ÃÄÄÄùú "RaGE - Coming to you like an affliction, úùÄÄÄ´ ÃÄÄÄùú Leaving you like an addiction." úùÄÄÄ´ 01110010 01100001 01100111 01100101 ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ sselhtuR ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ Ruthless stsichranA ÛÛ ÛÛÛÛÛÛÛÛ ÛÛ ÛÛ ÛÛ ÛÛ Anarchists gnitteG ÛÛ ÛÛ ÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ Getting nevE ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ Even ÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ 01110010 01100001 01100111 01100101 An H/P/A Mag for the 90's. Issue #1, released 01/13/95 .úùÄÄÄÄ´ Table of Kontentz ÃÄÄÄÄùú. I. K0mpUtiNg tOpiX 1. Masters of Deception 2. Intel Pentium Controversy 3. Cracking "Pathways into Darkness" II. FoNe pHUn 1. USA Telephone System 2. 1-800-825-5xxx Scanlist 3. 1-800-FUCK-ATT III. KaUZinG KaoS 1. Gerbil Feed Bomb 2. Gelled Flame Fuels 3. Mercury Fulminate 4. HMTD 5. Picric Acid from Aspirin 6. Red/White powder propellant IV. iMPR0v153d D3t0N4t10n T3chNiqUe5 1. Clothespin Switch 2. The Knife Switch 3. Mousetrap Switch 4. Pull-loop switch V. Ev3ry7h1nG El53 1. Internet Editorial 2. Hypocrites? Editorial .úùÄÄ[ø]Äð K0mpUtiNg tOpiX ðÄ[ø]ÄÄùú. ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ Masters of Deception À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ "Cyberspace Hacker Gangs Gain Revenge on Author" - Joshua Quittner's book exposed the hacker war, so they took over his phone line, voice mail, and filled his on-line account with messages. In his forthcoming book, "Masters of Deception: Gang Wars in Cyberspace, "writer Joshua Quittner chronicles the bizarre but true tale of a Harfiled-and-McCoys feud in the nether world of computer hackers. Now the hackers have extracted revenge for Quittner's attention, taking control of his phone line and voice mail and bombarding his online account with thousands of messages. To wreak their hacker havoc, they broke into computer systems run by Sprint Corp., International Business Machines Corp., and Pipeline, which provides Internet access to consumers. Billing themselves as the Internet Liberation Front, the pranksters have warned corporate America to get out of cyberspace, declaring war "on any company suspected of contributing to the demise of the Internet." The antics and break-ins underscore the security risks as companies seek a presence on the Internet, and point up how difficult it is to stop hackers from going where they please. "I don't believe I've ever been hacked to this degree," said Quittner, whose book, written with his wife, Michelle Slatalla, was excerpted in the latest issue of Wired magazine, apparently prompting the attack. The article and book tell of the Long Island hacker gang Masters of Deception and its "war" with a rival break-in group, the Legion of Doom. "People in MOD and LOD are very unhappy about the story," Quittner says. "This is what I believe prompted this whole thing." During the Thanksgiving weekend, the offended computer prowlers took command of Quittner's phone line and forwarded it to an out-of-state answering machine, substituting his greeting with a profane message of their own. One former MOD member was able to patch through a call to someone claiming to be a member of the Internet Liberation Front. He, in turn, played the messages left by Quittner's friends and family on the bogus answering machine they had set up. The messages included a call from Quittner's mother asking about her grandchildren and noting, "I think you ought to check your answering message." Another came from Quittner himself, after he realized he'd been had: "Very funny, guys." The group also zapped tens of thousands of messages to his E-Mail account, as well as about 1,000 messages to the mailbox of Wired magazine. The messages came from computers owned by IBM, Sprint, and Pipeline. Hackers had broken in and installed a script to fire off the Internet Liberation Front message to Quittner every five seconds. The "mail bombs" were "probably closely related to the Quittner article," said Ian McFarland, a Wired engineer. Sprint had to shut down several computers for about four hours, a company spokesperson said. "I don't know if it's an organized group," he said of the Internet Liberation Front. "We never heard of them before." The Masters of Deception was a notorious gang of clever New York teens whose on-line pranks landed four of them in jail. In Quittner's book, he sympathetically tells the story of young hackers who, in their quest for knowledge, go too far. "A number of them got sent to jail when they should have been sent to college," he said. In 1992, MOD was charged with tampering or stealing passwords to gain services from computers at the former Southwestern Bell Corp., now SBC Communications; British Telecommunications PLC's North American subsidiary, BT North America; TRW Inc., and NYNEX Corp., among others. The Wall Street Journal, New York GD: Internet Liberation Front.. now why can't we see more of that shit? Finally some dudes who know what they're doing. ÃÄÄÄùú "Every time we try to impose order, we create chaos.." úùÄÄÄ´ ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ The Intel Pentium Controversy À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ Last summer, Intel discovered a flaw in their new Pentium processor which caused errors in some floating-point calculations. Since the chances of an error were slim, with a 1 in 5 million chance of an error occurring, the famed microprocessor chip corporation decided to wait to fix the error until the fall of 1994. All they had to do was add one instruction. Intel recently took responsibility for the error and has announced a free replacement Pentium chip for all customers. The total number of Pentium processor owners worldwide tops 2 million, putting quite a burden and an expense on Intel. The biggest concern is for scientists in the fields of research and development who rely heavily on ultimate accuracy and speed in their computers. Normal games and word processor programs could not be affected in a large way by the Floating-point Division (FDIV) bug. Instead, government agencies, businesses, and laboratories are more prone to disaster due to their direct reliance on exact calculations. The fact that the Pentium processor is supposed to be the fastest and most advanced microprocessor for Personal Computers causes those who need the speed and power to rush out, pick up a Pentium system, and expect it to be inperfect condition. No one would think it would be necessary to check their calculations elsewhere. Intel has created a disaster for themselves, and in the future, who will make the chips for the PC's? For many years, there has seemed to be a monopoly of sorts in the PC world. You get an IBM or compatible system, and what often comes with it? Microsoft software and Intel processors. Due to this incident alone, the PC world may have lost their faith in the Intel products. Below is a C++ source code for a program to check a pentium chip to see if it has the FDIV bug. It has been distributed since the bug was announced, and its author is unknown. --CUT-- #include #include #include void main() { double x,y,z; x = 4195835.0; y = 3145727.0; /* Divide x by y The correct answer is 1.333 820 449 136 241. Bad Pentiums'll return 1.333 739 068 902 038. That's wrong. */ z = x - (x / y) * y ; if ( fabs(z) >= 1.e-1) { cout << " This CPU has the FDIV bug " << endl; cout << " 4195835 / 3145727 should equal 1.333820449136241 " << endl << " while your CPU yields " ; cout << " " << setprecision(16) << x/y << endl ; } else cout << "This CPU does not have the FDIV bug " << endl; /* Another example cout << (1.0/824633702449.0)*824633702449.0 << " should be 1" << endl ; cout << 824633702449.0 - (1.0/824633702449.0)*824633702449.0*824633702449.0 << " should be 0" ; */ return; } --CUT-- GraveDigger/uuDW ÃÄÄÄùú "We have determined that your whole system sucks." úùÄÄÄ´ ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ Cracking Pathways Into Darkness À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ Copy Protection -- When launching Pathways Into Darkness for the Macintosh for the first time, it will ask you to enter a specific monster sequence that can be found in the original manual (on the bottom of the pages). But seeing how you wouldn't need this text file if you had the REAL manual I guess I'll have to give them to you! In order to do this right the first time your gonna have to know a few things about how the manual is setup. In order to beat the copy protection you have to click on FOUR monsters upon the initial startup of Pathways. There are more than FOUR monsters displayed, but you ONLY have to click on FOUR. Alright in the REAL manual there are sets of FOUR monsters on the right and left sides of each page starting from page #1 and finally ending on page #19. Below are a bunch of descriptions I made up for you to identify each monster, a key that I made up so you will know which monster is which, and a listing of all the monsters IN ORDER on each page of the original manual. Descriptions -- Headless - No head, only a large tongue sticking out surrounded by teeth. Ooze - The faceless dude with an open stomach that looks like a mouth. Nightmare - That fishy looking thing with wiskers and beady eyes. Ghoul - The hunchback guy that's wearing a loincloth. Zombie - The skeleton dood that looks egyptian. Skitter - The only one there that resembles a spider. Key -- [H]eadless [O]oze [N]ightmare [G]houl [Z]ombie [S]kitter Monster Listing -- -- Pg. #01: Left -- [N], [H], [O], [H] -- Right -- [Z], [O], [S], [G] -- -- Pg. #02: Left -- [S], [G], [N], [N] -- Right -- [H], [Z], [O], [S] -- -- Pg. #03: Left -- [H], [N], [G], [Z] -- Right -- [S], [O], [N], [H] -- -- Pg. #04: Left -- [H], [Z], [G], [N] -- Right -- [G], [O], [Z], [G] -- -- Pg. #05: Left -- [O], [S], [N], [O] -- Right -- [O], [N], [O], [H] -- -- Pg. #06: Left -- [Z], [Z], [G], [S] -- Right -- [S], [H], [O], [S] -- -- Pg. #07: Left -- [H], [O], [Z], [N] -- Right -- [S], [H], [S], [G] -- -- Pg. #08: Left -- [O], [Z], [S], [N] -- Right -- [O], [G], [G], [Z] -- -- Pg. #09: Left -- [S], [Z], [O], [H] -- Right -- [H], [N], [N], [G] -- -- Pg. #10: Left -- [N], [S], [H], [S] -- Right -- [O], [H], [S], [H] -- -- Pg. #11: Left -- [Z], [H], [N], [G] -- Right -- [S], [O], [Z], [G] -- -- Pg. #12: Left -- [O], [S], [O], [S] -- Right -- [H], [H], [G], [N] -- -- Pg. #13: Left -- [N], [H], [N], [G] -- Right -- [S], [N], [H], [G] -- -- Pg. #14: Left -- [G], [S], [G], [H] -- Right -- [S], [G], [G], [G] -- -- Pg. #15: Left -- [H], [G], [O], [S] -- Right -- [G], [N], [O], [S] -- -- Pg. #16: Left -- [N], [Z], [N], [Z] -- Right -- [Z], [S], [G], [H] -- -- Pg. #17: Left -- [G], [G], [S], [O] -- Right -- [S], [Z], [G], [N] -- -- Pg. #18: Left -- [N], [Z], [H], [S] -- Right -- [S], [Z], [H], [G] -- -- Pg. #19: Left -- [O], [S], [Z], [O] -- Right -- [Z], [S], [H], [O] -- PSYC0SiS/uuDW .úùÄÄ[ø]Äð FoNe pHUn ðÄ[ø]ÄÄùú. ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ The USA Telephone System À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ The USA is running out of telephone numbers. Talks have circulated of updating the existing phone switching system to accomodate new customers as well as old customers. The current system has some interesting limitations "designed" into it. For example, all area codes must have a middle digit of 0 or 1. This limits the maximum area codes to 162. In a sense it is good, because it prevents the phone companies from ripping us off. Though, in a recent issue of 2600 magazine, some new area codes have been created which donot use the conventional system. Their middle digits can be any number, so it looks as though changes have begun in some areas. The actual phone number itself is limited to 7 digits, which allows for 1,000,000 possibilities per area code. This is only true if the number 000-0000 is to be used, though. The new system would probably increase the number of digits in a phone number to 8. How would this change occur though? After midnight, your newphone number will be xxx-xxxxx? Or, as they notate it in France, xx-xx-xx-xx? One thing is for sure, it will cost a lot to make the new system user-friendly. For example, if you dial a wrong number nowadays, a cyber-bitch will inform you that "That number is not in service," or maybe "The number you have reached, ...has been changed. The new number is..." Will that be set up forthe entire new system? Imagine the kind of money it will take for these kinds of changes. The fact that everyone will have a new phone number will totally cut off communications for an extended period of time. Automated phone services will have to be reprogrammed. Computer software may become outdated or useless. It's an overlooked detail as to how much we rely on the phone system to stay the same as it is. Now, think of the easy way out. Higher rates, less customers, no need to change the existing system. With the increased interest in modem communications, fax services, answering machines, and multi-line businesses, it is expected that the demand for a phone line will continue to increase, and in many cases, the demand will have nothing to do with the cost of service. On the other hand, if the government prevents the rates and fees from going out of hand, the phone system will need to be changed, but how will it be funded if the prices can't be raised? There's jobs to protect, too. It seems likely that as time goes on, the existing phone system in the USA will slowly meet its downfall. Perhaps an independent group of investors will attempt to create their own system, with some kind of access to the existing lines. Who knows what the future will bring? GraveDigger/uuDW ÃÄÄÄùú "And I abandon all my need for explaination" úùÄÄÄ´ ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ 1-800-825-5xxx Scan Listing À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ 017 - "Please enter your 4-digit PIN" 020 - VMB System 030 - "Extension 710 is Unavailable" 032 - VMB System 034 - VMB System 036 - VMB System 040 - Only rings once 043 - Teleconference service 045 - VMB System 069 - VMB System 075 - VMB System 082 - Carrier 090 - VMB System 099 - VMB System 116 - VMB System 122 - VMB System 123 - VMB System 134 - VMB System 135 - "674-0511 is not a working number. Its prime factors are..." 136 - "674-0512 is not a working number, bucko!" 137 - VMB System 138 - "674-0514 is not a working number, bucko!" 139 - "674-0515 is not a working number. Its prime factors are..." 140 - VMB System 141 - "674-0517 is not a working number. " 148 - Weird ring pattern 166 - Long tone 172 - VMB System 175 - VMB System 176 - Carrier 177 - VMB System (Audix) 192 - Carrier 197 - VMB System 203 - "Please enter your 4-digit PIN" 205 - VMB System 223 - Dialout 225 - VMB System 233 - VMB System 237 - VMB System 246 - VMB System 249 - Carrier 250 - Carrier 254 - VMB System 256 - VMB System (VMX) 262 - "Please enter your password" 265 - VMB System 266 - VMB System 267 - VMB System (Automated Attendant) 275 - Carrier 276 - VMB System 278 - VMB System 282 - VMB System 293 - Dialout 308 - "Please enter your 4-digit PIN" 315 - VMB System 322 - VMB System 332 - VMB System 334 - VMB System 340 - VMB System 346 - VMB System 367 - VMB System 384 - Carrier 411 - VMB System 414 - VMB System (Audix) (Press *7 to access) 415 - VMB System (Press *# to access) 420 - VMB System 422 - VMB System 425 - VMB System 426 - VMB System 427 - VMB System 430 - VMB System 436 - VMB System 450 - Carrier 451 - Carrier 456 - Dialout 474 - VMB System 482 - VMB System 484 - VMB System 488 - VMB System 494 - VMB System 502 - VMB System (transfers after 4 rings) 507 - VMB System 510 - VMB System 521 - Weird beeps 527 - Foreign Language Voice 533 - VMB System (Press *# to access) 548 - VMB System 549 - Loop Low End \ 550 - Loop High End / 555 - VMB System (disconnects on one error) 566 - VMB System 570 - Carrier 575 - VMB System 576 - VMB System 579 - VMB System 580 - Carrier 588 - VMB System 601 - Carrier 602 - Carrier 625 - VMB System (Press *# to access) 633 - VMB System 639 - "Enter pager number" 640 - "Please enter your 4-digit PIN" 643 - "Please enter your 4-digit PIN" 649 - "Please enter your 4-digit PIN" 650 - "Please enter your 4-digit PIN" 651 - "Please enter your 4-digit PIN" 658 - "...Please enter your authorization number now." 659 - "Please enter your 4-digit PIN" 660 - "Please enter your 4-digit PIN" 665 - VMB System (Enter password then mailbox.) 679 - VMB System 684 - "Please enter your 4-digit PIN" 687 - VMB System 700 - VMB System 711 - "Please enter your 4-digit PIN" 719 - "You have reached your party's message center." 726 - VMB System 727 - Programmable answering machine 737 - VMB System 738 - VMB System 742 - VMB System 760 - Fax Line 767 - Weird ring 773 - VMB System (Press *1 to access - Enter password then mailbox.) 787 - VMB System 789 - VMB System 800 - VMB System 801 - Loop Low End (High End is ?) 803 - VMB System 810 - VMB System 824 - VMB System 827 - VMB System (Automated Attendant) 833 - Weird beeps 836 - Fax Line 855 - VMB System 858 - VMB System ("Please enter your password") 874 - VMB System 883 - Weird beeps... Press # or * 884 - Weird beeps... Press # or * 885 - "Mailbox 2070" (VMB System) 899 - VMB System 902 - Weird beeps 903 - Weird beeps 904 - Weird beeps 911 - Weird beeps 912 - Weird beeps 915 - Rings then busy signal 920 - VMB System 923 - VMB System 933 - VMB System 936 - Loop Low End \ 937 - Loop High End / 941 - USA Paging 953 - "...Enter the number where you can be called." 958 - "...Please enter your authorization number now." 961 - "...Enter the number where you can be called." 964 - VMB System (*1 to access - enter password then mailbox) 968 - "...Enter the number where you can be called." 970 - "Not in service for incoming calls." (payphone/Buffalo, NY) 975 - Carrier 987 - VMB System ÃÄÄÄùú "We've come to create a new country called chaos, úùÄÄÄ´ ÃÄÄÄùú and a new government called anarchy." úùÄÄÄ´ ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ "1-800-FUCK-ATT" À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ Once upon a time, I started a little itty bitty war dialer up and started scanning the "1-800-222-XXXX" exchange (Which by the way was a bad idea since many of the AT&T operators direct numbers are in this range.). Well, I got probably about 9000 numbers through it, when suddenly all the tones quit appearing... And I was rather surprised since the tones normally pick up in the high ranges. I tried to call a known working number, and was suddenly greeted by a wonderful intercept message stating that "1-800-555- 1212" was not available from my calling area... Since "1-800-555-1212" (last time I checked) was the number for information I began to wonder what was going on. I called my local phone company, they sent me to AT&T, they said call local repair. Local repair told me to call AT&T repair. I called them, and they said that the number I was trying to dial was not available (I gave them a "1-800-222" number instead of information.) The kind operator then told me to call her direct over an "800" number, I hung up dialed it, and got the intercept message. I guess this just goes to show that if you fuck with AT&T they'll be real dicks and cut your calls to FREE numbers that you can call from anywhere. Even though they never say that you CAN'T call all the "800" numbers you want, when it gets down to it, they get pissed and yank your access... (Hmm... Is that unconstitutional?) Dunno... Oh well... But until I get full access back and an explanation of why I am not able to call "800" numbers I'm switching to MCI. (THREE DAYS LATER) AT&T said they will give me my 800 numbers back after an all day run around. Said there computer figured something weird was going on when my line dialed over 79 "1-800" numbers between 3:30 and 5:00 in the morning. (Hmm... Now I need a new war dialer that slows down in the early morning.) LATE UPDATE: Here is a copy of the letter sent to me and received on June 21, 1994: AT&T Logo June 17, 1994 46 N. Somewhere Ave. Somewhere, FU 49666 (212) 781-6012 Dear , AT&T has reason to believe that the telephone list to you has been used in violation of Federal Communications Commission - AT&T Tariff F.C.C. No. 2 Sections 2.2.3 and 2.2.4.C. These tariff sections prohibit using WATS to harass another, using WATS to interfere with the use of the service by others and using WATS with the intent of gaining access to a WATS Customer's outbound calling capabilities on an unauthorized basis. Accordingly, AT&T has temporarily restricted your telephone service's ability to place AT&T 800 Service calls in accordance to Section 2.8.2 of the above tariff. If the abusive calling reoccurs after AT&T lifts the temporary restriction, the restriction will be reimposed until AT&T is satisfied that you have undertaken steps to secure your number against future tariff violations. You should also note that unauthorized possession or use of access codes can constitute a violation of United States Criminal Code - Title 18, Section 1029, which carries a penalty of up to $10,000 fine and up to 10 years imprisonment for first time offenders. Any future activity from telephones listed to you may be referred to federal law enforcement officials. If you wish to discuss this restriction, you may do so in writing to AT&T Corporate Security, Dept. 19, P.O. Box 6735, Bridgewater, N.J. 08807-9998, or you may call 908-725-6973. *(What? No "1-800" number?)* *(Who the fuck is he anyway?)* AT&T Corporate Security (Lame recycled paper symbol in lower left hand corner) And just to be a nice guy... I'll publish my results... See the end of this file... Remember they said specifically: FROM YOUR LINES... The moral of this stupid fucking story: AT&T gets very angry when you war dial 9000 "1-800" numbers... So be sure to do it from a friends house... And BTW: I never used a code... Not an AT&T one... An out dial a few times... But not AT&T... Stumble/uuDW .úùÄÄ[ø]Äð KaUZinG KaoS ðÄ[ø]ÄÄùú. ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ The Gerbil Feed Bomb À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ Reprinted by Grendel (An oldie but goody, a terrorist bomb still in use.) Stuff you'll need: One glass jar. One bag of pellet feed (usually green in color, used to feed pet rodents). Two tubes of modeling cement. Last but not least you'll need some gasoline. Manufacturing the bomb: Powder up enough of the pet food to fill the glass jar halfway. Empty the two tubes of model cement into the jar and mix thoroughly. Now fill the rest of the jar with gasoline. Put the cap on the jar and shake. Put a fuse through the top of the jar. Light the fuse. THEN RUN LIKE HELL!! DIVE TO THE GROUND!! This bomb will KILL you if you are not out of range of the blast. (The range of the blast depends solely on how big the bomb is. 50 feet and some cover should suffice as a safe distance for most bombs). A note from Grendel on fuses: Go to your local gun show and buy REAL fuse. Most gun shows around the country sell fuse that are safe and fail proof. In fact they may even sell different grades of fuse, some may burn quicker than others. Another note these very same gun shows will sell gunpowder to just about anyone. You may also find electric fuses and starters, they tend to be army surplus and sell for about $50.00 and up. Of course gun shows are a great place to buy rifles and shotguns. Also are the wide selections of knives, swords, rapiers, machetes and various other cutlery. In fact 60 minutes (Or was it 48 hours?) just had a feature about gun shows around the country and how gun dealers sell to just about anyone. They showed some guy buying handguns and assault rifles without a license. :) DISCLAIMER: I take no responsibility on any damage or injuries the above information may cause. If some dumbshit kills 30 people with the bomb I outlined above then he's more fucked up than me and should get the death penalty. If some deranged fool blows up part of a school or takes out his enemy's house with this bomb isn't because of me. If some pissed off dude kidnaps his ex-girlfriend, ties her up, puts the bomb between her skank legs, lights the fuse, and watches from a safe distance as the explosion blows her to pieces; its not my fault that he's fucked up or that she's a slut that cheated on him then left him broken hearted. In other words: I DON'T GIVE A FLYING MONKEY FUCK! FUCK YOU! Grendel/uuDW ÃÄÄÄùú "Can you feel the RaGE?" "RaGE? No, passion!" úùÄÄÄ´ ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ Gelled Flame Fuels À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ Gelled or paste type fuels commonly known or referred to as "Napalm" are often preferable to raw gasoline for use in incendiary devices such as fire bottles (Moltov Cocktails). This type fuel adheres more readily to the target and produces a greater heat concentration. Several methods are shown below for transfering ordinary gasoline into a gelled fuel using commonly available materials. The methods are divided into the following categories based on the major ingredient: Lye Systems -- Lye (also known as caustic soda or Sodium Hydroxide) can be used in combination with powdered rosin or castor oil to gel gasoline for use as a flame fuel which will adhere to target surfaces. This fuel isn't suitable for use in the chemical (Sulphuric Acid) type of fire bottle. The acid will react with the lye and break down the gel. Lye-Alcohol Systems -- Lye can be used in combination with alcohol (Ethyl alcohol would be the best choice, but Methyl (wood) alcohol or Isopropyl (rubbing) alcohol can be used as substitutes; this produces softer gels though.) and any of the several fats listed below to gel gasoline for use as a flame fuel. Once again don't try using this fuel with the chemical fire bottle. A reaction will occur causing the gel to break down. The following can be used as fats to gel the gasoline: (a) Castor oil (good) (b) Any vegetable oil (corn, cottonseed, peanut, linseed, etc.) (c) Any fish oil (d) Butter or margarine It's necessary when using (b) to (d) to double the amount of fat and lye for satisfactory bodying. WARNING: Do NOT use an aluminum container when making the 2 gelled fuels listed above! If you do decide to disobey my instructions, have phun wiping an acid like substance off of your burnt face. Uhh... You see lye will react violently when mixed with aluminum and water. The result is a very hot chemical reaction which produces a flammable Hydrogen gas (Ahh... Gives you some kewl ideas huh?). Soap-Alcohol Systems -- Commonly used household soap (not laundry detergent) can be used in combination with alcohol to gel gasoline for use as a flame fuel which will also adhere to target surfaces. Unless the word "soap" actually appears somewhere on the container or wrapper, the washing compound is probably a detergent. THESE CANNOT BE USED! Egg Systems -- The WHITE of any bird egg can be used to gel gasoline. Don't get the yellow egg yolk mixed into the egg whites. If the yellow portion of the egg gets into the egg white then discard the egg. You MUST also add ONE of the following ingredients: Table salt, ground coffee, dried tea leaves, cocoa, sugar, potassium nitrate, epsom salts, washing soda, baking soda, or aspirin. Latex Systems -- Any milky white plant fluid is a potential source of latex which can be used to gel gasoline. One of the following acids must be added too: Acetic acid, sulfuric acid, or hydrochloric acid. Don't get the acids on your skin dumbfucks, it's not phun! Wax Systems -- Any of several common waxes can be used to gel gasoline for use as a flame fuel. Any of the following will do the trick when it comes to waxes: Candles, crayons, furniture and floor waxes, artificial fruit and flowers, wax paper, etc... Animal Blood Systems -- Animal blood can be used to gel gasoline. Okay all of you satanists out there go and get your devil worship groupies, kill a deer and save some of that sacrificial blood for this project! Heh. You MUST also add ONE of the following ingredients: Table salt, ground coffee, dried tea leaves, sugar, lime, epsom salts, or baking soda. Personally I have found that styrofoam works well too... A bit sticky but if your in a pinch then this might help you out! Have phun! Latz... PSYC0SiS/uuDW ÃÄÄÄùú "Too many fucking rules!" úùÄÄÄ´ ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ Mercury Fulminate À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ Mercury Fulminate is used as a primary explosive in the fabrication of detonators. It's to be used with a booster explosive such as picric acid (see other text files) or RDX... Material Required -- Nitric Acid, 90% concentrate. (1.48 sp. gr.) Can be found in industrial metal processors, and chemical supply stores. Mercury - Can be found in thermometers, mercury switches, old radio tubes, chemical supply stores, etc. Ethyl (grain) alcohol (90%) Filtering material - Paper towels, etc. Teaspoon measure (1/4, 1/2, and 1 teaspoon capacity) - aluminum, or stainless steel. Heat source Clean wooden stick Clean water Glass containers Tape Syringe Procedure -- 1. Dilute 5 teaspoons of nitric acid with 2-1/2 teaspoons of clean water in a glass conatainer by adding the acid to the water. 2. Dissolve 1/8 teaspoons of mercury in the diluted nitric acid. This will produce dark red fumes. NOTE: It may be necessary to add water, one drop at a time, to the mercury- acid solution in order to start the reaction. CAUTION: Acid will burn skin and destroy clothing. If any is spilled, wash it away with a large quantity of water. DO NOT INHALE THE FUMES! 3. Warm 10 teaspoons of the alcohol in a container until the alcohol feels warm to the inside of your wrist. 4. Pour the metal-acid solution into the warm alcohol. A reaction should start in less than 5 minutes. Dense white fumes will be given off during the reaction. As time passes, the fumes will become less dense. Allow 10 to 15 minutes to complete the reaction. Fulminate will settle to the bottom. CAUTION: The reaction generates large quantities of toxic, flammable fumes. The process must be conducted outdoors or in a well ventilated area, away from sparks or open flames. DO NOT INHALE FUMES! 5. Filter the solution through a paper towel into a container. Crystals may stick to the side of the conatainer. If so, tilt and squirt water down the sides of the container until all of the material collects on the filter paper. 6. Wash the crystals with 6 teaspoons of ethyl alcohol. 7. Allow these mercury fulminate crystals to air dry. CAUTION: Handle the dry explosive with GREAT care. Do not scrape or handle it roughly. Keep away from sparks or open flames. Store in a cool, dry place. PSYC0SiS/uuDW ÃÄÄÄùú "RaGE - The new world order!" úùÄÄÄ´ ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ How to Make HMTD À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ HMTD is a primary explosive which means extremely volatile to heat, flames, and friction. In other werds don't handle this shit roughly! I have warned you dumbfucks out there! I'm NOT joking! I know some idiot will ultimately blow their fucking face off, so don't even try to blame me. Okay this stuff can be made from hexamethylenetetramine, hydrogen peroxide, and citric acid. This explosive is to be used with a booster explosive such as picric acid or RDX in the fabrication of detonators. Material Required -- Hexamethylenetetramine - In drug stores under the names of: urotropine, hexamin, methenamine, etc... It can also be found in Army heat tablets. Hydrogen Peroxide - 6% hair bleach (or stronger if at all possible) Citric acid - Can be found in grocery stores and drug stores under the name of "Sour Salt" Containers, bottles, or glasses Paper towels Teaspoon Pan Water Tape Procedure -- 1. Measure 9 teaspoons of hydrogen peroxide into a container. 2. In 3 portions, dissolve 2-1/2 teaspoons of crushed hexamethylenetetramine in the peroxide. 3. Keep the solution cool for 30 minutes by placing the container in a pan of cold water. 4. In portions, dissolve 4-1/2 teaspoons of crushed citric acid in the hexamethylenetetramine-peroxide solution. 5. Let the solution stand at room temperature until solid particles form at the bottom of the container. Complete precipitation will take place in 8 to 24 hours. CAUTION: At this point the mixture is a primary explosive. Keep away from flame. 6. Filter the mixture through a paper towel into a container to collect the solid particles. 7. Wash the solid particles collected in the paper towel with 6 teaspoons of water by pouring the water over them. Discard the liquid in the container. 8. Place these explosive particles in a container and allow to dry. CAUTION: Handle the dry explosive with great care. Do NOT scrape or handle roughly. Keep away from sparks or open flames. Store in a cool, dry place. PSYC0SiS/uuDW ÃÄÄÄùú "Bless the beasts and the children" - Niki Taylor úùÄÄÄ´ ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ Preparation of Picric Acid from Aspirin À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ Picric acid can be used as a booster explosive in detonators, a high explosive charge, or as an intermediate to preparing lead picrate or DDNP. See other text files written by me to see how to make some of the other shit listed above. Material Required -- Aspirin tablets (5 grains per tablet) Alcohol, 95% pure Sulfuric acid, concentrated, (battery acid - boil until white fumes appear) Potassium Nitrate (saltpeter) Water Paper towels Canning jar, 1 pint Rod (glass or wood) Glass containers Ceramic or glass dish Cup Teaspoon Tablespoon Pan Heat source Tape Procedure -- 1. Crush 20 aspirin tablets in a glass container. Add 1 teaspoon of water and work into a paste. 2. Add approximately 1/3 to 1/2 cup of alcohol (100 milliliters) to the aspirin paste; stir while pouring. 3. Filter the alcohol-aspirin solution through a paper towel into another glass container. Discard the solid left on the paper towel. 4. Pour the filtered solution into a ceramic or glass dish. 5. Evaporate the alcohol and water from the solution by placing the dish into a pan of hot water. White powder will remain in the dish after evaporation. The water in the pan should be at hot bath temperature, not boiling, approximately 160 to 180 degrees fahrenheit. It shouldn't burn the hands. 6. Pour 1/3 cup (80 milliliters) of concentrated sulfuric acid into a canning jar. Add the white powder to the sulfuric acid. 7. Heat canning jar of sulfuric acid in a pan of simmering hot water bath for 15 minutes; then remove the jar from the bath. Solution will turn to a yellow-orange color. 8. Add 3 level teaspoons (15 grams) of potassium nitrate in three portions to the yellow-orange solution; stir vigorously during additions. The solution will turn red, and then back to a yellow-orange color. 9. Allow the solution to cool to a normal room temperature while stirring occasionally. 10. Slowly pour the solution, while stirring, into 1-1/4 cup (300 milliliters) of cold water and allow to cool. 11. Filter the solution through a paper towel into a glass container. Light yellow particles will collect on the paper towel. 12. Wash the light yellow particles with 2 tablespoons (25 milliliters) of water. Discard the waste liquid in the container. 13. Place particles in the ceramic dish and set in a hot water bath, as in step 5 listed above, for 2 hours. PSYC0SiS/uuDW ÃÄÄÄùú "Who cares about food? I'm reading RaGE." úùÄÄÄ´ ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ Red or White Powder Propellant À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ "Red or White Powder" Propellant may be prepared in a fairly simple, and safe manner. The formulation described below will result in approximately 2-1/2 pounds of powder. This is a small arms propellant and should only be used in weapons with 1/2 inch inside diameter or less. DO NOT use in pistols! Material Required -- Heat source (Kitchen stove or open fire) 2 gallon metal bucket Measuring cup (8 ounces) Wooden spoon or rubber spatula Metal sheet or aluminum foil (at least 18 inches square) Flat window screen (at least 1 foot square) Potassium Nitrate (granulated) 2-1/3 cups White sugar (granulated) 2 cups Powdered ferric oxide (rust) 1/8 cup (if available) Clear water, 3-1/2 cups Procedure -- 1. Place the sugar, potassium nitrate, and water in the bucket, Heat with a low flame, stirring occasionally until the sugar and potassium nitrate dissolve. 2. If available, add the ferric oxide (rust) to the solution. Increase the flame under the mixture until it boils gently. The mixture will retain the rust coloration. 3. Stir and scrape the bucket sides occasionally until the mixture is reduced to one quarter of its original volume, then stir continuously. 4. As the water evaporates, the mixture will become thicker until it reaches the consistency of cooked breakfast cereal or homemade fudge. At this stage of thickness, remove the bucket from the heat source, and spread the mass on the metal sheet. 5. While the material cools, score it with the spoon or spatula in crisscrossed furrows about 1 inch apart. 6. Allow the material to air dry, preferably in the sun. As it dries, rescore it occasionally (about every 20 minutes) to aid drying. 7. When the material has dried to a point where it's moist and soft but not sticky to the touch, place a small spoonful on the screen. Rub the material back and forth against the screen mesh with a spoon or other flat instrument until the material is granulated into small worm-like particles. 8. After granulation, return the material to the sun to dry completely. PSYC0SiS/uuDW .úùÄÄ[ø]Äð iMPR0v153d D3t0N4t10n T3chNiqUe5 ðÄ[ø]ÄÄùú. ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ The Clothespin Switch À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ A spring type clothespin can be used to make a circuit closing switch to activate explosive charges, mines, booby traps, and alarm systems. Material Required -- Spring type clothespin. Solid copper wire -- 1/16 in. (2 mm) in diameter. Strong string or wire. Flat piece of wood (roughly 1/8 x 1" x 2"). Knife Procedure -- 1. Strip four inches (10 cm) of insulation from the ends of 2 solid copper wires. Scrape the copper wires with the knife until the metal is shiny. 2. Wind one scraped wire tightly on one jaw of the clothespin, and the other wire on the other jaw. 3. Make a hole in one end of the flat piece of wood using a knife, heated nail or a drill. Tie the strong string or wire through the hole. 4. Place the flat piece of wood between the jaws of the clothespin switch. Basic Firing Circuit -- Attach one of your leads coming off of the clothespin switch directly to the negative terminal of your battery. Attach the other lead on the switch directly to one of leads coming off of your initiator (i.e. blasting cap). Make sure the small piece of wood is separating both jaws on your clothespin! Now connect the remaining terminal on your intiator and the positive terminal on your battery with a piece of wire. When the flat piece of wood is removed by pulling the string, the jaws of the clothespin will close thus completing the circuit. CAUTION: Do not attach the battery until the switch and the trip wire have been planted and examined. Be sure the flat piece of wood is separating the jaws of the switch. Usage -- Drive a small headed nail through the spring hole and attaching it to a stake of some sort (the clothespin MUST turn freely on the nail). Attach your trip wire to the small wooden block by means of the hole, and run it over a path, tie the other end of the tripcord to a tree or a large plant. Use your imagination! PSYC0SiS/uuDW ÃÄÄÄùú "I like the RaGE in you." úùÄÄÄ´ ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ The Knife Switch À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ This improvised device will close a firing circuit on mines, booby traps and other explosive devices when the trip wire is pulled or cut. Material Required -- A knife or a hack saw blade. A sturdy wooden board. Six long nails with heads. A good length of conductive wire. A strong string or light rope. Procedure -- 1. Place the knife or hack saw blade on the board. Drive 2 nails into the board on each side of the knife handle so the knife is held in place. 2. Drive one nail into the board so that it touches the blade of the knife near the point. 3. Attach the rope or string to the knife. Place the rope accross the path. Apply tension to the rope, pulling the knife blade away from the nail slighty. Tie the rope to a tree, bush, or stake. 4. Drive another nail into the board near the tip of the knife blade. Connect the two nails with a piece of conductive wire. The nail should be positioned so that it will contact the second nail when the blade is pulled about 1 inch (2-1/2 cm) to the side. Check the position of the nails to the knife blade. The nails should be placed so that the knife blade will contact either one when the rope is pulled or released. Usage -- Attach one wire from the firing circuit to one of the nails and the other to the knife blade. The circuit will be completed when the tripcord is pulled or released. Use your imagination! PSYC0SiS/uuDW ÃÄÄÄùú "I'd eat dog biscuits, but damn the calories. úùÄÄÄ´ ÃÄÄÄùú Alpo fucking rules" - Crax, author of Dementia BBS Software úùÄÄÄ´ ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ The Mousetrap Switch À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ A common mousetrap can be used to make a circuit closing switch for electrically initiated explosives, mines and other miscellaneous booby traps. Material Required -- Mousetrap A hack saw or a small file. Some good connecting wires. Procedure -- 1. Remove the trip lever from the mousetrap using the hack saw or file. Also remove the small staple and holding wire. 2. Retract the striker of the mousetrap and attach the trip lever across the end of the wood base using the staple that was removed previously. If the trip lever isn't made of metal, a piece of metal of approximately the same size should be used. 3. Strip one inch (2-1/2 cm) of insulation from the ends of 2 good connecting wires. 4. Wrap one wire tightly around the spring loaded striker of the mousetrap. 5. Wrap the second wire around some part of the trip lever or the improvised piece of metal. If a soldering iron is available, solder both of the wires in place. Usage -- This switch can be used in a number of ways -- one typical method is described below: The switch can be placed inside a box which also contains the explosive and batteries. The spring loaded striker is held back by the lid of the box and when the box is opened the circuit closes! Haha! Use your imagination! PSYC0SiS/uuDW ÃÄÄÄùú "Could you please pass the jelly?" úùÄÄÄ´ ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ The Pull-Loop Switch À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ This switch will initiate explosive charges, mines, and booby traps when a trip wire is pulled. Material Required -- 2 good lengths of insulated wire. A sharp knife and or a pair of wire strippers. A good amount of strong string or cord. Some fine thread that will break easily. Procedure -- 1. Remove about 2 inches of insulation from one end of each length of wire. Scrape the bare wire with a knife until the metal is shiny. 2. Make a loop out of each piece of bare wire. 3. Thread each wire through the loop of the other wire so the wires can slide along each other. The loops should contact each other when the two wires are pulled tight. Usage -- 1. Seperate the loops by about 2 inches. Tie a piece of fine thread around the wires near each loop. The thread should be tight enough to support the loops and the wire, yet fine enough that it will break under a very slight pull. 2. Fasten one wire to a tree or stake and connect the end of it to a firing curcuit. 3. Tie a piece of cord or string around the other piece of wire a few inches from the loop. Tie the free end of the cord around a tree, bush, or stake. Connect the free end of the wire to the firing circuit. Initiation will occur when the tripcord is pulled. CAUTION: Be sure that the loops do not touch each other when the wires are connected to the firing circuit. Other Uses -- The switch without the fine thread may be used to activate a booby trap by attaching it between the lid and a rigid portion of a box, between a door and a door jamb, and in similar manners. Use your imagination! PSYC0SiS/uuDW .úùÄÄ[ø]Äð Ev3ry7h1nG El53 ðÄ[ø]ÄÄùú. ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ The Downfall of the Internet À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ In recent times, there has been something terribly wrong with the Internet. Large numbers of inexperienced users have climbed on the net, hoping to get a taste of the "Information Superhighway." They are the people willing to pay a monthly fee for access to internet services, whether direct or indirect; and in most cases, not knowing the difference. Needless to say, those who have been on the net for some time simply hate to see these people. They are a distraction, and their lack of knowledge on the Internet in general speaks for itself in saying that they shouldn't be there. The Internet was designed to rely on unreliability. It can never officially be "shut down," in case of thunderstorms, or even, as its creators carefully planned, in case of nuclear attack. Due to this, the more people that occupy the bandwidth of the Internet increases the unreliability and unstability. This also means things will work slower, in attempts to accomodate the load of users. The attitudes of the people are different. Compare the long-time Internet users, the high school and college students, playing loud music and dressing according to their own styles, with the middle-class middle-aged nine-to-fivers, family-oriented people who are climbing on the net, who have to check their computer's manuals to find out how to turn it on. A conflict of ideas and beliefs separates the Internet into a fun-loving crowd and a "I want what I paid for: information, not a bunch of kids swearing and bothering me." The Internet is a means to keep people on the breaking edge of technology and information, not a place to learn family values and preach about goodness and religion. If there is to be an Information Superhighway meant for everyone, it definately is not the Internet. I'd like to find the guy who first provided the Internet as a commercial service and give him a piece of my mind. Despite attempts to stop the rush of unexperienced crowds of users who feel they can get on the Internet and act like they own it, it is still going on everyday, and at alarming rates. As many as 2 million people will experience the Internet for the first time each month. At a growth rate like this, something will have to be done to enforce a kind of population control. It is already a fact, though, that regular services are slower and sometimes not available due to an overflow of users. Take the Internet Relay Chat service (IRC) for example. Getting onto an IRC server is much harder now, with all the users swarming in for a taste of the infamous live, worldwide, uncensored teleconference system. The IRC servers have user limits which only allows so many users on at a time. By adding more users via commercial providers, and allowing these users to use other servers, they take away from us the freedom we once had. In the future, the Internet might be up for sale, but who will buy it? What will they do with it? And who gets paid for selling it? The simple answer to the demise of the Internet: Money ruins everything. If you sympathize with the newbies and offer your helping hand to them, then maybe you're not really an Internet junkie after all. If you oppose this invasion of the worldwide realtime network where many cyberpunks call home, then do something about it. Not everyone can drive the fast, shiny cars... Not everyone can build their dream home... And not everyone can enjoy the Internet. Whether we like it or not, our world is segregated. Very much so. Segregation is not a bad thing in the way of protecting the Internet, so let's make it a goal to keep it out of the hands of those who don't deserve it. GraveDigger/uuDW ÃÄÄÄùú "rUm 4Nd Gr33n 3gg5" úùÄÄÄ´ ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿ ú úùij¿ "Hypocrites or not?" À³Äùú ú À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ I have to say the whole H/P/A/V scene seems funny to me. There are so many differences in views! Which is the chaos that anarchists love of course, but otherwise its sorta fubar. I mean we've got pure hackers out there who slam through VAX and UNIX systems, take a look around, and then leave without hurting a thing; doing it all just to learn something new (which is fine). Then they go flame the destructive hackers. Which again is fine! That's their opinion. YET they find it alright to card shit. What the fuck is that shit!?! Its still fucking with shit either way! Now I could give a bunch more examples between the different actions, but you get the point. Now I'm not saying everyone in the scene is like this, but there are those few... If you're gonna take a stand: TAKE A STAND DAMMIT! I think the coolest people are the mutha-fuckers who don't give a shit either way. These guys (or girls) just do it and don't give a flying fuck what anybody thinks about it. I mean lets face it folks, blowing shit up is against the law, so is hacking into a restricted system, carding a new motherboard is illegal too, so is using unauthorized codes to get a free phone call, etc... Now we all know that those crimes may carry different penalties, but "Big Brother" doesn't like any of it. Lets take this to "Big Brother" not each other. In fact lets show them who's "Big Brother" when it comes to this shit. Well that's my rant. It turned out smaller then I thought it would. Oh well... Grendel/uuDW ÄþøÄ=Äð Disclaimer ÄïÄÄ The knowledge contained within can be harmful if used improperly. We do not advocate the construction or use of any of the items described within. Doing so may result in loss of life, limbs, cats, your mom, your dad, your parakeet polly, your tricycle, and even your mountain dew! In other words, don't be a dumb shit and blame us for it. By the way, have a wicked nice day. :) ÄþøÄ=Äð Disclaimer ÄïÄÄ Thanx for reading RaGE#1. We hope you liked it, hated it, farted on it, or at least fed some to your kid brother. We want to hear from you, in any case. Send mail to uudw@cyberspace.org with your mailz. ÄþøÄ=Äð l8z ÄÄÄÄÄÄÄÄïÄÄ