59 ';' $3B 60 '<' $3C 61 '=' $3D
62 '>' $3E 63 '?' $3F 64 '@' $40 65 'A' $41 66 'B' $42
67 'C' $43 68 'D' $44 69 'E' $45 70 'F' $46 71 'G' $47
72 'H' $48 73 'I' $49 74 'J' $4A 75 'K' $4B 76 'L' $4C
77 'M' $4D 78 'N' $4E 79 'O' $4F 80 'P' $50 81 'Q' $51
82 'R' $52 83 'S' $53 84 'T' $54 85 'U' $55 86 'V' $56
87 'W' $57 88 'X' $58 89 'Y' $59 90 'Z' $5A 91 '[' $5B
92 '\' $5C 93 ']' $5D 94 '^' $5E 95 '_' $5F 96 '`' $60
97 'a' $61 98 'b' $62 99 'c' $63 100 'd' $64 101 'e' $65
102 'f' $66 103 'g' $67 104 'h' $68 105 'i' $69 106 'j' $6A
107 'k' $6B 108 'l' $6C 109 'm' $6D 110 'n' $6E 111 'o' $6F
112 'p' $70 113 'q' $71 114 'r' $72 115 's' $73 116 't' $74
117 'u' $75 118 'v' $76 119 'w' $77 120 'x' $78 121 'y' $79
122 'z' $7A 123 '{' $7B 124 '|' $7C 125 '}' $7D 126 '~' $7E
127 '' $7F 128 'Ä' $80 129 'Å' $81 130 'Ç' $82 131 'É' $83
132 'Ñ' $84 133 'Ö' $85 134 'Ü' $86 135 'á' $87 136 'à' $88
137 'â' $89 138 'ä' $8A 139 'ã' $8B 140 'å' $8C 141 'ç' $8D
142 'é' $8E 143 'è' $8F 144 'ê' $90 145 'ë' $91 146 'í' $92
147 'ì' $93 148 'î' $94 149 'ï' $95 150 'ñ' $96 151 'ó' $97
152 'ò' $98 153 'ô' $99 154 'ö' $9A 155 'õ' $9B 156 'ú' $9C
157 'ù' $9D 158 'û' $9E 159 'ü' $9F 160 '†' $A0 161 '°' $A1
162 '¢' $A2 163 '£' $A3 164 '§' $A4 165 '•' $A5 166 '¶' $A6
167 'ß' $A7 168 '®' $A8 169 '©' $A9 170 '™' $AA 171 '´' $AB
172 '¨' $AC 173 '≠' $AD 174 'Æ' $AE 175 'Ø' $AF 176 '∞' $B0
177 '±' $B1 178 '≤' $B2 179 '≥' $B3 180 '¥' $B4 181 'µ' $B5
182 '∂' $B6 183 '∑' $B7 184 '∏' $B8 185 'π' $B9 186 '∫' $BA
187 'ª' $BB 188 'º' $BC 189 'Ω' $BD 190 'æ' $BE 191 'ø' $BF
192 '¿' $C0 193 '¡' $C1 194 '¬' $C2 195 '√' $C3 196 'ƒ' $C4
197 '≈' $C5 198 '∆' $C6 199 '«' $C7 200 '»' $C8 201 '…' $C9
202 ' ' $CA 203 'À' $CB 204 'Ã' $CC 205 'Õ' $CD 206 'Œ' $CE
207 'œ' $CF 208 '–' $D0 209 '—' $D1 210 '“' $D2 211 '”' $D3
212 '‘' $D4 213 '’' $D5 214 '÷' $D6 215 '◊' $D7 216 'ÿ' $D8
217 'Ÿ' $D9




This is no complete manual to MacsBug. This is taken from a file I wrote a while
back and is meant to be an extension of the file called "
Hex and Such".


--==< The Basics >==--


You install MacsBug simply by throwing it into the System Folder, and by restarting
your machine. You activate it by pressing the “command” and “power-key” (the one
towards the top of your keyboard marked with the head of an arrow pointing to the
left) buttons. This should have “dropped” you into MacsBug. You will notice that
you are in MacsBug because your desktop is replaced with a with a bunch of numbers on
a white background.
Well, going from the top left side, under “SP” is the current position of the stack
pointer, underneath the position of the SP are the values contained in the SP.
Under those numbers is the name of the application that is currently the foremost
one.
Under that is the status of the Status Register, followed by the info held in the 8
data registers, and the 8 address registers (or the 32 registers if it is a PPC
program). To the right of the registers is a horizontal line going across the
screen.
Under that are about 4 lines of text. The topmost line describes where in the
application’s code the processor was halted. Under that line are 3 other lines with
assembly commands. These are the three commands in line to be executed.
To the right of them (in the right bottom corner) are the hexadecimal values of the
assembly commands.
Above this section (in the middle) is a large empty space. This gets filled up with
the results of the commands you give to MacsBug.
Your commands get written under the three assembly commands.

What happens when you drop into MacsBug is that your processor stops executing
commands, and you can for example go through a code step by step, command by command,
following through exactly what the program does. So how do you do that?
Type “t” followed by a return.
This causes the processor to execute the next assembly command in line. The assembly
command that was executed appears now in the middle blank section of your screen, and
a new assembly command appears under the two old ones.


--==< Basic MacsBug Commands >==--

- t : traces over the next command in line. If it is used on a JSR command it
jumps over the the subroutine. (It executes the whole subroutine, without allowing
you to see what happened)

- s : does the same thing as “t” except it “steps into” a subroutine. For example
if you are not interested in what happens in an subroutine you should type “t”. This
causes the processor to continue until it reaches a RTS command, and only then give
the control back to you. If you on the other hand want to see what happens in that
subroutine, you should type “s” to step into it and follow through the code from
there.

- es : this forces the current application to quit (not always).

- rs : restarts your computer (sometimes it doesn't work and you have to do it
the old fashioned way: apple-control-powerkey)

- rb : reboots your computer (boots up the different external devices at
startup). This is slower then the “rb” command

- dm [address] : displays what is in the memory at a given address. For example,
the command “dm a6” shows you what is held in the address pointed to by address
register 6. If you type “dm abcd” it shows you what is held in the memory at
location “abcd” (in hex that is).

- db [address] : displays byte from address

- dw [address] : displays word from address

- dl [address] : displays long from address

- il : dissembles the codes. Used if you, for example, want to see what happens
after a branch code.

- atb [a-trap name] : MacsBug activates every time that a-trap is being called.

- atc : clears a-traps

- f address expr ‘string’ : this is the find command. “address” refers to the
starting point of the search; “expr” is how many bytes it should search; “ ’string' ”
is what you’re looking for! Observe the semi quotation mark before the string! You
need to use that!

You can find out more about commands for MacsBug by typing “help”











fifteen @ 15 @ fIFTEEN
@ Rebirth @
fifteen @ seti @ fifteen











Music, Rebirth, and other fun stuff:

At first Rebirth is very confusing and strange. Hopefully this will help you
get past some of that confusion.

Some good resources are:

http://www.computercontrolled.com/
http://home.worldonline.dk/~alf8myc/The_Rebirth_Songmaking_FAQ.htm
http://www.netmix.com/bpm Hotline: 209.90.212.12

I. Software:

In order to get Rebirth to work you need to either buy it, or download the 190
meg image. Otherwise mods won't work. Mods are different interfaces with
different sounds for Rebirth. So the 808 and 909 on different mods have
different sounds for each button. Also, after getting the non-cracked version I
noticed that it never crashed my system on the memory errors. You also want to
get the mod-packer, which is used to create mods. And the mod-unpacker, which
deconstructs mods. These two things are really useful when you want to make a
mod consisting of your favorite sounds. If the mod packer doesn't seem to work,
rebuild your desktop. It will fix the problem.

II. Rebirth:

Making music with Rebirth can be fun, but it sucks if you have no musical
knowledge (like myself). I'm not a music expert, so I'm not going to lie and say
I know what I'm talking about here. There is no guide on how to make music,
that is the creativity which is up to you alone.

