+----------------------------------------------------------------------------+ ! Beginners Guide to VAX/VMS Hacking ! ! ! ! File By ENTITY / Corrupt Computing Canada (c) 1989 ! ! ! ! ! ! CORRUPT COMPUTING CANADA! ! ! ! ! CALL: (416)/398-3301 Login: Guest, PW: Guest ! ! (416)/756-4545 type !! Login: lynx ! ! ! +----------------------------------------------------------------------------+ ! ! ! You may freely distribute this file as long as no modifications of any ! ! form are made to the file. All rights reserved by...What rights?! ! ! ! ! ! +----------------------------------------------------------------------------+ September 12,1989 INTRODUCTION ------------ Perhaps the most exciting Operating system to HACK on is VAX/VMS. It offers many challenges for hackers and boasts one of the best security systems ever developed. In comparison to the security on UNIX, VMS is far superior in every respect. It can be very difficult to get inside such a system and even harder to STAY inside, but isn't that what this is all about?! I have written this file as a way for beginning hackers to learn about the VMS operating system. There is such a vast amount of information that can be related about VAX/VMS hacking that it is not possible for me to cover everything in just one file. As such i will try and stick to the basics for this file and hopefully write another file in the future that deals with heavy-duty kernal programming, the various data structures, and system service calls. All right so lets get at it! GETTING IN ---------- First of all how do you recognize a VAX when you see one?! Well the thing that always gives a VAX away, is when you logon you will see: Username: It may also have some other info before it asks you for the username, usually identifying the company and perhaps a message to the effect of: Unauthorized Users will be prosecuted to the fullest extent of the law! That should get you right in the mood for some serious hacking! Ok so when you have determined that the system you have logged into is indeed a VAX, you will have to at this point enter your SYSTEM LOGIN. Basically on VAX's there are several default logins which will get you into the system. However on MOST systems these default logins are changed by the system manager. In any case, before you try any other logins, you should try these (since some system managers are lazy and don't bother changing them): Username Password Alternate ------------------------------------------------------------------------------- SYSTEM MANAGER OPERATOR FIELD SERVICE TEST DEFAULT DEFAULT USER SYSTEST UETP SYSTEST DECNET DECNET NONPRIV That's it. Those are the default system users/passwords. The only ones on the list that are GUARANTEED to be in the userlist are SYSTEM and DEFAULT. However, I have never come across a system where these two haven't been changed from their default passwords to something else. In the above list, the alternate password is simply a password many operators set the password to from the deafult. So if the first password doesn't work, try the alternate password. It should be noted when the a user is added into the system, the default password for the new user the SAME as his username. You should keep this point in mind because it is VERY important. Most of the accounts you hack out, will be found in this way! Ok if above ones don't work, then you should try these accounts. These following accounts are NOT defaults, but through experience i have found that many systems use these accounts or some variation thereof: Username Password --------------------------- VAX VAX VMS VMS DCL DCL DEC DEC * DEMO DEMO * TEST TEST * NETNONPRIV NONPRIV * NETPRIV PRIV ORACLE ORACLE * ALLIN1 ALLIN1 * INGRES INGRES * GUEST GUEST * GAMES GAMES BACKUP BACKUP * HOST HOST USER USER * DIGITAL DIGITAL REMOTE REMOTE * SAS SAS FAULT FAULT USERP USERP VISITOR VISITOR GEAC GEAC VLSI VLSI INFO INFO * POSTMASTER MAIL NET NET LIBRARY LIBRARY OPERATOR OPERATOR * OPER OPER The ones that have asterisks (*) beside them are the more popular ones and you have a better chance with them, so you should try them first. It should be noted that the VAX will not give you any indication of whether the username you typed in is indeed valid or not. Even if you type in a username that does not exist on the system, it will still ask you for a password. Keep this in mind because if you are not sure if whether an account exists or not, don't waste your time in trying to hack out its password. You could be going on a wild goose chase! You should also keep in mind that ALL bad login attempts are kept track of and when the person logs in, he is informed of how many failed attempts there were on his account. If he sees 400 login failures, I am sure that he will know someone is trying to hack his account. THE BASICS ---------- Ok i am assuming you tried all the above defaults and managed to get yourself into the system. Now the real FUN begins! Ok first things first. After you log in you will get some message about the last time you logged in etc. If this is the first time you have logged into this system then you should note the last login date and time and WRITE IT DOWN! This is important for several reasons. The main one being that you want to find out if the account you have just hacked is an ACTIVE or INACTIVE account. The best accounts are the inactive ones. Why?! Well the inactive accounts are those that people are not using currently, meaning that there is a better chance of you holding onto that account and not being discovered by the system operator. If the account has not been logged into for the last month or so, theres a good chance that it is inactive. Ok anyhow once your in, if you have a normal account with access to DCL you will get a prompt that looks like: $ This may vary from machine to machine but its usually the same. If you have a weird prompt and would like a normal one, type: $set prompt=$ If this is the first time you have hacked into this system there are a couple of steps you should take immediately. First type: $set control=(y,t) This will enable your break keys (like ctrl-c) so that you can stop a file or command if you make a mistake. Usually ctrl-c is active, but this command will insure that it is. (Note: in general to abort a command, or program you can type ctrl-c or ctrl-y) Ok anyhow, the next step is to open the buffer in your terminal then type: $type sys$system:rightslist.dat This will dump a file that has all the systems users listed in it. You may notice a lot of weird garbage characters. Don't worry about those, that is normal. Ok after this file ends and you get the shell prompt again ($) then save the buffer, clear it out and leave it open. Then type: $show logical Ok after this file is buffered save it also. Ok at this point you have two files on your disk which will help you hack out MORE accounts on the system. For now, lets find out how powerful the account you currently hacked into is. You should type: $set proc/priv=all This may give you a message telling you that all your privileges were not granted. That's ok. Now type: $show proc/priv This will give you a list of all the privileges your account is set up for. Usually most user accounts only have NETMBX and TMPMBX privs. If you have more than these two, then it could mean that you have a nice high-level user. Unlike UNIX which only has a distinction between user and superuser, VMS has a whole shitload of different privileges you can gain. The basic privs are as follows: PRIVILEGE DESCRIPTION ------------------------------------------------------------------------------ NONE no privilege at all NORMAL PRIVS ------------ MOUNT Execute mount volume QIO NETMBX Create network connections (you need this to call out!) TMPMBX Create temporary mailbox GROUP PRIVS ----------- GROUP Control processes in the same group GRPPRV Group access through SYSTEM protection field DEVOUR PRIVS ------------ ACNT Disable accounting ALLSPOOL Allocate spooled devices BUGCHK Make bugcheck error log entries EXQUOTA Exceed disk quotas GRPNAM Insert group logical names n the name table PRMCEB Create/delete permanent common event flag clusters PRMGBL Create permanent global sections PRMMBX Create permanent mailboxes SHMEM Create/delete structures in shared memory SYSTEM PRIVS ------------ ALTPRI Set base priority higher that allotment OPER Perform operator functions PSWAPM Change process swap mode WORLD Control any process SECURITY Perform security related functions SHARE Access devices allocated to other users SYSLCK Lock system-wide resources FILES PRIVS ----------- DIAGNOSE Diagnose devices SYSGBL Create system wide global sections VOLPRO Override volume protection ALL PRIVS --------- BYPASS Disregard protection CMEXEC Change to executive mode CMKRNL Change to kernal mode DETACH Create detached processes of arbitrary UIC LOG_IO Issue logical I/O requests PFNMAP Map to specific physical pages PHY_IO Issue physical I/O requests READALL Possess read access to everything SETPRV *** ENABLE ALL PRIVILEGES!!! *** SYSNAM Insert system logical names in the name table SYSPRV Access objects through SYSTEM protection field Ok that's the lot of them! I will explain some of the more important privileges later in the file. For now, at least you can see just how powerful the account is. It should be noted that most accounts usually are only granted the TMPMBX and NETMBX privileges, so if you don't have the others, don't fret too much. GENERAL TERMINOLOGY ------------------- I think that i should clarify some of the basic concepts involved with VAX/VMS operating systems before we go any further: PROCESS: this is what is created when you log in. The system sets aside CPU time and memory for you and calls it a process. Any task that is run in VMS is called a process. SUBPROCESS: also known as child-process, this is just a process that was created by another process. DCL : Digital Command Language. This is the shell ($) that you are put into when you log into a VAX MCR : an alternate shell that is used (rarely) on certain accounts. Login prompt is a > as opposed to DCL which gives a $ SHELL : this is the '$' that you see once you are logged in. This is your interface with the system, where you can enter the various commands execute files and perform other activities. JOB : a process and a group of its subprocesses performing some task SPAWN : this is the actual command that allows you to create subprocesses 'SPAWNING' is the act of creating subprocesses PID : process identification number. This is an 8 byte ID code that is uniquely given to each process that is created on the system. IMAGE : this is an EXE file that you can execute (ie run) UIC : User identification code. This is in two parts, namely: [group,member] The way this works is that users in the same group can access each others files through the group protection code. However since the UIC MUST uniquely identify each user, the member portion separates the individuals in each group. If an account does not have a different member number, he will NOT be put in the RIGHTSLIST database. CONTROL KEYS ------------ A brief note on control sequences. Several different actions can be activated via control sequences. They are: CTRL-H :delete last character CTRL-B :redisplay last command (can go back up to the last 20 commands issued) CTRL-S :pause display CTRL-Q :continue after pause CTRL-Z :*EXIT* use to break out of things such as CREATE and EDIT CTRL-C :*CANCEL* will exit out of most operations CTRL-Y :*INTERRUPT* will break out of whatever you are doing CTRL-T :print out statistical info about the process NOTE: sometimes upon login, the CTRL-Y, CTRL-C keys are disabled. To ensure these are enabled, issue this command upon login: $ SET CONTROL ------------------------------------------------------------------------------- NOTE: all the commands that are executed from DCL can be referenced from an online help manual. To access this, simply type help at any '$' prompt This help is also available within the various utilities and programs such as authorize and mail. The two MOST important commands are SET and SHOW. These should be buffered and printed out for your own reference. ------------------------------------------------------------------------------- FILES and DIRECTORIES --------------------- The directory structure of VMS is a heirarchical one similar to MS-DOS and UNIX. Its a simple concept, and i will only briefly skim over it. First of all it should be noted that there may be more than one hard drive or other mass-storage device hooked up to your system. Within each hard drive there is the ROOT directory. This is the highest directory in the tree and is referenced by [000000]. (this will be explained in a minute) Within the root there are several subdirectories. Within these subdirectories there may be files and even further subdirectories. The concept is quite simple, but can be difficult to explain. Here is a diagram to give you a rough idea of how it is set up: [000000] <--root directory ! ! +--------------------------+---------------------------------+ ! ! ! ! ! ! [d1] [d2] [d3] ! ! ! +-----+--------+ +-----+-----+ +--------+ ! ! ! ! ! ! ! ! ! ! ! ! [d3.d3a] [d3.d3b] [d1.da] [d1.db] [d1.dc] [d2.d2a] [d2.d2b] ! ! ! ! ! +--+-----------+ [d1.db.db1] [d2.d2a.d2a1] ! ! [d2.d2b.d2b1] [d2.d2b.d2b2] Hopefully this will give you some sort of an idea of how the directories can be structured. Within each subdirectory there may be other files also. For example to see the directory after you log in you would type: $dir a sample result may be: Directory DISK$SCHOOL:[REPORTS.JOHN] average.com;3 generate.exe;1 mail.mai;10 marks.dat;4 marks.dat;5 reportcard.dir projects.dir Total 7 files. What does this tell you? The first line tells you what drive and subdirectory you are in. The next lines are the actual files. As you can see each file has a 3 character extension, followed by a comma and a number. The name before the period is the actual filename (eg. average) the 3 characters after the period is known as the extension (eg.com) and the number after the comma refers to the version of the file. So in this case, this is version number 3. Any time you modify or save a file, it automatically assigns it a version number of 1. If file already exists on your disk, it increments the version number by 1 and then saves it as such. So the next time i go ahead and save the file average.com, it would add another file to the list called average.com;4 Special note should be taken of the files that have an extension of '.DIR' These are not really files, but rather subdirectories. I will show you how to switch subdirectories in just a minute. First you should take note of the different file extensions. Although you can name the files anything you want some of the more important extensions are: TYPE DESCRIPTION ------------------------------------------------------------------------------- EXE Executable IMAGE. These files are programs that can be RUN COM DCL SCRIPT files. These can also be executed, utilizing the @ command DAT DATA file. Sometimes useful things to look at. LIS Listing File, many times important info is in here MAI Mail file, use the MAIL command to read these DIR DIRECTORY - not a file JOU Journal File, often created thru the use of other programs eg EDIT TXT Text Files, often hold useful information. These are just some of the extensions you are most likely to see. The two important ones are the EXE and COM files. These can be executed from the DCL level. EXE files are executed via the RUN command. Eg. to run authorize.exe: $run authorize This will run the authorize IMAGE. Supposing there were more than one version of authorize you could specify a version number. eg. $run authorize.exe;4 The other type of file you can run is the COM files. These are like SCRIPT files in UNIX or .BAT files from MS-DOS. They are just a sequence of DCL commands strung together that are executed when you initiate the file. To run COM files, use the @ command. For example to run adduser.com, type: $@adduser The version number thing i stated for EXE files also applies for COM files. ***NOTE*** To get a listing of all the files on the whole drive, try this: $sd [000000] $dir [...]*.* Similarly you type dir [...]*.com, if you wanted just the COM files listed. To see the contents of a file, you can use the TYPE command. For example: $type login.com this might type out something like: $ sd:==set default $ set control=(y,t) $ set proc/name=entity $ set term/dev=vt100 : : : etc This is great for COM files, DAT files and some of the other types, but you will always get garbage when you type EXE files so don't bother trying those. This is very useful for snooping around other peoples files and getting information. Many times i have found user/passwords lying around in TXT or LIS files left by some careless user. Now, how do you go about changing directories? Well, first you should set up a shortcut. The normal command to change directories is SET DEFAULT. For example to change to a subdirectory called REPORTS, you would have to type: $set default [.reports] To make life simpler on yourself, as soon as you log in, you should type: $sd:==set default This defines a macro called SD that is interpreted by DCL as SET DEFAULT. You can similarly define other 'favorite' commands to some short, easy to remember definition. Anyhow heres the syntax for changing directories: SD DEVICE:[dir1.dir2.dir3....] The device can be optionally left out, if you plan to remain in the same hard drive. You have to then enter a '[' followed by the root directory, followed by a period, followed by another subdirectory name etc. Eg. $sd dub0:[cosy.users] Suppose at this point, you were in directory cosy, subdirectory users and there was a further subdirectory called 'info.dir'. Rather than specify the full pathname, you can simply type: $sd [.info] This will advance you one level into the info subdirectory. Remember to put the period in front of the subdirectory. If you don't, in this case it would assume that you were trying to reference the root directory called info. Another important thing to note is moving back levels in terms of subdirectories. For example if you were in [cosy.users.info] and wanted to move back to [cosy.users] you could type: $sd [-] Similarly you can put in as many hyphens (-) as you want to move back. For example sd [--] would put you back to the cosy directory. Another important thing to note about subdirectories are logical assigned symbols. These are names assigned to certain things. For example the main system directory is called sys$system. So to go to it you could type: $sd sys$system This would throw you into the system directory. Similarly you can type: $sd sys$login and this will put you back into the directory that you were initially in, when you first logged in. These symbols stand for actual device:directory combinations. To see the various definitions that are assigned to each process you should type: $show logical This will list a whole bunch of global system equates that you can use to access various parts of the VAX structure. In addition to view all of your locally defined symbols, use: $show symbol * FILE PROTECTION --------------- Ok before i begin this, let me just state that whatever i say about files also applies to directories. There are four types of file protections. There is SYSTEM,WORLD,GROUP and OWNER. These are briefly: SYSTEM- All users who have group numbers 0-8 and users with physical or logical I/O privileges (generally system managers, system programmers, and operators) OWNER - the owner of the file (or subdirectory), isolated via their User Identification Code (UIC). This means the person who created the file! GROUP - All users who have the same group number in their UICs as the owner of the file. WORLD - All users who do not fall in the categories above Each file has four types of protection within each of the above categories. They are: Read, Write, Execute, Delete. Explanations are: READ - You can read the file and copy it. WRITE - You can modify and rename that file. EXECUTE- You can run the file DELETE - You can delete the file When you create a file the default is that you have all the privileges for that particular file. Group, world and system may only have limited privileges. This can be changed with the set protection DCL command. For example: $set protection=(group:rwed,world:r)/default would set your default protection to allow other users in your group to have full read,write,execute,delete privs to the file, and others only read access to the file. The /default means that from now on all the files you create will be set with this particular protection. To change one of your own files to some other protection you can alternatively use: $set prot topsecret.dat /prot=(system:rwed,group:rwed,world:rwed,owner:rwed) This would enable all users on the system to access the file 'topsecret.dat' When specifying the protection, you do not have to list them for each of the four groups. You can simply choose only those thatPath: works!merk!alliant!linus!agate!ames!pacbell.com!tandem!UB.com!grafex!steveh From: steveh@grafex.Cupertino.CA.US (Steve Harding KA6ETB) Newsgroups: comp.bbs.waffle Subject: Re: Forced un-join? Message-ID: Date: Tue, 29 Sep 92 22:50:22 PDT References: <4i5VRB1w165w@dogear.spk.wa.us> Distribution: usa Organization: The GRAFex Company Lines: 15 bobk@dogear.spk.wa.us (Bob Kirkpatrick) writes: > Use Chris Winemiller's expire (CWEXP104.ZIP). It has a 'keeper' option > that will always retain at least one message in any group. I've been > using it since he first issued v1.0 and it just gets better with each > new rev level. He has a rev 1.05 in the wings, but I don't know if he > turned it loose yet. As a beta site for 1.05...it works...it's super. steve -- play:steveh@grafex.Cupertino.CA.US 408.252.0578 work:harding@nas.nasa.gov A prince trapped in the body of a dirty old man. emiller's expire (CWEXP104.ZIP). It has a 'keep D'@ Z0IFADII@RBP N0? ~[/[r}鐢ntp$ r|" .x|yH}7(N+P`( -` Pغ5ֈk"@8.=~sPg)[8@0J,~Hr!0J +!sq R>[.""`˜'PYkgr @j""఑, %-.0K|ˬ9̱i(X/Liь)l@MIpGȇbֈgbbZʇuJg !`ZÍvuzPȧC(Ebpًc0ʆ x|臀(뗲i]gj'/XxPȧC(EbpRC7 8:IM@ JkZ3ZЊ2\!, f˄-Xd0BI:O<P؉87 E@C(E(A 6 #a]z9.@".`,LሑDl?P%-E{׶ 9맏\(gh鱾(?i9 PL(X*N@˷g.gx0u<!ϵ P?X %Njg~~}(P2{bٱ%ݓgnx@ P P PҐ 鎛% )KX 8Ppf "@" O &kw i["z c0{ uzPȧC(Ebpm ^ADATA ԦC0DIRS XB$%VALIDATE ~C&&DOOM BBS ̀+ENTRY y[EXCUSE f0CFAILED &wFEEDBACK +)th SMTP (5.61/UUNET-internet-primary) id AA03070; Sat, 19 Sep 92 11:38:51 -0400 Received: by nyx.cs.du.edu (4.1/SMI-4.1) id AA06069; Fri, 18 Sep 92 15:06:39 MDT From: ahawks@nyx.cs.du.edu (tao master of existential angst) Message-Id: <9209182106.AA06069@nyx.cs.du.edu> X-Disclaimer: Nyx is a public access Unix system run by the University of Denver. The University has neither control over nor responsibility for the opinions or correct identity of users. Subject: Re: The real deal on Blade Runner To: future@nyx.cs.du.edu Date: Fri, 18 Sep 92 15:06:35 MDT In-Reply-To: <9209180311.AA21724@csd4.csd.uwm.edu>; from "Strider" at Sep 17, 92 10:11 pm X-Mailer: ELM [version 2.3 PL11] Strider | |I think we might all consider ending this thread and taking the time to read |the P.K. Dick book _Do_Androids_Dream_of_Electric_Sheep?_. From what I've |been told it is heads and tails better than the movie, not to mention |completely different. Well, any time someone suggests people "read the book" I get a little mad. Rarely does it occur that the author of the movie is the author of the book, thus the two can not be compared. I'm sure Ridley Scott can not read to the fullest Phillip K Dick's mind, nor should we want him to make a movie based completely on the book or Dick's vision. I just think movies and books are completely seperate works of art that can't really be compared. To me it might be comprable to seeing a Monet painting and then reading a book about the place that is the subject of the painting in real life. Just enjoy the painting for what it is, and if you want to read the book, that's certainly ok too, but don't compare 'em - that's my view. |Steve J. White |"Either there's something wrong with me, | |aragorn@csd4.csd.uwm.edu | or there's something wrong with the universe."| |skeptic@large@9600bps | - Dr. Crusher on ST:TNG | -- ahawks@nyx.cs.du.edu FutureCulture E-List: [future-request@nyx.cs.du.edu] andy (hawkeye) new edge, technoculture, cyberpunk, virtual reality, raves, etc. Home of the famous :) FutureCulture FAQ! From merk!nyx.cs.du.edu!ahawks Sat Sep 19 23:27:35 1992 remote from works Received: by works.uucp (1.65/waf) via UUCP; Sat, 19 Sep 92 23:26:39 EDT for phantasm Received: by merk.merk.com (/\==/\ Smail3.1.25.1 #25.17) id ; Sat, 19 Sep 92 23:27 EDT Received: from nyx.cs.du.edu by relay1.UU.NET with SMTP (5.61/UUNET-internet-primary) id AA03068; Sat, 19 Sep 92 23:25:31 -0400 Received: by nyx.cs.du.edu (4.1/SMI-4.1) id AA07828; Sat, 19 Sep 92 19:53:43 MDT From: ahawks@nyx.cs.du.edu (morrissey's therapist) Message-Id: <9209200153.AA07828@nyx.cs.du.edu> X-Disclaimer: Nyx is a public access Unix system run by the University of Denver. The University has neither control over nor responsibility for the opinions or correct identity of users. Subject: Mindless Babble for the Terminally Bored To: future@nyx.cs.du.edu Date: Sat, 19 Sep 92 19:53:41 MDT X-Mailer: ELM [version 2.3 PL11] If you have nothing else better to do this weekend than watch CNN, look for their "FutreWatch" segment...Featured some pretty interesting stuff including: --a snippet about the new Blade Runner (PS- look for a scene that shows Rachael on the streets of LA - I don't think this was in either release of the movie....) --a little thing about Sneakers, talking about (if I remember right) the plausibility of breaking the code (DES, I assume), and ummm, the possibility of getting government information via computer or something like that... --and a very interesting and disturbing little piece about a company that seeks to put a sort of universal price rate on all information...I only caught the last portion of this, but it seemed very disturbing to me...The impression I got from the representative of the corporation was that someday he hoped to see a sort of "cost this session" applied to *any* information retrieval via computer... I hope I see this again so I can confirm this and get more accurate info...Very scary thought that information will not be a free or almost-free or as-close-to-free-as-you-can-get in the coming information age....People are already starting to jack up the price of everything that you could possibly want to knw.... -- ahawks@nyx.cs.du.edu FutureCulture E-List: [future-request@nyx.cs.du.edu] andy (hawkeye) new edge, technoculture, cyberpunk, virtual reality, raves, etc. Home of the famous :) FutureCulture FAQ! From merk!nyx.cs.du.edu!ahawks Sun Sep 20 14:29:11 1992 remote from works Received: by works.uucp (1.65/waf) via UUCP; Sun, 20 Sep 92 14:53:30 EDT for phantasm Received: by merk.merk.com (/\==/\ Smail3.1.25.1 #25.17) id ; Sun, 20 Sep 92 14:28 EDT Received: from nyx.cs.du.edu by relay1.UU.NET with SMTP (5.61/UUNET-internet-primary) id AA12908; Sun, 20 Sep 92 14:26:34 -0400 Received: by nyx.cs.du.edu (4.1/SMI-4.1) id AA04001; Sun, 20 Sep 92 11:18:05 MDT From: ahawks@nyx.cs.du.edu (morrissey's therapist) Message-Id: <9209201718.AA04001@nyx.cs.du.edu> X-Disclaimer: Nyx is a public access Unix system run by the University of Denver. The University has neither control over nor responsibility for the opinions or correct identity of users. Subject: interesting p h i l e (fwd) To: future@nyx.cs.du.edu Date: Sun, 20 Sep 92 11:18:01 MDT X-Mailer: ELM [version 2.3 PL11] Morpheus writes: Thought you might want to check this out, maybe send it out to the list if you think it's decent... --------------------------- begin digital.txt ------------------------------- Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X X/\/ \/\X X\/X - Digital Underground - X\/X X/\X Story by Mark Bennett. Published in i-D Technology Issue X/\X X\/X X\/X X/\X Transcribed by Phantasm. 12th September 1992 X/\X X\/X X\/X X/\X Unauthorised Access UK. Online 10.00pm-7.00am. +44-636-708063 X/\X X\/\ /\/X X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X They've got a file on you. It's on computer. And that computer is connected to a global network. Who's going to stand up for our civil liberties in the digital era? Can the anarchic activities of hackers and cyberpunks make them freedom fighters for the information age? CYBERPUNK TECHNOLOGY Cyberspace, the Net, Non-Space, or the Electronic Frontier call it what you will, but it's out there now, spread across the world like an opulent immaterial spider's web, growing as each new computer, telephone or fax machine is plugged in, as satellites close continental divides, hooking independent phone systems together. It's almost a living entity - the backbone is the various telephone exchanges, the limbs the copper and fibre- optic links. Increasingly the world is shifting to this unseen plane. Your earnings, your purchasing patterns and your poll tax records are processed there. You may not realise it exists, but it's part of everyday life. As John Barlow, writer and electronic activist puts it, "Cyberspace is the place you are when you're on the telephone." As life moves to this electronic frontier, politicians and corporations are starting to exert increasing control over the new digital realm, policing information highways with growing strictness. Before we even realise we're there, we may find ourselves boxed into a digital ghetto, denied simple rights of access, whiSubject: Two birds with one can of sauce. From: ferret (Dave Ferret) Level SYSOP: Work you Damn insidious machine! Message-ID: Date: Sun, 12 Jan 92 17:19:18 EST First in response to a /reports section - For a long time, there was a section for school reports, and I just haven't had a chance to put it back up here, we have a mere dozen or so reports, all lacking the pertinant information you wanted, but hey, you have to figure if YOU think its good, then thats all that counts. I'll create a /tfiles/reports right now for you to start out and I'll dump the other reports in there when I get some time. As for Illegal/illicit material on the works,and what can we get caught for? Why don't I quote something for you (From The Department of Criminal Justice on Publications - Which I believe extends to text publications) This is taken from a Publication Denial Notice (2600Mag, Winter 90-91) (a) Publication contains contraband. (b) Publication contains information regarding the manufacture of explosives, weapons or drugs. (c) Publication contains material that a reasonable person would construe as written solely for the purpose of communicating information designed to achieve a breakdown of prisons through inmate disruption such as strikes or riots. (d) A specific factual determination has been made that the publication is detrimental to prisoners rehabilitation because it would encourage deviate criminal sexual behavior. ...and finally... (e) Publication contains material on the setting up and operation or criminal schemes or how to avoid detection of criminal schemes by lawful authorities charged with the responsibility for detecting such illegal activity. --- End Document quotes --- _ _ Now considering our archives, we could very possibly be cited for =_EVERY_= item on there, except that we _allegedly_ are allowed to have these items and have our rights to have them protected by the First Amendment to garuantee FREE SPEECH. But thats something for you to chew on for a while. nge public keys, and maybe even get them signed. Is anyone else interested in meeting sometime during the conference for this purpose? This would at least be slightly more secure than trusting a posted public key. Of course, whether you believe that it really is me is a different story. I'm presenting a paper that I wrote with a co-author that I've never met. So I can't know that even he is who he claims - or that I am who I claim :-) Please Email or reply via post. Even if we simply meet to talk about PGP over a beer, it could be worthwhile. Pat Pat Farrell, Grad Student pfarrell@cs.gmu.edu Department of Computer Science, George Mason University, Fairfax, VA PGP Public key available via finger #include standard.disclaimer #! rnews 808 Newsgroups: comp.bbs.waffle Path: merk!alliant!linus!agate!spool.mu.edu!wupost!zaphod.mps.ohio-state.edu!pacific.mps.ohio-state.edu!linac!att!att!fang!gator!towers!bluemoon!grant From: grant@bluemoon.rn.com (Grant DeLorean) Subject: Re: Multiple modems? Message-ID: <1992Oct3.143120.16476@bluemoon.rn.com> Organization: Blue Moon References: <2ACCB10E.3587@news.service.uci.edu> Date: Sat, 3 Oct 92 14:31:20 GMT Lines: 12 rmyers@dec5200.acs.uci.edu (Richard Myers) writes: >I want to hang 2000 modems off one waffle box (DOS). Well folks, Mr. Dell will be retiring on the check for this one so he should have plenty of time for Waffle enhancements... ;-} -- \ Grant DeLorean - IHMSA & NRA Life Member - (grant@bluemoon.use.com) / Talk sense to a fool and he calls you foolish. -- Euripides #! rnews 1825 Newsgroups: alt.drugs Path: merk!alliant!linus!agate!spool.mu.edu!sdd.hp.com!elroy.jpl.nasa.gov!news.claremont.edu!jarthur.claremont.edu!jrhine From: jrhine@jarthur.claremont.edu (Jared Rhine) Subject: Nitrous : mechanism Message-ID: <1992Oct3.215904.8289@muddcs.claremont.edu> Sender: news@muddcs.claremont.edu (The News System) Organization: Harvey Mudd College, Claremont, CA 91711 Date: Sat, 3 Oct 1992 21:59:04 GMT Lines: 26 Come on, don't tell me there isn't a single scuba diver out there who reads this group? The mechanism of nitrous oxide is same as for nitrogen narcosis, commonly called rapture of the deep. When a diver goes below about 80 ft, they are in "danger" of getting this effect (actually I know people who go diving JUST for that effect). The nitrous buzz is a function of the amount of nitrogen disolved in your fatty tissues. You ongas at an approximately exponetial rate and offgas at an approximately linear rate. The nitrogen in your fatty tissues interferes with neuron transmission. It is indeed inert to the body, just hangs around and blocks. It is NOT a function on oxygen deprevation; divers are still breathing the same amount of oxygen at those depths. When a diver comes up, the nitrogen offgases safely as it is under a lower pressure (divers breath gases at ambient pressure which at 100 ft is something like 4 atms; when you come up, you are under lower pressure so the nitrogen comes out). So now you can go find another source, go look up nitrogen narcosis in a scuba book. -- Jared -- _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ / \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \/ \ ---------> < Jared Rhine | Student, Philosopher, Zymurgy Specialist > \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ #! rnews 568 Newsgroups: alt.bbs.internet Path: merk!alliant!linus!agate!spool.mu.edu!wupost!news.miami.edu!cybernet!news From: garth@cybernet.cse.fau.edu (donna schweikert) Subject: internet Message-ID: Sender: news@cybernet.cse.fau.edu Organization: Cybernet BBS, Boca Raton, Florida Date: Sat, 3 Oct 1992 21:26:27 GMT Lines: 6 i would like to know if there is anyway of telneting out of the state of michigan without having to go thru merit. i have accounts in other states, is there a way the internet allows for this. thanx garth (donna) #! rnews 1087 Newsgroups: alt.locksmithing Path: merk!alliant!linus!agate!spool.mu.edu!sdd.hp.com!think.com!rpi!newsserver.pixel.kodak.com!psinntp!psinntp!cubetech.com!imladris!andrew From: andrew@cubetech.com (Andrew Loewenstern) Subject: Re: auto club locks Message-ID: <1992Oct2.205731.25213@cubetech.com> Organization: Cube Technologies, Inc. References: <1992Sep24.150843.9850@engage.pko.dec.com> <80833@ut-emx.uucp> Distribution: usa Date: Fri, 2 Oct 1992 20:57:31 GMT Lines: 14 In article <80833@ut-emx.uucp> jerry@ccwf.cc.utexas.edu (Jeremy Porter) writes: >Now maybe the car is less likely to be stolen if it has a club on it, but >I doubt it makes much difference to a "professional" car thief. Nothing will stop someone if they want it badly enough. The trick then is to drive a piece of shit car like I do. ;-) andrew -- andrew@cubetech.com | "We shall not cease from exploration Andrew Loewenstern | And the end of our exploring Cube Technologies, Inc. | Will be to arrive where we started | And know the place for the first time." -T.S. Eliot #! rnews 1279 Path: merk!alliant!linus!agate!spool.mu.edu!uwm.edu!linac!att!cbnewsi!cbnewsh!att-out!rutgers!psuvax1!postscript.cs.psu.edu!fenner From: fenner@postscript.cs.psu.edu (Bill Fenner) Newsgroups: comp.bbs.waffle Subject: Re: UDFB 1.0 Message-ID: Date: 3 Oct 92 22:06:15 GMT References: <26wZRB1w165w@eastwind.mcds.com> Sender: news@cs.psu.edu (Usenet) Organization: Penn State Computer Science Lines: 21 Nntp-Posting-Host: postscript.cs.psu.edu In article system@micromed.com (Duane Davis) writes: |You could have saved yourself some time. I wrote and released a program |that does exactly the same thing over a month ago. And then, of course, there's the perl scripts that I posted to alt.bbs.waffle last year, and the usenet-file updator that added group descriptions automagically, so you can get things like (public) 5:53p (891 left) (?=help) : comp.dcom.modems comp.dcom.modems (messages from 16475 to 16575) Data communications hardware and software. (comp.dcom.modems) 5:54p (891 left) (?=help) : echo %B Data communications hardware and software. (comp.dcom.modems) 5:54p (890 left) (?=help) : I can repost or make the scripts available via mail-server if anyone is interested. Bill #! rnews 16979 Organization: Senior, Physics, Carnegie Mellon, Pittsburgh, PA Path: merk!alliant!linus!agate!ames!haven.umd.edu!darwin.sura.net!udel!rochester!cantaloupe.srv.cs.cmu.edu!crabapple.srv.cs.cmu.edu!andrew.cmu.edu!cc4b+ Newsgroups: alt.fan.mike-jittlov Message-ID: Date: Sat, 3 Oct 1992 17:59:50 -0400 From: Christopher Brian Cox Subject: Re: Bitmapped Wizard? In-Reply-To: References: <1992Oct3.030540.16689@ccu.umanitoba.ca> Lines: 599 Here's a version I made from one of the bitmaps that came across the net a while back. Freehand version is available upon (limited I hope) request. Chris ps. anybody remember the 20page square KGB logo we hung off Wean hall? pps. I wish the Freehand EPS header was smaller %!PS-Adobe-2.0 EPSF-1.2 %%Creator: FreeHand 3.1 %%Title: Wizard Logo (Freehand) %%CreationDate: 10/3/92 5:58 PM %%BoundingBox: 30.8218 154.9947 578.6112 702.7841 %%DocumentProcSets: FreeHand_header 3 1 %%DocumentSuppliedProcSets: FreeHand_header 3 1 %%ColorUsage: Color %%FHPathName: Dora:Wizard Logo (Freehand) %%EndComments %%BeginProcSet: FreeHand_header 3 0 /FHIODict 30 dict def FHIODict begin /bdf{bind def}bind def /d{setdash}bdf /h{closepath}bdf /H{}bdf /J{setlinecap}bdf /j{setlinejoin}bdf /M{setmiterlimit}bdf /n{newpath}bdf /N{newpath}bdf /q{gsave}bdf /Q{grestore}bdf /w{setlinewidth}bdf /u{}bdf /U{}bdf /sepdef{ dup where not { FreeHandSepDict } if 3 1 roll exch put }bdf /` {false setoverprint end %. FreeHandDict /-save0- save def pop pop pop pop pop concat userdict begin /showpage {} def 0 setgray 0 setlinecap 1 setlinewidth 0 setlinejoin 10 setmiterlimit [] 0 setdash newpath /languagelevel where {pop languagelevel 1 ne you want changed from your default. EDITING FILES ------------- An important utility that all VAX hackers should be familiar with is the EDT text editor. To call it up, use the EDIT DCL command. ie: $edit [filename] This will invoke the EDIT/EDT text editor. The [filename] refers to the file that you want to edit. If the file does not exist, it is created at this point. The EDT editor does not provide a default file type when creating files, so if you do not specify one, it will leave it as NULL. It should be noted that there is more than just the EDT editor, but when you type in EDIT, the default is /EDT. Basically it is an editor that you can use to create/modify COM or any other type of text files. After the editor is invoked, it keeps track of everything that you enter in a JOU file. In case of lost carrier or some other accident, you can recover what you had by specifying the /RECOVER qualifier. For example: $edit/recover memo.dat This would take the last copy of memo.dat, load it into memory, then process your last JOU file, updating it to virtually exactly where you were before you got cut off. Journaling is automatically defaulted to ON, but can be turned off with the /NOJOURNAL qualifier. For a description of what all the qualifiers are, and what they do, refer to the online HELP manual. Ok here is a list of the basic commands you can perform in the EDT editor: -------------------------------------------------------------------------------- X (where X = line number)............show line X only X:Y (where X,Y = line numbers).........show line X through line Y A,B,C,D (a,b,c,d = line numbers).......list lines A,B,C,D X:e ...................................list from X to end T W ...................................TYPE WHOLE. List ALL of the text lines S/string1/string2/W....................substitute ALL occurrences of string1 for string2 as they occur from current line number downwards "string" ..............................search for first occurrence of string from current line downwards T A "string" ..........................type all occurrences of string from current line downwards X:Y a "string" ........................search for occurrences of string within range denoted by X through Y D X ...................................Delete line X D X:Y .................................Delete line X through Y, inclusively I .....................................insert a line I X ...................................insert from line X M X:Y to Z ............................move lines X through Y to line Z RES ...................................resequence line numbers RES/SEQ:X:10 ..........................resequence from line X in intervals of 10 R X ...................................replace from line X. This deletes the current line and automatically goes into insertion mode. EXIT ..................................leave the editor, and SAVE the current text. QUIT ..................................leave the editor and DO NOT SAVE the current text. -------------------------------------------------------------------------------- A sample editing session is shown: $edit lame.txt * i hi this is just some bullshit text to test out how this EDIT program works. Oh well, easy enough. bye! *exit $type lame.txt hi this is just some bullshit text to test out how this EDIT program works. Oh well, easy enough. bye! $del lame.txt;* COMMANDS -------- In this section i will outline some of the more important commands that you can issue from the DCL level. This is not meant to be a complete guide. I will merely point out some of the more important commands and a very brief description. Proper help can be obtained from the online HELP facility. NOTE: It should be noted that each of the following commands may have further ----- qualifiers that you can specify. You should check up on these from the online help also. @ -Lets you execute COM script files ACCOUNTING -allows you to view and edit system accounting data that keeps track of what system time you have racked up. ANALYZE -lets you view the contents of OBJ files in HEX/ASCII format. ANALYZE/SYSTEM -Invokes the SDA. VERY VERY USEFUL!! Allows you to view other running processes, their type-ahead buffers etc. APPEND -appends the contents of file1 to file2 ATTACH -allows you to attach yourself to one of your subprocesses CLOSE -closes a file that was opened for input/output via OPEN CONTINUE -continue a process that you have aborted with control-y COPY -copy file1 to file2. You can specify full pathnames, with device and subdirectory. If you want to copy it to your home directory just use sys$login as your 'TO' file. CREATE -create a text file of any type. Eg. you want to create a simple COM file or perhaps a letter to another hacker on the system. (you shouldn't be using MAIL to send messages!) CREATE/DIR -If you want to create a subdirectory DELETE -delete a filename. Remember to specify a version number when you are deleting a file or it wont work.eg. del garbage.com;1 DELETE/INTRUSION_RECORD -gets rid of the failed password attempts DIFFERENCES -compares two files and notifies you of their differences DIRECTORY -get a directory of the files. Various qualifiers can be chosen DUMP -get a hex/ascii file dump EDIT/EDT -invokes the VAX EDT interactive text editor EXAMINE -view the contents of virtual memory HELP -ONLINE HELP MANUAL. REFER TO IT OFTEN! LINK -link object files into EXE files that you can run LOGOUT -the proper way to terminate a session PHONE -Allows you to chat with another user on the system. It is not recommended that you use this, except with fellow hackers. RENAME -rename a file or directory RUN -lets you execute EXE files SET CONTROL -disables/enables interrupts via ctrl-y/ctrl-c SET DEFAULT -change directories SET HOST -allows you to connect to another mainframe SET PASSWORD -change the password of your account SET PROCESS -change the characteristics of your process SET PROMPT -change the prompt ($) SET TERMINAL -change your terminal characteristics SHOW ACCOUNTING -show the current security/accounting enabled SHOW AUDIT -show SECURITY enabled SHOW DEFAULT -see your current directory. (Like PWD in UNIX) SHOW DEVICES -check out the system setup SHOW INTRUSION -view the contents of the breakin database SHOW LOGICAL -current logical name assignments SHOW NETWORK -lists all the available nodes that you can connect to SHOW PROCESS -View your process settings SHOW PROTECTION -show the default protection you have set SHOW SYSTEM -useful to see the running processes SHOW TERMINAL -display your terminal characteristics SHOW USERS -see who else is logged in. SPAWN -spawn a subprocess STOP -kill off a subprocess TYPE -view a file This should give you a general overview of some of the more important commands that you can use. It would be impossible for me to list ALL the commands, and their descriptions, so i suggest that you go through the online HELP facility and familiarize yourself with the syntax of some these commands. HACKING ------- Up to this point i have mainly discussed the basic concepts involved with VMS. By now you should be familiar and comfortable with the various {false setstrokeadjust}if}if } bdf /~ {end -save0- restore FreeHandDict begin }bdf /FreeHandDict 191 dict def FreeHandDict begin /currentpacking where{pop true setpacking}if /xdf{exch def}bdf /ndf{1 index where{pop pop pop}{dup xcheck{bind}if def}ifelse}bdf /min{2 copy gt{exch}if pop}bdf /max{2 copy lt{exch}if pop}bdf /isLino statusdict /product get (Lino) anchorsearch{pop pop true}{pop false}ifelse def /dr{transform .25 sub round .25 add exch .25 sub round .25 add exch itransform}bdf /C{dr curveto}bdf /L{dr lineto}bdf /m{dr moveto}bdf /printerRes gsave matrix defaultmatrix setmatrix 72 72 dtransform abs exch abs max grestore def /maxsteps 256 def /calcgraysteps { currentscreen pop exch printerRes exch div exch 2 copy sin mul round dup mul 3 1 roll cos mul round dup mul add 1 add dup maxsteps gt {pop maxsteps} if } bdf /bottom -0 def /delta -0 def /frac -0 def /left -0 def /numsteps -0 def /numsteps1 -0 def /radius -0 def /right -0 def /top -0 def /xt -0 def /yt -0 def /df currentflat def /tempstr 1 string def /clipflatness currentflat def /inverted? 0 currenttransfer exec .5 ge def /level2 /languagelevel where {pop languagelevel 1 ne}{false}ifelse def /colorexists level2 { statusdict/processcolors known {statusdict/processcolors get exec}{1}ifelse 4 eq def } {systemdict/setcmykcolor known def} ifelse /tc1 [0 0 0 1] def /tc2 [0 0 0 1] def /fc [0 0 0 1] def /sc [0 0 0 1] def /concatprocs{ /packedarray where {pop dup type /packedarraytype eq 2 index type /packedarraytype eq or}{false}ifelse { /proc2 exch cvlit def/proc1 exch cvlit def proc1 aload pop proc2 aload pop proc1 length proc2 length add packedarray cvx } { /proc2 exch cvlit def/proc1 exch cvlit def /newproc proc1 length proc2 length add array def newproc 0 proc1 putinterval newproc proc1 length proc2 putinterval newproc cvx }ifelse }bdf /storerect{/top xdf/right xdf/bottom xdf/left xdf}bdf /rectpath{newpath left bottom m left top L right top L right bottom L closepath}bdf /i{dup 0 eq {pop df dup} {dup} ifelse /clipflatness xdf setflat }bdf version cvr 38.0 le {/setrgbcolor{ currenttransfer exec 3 1 roll currenttransfer exec 3 1 roll currenttransfer exec 3 1 roll setrgbcolor}bdf}if /gettint{0 get}bdf /puttint{0 exch put}bdf /vms {/vmsv save def} bdf /vmr {vmsv restore} bdf /vmrs{vmsv restore /vmsv save def}bdf /eomode{ {/filler /eofill load def /clipper /eoclip load def} {/filler /fill load def /clipper /clip load def} ifelse }bdf /CD{/NF exch def{exch dup/FID ne 1 index/UniqueID ne and{exch NF 3 1 roll put} {pop pop}ifelse}forall NF}bdf /MN{1 index length/Len exch def dup length Len add string dup Len 4 -1 roll putinterval dup 0 4 -1 roll putinterval}bdf /RC{4 -1 roll /ourvec xdf 256 string cvs(|______)anchorsearch {1 index MN cvn/NewN exch def cvn findfont dup maxlength dict CD dup/FontName NewN put dup /Encoding ourvec put NewN exch definefont pop}{pop}ifelse}bdf /RF{dup FontDirectory exch known{pop 3 -1 roll pop}{RC}ifelse}bdf /FF{dup 256 string cvs(|______)exch MN cvn dup FontDirectory exch known {exch pop findfont 3 -1 roll pop}{pop dup findfont dup maxlength dict CD dup dup /Encoding exch /Encoding get 256 array copy 7 -1 roll {3 -1 roll dup 4 -2 roll put}forall put definefont}ifelse}bdf userdict begin /BDFontDict 20 dict def end BDFontDict begin /bu{}def /bn{}def /setTxMode{av 70 ge{pop}if pop}def /gm{m}def /show{pop}def /gr{pop}def /fnt{pop pop pop}def /fs{pop}def /fz{pop}def /lin{pop pop}def end /MacVec 256 array def MacVec 0 /Helvetica findfont /Encoding get 0 128 getinterval putinterval MacVec 127 /DEL put MacVec 16#27 /quotesingle put MacVec 16#60 /grave put /NUL/SOH/STX/ETX/EOT/ENQ/ACK/BEL/BS/HT/LF/VT/FF/CR/SO/SI /DLE/DC1/DC2/DC3/DC4/NAK/SYN/ETB/CAN/EM/SUB/ESC/FS/GS/RS/US MacVec 0 32 getinterval astore pop /Adieresis/Aring/Ccedilla/Eacute/Ntilde/Odieresis/Udieresis/aacute /agrave/acircumflex/adieresis/atilde/aring/ccedilla/eacute/egrave /ecircumflex/edieresis/iacute/igrave/icircumflex/idieresis/ntilde/oacute /ograve/ocircumflex/odieresis/otilde/uacute/ugrave/ucircumflex/udieresis /dagger/degree/cent/sterling/section/bullet/paragraph/germandbls /registered/copyright/trademark/acute/dieresis/notequal/AE/Oslash /infinity/plusminus/lessequal/greaterequal/yen/mu/partialdiff/summation /product/pi/integral/ordfeminine/ordmasculine/Omega/ae/oslash /questiondown/exclamdown/logicalnot/radical/florin/approxequal/Delta/guillemotl eft /guillemotright/ellipsis/nbspace/Agrave/Atilde/Otilde/OE/oe /endash/emdash/quotedblleft/quotedblright/quoteleft/quoteright/divide/lozenge /ydieresis/Ydieresis/fraction/currency/guilsinglleft/guilsinglright/fi/fl /daggerdbl/periodcentered/quotesinglbase/quotedblbase /perthousand/Acircumflex/Ecircumflex/Aacute /Edieresis/Egrave/Iacute/Icircumflex/Idieresis/Igrave/Oacute/Ocircumflex /apple/Ograve/Uacute/Ucircumflex/Ugrave/dotlessi/circumflex/tilde /macron/breve/dotaccent/ring/cedilla/hungarumlaut/ogonek/caron MacVec 128 128 getinterval astore pop /fps{ currentflat exch dup 0 le{pop 1}if { dup setflat 3 index stopped {1.3 mul dup 3 index gt{pop setflat pop pop stop}if} {exit} ifelse }loop pop setflat pop pop }bdf /fp{100 currentflat fps}bdf /clipper{clip}bdf /W{/clipper load 100 clipflatness fps}bdf end%. FreeHandDict end%. FHIODict %%EndProcSet %%EndProlog %%BeginSetup FHIODict begin FreeHandDict begin 30.8218 154.9947 578.6112 702.7841 storerect rectpath clip newpath /onlyk{false}ndf /ccmyk{dup 5 -1 roll sub 0 max exch}ndf /setcmykcolor{1 exch sub ccmyk ccmyk ccmyk pop setrgbcolor}ndf /setcmykcoloroverprint{4{dup -1 eq{pop 0}if 4 1 roll}repeat setcmykcolor}ndf /findcmykcustomcolor{5 /packedarray where{pop packedarray}{array astore readonly}ifelse}ndf /setcustomcolor{exch aload pop pop 4{4 index mul 4 1 roll}repeat setcmykcolor pop}ndf /setseparationgray{1 exch sub dup dup dup setcmykcolor}ndf /setoverprint{pop}ndf /currentoverprint false ndf /colorimage{pop pop [5 -1 roll/exec cvx 6 -1 roll/exec cvx 7 -1 roll/exec cvx 8 -1 roll/exec cvx /cmykbufs2gray cvx]cvx image} %. version 47.1 on Linotronic of Postscript defines colorimage incorrectly (rgb model only) version cvr 47.1 le isLino and{userdict begin bdf end}{ndf}ifelse /customcolorimage{ colorexists { aload pop pop 4 array astore setimagecmyk currentcolortransfer {ik mul ik sub 1 add}concatprocs 4 1 roll {iy mul iy sub 1 add}concatprocs 4 1 roll {im mul im sub 1 add}concatprocs 4 1 roll {ic mul ic sub 1 add}concatprocs 4 1 roll setcolortransfer /magentabuf 0 string def /yellowbuf 0 string def /blackbuf 0 string def {invbuf dup length magentabuf length ne {dup length dup dup /magentabuf exch string def /yellowbuf exch string def /blackbuf exch string def}if dup magentabuf copy yellowbuf copy blackbuf copy pop}concatprocs {magentabuf}{yellowbuf}{blackbuf}true 4 colorimage } { pop image } ifelse }ndf /separationimage{image}ndf /newcmykcustomcolor{6 /packedarray where{pop packedarray}{array astore readonly}ifelse}ndf /inkoverprint false ndf /setinkoverprint{pop}ndf /overprintprocess{pop}ndf /setspotcolor {spots exch get 0 5 getinterval exch setcustomcolor}ndf /currentcolortransfer{currenttransfer dup dup dup}ndf /setcolortransfer{systemdict begin settransfer end pop pop pop}ndf /getcmyk { dup length 4 eq {aload pop} {aload pop spots exch get 0 4 getinterval aload pop 4 {4 index mul 4 1 roll}repeat 5 -1 roll pop} ifelse }bdf /setimagecmyk{ getcmyk/ik xdf /iy xdf /im xdf /ic xdf }ndf /autospread{pop}ndf /fhsetspreadsize{pop}ndf /fhsetspreadallow{pop}ndf /strokeopf false def /fillopf false def /R{0 ne /strokeopf xdf}bdf /O{0 ne /fillopf xdf}bdf /filler{fill}bdf /F{fc fhsetcolor fillopf setoverprint false autospread gsave /filler load fp grestore false setoverprint}bdf /f{closepath F}bdf /S{sc fhsetcolor strokeopf setoverprint true autospread {stroke}fp false setoverprint}bdf /s{closepath S}bdf /B{fc fhsetcolor fillopf setoverprint gsave /filler load fp grestore sc fhsetcolor strokeopf setoverprint true autospread {stroke}fp false setoverprint}bdf /b{closepath B}bdf /setcolorscreen where{pop}{/setcolorscreen{setscreen pop pop pop pop pop pop pop pop pop}bdf}ifelse /fhsetcolor{dup length 4 eq {aload overprintprocess setcmykcolor} {aload 1 get spots exch get 5 get setinkoverprint setspotcolor} ifelse }ndf /settextcolor{ dup fhsetcolor textblackopf { dup length 4 eq {onlyk{3 get 1.0 eq{true setinkoverprint}if}{pop}ifelse} {pop} ifelse } {pop}ifelse }ndf /ka{/fc xdf}bdf /Ka{/sc xdf}bdf /xa{/fc xdf} bdf /Xa{/sc xdf} bdf /bc2[0 0]def /bc4[0 0 0 0]def /absmax{2 copy abs exch abs gt{exch}if pop}bdf /calcstep { {calcgraysteps}{maxsteps}ifelse tc1 length 4 eq { 0 1 3 {tc1 1 index get tc2 3 -1 roll get sub }for absmax absmax absmax } { bc2 tc1 1 get 1 exch put tc1 gettint tc2 gettint sub abs } ifelse mul abs round dup 0 eq{pop 1}if dup /numsteps xdf 1 sub dup 0 eq{pop 1}if /numsteps1 xdf }bdf /cblend{ tc1 length 4 eq { 0 1 3 {bc4 exch tc1 1 index get tc2 2 index get 1 index sub frac mul add put }for bc4 } { bc2 tc1 gettint tc2 gettint 1 index sub frac mul add puttint bc2 } ifelse fhsetcolor }bdf /logtaper{/frac frac 9 mul 1 add log def}bdf FHIODict begin /origmtx matrix currentmatrix def /iminv false def /invbuf{0 1 2 index length 1 sub{dup 2 index exch get 255 exch sub 2 index 3 1 roll put}for}bdf /cmykbufs2gray{ dup length 0 1 3 -1 roll 1 sub {4 index 1 index get 4 index 2 index get 4 index 3 index get 4 index 4 index get 255 exch sub ccmyk ccmyk ccmyk pop 5 mul exch 45 mul add exch 14 mul add -6 bitshift 2 index 3 1 roll put}for 4 1 roll pop pop pop }bdf end /currentpacking where{pop false setpacking}if /spots[1 0 0 0 (Process Cyan) false newcmykcustomcolor 0 1 0 0 (Process Magenta) false newcmykcustomcolor 0 0 1 0 (Process Yellow) false newcmykcustomcolor 0 0 0 1 (Process Black) false newcmykcustomcolor 0 0 0 0 (White) false newcmykcustomcolor ]def %%EndSetup [] 0 d 3.863708 M 1 w 0 j 0 J 0 O 0 R 0 i false eomode [0 0 0 1] Ka [0 0 0 1] ka vms u u true fhsetspreadallow 47.8019 428.881 m 47.8019 571.7924 163.6511 687.6416 306.5625 687.6416 C 449.4739 687.6416 565.3231 571.7924 565.3231 428.881 C 565.3231 285.9697 449.4739 170.1204 306.5625 170.1204 C 163.6511 170.1204 47.8019 285.9697 47.8019 428.881 C b U u 69.0672 428.881 m 69.0672 560.0477 175.3958 666.3763 306.5625 666.3763 C 437.7292 666.3763 544.0578 560.0477 544.0578 428.881 C 544.0578 297.7144 437.7292 191.3858 306.5625 191.3858 C 175.3958 191.3858 69.0672 297.7144 69.0672 428.881 C [0 0 0 0] ka b U U vmr vms u u true fhsetspreadallow 30.8218 702.7841 m 578.6112 702.7841 L 578.6112 154.9947 L 30.8218 154.9947 L 30.8218 702.7841 L n U 453.0146 593.299 m 503.5003 620.4117 L 560.5305 539.0736 L 514.7194 497.937 L 453.0146 593.299 L [0 0 0 0] ka f n 105.224 324.0418 m 84.6558 277.2957 L 115.5082 241.7687 L 142.6209 272.6211 L 105.224 324.0418 L f n 31.3653 382.0069 m 87.4605 398.8354 L 94.9399 354.8941 L 37.9097 357.6989 L 31.3653 382.0069 L f n 257.6161 618.5418 m 290.8058 600.7783 311.2391 589.9844 348.7709 586.287 C 358.2205 585.3562 373.1002 585.3447 373.1002 585.3447 C 400.1465 584.2971 416.0852 557.3045 416.0852 557.3045 C 403.9545 557.2953 L 403.9545 546.6366 403.9545 539.3438 403.9545 530.181 C 391.3098 525.9847 366.0669 495.5997 366.0669 495.5997 C 362.14 513.9253 334.7471 545.1505 307.1669 549.8251 C 307.1669 549.8251 328.6701 554.0323 338.506 565.7101 C 317.4511 571.7958 310.0845 574.4759 295.9479 584.4172 C 272.1074 598.441 257.6161 618.5418 257.6161 618.5418 C [0 0 0 1] ka f n 498.3873 599.3694 m 498.8623 599.6678 511.25 588 511.477 581.6048 C 511.6147 577.723 509 555.5 497.4523 555.4254 C 491.9902 555.3901 475.0128 562.4836 475.0128 569.4501 C 475.0128 583.4747 L 482.5 589 488.25 593 498.3873 599.3694 C f n 205.7392 458.1877 m 217.8939 458.1877 L 223.6909 458.1877 228.5 452 230.0486 448.8379 C 230.0486 436.6832 L 230.0486 435.0938 222.5688 422.6585 216.0239 422.6585 C 212.9385 422.6585 191.7145 431.9148 191.7145 437.6182 C 191.7145 445.5655 205.7392 458.1877 205.7392 458.1877 C f n 271.1725 408.1846 m 276.3146 396.4981 279.1001 395.0016 288.4685 383.8767 C 295.9479 374.9949 326.8003 383.8767 326.8003 383.8767 C 312.25 373.25 250.75 327.25 236.5 321.5 C 218.9345 314.4122 161.3193 297.3965 161.3193 297.3965 C 157.5 300.75 151.9523 328.9807 127.201 347.8603 C 107.5613 362.841 105.7565 362.0152 90.2653 366.5806 C 72.5483 371.802 43.053 370.2998 43.053 370.2998 C 68.5 379.75 79.75 384.5 113.1709 384.8116 C 133.1919 384.9983 134.9789 384.5441 171.6034 376.8648 C 200.586 370.7878 224.8939 353.0243 224.8939 353.0243 C 271.1725 408.1846 L f n 127.201 323.5509 m 131.9696 321.8555 138.3317 317.3007 142.1534 312.8227 C 148.8164 305.0155 151.5105 296.4365 151.5105 296.4365 C 151.5105 296.4365 137.003 289.0936 124.3899 277.7632 C 113.3639 267.8584 103.9519 256.4436 101.0169 241.7687 C 100.5494 239.4314 95.4074 238.7302 94.005 246.4433 C 92.6041 254.1479 94.4724 267.9465 94.4724 267.9465 C 94.4724 267.9465 103.2604 285.616 108.4962 294.1243 C 117.285 308.2424 118.5 315 127.201 323.5509 C f n 427.3289 317.941 m 436.8083 318.1114 451.6384 317.941 451.6384 317.941 C 451.6384 317.941 452.0963 314.4705 451.6384 312.3311 C 449.7424 303.4735 435.4632 303.7293 412.3693 294.5665 C 387.1249 284.4688 374.5865 279.9465 368.8717 279.1656 C 358.7999 277.7893 361.3923 286.8786 361.3923 286.8786 C 361.6261 295.2929 369.084 303.4974 374.9487 314.9263 C 374.9487 314.9263 406.8697 317.5731 427.3289 317.941 C f n 407.2035 451.6584 m 414 452.25 429.5476 452.4064 436.6535 451.6584 C 436.6535 451.6584 446.4701 451.191 456.3132 448.8379 C 460.757 447.7756 465.5 446.1464 465.5 442.5 C 465.5 429.6908 412.25 332 410.0082 324.5092 C 388.0376 330.5862 348.4569 322.4282 313.7114 305.8108 C 281.4566 290.3846 239.3852 258.1298 239.3852 258.1298 C 273.4962 297.4235 317.7643 338.7731 351.5757 366.5806 C 401.5939 407.7172 411.8538 409.6046 422.1622 420.8061 C 422.1622 420.8061 316.9836 387.6164 305.2971 388.0838 C 293.0587 388.5733 278.6674 408.4469 278.6674 416.1137 C 278.6674 421.7235 296.4153 452.5934 296.4153 452.5934 C 316.5161 433.4275 L 350.4226 445.7434 394.7965 450.5786 407.2035 451.6584 C f n 548.3765 603.1156 m 549.7789 583.0148 548.1756 564.8962 542.767 554.9672 C 534.75 540.25 536.5 538.5 511.477 512.4164 C 501.1094 501.6095 461.6426 475.9523 447.8985 475.9523 C 437.2397 475.9523 424.4995 484.8481 405.8011 496.5347 C 387.1027 474.0965 380.0908 464.7473 372.1439 456.8005 C 367.25 455.5 338.4961 448.6926 325.8654 448.3862 C 320.25 448.25 308 459 302.9769 463.7975 C 302.9598 506.8188 L 293.6106 510.091 267.4328 519.4402 253.8764 524.5823 C 253.8764 524.5823 234.2431 476.4339 229.101 465.2148 C 215.0772 468.9545 204.3217 470.4189 196.3788 469.8894 C 175.3431 468.487 169.5542 468.0956 148.6978 457.268 C 120.2738 442.5116 101.9518 420.3386 101.9518 420.3386 C 108.6836 430.2494 133.5483 488.5854 196.8463 528.7894 C 202.4561 532.3423 239.3433 555.5533 254.358 556.3604 C 263.2257 556.8371 317.75 535.25 320.7415 532.9859 C 342.9023 516.2136 361.6 479.9727 364.6854 476.8872 C 409.5644 524.5711 L 412.3693 522.7012 432.8877 511.5058 451.1447 502.6116 C 460.0004 517.5828 467.0384 531.1267 479.1924 554.9672 C 489.944 549.8251 502.4621 545.9127 518.459 555.4347 C 538.0924 567.1212 539.4948 582.5474 548.3765 603.1156 C f n U vmr %%Trailer end % FreeHandDict end % FHIODict #! rnews 680 Path: merk!alliant!linus!agate!ames!pacbell.com!well!moon!cyberden!system From: moon!cyberden!system@well.sf.ca.us Newsgroups: comp.bbs.waffle Subject: USERS command V1.65 hangs system Message-ID: Date: Sat, 03 Oct 92 14:16:42 PDT Organization: Indescribable Creations Lines: 10 Is there a fix for this problem? I come home to find that some user has type USERS and get's some garbage for the first user to the extent of some field codes and then it hangs forever. orcist __________________________________________________________________________ | / |\ | H E \ Y B E R |/ E N [ moon!cyberden!system@well.sf.ca.us ] #! rnews 1482 Path: merk!alliant!linus!think.com!rpi!batcomputer!munnari.oz.au!network.ucsd.edu!porgy!kestanol From: kestanol@porgy.uucp (Keith C. Estanol) Newsgroups: rec.games.mud.tiny Subject: Re: TINYSNOOPING AGAIN Date: 3 Oct 1992 22:15:46 GMT Organization: UC San Diego Lines: 28 Distribution: world,local Message-ID: <1al62iINNgum@network.ucsd.edu> References: NNTP-Posting-Host: porgy.ucsd.edu In article References: Date: Thu, 20 Aug 92 03:19:43 EDT thanatos (Thanatos) writes: > Nobody call Newton Underground. It's a bad bbs, all it has is good games, > lots of games. But, they're liberal but not anarchists(how can the two not > go together...oh i see..anarchist don't believe in any form of government) > but...I just yelled at the sysop for not giving me higher acces after i ul'd > a bunch of anarchy sections to the education file section...It's educational > isn't it? Well, I thought so, he didn't...I'll put in a copy of his Don't be too hard on Joe. As messed up as he can seem, he's a good guy, in my opinion. He incredibly, rigidly lawful in his ways, and he's a neopagan, which i respect, but still find a bit cheesey... But he makes for good discussions. - Random ) > but...I just yelled at the sysoSubject: Re: I'm sorry From: makari (Random Tox) Level Janus: Yo ho ho and a bottle of Demerol Message-ID: References: Date: Thu, 20 Aug 92 03:29:19 EDT smut (Vince Niel) writes: > I just went on a leeching spree of the works. I'm sorry, I, I, just > couldn't help it. So many files, so little time to read them all. I > love this place. Never have I found such a vast amount of knowledge and > information under one roof at 2400 bps with a semi-small hard disk. Ans > this aint a warezz%$^@%^ board either. Sorry I kept other years from > logging on. I will try to keep my works leech sprees, unlike my Argus > porno gif sprees, at night. Thanks. I feel better already! Kind of sad. Don't get ripped, Vince, but ... Oh well. Your RA hacking thing was mostly plagiarized anyway, and via certain measures, RA can be safeguarded quite well. And the MATP BBS system that MAcula wanted you to call is indeed a butt ugly bbs with shit-ass structure. I would have preferred to have Aldebaran take over the BBS, but he's living in a tiny dorm room, so it's almost impossible. Too bad, since MAcula is twisting The Eleventh HOur into little bits. I streamline it and come back from france to discver he's trashed my BBS completely, and KILLED the hard drive. He backed it up, but ALL the files are gone. I'm fucking ripped at him. He's competent what has he done? Jesus fuck, im mad. I need to reconsider leaving it with him... he ruined it.. he bent it out of shape.. and the modem doesn't answer very well or do decent work.. fuck! and i cant switch to another bbs, because i'll lose allt he user records and bases and its too much of a pain. Anyone know if theres a telegard 2.7 to TAG messagebase converter? Yes i run a tg board, so sue me, its the first BBS software i ever played with, and the BBS was originally aimed at teachers, so i wanted something simple, friendly and easy to use, since most arent computer literate. Ah vell. I'll be running a Remote Access BBS at Amherst, on campus... if anyone cares. Unfortunately Trog will be sysop, and thus be totally foolish and silly, and dream of playing Food Fight. Help me god.... But as cosysop and designerof the board, i'll have some major say. Fuck. All these thoughts are pissing me off. - Random "I'm 'Mad' too 'Bob'!" Tox the BBS was originally aimed at teachers, so i wanted something simple, friendly and easy to use, since moSubject: Re: I'm sorry From: makari (Random Tox) Level Janus: Yo ho ho and a bottle of Demerol Message-ID: References: Date: Thu, 20 Aug 92 03:30:09 EDT jupiter (Peregrinus Jupiter) writes: > > logging on. I will try to keep my works leech sprees, unlike my Argus > > porno gif sprees, at night. Thanks. I feel better already! > > > That's about as low as it gets. > -ASJ That's what i wanted to say. Thanks... I agree. Porn GIFs are pathetic. From: makari (Random Tox) Level Janus: Yo ho ho and a bottle of Demerol Message-ID: References: Date: Thu, 20 Aug 92 03:30:09 EDT jupiter (Peregrinus Jupiter) writes: > > logging on. I will try to keep my works leech sprees, unlike my Argus > > porno gif sprees, at night. Thanks. I feel better already! > > > That's about as low as it gets. > -ASJ That's what i wanted to say. Thanks... I agree. Porn GIubject of the painting in real life. Just enjoy the painting for what it is, and if you want to read the book, that's certainly ok too, but don't compare 'em - that's my view. |Steve J. White |"Either there's something wrong with me, | |aragorn@csd4.csd.uwm.edu | or there's something wrong with the universe."| |skeptic@large@9600bps | - Dr. Crusher on ST:TNG | -- ahawks@nyx.cs.du.edu FutureCulture E-List: [future-request@nyx.cs.du.edu] andy (hawkeye) new edge, technoculture, cyberpunk, virtual reality, raves, etc. Home of the famous :) FutureCulture FAQ! From merk!nyx.cs.du.edu!ahawks Sat Sep 19 23:27:35 1992 remote from works Received: by works.uucp (1.65/waf) via UUCP; Sat, 19 Sep 92 23:26:39 EDT for phantasm Received: by merk.merk.com (/\==/\ Smail3.1.25.1 #25.17) id ; Sat, 19 Sep 92 23:27 EDT Received: from nyx.cs.du.edu by relay1.UU.NET with SMTP (5.61/UUNET-internet-primary) id AA03068; Sat, 19 Sep 92 23:25:31 -0400 Received: by nyx.cs.du.edu (4.1/SMI-4.1) id AA07828; Sat, 19 Sep 92 19:53:43 MDT From: ahawks@nyx.cs.du.edu (morrissey's therapist) Message-Id: <9209200153.AA07828@nyx.cs.du.edu> X-Disclaimer: Nyx is a public access Unix system run by the University of Denver. The University has neither control over nor responsibility for the opinions or correct identity of users. Subject: Mindless Babble for the Terminally Bored To: future@nyx.cs.du.edu Date: Sat, 19 Sep 92 19:53:41 MDT X-Mailer: ELM [version 2.3 PL11] If you have nothing else better to do this weekend than watch CNN, look for their "FutreWatch" segment...Featured some pretty interesting stuff including: --a snippet about the new Blade Runner (PS- look for a scene that shows Rachael on the streets of LA - I don't think this was in either release of the movie....) --a little thing about Sneakers, talking about (if I remember right) the plausibility of breaking the code (DES, I assume), and ummm, the possibility of getting government information via computer or something like that... --and a very interesting and disturbing little piece about a company that seeks to put a sort of universal price rate on all information...I only caught the last portion of this, but it seemed very disturbing to me...The impression I got from the representative of the corporation was that someday he hoped to see a sort of "cost this session" applied to *any* information retrieval via computer... I hope I see this again so I can confirm this and get more accurate info...Very scary thought that information will not be a free or almost-free or as-close-to-free-as-you-can-get in the coming information age....People are already starting to jack up the price of everything that you could possibly want to knw.... -- ahawks@nyx.cs.du.edu FutureCulture E-List: [future-request@nyx.cs.du.edu] andy (hawkeye) new edge, technoculture, cyberpunk, virtual reality, raves, etc. Home of the famous :) FutureCulture FAQ! From merk!nyx.cs.du.edu!ahawks Sun Sep 20 14:29:11 1992 remote from works Received: by works.uucp (1.65/waf) via UUCP; Sun, 20 Sep 92 14:53:30 EDT for phantasm Received: by merk.merk.com (/\==/\ Smail3.1.25.1 #25.17) id ; Sun, 20 Sep 92 14:28 EDT Received: from nyx.cs.du.edu by relay1.UU.NET with SMTP (5.61/UUNET-internet-primary) id AA12908; Sun, 20 Sep 92 14:26:34 -0400 Received: by nyx.cs.du.edu (4.1/SMI-4.1) id AA04001; Sun, 20 Sep 92 11:18:05 MDT From: ahawks@nyx.cs.du.edu (morrissey's therapist) Message-Id: <9209201718.AA04001@nyx.cs.du.edu> X-Disclaimer: Nyx is a public access Unix system run by the University of Denver. The University has neither control over nor responsibility for the opinions or correct identity of users. Subject: interesting p h i l e (fwd) To: future@nyx.cs.du.edu Date: Sun, 20 Sep 92 11:18:01 MDT X-Mailer: ELM [version 2.3 PL11] Morpheus writes: Thought you might want to check this out, maybe send it out to the list if you think it's decent... --------------------------- begin digital.txt ------------------------------- Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X X/\/ \/\X X\/X - Digital Underground - X\/X X/\X Story by Mark Bennett. Published in i-D Technology Issue X/\X X\/X X\/X X/\X Transcribed by Phantasm. 12th September 1992 X/\X X\/X X\/X X/\X Unauthorised Access UK. Online 10.00pm-7.00am. +44-636-708063 X/\X X\/\ /\/X X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X They've got a file on you. It's on computer. And that computer is connected to a global network. Who's going to stand up for our civil liberties in the digital era? Can the anarchic activities of hackers and cyberpunks make them freedom fighters for the information age? CYBERPUNK TECHNOLOGY Cyberspace, the Net, Non-Space, or the Electronic Frontier call it what you will, but it's out there now, spread across the world like an opulent immaterial spider's web, growing as each new computer, telephone or fax machine is plugged in, as satellites close continental divides, hooking independent phone systems together. It's almost a living entity - the backbone is the various telephone exchanges, the limbs the copper and fibre- optic links. Increasingly the world is shifting to this unseen plane. Your earnings, your purchasing patterns and your poll tax records are processed there. You may not realise it exists, but it's part of everyday life. As John Barlow, writer and electronic activist puts it, "Cyberspace is the place you are when you're on the telephone." As life moves to this electronic frontier, politicians and corporations are starting to exert increasing control over the new digital realm, policing information highways with growing strictness. Before we even realise we're there, we may find ourselves boxed into a digital ghetto, denied simple rights of access, whiSubject: Two birds with one can of sauce. From: ferret (Dave Ferret) Level SYSOP: Work you Damn insidious machine! Message-ID: Date: Sun, 12 Jan 92 17:19:18 EST First in response to a /reports section - For a long time, there was a section for school reports, and I just haven't had a chance to put it back up here, we have a mere dozen or so reports, all lacking the pertinant information you wanted, but hey, you have to figure if YOU think its good, then thSubject: Re:Re:Re:Re:E.T. phone home From: makari (Random Tox) Level Janus: Yo ho ho and a bottle of Demerol Message-ID: References: Date: Thu, 20 Aug 92 03:34:01 EDT jupiter (Peregrinus Jupiter) writes: > C'mon, I'm serious. I'm not worried about people stealing my stuff, just > fucking with it. (No puns, please.) Thanks, Noid, I will look for those > phone jack locks. One of my roommates is from Idaho and I don't want to end > up footing the bill for his calls back to his potato(e)-pickin' gf in > Boise... > > As for the paper shredder/scissors. I think having a paper shredder would > be k-k00l. It adds an air of importance and suspicion to things. Plus I'll > have a fireplace and it will be good for makin' kindlin'. > Fireplace? Fone jack lock? I thought you were going to UMass/Amherst... anks, Noid, I will look for those > phone jack locks. One of my roommates is from Idaho and I don't want to end > up fo deviate criminal sexual behavior. ...and finally... (e) Publication contains material on the setting up and operation or criminal schemes or how to avoid detection of criminal schemes by lawful authorities charged with the responsibility for detecting such illegal activity. --- End Document quotes --- _ _ Now considering our archives, we could very possibly be cited for =_EVERY_= item on there, except that we _allegedly_ are allowed to have these items and have our rights to have them protected by the First Amendment to garuantee FREE SPEECH. But thats something for you to chew on for a while. nge public keys, and maybe even get them signed. Is anyone else interested in meeting sometime during the conference for this purpose? This would at least be slightly more secure than trusting a posted public key. Of course, whether you believe that it really is me is a different story. I'm presenting a paper that I wrote with a co-author that I've never met. So I can't know that even he is who he claims - or that I am who I claim :-) Please Email or reply via post. Even if we simply meet to talk about PGSubject: Re: E.T. phone home From: makari (Random Tox) Level Janus: Yo ho ho and a bottle of Demerol Message-ID: References: Date: Thu, 20 Aug 92 03:36:22 EDT > Actually, I've found that by far the best way to keep your roommate from > fucking with your stuff is to get rid of your roommate... My preferred > method is to Gross/weird him out, by leaving the room a pigsty, playing > strange music, and just acting very odd in general. I got rid of my last > roommate in just under 3 weeks that way... I thought you went to high school and were taking a year off before college... Where'd you get a roommate? I get em for summer study programs or whatever, but they're not long enough to make it practical. te from > fucking with your stuff is to get rid of your roommate... My preferred > method is to Gross/weird him out, by leaving the room a pigsty, playing > strange music, and just acting very odd in general. I got rid lk sense to a fool and he calls you foolish. -- Euripides #! rnews 1825 Newsgroups: alt.drugs Path: merk!alliant!linus!agate!spool.mu.edu!sdd.hp.com!elroy.jpl.nasa.gov!news.claremont.edu!jarthur.claremont.edu!jrhine From: jrhine@jarthur.claremont.edu (Jared Rhine) Subject: Nitrous : mechanism Message-ID: <1992Oct3.215904.8289@muddcs.claremont.edu> Sender: news@muddcs.claremont.edu (The News System) Organization: Harvey Mudd College, Claremont, CA 91711 Date: Sat, 3 Oct 1992 21:59:04 GMT Lines: 26 Come on, don't tell me there isn't a single scuba diver out there who reads this group? The mechanism of nitrous oxide is same as for nitrogen narcosis, commonly called rapture of the deep. When a diver goes below about 80 ft, they are in "danger" of getting this effect (actually I know people who go diving JUST for that effect). The nitrous buzz is a function of the amount of nitrogen disolved in your fatty tissues. You ongas at an approximately exponetial rate and offgas at an approximately linear rate. The nitrogen in your fatty tissues interferes with neuron transmission. It is indeed inert to the body, just hangs around and blocks. It is NOT a function on oxygen deprevation; divers are still breathing the same amount of oxygen at those depths. When a diver comes up, the nitrogen offgases safely as it is under a lower pressure (divers breath gases at ambient pressure which at 100 ft is something like 4 atms; when you come up, you are under lower pressure so the nitrogen comes out). So now you can go find another source, go look up nitrogen narcosis in a scuba book. -- Jared -- _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ / \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \/ \ ---------> < Jared Rhine | Student, Philosopher, Zymurgy Specialist > \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ #! rnews 568 Newsgroups: alt.bbs.internet Path: merk!alliant!linus!agate!spool.mu.edu!wupost!news.miami.edu!cybernet!news From: garth@cybernet.cse.fau.edu (donna schweikert) Subject: internet Message-ID: Sender: news@cybernet.cse.fau.edu Organization: Cybernet BBS, Boca Raton, Florida Date: Sat, 3 Oct 1992 21:26:27 GMT Lines: 6 i would like to know if there is anyway of telneting out of the state of michigan without having to go thru merit. i have accounts in other states, is there a way the internet allows for this. thanx garth (donna) #! rnews 1087 Newsgroups: alt.locksmithing Path: merk!alliant!linus!agate!spool.mu.edu!sdd.hp.com!think.com!rpi!newsserver.pixel.kodak.com!psinntp!psinntp!cubetech.com!imladris!andrew From: andrew@cubetech.com (Andrew Loewenstern) Subject: Re: auto club locks Message-ID: <1992Oct2.205731.25213@cubetech.com> Organization: Cube Technologies, Inc. References: <1992Sep24.150843.9850@engage.pko.dec.com> <80833@ut-emx.uucp> Distribution: usa Date: Fri, 2 Oct 1992 20:57:31 GMT Lines: 14 In article <80833@ut-emx.uucp> jerry@ccwf.cc.utexas.edu (Jeremy Porter) writes: >Now maybe the car is less likely to be stolen if it has a club on it, but >I doubt it makes much difference to a "professional" car thief. Nothing will stop someone if they want it badly enough. The trick then is to drive a piece of shit car like I do. ;-) andrew -- andrew@cubetech.com | "We shall not cease from exploration Andrew Loewenstern | And the end of our exploring Cube Technologies, Inc. | Will be to arrive where we started | And know the place for the first time." -T.S. Eliot #! rnews 1279 Path: merk!alliant!linus!agate!spool.mu.edu!uwm.edu!linac!att!cbnewsi!cbnewsh!att-out!rutgers!psuvax1!postscript.cs.psu.edu!fenner From: fenner@postscript.cs.psu.edu (Bill Fenner) Newsgroups: comp.bbs.waffle Subject: Re: UDFB 1.0 Message-ID: Date: 3 Oct 92 22:06:15 GMT References: <26wZRB1w165w@eastwind.mcds.com> Sender: news@cs.psu.edu (Usenet) Organization: Penn State Computer Science Lines: 21 Nntp-Posting-Host: postscript.cs.psu.edu In article system@micromed.com (Duane Davis) writes: |You could have saved yourself some time. I wrote and released a program |that does exactly the same thing over a month ago. And then, of course, there's the perl scripts that I posted to alt.bbs.waffle last year, and the usenet-file updator that added group descriptions automagically, so you can get things like (public) 5:53p (891 left) (?=help) : comp.dcom.modems comp.dcom.modems (messages from 16475 to 16575) Data communications hardware and software. (comp.dcom.modems) 5:54p (891 left) (?=help) : echo %B Data communications hardware and software. (comp.dcom.modems) 5:54p (890 left) (?=help) : I can repost or make the scripts available via mail-server if anyone is interested. Bill #! rnews 16979 Organization: Senior, Physics, Carnegie Mellon, Pittsburgh, PA Path: merk!alliant!linus!agate!ames!haven.umd.edu!darwin.sura.net!udel!rochester!cantaloupe.srv.cs.cmu.edu!crabapple.srv.cs.cmu.edu!andrew.cmu.edu!cc4b+ Newsgroups: alt.fan.mike-jittlov Message-ID: Date: Sat, 3 Oct 1992 17:59:50 -0400 From: Christopher Brian Cox Subject: Re: Bitmapped Wizard? In-Reply-To: References: <1992Oct3.030540.16689@ccu.umanitoba.ca> Lines: 599 Here's a version I made from one of the bitmaps that came across the net a while back. Freehand version is available upon (limited I hope) request. Chris ps. anybody remember the 20page square KGB logo we hung off Wean hall? pps. I wish the Freehand EPS header was smaller %!PS-Adobe-2.0 EPSF-1.2 %%Creator: FreeHand 3.1 %%Title: Wizard Logo (Freehand) %%CreationDate: 10/3/92 5:58 PM %%BoundingBox: 30.8218 154.9947 578.6112 702.7841 %%DocumentProcSets: FreeHand_header 3 1 %%DocumentSuppliedProcSets: FreeHand_header 3 1 %%ColorUsage: Color %%FHPathName: Dora:Wizard Logo (Freehand) %%EndComments %%BeginProcSet: FreeHand_header 3 0 /FHIODict 30 dict def FHIODict begin /bdf{bind def}bind def /d{setdash}bdf /h{closepath}bdf /H{}bdf /J{setlinecap}bdf /j{setlinejoin}bdf /M{setmiterlimit}bdf /n{newpath}bdf /N{newpath}bdf /q{gsave}bdf /Q{grestore}bdf /w{setlinewidth}bdf /u{}bdf /U{}bdf /sepdef{ dup where not { FreeHandSepDict } if 3 1 roll exch put }bdf /` {false setoverprint end %. FreeHandDict /-save0- save def pop pop pop pop pop concat userdict begin /showpage {} def 0 setgray 0 setlinecap 1 setlinewidth 0 setlinejoin 10 setmiterlimit [] 0 setdash newpath /languagelevel where {pop languagelevel 1 ne you want changed from your default. EDITING FILES ------------- An important utility that all VAX hackers should be familiar with is the EDT text editor. To call it up, use the EDIT DCL command. ie: $edit [filename] This will invoke the EDIT/EDT text editor. The [filename] refers to the file that you want to edit. If the file does not exist, it is created at this point. The EDT editor does not provide a default file type when creating files, so if you do not specify one, it will lSubject: Re: bAd bbs From: makari (Random Tox) Level Janus: Yo ho ho and a bottle of Demerol Message-ID: References: Date: Thu, 20 Aug 92 03:42:07 EDT thanatos (Thanatos) writes: > i didn't exactly demand to have more access, i just was kinda in a state of > befuddlement b/c he has all this unregistered stuff, and even his bbs in > unregistered, but he's real hypocritical about the whole thing, cuase he > uses unreged ware and doesn't like ul of anarchist stuff..which is more > illegal.. Yes, but the sicko actually stops using the software after a while if its unregistered, unless he can pay for it. Seriously. Creepy, huh? He switches BBS software every week it seems, lately. I remember when it was WWIV. Yick! nda in a state of > befuddlement b/c he has all this unregistered stuff, and even his bbs in > unregistered, but he's real hypocritical about the whole thing, cuase he > uses unreged ware and doesn't likSubject: Re: Anarchy Files From: makari (Random Tox) Level Janus: Yo ho ho and a bottle of Demerol Message-ID: <7ZwsPB13w164w@works.UUCP> References: <4uiBPB2w164w@works.UUCP> Date: Thu, 20 Aug 92 03:44:05 EDT iskra (Iskra) writes: > Hate to disagree with you yet again, Jupitor, but it's illegal to write > instructions for committing a crime. I'm fairly certain about this. Whether > this has particular law has ever stood up in court I do not know. (I doubt > it, but I've been wrong before). Then how can Loompanics legally sell the How to Kill series of books, or whatever it is (Book 1: Your first kill, using a garotte, etc.) iBPB2w164w@works.UUCP> Date: Thu, 20 Aug 92 03:44:05 EDT iskra (Iskra) writes: > Hate to disagree with you yet again, Jupitor, but it's illegal to write > instructions for committing a crime. I'm fairly certain about this. Whether > this has particular law has ever stood up in court I do not know. (I doubt > it, but I've been wrong before).22353@scarlett.ccit.arizona.edu> marleyt@ccit.arizona.edu (Marley Treadwell) writes: >have the guts to say who he was, and just for the record i know. The >problem was discussed and worked out. This petty revenge is stupid and if Discussed and worked out? The guy was killed and toaded. This is what you call being 'worked out'? If you have more information about this, please contradict me. So far as I know, it was *not* petty revenge. >you all supposedly adults want to act like children . BE MY GUEST! but go >back to >nursery school to do. IMHO i am sick and tired of it. Nursery school was kinda fun. >*steps off her podium and waits for flames. Stop baiting the newbies. Keith C. Estanol | storm@ucsd.edu UCSD, Cognitive Science | storm@ucsd.bitnet Institute of Geo and Planetary Physics : kestanol@bull.ucsd.edu --------------------------------------------------------------- "We don't want to be victims, on that we all agree. So we lock up the killer instinct, and throw away the key.." #! rnews 3013 Newsgroups: rec.games.mud.diku Path: merk!alliant!linus!think.com!yale.edu!spool.mu.edu!umn.edu!csus.edu!netcom.com!exel From: exel@netcom.com (Frederick Myers) Subject: Re: TNG DikuMud opend Message-ID: <1992Oct3.222256.9961@netcom.com> Organization: Netcom - Online Communication Services (408 241-9760 guest) References: <1992Oct3.203341.5602@netcom.com> Date: Sat, 3 Oct 1992 22:22:56 GMT Lines: 59 ok, lets see. i get in the mud today and a bunch of people are telling me to go read the news groups because some fool (their words, not mine) decided to post some flames about hopper (tng) diku. ok, well lets see. 1) the prompt -- well if you have bothered to look, the prompt offers the options of having the scroll bar or not ( in either graphic or ascii) or if you want it to be the standard command line prompt (what a lot of diku currently use). so if your computer pukes on the idea of the scroll bar, you do not have to use it. and there is also a 'cls' command. 2) using midgaard -- yeah, we tossed around the idea of zapping midgaard. well, we decided not to because midgaard serves as a good 'ol familiar' to alot of players. if you would have bothered to look, there is also another town (guernica) that for the time is a little trivial to most players ountil the southern continet is done. 3) the say command -- yeah, that space is a toughie. how can you judge a mud bassed on having to type a space after 'say'. 4) about use being lazy and not doing anything-- yeah whatever. you are right, we have not put anything to the mud. it is all generic diku release. NOT. and i think that the commands or whatever else we have put in ( a totally re-written crash and renting code, fixing the game loop, etc etc) are a little bit more than 'bells and whistles'. we take many of the suggestions that are given to us by the players, and try to put as many in as possible. we run the game to make others happy obviously. 4) about having no creativity -- once again i say 'whatever'. yeah, everything on our mud can be seen on other muds. uh huh. yeah, nah, we have no areas that are just on our mud. we have no things (such as the prompt) that are tng only. NOT AGAIN. by no means do i claim tng to be the best. by no means at all. i do not think that any mud can honeslty 100% call itself the best. we try to mke it the best we can. and if you do not like it you do not have to play. there is nothing else to say. i just suggest that people come on and see what it is like b4 judging it based on someones uninformed judgements. just a side thought -- i was reading the flame on deth's mud on this news group too. i dunno'. i think muds such as deth's, ours and some other muds out there are out there and making diku a little bit more interesting by creating new and innovative ideas instead of just adding the same old stuff. reni (co-imp of tng diku, and proud of it) #! rnews 1202 Path: merk!alliant!linus!agate!spool.mu.edu!sol.ctr.columbia.edu!ucselx!crash!slic!mikey From: mikey@slic.cts.com (Mike Shirley) Newsgroups: comp.bbs.waffle Subject: Multiple copies of Waffle Message-ID: <1kV3RB13w165w@slic.cts.com> Date: Sat, 03 Oct 92 09:56:35 PDT References: <1992Oct2.052413.15383@nwnexus.WA.COM> Organization: Muth Valley Seismic Control District, San Diego, CA / Port2 Lines: 19 ralphs@halcyon.com (Ralph Sims) writes: > Ah, true enough. I'm running under DESQview and haven't logged out of > that account in months. 'login' didn't work there, and I never checked > to see if 'manually' coming in via waffle online. Learn something new > every day. I also use Desqview and keep a window open with Waffle local console using "waffle online mikey". I found out the hard way, while leaving that window open for months, not to stay in the mailer will your mail file open. I've lost and/or buggered up a few letters when the dial-in/dial-out window was writing to my mail file. I don't run share. I know I need to watch for these sort of conflicts but I was lazy. Just a reminder from a lazy bum... -- Mike, WB6WUI // INET: mikey@slic.cts.com // GEnie: SLIC #! rnews 927 Path: merk!alliant!linus!agate!spool.mu.edu!sol.ctr.columbia.edu!ucselx!crash!sound!markr From: markr@sound.cts.com (Mark B. Reinhold) Newsgroups: sdnet.waffle,comp.bbs.waffle Subject: Re: COLORS! Keywords: Colors Message-ID: <3c53RB2w165w@sound.cts.com> Date: Sat, 03 Oct 92 13:06:13 PDT References: Organization: SDCT 1-619-461-3415 Lines: 16 mikey@slic.cts.com (Mike Shirley) writes: > So, which colors did you end up with? Did you figure out a way > to do it without re-running Waffle? I change them in the static and then rerun waffle. At this point I have black letters on a green background, which seems pretty relaxing for the eyes. The status bar is suppose to something different but is not. As for the windows, I haven't seen any yet. The problem that I have is that I use VI as my editor, so when I create a message I go back to black background with white letters. Life is fun... #! rnews 1743 Path: merk!alliant!linus!agate!ames!sun-barr!cs.utexas.edu!uwm.edu!linac!att!att!fang!gator!towers!bluemoon!somenode!a-dent From: a-dent@somenode.uucp (Bryan Hannahs) Newsgroups: comp.bbs.waffle Subject: Re: poor transfer rates in Dos Waffle Message-ID: <3Zw3RB2w165w@somenode.uucp> Date: Sat, 03 Oct 92 13:27:13 EDT References: Organization: .sdrawkcaB sgnihT gnipyT roF yteicoS ehT Lines: 27 peterson@ZGNews.LoneStar.Org (Bob Peterson) writes: > I just started talking to another Waffle 1.65 running on a fast 386 > under Desqview-386, X00 FOSSIL locked at 19,200 bps, 7 packet window, > transferring news packets, and see log entries like these. > > 27-Sep-92 19:40 19:44 bluecafe | 4226 sent 38 rcvd 0 errs 1474 cps > 02-Oct-92 04:09 04:13 bluecafe | 5035 sent 38 rcvd 0 errs 1482 cps > 02-Oct-92 17:12 17:13 bluecafe | 1097 sent 9 rcvd 0 errs 1467 cps > > The window size seems critical at these speeds. I've not played with > the (experimental) packet size parameter available in uucico for 1.65, > but that may also have a positive impact. You didn't say what modem the other end is using. If they're using a v.32bis modem instead of just v.32, that would mostly explain it, though the best I've gotten (running Waffle on a 386SX-25 w/a Twincom 14.4DF modem, FOSSIL unlocked, Waffle 1.65 locked at 38400, talking to a Sun Sparc 2 using an HST/v.32bis DS) is about 1450cps, with about 1420cps average. Also, talking to a Supra 14.4 on the same system, I only get about 1110-1140 cps. --- "Man created God in his own image." - Lazarus Long Bryan Hannahs | a-dent@somenode.uucp a-dent@bluemoon.use.com (aka Arthur Dent) | bryan@bluemoon.use.com #! rnews 1189 Path: merk!alliant!linus!agate!ames!sun-barr!cs.utexas.edu!uwm.edu!linac!att!att!fang!gator!towers!bluemoon!somenode!a-dent From: a-dent@somenode.uucp (Bryan Hannahs) Newsgroups: comp.bbs.waffle Subject: Re: Multiple modePath: works!merk!alliant!linus!agate!ames!olivea!spool.mu.edu!sgiblab!kludge!therat!spud!tom From: tom@spud.kludge.com (Tom Lemos) Newsgroups: comp.bbs.waffle Subject: Waffle Offline Reader for 1.65 Message-ID: Date: 29 Sep 92 20:08:29 GMT Organization: Tater Tot Liberation Front, San Francisco CA Lines: 12 hello there... does an offline reader for 1.65 exist? I know of Wafmail but what version works with 1.65 or is the current version compatible. thanks for your help. any offline reader will be helpful,as my users are starting to complain... Tom Lemos (tom@spud.Kludge.COM) Tater Tot Liberation Front "It's Dan Quayle, FORGET about it!" San Francisco, California -Frank Fontana to Murphy Brown. +1 415 255 8340 beration Front, San Francisco CA Lines: 12 hello there... does an offline reader for 1.65 exist? I know of Wafmail but what version works with 1.65 or is the current version compatible. thanks fo