Copy Link
Add to Bookmark
Report

Phrack Inc. Volume 05 Issue 45 File 14

eZine's profile picture
Published in 
Phrack Inc
 · 5 years ago

  

==Phrack Magazine==

Volume Five, Issue Forty-Five, File 14 of 28

****************************************************************************

Updated Last : 3.14.1994
Late Night Hack Announcement #4.2

XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement
XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement
XXXXXXxxxxxxXXXXXX X X DEF CON II Convention Update Announcement
XXXXXxxxxxxxxXXXXXXX X DEF CON II Convention Update Announcement
XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON II Convention Update Announcement
XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON II Convention Update Announcement
XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON II Convention Update Announcement
XXXxxxxxxxxxxxxXXXXXXXX DEF CON II Convention Update Announcement
XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON II Convention Update Announcement
XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON II Convention Update Announcement
XXXXXXxxxxxxXXXXXXXXX X DEF CON II Convention Update Announcement
XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement

READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE

=============================================================================

What's this? This is an updated announcement and invitation to DEF CON II,
a convention for the "underground" elements of the computer culture. We try
to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies,
Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties
Groups, CypherPunks, Futurists, Artists, Etc..

WHO: You know who you are, you shady characters.
WHAT: A convention for you to meet, party, and listen to some speeches
that you would normally never hear.
WHEN: July 22, 23, 24 - 1994 (Speaking on the 23rd and 24th)
WHERE: Las Vegas, Nevada @ The Sahara Hotel

So you heard about DEF CON I, and want to hit part II? You heard about the
parties, the info discussed, the bizarre atmosphere of Las Vegas and want to
check it out in person? Load up your laptop muffy, we're heading to Vegas!

Here is what Three out of Three people said about last years convention:

"DEF CON I, last week in Las Vegas, was both the strangest and the best
computer event I have attended in years." -- Robert X. Cringely, Info World

"Toto, I don't think we're at COMDEX anymore." -- CodeRipper, Gray Areas

"Soon we were at the hotel going through the spoils: fax sheets, catalogs,
bits of torn paper, a few McDonald's Dino-Meals and lots of coffee grounds.
The documents disappeared in seconds." -- Gillian Newson, New Media Magazine

DESCRIPTION:

Last year we held DEF CON I, which went over great, and this year we are
planning on being bigger and better. We have expanded the number of
speakers to included midnight tech talks and additional speaking on Sunday.
We attempt to bring the underground into contact with "legitimate" speakers.
Sure it's great to meet and party with fellow hackers, but besides that we
try to provide information and speakers in a forum that can't be found at
other conferences.

While there is an initial concern that this is just another excuse for the
evil hackers to party and wreak havoc, it's just not the case. People come
to DEF CON for information and for making contacts. We strive to distinguish
this convention from others in that respect.

WHAT'S NEW THIS YEAR:

This year will be much larger and more organized (hopefully) than last year.
We have a much larger meeting area, and have better name recognition.
Because of this we will have more speakers on broader topics. Expect
speaking to run Saturday and Sunday, ending around 5 p.m. Some of the new
things expected include:

> An Internet connection with sixteen ports will be there, _BUT_ will only
provide serial connections because terminals are too hard to ship. So
bring a laptop with communications software if you want to connect to the
network. Thanks to cyberlink communications for the connection.

> There will be door prizes, and someone has already donated a Cell Phone
and a few "Forbidden Subjects" cd ROMs to give away, thanks to Dead Addict.

> Dr. Ludwig will present his virus creation awards on Sunday.

> A bigger and better "Spot The Fed" contest, which means more shirts to
give away.

> More room, we should have tables set up for information distribution.
If you have anything you want distributed, feel free to leave it on the
designated tables. Yes, this year there will be a true 24 hour
convention space.

> A 24 hour movie / video suite where we will be playing all type of stuff.
VHS Format. Mail me with suggested titles to show, or bring your own.
We'll use a wall projector when not in use by speakers.

> Midnight Tech Talks on Friday and Saturday night to cover the more
technical topics and leave the days free for more general discussions.

WHO IS SPEAKING:=============================================================

This list represents almost all of the speakers verified to date. Some
people do not want to be announced until the event for various reasons, or
are waiting for approval from employers. A speaking schedule will go out
in the next announcement.


Philip Zimmerman, Notorious Cryptographer & Author of PGP.

Dr. Ludwig, Author of "The Little Black Book of Computer Viruses," and
"Computer Viruses, Artificial Life and Evolution"

Loyd Blankenship (The Mentor), Net Running in the 90's and RPG.

Padgett Peterson, Computer Enthusiast, Anti-Virus Programmer.

The Jackal, A Radio Communications Overview, Digital Radio and the Hack Angle.

Judi Clark, Computer Professionals for Social Responsibility.

Gail Thackery, (Of Operation Sun Devil Fame), Topic to be Announced.

To be Announced, The Software Publishers Association, Topic to be Announced.

Toni Aimes, Ex U.S. West Cellular Fraud, Cellular Fraud Topics.

Mark Lotter, Cellular Enthusiast, Hacking Cell Phones.

Lorax, The Lighter Side of VMBs.

Peter Shipley, Unix Stud, Q&A on Unix Security.

George Smith, Crypt Newsletter, Virus Topic to be Announced.

Cathy Compton, Attorney, Q&A Surrounding Seizure Issues, Etc.

John Littman, Reporter and Author, Kevin Poulson, Mitnick, and Agent Steal.

Red Five & Hellbender, Madmen With a Camcorder, Who Knows?

Erik Bloodaxe, Phrack Editor, Wierd Wireless Psycho Shit.. Stay Tuned..

There should be a few round table discussions on Virus, Cellular, Unix and
something else surrounding the industry.

I'll name the rest of the speakers as they confirm. I'm still working on
a few (Two?) people and groups, so hopefully things will work out and I can
pass the good news on in the next announcement, or over our List Server.

============================================================================

WHERE THIS THING IS:

It's in Las Vegas, the town that never sleeps. Really. There are no clocks
anywhere in an attempt to lull you into believing the day never ends. Talk
about virtual reality, this place fits the bill with no clunky hardware. If
you have a buzz you may never know the difference. It will be at the Sahara
Hotel. Intel is as follows:

The Sahara Hotel: 1.800.634.6078

Room Rates: Single/Double $55, Triple $65, Suite $120
(Usually $200) + 8% tax

Transportation: Shuttles from the airport for cheap.

NOTE: Please make it clear you are registering for the DEF CON II
convention to get the room rates. Our convention space price is
based on how many people register. Register under a false name if
it makes you feel better, 'cuz the more that register the better for
my pocket book. No one under 21 can rent a room by themselves, so
get your buddy who is 21 to rent for you and crash out. Try to contact
people on the Interactive Mailing List (More on that below) and
hook up with people. Don't let the hotel people get their hands on
your baggage, or there is a mandatory $3 group baggage fee. Vegas
has killer unions.

OTHER STUFF:

I'll whip up a list of stuff that's cool to check out in town there so if for
some reason you leave the awesome conference you can take in some unreal
sites in the city of true capitalism. If anyone lives in Las Vegas, I
would appreciate it if you could send a list of some cool places to check out
or where to go to see the best shows and I'll post it in the next
announcement or in the program

-> I am asking for people to submit to me any artwork, pictures, drawings,
logos, etc. that they want me to try and include in this years program.
I am trying to not violate any copyright laws, but want cool shit. Send
me your art or whatever and I'll try and use it in the program, giving you
credit for the work, of course. Please send it in .TIF format if it has
more than eight bit color. The program will be eight bit black and white,
-> in case you want to make adjustments on your side.


PLEASE DONATE "STUFF" FOR THE GIVEAWAY:

We are trying to raffle off interesting and old functional items. If
you have anything such as old computers, modems, weird radio stuff, books,
magazines, etc that you want to get rid of, please call or mail me with
what it is, or bring it along. I don't want to waste peoples time giving
away rubber bands or anything, but pretty much anything else will go.

*** NEW MAILING LIST SERVER ***

We've finally gotten Major Domo List Serv software working (Kinda) and it
is now ready for testing. MTV spent a lot of time hacking this thing to work
with BSDi, and I would like to thank him. The purpose of the list is to
allow people interested in DEF CON II to chat with one another. It would
be very useful for people over 21 who want to rent hotel space, but split
costs with others. Just mention you have room for 'x' number of people, and
I'm sure you'll get a response from someone wanting to split costs. Someone
also suggested that people could organize a massive car caravan from Southern
Ca. to the Con. My attitude is that the list is what you make of it. Here
are the specifics:

Umm.. I TAKE THAT BACK!! The mailing list is _NOT_ ready yet. Due to
technical problems, etc. I'll do another mass mailing to everyone letting
them know that the list is up and how to access it. Sorry for the delay!


MEDIA:

Some of the places you can look for information from last year include:

New Media Magazine, September 1993
InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely
Gray Areas Magazine, Vol 2, #3 (Fall 1993)
Unix World, ???,
Phrack #44, #45

COST:

Cost is whatever you pay for a hotel room split however many ways, plus
$15 if you preregister, or $30 at the door. This gets you a nifty 24 bit
color name tag (We're gonna make it niftier this year) and your foot in the
door. There are fast food places all over, and there is alcohol all over
the place but the trick is to get it during a happy hour for maximum
cheapness.

============================================================================

I wanted to thank whoever sent in the anonymous fax to Wired that
was printed in issue 1.5 Cool deal!

=============================================================================

FOR MORE INFORMATION:

For InterNet users, there is a DEF CON anonymous ftp site at cyberspace.com
in /pub/defcon. There are digitized pictures, digitized speeches and text
files with the latest up to date info available.

For email users, you can email dtangent@defcon.org for more information.

For non-net people call:

---- A L L I A N C E ----
SysOp Metalhead
One Thousand One Hundred Megabytes Online
612.251.8596 USRobotics 16.8 Dual Standard
Synchronet Multinode BBS Software
International Informational Retrieval Guild (IIRG) Distro Site
Electronic Frontier Foundation (EFF) MEMBER
American Bulletin Board Association (ABBA) MEMBER
-----------------------------------------------------------------------
o 200+ Message bases. No post call ratio. Nope, not ever.
o FidoNet [1:282/8004]
o CyberCrime international [69:4612/2]
o International Networked message ECHO areas:
UFO, VIRUS, REPTILE, MUSIC, Twin Cities Chat, NORML, Telephone Watch,
TRADEWARS, MONTE PYTHON, FCC, NO PIRACY, CLASSIFIEDS
BBS Software & SYSOP Support, MUSIC, FISHING/HUNTING, Stephen King,
Programming, Computers, Foreign Language, iCE/ACiD/TRiBE, COLLEGE
LIVING, POLITICS, POETRY, RACISM, and too many more to mention
o Computer Underground Magazines, History, Updates & Text
o DEF CON Mirrior Archive
o uXu, PHANTASY, CuD, EFF Magazine(s) Distro Site
o Internet email mailbox (your.name.here@f8004.n282.z1.fidonet.org)
o 30 day FULL ACCESS Trial Account...$10/year MEMBERship (sub. to change)
-----------------------------------------------------------------------

For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102,
Seattle, WA, 98112

For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone.

A DEF CON Mailing list is maintained, and the latest announcements are mailed
automatically to you. If you wish to be added to the list just send email
to dtangent@defcon.org.

=============================================================================

(Note, I have put a copy of Dr. Ludwig's new KOH Data security encryption
Virus online at the DEF CON ftp site in /pub/defcon/KOH along with full
documentation. Get CrAzY.)


VIRUS CREATION AWARDS:

Announcing
The
Second International Virus Writing Contest
Sponsored by
American Eagle Publications, Inc. P.O. Box 41401
Tucson, AZ 85717 USA
and
The Crypt Infosystems BBS
+1 (818) 683-0854

*** The Goal ***

The purpose of this contest is to write a fully functional computer virus that
entertains people with political satire. Viruses will be judged on the basis
of originality, creativity, functionality, and political incorrectness.

*** Eligibility ***

Anyone who can write a computer virus is eligible.

*** Contest Dates ***

The contest is underway from January 1, 1994 until June 30, 1994. Your
submissions must be received by June 30 to qualify. The winner of the
contest will be announced at the DEFCON conference in Las Vegas, July 22-24,
1994. If you can be present, an official award will be bestowed on you at
that time.

*************************************************************

Details

*************************************************************

The philosopher Friedrik Nietzsche once said that if you want to kill
something, you must laugh at it--and laugh at it deeply. So there should be
little wonder that political satire is as old as politics itself.

Is there something going on in the political arena that you abhor, that makes
you sick, that is just plain wrong? Well, here's your chance to make a
mockery of it. I've always had this idea that if someone wrote a sufficiently
witty virus that really addressed the issues the way the people (not the
press, not the politicians) saw them, it might just get passed around by
people voluntarily.

Let's find out.

Write a virus that is itself a political satire. I don't mean a virus that
simply displays a message. I mean a living entity whose every move--whose
every action--is politically motivated. If you need more than one virus to
make your point--perhaps two viruses working together, or something like that,
that is fine.

-----------------------------------------------------------
Let me give you a simple example: The Political Correctness Virus

This virus is a spoof on the "political correctness" movement--which is just
a form of self-imposed censorship--that is sweeping American intellectual
circles, particularly colleges and universities.

This virus is a memory resident boot sector virus which maintains a list of
politically incorrect words on your computer system. It also hooks the
keyboard interrupt and monitors every keystroke you make. If you type a
politically incorrect word into the computer, the PCV springs into action.

Politically incorrect words are ranked at three different offense levels.
When the PCV encounters such a word, it determines what offense level that
word is, and acts accordingly.

The least offensive words merely register a beep. More offensive words cause
a beep to sound for 10 seconds. The most offensive words cause a siren to
sound for two minutes, locking the system for that duration. If you turn the
computer off before the two minutes are up, the virus will stop the boot
process for five minutes, with sirens, when you turn it back on. If you allow
the siren to complete, then you can proceed.

The virus has two different word lists, both stored in an encrypted and
compressed format. The list is selected at random when the system is
infected, after which it cannot be changed. The first list is the "proper"
list of political correctness no-no's. For example, a word like "sodomite" is
among the worst possible offenses. The second list is an inverted list of
no-no's. This list trys to force you to use "sodomite" by flagging words
like "gay" and "homosexual" as no-no's.

If you allow the PCV to live in your system for three months without getting
a single flag, you are given the supreme honor of viewing the word list
assigned to you and adding a word to it. If you get more than 3000 flags in
a lifetime, the virus will force you to enter a politically correct word
before allowing you to start the computer, since you are obviously unwilling
to submit to its censorship.

The virus also uses powerful means to prevent disinfection, so that, once you
get it, you can't get rid of it without a major effort.

------------------------------------------------------------

Now, I know you can get a lot more creative than this--so do it! Design your
virus carefully, so that everything it does has meaning. Then send it in.

Here are the criteria we'll use:

1. Originality: Your virus must be an original work. Do not send us anything
that is not 100% yours. Your message should be original too. Do not just
ape what everybody else is saying, especially the media. Also, a refined wit
is much to be preferred over vulgarity. Vulgarity is a substitute for
original wit. Foul language, porn, etc., are out. Destructive features should
be incorporated only if they are VERY appropriate (perhaps if you are
commenting on real live genocide in your country, or something like that).
In general, though, destructive features will hurt you, not help you. The one
exception is modifying anti-virus programs. That is considered to be
CONstructive activity.

2. Creativity: Make us laugh, make us cry. Amaze us with how bits and bytes
can say something about politics and issues. Think of it like this:
displaying a message on the screen is like reading a text file. What we want
is the equivalent of a multi-media extravaganza. Use all the system's
resources to tell your message. Don't be afraid to write a virus that has
some weird mode of infecting programs that tells a story, or to write one
that sends faxes to the White House, or sends an automatic request for reams
of free information to some government agency.

3. Functionality: The virus has to work. If it only works on some machines,
or under some versions of DOS, or what-not, then that will count against
you. The better it is at infecting systems and moving around, the better off
you will be. So, for example, if you write a file-infector, make sure it can
jump directories, and--if you're up to it--migrate across a network.

4. Political incorrectness: Since computer viruses are politically incorrect,
their message should be too. If you send us a pro-establishment virus, then
you will not win this contest. A word to the wise: think twice about what's
correct and what's not. Many positions are only superficially incorrect,
though they are really quite fashionable among the establishment. Look at it
this way: if you could get a well-written letter expressing your view
published in a big city newspaper, then it's not sufficiently incorrect.
There are a LOT of ideas that are unofficially censored by society--
especially the media and academia. They tend to make themselves out to be the
rebels, but they are really the establishment. If you can't think of anything
creatively incorrect and sufficiently obnoxious then you shouldn't be writing
viruses in the first place.

*************************************************************

How to Submit an Entry

You may mail your entry to American Eagle Publications at the above address,
or you may e-mail it to ameagle@mcimail.com. Alternatively, you can submit it
by dialing the Crypt Infosystems BBS and uploading it there. To get on to the
system quickly, efficiently and anonymously, log on as VIRUS, using the
password CONTEST.

An entry consists of:

1. A complete copy of your virus, both source and executable files.

2. If the political satire isn't perfectly obvious, send a verbal description
of how the virus works and why it does what it does. This is especially
important if you are not an American and you are commenting on something that
has not received worldwide attention. I don't care if you're Bulgarian and
you're commenting on something we've never heard of--just make sure you
explain it, or we won't understand and you'll lose.

3. If you want to be recognized for your work, include your name (real or
handle), and a way we can get in contact with you.

By submitting an entry, you grant American Eagle Publications, Inc. the right
to publish your virus in any form. You agree not to make your virus public
prior to July 25, 1994. If you do, you are automatically disqualified from
the contest.

For the sake of privacy, you may encrypt your entry and send it in with the
following PGP key (which we highly recommend if you have PGP):

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.1

mQCNAi09jVgAAAEEAN3M9LFQXeBprkZuKo5NtuMC+82qNd3/8saHLO6iuGe/eUai
8Vx7yqqpyLjZDGbAS7bvobrcY3IyFeu8PXG4T8sd+g81P0AY0PHUqxxPG3COvBfP
oRd+79wB66YCTjKSwd3KVaC7WG/CyXDIX5W6KwCaGL/SFXqRChWdf2BGDUCRAAUR
tApDT05URVNUXzk0
=Z20c
-----END PGP PUBLIC KEY BLOCK-----

Good luck!

****************************************************************

P R I Z E S

In addition to instant worldwide fame and recognition, you'll get:

1. A cash prize of $100 US.

2. A year's subscription to Computer Virus Developments Quarterly.

3. Your virus will be published in Computer Virus Developments Quarterly,
and other fine journals.

4. A handsome engraved plaque recognizing your contribution to the betterment
of mankind.

5. A free secret surprise that we cannot tell you about right now, valued
at $100.

Two runner-ups will receive the secret surprise.

!! GO FOR IT !!


=============================================================================

STUFF TO SPEND YOUR MONEY ON:

> Tapes of last years speakers (four 90 minute tapes) are available for $20

> DEF CON I tee-shirts (white, large only) with large color logo on the
front, and on the back the Fourth Amendment, past and present. This is
shirt v 1.1 with no type-o's. These are $20, and sweatshirts are $25.

> DEF CON II tee-shirts will be made in various colors this year, including
a few long sleeve shirts. Sizes will be in XL only again, with few white
larges made. Shirts will be $15, Long Sleeve $17, Sweat shirts will be $20.
Well, actually, I'll make a small quantity of various stuff, so with luck
you'll find something you like.

> We will have a few (ten maybe?) embroidered hats with this years logo.
Not sure how much they will be.. like $10 maybe.

> Full sized 4 color DEF CON II wall posters will be for sale for about $5.

> Pre-Register for next year in advance for $15 and save half.

> Make all checks/money orders/etc. out to DEF CON, and mail to the address
above. Way above. Above the virus awards announcement.

If you have any confidential info to send, use this PGP key to encrypt:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3

mQCrAiyI6OcAAAEE8Mh1YApQOOfCZ8YGQ9BxrRNMbK8rP8xpFCm4W7S6Nqu4Uhpo
dLfIfb/kEWDyLreM6ers4eEP6odZALTRvFdsoBGeAx0LUrbFhImxqtRsejMufWNf
uZ9PtGD1yEtxwqh4CxxC8glNA9AFXBpjgAZ7eFvtOREYjYO6TH9sOdZSa8ahW7YQ
hXatVxhlQqve99fY2J83D5z35rGddDV5azd9AAUTtCZUaGUgRGFyayBUYW5nZW50
IDxkdGFuZ2VudEBkZWZjb24ub3JnPg==
=ko7s
-----END PGP PUBLIC KEY BLOCK-----

- The Dark Tangent

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT