Exploit Phrack #35

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
42846
Проверка EDB
  1. Пройдено
Автор
PHRACK
Тип уязвимости
PAPERS
Платформа
MAGAZINE
CVE
N/A
Дата публикации
1991-11-17
Phrack #35
Код:
                               ==Phrack Inc.==

                Volume Three, Issue Thirty-five, File 1 of 13

                               Issue XXXV Index
                              __________________

                               P H R A C K  3 5

                               November 17,1991
                              __________________

                             ~Don't Tread on Me!~

     Phrack Inc. is going great!  In fact so great that we already have enough
material for the next two issues including the long-awaited sequel to Phrack 13
(the infamous joke issue released on April 1, 1987), Diet Phrack!  That issue
which will be number 36 is scheduled for release next month and will mark the
end of Volume 3.  If you have anything that is somewhat humorous, send it over
to us at Phrack as soon as possible so we can include it.

     Phrack Inc. celebrates its sixth birthday with the release of this issue.
Exactly six years ago, sitting in front of an IBM PC known as Metal Shop
Private, were Taran King and Knight Lightning releasing a soon to be famous
publication called Phrack Inc.  That first issue wasn't much, a small
collection of eight files sent across the country to bulletin boards at 1200
baud.  Six years is quite a long time in the hacker underground.  Today we send
Phrack to thousands of people at hundreds of Internet sites spanning the entire
world.  Phrack has become more than a magazine, it truly is an institution.
Long Live Phrack!

     Pay close attention to Phrack World News this issue for details on HoHo/
XMAScon and many other stories with serious ramifications to our way of life.

     Special thanks to Twisted Pair (for the help in a jam), Amadeus, The
Butler, and Black Kat for the great files.  Thanks to the Great Gatsby, just
because he is cool.  It's people like you that keeps this magazine comming out
so frequently.

     This month we have had a ton of letters for Phrack Loopback.  If your
letter or question did not appear, we are sorry that it has to wait one more
issue!  The last issue really got some administrators (or wanna-be admins)
steamed at us.  Check out Phrack Loopback and PWN Quicknotes for details.

Your Editors,

                  Crimson Death and Dispater
                   [email protected]


Submissions: [email protected]
FTP Distribution: cs.widener.edu or eff.org

______________________________________________________________________________

                         Phrack XXXV Table of Contents
                         =-=-=-=-=-=-=-=-=-=-=-=-=-=-=

 1. Introduction to Phrack 34 by Crimson Death and Dispater
 2. Phrack Loopback by Phrack Staff
 3. Phrack Profile of Chris Goggans by S. Leonard Spitz
 4. Telenet/Sprintnet's PC Pursuit Outdial Directory by Amadeus
 5. Sting Operations by Sovereign Immunity
 6. Social Security Numbers & Privacy by Chris Hibbert of CPSR
 7. Users Guide to VAX/VMS Part 1 of 3 by Black Kat
 8. A Beginners Guide to Novell Netware 386 by The Butler
 9. Auto-Answer It by Twisted Pair
10. PWN/Part 1 by Dispater
11. PWN/Part 2 by Dispater
12. PWN/Part 3 by Dispater
13. PWN/Part 4 by Dispater
______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                Volume Three, Issue Thirty-five, File 2 of 13

                          [-=:< Phrack Loopback >:=-]

                                By Phrack Staff

     Phrack Loopback is a forum for you, the reader, to ask questions, air
problems, and talk about what ever topic you would like to discuss.  This is
also the place The Phrack Staff will make suggestions to you by reviewing
various items of note; magazines, software, catalogs, hardware, etc.
______________________________________________________________________________

What's on Your Mind
~~~~~~~~~~~~~~~~~~

:: Hacking VMB's ::

From: Mr. Upsetter
To: [email protected]
Subject: Phrack 34 VMB article

The article in Phrack 34 on voice mail hacking by Night Ranger was really good.
It reminded me of some experiences I had with a cellular voice mail system a
couple years ago in San Diego.  I would bet there are similar systems in other
cities.

These VMB's would automatically answer calls when the subscriber wasn't on the
air.  They worked just like standard VMB's.  To access the box, the owner could
dial his or her own cellular number, then hit * when it answered.  Then the VMB
would ask for a password.

Guess what the default password was?  None!  That meant all you had to do was
dial up a cellular VMB and hit *, and you were in.  How many VMB's still had
the default password?  About half...

To scan for cellular VMB's all you had to do was dial numbers in the cellular
prefix.  It was pretty fun...almost too easy.

Cheers,
Mr. Upsetter

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

>From: Zoso Puda
>
>After reading PHRACK 34 I thought it was good. Especially the article on VMB
>hacking. As a matter of fact I wrote a SALT script to help me do it.

     This is exactly what we like to see.  People actually getting basic
information and building on it.

-  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -

                    +-------------------------------------+
                    |      ZoSoft Telix VMB Hacker        |
                    |                                     |
                    |       written by: Zoso Puda         |
                    +-------------------------------------+
First words
-----------
   After reading Night Ranger's article (see PHRACK 34), I decided to make a
VMB hacking program. Night Ranger provided good insight into how to hack VMB
systems but some VMBs are hard to crack. What I came up with is a program to
help me hack some of the harder systems. The ones that don't use the defaults
are tough. Also my phone has the buttons and earpiece in one unit and I had to
dial then put the phone to my ear and listen, look at the buttons to dial a
number and put the phone back to my ear to listen. It soon became tiresome.

   What I finally came up with was a program to let me run all the phone
functions from the keyboard. My modem speaker is loud enough to hear clearly so
it seemed like the perfect thing to do. I also automated certain features like
incrementing the password or box number. The program is not fully automated
however. You must run this program manually. It's main purpose is to allow you
to run normal phone functions via the keyboard. If you cannot hear clearly
through your modem speaker then pick up the phone after the program dials the
VMB phone # and hang up the phone before hanging up the modem.

   What follows is a brief description on how to use the program, compile the
program, and run the program. A working knowledge of VMB systems is expected.

Parameter details
-----------------
  VMB phone number : If you don't know this, give it up.

  Setup sequence : This code is used for systems that require a '9' or '#' or
                   '*' to be pressed before the box number. Up to 3 characters
                   can be in this string.

  Valid Box #      : This would be a known valid box or the box you will
                     be attempting to hack. This value remains constant.

  Codefile filename: You may use a file to get 'default' or your favorite
                     passwords from. You must include the extension.

  Starting box/code: Box # or code to start checking. This value will
                     increase automatically upon pressing [F7].

Using the function keys
-----------------------
                [F1]    Dials the VMB system (see params).
                [F2]    Hangs-up the modem.
                [F3]    Closes the current codefile.(see params).
                [F4]    Lets you set the current code/box #.
                [F5]    Dials the Setup sequence (see params).
                [F6]    Dials the current code.
                [F7]    Makes the next code current.
                [F8]    Dials the valid box (see params).
                [F9]    Allows you to re-set the parameters.
                [F10]   Hangs-up and quits the program.
                [0 - 9] These keys will dial 0 - 9 respectively.
                [*, #]  These keys will dial * and #.
                [/]     Used as a substitute # for the keypad.

Basic Insructions
-----------------
Codefiles should be stored in the same directory as your Telix program.

A sample codefile should look like this:

1111
2222
3333
etc...

I suggest you make seperate codefiles for the number of digits in each code.
For example, all 3 digit codes should be in a file called 3DIGIT.COD, or
something similar.

During parameter entry, if you enter a codefile and it exists, you will NOT
be prompted for a 'Starting box/code'. When the codefile is finished, the
current code will set itself to 1000.

If you enter a blank for the codefile or the name you entered doesn't exist
then you will be prompted for a 'Starting Box/Code'.

Compiling
---------
 Save the program within the 'CUT HERE' lines as VMBHACK.SLT. Copy the file
 VMBHACK.SLT into the directory where your Telix scripts are. Compile using
 CS.EXE. (example: CS VMBHACK.SLT) To run the program, load Telix and press
 Alt-G followed by the program name (VMBHACK).

//---------------------------<CUT HERE>-------------------------------------
//                   ZoSoft VMB Hacker Version 1.4
//                    Code by: Zoso, November 1991
//
//           See PHRACK 34 for more information on VMB systems.
//
// NOTE: Do not remove the credits of the original author, modified versions
//       you may add credits, but please do not remove any.
//
str code[10],                           // Global Variables
    codes[10],
    reset[1],
    vmb_number[15],
    borc[1],
    valid[10],
    setup[3];
str filename[12],
    fstatus[10];
int f;
int fflag = 0;
init_modem()                            // Modem initialization
{
cputs("AT X3 S6=0 S7=0 S11=105 M1 L3"); // X must be 3, L is Loudness on
cputs("^M");                            // some modems, you may have to
waitfor("OK",20);                       // alter this. See you modem
manual.
}
vmb_dial(str string)                    // Dial function
{
str workstr[20];
workstr = string;
strcat(workstr,";");
cputs("ATDT");
cputs(workstr);
cputs("^M");
cputs("^M");
}
hang_up()                               // Hang Up function
{
hangup();
waitfor("",20);
cputs("ATH0");
cputs("^M");
cputs("^M");
clear_scr();
display();
}
next_code()                             // Next code function
{
int cd;
if (fflag)
   {
    if (not feof(f))                    // Check for file first
       {
        fgets(code,10,f);
        return;
       }
    if (feof(f))
       {
        file_close();
        code = "999";
        goto NEXTCODE;
       }
   }
NEXTCODE:
cd = stoi(code);
cd = cd + 1;                            // This line determines how the
code
itos(cd,code);                          // gets incremented.
}
set_code()                              // Enter new code
{
gotoxy(65,2);
gets(code,10);
}
parameters()                            // Set parameters
{
str c[1];
file_close();
GETINFO:
clear_scr();
printsc("VMB Hacker Parameters^M^J");
printsc("^M^JVMB phone number    :");
gets(vmb_number,15);
printsc("^M^JSetup sequence      :");
gets(setup,3);
printsc("^M^JValid box #         :");
gets(valid,10);
printsc("^M^JCodefile filename   :");
gets(filename,12);
if (filename != "")
   {
    open_file();
    next_code();
   }
if (not fflag)
   {
    filename = "N/A";
    printsc("^M^JStarting box/code   :");
    gets(code,10);
   }
printsc("^M^J^M^JCorrect? (Y/n):");
gets(c,1);
if (c == "n" || c == "N")
    goto GETINFO;
}
press_enter()                           // Pause routine
{
str a[1];
pstraxy("Press [ENTER] to continue...",20,23,11);
gets(a,1);
}
title_scr()                             // Title screen
{
str i[1];
TITLE:
clear_scr();
pstraxy("  - ZoSoft VMB Hacker V1.4 -",20,4,11);
pstraxy("written for Telix by: Zoso Puda",20,6,14);
press_enter();
}
display()                               // Display screen
{
box(0,0,78,3,4,0,19); box(0,0,78,5,4,0,19);
pstraxy("[ ZoSoft VMB Hacker V1.4 ]",25,0,31);
pstraxy("VMB Number:",4,2,31);          // Information display
pstraxy(vmb_number,16,2,27);
pstraxy("Valid #:",33,2,31);
pstraxy(valid,42,2,27);
pstraxy("Current:",57,2,31);
pstraxy(code,66,2,27);
pstraxy("Codefile:",6,4,31);
pstraxy(filename,16,4,27);
pstraxy("File status:",29,4,31);
pstraxy(fstatus,42,4,27);
pstraxy("Setup sequence:",50,4,31);
pstraxy(setup,66,4,27);
box(0,6,78,10,4,0,103);                 // Function key display
pstraxy("[           ]",30,6,111);
pstraxy(" 0 - 9,*,#",31,6,110);
pstraxy("[  ] Dial VMB", 2,7,111);
pstraxy("F1", 3,7,110);
pstraxy("[  ] Hang up",22,7,111);
pstraxy("F2",23,7,110);
pstraxy("[  ] Close file",42,7,111);
pstraxy("F3",43,7,110);
pstraxy("[  ] Set Current",61,7,111);
pstraxy("F4",62,7,110);
pstraxy("[  ] Setup seq.",2,8,111);
pstraxy("F5", 3,8,110);
pstraxy("[  ] Dial current",22,8,111);
pstraxy("F6",23,8,110);
pstraxy("[  ] Next box/code",42,8,111);
pstraxy("F7",43,8,110);
pstraxy("[  ] Valid box",61,8,111);
pstraxy("F8",62,8,110);
pstraxy("[  ] Parameters",22,9,111);
pstraxy("F9",23,9,110);
pstraxy("[   ] QUIT",41,9,111);
pstraxy("F10",42,9,110);
gotoxy(0,11);
}
quit_vmb()                              // End program
{
file_close();
hangup();
waitfor("",20);
clear_scr();
printsc("Thanks for using ZoSoft's VMB Hacker.^M^J^M^J");
cputs_tr(_mdm_init_str);                // Restore modem params
}
open_file()                             // Open Codefile
{
fflag = 1;
f = fopen(filename,"r");
fstatus = "OPEN";
if (ferror(f))
    file_close();
}
file_close()                            // Close Codefile
{
fflag = 0;
fclose(f);
fstatus = "CLOSED";
}
main()                                  // MAIN program module
{
int chr;
title_scr();
parameters();
clear_scr();
display();
init_modem();
TOP:
gotoxy(0,11);
chr = inkeyw();
if (chr == '0')    vmb_dial("0");       // Dial 0-9
if (chr == '1')    vmb_dial("1");
if (chr == '2')    vmb_dial("2");
if (chr == '3')    vmb_dial("3");
if (chr == '4')    vmb_dial("4");
if (chr == '5')    vmb_dial("5");
if (chr == '6')    vmb_dial("6");
if (chr == '7')    vmb_dial("7");
if (chr == '8')    vmb_dial("8");
if (chr == '9')    vmb_dial("9");
if (chr == '#')    vmb_dial("#");       // Pound sign (#)
if (chr == '/')    vmb_dial("#");       // Make (/) same as (#) for keypad
if (chr == '*')    vmb_dial("*");       // Asterisk (*)
if (chr == 15104)                       // F1
    vmb_dial(vmb_number);
if (chr == 15360)                       // F2
    hang_up();
if (chr == 15616)                       // F3
   {
    file_close();
    display();
   }
if (chr == 15872)                       // F4
   {
    set_code();
    display();
   }
if (chr == 16128)                       // F5
    vmb_dial(setup);
if (chr == 16384)                       // F6
    vmb_dial(code);
if (chr == 16640)                       // F7
   {
    next_code();
    display();
   }
if (chr == 16896)                       // F8
    vmb_dial(valid);
if (chr == 17152)                       // F9
   {
    hang_up();
    parameters();
    display();
   }
if (chr == 17408)                       // F10
   {
    quit_vmb();
    goto END;
   }
goto TOP;
END:
prints("^M^J");
}
//---------------------------<CUT HERE>---------------------

______________________________________________________________________________

:: More Legal Stuff ::

>From: "Michael Lawrie, Operations" <[email protected]>
>Subject: RE: Who/What is this?
>
>In this country, the receipt of documents like this would probably be
>pretty helpful in sending a person down on a conspiracy to contravene
>a section or more of the Computer Misuse Act, I do not appreciate crap
>like this appearing on my machine but since you didn't send it me, I
>can't really moan at you - What I would appreciate though is if you
>told people that forwarding it to people who don't want it is probably
>not a good idea, unless you want all your list members locked up in
>some pokey British gaol that is!
>
>Michael Lawrie.
>---
>Michael Lawrie, Hicom Group Security           <[email protected]>

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Sir,
     You will have to excuse my ignorance of telecom laws in other countries.
In the United States, distribution of technical information such as Phrack Inc.
is protected by law.

     Hackers are not involved in conspiracies or plots.  Most hackers could
care less about politics.  Hackers are interested in the progression of
technology and learning about how our advanced society works.  The inefficient
structure known as government is the last thing most hackers are interested in
exploring.

     Phrack Inc. has no "membership."  Phrack Inc. is an electronically
distributed publication.  It is like any other security oriented newsletter.
Have you ever heard of "Computer Security Journal", "Computers and Security",
or "Computer Crime Digest?"  These are some of the "security industry"
publications that are read in the U.S.  Phrack Inc. merely has a little
different flavor to it.  If you are interested in seeing any of these printed
journals, I can forward their address to you.

     I am sorry if you received Phrack Inc. and didn't wish to read it.  You
might wish to take the matter up with the person that forwarded it to you.  I
hope it wasn't too big of an inconvenience for you to delete the mail message
containing Phrack Inc.

Cheers,

Dispater

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

     After a (as it turns out not so private) conversation with Torq, it seems
this guy isn't even an admin anywhere.  He just likes to pretend he is.  Did my
reply end this little debate?  NOT!  This person had the nerve to intercept my
private mail to Torq and then proceeded to bitch about it some more.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

>From [email protected] Sat Nov  9 09:45:53 1991
Date: Fri, 8 Nov 91 13:19 GMT
From: "Michael Lawrie, Operations" <[email protected]>
To: PHRACKSUB <<@nsfnet-relay.ac.uk:[email protected]>>
Subject: The EFF.

I found the following message the other day, whilst routing around, I am to
assume you lied to me about taking him off the list but for now we'll forget
that.

> From [email protected] Wed Oct 23 01:41:51 1991
> Date: Wed, 23 Oct 91 01:41:47 -0400
> From: [email protected]
> Message-Id: <::::::::::::::::::::::>       
> To: torq@:::::::::::::::
> Subject: Phrack
>
> This guy sounds like a total idiot. If he does kill your account or something
> stupid, get a hold of the EFF.  They went to bat for someone who had their
> account revoked because he/she had issues of Phrack on their directory.
>
> people should get a clue....
>
> Dispater
> [email protected]

As you say, people should get a clue. Are you assuming that 'torq' is perhaps
American and as such has his rights protected by constitution? He isn't, he is
British and doesn't really as such have much going for him. If I want to kill
his account I can do it at the bat of an eyelid, whilst him receiving 'Phrack'
is not breaking any laws because it does not show intent, it would be breaking
my machine's regulations if it came here. I would enjoy the EFF to come 'to
bat' for Torq if I revoke his account for having issues of Phrack in his
directory, Its a shame he hasn't. Does the EFF have any good lawyers in the UK
that you know of?

Regards...
  Michael.

---
Michael Lawrie, Operations Group, Systems Development and Security.
Mail: [email protected]                     (Span:19527::60478::lorry)
[What pretentious signature?]                     (Inet: [email protected])


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

From: Dispater
To: [email protected]

        I never said I would delete him from the distribution list.  I don't
have to DO anything.  Who the hell are you pretending to be anyway?  You aren't
the admin of MIT's gnu machine.

>I found the following message the other day, whilst routing around, I am to
>assume you lied to me about taking him off the list but for now we'll forget
>that.

        Really?  What the hell were you doing prowling though someone else's
mail?  I assume you did it without Torq's permission.  I wonder if MIT would
like to hear that some British hacker is rummaging around their machine?  Your
"finding" of our private e-mail might place you in criminal violation of the
Electronic Communications Privacy Act of 1986.  This is a federal law in the
United States which protects the privacy of electronic communications.  Your
interception of our communications has violated our privacy.  How would you
like me to have a little chat with YOUR supervisor?

       Why you care about what takes place on the MIT computer which is located
here in the USA?  In this country freedom of speech is a right granted to all
its citizens.  The previous publisher of Phrack had to go to Federal Court to
prove it and he succeeded.  Phrack Inc. is 100% legal here and there is not one
damn thing you can do about it!

Dispater
______________________________________________________________________________

:: Hacker Philosophy ::

From: The Dark Lord Sarik Malthus
Organization: Underground Computing Foundation


>         I'm curious...now, don't think I am trying to judge you, or your
> actions, or anything...but I am wondering how you, in your mind, justify the
> actions of hackers and the kind of information provided by your magazine?

     I don't.  I think people spend too much time attempting to justify
their "morality."  I don't play that guilt trip.  I only seek information.
Information has no morality.  It is simple and pure, just like truth.

     I do feel that with knowledge comes responsibility not to use it in a
destructive way.  This is why I will not print "how to make bomb" files in
Phrack Inc.  Explosives are made for one thing and it doesn't involve too
much creativity.  People can get that type of stuff elsewhere.

     I have never damaged any system or hurt any individual financially.
Carding is unquestionable robbery.  If you know the person you are carding
from, that is revenge and is a different category, as far as I am concerned,
but it still doesn't make it right.  Besides, any poser with half a brain can
pull a CBI.  That doesn't demonstrate much talent to me.  I admit I went
through the c0deZ phase, but I moved onto better things.

     I guess your basic question may boil down to, "Why hack?"  I see the
internet and the telecom world in as the latest frontier to be explored.  If
you look back at how this country started, you will see that it was explored
by people who probably had a similar mentality to that of hackers.  We want
to test ourselves.  We want to have a broad range of different experiences in
our lives.  We are not content with ignorance of the unknown.  And, to some
extent we are sick of our current society's norms.  With that in mind we
leave the security of what is considered acceptable at times.

     I guess I have a lot of different unpopular views....oh well.
_______________________________________________________________________________

A Review of:
~~~~~~~~~~
Full Disclosure #23 - a publication For Truth, Justice, and The American Way
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Full Disclosure                              Subscription Rates:
P.O. Box 903-FD23                            U.S - 12 issues for $18.00
Libertyville  IL  60048                            24 issues for $29.95
                                             No Canadian orders, please!
by:Twisted Pair


     About a month ago I mailed in a coupon I got from friend in order to get a
sample issue of Full Disclosure.  Within a week I received Issue #23.  It's got
articles on fax interception, dumpster diving, computer security tips,
surveillance tips, technical stuff, mail surveillance, etc.

     The Fax Interception article was most interesting to me.  I've often
wondered just how easy it could be to intercept faxes.  Its all explained in
the article.  Here's some text from the article:

|                       False Sense of Security:
|
|   With the widespread proliferation of fax machines came increased use.
|   In general, a document transferred has been given the same sort of
|   validity as one sent or received by the U.S. Mail.*  In general, such
|   communications were originally secure.  Now that interception equipment is
|   available, the
|   sense of security has become false.

*Note:  Just this month, the FCC has stopped accepting paperwork with faxed
        signatures on them.  Their new policy states that they only accept
        original signatures.

     How could the average Phrack reader start intercepting faxes?  Use a
standard fax machine hooked up to someone's line?  Naaah.  Wouldn't work.  The
handshaking routine between the two corresponding fax machines would be screwed
all to hell if you threw a third machine into the mix.  Full Disclosure claims
to have successfully nabbed faxes with another method.  They've pointed out
this assertion with a photo on their front page of a "fax".  It was supposedly
intercepted from the FBI.  It shows a computer screen with an FBI "FAX" on it.
It looks more like the photo was made with some cutting and pasting at the
neighborhood PIP store.  Maybe they should have added the caption "Simulated
Picture" to their front page.

     They recommend using IBM PC fax boards to intercept faxes.  You'd need
"sophisticated" software that would ignore the handshaking sequences between
the two fax machines you're spying on.  The IBM would just save all the page
information and ignore the protocol information transmitted.

Back to the article....

|   Cellular phone-based fax machines provide ripe opportunity for "hacker"
|   intercepts, since the signal is available via low cost police scanners.*
|   No physical connection to a common carrier network is necessary.  There is
|   absolutely no risk of being detected.

*Note:  That should read MODIFIED police scanners.  See any of the ads in
        "Nuts & Volts" for a book on doing this.

     Discussed in the article is something called Broadband Interception.
Commercial fax interception equipment can be hooked up to monitor satellite
link traffic.  One unit can decode up to 150 simultaneous fax transmissions
from a 6,000 phone line satellite link.

     Next, all the consequences of forged faxes are discussed.  People have
become so reliant on fax technology that they incorrectly assume that anything
that "comes over the fax" must be legitimate.  Forgers find faxing much simpler
than trying to make a "real" document.  The trouble of altering postmarks and
signatures is bypassed.  All they need now is scissors and tape to make any
"legitimate-looking" document needed.  In their next issue, they further
discuss fax interception and all the implications of sending sensitive info by
fax.

|                         Fax Intercept Suppliers
|          (The sale and/or use of fax interception equipment may be
|                  restricted by State and Federal law)
|
|   Burlex International, Box 6094, Silver Springs MD 20906 (301) 460-4444;
|   Communications Devices,3510 Mountain Rd,Haymarket VA 22069 (703) 754-9316;
|   El-Tec Intl, 205 Van Buren St #220, Herndon VA 22080 (703) 709-9673;
|   [Many others listed]

Oh, here's an ad from Full Disclosure.  It's a business card run:
     ______________________________________________________
|   |                                                      |
|   | Unix Systems Specialists     Available July 10, 1992 |
|   |                                                      |
|   |               L  E  N       R  O  S  E               |
|   |                                                      |
|   |                  Convicted "Hacker"                  |
|   |                         and                          |
|   |                 Computer  Consultant                 |
|   |              799 Royal St. Geore  #105               |
|   |         Naperville, IL 60563  (708) 527-1293         |
|   |______________________________________________________|

     Since you might want to check out a copy of Full Disclosure for yourself,
I'll include their address and stuff.  The issue I had was 16 pages long,
half-newspaper size.
______________________________________________________________________________


