New to Neperos ? Sign Up for free
DOWNLOAD NEPEROS
Latest Articles
Latest comments
020_795611_KNULLA_DO
030
0MFuXS
112_Under_Handsken
203
2112
2280_Magazine
2600_Magazine
29A
2h
2l8
40Hex
411_Newsletter
912_Hacking_Departem
aBBa
ABLs_Barney_Must_Die
Abuse
Accel_Virus_Lab
ACE
Acidust
Acid_Plum
Activist_Times_Inc
Addendum
AEO_News_Bulletin
AEO_Programmers_Jour
Aftershock
AHAS
AIA
Air_in_the_Paragraph
AKT2
AKT2
AKTIVIST
AKTIVIST
Alcibiade
Alcibiade
Alcor
ALFAA_News_Letter
Alive
AllianX
AllianX
All_no_All
Alternateen_Digest
American_Pirate_Indu
Amerikan_Junkie
Amoric
Anaconda
Anada
Anal_Puberty
Anarchia
Anarchia
Anarchia
Anarchist_of_America
Anarchist_Tendencies
Anarchy
Anarchy_DownUnder
Anarchy_in_the_Syste
Anarchy_n_Explosives
Anarchy_Today
Angst
Angstmonster
Animal
Another_Night_and_Da
Antidote
AntiOnline_s_RFC_Arc
antipress_ezine
AntiWarez_Associatio
Anti_Lamers_Foundati
ANUS
AOH_MAG
Apocalypse
Apocalypse
Armadillo_Culture
Artefacted
Aryan_Sekret_Service
Asian_Voices
ASKInews
Asmbeginer
Asmbeginer
Asmbeginer_en_ezine
ASpEN
Assemblage
Assembly_Programming
Astalavista_Group_Se
Astral_Avenue
Atari_Bulletin_Board
Atari_Explorer_Onlin
Atari_Gaming_Gazette
Atari_Online_News_Et
Atari_Power_Entertai
Atari_Power_User_Onl
Athene
Atmospherics
Attentat
Audiofile
Audyssey
Australian_Phreak_Sc
Autolog
Avalyn_Digest
Avantgarde_Intern
aware_eZine
B0G
B4b0
Bad_Ass_Retards
Bad_Sector
BAH
Banana_Juice_Fanzine
Bang_Sonic
Barata_Eletrica
BASIC_Softips
BASIX_Newsletter
BASTARD_OPERATOR_FRO
Bay_Area_Bulletin_Bo
Beef13_emag
Beef13_emag
Belgian_Glory
Bellcore_Technical_J
Bell_Hell
Belong
Beneath_the_Remains
Beyond_Eternity
Beyond_Lost
BIOC_AGENT_003
Birmingham_Telecommu
Bits_And_Bytes_Onlin
Bizarre_Types_of_War
Black_Circle_Product
Black_Hacker_Magazin
Black_Lotus
BLaH
BlasT
BlasT
Blast
Bleeding_Edge
Bliskit
Blisters_on_my_Butt
Bloated_Barbies
Bloated_Barbies
Blooball
Boardwatch_Magazine
BOM_Squad
Bondage
Bonkers
Boom
Bootlegger
Boredom_Incarnate
BoreD_Security_Diges
Boston_Anarchist_Dri
Bovens_Tidning
Brain_Faktor
Brain_Faktor
Brain_Storm_Crew
Brain_Storm_Crew
Brain_Waves
Breakaway_Debates_on
Breathe
Britcomedy_Digest
Brotherhood_of_Warez
Bucket
busted
busted
Butchered_From_Insid
Buzzz_Bros
bz1ne
Camarilla
Canada_h4xor
Canadian_Anarchists_
Capital_of_Nasty
Carrier_Detect
Catslash
Center_of_Intelligen
Central_Atari_Inform
Central_Atari_Inform
CERT_Advisory
CFX_BBS_official_NEW
Chalisti
Chaos_Chronicles
Chaos_Corner
Chaos_Digest
Chaos_IL
Cheap_Truth
Cheese_N_Crackers
Chemical_Chocolate
Chico_s_Groove
Children_of_a_Dying_
CHiNA
Chitto_Zine
Chronicles_of_Chaos
Citadel_666
Citronic_Journal
Clearing_Up_the_Conf
COG_Analog_Industria
COLOSSUS_NEWSLETTER
Commodore_Hacking
Communications_of_th
Computer_Down_Under_
Computer_Privacy_Dig
Computer_Undergroud_
Comsec
COM_NET_NEWS
Confidence_Remains_H
Connecticut_Hacker_N
Console_Maniacs
Conspiracy_Nation
Consumable_Online
Contrascience
Corbin_Handbook_and_
CORE
CORE_DUMP
Cosmic_Debris
Cousins
Cows
CPI_Newsletter
Cracking_101
Cranberry_Winters
Crank
Crap_Will_Eat_Itself
Crash
Creative_Anarchists
Cris
Critical_Mass
Cropduster
Cryptel
Crypt_newsletter
Cult_of_the_dead_cat
Cult_of_the_Dead_Cow
Current_Cities
Current_Notes
CV_CRUD
CyberLabs_Digital
CyberLaw
Cyberpoets_Guide_to_
Cybersaber
Cybertek_Electric
Cyber_Hackers_Guide
Cyber_Hackers_Guide
Cyber_Phuck_Magazine
Cyber_Rights_Now
CYBz
Damage_Inc
Damned_Fucking_Shit
Dancing_Monica
DargonZine
Dark_World_Enterpris
Da_Hacker_Blunt
DDE
DDN_Security_Bulleti
Dead_Smoking_Punx
Deapa4reaete_Addicts
Defacto2
Default_Newsletter
Deformed_Noodles_and
Delaware_Valley_Rail
Delirium
Demented_Anarchists_
Demented_Underground
DemoScene_Starter_Ki
Demo_News
Demo_News_extra
Den_Svarta_Cirkeln
Den_Svenska_Rapporte
Desire_Street
Destruction_of_Publi
Deviate
Devil_Shat
Diary_of_a_Hacker
Diet_Soap
Dig
Digital_Anarchists_S
Digital_Free_Press
Digital_Games_Review
Digital_Media_Perspe
Digital_Murder
Digital_Phreak_P1mps
Digital_Wannabes
Dirtynet
disCovery
Dishcetera_News
Dissident
DnA_Electronic_Magaz
Dogma
Doomed_to_Obscurity
Do_not_fuck_with_a_h
Dreamboy
Drum
DUB
Dumb
Dummercon
Durex_Blender_Corpor
Dyke_Magazine
Dystopinion_Online
Dzoom
Echo_Magazine
Ecstasy
Ecstasy
EFFector
EJournal
el8
ELD_RICH_PALMER
Electronic_Frontiers
Elektrix
eL_aFGHANO
Empire_of_Dirt
Emulation
Entropy
En_Uppkladd_Baver
Epos
Et_Cetera_The_Zine_o
Everyone_Gets_Owned
Evil
Evolution
Excerpt
Exploit_this
Exponentiation
ExTrAvAGanJa
eXtreme_Brain_Short_
eXtreme_Junkie
f0rbidden_knowledge
f41th
Fake_Hacker_Fags
Fat_Nipples
FBI_Newsletter
Felney
Fiction_Online
Fight_this_Generatio
Fingals_Cave
Fish_Head_Gang
Fist_of_God
Flak
Flam
Flame
Flashback_News_Agenc
FLC
Flights_of_Fancy_Cas
Flippersmack
Flowers_of_Disruptio
Flushbuck_News_Agenc
Folo_Zone_Fun_Files
Fondle_my_balls
Fongu
Forever_Alive
Freakers_Bureau_Inco
Freedom
FreePlay
FrHack
Fringe
Frontier
Frost_Warning
FSFNET_BITNET_Fantas
Fucked_Up_College_Ki
Fuck_the_World
FUCT
Full_Disclosure
FunHouse
Funky_Llama_Club
Fun_Time
FurBytes
Fuxin_Eleet_Haxor
FYI
Game_Bytes
Game_Guru
Game_Master_Journal
Gateway_To_The_Under
GEnie
Geripe
Getting_Even
Ghost_Sites
Gick_Zine
Globe_Trotter
Glossolalia
Godarkys_Virus_Heave
God_of_B0rk
Going_Ape_Shit_Press
Gothenburg_Secret_Se
Gozer
Go_Null_Yourself
Graphomania
GrayAreas_Magazine
Greenleaf_News
Greeny_World_Dominat
Grill
Grovers_research
Gruene_Street
H0no
HAA
HACK
Hackers
Hackers_Directory
Hackers_Information_
Hackers_Mentor
Hackers_Unlimited
Hackers_Unlimited_Ma
Hacking_ARPANET
Hacking_Cosmos
Hackviewer
Hackviewer
Hack_25_Magazine
Hack_25_Magazine
Hack_off
Hack_the_Planet
Hack_the_System
Hack_This_Zine
Hakd
Hallucinatory_Oyster
Halt_and_Catch_Fire
Happy
HAQCH
HAQCH
HardC.O.R.E.
HARDCORE
Hats
Havok
HaXoR
HBH
Heartbeat
Helter_Skelter
HEP
Herring
Hippie_Dippy_Klub
Hitnote
Hi_Rez
Holy_Temple_of_Mass_
Hornet_News
House_Info_Mag
HP_Magazine
Humdrum
HWA
H_Net_Magazine
Icon
Ictari
If_You_Have_Never_Us
iGA
iGA
Igh_Bah_Poo
Illeagal_Activities
Imaculate_Septic_Tan
Imprimis_On_Line
Imprint
Impulse_Lameality
Impulse_Reality
Infectious_Diseases
InfoHax_Digest
Informatik
Information_Communic
Information_Express_
Information_Policy_O
Information_Technolo
Info_Atari16_Digest
Ink_Sludge
Input_Output_Magazin
Inquisition
iNSOMNiA
Integral_Functions
Intelligent_Dance_Mo
Interface
Interface_5
Intermos
International_Inform
International_Sysop_
International_Teleti
InterText
Interzine
In_Around_and_Online
In_a_Free_Land
Iridium
Italian_Hard_Phreaki
I_Bleed_for_This
I_Dont_Care_if_You_R
Jaguar_Explorer_Onli
Jaguar_Journal
Jaguar_Mag
jambon
Jew_Ascii_Pack
Jolly_Rogers_Cookboo
Jonas
Joyce_Wankable
Just_Another_Mag
Just_Another_Zine
K0de
K1INE
Kamratliga_Ungdomars
KaotiX
KaotiX
Kapitalizt_Life_is_S
KCAH
KDB
KDB
Keen_Veracity
Keepers
Kensho
Key_Pulse
Killer_Ride_And_Chil
Kill_Yourself
Klan_of_the_Beckombe
Klan_of_the_BloodSta
Klunk
Knark_E_Fusk
Knights_of_Dynamic_D
KNKKKKKKKKKKK
Knotted
Koma
KRaD
KRad_GNUz_and_Bullsh
Kuht
KULTCHA
Kunt
K_Lined
L0ck
Lamer
Larissa
League_for_Programmi
LeECH_2
Legions_of_Lucifer
Legion_of_Bitter_Alu
Legion_of_Doom_Techn
Legion_of_SCHRAM_Tod
Lemon_Magazine
Lever
Le_MacMilliam_du_HaC
Le_Manuel_Du_CrAcKeu
Le_Manuel_Du_CrAcKeu
Le_Manuel_Du_CrAcKeu
Liberalt_Oorganisera
Liminal
Line_Noiz
Linux_News
List_Demo_Hidden_Par
Little_Red_Firecrack
Long_Dark_Tunnel
LooZeR_AsSh0lE_MiDgE
Loud_Lyrix
Love_and_Rage_Electr
Low_Self_Esteem
Lukewarm
Luna_Digizine
Lutin
Lutin
L_CHAIM
L_elephants_avec_les
M00se_Droppings
Machine_Language_Tut
Macroez_of_Distruksi
MAD_COW
MAGaTTaCk_Ezine
Magazyn_Alternatywny
Malicia_Production_Z
Manhattan_Project
Massive
Masters_of_Informati
Masters_of_Technolog
Master_Anarchists_Gi
Measure
Mentorz_Gazette
Mercenary_Mag
Metal_Madness
Metamorphisis
Metazine
Microwave_Consolitat
Midnights_Hackers_Pr
Midwest_Authority
Mikes_Madness
Milk
Milk_and_Tea
Mimeograph
Mindcrime
Mindcrime_Official_F
Mindflow
Mindless_Mayhem
Mind_Warp
MiniSport_Laptop_Hac
Mini_JIR
Misfits_Inc
Mishandled_Informati
Mitosis
mj13
MLiR
Modernz
Modus_Operandi
MOLE
Money_Inc
Monthly_Console_Scen
Morbide_Darkness
Morbide_Darkness
More_Than_One
Morgue_Texts
Morpheus_Laughing
MrHeadaches_Undergro
Mudlark
MVM_Hackers_Clan
MVM_Hackers_Clan
MWA
MWP
Mystery_Poetry
Mystery_Science_Thea
My_Millionth_Zine
n0pAsT
n0pAsT
N0RoUTE
N0RoUTE
N0_Way
N0_Way
Naked_Truth_Magazine
Napalm
NARCWATCH
National_Alliance_of
National_Hackers_All
National_Security_An
Nations_of_Ulysses
Necronomicon
Negative_Energy_Rema
Negative_Multiplicat
Net
Netmonkey_Weekly_Rep
NetNotify
Netrunners
Networks_and_CommunI
Network_Hackers_Alli
Network_Information_
Network_TwentyOne
Net_fo
Net_Sec_newsletter
Net_Vandal
NeuroCactus
Neurosis
NewBies
Newmag
News_of_Freedom
New_World_Reader
Next_Dawn_Comics
Nihilism_Monthly
Nimbus
NoCooking
NoFutur
NoFutur
Nonoxynol_zine
Non_Serviam
Northern_Phun_Co
Northern_Phun_Co
Norwegian_Undergroun
Not_Even
Not_Phrack_64
NoWall
NoWall
No_Fear
nO_fUtUr
No_Shit
No_way
No_WhErE
No_WhErE
NPA
NPANXX
NRX_1297
Nuclear_Phreakers_Ha
NuKE_Informational_J
Null
Nutworks
Nyquil
o7nio75
Oblivion
Obscure_Electronic
Oceania_Oracle
Ocean_County_Phone_P
ODZIA_PSYCHICZNY
Omphalos
OndaQuadra
On_the_Jazz
On_the_Prowl
Operation_for_Free_H
Operation_Majority
Orange_Cats_Are_Pret
Organized_Thoughts
OtakuBoy
Outbreak
Outlaw_Informativa
Out_of_Step
Out_of_Step_Magazine
Owned_and_Exposed
P0lt3rg31st
P4K
Pa1n
Palantir
Pandemonium_Magazine
Paradigm
Paranoia_Media_Scrut
Parthenogenesis
PC_Review_Online
PD_Quickview_ST
Peachey_Incorporated
People_in_Society_Su
Perl_Underground
Persistence_of_Time
Peter_Funk_Press
Pete_and_Bernies_Phi
PGK
PGK
PH34R
PH34R
Phantasy
Phantom_Access_Journ
Pharce
Philz_Lap
Phire
Phirst_Amendment
Phone_Punx_Magazine
Phose_Phree_Inner_Ci
Phrack_Inc
Phreakers_Digest
Phreakers_Hackers_An
Phreaking_Hacking_an
PhRoZeN_CReW
Phruwt
Phucked_Phreak_Produ
Phuckin_Phield_Phrea
Phuk_Magazine
Phun
Pirate
Pirates_Analyze_Ware
Pirates_Info_Manifes
Piss
Pizza_Underground_Di
Poets_on_the_Line
Polio
Politics_Online_Maga
Pong
Poor_Old_Ugly_Pompou
PoR
Pork
Portable_Addiction
Practical_Anarchy_On
Practical_Nutrition
Preachers_of_Texts
PRECIPICE
Private_Line
Processor_Direct
Prohibited_Data_Proc
Project_Underground_
Propaganda_Magazine
Propaganda_Unlimited
Prophe_Zine
PSiKOTiK
PSX_Freaks_Playstati
PsYkAoS_Diary
PsYkAoS_Diary
Public_Access_Comput
Public_Enema_Product
Public_Incantation
Pucktales
Pulse
Pure_Bollocks
PURSUiT
PyroFreak_Magazine
Qbasic_Developers_Fo
QBasic_Gazette
QBNews
QNews_QBasic_Newslet
QuadCon
Quanta
Quarantined_Dementia
Queso
QuickBasicNews
Quick_information_Cr
r00t
Radioactive_Aardvark
Rage
Raidchan
Rajasthan_Travellers
Random_Access_Humor
Randys_Rumor_Rag
Reality_check_networ
Reality_Sandwiches
Really_ELiTE_Doodz
Rebels_Riting_Guild
Rebel_Anarchistic_Te
Recidivism_and_Goodn
Red_Dye_Number_Five
Rejects_Illustrated
Relish
Renegade_Legion
Researchers_Undergro
Revival
Revolution
Revolution
Rhode_Island_Compute
Rice
Risks_Digest
Robot_Protection_Age
row
RTC
Russian_Reality_Revi
Ruthless_Anarchists_
Sabotage_and_Social_
SANctuary
Saqueadores_Edicion_
Sarko
Satellite_of_Love_Ne
Saxonia
SCAM
Scandinavian_Indie_D
SCENERS_EMAIL_ADDRES
Scenet
Scene_Charts
Scratch
Screams_of_Abel
Scream_baby
Scrolls_of_Serenia
SDM
Security_Breach
Security_info_2002
Security_System
Seductive_Monkey_Pos
Several_Errors_Hidde
Sex_With_Sheep
SFFS
Shackle
Shadow_Lurking
Shake
Shawn_Da_Lay_Dawg
SHA_and_IHA
Short_Talk_Bulletin
Silicon_Times_Report
SILMARILLON_MAG
SitComm_Magazine
Skips_Computer_Misce
Skweril
Slam
SLAP
Sleazy_Wind
Sleazy_Wind
Slightly_Insane_Anar
Slinky
Sloths_over_Ethiopia
Smash
Smite
Snorkle
Soapbox
Socially_Deranged_Me
Social_Workers_on_Ac
SoCiOtY_oF_LAMERS
Soldiers_of_Death
Some_Hairy_Illicit_T
Soshutup
Souls_In_Chaos
Southern_California_
Southern_Lights
Soveriegns_of_Bell
Space_Power
Sparkly_Blue
Spetznas
Sphear
Spilled_Ink
Spindle
Spiral_Chambers
Sprang_allt_och_Dera
Square
State_of_unBeing
Static_Line
STD
Story_Bytes
Strangeness
Stu
Stuck_In_Traffic
Stupid
ST_Gaming_Digest
ST_ZMagazine
Subliminal_Takeover_
Subterranean_technol
Sub_Space_News
Sunlight_Through_The
Super_Stupid_Slamboo
SURFPUNK_Technical_J
SWaT
Synaesthetic
Syndicate_Power_Acti
Syndicate_ZMagazine
SystemDown
System_Failure
Taco_Bell_Core
Take_Off
Tamer_Shrew
TapRoot
TAP_MAGAZINE
TAP_Magazine_Online
Taylorology
Tcahr
TDKEB
TeaMp0isoN
Technical_News_Assoc
Technophile_Times
Telecom_Computer_Sec
TELECOM_Digest
Telephone_Free_Plane
TFW
Tha_Ruthless_0rganiz
the2ndrule
There_Aint_No_Justic
There_Will_Be_Sharks
The_ABCs_of_Payphone
The_Abuser
The_Acid_Enema_Press
The_Adventures_of_Lo
The_Albert_Hofmann_F
The_Alembic
The_Alliance_Product
The_AlterNet_Times
The_Anarchists_Guide
The_Anarchives
The_Annihilation_Fou
The_Art_of_Technolog
The_Association_of_R
The_Asylum
The_Atari_Jaguars_La
The_BASIC_Code_Cache
The_Basix_Fanzine
The_Belgian_Hackers_
The_Belgian_Scene_Re
The_Black_Page
The_Blizzard_of_oz
The_Braille_Monitor
The_Carding_Hacking_
The_Carrier_Wave
The_Carrier_Wave
The_Cats_Pajamas
The_Chaos_Advocate
The_Charlatans_Diges
The_Cheap_Review_of_
The_CodeZero_Technic
The_Computer_Inciden
The_Connector
The_Console_Mag
The_Consortium
The_CyberSenior_Revi
The_Cyberspace_Chron
The_Cyberspace_Vangu
The_Cyber_Sleaze_Rep
The_Dark_Council_Dig
The_daubesque_journa
The_Discordant_Oppos
The_Drain_ezine
The_Eidolonica_Paper
The_Elite_Krue
The_Empire_Times
The_EuroGamer_Digest
The_Eye_of_a_Storm
The_Federation_Flash
The_Fixer_Collection
The_Free_Journal
The_Frog_Farm
The_Fucked_up_Indust
The_Game_Review
The_Genuine_Article
The_Green_Screen_Sce
The_Grimore
The_Hackers_Warehous
The_Hack_Report
THE_HAQ
The_Harold_Herald
The_Havoc_Technical_
The_Hell_Chronicles
The_Hex_Files
The_Hidden_Obvious
The_Hippie_Dippy_Klu
The_Hogan
The_Hogs_of_Entropy
The_Humus_Report
The_Imagica_Ezine
The_Infinity_Concept
The_International_Ro
The_Internet_Informe
The_Internet_Sux
The_iSO_News
The_Journal_of_Ameri
ThE_LaMeR_Kr0NiCkleS
The_Lawless_Society
The_Lobotomists_Dige
The_Lone_Gunmen
The_Martian_Chronicl
The_Media_Poll
The_Milkcrate_Libera
The_mini_Annals_of_I
The_Misfits
The_Morpo_Review
The_Mouth_of_Xibalba
The_Neo_Comintern
The_Netsearch_ezine
The_Network_Observer
The_New_Fone_Express
The_Nullifidian
The_Olde_Crohn
The_one_arm_monkey
The_Ontarian_Hackers
The_Orlando_Indicato
The_Phone_Losers_of_
The_Phreakers_Hanboo
The_Poets_Corner
The_Project
The_Purple_Thunderbo
The_Rant
The_Remote_Informer
The_ReservoirGODS_NE
The_Scanner
The_Scene_Post
The_Schidt
The_Scriptures_of_th
The_Space_Between
The_Swedish_Undergro
The_Syndicate_Report
The_Telecommunicatio
The_Teleputing_Hotli
The_Thrashing_Pirana
The_Toxic_Custard_Wo
The_Ultimate
The_Undead_Rise_Damm
The_Underground_Ange
The_Undiscovered_Cou
The_United_Phreakers
The_Unplastic_News
The_Utopian_News
The_Vandals
The_Vectronix_Newsle
The_Warez_Magazine
The_Ware_Report
The_Watcher
The_Web_Word
The_Weekly_EuroGamer
The_Weekly_Something
The_Week_in_Warez_Ne
The_WeST_of_Scotland
The_Winner_ANSI_Team
The_Word_of_God
The_WorldView
The_Zine
Thinking_Magazine
Thinking_to_Text
This_Zine_Sucks
Thought
Time_for_a_Change
Tolmes_News_Service
Topy_online_Transmis
Total_Control
Tower_of_Song_Canadi
Toxic_Shock
Trapped_In_Absence
TraxWeekly
Triad
Trickz_of_the_Trade
Trina_Magna
True_Cyberpunk
Truth_Is_Stranger_Th
Turbo_Zine
Turtle_Overlords_of_
Tutorial_Assembleur
Tutorial_Assembleur
Twilight_World
Twilight_Zone
Twisted_Young_Minds_
Twister
Tyrone
Ubiquitous
UCPH
UKA_N64_Ezine
unCERTain_DIGEST
UnderDark
Underground
Underground_Digital_
Underground_eXperts_
Underground_Legion_o
Underground_Magazine
Underground_Periodic
Underground_Technolo
Underg_eXperts_Unite
UnderWayy
UnderWayy
Under_Construction
Uninformed
United_Hackers_Army
United_Hackers_Army
United_Hackers_Assoc
United_States_Underg
Unlawful
Unreal
Untouchable
Upper_10
Urban
Utopia
Utter_Newbie_Faggots
Vana_Imago
Vanliga_Svenska_Prii
VAS
Viewer_Discretion
Vinilo
Violence
Violent_Perfection
Viper_Corp_Collectio
Virtual_Reality_Mont
Virus_Bits_and_Bytes
Virus_programming
Vision
Vivatron
Voices
vOLVo
Vomit
W0OL
WAG
Wannabe
Warning
Warpzine
Wave
Weakly_Weird_News
West_Coast_Phreakers
West_of_Scotland
West_Swede_Priiker_A
We_HaTe_You
We_Magazine
Whirlwind
White_Wolf_Army
White_Wolf_Army
Wizardry
Works_of_Art_that_di
Worthless_Piece_of_S
WritersWeb
WTF
WWIV_News
x0x0x
x0x0x_exposed
Xenocide
Xenon_Foundation
XIII
XIII
Xine
XSystem
Xtravaganza
x_files
X_H_Mag
X_H_Mag
Y0LK
Yahoo
Yellow_Journal
YFI
YGDRASIL_Magazine_A_
Your_Life_Your_Choic
Zencor
Zero_For_0wned
Zhit_Axis_Nation
Zig_Zag
Zine
Zodiac
Z_NET_Online_Magazin
_CbD_s_Tutorial

Hackers Issue 08

2 Jul 2020

  
* * * * * * * * * * * * * * * * * * * *

-= H A C K E R S =-

Issue #8, October, 1996: Mischief Night!

Edited by: Revolution


-------------------
Hackers Forums
-------------------

From the Editor . . . . . . . . . . . . . . . . . . . . . . . . Revolution


Letters . . . . . . . . . . . . . . . . . . . . . . . . Hackers World Wide

Checks and Balances . . . . . . . . . . . .Voters Telecommunications Watch

-------------------
Technology
-------------------

DTMF Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Jojo

Hacking Answering Machines . . . . . . . . . . . . . . . . . . . . . .Jojo

MCI - 1-800-Collect Fraud . . . . . . . . . . . . . . . . . . . .PBXPhreak

Phone Bugging and Modifications . . . . . . . . . . . . . James M Atkinson


--------------------
Politics
--------------------

Is the NSA Watching? . . . . . . . . . . . . . . . .NorthStar Mailing List


The End . . . . . . . . . . . . . . . . . . . . . . . . . . . . Revolution

----------------------------------------------------------------- ------------
copyright 1996 by Mike Scanlon All articles remain the property of their
authors, and may be reprinted with their permission. This zine may be
reprinted freely as a whole electronically, for hard copy rights mail the
editor. HACKERS is published monthly by Mike Scanlon, to be added to the
subscription list or to submit articles mail mrs3691@megahertz.njit.edu
----------------------------------------------------------------- -------------
* * * * * * * * * * * * * * * * * * * *

-= H A C K E R S =-

Issue #8, File #1 of 9

From the Editor

Finally? Another issue? Hell yeah. We finally have a respectable
web site up at http://people.delphi.com/scanlonr. If you have a page of your
own, or know someone who does, try and get them to link me to advertise the
page. I'm toying with the idea of starting a newsgroup, just for the fun of
it, but more on that in the coming months.
The coming months? Yes, I plan on getting into the mag a lot more,
for real this time. I finally have a steady job and am getting used to the
school work. And while ideas are being toyed with, how about a minicon in
Manhattan? That's kind of off in the distance now, but if anyone knows of any
perspective sites, send me mail.
A political column has been started courtesy of VTW, checks and
balances. I've found an author for a bug of the month column, but could not
get in touch with him before I felt this issue should be out. Also, Hackers
Profiles will be a monthly column, but I did not have time to get an interview
done after I decided to get this issue out.
I'm not going to write much more now, but I've been hustling behind
the scenes these last couple of weeks with a couple of projects...so don't
change that dial. Look for a lot more from this direction...

-Revolution

* * * * * * * * * * * * * * * * * * * *
As always, the standard disclaimer applies. All of these articles are
provided for informational purposes only, Mike Scanlon and the respective
authors cannot be held accountable for any illegal acts they are used to
commit.
* * * * * * * * * * * * * * * * * * * *


-= H A C K E R S =-

Issue #8, File #2 of 9

Letters


>From matt@matt.net.house.auSun Apr 21 18:41:18 1996

Date: Wed, 17 Apr 1996 19:09:28 +1000 (EST)
From: Matty <matt@matt.net.house.au>
To: Mrs3691@hertz.njit.edu
Subject: Handy Hack


G'day.. just started reading HACKERS #8 (finally got around to getting
it!) and thought I may as well make a fool of myself and contribute this
hack by a friend and I. It's not very exciting, and has nothing to do
with breaking into secret government computers or anything - but we were
proud of ourselves.

This was two years ago - when the lab that held the Sun workstations was
restricted to a few students 9and not open like it has been since they
stuck the colour linux boxes into another lab - anyway)
There was an aging line printer... 132 columns or so... extremely noisy
and usually having reams and reams of paper in a complete mess on the
out-tray bin and all over the floor. (it's been replaced by a laser now..
but I continue)
The problem was, there were some morons in the lab who were either
blind, stupid, or had difficulty reading the large sign above the printer
that we had made saying "THIS PRINTER DOES NOT PRINT POSTSCRIPT" - which
it didn't. Every time a postscript file came through, the printer would
happily churn out literally hundreds of pages of gibberish - wasting both
paper and ink - and being a general nuisance to those of us who had
important things to print out. One night my friend and I had important
things to print, but some lusers had postscript jobs queued ahead of us.
Anyway, it was typical programmers time (like about midnight or 1am) so
the Big Chief wasn't around to log in as root and nuke the jobs.
So anyway, after the usual "you dipshit" letters to the offenders, we
started thinking how we could get our jobs to go through.
Well, as usual, the printer was out of paper anyway. So I went on the
hike to the Computer Services Centre (from our faculty) with my large
backpack, and returned with around 3 inches of fanfold paper. The
advantage of the printer room (which is now gone - but basically it was a
partitioned-off section of a general computer lab) was that the security
camera was blocked by the partition - hence I could rip off as much paper
& stuff as I liked. The fake job I printed out was discarded in the usual
manner (banner & login name ripped into various segments and disposed in
random bins along the way out along with a few cusses about the printer
screwing up again) and I hiked back to the faculty with the paper.
First off, we took the ribbon out (no sense wasting the ink - it was
almost dry anyway) and then tried taking the paper out but of course the
printer had built-in detectors and wouldn't print. So we tried the
looping paper trick, but it started strangling the tractor.
Next we tried getting a long strand of holey bits and looping that around
- it failed due to a second paper-detector.
So two loops were made - and after the long wait for the glue to dry we
put them in - and it worked for a bit - then the loops jumped out. So we
cut them up tight enough to not jump but loose enough not to rip (it was
really crappy paper that would rip if you looked at it hard enough) -
waited again for the glue to dry - and set it off again. Worked
perfectly - we jammed a bit of paper over the tractor so it wouldn't get
damaged by the hammers, and hour or so later the crap stuff was out of the
queue and we could print our stuff.
While we waited my friend wrote up a short spiel about how to clear the
print buffer on the printer and how to defeat postscript jobs - this was
pinned on the noticeboard above the printer where it stayed until we took
it down when the line printer was replaced by a laser.
The tech. staff thought it was cool - we had a few compliments from others
who used the lab and experienced the same problems we did - and yeah we
were pretty proud.

Well that's it. Not a great hack, but still, a hack.

ObLittleHack:
Dialling 199 on a Telecom Commander PABX actually rings _every_ extension
on the system. Kinda fun in a big shop where you spin some crap to a
clueless salesperson who wanders off to find out and you reach over & grab
the phone, dial, hang up, look innocent, and wait for the joyful tones of
an entire PABX ringing - then the look on the faces of everyone who rushes
to pick up the phone, gives the standard welcome speech "Hello, Fred
Bloggs Nose Picking service, Jane Doe speaking; how can I help you?" and
gets the annoying *beeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeep* in the ear.
(Australia only - I assume the numbers & stuff differ overseas)

matt@matt.net.house.au (not on DNS)
tp943845@ise.canberra.edu.au (on DNS)
-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GIT/GMU/GO d- s++:- a-- C+++ UL++++(S+) P--- L++++>$ E- W+++(--) N+(++) !o
K- w--- O M-- V--(!V) PS+ PE++ Y+ PGP t+ 5++ X+ !R tv--- b+ DI(+) D++ G--

e>++ d++ r--->+++ !y+

------END GEEK CODE BLOCK------

-------------------------------------------------------------------------------

>From matt@matt.net.house.auSun Apr 21 18:41:27 1996

Date: Wed, 17 Apr 1996 19:58:35 +1000 (EST)
From: Matty <matt@matt.net.house.au>
To: Mrs3691@hertz.njit.edu
Subject: Another Hack


Oh yeah... forgot to add this one:

Lacking sufficient ethernet cabling and cards at the time, we were unable
to set up net.house properly - however with a few null-modem cables and
SLiRP (http://blitzen.canberra.edu.au/slirp/) we finally got the place
nettable. The link looked like this

INTERNET
|
128K_ISDN
|
/~~~~~~~~~~~~~~\
|AARNet gateway|
\______________/
|
eth
|
/~~~~~~~\ /~~~~~~~~~~~\ /~~~~~~~~~~~\ /~~~~~\
|blitzen|--eth--|ise-gateway|--eth--|csc-gateway|--eth--|annex|
\_______/ \___________/ \___________/ \_____/
I
modem
I
(telco)
I
my-modem
I
/~~~~~~~~\ /~~~~~~\ /~~~~~~~~~~~~~~\
|neil-mac|==serial==|smoopc|==serial==|matt.net.house|
\________/ \______/ \______________/

In order, my PC runs SLiRP off blitzen through the annex (they haven't
given proper (C)SLIP/PPP to students yet) Smoo runs slirp off my PC, and
Neil runs slirp off Smoo's PC. So when you look at it, Neil's Mac was
faking it was Smoo's PC which was faking it was my PC which was faking it
was blitzen.canberra.edu.au *phew!*
My poor little 28.8K modem was pretty busy keeping up with it all, but
the link worked (albeit slow at times - especially the Mac - hehe)
When Spakman moved in, the link got worse - it was the same to my pc, then
we had spak's pc slirping off mine and his laptop slirping off his pc, and
Neil's mac slirping off my other serial port. A nightmare of cables and
not much say in whose PC went where on the desk (cable length limitations)
Now I have my ethernet card back, and neil has a new ethernet-able mac, so
net.house is fully coax-ed and there's just the one slirp link faking
PPP from my pc to blitzen - and I IP-forward and proxyarp the rest of the
house. But that serial==serial==serial==serial slirp connection to get
every computer in the house on the net has to be one of the better hacks
we've done this year.

Again, not a 'secret government documents' - kind of hack, but I've been
out of that scene for a while...

matt@matt.net.house.au (not on DNS)
-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GIT/GMU/GO d- s++:- a-- C+++ UL++++(S+) P--- L++++>$ E- W+++(--) N+(++) !o
K- w--- O M-- V--(!V) PS+ PE++ Y+ PGP t+ 5++ X+ !R tv--- b+ DI(+) D++ G--

e>++ d++ r--->+++ !y+

------END GEEK CODE BLOCK------

-------------------------------------------------------------------------------

>From matt@matt.net.house.auSun Apr 21 18:41:32 1996

Date: Wed, 17 Apr 1996 20:25:30 +1000 (EST)
From: Matty <matt@matt.net.house.au>
To: mrs3691@hertz.njit.edu
Subject: Australian ANI numbers & stuff


They say there's two types of users - those who read everything first and
then send the mail, and those (like me) who just keep on mailing and
mailing until everything is read & sent :)

Anyway, I'm on to the letters section now. I don't know about that 1114
and 1115 that some guy/gal wrote in - it could be true but it sounds kinda
fake. The number I know has always been 19123. HOWEVER (I just had a
brief flash of insight) the 111x stuff _could_ be for a pay phone - I'll
have to test that one out. 19123 does _not_ work on pay phones (it says
"No information to identify telephone number" in this cool robotic voice)
- works on normal house phones though (and I assume a PABX or other
non-pay-phone phone)

New info: dialling "12711" will identify which service carrier you're
using for long distance calls, and how to use a different carrier. I
guess it's of some use to someone somewhere in Australia :)

Apologies for my 3-message spam - I really should learn to collate all my
thoughts first but I'm a spontaneous kind of person :)

matt@matt.net.house.au (not on DNS)
-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GIT/GMU/GO d- s++:- a-- C+++ UL++++(S+) P--- L++++>$ E- W+++(--) N+(++) !o
K- w--- O M-- V--(!V) PS+ PE++ Y+ PGP t+ 5++ X+ !R tv--- b+ DI(+) D++ G--

e>++ d++ r--->+++ !y+

------END GEEK CODE BLOCK------

[ Exactly the kind of hacks I was looking for...anybody can hack into
government computers, but what the hell do you do when the printer is out
of paper? Definetly cool hacks. You win the Hack of the Month award, send
me your snail mail address and I'll mail it out to you. ]

-------------------------------------------------------------------------------

>From jmfriedman@chop.isca.uiowa.eduSat Mar 30 18:27:28 1996

Date: Thu Mar 28 19:07:34 1996
From: jonathon friedman <jmfriedman@chop.isca.uiowa.edu>
To: mrs3691@hertz.njit.edu
Subject: HACKERS 7

I would like to respond to the 13 year old who wants to learn how to hack. I
would not recomend it, or at least actually doing it espieccially if you are a
"newbie". You will probably ask why should you tell me what to do,w ell, I am
13 years old as well, and I used a rlogin bug to get in to a computer at our
university (when i was 12) and I didn'at do anything, though Ic oudl have bu t
I was caught they didn't do anything like taking me to court but if I had done
something I could have been, anywyas the moral, Don't hack, especially if youd
on't know wha tthe hell you are doing.

--Jon
---
Wise man say the meaning of life is "Life is like.....Ever seen forest gump?"

[ Good advice, despite the typos...in my opinion, the real hacks are those
like the first two letters. Anyone can run an 8lgm script. Levy's version
of Hackers is what it is really all about. ]

-------------------------------------------------------------------------------

>From turgjb@ee.mcgill.caSat Mar 30 18:43:39 1996

Date: Sat, 30 Mar 1996 14:48:22 -0500 (EST)
From: Turgeon Jean-Benoit <turgjb@ee.mcgill.ca>
To: mrs3691@hertz.njit.edu
Subject: Hackers subscription

I read the latest edition of Hackers. Its a great zine!
Sysadmins at our lab are quite paranoids about hackers, they feel the network
is threathened by hackers every minute and even look for any file containing
the word "hack" in all users home dirs. Anyway, hiding ourselves is not
the way to go. So to end this story could you add my address to the
subscribtion list.

Thanks JBT

[ The same thing is done on the computers at my campus. If anyone out there
is currently in college, watch the names of the files you leave lying around. ]

-------------------------------------------------------------------------------

>From arcane@texnet.net Thu Oct 10 19:58:01 1996

Date: Wed, 04 Sep 1996 09:24:35 -0500
From: Brian Thomas <arcane@texnet.net>
To: mrs3691@hertz.njit.edu
Subject: phone number decyphering

I ran across issue six from 96 and saw the article on dialing the ANI code
to determine the number you are at. In the article wyle@max.tiac.net wrote
about a three digit code that will give you the phone number for any phone
in an area code. In our area code (817) I have found that the numbers are
actually based on the prefix and not the area code. For example
817-741-#### would dial 974 but 817-752-#### would dial 972. For anyone
that tried to find a number based on this code and failed you might try
again and use the numbers around it because of a difference in your prefix.

-------------------------------------------------------------------------------

>From gauravm@giasbma.vsnl.net.in Thu Oct 10 20:01:48 1996

Date: Mon, 30 Sep 1996 19:09:53 +0530 (IST)
From: GAURAV MARBALLI <gauravm@giasbma.vsnl.net.in>
To: mrs3691@hertz.njit.edu
Subject: Very tightly secured UNIX system

Hi! My name is WeByte from Mumbai, India. Our ISP gives us a UNIX based
Lynx browser for the Internet (Lynx version 1.0). We get access to the
UNIX prompt, but it is a Restricted Korn Shell ('coz it says rksh:
everytime). Earlier security was not so tight and so me and my friend used
to Cracker-Jack the password file, to get the passwords for the more
expensive TCP/IP accounts. But not anymore man!! Security is so bad, we
aren't allowed to use even "ls -la" forget "cd". So help me man. I tried
methods suggested by other hackers like "shelling" out of "vi" and stuff
like that, but man, we do not even have "vi". We use PICO. So help me
man!! I want that passwd file. (Remember I am a rookie) Bye for now! and
Thanx!!

[ Another testament to the horror of not leaving back doors. ]

* * * * * * * * * * * * * * * * * * * *



-= H A C K E R S =-

Issue #8, File #3 of 9

Checks and Balances

Courtesy of Voters Telecommunications Watch

===========================================================================
VTW BillWatch #62

VTW BillWatch: A newsletter tracking US Federal legislation
affecting civil liberties. BillWatch is published about every
week as long as Congress is in session. (Congress is out of session)

BillWatch is produced and published by the
Voters Telecommunications Watch (vtw@vtw.org)

Issue #62, Date: Tue Oct 22 02:32:41 EDT 1996

Do not remove this banner. See distribution instructions at the end.
___________________________________________________________________________
TABLE OF CONTENTS
New feature at VTW: CaseWatch
About VTW Center's CaseWatch
Subscription Information and donation policy (unchanged 2/18/96)
___________________________________________________________________________
INTRODUCTION BY SHABBIR J. SAFDAR

I'm still not quite sure how we've done this, but I'm proud to say that
we still don't have any money and we're about to announce a brand new
Web publication. Today, our nonprofit organization, the VTW Center
for Internet Education, unveils a new publication dedicated to following
important legal disputes that affect the net.

Our new publication, CaseWatch (http://www.vtwctr.org/casewatch/),
focuses on the evolving common law of the Internet. Small, often
private disputes between individuals and organizations are today
creating the common law of the Internet, in at least as much as they
are a sign of society's continuing discourse on how to integrate the
Internet into our lives. The disputes we cover in CaseWatch today may
continue to be obscure, but more than likely, we'll look back at them
many years from now with the benefit of perspective and see their
importance.

CaseWatch isn't for the faint of heart. It assumes a knowledge of both
Internet technology and a not insignificant legal background. However
it should still be accessible to most everyone reading this list, as you
are already better educated on these issues than most of the public.

CaseWatch is researched and produced by Diana Jarvis (daj@vtw.org). Diana
graduated from Harvard in 1986, and Yale Law School in 1992. She clerked for
Justice Robert W. Sweet, a Federal District Judge in the southern district
of New York. She has been with VTW since 1994 and is currently VTW Center's
Staff Counsel.

Please take a moment and visit CaseWatch at VTW Center's new home page
at http://www.vtwctr.org Most of all, take a moment to send a note of
congratulations to Diana for her first VTW publication, as well as starting
work as VTW Center's first full time staff member. She can be reached
at daj@vtw.org.

Here is this month's CaseWatch synopsis:


What community standards should determine the obscenity of images
loaded onto a Californian BBS and downloaded into Tennessee? We still
don't know, thanks to the fact that Robert Thomas' habit of collecting
addresses from all his customers enabled the Sixth Circuit to decide that
the mere presence of a computer BBS did not make his operation any different
from the traditional pornographer who sends magazines or videotapes
through the mail. The Supreme Court apparently agrees, having denied
certioriari on October 7th.


Don't forget!
On Sunday November 3, 1996 will be the seminar on the New York State
Internet Censorship legislation. Be a part of it by showing up, or show
up online through RealAudio and participate in the trivia contest to win
valuable prizes (including VTW tshirts!). For more information on the
seminar, see http://www.vtw.org/speech/

___________________________________________________________________________
ABOUT CASEWATCH

[The following information is taken from http://www.vtwctr.org/casewatch/about/]

The legislation tracked by VTW is not the only law in cyberspace. As
the Internet becomes more prevalent, it will inevitably become the
subject of disputes, some of which will be settled in court. Because
the law laid down by judges in their opinions resolving these disputes
-- the common law -- is just as much law as legislation passed by
Congress, CaseWatch will try to track court opinions on issues
affecting the online community much as BillWatch tracks legislation.

Chicago Law School professor Lawrence Lessig has argued for a chance to
allow the common law of cyberspace to developed unhindered by
unnecessary and premature legislation:

"[W]hat the system of cyberspace regulation will need is a way to pace
any process of regulation -- a way to let the experience catch up with
the technology .... This is the practice of the common law. [It] is
democratic not because many people get to vote together on what the law
should mean, but because many people get to say what the common law
should mean, each ofter the other, in a temporally spaced dialogue of
cases and jurisdiction. Unlike other lawmaking, what defines the
process of the common law is small change, upon which much large change
gets built; small understandings with which new understandings get
made. What counsels it here is the way this process will function to
create in an as yet uninhabited, unconstructed, world.

What will be new are the communities that this space will allow, the
constructive ... possibilities that these communities will bring.
People meet, and talk, and live in cyberspace in ways not possible in
real space. They build and define themselves in cyberspace in ways not
possible in real space. And before they get cut apart by regulation, we
should know something about their form, and more about their
potential."

The Path of Cyberlaw, 104 Yale L.J. 1743, 1743-46 (1995).

Every new issue of Casewatch will try to bring you a new, usually quite
recent case that will reflect the development of Lessig's common law of
cyberspace and highlight the ways in which the Internet is quickly
being drawn into our legal lexicon.

___________________________________________________________________________
SUBSCRIPTION INFORMATION AND DONATION POLICY

We do not accept unsolicited donations at this time.
If you want to help, for heaven's sakes, register
to vote at http://netvote96.mci.com/register.html.

You can receive BillWatch via email or WWW:

To subscribe via email, send mail to majordomo@vtw.org with
"subscribe vtw-announce" in the body of the message. To
unsubscribe from BillWatch send mail to majordomo@vtw.org with
"unsubscribe vtw-announce" in the body of the message.

BillWatch can be found on the World Wide Web at http://www.vtw.org/billwatch/

___________________________________________________________________________
End VTW BillWatch Issue #62, Date: Tue Oct 22 02:32:41 EDT 1996
___________________________________________________________________________
This file provided by:

Voters Telecommunications Watch
*** Watching out for your civil liberties ***

Email: vtw@vtw.org (preferred)
Gopher: gopher -p1/vtw gopher.panix.com
URL: http://www.vtw.org/
Telephone: (718) 596-2851 (last resort)

===========================================================================
VTW BillWatch #63

VTW BillWatch: A newsletter tracking US Federal legislation
affecting civil liberties. BillWatch is published about every
week as long as Congress is in session. (Congress is out of session)

BillWatch is produced and published by the
Voters Telecommunications Watch (vtw@vtw.org)

Issue #63, Date: Tue Oct 29 00:18:48 EST 1996

Do not remove this banner. See distribution instructions at the end.
___________________________________________________________________________
TABLE OF CONTENTS
CaseWatch: Jurisdiction in cyberspace
Subscription Information and donation policy (unchanged 2/18/96)
___________________________________________________________________________
CASEWATCH: JURISDICTION IN CYBERSPACE

[Here is a summary of this week's CaseWatch, http://www.vtwctr.org/casewatch/]

Dennis Toeppen is the guy who registered "Panavision.com"
(and then posted aerial photographs of Pana, Ill, on the site until NSI
put it on hold) along with approximately 240 other domain names, at least
some of them 'bitchin' corporate names'; as Josh Quittner put
it in his Wired column about mcdonalds.com.

By now at least four of the companies which have discovered their
companyname.com registered to Toeppen have now sued for assorted trademark
violations -- one of them being Panavision, of course -- and although the
real question is whether Panavision has a right to Panavision.com simply
because it has trademarked the name, the first question, as it turns out, is
whether Panavision (which is based in California) can sue Toeppen in a court
in the state of California, when the guy by his own admission rarely goes
there and maintains his web page in Illinois.

The court's analysis is this: it's not just having a web page
-- it's what you're doing with your web page which dictates where
you can get sued (and if you're infringing a trademark, you've had an effect
in the trademark owner's home town). But the details haven't all been worked
out yet. ....

[Read the whole story for free in this week's CaseWatch,
http://www.vtwctr.org/casewatch/]

___________________________________________________________________________
SUBSCRIPTION INFORMATION AND DONATION POLICY

We do not accept unsolicited donations at this time.
If you want to help, for heaven's sakes, register
to vote at http://netvote96.mci.com/register.html.

You can receive BillWatch via email or WWW:

To subscribe via email, send mail to majordomo@vtw.org with
"subscribe vtw-announce" in the body of the message. To
unsubscribe from BillWatch send mail to majordomo@vtw.org with
"unsubscribe vtw-announce" in the body of the message.

BillWatch can be found on the World Wide Web at http://www.vtw.org/billwatch/

___________________________________________________________________________
End VTW BillWatch Issue #63, Date: Tue Oct 29 00:18:48 EST 1996
___________________________________________________________________________
This file provided by:

Voters Telecommunications Watch
*** Watching out for your civil liberties ***

Email: vtw@vtw.org (preferred)
Gopher: gopher -p1/vtw gopher.panix.com
URL: http://www.vtw.org/
Telephone: (718) 596-2851 (last resort)
Copyright 1994-1996 (commercial use without permission prohibited)
===========================================================================

Copyright 1994-1996 (commercial use without permission prohibited)
===========================================================================

* * * * * * * * * * * * * * * * * * * *



-= H A C K E R S =-

Issue #8, File #4 of 9

***************************************************************************
D T M F S C A N N E R
***************************************************************************

By: Jojo

This article gives descriptions and plans for building a small electronic
circuit that reads digits dialed on a phone line. I made it all up myself
so u won't find anything about it in books; it works fine, I sold a lot
of these devices to friends.

If u already have experience in building electronic circuits then u will
find this circuit very easy to build: two graphic files (DTMF.BMP and
DTMFPCB.BMP) give circuit diagrams *and* printed circuit board layouts :-)

If u r a beginner and want to learn about building an electronic circuit
using the printed circuit board layouts, just print the graphic file
DTMFPCB.BMP and take it to an electronic components shop. They will
tell u how easy it is to use those layouts: they can make the board
for u for less than $10, then all u'll have to do is soldier the
components on it.

If u just want to know more about how a digit is dialed on a phone line
then read the "how does it work?" part.




W H A T ' S A D T M F S C A N N E R ? :
-----------------------------------------------

It's an electronic device that connects to a phone line and reads the
digits dialed on it. DTMF stands for: Dialing Tones using Multiple (or
Modulated) Frequencies. The scanner described here can be used in 2
different ways:

1. PHONE LINE --> DTMF SCANNER --> YOUR EYES
The scanner has LEDs (Light Emitting Diodes) on it; when a
digit is dialed on the phone line, some of these LEDs will
light, others won't, depending on which digit is dialed. So
you can "read" the digits just by looking at the LEDs :)))

2. PHONE LINE --> DTMF SCANNER --> COMPUTER
The scanner can also be connected to the Centronics interface
of a computer: the centronics is the 25-pins connector at the
back of your computer that is usually used for connecting a
printer.

The computer then uses a little program to read the signals
received on the Centronics interface and display the digits
dialed on the phone line. These digits can be saved in a file.

NOTE: this scanner uses special electronic components called
opto-isolators that ELECTRICALLY SEPARATE the signals on the
computer side from the signals produced on the scanner side.
That means that your computer CAN *NOT* be damaged even if
the scanner goes electrically "mad". You could even connect
1000 Volts to the scanner's input, the output on the computer
side would still be held at a standard low voltage!



W H A T ' S T H E G O O D T H I N G A B O U T T H I S
D T M F S C A N N E R ?
---------------------------------------------------------------

Some people use sound cards (like SoundBlaster) to scan digits
dialed on a phone line. The DTMF scanner can be more usefull
cuz it's a *small* device that u can carry in ur pocket :) :) :)

It uses low-cost components: the whole thing costs less than $20.




T H E C I R C U I T D I A G R A M :
---------------------------------------

UUencoded graphic file (DTMF.BMP):

[ Section: 1/1 File: dtmf.zip Encoder: Wincode v1.4 ]
Original Input File Size: 11647
begin 644 dtmf.zip
M4$L#!!0``(`(`&``=""A30)`#2T``"9+!0`(````1%1-1BY"35#MG<_/-<EU

MU\MC>P82*R>_Y&23!"%D4/X")!9(+,8+2!A!Y%7D[)`UB@P2SNQ"!EA`-+"`

M!8HB-DA(2"@[+T!96<(+5IA=_H&`C&+0$8J"[8QRN/6CJ^MG=W5W/?=V5W^_
M[_L^[[VWJ[N?^[FGJDY5G3KW;_S2E_[FYY761X]_?^7Q[]^_H]2GGU7J,^IS
M:ED?F[_JXX_M?_K/X\&WOO6MQ__Z%3%_E8C]3__1+^GG4&?]BW<$ZJQ/?T.@
MSGK_^P)UUG^'G7;7CW]6H,[ZR2\*U%G?_?L"];93^*?=]<4/!.HL]:%`O9FB
M[O=G^@V!8*=@"J80F)Y2[X$I[!1,P10"TY/J!Y\1J'>__YY`\*5.KS_X?8$Z
MZZ/?$:BWG:+N]X^9^`<"==;OH.[WCT/Y%8$ZZU>^(U!G?>>_"=2;Z7<$ZJP?
M^5F!P/3T^H6?$ZCWV!0^?_]QU/L"==;7OR90[['IUP7JO1[U!P)UUK_"'$K_
MNH]Y_OY[>7Y)(/11Y_>E?DR@WGT4[+3_&A_Z?0B"(`B"H/WK40(!*IA"$'1.
M??\G!.JLG_YI@3KK#\&TNWX?3%'W4?<A"((@"((@"#X_F((I!*9@"J80F((I
MF$(STS\4J#?3;PITKKK/U+/8(/G#?NJ8G8)I03]Q[+OCP+3$]*?`M'O=!]/^
M,6A/87HO';13J,04XZCN^N93[/1>&>N?PI2IJ=U5@[3.WWQ&W;\9TSWM*=NO
MI]</B8,7BJ*`Z7(QMM=D>\Z%]3]VU/V`J?W9AZFST^LS/;@]JJVVWJSN'V/:
M:%.-3)ENY1X\Q4Y'8?J4K9&M=?_R+>DSH;;Y_+#3MS#G09AB7S3VFE]`/WLL
M[SGF3TM,#SJHU+/8(/JY+X!I;WWA6'Y^K$>]:AP%IF`*IF`*IF#Z@@E4`E/8

M*>P43,$43*^\;HH^"DS!]*9,6Y<"!<(\/YA"$(2U:`CC*&RE6(FTT_]LG&GA

M+;<Z\XTQ:'<(ZE7NW^.]JN);[AI_>@_7+&"JWZY[RU/X_E1B*9P_C.=?+6=O
M,DH4ZCF83MM/Z-AO?46FFX?HS;'GMZG[2CFF7`#81N%F?=1!.^UI@&"ZH?*#
MZ19?2C75ZE98]_#YG=_/-9\?`R0(<])@"CTU9@)K?%B+1FP/F([/]-@V/C!%

M>PJF8`JF8`JF8`JF8`JF8(I])V"*\3[L%.TIF$*(/0=3"$PA:'M7S6UANJ.$

M`"W'\X=[),R/?4Q5S_"_L>+Z2LPW7.DN3)>[J"C^M!AY#J:'F'HN/'^=ALT`
MK58W/TQ1EXO%+--[[9%X_-W+U/U<_<(3&8%I@YWZ/1*%"MS8GC9Z!R0W</E7
MX_G!]%C=+^Z-[,L4>R0V^*=M]CR(S]_4GA[>(X$I%`A0(0CK4=OU7_XKF';7
M-\"TM][_(9CVUA]_"4Q[ZZ,S?2_/($P_>^Q]@&FIBT(,6G=]Z4_`M/O,TV^`
M:7<[_01,N]LI?/[N^NK_.1%3"$R1-@5,(0AK)Q"TO]4=)/AL97T_RGN^OZ=I
MBYEHC[P<)N]YB6GG`=)MXE"R6$DP[1]_^G;CJ!O;J?*IY.U+:E$>UFJQ*?*7
MUG[K@?*>D^QERJMQTBJ,>1.TI]UJ]<WZ_8-]U*U\J0TQO84ZV97I*#[_EKSG
MI=#S[*4;T\(D'@1!IVDBD%\*3)&S"SF[+JR/W@73WOK@0S!]38X8,-VB?_H^
MF'9O3S\%T][ZWL^#:?>8WM\&T][Z:Q^!:?>8WE\#T^Y]%&+0^K>G_T^@<^V-
MA`KZ"ZC[_>WTQP7JW>]_4:#.0G,*.[V"/O[;`G76M[\J4&>]>RP?"E3*,2-0
M]WG^WQ*HL_[.!P?VYP3[?!"--NO+O]PE-K7*-"9_CPRJZN,^>9%K0?CKF7['
MT^=V6T[,M$8KCEZ_1POQ3A^FHA[_P+3O/I\FIC>I^_M[C61/RE)[.I'GF_11
MSV"Z\"TT(^IKG^GD2X%I+SM=]?D37TIN$6E_++9G&WGS`W8*[9B7^E&!.NLS
ML-/^3(_%]$(%_>!8_E.HM!XE4&_]VI\7"$S/OQ[U/8$ZZ^M@VEU?^9\"==;?
M0OQI=_WNL;SG4$&_C7%4=_U'C*-0]R^@_X68WN[ZLS\2J+/^WCL"]=[+\SF!
M.NL7_[=`G?57ORP0OIKC]/KDGPG46>]CDT1W_7.,]S'/?P']YJ\+U%D_B<7H
M_N.H7Q2H-U/,2_7WI?Z20-T-52`P/7^<]+$\O1`"^YZSWQ3KIFA/+Z#_O'O/
M&533AUCC.^O^*.Q>`5,PO2I3I?\JMV?<_BSEA]%;\94R1?43\D7-'EUE+Z"+
MJOEU?Z+>&*VF&Y').V&+2G1`!F/J8/G]S$E^&/TS+A8_,G]L0HFI>/S(<HVN
MEQV0X9A*M$<\R66B_Z4D)6$J$ZSYITB$SQA_P-0?5$-LG&YGJMQ#F2PU9VJ/
M!$Q-FI2H[ML_*F8Y`Z^E5;DV4_-"5O>G'!$65,14!7259>K-4+>N\XDUIJ[X
MN$Q]YR-)?IA^[:DOE+:G8449A>G<C4N6RR3L]RGHU>-^G[)^7\(3O2D_F-JV
M).KWE6LMAK)3B=S-I(]:\TH3"\M/*5QD>BDX=!NFY1KY)DR'J?O&BPF8*C6W
MI\L)#L$TTWOO"82\/1`$0:?-8@I!$`0=UY_^J4#P^<$4@B`(@C`VQ9PT!$'0
M8/K\YP6"H!OJTT\%@B`(PMCTG',H8`I!$`2?'X(@"((@K$5#$`1!$(0X:0B"
MX/1#$`1!$`1!$`1A&`4-K'??%0B"T$=!$.P4@B`([2F$?7POU;=^0Z#>=?^/
M!.JL?_@-@7JWIY\5J'?=_T"@SGK_CP7JK.]_(A!B>D^O7_TQ@6"GY^^CL,;7
M7=_[QP)!$`1!$`1!$`1!$`1!$`1!$`1!$`1!=POJ8"6*6$B@[?`*>KRN<1*#
MZ1Y1X36>F?*ABX,IF#Z':>DP].9VRG83W:-7>UQ,G\;FQ^,5,1_)_4R=RI2H
MG2F9,XAD8FJ[-ONH=HL[,N7V?I_<I^"8LGBFYM^-F/):W=?>J:G.[4Q9DS1<

MV3*5>S&EY/\2[_8KL1DE&)(J8,IT%Z848J-"@5U,'W9*OCTE5_>KMQB1*05/

M,H1[F%*!Z5WZ*!;=E[,?AE*,T'H_P1@5_7XKTZJ=SCU+L[V&_JGY(.[FGSY,
M,,*F^_?('+<SA3AQ&IW3`Z8=F,[^:3164C1[E;:UA5KZE,C\$J;D>1MWG_;=
MXO9,HR1"--OPHR<'TUVBI-^?F3*8]IE#,4Z`@ZS`M._\J:W\I:/0$:9M*WQF
MTJ0VY#*KKP*FGJGIIAJ<,S_/^FB"38.AXJ-R,]$2TY;EJ)#I/-*/CLK-1'6F

M9O!>.AX7?DQ"J9AI<-4;,XW?=C`V7:_]NA"8;F&Z7OOU%']:]V_?GBHR_;:9

MG$N9\GJGK6?XLO;T[DS9H@AZEL!.=_918%ICVN99!OYI@:FI`(.'[*4J,@T6
M5K9-))*;Z]]ZXJ7=I**=JD-V>GO7LUSWW:I\WD=!^YCFC\'TN)VF)VQFNEB0
M6J\RI)W&B+AYA3]J>--&>*AN_WE,PY#*++R2UH>W%V<:].Z]XJ7BBZ8WX&3]
M:\@II^0ME@MM$IL_^>-I$G:D%I76;*I;>QI2S#X0DM';TW20T\(T:S#`=+%B
MEPJEOM1JFPBFJX4R_W3-4#D4F)8*94S79D52.^5P#F;QS(&8,DT3^*5"^3AJ
MQ1/(F$IP\=(=P'25:3J.&I[I8_W#[!PGV]2]"5/O=<5!Z[LF82_!5*8)/9XC
M3)N8SCA6[53Y<IF=CC@OE3*UQA-U(XDX7PY8OI.^^G3+K#T==%L9'[73QJ!6
M3CZ4]O.OQI2M@_E8(?'ULHWIIHV6Y/YM/OF:_3Z)67`*;&F5Z0._W<;;>"].
MVHC'(I>M'3)H>SHMP&_I]Z?5U*8[I?[I+9FNCZ.TK2XR)5Z:PN=Y>]N0==_L
MIS--:;H3\BC3P+5(MO6I*81B,-&1\3[K_?N/*,BJ*89,*VX`C9=.A8XQM3U;
MY=K:Y*ENIV[(!CN-^GW'*SFLE*O6G,1#ZY>#($`P+1519:9^AQJ%9LSF95O3

M>2HH2W9^U_94^<XF6%CVH]"D:;#/HTO8[$A@NC*.TM6=IUU^D9WZ+FNXZO[6
M3$UY>XIV":(!?2D+R)V8SO,;I4*;T63]_K!XJ?[^*2B4NZ`+/.IAS^D1JE]D

M?*9YN46FKCV-0JDY.,)[C?WR3+U-T4:F4^@.I3=125#/F(9*>YCR<E=CXO_#

MB],T>3T=\?T6CVBN5)_II'`;1%1.5^#"VDFPB,+1%'Y^)$Q==1.FLFRGAFDW

M.Z7V6>VAF,;O>HWIMO;T%DR-HTY1OQ]/R*VUIYOZ_::-U6/$G\9,M]7];?XI
MC3;BISI3I:;F+RVTPG3C..I.3$O>_P&FB]$4<@NF;EK9_)<66FE/M\;TPDX7
MQU%3+-NM<_93Z36:#VQE:IP$<:$7[7'2XZ>/H>1`9;"TP+1G<SM(W<\71-H;
M33"EWIE377[CSM<=CBFQ3WQ(_D>YJ&]/!4S7F=+\*,HU#:8'F0J8]F*J<J:5
M$VU[.@6BA)X#SXZ9]6%I6"^66IG:Z`A:8;ILZ^Y$,VYR%CVBJ"5#Q-R>SA/*
M&W&04,:4W07!M)B]KXFI"SB=F`Z;2I:V]?N[U^7(QOB%3%U@]MW]4VMI:L<P
MBWR4.9CVNDW*E,'T\)B5C!,ELYTJ,.UP'W)+>J07$+79.LA@"H$IF((I!*9@
M"J80F((IF((I!*9@"J80F((IF$)@"J9@"H$IF((I!*9@>F^F-B":!@W0>>OX
MT\J6,S(;]L!T5ZQD+>.V9;HQ$A5,P?0E3%LN`:;=[91M>+5-S*E/,SGH=1>W
MN"OP?DRIG2G9S`?D4_?:KLT^JMWBCDRYO=^G<,LT^;ASLCE1*[<8DBFOU7WM
MG9KJW,Z4-4G#E2U3N1=36F&Z[2YVVZ0AJ0*F3'=A&G4<I3*[F#[LE'Q[2J[N
M5V\Q(E,*GF0(]S"E`M.[]%%V)Q.'N1]#A-;[:?LB+O3[$=.JG5*X?[_-7D/_
MU'P0=_-/6:<^E:@]C<UQ.U.,HSAQ&IW3`Z8=F+(O$XV5E*^MM/KENV`:-YGA
MGN:H/?6\C;M?O@*8KC&--H8&F_@?/3F8[AWOE^W4;7>&#L^AV.Q=_GN-6JX`
MIJWSI[;RMUSA7J*#3-M6^,RDB9J:"VO<-/O#@^6:H8-,33?5D-S8S[.Z46G(
M=!J@@JD[U+(<!:9;F)K!^^HU]"24BIFR`M-T%,KS_^NU7Q=*F<).EYBNUWX]
MQ9_6?;H[4T6FWS:3<RG3H!8OM*=@FN<P,RB"&AO8Z;X^BH=ERJJAT!+3-L\R
M\D_-O#1%_FG3KW$=I@TJ,@T65J!]=JH.V2G&IL6Z[U;E\SX*.NKS[^JCP+1H
MIVGYS4P7"U+K56XP-N7F%?ZHX4T;X:&Z_><Q#4,JL_!*6A_>7IQI.!;O%"\5
M7S2]`2?K7R/&3*1OL5!F*U,V?_+'<_YN&;ONIW;4I3T-*68?",FS_/$/Y35,
MT]%1"].LP3@GTS]Y1F](#7Y/J4SJ2ZVVB>=@^ODOR'68KAKJXM?Q+9[94S]R
M)3M=C9Q*[93#.9C%,WOJDR_+*YDR35.<I3+Y.&K%$\B82G#QTAW>1+_W6COM
MS#0=1[V&Z5>^*\]B.GW5*]FF[DV8>J\K#EI_[B3L>U^3IS&5:4*/YPC3)J;A
MDO**G2I?+K/3I^E7?R"O8FJ-)^I&UA<(EF^DKS[=,6M/GZ9/OBA/:T_)C!</
MV6G;5R;-C<9+UE[^\G^0IS%EZV`^5DA\O6QCNNEKS<G]VWQR-[W[@3ROWR<Q
M"TZ!+:TR?>"WVW@;;\5)&_%8Y+*U0X:<YY\7X+?T^]-J:M.-4O_TEDS7QU':

M5A>9$B]-X?.\O6W(]2BSG\XTI>E.R*-,@Q8[V=:GIK"4T40'QONL]^\_HB"K

MIA@RK;@!-&`Z%3K$U/9LE4MKDZ>ZG;HA&^PTZO<=K^2P4JY:<Q)GJE\.0WG!
MM%!$E9GZ'6H4FC&;EVU-YZF@+-GY7=M3Y3N;8&'9CT*3IL$^CRYALR.!Z<HX
M2E=WGK;M1';JNZSQJOL;,S7E[2G:)8@&]*4L('=B.L]OE,IL1I/U^^/BI>K[
MIZ!,[H(N\*B'/:='J'Z1\9GFQ1:9NO8T"J7FX`CO-?;+,_4V11N93J$[E-Y#
M)4$]@QHJ[6#*RUV-B?\/KTW3Y/5TQ/=;/*2Y4G6FD\)M$%$Q78$+:R?!(@I'
M4_CYD3!UU4V8RK*=&J;=[)3:9[6'8AJ_ZS6FV]K36S`UCCI%_7X\(;?6GF[J
M]YLV5H\1?QHSW5;WM_FG--R(GZI,E9J:O[3,"M.-XZ@[,2UY_P>8+D93R"V8
MNFEE\U]:IMZ>ZJ`KRGROE9A>V.GB.(K<E-YHE([OY:'Y]7Y,%^.DAV?*`=/%
M[Y"I,FU(/7&W^5/*%T2:K\8FS0?J?L^K<=0<@^E2<(--?$C^1^UJ8-K.E.9'
MO,YTP."2MV(J#4QK_BF81D54SG0C-+V,[QTSNQ^#U"NM69D_;%+<V?@[15.<

MS*[>>0]3&QU!.YD&QDUVW,2NH7@I4S6S=7_L\[=GJN;V=)Y0WHB#A#*FQ:'!

MTYE*P%2.\]S'M)2]KXFI"SB=F+XTE6S*]/$FG\HTZ/=WK\N1C?$+F;YT:."9
M*EOW[>8$.T/^7/_4WE#M&&:1CS(_&5/]A^+V]&3CJ.I=4J;\>J9Z8=CV^\J%
MS,;QL6=GJJN5<U*<G:K7,O6ALO.LT5G'^\NA?K8-(;V`*&:LU:5'.$#SVDS/
MIN33[/OADD#GGNN#P!1,P11,(3`%TU,ZJ'8<RLK-H?K)C.EU.R:Q<P!NS#J-
M8,G.9+E"4X%I$H0._W:793K-](7S?NGK\:P@![,MEFOXQ[QR<Z9281J^+N$Q
M_=-P*S(5/\:E([_8"$RG]9)&IK+`%'7?_VBJ^W;^V+:_Y;H_S\30P=_MRDQ-
MOU-H3X/7X_8T:5.CUA3M:5#WE5V(GOM]-67)8&7C%>Q_@5T;7T'Y*6VSG(U^
M/ZC[V4LJ-N;X.471C_!/D^^]#6F%ZVQUIG/*K81IDA5";N[S%^Q4Q?/_`;#:
MTB:8OK5((#`%4S"%>BRFDNQW1TP4&0_[L;PET]I6'HV3^'9,2RYJ/`"(GK1C
MYYDIKU_AI$Z_^(D1-P)PL]'D1J+1A//LTZK@G,F?W9J.:$2F9D0TAYRJ<$XO
MGSV)YZPRIO9)3Z8-5SCO-+_].R.IS?"'3"4\)QK+/M-.65QX(MO07CU1)G:N
M;&FWU6F8SG6_Q#2SJO1Y.U-J9TKF#+)ADG/79A_5;O$"IO6Z'YV4,,T,E=;O
M7TLIV][OD_B-)IHDBV>Z;Q?+FS&MS$:G:P`)T]10DZ>E[>2E(J;N:^]4;6/*
M9%;)M'E;IG(N.YTGHWV_[V>DJTQ30Z7Z?6F%Z38GF,THP9!4`5.FLS'-JG*^
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M+RWI)&KP<`]3;F*J]*2)FIH+8]PJ\(=?D,-C,U/EAB=/8*HMM25IK!V,NN_?
MH^BSX&F`>CJF*JS[=C!4*&U+]63:LAQ58!I<]35,IXAS6FE/Z>GMJ6K*6JXG
MH=3)F/H(:9E[<CM%I?_)'`0]U_VDW_?QU2Z8>KXXK=^_E/R(Y__7:[\NE#(-
MVM-7,>WJI^ZRTRK3]=K_**3.5O<[E#C&U.2)5::'SI@V9+IA;::G:T])7ID#
M4=Q"9]!;!W9ZR7[_3==E&DQ\B6G;IZU"_]3,2U/0GJJFW^)*3-=59!HLK$#[
M[%0=LE/,21?KOEN5S_LH:.=<7_883(_;:5I\,]/%@M1ZE2'M-$;$S2O\4<.;
M-L)C=?M/8\K,Q<=N%K9TBY&8AOYXIWBI^*+I#3A9_QHQ9B)]BWF1S4S9_,D?
MSWF19>RZG]I1H<CV]C2DF'T@)*.WI^GHJ%`D8YHU&&"Z6+&7BG!KFPBFS46X
MVK-M^9JSQ3/ORW1M.B6U4P[G8!;/'(CIG/NC6B1"M>()9$PEN'CI#F"ZRC0=
M1PW/U*S[V8FG-V/JO2Y7Z8/71YLPI&EA<UKAD"G"M(GIC&/53I4OE]GIB/-2
M*5-K/%$WLKX^L'P???7IAEE[.N1<'YGQXB$[;?LJFKG1&'CMA7Q4@UTQ]O6R

MC>F&$;^]T(#;3&K]_L-0M9T&MK3*U'SCDJ_2[<N)\R64K1TR:'LZ+<!OZ?>G

MU=2F^Z3^Z2V9KKNPVE87F1(O3>';2^0#U5'JOOU*.G)[)WLRG<[.[-0V`C0N
MTUWC?=;[]RF*$JPSK;@!U!*_>BNFMF>K7%F;/-7MU`W98*=1O^]X)8=-6N!I
M1]K,=`Z&]9-_8)H7466F/G230C-FF:/>>2HH2W9^U_94^<XF6%CVH]"D:;#/
MHTO8[$A@NC*.TM6=I]#AR$Y]ES5@=7];IJ:\/46[!-&`OI0%Y$Y,Y_F-:I&M
MX_WD\;!XJ?;^*2B2NZ`+/.IAS^D1JE]D?*9YJ46FKCV-0JDY.,)[C?WR3+U-
MT4:F4^@.I;=025#/J(9*VYGR<E=CXO_#2],T>3T=\?T6CVFN5)OII'`;1%1*
M5^#"VDFPB,+1%'Y^)$Q==1.FLFRGAFDW.Z7V6>VAF,;O>HWIMO;T%DR-HTY1
MOQ]/R*VUIYOZ_::-U6/$G\9,M]7];?XIC3?BIQI3I:;F+RVRPG3C..I.3$O>
M_P&FB]$4\O+=C-3S<H6+V5VVSJDJ%%EI3[?&])Z`Z;R'_E5VNN!3FB_^,\DO
M+J8W9DHTO[R5*=EYTH+I+<9)O\8R@V_C\,LZ_GLYPB\S8#455O.AA?8B/\`!
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
MF!Z>\R7C1,ELI^JZ3-==P-4"O3XY<DMZI!<0M=F6?!4PO6G:2`+3ZH!)>2]3

MJ3D/O[ADW'[VQ#!4/E&W'<CZE/W3JV#JF<[?;!`PC1/'S_^GC\-7P31@*IZI
M6;ZP3/U29L)1I,04=;_`U&+Q4WA,\XPQF&YG.H]C`J8ZJI$D9^J^G"/YDR4A

M2)[>LST-ZKDR&S[1GNYEZN>DS5/+2TT;$?4_F9^P?\U.8"NW+]&7!--X*F]Q

MYB_\\J@V'W7QX`V9YG#!M#V/"*E2#%K!8%5.$4R'G)<"4PA,P11,(3`%4S"%
MP/1Z3$VRY,>\&#Z5/?%2E2T2&N?`@0]O&]M3RQ!KF?+J!<ZD3[XJ8-I9[WPH
M%V"Z?H$SZ?T?RAAVRF[>5[$-F=1+.";G@EK>Q?(&^E3.S)3:F9(Y@VSXV=RU

MV4>U6[Q1>_K+<F*FW-[OD_@`?K+Q?!/3?;L#CM3]_RNO9,IK=5][IZ8ZMS-E

M3=)P9<M4GLST'\E+F=(*TVWW8#-*,"15P)3IN4S5OY07,8TZCE*)74P?=DJ^
M/257]ZNW>!O]V1?EA4PI>)(AW,.4"DR?WD?)1_(*IC;RGL-<92%"IN`[(53S
M/4[2[__,M^5U3*MV.O<LS?8:^J?F@WB=?_K)OY$7,#5!;1*UI[$Y;F=Z(GWP
MFK$I)TZC<WK&8/JB>:F)*?L2T5A)^=I*07YD:*7?C^TR84J>MW'W2^>#Z3K3
M*#`KV'3ZZ,G!=.]XOVRGPF#:9P[%Q@K[*,+U\\%TT[<BZ,&00'V9MJWPF4F3
MVI!KP-P(=(BIZ:8:DG'.\ZQFZ,3!,,(/4,'4'6I9C@J96H*A>8-IS%0U98/6
MDU`*3(O?*EN8ZV-IJ/VZ4,J4P72!Z7KMUU/\:=V?[WM3ICI5)+NDGRG3AE3,

M>H8O8\K!T3LR9;O0&7A.@9WN[*,&9EIU&]N8MGF6@7]:8*I:?HFK;6A;49%I

ML+"R=4^BYJLN%A+T%G:J#MGIW41M==^MRN=]%'34Y]_51X%I.??N4::+!:GU
M*C<8FW+S"G_4\*:-\&#=_K.8AB&567@EK0]O+\XTZ-U[Q4O%%TUO$#JK@S+-
MWF)68CO3<-8DGD&9\LW*V'4_M:.\Q([V-*28?2`DH[>GZ>@H+Y$SS1H,,%VL
MV(42F2^UVB:>DZD*4LQT=#ZH"]-50^50IV"J9J:5Q/&O9KHVG9+:*8=S,(MG
MOB'3.0F::ID'/LQTSE)5*)$S7?,$,J827+QTAV<Q]?DYK\<T'4>]G*D)+9;`
M3CO^%F3;:+-SG&Q3]R9,O=<5!ZWOFX3MF%C2_A+D'W=C*M.$'L\1IDU,9QRK
M=JI\N<Q.7YT`U797;\O4&D_4C:PO#RS?1E]]NE_6GKZ2J7@7H"]30_2@G;9]
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M7=W9#U-"._5=UHC5_4V9FO+V%.T21`/Z4A:0$46UM!!^?J-08CN:K-\?&2]5
MWC\%)7(7=(%'/>PY/4+UBXS/-"^TR-2UIRJ<SN/@".\U]LLS]39%&YE.H3N4
MWD$E03W#&BIM9LK+78V)_P^O3-/D]73$]UL\J+E29::3PFT042%=@0MK)\$B
M"D=3^/F1,'7539C*LIT:IMWLE-IGM8=B&K_K-:;;VM-;,#6..D7]?CPAM]:>
M;NKWFS96CQ%_&C/=5O>W^:<TX(B?*DR5FIJ_M,0*TXWCJ#LQ+7G_!Y@N1E/(
M+9BZ:67S7UJBWI[JH"O27EA^T8*=WHWIDIW6?4JR4WJWW]Q'V0LTO]J/Z6*<
M]/!,.6"Z^!TR5:;C5>;C=3]?$&F^%NLT'SU[L-M_)]=DIW<W5&J*<;2)#\G_
MJ%W+M:>K%P73><B3I.@&TZ-,I8&I]D^G!7XPK190.=.-AJB7\;UC9O=CD.H8
M0WM-IC8Z@G8RC;XMQK0,[!J*FS)5<WLZ3RAOQ$%"&=.!W0/:R+24O:^)J0LX
MG9@.F$IV5[^_>UV.;(Q?R'1D]X#:_5-K:6K',(M\E#F8]KI'RI3!M,-&)'%>
MJ[-3!:8=;D)N28_T`J(VVX&'!B00F((IF$)@"J;7%S<MMZT6@,K;:L#TJ8:Z
M=AS:;J@DT,:\5*LS2"30,S(;0V`*IF`*N10CT^H/F(+IF:O[G.NAJ3BTDL&-
MDBR.8-IG%P?+M,=!^1V+=IS*Z0:&^!E46??U7R'"P5ZDB>GTRF&F)K.O:IGZ
M`M/R"+<0ST_FHG=@RHXI%YB:[$6;F=;VG3BFJ[.)8_3[=J="PM3@I!UV"J9I
M!KC03DWP1V^FZQ<8E*F+):-\QQ>M7N6XG;*-7;-9S_1I)L&O[N(6MUQ<A*ED
MZ;UI]2H5IM3.E":7>6)JNS9RM:?EES@G4S9[:_O5?6[O]TE\M#G9X+.)Z;Y0
M]M,PW3R.XK6ZK[U34YW;F>JY"////A(?D7X3IK3"=//W*CS:4T-2!4R9+EWW
MRZNH^2LSA,Y,'W9*OCTE5_>KMWC%C)[2O:?2OP^UV6EY%;5X,H4'2BD0]C"E
M`M,S]5&FJW$MO7Y8-L68:=E0LQ?$AHESF%@K1&B]G\4]YY?J]ST6VWV['I1K
MIIBTIT5#I<)-C']$%3LE#NRTS5Y#_]1\$*?R3R<LMB7*F":FF#`M&A:E+[#.

M*R=1>QJ?M9WI-<)U#"WE*D^US0SF3ZL$J'R/X`@EUCT:TPF:J9RF?8J9IJ9(

M01:]K4S9E^#PQ/E*%"3S'2!<AWV;'S--&5&A%9PR%ND+E)A*8I<)4_*\38TI
MG7_-)?OM3.>NAKS/0(U,)3-]=R6Z-E,S"IQSD9K9$).M,/&/HB<A4]=BM##-
M)V332W*PE^SB+6E#_I;X,`4/)D>699K)H%:F2=Y)#UF-P;26M+'8T\^%:?)I

MI_V)>B2CFIB42DQ7HH;S3\V4`Z9FU9*BSJ/@D4:#(=],:D,U$Y^TQTXCIDG#

MLY`2M6H+K]S('S/U0[RT5/0F0SOUW;>M]FQ>/,K4MA_K3O4\SVJ&3AP,(Z9?
MYD5Q4.'-*TR35RA*9:SZ,VU9C@J9>D^%KL/4_*[*[3H.C#;PI<PQGE(;T/J-
MZTR-L[QZ!=-TGY1I='.3I32+U'$MJEU$,W\B,&GA#78:OVV6H&E>NX`N=$JF
MQC\-&GJ#N/3+F%X]RXY!.1BF-O]RA>EZ[==3_.>L^VD(#Z?.N/>EZDPC@NU,
M]<B"37NA,J:EI+QY>WH)IEQF*@[GE+F=@I>S%,3-3-GW:Y3;Z;X^BD[(U%B/
M%*R$G`<5,_`/:':Q#-/E(<0JTS;/4LW^Z<1T;C%L!3A]N)34F7(0FT?AD[J*
M3,.QQ+:)-<-7-=2/LX6>UYGNLU-UR$Y'F`KD:GOJ_J>Y/6U+N$5N53[OHT92
MC4C\(I7[*-K&-'\,IIDOM=E.T^MM9AHY'.E!:KW*<YARFMV=HE(4/^`];Z(^
M-N7F%?ZHX4T;X9=U^VFTU\14D@\_+)/.H22MZA.9AB&5>0@LE6[QK/%^\*%6
MF":?.4UV$6>"I?7[[/_.V+6+IC?0GIJ\1N97H<`SY&CA><77)/^UUVM,L[=8
M*KP1@O'R"X_GY*CRLCEIH2-VRDUVFME1E_;TG'V49AJ,6VKM:7'AVCZ@-J;I
MZ*B%Z>HBREF94EA':OU^G:FM<IR'_*Q4;%HHPJUMXI68M@58F`?.SS3_+0+8
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M,)UZ,O,RF8)^T9V#&(QVIK+*=#H[LU/;"-`5F$9YT-*Z[WI9]D%5Q^90MC"M
MN`&-RXQGRH-6;D^=+5/]&I%*Y1Q3W:*2*M=O_>E2W4Z9BVM35\G9E?_:/K#B
M(%/K+D1'E'+5FB5D:H\$X5TC,EUPMQN93CCCX\HO>U%(G.TT`\W75Q)<XW)Y
MT#C#0\N7B)^6"KO=XY0??Y!TK4K$U#^/+F&S(UTK#]H\+_463-WND;@]G7=F
M<V*GOLNZ0G5O63N)G4%:/*F5Z=(7Q9D'*MGZ5`Q"OA'3>7ZC5'@SFO`$WGF-
M\S%EES]"VM9-*;A&7GR!AZH.GM(C5+_(=>QT8KIB(QG3_-TO,B4.)_25_QU4
M.M\GEQ3M9^IMBC8R97>44G/T1ZYMJ)0NPG=@RLM=C8G_EY2IMM;IB.^W^)+F
M2KN8QALH*&&JKU)8.PD643B:PL^/Q)%QUV:Z(8W?@IW2\OD;[906)AY&9AJ_
MZS6FV]K36S`UCCH%IDGIJ@!U[/>;-E9?WT[)S(E2>`U*CG?T3^D:(_XN3(V!
ML81UMXWIQG'42$QU%2_/"UFF)>__`-.U6?0AF)*=JZLP==/*YK^T0+4]G<*N
M2B/?@IU>D^F<A++(5"2>T6RTTZI/R>(^I-(9XVP^-7"*3#F9JHH7"D@Z,UV,
MD[Y80KIBW5<^N4QAW9(#ILDX:"7B[!YV6FY/[<M<6V.C;.Z^O6^WG1[M./EZ
M7]%1F(IG60JPWAU?#*9=URTGIM3ODM>J^TQSIIK.3,\<6_*CWWK+]G1;,*Y=
M@"7_HU1PVB!TYKK_Y_[34;MA+@>*TY;+V%9B?E0.PUC>(,&S8V8'!J06`F'>
M4#]SN"YVZ8%FIK*3:7".&[FY9N+Y^N@+!YW3::'T(%.5,]U8O4DH8\I;+])%
MW_YJEZ%I%Z8VXH0.,'4!IQ-33N(IGJ3??>\43-7<GLXK']LN3#;&KYJA\7GZ
MVE_LTA1V9DKU`?_BQCC;MK^:Z7L?GH)IT._O7$"FE"F_C.E7/I"3)%R7,()/
M;9X/T%X32=B>JE<Q_;N?R#C#.7)+>J07$&UBR4V?2R?]DU\0J+/>_Z%`$`1!
M$`1!$`1!$`1!$`1!$`1!$`1!$'0!J?M)WEKJ?I*WUBMBBEY<,^6M!:9@"J9@
M"J8OOP.;O64Z"RG9/\Z1()N;1P?JVV/ZA[(OL=L4;8LKFZQ8=\7*_2JF7[8G
MFJUDRB:.9C*I0*2#SLV4'*60J7E1/W%H=)9M^\-S\\5-6<?7,S6O3A]&\-'<
MANGT]V%1(5.E@_3UCC1B_T,\4W.4O`W;EV>F8I/3J.!U\XS]UQG=C:DX$),U
MEIG*S%3*3"5B*O=CJCPVNV=L9JK\CSDUKSNJE-MF6V>JE#W'/Y8.NA131XS<
M14GO_?!,+9IF.V6AX#G;K8_W8BI3-^0MS_;N<Y-*V^H^.VMW3/4SJN:4NP%3
MVT<M,EWMHQQ3OB%3-9&5S)=RL#73R"!S7RIAZATK[TM%%GX#GU]/GCFFRNUO
M)%/OO1D'/K]+0&%]?I=7UQ%4K-R9`4)[?;H14XQ-P11,P11,P11K?%@WO3U3
MJ*_^];L"]<Z%]&\%ZJQ_]^L"==;/?TV@SOK,;PG4N^Z_(U#O7$@L4&?]=?A2
MW?7=W_O_4$L!`A0`%`````@`8`!T(*%-`D`-+0``)DL%``@````````````@
E`````````$14348N0DU04$L%!@`````!``$`-@```#,M````````
`
end
[ Section: 1/1 File: dtmf.zip Encoder: Wincode v1.4 ]

How does it work?

A digit dialed on a phone line is a simple sound containing
two special frequencies:
1 ---> 697Hz & 1209Hz
2 697 1336
3 697 1477

4 770 1209
5 770 1336
6 770 1477

7 852 1209
8 852 1336
9 852 1477

* 941 1209
0 941 1336
# 941 1477

The circuit used here uses 5 cells with a NE567 device and a
LED in each cell. Each cell will be adjusted for detecting one
of the special frequencies above in the sound carried on the phone
line. When the cell detects the frequency it LIGHTS THE LED.

The uA741 part: it's here to fix the level of the sound (like an
amplifier) that is sent to the 5 NE567 cells. At first just adjust
the 100K variable resistor at half its way.

Use the variable resistors (220K) to fix the frequency detected
on each of the 5 cells:
cell 1 has to light ONLY IF digits 1 or 2 or 3 are dialed
cell 2 has to light ONLY IF digits 4 or 5 or 6 are dialed
cell 3 7 or 8 or 9
cell 4 1 or 4 or 7 or *
cell 5 2 or 5 or 8 or 0

So cell 1 will detect frequency 697Hz
2 770
3 852
4 1209
5 1336

You can then know what digit is dialed simply by looking at the
LED or LEDs which are on:
LED1 & LED4 ---> 697Hz & 1209Hz ---> digit=1
1 5 697 1336 2
1 697 1447 3
2 4 770 1209 4
2 5 770 1336 5
2 770 1447 6
3 4 852 1209 7
3 5 852 1336 8
3 852 1447 9
4 941 1209 *
5 941 1336 0

NOTE: if u find that too many LEDs are on then it means that the uA741
part delivers too powerfull sounds. If u find that too few (or none)
LEDs are on, then it means that the uA741 part delivers sounds at
a too low level. All u have to do is fix the 100K variable resistor
to get a good working sound level delivered to the 5 cells.

The outputs OUT1...5: these r used if u want to connect ur scanner to
a computer's centronic interface. When LED1 is on, OUT1 is at the low TTL
level (0V). When LED1 is off, OUT1 is at the high TTL level (+5V). LED2..5
and OUT2..4 work in the same way.

If u r using these outputs then u must have D0=+5V so that the "TIL" chips
(these r the opto-isolators) can work. D0 is the Data bit0 output of the
centronics interface, so ur program on the computer must output a "1" on
this pin to take it to +5V.




T H E P R I N T E D C I R C U I T B O A R D :
---------------------------------------------------

The PCB construction plans (tracks, pads, components layout) used for
building it on a printed circuit board is contained in a file named
DTMFPCB.ZIP: it contains a high resolution graphic file that you can
print on a laser printer.




U S I N G I T W I T H Y O U R C O M P U T E R :
-------------------------------------------------------

If you want to use your computer for reading the digits, u have to
write a little program that reads the 5 Centronics interface inputs
(pins 10,11,12,13 and 15 connected to the scanner circuit).

The electrical state of the Centronics inputs are usually at port addr
379h: the byte read at this addr has bit7=NOT(pin11_of_the_Centronics),
bit6=pin10, bit5=pin12, bit4=pin13, bit3=pin15. All of these 5 pins are
connected to the OUT1..5 of the scanner circuit, so u just have to read
the byte at addr 379h to know which LEDs are on.

Reading the byte of the centronics inputs can be done using instructions
like "INPORTB" in C or "BYTE=INP(&H379)" in QBASIC.


***************************************************************************
[ Jojo (Jojo on Brinta BBS / email an617527@anon.penet.fi)]
***************************************************************************
* * * * * * * * * * * * * * * * * * * *



-= H A C K E R S =-

Issue #8, File #5 of 9

***************************************************************************
H A C K I N G A N S W E R I N G M A C H I N E S
***************************************************************************

By: Jojo

This articles shows how to take advantage of a "special feature" of
some answering machines to hack their access code in less time.



ANSWERING MACHINES:
-------------------

Most of 'em can be hacked by having ur modem call that machine and try
(at each call) all the possible access codes until u hear the beeeeeep
that tells u it's the right one.

Many answering machines have 3 digits access codes, and give u 7 seconds
at each call to try to find the right access code. So u'll have ur modem
dial as many digits as possible during these 7 seconds... until u hear
the beeeeep.



THE SPECIAL FEATURE:
--------------------

Among those r some machines with the following special feature: when u
dial a list of digits it will search the right 3 digits access code in
*ALL* the list STARTING AT ANY DIGIT. If u dial 123 456 then this special
answering machine will not only see 2 codes "123" & "456": it will see
the following codes: "123", "234", "345", "456".

That's the special feature.



TAKING ADVANTAGE OF IT:
-----------------------

Instead of making ur modem dial 000, 001 ... 999 which would make 3000
digits, u can make it dial a special list of digits: that list is only
about 1000 digits long and has all the 3 digits codes in it.

I wrote a program in C to find that special list. Here is the uuencoded
file:

[ Section: 1/1 File: list.zip Encoder: Wincode v1.4 ]
Original Input File Size: 566
begin 644 list.zip
M4$L#!!0````(`&``="!+A'W1S`$``.T#```$````3$E35`W`P0W```@"P'^3
M[B(HB/-/UE[]4,6JKIHJ5;EJJU)U!118Z,(45'!A"RE<$446NSA%%5W<8HI7
MC6I6=_54J]K56YWJJT$-:[IF:E3CFJU)S9508JE+4U+)I2VE=&646>[RE%5V

M><LI7RUJ6=NU4ZM:UVYM:J^""BM=F8HJKFPEE:M#'>NZ;NI4Y[JM2]T!(-#`

M``(,+!#@0((-#BC0X((!#TUTHP<MM-&+#OHPQ#1F,,(8LYA@#B+4T$""#"T4
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M2P$"%``4````"`!@`'0@2X1]T<P!``#M`P``!``````````!`"``````````
:3$E35%!+!08``````0`!`#(```#N`0``````
`
end
[ Section: 1/1 File: list.zip Encoder: Wincode v1.4 ]

***************************************************************************
[ Jojo (Jojo on Brinta BBS / email an617527@anon.penet.fi)]
***************************************************************************
* * * * * * * * * * * * * * * * * * * *



-= H A C K E R S =-

Issue #8, File #6 of 9


(i) // \\ (i)
(*) (-) (*) \\ MCi - 1-800-COLLECT FRAUD // (*) (-) (*)
(*) (-) \\ // (-) (*)
(*) \\ Written by PBXPhreak // (*)

.----------------------------------------------------------------.
| If you have any comments or questions about this phile then |
| send PBXPhreak email at pbxpbx@netaccess.on.ca .. you can |
| also visit my www page at http://www.netaccess.on.ca/~pbxpbx |
`----------------------------------------------------------------'

.----------------------------------------------------------------.
| Greets Go out to the Following DUDEZ!.. |
|----------------------------------------------------------------|
| Evian, Sloppy, KatKiller, Optic, Ip, Fiasco, Telmnstr, Plant |
| Darkagl, Lefty, Emmanuel, Terminal, Sinner, Snoninja, N0-D0Z3 |
| Dtmf, Plot, Rage, Ace, Dr-Freeze, Qsilver, Phractal, D-fens |
| KC, Juliet, K-RaD, T3, Theejoker, Substance, Odd, Teklord |
| CG, Doug, U4ea, Alpaca, Antix, Dip, Yuckfou, Macpass, Mdma |
| Mother, Nitzerebb, Quagmire, Hitraject, T99, T-800, Paradin |
| Digint, Seen, Dark Tangent, Dark Knight, Tek, Ajax, Black Flag |
| Motorola, XGIRL, Gweeds, Zeed, Phiber Optic, Kemo, Viciouz |
|----------------------------------------------------------------|
| - IF I MISSED YOU.. SORRY.. - PBXPhreak |
`----------------------------------------------------------------'

.--------------------------------.
| Be sure to check out |
|--------------------------------|
| www.netaccess.on.ca/~pbxpbx |
| #hack |
| #phreak (gpkbot=bot) |
| #cellular (dialtone=bot) |
| #2600 |
| #bluebox (blueboss=bot) |
| #linux (linbot=bot) |
`--------------------------------'

.------------.
| Disclaimer |
`------------'
This file is written for informational purposes only. I PBXPhreak don't
take any responsibility for any actions taken by readers of this text

.--------------.
| Introduction |
`--------------'
MCI is one of the United States leading long distance providers
and one of my favourite telephone companies. With the method explained
in this phile you can successfully call anywhere in the united states
for phree!!.

.---------------------------------------------------.
| Important MCI Numbers: |
|---------------------------------------------------|
| 800-265-5328 (800 COLLECT) |
| 800-444-1111 (Network MCI Services) |
| 800-444-2222 (Customer Service -> Proof Positive) |
| 800-444-3333 (General Information) |
| 800-444-4444 (Service Express) |
| 800-444-5555 (Proff Positive) |
| 800-374-3637 (Friends and Family set up) |
| 800-799-7994 (Customer Service) <-- *NEW* |
| 800-888-8800 (MCI Long distance help) |
| 800-945-2799 (MCI Fraud Department) |
| 800-950-1022 Calling Card Dialup |
| 800-888-8000 Calling Card DIalup |
| 800-FRI-ENDS Friends and Family Setup |
`---------------------------------------------------'

  
.-----------------------.
| How the Magic is Done |
`-----------------------'
I am warning you! if you are chicken shit and hate to speak to
operators then you wont like this method!!

The first step is calling 1-800-265-5328 (800-COLLECT). You will
probably want to divert if you are calling from home.

Once you are connected to the 800 # it will say .. "Thank You
for calling 1-800-COLLECT.. Please Enter the number you wish
to call .. area code first" . You will hit "0". You will then
be transfered to a MCI operator. She will come on and say "May I
have the Area code and Number you are calling". This is when you
tell the Operator how PBXPhreak defrauds MCI everyday of his life
and tell the MCI fraud squad his info!! (just kidding). When she
asks for the # you wish to call, tell her a # you want to call.
You can tell her any number except some #'s it doesnt notice in
its database. Like Defcon voice bridge (801-855-3326) and the rest
of those silly 801 partylines (801-234-4444) (801-234-7448) . She
will then ask you for your name. You will tell the operator "I would
like to charge this call on my mastercard. (Use this dead card)
She will ask for the card number. (5371-5990-0600-2787) . Now she
will ask for expiry date (01/98) . She will now ask for Zip code ..
Here is the trick. You must say its an overseas card. (she will enter
00000 into the computer) .. (MCI only checks algorithm for overseas cards)
if you told her a zipcode for the USA , the computer would check the
zipcode against the card and it would not be valid. The call should go
through. She will say. "Thankyou for using 1-800-COLLECT".

If you are using a payphone you can use the MCI Carrier Access K0DE
and it will be AUTOMATED!!.. DIAL like so.

10222+0+718-123-4567 (Enter your Number you wish to kall!!)

After you enter that you will hear a voice "MCI". Then the automated
operator will say "For a Collect call press 11". When you hear that
enter the Credit Card #. Then it will ask for expiry. Then is will ask
for Mailing Zipcode. You will enter "00000" (5 if you cant count). then
it will say "Thankyou for using MCI".

"Thankyou for ABUSiNG MCi" - PBXPhreak

.-------------.
| Final Words |
`-------------'
Well there you have it. Easy as hacking root on 127.0.0.1!!!
if you have any comments, questions, or anything else you want
send me email. the address is at the top of the phile. Until
we meet again. CYA!! /mode #hack +o PBXPhreak (hehe)

* * * * * * * * * * * * * * * * * * * *


-= H A C K E R S =-

Issue #8, File #7 of 9

TSCM.COM - Counterintelligence and Counterterrorism WWW Page

Phone Bugging and Modifications

By: James M Atkinson


If you are reading this then you probably have a telephone, and if you have
a telephone, then you have an excellent bugging device already installed in
your home or office.

In many cases nothing has to be done to the telephone (ie: Northern Telcom)
to turn it into a room bug, but in most cases a simple capacitor (costs a
nickle) can be installed and a wire snipped to turn your telephone into a
VERY high quality bug.

Telephones have microphone, speakers, ringers, and power... everything a
good bug needs to listen in on your business or home affairs.

What follows are a few of the Hundreds of things a spy can do to turn a
telephone into an excellent eavesdropping device.

RF Transmitter
This is a classic phone bug, a small RF transmitter is attached to your
phone line somewhere.

Power may be supplied by the current on the phone line or from a battery.

Most devices of this nature only transmit when the phone is lifted off of
the switch.

RF Transmitter-w/Microphone
This is similar to the above device, but it has its own microphone, and is
typically installed inside the telephone. Normally considered a room bug.

It may transmit the RF over the phone lines as well (carrier current - 9khz
to 32mhz typical).

Infinity Transmitter/Harmonica
An older devices, which was attached to a telephone, and when called from
an outside telephone would enable the caller to listen in on room audio...

Considered obsolete, but still sold in spy shops.

Recorder Starter/Drop Out Relay
This is little more than a device that detects when you lift your phone
handset off of the hook.

Its purpose is to activate a tape recorder hidden nearby.

This type of device is popular with private investigators and "wanna-be
spies".

Some recorder starter devices also detect sound, and only activate if sound
is detected on the line.

CO/REMOBS Monitoring (Remote Obseravance)
Allows the phone company or government to legally tap/monitor your phone.

* Message split, to be continued *
--- ifmail v.2.8.lwz
* Origin: Toronto Free-Net (1:340/13@fidonet)

ƒ ALT.2600.MODERATED (1:340/26) ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒ ALT.2600.MODERATED ƒ
Msg : 12 of 12
From : Graham Bullers 1:340/13 31 Oct 96 22:57:52
To : All 03 Nov 96 06:22:34
Subj : [part 2] HACKING
ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒ
.RFC-Path:
news.spydernet.com!news.pinc.com!news.bctel.net!noc.van.hookup.net!nic.win.hooku
p.net!vertex.tor.hookup.net!loki.tor.hookup.net!ve3ied!gts!torfree!ab756
From: ab756@torfree.net (Graham Bullers)
.RFC-X-Newsreader: TIN [version 1.2 PL2]
.RFC-Approved: ab756@freenet.toronto.on.ca

* Continuation 1 of a split message *


What happens is the computer that handles your calls is instructed to
transmit a real time digital copy of your call to anywhere in the world.

All that is required is access to the ESS translation, and access to a
T-Carrier or OC-xx data line (a normal "loop" line is rarely used).

With a 622mb fiber optic line most users can easily access (record) over
11,100 lines at a time in a local area.

This function of the phone system is very loosely controlled as the
maintenance people at the phone company use it for routine maintenance.

Any computer hacker/PHreaker can easily access the system.

Savvy Private Investigators and Insurance companies have been known to
illegally use this system to gather information on targets...


Hookswitch Bypass Methods
Inside your telephone is a switch that disconnects the microphone in your
telephone handset when the telephone is hung up (Hookswitch).

If the telephone is modified (cut one wire, install cap) then the
microphone will be hot all the time.

If the microphone is hot all the times then the "spy" can go anywhere
outside of the the building; plug a audio amplifier/monitor into the line;
and gets clean room audio now.

It is effectively the same as installing a microphone in the room or
building.

Several types of Hookswitch Bypass Methods follow:

* Resistance/Capacitance Bypass
* Capacitance Bypass
* Spare Pair Bypass
* Spare Pair to Microphone Bypass
* Spare Pair to Earpiece Bypass
* Third Wire Bypass
* Ground Return Bypass
* Reversed-Biased Diode Bypass
* Neon Bulb Bypass
* Four-Layer Device
* Ringer
* Handset Wiring Change


Comments

To be contacted for a confidential consultation
please E-mail: jmatk@tscm.com

or send a letter via US Mail to:
James M. Atkinson
Granite Island Group/TSCM.COM
127 Eastern Avenue #291
Gloucester, MA 01931-8008

or call:
(508) 546-3803 Telephone

URL: http://www.tscm.com/

Copyright c 1993, 1994, 1995, 1996 James M. Atkinson

* * * * * * * * * * * * * * * * * * * *


-= H A C K E R S =-

Issue #8, File #8 of 9

Is the NSA Watching?

From NorthStar Mailing List

Julian Assange's thoughts were:

>From best-of-security-request@suburbia.net Wed Jun 12 07:59:58 1996

Resent-Date: Wed, 12 Jun 1996 20:18:48 +1000
Date: Wed, 12 Jun 1996 20:18:43 +1000
From: Julian Assange <proff@suburbia.net>
Message-Id: <199606121018.UAA07143@suburbia.net>
To: best-of-security@suburbia.net, lacc@suburbia.net
Resent-Message-ID: <"PQG5a.0.nl1.6cfln"@suburbia>
Resent-From: best-of-security@suburbia.net
X-Mailing-List: <best-of-security@suburbia.net> archive/latest/107
X-Loop: best-of-security@suburbia.net
Precedence: list
Resent-Sender: best-of-security-request@suburbia.net
Subject: BoS: NSA is monitoring key internet routers - Puzzle Palace Author


The National Security Administration is Poised to Control the Internet

The oppressive atmosphere of Orwell's 1984 arises from the omnipresence of
Big Brother, the symbol of the government's concern for the individual. Big
Brother controls the language, outlawing words he dislikes and creating new
words for his favorite concepts. He can see and hear nearly everything -
public or private. Thus he enforces a rigid code of speech and action that
erodes the potential for resistance and reduces the need for force. As Noam
Chomsky says, propaganda is to democracy what violence is to
totalitarianism. Control thoughts, and you can easily control behavior.

U.S. history affords a prime example in the era named after Senator Joseph
McCarthy, though he had many supporters in his attack on freedom of thought
and speech. Perhaps his most powerful friend was J. Edgar Hoover, who fed
him material from FBI files (some of it true) which he used to attack
individuals for their supposed political leanings. By the time of
Watergate, the CIA had become at least as notorious as the FBI, due largely
to its assassinations of foreign leaders and support for military coups
around the world.

Now its the 90's. A computer revolution seems to be happening and with it a
dramatic increase in people using the Internet, as well as people watching
what the people use it for. Ever heard of the NSA? This could very well be
the NSA decade for the Internet. Conspiracy, power struggles and
survellience of the citizenry may be what is remembered about the NSA
during this period of time. I used to think democracy meant people keeping
a watchful eye on its government, not its government keeping a watchful eye
on its people. Today we can now see comparisons being drawn between the FBI
of the 50s and the CIA of the 60s, the obvious government corruption in the
70s, Reagan in the 80s (sorry - that was just incompetence), and the
emerging role of the NSA in the 90s.

Is NSA Sniffing the Internet? Do they have the jurisdiction? Lets take a
look back and see what they are all about and make an educated hypothesis.

Budgetary authority for the National Security Agency (NSA) apparently comes
from the Central Intelligence Act of 1949. This act provides the basis for
the secret spending program known as the black budget by allowing any arm
of the government to transfer money to the CIA "without regard to any
provisions of the law," and allowing the CIA to spend its funds as it sees
fit, with no need to account for them.

Congress passed the C.I.A. Act despite the fact that only the ranking
members of the Senate and House Armed Services Committees knew anything
about its contents; the remaining members of Congress were told that open
discussion, or even clear explanation, of the bill would be
counterproductive. There were complaints about the secrecy; but in the end
the bill passed the House by a vote of 348-4, and the Senate by a majority
voice vote. Hmmmm, it seems several legislative disasters have occurred by
landslides. Anyone remember the Telecommunication Attack of 1996?

The NSA's estimated $10 billion annual allocation (as of 1990) is funded
entirely through the black budget. Thus Congress appropriates funds for the
NSA not only without information on the agency's plans, but without even a
clear idea of the amount it appropriates; and it receives no accounting of
the uses to which the funds were put. This naturally precludes any debate
about the direction or management of such agencies, effectively avoiding
public oversight while spending public funds. Weiner notes the analogy to
"Taxation without representation." In any respect, it seems to be
unconstitutional - a major point that has failed to stop them.

"The NSA has also spent a great deal of time and money spying on American
citizens. For 21 years after its inception it tracked every telegram and
telex in and out of the United States, and monitored the telephone
conversations of the politically suspect." (Weiner, Blank Check)

Due to its unique ability to monitor communications within the U.S. without
a warrant, which the FBI and CIA cannot legally do, NSA becomes the center
of attempts to spy on U.S. citizens. Nominally this involves only
communications in which at least one terminal is outside the U.S., but in
practice target lists have often grown to include communications between
U.S. citizens within the country. And political considerations have
sometimes become important. Oh yeah, I forgot to mention that in the NSA's
Charter they claim to be unable to spy on US citizens. Apparently, the real
charter is as elusive as what they do with taxpayer money.

The Huston Plan, formally known as "Domestic Intelligence Gathering Plan:
Analysis and Strategy," was submitted in July 1970 to President Nixon. The
goal of the plan was to relax some restrictions on intelligence gathering,
apparently those of NSCID No. 6. Some parts of the intelligence community
felt that these relaxations would assist their efforts.

Like most intelligence agencies, the NSA uses words such as "interrupt" and
"target" in a technical sense with a precise but often classified
definition. This specialized language makes it difficult to legislate or
oversee the activities involved. For instance, in NSA terms a conversation
that is captured, decoded if necessary, and distributed to the requesting
agency is not considered to be the product of eavesdropping unless one of
the parties to the conversation is explicitly targeted. However, the NSA
does not depend on semantic defences; it can also produce some legal
arguments for exempting itself from normal requirements. How convenient.

For those who feel your lives are too flawless to be affected, or for those
of you who actually vote Republican or Democrat thinking the change will
come from within (nice try), and for the lowest common denominator -
dittoheads, this is not a good thing. Complete control over a secret agency
with at least 60,000 direct employees, a $10 billion budget, direct command
of some military units, and the ability to read all communications would be
an enormous weapon with which to maintain tyranny were it to arise. A
President with a Napoleonic or Stalinistic delusion would find the perfect
tool for the constant supervision of the individual by the state in the
NSA; not unlike scenarios depicted in novels such as Orwell's 1984.

====================================
1) NSA Homepage
http://www.nsa.gov:8080/

2) NSA Can Break PGP Encryption
http://www.quadralay.com/www/Crypt/NSA/break-pgp.html

3) Houston Chronicle Interview
http://www.quadralay.com/www/Crypt/NSA/letter.html

4) Original Charter of the National Security Agency
http://www.quadralay.com/www/Crypt/NSA/charter.html

5) CFP'92 - Who Holds the Keys?
http://www.cpsr.org/dox/conferences/cfp92/denning.html

====================================

Americans would not have any privacy left, such is the capability to
monitor everything: telephone conversations, telegrams, or in our case
email, it doesn't matter. There would be no place to hide. If this
government ever became a tyranny, if a dictator ever took charge in this
country, the technological capacity that the intelligence community has
given the government could enable it to impose total tyranny. There would
be no way to fight back because the most careful effort to combine together
in resistance to the government, no matter how privately it was done, is,
and would continue to be, within the reach of the government to know. Such
is the capability of this technology ...

I don't want to see this country ever go across the bridge. I know the
capability that is there to make tyranny total in America, and we must see
to it that this agency and all agencies that possess this technology
operate within the law and under proper supervision, so that we never cross
over that abyss. That is the abyss from which there is no return...

So, is the NSA 'sniffing' on the Internet? Does their reputation seem
worthy of our trust and respect? Lets take a look at some of their recent
plans for Internet communication. Then you can decide for yourself if you
want to watch the magic act....the "now you see it....now you don't" act
starring Freedom, of course.

Puzzle Palace co-author Wayne Madsen, in an article written for the June
1995 issue of Computer Fraud & Security Bulletin (Elsevier Advanced
Technology Publications), wrote that "according to well-placed sources
within the Federal Government and the Internet service provider industry,
the National Security Agency (NSA) is actively sniffing several key
Internet router and gateway hosts."

Madsen says the NSA concentrates its surveillance on destination and
origination hosts, as well as "sniffing" for specific key words and
phrases. He claims his sources have confirmed that the NSA has contracted
with an unnamed private company to develop the software needed to capture
Internet data of interest to the agency.

According to Madsen, the NSA monitors traffic primarily at two Internet
routers controlled by the National Aeronautics and Space Administration
(NASA), one in College Park, MD (dubbed "Fix East") and another at NASA
Ames Research Center in Sunnyvale, CA ("Fix West").

Other NSA Internet sniffers, he said, operate at busy routers known as Mae
East (an East Coast hub), Mae West (a West Coast hub), CIX reportedly based
in San Jose), and SWAB (a northern Virginia router operated by Bell
Atlantic).

Madsen continues on to say the NSA may also be monitoring traffic at
network access points (NAPs), the large Internet gateways operated by
regional and long-distance service providers. The NAPs allegedly under
surveillance are in Pennsauken, NJ (operated by Sprint), Chicago (run by
AmeriTech and Bell Communications Research), and San Francisco (Pacific
Bell).

Madsen claims the NSA has deals with Microsoft, Lotus, and Netscape to
prevent anonymous email. "One senior Federal Government source has reported
that NSA has been particularly successful in convincing key members of the
US software industry to cooperate with it in producing software that makes
Internet messages easier for NSA to intercept, and if they are encrypted,
to decode," Madsen wrote. "A knowledgeable government source claims that
the NSA has concluded agreements with Microsoft, Lotus and Netscape to
permit the introduction of the means to prevent the anonymity of Internet
electronic mail, the use of cryptographic key-escrow, as well as software
industry acceptance of the NSA-developed Digital Signature Standard (DSS)."

Similarly, according to reports in several trade magazines, the Defense
Messaging System (DMS) developed by the Pentagon is nearly ready for
implementation, but prospective users are threatening to shun the universal
e-mail platform unless Pentagon officials eliminate cumbersome security
procedures designed by the NSA.

DOD designed DMS a decade ago to replace the aging AUTODIN message system
and to serve as the armed services' global e-mail infrastructure. Officials
familiar with DMS' security features, which rely on the National Security
Agency's Fortezza encryption card, said the system's slowness is likely to
alienate users who send mostly unclassified messages over commercial e-mail
systems. Users of wireless systems are also complaining about the high
overhead.

The DMS adopted the Fortezza card and is expected to implement over 450,000
cards in the next few years. Inside sources note that the NSA is using the
DMS as a justification for paying companies such as Microsoft and Netscape
to adopt the Fortezza card as a standard for their products. NSA has pushed
agencies such as the CIA, NASA, IRS and the Federal Reserve to adopt
Fortezza without success.

Cost is also a major factor. Fortezza's PCMCIA cards cost nearly $100 each
and all computers must be equipped with a card reader that costs an
additional $150. (Would you like to have to buy a modem or pre-assembled
computer system that would make it easier for the NSA to monitor your
communications? Not me!)

Is the NSA really snooping on the Net? If they are, would that violate the
agency's charter, which specifically prohibits it from spying within the
US? "Well, Net traffic is routed from God knows where to God knows where
around the world," says George Washington University Professor Lance
Hoffman, a professor of Communications and Telecommunications Systems
Policy at George Washington University. "So if the NSA is doing this, they
could say they are not violating their charter not to spy in the US. That's
the thing. Intelligent routers send stuff any which way."

What can be done? - you say. There is a solution. Encryption. Next issue
will discuss trap doors and your right to encryption as strong as you can
make it.

====================================
6) The Agency That Came in from the Cold
http://www.ams.org/committee/profession/shaker.html

7) The Codex Surveillance & Privacy Page
http://www.thecodex.com/

8) Profiles of the U.S. Intelligence Community
http://www.kimsoft.com/korea/usintel.txt

9) Intelligence and CounterIntelligence
http://www.kimsoft.com/kim-spy.htm

10) The National Security Administration
http://hops.cs.jhu.edu/~arvi/nsa.html

*** proteios@indirect.com PLEASE send us any other relevant URLs you may
find ***
====================================

----------------------------------------------------------------------------
NorthStar is an Internet Distribution List provided by the Internet Users
Consortium
a fiercely independent Grass Roots organization founded by Martin Thompson
and Kenneth Koldys, Jr, to inform and coordinate Internet Users concerning
political and government actions against the complete self-actualization
of the Internet and our Constitutional Rights in Cyberspace.
----------------------------------------------------------------------------
Past issues of NorthStar are archived at the NorthStar Archive
http://www.iuc.org/www/proteios/northstar.html
on the Internet Users Consortium WWW site
----------------------------------------------------------------------------
***Please feel free to distribute NorthStar to as many people and relevant
forums as possible. That is one way to inform, educate and take action.
All we ask is that you keep NorthStar intact. It is concise for that very
reason.
***If you wish to submit an article to NorthStar, please send your
article to proteios@iuc.org


--
[ route@infonexus.com ] Guild member, Information enthusiast, Hacker, demon
...this universe is MINE... I am *GOD* here...

* * * * * * * * * * * * * * * * * * * *


-= H A C K E R S =-

Issue #8, File #9 of 9

The End

Hackers Magazine Next issue will be out on time.
* * * * * * Until then, remember to link the Hackers
317 MLKing BLVD home page. Keep those letters coming,
Newark, NJ 07103 and keep your eyes on this space. A lot
(201) 623-2510 of good things to come.
mrs3691@megahertz.njit.edu
http://people.delphi.com/scanlonr

And where ever you hack, may the ethic be with you!
0  Comments

OKThis website uses cookies to store your preferences and improve the service. By pressing OK you accept the Terms of Service and Privacy Policy