Copy Link
Add to Bookmark
Report

Catslash Issue 07

eZine's profile picture
Published in 
Catslash
 · 5 years ago

  


%%%%%%% %%%%%% %%%%%%%%%%%% %%%%%%%%
%%% %%% % %%% %%%
%%% %%% % %%% %%%
%%% %%%%%%%% %%% %%%%%%%%
%%% %%% % %%% %%
%%%%%%% O %%% % O %%% O %% O
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
The Canadian Anarchy Technology Society Presents...

______ _________ _______ /| /|
/ _____\ /\ \__ __// ____/| | | |
| | / \ | | / /____ | | ____ ____ | |
| | / /\ \ | | /_____ / | |/__ |/ __/ | |___
| |_____ / /__\ \ | | _____/ / | | _/_ |\__ \ | __ \
\_______\/ / \ \ \ //______/ \ //_/_\|/___/ | | | |
\/ \/ \| \| \/ \/

|\ /| --- --- --- --- | |\ | ----
| \/ | |___|| __ |___| / | | \ | |_
| | | ||___| | | /__ | | \| |___

Issue #7
February, 1997!
Edmonton, Alberta,Canada
http://members.tripod.com/~catslash/index.html
E-mail:catslash@probfate.alive.ampr.ab.ca
or call Bethlehem at: (403)477-2351
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Well, issue 7 is here! We have some pretty good stuff this month,
and you should have a ball with it!

There were also a lot of comments about the garbled text on the tops
of our files and in our DIZ. This was the fault of our text program,
and should now be fixed.

We are also announcing something cool. Since this month had 'random
acst of kindness week', then in March we should have 'random acts of
violence month'. So from March 2-8, we hope you join us in our
violent actions.

And finally, we have started to fix up our web pages! They were
starting to look rejected, and it turned out our Mac Issue page had
crashed and we were just uploading to an inaccessable FTP! That
should be fixed soon. Also, keep an eye out for the CATS web page.
It will have links to all kinds of files and good H/P/A pages.

_____________________________________________________________________
| CATSlash Contents |
| - Issue 7 - |
|___________________________________________________________________|
|1. Intro |
|2. Free Internet with Compuserve! |
|3. Simple Grenade |
|4. Vengence Column |
|5. Hacking MacJanet part 1: The Server |
|6. Explosive Tester |
|7. CSIS is watching you |
|8. Connection Corner |
|9. Top Ten |
|9. Other CATSlash Info |
|___________________________________________________________________|

We are user supported, so feel free to send in any articles you deem
suitable for this magazine. Make sure to include your alias, so we
can place your name in the file's intro. If you are interested in
becoming a full time CATSlash writer, send us a letter saying you
want to do so, and we will include you in the best 403 magazine you
can write for! To E-mail comments, articles, questions (relating to
H/P/A), Connection Corner info or whatever else send to:
catslash@probfate.alive.ampr.ab.ca
or call Bethlehem (403)477-2351 and mail Jeriatrick or Poison Ice.
_____________________________________________________________________


---------------------------------------------------------------------
\ Free Internet With Compuserve /
\ By: Jeriatrick /
\___________CATSlash Magazine - Issue 7, February 1997__________/
'''''''''''''''File #2 of 9'''''''''''''''
'''''''''''

In issue 2, we told you how to get access to Compuserve by putting a
fake credit card info into the signup program. We also mentioned that
you could not get internet access, because they would have to mail you
your second password. Well, that is no more, at least for the Mac
users (This probably won't work for PCs!).

What you need to have:

1. The old Compuserve signup package which includes Mac CIM 1.0 and
the Signup program.
2. About 30Mb hard disk space (Don't worry, you will get most of it
back)
3. An hour or two on the modem

Now make sure we have all this stuff, as it is very important. Now
we need to get MacCIM 3.0:

