2600: The Hacker Quarterly (Volume 2, Number 7, July 1985)

Embed Size (px)

Citation preview

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 7, July 1985)

    1/8

    --- -- - ~ -Ii,I,600 --I' JULY, 1985I'II J'OU'\ff: 'TU'() \ { ' \ I IJ/ : ,R,\ I I I \

    ~ f ) I H I I " ruhl!',hcd tp. ~ N I I ' I t nh:rpn",:". Inl JIl l ' I l ' L ' m l l ~ \ , t . \ \ l r} !anl/ .111It l Suthcnpllon rate, S l ~ 1 'car. h month .... SI pc.:r had,,, I "U l ' O\cr,ca, Si5 I ~ c a r I l t c t lml ' . uh",I.:TlptIlHl ~ ~ h t J Ctlrpnl.Jt.: . r"Itln"lr ....t1lp ~ 2 " ' O O \ 1 a ~ L ' d ~ l ' l k , r , f \d l " l l ! 'folM'1 :. .. ;, , \\ 'ntct" _ W H ) , H " ' ' ' ~ 2 , ' v 1 , d d k l , l " n J , ' ' 1 1 ~ ~ ' - 1 I 7 ~ 2 Il,.,\ S \ h " ~ \ 2 f ~ M I HHS :!fIiV,f,J..I'1 \..,S, II ~ ~ - ' " ~ \ ~ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ------INTERESTING THINGS TO DO ON A DEC-20

    by The Knights of Shadow( RA geen on the late Sherwood Forest ][)The f i rs t t h i n ~ you want to do when youare receiving car-1er from a DEC system isto find out the rormat of login names. You~ a n do this by looking at who is on the.ystem. {DEC>,@ (the 'exec' level prompt)YOU> SY} SY is short for SYSTAT and showsyou the system status. You should be ableto see the format of login names. A SYSTATusually comes up in this form: Job, Line,Program, User. The JOB number is notimportant unless you want to log them offlater. Line is a number that is used tocommunicate with th e user. These are bothtwo or three digit numbers. Program te l lswhat program they are r u n n i n ~ under. I f i tsays 'EXEC' they aren ' t dOIng anything atal l . User is the username they are loggedin under. You can copy the format, andhack yourself out a working code. Loginformat ,is as such: {DEC> @ YOU> login user-name password}. Username is the usernamein the format you saw above in th e SYSTAT.After you hit th e space after yourusername, the system will stop echoingcharacters back to your screen. This i s ~ th e password you are t ~ i n g in. Remember,people often use the1r name, their dog'sname, the name of a favorite character in abook or something like this. A few cleverpeopie have i t set to a key cluster (qwertyor asdfg). pw's can be from 1 to 8characters long, anything after that isignored.Let's assume you got in. I t would benice to have a l i t t le helpL wouldn't i t?Just type a ? or th e word H E L ~ , and you'l lget a whole l i s t of topics. Some handycharacters for you to know would be th econtrol keys. Backspace on a DEC-20 is rubwhich is 255 on your ASCII chart. On th eDEC-lO i t is Cntrl-H. To abort a longl is t ing or a program, Cntrl-C works fine.Use Cntrl-Q to s t o ~ long output to th eterminal. This IS handy when playing agame but you don't want to Cntrl-C out.Cntri-T gives you the time. Cntrl-U willki l l th e whole l ine you are typing at th emoment. You may accidentally run a programwhere the only way out is a Cntrl-X, sokeep that in reserve. Cntrl-S to stopl ist ing, Cntrl-Q to continue on bothsystems.Is your terminal having trouble? Like i tpauses for no reason, or i t doesn'tbackspace right? This is because bothsystems support many terminals, and youhaven't told i t what yours is yet. You areusing a VT05 ( isn ' t that funny? I thoughtI had an Apple), so you need to t e l l i t youare one. ~ D E C > @ YOU> informationterminal} ' Info tertI also works. Thisshows you what your terminal is set up as.{DEC> assorted garbage, then the @ YOU> sette r vt05} This sets your terminal type toVT05. 2-41

    Now le t ' s see what is in the account(hereafter t ~ b r e v i a t e d acct.) that you havehacked onto. DIH is short for directory,i t shows you what the user of the code hassaved to the disk. There should be aformat l ike this: xxxxx.ooo xxxxx is th efi le name, from 1 to 20 characters long000 is th e fi le type, one of: EXE, TXT,DAT, BAS, CMD and a few others that aresystem dependant. EXE is a compiledprogram t h ~ t can be run (just by typing i tsname at th e @). TXT is a text f i le , whichyou can see by typing "tr,Pe xxxxx.TXT". 00not try "type xxxxx.EXE'. This may makeyour terminal do strange things and willt e l l you absolutely nothing. DAT is datathey have saved. BAS is a basic program,you can have i t typed out for you. CMD isa command type f i le , a l i t t l e to ocomplicated to go into here. Try "t.akexxxxx.CMD".By th e way, there are other users outthere who may have f i les you can use ( ~ e e ,why else &..II I here?). Type "DIR ona DEC-20 or "DIR [*,*1" on a DEC-lO. * 'a wildcard, and will allow you to essthe f i les on other accounts i f th e er hasi t set for public access. I f i Isn ' t setfor public access, then you wo t see i t .To run that program: {DEC> @ OU> usernamef i le name}. Username is t directory yousaw the fi le l is ted under, and fi le namewas what else but the fi le name?Remember you said (at the very start)"SY" which showed the other users on th esystem? Well, you can talk to them, or atleast send a message to anyone you seel isted in a SYSTAT. You can do this by:{DEC> the user l i s t (from your systat) YOU>talk username (DEC-20) send username(DEC-IO)}. Talk allows you and themimmediate transmission of whatever you/theytype to be sent to the other. Send onlyallows you one message to be sent, and onlyafter you hit . With send, they~ i l l send back to you l with talk you canjust keep ~ o i n g . By tne way, you may benoticing WIth the talk command that whatyou type is s t i l l acted upon by the parser(control program). To avoid the constanterror messages type either: {YOU> ;yourmessage YOU> rem your message}. Thesemi-colon te l ls the parser that whatfollows is just a comment. Rem is shortfo r 'remark' and ignores you from then onunti l you type a Cntrl-Z or Cntrl-C, atwhich point 1t puts you back in th e e x e ~ mode. To break the connection from a talkcODmland type "break".I f you happen to have p r i v s ~ you can doa ll sorts of things. First or al l , youhave to activate those privs. "Enable"gives you a $ prompt, and allows you to doanything to any other directory that youcan do with your own. To create a newaccount, using your privs, just type "buildusername". I f the username is old, y"c:)u can(continued on page 2-48) I

    http:///reader/full/Ctlrpnl.Jthttp:///reader/full/Ctlrpnl.Jt
  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 7, July 1985)

    2/8

    banking from your terminal-a look at PRONTO by Orson BuggyElectronic banking ~ ~ r v i c e s via personalc o m ~ u t e r and modem are springing up asvar10US banks try to jump on th einformation age bandwagon. This month 2600takes a look at one of the older and morevaried services available in the New YorkCity area.Chemical Bank's PRONTO provides a host ofb a n k i ~ g services a l l available for dialingup W 1 t ~ your personal computer and modem.After s1gning on with your account you canmake balance inquiries, transfer fundsbetween accounts, use th e bank's computerto keep track of your checkbook and budget,pay bi l ls to selected merchants, and sendelectronic mail to other subscribers. Allthis costs ~ w e l v e bucks per month and youget a check1ng account and cash machinecard thrown in too.Naturally, PRONTO includes numeroussecurity features to make sure that onlythose authorized to do so can plar w:th theaccounts. First of al l , you can t ~ a l l upPRONTO with just any dumb terminal. Youmust be using their special software. Thismeans that you can ' t even subscribe unlessyour c o m p u t ~ I ' is one of th e popular seriesthat they c:upport (Apple II , Atari,Commodore 64, Compaq, and IBM compatible).On to p of that, there 's ~ o u r personalpassword that you have to fork over eachtime you connect. Th s sounds ~ o o d enoughto keep th e a v e r a ~ e troublemak1ng hackerou t of their ha1r, but is by no meansbulletproof. I f someone eavesdropped on aPRONTO conversation he or she could easilypick up the codes needed to get into thataccount, since they're probably the sameones for each session (unless, of course,th e eavesdroppee has c h a n ~ e d the passwordlately). Of course, th1s hypotheticalintruder would need their own copy ofPRONTO software. But that would not bemuch of an impediment to many hackers.One bank officer, when presented withthis argument, countered with, "But there 'sreally nothing an intruder could do withyour account even i f they did manage tosign on to i t somehow. They could gettheir jo l l ies transferring money betweenyour accour,ts, but they can' t take any outfor themselves." PRONTO allows you to paybi l ls , but only to a selected l i s t ofmerchants. This has over 300 companies oni t , including other banks where you mightwant to make loan or credit card ~ a y m e n t s ,a l l of th e area ut i l i t ies , 1nsurancecompanies, several clubs, newspapers andother kinds of businesses that bi i l youevery month. I f there 's someone you wantto pay that 's not on th e l i s t you can askfor them to he included. Chemical claimsthis is a big security advantage over otherbanks' home services, since you can onlysend money to someone on their pre-approvedl is ts . Just in case the unthinkable shouldhappen, th e customer is l iable for thef i r s t $50 of a fraudulent electronicbanking transaction, just l ike in th ecredit card and cash machine services.Except in that case, the customer may bel iable for the f i rs t $500 (the maximum) i fhe or she fai ls to notify th e bank withintwo days of losing the bank card or accesscode.Chemical also provides another servicecalled PRONTO Business Banker. LikePRONTO, i t has slick promotional material

    2-42

    te l l ing the prospective manager how he canget complete control over his company'saccounts. The sel l ing style is a l i t t l edifferent, but i t appears to be basicallythe same service except with a few minorchanges for business customers.The way the money actually getstransferred when you pay your bi l ls is alsointeresting - - as of March when Chemicalreceived a PRONTO r e 9 u e ~ t for a paymentsomewhere, some clerk 1n New Jersey wouldactually write a check o u t ~ shove i t in anenvelope, and mail i t oIf. I don't knowwhether they've modernized this a t al l , butthey were planning to. Chemical alsospeaks of future e x ~ a n s i o n s to PRONTO, suchas news, home shopp1ng, and stock quotes.In th e bad old days, most banktransactions needed a human being'ssignature to be processed. Electronicbanking services rep-lace the handwrittensignature with a digita l identification.The security is fair ly good when i t comesto a handheld bank card, suitable fors t i c k i n ~ into cash machines wherever yougo, wh1ch otherwise stays in your pocketwhere no one else should have any access.But the home banking services take this onestep further - - the la test "signature" ismerely a computer identification code,which, l ike a common-carrier access code orcredit card n u m b ~ r , is only secure while noone else knows about i t .Citibank's recognition of your digita lsignature is rather disappointing. Theirf i r s t level of security is th e individualcopy of the software they give you, whichhas an embedded identification in i t . Thenext one is the number printed on your bankmachine card that they give you (shades ofth e ATT calling card blunders hsee page1-9]). The l as t one is the same personalidentification code" (PIC), a four to sixdigi t password, that is magneticallyencoded on your oanking card and must betyped in whenever you use their cashmachines. This puts a lot of strain on thePIC, since i t s disclosure would compromisebotn your cash machine and home bankingaccounts. Citibank warns you in theirl i terature to inform them immediately i f ,a m o n ~ other things i your banking softwareis lost or sto en". Either they don'tthink copying of that software is a threat,or they have (ha ha) copy protected i t .By the way, one of the other home bankingservices is called EXCEL from ManufacturersHanover (a.k.a. Manny Hanny). The only oneI know of of merit is PRONTO, and thereoni l because of th e electronic mailinc uded in the monthly fee. You wouldhave to be th e kind of person who writes alo t of monthly checks or has a diff iculttime making i t out to the nearest cashmachine in order to benefit from thoseservices.rCitibank's bank-by-phone system iscalled DIRECT ACCESS. We tried out thisone using a simulation disk which weordered for free through an 800 number.The people there were very hapPf to send usa demo-floppy for an IBM-Compat1ble. Thissystem several other services includingDow Jones.]2600 subscribers who have home bankingservices in their area are invited to writeback and te l l us what's going on in yourhome town. Any of your personal experiences (good or bad) with these serviceswould also be welcome.

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 7, July 1985)

    3/8

    --- - - - - --- - -=---= -- - - - - ~ = - = = = - - - - - - - -- - - - - -..... - -- - - - - - - - .... - ffiffiffiffi2 Billion ErrorAssociated P re .Somewhere in the federal bureaucracy, a clerk has made a $2billion error that will take an act of Congress to correct.When Congress was scurrying around last year for ways toreduce the federal deficit, a natural target was the 3 percentexcise tax on telephone service. which was due to expire at theend of 1985. The lawmakers voted to extend the tax through1987. But after the law containing the telephone tax andhundreds of ether tax provisions was signed by PresidentReagan, some body noticed that 1985 had been deleted from thelist of years to which the telephone levy applies.

    That oversight is being rectified in something called the"Technical Corrections Act of 1985." Such corrections havebecome commonplace in recent years because Congress hasbeen changing the laws with regularity. The 1984 law that the1985 bill is correcting was so voluminous that the staff of theJoint Committee on Taxation took 1,257 pages to explain.ITT CrackdownRadio Electronic .An ITT Corp. task force, the FBI, and other law enforcementagencies are engaged in a major crackdown on illegal users ofthe ITT Longer Distance telephone service. That service isprovided to residential and business customers in 113 majormetropolitan areas. To place a call on the system, customersdial a special access number, then the phone number they wantto call, and finally their authorization code, which bills the callto the customer's account.In one ~ a s e , an FBI investigation led to the indictment of aformer ITT employee who was charged with selling ITT'sauthorization codes. The codes were sold to a New Jerseycompany, which used them in a nationwide campaign to sell itsproducts through its large telephone sales force.GTE Sprint Cheats CustomersNe_rStar-LedgerGTE Sprint has been sued for allegedly overcharging itscustomers millions of dollars on calls made duringThanksgiving and Christmas.The class action suit was filed in Super ior Cour t by the LosAngeles-based Center for Law in the Public Interest. Acomplaint was also sent to the California Public UtilitiesCommission.The suit alleges the company charged regular daytime ratesfrom 8 am to 5 pm on November 22, 1984 and December 25,1984 instead of the lower evening rates which it advertised.The overcharges were estimated at $2 million to $4 million.

    Listening In On Cellular PhonesliSA TodayCar-phone owners, beware. For $350, an eavesdropper cansnoop on your cellular-radio conversations. It's random andbasically anonymous, but it's snooping nonetheless. "Verysimply, as long as radio waves are being transmitted, we canlisten in on them," said a Vienna, Virginia electronics salesmanwho sells cellular-radio scanners made by Indianapolis-basedRegency Electronics.More Phone FraudToday MagazineCrackers in at least three majorcities have been blamed for a

    $60,000 phone bill that was sent to a Californian man whos(stolen credit card number was apparently posted on a runderground network of computer..BBS's. Officials with GTESprint Communications Corp. told the Associated Press ~ h a l computer vandals in Atlanta, Baltimore, and New York usedthe Sprint number of Robert Bocek to charge more than250,000 minutes of calls in two months. Sprint spokesmanMike Furtney said "an investigation is underway" with lawenforcement officials in the three East Coast cities and a t leastseven others. Bocek's mid-December bill ran 722 pages, listed17,311 calls totaling 256,697 minutes, and costing $55,562.27,not countingan $8,197 "volume discount. "[Computer vandals,eh? What if they used a car to drive to the payphone, are theycar thieves? Aren't computer vandals people who wreckcomputers?]Computers Monitor TruckersTIle Wall Street JournalLeprino Foods Company of Denver has outfitted its entiretrucking fleet with portable computers that hook up to sensorsin a truck's engine and transmission. The devices gatherdetailed information abouta truck's trip: what times it stoppedand started, how fast the engine ran, how fast the truck wasgoing throughout the trip.The last statistic is especially potent at Leprino, which wieldsboth carro t and stick to encourage its drivers to stay under 60miles an hour. A trucker gets a bonus of three cents a mile forevery trip he makes without breaking 60.But the first time a printout shows a driver sped at 65 milesanhour or faster, he gets an official reprimand. The second time,he is suspended without pay for a week. The third time, he isfired. Leprino has fired half a dozen truckers for speeding sincethe computers started to be installed about three years ago.Drivers at Leprino aren't enchanted with the system. "Istarted driving trucks because I'm kind of an independent sortof a guy that didn 't like having the boss always looking over myshoulder," says E.K. Blaisdell, a former Leprino driver whorecently became a dispatcher. "Then they managed to invent amachine that looks over my shoulder."Missing Children's Faces DisplayedCombined News Services

    Pictures of missing children are being flashed on anelectronic billboard in the Times Square area of New York Cityas part of a new city drive to find the youngsters. Children'sfaces and a brief description are flashed on the screen in 30second spots, twice an hour between 8 am and midnight. Theyare followed by the phone number of the police department'smissing persons bureau and a. plea that reads: "Please Help."In Missouri, the nation's third largest movie theatre chainannounced it would begin a program" to help find missingchildren through slide shows in theatres in I03 cities. AmericanMulti-Cineml!- will feature two children each month. Slidesbearing photos of the children and thei r hometowns, ages, anddates of disappearance are to appear at least four times beforeeach screening.Children's faces are also appearing on milk containers, andnew technology is being used to project what these children willlook like in I, 2, or 5 years. [Right now, they are only using thiswith innocent missing children. Big Brother finds little bro ther,easy as pie. It's quite possible that criminals' faces will beshowingup in these places in the near future, followed by thoseof suspects or malcontents. I f not here, then somewhere ... ]

    2-43

    http:///reader/full/55,562.27http:///reader/full/55,562.27
  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 7, July 1985)

    4/8

    LETTERS I 've seen ~ i l e s of examples ofinaccurate bill ings from alternate longdistance companies (mostly resulting froma lack of called party supervisioncontrol). Automated data calls are th ebiggest culprit--where the other enddidli' t answer or was busy I and the modemtook about a minute to timeout (typical

    setting for a long distance cal l) . Thecal ls charged as i f they had been answeredin each and every case. There are manymore mundane cases that are generallyknown--the C-SPAN cable service had someproblems since they le t the ~ h o n e s keepringing on their talk shows untIl they areready to put people on the air . Thus, thephones might ring for five or te n minutesor more, and many people just got ringingand eventually gave up. Guess what? Thepeople call ing via alternates discoveredthat they had gotten billed for ~ h o s e calls--even though they were n o n - a n s w ~ r e ~ . Lots of them. Now iT a company wants tomake i t a policy that you pay fo r a llcal ls whet he'" they are ' answered or notthat exceed a certain duration l I guessthat 's OK, b u ~ nobody doing this nas everaa.i t ted publicly that that 's what theydo! In fact, i f you confront them withthe question they deny i t as often as not(most l ikely because they don't understandwhat you're talking about because they'venever been told what's going on!).The l i t t le guy who makes a few longdistance calls a week doesn't have toworry about call ing up the alternate 'sbusiness office once a month to clear offa couple of bad billings. But many businesses are in exactly this sort ofsituation, and needless to say they canget a bit t i red of i t pret ty quickly.We'd l ike to cOJllpi1e a l.J.st o f longdistance COIIplUJies that charge for unanswered calls and busy silfDa1s. I t couldprove invaluable to consu.ers who areshopping around. If you MHlt to he1R uson this , cal l or write us. We'd also l iketo know how lIIuch o f a hassle each cOlllpanycreates for reIlloving wrong mBtbers frOlBthe bi l l .About that white box art ic le you printedin April--I buil t one soon af ter I readthe art ic le on OSUNY and found out that i treally doesn't matter whether you use onenine-volt battery or two. The tones areslightly louder with two batteries, butusing one battery is a lo t more convenient. Since when the pad s i t s in atelephone i t is powered by the 7-9 volts"off-hook" voltage that the phone l inegives you, i t would seem strange that i twould reqUire 18 volts si t t ing by i t sel f .I go t my f i r s t issue of 2600 yesterdayand was fairly impressed. You convincedme to buy Out o f the Inner Circle, and Iam almost finished with i t . Somehow Ican ' t get over ~ i l l ' s confusion aboutbits-per-second and baud (see page 45).Too bad nobody knows anything about IBMsystems; they are the mostfun! I will betrying your BBS again tonight - - and every

    page 2-44

    night until I get through. Birmingham. ALI(hen trying th e BBS (2013664431) , youwill [Jet through JIIore frequently if yo utry repeatedly within a short period o ftiJlle. Most users cannot reIllain on forlonger than ha l f an hour so you should getthrough when they hang up. I t ' s also agood idea to try "non-peak" hours, such asth e JIIidd1e o f a ffleekday. Those interestedin uploading an art icle can do so bysending J//ai1 to "2600 MA.GAZINE". You canthen send up to 10 0 l ines o f text . Wehandle XMOOEM transfers at the of f ice(5167512600). Best tiJ/le to reach a hUJIIBIJi s between 6 pJ6 and JIIidnight, fflee.kdays.Would you have any information on th eavailability of a back-pack microwaveunit with both line-of-sight andsatel l i te capability, with some type ofagreement for paid time/use on satel l i techannel? I was recently told of this andhave not as of yet found any info on theequipment/package. Gulfport, MSNo one here knOfflS anything about such adevice, except that it probably existssOll1eff1here. In a l l l ikelihood, it wouldn'tbe consumer-oriented. Our readers areprobably the best people to ask.How can I obtain back issues of 2600?Every issue o f 2600 i s available as aback issue. Since our f i r s t issue fflBS inJanuary o f 1984, that means there arecurrently 18 available, not counting theone you're reading. Currently, we onlyhave a Table o f Contents for 1984, but1985 back issues are also available. Eachissue i s $1 an d you can order theJ/1 a t ourregular address (Box 752, Middle Island,NY 11953-0752).Incidentally, you JIIay have noticed achange in our envelopes. We used to havea stBll1P that looked l ike this:11953-0752

    ADDRESS CORRECTION DEMANDEDI t was our tongue-in-cheek version o fthe acceptable ' ~ d d r e s s CorrectionRequested", although sOJ//e o f our readerstook it to J//ean that we wanted to receivefrequent address updates froJ// thelll andthey kept us infoI7lled o f their whereaboutsat a l l tillles. A.pparent1y a postal czarsOlllefflhere caught s.1ght o f this an d issueda decree that such statements wereunacceptable. We f e l t it in the bestinterests o f our readers to change theoffending statement, as an angry postoff ice benef i ts no one. We were alsoadvised not to use our nine-digit . z ip codeas our only return address. Even thoughthe code i s total ly unique and leadsdirect ly to us, this systeJII "is not beingused yet" according to the people whoimplemented it a couple o f years ago.LETTERS AOORESSBox 99, Middle Island, NY 11953-0099SUBSCRIPTIONS .AND BA.CK ISSUESBox 752, Middle Island, NY 11953-0752

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 7, July 1985)

    5/8

    The 2600 Information Bureau d

    KILNET TAC DIALUPS SORTED BY LOCATION 22-JAN-95State/Country 300 Baud 1200 Baud 1200 Type Stlh/Country 300 bud 1200 Baud 1200 Type

    ALABAKA FLORIDAAnniston ArlY D.pot Eglin AFB(ANNIS-KIL-TAC) (205) 235-62B5 (R4) (205) 235-7650 B/V (AFSC-AD-TAC) (904) 882-3242(904) B82-324BaPlease note: When accessing the Anniston TAC you lust (904) 8B2-8202 (904) 8B2-8202 B/Vfirst enter a L then enter DDN

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 7, July 1985)

    6/8

    "ILNET TAC DIALUPS (Continued)itate/Country 300 Baud 1200 Baud 1200 Type

    NEil JERSEYDover(ARDC-TAC) (201) 724-b731(201) 724-b732(201) 724-b733(2011 724-b734(201) 724-b731(2011 724-6732(201) 724-b733(2011 724-b734

    B/V8/YB/V8/YFort "onlouth(CORADCO/'l-TAC) [no dialups](CORADCOI12-TAC) (201) 544-4254 (R3) (201) 544-2430(201) 544-2b3b(201) 544-2638(201) 544-2777

    BBBB~ E W /'IE XI COA l b u q u e r ~ u e(AFIIL-TA ) [none k n o ~ m l ~ h i te Sands(W5/'1R-TAC) (505) b78-3336 (FTS) 898'Please note, ~ h e n accessing the White Sands /'Iissile Rangehost cOlputer through one of these TAC phone nUlbers youlust first 90 thrJugh the f o l l o ~ i n g steps before openingthe connectlDftJ .ENTER CLASS ddnet3 (CR) GO (CR>

    (50S) 678-3701 (FTS) 898(50S) 678-6431 (FTS) 898(50S) 678-1438 (FTS) 898(50S) b78-1354 (FTS) 898~ E W YORkGriffiss AFB(RADC-TAC) (315) 339-4913 (RS)(315) 337-2004 (315) 337-2004 8/V(315) 337-2005 (315) 337-2005 B/V

    (315) 330-2294 (315) 330-2294 (FTS) 952 B/V(315) 330-3587 (315) 330-3587 (FTS) 952 B/VNORTH CAROLINA

    Ft. Bragg(BRAGG-I1IL-TAC) tnone k n o ~ n l OHIOIIright-Patterson AFB(NPAFB-TAC) (SI3) 258-4218(513) 258-4219(513) 258-4987(513) 258-4988(513) 258-4989(513) 258-4990OKLAHO/'IATi nker AFB(TINkER-/'IIL-TAC) [none k n o ~ n ] PENNSYLVANIAN e ~ CUlberland Arlr Depot(NCAD-I'IIL-TAC) none knownl(NCAD2-"IL-TAC) [none known]

    TEXASBrooks AFB(BROOKS-AFB-TAC) (512) 536-3081 (Rb) (512) 53b-3081 (Rb) 8/VUTAHDugway Proving Ground(DOGWAY-/'IIL-TAC) [none known]VIRGINIAAleundria(DARCOI'I-TAC) (202) 274-5300 (202) 274-5300 B(202) 274-5320 (R6) (202) 274-5320 (Rb) 82-46

    Stlte/Country 300 Baud 1200 Baud 1200 Type

    Arlington(ARPAl-/'IIL-TAC) [none known] (ARPA2-"IL-TAC) [none known] Dahlgren(NSilt-TAC) [no dialupsj contact liaison for access] /'IcLean(DDN-P"O-"IL-TAC) [none known] ("ITRE-TAC) (703) 442-8020 (RIS)(703) 893-0330 (RIO) (703) 893-0330 (RIO) 8/VNorfolk(NORFOLk-I'IILTAt) (804) 423-0241 (R2) (804) 423-0241 (R2) 8(804) 423-0247 (R2) (804) 423-0247 (R2) 8(804) 423-0346 (R4) (804) 423-034b (R4) 8(804) 423-0480 (804) 423-0480 B(804) 423-0486 (R2) (804) 423-0486 (R2) 8(804) 423-0489 (804) 423-0489 B(804) 423-0570 (804) 423-0570 B(804) 423-0572 (R2) (804) 423-0572 (R2) 8(804) 423-0577 (R2) (804) 423-0577 (R2) B(804) 423-0651 (804) 423-0651 8(804) 423-0b54 (Rl) (804) 423-0b54 (R3) B(804) 423-0841 ( ~ 2 ' (804) 423-0841 (R2) 8(t04) 423-0845 (804) 423-0845 8(804) 423-0849 (804) 423-0849 B(804) 423-0858 (804) 423-0858 B(804) 423-0950 (804) 423-0950 8(804) 423-0952 (804) 423-0952 B(804) 423-0955 (R3) (804) 423-0955 (R3) 8(804) 423-0959 (804) 423-0959 8Reston(DtEt-TAC) [none known] (DCEC-"IL-TAC) (703) 437-2892 (RS) (703) 437-2928 (703) 437-2925 (703) 437-2929(703) 437-2926(703) 437-2927

    GER"ANY(FRANkFURT-I1IL-TAt)(H) 2311-5641 (R8) BkOREA(kOREA-TAt) (11) 2b4-4951 (R8) B

    Notes:1. "(RIO)' following phone nUlber indicates a rotary with10 lines.2. For alternate phone nUlbers, FTS=Federal Telephone Systel.3. (11) ="i l i tary DoD Telephone Systll.4. '1200 Type' refers to the lodel cOlpatibility for1200 baud only:8/V = 8ell and Vadic 8 = 8ell 212A on1r V = Vadic 3400 on y5. This list is contained in the file NETINFD:TAe-fHONES.LISTat SRI-NIC.b. This list Nas obtained for 2600 courtesy of The PrivateSECTOR BBS: (201) 366-4431.

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 7, July 1985)

    7/8

    E Y S T t f j R T ~ C R L L Y S P E R r l ~ ~ [ j MCI Expanding With Optical FibersWall Street JournalMCI Communications plans to spend about $400 million toexpand its U.S. telecommunications network by adding opticalfiber routes ,,] the Midwest and elsewhere. [Optical fibers arethin, flexibk fibers of glass or plastic that transmit voices,television prugrams , and data in digital form, with on / off laserpulses representing zeros and ones. This gives greater fidelity tothe signals with less distortion from electrical interference.Moreover. because the laser beams are so narrow, the glassfibers can carry more i,.,rJrnl'ltion than do copper wires. Anoptic fir: .aule less t . .1n an Inch thick, for instance, can carry4O.()()(j phone calls s i m u l t a n e o u s l y ~ a job that would requireseveral ropper-wire cables, each 4 to 6 inches thick. The diodelasers found in optic fiber systems are tiny crystals, some nolarger than a grain of salt, that emit a beam of light whenelectrically stimulated. They consist of such materials asindium, gallium, arsenic, and phosphorous, mixed in specificproportions. Currently, MCI operates an optical fiber systembetween New York and Washington.]

    The company has obtained rights to 7,300 miles of railroadright-of-way. Along with other improvements, the project willincrease the long-distance telephone company's transmissioncapacity 8 ( ) 1 ? ~ by year's end.The First 100% ESS Staterhe Hackensack Record

    !By 1988, New Jersey will be the first state in the country toconvert all of its 250 central offices to Electronic SwitchingSystems. As a result, all kinds of new services will be poppingup [such as instant detection of all phone phreaks!]. One suchservice will allow users to learn who is calling them before theypick up the phone and to program the phone to assigndistinguishable rings to certain callers.In addition, the company plans to introduce REACT, aburglar alarm system connected to the telephone. It informs thephone company if an alarm is triggered or a phone wire is cut.TIle phone company, in turn, will contact the burglar alarmcompany. [Presumably, somebody will wind up calling thecops .... ]E-COM Really On The Way OutWJlt Street JournalThe Postal Service intends to fold its money-losing electronicmail service if it doesn' t find a private buyer for it by the end ofthe summer.Postal officials have been searching since last summer for abuyer for E-COM. The service is used by about 900 (?!)customers to transfer messages electronically to post offices fordelivery via regular mail, usually within two days.AT&T Put On HoldUSA r o d a ~ The FCC delayed until October I a decision on an AT&Tplan to offer 15% discounts on long-distance bills in return for amonthly $25 fee. AT&T had wanted the plan, aimed at smallbusinesses, to begin on May I.GTE Now Bigger Than AT&T't"1A York P l l ~ \

    GTE Corporation has become the nation's largest utility as aresult of the breakup of the American Telephone and TelegraphCompany. according to Fortune \1agazine. GTE had been aperennial second to giant A T&T.

    Pentagt'n Steals Cray From AT&TLast J lOWry , AT&T's Bell Labora tories developed a 1-million-bit c ',nputer chip four times more powerful than themost advanced Japanese or America!) chip. But the n.lce g o e ~ on. To proceed to the next level of chip development. Bellwanted a Cray X-M P supercomputer, made by Cray R e ~ e a r c h

    of Minneapolis.Bell placed its order with Crayand delivery was scheduled forAugust -until tl:e Pentagon stepped in. General D y n a m i c ~ Corp. also needeJ a Cray X-MP to do research on the F-l (, letfighter. Cray told General Dynamics to wait its turn. GencralDynamics appealed to the Pentagon and, under a 35-\ca r-old.Korean War-era law, got priority over Bell on the ground, 01national security.Bell's microchip research will be delayed up to fourmonthsa critical amount of time in the technological race again,t

    Japan. To Dr. William O. Baker, retired chairman of the boardof Bell Laboratories and a member of the Presldent\Intelligence Advisory Board, the issue is indeed critical."We would feel that the design of a four-megabit chip (theobvious next generation of chip) is as vital as any matter thatconfronts the country at the moment.. .. The Pentagon \allocation of resources to the military is very unskilled and ver:.naive."NSA Chooses AT&T Computer

    The National Security Agency has chosen the AmericanTelephone and Telegraph Company to supply it with up to S94('million in minicomputers and services for a new, classifiedproject.The contract appeared to be one of the largest for thepurchase of sophistiCated computer systems by the intelligencecommunity. Officials of the NSA, the largest and most secretiveintelligence agency in the United States, did not say how thecomputers would be used. But industry sources and intelligenceanalysts suggested that the NSA would deploy the machines atits headquarters in Fort George Meade, MD, and in fieldoffices around the world and would use them to help encodeand decode data flowing through the Government'scommunication networks. A spokesman for the NSA said themachines were for a "new purpose" and would involve "manyunits, spread out over a number of places." Sources ind icatethat the contract calls for up to 250 of AT&T's most advanced3B line of super-minicomputers.IBM Gets Bigger/Goodbye SBS

    IBM has announced that it will acquire a major stake ofMCL the nation's second largest long distance telephonecompany. In the agreement. IBM's SBS-Skyline will mergewith MCI. This action comes less than eight months afterIBM's acquisition of the Rolm corporation, which m a k e ~ telephone switching equipment.Together, MCI and SBS-Skyline will have one of the l a r g e ~ t computerized transmission networks in the natIon for voice.data, and pictures. Consisting of optical fiher. microwave. anathree of SBS's satellites, the new network will sene ahout 2.7million customers.

    Gunnar Hughes, a spokesman for Skyline, said they willcontinue to offer the same service, but will eventually mergewith and become a part of MCI. Hughes Silld that "'togetherwith MCTs terrestrial systems, there will he a synergy. "There I ,no word yet on any new rate structures for Sky line u ~ e r s , hutSkyline has vowed 10 inform cu,tOl11er, " ' e v c r ~ '>tcr 1lI the \\il\ "2-47

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 7, July 1985)

    8/8

    (colllinuedfrom page 2-41)DEC-20'sedit i t . I f i t is new. you can define i tto be whatever you wish. Privacy meansnothing to a user with privs. There arevarious levels of privs: Operator. Wheel.CIA. Wheel is the most powerful. beingthat he can lo g in from anywhere and havehis powers. Operators have their powerbecause they are at a special terminalallowing them the privs. CIA is short for'Confidential Information A c c e s s ' ~ whichallows you a low level amount 01 privs.Not to worry though, since you can read th esystem log fi le which also has th epasswords to a l i the other accounts. To

    de-activate your privs, type Itdisable lt When you have playea your greedy heart out,you can finally leave th e system with thrcOlDl8Dd It logout It. This logs th e job YOtare using off the system (there may b,variations of this such as kjob, 0. \killjob). By the way. you can say ( i f youhave privs) tt logout username tt and thatki l ls the username's terminal.There are lIany more cOJlllands so try themout. Just remember: leave the account inthe same state as you found i t . This waythey may never know that you are playingleech off their acct.

    Announcing The Great 800 Scanl *** Right now. phont: phreaks and hackers alund the counby arecalling thousand::; of 800 numbers in an effort to collectinformation. Soon an amazinc list of computers. voice mailsystems. extenders, PBX's, test r.umbers. and service numberswill be compiled! And can be a part of this. Just: Pick your favorite 800 exchange (8OO-EXC-)()()()Q Makesure yourexchange snlalreadybeing scc:Iuled Then dial away, laking note of what you find

    an d what area code you're calling from.FOR MORE DETAILS CALL CXJR OFFICE AT 516-751-2600 AND ASK TO SPEAK TO AN 800 SCAN COORDINATOR.

    We will be keeping track of what has alreadybeen mapped out. Remember, this activity isFREE and LEGAl!!

    The Private Sector Has Gone 10 MegrTheofficial bulletin board of 2600 now has even more nfoto share with our new 10-megabyte hard disk drive.Access is open to all! We have the following sub-boards:Media/NewsAltlcIesB8S sing Telcom QuestionsTelcom ElectronicsTrashing SecurityComputers. NelworkingCall The Private Sector for the most interesting andintelligent talk on telecommunications and computersthat ~ mex,;em will ever find!Call Today' 201-366-4431 (300/1200)

    ***** INFOWANTED *****il l pay reasonable price for: Telco servicerep manual Info on toll libraries Library codes Remobs Also would like to meet 2600 type people in Chicago area

    MR. THORHAMMER P.O. BOX 8-STATION F BUFFALO, NY 14212

    2600 is always looking for information that we can pass onto you. Whether it is an article, data, or an interesting newsi tem-if you have something to offer, send it to us!

    Remember, much of Z600 is written by YOU, our readers. NOlE: WE WILl.. ONLY PRINT A BYLJNE IF SPECIFICAlLY REG..lESTID.

    Call our office or BBS to arrange an upload. Send US mail to2600 Editorial Dept.Box 762Middle Island, NY 11953-0762(516) 751-2600

    .\ \ (I", a n ( l t h ~ r banI.. m a c h i n ~ ! 2-48