The good rebirth songs, if you haven't noticed already, consist of chord
progressions. If you don't know what I'm talking about listen to something by
Niclas Lundqvist, or T.G. Virus. Each pattern in rebirth, (A1, A2, etc...) is
in a different "
key" in these guy's songs. When they cycle through the
patterns, it sounds good. This is not an accident. Rebirth's patterns consist
of 16 notes, and are one "
bar" long. Start simple. I think it's easier to set
my pattern to one step and just choose a few notes that sound good when I cycle
through them. Lets say I have the notes: C, A#, A, F. After you have this
then change the step to 4 and add a few notes. And if you can get something
that progresses well, change it to 8, then 16 and keep working on it. There are
lots of ways to make your music, this is just one method I use. There is one
rule you should remember: All that matters is that it sounds good. The Beatles
couldn't read sheet music and they had a couple good tunes. A good time to
really think about progressions is when you have come up with 10 different
patterns that you like and you start wondering why it all "
sounds the same."
It's because it's all in one key most likely. You can have one 303 with a chord
progression and the other with something else. There are lots of things you can
do. It is possible to make your pattern 16 steps and have all of them be the
same note and just change the accent and slide. Then in your next pattern just
change the note. This can work very well sometimes.

Some of this stuff seems really obvious, but when you first start out it can be
very confusing. All the dials and knobs on the 808 and 909 are probably the
most confusing. But I will go over a few different things here:

303:. If you didn't already know, the two synthesizer sections on the top half
of rebirth are the 303's. All the dials on the 303 are somewhat simple to
learn. As with most of rebirth you can learn best by playing around and seeing
what you like. There are two buttons above the "
down/up/acc/slide" section.
The left button turns the note ON for the current step you are editing. The
right button turns it off (it will not play that step). Maybe I was just a
retard, but I couldn't figure that out for a week.

Waveform: Sawtooth is a more rigid sounding wave, while the square sounds more
like 8 bit nintendo.

Delay: Gives a delay to the sound, you can hear it's echo, and it gets more and
more intense If you set the delay steps to 1 it will get intense very quickly,
you can also change the pan (R/L channels) and the amount of feedback.

PCF: This is a filter that changes the way your pattern sounds. Many times it
"
sounds" like a sine wave, fading in and out. But that can be changed, the
frequency is how much sound it allows in through the filter.

Compressor: It's possible to get your sounds to seem like they are `pumping' if
you set the threshold and ratio to 10.

808:. On the standard mod to hear different kinds of drum beats you just use the
large knob on the right that points to the different sounds (BD1, CY2, OH2, LT,
MT, etc) and click on which beat you want to hear it. You can change the
attributes of the sound by varying the level, tune, or decay.

909:. With the 909 you just select which sound you want to hear by clicking on
the little rectangular boxes above the square boxes at the bottom.

What do all those two letter abbreviations mean and do? If you're just starting
out you probably are using the standard mod, which I don't care much for. My
personal favorite mod is Massen's MSM, and I added much of my own sounds in with
it. So the following list only really holds true for the standard mod. Other
mods may have better or worse sounds as replacements.

AC - Accent: If you put this on the current step it will make it "
louder." If
anything else is on the step as well, it will be louder too. A way of making
things like bass drum or anything else stand out.

BD - Bass Drum: Usually in rebirth most people but the beat on steps 1, 5, 9,
13. Do this for now.

SD - Snare Drum: Can sound very metallic or like animal skin.

LT - Low Tom MT - Middle Tom HT - High Tom

All three of these are usually replaced in other mods by completely different
sounds.

RS - Rim shot:

CP - (Hand) Claps: This effect can make a song sound good or make it sound
completely fake and cheezy. Use with cuation.

CH - Closed Hi-hat: Cuts off the Open Hi-hat. You can use these together, for
instance if you have a series of CH's and then one OH it sounds like it is
"
complete" OH - Open Hi-hat: Cut off by the Closed Hi-hat.

CC - Crash Cymbal: Sounds like a crash sound.

RC - Cymbal: Toned down/less dramatic CC


The difference between song mode and pattern mode:. You use song mode when you
want to record your whole song into one piece. Say you have a song and want to
record it, you'd click on song mode. Make sure "
bar" and "start" are set to 1,
then select "
Initialize Song from Pattern mode" in the edit menu. Click record
then play, and play your song by hand. When you're done click RECORD AGAIN. If
you want to go back and say add effects to the 303 you can do this by going back
to bar 1 and clicking record then play. In other words it's possible to record
over your song without destroying it, only adding to it. One thing I usually do
is I record just the 303's. Then go back and record the 808/909 this way I
don't have to worry about 4 things at once.


Mixing:. If you have a song you like and want to mix in a Gregorian chant or
something. You can mix it in with Cubase, Peak, AudioFusion, and a variety of
other programs. My setup is like this: I've got my laptop, other computer(s),
turntables, cd, VCR, & radio going into my mixer, which then goes to my desktop
to be recorded. I don't have to be completely restricted to only the computer.