1. Install Mac CIM 1.0 and the signup software
2. Using the Signup program, fill in all false info. For the Credit
Card info, use a program like CrayZ Carder or CCS Mac.
3. Uncheck all requests for stuff like Compuserve Magazine and
promotional mail.
4. Call their number, and follow the instructions to get a new
account. After registering, press the 'Launch MacCIM' button
5. Now when the Connect window pops up, choose 'Continue'
6. Open up the preferences, and type in this string before
compuserve's number: *70,,,*67,,,,,,,
7. Now, from under the File Menu, choose 'Connect'
8. Once connected, double click on the Internet icon. This will bring
up a window telling you your version of MacCIM is outdated.
9. Double click on the 'Download MacCIM' option, and from there,
follow the buttons, and download MacCIM 3.0. This will take a long
time. My 28.8 modem took and hour and a half. It is about 8Mb.
10. Once finished, quit out of MacCIM 1.0, and install MacCIM 3.0.
It is about 20Mb. If you have Netscape (the best internet
browser!) tell it not to install Microsoft Internet Explorer,
and it will only take about 15Mb.
11. Delete the MacCIM 3.0 Installer. Then in the MacCIM 1.0 folder,
take out the 'Signup' program, the 'signup files' folder, and the
'signup data' file. In other words, any files associated with
signup, you keep! Then delete whatever else is left out of the
MacCIM 1.0 folder.

Now it is installed, and you are ready to go. I'll explain what
happened, and why you can get this software. Basically, Compuserve
3.0 (and 4.0 on the PCs) come with their own signup programs, and
internet capability. The only problem here is, that these programs
only allow you to signup once, so you cannot do the process described
in CATSlash issue 2. However, they forgot one thing. Mac users have a
separate signup program that they can use!

Ok, now, if you only want internet, you can delete the whole CIM3.0
folder, because Compuserve PPP will launch when you open Netscape.
If you want to use any other services though, keep it around.

Now, to use the internet (this must be done every time!)

1. Open up signup
2. Change the Credit Card number
3. Follow the rest of the signup process and write down your
usernumber and password.
4. Open up 'Compuserve Dialer' from your 'Control Panels' folder.
5. Under the 'sessions' menu, change your usernumber and password to
your new one.
6. Change the number to include *70,,,*67,,,,, if it isn't already
changed.
7. Quit the Compuserve Dialer and launch Netscape.
8. If all goes well, you will connect and get internet!

One account number will last you up to a whole day. Once it is over,
you must use the signup program and create a new account. If
Compuserve kicks you off in about an hour while you are on the
internet, quit Netscape and launch it again. No need to create a
new account like on BIX!

MacCIM 3.0 is really a crappy program, it is slow, and has hundreds of
bugs in it. If you are going to just browse Compuserve, stick with
MacCIM 1.0. MacCIM 3.0 is really just good for internet browsing.
But like I said, for making your WWW page, accessing CIS forums,
or stuff like that, you will need it.

And, if the CIM Telnet browser is crappy, set up Internet Config to
use Black Night as the Telnet program, then visit the site with
" telnet:// " and enter the Telnet address after it. It will use
Black Night as the program, which is better (it has ANSI).

I hope you have fun with this, and make sure you visit our web page!


---------------------------------------------------------------------
\ A Simple Grenade /
\ By: Boom Boom /
\___________CATSlash Magazine - Issue 7, February 1997__________/
'''''''''''''''File #3 of 9'''''''''''''''
''''''''''''
This is very handy and will be used in other articles:

__ __
/o \/\/ o\
\ || /
\ || /
\ || /
||||
||||
|||| <-------- Toy Cap Grenades
|\/|
|--|
|\__/|
| ## |
|_##_|
\_ _/
\/

~~~~~~~~~~~~~~~~~ Fuse ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~ ____________ ~
~ Paper--> |____________| Put model glue on paper. Let ~
~ sit 'till almost dry, then ~
~ sprinkle gunpowder on glue. ~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

_____
Tube for ----->| []<--- Slot for
cap grenade | | fuse
| |
| |
|_____|

Assemble as shown:
____________________________________________________
| __ <---- Fuse |
|_/_________________ Gunpowder |
/|/ \________/ /| (fills toilet paper roll) |
Cap --> C| || ________<<<<<<<>| |
grenade \||_/________\______\|<----- Tube |
| |
|____________________________________________________|
^
|
|
Toilet paper roll

=====================================================================
Also: For a very flammable chemical mixture, buy Ammo Carb. Its an
aquarium filter component available at PJ's Pets in large cheap
containers.
=====================================================================


__ ________ ''''''''''''''''''''''
\_\ /\_\_____\ ' CATSlash Magazine '
\ \ / / / ____/ ' Issue #7 '
\ \/ / / / ' February, 1997 '
\ \/ / /___ ' File #4 of 9 '
\ / /____\ ''''''''''''''''''''''
\engence_/olumn

By: Poison Ice
___________________________________________________________


Well my fellow anarchists, we meet again, and I have some more stuff
so here it is.


Magazine subscriptions
[[[[[[[[[[[]]]]]]]]]]]

The time-honored tradition of giving person x a subscription to every
magazine that was ever made. Go to your library and rip out those
little subscription cards out of each one. If the librarian asks you
what you're doing, tell him/her to go piss up a flagpole and continue
your mission.

Now take this big stack of cards home and fill them all out in person
x's name and send them in. Almost every one of the cards will already
have the postage paid for so you won't have to worry about the cost
of stamps.

Now me, I could care less if someone did that to me. I would get a
little pissed off, though, if someone were to use my name on the
subscription cards and send them to my friends or my boss. So try
this. He'll get a couple of issues of each magazine until they get
pissed off that he's not paying for them and stop his subscription.
For a few months after thea they'll harass him about paying for the
magazines he ordered but he won't het into any kind of trouble
because of it.


__ __ ______
| \ / | || _||_
||\\//|| ___ ___ || ___ ___ __ ||
Hacking/ || __|| || || __|| || || //__/ || Part 1
|| |||__|| ||__ |___|||__|| || || \\__ ||_/
By: Jeriatrick
_____________________________________________________________________
CATSlash Magazine Issue #7, February 1997
File #5 of 9
_____________________________________________________________________

There are many Mac networks out there in the schools, and we have
been asked many times how to hack them and screw them up. In reading
this, you must remember that Macs have been proven to be the hardest
computers to hack! But we won't let that discourage us will we...

MacJanet is a very popular type of Appletalk server. You can tell if
its MacJanet by going under the apple menu and looking for something
under it called "Waterloo MacJanet", and often "MacJanet Message". If
it doesn't have this, it may be a MacJanet server, but chances are
that it is not. If it is run by System 7, go under the Chooser and
see if there is a MacJanet icon.


Part 1: The General Network Operations
""""""""""""""""""""""""""""""""""""""
First, we will look at the general workings of the network, and what
to do with it...

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Logging In:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Logging in is a simple procedure. Under the apple menu, there will be
something called "Waterloo MacJanet" or "MacJanet Login". Select this
and you will get a dialog box with a "Login" button. Click on it or
hit return. Then you will see two fields, the Login Name field and
the password field.

The login name can be anything, it can be up to 31 characters long,
with ANY character the mac keyboard can generate, including the
special characters like bullets and spanish characters. It is a good
idea to watch someone logging in, so you can get their username. Most
usernames go in consecutive order like CPAB, CPAC, CPAD and so on, so
if you get one, chances are you have 26 of them. The login names are
not case sensitive.

The Password field is difficult to work with, as it uses the same
process as the Login field, except it echoes the characters back with
dark circles. The passwords can also be set up to be case sensitive.

If you are part of the network, log in here.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Network Disks
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
When you log in, you will see two or more disks on the right side of
the screen. The first is the hard drive. You can use this any time,
logged in or off. For more info on hacking the hard disks, see part 2
of this series (Coming next month). The next one will have an icon of
a page with a corner bent over, and four small squares on it. This
will have your Login name on the bottom as its name. This is your
network disk.

Your network disk is completely under your control. You can move
files, write to it, whatever.

There may also be other disks. These are other network disks, which
your system supervisor has allowed you access and set to display on
login. You can open and run files from these disks, but according to
the Mac OS, they are set to "locked".

To access other disks on your network, select the DA (Desk Accessory)
under the apple menu that you used to login, and select the now
available "More Disks..." button. Then you can double click on these
and use them like the network disks described above. These are also
set to "locked". These disks are not neccessarily located on the
server, but can be from any computer attached to the network.
Teachers in schools often set up these disks for their files, so only
they can edit them.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
What the server shows
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
See that little guy in the corner by the apple menu who's running?
If you see him, your computer is exchanging info with the server.
This is performed every time you do something that involves a net-
work disk. The things on the hard drive don't count here.

Lets take a look at the server's monitor, and see what's going on:
(It is smaller than the real windows. The real windows are full
screen, and have scroll bars, close boxes and stuff like that).

_____________________________________________________________________
| MacJanet Event Log | USERNAME | APPLICATION |
|________________________________ |___________________|_____________|
| POISON ICE Login 11:30p| | |
| JERIATRICK Login 11:30p| BOOM BOOM 11:31p| ªHypercard |
| POISON ICE Launched Doom 11:35p| JERIATRICK 11:30p| |
| Qp5cd Login 11:35p| POISON ICE 11:35p| ªDoom |
| Qp5cd Launched Cl...11:36p| Qp5cd 11:36p| ªClarisWorks|
| | SOME GUY 11:00p| |
|_________________________________|___________________|_____________|
| IMAGEWRITER 1 Document Spooled by SOME GUY at 11:00p |
|___________________________________________________________________|
| SPOOLER B Document "untitled" now printing... |
|___________________________________________________________________|
| LAZERJET+ Not Active |
|___________________________________________________________________|

Ok, now to explain what you are seeing. On the top left, is the event
log, this records every program you open from the point you log in.
It will also record saves and prints.
If your supervisor is not crazy about security, he will probably
close it to allow the server more memory.

Next to that window, is the one with "USERNAME" and "APPLICATION".
This is quite obvious. The names like "JERIATRICK" are the people's
login names. The time beside them is when they last opened a program
or logged in. Then, under the APPLICATION window, there is what
application each person is in. Of course, if they are in the Finder,
or have just logged in, it is blank. The dark circles in front of the
program they are in serves no purpose.

Under that is the printer status. This records the progress of every
document spooled to the printers.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The System Administrator
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The system administrator runs the whole system. He has no limits to
what he can do. His login name is "ADMIN". To see if he's on the
system, go into MacJanet Message under the apple menu and look for
him.

The system administrator can do many things. One is screen lockup.
This is when he hits a three key combination, and your screen changes
to what's on his computer. There, you are helpless to do anything, but
watch what he is doing. You don't even have to be logged in for this
to work. Just as long as your computer is connected to the network!

He also has the power to unlock network disks, allowing you access
them as a real disk.

He can basically do anything he wants to, from any terminal. The only
thing he cannot do is find your password or edit your account. For
those he must go to the server itself.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Messing with the network
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Ok Jeriatrick, enough technical crap! Get to the good part! Well,
here we are...

The Chooser - A great tool
>>>>>>>>>>>>>>>>>>>>>>>>>>

Under the apple menu is something called the Chooser. This is used to
select a printer, network, fax driver, etc. Well, it is far more
useful than that!

If you are in the market for other people's login names, open up the
chooser, (before you log in!) and in the bottom right hand corner
will be the username of the last person that logged in!

If you want to print on a better printer, open it up and select a
different printer to spool to.

If you want to make life hell for the next guy, on the bottom right
hand corner is also two options: Appletalk ON and Appletalk OFF.
Switch it off to disconnect the computer from the network. Also use
this to avoid the dreaded "screen lock"

To access other file areas on the network, click on the Appleshare
icon in there and select a new fileserver!

After logging in, click on the MacJanet icon, select 'preferences...'
and change your username! Delete the old one and type in the new one.
Then click on the 'save' box and choose OK.

Using Programs Without Getting Caught
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Ever get into some boring lecture in computer class and go "Fuck! If
only I could play a game! But he would just look at the log and catch
me!". Well there are solutions.

The first is really simple... Don't log in! As long as you are not
logged in, they cannot find you. A teacher of mine went nuts because
me and some friends were playing 'Shufflepuck' (You know, the one
with the real loud sound effects and people!), and he couldn't find
us!

But if you want to play a network game like Marathon? There is no
easy way. The first thing to do is change the volume to 0. If he
hears no gunfire, chances are he's not going to bother checking what
program everyone's into. If you have no access to the volume control
panel, plug your headphones into the headphone/speaker port on the
back of the computer.

Another fun thing that may work for you, is under the chooser, change
your Login names to stuff like "Fuck You". That way when he checks,
he will not know who "Fuck You" is.

The final option is to get ahold of some of the programs that allow a
"ghost login". This lets you log in, but you do not appear on the
server's lists.

Multitasking
>>>>>>>>>>>>

Want to give some lamer a real shitty day on the network? Just choose
'Set Startup...' from under the 'Special' menu. Then click on the
button that says 'Multifinder only'. Now hit return and restart the
computer. Now whenever someone tries to access MacJanet login, it
will just beep.

An explanation of this is that Waterloo MacJanet does not work in a
multitasking environment. That is why many networks have the old
System 6, instead of the great System 7 or 7.5. The only way to log
in now is to use the Chooser, or AtEase.

Avoiding "screen lockup"
>>>>>>>>>>>>>>>>>>>>>>>>>
Screen lockup is a real pain. There are many ways to get past it.
The easiest way is to disconnect your computer from the network. This
can be accomplished by using the Chooser (See the part about using
the Chooser above...) or by physically unplugging your computer from
the network. Just unplug the cable running to the Mac's printer or
modem port.

Another way is to reset your Mac. This can be done by pressing the
reset button on the side or back of your Mac. It is a small button
with a triangle above it. Once your computer restarts, you will no
longer be under screen lock, even if you log in!

You could probably also use the debugger to bypass it. On the side or
back of your Mac is two buttons as described above. This time we want
the one with the circle on it. I don't know what to type, but there
probably is something!

And, if you are lucky enough to have System 7 on your network, press
COMMAND-OPTION-ESCAPE. This will then ask you if you want to force
quit the Finder. This usually will work.

Phun with peripherals
"""""""""""""""""""""
The following are ways to abuse all peripherals connected to the
network!!!

Dialing out
>>>>>>>>>>>>
Lets say you wanted to dial a BBS through the network. Is very easy
to do so. We'll use the Bethlehem BBS (403/477-2351) as an example.
1. Launch Microsoft Works, ClarisWorks, Hypercard or any other
terminal program you can locate.

2. Type in a command to silence the modem. This is very important
otherwise your teacher will hear the modem dialing and find you!
some zero volume commands are:
ATM0 - Most models
ATS7=1DT - Some Hayes Models
ATS7=1L0DT - An alternative to the above command

3. Now dial any number. Either use the program's dial command or type
ATDT 477-2351.

Save the files to your network disk. Maybe even download a copy of
ResEdit, so you can do some really cool stuff. Have phun!

Faxes
>>>>>>
There are so many fax modems out there today! To use them, try some
of these methods:

1. Hold down COMMAND, SHIFT, CONTROL, or OPTION when selecting the
file menu. If the Print... command is now a Fax... command, then
select it, enter the requested number, and whatever page or window
you have on your screen will be faxed.

2. Find or obtain some fax software like Fax STF. Now use it, just
like you used the modem for dialing.

Scamming the school's internet
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Get some free internet time easily! If your school is connected to
the internet through a psn, then you will be told the password and
login name for the account. Look under the ConfigPPP, FreePPP, or
InterSlip control panels (you will have to have access to those) and
get the phone numbers.
If Netscape logs you in automatically, Just visit the control
panels listed above and grab the username. You will have to crack the
password yourself (make sure you count the dots so that you know how
many characters are used in it!). There is also a program available
on many PD boards called 'PPP Password' that can find it for you.

Messing up the school's printer
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
There are a few ways to mess up the printer. Why would you want to do
that? Lets say you have to print an assignment, but you don't have it
done. If you could not print it, then you would have more time to
finish it! Here are the easy ways:

1. Simply unplug the printer's serial cable. Now it is not connected,
and nothing can reach it. If you don't want it to be discovered,
unplug it, but make sure it is still partly into the port. If you
really want to cause a delay, steal the whole cable. They come out
very easy and it will be very short (from the printer to a small
plastic box not too far away).

2. Log in using the guest account, or ANY ACCOUNT THAT ISN'T YOURS.
On some networks you won't even have to log in. Open the Hard
Drive's window and keep selecting "Print Window" from the file
menu. You can also use the print screen F-Key (Command-Shift-4) if
it is an imagewriter. Do this repeatedly for a long time, and the
printer will be so overloaded with print jobs that it will be
hours before it will get to your assignment! Your teacher will
most likely shut it off to save ink. Better for you!

3. If your teacher is really lame, and knows nothing about computers,
try the following: Press the "Select" button on an Imagewriter
style printer, or the "Line" button on a Lazerjet style printer.
It will "pause" the printer, and most people don't know that. You
can also easily jam up an imagewriter by pulling on the paper
while it is printing. It will keep printing over the same line!
Let the bastard try to figure out why nothing he's spooling comes
out!

Conclusion
""""""""""
Well, now you have a basic idea of the server's operations and how to
screw them. There are many other methods, but these are probably the
easiest and the best for what you want to do. Tune in for part 2 next
month titled "Foolproof" for info on getting the ability to edit the
computer's hard disk!


---------------------------------------------------------------------
\ Bomb Heat Tester /
\ By: Jeriatrick /
\___________CATSlash Magazine - Issue 7, February 1997__________/
'''''''''''''''File #6 of 9'''''''''''''''
''''''''''''
Ever want to tell how effective your explosives are? Well, recently
while browsing a book on explosives, I came upon a diagram for an
explosive tester! I'll try to type a diagram here:


ignition -----> \ / || <---------- thermometer
wires \ / ||
___||____________|__|_________||____
|___||____________|__|_________||____|
| | || | | || | |
| |_||____________| |_________||__| |<---- insulated container
| | || | | || | |
| | ||<- stirrer | | <------- water
| | || ___|_|__|_____ | |
| | || | | | | | | |
| | || | | | | |<------------------ bomb
| |(||) | |_|__|_ | | |
| | | \____/ <---------------------- sample cup
| | |______________| | |
| \______________________________/ |
\__________________________________/

So, now we tell how it works. You place the bomb, with the ignition
wires connected and running out of the top into the reinforced
container full of water. Then you use the ignition wires to blow up
the bomb. The thermometer tells you the approximate heat your bomb
would generate. The amount of rotations that the stirer makes on
explosion tell you the force of the blast (I think you need a gauge
on the end of the stirrer). Then finally, you are supposed to measure
the height that the water expanded to (so don't fill the container
to the top with water). That will give you a reading on the effectiv-
ness of your explosive. This test is also used in some labs, so you
will probably get a better explanation on how to use this thing at
a lab.

Its just a fun thing that I thought you might find a use for!


---------------------------------------------------------------------
\ CSIS is Watching You /
\ By: Jeriatrick /
\___________CATSlash Magazine - Issue 7, February 1997__________/
'''''''''''''''File #7 of 9'''''''''''''''
'''''''''''
If you don't know, CSIS is the canadian equivalent of the FBI. They
recently have been busting a lot of people using methods that most
are unaware of. Let it be known that our H/P/A community is also
threatened.

Here is an example of how they have been busting a lot of people:
.....................................................................

Jim Chamzuck is a drug dealer, so of course has a cell phone. One
night, he is talking to a business associate over the phone, and at
some point mentions the words 'drug deal'.

That night, CSIS also has a van parked beside a cellular tower, which
unknown to them is the same tower that our buddy Jim is using. The
van is white, like any other van you might see. The only difference
is that on the inside are two CSIS agents and a whole shitload of
computers. They are not looking for anything in particular, but have
been there for two hours already. What are they doing? They are
downloading every conversation that passes through that tower!

It is now three hours later, Jim's conversation has ended a long time
ago, and the CSIS agents have filled their computers hard drives up
so that they can't download anymore, or else they have just decided
to call it a day. They set their computer to search for keywords in
all the conversations, words like 'drugs', 'phreak', 'gun running'
and many more are searched for. The computer of course, pinpoints
Jim's conversation and flags it.

The next day, the CSIS agents check the computer provided list, and
find Jim's conversation among the many flagged. A short investigation
into it, and Jim is busted.
.....................................................................

This is almost the exact story that was told to me by one of our law
enforcement contacts. Many people in Ontario have been busted by this
process.

But isn't monitoring cell frequencies illegal? You have to remember
that this regulation is set up by the CRTC, and who owns the CRTC and
CSIS? The government. CSIS can monitor everything you say on a cell,
and you don't even know it.

If you use a cellular modem, you are a bigger target. CSIS will check
to see if you are downloading anything that you shouldn't. Then, it
will give them an idea who to watch. Those they check first!

However, CSIS can't tap or monitor your phone line without a warrant,
or you can charge them. They can ask to see your caller log to get an
idea of the numbers you are calling, or see the status log to see if
you are using a modem, fax or normal phone call, but that is as far
as they can go without a warrant.

So, the solution is then to stick with your normal phone. That is
true, it is the best way, but many people also don't know that by
saying words like 'hack and 'phreak', the telco's computer flags the
number on their computer. They may investigate your caller log after
this, but usually won't.

CSIS mainly operates in Vancouver and Ontario, so we don't have to
worry too much, but BE CAREFUL WHAT YOU SAY ON THE PHONE. CSIS may be
listening and waiting...


__________
| ________| '''''''''''''''''''''
| | ' CATSlash Magazine '
__| |_____ ' Issue #6 '
| | |_____| ' January, 1997 '
| || |________ ' File #8 of 9 '
| ||__________|onnection '''''''''''''''''''''
| |
| |________
|__________|orner

By: Poison Ice and Jeriatrick
_____________________________________________________________________

Hi everybody! poison ice here, c.a.t.s' resident arab terrorist,
here to give you the info I acquired recently. And here it is, Ready,
willing, and unstable!
_____________________________________________________________________
| | Phone Booth Blown by Pipe Bomb |
| __ |=======================================================|
| ___/ '>___| The pipe bomb that went off across the street from |
|////| |\\\| shep,and very little is known, who did it? why? and |
|////| |\\\| how did he/she know how to make a pipe bomb? who ever |
|""""//\\"""| knows this is urged to contact either jeriatrick or |
| | myself on any bbs where catslash can be found. |
| Ross Shep | |
|___________|_______________________________________________________|
| | Security Cameras |
|\ / |=======================================================|
| \ / | The word is that victoria school has quicksnap cameras|
| \ o __ | strategically placed through out the school in key |
| \/||__ | area's, such as locker rooms, and other high theft |
| | area's, one kid was already busted. |
| Vic: | |
|___________|_______________________________________________________|
| _ _ _ | Office Payphone |
|/_ / \ |=======================================================|
|\ \ H \ | The Eastglen payphones are so busy that the office now|
| \_ \_ \_\ | offers a new payphone. You walk in the office, give |
| | the lady 25c and use a phone designated as a payphone.|
| Eastglen: | If you are going to phreak or call long distance, call|
| | from here, its only a quarter because they don't check|
| | where you are calling! |
|___________|_______________________________________________________|
| | Local Phreaks Busted | |
| /\ |==============================|========================|
|____/__\___| Recently in St.Albert two | |
| / \ | phreaks were busted using PBX| |
| / \ | codes. The were using them | |
| Local | from home, and were very easy| |
| H/P/A | for the PBX's owner to find. | |
| News: | Let this be a lesson: DON'T | |
| | USE PBX CODES FROM HOME! ITS | |
| | RECORDED ON YOUR CALLER LOG! | |
| |______________________________|________________________|
| | Pipe bombs in Phone Booths |
| |=======================================================|
| | Recently, two phone booths were blown up by pipe |
| | bombs, and one other bomb was found in a dumpster. The|
| | first phone booth was located in the west end, and the|
| | second was across from Ross Sheppard high school (as |
| | seen above). The police say the pipe bombs are very |
| | simple in construction, but are very powerful. They |
| | have no leads. Telus Security has also launched their |
| | own investigation force to find the criminal. |
|___________|_______________________________________________________|
| _____ | AOL Being Sued | Sprint Declares Loss |
|/ /\ \ |==============================|========================|
|_/__\___\__| - Washington D.C., USA |- Seattle, USA |
|/ \ / | Soon after offering their new| Recently, Sprint decla-|
|______\/ | flat rate monthly service, | red that they lost a |
| | they were swamped with calls | lot of money this year,|
| World | and many of their systems | and as usual, has blam-|
| H/P/A | overloaded. People now are | ed phone phreaks. So, |
| News: | sueing them because they cou-| now they will be stren-|
| | ld not connect. AOL has anno-| thening their anti phr-|
| | unced that they will try to | eak mesures by a lot. |
| | upgrade, if the lawsuits do | By the way, since the |
| | not drive them bankrupt. | 80's, Sprint has been |
| | | at war with phreaks, so|
| | |they mean what they say!|
| |______________________________|________________________|
| | Police going extreme on hackers |
| |=======================================================|
| |- New York, USA |
| | The police have started to hunt hackers in New York |
| | like crazy. They busted about 30 hackers in one week! |
| | Be very careful in New York! |
| | - Info supplied by HackR of DreD |
|___________|_______________________________________________________|
To give us Connection Corner info, call Bethlehem (403)477-2351 and
E-mail Poison Ice.


CATSlash
_________
/___ ___/_____ _____ '''''''''''''''''''''
/ // / ___ / __ \\ ' CATSlash Magazine '
/ // / // / / /_/ // ' Issue #6 '
/ // / // / / ____// ' January, 1997! '
/ // / //_/ / // ' File #9 of 9 '
/_// \_____/_// '''''''''''''''''''''
_________
/___ ___/____ __
/ // / ___//\ / //
/ // / /__ / \ / //
/ // / ___// /\ \/ //
/ // / /___/ // \ //
/_// \____/_// \//

By: Poison Ice

Top Ten ways to tell you've mishandled your explosives.
(as if you wouldn't be able to tell anyway)

10. You have a huge amount of burnt meat where your leg
once was.
9. You can't seem to find your house.
8. You no longer have a garage.
7. You put your nitro glycerine into your blender.
6. Your parents ask you about your new skylight.
5. Your sister disapears suddenly.
4. Upon attempting to count to ten with your fingers,
you can't seem to get passed three.
3. You find one of your grenades missing a pin.
2. You think twice about leaving your nitro glycerine
inside the blender.
1. You leave your gunpowder on the red oven burner.

_____________________________________________________________________
?????????????????????????????????????????????????????????????????????
? The CATSlash Question Of the Month ?
??????????????????????? By: Poison Ice ??????????????????????????????
?????????????????????????????????????????????????????????????????????
? This month's question of the month is: ?
? What in your opinion would be the best april fool's joke? ?
? ?
?????? Send your answers to Poison ice c/o the bethlehem bbs! ???????
?????????????????????????????????????????????????????????????????????

=====================================================================
Other CATSlash Info:
=====================================================================
____________
/~~~~~~~~~~~~~~~~~~~~~~~~~\Disclaimer/~~~~~~~~~~~~~~~~~~~~~~~~~~~\
< C.A.T.S or CATSlash Magazine are not responsible for any incid- >
< ents occuring from this magazine or past issues. This is for >
< informational purposes and anything described in these files >
< are not meant to be done by the reader. So, if you blow off a >
< body part, we aren't reaponsible. You are you! >
\________________________________________________________________/
_____________________________________________________________________
Text issues of CATSlash Magazine at:

"&&&"&& "&&&"&& &&"&&a "&&a && "&&" "&&&"&& "&&& && "&&&"&& "&&&"&&"&a
&&& && &&& && &&& &&&e&& && &&& &&& && &&& &&& && &&
&&&e&" &&&e &&& &&& && && &&&e &&&e&& &&&e &&& && &&
&&& && &&& &&& &&& && && &&& &&& && &&& &&& && &&
&&& && &&& &&& &&& && && &&& &&& && &&& &&& && &&
e&&&e&" e&&&e&& e&&" e&&" && && e&&&e&& e&&& && e&&&e&& e&&" && &&
&&
The official CATSlash &&&&&&&&&& Call:
distribution board! && (403)477-2351
&&

Files on Anarchy, the Occult, Black Metal and More!
______________________________________________________________________
~CATSlash Magazine is made in Canada! ~
~ /\ ~ ~
~ |\/ \/| ~ __ _ ~_ _ _
~ | | ~/ /_| |\ | /_| | \ /_|
~ _/\ | | /\_ ~\___/ | | \| /~ | |_/ / |
~ _| \| |/ |_ ~ __ _ __ ~ __
~ \ \ / / ~|__\ / \ / |_/ /_
~ \ / ~| \ \_/ \__ | \ __/
~ \ / ~ ~
~ /_____ _____\ ~ ~
~ | | ~ ~
~ | | ~ ~
~ |__| ~ ~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
_____________________________________________________________________
______________
| / | CATSlash Magazine is made with
| | / | | '''''''''Macintosh''''''''''''
| / | '''''''''
| /__ | We also have a Mac version of CATSlash Magazine!
| \____|___/ | It comes as an application. Why is this better?
|_______|______| because the Mac version comes with pictures,
sound, movies, point and click interface plus
Macs Rule! all the other things you would expect to find
for your Mac. Check our web page for details.
_____________________________________________________________________

Be sure to join us for Random Acts of Violence Week. Also keep a
lookout for a CATSlash explosive show planned that week in Beverly.

- End of Issue -

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT