------------------------------------------------------------------------------- ######### ############ ######### ########### ############ ########### #### #### #### #### #### #### #### #### #### #### #### #### ######## ########### #### #### ######## ######### #### #### #### #### #### #### #### #### ########### #### #### ######### #### #### DIGITAL FREE PRESS ------------------------------------------------------------------------------- Volume 1.0 Issue 4.0 ------------------------------------------------------------------------------- * A Publication of The Underground Computing Foundation (UCF) * * Send Subscription Requests to: dfp-req%underg@uunet.uu.net * * Send Submissions to: hackers%underg@uunet.uu.net * * Editor: Max Cray (max%underg@uunet.uu.net) * Back issues can be found in the CUD archives at ftp.eff.org [Note: BBS is not currently up. Sorry.] ------------------------------------------------------------------------------ Statement of Purpose and Disclaimer The Digital Free Press is an uncensored forum to document current activities in and of the world of modern technology. It is published under the premise that it is better to know, rather than not know, so no attempt is made to hide any information no matter how dangerous it may be. Information is a double edged sword. It is neither good nor bad, and can be used for either good or bad. Warning: Some information in this document could be used for illegal activities. Use at your own risk. Articles are the opinion of the authors listed, and not of the editor (unless of course the editor wrote it). Information is not verified for accuracy. ------------------------------------------------------------------------------ ------------------------------------------------------------------------------ In this Issue: 1. Mail to Max 2. Privacy and Electronic Mail by GodNet Raider 3. Hardware Destructive Code by The BBC 4. Invisible Killer Chips by Jean-Bernard Condat 5. Short Takes: - Hacking Remote Access by PeeWee - Little Black Book of Viruses Review by PeeWee - Where to find Online Library Catalogs, and How to get info about DEC's new Alpha chip by Wes Morgan - Compiling C programs on a VMS system by Max Cray 6. Paid Advertisement by UPi 7. FutureCulture (Condensed) by Hawkeye ------------------------------------------------------------------------------ ############################################################################## ------------------------------------------------------------------------------ Mail to Max: ----------- Date: Tue, 28 Apr 92 14:05 GMT From: Jean-Bernard Condat To: Max Cray Subject: RE: DFP #3 Bounce Test Dear Max: The scene in France is very clear: nothing. The police look at what the Chaos Computer Club france (CCCF) make... and the secret services work on several formations for all the people! A lot of anti-virus softwares are available, but some softs are sell with viruses in it (!). I paid US$1,000 pro week like Craig Neidorf... because I "have perhaps possess one hard-to-find NUI"! I mind that the US hacking market is the same: you have some blue box codes available, the French hackers have some "Carte Pastel Internationale" codes... and France Telecom don't make any thing against that. Only some poor teenagers are arrested, but in 60%, they don't found the good people! Can I help you? Jean-Bernard Condat, General Secretary, CCCF B.P. 8005 69351 Lyon Cedex 08, France [Editor's note: Of course you can help! Send all your information to: hackers%underg@uunet.uu.net and I will try to edit it to make it even more useful, and then I will publish it in the DFP!] ----------------------------------------------------------------------------- From: Root of all Evil Account Subject: Re: Digital Free Press #3 To: underg!max (Max Cray) Date: Sun, 26 Apr 92 19:38:24 EDT X-Mailer: ELM [version 2.3 PL11] Dear Mr. Cray, Recently, 4 users of this system complained about receiving copies of your "Digital Free Press". As the distribution site for Phrack, I in no way discourage freedom of electronic speech. I do, however, discourage "cyber junk-mail". Each of the users mentioned they had not specifically asked for this to be sent to them. In the future, please verify any subscriptions of your newsletter through me. The Root of all Evil at StormKing.Com [Editor's note: 'Mr. Cray' ... I like that!] ------------------------------------------------------------------------------ ############################################################################## ------------------------------------------------------------------------------ From: gnr@tsf.UUCP (GodNet Raider) Date: Wed, 26 Feb 92 05:17:53 EST Organization: The CyberUnderground -=[ Privacy and electronic mail ]=- -or- /*************************************/ /* How to whisper over a crowded net */ /*************************************/ - written by - GodNet Raider - of - The CyberUnderground -=[ "Information is the greatest weapon of power to the modern wizard." ]=- ]----------------------------------------------------------------------------[ Introduction: ------------- A while back I was listening to a pro password sysop talk about the 'evils' of hacking. His biggest point was that 'a hacker could read private mail from/to the person whose' account they have accessed. The right or wrong of that point I will leave to others to discuss/flame/get flamed over. What stuck with me was the fact that he like many other sysops and system admin, their friends and whoever else can access the system at high level (or in the case of DOS, can pound the local keyboard), can also read any text messages they wish. Some even feel that it is a god given right to read any mail, strange seeing that the government and even ma bell (remember the phone chase from _the_cuckoo_ nest_ they could not get the phone number for they did not have a valid warrant in in that state) must get a search WARRANT to do the same thing. Well it seems what they feel god has giveth them, GodNet Raider can taketh away. So I thought there must be a simple way to make truly private messages to protect all from this 'hacker threat' and nosey sysops (etc..) as well (without having to resort to using DES and uuencode, for it is slow and a bit of a hassle to use a lot (but it should be noted this is the most secure method). Then I remembered an article I read in The LOD/H Technical Journal, Issue #3. [Editor's note: The Legion of Doom Technical Journals can be found in the CUD archives at ftp.eff.org. Highly recommended.] It contained a basic BASIC program and explanation to a simple text encryption method using cellular automatons by The Mentor (strongly recommended reading for understanding the theory behind the method). After converting the BASIC code for the second program to C (under Minix) I proceeded to make changes to (hopefully improve) it. What I came up with is included at the end of this file (MsgLock.c). Of the changes made: Added the use of stdin/stdout to support a wide extent of I/O methods. Used multiple cells in defining shift amount. Allowed the pass though of char.s not in aszValid array (raw output) to keep message integrity (returns and tabs that a message may gain/lose in some online editors). Added code to expand small key strings to fill out key cells. So I hope you find MsgLock of use and remember... WMIe`H-h(`[ga0)9oW-/V MsgLock wish list/projects: --------------------------- MsgLock is by no means complete following are some suggestions for the obsessed prodigies out there who want to expand on the basic idea. For a more private version one can change: The size of the key cells (#define WIDTH xx). The expansion methods used to fill out the initial key cells. The key cell update method. The order of the char.s in aszValid. Adding/removing char.s from aszValid. Msglock could use a way to know when an encoded area begins and ends (like the 'begin'/'end' in uuencoded files) to save post processing on net messages. Removal of char.s used in quoted messages so that it will not try to process (cook) char.s added to quoted messages. Changes to allow it to be treated like a ASCII Xfer protocol in term packages (qmodem, boyan, kermit)/online by bbs packages (RBBS, etc..) as an auto encrypt for chat/general online use. Or many others I have not thought of. MsgLock source code: -------------------- MsgLock was compiled in Minix using the ACK compatible compiler and under DOS using Turbo C++ using ANSI C compatible commands. Usage: msglock [-d] Key -d(code) : Decode stdin to stdout (MsgLock otherwise encodes stdin to stdout. -d is only used for decoding if followed by a space and is the first parameter following the command ('-dKEY' will be used as a key to encode stdin, use '-d -dKEY' instead to decode) Key : String of char. used to encode/decode stdin to stdout. String can contain spaces. Examples: msglock key file2.txt Encode file 'file1.txt' to 'file2.txt' using the key string 'key'. msglock -d this is the key com1 (/dev/tty1 for minix users) Encode keyboard input (using the key 'knowledge is power') directly to the device/terminal on com port 1. +---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+ /* MsgLock.c by GodNet Raider. Based on a program for encrypting using cellular automaton by The Mentor Allows encoding of text for transmittal over computer nets and BBSs. This program is not to DES standards and should not be considered 100% secure by any means. */ #include #include #include #include #define TRUE 1 #define FALSE 0 #define SPACE 0x20 #define WIDTH 50 #define MAX_CELLS (WIDTH + 2) char *aszErrMsg [] = { "Usage: msglock [-d(ecode)] Key", "Write error on stdout.", "Read error on stdin." }, asCells [2] [MAX_CELLS], /* Not using 0 offset to prevent errors caused by the fact that */ /* (0 % x == x % x). */ aszValid [] = "\xff\ABCDEFGHIJKLMNOPQRST" "yz1234567890!@#$%^&*()-=_+[]{};:'.><,/?\\| \`\"", fActive = 0, fDecode = FALSE; void main (int, char **), FatalErr (int); void main (argc, argv) int argc; char *argv []; { char sWorkKey [WIDTH], cInChar; int nArgCnt = 1, nTmpCnt1 = 1, nTmpCnt2 = 0, nValidSize; nValidSize = strlen (aszValid) - 1; /* Check for missing parameters. */ if (argc == 1) FatalErr (1); /* Check if decode, else default to encode */ if (*argv [1] == '-' && toupper (argv [1] [1]) == 'D' && !argv [1] [2]) { /* Check for missing parameters, again. */ if (argc < 3) FatalErr (1); fDecode = TRUE; nArgCnt++; } /* Move key in to encode/decode key cells to the max set by WIDTH. */ while (nTmpCnt1 <= WIDTH && nArgCnt < argc) if (argv [nArgCnt] [nTmpCnt2]) asCells [1] [nTmpCnt1++] = argv [nArgCnt] [nTmpCnt2++]; else if (++nArgCnt < argc) { asCells [1] [nTmpCnt1++] = SPACE; nTmpCnt2 = 0; } nTmpCnt2 = 1; /* Fill unused cells in key cells up to WIDTH. */ while (nTmpCnt1 <= WIDTH) asCells [1] [nTmpCnt1++] = asCells [1] [nTmpCnt2++] ^ asCells [1] [nTmpCnt1 - 1]; /* Process stdin. */ while ((cInChar = (char) getc (stdin)) != EOF) { /* Check if char. is in aszValid list, if so cook, */ /* else let it pass though raw. */ nTmpCnt2 = nValidSize; while (nTmpCnt2 && aszValid [nTmpCnt2] != cInChar) nTmpCnt2--; if (nTmpCnt2) { /* Update key cells, excluding head and tail. */ for (nTmpCnt1 = 1; nTmpCnt1 <= WIDTH; nTmpCnt1++) asCells [fActive] [nTmpCnt1] = asCells [fActive ^ 1] [nTmpCnt1 - 1] ^ (asCells [fActive ^ 1] [nTmpCnt1] | asCells [fActive ^ 1] [nTmpCnt1 + 1]); /* Update head of key cells. */ asCells [fActive] [0] = asCells [fActive ^ 1] [WIDTH + 1] ^ (asCells [fActive ^ 1] [0] | asCells [fActive ^ 1] [1]); /* Update tail of key cells. */ asCells [fActive] [WIDTH + 1] = asCells [fActive ^ 1] [WIDTH] ^ (asCells [fActive ^ 1] [WIDTH + 1] | asCells [fActive ^ 1] [0]); /* Get char shift offset value */ cInChar = (asCells [fActive] [1] & 0x7f) % WIDTH; /* Get char shift value */ cInChar = asCells [fActive] [(cInChar ? cInChar : WIDTH)]; /* Switch to updated key cells for next pass. */ fActive ^= 1; /* If decode is TRUE then shift left though aszValid, else */ /* shift right (negative numbers in cInChar reverses this). */ if (fDecode) { /* Needed to bypass warning message (turbo C++ gets */ /* confused sometimes when it sees a single '=' in */ /* an 'if' statement, even though it is bracket to be */ /* evaluated before the 'if'). */ #ifdef __TURBOC__ if ((cInChar = nTmpCnt2 - cInChar) != 0) #else if ((cInChar = nTmpCnt2 - cInChar)) #endif { if ((cInChar %= nValidSize) < 1) cInChar = nValidSize + cInChar; } else cInChar = nValidSize; } else if (!(cInChar = (nTmpCnt2 + cInChar) % nValidSize)) cInChar = nValidSize; /* Write cooked char. to stdout. */ if (putc (aszValid [cInChar], stdout) == EOF && ferror (stdout)) FatalErr (2); } else /* Write raw char. to stdout. */ if (putc (cInChar, stdout) == EOF && ferror (stdout)) FatalErr (2); } /* Check for file error on stdin. */ if (ferror (stdin)) FatalErr (3); /* End program run. */ exit (0); } void FatalErr (ErrNum) int ErrNum; { /* In every life a little rain must fall. */ /* Complain and bail out. */ fprintf (stderr, "\n%s\n", aszErrMsg [ErrNum - 1]); exit (ErrNum); } +---- Cut Here ----+---- Cut Here ----+---- Cut Here ----+---- Cut Here ---+ ]============================================================================[ ...uunet!underg!tsf!gnr (GodNet Raider) -=[ "You gotta learn to listen, before you learn to play." ]=- ------------------------------------------------------------------------------ ############################################################################## ------------------------------------------------------------------------------ To: hackers@tsf.UUCP Subject: Text phile 5. From: bbc@tsf.UUCP (The BBC) Organization: The CyberUnderground Da da.. da da dup... Da da.. da da dup... Da da.. da da dup... Yes boys and girls... It time once again for your favorite waste of humanity... Yes it the BBC's Hackit J. Squirrel and crashwinkel The moose show... So put your antlers on and lets now go to the magical land of frostbite Falls Min. An see what our heroes are up to... Golly gee Hack... Every time I crash a sysops hard drive with a trojan... they just reformat the drive and reinstall the software and are up and running again... I wish there was a way to bring them down that would really give them something to think about... Maybe there is lets go see Mr. Woopie and his 3D BBC, crashwinkel... So our HEROES went to see Mr. Woopie... But where confronted by Tennessee tuxedo and his friend chumly... But a quick squeeze of the trigger on their semi automatic weapons and a short thank you note to the NRA... An they where in... So you boys want to know how to cause more than just data loss with trojans? Well lets ask the 3D BBC... Thank you Mr. Woopie... It sounds like you boys want to hear about how to force hardware problems using software... 'Wow Hacket.I only thought you could only do major data loss with trojans.'... Yes but there are other nasties you could pull if you want to... Take this simple bit of code for example: =============================================================== mov Ax, 0508h mov CX, 8001h mov DX, 0000h int 13 =============================================================== This small bit of codes just moves the disk heads past the inner most track... 'But what good is that BBC?'... Well our furry little friend... Some disks will lock and the only way to fix it is to open the bugger up... An since the only way to be sure this will or won't work is to try it... Well... Or how about this bit of code: =============================================================== xor Al, Al NextPass: mov DX,ffffh NextPort: out DX, AL dec DX jnz NextPort inc AL jmp short NextPass =============================================================== We like to call it armageddon... 'Ohhh, Ahhhh'... It simply looks for and writes to every port in the system... An based on the hardware in the system it can... Toast monitors, Change CMOS values, Change stepper rates, Change voltages (to burn/disable cards, boards, and memory), Reek havoc on co-processers, Disable networks, As well as other nasties too numerous to mention... Seeing that there is some time involved in writing all those ports... The poor fool has some time to guess what is going on and shut the computer down (oh about 4 min.)... 'But we can't test things like that on our computers.' 'How will we know if it will work or not.'... Who said to test it on your systems... Not that we would suggest you test it on others systems... That would make you a wast of humanity like... The BBC ---------------------------------------------------------------------- ...uunet!galaxia!divinity!tsf!bbc (The BBC) -=[ "Anarchy is never HAVING to say you're sorry." ]=- ------------------------------------------------------------------------------ ############################################################################## ------------------------------------------------------------------------------ Invisible Killer Chips Now Available Intelligence Newsletter (10 rue du Sentier, 75002 Paris, France) No. 186 (Jan. 29, 1992), page 2, ISSN 0997-7139 By: Jean-Bernard Condat (CCCF, B.P. 8005, 69351 Lyon Cedex 08, France) The military use of computer viruses is often overblown, if not just simple disinformation as in the recent Iraqi case. But researchers at Boston University have developed and patented (U.S. patent 5 049 775) an infinitely more offensive and effective anti-computer agent: the silicon ant. Micro-electronics has perfected technologies for making toys and machines so small that they are invisible. Using piezoelectric ceramics which expand or contract under an electric current, the researchers constructed a microscopic ship with three "legs" on each side and a "cutter" in front. By alternating current in different sides of each "leg", it bends forward or backward. Under remote control the killer chips can be "walked" into a computer and cut up other microscopic chips, turn around and "walk" away, leaving invisible damage in the computer system. The killer chips could be solar powered and therefore have an indefinite life-span. PATENT DESCRIPTION 008245420 WPI Acc No: 90-132421/17 XRPX Acc No: N90-102550 Piezoelectric micro-machine or robot basic operating unit - made by covering silicon cantilever beams projecting from frame with piezoelectric material when applied voltages cause them to deflect Patent Assignee: (UYBO-) BOSTON UNIV Author (inventor): SMITS J G Number of Patents: 002 Patent Family: CC Number Kind Date Week WO 9003665 A 900405 9017 (Basic) US 5049775 A 910917 9140 Priority Data (CC,No,Date): US 251565 (880930); Applications (CC,No,Date): WO 89US4129 (890921); EP and/or WO Language: English EP and/or WO Cited Patents: No.SR.Pub Designated States (National): JP (Regional): AT; BE; CH; DE; FR; GB; IT; LU ; NL; SE Abstract (Basic): WO 9003665 An electrical micromachine is made by securing films (20,22) of piezoelectric material to the top surfaces (16,18) of crystalline silicon beams (12,14) projecting from a crystalline silicon body (10) to form a bimorph structure. A potential applied across the ends (24,26) of the piezoelectric films causes the beams to deflect. The piezoelectric material used is zinc oxide. A number of such micromachines can be assembled to form a robot, and when a foot (30) is provided the machine can move itself along a surface by sequential deflecting and straightening of the beams. The foot can be associated with a toothed wheel to produce rotary motion. The micromachine may be solar powered, and can be associated with sensors or a microprocessor with programmable memory. USE - Microsurgical tools, and robots for grasping, carrying or cutting tasks. @(33pp Dwg.No.1/10)@ Abstract (US): 9140 US 5049775 The piezoelectric actuation machine comprises two cantilever beams extending from a frame. The beams comprise a piezoelectric material such that application of an electric potential across the material of each beam rotationally diplaces the first and second beams relative to each other. An actuating member is secured between displaceable surfaces on the beams and extends orthogonally from a plane through the beams such that relative displacement of the beams displaces a portion of the member in a direction orthogonal to beam displacement. A rigid object contacting the displaced portion of the member is translated relative to the member and the frame. USE - For piezoelectric micromachines e.g. small robot or cutting tool. @(17pp)@ File Segment: EPI Derwent Class: S05; V06; X25; R46; Int Pat Class: H01L-041/09 Manual Codes (EPI/S-X): S05-B; V06-M06D; X25-A03E Jean-Bernard Condat General Secretary Chaos Computer Club France B.P. 8005 69351 Lyon Cedex 08, France Tel.: +33 78 61 15 88 ------------------------------------------------------------------------------ ############################################################################## ------------------------------------------------------------------------------ Short Takes: ----------- ------------------------------------------------------------------------------ From: uunet!uga.cc.uga.edu!ART30275%NUSVM.BITNET (PeeWee) Hey, press alt-200 (on the numberpad) to access the highest level menu in Remote Access v1.10. Often lets u shell out to DOS. ------------------------------------------------------------------------------ From: uunet!CUNYVM.CUNY.EDU!ART30275%NUSVM.bitnet (PeeWee) Hey! have you got your copy of The little black book of Computer viruses yet? It's very detailed and good! I had to order it and have it shipped over here to me, took me about 3 months (worth the wait!) The ISBN is 0-929408020 Author: Mark Ludwig, Publisher: American Eagle ------------------------------------------------------------------------------ From: Wes Morgan Obligatory Information Pointers: List of Online Library Catalogs: Anonymous ftp from ftp.unt.edu (129.120.1.1) in directory /pub/library. Versions are available in plaintext, PostScript, and WordPerfect 5.0. [Editor's note: With these lists of online library catalogs you can find out much information by learning what libraries have the info that you need, and then requesting it via an inter-library loan.] DEC's new Alpha chip (for you hardware fanatics): Call 1-800-332-2717 and ask for the "Alpha Packet". They'll send you the Architecture Handbook (detailed) and more information about the Alpha chip. ------------------------------------------------------------------------------ From: Max Cray On a VMS system you can not simply type 'CC HELLO.C' to compile a C program. First you have to define a Link Library. This command will work for a generic program that does not need floating point: DEFINE LNK$LIBRARY SYS$LIBRARY:VAXCRTL For more information use the excellent help system in VMS. Simply Type 'HELP CC'. ------------------------------------------------------------------------------ ############################################################################## ------------------------------------------------------------------------------ PAID POLITICAL ADVERTISEMENT UPi has once again returned and it no longer the shit group it used to be in the past. UPi is a group that puts out newsletters that deals with the H/P/C/A world. In the past, our newsletters averaged only 1 article in length (which in size means a range of 25-50k) but now in the all new UPi newsletter we have decided to expand it so it will contain more articles (and all quality articles which means no more of those little shitty files that contains useless information). What we are looking for are quality members and sites that are willing to contribute to the group and support the group. We are also looking for people who can freelance write for us too. We are looking for people who are experienced in electronics and chemistry, and as well as any of the P/H/C/A topics. If you would like to join UPi either as a site or a member or become a freelance writer for us please send mail to The Lost Avenger via internet e-mail to the following address Tla@Maria.Wustl.Edu or you can contact him on his voice mail box at 416-402-0788. The Lost Avenger/UPi ------------------------------------------------------------------------------ ############################################################################## ------------------------------------------------------------------------------ From: uunet!isis.cs.du.edu!ahawks (floyd) Subject: FutureCulture Update To: hackers%underg@uunet.uu.net Date: Tue, 12 May 92 20:38:20 MDT [Editor's note: This is an edited version of Hawkeye's excellent e-mail FutureCulture listing. It is intended to deal with the entire CyberPunk/Rave scene and thus is rather large and comprehensive. I edited out most of the cultural listings, and left most of the tech listings, since I intend for the DFP to be more of a technical journal. However it is highly recommended that you send him mail and get on the mail list.] _____________________________________________________________________________ | | | Magazines (hardcopy) of interest: | |_____________________________________| Communications of the ACM (Association for Computing Machinery, Inc.) -sorry, don't have the address or subscription info, but should be available at any decent newsstand - also, the ACM has forums available on the Internet Cybertek OCL/Magnitude PO Box 64 Brewster, NY 10509 -hacking, cyberpunks, technology, culture $10 a year Fact Sheet Five 6 Arizona Avenue Rensselaer, NY 12144-4502 518.479.3707 -independently-oriented reviewers of the culture $3.50 an issue, $33 a year for 8 issue subscriptions (unconfirmed rumors say it's no longer in production) Hac-Tic pb 22953, 1100 DL Amsterdam, The Netherlands ropg@ooc.uva.nl (Internet) -published near that hotbed of hackers in holland/amsterdam European counterpart to 2600 $2.30 US an issue [Editor's note: The above is not in English! Is there a translator?] Intertek: The Cyberpunk Journal Steve Steingerg 325 Ellwood Beach #3 Goleta, CA 93117 steve@cs.ucsb.edu -formerly Frank Drake's W.O.R.M hacking, cyberspace, interviews, designer drugs, cryonics, etc. $2.50 an issue Iron Feather Journal PO Box 1905 Boulder, CO 80306 -hacking, anarchy, techno-phun $2 an issue Mondo 2000 PO Box 10171 Berkeley, CA 94709 415.845.9018 (phone) 415.649.9630 (fax) mondo2000@mcimail.mci.com -your definitive guide to all things cyberpunk and some things not should be available at any decent newsstand was Reality Hackers and High Frontiers $21 for 5 issues (published quarterly) TAP PO Box 20264 Louisville, KY 40250 -the original phreaker's rag, begun by Abbie Hoffman formerly YIPL (Youth International Party Line) and then it was Technilogical Assistance Program, now it's Technilogical Advancement Party hacking, anarchy, some political has undergone many publishing changes operates Blitzkrieg BBS @ 502.499.8933 TAP-Online also available on some BBSes / FTP sites 2600 PO Box 752 Middle Island, NY 11953-0752 516.751.2600 (office) 516.751.2608 (fax) 2600@well.sf.ca.us (Internet) -the original infamous hacker's zine subscriptions are $21 for 4 issues (published quarterly) back issues are $25 / year [Editor's note: They also have meetings on the first friday of the month in New York City.] Whole Earth Review PO Box 38 Sausalito, CA 94966-9932 (Whole Earth runs The Well [Whole Earth Lectronic Link] - well.sf.ca.us) -combines new age, techno-culture, california fads, etc. should be available at any decent newsstand $20 year for subscriptions ____________________________________________________________________________ | | | E-Magazines and digests: | |_____________________________| [Editor's note: I edited out the listings that did not have references on how to get them. Suffice it to say that there are many more journals available that are not listed here. See some of the Internet and BBS listings for places to find these items.] Activist Times Incorporated gzero@tronsbox.xei.com -political, hacking, anarchy Computers and Academic Freedom listserv@eff.org -computing freedom, mostly deals with college campuses Computer Underground Digest tk0jut2@niu.bitnet Digital Free Press dfp-req%underg@uunet.uu.net -hacking, information, etc. EFF News (EFFector Online) effnews-request@eff.org -sends out EFFector Online, the Electronic Frontier foundation's e-journal Freaker's Bureau International au530@cleveland.freenet.edu -anarchy, hacking, cyberpunk Informatik inform@doc.cc.utexas.edu -hacking, phreaking, computer underground, cyberpunk, etc. Network Information Access nia@nuchat.sccsi.com -hacking, computer underground, etc. Phantasy Mercenary@f515.n141.z1.fidonet.org -anarchy, hacking Phrack phracksub@stormking.com -need we say more - the one, the only hacking e-zine... Pirate Radio brewer@ace.enet.dec.com -pirate radio RISKS Digest risks-request@csl.sri.com -the RISKS of computing in our lives Telecom Privacy Digest telecom-priv-request@pica.army.mil -deals with privacy aspects of telecommunications most of the conversation revolves around Caller-ID and such Telecom Digest telecom-request@eecs.nwu.edu -deals with all aspects of telecommunications Virus-l Digest krvw@cert.sei.cmu.edu (also virus-l on BITNET) -discussion of viruses and all aspects of 'em Worldview - Der Weltanschauung fox@nuchat.sccsi.com -hacking, computer underground, church of subgenius, political, etc. _____________________________________________________________________________ | | | E-Mail Addresses: | |____________________| (please use care and consideration when mailing to these people) Aristotle uk05744@ukpr.uky.edu John Perry Barlow barlow@well.sf.ca.us Dorothy Denning denning@cs.georgetown.edu Peter J Denning pjd@cs.gwu.edu Desert Fox dfox@taronga.com Dispater dispater@stormking.com The EFF eff@eff.org Freaker's Bureau Int'l au530@cleveland.freenet.edu Gatsby gatsby@ryptyde.tcs.com Mike Godwin mnemonic@eff.org Emmanuel Goldstein emmanuel@well.sf.ca.us Ground Zero gzero@tronsbox.xei.com Hactic ropg@ooc.uva.nl Hawkeye (put this art. together)ahawks@nyx.cs.du.edu Intertek steve@cs.ucsb.edu Judge Dredd elisem@nuchat.sccsi.com Mitch Kapor mkapor@eff.org Knight Lightning (Craig Neidorf)knight@well.sf.ca.us kl@stormking.com Lord Macduff macduff@nuchat.sccsi.com Mentor (Lloyd Blankenship) cs.utexas.edu!dogface!fnordbox!loydb Mondo 2000 mondo2000@mcimail.mci.com Gordon Meyer 72307.1502@compuserve.com Peter G Neumann neumann@csl.sri.com Pengo (Hans Heubner) hans@trabant.at John S Quarterman jsq@tic.com Len Rose len@netsys.netsys.com RU Sirius rusirius@well.sf.ca.us Cliff Stoll cliff@cfa.harvard.edu Michael Synergy synergy@metaphor.com Jim Thomas tk0jut1@niu.bitnet Tuc tuc@stormking.com 2600 2600@well.sf.ca.us [Editor's note: How about Eric S. Raymond author of 'The New Hacker's Dictionary'? He is at: eric@snark.thyrsus.com. Also Belgorath provides these alternate addresses: Hans Huebner (aka Pengo) is hans@trabant.artcom.de, or hans@skoda.vie.artcom.de Cliff Stoll (No known alias) is stoll@earthquake.berkeley.edu] _____________________________________________________________________________ | | | FTP Sites: | |______________| (all of these sites carry either computer underground information, information on drugs, music, subgenius, etc.) 18.26.0.36 lcs.mit.edu 18.26.0.179 zurich.ai.mit.edu 128.6.4.15 pyrite.rutgers.edu 128.6.60.6 quartz.rutgers.edu 128.8.2.114 sayshell.umd.@edu 128.83.132.20 ?? 128.95.136.1 milton.u.washington.edu 128.100.3.6 ftp.cs.toronto.edu 128.135.46.7 ?? 128.135.252.7 ?? 128.174.5.50 @uxc.@cso.@uiuc.@edu 128.214.6.100 @nic.@funet.fi 128.235.33.1 ?? 128.252.135.4 @wuarchive.@wustl.@edu 129.173.4.5 cs.dal.ca 130.18.64.2 ?? 130.43.2.3 bric-a-brac.apple.com 130.56.96.2 ?? 130.71.192.18 stolaf.edu 130.234.0.1 jyu.fi 131.188.31.3 faui43.informatik.uni-erlangen.de 131.210.1.4 cs.uwp.edu 133.137.4.3 ?? 134.60.66.21 ?? 134.95.132.2 aix370.rrz.uni-koeln.de 137.39.1.9 uunet.uu.net 146.169.3.7 ?? 192.88.144.4 eff.org 192.88.209.5 cert.sei.cmu.edu _____________________________________________________________________________ | | | BBSes: | |__________| 201.451.3063 Wrong Number 203.485.0088 Rune Stone 203.628.9660 Dark Shadows 206.454.0075 Manta lair 209.526.3194 Tequilla Willie's Great Subterranean Carnival 214.324.3501 KeelyNet 214.522.5321 Dead Zone 215.449.1902 Time Enough for Love BBS 303.438.1481 The Kracker Box 303.871.4824 Nyx (public access unix) 312.528.5020 Ripco 401.847.2603 Underground 414.789.4210 PC Exec 415.332.6106 The Well 415.472.5527 The Cyberden 502.499.8933 Blitzkrieg 503.635.2615 Awakening Technology 512.447.4449 The Illuminati BBS 517.337.7319 Pure Nihilism 602.861.3167 Frayed Ends 617.475.6187 Convent 617.861.8976 The Works 618.549.4955 Free Speech 708.672.5426 World Trade Center 713.242.6853 Face-2-Face 718.358.9209 Switchboard 718.428.6776 Milliways 806.794.4362 Demon Roach Underground 914.761.6877 Uncensored 916.673.8412 Greenpeace's Inverted Granola Bar -- [Editor's note: The Underground is no longer up (I moved). Perhaps at a later date I will put it back up. Other Boards I know about: 408.241.9760 NetCom - Network Access 408.245.7726 darkside.com (The Waffle support BBS) 408.867.7400 Spies in the Wire Most Notorius hangout for hardened Cyber- Criminals. Ask for access to 'The Good Stuff' and tell them Max sent ya. 602.894.1757 Unphamiliar Territory NUP (New user Password) 'Bunnylust' 717.361.0947 Digital Warfare Phalcon-Skism, 40 Hex Mag, Viruses (Sorry, forgot the NUP) 916.481.2306 Phun Line Password 'Darkness has Fallen' 359.2.20.4198 Virus eXchange BBS in Sofia, Bulgaria Working hours: 20:00 - 06:00 GMT (in the winter) 19:00 - 05:00 GMT (in the summer) Also the NUP for Blitzkrieg is 'Columbian Coke'.] _____________________________________________________________________________ | | | Merchandise/Companies: | |__________________________| (a lot of the companies on this list are on the very edge of the underground, and would not exist but for the 1st amendment - please use caution and care when dealing with these people, and don't abuse them, otherwise you'll ruin it for us all!) Abbie Yo-Yo Inc. PO Box 15 Worcester, MA 01613 -things related to Abbie Hoffman Amok PO Box 861867 Terminal Annex Los Angeles, CA 90086-1867 -hard to find/underground books catalog is a whopping $9 (400 pages) Autodesk, Inc. 2320 Marinship Way Sausalito, CA 94965 -makers of Chaos software. $59.95 Books by Phone Box 522 Berkeley, CA 94701 800.858.2665 (orders) 510.548.2124 (info) -large library of hard-to-find books related to CP, drugs, etc. nice resource, but you pay a lot for it :-) Consumertronics 2011 Crescent Dr. PO Drawer 537 Alamogordo, NM 88310 505.434.0234 500.434.0234 (fax - orders only) -hacking/phreaking manuals Feral House Productions PO Box 861893 Los Angeles, CA 90086-1893 -obscure books Further Connections Waves Forest PO Box 768 Monterey, CA 93940 -fringe science Kodak's Center for Creative Imagining 800.428.7400 -offers classes in electronic imaging "taught by artists and industry experts with state-of-the-art technology" anyway, call 'em and ask 'em for their catalogue - might be decent (at least the ad in Mondo looks nifty :-) Loopmanics, Ltd. PO Box 1197 Port Townsend, WA 98368 -carries a large collection of underground/hard-to-find books and stuff send for a catalog NewTek, Inc. 215 SE 8th St. Topeka, KS 66603 800.843.8934 -makers of the great Video Toaster send 'em $4.95 for a demo tape of what the Video Toaster does Paladin Press PO Box 1307 Boulder, CO 80306 -obscure books Re/Search Publications 70 Romolo Street #B San Franssico, CA 94133 Rip Off Press PO Box 4686 Auburn, CA 96504 Sense8 1001 Bridgeway #477 sausalito, CA 94965 415.331.6318 415.331.9148 (fax) -vr firm Survival Books 11106 Magnolia Blvd. North Hollywood, CA 91601 TOPYUS (Psychic TV) PO Box 18223 Denver, CO 80218 -Genesis P-Orridge's Psychic TV send a SASE for info on Psychic TV, catalogs, albums, t-shirts, videos, books, etc. Virtual Research 1313 Socorro Ave Sunnyvale, CA 94089 408.739.7114 -a vr firm VPL Research, Inc. 656 Bair Island Rd. Suite 304 Redwood, CA 94063 415.361.1710 -Jaron Lanier's famous virtual reality firm Zentech Box 138 Morgan Bay Rd. Surry, ME 04684 -cyberpunk, virtual reality merchandise _____________________________________________________________________________ | | | see ya! | |___________| Welp, that looks like it for now. Have fun! Again, if you have any questions/comments/concerns/criticisms/corrections or any additional info, please contact me at ahawks@nyx.cs.du.edu - or on The Kracker Box BBS at 303.438.1481. I can be reached at: ahawks@nyx.cs.du.edu, or ahawks@isis.cs.du.edu. ------------------------------------------------------------------------------ ############################################################################## ------------------------------------------------------------------------------ Personal Notes: Hello to the RI Hackers from the New Texas Hacker. Metacom2 send me mail! Well folks, thats all for DFP #4. Keep that e-mail coming! Downloaded From P-80 International Information Systems 304-744-2253