-Seti










sixteen @ 16 @ sicksteen
@ why i went vegan @
uhm..... @ error type 11 @ dIE@#$












Pretend you’re watching this on TV, it plays out in a disjointed
amalgamation of narration, effects, and action. He begins with brief dialog and
moves into his rambling recitation.
“Heh!”
This type of thing is fun, but sometimes it’s hard to take these kids
seriously. As my friends reorganize the strike, a problem at hand, I let my mind
wander a bit.
Open your eyes and see all the love in me! I got enough forever! Don’t be
afraid, to take all you need from me, and we’ll be strong together ooooaaaaah!
And we’ll be strong together! And we’ll be strong together! Open your eyes and
see all the love in me! I got enough forever! Don’t be afraid, to take all you
need from me, and we’ll be strong together!
“Heh.” I say to no one but myself, this time with even less enthusiasm. We
move out as the little happy hardcore ravers in my head dance around and hug
each other. I’ve never seen anyone outside of boy scouts prepare so much for
something, and after all that they manage to find imperfections in their plan.
“That light’s bright man.” Paranoia sets in on the group :P
“Should we take it out?”
“Yeah.”
It’s funny how stressed out they can get over little things. I thought we
were gonna have to split up in a mad panic and regroup at the rendezvous after
such an unexpected obstacle. We should have just broken it last night. It’s sort
of ridiculous, this whole deal. They all say it’s about animal rights and the
next movement and all that. I don’t know though. There aren’t many people I’ve
met that are more adamant about anything, so I give them respect for that I
guess. The compassion aspect is legit; that’s real. They care and all, but it
comes down to self sacrifice and accepting the fact that you really can’t go out
to eat with everyone else anymore. Like them, you just have to care I guess. I
have my own reasons--not that I don’t care altogether.
I don’t really know how any of these other kids think, or why they do what
they do. It’s definitely got something to do with growing up in the suburbs,
looking for something to do, trying to figure out why the hell you hate it here
so much.
Once you get past all the obvious reasons that you’re unhappy, and actualy
start thinking, you realize that you’re just sick of the same thing all the
time. You’re not any better than all the pathetic people that dwindle theirs
lives away here. You’re bored, and you’re whinny. That’s it kid. No matter who
you are, someone is more needy, someone always has it worse.
Deep down it’s hard to tell if any of them care about what they’re doing.
It depends on what you know. These things are always in the world, and a lot of
it really is cruel. It’s only when you’re put face to face with them that you
start to get into it and let it bother you. For most of them, they had to take a
step on their own to get to that point, you have to do extra to get yourself angry.
The first time they saw a leaflet they thought it was cool. Some of them wanted
to make a difference, to do something, it didn’t really matter what. They never
really even thought about it that way before, and that moment had a big impact
on their thinking. I don’t know all the other things they thought. At first, I
wanted to fight for the cause, to be part of it all, but now I know that just I
wanted an excuse to do stuff like I saw Christian Slater do on television. I
wanted to be like the Duke’s of Hazard and drive around fast, and once in a
while throw a molotov cocktail and all.
Back when fire crackers still really kicked ass, the long summer days
didn’t leave too much to do in a constructive sense. We were too old for day
camp, go away camp only lasted for so long, and that was only for who could
afford it. Sports suck, that rules them out. Sailing is fun, but you had to go
every day--Screw that. There were all kinds of community sponsored/related
programs for kids our age, but nah. Thus, there was nothing to do. Jumping the
back fence at the pool and harassing the life guards only entertained a young
mind for so long. The guards at the beach looked better anyway. They didn’t have
anything to do either, so they let us hang out with them. When we weren’t
staring at the girl lifeguards, we built things out of sand (usually girl
lifeguards), climbed on rocks, and threw stones into the water.
But even hot 19 year olds in swimming suits willing to talk to sixth graders
with brand new skateboards could get boring. So inside we went. Television does
indeed have no boundaries. Whatever time of day there is always something on TV.
Never let fools who say otherwise lead you down the wrong path. They will end
their lives bitter, broken, and alone.
We learned many things in those days. Sex came easy. What with MTV, HBO, and
PBS, we had it all figured out. Already educated by analog television sets and
TV Week; we would endure the coming school days by staring blankly at the board
until our attention returned, and commence to throw things at each other. To the
principal’s office and beyond.
Someone got America Online, and the compiled files of the anarchist cookbook
became our definitive guide to everything. All I wanted to do was make it smoke,
but the alcohol lamp that came with my chemistry set exploded when I filled it
with the insides of a pack of morning glories. A few months later, Brett’s hand
came apart while he was stuffing strike anywhere matches into a CO2 cartridge
with a screwdriver. That ended that.
With The Rescue, Red Dawn, and Toy Soldiers, I set out on the rest of my
life. By way of this and that I further developed my interests and beliefs.
There’s no room in life for killing, things don’t make you happy, no one is
perfect, and you and me are just like everyone else. But when all is said and
done, wtf am I supposed to do with myself? What to do? What to do?
This is where I stop elaborating on my past, and answer that question. What
to do?
We slowly crawl along the alley way. Our shoes make faint crunching sounds
on the concrete. We emerge partially into the light, dark shapes silhouetted
against the wall. Brian is first, he raises the slingshot and sights the target
through the eye holes in his ski mask. He releases and his ball bearing
penetrates the thick glass housing and the lamp goes out with a shower of
sparks. The shatter of glass and the peace of the city broken by a thousand
sounds all at once as the engine of the escape car parked on the opposite side
comes to life and the loud slapping of our frantic sprinting feet echo off the
buildings. We surge into the street, a torrent of angst, adrenaline and
misplaced purpose. Tony, bounding fiercely at his target, puts a brick through
the window of the shop. My heart thumping and hands trembling, I flick the
cigarette lighter open and light the rag.
As he extends his arm past his head, preparing to throw the bottle, a loud
stereophonic swhooshing (the sound of flames moving through the air) drowns out
everything else as the picture speed goes into slow motion. All action halts
abrubpty when his wrist snaps back and his chest protrudes forward in
equilibrium. In small white letters, the following appears:
“March 11, 1999 02:23 A.M. Highland Park, Illinois: Adriana Furs”
There is a short pause. The action resumes in slow motion with the same
swhooshing. Imediately before the moment that he will release the bottle it
freezes. In large white letters, the follwoing appears:
“WHY I WENT VEGAN”
There is another pause and the action resumes at normal speed.
I break out laughing and let the fire bomb fly through the window of the fur
store. There is a barely audible sound of breaking glass before it is
overwhelmed by the flooding rush of gasoline in ignition as the entire street is
illuminated by the flames. I can see the gum spots on the sidewalk and the
clothes on display in the windows across the street. I can’t stop laughing as I
jerk my head each way. Brian is first to the car. He struggles excitedly with
the door handle and takes the passenger seat. Tony transfers the milk container
of gasoline to his throwing hand, awkwardly performs a leaping spin for
momentum, and lets it sail. At Brian’s shouts, I stop gawking like a little kid
and jump into the car. Tony’s container meets the ground well inside, breaking
open and the small blaze beginning to consume the shop nearly doubles. The
flames reach the out from the window onto the front of the building.
Tony leaps into the car next to me in the back seat. We’re already speeding
away as I reach over his legs to close the door. My friends have serious, if
excited indignance on their faces, like they just saved the world and all. I
can’t stop laughing. I’m not laughing at them, I know you have to live for
something.
It’s just the fun and everything makes me laugh.
“Heh.” I say, slouching down comfortably when I finally stop laughing.










seventeen @ 17 @ seventeen
@ SS7 signal units @
constant ... @ h1tman @ elevation













1. Introduction
2. Explaination of Signal Units
3. Functions of the different Siganl Units
4. Signal Unit Structure
5. Message Signal Unit Structure
6. Link Status Signal Unit Structure
7. Fill-In Signal Unit Structure
8. Appendix
9. Closing


1.Introduction


In my last article, i briefly went over the functions of the three signal units
Message Signal Units (MSUs),Link Status Signal Units (LSSUs) and Fill-In Signal
Units (FISUs). In this paper i will hope to give you more information on these
'packets of the signaling link' so that you can have a broader understanding of
how the SS7 network works and communicates with it's components.


2.Explaination of Siganl Units


Signal Units (SUs) are packets of data that are sent over the signaling links of
a SS7 network. These messages contain needed signalling information such as the
destination switch, sending switch, the calling number,called number,selected
trunk,etc. Signal Units are used to setup call control and tear down, provide
error checking by monitering the link constantly. Basically, it helps manage a
SS7 network.


3.Functions of the different Siganl Units


FISUS, or Fill-In Signal Units are sent when no important information is being
transmitted over the siganl link. They contain no data,they fill up the signalling
link until there is a need to send important signalling. They provide a constant
signal over the link which is good for monitering and troubleshooting.

LSSUs or Link Status Signal Units provide information on the status of the signal
link.They signal the initiation of link alignment, the quality of received
signaling traffic and the status of processors at either end of the link between
the node.

MSUs are Message Signall Units, they send messgases between SSPs and STPS and STPs
and SCPs. MSUs conatain routing information,trunk data,etc. They control call
setups and tear downs and database queries and responses(800 nums,etc)

There are several types of MSUs...

IAM - Initial Address Message- Used to begin the call.
It identifies the sending switch,the recieving switch,the trunk selected, the
calling and called numbers, and other information.

ACM - Address Complete Message- indicates that the IAM has been recieved.
The message identifies the recipient switch, the sending switch ,and the
selected trunk.

ANM - Answer Message- Is sent when the called person picks up his phone.
It tells the trunk to open itself in both directions.

REL - Release Message- is sent to tell that one of the calling subcriber has hung
up. It also identifies the trunk used for the call.

RLC - Release Complete Message- This identifies the trunk used to carry the call
and to idlethat trunk.



4.Signal Unit Structure


Flag

A flag marks the beginning of a signal unit and end of a previous signal unit
(if there was one). The flag's binary value is 01111110. MTP Level 2 adds a
zero-bit(0) after any sequence of of five one-bits(11111) to remove false flags.
After the the message is recieved and the flag removed, MTP Level 2 then removes
the 0's so that the original message is restored. Bit manipulation like this is
used to prevent data being transmitted over the signalling link containing the
flag's binary value.

Checksum (CRC)

The checksum is an 8-bit (octect) number that verifies that the Signal Unit has been
transmitted across the link error free. The checksum is calculated from the
transmitted message by the signalling point and then inserted into the message. The
checksum is recalculated by the signaling point when the message is received. If the
result is different from the recieved checksum,then a retransmission is requested due
to the corruption of the SU.

Length Indicator

The length indicator (LI) shows the number of octets between itself and the checksum.
It checks the condition of the SU and to determine what type of SU is being
transmitted. A FISU has a length indicator of 0, a LSSU has the lenght indicator
of 1 or 2, and a MSU has a length indicator of 3 to 63. If the value is less than
63,than the LI will store that number that number. Yet if the value is greater than
63,then the LI will set the value to 63. Meaning, any MSU with value in the length
indicator greater than 63 (ex; 65),the value 63 will be used.

BSN/BIB FSN/FIB

The Backwards Sequence Number (BSN), Backwards Indicator Bit (BIB), Forward
Sequence Number (FSN), and Forward Indicator Bit (FIB) are used to confirm that a
signal unit was received and recieved in the correct order transmitted. The BSN is
used to confirm that a signal unit was received by the signaling point and contains
the sequence number of the SU being acknowledged. The FSN contains the sequence
number of the signal unit.The BIB and FIB are used to check for data corruption of
the SU and to request retramission.


Subservice Field

The subservice field contains the network indicator and the message priority. The
network indicator indicates whether the the message is for national or international
networks. Message priority is only used during certain congestion conditions.


Service Indicator


The service indicator denotes the MTP user, which allows the decoding of the
information contained in the SIF. Signaling Network Management is 0, Maintenance Regular Message is 1,
Maintenance Special Message is 2, Signaling Connection Control Part is 3, Telephone
User Part is 4, ISDN User Part is 5, Data User Part for call and circuit related is
6, and Data User Part for facility registration is 7. Two bits of the SIO are used
to determine whether it is for national or international networks and two bits are
used for message priority. The lowest priority is 0 and the highest priority is 3.
However, priority is only used during certain congestion condtions. Also note that
FISUs and LSSUs do not contain a SIO and that the SIO field in an MSU contains the
4-bit subservice field followed by the 4-bit service indicator.

+--------------------+-----------------------------------------------+
| Service Indicator | MTP User |
|--------------------|-----------------------------------------------|
| 0 | Signaling Network Management Message (SNM) |
|--------------------|-----------------------------------------------|
| 1 | Maintenance Regular Message (MTN) |
|--------------------|-----------------------------------------------|
| 2 | Maintenance Special Message (MTNS) |
|--------------------|-----------------------------------------------|
| 3 | Signaling Connection Control Part (SCCP) |
|--------------------|-----------------------------------------------|
| 4 | Telephone USer Part (TUP) |
|--------------------|-----------------------------------------------|
| 5 | ISDN User Part (ISUP) |
|--------------------------------------------------------------------|
| 6 | Data User Part (call and circuit) |
|--------------------------------------------------------------------|
| 7 | Data User Part (facility registration) |
+--------------------+-----------------------------------------------+


SIF

The Signaling Information Field is used for routing information. The routing
label is the first section of the Signaling Information Field of a Signal Unit.
It identifies the origination point, the destination point, and the signaling link
selection. Point codes are numeric addresses which uniquely identifies each
signaling point of a SS7 network. The signaling link selection is used to distribute
message traffic over different links. The Destination Point Code (DPC) contains
the address of the node to which the message is to be sent to. The Originating
Point Code (OPC) contains the address of the message originator. The Signaling Link
Selection (SLS) distributes the data across different links.

SLS

The SLS (Signaling Link Selection) is used to verify message sequencing. If any two
messages are transmitted with the same SLS,they will arrive at the destination in
the same order they were origianlly sent. SLS also allows equal load sharing of
traffic among all available links,which theoritically equals the traffic level among
all links to that destination.


5.Message Signal Unit Structure


+---------+-------+--+---------+--+-----+-----+-------+--------+-------+---------+
| | | B| |F | | | | | | |
| Flag | BSN | I| FSN |I | LI |Spare| SIO | SIF | CRC | Flag |
| | | B| |B | | | | | | |
+---------+-------+--+---------+--+-----+-----+-------+--------+-------+---------+
Length 8 7 1 7 1 6 2 8 8n 16 8
(bits) n<=272

Message Signal Units (MSUs),unlike FISUs and LSSUs have a SIO and a SIF.They need
the SIF to hold the call control,database queries and responses and other data.
The MSUs have a SIO to determine where the message will be sent (national or
international) and what user type is being used.


6.Link Status Signal Unit Structure


+---------+-------+--+---------+--+-----+-----+-------+--------+---------+
| | | B| |F | | | | | |
| Flag | BSN | I| FSN |I | LI |Spare|Status | CRC | Flag |
| | | B| |B | | | | | |
+---------+-------+--+---------+--+-----+-----+-------+--------+---------+
Length 8 7 1 7 1 6 2 8/16 16 8
(bits)

Link Status Signal Units (LSSUs) carry one or two octets (8-bit bytes) of link
status information between signaling points at either end of a link. The link status
is used to indicate the status of a signaling point to the remote signaling point.


7.Fill-In Signal Unit Structure

+---------+-------+--+---------+--+-----+-----+-------+---------+
| | | B| |F | | | | |
| Flag | BSN | I| FSN |I | LI |Spare| CRC | Flag |
| | | B| |B | | | | |
+---------+-------+--+---------+--+-----+-----+-------+---------+
Length 8 7 1 7 1 6 2 16 8
(bits)

Unlike LSSUs and MSUs, FISUs can travel a link in both directions. This is good for
network managment because it checks the quality of a link. The FISU is used to fill
up the link until a MSU or LSSU is present.

8.Appendix


ACM Address Complete Message
ANM Answer Message
BIB Backward Indicator Bit
BSN Backward Sequence Number
CRC Cyclic Redundancy Check
DPC Destination Point Code
FIB Forward Indicator Bit
FISU Fill in Signal Unit
FSN Forward Sequence Number
IAM Initial Address Message
LI Length Indicator
LSSU Link Status Signal Unit
MSU Message Signal Unit
MTP Message Transfer Part
OPC Originating Point Code
REL Release Message
RCL Release Complete Message
SCCP Signaling Connection Control Part
SCP Signal Control Point
SIF Signaling Information Field
SIO Service Information Octet
SLS Signaling Link Selection
SS7 Signaling System 7
SSP Signal Switching Point
STP Signal Transfer Point
SU Signal Unit


9.Closing


Thatz it. Hopefully ya newbie phreaks are learning something about telecommunications
and how calling your phriend is really made possible. Like last time, i really hope
you go out and buy some books on SS7 and ISDN,the books explain it in much more detail
then i ever could(even though the books cost ($70-100)). I want feedback too,aight?
Keep your beef to a minimum though kid.

-h1tman aka tah murdah
werd to nulltone,lupus,simon,teflon,loopHole,alienbinary,digiphreq,hybrid,substance

idle_TRUNK BBS(973) fewls.jo0 betta recognize%#$^











eightteen @ 18 @ eightteen
@ the nortel phone system @
eightteen @ alienb1nary @ eightteen











[ intr0 ]----------------][1]-]
[-------[ the netw0rk ]--][2]-]
[-------------[ overview ][-]-]
[-------------[ diagram ][-]-]
[-------------[ glossary ][-]-]
[-------[ z0nes ]--------][3]-]
[-------------[ overview ][-]-]
[-------------[ diagram ][-]-]
[-------[ n0des ]--------][4]-]
[-------------[ overview ][-]-]
[-------------[ glossary ][-]-]
[-------[ feat0res ]-----][5]-]

[ intr0 ---------------------------------------]

The nortel phone system was developed by northern telecommunications. It's a
system that uses a main computer, an administrative phone, and regular phones
as nodes. It's a very useful system, and is increasing in popularity in
businesses and schools.

[ the netw0rk ---------------------------------]

The network consists of a computer for advanced features, an administrative
phone which is like a sysop phone, a pbx which handles the extensions, zones
which handle groups of nodes, and phones for nodes.

outside line other outside line
! !
main computer···········˙
: |
: '---- administrative phone -.
:.... |
: pbx
: .--' ! '--.
: zone1 zone2 zone3
: | | '--- node 1 --- node 2 --- node 3, etc.
: | |
˙···················|······'-------- node 4 --- node 5 --- node 6, etc.
|
'--------------- node 7 --- node 8 --- node 9, etc.

main computer - this handles the advanced features. It is normally a PC box running
a nortel operating system. The nortel system is essentially a run off DOS. It uses
ascii and ansi, and navigating through it is similar to using cgi forms in lynx.
It's an efficient system, with no added shit to slow it down.

administrative phone - this is where all the calls are filtered through. If the
network has an admin phone, the administrator is capable of disabling features
remotely. When a page comes through, it can be stopped by the administrator, only
through the admin phone.

pbx - it's a fucking pbx. public branch exchange. This is essentially the entire
physical phone network.

zone - this handles a group of nodes. it's for addressing groups of phones. A zone
can be assigned privaledges. A zone can be disabled through the admin phone.

node - this is a phone on the network.

[ z0nes --------------------------------------]

On the nortel network, zones are connected directly to the PBX through the phone
box. There is normally a single outside line, and then a block of about 10 ring
and tip terminals, and then red and black. The nortel switch is connected to the
network. The bell switch, or the phone box is connected to the network, and to the
outside line. This allows the network to call out, and the outside line to call in.

phone box
.············.
.---------. .--------.
network | o + - o | | o o | outside line
.........-| o + - o | | + - |-........... . . . .
˙-| o + - o | | o o |-˙
| o + - o | | |
'---------' '--------'
nortel bell

[ n0des ---------------------------------------]

Each node is a nortel model phone. It has a few things that a normal phone might
not. There is an LCD screen, Built in CallerID, Speeddial, Features, and Speakerphone.

The LCD screen is for prompts and CallerID and messages. It displays the Time and Date,
and can even scroll a MOTD. The CallerID message says the extension, the zone, and the
phone number.

The Features button allows the user access to a broad range of programmable features.
It can even access the background music and play it over the speaker.

[ feat0res ------------------------------------]

the nortel system is full of features that can be used to do tasks on and off
the phone. There's a feature that even allows for paging. I scanned a few at
my school, and I found some good results.

ftr - 0 | speeddial
ftr - 66 | voicecall
ftr - 85 | do not disturb
ftr - #85 | take off do not disturb
ftr - 630 | page all zones
ftr - 63, zone | paging
ftr - 86 | background music
ftr - #86 | turn off background music
ftr - *7, node | transfer
ftr - 65 | check voice mail











nineteen / 19 \ nineteen
norstar integrated communications system
nineteen \ h1tman / nineteen











In this article i will i h0pe t0 sk3wl jo0 in other types of switches/pbx's
other than 1AESS and centrex. It's 2000 now,and businesses are still cheap and
looking for the most reasonable product that still can support their needs.
Enter Norstar. Their products are being used by millions of people, from more
than 80 countries as the center of their business communications systems. It
provides businesses sophisticated features that are easy to learn and gives them
the flexability of adding new services/options to their system as their
bussiness grows. The Norstar Integrated Communications System (ICS) is the heart
of their business's communications system. Depending on the size and the needs
of the business, the type of Norstar Integrated Communications System system
will vary from a...

-Compact 3x8
-Compact ICS
-Modular ICS

Each switching product comes with software packages that can distribute
calls, track billable activity and generate reports on incoming and outgoing
telephone calls. Every Norstar ICS allows you to use applications such as
Integrated Services Digital Network (ISDN) and Computer-Telephony Integration
(CTI). Also, as the size of the business increases, the ICS can still fit the
bussines's needs by the use of expansion cartridges and trunk modules. Even
though each system comes with its own standard features and options,as your
needs grows so you can your Norstar ICS because the Compact ICS can be upgraded
to a Modular ICS easily.

*************** 
Compact 3x8
***************

The Compact 3x8 system is the ideal telephone system for small bussinesses.
Even though its the simpler of the 3,the Norstar Compact 3x8 is still a flexible
and dependable switch. It can be expanded to 3 lines and 8 extensions and offers
a wide range of features. The Compact 3x8 also works seamlessy with the Norstar
telephones's built-in LCD Windows by providing the user with instructions on
using the switch's features. Also like all of the Norstar ICSs, the Compact 3x8
simplifies communications by making the task of transferring calls easy,allows
paging, discriminates ringing to distinguish between internal adnd external
calls and even has a conference feature to allow another employee to enter the
conversation. Yet those are just the standards, because of Norstar's flexible
design, adding more software and hardware options for your business's needs are
made easy. You can add software like a SMDR (Station Message Detail Recording)
to track your calling activity. Or hardware like an Analog Terminal Adapter to
connect modems, fax machines, and other analog devices without the need for a
dedicated line. As a small company a 3x8 is their best bet to gain an advatage
over your competitors.


***************
Compact ICS
***************

The Compact ICS is an affordable system loaded with features and supports
high speed communications over Integrated Services Digital Network(ISDN) Basic
Rate Interface (BRI). The Norstar Compact ICS has over 100 features including
but not limited too..

-Paging
-Backround Music
-DISA (Direct Inward System Access)
-CLID
-Itegrated Automated Attendant
-and other standard features

When upgraded with some Norstar aplications,your bussiness can have Voice
Mail,message delivary, MOTD (Message of The Day),CTI(Computer-Telephony
Integration). The Compact ICS when expanded can go from 4 lines and 8/16
stations to 8 lins and 24 stations. Also as your bussiness needs grow, the
Compact ICS can be upgraded to a Modular ICS.


***************
Modular ICS
***************

The Modular ICS is the type of system you would want for your company. The
Norstar Modular ICS is more powerful than the other 2 ICSs but it is still
simple for employees to learn. Like the Compact ICS, the modular ICS has
Integrated Calling Line ID (CLID) capabilities plus a feature named Call Log
which tells the employee who called him/her while he/she was away. Plus another
feature of the modular ics is internal messaing which allows you to leave a
message for another employee who is away or busy. Norstar Applications allows
you to manange voice,fax,and email messages all from your PC remotely. Also with
the Nortel Companion wireless system, you can use the Norstar Companion wireless
phones when away from their desks. Plus the Modular ICS can still be expanded
and upgraded to fit your companies' needs.


****************
Info on Features
****************

Backround Music- suppose to assure callers to your company that they haven’t
been forgotten or disconnected.(heh yeah riiiight)
Call Log- Tells the employee who called him/her while he/she was away
CLID- Calling Line ID,when subcribed to, shows the name and number of the person
calling on the LCD window
CTI- Computer-Telephony Integration, allows you to manage all your
communications right from your PC.
DISA- Direct Inward System Access, with it you can dial in to your Compact ICS
remotely to use system features.
Held Line Reminder- reminds the employee that someone is still on hold.
Itegrated Automated Attendant- answers and transfers incoming calls 24 hours a
day
MOTD- A message of the day
message delivary- prompts message delivery
Paging- enables an employee to quickly locate a co-worker by making an
announcement through Norstar phones, auxiliary speakers or both.
SMDR- Station Message Detail Recording, tracks your calling activity for
monitoring telephone costs and assigning codes for client billing.



****************
Closing
****************

If something is wrong,i must've misinterpreted nortel,because i got all my info
from nortel network's webpage located at;
http://www.nortelnetworks.com

Thats all,oh Nortel Networks has completed their w0r1d d0min4t1on p1an@#$!oh
n0!@ shouts too...

digiphreq,hybrid,teflon,nulltone,alienbinary,lupus,and simonsays


exit!@















twenty @ 20 @ twenty
@ hacker's insomnia @
twenty @ alienbinary @ twenty











hacker's insomnia
by alienbinary

It's late. It's always either too late, or too early. I was on a home visit,
earlier today. If you don't know, I went to a "therapeutic" boarding school. I'm
back there now. It's late. I'm sitting in my bed, typing on my small appletalk
network's server. I'm using a shared copy of bbedit lite. My eyes want to shut,
but when they do, they want to open again, immediately met with the harsh scenery
of the world. I tried to make this place look good. I wanted it to be a good place.
After all, once the internet is up here, I'll be here all day. The cpu monitor in
the lower left corner of my powerbook 3400 screen displays a spike of data that
shouldn't be there. Figures, nothing's working. The ambien they put me on isn't
working. All insomniacs will be insomniacs sometimes. A hacker, is always an
insomniac. That's why I smoke weed. The familiar smell of marijuana and tobacco
waft through the room. Perhaps it's not so much there, as it is in my mind. My
mind can produce a smell. It's late, too late. Cheezi isn't back yet.