A Review of TAP #105
~~~~~~~~~~~~~~~~~~~
TAP Magazine                                       Subscription Rates:
PO Box 20264                                       10 issues for $10.00
Louisville KY  40250-0264

by Dispater

     Around March of 1991 I mailed in my $10. for a subscription to TAP
Magazine.  Promoted as "the oldest hacker magazine" and "created by Abbie
Hoffman."  I still, to this day, have not received ONE issue for my money.

     While attending CyberView '91, I met Predat0r and gave him $5.00 for a few
back issues consisting of #97, #100 through issue #104.  I was later given a
complimentary issue of #105.  After asking about #98 & #99, Predat0r said that
he wasn't going to give those out because of some bullshit with Aristotle.
Whatever...I still don't see why we couldn't see it.

     Anyway, Issue #105 of TAP Magazine (June 1991) was nothing spectacular,
but it wasn't bad either.  The issue was 18 pages long.  For those of you who
have never seen it, TAP contains information on hacking and phreaking as well
as some political commentary.  The articles are always diverse and interesting.

     TAP #105 contained information about the DNA Box.  This is basically
cellular phone phreaking.  It was very good and quite detailed.  There were
also schematics of bugs and a flow chart explaining the incident initiation
sequence of the E-911 system.  This issue of TAP was sprinkled with some neat
advertisements and news clippings (as usual) and wrapped up with a file about
Blue Boxing.  The price of $10.00 for 10 issues is worth it, but read on...

     Last week I asked Predat0r what was going on with TAP magazine.  He told
me that he had the material for the next three issues, but his copier or some
other equipment was broken.  This is an excuse I have heard before.  Whether it
is a valid excuse or not, only he knows.  Since issue #105 (June) there has
been not one issue of TAP.  If you have ordered a subscription prior to July
and not received anything, I highly suggest you write to Predat0r.

     The material contained in TAP is good and very much worth the price.
(Especially compared to 2600 Magazine) However, I find that the general
management of TAP to be poor, at this time, and therefore I highly recommend
that you NOT send your $10 to TAP Magazine.  Considering the amount of
advertisements that we have all seen by TAP (in magazines such as Mondo 2000,
2600, etc.) in the past year, there is no excuse for the non-existent service
that has transpired.  Predat0r is a good sysop and needs to manage TAP as he
does his BBS.  I do urge you to call BLITZKREIG BBS (502) 499-8933 : NUP:
COLUMBIAN COKE.

     I really don't like to be so critical, but I know some people I've talked
to are feeling ripped off.  This is why I wrote this.  I truly hope that TAP
can get out of this slump.
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                Volume Three, Issue Thirty-five, File 3 of 13

                 -*[  P H R A C K  XXXV  P R O P H I L E  ]*-

                             -=>[  Presents  ]<=-      

                        Sincerely Yours, Chris Goggans
                        -===--===--===--===--===--===-
                             by S. Leonard Spitz
                             Associate Publisher
                          INFOSecurity Product News

"A provocative interview with a former member of the "Legion of Doom" suggests
that the ethics of hacking (or cracking) are often in the eye of the beholder."

Malicious hackers, even though most operate undercover, are often notorious for
the colorful pseudonyms they travel under.  Reformed hackers, however, prefer a
low profile so as to shed their image of perceived criminality.  Kevin Mitnick,
infamous for the DEC caper, is one of the foremost advocates of this strategy.

Now comes Chris Goggans, trailing his former "Legion of Doom" moniker, Erik
Bloodaxe, behind him, to try it his way.  Goggans insists that where once he
may have bent the rules, he is now ready to give something back to society.
And coming across with a high degree of sincerity, he affirms his intention to
try.  Are he and his colleagues, wearing their newly acquired information
security consultants hats, tilting at windmills, or does their embryonic,
cracker-breaking start-up, Comsec Data Security Co., stand a fighting chance?
We thought we would ask him.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

ISPNews: I am going to ask several legitimate questions.  Please answer them
          completely, truthfully, and honestly.

Chris Goggans:  OK.


JUDGEMENT BY THE MEDIA

ISPNews: Would you react to Computerworld's July 29 piece, "Group Dupes
          Security Experts," <also seen in Phrack World News issue 33, part 2
          as part of the article called "Legion of Doom Goes Corporate> in
          which members of your organization were accused of masquerading as
          potential customers to obtain information, proposals, and prices from
          other security consultants?

     CG: We were all amazed that something like that would ever be printed
          because, as we understand common business practices, we weren't doing
          anything unusual.

ISPNews:  Computerworld reported that the Legion of Doom was "one of the
          nation's most notorious hacker groups, according to federal law
          enforcers."  Can you respond to that?

     CG: Notorious is a relative term.  There has always been a shroud of
          mystery covering the Legion of Doom, because it was an organization
          whose membership was private.  When you keep people in the dark about
          the activities of something, there is always going to be the
          perception that more is going on than there really is.

ISPNews: Would you say then that the characterization of being notorious is
          unfair?

     CG: To some degree, yes.  There certainly was activity going on within
          the group that could be considered illegal.  But most of this was
          taking place when members of the group were all between the ages
          of 14 and 17.  While I don't want to blame immaturity, that's
          certainly a factor to be considered.

          The Legion of Doom put out four <issues of an> on-line electronic
          newsletter <called the Legion of Doom Technical Journals> composed
          of different files relating to various types of computer systems
          or netware.  They explained different operating systems or
          outlined different procedures used by networks.  They were always
          informative and explained how to use a computer.  We never said
          "This is a computer and this is how to break into it."

          Colorful names and words used to describe groups also add to
          notoriety.  If we had been the "Legion of Flower Pickers," the
          "Legion of Good Guys," or the "SuperFriends," there probably
          wouldn't be this dark cloud hanging over the group.

ISPNews:  Could you be charged with intent to provide information to others
          which would make it easier to gain unauthorized access?

     CG: I don't see how that could be a charge.  There's the first amendment.
          I maintain that talking about something and encouraging or forcing
          someone to do it are completely different.


EARNING AN "A" IN INFOSECURITY

ISPNews:  What attracted you to computer security?

     CG: The same thing that would attract anybody to being a hacker.  For
          half of my life I've been in front of a computer every day.
          Sometimes from early in the morning until the wee hours of the night.
          And my particular focus has been on computer security.

ISPNews:  At least the dark side of that coin.

     CG:  I wouldn't say the dark side.  I'd say the flip side.  If you do
          something for 11 years, you are going to pick up a lot of knowledge.
          And I've always wanted to find some kind of productive career that I
          thoroughly enjoyed.  So this was just an obvious progression.  No one
          wants to be a 40-year-old hacker living in fear of the Secret
          Service.

ISPNews: When you first applied to enter college, did you feel that it was the
          right place to learn about information security?

     CG: Yes, I thought it was the right place, mainly because college is the
          most obvious choice to pursue an education in any field.  I just
          assumed that I would be able to find formal training leading to
          certification or a degree in this field.  Yet, at the University of
          Texas, there wasn't anything along those lines.

ISPNews:  Did you graduate from the University of Texas?

     CG: No, I changed majors and then moved to Houston.  I had started out in
          computer science but it was completely unrelated to any kind of
          career I wanted to pursue.  I eventually changed my major to
          journalism.  There are only two things I like to do:  Work on
          computers, and write.  So, if I wasn't going to get a degree in one,
          it was going to be in the other.  I'm a semester away, and I do plan
          on finishing.

ISPNews:  If you were to structure a college curriculum for studies in
          information security, would you design it to focus on technical
          issues, ethics, business issues, or legal matters?

     CG: I would try to focus on all of these.  If you don't have a technical
          background, you can't understand the way the operating system works,
          and you really can't focus on some of the issues that need to be
          addressed with information security.

          Ethics certainly come into play ass well for obvious reasons.  I
          don't think hackers are going to go away.  Even with the advent of
          newer technology, there are always going to be people who have an
          interest in that technology and will learn how to manipulate it.


ETHICS, INTELLECTUAL PROPERTY RIGHTS, AND THE LAW

ISPNews:  What is your definition of a hacker?

     CG: A Hacker is someone who wants to find out everything that there is to
          know about the workings of a particular computer system, and will
          exhaust every means within his ability to do so.

ISPNews:  Would you also comment on the ethics of hacking?

     CG: There is an unwritten code of ethics that most people tend to adhere
          to.  It holds that: no one would ever cause damage to anything; and
          no one would use any information found for personal gain of any kind.

          For the most part, the only personal gain that I have ever seen from
          any sort of hacking activity is the moderate fame from letting others
          know about a particular deed.  And even in these cases, the total
          audience has been limited to just a few hundred.

ISPNews:  Are you unaware of hackers who have in fact accessed information,
          then sold it or massaged it for money?

     CG: No, certainly not.  I am just acknowledging and defining a code of
          ethics.  We of the Legion of Doom tried to adhere to that code of
          ethics.  For example, members of the original nine who acted
          unethically were removed from the group.

ISPNews:  Do you believe that penetrating a computer system without either
          making changes or removing information is ethical, or a least is not
          unethical?

     CG:  At one time in the past I may have held that belief, but now I
          certainly must not, because the whole idea of being involved in the
          formation of my new company, Comsec Data Security, would show
          otherwise.

ISPNews:  So today, you believe that unauthorized entry is unethical.

     CG:  Exactly.  As a hacker, I didn't particularly hold that.  But as
          things such as invasion of privacy, even though I never caused any
          damage, and breach of trust became more apparent to me, I was able to
          step back, see the picture, and realize it was wrong.

ISPNews:  Can I conclude that you are speaking for you company and its
          principals?

     CG:  Yes, I am speaking for all of the principals.

ISPNews:  What are your views on the ownership of information?

     CG:  I feel that proprietary information, national-security-related
          information, information that could be considered a trade secret, all
          definitely have ownership, and access should be restricted.

          In the past, I felt that information that affected me or had some
          relevance to my life should be available to me.  I felt that
          information should be available to the people it affected, whether
          that be phone company information, credit bureau information, banking
          information, or computer system information in general.  I am saying
          this in the past tense.

          In the present tense, I feel that the public is entitled only to
          information in the public domain.  Information not available legally
          through normal channels is just going to have to be left at that.

ISPNews:  Do you believe that software should always be in the public
domain.?

     CG: No, I do not.  If I wrote something as wonderful as Lotus, or any of
          the Microsoft programs, or Windows, I would want people to pay for
          them.

ISPNews:  Then you do believe in private ownership of and protection for
          software?

     CG:  Yes, definitely.

ISPNews:  What are you views on current U.S.  Computer crime laws?

     CG:  I think that the current laws are too broad.  They do not make
          distinctions between various types of computer crimes.  I consider
          breaking into a computer akin to trespassing.  If someone simply
          walks across my lawn, I might be upset because they trampled my
          grass, but I would leave it at that.  If someone drives across my
          lawn and leaves big trenches, and then comes over and kicks down my
          rosebush, well that's another thing.  Then, if someone drives up my
          steps, goes through my house, through my kitchen, steals all my
          silverware, and then leaves, that's something completely different.
          And while these physical representations of trespassing can't be
          applied directly to an electronic format, distinctions are still
          necessary.

ISPNews: And the present computer crime laws do not make these distinctions?

     CG: I am no lawyer, but from my understanding they do not.  They need to
          be brought into focus.

ISPNews: If they were brought into the kind of focus you suggest, would they
          be fair and equitable?

     CG: Definitely, depending on the punishment that went along with them.  I
          don't think that people who own and operate computer systems would
          view someone who has logged into their system using a guest account
          that was deliberately left with no password to be as serious an
          intrusion as someone who got the system administrator password and
          then went through and deleted all the files.  I don't think that
          simple intrusion would be considered as serious as unauthorized
          penetration along with the wholesale theft and sale to a competitor
          of marketing information, and advertising plans, and financial
          projections for the next quarter.

ISPNews:  What are your views on security training for users?

     CG: People need to be taught what the computer operating system is and
          how it works.  After that, they need to establish some sort of
          channel by which information can be transmitted to others. Direct
          physical contact between communicating parties, covered by official,
          standard company procedures, is the best way to do this.

          People need to be aware that their account, no matter the level of
          importance, is a link in a chain that makes up the security of the
          system.  Information from one account can be used as a springboard to
          other, more powerful accounts.  All users within a network must
          understand that their information is just as important in the
          security chain as is that of the next person.

ISPNews: Given where you are coming from, why should a potential client trust
          you?

     CG: I know that is a natural question.  Just the very nature of creating
          a company should project an image that we are trying to come out of
          the shadows, out of the underground.  We are saying, "Look everybody,
          we've been doing this for a long time, now we want to help.  We have
          11 years of working information about how people compromise existing
          security, and we can help with your particular situation."

ISPNews: I am sure that you understand the natural suspicion that people have.

     CG:  No, that's what I don't understand.  If we at Comsec were out to
          compromise information from an existing company's computer network,
          we wouldn't have incorporated.  We could have done that, and someone
          else out there probably has already done so.  Then the information
          would be available to from one hacker to another.

ISPNews: Are you suggesting there is no system out there that you can't break
          into?

     CG: No, I'm not suggesting that.  But I am saying the vast majority can
          be penetrated.

ISPNews:  Which system is easiest to crack; and which is most difficult?

     CG:  It is hard to say which system is more inherently penetrable than
          another.  From the initial log-in, it's not the operating system;
          rather it's the system's operating environment that is the problem.
          Users may not have addressed security measures.  Certain types of
          security holes may not have been closed.  That's where a technical
          background comes into play: to understand the way the applications
          work; how different systems are accessed; to close holes in the
          system which have become apparent.  You have to deal with human
          factors and technical issues.  You must understand the way the
          computer works and the way programs are run.

ISPNews:  What is the best way to foil hackers?

     CG: It depends on the hacker.  There are different types.  Some people
          hack with modems.  The casual hacker may just stumble across your
          particular computer system, and may be foiled with something as
          simple as good external security.  He may be turned off by physical
          security devices such as a call-back modem, some sort of code access,
          or smart card.

          These measures will not stop a serious hacker who is after your
          company specifically.  In this case, you have to beef up security,
          and take additional steps to ensure the safety of your computer.  And
          you must make certain that security on the inside is as tight as on
          the outside.

ISPN Editor's Note:  Chris Goggans will respond, in every other issue of
                     ISPNews, to your questions on hacking computer systems.
                     His answers promise to be problem-solving, interesting,
                     and even entertaining.  We invite you to write Chris c/o:

                     "Hackers' Mailbag"
                     ISPNews
                     498 Concord Street
                     Framingham, MA  01701-2357
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                Volume Three, Issue Thirty-five, File 4 of 13

                                Amadeus Presents
 //////////////////////////////////////\\\\\\\\\\\\\\\\\\
<<<<<<<<<<<<<  TELENET/SPRINTNET'S PC PURSUIT OUTDIAL DIRECTORY >>>>>>>>>>>
 \\\\\\\\\\\\\\\\\\\////////////////////////////////////
                                October 25, 1991

Area
Code  City, State U.S.A.              300 bps      1200 bps     2400 bps
--- --------------------------------- ------------ ------------ ------------
201 Newark, New Jersey                311020100001 311020100301 311020100022
    NJNEW                                2011         201301       20122
202 Washington, D.C.                  311020200115 311020200116 311020200117
    DCWAS                                202115       202116       202117
203 Hartford, Connecticutt            311020300120 311020300121 311020300105
    CTHAR                                203120       203121       203105
206 Seattle, Washington               311020600205 311020600206 311020600208
    WASEA                                206205       206206       206208
212 New York, New York                311021200315 311021200316 311021200412
    NYNYO                                212315       212316       212412
                                                               311021200028
                                                                   21228
213 Glendale, California              Same as 818,see 818's NUAs & addresses
    CAGLE                                       (Dial 1213+number)
213 Los Angeles, California                        311021300412 311021300413
    CALAN                                             213412       213413
                                                   311021300103 311021300023
                                                      213103       21323
213 Santa Ana, California             Same as 714,see 714's NUAs & addresses
    CASAN                                       (Dial 1213+number)
214 Dallas, Texas                     311021400117 311021400118 311021400022
    TXDAL                                214117       214118       21422
215 Philadelphia, Pennsylvania        311021500005 311021500112 311021500022
    PAPHI                                2155         215112       21522
216 Cleveland, Ohio                   311021600020 311021600021 311021600120
    OHCLE                                21620        21621        216120
301 Washington, D.C.                  Same as 202,see 202's NUAs & Addresses
    DCWAS                                       (Dial 1301+number)
303 Denver, Colorado                  311030300114 311030300115 311030300021
    CODEN                                303114       303115       30321
305 Miami, Florida                    311030500120 311030500121 311030500122
    FLMIA                                305120       305121       305122
312 Chicago, Illinois                 311031200410 311031200411 311031200024
    ILCHI                                312410       312411       31224
313 Ann Arbor, Michigan                No 300 bps
    MIAAR                                access
313 Detroit, Michigan                 311031300214 311031300216 311031300024
    MIDET                                313214       313216       31324
314 St. Louis, Missouri               311031400020 311031400021 311031400005
    MOSLO                                31420        31421        3145
317 Indianapolis, Indiana              No 300 bps
    ININD                                access
404 Atlanta, Georgia                  311040400113 311040400114 311040400022
    GAATL                                404113       404114       40422
407 Miami, Florida                    Same as 305,use 305's NUAs & addresses
    FLMIA                                       (Dial 1407+number)
407 Orlando, Florida                   No 300 bps
    FLORL                                access
408 San Jose, California              311040800110 311040800111 311040800021
    CASAN                                408110       408111       40821
412 Pittsburgh, Pennsylvania           No 300 bps
    PAPIT                                access
414 Milwaukee, Wisconsin              311041400020 311041400021 311041400120
    WIMIL                                41420        41421        414120
415 Oakland, California               311041500108 311041500109 311041500224
    CAOAK                                415108       415109       415224
415 Palo Alto, California             311041500108 311041500011 311041500005
    CAPAL                                415108?      41511        4155?
415 San Francisco, California         311041500215 311041500217 311041500217
    CASFA                                415215       415217       415217?
415 San Jose, California              Same as 408,use 408's NUAs & addresses
    CASJO                                       (Dial 1415+number)
503 Portland, Oregon                  311050300020 311050300021
    ORPOR                                50320        50321
504 New Orleans, Louisiana             No 300 bps
    LANOR                                access
512 Austin, Texas                      No 300 bps
    TXAUS                                access
516 Hempstead, New York                No 300 bps  311051600014
    NYHEM                                access       51614
516 New York, New York                Same as 212,use 212's NUAs & addresses
    NYNYO                                       (Dial 1516+number)
601 Memphis, Tennessee                Same as 901,use 901's NUAs & addresses
    TNMEM                                       (Dial 1601+number)
602 Phoenix, Arizona                  311060200020 311060200021
    AZPHO (Some 602 numbers require      60220        60221
           1602+number, see exchange  311060200022 311060200023 311060200026
           database below)               60222        60223        60226
612 Minneapolis, Minnesota            311061200120 311061200121 311061200022
    MNMIN                                612120       612121       61222
614 Columbus, Ohio                     No 300 bps
    OHCOL                                access
617 Boston, Massachusetts             311061700311 311061700313 311061700026
    MABOS                                617311       617313       61726
618 St. Louis, Missouri               Same as 314,use 314's NUAs & addresses
    MOSLO                                       (Dial 1618+number)
619 San Diego, California
    CASDI
703 Washington, D.C.                  Same as 202,use 202's NUAs & addresses
    DCWAS                                       (Dial 1703+number)
708 Chicago, Illinois                 Same as 312,use 312's NUAs & addresses
    ILCHI                                       (Dial 1708+number)
713 Houston, Texas                    311071300113 311071300114 311071300024
    TXHOU                                713113       713114       71324
714 Colton, California                311071400119 311071400121 311071400102
    CACOL                                714119       714121       714102
714 Santa Ana, California             311071400023 311071400024 311071400021
    CASAN                                71423        71424        71421
                                      311071400210 311071400213 311071400004
                                         714210       714213       7144
718 New York, New York                Same as 212,use 212's NUAs & addresses
    NYNYO                                       (Dial 1718+number)
801 Salt Lake City, Utah              311080100020 311080100021 311080100012
    UTSLC                                80120        80121        80112
813 Tampa, Florida                    311081300020 311081300021 311081300124
    FLTAM                                81320        81321        813124
815 Chicago, Illinois                 Same as 312,use 312's NUAs & addresses
    ILCHI                                       (Dial 1312+number)
816 Kansas City, Missouri             311081600104 311081600221 311081600113
    MOKCI                                816104       816221       816113
817 Dallas, Texas                     Same as 214,use 214's NUAs & addresses
    TXDAL                                       (Dial 1817+number)
818 Glendale, California                           311081800021
    CAGLE                                             81821
818 Los Angeles, California           Same as 213,use 213's NUAs & addresses
    CALAN                                       (Dial 1818+number)
901 Memphis, Tennessee                 No 300 bps
    TNMEM                                access
908 New Brunswick, New Jersey          No 300 bps
    NJNBR                                access
908 Newark, New Jersey                Same as 201,use 201's NUAs & addresses
    NJNEW                                       (Dial 1908+number)
913 Kansas City, Missouri             Same as 816,use 816's NUAs & addresses
    MOKCI                                       (Dial 1913+number)
914 New York, New York                Same as 212,use 212's NUAs & addresses
    NYNYO                                       (Dial 1914+number)
916 Sacramento, California            311091600011 311091600012 311091600007
    CASAC                                91611        91612        9167
919 Research Triangle Park,N Carolina 311091900020 311091900021 311091900124
    NCRTP                                91920        91921        919124

KEY: NUA (X.25 International Inter-Network User Address)------>311012300456
     Sprintnet/Telenet's Intra-network address --------------->    123456

PC Pursuit Outdial City/Area Code Cross Reference Directory
-----------------------------------------------------------

Ann Arbor, Michigan               313  New Brunswick, New Jersey        908
Atlanta, Georigia                 404  New Orleans, Louisiana           504
Austin, Texas                     512  New York, New York  212,516,718 &914
Boston, Massachusetts             617  Newark, New Jersey          201 &908
Chicago, Illinois      312, 708 & 815  Oakland, California              415
Cleveland, Ohio                   216  Orlando, Florida                 407
Colton, California                714  Palo Alto, California            415
Columbus, Ohio                    614  Philadelphia, Pennsylvania       215
Dallas, Texas               214 & 817  Phoenix, Arizona                 602
Denver, Colorado                  303  Pittsburgh, Pennsylvania         412
Detroit, Michigan                 313  Portland, Oregon                 503
Glendale, California        213 & 818  Research Triangle Park,N Carolina919
Hartford, Connecticutt            203  Sacramento, California           916
Hempstead, New York               516  Salt Lake City, Utah             801
Houston, Texas                    713  San Diego, California            619
Indianapolis, Indiana             317  San Francisco, California        415
Kansas City, Missouri       816 & 913  San Jose, California        408 &415
Los Angeles, California     213 & 818  Santa Ana, California       213 &714
Memphis, Tennessee          601 & 901  Seattle, Washington              206
Miami, Florida              305 & 407  St. Louis, Missouri         314 &618
Milwaukee, Wisconsin              414  Tampa, Florida                   813
Minneapolis, Minnesota            612  Washington, D.C.       202, 301 &703

Preface
-------

The PC Pursuit outdials, although limited in their dialing range, are of
fundamental knowledge to any X.25 hacker in the world.  Collecting the
addresses of the PC Pursuit outdials is among the first projects of any
hacker new to the X.25 hacking arena.  On and off through the years since
1986 when I first happened upon the X.25 scene, I have been attempting to
compile the complete list of NUAs for all of the outdials.  I still haven't
realized this goal five years later, as can be evidenced by blanks in the
above list.

Other outdials, such as the ones hacked out of explorations of internal
corporate, government, or educational networks, come and go usually as fast
as codes.  Some of these outdials are prize finds that can dial any number
in the world and would supplant the usefulness of this list.  But such out-
dials are normally gone in a matter of weeks.  The ones that do stay around
(such as the infamous 30209160xxxx global outdials) do not work very well.
Of course there are exceptions to every rule.  Some Global OutDials (GODs)
go on working for years, but only because they are known only by one or a
few hackers who don't go around giving it to everyone in hackerdom far and
wide.

The PC Pursuit outdials have been functioning without fail for several years
and will continue to be a reliable and useful hacker's tool for the foreseeable
future.  You can count on them to be there when you need them, especially when
a GOD you've been using fails and you need something to fall back on. I have
put together these two files to help further facilitate your use of the PC
Pursuit outdials.  I hope you find them useful references.

Some Notes for Beginners
------------------------

All the modems that you access on the outdials are of the Racal-Vadic brand
and accept the standard Hayes AT command set as a default.  I will not go
into an explanation of AT commands since you should already know them as a
competent user of your computer and modem.  If not, check your modem's
manual since it is almost certainly a Hayes compatible modem.

The Racal-Vadic modem offers its own command mode as an alternative to the
industry standard Hayes AT command set.  To access the Racal-Vadic mode, type a
CTRL-E and then RETURN.  You will see "READY" and an asterisk for a prompt.
Type "?" for a list of commands.  This mode is more attractive to many users
because of its verbose interface and detailed call progress messages; because
fewer keystrokes are needed to execute commands such as dial, and because of
its ability to redial up to nine times until a connection is made.

None of the outdials allow you to call them collect.  You will have to call
them from either a PAD (Packet Assembler Deassembler) or NUI (Network User
ID).  PC Pursuit IDs can also be used as pseudo-NUIs by typing the NUA
followed by a comma, the PCP ID, another comma, and the PCP Password.  If
you do not already have one, you will have to consult a fellow hacker for a
valid NUI or PAD (not as freely traded nowadays).  Or, to really impress
your hacker friends, hack your own. (Consult other files featured in Phrack
that deal with this subject matter.)

The 12 digit NUA (Network User Address) for each outdial above is for accessing
the outdial from a network other than SprintNet/Telenet.

The shorter five to six digit number below it is for accessing the outdial
from SprintNet/Telenet.  Actually, you can use the 12 digit number as well
as the shorter five to six digit number (if you precede the 12 digit NUA
with a 0) on SprintNet, but the shorter one is easier to remember and use.

For the purposes of memorizing the outdials that you will use more often, it is
a simple matter of remembering the shorter SprintNet address and convert- ing
it to the 12 digit NUA as needed like this:

SprintNet address xxxyyy becomes 3110xxx00yyy (Add 0's in yyy where needed)
EXAMPLE:          813124 becomes 311081300124
EXAMPLE2:         4155   becomes 311041500005 (Add preceding 0's in yyy)

Note that networks usually require you to precede the NUA with a 0 or 1
(usually 0) much like when you dial a long distance phone call.  For
example, on Tymnet, typing an NUA does not require a 0 or 1.  On Canada's
DataPac, a 1 is required before the 12 digit NUA.  On SprintNet and most
European X.25 networks, a 0 is needed.

When you connect with an outdial modem, the first thing you might want to
do is to redial the last number dialed.  The last person who used the modem
might have called a number that would be of interest to you in your hacking
endeavors.  Enter the Racal-Vadic mode and execute the "R" redial command.
The last number dialed is shown on the screen and dialed.  The A/ command
in the Hayes AT command mode won't work for this purpose since the last
number dialed is not shown and the last command executed isn't necessarily a
dialing command.

Unfortunately, when a person exits the outdial, the modem resets itself in
most cases and the last number dialed is lost.  But occasionally you'll get
lucky and find an interesting new number to call

Calling Specific Modems, and GODs (Global OutDials)
---------------------------------------------------

Each outdial has many modems that you can connect to.  When calling the
outdial NUA, you will be connected to the first available modem.  If all
are being used, you will get a busy message.  It is possible for you to
attempt to connect to one particular modem in the series rather than
connect to the first available unused modem.

Append two digits to the end of a NUA to specify which modem you want.
For example, to connect to the third modem on 311061200022, you would
call NUA 31106120002203.  So theoretically, you can call up to 99
different modems on the same outdial (31106120002200 is the same as
311061200022), but no outdials have this many modems.

On SprintNet, you can append a letter to the four to six digit address
to specify a modem.  You can also add a decimal point and then the two
digits for modems above 26 (and below).  For example, 31106120002203 is
the same as 61222C and 61222.03; 31108130012426 is the same as 813124Z
and 813124.26.

So, you may ask, why would I want to call a specific modem?

The reason is that some modems permit unrestrictive dialing.  Such modems
will let you dial ANY number in the world, not just the local numbers
that you're only suppose to call.  Such modems are known as GODs, which
stands for Global OutDial.

GODs don't last forever.  As soon as the SprintNet priests discover the
abuse occurring on a particular modem, they'll fix it.  So you'll have to
talk with your fellow hackers to find out which modems are known to be
GODs, or better yet, scan for your own.

Local Exchange Database
-----------------------

For those using the outdials from international locations, it is important
to note that you cannot call just any number in the same area code as the 
outdial.  Unless you're using a GOD (see part A), you can only dial numbers
local to the city the outdial is in.

At the end of this file you will find a database of all the exchanges (the
three numbers in a telephone number after the area code) that are dial-able
from each outdial.  This database will not only be useful to verify for sure
that you can dial a particular number from a PC Pursuit outdial, but will also
be useful for checking which outdial to use in cases where multiple outdials
can be used to dial different numbers in the same area code.  For example you
can dial numbers in area code 213 from THREE different outdials: 213 CALAN, 818
CAGLE, *and* 714 CASAN.  Unless you are familiar with the geographic dialing
plan of the Los Angeles area, you would have to consult the exchange database
to figure out which outdial to use.

The raw data for the list was downloaded from the PC Pursuit Service BBS
(call collectable from SprintNet at 311090900631, @C PURSUIT or @909631;
logon as "Sprint Guest" with password "outdial").  I made some very time
consuming modifications to the format of the list so that it could be used
effectively with Unix's grep command or MS-DOG's FIND command (and similar
commands on other operating systems).

For example, let's say you wanted to call a BBS at 213-395-0221.  As I
mentioned earlier, there are three different outdials that can dial numbers in
the 213 area code.  You have to find out which one to use.  On Unix, you would
type:

% grep 213 <filename>|grep 395

Or on MS-DOS, you would type:

C:>FIND "213" <filename>|FIND "395"

where <filename> is the name this file is saved under.  You will then see:
 OB
1 213 CAGLE 393 394 395 396 399 400 413 415 450 451 452 453 454 455 458
  213 CALAN 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400

As you can see, you can call 1-213-395-0221 from two outdials: CAGLE and
CALAN.  But notice that the CAGLE outdial has a 1 in front of it.  This
means that if you use the CAGLE outdial, you will have to dial with the
toll prefix (1) and area code preceding the local number since CAGLE is
in the 818 area code.

Dialing from CAGLE: ATDT12133950221
Dialing from CALAN: ATDT3950221

The Database
------------

  602 AZPHO 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234
  602 AZPHO 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249
  602 AZPHO 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264
  602 AZPHO 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279
  602 AZPHO 280 285 320 331 336 340 345 350 351 352 370 371 375 376 377
  602 AZPHO 379 381 382 389 390 391 392 393 395 396 397 412 420 423 431
  602 AZPHO 433 434 435 436 437 438 439 440 441 443 450 451 460 461 464
  602 AZPHO 468 470 481 482 483 484 486 490 491 493 494 495 496 497 498
  602 AZPHO 528 530 531 534 540 542 543 545 547 548 549 551 553 554 563
  602 AZPHO 585 588 589 596 597 598 630 631 640 641 644 649 650 661 678
  602 AZPHO 681 693 730 731 732 752 756 759 784 786 788 789 820 821 827
  602 AZPHO 829 830 831 832 833 834 835 838 839 840 841 842 843 844 846
  602 AZPHO 848 849 852 853 856 860 861 862 863 864 866 867 869 870 872
  602 AZPHO 873 876 877 878 879 890 891 892 893 894 895 897 898 899 921
  602 AZPHO 924 925 926 929 930 931 932 933 934 935 936 937 938 939 940
  602 AZPHO 941 942 943 944 945 946 947 948 949 951 952 953 954 955 956
  602 AZPHO 957 961 962 963 964 965 966 967 968 969 970 971 972 973 974
  602 AZPHO 975 977 978 979 980 981 985 986 990 991 992 993 994 995 996
  602 AZPHO 997 998
1 602 AZPHO 566 583 584 546 492 561 581 582 780 569 586 471 837 373 380
1 602 AZPHO 983 982 984 986 983 671 987 988
  714 CACOL 275 276 335 350 351 352 353 354 355 356 357 358 359 360 369
  714 CACOL 370 381 382 383 384 386 387 422 431 602 681 682 683 684 685
  714 CACOL 686 687 688 689 749 780 781 782 783 784 785 787 788 789 790
  714 CACOL 791 792 793 794 795 796 797 798 799 820 822 823 824 825 829
  714 CACOL 872 873 874 875 876 877 880 881 882 883 884 885 886 887 888
  714 CACOL 889
1 213 CAGLE 201 202 203 204 205 221 222 223 224 225 226 227 228 229 230
1 213 CAGLE 236 237 238 239 245 250 251 252 253 254 255 256 257 258 259
1 213 CAGLE 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284
1 213 CAGLE 285 286 287 288 289 303 310 314 315 319 340 341 342 343 345
1 213 CAGLE 347 351 353 362 380 381 382 383 384 385 386 387 388 389 392
1 213 CAGLE 393 394 395 396 399 400 413 415 450 451 452 453 454 455 458
1 213 CAGLE 459 460 461 462 463 464 465 466 467 468 469 480 481 482 483
1 213 CAGLE 484 485 486 487 488 489 520 550 551 552 553 556 557 558 559
1 213 CAGLE 573 580 612 613 614 617 619 620 621 622 623 624 625 626 627
1 213 CAGLE 628 629 650 651 652 653 654 655 656 657 658 659 660 661 662
1 213 CAGLE 663 664 665 666 667 668 669 680 681 682 683 684 686 687 688
1 213 CAGLE 689 714 730 731 732 733 734 735 736 737 738 739 740 741 742
1 213 CAGLE 743 744 745 746 747 748 749 765 785 828 829 836 837 838 839
1 213 CAGLE 840 841 842 849 850 851 852 854 855 856 857 858 859 870 871
1 213 CAGLE 872 873 874 875 876 877 878 879 891 892 893 894 895 896 912
1 213 CAGLE 913 930 931 932 933 934 935 936 937 938 939 955 960 962 963
1 213 CAGLE 964 965 966 967 968 969 972 974 975 977
  818 CAGLE 200 240 241 242 243 244 246 247 248 249 301 303 304 350 351
  818 CAGLE 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366
  818 CAGLE 367 368 370 371 372 373 374 375 376 377 378 379 381 382 393
  818 CAGLE 397 398 399 400 401 402 403 404 405 406 409 440 441 442 443
  818 CAGLE 444 445 446 447 448 449 450 459 500 501 502 503 504 505 506
  818 CAGLE 507 508 509 528 542 545 546 547 548 560 564 565 566 567 568
  818 CAGLE 569 574 575 577 578 579 580 584 753 754 760 761 762 763 764
  818 CAGLE 765 766 767 768 769 777 780 781 782 783 784 785 786 787 788
  818 CAGLE 789 790 791 792 793 794 795 796 797 798 799 818 821 831 840
  818 CAGLE 841 842 843 845 846 847 848 890 891 892 893 894 895 896 897
  818 CAGLE 898 899 901 902 903 904 905 906 907 908 909 951 952 953 954
  818 CAGLE 955 956 957 972 980 981 982 983 984 985 986 987 988 989 990
  818 CAGLE 994 995 997
  213 CALAN 200 201 202 203 204 205 206 207 208 209 212 214 215 216 217
  213 CALAN 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233
  213 CALAN 234 235 236 237 238 239 241 245 248 249 250 251 252 253 254
  213 CALAN 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269
  213 CALAN 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284
  213 CALAN 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299
  213 CALAN 300 301 302 303 304 305 306 307 308 309 310 312 313 314 315
  213 CALAN 316 318 319 320 321 322 323 324 327 328 329 330 331 
  213 CALAN 334 335 336 337 338 340 341 342 343 345 347 351 353 362 370
  213 CALAN 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385
  213 CALAN 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400
  213 CALAN 402 404 406 408 410 412 413 414 415 416 417 418 419 440 442
  213 CALAN 443 444 445 446 447 450 451 452 453 454 455 458 459 460 461
  213 CALAN 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476
  213 CALAN 477 478 479 480 481 482 483 484 485 486 487 488 489 500 512
  213 CALAN 515 516 520 527 531 532 533 535 536 537 538 540 541 542 543
  213 CALAN 544 545 546 550 551 552 553 554 556 557 558 559 560 561 562
  213 CALAN 563 564 565 566 567 568 569 573 574 578 580 581 582 583 584
  213 CALAN 585 586 587 588 589 600 601 602 603 604 605 606 607 608 609
  213 CALAN 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626
  213 CALAN 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641
  213 CALAN 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656
  213 CALAN 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671
  213 CALAN 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686
  213 CALAN 687 688 689 692 693 695 696 698 699 700 702 703 712 713 714
  213 CALAN 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729
  213 CALAN 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744
  213 CALAN 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759
  213 CALAN 760 761 762 763 764 765 769 770 771 772 773 774 775 776 777
  213 CALAN 778 779 780 781 782 783 785 791 794 801 802 803 804 806 807
  213 CALAN 809 812 813 814 819 820 821 822 823 824 825 826 827 828 829
  213 CALAN 836 837 838 839 840 841 842 846 849 850 851 852 854 855 856
  213 CALAN 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871
  213 CALAN 872 873 874 875 876 877 878 879 881 887 888 889 891 892 893
  213 CALAN 894 895 896 903 904 907 908 912 913 920 921 922 923 924 925
  213 CALAN 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940
  213 CALAN 941 942 944 945 946 948 949 955 960 962 963 964 965 966 967
  213 CALAN 968 969 970 971 972 973 974 975 977 978 979
1 818 CALAN 200 240 241 242 243 244 246 247 280 281 282 284 285 286 287
1 818 CALAN 288 289 300 301 302 303 307 308 309 350 357 358 359 401 402
1 818 CALAN 409 442 443 444 445 446 447 448 450 451 457 458 459 500 502
1 818 CALAN 507 529 545 546 547 548 570 571 572 573 574 575 576 579 580
1 818 CALAN 805 821 956
  415 CAOAK 200 222 223 227 231 232 233 234 235 236 237 241 243 251 252
  415 CAOAK 253 254 255 256 261 262 263 264 265 267 268 269 271 272 273
  415 CAOAK 274 276 278 279 282 283 284 285 287 291 292 295 296 297 298
  415 CAOAK 302 339 346 351 352 357 362 374 376 385 391 392 393 394 395
  415 CAOAK 396 397 398 399 420 421 425 428 430 431 433 434 436 437 441
  415 CAOAK 442 444 445 446 448 451 452 464 465 466 474 477 478 481 482
  415 CAOAK 483 486 495 521 522 523 524 525 526 527 528 529 530 531 532
  415 CAOAK 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547
  415 CAOAK 548 549 550 552 553 554 556 557 558 559 561 562 563 565 567
  415 CAOAK 568 569 576 577 581 582 596 597 620 621 622 624 626 627 631
  415 CAOAK 632 633 635 636 638 639 641 642 643 644 645 647 648 649 652
  415 CAOAK 653 654 655 658 660 667 668 670 673 677 678 695 724 727 729
  415 CAOAK 732 733 736 739 741 743 746 748 749 758 762 763 764 765 768
  415 CAOAK 769 771 772 773 774 775 776 777 781 782 783 784 785 786 788
  415 CAOAK 799 820 821 822 824 826 831 832 834 835 836 837 838 839 840
  415 CAOAK 841 843 845 848 849 860 861 863 864 865 869 874 881 882 884
  415 CAOAK 885 886 887 888 889 891 893 894 895 896 921 922 923 928 929
  415 CAOAK 930 931 932 933 934 935 936 937 938 939 942 943 944 945 946
  415 CAOAK 947 951 953 954 955 956 957 970 971 972 973 974 975 977 978
  415 CAOAK 979 981 982 983 984 985 986 987 989 990 995 996 998 999
  415 CAPAL 226 276 278 321 322 323 324 325 326 327 328 329 335 336 340
  415 CAPAL 341 342 343 344 345 347 348 349 354 358 361 363 364 365 366
  415 CAPAL 367 368 369 371 375 377 378 424 429 438 471 475 481 487 489
  415 CAPAL 490 493 494 496 497 498 537 538 570 571 572 573 574 578 579
  415 CAPAL 581 582 591 592 593 594 595 598 623 637 651 656 657 659 670
  415 CAPAL 683 688 691 694 696 722 723 725 727 732 733 745 770 780 782
  415 CAPAL 783 784 785 786 790 791 792 793 794 795 796 797 851 852 853
  415 CAPAL 854 855 856 857 858 859 881 884 886 887 888 889 926 940 941
  415 CAPAL 948 949 960 961 962 964 965 966 967 968 969
  916 CASAC 278 321 322 323 324 325 326 327 328 329 331 332 334 338 339
  916 CASAC 344 348 349 351 353 355 361 362 363 364 366 368 369 371 372
  916 CASAC 373 381 383 386 387 388 391 392 393 394 395 399 421 422 423
  916 CASAC 424 425 427 428 429 440 441 442 443 444 445 446 447 448 449
  916 CASAC 451 452 453 454 455 456 457 480 481 482 483 484 485 486 487
  916 CASAC 488 489 531 535 537 539 551 552 553 557 567 568 593 631 635
  916 CASAC 636 638 641 643 646 648 649 653 654 657 665 682 683 684 685
  916 CASAC 686 687 688 689 721 722 723 725 726 727 728 729 731 732 733
  916 CASAC 734 736 737 739 745 747 761 762 763 764 765 766 767 768 785
  916 CASAC 852 855 863 920 921 922 923 924 925 927 928 929 933 939 944
  916 CASAC 951 957 961 962 965 966 967 969 971 972 973 974 978 983 985
  916 CASAC 987 988 989 991 992
1 213 CASAN 430 431 433 434 438 439 493 494 498 592 594 596 597 598 797
1 213 CASAN 799 985 987
  714 CASAN 220 228 229 236 239 241 250 251 253 255 256 258 259 261 262
  714 CASAN 265 282 283 285 289 321 322 323 324 325 326 327 328 329 332
  714 CASAN 367 372 373 374 380 385 414 415 418 432 433 441 447 449 455
  714 CASAN 458 472 474 475 476 490 491 494 497 499 502 503 509 513 515
  714 CASAN 516 517 519 520 521 522 523 524 525 526 527 528 529 530 531
  714 CASAN 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546
  714 CASAN 547 548 549 550 551 552 553 554 556 557 558 559 565 566 567
  714 CASAN 568 569 572 579 581 582 583 586 587 588 589 630 631 632 633
  714 CASAN 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648
  714 CASAN 649 650 651 660 662 663 664 665 666 667 668 669 670 671 673
  714 CASAN 675 680 691 692 693 707 708 712 720 721 722 723 724 725 726
  714 CASAN 727 729 730 731 732 733 738 739 740 741 742 743 744 745 746
  714 CASAN 747 748 750 751 752 754 755 756 757 758 759 760 761 762 764
  714 CASAN 768 770 771 772 773 774 775 776 777 778 779 786 821 826 827
  714 CASAN 828 830 831 832 833 834 835 836 837 838 839 840 841 842 843
  714 CASAN 846 847 848 850 851 852 854 855 856 857 858 859 863 870 871
  714 CASAN 879 890 891 892 893 894 895 896 897 898 921 937 938 939 951
  714 CASAN 952 953 954 955 956 957 960 961 962 963 964 965 966 968 969
  714 CASAN 970 971 972 973 974 975 977 978 979 990 991 992 993 994 995
  714 CASAN 996 997 998 999
  619 CASDI 221 222 223 224 225 226 229 230 231 232 233 234 235 236 237
  619 CASDI 238 239 258 260 262 263 264 265 266 267 268 270 271 272 273
  619 CASDI 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288
  619 CASDI 289 290 291 292 293 294 295 296 297 298 299 336 338 390 401
  619 CASDI 404 406 408 412 413 416 417 419 420 421 422 423 424 425 426
  619 CASDI 427 428 429 435 437 440 441 442 443 444 447 448 449 450 451
  619 CASDI 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466
  619 CASDI 469 470 472 474 475 476 477 479 482 483 484 485 487 488 490
  619 CASDI 491 492 493 494 495 496 497 502 505 506 508 514 518 522 524
  619 CASDI 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539
  619 CASDI 540 541 542 543 544 545 546 547 548 549 551 552 553 554 556
  619 CASDI 557 558 559 560 561 562 563 565 566 569 570 571 573 574 575
  619 CASDI 576 578 579 580 581 582 583 584 585 586 587 588 589 592 594
  619 CASDI 604 660 661 662 668 669 670 672 673 690 691 692 693 694 695
  619 CASDI 696 697 698 699 701 702 717 980 981 987 990 991
  415 CASFA 200 221 227 231 232 233 234 235 236 237 239 241 243 244 251
  415 CASFA 252 255 257 258 259 261 263 264 266 267 268 269 271 272 273
  415 CASFA 274 279 282 285 287 289 291 292 296 298 302 330 331 332 333
  415 CASFA 334 337 338 339 340 341 342 343 344 345 346 347 348 349 355
  415 CASFA 358 359 362 371 374 375 377 378 381 383 385 386 387 388 389
  415 CASFA 391 392 393 394 395 396 397 398 399 420 421 428 431 433 434
  415 CASFA 435 436 437 441 442 444 445 446 448 451 452 453 454 456 457
  415 CASFA 459 461 464 465 466 467 468 469 472 474 476 477 478 479 482
  415 CASFA 485 488 491 492 495 499 502 521 522 523 530 531 532 533 534
  415 CASFA 535 536 539 541 542 543 544 545 546 547 550 552 553 554 556
  415 CASFA 557 558 561 563 564 565 566 567 570 571 572 573 574 576 578
  415 CASFA 579 583 584 585 586 587 588 589 596 597 620 621 622 624 626
  415 CASFA 627 641 645 647 648 652 653 654 655 658 660 661 664 665 666
  415 CASFA 668 673 677 681 692 695 696 697 721 722 731 737 738 739 742
  415 CASFA 748 749 750 751 752 753 755 756 759 761 762 763 764 765 768
  415 CASFA 769 771 772 773 774 775 776 777 781 788 789 821 822 824 826
  415 CASFA 832 834 835 836 839 840 860 861 863 864 865 869 871 872 873
  415 CASFA 874 875 876 877 878 882 885 891 893 894 896 921 922 923 924
  415 CASFA 925 927 928 929 931 936 951 952 953 954 955 956 957 970 971
  415 CASFA 972 973 974 978 979 981 982 983 984 985 986 987 989 990 991
  415 CASFA 992 993 994 995 996 997 998 999
  408 CASJO 221 223 224 225 226 227 234 235 236 237 238 241 243 244 245
  408 CASJO 246 247 248 249 251 252 253 255 256 257 258 259 262 263 264
  408 CASJO 265 266 267 268 269 270 272 274 275 276 277 279 280 281 282
  408 CASJO 283 284 285 286 287 288 289 291 292 293 294 295 296 297 298
  408 CASJO 299 332 345 353 354 356 358 365 370 371 374 376 377 378 379
  408 CASJO 395 398 399 432 433 434 435 436 437 441 446 447 448 452 453
  408 CASJO 463 473 491 492 496 499 522 524 534 552 553 554 559 562 575
  408 CASJO 578 629 720 721 723 725 727 729 730 732 733 734 735 736 737
  408 CASJO 738 739 741 742 743 744 745 746 747 748 749 752 756 765 773
  408 CASJO 864 865 866 867 879 920 922 923 924 925 926 927 929 942 943
  408 CASJO 945 946 947 954 957 970 971 972 973 974 977 978 980 982 983
  408 CASJO 984 985 986 987 988 989 991 992 993 994 995 996 997 998
1 415 CASJO 226 335 336 438 490 498 623 651 656 657 659 683 691 694 77
1 415 CASJO 940 941 948 949 960 961 962 964 965 966 967 968 969
  303 CODEN 200 220 230 231 232 233 234 235 236 237 238 239 252 255 261
  303 CODEN 266 270 271 273 277 278 279 280 281 286 287 288 289 290 291
  303 CODEN 292 293 294 295 296 297 298 299 320 321 322 329 331 333 337
  303 CODEN 340 341 343 344 348 355 360 361 363 364 366 367 368 369 370
  303 CODEN 371 372 373 375 377 388 393 394 397 398 399 420 421 422 423
  303 CODEN 424 425 426 427 428 429 430 431 433 440 441 442 443 444 447
  303 CODEN 449 450 451 452 455 457 458 460 461 465 466 467 469 470 477
  303 CODEN 478 480 492 494 497 499 526 530 534 538 556 571 572 573 575
  303 CODEN 581 592 595 620 623 624 628 629 631 639 640 642 643 649 650
  303 CODEN 654 657 659 660 665 666 670 671 673 674 676 680 681 688 689
  303 CODEN 690 691 692 693 694 695 696 697 698 699 720 721 722 727 730
  303 CODEN 733 739 740 741 743 744 745 750 751 752 753 755 756 757 758
  303 CODEN 759 760 761 762 763 764 766 770 771 773 777 778 779 780 781
  303 CODEN 782 786 787 788 789 790 791 792 793 794 795 796 797 798 799
  303 CODEN 820 821 825 826 829 830 831 832 836 837 839 840 841 843 844
  303 CODEN 850 851 855 860 861 863 866 868 869 871 877 880 888 889 890
  303 CODEN 891 892 893 894 896 898 899 922 924 930 932 933 934 935 936
  303 CODEN 937 938 939 940 964 965 966 969 971 972 973 977 978 979 980
  303 CODEN 985 986 987 988 989
  203 CTHAR 223 224 225 229 231 232 233 236 240 241 242 243 244 246 247
  203 CTHAR 249 252 257 258 273 275 277 278 279 280 282 285 286 289 291
  203 CTHAR 292 293 296 297 298 299 520 521 522 523 524 525 527 528 529
  203 CTHAR 547 548 549 557 559 560 561 563 565 566 568 569 623 627 633
  203 CTHAR 643 644 645 646 647 648 649 651 653 654 657 658 659 660 665
  203 CTHAR 666 667 668 673 674 675 676 677 678 679 683 688 693 721 722
  203 CTHAR 724 725 726 727 728 826 827 828 829 841 843 870 871 872 875
  203 CTHAR 930 936 951 952 953 954
  202 DCWAS 200 204 206 207 208 209 210 213 214 217 218 220 222 223 224
  202 DCWAS 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239
  202 DCWAS 240 241 242 243 244 245 246 247 248 249 250 251 252 254 255
  202 DCWAS 256 258 259 260 262 263 264 265 266 267 268 269 270 271 272
  202 DCWAS 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287
  202 DCWAS 288 289 291 292 293 294 295 296 297 298 299 306 307 309 310
  202 DCWAS 317 319 320 321 322 323 324 325 326 328 329 330 331 332 333
  202 DCWAS 334 336 337 338 339 340 341 342 343 344 345 346 347 348 350
  202 DCWAS 351 352 353 354 355 356 357 358 359 360 362 363 364 365 366
  202 DCWAS 369 370 371 372 373 374 376 377 378 379 380 382 383 384 385
  202 DCWAS 386 387 388 389 390 391 392 393 394 395 396 397 398 399 401
  202 DCWAS 402 403 404 406 407 408 409 415 416 417 418 420 421 422 423
  202 DCWAS 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438
  202 DCWAS 439 440 441 442 443 444 445 447 448 449 450 451 452 453 454
  202 DCWAS 455 456 457 458 459 460 461 462 463 464 466 467 468 469 470
  202 DCWAS 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485
  202 DCWAS 486 487 488 490 492 493 495 496 497 498 499 501 502 503 504
  202 DCWAS 505 506 507 509 513 514 516 517 519 520 521 522 523 524 525
  202 DCWAS 526 527 528 529 530 532 533 534 535 536 537 538 539 540 541
  202 DCWAS 542 543 544 545 546 547 548 549 550 551 552 553 554 556 557
  202 DCWAS 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572
  202 DCWAS 573 574 575 576 577 578 580 581 582 583 584 585 586 587 588
  202 DCWAS 589 590 591 592 593 595 597 598 599 601 602 603 604 605 606
  202 DCWAS 608 610 613 618 619 620 622 623 624 625 626 627 628 630 631
  202 DCWAS 632 633 634 635 636 637 638 639 640 641 642 643 644 646 647
  202 DCWAS 648 649 650 651 652 653 654 656 657 658 659 660 661 662 663
  202 DCWAS 664 665 666 667 668 669 670 671 673 675 676 678 679 680 681
  202 DCWAS 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696
  202 DCWAS 697 698 699 702 706 707 708 709 712 713 714 715 719 722 723
  202 DCWAS 724 725 726 727 728 731 732 733 734 735 736 737 738 739 742
  202 DCWAS 745 746 749 750 751 752 753 755 756 758 759 760 761 762 763
  202 DCWAS 764 765 767 768 769 770 772 773 774 775 776 778 779 780 781
  202 DCWAS 783 784 785 786 787 789 790 794 795 797 799 801 802 803 805
  202 DCWAS 806 807 808 812 815 816 817 818 820 821 822 823 824 825 826
  202 DCWAS 827 828 829 830 832 833 834 835 836 837 838 839 840 841 842
  202 DCWAS 843 844 845 846 847 848 849 850 851 852 853 856 857 860 861
  202 DCWAS 862 863 864 865 866 868 869 870 871 872 874 875 876 877 879
  202 DCWAS 881 882 883 885 887 888 889 890 891 892 893 894 895 896 897
  202 DCWAS 898 899 901 904 906 907 912 913 914 916 917 920 921 922 924
  202 DCWAS 925 926 927 928 929 930 931 933 934 935 936 937 938 939 940
  202 DCWAS 941 942 943 944 946 947 948 949 951 952 953 954 955 956 957
  202 DCWAS 960 961 962 963 965 966 967 968 971 972 974 975 977 978 979
  202 DCWAS 980 981 982 983 984 985 986 989 990 991 994 996 998
1 301 DCWAS 206 209 210 217 220 227 229 230 231 236 238 240 248 249 251
1 301 DCWAS 258 262 270 277 279 283 286 292 294 295 297 299 306 309 317
1 301 DCWAS 320 322 330 336 340 341 344 345 350 353 365 369 372 380 384
1 301 DCWAS 386 390 394 402 403 409 417 420 421 422 423 424 427 428 431
1 301 DCWAS 434 436 439 441 443 445 449 454 459 460 464 468 469 470 474
1 301 DCWAS 480 490 492 493 495 496 497 498 499 502 505 507 509 513 520
1 301 DCWAS 530 540 552 559 564 565 567 568 570 571 572 577 580 585 587
1 301 DCWAS 588 589 590 593 595 598 599 601 604 608 618 622 627 630 640
1 301 DCWAS 649 650 652 654 656 657 670 680 681 688 699 702 713 725 731
1 301 DCWAS 735 736 738 753 762 763 770 772 773 774 776 779 794 805 807
1 301 DCWAS 808 816 839 840 843 851 852 853 856 864 868 869 870 871 881
1 301 DCWAS 888 890 891 894 897 899 907 913 916 921 924 925 926 927 929
1 301 DCWAS 930 933 935 937 940 942 946 948 949 951 952 953 961 963 967
1 301 DCWAS 972 975 977 980 981 982 983 984 985 986 989 990
1 703 DCWAS 204 207 214 218 222 235 237 239 241 242 243 246 247 250 255
1 703 DCWAS 256 260 263 264 266 271 273 274 276 278 280 281 284 285 321
1 703 DCWAS 323 325 329 339 351 352 354 355 356 358 359 360 370 378 379
1 703 DCWAS 385 391 406 407 415 418 425 430 435 437 438 440 442 444 448
1 703 DCWAS 450 451 455 461 471 476 478 481 482 486 487 503 506 516 517
1 703 DCWAS 519 521 522 524 525 527 528 532 533 534 536 538 548 549 550
1 703 DCWAS 551 553 556 557 558 560 569 573 578 591 602 603 620 631 641
1 703 DCWAS 642 643 644 648 658 660 661 664 671 683 684 685 689 690 691
1 703 DCWAS 698 706 709 712 715 719 733 734 739 742 746 749 750 751 756
1 703 DCWAS 758 759 760 761 764 765 768 769 780 781 787 790 795 799 802
1 703 DCWAS 803 815 817 818 820 821 823 824 826 827 830 834 836 838 841
1 703 DCWAS 845 846 847 848 849 850 860 866 874 875 876 883 892 893 904
1 703 DCWAS 912 914 920 922 931 934 938 941 960 968 971 974 978 979 998
  305 FLMIA 220 221 222 223 224 226 227 230 232 233 235 238 242 245 246
  305 FLMIA 247 248 250 251 252 253 254 255 257 258 261 262 263 264 266
  305 FLMIA 267 268 270 271 274 279 284 285 324 325 326 327 329 332 342
  305 FLMIA 343 347 348 349 350 352 353 354 358 361 362 363 364 365 366
  305 FLMIA 371 372 373 374 375 376 377 378 379 380 381 382 385 386 387
  305 FLMIA 388 397 399 441 442 443 444 445 446 447 448 449 460 464 470
  305 FLMIA 471 477 478 520 526 529 530 531 532 534 535 536 538 539 541
  305 FLMIA 542 543 544 545 547 548 549 550 551 552 553 554 556 557 558
  305 FLMIA 559 560 567 571 573 575 576 577 578 579 590 591 592 593 594
  305 FLMIA 595 596 598 599 620 621 623 624 625 628 633 634 635 636 637
  305 FLMIA 638 642 643 644 649 651 652 653 654 661 662 663 665 666 667
  305 FLMIA 669 670 672 673 674 681 685 687 688 691 693 694 696 751 754
  305 FLMIA 756 757 758 759 762 769 770 773 775 780 787 789 794 795 821
  305 FLMIA 822 823 825 827 829 835 836 854 855 856 858 859 861 864 865
  305 FLMIA 866 867 868 871 873 874 876 880 881 882 883 884 885 886 887
  305 FLMIA 888 889 891 892 893 895 899 931 932 933 935 937 939 940 944
  305 FLMIA 945 947 948 949 951 952 953 956 957 993 995
  407 FLORL 222 228 236 237 238 239 240 244 246 247 249 256 257 260 262
  407 FLORL 263 273 275 277 281 282 290 291 292 293 294 295 297 298 299
  407 FLORL 327 331 332 339 341 342 345 351 352 354 356 363 365 366 380
  407 FLORL 381 382 420 422 423 424 425 438 469 539 560 568 578 579 623
  407 FLORL 628 629 644 645 646 647 648 649 651 656 657 658 660 661 671
  407 FLORL 672 675 677 678 679 682 695 696 699 740 767 774 788 823 824
  407 FLORL 825 826 827 828 830 831 834 836 839 841 843 849 850 851 855
  407 FLORL 856 857 859 862 869 872 875 876 877 880 884 886 889 894 895
  407 FLORL 896 897 898 899 934 939
  813 FLTAM 221 222 223 224 225 226 227 228 229 231 232 234 236 237 238
  813 FLTAM 239 240 241 242 247 248 251 253 254 258 259 264 265 272 273
  813 FLTAM 276 281 286 287 289 620 621 622 623 626 628 633 634 641 645
  813 FLTAM 653 654 661 662 664 671 677 681 684 685 689 690 830 831 832
  813 FLTAM 835 837 839 840 854 855 870 871 872 873 874 875 876 877 878
  813 FLTAM 879 880 881 882 883 884 885 886 887 888 889 920 931 932 933
  813 FLTAM 935 948 949 960 961 962 963 968 969 971 972 973 974 977 978
  813 FLTAM 979 980 985 986 987 988 989 990 996
  404 GAATL 200 212 215 220 221 222 223 225 230 231 233 237 238 239 240
  404 GAATL 241 242 243 244 246 247 248 249 250 252 255 256 257 260 261
  404 GAATL 262 263 264 266 270 271 279 280 281 284 286 288 289 292 294
  404 GAATL 296 297 299 310 312 313 314 315 316 319 320 321 325 329 330
  404 GAATL 331 332 333 339 341 343 344 346 347 348 349 350 351 352 355
  404 GAATL 360 361 362 363 364 365 366 368 370 371 372 373 377 378 380
  404 GAATL 381 383 388 389 390 391 392 393 394 395 396 399 413 416 417
  404 GAATL 420 421 422 423 424 425 426 427 428 429 431 432 433 434 435
  404 GAATL 436 438 439 441 442 443 445 446 447 448 449 451 452 454 455
  404 GAATL 457 458 460 461 463 466 469 471 473 474 475 476 477 478 482
  404 GAATL 483 484 487 488 489 491 493 494 496 497 498 499 505 508 512
  404 GAATL 513 515 520 521 522 523 524 525 526 527 528 529 530 533 550
  404 GAATL 551 552 558 559 564 565 566 570 572 573 577 578 580 581 584
  404 GAATL 586 587 588 589 590 591 593 594 603 607 610 618 619 621 622
  404 GAATL 623 624 626 627 631 633 634 636 639 640 641 642 651 653 656
  404 GAATL 658 659 661 662 664 668 669 671 676 679 680 681 683 686 688
  404 GAATL 690 691 696 697 698 699 712 717 723 726 727 728 729 730 732
  404 GAATL 739 740 741 744 750 751 752 753 755 756 758 760 761 762 763
  404 GAATL 765 766 767 768 772 774 785 792 794 799 804 808 810 815 822
  404 GAATL 827 833 835 837 839 840 841 842 843 847 848 850 851 852 853
  404 GAATL 859 870 871 872 873 874 875 876 877 879 880 881 885 888 890
  404 GAATL 892 894 897 898 899 907 916 920 921 922 923 924 925 926 928
  404 GAATL 929 932 933 934 936 938 939 941 942 943 944 945 946 948 949
  404 GAATL 951 952 953 954 955 956 957 960 961 962 963 964 968 969 971
  404 GAATL 972 973 974 975 977 978 979 980 981 982 984 985 986 987 988
  404 GAATL 991 992 993 994 995 996 997 998 999
  312 ILCHI 202 204 207 214 220 221 222 224 225 226 227 229 230 233 235
  312 ILCHI 236 237 238 239 241 242 243 245 247 248 252 254 261 262 263
  312 ILCHI 264 265 266 267 268 269 271 273 274 275 276 277 278 280 281
  312 ILCHI 282 283 284 285 286 287 288 292 294 302 306 308 313 321 322
  312 ILCHI 324 326 327 329 332 334 337 338 341 342 346 347 348 353 363
  312 ILCHI 368 372 373 374 375 376 378 379 380 384 404 407 408 410 413
  312 ILCHI 413 415 417 419 421 427 431 434 435 436 440 443 444 445 454
  312 ILCHI 461 463 465 467 468 471 472 476 477 478 483 486 487 488 489
  312 ILCHI 493 507 508 509 514 521 522 523 525 527 528 533 536 538 539
  312 ILCHI 542 545 548 549 558 559 561 565 567 568 569 580 581 582 583
  312 ILCHI 585 586 588 589 591 592 601 602 604 606 609 621 622 624 625
  312 ILCHI 626 630 631 633 637 638 641 642 643 644 645 646 648 649 650
  312 ILCHI 651 660 661 663 664 666 667 670 684 685 686 693 694 701 702
  312 ILCHI 703 704 707 712 715 716 718 721 722 723 725 726 727 728 731
  312 ILCHI 732 733 734 735 736 737 738 743 744 745 750 751 752 753 760
  312 ILCHI 761 762 763 764 765 767 768 769 770 772 774 775 776 777 778
  312 ILCHI 779 781 782 783 784 785 786 787 791 792 793 794 796 797 802
  312 ILCHI 804 805 807 808 812 814 819 821 822 826 828 829 836 838 842
  312 ILCHI 845 846 847 853 854 855 856 861 871 873 874 875 876 878 880
  312 ILCHI 881 883 886 889 890 899 901 902 903 906 907 908 909 915 917
  312 ILCHI 918 921 922 923 924 925 927 928 929 930 933 935 936 938 939
  312 ILCHI 942 943 944 947 951 955 962 973 975 977 978 984 987 988 989
  312 ILCHI 992 993 994 995 996 997
1 708 ILCHI 200 201 203 205 206 208 209 210 213 215 216 218 223 228 231
1 708 ILCHI 232 234 240 244 246 249 250 251 253 255 256 257 258 259 260
1 708 ILCHI 272 279 289 290 291 293 295 296 297 298 299 301 303 304 307
1 708 ILCHI 310 314 315 316 317 318 319 323 325 328 330 331 333 335 336
1 708 ILCHI 339 343 344 345 349 350 351 352 354 355 357 358 359 360 361
1 708 ILCHI 362 364 366 367 369 371 377 381 382 383 385 386 387 388 389
1 708 ILCHI 390 391 392 393 394 396 397 398 401 402 403 405 406 409 412
1 708 ILCHI 416 418 420 422 423 424 425 426 428 429 430 432 433 437 438
1 708 ILCHI 439 441 442 446 447 448 449 450 451 452 453 455 456 457 458
1 708 ILCHI 459 460 462 469 470 473 474 475 479 480 481 482 484 485 490
1 708 ILCHI 491 492 495 496 498 499 501 502 503 504 505 506 510 512 513
1 708 ILCHI 515 516 517 518 519 520 524 526 529 530 531 532 534 535 537
1 708 ILCHI 540 541 543 544 547 550 551 560 562 563 564 566 570 571 572
1 708 ILCHI 573 574 575 576 577 578 579 584 590 593 594 595 596 597 598
1 708 ILCHI 599 603 605 607 608 612 613 614 615 617 618 619 620 623 627
1 708 ILCHI 628 629 632 634 635 636 639 640 647 652 653 654 655 656 657
1 708 ILCHI 658 659 662 665 668 671 672 673 674 675 676 677 678 679 680
1 708 ILCHI 681 682 687 688 689 690 691 692 695 696 697 698 699 705 706
1 708 ILCHI 709 713 714 717 719 720 724 729 730 739 741 742 746 747 748
1 708 ILCHI 749 754 755 756 757 758 759 766 771 773 780 788 789 790 795
1 708 ILCHI 798 799 801 803 806 810 816 817 818 820 823 824 825 827 830
1 708 ILCHI 831 832 833 834 835 837 839 840 841 843 844 848 849 850 851
1 708 ILCHI 852 857 858 859 860 862 863 864 865 866 867 868 869 870 872
1 708 ILCHI 877 879 882 884 885 887 888 891 892 893 894 895 896 897 898
1 708 ILCHI 904 905 910 913 914 916 919 920 926 931 932 934 937 940 941
1 708 ILCHI 945 946 948 949 952 953 954 956 957 960 961 963 964 965 966
1 708 ILCHI 967 968 969 971 972 974 979 980 981 982 983 985 986 990 991
1 708 ILCHI 998
1 815 ILCHI 254 372 423 424 436 439 469 474 478 485 722 723 725 726 727
1 815 ILCHI 729 740 741 744 773 774 834 838 886
  317 ININD 200 222 226 228 230 231 232 233 235 236 237 238 239 240 241
  317 ININD 242 243 244 247 248 251 252 253 254 255 256 257 259 261 262
  317 ININD 263 264 265 266 267 269 271 272 273 274 276 277 278 283 290
  317 ININD 291 293 297 298 299 321 322 326 328 335 351 352 353 355 356
  317 ININD 357 359 422 424 425 431 432 439 441 442 443 445 461 462 464
  317 ININD 465 466 467 469 470 471 485 486 488 535 539 541 542 543 545
  317 ININD 546 547 549 556 571 573 574 575 576 577 578 579 580 630 631
  317 ININD 632 633 634 635 636 637 638 639 681 684 685 686 687 691 694
  317 ININD 736 738 745 769 773 776 780 781 782 783 784 786 787 788 823
  317 ININD 831 835 838 839 841 842 843 844 845 846 848 849 852 856 861
  317 ININD 862 867 870 871 872 873 875 876 877 878 879 881 882 885 887
  317 ININD 888 889 891 892 894 895 896 897 898 899 920 921 923 924 925
  317 ININD 926 927 928 929 976 994 996
  504 LANOR 241 242 243 244 245 246 253 254 255 257 260 271 277 278 279
  504 LANOR 282 283 286 288 340 341 347 348 349 361 362 363 364 366 367
  504 LANOR 368 391 392 393 394 398 431 436 441 443 450 451 454 455 456
  504 LANOR 461 462 464 465 466 467 468 469 482 483 484 486 488 521 522
  504 LANOR 523 524 525 527 528 529 552 561 565 566 568 569 581 582 583
  504 LANOR 584 585 586 587 588 589 592 593 595 596 597 656 662 671 676
  504 LANOR 682 684 689 731 733 734 736 737 738 739 762 821 822 824 826
  504 LANOR 827 830 831 832 833 834 835 836 837 838 861 862 865 866 883
  504 LANOR 884 885 887 888 889 891 895 896 897 899 941 942 943 944 945
  504 LANOR 947 948 949 976
  617 MABOS 200 223 224 225 226 227 230 231 232 233 234 235 236 237 239
  617 MABOS 241 242 243 244 245 246 247 248 252 253 254 257 258 261 262
  617 MABOS 263 264 265 266 267 268 269 271 274 275 276 277 278 279 280
  617 MABOS 282 284 285 286 287 288 289 290 292 296 298 320 321 322 323
  617 MABOS 324 325 326 327 328 329 330 331 332 333 335 337 338 340 343
  617 MABOS 345 348 349 350 353 354 357 361 362 364 367 375 377 380 381
  617 MABOS 382 387 389 391 393 394 395 396 397 421 423 424 426 427 428
  617 MABOS 429 431 432 434 436 437 438 439 442 444 445 446 449 450 451
  617 MABOS 455 456 457 461 463 464 466 469 471 472 473 479 482 483 484
  617 MABOS 486 487 488 489 491 492 493 494 495 496 497 498 499 522 523
  617 MABOS 524 527 532 534 536 538 539 541 542 546 547 552 553 556 558
  617 MABOS 560 561 562 565 566 567 568 569 570 571 572 573 574 576 577
  617 MABOS 578 579 581 586 589 592 593 594 595 596 598 599 621 622 623
  617 MABOS 625 628 629 630 633 635 637 638 641 642 643 646 647 648 654
  617 MABOS 661 662 665 666 669 674 680 684 693 694 695 696 698 720 721
  617 MABOS 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736
  617 MABOS 737 738 739 740 742 743 748 749 756 770 773 774 776 781 782
  617 MABOS 783 786 787 789 825 841 842 843 845 846 847 848 849 855 859
  617 MABOS 860 861 862 863 864 868 873 876 884 887 889 890 891 893 894
  617 MABOS 895 899 923 924 925 926 929 930 931 932 933 935 936 937 938
  617 MABOS 942 944 945 951 954 955 956 958 962 964 965 966 969 972 973
  617 MABOS 974 979 981 983 984 985
  313 MIAAR 420 426 428 429 434 437 439 449 451 453 454 455 459 475 481
  313 MIAAR 482 483 484 485 486 487 495 572 662 663 665 668 677 747 761
  313 MIAAR 763 764 769 930 936 971 973 981 994 995 996 998
  313 MIDET 222 223 224 225 226 237 240 245 252 255 256 259 267 270 271
  313 MIDET 272 273 274 275 276 277 278 291 292 295 297 298 320 321 322
  313 MIDET 323 328 330 331 336 337 341 342 343 345 361 365 366 368 369
  313 MIDET 371 372 381 382 383 386 388 389 390 393 396 430 431 436 438
  313 MIDET 440 441 444 446 448 460 491 493 494 496 499 520 521 526 527
  313 MIDET 531 532 533 534 535 536 537 538 554 556 560 561 562 563 564
  313 MIDET 565 567 568 571 577 579 581 582 584 592 593 594 596 599 630
  313 MIDET 690 745 770 780 821 822 823 824 829 831 832 833 834 835 836
  313 MIDET 837 838 839 841 842 843 845 846 849 861 862 863 864 865 866
  313 MIDET 867 868 869 871 872 873 874 875 876 881 882 883 884 885 886
  313 MIDET 891 892 893 894 895 896 897 898 899 921 922 923 924 925 926
  313 MIDET 927 928 929 931 933 934 935 937 940 943 945 956 961 962 963
  313 MIDET 964 965 966 972 974 976 980 983 993
  612 MNMIN 220 221 222 223 224 227 228 229 290 291 292 293 296 297 298
  612 MNMIN 323 330 331 332 333 334 335 336 337 338 339 340 341 342 343
  612 MNMIN 344 347 348 349 368 370 371 372 373 374 375 376 377 378 379
  612 MNMIN 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434
  612 MNMIN 435 436 437 438 439 440 441 443 444 445 446 447 448 449 450
  612 MNMIN 451 452 454 455 456 457 458 459 460 461 462 463 464 469 470
  612 MNMIN 471 472 473 474 475 476 477 478 479 481 482 483 484 487 488
  612 MNMIN 489 490 491 492 493 494 496 497 498 499 520 521 522 526 527
  612 MNMIN 529 533 534 535 536 537 538 540 541 542 544 545 546 552 553
  612 MNMIN 557 559 560 561 566 569 571 572 574 588 591 593 620 621 622
  612 MNMIN 623 624 625 626 627 631 633 635 636 638 639 640 641 642 643
  612 MNMIN 644 645 646 647 648 649 653 663 667 673 681 683 687 688 690
  612 MNMIN 696 698 699 720 721 722 723 724 725 726 727 728 729 730 731
  612 MNMIN 733 735 736 737 738 739 741 750 753 754 755 757 770 771 772
  612 MNMIN 774 776 777 778 779 780 781 782 784 785 786 788 789 822 823
  612 MNMIN 824 825 827 828 829 830 831 832 835 851 853 854 858 861 863
  612 MNMIN 865 866 867 868 869 870 871 872 874 879 881 884 885 887 888
  612 MNMIN 890 891 892 893 894 895 896 897 920 921 922 924 925 926 927
  612 MNMIN 929 931 932 933 934 935 936 937 938 939 941 942 944 949 976
  612 MNMIN 977 989
  816 MOKCI 221 223 224 225 228 229 231 234 241 242 243 245 246 247 251
  816 MOKCI 252 254 257 274 275 276 283 292 322 331 333 346 348 353 356
  816 MOKCI 358 361 363 373 374 391 395 421 426 435 436 444 452 453 454
  816 MOKCI 455 459 461 464 466 468 471 472 474 478 483 497 521 523 524
  816 MOKCI 525 531 532 537 556 561 572 576 578 587 589 591 654 698 734
  816 MOKCI 737 741 743 751 753 756 757 759 761 763 765 767 781 792 795
  816 MOKCI 796 821 822 833 836 842 844 854 861 871 881 891 921 922 923
  816 MOKCI 924 926 931 932 941 942 943 966 968 995 997
1 913 MOKCI 236 262 268 281 287 299 321 334 339 341 342 345 362 371 375
1 913 MOKCI 381 383 384 422 432 441 451 469 491 492 541 551 573 574 576
1 913 MOKCI 588 596 599 621 631 642 648 649 661 676 677 681 721 722 724
1 913 MOKCI 764 780 782 787 788 791 829 831 888 894 897 962 967
  314 MOSLO 225 227 231 232 233 234 235 241 247 253 259 261 263 268 275
  314 MOSLO 277 289 291 296 298 321 331 342 343 344 349 351 352 353 355
  314 MOSLO 361 362 367 371 381 382 383 385 388 389 391 394 421 423 424
  314 MOSLO 425 426 427 428 429 432 434 436 441 444 454 458 464 466 469
  314 MOSLO 476 481 487 489 521 522 523 524 525 529 531 532 533 534 535
  314 MOSLO 538 539 541 542 544 551 553 554 567 569 571 572 576 577 578
  314 MOSLO 595 621 622 623 631 638 644 645 647 652 653 658 664 671 677
  314 MOSLO 679 694 721 725 726 727 731 739 741 746 747 752 755 758 768
  314 MOSLO 771 772 773 776 777 781 791 795 821 822 823 826 829 831 832
  314 MOSLO 836 837 838 839 841 842 843 845 846 848 849 851 854 855 862
  314 MOSLO 863 865 867 868 869 871 872 878 879 889 891 892 894 895 899
  314 MOSLO 921 928 938 939 941 942 946 947 949 957 961 962 963 965 966
  314 MOSLO 968 969 973 982 984 991 992 993 994 997
1 618 MOSLO 271 274 337 451 452 482 583 797
  919 NCRTP 248 254 266 269 280 286 361 362 365 382 383 387 460 467 469
  919 NCRTP 470 471 477 479 481 489 490 493 528 530 541 543 544 546 549
  919 NCRTP 560 575 596 598 620 660 662 664 677 681 682 683 684 687 688
  919 NCRTP 733 737 740 755 772 779 781 782 783 787 790 821 828 829 831
  919 NCRTP 832 833 834 836 839 840 846 847 848 850 851 856 859 860 870
  919 NCRTP 872 876 878 880 881 890 899 929 932 933 941 942 956 962 966
  919 NCRTP 967 968 976 990 991 992
  908 NJNBR 202 205 214 218 220 225 231 238 246 247 248 249 251 254 257
  908 NJNBR 271 274 283 287 297 302 306 321 324 329 356 360 390 406 407
  908 NJNBR 412 417 418 422 424 442 457 463 469 494 510 519 524 525 526
  908 NJNBR 545 548 549 560 561 562 563 572 602 603 607 613 632 634 636
  908 NJNBR 658 668 679 685 699 704 707 715 721 722 723 725 727 738 745
  908 NJNBR 750 752 753 754 755 756 757 769 805 819 821 826 828 844 846
  908 NJNBR 855 873 878 880 883 885 906 932 937 954 968 980 981 985
  201 NJNEW 200 207 216 217 224 226 227 228 232 233 235 239 241 242 245
  201 NJNEW 256 259 266 268 272 273 276 277 278 279 284 288 289 298 301
  201 NJNEW 304 305 309 312 313 314 315 317 318 319 322 325 330 332 333
  201 NJNEW 338 339 340 342 343 344 345 346 348 351 352 353 354 355 365
  201 NJNEW 368 371 372 373 374 375 376 377 378 379 381 382 386 388 392
  201 NJNEW 393 394 396 399 401 403 408 413 414 416 419 420 421 423 427
  201 NJNEW 428 429 430 432 433 434 435 436 437 438 440 441 450 451 456
  201 NJNEW 460 461 464 465 467 468 470 471 472 473 474 478 480 481 482
  201 NJNEW 483 484 485 486 487 488 489 499 503 504 507 509 514 515 516
  201 NJNEW 522 523 527 533 535 541 546 547 558 564 565 567 568 569 570
  201 NJNEW 574 575 578 581 582 585 587 589 592 593 594 595 596 601 602
  201 NJNEW 608 614 617 621 622 623 624 626 628 633 634 635 636 641 642
  201 NJNEW 643 645 646 648 649 653 654 656 659 661 662 665 667 669 672
  201 NJNEW 673 674 675 676 677 678 680 684 686 687 688 690 692 694 695
  201 NJNEW 696 701 703 705 708 709 712 714 716 731 733 736 737 740 742
  201 NJNEW 743 744 746 748 750 751 759 760 761 762 763 765 771 772 773
  201 NJNEW 777 778 779 783 785 789 790 791 792 794 795 796 797 798 801
  201 NJNEW 802 803 804 807 808 812 814 815 816 817 820 822 823 824 833
  201 NJNEW 836 837 843 845 851 854 855 857 858 860 861 862 863 864 865
  201 NJNEW 866 867 868 869 871 877 881 882 884 886 887 889 890 893 894
  201 NJNEW 896 902 904 907 909 912 913 915 916 923 925 926 931 933 935
  201 NJNEW 939 941 942 943 944 945 947 952 955 956 960 961 963 964 965
  201 NJNEW 966 969 977 991 992 994 997 998
1 908 NJNEW 200 232 233 241 245 272 273 276 277 289 298 317 322 351 352
1 908 NJNEW 353 354 355 381 382 388 396 419 464 474 486 499 522 527 541
1 908 NJNEW 558 574 582 594 602 634 636 654 665 686 687 688 709 737 750
1 908 NJNEW 760 771 789 815 820 851 855 862 889 913 925 931 964 965 969
  516 NYHEM 220 221 222 223 227 228 229 235 236 237 238 239 248 249 252
  516 NYHEM 255 264 270 285 292 293 294 295 296 299 326 328 333 334 335
  516 NYHEM 336 338 346 349 352 354 355 357 358 364 365 367 371 374 378
  516 NYHEM 379 383 384 391 394 420 431 432 433 437 454 463 466 481 482
  516 NYHEM 483 484 485 486 487 488 489 496 520 521 522 526 531 535 536
  516 NYHEM 538 541 542 546 559 560 561 562 564 565 566 568 569 573 574
  516 NYHEM 575 576 577 579 593 596 598 599 621 623 624 625 626 627 628
  516 NYHEM 629 644 647 656 658 659 663 671 674 676 677 678 679 681 682
  516 NYHEM 683 684 686 691 692 694 731 733 735 739 741 742 745 746 747
  516 NYHEM 752 753 755 756 759 763 764 766 767 773 775 777 781 783 785
  516 NYHEM 789 791 794 795 796 797 798 799 822 823 824 825 826 829 832
  516 NYHEM 833 842 844 845 847 867 868 869 872 873 876 877 883 887 889
  516 NYHEM 890 897 921 922 925 926 931 932 933 934 935 937 938 939 942
  516 NYHEM 943 944 949 997
  212 NYNYO 200 205 206 207 208 210 213 214 216 218 219 220 221 222 223
  212 NYNYO 225 226 227 228 230 231 232 233 234 235 236 237 238 239 240
  212 NYNYO 241 242 243 244 245 246 247 248 249 250 251 252 254 255 260
  212 NYNYO 262 264 265 266 267 268 269 272 276 277 279 280 281 283 285
  212 NYNYO 286 288 289 290 291 292 293 294 295 296 297 298 299 301 302
  212 NYNYO 303 304 305 306 307 308 309 310 312 313 314 315 316 319 320
  212 NYNYO 321 322 323 324 325 326 328 329 330 333 334 335 337 339 340
  212 NYNYO 341 342 344 346 348 349 350 351 352 353 354 355 356 357 358
  212 NYNYO 359 360 361 362 363 364 365 367 368 369 370 371 373 374 378
  212 NYNYO 379 380 382 385 390 391 392 393 395 396 397 398 399 401 402
  212 NYNYO 404 406 407 408 409 410 412 413 414 415 416 418 419 420 421
  212 NYNYO 422 425 427 428 430 431 432 433 436 437 439 440 446 447 448
  212 NYNYO 449 451 452 453 455 456 457 458 459 460 461 463 464 465 466
  212 NYNYO 467 468 469 472 473 474 475 476 477 480 481 482 483 484 485
  212 NYNYO 486 487 488 489 490 491 492 493 495 496 502 503 504 505 506
  212 NYNYO 508 509 510 512 513 514 515 517 518 519 520 521 522 523 524
  212 NYNYO 525 527 528 529 530 531 532 533 534 535 536 537 538 541 542
  212 NYNYO 543 545 546 547 548 549 551 552 553 554 556 557 558 559 560
  212 NYNYO 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575
  212 NYNYO 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590
  212 NYNYO 593 594 595 597 598 599 601 602 603 605 606 607 608 609 610
  212 NYNYO 612 613 614 616 617 618 619 620 621 623 624 625 627 628 629
  212 NYNYO 632 633 635 637 639 640 641 642 643 644 645 648 649 650 652
  212 NYNYO 653 654 655 656 657 658 659 661 662 663 664 665 666 667 668
  212 NYNYO 669 671 673 674 675 676 677 678 679 681 682 683 684 685 686
  212 NYNYO 687 688 689 690 691 692 693 694 695 696 697 698 701 702 703
  212 NYNYO 704 705 707 708 709 711 713 714 715 716 717 719 720 721 722
  212 NYNYO 724 725 727 730 731 732 733 734 735 736 737 740 741 742 744
  212 NYNYO 745 746 747 749 750 751 752 753 754 755 757 758 759 760 761
  212 NYNYO 764 765 766 767 768 769 770 772 775 776 777 779 781 785 786
  212 NYNYO 787 790 791 792 793 794 795 796 797 798 799 804 806 807 808
  212 NYNYO 809 812 813 815 818 819 820 822 823 824 825 826 827 828 829
  212 NYNYO 830 831 832 836 837 838 839 840 841 842 844 847 848 850 852
  212 NYNYO 853 854 855 856 858 860 861 862 863 864 865 866 867 868 869
  212 NYNYO 870 871 872 873 874 876 877 878 879 880 881 882 883 884 885
  212 NYNYO 886 887 888 889 891 892 893 898 899 901 902 903 904 905 906
  212 NYNYO 907 908 909 912 916 918 920 921 922 923 924 925 926 927 928
  212 NYNYO 929 930 931 932 933 935 936 938 940 941 942 943 944 945 947
  212 NYNYO 949 951 952 953 954 955 956 957 960 962 963 964 966 967 968
  212 NYNYO 969 971 972 973 974 975 977 978 979 980 982 983 984 985 986
  212 NYNYO 988 989 991 992 993 994 995 996 997 998 999
1 516 NYNYO 221 222 223 227 228 229 235 236 237 238 239 248 249 252 255
1 516 NYNYO 264 270 285 292 293 294 295 296 299 326 328 333 334 336 338
1 516 NYNYO 346 349 352 354 357 358 364 365 367 371 374 378 379 391 420
1 516 NYNYO 431 432 433 437 454 463 466 481 482 483 484 485 486 487 488
1 516 NYNYO 489 496 520 521 526 531 535 536 538 541 542 546 559 560 561
1 516 NYNYO 562 564 565 566 568 569 574 575 576 577 579 593 596 598 599
1 516 NYNYO 621 623 624 625 626 627 628 629 644 647 656 658 663 671 674
1 516 NYNYO 676 677 678 679 681 682 683 684 686 691 692 694 731 733 735
1 516 NYNYO 739 741 742 745 746 747 752 753 755 756 759 763 764 766 767
1 516 NYNYO 773 775 781 783 785 789 791 794 795 796 797 798 799 822 823
1 516 NYNYO 824 825 826 829 832 842 844 845 847 867 868 869 872 873 876
1 516 NYNYO 877 883 887 889 890 897 921 922 926 931 932 933 934 935 937
1 516 NYNYO 938 939 942 943 944 949 997
1 718 NYNYO 200 204 209 217 221 224 225 229 230 232 233 234 235 236 237
1 718 NYNYO 238 240 241 244 247 248 251 252 253 256 257 258 259 260 261
1 718 NYNYO 262 263 265 266 267 268 270 271 272 273 274 275 276 277 278
1 718 NYNYO 279 282 284 287 291 296 297 317 318 321 322 326 327 330 331
1 718 NYNYO 332 335 336 337 338 339 341 342 343 345 346 347 349 351 352
1 718 NYNYO 353 354 356 357 358 359 360 361 363 366 370 372 373 375 376
1 718 NYNYO 377 380 381 383 384 385 386 387 388 389 390 392 395 397 398
1 718 NYNYO 403 417 421 423 424 426 428 429 434 435 436 438 439 441 442
1 718 NYNYO 443 444 445 446 447 448 449 451 452 453 454 455 456 457 458
1 718 NYNYO 459 461 462 463 464 465 467 468 469 470 471 474 476 478 479
1 718 NYNYO 480 481 482 485 486 489 492 493 494 495 497 498 499 507 520
1 718 NYNYO 522 523 525 526 527 528 529 531 533 539 541 544 545 552 557
1 718 NYNYO 565 571 574 575 591 592 596 599 604 615 622 624 625 626 627
1 718 NYNYO 628 629 630 631 632 633 634 636 638 639 641 642 643 644 645
1 718 NYNYO 646 647 648 649 651 656 657 658 659 667 670 672 680 692 693
1 718 NYNYO 694 698 699 706 712 720 721 723 726 727 728 729 735 738 739
1 718 NYNYO 740 743 745 746 748 754 755 756 760 761 762 763 764 767 768
1 718 NYNYO 769 771 773 774 776 778 779 780 782 783 784 786 788 789 793
1 718 NYNYO 797 802 803 805 816 821 826 827 830 831 832 833 834 835 836
1 718 NYNYO 837 843 845 846 847 848 849 851 852 853 854 855 856 857 858
1 718 NYNYO 859 868 871 875 876 883 886 891 894 895 896 897 898 899 917
1 718 NYNYO 919 921 922 927 932 934 935 937 938 939 941 942 945 946 948
1 718 NYNYO 949 951 953 955 956 961 962 963 965 966 967 968 969 972 977
1 718 NYNYO 978 979 981 983 984 987 990 995 996 997 998 999
1 914 NYNYO 235 237 251 253 270 282 285 286 287 288 289 321 328 332 333
1 914 NYNYO 335 337 345 347 375 376 378 381 390 391 395 397 422 423 428
1 914 NYNYO 472 476 478 523 524 576 591 592 631 632 633 636 641 642 644
1 914 NYNYO 654 662 664 665 667 668 674 681 682 683 684 686 693 694 696
1 914 NYNYO 697 698 699 721 723 725 738 761 768 771 776 779 784 789 792
1 914 NYNYO 793 833 834 835 899 921 925 933 934 935 937 939 946 948 949
1 914 NYNYO 961 963 964 965 967 968 969 993 997
  216 OHCLE 221 226 228 229 231 232 234 235 236 237 238 241 243 247 248
  216 OHCLE 249 251 252 261 265 266 267 268 271 278 281 283 289 291 292
  216 OHCLE 295 299 321 328 331 333 338 341 344 348 349 351 356 361 362
  216 OHCLE 363 368 371 381 382 383 389 391 397 398 421 423 425 429 431
  216 OHCLE 432 433 439 441 442 443 444 445 446 447 449 451 459 461 463
  216 OHCLE 464 467 468 469 471 473 475 476 479 481 486 487 491 521 522
  216 OHCLE 523 524 526 529 531 541 543 561 562 566 572 574 575 578 579
  216 OHCLE 581 582 585 586 587 589 591 621 622 623 631 634 641 642 646
  216 OHCLE 651 656 659 661 662 663 664 671 676 681 687 689 691 692 694
  216 OHCLE 696 721 728 729 731 732 734 736 737 741 749 751 752 754 761
  216 OHCLE 765 766 771 777 779 781 789 791 795 822 826 831 835 838 842
  216 OHCLE 843 844 845 851 861 871 881 883 884 885 886 888 891 892 899
  216 OHCLE 921 931 932 941 942 943 944 946 951 953 961 975 987 991 995
  614 OHCOL 221 222 223 224 225 227 228 229 231 235 236 237 238 239 243
  614 OHCOL 248 249 251 252 253 258 261 262 263 265 267 268 271 272 274
  614 OHCOL 275 276 278 279 281 288 291 292 293 294 296 297 299 325 329
  614 OHCOL 337 338 341 351 361 365 371 395 421 424 431 433 436 438 442
  614 OHCOL 443 444 445 447 451 457 459 460 461 462 463 464 466 469 471
  614 OHCOL 475 476 478 479 481 486 487 488 491 492 497 523 538 548 575
  614 OHCOL 621 644 645 752 755 756 759 761 764 766 771 777 785 786 791
  614 OHCOL 792 793 794 821 833 836 837 841 842 846 847 848 851 852 855
  614 OHCOL 860 861 863 864 866 868 870 871 875 876 877 878 879 881 882
  614 OHCOL 885 888 889 890 891 895 898 899 927 964 965
  503 ORPOR 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234
  503 ORPOR 235 236 237 238 239 240 241 242 243 244 245 246 248 249 250
  503 ORPOR 251 252 253 254 255 256 257 273 274 275 279 280 281 282 283
  503 ORPOR 284 285 286 287 288 289 291 292 293 294 295 297 299 323 324
  503 ORPOR 326 335 357 359 452 464 526 591 620 621 624 625 626 627 628
  503 ORPOR 629 630 631 632 635 636 637 638 639 640 641 642 643 644 645
  503 ORPOR 646 647 648 649 650 652 653 654 655 656 657 658 659 661 663
  503 ORPOR 665 666 667 668 669 677 681 682 684 685 690 691 692 693 694
  503 ORPOR 695 696 697 698 721 731 733 760 761 771 774 775 777 778 781
  503 ORPOR 789 790 796 936 976 985
  215 PAPHI 221 222 223 224 225 226 227 228 229 231 232 233 235 236 237
  215 PAPHI 238 241 242 243 244 245 246 247 248 254 259 260 263 265 270
  215 PAPHI 271 272 275 276 277 278 279 280 281 283 284 288 289 291 293
  215 PAPHI 299 324 328 329 330 331 332 333 334 335 336 337 338 339 341
  215 PAPHI 342 349 350 351 352 353 354 356 359 365 379 382 386 387 389
  215 PAPHI 422 423 424 425 426 427 438 440 446 447 448 449 450 452 455
  215 PAPHI 456 457 460 461 462 463 464 465 466 467 468 470 471 472 473
  215 PAPHI 474 476 477 480 482 483 485 487 490 492 494 496 497 499 520
  215 PAPHI 521 522 523 525 526 527 528 531 532 533 534 535 537 539 540
  215 PAPHI 542 543 544 545 546 548 549 551 552 553 557 560 561 563 564
  215 PAPHI 565 566 567 568 569 570 572 573 574 576 577 578 580 581 583
  215 PAPHI 585 586 587 590 591 592 595 596 597 620 621 622 623 624 625
  215 PAPHI 626 627 628 629 630 631 632 634 635 636 637 638 639 641 642
  215 PAPHI 643 645 646 649 653 657 659 660 662 663 664 665 667 668 671
  215 PAPHI 673 676 677 680 684 685 686 687 688 690 697 698 722 724 725
  215 PAPHI 726 727 728 729 732 734 735 737 739 742 743 744 745 747 748
  215 PAPHI 751 753 755 761 763 765 768 769 782 784 786 787 789 790 823
  215 PAPHI 824 825 828 829 830 831 833 834 835 836 839 840 841 842 843
  215 PAPHI 844 846 848 849 851 853 854 864 870 871 872 874 875 876 877
  215 PAPHI 878 879 880 881 884 885 886 887 891 892 893 894 895 896 897
  215 PAPHI 898 899 920 922 923 924 925 927 928 930 931 934 936 937 938
  215 PAPHI 940 941 947 951 952 955 960 961 962 963 964 969 971 972 973
  215 PAPHI 975 977 978 980 981 985 986 988 990 991 998
  412 PAPIT 200 221 227 231 232 234 236 237 241 242 243 244 247 255 256
  412 PAPIT 257 261 262 263 264 268 269 271 273 276 279 281 288 298 321
  412 PAPIT 322 323 328 331 333 338 341 343 344 351 355 359 361 362 363
  412 PAPIT 364 365 366 367 369 371 372 373 374 381 389 391 392 393 394
  412 PAPIT 421 422 427 429 431 433 434 441 442 456 461 462 464 466 469
  412 PAPIT 471 472 476 481 486 487 488 491 492 497 521 531 551 553 561
  412 PAPIT 562 563 565 566 571 572 578 594 621 622 623 624 633 636 642
  412 PAPIT 644 645 647 648 653 655 661 664 665 672 673 674 675 678 681
  412 PAPIT 682 683 687 692 699 731 734 741 747 749 751 754 761 762 765
  412 PAPIT 766 767 771 777 778 781 782 784 787 788 793 795 798 821 822
  412 PAPIT 823 824 825 826 828 829 831 833 835 840 854 855 856 858 859
  412 PAPIT 881 882 884 885 889 892 921 922 923 928 931 936 937 939 961
  412 PAPIT 963 967
1 601 TNMEM 342 349 393 781 851
  901 TNMEM 227 272 274 276 278 320 323 324 325 327 332 344 345 346 348
  901 TNMEM 353 357 358 360 362 363 365 366 367 368 369 371 372 373 375
  901 TNMEM 377 382 385 386 387 388 395 396 397 398 452 454 458 465 475
  901 TNMEM 476 483 484 485 486 521 522 523 524 525 526 527 528 529 531
  901 TNMEM 532 533 535 543 544 572 575 576 577 578 579 597 654 678 681
  901 TNMEM 682 683 684 685 721 722 725 726 728 729 743 744 745 747 748
  901 TNMEM 752 753 754 755 756 757 758 761 762 763 765 766 767 774 775
  901 TNMEM 785 789 794 795 797 829 853 854 867 872 873 876 877 922 942
  901 TNMEM 946 947 948 976
  512 TXAUS 218 219 243 244 247 250 251 255 258 259 261 263 264 266 267
  512 TXAUS 272 276 280 282 288 292 320 322 323 326 327 328 329 331 335
  512 TXAUS 338 339 343 345 346 356 369 370 371 385 386 388 389 390 397
  512 TXAUS 403 416 422 440 441 442 443 444 445 447 448 450 451 452 453
  512 TXAUS 454 458 459 461 462 463 465 467 469 471 472 473 474 475 476
  512 TXAUS 477 478 479 480 482 483 495 499 750 794 823 832 834 835 836
  512 TXAUS 837 838 860 867 870 873 891 892 926 928 929 940 941 973 984
  512 TXAUS 990
  214 TXDAL 202 203 204 205 212 216 217 218 219 220 221 222 223 224 225
  214 TXDAL 226 227 228 229 230 231 233 234 235 238 239 240 241 242 243
  214 TXDAL 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258
  214 TXDAL 259 260 262 263 264 266 269 270 271 272 275 276 278 279 281
  214 TXDAL 284 285 286 287 288 289 290 291 293 296 298 299 301 302 303
  214 TXDAL 305 306 307 308 309 313 314 315 316 317 318 319 320 321 323
  214 TXDAL 324 327 328 330 331 332 333 336 337 339 340 341 343 348 349
  214 TXDAL 350 351 352 353 357 358 360 361 363 368 369 371 372 373 374
  214 TXDAL 375 376 380 381 384 385 386 387 388 391 392 393 394 397 398
  214 TXDAL 399 401 402 403 404 406 407 412 413 414 416 417 418 420 421
  214 TXDAL 422 423 424 426 428 434 436 437 438 441 442 443 444 445 446
  214 TXDAL 450 453 456 458 462 464 466 470 471 475 480 484 487 490 492
  214 TXDAL 494 495 497 502 503 504 506 508 513 514 516 517 518 519 520
  214 TXDAL 521 522 526 528 530 533 539 541 550 553 554 556 557 558 559
  214 TXDAL 565 570 573 574 575 578 579 580 590 591 594 596 601 602 603
  214 TXDAL 604 605 606 607 608 609 612 613 615 616 618 620 621 630 631
  214 TXDAL 634 637 638 641 642 644 647 650 651 653 655 658 659 660 661
  214 TXDAL 669 670 676 680 681 686 688 689 690 691 692 696 698 699 701
  214 TXDAL 702 704 705 706 707 708 709 712 713 714 715 716 717 718 720
  214 TXDAL 721 724 727 733 739 740 741 742 744 745 746 747 748 749 750
  214 TXDAL 751 754 760 761 767 770 771 780 781 783 787 788 790 791 799
  214 TXDAL 804 808 812 815 818 819 820 821 823 824 826 827 828 830 840
  214 TXDAL 841 844 850 851 855 864 867 869 871 879 880 881 888 890 891
  214 TXDAL 902 904 905 907 909 913 917 918 919 920 922 929 931 933 934
  214 TXDAL 939 941 942 943 944 946 948 949 951 952 953 954 956 957 960
  214 TXDAL 964 969 977 978 979 980 985 986 987 988 991 992 993 995 996
  214 TXDAL 997 999
1 817 TXDAL 261 265 267 268 273 329 355 356 366 379 421 424 425 429 430
1 817 TXDAL 432 449 450 461 467 469 475 477 481 498 530 540 543 572 577
1 817 TXDAL 588 589 640 654 667 671 679 695 784 792 832 856 884 890 922
1 817 TXDAL 925 929 930 961 962 963 967
  713 TXHOU 200 220 221 222 223 224 225 226 227 228 229 230 233 235 236
  713 TXHOU 237 238 240 241 242 244 246 247 252 253 254 261 263 264 265
  713 TXHOU 266 267 268 269 270 271 272 274 277 278 280 282 283 284 285
  713 TXHOU 286 287 289 293 295 320 324 326 328 331 332 333 334 335 336
  713 TXHOU 337 338 339 341 342 343 346 347 350 351 353 354 355 356 358
  713 TXHOU 359 360 363 364 367 370 371 373 374 376 377 378 383 388 390
  713 TXHOU 391 392 393 394 395 420 421 422 424 425 426 427 428 431 432
  713 TXHOU 433 434 436 437 438 439 440 441 442 443 444 445 446 447 448
  713 TXHOU 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463
  713 TXHOU 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478
  713 TXHOU 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493
  713 TXHOU 494 495 496 497 498 499 520 521 522 523 524 525 526 527 528
  713 TXHOU 529 530 531 535 536 537 540 541 542 546 547 548 549 550 551
  713 TXHOU 552 556 558 561 563 565 568 571 575 577 578 579 580 583 584
  713 TXHOU 586 587 588 589 590 591 596 599 620 621 622 623 626 627 629
  713 TXHOU 630 631 633 635 636 639 640 641 643 644 645 649 650 651 652
  713 TXHOU 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667
  713 TXHOU 668 669 670 671 672 673 674 675 676 678 679 680 681 682 683
  713 TXHOU 684 685 686 688 690 691 692 694 695 696 697 699 720 721 723
  713 TXHOU 726 728 729 731 732 733 734 738 739 741 744 746 747 748 749
  713 TXHOU 750 751 752 753 754 757 758 759 761 762 763 764 765 768 769
  713 TXHOU 771 772 774 775 776 777 778 779 780 781 782 783 784 785 786
  713 TXHOU 787 788 789 790 791 792 793 794 795 796 797 798 799 820 821
  713 TXHOU 822 823 824 825 826 827 828 829 831 833 834 835 836 840 841
  713 TXHOU 842 844 845 846 847 850 852 853 854 855 856 857 858 859 861
  713 TXHOU 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876
  713 TXHOU 877 878 879 880 882 883 884 886 888 890 891 892 893 894 895
  713 TXHOU 896 897 898 899 920 921 922 923 924 926 928 929 930 931 932
  713 TXHOU 933 935 937 938 939 940 941 943 944 946 947 948 951 952 953
  713 TXHOU 954 955 956 957 960 961 963 964 965 966 967 968 969 971 972
  713 TXHOU 973 974 975 977 978 980 981 983 984 985 986 987 988 989 991
  713 TXHOU 992 993 995 996 997 998 999
  801 UTSLC 220 237 240 250 251 252 254 255 261 262 263 264 265 266 268
  801 UTSLC 269 272 273 277 278 287 292 295 298 299 321 322 328 350 355
  801 UTSLC 359 363 364 366 451 460 461 466 467 468 480 481 482 483 484
  801 UTSLC 485 486 487 488 521 522 524 526 530 531 532 533 534 535 536
  801 UTSLC 537 538 539 543 544 546 547 549 561 562 565 566 569 570 571
  801 UTSLC 572 573 575 576 578 579 580 581 582 583 584 585 588 594 595
  801 UTSLC 596 633 799 933 942 943 944 947 964 965 966 967 968 969 972
  801 UTSLC 973 974 975 977
  206 WASEA 223 224 226 227 228 232 233 234 235 236 237 241 242 243 244
  206 WASEA 246 248 251 255 271 277 281 282 283 284 285 286 287 292 296
  206 WASEA 298 320 322 323 324 325 326 328 329 340 343 344 345 346 358
  206 WASEA 361 362 363 364 365 367 368 382 386 389 391 392 393 394 395
  206 WASEA 421 431 432 433 439 441 442 443 447 448 451 453 454 455 461
  206 WASEA 462 464 467 477 481 483 485 486 487 488 489 522 523 524 525
  206 WASEA 526 527 528 542 543 544 545 546 547 548 554 557 562 575 583
  206 WASEA 585 587 621 622 623 624 625 626 628 630 631 632 633 634 635
  206 WASEA 637 639 641 643 644 646 649 654 655 656 657 661 662 667 670
  206 WASEA 672 682 684 685 720 721 722 723 725 726 727 728 742 743 744
  206 WASEA 745 746 747 762 763 764 767 768 771 772 773 774 775 776 778
  206 WASEA 781 782 783 784 787 788 789 820 821 822 823 824 827 828 836
  206 WASEA 838 839 842 850 852 854 859 861 865 867 868 869 870 872 874
  206 WASEA 878 880 881 882 883 885 889 930 932 933 935 936 937 938 940
  206 WASEA 941 946 947 948 949 953 954 955 965 969 972 977 979 982 986
  206 WASEA 989 991 993 994 995 996 997 998 999
  414 WIMIL 221 222 223 224 225 226 227 228 229 237 241 242 243 246 251
  414 WIMIL 252 253 254 255 256 257 258 259 263 264 265 266 271 272 273
  414 WIMIL 274 276 277 278 281 282 283 287 288 289 291 297 298 299 321
  414 WIMIL 322 323 327 332 341 342 343 344 345 347 351 352 353 354 355
  414 WIMIL 357 358 359 362 365 367 372 374 375 377 382 383 384 385 421
  414 WIMIL 422 423 425 427 438 442 444 445 447 449 453 454 461 462 463
  414 WIMIL 464 466 471 475 476 481 482 483 486 491 521 523 524 527 529
  414 WIMIL 535 536 538 541 542 543 544 545 546 547 548 549 562 575 579
  414 WIMIL 581 643 645 647 649 662 663 671 672 678 679 691 744 747 761
  414 WIMIL 762 764 765 768 769 771 774 778 781 782 783 784 785 786 789
  414 WIMIL 791 792 796 797 798 799 821 835 844 871 873 874 881 896 931
  414 WIMIL 933 935 936 937 941 955 961 962 963 964 966

Conclusion
----------

I could hardly take credit for scanning and finding the NUAs that make
make up this list.  I put this list together because the lists I've seen
in the past were either partially incomplete or partially incorrect.  A
list put out by OpusWiz and Dawn Treader several years ago served as the
base data for this list.  I've spoken to many many hackers over the years
to add to and correct the list.  Erik Bloodaxe's Telenet Directory,
published in the Legion of Doom Technical Journals, was of great help in
clarifying and adding to the data.

The list is still neither complete or fully accurate.  For example, I still
don't know the outdials for San Diego, California (619).  The 415 and 714
outdials might be mixed up.  If you have any additions or corrections, please
e/mail one of my Internet accounts.

By the way, the new 510 area code will have an impact on the PC Pursuit
dialout list.  SprintNet hasn't incorporated the new area code into its
lists yet, so I haven't either.  But they will soon, so be aware that the
Oakland, California dialout will change from area code 415 to 510 someday.
_____________________________________________________________________________


--------------------------------------------------------------------------------


                               == Phrack Inc. ==

                 Volume Three, Issue Thirty-five, File 5 of 13

        ______________________________________________________________
      ||                                                              ||
      ||  Don't let THIS happen to you!                               ||
      ||                                                              ||
      ||           __________                                         ||
      ||     Heh  |          |/No life, no future...                  ||
      ||    /Heh! |          0                         H S L Q I F X  ||
      ||   O      |        --|--                                      ||
      || --|--    |         /                                        ||
      ||  /      |        /                                         ||
      || /   \____|____              E  N  _  R  _  P  M  E  N  _     ||
      ||  Dale               ^                                        ||
      ||  Drew               |                                        ||
      ||              Will this be YOU?!                              ||
      ||______________________________________________________________||


The following is a reprint of the article "Sting Operations" from the book
_Dedicated Computer Crime Units_ (pages 101-103) written by J. Thomas McEwen
for the U.S. Department of Justice and published in June 1989.

If you would like to get your own FREE copy of this book, or its companion
books:

- Organizing for Computer Crime Investigation and Prosecution
- Electronic Fund Transfer and Crime
- Electronic Fund Transfer Fraud

you can contact:

U.S. Department of Justice
Office of Justice Programs
National Institute of Justice
Washington, D.C.  20531
(301)251-5500
(800)851-3420
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

                        S T I N G   O P E R A T I O N S
                        ~~~~~~~~~   ~~~~~~~~~~~~~~~~~~~
                        Will *YOU* Be The Next Victim?!

                       Transcribed by Sovereign Immunity


ELECTRONIC BULLETIN BOARDS

An electronic bulletin board allows for the storage of information which can be
retrieved by other systems calling into the board.  It is essentially a
database maintained by a system that is accessible by others over telephone
lines.  Most bulletin boards have been created for specific purposes, usually
for the exchange of messages and information among parties with common
interests.  For example, members of computer clubs maintain bulletin boards for
communicating with each other between meetings.

Bulletin boards are especially popular among microcomputer users.
Establishment of a bulletin board is facilitated by programs that can be
purchased or obtained from public domain software.  With one of these programs,
a user can establish tailored menus for anyone dialing into the board.  These
menus will usually contain options on information about the board, bulletins,
news summaries, personal mail, conferences, and leaving messages.

In addition, most bulletin boards have different levels of access to restrict
users from certain parts of the board.  The bulletin board owner, usually
called the System Operator (SYSOP), personally establishes the authorized
access levels for each user and enters this information into the system.
Access is determined by having a user provide their name and password when
signing on to the system.  A telephone line into the system is the only other
requirement for establishing a board on a microcomputer.

Access to bulletin boards generally operates along the following lines:

- A user dials into the bulletin board.
- The board responds with a message asking for the person's name and password.
- The board then provides a menu showing the options available to the user.
- The user selects an option and starts interacting with the system.
- During a session, a user typically may read messages, leave messages,
  download files, upload files, or join a conference.
- The user eventually "quits" the session and hangs up from the board.

While most bulletin boards have been established for legitimate purposes, there
are also "pirate" or "elite" boards that contain illegal information or have
been established to advance an illegal activity.  Security on those boards is
tightly controlled by the owners.  With these bulletin boards, users usually
have to contact the owner directly to obtain a password for access to different
levels of the system.  A degree of trust must therefore be established before
the owner will allow access to the board, and the owners develop "power" over
who can use the system.

Pirate boards have been found with a variety of illegal information on them
including the following:

- Stolen credit card account numbers
- Long distance telephone service codes
- Telephone numbers to mainframe computers, including passwords and account
  numbers
- Procedures for making illegal drugs
- Procedures for making car bombs
- Hacking programs
- Tips on how to break into computer systems
- Schematics for electronic boxes (e.g., black box)

These boards obviously are a threat to communities, and their existence has
gained the attention of some police departments.


STING OPERATIONS WITH BULLETIN BOARDS

The experiences of the Maricopa County, Arizona, Sheriff's Department and the
Fremont, California, Police Department are very instructive on how local
departments can establish their own bulletin boards and become part of the
network with other boards.  Members of the Maricopa County Sheriff's Department
were the first in the country to establish such a board.  Their board resulted
in over 50 arrests with the usual charge being telecommunications fraud.

In September, 1985, the Fremont Police Department established a bulletin board
for the primary purpose of gathering intelligence on hackers and phreakers in
the area.  The operation was partially funded by VISA, Inc. with additional
support from Wells Fargo Bank, Western Union, Sprint, MCI, and ITT.

After establishing their bulletin board, they advertised it on other boards as
the newest "phreak board" in the area.  Within the first four days, over 300
calls were received on the board.  During the next three months, the board
logged over 2,500 calls from 130 regular users.  Through the bulletin board,
they persuaded these groups that they had stolen or hacked long-distance
telephone service codes and credit account numbers.  They were readily accepted
and were allowed access to pirate boards in the area.

The board was operated for a total of three months.  During that period, over
300 stolen credit card numbers and long-distance telephone service codes were
recovered.  Passwords to many government, educational, and corporate computers
were also discovered on other boards.

The operation resulted in the apprehension of eight teenagers in the area who
were charged with trafficking in stolen credit card accounts, trafficking in
stolen long-distance telephone service codes, and possession of stolen
property.  Within the next week, seven more teenagers in California and other
states were arrested on information from this operation.

It was established that this group had been illegally accessing between ten and
fifteen businesses and institutions in California.  They were regularly
bypassing the security of these systems with stolen phone numbers and access
codes.  One victim company estimated that it intended to spend $10,000 to
improve its security and data integrity procedures.  Other victimized
businesses were proceeding along the same lines.


CONCLUSIONS

There are several reasons for conducting Sting operations of this type.  One of
the most important is that it provides a proactive method of identifying
hackers and phreakers in the area.  These groups are particularly hard to find
since they operate in closed circles with personal networks developed from
friendships.

Another byproduct of these operations is the publicity surrounding the cases.
Sting operations result in considerable amount of attention from the media.
The publicity has the effect of closing down other pirate boards in the area.
One of the greatest fears of these offenders in that their systems will be
taken, and in the Fremont operation over $12,000 of computer equipment was
seized.  The publicity associated with these seizures seems to be the primary
reason for others to stop their pirate boards.

These operations also lead to other types of offenses.  In Fremont, for
example, drug and alcohol cases were developed as a result of the Sting
operation.   This has been typical of these operations.

The Sting operations with bulletin boards have been criticized because
teenagers, rather than hardened criminals, are arrested.  Many hackers believe
that they have a right to the data in other systems and that their activities
are not illegal since the companies can afford the losses.  On the other hand,
as one investigator observed, the hackers of today may be the sophisticated
computer criminals of tomorrow.  It is therefore important to set a lesson
early in their careers steering them away from these offenses.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

RESPONSE FROM A MEMBER OF THE HACKER COMMUNITY:

Now lets take a look at this article and the ignorant author J. Thomas
McEwen.

     "Pirate boards have been found with a variety of illegal
     information on them..."

The author names:

"Telephone numbers to mainframe computers" -- There is nothing illegal in
having the telephone number to a mainframe computer.  It is illegal to access a
computer without authorization.

"Procedures for making illegal drugs" -- It is NOT illegal to know how to
manufacture illegal drugs, only to actually manufacture or use them.

"Procedures for making car bombs" -- It is NOT illegal to know how to
manufacture car bombs, only to actually manufacture or use them.

"Hacking programs" -- Indeed most security companies, private security
consultants, or mainframe owners and operators use these to test their systems
very often.  It would only be illegal to use one on a machine that you are not
authorized to use it on.

"Tips on how to break into computer systems" -- Again, it is NOT illegal to
know how to break into a computer... although for a change, according to a
section of the Computer Fraud & Abuse Act of 1986 (Federal Law), it would be
illegal to traffic in passwords, codes, and theoretically any instructions that
would be the equivalent of passwords or codes for the unauthorized entry into
computer systems.

"Schematics for electronic boxes (e.g., black box)" -- This is getting boring.
It is NOT illegal to know how to build these devices, only the actual
construction or use of them is illegal.


     "These boards obviously are a threat to communities, and their
     existence has gained the attention of some police departments."

How are they obviously a threat?

The author would like us to believe that if the information on how to make
telephone devices, explosives, or narcotics is available on bulletin boards,
this is enough to make them a threat to communities.

What he ignores is that the same information can be found in public and
university libraries, text books, and technical journals;

He ignores that the mere possession of information on how a crime MIGHT be
committed is NOT a crime; and finally,

He fails to recognize any First Amendment rights whatsoever of computer
bulletin boards to have all such information to begin with.


     "It is therefore important to set a lesson early in the careers
     steering them away from these offenses."

Of course an arrest for some minor computer mischief is not going to be great
resume material when these teenagers start applying for jobs, even though the
establishment has inspired within them the socially acceptable goal of
conforming to society's expectations.


CONCLUSIONS

The author, J. Thomas McEwen, does not know much about freedom of speech and
for that matter, he does not know much about the law.  He does know a lot about
how to sensationalize very benign conduct into dangerous conspiracy.  Perhaps
he is close friends with Geraldo Rivera.

Bulletin board operators and users take note of the law and your rights.  Don't
let yourself get taken in by Sting boards or ignorant law enforcement officers
looking for some gratification on the job since they aren't getting it at home.


S o v e r e i g n   I m m u n i t y

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Editor's Comments by: Dispater

Sting boards have been a popular topic in Phrack and Phrack World News over the
years.  In this file, Sovereign Immunity, showed us an excerpt that discussed a
Sting bulletin board in Fremont, California.  As it turns out, Knight Lightning
had some material about this way back in Phrack World News Issue 3 (which
actually appeared in Phrack Issue 4).  The article was titled "Phoenix
Phortress Stings 7."  There have also been many other articles in Phrack World
News about sting operations and bulletin boards.

Additionally, Phrack Issues 21-23 each carried one part of Knight Lightning's
"Vicious Circle" Trilogy.  The first two parts of which ("Shadows Of A Future
Past" and "The Judas Contract") contained a lot of material about sting boards
and informants.

Although Phrack has not presented material concerning Sting boards in Maricopa
County, Arizona, there was discussion about a bulletin board (The Dark Side) in
Arizona (602) run by "The Dictator" (Dale Drew) as a sting operation revealed
in Computer Underground Digest 3.02 and recently we heard that he was back in
action under the name "Blind Faith."

Dispater 
_____________________________________________________________________________?_


--------------------------------------------------------------------------------


                               == Phrack Inc. ==

                 Volume Three, Issue Thirty-five, File 6 of 13

                *****  Social Security Numbers & Privacy  *****
                 ***                                       ***
                  *     b y   C h r i s   H i b b e r t     *
                 ***                                       ***
                *****            June 1, 1991             *****

                Computer Professionals for Social Responsibility

Many people are concerned about the number of organizations asking for their
Social Security Numbers.  They worry about invasions of privacy and the
oppressive feeling of being treated as just a number.

Unfortunately, I can't offer any hope about the dehumanizing effects of
identifying you with your numbers.  I *can* try to help you keep your Social
Security Number from being used as a tool in the invasion of your privacy.

Surprisingly, government agencies are reasonably easy to deal with; private
organizations are much more troublesome.  Federal law restricts the agencies at
all levels of government that can demand your number and a fairly complete
disclosure is required even if its use is voluntary.  There are no comparable
laws restricting the uses non-government organizations can make of it, or
compelling them to tell you anything about their plans.  With private
institutions, your main recourse is refusing to do business with anyone whose
terms you don't like.

*********************
***               ***
*** Short History ***
***               ***
*********************

Social Security numbers were introduced by the Social Security Act of 1935.
They were originally intended to be used only by the social security program,
and public assurances were given at the time that use would be strictly
limited.  In 1943 Roosevelt signed Executive Order 9397 which required federal
agencies to use the number when creating new record-keeping systems.  In 1961
the IRS began to use it as a taxpayer ID number.  The Privacy Act of 1974
required authorization for government agencies to use SSNs in their data bases
and required disclosures (detailed below) when government agencies request the
number.  Agencies which were already using SSN as an identifier were allowed to
continue using it.  The Tax Reform Act of 1976 gave authority to state or local
tax, welfare, driver's license, or motor vehicle registration authorities to
use the number in order to establish identities.  The Privacy Protection Study
Commission of 1977 recommended that the Executive Order be repealed after some
agencies referred to it as their authorization to use SSNs.  I don't know
whether it was repealed, but that practice has stopped.

The Privacy Act of 1974 (5 USC 552a) requires that any federal, state, or local
government agency that requests your Social Security Number has to tell you
three things:

     1.  Whether disclosure of your Social Security Number is required or
         optional;

     2.  What law authorizes them to ask for your Social Security Number; and,

     3.  How your Social Security Number will be used if you give it to them.

In addition, the Act says that only Federal law can make use of the Social
Security Number mandatory.  So anytime you're dealing with a government
institution and you're asked for your Social Security Number, just look for the
Privacy Act Statement.  If there isn't one, complain and don't give your
number.  If the statement is present, read it.  If it says giving your Social
Security Number is voluntary, you'll have to decide for yourself whether to
fill in the number.

*****************************
***                       ***
*** Private Organizations ***
***                       ***
*****************************

The guidelines for dealing with non-governmental institutions are much more
tenuous.  Most of the time private organizations that request your Social
Security Number can get by quite well without your number, and if you can find
the right person to negotiate with, they'll willingly admit it.  The problem is
finding that right person.  The person behind the counter is often told no more
than "get the customers to fill out the form completely."

Most of the time, you can convince them to use some other number.  Usually the
simplest way to refuse to give your Social Security Number is simply to leave
the appropriate space blank.  One of the times when this isn't a strong enough
statement of your desire to conceal your number is when dealing with
institutions which have direct contact with your employer.  Most employers have
no policy against revealing your Social Security Number; they apparently
believe the omission must have been an unintentional slip.

*****************************
***                       ***
*** Lenders and Borrowers ***
***                       ***
*****************************

Banks and credit card issuers are required by the IRS to report the SSNs of
account holders to whom they pay interest or when they charge interest and
report it to the IRS.  If you don't tell them your number you will probably
either be refused an account or be charged a penalty such as withholding of
taxes on your interest.

************************************
***                              ***
*** Insurers, Hospitals, Doctors ***
***                              ***
************************************

No laws require medical service providers to use your Social Security Number as
an ID number (except for Medicare, Medicaid, etc).  They often use it because
it's convenient or because your employer uses it to certify employees to its
groups health plan.  In the latter case, you have to get your employer to
change their policies.  Often, the people who work in personnel assume that the
employer or insurance company requires use of the SSN when that's not really
the case.  When my current employer asked for my SSN for an insurance form, I
asked them to try to find out if they had to use it.  After a week they
reported that the insurance company had gone along with my request and told me
what number to use.  Blood banks also ask for the number but are willing to do
without if pressed on the issue.  After I asked politely and persistently, the
blood bank I go to agreed that they didn't have any use for the number, and is
in the process of teaching their receptionists not to request the number.

************************************************************
***                                                      ***
*** Why Is The Use of Social Security Numbers A Problem? ***
***                                                      ***
************************************************************

The Social Security Number doesn't work well as an identifier for several
reasons.  The first reason is that it isn't at all secure; if someone makes up
a nine-digit number, it's quite likely that they've picked a number that is
assigned to someone.  There are quite a few reasons why people would make up a
number: to hide their identity or the fact that they're doing something;
because they're not allowed to have a number of their own (illegal immigrants,
e.g.), or to protect their privacy.  In addition, it's easy to write the number
down wrong, which can lead to the same problems as intentionally giving a false
number.  There are several numbers that have been used by thousands of people
because they were on sample cards shipped in wallets by their manufacturers
(one is included below).

When more than one person uses the same number, it clouds up the records.  If
someone intended to hide their activities, it's likely that it'll look bad on
whichever record it shows up on.  When it happens accidently, it can be
unexpected, embarrassing, or worse.  How do you prove that you weren't the one
using your number when the record was made?

A second problem with the use of SSNs as identifiers is that it makes it hard
to control access to personal information.  Even assuming you want someone to
be able to find out some things about you, there's no reason to believe that
you want to make all records concerning yourself available.  When multiple
record systems are all keyed by the same identifier, and all are intended to be
easily accessible to some users, it becomes difficult to allow someone access
to some of the information about a person while restricting them to specific
topics.

***********************************************
***                                         ***
*** What Can You Do To Protect Your Number? ***
***                                         ***
***********************************************

If despite your having written "refused" in the box for Social Security Number,
it still shows up on the forms someone sends back to you (or worse, on the ID
card they issue), your recourse is to write letters or make phone calls.  Start
politely, explaining your position and expecting them to understand and
cooperate.  If that doesn't work, there are several more things to try:

     1.  Talk to people higher up in the organization.  This often works simply
         because the organization has a standard way of dealing with requests
         not to use the SSN, and the first person you deal with just hasn't
         been around long enough to know what it is.

     2.  Enlist the aid of your employer.  You have to decide whether talking
         to someone in personnel, and possibly trying to change corporate
         policy is going to get back to your supervisor and affect your job.

     3.  Threaten to complain to a consumer affairs bureau.  Most newspapers
         can get a quick response.  Some cities, counties, and states also have
         programs that might be able to help.

     4.  Tell them you'll take your business elsewhere (and follow through if
         they don't cooperate).

     5.  If it's a case where you've gotten service already, but someone
         insists that you have to provide your number in order to have a
         continuing relationship, you can choose to ignore the request in hopes
         that they'll forget or find another solution before you get tired of
         the interruption.

If someone absolutely insists on getting your Social Security Number, you may
want to give a fake number.  There is no legal penalty as long as you're not
doing it to get something from a government agency or to commit fraud.  There
are a few good choices for "anonymous" numbers. Making one up at random is a
bad idea, as it may coincide with someone's real number and cause them some
amount of grief.  It's better to use a number like 078-05-1120, which was
printed on "sample" cards inserted in thousands of new wallets sold in the 40s
and 50s. It's been used so widely that both the IRS and SSA recognize it
immediately as bogus, while most clerks haven't heard of it.  It's also safe to
invent a number that has only zeros in one of the fields. The Social Security
Administration never issues numbers with this pattern.  They also recommend
that people showing Social Security cards in advertisements use numbers in the
range 987-65-4320 through 987-65-4329.

The Social Security Administration recommends that you request a copy of your
file from them every few years to make sure that your records are correct.

                                ***************
                                ***         ***
                                *** THE END ***
                                ***         ***
                                ***************
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                Volume Three, Issue Thirty-five, File 7 of 13

      <:=--=:><:=--=:><:=--=:><:=--=:>|/<:=--=:><:=--=:><:=--=:><:=--=:>
      <:=--=:>                                                   <:=--=:>
      <:=--=:>    >>>>>=-*  Users Guide to VAX/VMS  *-=<<<<<     <:=--=:>
      <:=--=:>                                                   <:=--=:>
      <:=--=:>                   Part I of III                   <:=--=:>
      <:=--=:>                                                   <:=--=:>
      <:=--=:>            Part A:  Basic Information             <:=--=:>
      <:=--=:>         Part B:  Programming the VAX/VMS          <:=--=:>
      <:=--=:>                                                   <:=--=:>
      <:=--=:>                   By: Black Kat                   <:=--=:>
      <:=--=:>                                                   <:=--=:>
      <:=--=:><:=--=:><:=--=:><:=--=:>/|<:=--=:><:=--=:><:=--=:><:=--=:>


Index
~~~~
Part A contains information on the following topics:

   o  Background                          o  Logical Names
   o  Terminal Control Keys               o  System Default Logical Names
   o  Logging in                          o  Logical Name Tables
   o  Digital Command Language (DCL)      o  User Environment
   o  Error Messages                      o  Terminal Characteristics
   o  Command Line Editing                o  File Security
   o  Files and Directories               o  EDT Text Editor
   o  File Operations                     o  EDT Help manual

Part B contains information on the following topics:

   o  Programming VAX/VMS              o  Parameters
   o  DCL Expressions                  o  Terminal I/O
   o  Command Procedures               o  File I/O
   o  Writing Command Procedures       o  Redirecting Command Procedure I/O
   o  Comments                         o  Branching and Conditionals
   o  Labels                           o  Loops
   o  Debugging                        o  Subroutines
   o  Invoking Command Procedures      o  Error Handling
   o  Symbols                          o  Termination
   o  Lexical Functions                o  Example Command Procedures


                   <:=- Part A : Basic Information -=:>

Introduction
~~~~~~~~~~~
VAX is an acronym for Virtual Address eXtension, a 32-bit computer developed by
Digital in the 1970's.  The VAX architecture supports multiprogramming, where
many users running different programs can use the VAX simultaneously and each
appears to have full control of the computer's resources.  The multiprocessing
VAX functions vary differently from the old timesharing systems, which would
allocate a slice of CPU time to each user of the system in a rotating fashion,
whether the time slice was required or not.  The VAX/VMS environment, however,
provides each user an allocation of processor time based on the user's needs
and priority. If a user does not need his quantum of time, or a portion of it,
it is given to the next user.  This scheduling method is very efficient when
compared to the old method of timesharing.

The VAX is capable of addressing more than four billion addresses, through a
method known as virtual memory addressing.  Because the memory is virtual
however, there is no need to have four billion bytes of physical memory.  The
VAX executes programs by a technique known as paging, whereby a single "page"
of the program is read into memory at a time, and when a new page is needed,
the old one is "swapped" back out to disk to make room for the new one.  The
VMS operating system ties everything together.  The user interacts with VMS
(Virtual Memory System) through a Command Language Interpreter (CLI), usually
the Digital Command Language (DCL).

When you use VAX/VMS, you are known to the system as a process, which is
created when you log in to the system and deleted when you log out.  This
process carries with it various attributes to identify you from other system
users (process name, identification, user identification code, privileges,
etc).


Terminal Control Keys
~~~~~~~~~~~~~~~~~~~
Ctrl-A      Allows you to insert, rather than overstrike, characters on a
            DCL command line that you're editing.
Ctrl-B      Displays DCL commands that you've previously entered.
Ctrl-C      Interrupts the coessed or the program being executed.
Ctrl-E      Positions the cursor at the end of the line.
Ctrl-H      Positions the cursor at the beginning of the line.
Ctrl-I      Tab
Ctrl-O      Alternately suppresses and continues the display of the output
            terminal.
Ctrl-Q      Enables (toggles on) output to the display after CTRL-S.
Ctrl-R      Retypes the current input line and repositions the cursor atthe
            end of the retyped line.
Ctrl-S      Disables (toggles off) output to the display until CTRL-Q is
            pressed.
Ctrl-T      Displays process statistics.
Ctrl-U      Discards the current input line and performs carriage return.
Ctrl-W      Refreshes the screen.
Ctrl-X      Flushes the type-ahead buffer.
Ctrl-Y      Interrupts command or program execution and returns control to
            the DCL command line interpreter.
Ctrl-Z      Indicates end of file for data entered from terminal.


Logging in
~~~~~~~~
Most VAX systems prompt you with something like this:

   Welcome to VAX1
   Username:

Type your username and press <enter>.  You'll then be prompted for your
password.  If you enter the correct username/password combination, you'll
be given something like the following:

          Welcome to VAX/VMS V4.4
   Last interactive login on Monday, 16-JUL-87  16:12
   Last non-interactive login on Friday, 13-JUL-87  00:14
   $

If you entered an incorrect username and password, you'll receive the
message:

   User authorization failure

Just hit <enter> and you'll be prompted for your username again.  Once
you're logged in, you'll be given the DCL prompt ($).  This indicates that
the system is ready to accept interactive commands.

To log out, use the command:

   $ LOGOUT


The Digital Command Language (DCL)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DCL is comprised of more than 200 commands called verbs.  Each DCL verb acts on
a parameter or assumed parameter, and the action of these verbs and the scope
of their parameters can be modified with qualifiers.  The basic command
structure is:

$ LABEL: COMMAND-NAME PARAMETER(S) /QUALIFIER(S) !COMMENT
    |           |         |             |           |
    |           |         |             |           +-- Optional Comment
    |           |         |             |
    |           |         |             +-------------- Command modifier(s)
    |           |         |
    |           |         +---------------------------- Object of the
Command
    |           |
    |           +-------------------------------------- DCL command verb
    |
    +-------------------------------------------------- Optional Label

A label is an optional, user-specified string with a maximum length of
255 characters.  It is most commonly used in command procedures.

A DCL command verb defines the action the VAX will take when the command
line is interpreted.

Parameter(s) specify the object or a list of objects the DCL command verb
will act upon.  Multiple parameters may be specified but must be separated
from one another by a space, multiple spaces, or a tab.  If you enter a DCL
command that requires parameters, but you don't enter them on the command
line, the DCL interpreter will prompt you for them automatically.

Qualifiers further define or modify the function the DCL command will
perform.  They consist of a keyword followed by a value or a list of
values.

The qualifier keyword must be preceded by a slash (/).  Multiple qualifiers
may be specified, but each must be preceded with a slash.  Qualifiers
usually aren't required.  There are three kinds of qualifiers:  parameter,
positional, and command.  A command qualifier applies to the whole command.
Generally, these are placed at the end of the command.  For example:

   $ DIRECTORY [BYNON],[BYNON.DECPRO]/FULL

This displays a full listing of two directories, using the /FULL qualifier of
the DIRECTORY command.  A positional qualifier takes on a different meaning
based on where it is located in the command.  If a positional qualifier is
placed after the command verb, but before the first parameter, the qualifier
will affect the entire command.  If the same positional qualifier is placed
after a parameter, only that parameter will be affected.  For example:

   $ PRINT/COPIES=3 MEMO1.TXT,MEMO2.TXT
   $ PRINT MEMO1.TXT/COPIES=2,MEMO2.TXT

The first command prints three copies of each file.  The second command prints
two copies of the first file, but only one copy of the second.  A parameter
qualifier affects only the parameter it follows.  In the following example,
MEMO1.TXT is sent to the queue LASER and MEMO2.TXT is sent to queue FAST_PRINT:

   $ PRINT MEMO1.TXT/QUEUE=LASER,MEMO2.TXT/QUEUE=FAST_PRINT

A comment is an optional, user-specified comment about the command.  It is
commonly used in command procedures to document the command.


Error Messages
~~~~~~~~~~~~
Generally, error messages are of the format:

   % FACILIT-L-IDENT, TEXT
   |   |     |   |      |
   |   |     |   |      +-- explanation of the error message
   |   |     |   |
   |   |     |   +--------- abbreviated message text, for reference
   |   |     |
   |   |     +------------- error severity
   |   |
   |   +------------------- Vax/VMS facility or component (error source)
   |
   +----------------------- message number: "%" = first, "-" = subsequent

A percent sign (%) indicates the first error message for a given command.
All subsequent errors for that command are preceded with a hyphen (-).

The facility indicates the source of the error.  The source may be the DCL
command line interpreter, one of the various VMS utilities, or a program
image.

The severity level indicator (L) will have one of the following values:
S (successful completion), I (information), W (warning), E (error), or
F (fatal or severe error).

The ident is an abbreviation of the error message text.  It can be referenced
in the VAX/VMS System Messages manual.

The text provides an explanation of the error message.


Command line editing
~~~~~~~~~~~~~~~~~~
DCL stores the last 20 command lines entered.  You can display a list of them
with:

   $ RECALL /ALL

The resulting display might look like:

   1  DIR
   2  COPY VAX1::$1$DUA5:[BYNON]LOGIN.COM LOGIN.COM;1
   3  EDIT LOGIN.COM
   $

To recall a specific command from the recall buffer, use the DCL RECALL
command with a command line number as a parameter.  For example:

   $ RECALL 2
   $ COPY VAX1::$1$6DUA5:[BYNON]LOGIN.COM LOGIN.COM;1


Files and Directories
~~~~~~~~~~~~~~~~~~~~
Files are organized much like MS-DOS, with a directory-tree structure.  The
user's default directory (assigned by the system administrator) is the "root"
directory.  Up to seven subdirectories may be created, each containing as many
subdirectories as you like.  The complete file specification looks like:

   VAX1 :: DUA0 : [BYNON.PROGRAMMING.FORTRAN]WINDOWS.FOR;3
    |       |                |                  |     |  |
    |       |                |                  |     |  |
   node   device         directory          filename  |  version
                                                     type
                                                     
The node name identifies a computer system in a network.  If no node name is
specified, VMS assumes the file is located on the local node where you're
logged in.

The device name is the physical device where the file is stored.  It is a
four-character alphanumeric code which identifies the device type, hardware
controller to which it is attached, and the unit number of the device on the
controller.  If you omit the device name from a file specification, VMS assumes
you are referring to your default device.

The directory entry is enclosed in brackets, and is the name of the directory
that contains the file.  If you omit the directory name from a file
specification, VMS will assume you are referring to your default directory.

The filename may consist of up to 39 alphanumeric characters.

The file type is a code consisting of up to 39 alphanumeric characters, and it
generally indicates the type of information supplied in the file.  Some system
programs and utilities supply a three character default file type.

The version number is a 1 to 5 digit number the system assigns to every file by
default.  When a file is created, it is assigned a version number of 1.  Each
time the file is edited or another version of it is created, the version number
is automatically incremented by 1.  Alternatively, you may specify a version
number of your choice.

No blank spaces are allowed within any portion of a file specification.  In
VMS Version 4.x, the maximum lengths are as follows:

   node name           up to 6 characters
   device name         four characters
   directory name      up to 39 characters
   subdirectory name   up to 39 characters
   file name           up to 39 characters
   file type           up to 39 characters
   version number      up to 5 decimal digits with a value between 1
                       and 32,767

File specifications must be unique; no two files can have completely identical
specifications.  It's conceivable to have many copies of NOTES.TXT in a
subdirectory, but only one NOTES.TXT;8 may exist in the same subdirectory.

Wildcards are similar to those in MS-DOS, with an asterisk (*) representing
a filename or filetype, and a percent sign (%) indicating a single
character.


File operations
~~~~~~~~~~~~~~
Creating and modifying files:  $ CREATE TEMP.DAT
                               TEMP 1
                               TEMP 2
                               <CTRL-Z>

Renaming files:   $ RENAME TEMP.DAT NEW.DAT
                  $ RENAME TEMP.DAT [BYNON.PROG]TEMP.DAT
                  Note: you cannot rename files across devices, just
                  directories.

Copying files:    $ COPY TEMP.DAT NEW.DAT
                  $ COPY TEMP.DAT,TEST.DAT NEW.DAT

Appending files:  $ APPEND TEMP.DAT NEW.DAT

Deleting files:   $ DELETE TEMP.DAT;1
                  $ DELETE *.DAT;*
                  $ DELETE /CONFIRM .DAT;*  (confirm each file)

Displaying files: $ TYPE /PAGE TEMP.DATE    (one page at a time)

Directories:      $ DIRECTORY
                  $ DIRECTORY DJA1:[BYNON.PROG]

Printing files:   $ PRINT TEMP.DAT

Purging files:    $ PURGE *.DAT   (erase all but latest version of .DAT files)

Create a dir:     $ CREATE/DIRECTORY [.BUDGET]

Set default dir:  $ SET DEFAULT [BYNON.PROG]
                  $ SET DEFAULT [.PROG]

Delete a dir:     $ SET DEFAULT [BYNON.PROG]
                  $ DELETE *.*;*
                  $ SET DEFAULT [BYNON]
                  $ SET PROTECTION=(0:D) PROG.DIR;1
                  $ DELETE BUDGET.DIR;1


Logical Names
~~~~~~~~~~~~
A logical name is a substitute for a file specification, portion of a file
specification, or another logical name.  They provide two primary functions:
file and device independence and file specification shorthand.

File and device independence means that you are not constrained by a physical
element, such as a disk or printer name.  If you use files nested deeply in
subdirectories, with long names, or on devices or nodes other than your
default, you can define a meaningful logical name to represent it.  These
shorthand names are faster to type and easier to remember.

To define a logical name:

   $ DEFINE PARTS_DBF DJA2:[DATABASES]PARTS.DAT

This example will associate the logical name PARTS_DBF with the file
specification  DJA2 : [DATABASES]PARTS.DAT.  Now, PARTS_DBF may be used
anywhere as a substitute for the complete file specification.

Other commands also can be used to assign logical names.

Assign  :  Associates equivalence names with a logical name
Mount   :  Mounts a disk or tape volume and assigns a system logical for the
           volume.
Allocate:  Allocates a system device for private use and optionally (command
           qualifier) assigns a logical name to the device.
Open    :  Opens a file for read or write operations and assigns a logical
           name to the file specification.

To display the logical name translations: $ SHOW LOGICAL PARTS_DBF will
display: "PARTS_DBF" = "DJA2:[DATABASES]PARTS.DAT"  (LNM$PROCESS_TABLE).

To deassign a logical name:  $ DEASSIGN  PARTS_DBF


System default logical names
~~~~~~~~~~~~~~~~~~~~~~~~~~~
SYS$COMMAND   The initial file, or input stream, from which the DCL command
              line interpreter reads input data.  The logical name
              SYS$COMMAND is equated to your terminal for interactive
              processes.
SYS$DISK      Your default disk as assigned in the UAF.
SYS$ERROR     The device on which the system displays all error and
              informational messages.  By default, SYS$ERROR is assigned
              to your terminal for interactive processes, and to the batch
              job log file for any batch processes.
SYS$INPUT     The default file or input stream from which data and commands
              are read by either the DCL command line interpreter or
              programs executing in your account.  By default, SYS$INPUT is
              equated to your terminal for interactive processes and to the
              batch job stream (or command procedure) for batch processes.


Logical Name Tables
~~~~~~~~~~~~~~~~~
Logical names are stored in system files called logical name tables.
The following are the four most commonly used:

Group table  :  Contains the logical names available to all users in your
                UIC (User Identification Code) group.
Job table    :  Contains the logical names available to your process and
                any subprocess it creates.
Process table:  Contains the logical names available to your process only.
System table :  Contains the logical names that may be used by all users
                of the system.


User Environment
~~~~~~~~~~~~~~
The User Authorization File (UAF) is a system file controlled and modified
by the system manager.  A record for each system user is contained in the
UAF.

A User Identification Code (UIC) is an identifier used by VAX/VMS to identify
users and groups of users.  It is used to identify processes, directories,
files, and other objects in the system.  A UIC may be specified numerically or
alphanumerically, and is made up of two parts, a group and a member, specified
in the format: [group,member].  For example, UIC [10,14] identifies group 10,
user 14.  The group number is an octal number in the range 1-37776, and the
member is an octal number in the range 0-177776.  An alphanumeric UIC contains
a member name and optionally, a group name in the format: [member] or
[group,member].  The group and member names in an alphanumeric UIC may contain
1 to 31 alphanumeric characters (A-Z, 0-9, underscore, dollar sign).

Each user of the system is limited in the consumption of system
resources, and these limits control the rate at which your process or
any subprocesses you create may consume a resource.  There are 32 levels
of priority in the VAX/VMS system, 0 through 31, the highest being 31.
The priorities are divided into two ranges: timesharing (0-15) and
real-time (16-31).  The default user priority is 4.  Depending on how
heavily the system is being used, your priority may be raised above the
default, but never lowered below it.  VAX/VMS maintains 35 privileges,
divided into the following seven categories classified by how much
damage could be done to the system by possessing them:

None    No privileges.
Normal  The minimum privilege needed to use the system effectively.
Group   The ability to effect members of the same UIC group.
Devour  The potential to consume noncritical system-wide resources.
System  The ability to interfere with normal system operation.
File    The potential to bypass file protection security.
All     The ability to take over the entire system.

VAX/VMS systems keep a record of overall computer system use by account
holder in a system file called ACCOUNTING.DAT.  The system manager uses
this file to produce reports with the Accounting Utility.  This can be
used to learn more about how the system is being used, how it performs,
and how a particular user is using the system.  It can also be used to
bill users for system time.


Terminal Characteristics
~~~~~~~~~~~~~~~~~~~~~~
Setting display width:  $ SET TERMINAL/WIDTH=132

Shutting messages off:  $ SET TERMINAL/NOBROADCAST
  This prevents other users from phoning you, sending mail messages, and
  some system messages from appearing on your screen.  If you just want
  mail and phone messages screened, use: $ SET BROADCAST=(NOMAIL,NOPHONE).

Increasing type-ahead buffer:  $ SET TERMINAL/ALTYPEHD/PERMANENT

Line editing modes:  $ SET TERMINAL/INSERT or $ SET TERMINAL/OVERSTRIKE

Defining keys:  $ DEFINE/KEY PF1 "SET DEFAULT DUA3:[INV.SUP]"
                % DCL-I-DEFKEY, DEFAULT key PF1 has been defined

Showing keys:   $ SHOW KEY PF1      (or $ SHOW KEY ALL)
                DEFAULT keypad definitions:
                   PF1 = "SET DEFAULT DUA3:[INV.SUP]"

Deleting keys:  $ DELETE/KEY PF1    (or $ DELETE/KEY ALL)
                % DCL-I-DELKEY, DEFAULT key PF1 has been deleted


Changing prompt:  $ SET PROMPT = "What now?"

Displaying process information:  $ SHOW PROCESS  (add a qualifier)

Changing process information:  $ SET PROCESS/NAME="Bob"
                               $ SET PROCESS/PRIVILEGES=OPER


File Security
~~~~~~~~~~~~
UIC-based protection permits access to be granted or denied based on
protection codes that reflect four user categories:

System:  system manager
Owner :  account owner
Group :  users in same UIC group
World :  all users of system, regardless of UIC

Four type of file access can be granted or denied to members of these user
categories:

Read    (R): read the file
Write   (W): create or modify the file
Execute (E): run a program
Delete  (D): delete the file

Generally, any category of user can be granted or denied file access
with this protection scheme.  However, you can read a file in a
subdirectory with EXECUTE access if you know its filename and filetype.
Also, since SYSTEM privileges include the ability to bypass all file
protection, anyone within the SYSTEM category can read a file.

CONTROL access, or the ability to change the protection and ownership of
a volume, is never specified in the UIC-based protection code.  This is
the fifth type of protection that can be specified in an access control
list (ACL).  It's automatically granted to two user categories when VMS
examines UIC-based protection.  Users in the SYSTEM and OWNER categories
receive CONTROL access by default while GROUP and WORLD categories are
denied CONTROL access.

File protection defaults are as follows:

System:  RWED
Owner :  RWED
Group :  RE
World :  No access

To determine the existing or default protection of a file, use the SHOW
PROTECTION command.  The default in the previous example would be:
   $ SHOW PROTECTION
       SYSTEM=RWED, OWNER=RWED, GROUP=RE, WORLD=NO ACCESS

If you want to see file protection in directories, use the /PROTECTION
qualifier with the DIRECTORY command.

To change the protection of a file, use the command:

   $ SET PROTECTION=(O:RWE,G,W) LOGIN.COM

In this example, the account owner has READ, WRITE, and EXECUTE access
to his LOGIN.COM file.  The GROUP and WORLD categories have no access
and SYSTEM access remains unchanged.

Rules for specifying protection codes:
1.  Access types must be abbreviated with one letter: R, W, E, or D.
2.  User categories may be spelled out or abbreviated.
3.  Each user category must be separated from its access types with a colon.
4.  If you specify multiple user categories, separate each with a comma
    and enclose the entire code in parenthesis.
5.  User categories and access types may be specified in any order.
6.  If you include a user category, but do not specify an access type
    for that category, access is automatically denied.
7.  If you omit a user category entirely, protection for that category
    is unchanged.

Remember that VAX/VMS evaluates directory protection before file
protection.  If you grant WORLD:R access to a file, but the file is in a
directory without WORLD:R access, another user couldn't read the file.


EDT Text Editor
~~~~~~~~~~~~~~
When you enter EDT, you automatically enter line mode, indicated by the
EDT prompt, an asterisk (*).  All line mode commands are made at the
asterisk prompt and terminated by pressing <Return>.  Lines that you
input are numbered sequentially by the editor.  You can reference a line
or group of li^S^Qnes based on the line number or range of line numbers.  A
list of basic EDT commands follows.  Each command may be abbreviated to
the characters in parenthesis.  Complete information on all EDT line
mode commands can be found through the use of the line mode EDT HELP
command.

Commands          Function
~~~~~~~         
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Change (C)        Change from line to keypad mode.  To switch back from
                  keypad mode to line mode, press <Ctrl-Z>.
Copy (CO)         Copy a line or group of lines from one place to another.
                  If you enter the command CO 5 to 10, line 5 will be
                  copied to the line immediately preceding line 10.  The
                  command CO 5:10 to 20 would copy the contents of lines 5
                  through 10 into the area immediately preceding line 20.
Delete (D)        Delete a line or group of lines.  The command D13 would
                  delete line 13, while D13:20 will delete lines 13 to 20.
Exit (EX)         Terminates the EDT session, saving all changes.  This
                  also creates a new version of the file being edited.
Help (H)          Display on-line help on all EDT line mode commands.  The
                  help messages will not be included in the file being edited.
Include (INC)     Copy text from an external file into the file being edited.
                  When the EDT command INCLUDE FILENAME.TYPE is executed,
                  the contents of FILENAME.TYPE are copied into the file
                  being edited.
Insert (I)        Inserts specified text directly before the current
                  position in the file.  While inserting text, you will
                  not receive the EDT "*" prompt.  Press <Ctrl-Z> to
                  return to the "*" prompt when you're finished inserting.
Move (M)          You can't cut and paste with a line-oriented editor.
                  Text will be moved to the area immediately preceding a
                  specified line.  The command M 10:15 to 50 would move
                  lines 10 through 15 to the area immediately preceding
                  line 50.
Quit (QUI)        Exit the EDT editor without saving changes.
Replace (R)       Deletes a specified line or group of lines and enters the
                  INSERT mode so you can add text in that place.  The
                  command R5:10 would delete lines 5 through 10 and switch
                  to the INSERT mode to permit you to enter new text.  To
                  exit the INSERT mode, press <Ctrl-Z>.
Resequence (RES)  Numbers all of the lines in the file that you're
                  editing in increments of 1.  This is useful because
                  text insertion, movement, or deletion causes the file
                  to lose numeric sequence.
Substitute (S)    Substitute a new text element for an old one in the
                  format s/oldtext/newtext/range.  The old and new text
                  elements must be enclosed in angle bracket (< >)
                  delimiters and the range must be specified.
Write (WR)        Write a given range of text to a new file.
                  WRHISTORY.TXT 50:100 would write lines 50 through 100 to
                  a new file called HISTORY.TXT.


EDT Help Manual
~~~~~~~~~~~~~
To dump the entire EDT Help file to disk, enter the following DCL command
during a terminal session:  $ ASSIGN EDTHELP.FIL SYS$OUTPUT.  Now, enter
line mode EDT and type:  * HELP *.  Now exit EDT and enter the DCL
command: $ ASSIGN TTnn: SYS$OUTPUTT (TTnn: is your terminal number).


                  <:=- Part B : Programming VAX/VMS -=:>

Introduction
~~~~~~~~~~~
A symbol is a name chosen to represent a string of characters, a numeric value,
or a logical (true/false) value.  A symbol may be used wherever the value it
represents would normally be found, and can be up to 255 characters long.
Symbols must begin with a character, dollar sign, or underscore, and are not
case-sensitive.  Symbols are created like this:

   symbol_name = value    (local symbol)
   symbol_name == value   (global symbol)

A global symbol may be used at any command level, but local symbols are lost
when command procedures are finished.  For example:

   $ WIDE = "SET TERMINAL/WIDTH=132"

Now, anytime you type WIDE at the DCL command line, the terminal width will
be changed to 132 characters.  To show the contents of a symbol:

   $ SHOW SYMBOL ANSWER
      ANSWER = 1584    HEX = 00000630    OCTAL = 000000003060

The SHOW SYMBOL command uses the local symbol table by default.  To show
the value of a global symbol, use the /GLOBAL qualifier.  To show all
symbols, use the /ALL qualifier (or /GLOBAL/ALL).  To delete symbols,
use: $ DELETE/SYMBOL symbol_name command (with /GLOBAL if it's global).

When a DCL command is executed, symbols in the following positions are
automatically translated:

  o  the beginning of the command
  o  in a lexical function
  o  in a WRITE or IF statement
  o  on the right side of an = or == assignment statement
  o  inside brackets on the left side of an assignment statement when
     you're preforming string substitution

If none of these cases fits, apostrophes will force the translation:
   $ DIRECTORY 'PARTS'  (after $ PARTS = "DJA2:[DBA]PARTS.DAT")

Symbols are commonly used for shorthand.  For example, to clear the screen:

   $ ESC[0,8] == 27
   $ CLEAR == "[J"
   $ HOME  == "[H"
   $ CLR == WRITE SYS$OUTPUT ESC,HOME,ESC,CLEAR

Now, anytime you enter CLR, the screen will be cleared.  Symbols can also be
used to execute command procedures:

   $ NETBACK == "@SYS$LOGIN:NETBACKUP"

Finally, foreign commands unknown to DCL can be executed by using symbols:

   $ KERMIT == RUN SYS$$SYSTEM:KERMIT


DCL Expressions
~~~~~~~~~~~~~~
Expressions are built by combining data elements with operators.  A logical
comparison evaluates the relationship between two components as true or
false (True = 1, False = 0).

Lexical functions are VAX/VMS routines that return process or system
information, or manipulate user-supplied data.  Lexical functions are unique
because the result is returned in the function name, allowing it to be used as
a symbol (much like Pascal).  Lexical functions are called with the following
format:

   F$function_name(parameter, parameter...)

For example, the following lexical function manipulates user-supplied data:

   $ STRING = "Go     home    right      now!"
   $ STRING = F$EDIT(STRING, "COMPRESS, UPCASE")
   $ SHOW SYMBOL STRING
      STRING = "GO HOME RIGHT NOW!"


Command Procedures
~~~~~~~~~~~~~~~~~
A command procedure is a file consisting of a sequence of DCL commands which
can be executed interactively or as a batch job (like a .BAT file in MS-DOS or
a REXX EXEC in VM/SP).  Command procedures are used in VAX/VMS to perform
repetitive or complex tasks and to save time.  With a command procedure, you
can execute many DCL commands with a single statement.

Command procedures aren't bound by simple lists of DCL commands executed in
sequence.  They can take advantage of labels, lexical functions, symbols and
relational operators to build sophisticated procedures which act like VAX/VMS
programs.  Command procedures are flexible.  They can be written to take
specific actions based on responses to questions, or even to perform a given
function depending on the time or date.


Writing Command Procedures
~~~~~~~~~~~~~~~~~~~~~~~
A text editor such as EDT or EVE is used to create and edit command procedures,
which should be named "PROCEDURE_NAME.COM".  The file type ".COM" is the
default procedure file type, and if a different file type is included, it must
be included when the procedure is invoked.

Each new command line must begin with a dollar sign ($).  Multiple spaces or
tabs may be included after the "$" for readability, and command lines may be
extended past a single line by ending the previous line with a hyphen (-) and
not starting the next line with a dollar sign.

Data input to programs, such as responses, must be entered without the dollar
sign.  Data lines are used by the program running and are not processed by the
DCL command line interpreter.  For example:

   $ MAIL         <--- invokes the Mail Utility
   SEND           <--- Mail SEND command
   JONES, BOB     <--- response to Mail prompt "To:"
   Memo           <--- response to Mail prompt "Subj:"
   Bob,           <--- Mail message

   How's it going?'?

   Joe
   $              <--- terminates Mail program
   $ EXIT         <--- terminates command procedure


Comments
~~~~~
Comments may be included by preceding them with an exclamation point (!),
which causes everything to the right of it to be ignored by the DCL command
interpreter.  Comments make command procedures easier to debug and modify
later.  Spelling DCL commands out rather than using the abbreviations also
makes the command procedure more readable.


Labels
~~~
Labels are used by the DCL command line interpreter for conditional
processing and repetitive looping.  Labels should be placed on separate
lines, making them easier to find.  Labels can be 255 characters long, may
not contain blanks, and must be terminated with a colon (:).


Debugging
~~~~~~
The SET VERIFY command tells DCL to display each command as it processes it.
This allows you to see where errors are generated, and how strings are
translated.  SET NOVERIFY turns the verify mode off.

The SHOW SYMBOL command displays the contents of defined symbols, and is
used to show the contents of a symbol in a command procedure as it is being
executed.


Invoking Command Procedures
~~~~~~~~~~~~~~~~~~~~~~~~~~
Command procedures may be invoked interactively by typing the "at" sign (@)
followed by the procedure name.  The file type must also be included if it is
not ".COM" (the default).  Command procedures may be invoked at the command
line or from within another command procedure, called nesting.  The DCL SUBMIT
command will place your command (job) in a batch queue with other jobs waiting
to be run.  Command procedures are generally submitted as batch jobs when you
want them to execute at a specific time, they will take a long time to run, or
when a job must run at a reduced priority.  The following command submits the
command procedure ACCOUNT.COM to the VAX/VMS batch processor:

   $ SUBMIT ACCOUNT
   Job ACCOUNT (queue SYS$BATCH, entry 103) started on SYS$BATCH

The SYS$BATCH queue is the default and is used unless otherwise specified with
the /QUEUE qualifier.  When VAX/VMS runs this job, a process with your rights
and privileges will be created and the procedure executed within that process.


Symbols
~~~~~~
Symbols may be local (single equal sign) or global (double equal sign).
Local symbols are recognized by DCL only at the command level at which it
was defined and more deeply nested levels (subsequently called command
procedures).  Global symbols are recognized at any command level.  Local
symbols should be used when the symbols is only needed for the duration of
the command procedure employing it.  You should only define global symbols
if you're going to use them in other command procedures or for the duration
of your login session.

An asterisk can be used to tell the command line interpreter (CLI) to accept
abbreviations.  For example:

   $ NO*TES == "@SYS$LOGIN:NOTES"

This tells the CLI to accept NO, NOT, NOTE, or NOTES as a valid abbreviation
for the NOTES command.  This notation is usevul for long symbol names.


Lexical Functions
~~~~~~~~~~~~~~~~
Lexical functions allow you to obtain basically the same information as DCL
SHOW commands.  However, it's easier to manipulate information which comes
from a lexical function.  As an example, the following two command give the
same information:

   $ SHOW TIME                  ! DCL SHOW TIME command
       12-JUN-1989 14:29:23
   $ WRITE SYS$OUTPUT F$TIME()  ! lexical function
       12-JUN-1989 14:29:25.17

The second command is more usable, however:

   $!  Show_Date.COM
   $!
   $ TIME&DATE = F$TIME()
   $ DATE = F$EXTRACT(0,11,TIME&DATE)
   $ WRITE SYS$OUTPUT DATE

This procedure displays only the date portion of the string returned by the
lexical function F$TIME().  (Use @SHOW_DATE to invoke it) VAX/VMS supports
lexical functions to manipulate text strings, convert data types, and return
information about the system, your process, symbols, files and devices.


Parameters
~~~~~~~~~
Eight reserved symbols (P1 through P8) are available to command procedures to
supply data to process.  By using these parameters in a command procedure,
different data can be specified each time it's run.  Parameter specification is
done on the command line where the procedure is called.  Unless designed to,
the command procedure will not prompt for parameters.  Parameters are separated
with spaces and may be character strings, integers, or symbols.  If you want to
skip a parameter, us a null string (" ").

   $! Add.Com
   $! command procedure to demonstrate passing parameters
   $! (add the first and third parameter)
   $!
   $  WRITE SYS$OUTPUT P1+P3

   $ @ADD 12 " " 14
   26

If a command procedure requires multiple letters or words as a single
parameter, enclose it in quotes and it will be treated as one parameter and
not converted to uppercase.


Terminal Output
~~~~~~~~~~~~
The WRITE and TYPE commands send data to the terminal.  TYPE is used to
display the contents of a file, but may also be used to print lines of text
from within a command procedure.  TYPE may only be used to output text
strings.  Since the WRITE command is processed be DCL, expressions, symbols
and lexical functions are evaluated before the data is sent to the
terminal.

The output expression must translate to a string and be sent to the logical
device SYS$OUTPUT, but may be a string, lexical function, symbol, or any
combination of the three.  Here's an example of a command procedure that
uses terminal output:

   $! Writing a simple text string
   $!
   $  WRITE SYS$OUTPUT "This is a test..."
   $!
   $! Displaying multiple lines at the terminal
   $!
   $  TYPE SYS$OUTPUT Warning!
          It's been 30 days since you changed
          your password.  Change it now!
   $!
   $! Writing a string with a lexical function
   $!
   $  WRITE SYS$OUTPUT " "HI' You are in directory "F$DIRECTORY()' "


Terminal Input
~~~~~~~~~~~
The INQUIRE command's default device is the terminal keyboard, while the
READ command must be told where to accept data from.  The INQUIRE command
prompts for input, reads data and assigns it to a symbol.  All data is
accepted as a character string and is converted to uppercase and compressed
(extra blanks removed).  The READ command prompts for input if the /PROMPT
qualifier is used, accepts data from a specified source and assigns it to a
symbol.  The data is accepted with no string conversion or compression
occurring.  Here's an example of a command procedure that uses terminal
input:

   $! Puts whatever you type in the symbol NAME
   $! the /NOPUNCTUATION qualifier will suppress the colon
   $! and space INQUIRE puts at the end of the prompt
   $!
   $  INQUIRE /NOPUNCTUATION NAME "What is your name? "
   $!
   $! Example of READ using SYS$INPUT (terminal) for data
   $!
   $  READ /PROMPT = "First value: " SYS$INPUT VALUE_1
   $  READ /PROMPT = "Second value: " SYS$INPUT VALUE_2
   $  WRITE SYS$OUTPUT VALUE_1," + ",VALUE_2," = ",VALUE_1+VALUE_2


File I/O
~~~~~~~
The basic steps to read and write files from within command procedures are
similar to most other languages.  Use the OPEN command to open the file.  If it
does not exist, OPEN will create it.  Use the READ or WRITE commands to read or
write text records from the file.  Use the CLOSE command to close the
 file when you're done.

To open a file for writing, you must use the /APPEND or /WRITE qualifier.  The
/WRITE qualifier creates a new file and places the record pointer at the
beginning of the file.  If the file already exists, a new version will be
created by OPEN/WRITE.  The /APPEND qualifier is used to add records to the end
of an existing file.  The file must already exist before using the OPEN/APPEND
command, and when the file is opened, the record pointer is placed at the end
of the file.

To open a file for reading, use the /READ qualifier (the default for the
OPEN command).  A file opened for reading may not be written to, and the
record pointer will initially be placed at the first record in the file.
Each time a record is read, the pointer is moved down to the next record.
The WRITE/UPDATE must be used to write over an existing record. Here's an
example of a command procedure using file input and output:

   $ OPEN/APPEND OUTPUT_FILE NEW.DAT
   $ OPEN/READ INPUT_FILE OLD.DAT
   $ READ INPUT_FILE RECORD
   $ WRITE SYS$OUTPUT "First record from OLD.DAT - ",RECORD
   $ WRITE OUTPUT_FILE "First record from OLD.DAT - ",RECORD

To open a file for both reading and writing, use both the /READ and /WRITE
qualifiers.  The record pointer will be placed at the first record in the file.
Using this method, however, you can only overwrite the record you most recently
read, and records you replace must be the same length.
                                                   

Redirecting Command Procedure I/O
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Command procedures often invoke VAX/VMS utilities, and these programs will
normally get input from the logical device SYS$INPUT.  While executing a
command procedure, SYS$INPUT is directed to the command procedure itself, and
this is why you can put command and data lines for a utility or program
directly in the procedure.  SYS$COMMAND defaults to the terminal from where a
command procedure is being executed, and by redirecting SYS$INPUT to
SYS$COMMAND you can use utilities and other programs interactively from command
procedures:

   $ DEFINE/USER_MODE SYS$INPUT SYS$COMMAND:
   $ EDIT JUNK.DAT

The /USER_MODE qualifier causes the re-assignment to be in effect only for
the next command.

Normally command procedure output is displayed at your terminal.  You may
redirect output to a file by using the /OUTPUT qualifier:

    $ @SHOW_TIME/OUTPUT = TIME.DAT

By default, DCL error and severe error messages are directed to the file
represented by the logical name SYS$ERROR, which usually points to your
terminal.  If you want to log error messages, simply redirect SYS$ERROR to
a file.  If you redirect SYS$ERROR without also redirecting SYS$OUTPUT, DCL
will send error messages to both, and you'll receive the error messages
twice -- at your terminal and in the file.

To completely suppress error messages you can redirect both SYS$ERROR
and SYS$OUTPUT to the null device (NL:) or you can use the SET MESSAGE
command to turn off all message output.  To suppress all messages, use:
SET MESSAGE/NOTEXT/NOIDENTIFICATION/NOFACILITY/NOSEVERITY.


Branching and Conditionals
~~~~~~~~~~~~~~~~~~~~~~~~~
You can use the DCL IF/THEN statements and conditional operators withing
command procedures to cause the execution of a command based on the
evaluation of a condition.  The basic use is:  $ IF condition THEN command.
The condition is a Boolean expression (True or False) and the command is
any legal DCL command.  The following is a list of conditional operators:

Operator        Function
~~~~~~~       
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
.EQ. / .EQS.    Determines if two numbers/character strings are equal
.GE. / .GES.    Tests to see whether the first number/character string is
                greater than or equal to the second
.GT. / .GTS.    Determines if the first number/character string is greater
                than the second
.LE. / .LES.    Tests to see if the first number/character string is less
                than or equal to the second
.LT. / .LTS.    Determines if the first number/character string is less than
                the second
.NE. / .NES.    Tests to see whether the two numbers/character strings are
                not equal
.AND.           Combines two numbers with a logical AND   (boolean algebra)
.OR.            Combines two numbers with a logical OR    (boolean algebra)
.NOT.           Logically negates a value

The following is a command procedure using conditional branching:

   $! Time.Com
   $!
   $    TIME = F$TIME()
   $    HOUR = F$EXTRACT(12,2,TIME)
   $    IF HOUR .LT. 12 THEN GOTO MORNING
   $    IF HOUR .LT. 17 THEN GOTO AFTERNOON
   $    IF HOUR .LT. 18 THEN GOTO EVENING
   $    GOTO END
   $  MORNING:
   $    WRITE SYS$OUTPUT "Good morning!"
   $  AFTERNOON:
   $    WRITE SYS$OUTPUT "Good afternoon!"
   $  EVENING:
   $    WRITE SYS$OUTPUT "Good evening!"
   $  END:
   $    EXIT


Loops
~~
Loops are used to repeat a statement or group of statements until a
given condition is met.  DCL supports both DO WHILE and DO UNTIL loops.
The DO WHILE loop tests the condition before evaluation:

   $ LOOP:
   $    IF .NOT. condition THEN GOTO END
     .
     .
     .
   $    GOTO LOOP
   $ END:
   $    EXIT

The DO UNTIL loop executes the statement(s) and then tests the condition:

   $ LOOP:
     .
     .
     .
   $    IF condition THEN GOTO LOOP
   $    EXIT


Subroutines
~~~~~~~~
The DCL command GOSUB transfers execution control to a label and the RETURN
command terminates subroutine execution, returning control to the statement
after the GOSUB command.  Subroutines are useful where you need to do the same
series of commands repeatedly in different parts of a command procedure.  They
also make procedures easier to read and more compact.  The DCL commands GOSUB
and RETURN are not supported in VAX/VMS versions before VAX/VMS Version 4.4.
The following is an example procedure using a subroutine:

   $! Personal.Com
   $!
   $!     opens the personal info file
   $!
   $  OPEN/WRITE OUTPUT_FILE PERINFO.DAT
   $!
   $!     collect info
   $!
   $  INQUIRE RECORD "Enter full name"
   $  GOSUB WRITE_FILE
   $  INQUIRE RECORD "Enter address"
   $  GOSUB WRITE_FILE
   $  INQUIRE RECORD "Enter phone number"
   $  GOSUB WRITE_FILE
   $  CLOSE OUTPUT_FILE
   $  EXIT
   $!
   $!     subroutine WRITE_FILE
   $!
   $  WRITE_FILE:
   $      WRITE OUTPUT_FILE RECORD
   $      RETURN


Error Handling
~~~~~~~~~~~~~
The command interpreter will execute an EXIT command if a severe error occurs,
terminating the procedure and returning control to the previous command level,
unless the DCL ON command is used to specify an action for the command
interpreter to take.  The ON command supports the three keywords WARNING,
ERROR, and SEVERE_ERROR.  To override error handling for procedure warnings,
for example, use something like this:

   $ ON WARNING THEN EXIT
     or
   $ ON WARNING THEN GOTO label

WARNING causes the command procedure to take action if a warning, error, or
severe error occurs.  ERROR causes the action if an error or severe error
occurs, and SEVERE_ERROR causes the action only if a fatal error occurs.

$STATUS and $SEVERITY are reserved DCL global symbols, and each time a command
is executed, values are assigned to these symbols. $STATUS holds the full
condition code of the last statement and $SEVERITY holds an error severity
level.  The condition code in $STATUS is valid to the VAX/VMS MESSAGE facility
and can be used in conjunction with F$MESSAGE to obtain the actual text message
associated with the code:

   $ SET DEFAULT DUB1:[BYNON]
   $ WRITE SYS$OUTPUT $STATUS $X00000001
   $ WRITE SYS$OUTPUT F$MESSAGE(%X00000001)
   % SYSTEM-S-NORMAL, normal successful completion

All DCL commands will return a condition code, but not all condition codes
have text messages.  Condition codes without text messages will return the
message "%NONAME-E-NOMSG Message number (8-digit code)".

The message text isn't very useful for making conditional decisions though, so
$SEVERITY is used.  It contains one of five possible values extracted from the
first three bits of $STATUS.  Here are the codes:

Code  Definition
~~~  ~~~~~~~~~~
 0    Warning
 1    Success
 2    Error
 3    Information
 4    Severe Error

Odd values (1,3) indicate success while even values (0,2,4) indicate failure.
There are basically two ways to use the status and severity codes to handle
errors.  The first is to treat $STATUS as a Boolean value:

   $ SET NOON
   $ command                         ! a DCL command
   $ IF $STATUS THEN GOTO NO_ERR     ! test $STATUS for T or F
     .
     .                               ! handle the error
     .
   $ NO_ERR                          ! continue processing
     .
     .
     .
   $ EXIT

The second method is to trap the error with the ON WARNING command, then use
the severity level to determine an appropriate course of action:

   $ SET NOON
   $ ON WARNING GOTO ERR_TRAP
   $ command                         ! a DCL command
   $ command                         ! a DCL command
     .
     .
     .
   $ EXIT
   $!
   $! error trap code
   $!
   $ ERR_TRAP:
   $    SEVERITY = $SEVERITY             ! save the error code
   $    IF SEVERITY = 0 THEN command     ! if warning...
   $    GOTO DONE
   $    IF SEVERITY = 2 THEN command     ! if error...
   $    GOTO DONE
   $    IF SEVERITY = 4 THEN command     ! if severe error...
   $ DONE:
     .
     .
     .
   $ EXIT

Error checking can be completely disabled with the SET NOON command.  When
this is in effect, the command interpreter continues updating the condition
code, but does not perform any error checking.  The DCL command SET ON
restors error checking to normal.  For example:

   $ SET NOON      ! turn off error checking
   $ command       ! a DCL command
   $ SET ON        ! restor error checking


Termination
~~~~~~~~~~
The EXIT command will terminate the current command procedure and return
control to the command level that called it while the STOP command terminates
all command procedures (if nested) and returns control to DCL.


Example Command Procedures
~~~~~~~~~~~~~~~~~~~~~~~~~
The following are two example command procedures to demonstrate some of
the previously discussed techniques.

Login.Com
~~~~~~~~
   $! Login.Com - executed each time you log in
   $!
   $! Check for a network or batch login
   $!
   $      IF F$MODE() .EQS. "NETWORK" THEN GOTO NETWORK
   $      IF F$MODE() .EQS. "BATCH" THEN GOTO BATCH
   $!
   $! Define process permanent symbols for convenience
   $!
   $      SD == "SET DEFAULT"
   $      SH == "SET HOST"
   $      WI*DE == "SET TERMINAL/WIDTH=132"
   $      NA*RROW == "SET TERMINAL/WIDTH=80"
   $      DIR*ECTORY == "DIRECTORY/SIZE"
   $      PU*RGE == "PURGE/LOG/KEEP=2"            ! keep latest 2 version
   $      HO*ME == "SET DEFAULT SYS$LOGIN:"
   $      WHO == "SHOW USERS"
   $      EVE == "EDIT/TPU"
   $      EDT == "EDIT/EDT/COMMAND=SYS$LOGIN:EDTINI.EDT"
   $      BR*OWSE == "TYPE/PAGE"
   $!
   $! Define special keys
   $!
   $      DEFINE/KEY/NOLOG/TERM PF1 "DIR"         ! term ends with <enter>
   $      DEFINE/KEY/NOLOG PF2 "EDIT"
   $      DEFINE/KEY/NOLOG/TERM/NOECHO PF3 "LOGOUT"
   $      DEFINE/KEY/NOLOG/TERM/NOECHO HELP "SHOW KEY/ALL"
   $!
   $! Modify terminal characteristics
   $!
   $      SET TERMINAL/INSERT     ! insert mode
   $      SET PROMPT = "[BYNON]> "
   $!
   $! Show time and quit
   $!
   $      SHOW TIME
   $      EXIT
   $!
   $! If it's a network login, we can now
   $! perform some other commands if desired.
   $! Just quit for now though.
   $!
   $  NETWORK:
   $      EXIT
   $!
   $! If it's a batch job login, set verification on and quit.
   $!
   $  BATCH:
   $      SET VERIFY
   $      EXIT


Subdir.Com
~~~~~~~~~
   $! Subdir.Com - how to search and parse character strings
   $!
   $      WRITE SYS$OUTPUT F$DIRECTORY()+ " Subdirectories:"
   $      WRITE SYS$OUTPUT " "
   $!
   $! Search for subdirectory names and display them on the terminal
   $!
   $  DIR$LOOP:
   $      FILE = F$SEARCH("*.DIR")
   $!
   $! If DCL returns a null string (" ") we're done
   $!
   $      IF FILE .EQS. " "THEN GOTO END$DIR$LOOP
   $!
   $! Find the position of the period
   $!
   $      DOT = F$LOCATE(".",FILE)
   $!
   $! Find the position of the right bracket
   $!
   $      BRACKET = F$LOCATE("]",FILE)
   $!
   $! Extract the string between the dot and bracket
   $!
   $      FILE = F$EXTRACT(BRACKET+1,DOT-BRACKET-1,FILE)
   $!
   $! Display the subdirectory name and start over
   $!
   $      WRITE SYS$OUTPUT "      ' 'FILE' "
   $      GOTO DIR$LOOP
   $  END$DIR$LOOP:
   $      EXIT                                              

<END PART I>
______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                Volume Three, Issue Thirty-five, File 8 of 13

 
+=========================================================================+
                                                                           
 
                   A Beginners Guide to Novell Netware 386                 
 
                                                                           
 
                             Brought to you by:                            
 
                                                                           
 
                                 The Butler                                
 
 
+=========================================================================+

As most of you know NOVELL is the most popular PC network software around,with
that being the case I decided to put together a little file on just what you
can do with a NOVELL network.

* The information in this file is primarily for NOVELL NETWARE 386 networks!!!
If you have NOVELL NETWARE 286 some of this information may not be correct.

When the word "Network" is mentioned in this file I am referring to a PC-based
network or LAN (Local Area Network).

If you are not familiar with the concept of a "Network" I would suggest you
first get acquainted with it by either picking up a good book or if you have
access to one, go exploring.

This file is for those who have some experience with networks and or the
concept of a network.

(----------------------------------------------------------------------------)

Variations in Setups:

Every network is setup differently is some way.  Even within the same company
two different networks may be setup different.  The differences may be slight
or major and can consist of everything from menus to naming conventions.

Companies that install networks as a business are inconsistent with their
setups also because every network technician does things differently and every
customer wants things to be a certain way.

Keep this idea in mind when exploring different networks because most likely
the setup will be different from network to network.

(----------------------------------------------------------------------------)

Terminology:

 Bindery-- A database that contains definitions of entities such as users
           groups, and workgroups.  The bindery is comprised of three
           components: objects, properties, and property data sets.

 Console-- The monitor and keyboard at which you actually control fileserver
           activity.

 File Server-- The Computer that the Network software, applications, and some
               data reside on.  (Usually a very powerful one, i.e. Compaq 486
               with 1 gigabyte of storage).

 Groups-- A means of dealing with users collectively rather than individually.
          i.e. Word Processing, Accounting.

 LAN-- Local Area Network

 Login Script-- Similar to autoexec.bat, contains commands that initialize
                environmental variables, map network drives, and control the
                user's program execution.

 Netware-- Novell's Network Operating System.

 Netwire-- Novell's on-line information service, accessible via Compuserve.

 Network-- A group of computers that can communicate with each other.

 NIC-- Network Interface Card

 Novell-- Software Manufacturer

 Objects-- any physical or logical entities, including users, user groups,
           workgroups, file servers, print servers, or any other entity that
           has been given a name.

 Print Server-- A computer dedicated to controlling all jobs for a specified
                printer.

 Properties-- the characteristics of each bindery object.  Passwords, account
              restrictions, account balances, internetwork addresses, list of
              authorized clients, and group members are all properties.

 Property Data Sets-- the values assigned to an entity's bindery properties.

 Rights-- Rights control which directories and files a user or group can
          access and what the user or group is allowed to do with those
          directories and files.

 User-- Any person allowed to work on the network.

 WAN-- Wide Area Network

 Workstation-- Any usable computer connected to a network.

(----------------------------------------------------------------------------)

Netware Environment:

The SYS:SYSTEM directory is used for system administration and contains
operating system files, NetWare utilities, and programs reserved for
SUPERVISOR.

The SYS:PUBLIC directory is used for general access and contains NetWare
utilities and programs for regular network users.

The SYS:LOGIN directory contains the programs necessary for logging in.

The SYS:MAIL directory is used by NetWare-compatible mail programs.  This
directory also has and ID number subdirectory for each user that contains
the user login script and print job configurations.

(----------------------------------------------------------------------------)

Breaches in Security:

Set Allow Unencrypted Passwords=on/off.

Enter this command from the "CONSOLE".

By changing this command you will disable the encryption scheme which will
then allow you to sniff passwords from the cables between workstations and
servers.

By default Netware comes with usernames GUEST and SUPERVISOR that have no
passwords.

Also try names like TAPE, BACKUP, SERVER, REMOTE, CONNECT, NOVELL, etc...  If
you have access to an existing account use SYSCON to get a list of all the user
names, most likely there will be one or two accounts that don't have passwords.

Also on some of these accounts that do not have passwords, part of their logon
process is the execution of a batch file that executes the individual software
i.e. backup.  A batch file is a batch file so if its not disabled do the old
CTRL-C to break out of the batch file and roam around.  Some accounts like the
backup account must have supervisor rights so that everything can be backed up.
So if you can break out of one of these you can roam the whole Network.

There are also a few neat little programs out there in cyberspace that will
make your task of getting access a little easier:

        1.  THIEFNOV.ZIP ===> THIEFNOV is a TSR that will capture usernames
                              and passwords from a workstation on Novell
                              Networks. The Thief works by hiding in a user's
                              autoexec.bat file, and executing every time
                              someone tries to login to the network.  The Thief
                              captures their username and password and saves
                              them in a hidden file in the root directory of
                              their C: drive.

        2.  TEMPSUP.ZIP ====> TEMPSUP is a utility that will create a user for
                              you to play with.  TEMPSUP comes with two
                              programs, an executable and a NLM module. The
                              executable can be run by any user with access to
                              DOS but only gives you the rights of that user.
                              But, the NLM module can be loaded at the Console
                              and will give you Supervisor Rights to the whole
                              Network. The syntax is "Tempsup_username to be
                              created" i.e. f:> tempsup hacker <return>.

        3.  NETCRACK.ZIP ===> NETCRACK is a brute force hacking program
                              designed for Novell.  NETCRACK can be run with
                              out login in to the network but by just loading
                              ipx and netx.  NETCRACK starts with AAA and goes
                              from there trying to guess the password for any
                              user.  The syntax is "netcrack_username <return>.


These are the only programs I know of made especially for Novell and I have
personally tried them all out with excellent results.

If you do get access to a Novell Network and you are not sure what to do, then
go to the F:PUBLIC directory and type HELP.  Novell comes with an online help
system that uses FOLIO Infobases.  The HELP system is very easy to navigate
through and is better that the actual Novell Manuals.  You can even download
the programs NFOLIO.COM & NFOLIO.EXE and the infobases *.NFO to your local PC
to examine further.

If you are using the brute force hacking method Novell will stop you dead in
your tracks if the Intruder Detection/Lockout option has been enabled because
after 3 unsuccessful login attempts the account is locked until a supervisor
resets it.

Intruder Detection/Lockout options are as follows:

        Detect Intruders:                       Yes/No
        Intruder Detection Threshold
        Incorrect Login Attempts:               #
        Bad Login Count Retention Time:         # Days    # Hours   # Minutes

        Lock Account After Detection:           Yes/No
                Length of Account Lockout:      # Days    # Hours   # Minutes


The following restrictions are optional for every user account:

        Account Disabled:                       Yes/No
        Account Has Expiration Date:            Yes/No
                Date Account Expires:
        Limit Concurrent Connections:           Yes/No
                Maximum Connections:
        Allow User To Change Password           Yes/No
        Require Password:                       Yes/No
                Minimum Password Length:
        Force Periodic Password Changes:        Yes/No
                Days Between Forced Changes:
                Date Password Expires:
                Limit Grace Logins:             Yes/No
                        Grace Logins Allowed:
                        Remaining Grace Logins:
        Require Unique Passwords:               Yes/No


Novell can also be setup so that users can only logon during certain hours,
i.e. 8 a.m. - 5 p.m. Monday thru Friday.

Trustee Assignments grant rights to specific users (or groups) that allow
them to use a file or directory in particular ways (i.e., only for reading)
The network supervisor can select the appropriate rights to assign to users
or groups in each directory or file.

A trustee assignment automatically grants users the right to see to the root of
a directory.  However, the users can't see any of the subdirectories unless
they also have been granted rights in the subdirectories.

Inherited Rights Masks are given to each file and directory when they are
created.  The default Inherited Rights Mask includes all rights. But this does
not mean that users have all rights; users can only use rights that they been
granted in trustee assignments.

If the Inherited Rights Mask is modified for a file or subdirectory below the
original trustee assignment, the only rights the user can "inherit" for the
file or subdirectory are rights that are allowed by the Inherited Rights Mask.
For example, if a user is granted Read right with a directory trustee
assignment, the right to read files in a subdirectory could be revoked by
having the Read right removed from the subdirectory's Inherited Rights Mask.

Both trustee assignments and Inherited Rights Masks use the same eight trustee
rights to control access to directories and file.

S -- Supervisory

        Supervisory right grants all rights to the directory or file.  At the
        directory level, this right grants all rights to the directory and to
        any files, subdirectories, or subdirectory files in that directory.
        The Supervisory right overrides any restrictions placed on subdirs or
        files with Inherited Rights Masks.  Users who have the Supervisory
        right in a directory can grant other users Supervisory rights to the
        directory, its files, and subdirectories.

        Once the Supervisory right has been granted, it can be revoked only
        from the directory is was granted to.  It cannot be revoked in a
        file or subdirectory.

R -- Read

        Read right allows users to open and read files.  At the directory
        level this right allows users to open files in a directory and read
        the contents or run the program.  At the file level, this right allows
        users to open and read the file (even when the right has been revoked
        at the directory level).

W -- Write

        Write right allows users to write to files.  At the directory level,
        this right allows users to open and write to (modify the contents of)
        file in the directory.  At the file level, this right allows users
        to open and write to the file (even if the right has been revoked at
        the directory level).

C -- Create

        Create right allows users to create directories and files.  At the
        directory level, this right allows users to create files and
        subdirectories in the directory.  At the file level, this right
        allows users to salvage a file after it has been deleted.

E -- Erase

        Erase right allows users to delete directories and files.  At the
        directory level, this right allows users to delete a directory as well
        as any files, subdirectories, and subdirectory files in that
        directory.  At the file level, this right allows users to delete the
        file (even when the right has been revoked at the directory level).

M -- Modify

        Modify right allows users to change directory and file attribute sand
        to rename subdirectories and files. At the directory level, this right
        allows users to change the attributes of and rename any file, subdir,
        or subdirectory file in that directory. At the file level, this right
        allows users to change the file's attributes or to rename the file
        (even when the right has been revoked at the directory level).

F -- File Scan

        File Scan right allows users to see files.  At the directory level,
        this right allows users to see files and subdirectories in a
        directory.  At the file level, this right allows users to see the file
        (even when the right has been revoked at the directory level).

A -- Access Control

        Access Control right allows users to modify trustee assignments and
        Inherited Rights Masks.

(----------------------------------------------------------------------------)

As a network user, you should be familiar with the operation of the personal
computer you are using.  If you have an IBM PC-type workstation, you should
also be familiar with basic Disk Operating System (DOS) commands.

User Basics is divided into the following ten sections.  The first section
explains basic networking concepts and gives an overview of how a NetWare
network operates.

The second section introduces the NetWare menu and command line utilities and
explains how to use them.

The next seven sections explain some basic network tasks:

o   Booting up
o   Logging in and out
o   Creating your login script
o   Mapping your drives
o   Sending messages
o   Managing files and directories
o   Printing

Some basic troubleshooting hints are covered under "What If ..." at the end of
each of these modules and are also listed in the index.

The last section lists some common error messages and how to respond to them.

This booklet does not explain how to perform every network task or how to use
every available network command.  For complete explanations of all network
tasks and commands, see NetWare v3.11 Utilities Reference.

INTRODUCTION TO NETWARE

If your personal computer is part of a NetWare network, it is connected to
other computers and peripherals.  You can share files and resources and
communicate with others in your workgroup, thus increasing productivity.

This introduction answers the following questions about using a NetWare
network:

o   What is a NetWare network?
o   How does a network operate?
o   How are files stored on a network?
o   Who can use the network?
o   How is information protected on a network?

WHAT IS A NETWARE NETWORK?

A NetWare network is a group of computers (such as IBM PCs or Macintoshes)
that are linked together so they can communicate and share resources.

Network users, each working on a different personal computer, can communicate
with each other via the network.  They can also share network resources (hard
disks on the file server, data, applications, and printers) and use any service
the network provides (for example, access to a mainframe system).

HOW DOES A NETWORK OPERATE?

To understand how a network operates, you must know about the principal
components of a network: the file server, the workstations, and the software
that runs on each----NetWare and operating systems like DOS, OS/2, VMS, UNIX,
and the Macintosh operating system.

Beyond these basic components, a NetWare network can incorporate mainframe
computers, backup devices, modem pools, and different types of servers (such as
file servers, print servers, or archive servers).

The Network Workstations and DOS

Workstations are the personal computers on which network users do their work.
Workstations are used much like non-networked personal computers.  The only
difference is that they can access files from more than just the local drives.
Each workstation processes its own files and uses its own copy of DOS.

The Network File Server and NetWare

The file server is a personal computer that uses the NetWare operating system
to control the network.  The file server coordinates all of the workstations
and regulates the way they share network resources.  It regulates who can
access which files, who can make changes to data, and who can use the printer
first.

All network files are stored on a hard disk in or attached to the file server,
instead of on diskettes or hard disks in individual workstations.

The NetWare Workstation

Workstations use two pieces of software to communicate with the file server,
the shell and a protocol.  The shell must be loaded into each workstation
before that workstation can function on the network.

The NetWare shell, either NET3 or NET4 (depending on whether you are using DOS
3.x or 4.x), directs workstation requests to DOS or NetWare.  When a
workstation makes a request (asks to do a task), the shell decides if it is a
workstation task (to be directed to DOS) or a network task (to be directed to
NetWare).  If the request is a workstation task (such as using the DOS DIR
command to list the files in a local directory), DOS should handle the request.
If the request is a network task (such as printing a job on a network printer),
NetWare should handle the request.  The shell sends the request to the
appropriate operating system, somewhat like a railroad track switcher sends
trains to the proper destination.

The workstation shell uses another file, IPX.COM, to send network messages to
the file server and, in some cases, directly to other network stations.  This
IPX protocol is the language the workstation uses to communicate with the file
server.

HOW ARE FILES STORED ON A NETWORK?

All network information is stored on the file server's hard disk.  The system
for storing that information is called the "directory structure."

The NetWare directory structure, or storage system, is organized into

o   File servers, which contain one or more
o   Volumes, which can span several hard disks and are divided into
o   Directories, which can contain other directories (subdirectories) and
o   Files.

A directory structure can be compared to a filing cabinet system.

o   The file server corresponds to the filing cabinet.

o   The volumes correspond to the filing cabinet drawers.  Each file server
    has at least one volume, the SYS volume, which is created when the server
    is installed.  In NetWare v3.11, however, one volume can span several
    hard disks.

o   The directories correspond to the hanging folders within the filing
    cabinet drawers.  You can create and delete directories to suit your
    organizational needs, much as you insert hanging folders into, and remove
    them from, a filing cabinet.

o   Directories can contain other directories, which are sometimes referred
    to as "subdirectories.  These directories within a directory then
    correspond to the manila folders inside the hanging folders.  They divide
    directories into smaller units, just as manila folders divide hanging
    folders into smaller units.

o   And finally, directories contain actual files, just as manila folders
    contain individual documents.  A file might be a letter or a list of
    addresses.  When you save information in a file, you give the file a
    unique name so you can retrieve it later.

WHO CAN USE THE NETWORK?

Before being able to work on the network, a person must be designated as a
network user.  Network users can be assigned four levels of responsibility on
the network.

o   Regular network users

o   Operators (file server console operators, print queue operators, print
    server operators)

o   Managers (workgroup managers, user account managers)

o   Network supervisors

Regular network users are the people who work on the network.  They can run
applications and work with files according to the rights assigned to them.

Operators are regular network users who have been assigned additional   
privileges.  For example, a file server console operator is a network user
who is given specific rights to use the FCONSOLE utility.

Managers are users who have been given responsibility for creating and/or
managing other users.  Workgroup managers can create and manage users; user
account managers can manage, but not create, users.  Managers function as
supervisors over a particular group, but they do not have supervisor
equivalence.

Network supervisors are responsible for the smooth operation of the whole
network.  Network supervisors maintain the system, restructuring and updating
it as needed.  Supervisors may also teach regular network users how to use the
network.

HOW IS INFORMATION PROTECTED ON A NETWORK?

All information on a NetWare network is stored in a central location---the file
server's hard disk.  However, all users should not be able to access all
information (such as payroll files).  In addition, users should not always be
able to access the same data file at the same time; otherwise, they may
overwrite each other's work.

To prevent problems like these, NetWare provides an extensive security system
to protect the data on the network.

NetWare security consists of a combination of the following:

o   Login security

    Login security includes creating usernames and passwords and imposing
    station, time, and account restrictions on users.

o   Trustee rights (privileges) assigned to users

    Trustee rights control which directories and files a user can access and
    what the user is allowed to do with those directories and files, such as
    creating, reading, erasing, or writing to them.

o   Attributes assigned to directories and files

    Directory and file attributes determine whether that directory or file
    can be deleted, copied, viewed, or written to.  Among other things, they
    also mark a file as shareable or non-shareable.

These three levels of security work together to protect the network from
unauthorized access.

REVIEW

This introduction explained the following:

o   A NetWare network links personal computers so users can communicate and
    share resources.

o   A NetWare network consists of two or more workstations and at least one
    file server.

    Workstations are personal computers on which network users do their work.
    Workstations run their own native operating system (for example, DOS) and
    process their own files.  They can access files, applications, and
    resources through the file server.

    File servers are personal computers that use the NetWare operating system
    to coordinate all network activities.

o   Workstations and the file server communicate via the NetWare shell, which
    must be loaded into each workstation (just as DOS must be loaded into
    each workstation).  NET3 or NET4 (the NetWare shells corresponding to DOS
    3.x or 4.x) sends workstation requests to the proper operating system
    (file server or workstation) for processing.

o   The shell uses a protocol, such as IPX, to send messages to the
    appropriate network station.

o   Information is stored on the file server in a directory structure that is
    made up of volumes, directories, and files.

o   There are four types of network users:  regular network users, network
    operators, network managers, and network supervisors.  The type of user
    you are is determined by your responsibilities.

o   NetWare's extensive security system prevents users from corrupting data
    in network files and prevents unauthorized users from accessing
    restricted files.

WHAT ARE MENU AND COMMAND LINE UTILITIES?

You use NetWare utilities to perform network tasks.  There are two types of
utilities: menu utilities and command line utilities.  Menu utilities let you
perform network tasks by choosing options from menus.  Command line utilities
let you perform tasks by typing commands at the DOS command line.  This section
explains how to execute both types of NetWare utilities.

WORK WITH MENU UTILITIES

Access a Menu Utility

To access a menu utility, such as FILER, type the utility's name
at the DOS prompt and press <Enter>.  The utility's main menu
is displayed along with a screen header showing the following:

o   The utility's full name
o   The current date and time
o   The directory path leading up to your current directory (some utilities)
o   Your username on your file server (some utilities)
o   Your connection number (some utilities)

Exit a Menu Utility

There are two ways to exit a menu utility:

o   Press <Escape> until an exit confirmation box appears.  Then highlight
    "Yes" and press <Enter>.

o   Press the Exit key (usually <Alt><F10>).  Do not press the Exit key to exit
    a menu utility if you have made changes within the utility; if you do, the
    changes are not saved.  Exiting via the Escape key saves your changes.

Additional Information

Once you have accessed a menu utility and the main menu is displayed, you are
ready to work.  Menu utilities use certain keys to perform special functions.
The utilities also have certain standard components.  The keys, wildcards, and
components are described below.

F1  (Help) Key.  Displays help screens.
    If you press the help screen once, a help screen that applies to the task
    you are currently working on appears.  The help screen describes all the
    options on the screen.  To get help on a specific option, highlight the
    option and press <Enter>.

    If you press the Help key twice, your computer's function key assignments
    are listed.  There are three screens containing function key assignments.
    Press the <PageDown> key to see subsequent screens.

F5  (Mark) Key.  Allows you to mark multiple items in a list so you can add or
    delete several items at once.

Esc (Escape) Key.  Has three functions:

    1)   If you are on a menu screen, pressing <Escape> allows you to return to
         a previous menu.

    2)   If you are at the main menu, pressing <Escape> causes an exit
         confirmation box to appear.  By highlighting "Yes" and pressing
         <Enter>, you exit the menu utility and return to the menu or command
         line prompt.

    3)   If you are performing a process, pressing <Escape> allows you to
         continue.

Wildcard characters (* and ?).  DOS and NetWare recognize these as universal
replacements for any other character or set of characters.  Wildcards can be
used to search for groups of volumes, directories, or files, or they can be
used to search for a particular file when you are unsure of its complete
name.

An asterisk (*) in a filename indicates that any character can occupy that
position and all remaining positions in the filename.  For example, in the
FILER utility, to copy all subdirectory's files with the extension .EXE to
another directory, type "*.EXE" in the menu's entry box and press <Enter>.

In contrast, a question mark (?) in a filename indicates that any character can
occupy that position, and that position only.  So, if you were to type
"ACCOUNT?.NEW", you would copy files like ACCOUNT1.NEW, ACCOUNT2.NEW, and so
on.

NetWare's use of wildcard characters differs from DOS's in one respect.  For
example, to represent all files in a directory, DOS expects you to type "*.*",
whereas NetWare only needs one asterisk (*).

For more information about wildcard characters (global filename characters),
see your DOS manual.

Components.  When you first access a menu utility, the main menu is displayed.
Menus contain options you can choose from.  Options can be selected one of two
ways:

o   You can use the arrow keys to highlight the option you want. Then press
    <Enter>.

o   You can type the first letter of an option to highlight that option.  If
    more than one option in the menu starts with the same letter(s), type
    enough additional letters to distinguish one option from the others.  (For
    example, if both "Search" and "Select" were options, you would have to type
    "Sel" to highlight "Select.")  Once the option you want is highlighted,
    press <Enter>.

When you select an option from the main menu, additional menus and displays
appear on the screen.  These displays include lists, entry boxes, insets,
forms, and confirmation boxes.  Each type of screen display is explained
below.

Lists               Lists are similar to menus, and items in the lists can be
                    selected the same way menu options are.  However, you can
                    also add to and delete items from some lists.  Lists may
                    have more than one column, and they may extend below the
                    screen display.  Press the Down-arrow key to see additional
                    items.  Pressing <Ctrl><PageDown> takes you to the bottom
                    of the list.  Pressing <Ctrl><PageUp> takes you to the top
                    of the list.

Entry boxes         Entry boxes are boxes in which you can get information,
                    such as a username or pathname.  The Delete, Backspace, and
                    arrow keys work in these boxes.

Insets              Insets display information that cannot be edited (except by
                    the network supervisor).  Regular users cannot add to or
                    delete from the information in this window.

Forms               Forms are windows that contain fields.  You can move around
                    in a form using the arrow keys or the Enter key.  (When you
                    press <Enter>, the cursor moves to the next field in the
                    form.)  You can change the information in the field by
                    highlighting the field and pressing <Enter>.

                    What you do next depends on the type of field.  Some fields
                    allow you to type in information; others display menu items
                    to select.

Confirmation boxes  Confirmation boxes are displayed whenever you exit a menu
                    utility or whenever you create or delete items (such as
                    directories or files).  You can either confirm or cancel
                    the action by selecting "Yes" or "No" and pressing <Enter>.

WORK WITH COMMAND LINE UTILITIES

Command Format

The command format displays the appropriate syntax for command line utilities.
Command line utilities are typed in at the DOS prompt.

The following are examples of the command formats for the NPRINT and the TLIST
utilities:

    NPRINT path [option...]  <Enter>

    TLIST [path [USERS | GROUPS]]  <Enter>

Conventions

The conventions for these example command formats are explained below:

NPRINT      Words that appear in all capital letters must be spelled exactly as
            shown.  Although they appear in capital letters, they can be typed
            in either upper or lower case.

path        Words that appear in lower case are variables.  They should be
            replaced with the information pertinent to your task.  In this
            case, "path" would be replaced with the path leading to and
            including the file you want to indicate, and you would replace
            "option" with any NPRINT options you want to specify.

[ ]         Square brackets indicate that the enclosed item is optional:  you
            can enter a command with or without the enclosed item.  In this
            case, "option" is optional.

....        Ellipses indicate that more than one option can be used with the
            command.  In this case, more than one NPRINT option can be entered
            in the command.

<Enter>     The angle brackets indicate that you should press the key whose
            name appears between them.

            Always press <Enter> after typing the command format for
command
            line utilities.

[[ ]]       Nested square brackets indicate that all enclosed items are
            optional.  However, if you use the item(s) within the innermost
            brackets, you must also use the item(s) within the outer brackets.

|           A vertical bar or "pipe" means "either, or."  You can use either
            the item to the left of the vertical bar or the item to the right,
            but not both.

Wildcard Characters

DOS and NetWare recognize wildcard characters (* and ?) as universal
replacements for any other character or set of characters.  Wildcards can be
used to search for groups of volumes, directories, or files, or to search for a
particular file when you are unsure of its complete name.

An asterisk (*) in a filename indicates that any character can occupy that
position and all remaining positions in the filename.  For example, to search
for all filenames with the extension .EXE in your default directory, type "NDIR
*.EXE" and press <Enter> to display the list.

In contrast, a question mark (?) in a filename indicates that any character can
occupy that position, and that position only.  So, if you were to type "NDIR
*.?", you would see a list of all files in your default directory with a
single-character extension or no extension at all.

NetWare's use of wildcard characters differs from DOS's in one respect.  For
example, to represent all files in a directory, DOS expects you to type "*.*",
whereas NetWare only needs one asterisk (*).

For more information about wildcard characters (global filename characters),
see your DOS manual.

GET HELP IN NETWARE

Use the NetWare HELP utility to view on-line information about NetWare
utilities, NetWare system messages, and NetWare concepts.  NetWare HELP allows
you to search for and retrieve information from infobases (information
databases).  To access HELP, type

    HELP  <Enter>

Press <Enter> again to bring up the main menu.  For more information on how to
use NetWare HELP, press the Tab key until you get to "How to use this
reference."  Then press <Enter>.

BOOT UP

To "boot up" your workstation means to turn on your computer, load DOS, and
then load the workstation shell.  You accomplish all of this with a boot
diskette, or you can put the necessary boot files on your workstation's hard
disk.  These boot files start up the workstation operating system, load the
NetWare shell, and gain access to the network.

Create Boot Diskettes

1.  Format a blank diskette as a boot diskette, using the DOS FORMAT command. 
    Insert a diskette into drive A and type

        Format a: /s  <Enter>

    Follow the screen prompts.

2.  Copy IPX.COM and the shell file (NETx.COM) onto the boot diskette or to the
    root directory of your workstation's hard disk.

    If your workstation uses DOS 3.x, use NET3.COM.

    If your workstation uses DOS 4.x, use NET4.COM.

3.  Copy these following additional boot files to the boot diskette or your
    hard disk, if needed.  Your network supervisor can provide you with these
    files:

    AUTOEXEC.BAT
    CONFIG.SYS
    SHELL.CFG

    See also "Boot files" in NetWare v3.11 Concepts and Appendix A in NetWare
    v3.11 Installation.

4.  Label the boot diskette.

Create an AUTOEXEC.BAT File

You can create an AUTOEXEC.BAT file that automatically loads the shell file
each time you boot the workstation.  This AUTOEXEC.BAT file can also set your
workstation to the first network drive (F), connect you (user MARIA) to a file
server (WONDER), and set your DOS prompt to show your current directory (PROMPT
$P$G).

Follow these steps to create your AUTOEXEC.BAT file:

1.  Insert your boot diskette into drive A and change to drive A.  If you plan
    to boot from your hard disk, change to your hard disk drive (C or D).

2.  If you are using DOS 4.x, type

        COPY CON AUTOEXEC.BAT  <Enter>
        IPX  <Enter>
        NET4  <Enter>
        F:  <Enter>
        LOGIN WONDER/MARIA  <Enter>
        PROMPT $P$G  <Enter>
        <Ctrl>Z  <Enter>

    If you are using DOS 3.x, replace NET4 with NET3.

LOGIN/LOGOUT

When you log in to a network, you establish a connection between your
workstation and the file server.  When you log out, you terminate that
connection.

To log in to the network, you must type in a unique password.  If there were no
password, other unauthorized users could easily get to your files and use them
for their purposes.

Log In to Your Network

To log in to your default server, type

    LOGIN servername/username  <Enter>

Replace servername with the name of the file server you want to log in to.
Replace username with your login name and (if applicable) type your password
when you are prompted for it.

Log Out of Your Network

To log out of your default server, type

    LOGOUT  <Enter>

To log out of a file server you are attached to, type

    LOGOUT servername  <Enter>

Attach to Another File Server

Attach to another file server if you want to do the following:

o   Send messages to users on that file server

o   Map a drive to that file server

o   Copy a directory to that file server

To access another file server while remaining logged in to your default file
server, type

    ATTACH servername/username  <Enter>

Replace servername with the name of the server you want to attach to.  Replace
username with the username you have been assigned to use on that file server.

Create or Change a Password

1.  To create or change a password on your default server, type

        SETPASS  <Enter>

    The following prompt appears on the screen:

    Enter your old password:

2.  If you are changing a password, enter the old password.  If you are
    creating a new password, press <Enter>.  The following prompt appears on
    your screen:

    Enter your new password:

3.  Enter the password you want.  The following prompt appears:

    Retype your new password:

4.  Enter the new password again.  The following message appears on your
    screen:

    Your password has been changed.

View Who You Are on Your Network

Type

    WHOAMI  <Enter>

Information similar to the following is displayed:

    You are user FRANK attached to server MKTG, connection 1
    Server MKTG is running NetWare v3.11.
    Login time:  Wednesday October 2, 1991  8:05 am

    You are user GUEST attached to server ACCT, connection 7
    Server ACCT is running NetWare v3.11.
    Login time: Wednesday, October 2, 1991  8:05 am


This screen display indicates that you are attached to both file servers MKTG
and ACCT.  Your username on MKTG is FRANK, and your username on ACCT is GUEST.

View File Servers on Your Network

Type

    SLIST  <Enter>

Information similar to the following appears:

    Known NetWare File Servers   Network   Node Address
    --------------------------   -------   ------------
    RECORDS                     [CED88]   [2608C234732]
    SALES                       [CED87]   [2608C217651]
    MFG                         [CED86]   [2608C293185]

View Current Users on Your File Server

You must be attached to a file server before you can view the list of users for
that file server.

Type

    USERLIST  <Enter>

Information similar to the following appears:

    User Information for Server BLOOM
    Connection  User Name     Login Time
    ----------  ---------     ------------------
    1           JOE           4-17-1991  8:05 am
    2           *CORRINE      4-17-1991 11:20 am
    3           PAULO         4-17-1991  7:58 am
    4           GUS           4-17-1991  6:01 pm

An asterisk (*) appears next to your username.

What If ...

.... I can't log in?

o   Your password may have expired or you may have run out of grace logins.

    Your supervisor or manager has to unlock your account.

o   You haven't changed to the network login drive (F).

o   The LOGIN.EXE file is missing.

o   Your shell may be outdated.  Type

        NVER  <Enter>

    Report the version number to your supervisor.

o   Your network board may not be seated correctly.

o   Your file server may be down.  Type

        SLIST  <Enter>

    If your file server is listed, log in by typing

        LOGIN servername/username  <Enter>

o   You may be restricted from logging in during certain times.  Ask the
    network supervisor.

.... My screen is frozen?

o   Your supervisor should run the MONITOR utility and clear your connection.
    This saves the work you were doing.  Then complete one of the two following
    tasks:

    o   To warm boot, press <CTRL><ALT><DEL> simultaneously.

    o   To cold boot, turn the computer OFF, wait 15 seconds, and then turn it
        ON again.

o   Your network cable may not be connected or terminated properly.  Notify
    your supervisor.

o   Your node (or station) address may be in conflict with another workstation.
    See if new workstations have been added to your network.

o   You may have the wrong IPX configuration.  Ask your supervisor.

o   You may have received a message while in graphics mode.  Disable messages
    before entering graphics mode by typing

        CASTOFF  <Enter>

CREATE YOUR LOGIN SCRIPT

Your login script is a program that automatically sets up your workstation's
environment each time you log in.  It performs tasks such as mapping network
drives for you, automatically executing programs and starting applications, and
attaching you to different file servers.

This section introduces some basic login script commands.

To access your login script, follow these steps:

1.  Type

        SYSCON  <Enter>

2.  Select "User Information" from the main menu.

3.  Select your user name from the list of users that appears.

4.  Select "Login Script."

5.  Enter the commands you need in your login script.  Some common commands are
    listed under "Common Login Script Commands" below.

6.  Exit and save the login script by pressing <Escape> and answering "Yes" in
    the confirmation box.

7.  To execute your new login script, you must first log out of the network,
    and then log in again.

Common Login Script Commands

The commands below can be used in your login script.  Each command is followed
by its purpose and an example of how to use it.

MAP INS16:=     Inserts the drive as the next available search drive.

                        MAP INS16:=pd3sys:jan

MAP drive:=     Maps the specified drive to the given directory.

                        MAP G:=pd3sys:homejan

MAP *n:=        Maps the next available drive to the given directory.

                        MAP *1:=pd3sys:homejan

#               Runs an executable file (a file with an .EXE or .COM
                extension).

                        #SYSCON

REMARK          These three commands allow you to insert explanatory text in
*               the login script.  They will not appear on your screen.
;
                        REMARK Be sure to update the PROJECTS file.

                        * Check for new mail.

                        ; Assign OS-dependent Search mappings.

ATTACH          Allows you to attach to other file servers while remaining
                logged in to your current file server.

                ATTACH pd3jan

SET             Allows you to set DOS variables.

                SET wp="/u-jlw/"

                SET usr="jwilson"

IF...THEN       Executes certain commands, if a specified condition exists.

                IF DAY_OF_WEEK="Monday" THEN WRITE "AARGH..."

What If ...

.... My login script doesn't execute all the way?

o   You may have inserted an EXIT command to a batch file in the middle of your
    login script.  Anything after the EXIT command is ignored.  Move the EXIT
    command to the end of your login script.

o   An IF...THEN clause in your login script may be incomplete or incorrect. 
    Check the proper command format in Appendix A of NetWare v3.11
    Installation.

.... I am unable to map a drive to another file server?

The file server you want to map a drive to may be down.  To check whether the
file server is up, type

        SLIST  <Enter>

.... I add some mapped drives to my login script and some I wanted are gone?

The system login script executes before the user login script.  You can
overwrite the mapped drives in the system login script with those in your user
login script.  Instead of using the command "map drive:=", use the command "map
ins 16:=" or "map *1:=". (Remember: You can have only 26 drive mappings.)

VIEW OR CREATE YOUR MAPPED DRIVES

Mapped drives point to particular locations in the directory structure.  In
NetWare, there are three type of drives: local drives, network drives, and
search drives.  Local drives are physically attached to a workstation.  Network
drives allow users to access particular locations in the directory structure.
Search drives allow users to execute program files (such as applications or
utilities) that are in a directory other than the user's current directory.
For more information, see "Drive mappings" in NetWare v3.11 Concepts.

This section tells you how to do the following:

o   View all mappings
o   Map network drives
o   Map search drives

View All Mapped Drives

Type

    MAP  <Enter>

You see information similar to the following:

    DRIVE A:  maps to a local drive
    DRIVE B:  maps to a local drive

    DRIVE F:= COUNT/SYS:  /HOME/KAREN
    DRIVE G:= COUNT/SYS:  /
    DRIVE H:= COUNT/ACCT: /ACCDATA

    -------

    SEARCH1:=Z:  [COUNT/SYS:  /PUBLIC]
    SEARCH2:=Y:  [COUNT/SYS:  /PUBLIC/WP]
    SEARCH3:=X:  [COUNT/ACCT:  /ACCREC]

Map Network Drives

Suppose you want to map a network drive to a directory in which you have files.
To see what network drive letters are available, type

    MAP  <Enter>

Choose a drive letter that is not being used, such as J.  Type

    MAP J:= path  <Enter>

Replace path with the directory path (including the file server name and the
volume name) leading to the directory to which you want to map network drive J.

For example, suppose your username is MARIA and you want to map drive J to your
home directory, which is on file server COUNT in volume SYS.  Type

    MAP J:= COUNT/SYS:HOME/MARIA  <Enter>

MAP SEARCH DRIVES

Suppose your search drives appear as follows:

    SEARCH1:=Z:  [COUNT/SYS:  /PUBLIC]
    SEARCH2:=Y:  [COUNT/SYS:  /PUBLIC/WP]

The next available search drive is SEARCH3 (S3).  To map a
search drive to directory ACCREC on volume ACCT, type

    MAP S3:=COUNT/ACCT:ACCREC  <Enter>

When you type MAP again, the new search drive appears:

    SEARCH1:=Z:  [COUNT/SYS:  /PUBLIC]
    SEARCH2:=Y:  [COUNT/SYS:  /PUBLIC/WP]
    SEARCH3:=X:  [COUNT/ACCT:  /ACCREC]

What if ...

.... I just mapped a drive and then rebooted, and now the mapped drive is gone?

Did you map the drive in your login script?  Drives mapped at the command line
are temporary----they are deleted when you log out of your file server or turn
off your workstation.  If you want the mapping to be permanent, you must enter
it in your login script.

.... The system won't accept my mapped drives?

o   You may not have rights to the directory you want to map to.  Change to
    that directory and type

        RIGHTS  <Enter>

    If your rights aren't sufficient, see your supervisor.

o   You may have used the wrong command format.


.... I just viewed my mapped drives and some of them seem to be incorrect?

Did you use the DOS CD command to change your default directory?  Changing
directories changes your mapping.

.... My search drives are in reverse order?

Search drives are numbered, but their associated drive letters begin in reverse
alphabetical order.  For example, the first search drive (Search 1 or S1)
appears as network drive Z, the second one appears as network drive Y, and so
on.  However, in your login script, they should appear in normal alphabetical
order.

SEND MESSAGES TO OTHER USERS

You can communicate with other users on your network by
sending messages from your workstation command line.

This section explains how to do the following:

o   Send a message to one or more users
o   Send a message to all workstations
o   Block/allow messages from other workstations

Send a Message to One or More Users

Suppose you want to send the following message to users CINDY and ERIC:
"Meeting at 1:30 today."  Also suppose that CINDY and ERIC are logged in to
your default server.  Type

    SEND "MEETING AT 1:30 TODAY" CINDY, ERIC  <Enter>

A confirmation message appears, telling you that the message was sent.

If CINDY is logged in to another file server called SALES, attach to that file
server and type

    SEND "MEETING AT 1:30 TODAY" SALES/CINDY  <Enter>

Send a Message to All Workstations

Suppose you want to send the following message to all workstations: "Paychecks
are here."  Type

    SEND "PAYCHECKS ARE HERE." EVERYONE  <Enter>

A confirmation message appears listing all the users to whom the message was
sent.

If you want to send a message to everyone on another file server, you must be
attached to that file server and specify the name of the file server in the
command.


Block/Allow Messages from Other Workstations

If you do not want to receive messages sent to you from any network stations,
type

    CASTOFF   <Enter>

The following message appears on your screen:

    Broadcasts from other stations will now be rejected.

To allow your workstation to again receive messages from other network users,
type

    CASTON  <Enter>

The following message appears on your screen:

    Broadcast messages from the console and other stations will now be
    accepted.

What If ...

.... I am unable to send a message to a user?

o   Is the user logged in?  Type

        USERLIST  <Enter>

o   Is your message buffer full?  You can only receive up to two messages. You
    must clear these messages from your screen (by pressing <Ctrl><Enter>)
    before you can receive others.

o   Did you type the SEND command properly?

.... I am unable to send messages to users on another file server?

o   Did you attach to that file server?
o   Is the user logged in?  Type

        USERLIST  <Enter>

o   Did you type the SEND command properly?


MANAGE FILES AND DIRECTORIES

You can manage your files and directories in a variety of ways.  You can copy,
delete, rename, view, write to, share, and print them.  NetWare uses a system
of file and directory rights and attributes to make sure that only authorized
network users can access and handle network data.

Attributes are assigned to files and directories.  They override rights, which
are assigned to users.  For example, suppose you have the right to rename files
(the Modify right).  However, the file you want to copy is flagged with the
Rename Inhibit attribute.  This prevents you from renaming it, even though you
have the right to do so.

For more information, see "Attributes" and "Rights" in NetWare v3.11 Concepts.

Know Your Rights

To view your rights in your default directory, type

    RIGHTS  <Enter>

If your effective rights include all rights, the following information appears:

    SERVER1SYS:PUBLICUTIL
    Your effective rights for this directory are [SRWCEMFA]
        You have Supervisor Rights to Directory. (S)
       *May Read from File.                      (R)
       *May Write to File.                       (W)
        May Create Subdirectories and Files.     (C)
        May Erase Directory.                     (E)
        May Modify Directory.                    (M)
        May Scan for Files.                      (F)
        May Change Access Control.               (A)

    *Has no effect in directory.

    Entries in Directory May Inherit [SRWCEMFA] rights.  You have ALL RIGHTS to
    Directory Entry.

Copy a File to Another Network Directory

Suppose you want to copy a file called ACC.DAT from your default directory (for
example, F) to the SALEPROG directory in volume SYS on the file server SALES.
First, make sure you have a drive (for example, G) mapped to SALEPROG as
follows:

    G:=SALES/SYS:SALEPROG

To copy ACC.DAT from your default directory to the SALEPROG directory, type

    NCOPY F:ACC.DAT TO G:  <Enter>

Suppose you want to copy a file called ACC.DAT from the SALEPROG directory in
volume SYS on the file server SALES to your default directory.  Also suppose
drive G is mapped to SALEPROG as G:=SALES/SYS:SALEPROG.  Type

    NCOPY G:ACC.DAT F:  <Enter>

Copy All of a Directory's Files to Another Directory

1.  Type

        FILER  <Enter>

    and select "Directory Contents" from the "Available Topics" menu.

2.  Select the directory you want to copy from the "Directory Contents" window.
    The "Subdirectory Options" window appears.

3.  Select "Copy Subdirectory's Files."  The "Copy Subdirectory To:" window
    appears.

4.  To copy subdirectory files, complete one of the following:

    o   Copy to a subdirectory in your current directory.  Type the name of the
        directory; then press <Enter>.

        You can also use <Insert> to bring up the "File Servers/Local Drives"
        window, from which you can select your directory path by selecting file
        server, volume, and directory options.

        After you select your directory path, press <Escape> to bring your
        cursor back to the "Copy subdirectory To:" window.  Then press <Enter>
        to copy your subdirectory's files.

    o   Copy to a directory on another volume on your file server.  Type in the
        name of the volume and directory; then press <Enter>.

        You can also use <Insert> to bring up the "File Servers/Local Drives"
        window, from which you can select your directory path by selecting file
        server, volume, and directory options.

    o   Copy to a directory to another file server.  You must be attached to
        the file server you want to copy files to.  Type in the name of the
        file server, volume, and directory; then press <Enter>.

Delete a File

1.  Type

        FILER  <Enter>

2.  Select "Directory Contents" from the "Available Topics" menu.

3.  Highlight the file you want to delete from the "Directory Contents" window
    and^S press <Delete>.  Answer "Yes" in the confirmation box.

    To delete more than one file, use the Mark key (<F5>) to highlight multiple
    files; then press <Delete>.  Answer "Yes" in the confirmation box.

Salvage a File You Just Deleted

1.  Type

        SALVAGE   <Enter>

2.  Select "View/Recover Deleted Files" from the "Main Menu Options"window. 
    To change to another volume, you must select the directory path from the
    "Select Current Directory" option in the main menu.

Note:   If you have too many salvageable files to fit on the screen, you will
        see the heading "Inc^Qomplete."  Scroll through the list to see the
        entire list, or use the Mark Pattern key <F6> to mark the file pattern.
        Then exit the list and reenter it.

3.  To salvage files using wildcards or to salvage a specific file, type the
    information in the "Erased File Name Pattern To Match" window.

    To view all salvageable files, press <Enter>.

4.  To salvage a file, complete one of the following:

    o   Salvage a single file.  Select the file you want to salvage. Select
        "Yes" from the "Recover This File" box.

    o   Salvage multiple files.  Use the Mark key (<F5>) to select multiple
        files.  Select "Yes" from the confirmation box.

    o   Salvage multiple files using wildcards.  To match a filename pattern or
        extension, press the Mark Pattern key (<F6>) and type the pattern you
        want to match.

        Once you match the pattern of the files you want to salvage, press
        <Enter> and select "Yes" from the "Recover ALL marked files?"
        confirmation box.

5.  Press <Escape> to exit SALVAGE.

Find a Lost File

Suppose you don't remember the location of a file.  The file is called
FUTURE.DAT.  You think it may be in the PROGRAMS directory, and drive G is
mapped to that directory.

To find the location of the lost file, type

    NDIR G: FUTURE.DAT  <Enter>

If you don't know which directory the file is in, change directories back to
the volume level.  Then type

    NDIR filename sub  <Enter>

The NDIR utility searches all those directories you have rights to on the
volume for the file.

Rename a Directory

Suppose you want to change the name of the ACCT directory to PROGRAMS.  Also
suppose drive G is mapped to ACCT in volume SYS on file server RECORDS as
follows:

    Drive G: = RECORDS/SYS:ACCT

To rename the directory, type

    RENDIR G: PROGRAMS  <Enter>

Note:   You must be attached to a file server before you can change the name of
        a directory on that file server.

        You must also have the Modify right in the directory to rename
        subdirectories in that directory.

        Drive mappings in login scripts (if they exist) must be changed to
        reflect the new name of the directory.

What If ...

.... I can't copy?

o   You may not have sufficient rights.  Type

        RIGHTS  <Enter>

    You must have the Create right to copy files into a directory.

o   The file may be flagged "non-shareable" and may be in use. Type

        FLAG filename  <Enter>

    If it is flagged "non-shareable," try again at a later time, when the file
    is not in use.


.... I can't see a directory?

o   You may not have enough rights to that directory.  Type

        RIGHTS  <Enter>

o   The directory attribute may be set to "Hidden" or "System." Type

        FLAG filename  <Enter>

o   The directory may have set disk space limitations.  To view the directory
    restrictions, type

        DSPACE  <Enter>

o   The directory may have been deleted.  Ask your supervisor.

PRINTING

Printing from a network workstation is similar to printing from a stand alone
workstation.  When you send a print job to a network printer, however, the job
is routed first through the file server and then delivered to the printer by
the print server.

When a print job leaves the workstation, it is stored temporarily in a print
queue on the file server.  This queue, which is a subdirectory on the file
server, stores the print job until the print server can deliver it to the
printer.  When the printer is ready to service the job, the print server moves
it from the queue to the printer.

Permanently Set Up Workstation Printing

If you want to print from a non-NetWare-compatible application or from the
screen, you need to route print files from your local printer port (LPT1) to a
file server queue.

1.  Enter the SYSCON utility.

2.  Select "User Information" from SYSCON's main menu.

3.  Select your username.

4.  Select "Login Script."

5.  Insert the following command into the login script:

        #CAPTURE Q=queuename TI=5

6.  Exit SYSCON, saving changes when prompted.

7.  Log back in to or reboot your workstation to allow the CAPTURE command to
    take effect.

Print Screens Using CAPTURE

Before you start printing screens using CAPTURE, you need to set the CAPTURE
parameters in your login script.  See "Permanently Set Up Workstation Printing"
on the previous page. Also, your supervisor needs to set up a default queue.

1.  At the command line, type

        CAPTURE  <Enter>

    You can include any of the CAPTURE options except Show.  Some of the most
    common CAPTURE options are the following:

    L=n
        Indicates which of your workstation's LPT ports (local parallel
        printing ports) to capture.  Replace "n" with 1, 2, or 3.  Default:

  ^S^Q      L=LPT1

    Q=queuename
        Indicates the queue the print job should be sent to.  If multiple
        queues are mapped to a printer, you must include this option.  Replace
        "queuename" with the name of the queue.

    TI=n
        Indicates the number of seconds between the last time the application
        writes to the file and the time it releases the file to the queue. 
        Include this option if you want to print from an application without
        exiting the application.  Replace "n" with a number of seconds
        (1-1000).  Default: TI=O  (Timeout disabled)

2.  Access the application containing the screen you want to print.

3.  Press <Shift><Print Screen>.

4.  If you want to print more screens, repeat steps 2 and 3.

5.  When you have selected the screens you want printed, return to the DOS
    prompt and type

        ENDCAP  <Enter>

    ENDCAP sends your print job to the default print queue of your default file
    server, and then the job is printed. ENDCAP also ends the capture of your
    LPT port.

Note:   Your workstation might hang if you press the <Shift><Print Screen> keys
        when none of your LPT ports are captured and no local printers are
        attached to your workstation.  To prevent this, ask your supervisor to
        include the following line in the SHELL.DFG file on your workstation
        boot disk.

        LOCAL PRINTERS = 0

List the Jobs in a Queue

A queue is a special directory where print files are stored while waiting for
printer services.  To see which jobs are waiting in a queue to be printed,
complete the following steps:

1.  Type

        PCONSOLE  <Enter>

2.  Select your file server (if other than your current file server).

3.  Select "Print Queue Information" from the "Available Options" menu.

4.  Select the print queue whose print job you want to view.  If you don't know
    the name of the print queue, ask your supervisor.

5.  Select "Current Print Job Entries" from the "Print Queue Information" list.
    The print job entries are displayed.

Delete Your Print Job from a Queue

You can cancel your print job by deleting it from the print queue (even after
the job has started printing).  You can delete a print job only if you are the
owner of the job or if you are the print queue operator.

To delete your print job, complete the following steps:

1.  Type

        PCONSOLE  <Enter>

2.  Select "Print Queue Information" from the "Available Options" menu.

3.  Select the print queue whose entries you want to view.  The "Print Queue
    Information" list is displayed.

4.  Select "Current Print Job Entries."

5.  Highlight the print job entry and press <Delete>.

6.  Select "Yes" at the confirmation box.

What If...

.... I send commands to print a screen, but it doesn't print?

Did you include the CAPTURE command in your login script?  See a previous
section called "Permanently Set Up Workstation Printing."

.... The application I'm using says that the print job was sent, but it doesn't
print out?

o   Did you use CAPTURE to redirect output to a print queue first?

o   Are the LPT ports captured?  Type

        CAPTURE SH  <Enter>

o   Check PCONSOLE and find the appropriate queue.  If the queue has a long
    list of jobs and none are marked "active," see your print server operator.
    If your job isn't in the queue, the application is not set up properly;
    check with the applications expert.

COMMON ERROR MESSAGES

Error messages point to a software or hardware error that doesn't allow further
processing.  An explanation of the nature of the message and a recommended
course of action follow each message listed below.

"Access denied"

Explanation 1

This message indicates one of the following:

o   You entered your username, your password, or both incorrectly.
o   You tried to log in to a file server on which you are not defined as a
    user.

Action 1

Try to log in again and make sure you type the username and password correctly.
Make sure you are logging in to a file server on which you are defined as a
user or as a member of a group.  You can log in to most file servers as GUEST
because user GUEST seldom requires a password.

Explanation 2

You tried to copy, delete, rename, or modify the file attributes of a file for
which you lack rights.

Action 2

Find out about your rights to this file by typing

    RIGHTS filename  <Enter>

or by asking your supervisor.



"A File Server could not be found"

Explanation

The shell tried to build a connection with the network, but no file server
responded to the request in the given time limit.

Action

Check the cable connection and make sure at least one active file server exists
on the network.  Also ask your supervisor to make sure the IPX file and the
network board have the same configuration.


"Message NOT sent to <servername>/<username> (station number)"

Explanation

If a number of messages have been sent to the user or group and have not been
cleared, either of the following may be true:

o   The workstation's buffer for incoming messages may be full.

o   The message was not sent to the user or group because the user or group
    used the CASTOFF utility.

Action

Send the message later, or try another method of communication.


"Network Error <cause> during <operation>.  File = <drive>:<filename> Abort,
Retry or Fail?" (or "Abort, Retry?")

Explanation 1

The shell called a function call or a DOS interrupt, but the specified
operation could not be performed.  The <drive>:<filename> specify the drive and
filename on which the error condition occurred.

Action 1

Press the R key to retry the operation and, if necessary, repeat this several
times.  If the problem persists, ask your supervisor or look up the specific
message in NetWare v3.11 System Messages.

Explanation 2

Your file server may be down.

Action 2

Press the A key to abort the operation, and then try to connect to the file
server again.  If this attempt fails, contact your supervisor.

"Password has expired"

Explanation

This message indicates your password has expired.

The network supervisor can require users to periodically change their passwords
on the file server to protect the file server from access by unauthorized
persons.  The network supervisor can also assign a number of grace logins
during which users can still use their old passwords (after they have expired)
before having to create new passwords.

Action

Use the SETPASS command to change your password.  If you use the old password
during your remaining grace logins, be sure to change it before you run out of
grace logins, or else your network supervisor has to change it for you.

"Password has expired and grace period has also expired."

Explanation

This message indicates that your user account is locked because your password
has expired and you have used all your grace logins.

After your password expires, you may have a number of grace logins during which
you can still use your old password.  If you do not change your password before
your grace logins are used, you are denied access.

Action

Since you have run out of grace logins, you cannot access your account until
your network supervisor or manager assigns you a new password.

"Server <servername> not found"

Explanation

This message indicates that you tried to attach to the file server
<servername>, but the file server did not respond for one of the following
reasons:

o   You mistyped the name of the file server.
o   You specified a file server not cabled to your network.
o   You specified a file server that is down for system maintenance.

Action

o   Type the file server name correctly.

o   Use the SLIST command to list all the available file servers.

o   If the file server is down for maintenance, try the command later when the
    file server has been brought back up.

If you still have problems, ask your network supervisor for help.

"Unable to attach to server <servername>"

Explanation

This message indicates one of the following:

o   You mistyped the name of the file server.
o   You specified a file server not cabled to your network.
o   You specified a file server that is down for system maintenance.

Action

o   Type the file server name correctly.

o   Use the SLIST command to list all available file servers.

o   If the file server is down for maintenance, try the command later when the
    file server has been brought back up.

If you still have problems, ask your network supervisor for help.

"User <fileserver>/<username> not found"

Explanation

This message indicates that you either specified a user who does not exist on
<fileserver> or mistyped the user's name.

Action

o   Make sure you have typed the user's name correctly.

o   If you are not certain which users are established on the file server, use
    the SYSCON utility to view the list of network users.

o   You can also use the USERLIST command to view a list of currently attached
    users.

(----------------------------------------------------------------------------)

One of the most useful tools that any Novell Network user can have is access to
Netwire on Compuserve.  Netwire is a forum that contains messages, files, and
access to Novell product information firsthand.  You can submit questions to
Novell technicians and hundreds of other Novell users.  A must for any Netware
user.

Another handy tool for those that do have access is the SALVAGE program.
SALVAGE will let you undelete files throughout the system unless the directory
is marked to be purged.  PURGE is nice too because it will allow you to
completely erase any files you created or copied.  To use purge and or salvage
make sure you are mapped to the public directory and execute them from any DOS
prompt.

(----------------------------------------------------------------------------)

As far as dialing up a Novell Network the means are unlimited.  Some have very
tight security systems that only let users with certain hardware dial-in and
others limit the usernames that are allowed dial-in access.
______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                Volume Three, Issue Thirty-five, File 9 of 13

                //////////    //////////////////////////////////////
               //  C   //    //                                  //
              //  r   //    //  A U T O - A N S W E R   I T !   //
             //  e   //    //                                  //
            //  a   //    //////////////////////////////////////
           //  t   //
          //  e   ////////////////////////////////////////////
         //  d     B y :     T w i s t e d   P a i r       //
        ////////////////////////////////////////////////////

     Many times I've wanted to be able to start and/or listen to devices at my
home when I'm somewhere else.  I've developed the following circuits to do this
for me.  The circuits have all kinds of uses.  I'll let your mind ponder the
endless fun activities you can have.  Some of the things I have used them for
are monitoring my own house, tape record my friends for fun without their
knowledge, or listen to a radio station when you're out of town, etc.

                 /////   Automatically Answer a Phone   /////

     This has got to be the best way to automatically answer the phone.  With
just 2 parts, we can couple an audio source into a phone line.  The cost will
be less than $5 no matter where you get the parts!


                       .  .                  Radio Shack
                    .        . / ECG 6412     273-1374 Transformer
Red                __        __  Diac             /
(+)  O-------------I        /I------------) || (---------O  <-
Tip                .       / .            ) || (
                    ._\____/_.             ) || (             Audio Source
                       .  .                ) || (              feeding IN
Green                                      ) || (             to transformer
(-)  O-------------------------------------) || (---------O   <-
Ring

     The "Diac" or "Bilateral Trigger Diode" looks like an open circuit until a
voltage of either polarity is applied that is above its threshold of 63 Volts.
(plus or minus 7 Volts) When this voltage is exceeded, like when the line
rings, the device acts as a switch and goes into conduction.  This "answers"
the phone and holds the line through the transformer, which couples the audio
to the line.

     When the caller hangs up, most telephone companies provide a momentary
reversal of Tip and Ring which causes the Diac to stop conducting and release
the line.

             /////   Another Way to Automatically Answer   /////

     For those who want to really play with this circuit, I suggest the
following additions.  I have added a bridge rectifier and an optical coupler to
the circuit. The bridge just makes sure that the LED inside the optical coupler
gets the proper polarity.  If you are careful to observe polarity when
connecting to Ma Bell, you can leave out the diodes and save a little money.

                                    .   .
                                  .       .                   Radio Shack
     |----------|-----------------__     __---------------|    273-1374
     |          |               .I      /I.              |   Transformer
    ---        ---               ._\____/_.               |--) || (-----O
     /         /                  .  .                     ) || (
    ---        ---                ECG 6412                   ) || (   Audio
 O---|          |                   Diac                     ) || (   Source
Tip  |     O----| 1N4003 Diodes                              ) || (
(+)  |  Ring    |    ( 4 )                                |--) || (-----O
    ---  (-)   ---              ECG 3045  Optical Coupler |
     /         /             ______________    /        |
    ---        ---            |              |            |
     |          |           2 |     | |     | 1          |
     -------------------------------| |------------------|
                              |     |/ |     |
                              |              |
                              |            |
                              |       v v    |
                              |   ________   |
                              |    /        |
                              |   V         |
                              |___|______|___|
                                  |      |
                                4          5

     Pins 4 and 5 on the optical coupler can be wired to remotely start a
device upon answering the line.  An example would be a tape machine or battery-
powered bugging amplifier.  Be careful not to connect anything over 25 volts to
pins 4 and 5 to avoid frying the opto-coupler.  Either circuit will accommodate
an extra LED that could be used as a status indicator.  Just be sure to keep
the polarity proper and put it in series with the other components.

     The Audio Source can be almost ANYTHING.  If you want to hook up a
microphone as the Audio Source, connect the microphone to some kind of
amplifier first, then to the transformer.

           /////   An Interesting Catalog to Read Through   /////

     If you really want to get fancy, you could consider ordering a free
catalog from Monroe Electronics.  They sell the following products you might
wish to play with.  Use these as building blocks to make whatever you need...

   DTMF Decoders  (a) Which provide a momentary or latching relay
   -------------      output for the duration of time the DTMF digit
                      is being pressed.  (If you're really obnoxious,
                      you'd use one of these with one of the above
                      circuits.  Then you could call and randomly turn
                      things on and off like maybe a TV scrambler/
                      jammer.)

                  (b) Which can accept multiple digits and be programmed
                      for a momentary or latching relay output.  (Use one
                      of these to make a DTMF combination lock for your
                      BBS.  Or use as a call screener, i.e. only the
                      correct DTMF sequence could make your phone actually
                      ring)

                  (c) Which can control access by a 4 digit code to latch
                      a relay, then a single digit to unlatch it.  (A
                      little bit more sophisticated than (b) above.

    DTMF Encoders     Which can convert BCD to DTMF tones. Crystal-
    -------------     controlled, of course. 600-ohm audio output.
                      (Use one of these to convert your computer's 
                      output into ANY DTMF tones of your choosing.  You'd
                      be able to choose the duration as well!  Then this
                      circuit would couple your evil DTMF into the phone
                      line)

    Audio Detectors   Detect BUSY and DIAL TONE and operate a relay.
    ---------------   (Useful when making scanning hardware/software
                      applications)  

    Audio Generators  Generate Ring Tone, Dial Tone, Busy Tone, Tone
    ----------------  Burst, etc.  (Start your own phone company.  Fool
                      your friends, trip out the operator)


     Dial-up DTMF remote control systems which can be used to control and
     monitor remote relays and status inputs at unattended sites.
     They can also provide automatic dialing of stored phone numbers to
     report status of inputs, and can make use of an internal timer to
     execute control commands.  (Water strange plants by call-in remote
     control, check moisture levels, see if a certain mailbox is empty
     or full, have the mailbox CALL you when something is delivered,
     etc.  Do I have to tell you everything?  Just get the catalog!)


Their address is:
                    MONROE ELECTRONICS, INC.
                    100 HOUSEL AVENUE
                    LYNDONVILLE  NY  14098
                    (716) 765-2254

////////////////////////- T W I S T E D  P A I R-//////////////////////////
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                 Volume Three, Issue Thirty-five, File 10 of 13

              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN            Issue XXXV / Part One            PWN
              PWN                                             PWN
              PWN            Compiled by Dispater             PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN

Welcome to another edition of Phrack World News.  Read this issue very
carefully because it is full of very important stories about a multitude of
different issues.  Special thanks goes to Dark OverLord, Stainless Steel
Provider, and Private Citizen for their help in preparing this issue.
_______________________________________________________________________________

XMASCON 1991
~~~~~~~~~~~
NIA Magazine & Phrack Inc. present:

                           The Second Annual

                             X M A S C O N


Who:  All Hackers, Journalists, Security Personnel, Federal Agents, Lawyers,
      Authors and Other Interested Parties.

Where:                 Houston Airport Hilton Inn
                          500 North Belt East
                         Houston, Texas  77060
                                 U.S.A.
                          Tel: (713) 931-0101
                          Fax: (713) 931-3523

When:      Friday December 27 through Sunday December 29, 1991


Yes, ladies and gentlemen, you read it right... Xmascon has returned! This will
undoubtedly be the telecom event of the year. Unlike certain conferences in the
past, Xmascon 91 has a devoted and dedicated staff who are putting in an
unmentionable amount of time to ensure a large, vast and organized collection
of some of the most diversified people in the telecommunications world. The
event will be open to the public so that anyone may attend and learn more about
the different aspects of computer security.


                           Hotel Information
                           -----------------

The Houston Airport Hilton Inn is located about 6 miles from Intercontinental
Airport. The Xmascon group room rates are $49.00 plus tax (15%) per night, your
choice of either single or double. There are also 7 suites available, the
prices of which vary from $140 to $250. You can call the hotel to find out the
differences and availability of the suites, and you will also NEED to tell them
you are with the Xmascon Conference to receive the reduced room rate,
otherwise, you will be paying $69.00. There is no charge for children,
regardless of age, when they occupy the same room as their parents.  Specially
designed rooms for the handicapped are available. The hotel provides free
transportation to and from the airport, as well as neighboring Greenspoint
Mall, every 30 minutes on the hour, and on call, if needed. There are 2
restaurants in the hotel. The Wicker Works is open until 11:00 pm, and The
Forty Love is open 24 Hours. There will also be breakfast, lunch and dinner
buffets each day. There is a piano bar, The Cycle Club, as well as a sports
bar, Chaps, which features numerous table games, large screen TV, and a disco
with a DJ.  Within the hotel compound, there are 3 pools, 2 of which are
indoors, a jacuzzi, a miniature golf course, and a fully equipped health club
which features universal weights, a whirlpool and sauna.  A car rental agency
is located in the hotel lobby, and you can arrange to pick your car up at
either the airport or the hotel. Xmascon attendees are entitled to a discounted
rate. Contact the hotel for more information.

Xmascon will last 3 days, with the main conference being held on Saturday,
December 28, in the Osage meeting room, starting at 12:00 p.m. and continuing
on throughout the evening. This year, we have our own complete wing of the
hotel, which is housed around a 3,000 square foot atrium ballroom. The wing
is completely separated from the rest of the hotel, so we are strongly
encouraging people to make their reservations as far in advance as possible
to ensure themselves a room within our area.

We are hoping to have a number of people speak on a varied assortment of
topics. If you would like to speak, please contact us as soon as possible and
let us know who you are, who you represent (if anyone), the topic you wish to
speak on, a rough estimate of how long you will need, and whether or not you
will be needing any audio-visual aids.

There will be a display case inside the meeting room which will hold items of
telecom interest. Specific items that will be available, or that we hope to
have, include the first issues of 2600, Tap, Mondo 2000, and other magazines,
non-computer related magazines that feature articles of interest, a wide array
of boxes, the Quaker Oats 2600 mhz whistle, The Metal AE, etc. We will also
have a VCR and monitor set up, so if you have any interesting videos (such as
the Unsolved Mysteries show featuring Kevin Poulsen), or if you have anything
you think people would enjoy having the chance to see, please let us know ahead
of time, and tell us if you will need any help getting it to the conference.
If all else fails, just bring it to the con and give it to us when you arrive.

If anyone requires any additional information, needs to ask any questions,
wants to RSVP, or would like to be added to the mailing list to receive the
Xmascon updates, you may write to either myself (Drunkfux), Judge Dredd, or
Lord Macduff via Internet at:

                          [email protected]

Or via US Mail at:

                         Hard Data Corporation
                               ATTN: HoHo
                             P.O. Box 60695
                         Airport Mail Facility
                      Houston, Texas  77205-9998
                                 U.S.A.

We will hopefully have an 800 mailbox before the next update is sent out.  If
someone cares to donate a decent one, that will stay up throughout the end of
the year, please let us know. We should also be listing a few systems as an
alternative form of reaching us.

Xmascon 91 will be a priceless learning experience for professionals, and gives
journalists a chance to gather information and ideas direct from the source. It
is also one of the very few times when all the members of the computer
underground can come together for a realistic purpose. We urge people not to
miss out on an event of this caliber, which doesn't happen very often. If
you've ever wanted to meet some of the most famous people from the hacking
community, this may be your one and only chance. Don't wait to read about it in
all the magazines, and then wish you had attended, make your plans to be there
now! Be a part of our largest and greatest conference ever.

Remember, to make your reservations, call (713) 931-0101 and tell them you're
with Xmascon.

In closing...  if you miss this one, you're only cheating yourself.
_______________________________________________________________________________

MindRape Revisited                                           September 27,1991
~~~~~~~~~~~~~~~~~
>From Arizona State University State Press
Further Reading:  Phrack Issue 34, File 11, "MindRape or MediaRape?"

     An Arizona State University (ASU) student is one of seven suspects in a
computer fraud scheme that one US West Communications official said could cost
the carrier and the phone company as much as $5 billion in one year.

     Police in Phoenix, Arizona have seized computer equipment, software, and a
list of long distance calling card codes from the home of the unidentified
19-year-old student.

     The student is one of seven people -- three in Oregon and one each in
Washington, Utah, and Iowa -- singled out as suspects in a month-long
investigation of electronic phone fraud conducted by Phoenix police, said Jim
Waltman, a fraud manager for US West Communications.  The Phoenix man has not
been arrested.

    The computer "hackers" allegedly used their computers to gain access to
secret long distance phone access codes such as the ones found on calling
cards, and sold codes to other students for profit.

    US West officials told the Associated Press that it is unknown how many
local customers have been wrongfully billed for long distance calls on their
accounts.

    Kevin Robinson, public information sergeant for the Phoenix Police
Department, would not comment on the investigation.

    Art Carter, dean of Student Life at Arizona State University (ASU), said
that if the student is charged, the case will be reviewed under the ASU Code of
Conduct and the action taken by the University will be determined at that time.

    Mark Knighton, security director for LDL Long Distance, said his company
and US West were able to trace calls to several location, including the home of
the Phoenix man.

    The Phoenix man has not been arrested, authorities said.

    Waltman said he was with Phoenix police a week ago when they searched the
north Phoenix home and uncovered what turned out to be an inexpensive and
relatively simple system for getting free codes.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Editor's Comment by: Dispater

     What MindRape has been charged with cannot be determined now.  A request
must be submitted to Arizona Public Records and be considered for release to
the requestor.

Here are some possibly useful numbers:

Arizona Special Investigations Division (602)542-4853
County Attorney's Office                (602)262-3411      (Gail Thackeray)
Arizona Republic Newspaper              (602)271-8000
Phoenix Police Department
- General Investigations                (602)262-6141
- Police Information                    (602)262-7626
- Police Records                        (602)262-6134
_______________________________________________________________________________

East Coast LOD Hackers Create Virtual Reality MAELSTROM
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         "It's reached the point where hacking is counter-productive."

If the 1980's were the decade that hackers emerged from their relative
obscurity as computer oddities, to be transformed in the public's perception as
front-page news -- then the 90's are shaping up to be the decade of hacker
turned entrepreneur.  Lately the notorious hacker group Legion of Doom seems to
be a particularly fertile spawning ground for ex-hackers turned
young-businessman.

Two former East-Coast Legion of Doom members, Bruce Fanscher <Dead Lord> and
Patrick Krupa <Lord Digital>, have pooled their talents to form a new company
in the burgeoning field of Virtual Reality.

The arena of Virtual Reality has often been called technology in search of a
purpose and at times resembles nothing more than an interactive movie meets
videogame.  This chaotic state of affairs has led to a never-never land of
incompatible technologies and far-out ideas, that have tremendous potential,
but little commercial application at present.  Fanscher and Krupa plan to
change all that.  "VR isn't anything new, it's something we've been living for
over half our lives.  The only difference is the state of current technology,
makes possible an incredible variety of application." said Krupa in an
interview.  "Right now we're in the ideal position to move forward on ideas
we've been working on for years," added Fanscher.

Krupa, who had attained the status of cult figure in the hacker underground
prior to his arrest, as chronicled by John Markoff (New York Times) technology
columnist, has spent the last several years working in the very lo-tech world
of theater, "Basically I was totally burnt out on computers.  I mean I don't
give a damn if my word processor boots in one second instead of eight, and
that's the only place anything was heading for a long time.  The NeXT has
changed all that and brought to market something truly innovative, although I
still don't care too much about technology as anything but a medium through
which you can reach people and affect their experiences and perceptions."

No stranger to creative innovation himself, Fanscher, Krupa's longtime
compatriot, has spent his share of time in the somewhat murky spotlight of the
hacker underground.  Musing about his days as a hacker delving into computer
systems to see how they worked, Fanscher remarked that:

     "It's reached the point where hacking is counter-productive.  You can
     only take apart things other people have designed and see what makes
     them work, for so long, before it becomes an exercise in boredom and
     the time comes to use what you've learned to create something new
     that nobody has ever seen before.  My current interest in other
     people's systems is zero.  It was a useful learning experience for me,
     but there's no future in it."

This oddly charismatic, dynamic duo is rounded out by Delia Kopold a former
actress and theater major who is the architect of the worlds that make
MAELSTROM come alive.  This initial offering by the collection of talents will
be an online system run on the NeXTcube supermicro -- a machine that looks more
like a piece of modern art than a computer -- that offers enhanced versions of
all the usual amenities like electronic messaging, file transfers, and
networking, all revolving around MAELSTROM, a program Fanscher calls, "a
real-time virtual interaction simulation engine."  MAELSTROM will initially
take the form of an extremely detailed fantasy world complete with custom
graphic programs that run on MS-DOS, Macintosh and Amiga computers, allowing
users to tap into the NeXTcube's system architecture through their home
computers connected to telephone lines.  "Maelstrom isn't really a fantasy
game, it's actually a universal engine comprised of objects that can be
accessed by a variety of graphic, sound and data files to create just about any
multi-user reality you can dream up," explains Krupa.

The MAELSTROM system is about to go through a short beta-test run in New York
City prior to a national ad campaign that will herald its universal
accessibility on packet switch.  "Our beta system already offers everything
that competing services offer, but at a much lower cost -- and we're still
adding features.  And nothing like Maelstrom has ever existed before, the
technology just wasn't there," concludes Fanscher.
_______________________________________________________________________________

2600 Magazine Exposes Security Holes                           October 18,1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by John F. McMullen & Barbara E. McMullen (Newbytes)

Armonk, New York -- Supported by videotape examples, Emmanuel Goldstein, editor
and publisher of 2600 Magazine: The Hacker Quarterly, told those in attendance
at an October 17th New York City press conference that "the American public is
often lulled into a false sense of security; a security that is often not
supported by the facts of specific cases."

The videotapes, produced by 2600 and provided to the press show both the
intrusion of a Dutch "hacker" in to United States Military computers and what
Goldstein alleges is the fallibility of a brand of mechanical, pushbutton locks
used by, among others, New York State University sites, Federal Express, United
Parcel Service, JFK International Airport, IBM and NASA.

Goldstein told Newsbytes "We invested considerable time and money to wake
people up to the fact that we have a false sense of security when it comes not
only to computer networks but to physical safety as well."

The tape of the Dutch "hacker" was made by Goldstein while in Europe. and shows
the intrusion into a Unites States Army computer system.  The intruder was able
to set up a fictitious account called "danquayle" and, once into the system,
was able to obtain "root" privileges thus giving him total control of the
workings of the system.

A portion of this tape had previously been shown with Goldstein's approval on
an episode of the Geraldo Rivera television show "Now It Can Be Told".
Goldstein told Newsbytes that one^S^Q reason for his release of the entire tape to
the press was his feeling that the Rivera episode entitled "The Mad Hacker's
Key Party" had distorted the message of the tape -- "This was not a case of a
terrorist break-in but was rather simply a demonstration of the lack of
security of our systems.  To find root accounts with password like "Kuwait" and
lack of sophisticated security in our military computers should be of real
concern and should not be lost in an exploitation of the 'hacker' issue."

A background paper provided at the conference by 2600 explains the entire
intrusion effort in detail and states "The purpose of this demonstration is to
show just how easy it really was.  Great care was taken to ensure that no
damage or alteration of data occurred on this particular system.  No military
secrets were taken and no files were saved to a disk by the hackers.  What is
frightening is that nobody knows who else has access to this information or
what their motivations might be.  This is a warning that cannot be taken
lightly."

The second videotape show Goldstein and other 2600 staff opening seemingly at
will locks manufactured by Simplex Security Systems.  The locks of the
mechanical pushbutton combination variety were shown to be installed at the
State of New York University at Stony Brook, JFK International Airport and on
Federal Express and United Parcel pick-up boxes throughout the New York
Metropolitan area.

In the film, Goldstein is shown filling out a Federal Express envelope for
delivery to 2600 Magazine and inserting in the Fedex dropbox.  He then lifts
the weather protection cover on the box's lock and keys a combination that
allows him to open the lock and remove his envelope.  Scott Skinner, a SUNY
student and 2600 staff member told Newsbytes that it had actually taken the
staff 10 minutes to determine the proper code combinations to open the lock.

Skinner explained, "While Simplex prefers people to think that there is an
endless number of permutations to the lock, there are actually only 1,085.  In
most cases, even this number is greatly reduced -- if one knows that only three
buttons are being used, it reduces the possibilities to 135.  Additionally, we
found that, once we had the combination to one Federal Express dropbox, it
worked in every other one that we tried in the New York area."

Goldstein told Newsbytes "When we contacted Simplex, they first denied that the
locks were unsafe and then said that the permutations were much greater.  After
some discussion, they admitted that the 1,085 figure was correct but said that
it would take a person with a complete listing of the combinations over four
hours to try them all. Our experience obviously shows that they may be opened
in a much shorter time than that."

Goldstein also pointed out that, "although a $5 Master combination lock may be
broken by a crowbar, it is a much more secure combination device.  It has
64,000 combinations compared to the 1,085 with the Simplex."

Goldstein continued, "One of the real problems is that, should a person have
the misfortune to be robbed, entry due to a failure of the Simplex lock gives
no evidence of a forcible break-in and police and insurance companies often put
the blame on the homeowner or office manager for 'giving away the combination.'
It really can create a problem."

Skinner told Newsbytes "I'm really concerned about t^Shis.  I'm a student at
SUNY, Stony Brook and all our dormitories use these locks as the only means of
security.  I've shown the problem to Scott Law who is responsible for residence
security but he has discounted the problem and said that the locks were
installed at the recommendation of the campus locksmith.  The locksmith, Garry
Lenox contradicts Law and says that he recommended against these locks years
ago and said that they were not secure for dormitory use."  Skinner said that
he will write an article for the college newspaper in an attempt to raise
consciousness about this problem.

Goldstein also said that he intends to publish the list of valid combinations
in an up-coming iss^Que of 2600 to demonstrate to the public the problems with
the lock.  He further said that he will raise the issue on his weekly radio
show, "Off The Hook", heard on New York's WBAI-FM.

In response to a Newsbytes question concerning how the 2600 staff happened to
become involved in a problem with locks, Goldstein said, "We're hackers and
when we see something with buttons on it, whether it's a computer or not, we
tend to try it.  While the average person tends to accept that things are
secure just because he is told that they are, hackers will usually try them
out.  It's because of this 'trying out' that we can point out the problems with
both the US military computer security and this lock -- and we feel that, in
both cases, we have performed a service. People should be aware when they are
at risk so that they may take action to correct it."
_______________________________________________________________________________
 
Questions Exist On Israeli Break-In Of US Systems            September 10,1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Barbara E. McMullen & John F. McMullen (Newsbytes)

NEW YORK -- Amidst reports of the intrusion by an Israeli national into United
States military computer systems, there have been conflicting accounts of the
extent and nature of the invasion.

According to wire services, Deri Schriebman, an 18 year-old graduate of
Israel's Technion Institute and a native of the northern Israeli city of
Carmiel, was arrested by Israeli police for allegedly breaking into US military
computers and commercial credit card systems.  Israeli spokes person Eitan Raz,
commenting on the equipment found at Schriebman's home for allegedly making
free overseas phone calls, was quoted as saying "This was a very complex
system. It was the first time such technology was discovered in Israel."

Newsbytes has ben able to confirm with sources that a trail of credit card
fraud in the United States and Canada led investigators to Schriebman but has
not been able to confirm that Schriebman, as reported in Israeli press, was
able to access classified Pentagon information concerning Patriot missiles
during the recent Gulf War.  A US government investigative official told
Newsbytes that, while his agency has formally requested documentation of the
events from the Israeli police, that there seems to have been no contact to
date between any US service and the Israeli investigators.

Other investigative sources have told Newsbytes that the investigation into
Schriebman's activities began in May 1991 when two Quebec teenagers were
arrested for purchasing goods through the use of stolen credit card
identification.  The teenagers told Canadian authorities that they had received
the information from a source in Carmiel, Israel and the authorities notified
Israeli police.  According to the Israeli reports, Schriebman admitted the
intrusion into credit card files and the subsequent dissemination of codes but
denied making any use of the information. He was quoted as saying that his
cracking into the systems was done only out of curiosity.

A "hacker" source told Newsbytes that underground bulletin boards utilized for
the exchange of such credit information are often frequented by foreign
nationals. He said that the most frequent visitors come from Australia, Israel
and Germany and that many of the Israelis identify themselves as have a
connection with the Technion Institute.
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                 Volume Three, Issue Thirty-five, File 11 of 13

              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN            Issue XXXV / Part Two            PWN
              PWN                                             PWN
              PWN            Compiled by Dispater             PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN

Justice Revs Up Battle On Computer Crime                        October 7, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Michael Alexander (ComputerWorld)(Page 4)

Washington D.C. -- The nation's top federal computer crime law enforcers
announced plans to escalate the war on computer crime.

At the federal government's 14th National Computer Security Conference held in
Washington D.C., officials at the U.S. Department of Justice said the
department is launching a computer crime unit that will be charged with
prosecuting crimes and pushing for stiffer penalties for convicted computer
outlaws.

"Computer crime is on the rise, and the Justice Department is taking this area
very seriously -- as well as the FBI, U.S. Secret Service, and the military,"
said Mary Spearing, chief of general litigation and legal advice in the
criminal division at the Justice Department.

The new crime unit will also advocate closing loopholes in the government's
computer crime statute.  The Computer Fraud & Abuse Act of 1986 "is outmoded
and outdated," said Scott Charney, a computer crime prosecutor and chief of the
new computer crime unit.

The Justice Department wants to amend the law with a provision that would make
inserting a virus or worm into a computer system a crime, Charney said.

Those convicted of computer crimes will more often be sentenced according to
federal guidelines rather than on recommendation of prosecutors, who may ask
for lighter penalties, said Mark Rasch, the government's attorney who
prosecuted Robert Morris in the infamous Internet worm case.

A new Justice Department policy now mandates that all defendants will be
treated equally, without regard for personal history or other factors that
might mitigate stiffer sentences, Rasch said.

"The penalties for computer crime will become increasingly more severe,"
predicted Kent Alexander, assistant U.S. attorney in Atlanta <prosecutor of the
Atlanta members of the Legion of Doom>.  "In five years, they are going to look
back and think a year in jail was a light sentence."

The FBI is "staffing up to address concerns about computer crimes" and
increasing its training efforts, said Mike Gibbons, FBI supervisory special
agent <who worked on both the Morris and the Clifford Stoll KGB hackers
cases>.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Supreme Court Refuses Morris Appeal                            October 14, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Michael Alexander (ComputerWorld)(Page 14)

Washington, D.C. -- The U.S. Supreme Court refused without comment to hear
Robert T. Morris' appeal last week, ending a legal journey that began nearly
three years ago when he injected a worm into the Internet network.

While the trek is over for Morris, there remain serious questions about the
Computer Fraud and Abuse Act of 1986, the statute under which he was
prosecuted.

The refusal to review the Morris case leave intact a "bone breaker" law that
could transform otherwise law-abiding computer users in felons and inhibit the
creative uses of computer technology according to Thomas Viles, an attorney at
the Silverglate & Good law firm in Boston.  Viles authored a friend of the
court brief in the Morris appeal on behalf of the Electronic Frontier
Foundation.

Some legal experts worry that computer users who enter a computer system
without authorization, either unwittingly or with the intention of merely
looking around, could be given penalties that are overly severe.

"A single computer entry is of an entirely different order than the destruction
of data or the intentional alteration of data, just as simple trespass is
pretty minor stuff compared to vandalism or burglary," Viles said.  "Now if
people whose livelihoods depend on computers get into somebody else's computer
without authorization, they could be in Leavenworth for five years."

The Morris appeal boiled down to the critical question of whether he intended
to cause the harm that ensued after he set loose his ill-conceived computer
program on November 2, 1988.

In 1990, a federal judge in Syracuse, New York ruled that it was not necessary
for the government to prove that Morris intended to cause harm, only that
Morris intended to access computers with authorization or to exceed
authorization that he may have had.  Earlier this year a federal appeals court
upheld Morris' May 1990 conviction under which he received three years
probation, a $10,000 fine, and 400 hours of community service.

That affirmation goes against the widely accepted tenet that an injury can
amount to a crime only when deliberately intended, Viles said.  "The law
distinguishes, say, between murder and manslaughter.  You can't be guilty of
murder if the killing was utterly accidental and unintended."

A General Accounting Office (GAO) report released in 1989 noted other flaws in
the federal computer statute.  While the law makes it a felony to access a
computer without authorization, the law does not define what is meant by
"access" or "authorization," the GAO reported.

UPDATING THE LAW

U.S. Department of Justice Officials recently acknowledged that the Computer
Fraud and Abuse Act is outdated and noted that it should be refined <see
Justice Revs Up Battle On Computer Crime (the previous article)>.  Scott
Charney, chief of the Justice Department's newly created computer crime unit,
said the department will lobby to fortify the law with provisions that would
outlaw releasing viruses and worms and make it a felony to access a computer
without authorization and cause damage through reckless behavior.

Trespassing into a computer is more serious than it may appear at first
glance, Charney said.  "It is not easy to determine what happened, whether
there was damage, how safe the system now is or what the intruder's motives
were."

Some legal experts said they believe the law is already overly broad and do not
advocate expanding it with new provisions.  "It is a far-reaching law, whose
boundaries are still not known," said Marc Rotenberg, an attorney and director
of the Washington, D.C. office of Computer Professionals for Social
Responsibility.  "The way I read the law is, the Justice Department has
everything it needs and more," he said.  "After the Morris decisions, if you
sneeze, you could be indicted."

The Morris case pointed out deficiencies in the law that have resulted from
technology's rapid advance, said Thomas Guidoboni, the Washington, D.C.-based
attorney who defended Morris.

Neither Guidoboni nor Morris were surprised by the Supreme Court's refusal to
hear his appeal, according to Guidoboni.  "Robert's case had a particular
problem in that it was the first one involving the 1986 act.  They like to take
cases after the circuit courts had had some chance to play with them and see if
there is a disagreement."

Morris is working as a computer programmer in Cambridge, Massachusetts for a
company that "knows who he is and what he's done," Guidoboni said.  He declined
to identify the company.

<Editor's Note: Morris was actually the SECOND person to be tried under the
 1986 Computer Fraud and Abuse Act.  The first person was Herbert Zinn, Jr.
 a/k/a Shadow Hawk of Chicago, Illinois, who was convicted in 1989 in a
 prosecution led by William Cook, a now former assistant U.S. attorney whose
 name most of you should recognize from the Craig Neidorf (Knight Lightning)
 and Lynn Doucette (Kyrie) cases.

 Zinn was tried as a minor and therefore in a bench trial before a sole judge.
 Morris is the first person to be tried under the Act in front of a jury.
 Zinn's conviction earned him 10 months in a juveniles prison facility in South
 Dakota, a fine of $10,000, and an additional 2 1/2 years of probation that
 began after his prison term ended.

 For additional information about the Shadow Hawk case, please read "Shadow
 Hawk Gets Prison Term," which appeared in Phrack World News, Issue 24,
 Part 2.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Justice Unit Spurred On By Cross-Border Hackers                October 21, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Michael Alexander (ComputerWorld)(Page 6)

Washington D.C. -- The U.S. Department of Justice's formal launch of a computer
crime unit was prompted largely by an alarming rise in computer invasions that
traverse geographic and jurisdictional boundaries, according to a top Justice
Department official.

Robert Mueller III, assistant U.S. attorney general, said the Justice
Department needs to be better prepared to prosecute computer criminals.  he is
one of the architects of a five-person unit recently established by the justice
department expressly to combat computer crime.

"One of the principal functions of the unit is to anticipate areas where
federal, state, and local law enforcement will have to expend resources in the
future," Mueller said.  "One that comes immediately to our attention is crime
related to computers used as a target as in The Cuckoo's Egg."  He was
referring to author Clifford Stoll's account of how he tracked West German
hackers who penetrated U.S. computers for the KGB in exchange for cash and
cocaine.

Increasingly, computer crimes cut across state and international boundaries,
making them difficult to investigate because of jurisdictional limits and
differing laws, Mueller said.  The computer crime unit will be charged with
coordinating the efforts of U.S. attorneys general nationwide during
investigations of crimes that may have been committed by individuals in several
states.

One of the unit's first assignments will be to take a pivotal role in OPERATION
SUN-DEVIL, last year's much-publicized roundup of computer hackers in several
states.  That investigation is still under way, although no arrests have
resulted, Justice Department officials said.

The unit will coordinate efforts with foreign law enforcers to prosecute
hackers who enter U.S. computer systems from abroad while also working to
promote greater cooperation in prosecuting computer criminals according to
Mueller.

The unit will also assist in investigations when computers are used as a tool
of a crime -- for example, when a computer is used to divert electronically
transferred funds -- and when computers are incidental to a crime, such as when
a money launderer uses a computer to store records of illegal activities,
Mueller said.

"There have been many publicized cases involving people illegally accessing
computers, from phone phreaks to hackers trying to take military information,"
said Scott Charney, chief of the new computer unit.  "Those cases have high
importance to us because any time that computers are the target of an offense,
the social cost is very high.  If you bring down the Internet and cripple 6,000
machines and inconvenience thousands of users, there is a high social cost to
that type of activity."

The computer crime unit will also work to promote closer cooperation between
the Justice Department and businesses that have been the victims of computer
crime, Charney said.

Law enforcers are better trained and more knowledgeable in investigating and
prosecuting computer crimes, Charney said.  "Businesses need not be concerned
that we are going to come in, remove all of their computers, and shut their
businesses down.  FBI and Secret Service agents can go in and talk to the
victim in a language they understand and get the information they need with a
minimum amount of intrusion."

<Editor's Note:  "Businesses need not be concerned that we are going to come
 in, remove all of their computers, and shut their businesses down."  Excuse
 me, but I think STEVE JACKSON GAMES in Austin, Texas might disagree with that
 statement.  Mr. Charney -- Perhaps you should issue an apology!>

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                           V  I  E  W  P  O  I  N  T

Let's Look Before We Legislate                                 October 21, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Marc Rotenberg (ComputerWorld)(Page 25)

    "Laws Are Adequate To Handle Computer Crime -- 'Net Police' Not Needed"

The U.S. Department of Justice is now circulating a proposal to expand the
reach of federal computer crime law.  On first pass, this might seem a sensible
response to concerns about computer crime.  The reality, however, it that the
current federal law is more than adequate and the Justice Department proposal
is poorly conceived.

The Justice Department proposal will give federal agencies broad authority to
investigate computer crime, allowing them to intercede in any situations
involving a computer hooked to a network.

Creating a worm or virus could become a felony act, no questions asked.
Espionage laws would be broadened and intent requirements would be lowered.
Certain procedural safeguards would be removed from existing law.

CURRENT LAW ADEQUATE

Taken as a whole, the proposal will make it possible for the federal government
to prosecute many more computer crimes, but the question is whether this
additional authority will improve computer security.  Between the current
federal statute, the Morris decision, and the sentencing guidelines, federal
prosecutors already have more than enough tools to prosecute computer crime.

Under the Computer Fraud & Abuse Act, passed in 1984 and amended in 1986, the
unauthorized use of a computer system is a felony.  Though the act does not
define what "authorization" is or how it is obtained, a person found guilty
faces up to five years in jail and fines of $250,000.  It is a far-reaching law
whose boundaries are still not known.

THE MORRIS FACTOR

The Morris case strengthened the hand of federal prosecutors still further.
The judge ruled that it was not necessary for the government to prove that
Morris intended the harm that resulted when the worm was released, only that he
intended unauthorized use when he did what he did.

>From a common law viewpoint, that's a surprising result.  Traditional criminal
law distinguishes between trespass, burglary, and arson.  In trespass, which is
a misdemeanor, the offense is entering onto someone else's property.  Burglary
is simple theft and arson is destruction.  To punish a trespasser as an
arsonist is to presume an intent that may not exist.

A federal appeals court affirmed the Morris decision, and the Supreme Court has
refused to hear his appeal, so now the computer crime statute is essentially a
trip-wire law.  The government only has to show that the entry was unauthorized
-- not that any resulting harm was intentional.

There is another aspect of the Morris case that should be clearly understood.
Some people were surprised that Morris served no time and jumped to the
conclusion that sentencing provisions for this type of offense were
insufficient.  In fact, under the existing federal sentencing guidelines,
Morris could easily have received two years in jail.  The judge in Syracuse,
New York, considered that Morris was a first-time offender, had no criminal
record, was unlikely to commit a crime in the future, and, not unreasonably,
decided that community service and a stiff fine were appropriate.

To "depart" as the judge did from the recommended sentence was unusual.  Most
judges follow the guidelines and many depart upwards.

That said, if the Department of Justice persists in its efforts, there are at
least three other issues that should be explored.

UNANSWERED QUESTIONS

First there is the question of whether it is sensible to expand the authority
of federal agents at the expense of local police and state government.  If
theft from a cash register is routinely prosecuted by local police, why should
the FBI be called in if the cash register is a computer?

What will happen to the ability of state government to tailor their laws to
their particular needs?  Do we really want "Net Police"?

There is also the need to explore the government's performance in recent
computer crime investigations before granting new powers.  For example, the
botch Operation Sun-Devil raid, which involved almost one quarter of all Secret
Service agents, resulted in hardly a conviction.  (A good cop could have done
better in a night's work.)

In a related investigation, Steve Jackson, the operator of a game business in
Texas was nearly forced out of business by a poorly conceived raid.

In fact, documents just released to Computer Professionals for Social
Responsibility by the Secret Service under the Freedom of Information Act raise
substantial questions about the conduct, scope, and purpose of Operation
Sun-Devil investigations.  They reveal, for example, that the Secret Service
monitored and downloaded information from a variety of on-line newsletters and
conferences.

A congressional hearing to assess Operation Sun-Devil would certainly be in
order before granting federal officials new powers.

PROTECTION OF RIGHTS

Finally we should not rush to create new criminal sanctions without fully
recognizing the important civil liberties interests in information
technologies, such as the rights of privacy and free expression.  There are,
for example, laws that recognize a special First Amendment interest in newsroom
searches.

But no case has yet made clear the important principle that similar protections
should be extended to computer bulletin boards.  New criminal sanctions without
necessary procedural safeguards throws off an important balance in the criminal
justice system.

Expanding the reach of federal law might sound good to many people who are
concerned about computer crime, but broadening criminal law is always
double-edged.  Could you prove to a court that you have never used a computer
in an "unauthorized" manner?

<Editor's Note:  Marc Rotenberg is the Director of the Washington office of
 Computer Professionals for Social Responsibility and he has testified in both
 the House of Representatives and the Senate on computer crime legislation.>
_______________________________________________________________________________

PWN Quicknotes
~~~~~~~~~~~~~

1.  Operation Sun-Devil Scope Emerges (ComputerWorld, 10/14/91, page 119)
--
    The Computer Professionals for Social Responsibility (CPSR), an advocacy
    group, received more than 2,400 documents from the U.S. Secret Service
    under the Freedom of Information Act.  The documents relate to Operation
    Sun-Devil, last year's nationwide dragnet through the hacker underground.
    An early look at the documents reveals that the scope of the operation was
    considerably broader than the U.S. Secret Service has admitted, said Marc
    Rotenberg, director of CPSR's Washington, D.C. office.  CPSR will soon hold
    a press conference to discuss the findings, he added.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

2.  6 Police Employees Probed for Wiretaps (Washington Post/AP, 10/24/91, page
    A4) -- Jefferson City, Missouri -- Missouri's Highway Patrol is
    investigating six employees implicated in three illegal wiretaps, officials
    said.

    The wiretaps were "stupid" and were intended to "gain personal information
    in an effort to supervise subordinates," said Colonel C.E. 'Mel' Fisher,
    the patrol's chief.

    Fisher said that six employees are on administrative leave without pay
    after a two-month internal investigation confirmed conversations were
    recorded at patrol headquarters and at a troop office in Kirkwood,
    Missouri.

    Fisher did not identify the employees, who face hearings that could lead
    to possible penalties ranging from a written reprimand to dismissal.  It is
    a federal felony to conduct an illegal wiretap.  He said the FBI
    investigated the wiretaps.

    Major Bobby G. Gibson, chief of the patrol's Criminal Investigation Bureau,
    in which two of the wiretaps occurred, committed suicide on October 9,
    1991.  He was among five defendants in a $7 million federal lawsuit filed
    recently by a black patrolman, Corporal Oliver Dixon, who alleged he had
    been wiretapped and denied promotions because of his race.  All of the
    defendants, including Fisher, are white.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
3.  Patrick Townson, the moderator of the Internet's Telecom Digest
    (comp.dcom.telecom) was less than pleased when an unknown person placed
    Phrack 34 into alt.dcom.telecom.  Townson consistently preaches about the
    evils of hacking, but we know that he did not learn everything he knows
    about telecommunications in the classroom.  See you after World War Three
    Pat!  We know who you are, we know who you WERE and we know what crimes
    you have committed in the realm of telecommunications.  We're anxious to
    talk some more with you about this in the near future.

    See below:

    "I assume you saw the stuff which was left in alt.dcom.telecom today:
    A whole series of messages telling how to break into several voicemail
    systems; how to break into the MILNET; a program designed to discover
    passwords; and other obnoxious files.  All of them were left by the same
    anonymous user at the same non-existent site.  Siemens Medical Systems
    (one of the victims in the theft-of-voicemail-services tutorial in
    alt.dcom.telecom today) has been notified that their 800 number link to
    voicemail is now under attack, and given the box number involved.  Like
    cockroaches, you can stomp on those people all you like; they seem to
    survive.  One person has said in the event of WW-3, the only species to
    survive will be the cockroaches and the hackerphreaks.  Good socially
    responsible computing, that's what it is!   PAT"
_______________________________________________________________________________

4.  The existence of back issues of Phrack Inc. found in a user's home
    directory was enough for a system administrator at Tufts University in
    Massachusetts to revoke a users account.  Michael Godwin, an attorney for
    the Electronic Frontier Foundation went to bat for this individual and
    succeeded in restoring the user's account.  The incident prompted the
    following response by a reader of Telecom Digest (comp.dcom.telecom):

     On Oct 19 at 11:51, TELECOM Moderator writes:

     > Is it easier and more pragmatic for a
     > system administrator to answer to his/her superiors regarding files at
     > the site which harassed or defrauded some third party (ie. telco) or
     > to simply remove the files and/or discontinue the feed"   PAT]

     But this requires a judgment call on the part of the system
     administrator, does it not?  Most of the system administrators that I
     know are too busy administering the system to worry about this file or
     that feed, except perhaps as it relates to traffic volume or disk space
     consumed.

     Will we ever get to the point where those in charge will stop dreaming of
     practicing mind control?  I am so sick of those who are paranoid that
     someone somewhere may actually express an uncontrolled thought or idea to
     someone else.

     Ah, the advantages of owning one's own UUCP site ...
_______________________________________________________________________________

5.   The National Public Network Begins Now.  You Can Help Build it.

     Telecommunications in the United States is at a crossroads.  With the
     Regional Bell Operating Companies now free to provide content, the shape
     of the information networking is about to be irrevocably altered.  But
     will that network be the open, accessible, affordable network that the
     American public needs?  You can help decide this question.

     The Electronic Frontier Foundation recently presented a plan to Congress
     calling for the immediate deployment of a national network based on
     existing ISDN technology, accessible to anyone with a telephone
     connection, and priced like local voice service.  We believe deployment of
     such a platform will spur the development of innovative new information
     services, and maximize freedom, competitiveness, and civil liberties
     throughout the nation.

     The EFF is testifying before Congress and the FCC; making presentations to
     public utility commissions from Massachusetts to California; and meeting
     with representatives from telephone companies, publishers, consumer
     advocates, and other stakeholders in the telecommunications policy debate.

     The EFF believes that participants on the Internet, as pioneers on the
     electronic frontier, need to have their voices heard at this critical
     moment.

     To automatically receive a description of the platform and details, send
     mail to [email protected], with the following line:

     send documents open-platform-overview

     or send mail to [email protected].
_______________________________________________________________________________

6.  The September/October 1991 issue of The Humanist has a cover story
    regarding Cyberspace, rights and freedoms on nets such as Usenet, and makes
    reference to Craig Neidorf, Jolnet, Prodigy and other matters.
_______________________________________________________________________________

7.  A Virginia Beach restaurateur plead guilty to illegally taping a telephone
    call by Governor L. Douglas Wilder and said he arranged for the tape to be
    delivered to the staff of Senator Charles Robb, D-Va., hoping it would be
    damaging to Wilder and politically helpful to Robb.

    Robert Dunnington, a onetime social companion of Robb's, admitted in
    federal court that he intercepted a 1988 car phone call by then-Lt.
    Governor Wilder as part of his hobby of monitoring and recording cellular
    calls.

    From February 1988 to October 1990, Dunnington overheard and taped hundreds
    of calls and, his attorney said, it was "just happenstance" that Wilder's
    call was picked up.  (Washington Post)
_______________________________________________________________________________

8.  A Federal District Judge in New York ruled that a computer-network company
    is not legally liable for the contents of information it disseminates.
    While the decision could be influential because it tackles free speech on
    an electronic network, it is not clear how the ruling would affect bulletin
    boards ^S^Qon which users add comments.  The decision concerned an electronic
    gossip column carried by CompuServe.  In the decision, the judge stated
    "CompuServe has no more editorial control over such a publication than
    does a public library, bookstore or newsstand, and it would be no more
    feasible for CompuServe to examine every publication it carries for
    potentially defamatory statements than it would be for any other
    distributor to do so."  (Wall Street Journal, October 31, 1991)
_______________________________________________________________________________


--------------------------------------------------------------------------------


                                ==Phrack Inc.==

                 Volume Three, Issue Thirty-five, File 12 of 13

              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN           Issue XXXV / Part Three           PWN
              PWN                                             PWN
              PWN            Compiled by Dispater             PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN

Prodigy Stumbles as a Forum...Again
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Mike Godwin (Electronic Frontier Foundation)

     On some days, Prodigy representatives tell us they're running "the Disney
Channel of online services."  On other days the service is touted as a forum
for "the free expression of ideas."  But management has missed the conflict
between these two missions.  And it is just this unperceived conflict that has
led the B'nai B'rith's Anti-Defamation League to launch a protest against the
online service..

     On one level, the controversy stems from Prodigy's decision to censor
messages responding to claims that, among other things, the Holocaust never
took place.  These messages--which included such statements as "Hitler had some
valid points" and that "wherever Jews exercise influence and power, misery,
warfare and economic exploitation ... follow"--were the sort likely to stir up
indignant responses among Jews and non-Jews alike.  But some Prodigy members
have complained to the ADL that when they tried to respond to both the overt
content of these messages and their implicit anti-Semitism, their responses
were rejected by Prodigy's staff of censors.

     The rationale for the censorship?  Prodigy has a policy of barring
messages directed at other members, but allows messages that condemn a group.
The result of this policy, mechanically applied, is that one member can post a
message saying that "pogroms, 'persecutions,' and the mythical holocaust" are
things that Jews "so very richly deserve" (this was an actual message).  But
another member might be barred from posting some like "Member A's comments are
viciously anti-Semitic."  It is no wonder that the Anti-Defamation League is
upset at what looks very much like unequal treatment.

     But the problem exposed by this controversy is broader than simply a badly
crafted policy.  The problem is that Prodigy, while insisting on its Disney
Channel metaphor, also gives lip service to the notion of a public forum.
Henry Heilbrunn, a senior vice president of Prodigy, refers in the Wall Street
Journal to the service's "policy of free expression," while Bruce Thurlby,
Prodigy's manager of editorial business and operations, invokes in a letter to
ADL "the right of individuals to express opinions that are contrary to personal
standards or individual beliefs."

     Yet it is impossible for any free-expression policy to explain both the
allowing of those anti-Semitic postings and the barring of responses to those
postings from outraged and offended members.  Historically, this country has
embraced the principle that best cure for offensive or disturbing speech is
more speech.  No regime of censorship--even of the most neutral and well-
meaning kind--can avoid the kind of result that appears in this case: some
people get to speak while others get no chance to reply.  So long as a board of
censors is in place, Prodigy is no public forum.
        
     Thus, the service is left in a double bind.  If Prodigy really means to be
taken as a computer-network version of "the Disney Channel"--with all the
content control that this metaphor implies--then it's taking responsibility for
(and, to some members, even seeming to endorse) the anti-Semitic messages that
were posted.  On the other hand, if Prodigy really regards itself as a forum
for free expression, it has no business refusing to allow members to respond to
what they saw as lies, distortions, and hate.  A true free-speech forum would
allow not only the original messages but also the responses to them.

     So, what's the fix for Prodigy?  The answer may lie in replacing the
service's censors with a system of "conference hosts" of the sort one sees on
CompuServe or on the WELL.  As WELL manager Cliff Figallo conceives of his
service, the management is like an apartment manager who normally allows
tenants to do what they want, but who steps in if they do something
outrageously disruptive.  Hosts on the WELL normally steer discussions rather
than censoring them, and merely offensive speech is almost never censored.

     But even if Prodigy doesn't adopt a "conference host" system, it
ultimately will satisfy its members better if it does allow a true forum for
free expression.  And the service may be moving in that direction already:
Heilbrunn is quoted in the Wall Street Journal as saying that Prodigy has been
loosening its content restrictions over the past month.  Good news, but not
good enough--merely easing some content restrictions is likely to be no more
successful at solving Prodigy's problems than Gorbachev's easing market
restrictions was at solving the Soviet Union's problems.  The best solution is
to allow what Oliver Wendell Holmes called "the marketplace of ideas" to
flourish--to get out of the censorship business.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Computer Network to Ban 'Repugnant' Comments
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From Washington Post

     Prodigy has been charged with allowing "antisemitic slurs" to run on its
network.  Prodigy officials said they would *not* censor discussion of
controversial subjects, such as the one that has been raging over the net for
several months -- whether the Holocaust was a hoax.

     The controversial message that was labeled "repugnant" included the
statements: "Hitler had some valid points...", and "...whenever Jews exercise
influence and power, misery, warfare and economic exploitation [are the
result]".  There were six other messages that the Anti-Defamation League of
B'nai B'rith are complaining about.  The Hitler message was not available to
all subscribers, it was just personal mail between users.  The person who
received the mail brought it to the ADL's attention.

     Civil liberties groups have compared computer networks to telephone
companies, which do not censor calls.  However, Prodigy officials object to
that analogy, saying it is more like a newspaper, and that Prodigy must judge
what is acceptable and what is not, much as a newspaper editor must.

     Prodigy officials take the position of, and I quote, "we were speaking in
broader terms ... we were focused on the broad issue of free expression".
_______________________________________________________________________________

More on Proctor & Gamble                                        August 15, 1991
~~~~~~~~~~~~~~~~~~~~~~~
by Randall Rothenberg (New York Times)
Further Reading:  Phrack Inc., Issue 33 , File.12, "Proctor & Gamble"

     Law-enforcement officials in Ohio have searched the records of every
telephone user in southwestern Ohio to determine who, if anyone, called a Wall
Street Journal reporter to provide information that Proctor & Gamble said was
confidential and protected by state law.
        
     The investigation goes far beyond examining the telephone records of
current and former employees of the giant consumer products company, an inquiry
the Hamilton County prosecutor's office confirmed on Monday.  The Journal
reported the scope of the investigation Thursday.

     The prosecutor, Arthur Ney Jr., acting on a complaint by Procter & Gamble,
ordered Cincinnati Bell to turn over all the telephone numbers from which
people called the home or office of the reporter, Alecia Swasy, from March 1 to
June 15.

     The situation began sometime before June 17 when Procter & Gamble, which
makes Tide detergent, Crest toothpaste and other familiar supermarket products,
asked the Cincinnati police to determine whether current or former employees
were leaking confidential corporate information to The Wall Street Journal.

     On Monday the newspaper reported that the company had been bothered by two
news articles published on June 10 and June 11 written by Ms. Swasy, a reporter
based in Pittsburgh who covers Procter & Gamble.  The articles cited
unidentified sources saying that a senior executive was under pressure to
resign from the company, and that it might sell some unprofitable divisions.

     But a spokeswoman for Procter and Gamble, Sydney McHugh, said Thursday
that the company "had been observing a disturbing pattern of leaks" since the
beginning of the year.  She refused to elaborate, but said the decision to
pursue legal action was reviewed at several levels in the company and was made
by Jim Jessee, a corporate security officer.

     Two Ohio statutes protect the unauthorized disclosure of trade secrets.
One makes it a felony to transmit formulas, customer lists or other tangible
pieces of information that would be valuable to a company and its competitors.
But another, broader law makes it a misdemeanor to disclose "any confidential
matter or information" without the company's consent.

     The Cincinnati police approached the Hamilton County prosecutor's office,
which sought and received from a grand jury a subpoena for telephone records.

     A copy of the subpoena, dated June 17, was given to The New York Times by
someone involved in the case who insisted on anonymity.  The subpoena ordered
Cincinnati Bell to "identify all (513) area code numbers that have dialed" Ms.
Swasy's home or office telephones in Pittsburgh during an eight-week period
that started on March 1.

     Cincinnati Bell serves 655,297 telephone numbers in the 513 area code, in
an area covering 1,156 square miles, said Cyndy Cantoni, a spokeswoman for the
company.  In the company's entire jurisdiction, which also covers parts of
Kentucky and Pennsylvania, about 13 million toll calls are placed in an average
month, she said.

     Ms. Cantoni said she could not comment on what Cincinnati Bell turned over
to the authorities, but said the company routinely complied with subpoenas.
Under normal procedure, the company's computers would have automatically
searched its customer list and printed out only the originating numbers, and
not the names or addresses, of calls to Ms. Swasy's numbers, Ms. Cantoni said.

     The Wall Street Journal, which is published by Dow Jones & Co., reported
on Monday that neither Ms. Swasy nor executives at the Journal were informed of
the subpoena by the authorities.

     Neither Terry Gaines, a first assistant prosecutor, nor Ed Ammann, a
police department colonel involved with the investigation, returned repeated
calls to their offices.

     Alan F. Westin of Columbia University, an authority on technology and
privacy issues, said the legality of the Ohio authorities' search for the
Procter & Gamble whistleblower may depend on how the investigation was pursued.

     If Procter & Gamble turned over the names and phone numbers of present and
former employees to the police and the police matched that list against the
numbers they were given by the telephone company, the rights of other,
uninvolved parties may not have been violated, Westin said.  But if the police
learned the names of people unaffiliated with Procter & Gamble who called the
Journal's reporter, he said, or if they turned over a list of numbers to
Procter & Gamble for research, some Ohio residents' Fourth Amendment
protections may have been sullied.

     "When technology allows you to run millions of calls involving 650,000
telephone subscribers through a computer in order to identify who called a
person, potentially to find out whether a crime was committed, you raise the
question of whether technological capacity has gone over the line in terms of
what is a reasonable search and seizure," Westin said.
_______________________________________________________________________________

Expert Fraud Shares Tricks of His Trade                         October 7, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Bob Reilly (New York Times)

     PHOENIX -- A freelance writer didn't think the $333 that Forbes magazine
paid him for a one-page article was enough money so he used his personal
computer to duplicate the check in the amount of $30,000.  And, the check
cleared.

     A handyman fixes a bedroom window and gets paid by check.  The handyman
copies down the homeowner's bank account number, name, address and check number
sequences and sends $4.95 to a company that prints fancy colored checks.  The
handyman masters the homeowner's signature and then proceeds to cash the checks
after they arrive.

     American Express and Mastercard traveler's checks are duplicated on a
colored photostat machine and spent in hotels and restaurants.

     A man rents a banquet room in a hotel for $800 and gets the bill in the
mail a few days later.  The man sends in a check for $400 with the notation
"paid in full" written in the lower left-hand corner.  The hotel cashes the
check and sends a notice to the man saying $400 is still owed.  The man refuses
to pay the $400 and wins in court because the law says by cashing the check the
hotel conceded the debt was paid.

     White-collar crime amounts to more than $50 billion a year, said Frank
Abagnale, who cited the examples at a business-sponsored seminar in the Phoenix
Civic Center.  By contrast, bank robbers, who get most of the media attention,
abscond with a paltry $450 million, he said.

     Abagnale is said to have conducted scams and frauds in 26 nations.  Known
as "The Imposter," he now advises government and industry.  He says he served
six years in jail in France, Sweden and the U.S. for his crimes, which included
writing bad checks for more than $2.5 million.

     "As technology improves, so does the ability to commit fraud," said
Abagnale.

     He claims that at 16 he impersonated an airline pilot, at 18 was a chief
resident pediatrician in a Georgia hospital, at 19 passed the Louisiana state
bar exam and served as an assistant attorney general for the state.

     Abagnale also claims he never flew an airplane or treated a patient but
along the way used false names to get jobs and pass bad checks.  He claims he
even got a job at age 20 teaching sociology at Brigham Young University,
beating out three Ph.D.s for the job.

     "I was always just one chapter ahead of the class," he said.  Demeanor,
style, confidence, clothes and the overt display of wealth also help the con
man, Abagnale said.
        
     Abagnale claimed he got one teller to cash a napkin because he drove up to
the bank in a chauffeur-driven Rolls Royce and entered wearing a $600 suit and
all the confidence of a billionaire.  The feat was recorded for television by
CBS, he said.

     Another time he supposedly put the numbers of the bank account he was
using on a bunch of deposit slips, placed the deposit slips in a bank for
public use, and in one day alone more than $40,000 was deposited into his
account by unsuspecting customers who picked up his slips because they had
either run out of their own or hadn't yet got their own deposit slips.
  
     Abagnale asserted that there are several ways to discourage fraud, 
including:

       -- Use checks that are impossible to duplicate on a home computer.
       -- Don't cash checks that don't have at least one rough edge.
       -- Scan travelers checks by looking for impossible to reproduce
          pictures or symbols that can only be seen at eye level or by
          wetting the back, left-hand side of an American Express traveler's
          check, which will smudge if it is authentic.

     Abagnale is known as the author of a book called "Catch Me If You Can."

     "I always knew I would eventually get caught," he said.  "Only a fool
believes he won't.  The law sometimes sleeps, but it never dies."

     Abagnale claimed he started a life of crime when his parents divorced and
he was forced to choose between living with his mother or father.  He said he
couldn't make the choice and ran away.
_______________________________________________________________________________
       
Dumb Jocks Learn First Lesson of Phreaking                     October 17, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From Associate Press

     Four current Ball State University basketball players have admitted to
investigators that they charged a total of $820.90 in unauthorized long
distance calls. School officials announced the preliminary findings in the
first phase of their report the the NCAA.  What the investigators found, in
regards to the unauthorized calls, was the following information:

Person             Yr   Calls  Cost
~~~~~~~~~~~~~~~~ ~~~  ~~~~~  ~~~~~~~
Jeermal Sylvester  Sop  255    $769.93
Chandler Thompson  Sen  28     $ 45.14
Michael Spicer     Sen  3      $  4.43
Keith Stalling     Sen  1      $  1.40

     Investigators reported three of the men said former players had provided
the long distance credit card numbers or authorization codes on which the calls
were made.  The fourth player Keith Stalling, could not explain how his call
had been charged to the university.  Head basketball coach Dick Hunsaker
reiterated that neither he nor the coaching staff had made available the
numbers that were assigned to the coaches.

     "When this problem was first discovered back in August, it came as a shock
to me," Hunsaker said.  "I'm disappointed with the judgement of the players
involved, but I'm glad we're getting to the bottom of it quickly and clearing
it up before the season starts."

     "Our attention now will focus on former players and other people not
connected with the basketball program who might have used the same credit cards
and access numbers," said the university's auditor.  The investigation that
began in August was conducted by the Ball State university's auditor and
Department of Public Safety.  The investigation started one week after a
routine review of telephone records by athletic department officials.  At the
time, investigators said the total cost of the unauthorized calls was in the
thousands of dollars.
_______________________________________________________________________________

Silicon Government in California                               October 28, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From UPI Sacramento

     California unveiled an easy-to-use computer system Wednesday that is
designed to tell people about such topics as statewide job openings, where
parents can find child care and how to re-register a car.

     Officials described the experimental "Info/California" program as an
information-dispensing version of an automatic teller machine at a bank.  It
will operate in Sacramento and San Diego as a pilot project for the next nine
months.

     Users will obtain free information on a variety of state services as they
touch the television-like computer screen to evoke an on-screen narration and
color graphics in English, Spanish and potentially other languages.

     "It literally puts state government at our fingertips," a computerized
image of Gov. Pete Wilson said at a Capitol news conference.
    
     Secretary Russell Gould of the Health and Welfare Agency said the system
may be especially useful to announce job openings as the economy rebounds from
the recession. Job-seekers will need a fourth-grade literacy level to use the
machine, which will refer them to Employment Development Department offices for
follow-up.

     Director Frank Zolin of the Department of Motor Vehicles said the system
will benefit 20 million drivers who want vehicle registration renewals, vanity
license plate orders and faster service.

     John Poland, Central California manager for IBM -- the state's partner in
the project -- said that besides telling the public about job opportunities, it
will allow Californians to order birth certificates and get information about
education, transportation, health and welfare at more than one site.

     During the nine-month trial, people will use the system at 15 kiosks in
Sacramento and San Diego that will be similar to, and eventually integrated
with, local system kiosks such as those in the courts in Los Angeles and Long
Beach, and for community services in San Diego and Tulare counties.

     Info/California was authorized under 1988 legislation. It is based on an
experimental touchscreen network in Hawaii that 30,260 people used over a six-
month period.

     The state spent about $300,000 on the project, and IBM invested about $3
million to develop the technology.  By performing functions now done by humans,
the system may ultimately replace some state workers and produce cost savings
for taxpayers.

     "We're working smart here," Gould said.  "This may diminish some of the
need for new state workers."
_______________________________________________________________________________

Digital Tapes Deal Endorsed by Music Industry                  October 30, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From (Congressional Monitor)

     Record industry executives joined with retailers and consumer groups in
endorsing legislation (S 1623) that would pave the way for widescale
introduction of digital audio tapes into the U.S. marketplace.

     For the first time, consumers would be allowed to legally make copies of
prerecordings for home use.

     The agreement would allow artists, songwriters, and record companies to
collect royalty fees on the sale of blank tapes and digital audio recorders.

     In addition, an electronics chip will be placed in the recorders to
prevent anything other than the original recording to be copied.

     In testimony before the Senate Judiciary Committee's Subcommittee on
Patents, Copyrights, and Trademarks, pop star Debbie Gibson said that many
artists had been concerned that digital copying could spell the end of a
profitable music industry.

     Unlike conventional tapes, digital audio recorders allow consumers to make
a perfect copy of a prerecording.  The record industry says it already loses $1
billion a year in sales due to illegal copying.  And, the industry says,
unchecked digital technology would dramatically increase that figure.

     Electronics manufacturers and retailers won the assurance that they will
not be sued for copyright infringement due to the sale of blank tapes or
recorders.
_______________________________________________________________________________

Computer Cryptography:  A Cure For The Common Code
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

     Anyone can sign a postcard, but how do you sign a piece of electronic
mail?  Without a "signature" to demonstrate that, say, an electronic transfer
of funds really comes from someone authorized to make the transfer, progress
towards all-electronic commerce is stymied.  Ways of producing such signatures
are available, thanks to the technology of public-key cryptography.  They will
not work to everyone's best advantage, though, until everyone uses the same
public- key system.

     It is an obvious opportunity for standards-makers -- but in America they
have turned up their noses at all the variations on the theme currently in use.
The alternative standard for digital signatures now offered by America's
National Institute of Standards and Technology (NIST) has brought a long-
simmering controversy back to the boil.

     Public-key cryptography could become one of the most common technologies
of the information age, underpinning all sorts of routine transactions.  Not
only does it promise to provide the digital equivalent of a signature, it could
also give users an electronic envelope to keep private messages from prying
eyes.  The idea is to create codes that have two related keys.  In conventional
cryptography the sender and receiver share a single secret key; the sender uses
it to encode the message, the receiver to decode it.

     In public-key techniques, each person has a pair of keys: a disclosed
public key and a secret private key. Messages encoded with the private key can
only be decoded with the corresponding public key, and vice versa.  The public
keys are published like telephone numbers. The private keys are secret.  With
this technology, digital signatures are simple. Encode your message, or just
the name you sign it with, using your private key.  If the recipient can decode
the message with your public key, he can be confident it came from you.
Sending a confidential message -- putting electronic mail in a tamper-proof
envelope -- is equally straightforward.

     To send a secret to Alice encode it with her public key.  Only Alice (or
someone else who knows her private key) will be able to decode the message.
The heart of any system of public-key cryptography is a mathematical function
which takes in a message and a key, and puts out a code.  This function must be
fairly quick and easy to use, so that putting things into code does not take
forever.  It must be very hard to undo, so that getting things out of code does
take forever, unless the decoder has the decoding key.  Obviously, there must
be no easy way to deduce the private key from the public key.  Finding
functions that meet these criteria is "a combination of mathematics and
muddle," according to Roger Needham of the Cambridge Computer Laboratory.

     The greatest successes to arise from the muddle so far are those using
functions called prime factorisation algorithms.  They are based on the
mathematical insight that, while it is easy to multiply two numbers together,
it is very hard to work backwards to find the particular two numbers which were
multiplied together to produce some given number.  If Alice chooses two large
prime numbers as her private key and publishes their 150-digit product as her
public key, it would probably take a code-breaker thousands of years to work
backwards to calculate her private keys.

     A variety of schemes have been worked out which use this insight as the
basis for a workable public-key code.  Most popular of these is the so-called
RSA algorithm, named after the three MIT professors who created it -- Ronald
Rivest, Adi Shamir and Len Adleman.  It has been patented and is sold by a
Silicon Valley company, called RSA, that employs 15 people, most of them ex-MIT
graduate students.  Faculty firms are to computer start-ups what family firms
were to the industrial revolution.  RSA has attracted both academic praise and
a range of heavyweight commercial customers: Microsoft, Sun Microsystems,
Digital Equipment and Lotus Development. But, despite repeated applications, it
has never been endorsed by those in government.  Rumors abound that the
codebreakers in the National Security Agency have discouraged standard-setters
from recommending RSA because they do not want to promote the use of codes they
cannot break.  RSA, for obvious reasons, does not discourage the rumors.
Whatever the reason, the standard-setters at the NIST have sidestepped the
debate over RSA with their new algorithm, DSA.  As set out in the standard, DSA
verifies the identity of the sender, but does not encrypt the message.  It
appends to the message a number calculated from the message and the sender's
private key.  The recipient can then use this number, the message and the
sender's public key to verify that the message is what it seems.

     The NIST says that this technique is well suited to "smart cards" and
other applications where there is not a lot of computing power available for
working out codes.  Because it hopes that DSA will be used for verifying the
identity of everyone from welfare recipients to military contractors, its
flexibility is a boon.  Meanwhile, however, more and more companies are
choosing a public-key cryptography system for communicating confidentially --
often RSA, sometimes something different. Someday, probably soon, governments
will want to choose, too.  Watch out for fireworks when they do.
_______________________________________________________________________________

SWBT Sends Off First "Cross-Country" ISDN Call
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From Southwestern Bell Telephone

     The nation's first "cross-country" public network ISDN was placed last
week, courtesy of SWBT.  The historic first call was the result of a two-year
joint effort among SWBT, BellSouth Corp., US Sprint and Bellcore.  SWBT's
Advanced Technology Lab originated the call, which used US Sprint's digital
facilities in Burlingame, Calif.  The call terminated at a BellSouth switch
in Atlanta, Ga.

     Using an ISDN video application, SWBT's trial director Ken Goodgold was
able to see and talk to BellSouth's David Collins.  "With this test, the
geographic limits of ISDN-based services were stretched from a few miles to
cross-country," Goodgold says.  "We began with protocol testing and service
verification, two key parts of the process," Goodgold says. "That required an
extremely complex series of technical tests.  The Advanced Technology Lab staff
worked for months performing the tests leading up to the first successful
call."

     Last week's test call was significant from a marketing perspective as well
as a technical one.  That's because it demonstrated the economic benifits of
using ISDN for video information.  "The cost of a long distance call is
approximately the same, whether it's a voice transmission using a regular phone
line or a video transmission using ISDN," Goodgold says. "That means a big
reduction in cost to arrange a videoconference." US Sprint joined the test
because ISDN has evolved beyond the local stage, says Terry Kero, the carrier's
director of InfoCom Systems Development Labs.  "After today, it will be
technically possible to make an ISDN call across the country just as it is
possible today to make a regular long distance call," Kero says.
_______________________________________________________________________________


--------------------------------------------------------------------------------


                               == Phrack Inc. ==

                 Volume Three, Issue Thirty-five, File 13 of 13

              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN           Issue XXXV / Part Four            PWN
              PWN                                             PWN
              PWN            Compiled by Dispater             PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


The Media Monopoly
~~~~~~~~~~~~~~~~~
by Dispater

     As we all know, more technology means more and more legal questions.  It
is important not only to understand the economic but social impacts of the
recent "Telco-TV" issue.  I think technologically the idea of transmitting
audio/video signals through phiber optic line is fascinating and a great
technological triumph.  However, how will society benefit by having an even
smaller number of owners controlling the media?  There is already a media
dynasty due to policies established in Ronald Reagan's presidency.

     Today almost all of the media is controlled by 18 global corporations.
That is down from 23 in 1990 and down from 50 corporations in 1983.  The trend
is very scary.  In the United States there are around 25,000 different media
voices.  This includes newspapers, book publishers, television stations, radio
stations, movie studios, and magazines.  However we should not kid ourselves
into thinking that there are 25,000 different owners.  Is it fair to that 23
companies have so much power over our lives?  It is incredibly dangerous to
allow this trend to continue.  We must stop this trend and "bust up" the media
as it was done in the pre-Reagan era.

    If you are concerned about this issue I strongly urge you to read "The
Media Monopoly" by Ben Bagdickian.  It is published by Beacon Press and runs
around 300 pages in length.
_______________________________________________________________________________

Phone Companies Could Transmit TV Under FCC Plan               October 25, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Edmund L. Andrews (The New York Times)

     In a surprising and controversial move to promote cable television
competition, the Federal Communications Commission proposed today that local
telephone companies be allowed to package and transmit television programming.

      The proposed rules, which were unanimously endorsed and are likely to be
adopted within a year, would expose cable companies to the most threatening
competition yet.  But they could benefit cable television consumers, many of
whom have seen their bills double and triple in recent years.

      The cable industry vowed to fight the proposals and threatened to
challenge the rules in court if they are adopted.  Telephone companies, eager
to enter a lucrative new business, applauded.

     "Today's action will create competition and offer consumers more choices,"
said James R. Young, vice-president of regulatory and industry relations at the
Bell Atlantic Corporation.  "Let's hope it's a beginning to the end of turf
wars."

     In essence, the commission recommended that telephone companies be allowed
to offer "video dial tone" over telephone lines that would carry programming
produced by outside companies.  Consumers could view whatever programs they
pleased and would be charged accordingly.

     Initially, telephone companies would serve primarily as a pipeline, not
producing the programs.  But the commission said telephone companies should
also be allowed to organize and package video services, as long as they make
their networks available to all programmers.  The commission also opened an
inquiry on whether to let telephone companies produce programs.

     The idea of allowing so-called video dial tone service has long been a
favorite of the FCC's chairman, Alfred C. Sikes.  Congress, which is weighing
regulatory legislation to rein in cable process has shied away from the issue.
Today's action makes it more likely that lawmakers will have to reconsider the
role of telephone companies in television.

     Before cable companies would feel much impact from today's FCC proposal,
however, most telephone companies would have to spend billions of dollars to
install new fiber-optic transmission lines and switching equipment that could
carry large volumes of television material.  Analysts have estimated that the
cost of converting every home in the country to a fiber-optic line would be
$100 billion to $200 billion and that it would take at least five years.

     Most large telephone companies, including all of the regional Bell
companies, already plan to replace their copper wires with fiber over the next
two decades.  The immense business opportunity posed by the $18 billion cable
television market is likely to accelerate those plans.

     High-capacity communications lines that reach every home in America could
radically alter the distribution of entertainment and enable people on home
computers to tap distant libraries and obtain information in seconds.

     "Both program providers and consumers would have chances they don't have
today, without the bottlenecks provided by cable companies and without the
bottlenecks of broadcasting," said Richard Firestone, chief of the FCC's common
carrier bureau.

     The move was immediately attacked by the National Cable Television
Association, which threatened to challenge any new rules in court.

     "Until and unless the telco's monopoly in voice telephone is ended, no
level of Government safeguards against cross-subsidies will be effective," said
James P. Mahoney, president of the cable association.

     The most controversial issue, which the FCC raised for discussion without
recommendation, is whether telephone companies should be allowed to produce
programming, a much bigger business than transmission.  Many Bush
Administration officials favor such a move, but television broadcasters and
producers bitterly oppose it.  Officials noted that such a shift would require
changes in the Cable Television Act of 1984.

     "Among the top two or three concerns of ever cable operator has always
been head-to-head competition against local telephone companies," said John
Mansell, a senior analyst at Paul Kagan Associates, a marketing-research firm
that monitors the cable industry.

     For telephone companies, the move could be a windfall.  Steven R.  Sieck,
vice president of Link Resources Inc., a market-research firm in New York,
said, "It's by far the largest market opportunity among the whole collection of
information services" for telephone companies.

     It remains unclear, however, whether the new rules will survive in court.
The Cable Television Act of 1984 bars a telephone company from owning a cable
television franchise in the same market.  The FCC ruled today, however, that
the law does not prevent a local telephone company from transmitting programs
produced by other companies and that it does not bar long-distance carriers in
any way.

     The Bell companies have lobbied strongly for legislation that would allow
them to enter the cable business, and several companies have invested in
European cable franchises.  In addition, Pacific Telesis Group, which provides
local phone service in California, already holds an option to buy a controlling
interest in a Chicago cable franchise, which could be [sic] permissible since
it is outside the company's telephone area.

     The commission also handed down a ruling that could give telephone
companies an important price advantage in future competition with cable
operators and could prompt protests from local governments, ruling that neither
a telephone company nor a video programmer needs to pay franchise fees to local
governments.

     Under the cable act, by contrast, local governments can charge cable
operators a franchise fee as high as five per cent of revenues.

     Explaining today's ruling, Mr. Sikes said, "We have segregation laws, and
these segregation laws should be ended."  He added that some cable companies
were already installing optical fibers in their own networks, and that some
were exploring the option of using their networks to offer telephone service.

     The proposals mark the second major change in longstanding restrictions on
the telephone companies' ability to move into new services.  Less than three
weeks ago, a Federal appeals court cleared the way for the regional Bell
companies to begin providing information services, like news, stock and sports
tables, immediately.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Phiber Optic or Twisted Pair?
~~~~~~~~~~~~~~~~~~~~~~~~~~~
by John J. Keller (Wall Street Journal)                        October 28, 1991
                
     Expanding the nation's telephone network into a vast television broadcast
system is going to cost tens of billions of dollars and won't be finished
before the end of the decade, say executives at some of the largest phone
companies.

     But the scale of the project isn't stopping the phone giants, such as GTE
Corp., Ameritech, Bell Atlantic Corp., and Pacific Telesis Group, from
methodically exploring how to implement such a system.

     The Baby Bells and GTE have spent several million dollars testing new
systems that carry cable TV shows into homes via the phone network.  The phone
companies will spend many million of dollars more before they are satisfied
that they have a service that matches the current voice phone system and tops
today's entrenched cable TV monopolies.

     Last week the phone companies were buoyed by a Federal Communications
Commission plan to support a new technology called video dial tone, that would
put the big phone companies into direct competition with local cable-television
monopolies.

     Phone subscribers could use such a system to dial up and order video
programs from an entertainment company through the same wire that connects a
typical phone call.  More important, allowing the phone companies could
generate enough traffic to fund "broadband" upper-capacity information highways
that could someday carry TV, medical information, and even FM stereo channels
into a home through a single wire, say the executives.

     However, big hurdles remain.  The FCC hasn't decided whether to let the
phone companies participate in the programming end of the cable TV business.
The phone companies argue that's a financial necessity, because cable TV
companies would be reluctant to share the programs they now support and run
them over a rival's network.  In addition, the 1984 Cable TV Act, which
prohibits phone company participation in the cable business, would have to be
rewritten.

     "We're encouraged by the FCC action, but it's not as complete a step as
there needs to be made," said Larry J. Sparrow, vice president of regulatory
and governmental affairs at GTE Telephone Operations, Irvine, Texas.  Adds
Kathleen Ahren, Nynex Corp.'s director of federal regulatory policy: "For us to
build facilities without anyone to use them would be irresponsible...
programming is essential."

     There are also technical issues such as whether TV service to the home
should be provided through a cable-TV-like coaxial cable or advanced fiber-
optic line.  Either would require pulling out existing "twisted pair" wiring
that now binds the phones in homes and most small businesses to the local phone
network.  Moreover, the phone industry must still hammer out technical
standards for melding video transmission, which requires tremendous
transmission capacity, with voice traffic, which uses far less.

     The system that is finally built will require mountains of capital to
transform the existing phone network into a high-capacity phone network of
systems that pump signals digitally through fiber-optic transmission lines,
which are glass wires.  "We've seen figures that it would cost about $250
billion nationwide," says James R. Young, vice president of regulatory and
industry relations at Bell Atlantic.  Adds Ms. Ahern, "I don't think our plans
would have us doing this in less than 20 years and if we do you're talking
billions of dollars."

     Pacific Bell, which spends about $1 billion a year on new network
equipment, would see that annual tab jump by two to three times in the first
several years of constructing a broadband network, says Michael Bloom, customer
premise, broadband applications at the San Francisco-based unit of Pacific
Telesis Group.  But he notices that as equipment purchases grow and the
technology is perfected the annual cost should drop down to current levels
after about four years.

     PacBell, like most other phone companies, already has installed fiber-
optic "trunking" lines to carry bulk traffic between its switching centers.
 It has also begun replacing copper facilities in some neighborhoods, running
optical fibers to the pedestal at the curb and then connecting to the regular
phone home wires.  Someday these lines will carry cable TV, but for now
regulation restricts the phone company to voice and data transmission, says Mr.
Bloom.

     Someday this will change, says the FCC, which envisions a service where
phone customers would turn on their TVs and find a listing of TV shows, movies,
news and other programs, supplied by the phone company and other programmers
and accessible via remote control.

     Several phone companies are already testing such services.  In Cerritos,
Calif., GTE has built an elaborate network of fiber-optic and coaxial cables
lines and advanced switching systems to deliver TV services to several thousand
customers.  One service, called "Main Street," allows a customer with a remote
control to shop via TV, check a bank account and even seek information on
colleges in the US.  Another service, dubbed "Center Screen," lets 3,900
residential customers call for a movie or a TV show by dialling a special
number.  A third service lets some customers talk to one another through a
videophone in the house.

     "We've found [from the Cerritos tests] that our customers like full-motion
video and not still pictures," which is all that's possible over today's
regular phone lines, Mr. Sparrow says.

     That's because regular conversation travels over phone lines at the rate
of 64,000 bits a second.  By contract, "reasonable quality" video, such as the
kind that appears from a VCR tape, requires transmission capacity of at least
1.3 megabits to 1.5 megabits a second.  High quality video will take capacity
of 45 megabits to 90 megabits a second, he says.  A megabit equals 1 million
bits.

     To save money and get as much capacity out of the existing copper-based
systems, Bell Communications Research, the Baby Bell's research arm, has
developed "video compression" technology which uses existing copper wire to
deliver TV to the home.  With video compression, a microprocessor squashes
video signals so they can be sent through a regular phone line at the rate of
1.5 megabits a second.  The little chip, which is in an electronic box attached
to the phone line, looks at an incoming video signal, and filters out the parts
of the moving image that are redundant.  The chip codes and sends the parts of
the signal that are different through the phone line to a receiving box, which
decodes and reconstructs the image before projecting it onto the TV screen.

     The cable companies hope to retaliate by providing phone service through
their cable networks.  They are funding research to develop switching systems
that can pass phone calls from one cable subscriber to another and out to
customers using the regular phone system.

     But the blood between the industries isn't all bad.  Ameritech's Indiana
Bell subsidiary and Cardinal Communications, an Indiana cable TV operator, are
testing a fiber distribution system made by Broadband Technologies Inc, of
Raleigh, NC.  The system is being used to route video and phone signals over
backbone fiber-optic lines and finally through coaxial and twisted pair lines
attached to homes in Tipton Lake, a Columbus, Ind. residential development.
Bell Atlantic is negotiating with Loudon Cablevision, a cable TV company in
Loudon County, Va., to test the transmission of TV signals through phone
company lines to 5,000-6,000 homes in The Cascades, a local housing
development.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Baby Bells as Big Brother                                      November 2, 1991
~~~~~~~~~~~~~~~~~~~~~~~~
>From The New York Times

     Two official decisions in October, one liberating and the other
frightening, may shape telecommunications -- and America -- for decades.  The
liberating decision, by the Federal Communications Commission, proposes to
allow the seven regional telephone companies to transmit TV programs.

     If implemented, that proposal for video-by-phone would free families to
tell cable operators, if they misbehave, to get lost.

     The frightening decision, by a federal appeals court, unblocked the same
seven "Baby Bell" companies from owning electronic yellow pages, video shopping
and other information services.

     Unless Congress intervenes, this decision will allow the Baby Bells to
exploit their monopolistic stranglehold over residential phone lines and
dictate what information reaches nearly every home.  The same principle ought
to govern in both situations: democracy needs diversity.

     Technological advances have brought the nation to a regulatory crossroad.
A single information pipeline -- perhaps fiber-optic cable, perhaps enhanced
coaxial or copper wire -- may soon pour an unimaginable array of phone, video
and data communications into homes.  Whoever controls the pipeline controls
access to American minds.

     The best protection against Big Brother is to separate control of the
pipeline from the information.  That could be easily enforced by requiring that
pipeline owners, like the Baby Bells, serve only as common carriers and lease
pipeline space to information providers on a non-discriminatory basis.

     Common carrier status is what the FCC proposal would achieve for video
services but what the appeals court decision would foreclose for information
services.

     Congress seems unwilling to impose common carrier status. But Rep. Jim
Cooper, D-Tenn., offers a second-best remedy.  As long as the Baby Bells retain
monopoly control over local phone service, he would allow each to sell
information only outside its own region.  His bill also offers stringent
safeguards against anti-competitive behavior.
   
     Yet the bill's provisions aren't as safe as common carrier status.  The
Baby Bells have frequently violated regulations; rules alone are unlikely to
stop them from subsidizing forays into information services with funds
extracted from captive rate-payers.

     Contrary to their claims, the Baby Bells have no special abilities to
provide electronic services.  If they could sell video shopping for a profit,
so could hundreds of other companies -- not one of which has the power to
intimidate ratepayers because not one has privileged access to their homes.

     Nor, as the Baby Bells claim, do they need to produce their own
information services in order to fill capacity on fiber-optic cables they might
lay.

     The strongest argument the Baby Bells offer is technological.  Only a
single company, they contend, will be able to marry pipeline and information.
But there's no proof of this speculation and besides, there are better ways to
manage the problem.

     The Cooper bill provides plausible protection against monopolistic Baby
Bells, giving them ample room to compete but limited room to exploit.

     Newspapers, including The New York Times Co., support the bill for
competitive commercial reasons. But there is a much more important reason for
the public to favor, and Congress to adopt, the Cooper bill: to protect the
free, diverse flow of information on which democracy depends.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Don't Baby the Bells                                          November 10, 1991
~~~~~~~~~~~~~~~~~~~
>From The New York Times

     Although the Bell companies are opposed by numerous groups, including the
Consumer Federation of America, the cable television industry and existing
providers of electronic information services, it is the newspapers that are its
biggest opponents.

     The publishers argue that the telephone companies can compete unfairly by
subsidizing their services with money from their regulated telephone businesses
and by imposing technical obstacles to competing information suppliers.

     But one of their biggest fears is simply that the telephone companies
could attract a large proportion of the classified advertising, a mainstay for
newspapers, by offering cheap and easy-to-use electronic bulletin boards.

     The newspapers are pushing Congress to adopt a bill introduced by
Representative Jim Cooper, Democrat of Tennessee, which would not allow a Bell
company to offer information services unless those services are already
available to at least 50 percent of the people in the area over an alternative
network.

     As a practical matter, the bill would reinstate the information-service
ban for all Bell companies for years, because of the difficulty in building an
alternative network that reaches most customers.

     To defend their position as more than a simple bid to keep out
competition, the newspaper association has crafted a blunt advertising campaign
around the slogan "Don't Baby the Bells."

     In one ad, the association warns that the telephone companies could amass
as much private information on customers as the Internal Revenue Service.

     But while many members of Congress are worried about giving new powers to
the Bell companies, the Cooper bill has thus far attracted only 24 sponsors,
and most experts doubt the bill can muster enough support to pass even the
House.

     Meanwhile, the Bush administration strongly favors lifting the prohibition
on information services and would probably move to veto a bill that kept it in
place.  The upshot is that newspaper publishers are in a difficult position.

     A stalemate in Congress amounts to a complete victory for the Bell
companies, because court decisions have already given them precisely what they
want.

     In Congress, however, aides to leading lawmakers say they are waiting in
part to see how much popular and political strength each side can muster.  "We
want them to show us what they can bring," one staff member said about the
publishers.

     One lobbyist allied with the publishers said opponents of the Bell
companies were essentially trying to build up a bargaining position. "You could
see this as the beginning of a minuet," he said.  "The question is whether they
will ever get into the middle of the floor and dance."
_______________________________________________________________________________



--------------------------------------------------------------------------------
 
Источник
www.exploit-db.com

Похожие темы