I met Cheezi when I first came here. He was a member of the phr0zen crew. He used
to idle with saltine, tkc, and didjital. Didjital's a phreak. Why hasn't error
called? Why is it late. I just had a lapse in conciousness. A blackout. The mind
melds into fatty tissues and amino acids. The electrodes wink out, and cease. A
small murmur goes away, and there is nothing. Conciousness is regained only
milliseconds later, but it took the past few minutes with it. I forget what I
was doing. I was writing. The electrodes start to flow through my body again. But
by now, all the toxins that keep me stable went with the stability itself. I have
no nicotine or THC to calm me. All is bleak. The only traces of marijuana are on
the other side of the campus. This bleak sanitarium. The asshole who rooms alone
with me, Cheezi's upstairs, snores so loud.

I wish a waft of cold air come in. It would wake me up. Nicotine. I have a newport
100, and no matches. I used to use my grey box as a taser, and consequently, a
lighter, but it's missing a couple of flash capacitors. There's upstairs. It's okay.
I'm not gonna smoke them all now. I will probably wake up tomorrow. I think half
assedly about how I want to wake up tomorrow. Who care's? It's too bleak. Too late.
There's no point. The happy meal toy I convinced some girl at a mcdonalds to give
me is on the brink of falling over. I have to fix it. He seems to make a face at
my old PB150, which is now acting as a temporary server because it has shit on it
that I need.

Some doubt comes into my head, as to whether I need any of that shit. All the sudden,
the cpu monitor goes flat, and blueBox CPU goes low. Does it matter? It's too late,
and I'm too tired. Tommorow's gonna suck. As if you can have a good day in a
sanitarium? Breakfast is nothing but bad food and restraints.

A sanitarium is a perversion of society. It recreates society, and then picks at it.
It puts it in it's padded walls, and let's it rot. It pushes out, and smashes itself
inward in the process. The sinews of the core tissues that make society stay together,
are torn. This leaves society bleading. The structure is destroyed. Next, the bones
are broken, and the mind is mangled. The sanitarium observes, the doctors take note,
and society is removed from this perversion of science. Years later, the infrastructure
hardens, the patients increase, and then I am thrown in. I am sent into the sanitarium.
I can no longer sleep. At least I got an hour at home. I'm running off the 15 minutes
in classes that I get here during the week.

It's late. I look through a past issue of the midnight raid. I read error.type.eleven's
article entitled "sex_drugs_n_drums_'n'_bass.txt". I decide to write. It's been a while
since I wrote a long stream of consciessness like this. It sounds like a good idea. The
night watchmen come's around, to do his rounds. He tells me what I already know. It's
late. I don't know how late. He tell's me that it's ten till midnight. It's late. I try
to rest. It isn't happening. No sleep for the hacker. I wonder if ete will call. I miss
you man. Why won't the phone ring?

It's late. I'm tired. Perhaps I'll get some sleep.

I'm awake again. I wish I was asleep. The cruel reality of the walls of my asylum.
The world reveals itself to be uncaring and unfeeling. Help me, I'm in hell.

I got like two hours of sleep. My mind is jelled. I can't feel my arms. My fingers are
typing, but no feeling is relayed. Only a dull echo that let's me know that I am alive.
It's been long. Too long. I don't know what to make of the sound that's in my head. I
feel nauseaous. A deep neausea that comes from being overtired, and overworked. I'm not
doing shit today. They can't make me. This asylum tries to assimilate me into it's
infrastructure. Fuck them.

I missed half of school today, do to my overtiredness, and my ability to social
engineer my way into getting what I want. In that time, I tried ete's recipe for
extracting codeine from a common over the counter painkiller. My head Doesn't
hurt anymore. I feel great. Except for the new feeling of neaseua that codeine
or cytomorphone (unbroken morphine) can't cure. I'm in a daze. I can't figure out
the clock. From what parts of it aren't distorted beyond reconciliation, due to
the drugs and the lack of sleep, it's been three days since I slept, I can't see
shit. Logically, the reading on the clock should be the time. But I don't know
if I trust it. It's the iClock. It was a timex clock shaped like the iMac, and
sold without the license. It's one of my more amusing possessions chaotically
strewn throughout the dorm.

The sounds and beats of the crystal method play strange sounds into the earbuds
that I bought specifically for school. They're inconspicuous, and unlike most
earphones, they're digital, not analog. It's great. The familiar sounds of filter
are played as soundclips on the CD. This reminds me. Where's ShaShi? Cheezi's
back. ShaShi isn't. Maybe she is, and is awake. Maybe it's late. I don't know now.
I took care of it. Five standard doses of extracted morphine will do that to you.
I can't feel my head. Perhaps that's what I wanted.

It's soothing to know that somewhere, a young child sleeps that will never be
locked up, and will know true freedom. No psychologists telling him how to be,
no cops arresting him for being different, no social workers telling him he
needs to improve. His own life. I guess that's what I sort of hoped for myself.
I suppose it's better this way. But I punish myself alot. So does that make it
better? I close my eyes, and feel a floating sensation.The burn in my throat
manifests itself in small spurts of acute pain, the inevitable erosion of the
esophegous, if I continue to chug codeine. It's okay. It'll go the way my nose
did. It'll be a casualty that I only miss until it's completely gone. It's late.

I want to sleep but can't. It's been too long since I really slept. I need to
get better sleeping medication. The ambien has been in my system too long. I
have developed a tolerance. Perhaps I'll get the dosage increased, so instead
of going to sleep, I can get shitfaced every night. Ambien. Sleep. It's late.

It's so goddamned late. There's a point in time where you know that
theoretically, no person should be awake. Which means you are the sole awake
person. It's your world. Yet I choose the world of MacOS and Linux and BSD. I
choose the world of phones and hotline. Of code and text. Where the only thing
that seperates the awake from the sleeping is the shade of the username on the
users list. I'm almost never idle. I don't sleep. It's late.

My sleeping medication has been increased. I'm going to allow the dopamine
levels to stabalize, let the ambien take it's toll. I've been taking codiene
a few times a day. The world is a much brighter place on codiene. It's happier.
My inability to move is what makes me happy. No more ocd while the codeine is
there. No use worrying about something that can't be dealt with. It's late, but
a happier late. The calmness of midnight sets in. I'm almost ready to sleep.
Not yet. My hormones are raging. Well, I hate to say it, but it really isn't the
place to masturbate. Oh well. I played quake three today.

All the bots, running around with rocket launchers, and me, sitting 5 levels
above them, with a railgun. I picked them off one by one. The surround sound
system shakes the room with each blow. It's a great day to die. I can't recall
where I heard that. My memory isn't working so well anymore. The drugs. They
get to you. After a while, it's not enough to just smoke. Sometimes, I need
energy. Grin Reaper got a bottle of ritalin. Ritalin is basically comprised of
two essential ingredients. Methamphetamine, or dexidrine, and sodium sulfide.
The methamphetamine triggers increased brain activity, and the sulfur is the
filler. I let the meth take it's toll. After a while, I could feel my heart
race. The techno pulsing, making me move. After a while, I start to crash. I
don't feel so good. It's time to sleep.

I can't sleep. Shit.

I'm still awake, and I'm obviously not sleeping soon. Well, there's only one
thing I want to do now. Speed. I go to my jeans, far too big for me, they're
laying on the ugly green carpeting in a heap. I have to search through my
pockets before I find what I was looking for. Two yellow pills, with the the
letters "CIBA" scrawled on them. The ritalin is put next to my computer. I
then look around for a suitable crushing surface. I decide upon the zip disk
holder that I got from Grin Reaper. It's time to crush. The key to crushing
is to get it as fine as possible, without losing a fuckload off the powder.
I leave a few extra chinks to dissolve later. Next I use a small container
I mix drugs in. It's become a mixing bowl for me. I can see a little codeine
residue on it. That's okay. I like speedballing. The yellowish powder is
dumped into the bowl. I need some water. A large bottle of water is at the
other end of the room. It should suit my purpose. All I need is a cap and a
half of lukewarm water. After about half an hour, there's a very yellowish
nasty colored solution in the bowl. I take a tiny bit on my finger, and place
it on the crushing surface, and taste it too. It's cloudy enough to be potent,
and tastes like ritalin, meaning that it has enough ritalin to be the effective
ingredient. Now to apply it. This is the wierd part. I take a qtip from my
drawer, and take a cigarette from my pants pocket. I dip the qtip in the
solution, and let it sit. Next I apply the solution with the qtip to the
cigarette, gently. I put the cigarette and swab on the crushing surface to
dry. Had I had more ritalin, I would have only had to apply once. But hey,
it was free shit.

This is taking a while. I decide to turn on my lamp. It's one of those black
and white desk lamps. You get them cheap at office supply stores. It has my
handle written on the side, because I always use it for hacking/phreaking/drugs.
It's almost ready for another coat. I apply the second coat under the lamp. I
want it to soak deep into the tobacco. Fuck it's not close enough to the lamp.
I prop it up under a book I plan to read. The forth coat. The final coat. It's
ready. All I need is for it to dry. It's realy fucking late.

Shit. My pupils are fucking huge, and I'm shaking. This is fucking cool. I'm
gonna put on some Cypress Hill and sit in muh bed.

The lights are out, and my brain is tired. I have a dose of ambien twice as high
as normal to get me to sleep. I don't know if it's going to work. I was hitting
off the pipe today, and I smoked some nasty crack shit. It tasted so nasty. She
told me to lick her finger. I was a little talken a back. Then she said to lick
it more. I did. She said I'd get high if I sucked on her fingers. I still haven't
recovered from that. My screen is changing colors, and the light is dancing. The
bulb appears to be dripping. An eery light is dripping from my lava lamp. It's
irridescent, and cold light. The warmth is going away. I am cold. It's cold. No
heat, just my laptop. I am fucking tired. It's late.

My eyes are stuck at a sort of half awake stage. They refuse to focus. It's
good I can type without looking at the keys or the screen. I am almost asleep.
It's been so long. I am so tired.

Grin reaper's away, spliff's asleep, and Cheezi is upstairs. I'm bored, high,
and depressed. Shit. This fucking sucks. It got dark so quickly. The sun was up,
and then a flicker and it was out. that's all I remember of the contrast. No
sun set, just an abrupt harsh inversion of light. I read a poem by ginsberg. The
angry poetry helps me to reinforce my beleifs. I don't have to sleep! Why should
I sleep when I could be doing so much. Reading so much. In fact, I could go
scanning right now. But there's someone waiting for me. Those fucks. They always
want to catch me. That sucks for them. I know what to do. A couple more hours, and
I can start scanning at midnight. It's a great range to scan. In a bowl on a
make shit shelf next to my bed is the residue of the crystal meth I made. I
might need that later.

Hacker's Insomnia Part Two
by alienbinary

I missed half of school today, do to my overtiredness, and my ability to social
engineer my way into getting what I want. In that time, I tried ete's recipe for
extracting codeine from a common over the counter painkiller. My head Doesn't
hurt anymore. I feel great. Except for the new feeling of neaseua that codeine
or cytomorphone (unbroken morphine) can't cure. I'm in a daze. I can't figure out
the clock. From what parts of it aren't distorted beyond reconciliation, due to
the drugs and the lack of sleep, it's been three days since I slept, I can't see
shit. Logically, the reading on the clock should be the time. But I don't know
if I trust it. It's the iClock. It was a timex clock shaped like the iMac, and
sold without the license. It's one of my more amusing possessions chaotically
strewn throughout the dorm.

The sounds and beats of the crystal method play strange sounds into the earbuds
that I bought specifically for school. They're inconspicuous, and unlike most
earphones, they're digital, not analog. It's great. The familiar sounds of filter
are played as soundclips on the CD. This reminds me. Where's ShaShi? Cheezi's
back. ShaShi isn't. Maybe she is, and is awake. Maybe it's late. I don't know now.
I took care of it. Five standard doses of extracted morphine will do that to you.
I can't feel my head. Perhaps that's what I wanted.

It's soothing to know that somewhere, a young child sleeps that will never be
locked up, and will know true freedom. No psychologists telling him how to be,
no cops arresting him for being different, no social workers telling him he
needs to improve. His own life. I guess that's what I sort of hoped for myself.
I suppose it's better this way. But I punish myself alot. So does that make it
better? I close my eyes, and feel a floating sensation.The burn in my throat
manifests itself in small spurts of acute pain, the inevitable erosion of the
esophegous, if I continue to chug codeine. It's okay. It'll go the way my nose
did. It'll be a casualty that I only miss until it's completely gone. It's late.

I want to sleep but can't. It's been too long since I really slept. I need to
get better sleeping medication. The ambien has been in my system too long. I
have developed a tolerance. Perhaps I'll get the dosage increased, so instead
of going to sleep, I can get shitfaced every night. Ambien. Sleep. It's late.

It's so goddamned late. There's a point in time where you know that
theoretically, no person should be awake. Which means you are the sole awake
person. It's your world. Yet I choose the world of MacOS and Linux and BSD. I
choose the world of phones and hotline. Of code and text. Where the only thing
that seperates the awake from the sleeping is the shade of the username on the
users list. I'm almost never idle. I don't sleep. It's late.

My sleeping medication has been increased. I'm going to allow the dopamine
levels to stabalize, let the ambien take it's toll. I've been taking codiene
a few times a day. The world is a much brighter place on codiene. It's happier.
My inability to move is what makes me happy. No more ocd while the codeine is
there. No use worrying about something that can't be dealt with. It's late, but
a happier late. The calmness of midnight sets in. I'm almost ready to sleep.
Not yet. My hormones are raging. Well, I hate to say it, but it really isn't the
place to masturbate. Oh well. I played quake three today.

All the bots, running around with rocket launchers, and me, sitting 5 levels
above them, with a railgun. I picked them off one by one. The surround sound
system shakes the room with each blow. It's a great day to die. I can't recall
where I heard that. My memory isn't working so well anymore. The drugs. They
get to you. After a while, it's not enough to just smoke. Sometimes, I need
energy. Grin Reaper got a bottle of ritalin. Ritalin is basically comprised of
two essential ingredients. Methamphetamine, or dexidrine, and sodium sulfide.
The methamphetamine triggers increased brain activity, and the sulfur is the
filler. I let the meth take it's toll. After a while, I could feel my heart
race. The techno pulsing, making me move. After a while, I start to crash. I
don't feel so good. It's time to sleep.

I can't sleep. Shit.















!m0ve on!
http://badmoon.fortyoz.org
http://www.countzeero.net
http://seti.flatirons.org
http://www.countzeero.net/raid/fJEAR/fJEAR.html








it all ends here...
APPLAUD OR BE SHOCKED!
The badtext ceases. The crowd leaves, most dissapointed with the nothing
speech they got. A man mumbles something about "That dumbfuck kid stood up
there for an hour and didn't say a thing.." But the beautiful thing about it
is that I don't give a fuck....

Maybe I'll take out an ice pick and kill you in the night but i probably won't.
Maybe this will go on forever even though there's only a centimeter left
under your scrollbar. A dialog in a screenplay. The rant of a raving madman.
It's all the same. Only words.

Applaud? Why? I don't appreciate the dumb shit you showed me. I don't even
understand it. I'll just sit here, semi-slack jawed, and pretend you're smarter
that me,...,,.,.,,,,.b00m bahf ge gahf bppp9oig\\'

It's all white boy shit anyways. I bet he has long hair and smells like dick.
Never combsit and thinks he's a rebel. It makes me laugh. "Heh." I say,
slouching down uncomfortably hoping the next one will say something different.


all feedback and
submissions go to:

phear@countzeero.net










http://www.countzeero.net/raid
hotline://24.8.182.77:666
mailto:phear@countzeero.net






`;_(}cnFpHpppp#ZFnt(^.
.IZ@$$$$$@DHpPPPPP#HD%$$$$pf"
`c%$$#Xi<:. .^(XaD$#>
`c%$H[` _g$#,
^D$%I "1fff[I^ .F$%^
N$H: "i1< t@$$$$$$$$a: .g$c
I$%^ >yD$$$$c <s$$$$$$$$$$$F I$p
P$f ID$$$$$$$$c u$$$$$$$$$$$$s _$H
%%. .@$$$$$$$$$H I$$$$$$$$$$$D` c$y
"$g a$$$$$$$$$p .$$$$$$$$$$Z, p$I
<$$! `P$$$$$$$$I p$$$$$$@a" "$$.
.@$D` <!(i[[(, ,1I1}i<. s$@
Z$$F }$$u
:p$$i ."_ifnsaP#p#ZFnuXff1n$$D.
y$@< ,!tsND$$$%#nccX}tccnaPg$$$$$p:
y$@s%$$$%F}I>, .tD$$Ni`
.#$$$s[<. `(y@$%n;
.c@$@s!. `,">}Fg$$%u_
`XD$$%Pa#HD%$$$$$$$%a(
.;([naP%$%a$$$HX_.
$%_:@$$
$$DZnD$$f
uPH$$$$$$$n
.@$f,`
s$g:
.H$H:
>@$a
n$N
.@$f,`
s$g:
.H$H:
>@$a
n$N
.D$[
1$@.
">; .>>. :>>> #$g, :icsFsu1, <<"
:@$$^ >$$^ [$$$ $$$ @P! ;P$DFXfXFD$P; .$$N
y$$$F >$$^ [$$"I$$}1a$$s }$#< >p$1 $$p
"$@c$$" >$$^ [$$ ($$1 !@$u 1$c ,;;;, n$! %$Z
.11..iyF_ Z$X.D$F >$$^ [$$ _$$F X$$, `%P .n%$%%$s ND D$F
:$$(D$@$t >$%. [$$" >$$^ [$$ ($$% :$$t }$< p$f. <$s i$; g$y
:$$%a" ` p$} .D$a >$$^ [$$ .@$$, D$F Z% i$F <$s <$! p$u
:$$a ($D. [$$" >$$^ [$$ #$@ p$P Ng y$[ 1$s _$< P$X
:$$_ g$i .D$a >$$^ [$$ g$$` H$a P% c$u 1$$# ag F$}
:$$^ 1$$syyyyyH$$" >$$^ [$$ y$$. .@$X c$" :%$pg$t@$t(a%; y$[
:$$, .D$HNNNNNNN%$a >$$^ [$$ Z$% i$$; ^$y `Xau" <FHpc` u$I
:$$, f$p 1$$; >$$^ [$$ XF[ ^%$a n$!
:$$, `%$< D$Z >$$^ [$$ .<X%$N. .Z$t.
:$$, u$a 1$$; >$$^ [$$$$$$$$$%X. t%%nI;"_tpF P$X
.cc` Xc^ cc( ,cc` <ccccccX[>. .1Fg%@D#c" 1c_
[the end is near! ....here]

multiplex.c

/* Multiplexing Daemon 
*
* -Thanx to Ballbach, Iretd, Muffin.
*
* This is a server that allows multiple connections at once. What happens to the data
* is up to you. hAr hAr hAr hAr!@@E get raid3d.
* -Seti
*/


#include <stdio.h>
#include <stdlib.h>
#include <errno.h>
#include <string.h>
#include <sys/time.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <sys/socket.h>
#include <sys/wait.h>
#include <time.h>
#include <fcntl.h>
#include <unistd.h>

/* Some stuff to determine what to do with the data we get
#include "login_functions.c"
#include "decode.c"
*/


#define PORT 4019
#define MAX_CONNECTIONS 15

char welcomeMessage[] = "Multiplexing Daemon\n";
void setup(fd_set *, int *, int *, int);
int free_slot(int *, int *);

main()
{
int sockfd, fds[MAX_CONNECTIONS], bytes, retval, freei, x=0, connections=0;
int len = sizeof(struct sockaddr_in);
struct sockaddr_in my_addr, their_addr;
fd_set in;
struct timeval timeout;
char buf[50];

timeout.tv_sec = 5;
timeout.tv_usec = 0;

my_addr.sin_family = AF_INET;
my_addr.sin_port = htons(PORT);
my_addr.sin_addr.s_addr = INADDR_ANY;
bzero(&(my_addr.sin_zero), 8);

if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1)
exit(1);

if(bind(sockfd, (struct sockaddr *)&my_addr, sizeof(struct sockaddr))==-1)
exit(1);

if(listen(sockfd, MAX_CONNECTIONS) == -1)
exit(1);

while(1)
{
setup(&in, &sockfd, fds, connections);
retval = select(MAX_CONNECTIONS, &in, NULL, NULL, &timeout);

if(retval)
{

if(FD_ISSET(sockfd, &in))
{
printf("Accepting new connection...\n");
freei = free_slot(&fds, &connections);

if(!(freei == -1) && !(freei == MAX_CONNECTIONS))
{
printf("Creating socket fds[%d]: FD #:%d\n", freei, fds[freei]);
fds[freei] = accept(sockfd, (struct sockaddr *)&their_addr, &len);
FD_SET(fds[freei], &in);
send(fds[freei], welcomeMessage, strlen(welcomeMessage), 0);
}
}
}

/* Check for incoming data and exceptions */

setup(&in, &sockfd, fds, connections);
retval = select(MAX_CONNECTIONS, &in, NULL, NULL, &timeout);

if(retval)
{
for(x=0; x<connections; x++)
{
if(FD_ISSET(fds[x], &in))
{
printf("Data Available\n");
if((bytes = read(fds[x], buf, sizeof(buf))) <=0)
{
close(fds[x]);
FD_CLR(fds[x], &in);
fds[x] = 0;
}

else
{
buf[bytes] = '\0';
printf("Data Received on fd[%d]: %s\n", x, buf);
//this is in decode.c
//decode(buf, fds[x]);
}
}
}
}
}
}


/*** Initialize & Setup file descriptors
*/

void setup(fd_set *in, int *mainsock, int *fds, int i)
{
int x;

FD_ZERO(in);
FD_SET((*mainsock), in);

for(x=0; x<i; x++)
FD_SET(fds[x], in);
}


/*** Return a free connection slot, if one is available
*/

int free_slot(int *fds, int *connections)
{
int x;
int tmp[MAX_CONNECTIONS];

for(x=0; x<(*connections); x++)
{
if(fds[x] == 0)
{
fds[x] = tmp[x]; //fix it later
return x;
}
}

if((*connections) < MAX_CONNECTIONS)
return (*connections)++;

if((*connections) == MAX_CONNECTIONS)
return (*connections);

return -1;
}

vgc.cpp

//Virtual Ghetto Craps 
//vgc.cpp
//h1tman

#include <iostream.h>
#include <stdlib.h>
#include <time.h>

int rollDice(void);
int intro(void);
main()
{
intro();
enum Status { kContinue, kWon, kLost };
int sum,myPoint;
Status gameStatus;

srand(time(NULL));
sum = rollDice();

switch(sum) {
case 7: case 11:
gameStatus = kWon;
break;
case 2: case 3: case 12:
gameStatus = kLost;
break;
default:
gameStatus = kContinue;
myPoint = sum;
cout<<"Point is " << myPoint << endl;
break;
}

while (gameStatus == kContinue) {
sum = rollDice();

if (sum == myPoint)
gameStatus = kWon;
else
if (sum == 7)
gameStatus = kLost;
}

if (gameStatus == kWon)
cout<<"jo0 win m0f0" << endl;
else
cout<<"jo0 l0se wh1t3 boi" << endl;

return 0;
}


int rollDice(void)
{
int die1, die2, worksum;

die1 = 1 + rand() % 6;
die2 = 1 + rand() % 6;
worksum = die1 + die2;
cout<<"player rolled " << die1 << "+" << die2 << " " << worksum << endl;

return worksum;
}


int intro(void)
{
cout<<" you walk out of the local corner store with a 40oz in a bag(h0w 80s)."<<endl
<<" jo0 see some of the local gangbangers big smally,bubba and wang g thang playing craps."<<endl
<<" You go ooo i can do that,sorta like monopoly. You walk your ghetto walk and"<<endl
<<" speak in your best ebonics, ay yo, lemme get in dis yo. i can beat all yaw fewls"<<endl
<<" they look at you,like who is dis white dude?stick to water polo. But you whine" <<endl
<<" and plead and finally they let you play! Now show your stuff in....."<<endl;
cout<<"\nVirtual Ghetto Craps@#&%&\n\n";
}

← previous
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT