Copy Link
Add to Bookmark
Report

Pirate Vol 1 Issue 4

eZine's profile picture
Published in 
Pirate
 · 5 years ago

  


*******************************************************
** **
** PPPPP I RRRRR AAAAA TTTTT EEEEE **
** P PP I R RR A A T E **
** PPP I RRR AAAAA T EEEEE **
** P I R R A A T E **
** P I R R A A T EEEEE **
**keepin' the dream alive **
*******************************************************

-=> VOLUME 3, ISSUE 4, February, 1989 <=-

**** WELCOME ****

To the fourth issue of -=* PIRATE *=-!
Special thanks for getting this issue out go to:
Chris Robin
Gene & Roger
Hatchet Molly
Hot Mix #1
Jedi
Knight Lightning
Maxx Cougar
Nicodemus Keezarvexius
Pru Dohn
Taran King
The California Zephyr
Ty Rexx

Any comments, or if you want to contribute, most of us can
be reached at one of the following boards:
BOOTLEGGER'S >>> PIRATE HOME BOARD
RIPCO (Illinois)
SYCAMORE ELITE (815-895-5573)
COMPANY OF WOLVES (301-791-1595)
THE ROACH MOTEL (California)
PACIFIC ALLIANCE (818-280-5710)

+++++++++++++++++++++++++++++++++++++++++++++++++++++

Dedicated to sharing knowledge, gossip, information, and tips
for warez hobbyists.

** CONTENTS THIS ISSUE **

File 1. Introduction and contents issues 1-4
File 2. Editorial: Defense of pirating
File 3. PHRACK BUST
File 4. Zipfile Tips
File 5. Company of Wolves Unprotects
File 6. PTL Cracking Primer
File 7. What Makes a Good Board
File 8. BBS Symbols and Faces
File 9. Gene and Roger at the BBS: *EURO-AMERICAN CONNECTION*
File 10. Some of our favorite numbers

------------------------------------------------

** WHO ARE WE? **

We've been asked "who are you guys?" Well, the guys are not all guys, and
sexism sucks. The people who put out pirate are mostly IBMers with some apple
and ST influences. We're a loose collective, mostly from the midwest, but with
contributors from around the country. Collectively, we're on probably all of
the good national boards, and those listed as "contact points" are not
necessarily those we frequent the most, but those we like a lot and where we
check in at least once every few weeks. Our goal is to try to provide news of
general interest to *all* BBS enthusiasts, share information and gossip, and to
give newcomers tips on how not to be lame. We hope this will improve BBSing for
everybody. We are committed to keeping information free to the people, and we
oppose control of knowledge by an elite few. As warez hobbyits, we believe that
knowledge of current software is of benefit to the software industry despite
their claim that sharing is unethical. We also believe that informed consumers
make for better products, and that sharing information on warez is a patriotic
and democratic duty.

As some may notice, the format of *PIRATE* changes each issue, for the better,
we hope. We have noticed some *PIRATE* files listed as g-philes on some boards,
so we thought it might be helpful to include an index periodically of previous
issues:

PIRATE INDEX (Issues 1-4)

*PIRATE* Index to Issue #1 (June, 1989)

File 1. What's a Pirate?
File 2. Pirate Do's and Don'ts
File 3. Pirate tips
File 4. Why Software ownership is bad for society
File 5. Copyright Law
File 6. Computer laws in Wisconsin
File 7. Editorial: Big Brother in the Computer Room?
File 8. Sysop's corner
File 9. What's hot, what's not
File 10. Wants and Needs
File 11. Board Review of the Month: THE GREAT ESCAPE
File 12. A few decent boards
-=-=-=-=-=-=-

*PIRATE* Index to Issue #2 (September, 1989)

File 1. Introduction, editorial, and general comments
File 2. Whither the World of Pirates?
File 3. How to get things running
File 4. Sysops and the Law -- Sysops' Legal Liability
File 5. Hackers in the News
File 6. Illinois and Texas Computer Laws
File 7. Is Teleconnect Dangerous? They're after our rights!
File 8. Viruses
File 9. BBS NEWS: Review (ATLANTIS) and APPLE #s
-=-=-=-=-=-=-

*PIRATE* Index to Issue #3 (January, 1990)

File #1. Introduction, editorial, and general comments
File #2. News Reprint: Who's the REAL software threat??
File #3. Unprotects and cracking tips (part 1)
File #4. Unprotects and cracking tips (part 2)
File #5. Unprotects and cracking tips (part 3)
File #6. Unprotects and cracking tips (part 4)
File #7. Unprotects and cracking tips (part 5)
File #8. Unprotects and cracking tips (part 6)
File #9. Gene n' Roger's "review of the month" (DEAD ZONE)
-=-=-=-=-=-=-

*PIRATE* Index to Issue 4 (March, 1990)

File 1. Introduction and contents issues 1-4
File 2. Editorial: Defense of pirating
File 3. PHRACK BUST
File 4. Zipfile Tips
File 5. Cult of Wolves Unprotects
File 6. PTL Cracking Primer
File 7. What Makes a Good Board
File 8. BBS Symbols and Faces
File 9. Gene and Roger at the BBS: Euro-American Connection
File 10. Some of our favorite numbers

>--------=====END=====--------<



***************************************************
*** Pirate Magazine Issue IV / File 3 of 10 ***
*** PHRACK/LoD bust of January, 1990 ***
***************************************************


As most of you know, PHRACK is down for awhile. It seems that in doing the good
deed of sending out back issues across e-mail lines, some eyebrows were raised.

----
The following newspaper accounts and commentary come from Dr.Ripco.
-----

(From the CHICAGO SUN-TIMES 2/7/90)

Two students with reputations as master computer hackers were
indicted here Tuesday on charges of stealing and publishing highly sensitive
information about the 911 emergency phone system in nine southern states. The
indictment alleges Robert J. Riggs, 20, a student at DeVry Institute in
suburban Atlanta, is a member of "The Legion of Doom," a nationwide group of
hackers said to be involved in illegal activities. His co-defendant is Craig
M. Neidorf, 19, a University of Missouri student who publishes Phrack, a
hacker magazine transmitted by computer. The indictment charges Riggs gained
unauthorized access to computers of the Bell South Telephone Co. in Atlanta in
December, 1988, and obtained the 911 file. It was sent to Neidorf via a
computer bulletin board in Lockport.

* * * * * * * * * * * * * * *

2 STUDENTS CHARGED IN COMPUTER FRAUD
------------------------------------

(from the Chicago Tribune 2/7/90)

Two college students who were members of a nationwide network of
computer hackers called the Legion of Doom were charged Tuesday with
breaking into the BellSouth Corp. 911 emergency system and publishing the
system through a hackers' "bulletin board."

Robert J. Riggs, 20, a DeVry Institute student in Atlanta, and Craig
Neidorf, 19, a University of Missouri student from Chesterfield, Mo., were
charged with wire fraud, interstate transportation of stolen property and
computer fraud and abuse.

The indictment, announced in Chicago by U.S. Atty. Ira Raphealson,
charges that Riggs broke into the BellSouth system in December 1988 "by using
a computer outside the telephone company to break into the telephone company's
computer system in which the computer file was stored."


The computer program for the BellSouth 911 system, valued at $79,449,
controls emergency calls in nine Southern states - Alabama, Mississippi,
Georgia, Tennessee, Kentucky, Louisiana, North Carolina, South Carolina and
Florida.

Riggs then transfered the BellSouth 911 information to the computer
"bulletin board" in Lockport. At this point, Neidorf loaded it into his
computer in Missouri and edited it for publication in a computer hacker
publication known as "Phrack," the indictment charges.

Assistant U.S. Atty. William Cook, who prepared the indictment,
declined to say if the police or fire departments in any of the affected citie

If convicted of all charges, Riggs would face a prison sentence of
32 years and a fine of $220,000. Neidorf faces 31 years in prision and a
fine of $122,000. Riggs faces similar charges in Atlanta, Cook said.

--------------------------------------

Whats interesting about this is what they are charging Craig (Knight Lightning)
with. it appears publishing the information (based on prision time) is nearly
as criminal as breaking in and getting the program. its unlikely that either
one will serve much time if any at all but it does present a crimp into what
can be 'published' and what cannot on bulletin boards.

what the article did not mention or name is the board in Lockport. i take it
they are taking about Lockport Illinios which i'm unfamilar with which board
this could be. although they have indicted 2 people, one who sent the info and
one who took it, does that mean the bbs used for the transfer is out of the
picture so to speak?

much food for thought....

Dr. Ripco

* * * * * *

As of this writing, nobody is completely certain what has happened or what will
happen, but we obtained the following from the major board where the crowd
hangs out.
The names were changed to protect the, uh, innocent.

--------------------

31/53: phrack...
Name: Magnum Guru
Date: Sat Jan 20 02:58:54 1990

Welp, Phrack magazine is dead. Those of you who pay attention to BITNET know
that the phrack accounts at U of M have been shut down. The story is as
follows...

Government agents (not sure of the dept., probably SS) have apparently been
monitoring the e-mail of the Phrack kids (Night Thunder & Prince Tarzan) for
some time now. Apparently, a portion of a file sent to them (and subsequently
published) contained copyrighted information. This is all they needed. They
have now seized the entire Phrack net mailing list (over 500 accounts), plus
every piece of information that Andar & Geric have (and they have a *LOT*) on
real names, addresses and phone numbers. This is evolving directly out of the
busts of three LOD members (Urvile, Leftist & Prophet). The Prophet (who is on
probation) is apparently being threatened with a prison term if he doesn't
cooperate. We don't know for sure if he cooperated or not, but what would you
do in the same position? The same officials are apparently *VERY* interested
in our co-sys, Mr. BA. His net account is being watched, etc. I'll let
him tell the story.

Anyone wishing to communicate with E or myself should do so through the
board only. I will be adding a secure (and I mean fucking secure) encryption
routine into the e-mail in the next 2 weeks - I haven't decided exactly how to
implement it, but it'll let two people exchange mail encrypted by a password
only know to the two of them. Hmmmm... carry this conversation to the
programming board.

Anyway, I do not think I am due to be busted, but then again, I don't do
anything but run a board. Still, there is that possibility. I assume that my
lines are all tapped until proven otherwise.

There is some question to the wisdom of leaving the board up at all, but I have
(have) personally phoned several government investigators and invited them to
join us here on the board. If I begin to feel that the board is putting me in
any kind of danger, I'll pull it down with no notice - I hope everyone
understands.

It looks like it's sweeps-time again for the feds. Let's hope all of us are
still around in 6 months to talk about it.

32/53: hmm
Name: Ashman
Date: Sat Jan 20 07:50:12 1990

this is getting truly annoying..

Phoenix

33/53: Phrack, etc...
Name: Phobos Kutter
Date: Sat Jan 20 09:30:10 1990

RE: phrack...

I sounds to me as though the "SS" was really reaching. I mean, to get them on
"copyright" violations is sort of like that had such a hard on for the
Phrack boys it was as though they went after gangsters with income tax evasion!

What is the legality of them spreading all of this information that they have
obtained throughout the world? I mean, if they got names, etc.., isn't that
private information? Do they or wl they publish all of it to the maniacs out
there?

35/53: Phrack and Pac*Hell
Name: Rip Torn
Date: Sat Jan 20 21:05:55 1990

Well-

A copyright infringement isn't all that major that the SS would bust them for
just that. I'm willing to bet they intercepted something bigger than a simple
copyright piracy case. Although they would be interested since the information
is being transported across state (and quite likly) national boundries.

About the San Jose case, sounds like they just got access to the TAN (Technical
Access Network), and went from there. Along with their other antics, they'll
prob get a prison term, because they are really strict on the wiretap bit. I
don't get the part about the false names and addresses. The courts have said
in the past, you can just pick a name out of the blue and use it, and you can
give any kind of information (like a false address or phone number for
instance) as long as the documentation is not for an official purpose and is
not intended to defraud someone.

I noticed Peter Neumann in there, he's a guy to listen to, and many of you
might reconize him from the Risks forum on the net. He is one of the few
public figures involved in computers that knows which way is up.

Recap-

Phrack will most likly get a slap on the wrist, but will have a sober look at
the world, and won't be inclined to be as high profile as they were.

The San Jose case, I'm betting it'll turn high profile, and there will be alot
of pressure for a nice long lock up.

Most of this is based on my dealings with local, state, and federal law, as
well as experience I gain while working for the County of San Diego.


36/53: phrack
Name: Midnight Star
Date: Sat Jan 20 21:36:56 1990

I would think they knew of dealings between phrack & hackers/phreakers, but
they had to have some real evidence in order to get in, once they did, they
found much info that would make for a good prosecution... As any hacker knows,
its the little things that matter

37/53: The Bottom line.
Name: The Rap Master
Date: Sun Jan 21 10:05:38 1990

The bottom line is..a crackdown. We can now expect a crackdown because of
the shit with the virus,the boys in cali, and the phrack kids.... The phrack
boys were just the start, i'm sure of it.. Unfortunately with all of this in
the news now, they will be able to get more government money to combat hackers.
And thats BAD fucking news for us. I think they are going after all the
"teachers" etc/.. people who educate others into this sort of thing.. (which i
didn't need to say because it's obvious after what happened to Andar & Geric) i
wonder if they think that maybe these remote cases are linked in any way.. The
only way they can probably see is that we are hackers.. And so that is where
their energies will be put.. To stop ALL hackers..and stop people BEFORE they
can become a threat.. After they wipe out the educators that is. Just a
theory.

38/53: Phrack
Name: Phobos Kutter
Date: Sun Jan 21 13:09:20 1990

It's a scary thought... - How did the intercept the information?? -

An information, ok, that's legal.... but how private is electronic mail? Per
haps we need a sub board to discuss some of these LEGAL issues...

39/53: ripper
Name: Magnum Guru
Date: Sun Jan 21 17:12:22 1990

Well, I know PT & NT pretty well, and they've been paranoid about doing
*anything* illegal. I think the SS just had a hard-on to hassle them and this
was the only excuse that they could come up with...

41/53: Phrack
Name: The Mogul
Date: Mon Jan 22 01:19:32 1990

I'm not sure what to make out of the Phrack. I think the SS, FBI, and whoever
has been waiting to bust them so long on ANYTHING that they waiting untill PT
NT crossed the line in any way. I mean, hell..PT and NT were paranoid, and
they suspected everything..so they stopped..and the SS, FBI and whoever had
nothing to go on...

Rap Master was right, PT and NT were "educators"..a lot of hacks/phreaks looked
up to them..maybe the SS and FBI thought that maybe if they couldn't get the
little guys, then to go for "the big guys"..(same philosophy of the drug war,
eh? Get the dealers, not the users?) Oh well..

I dunno..thats just my opinion... Shit, the public doesn't understand us enough
for the government to declare war on us... Maybe if you collect everyones
opinion on this, we can come to ONE conclusion..


42/53: Phrack
Name: Viking Warrior
Date: Mon Jan 22 02:40:13 1990

Geric was very upset when I talked to him a few days ago.

The Secret Service had been to their school and had taken all information off
of their public accounts through the university...this included the ENTIRE
phrack internet mailing list, future files, old issues, various lists of info
on people they knew, etc...

Geric assured me that they didn't go through his room, or even mess with his
pc, but that didn't matter, as they got enough from the system at school.

The problems stem from various articles published through Phrack, most
specifically an article dealing with E911 that was written by The Prophet.
They have said that this was stolen from a computer system, and was accepted
and distributed knowing that it was illegally obtained propriatary information.

(The Prophet was one of the 3 LOD members busted this summer in Atlanta) This
led to various questions dealing with LOD in general and a great deal of hazing
towards Geric.

For the most part, they pulled the same crap: "We know what you did, so if
you're smart you'll talk, or we'll make your life shit."
And the other
approach, "Look, we know you're a smart kid with a bright future and we really
wouldn't want to see you fuck things up."
Basic cop bullshit.

Geric was visited first by 3 agents, and Andar was supposedly to be visited the
following day. (They are at different schools now)

They were interested in the Telenet Directory, The EFT Files, which by now,
everyone knows that I wrote, since they had been grabbing the boys e-mail.

That pisses me off greatly, as Electronic Mail is supposed to be covered under
the same protection as regular mail now, or so I understood. I thought it was
a felony to interfere with peoples mail. Can you commit a felony, to stop a
suspected one from occurring? I hope not...hell, maybe Noriega is in charge
now...

In any case, I think I'm in for a world of shit...

43/53: MY feelings about this fucked up situation
Name: Viking Warrior
Date: Mon Jan 22 03:31:01 1990

I do not live in a fascist country...or so I thought.

INformation is withheld, people are threatened daily by an elite group of
Government thugs who operate above the law, hell, what do you call that kind of
bullshit?

I'm growing more and more pissed by the minute...if I do get nabbed, which I
semi-expect to, so you SS boys take a good look at this, I am dangerous. Maybe
not in a physical manner, although I'm kinda suicidal, and don't know how I'll
be on any given day, and I've only tried to kill my roommate once with a big
knife, and I've only broken wine bottles over two people...

But, I am dangerous in that I'm quite eloquent and VERY outspoken on topics
about which I feel strongly. Guess what? I kinda have a personal leaning
towards computer crime. Think carefully about reprocussions world-wide when
reporters find out just how insecure your precious Internet is, or think about
the stock fluctuations on Fortune 500 companies when their shareholders find
out just how easily the company could be shut down for a few days with a few
keystrokes, or consider the implications following just a few choice comments
about the lack of security at large banking institutions...hell, How fucking
skilled does someone have to be to sit on a nua and capture every fucking Saudi
Visa? (No offense P) but that shit is totally ridiculous. Security is
pathetic, and the ones who can fix it, or at least point it out are suppressed,
and placed in jail.

Fuck that. If that's what you expect to do to me, then you had better be
prepared to blow my fucking head off when you kick in the door, because I will
be heard.


47/53: well
Name: Ashman
Date: Mon Jan 22 09:21:39 1990

as long as nothing illegal is not posted.. the board is ine.. well... All i
have to say is that i ss/eds/or in my case CIA start playing dirty.. we have
been very nice in general about everything.. In act I cannot think o any time
when i have bought a system down.. But i it comes to it... we can fight ire
with ire.. <add f's where chars are missing.. i gotta get a new keyboard..> coz
i seriously agree with erik.. and when you guys start breaking the law to get
at us... well.. what the hell is the law or... i never liked the damn thing
anyway.. jesus.. as a final note... i will set up some sort of insurance... not
just or myself... but or anyone who needs it... and cant provide it or
themselves.. we can play below board just as much as any authorities can... so
there

49/53: dumb feds
Name: Silver Hawk
Date: Mon Jan 22 14:11:13 1990

Kill 'em all..as I like to say. Seriously, what can they prove if you are a
safe hacker? (hacking via outdials, phreaking with divertors only..no codes
etc. nothing traceable) They can't prove a damn thing. So what do they do,
but nail you on something trivial like copyright violation. All that shows is
that they have such a weak case that there is nothing solid to bust on. Enough
rambling for this paragraph...

What we need to do is set up a hackers network where everyone has their hands
in a few systems. That way, we have this sort of insurance that Phoenix talked
about: if one hacker gets busted 2 systems _die_. 2 hackers get busted 4
systems bite the dust. 3 hackers...9 systems. They need to quit messing with
people who wouldn't otherwise be harmful to the computer world. I know there
are freeloaders around that get their kicks from trashing Apple][ boards and
unixes, but this doesn't represent the majority of the hacker population. It
sure doesn't represent me!

50/53: busts
Name: Midnight Star
Date: Mon Jan 22 15:33:56 1990

I don't think that would be a very wise idea... It would just cause the
"authorities" and the general public to look toward us as destroyers, not
explorers... The ONLY times I have killed a system is when I really get pissed
off that the sysop keeps changing all the operator passwords (well... so maybe
i am a little malicious at times, but not like some people on this board)

51/53: Arg...
Name: Viking Warrior
Date: Mon Jan 22 18:22:55 1990

Wiping out systems as a means of retribution, or vengeance for a fellow
hacker's bust is NOT a good idea. You cannot take a bully approach when
dealing with the world biggest bully (The US Government) you will lose.
You have only one manner of defense, and that is to outsmart your opponent, or
to publicly humiliate him when faced with immediate danger.


Numb ->117 (51u7u2k2-117)
Sub ->busting hackers
From -> (#227)
To ->
Date ->02/08/90 08:58:00 PM


Reading the previous msgs. about the legion of doom and the possible prison
term of 32 years infuriates me. sure, what those dudes did is not right, but
lets keep their crime in perspective. they stole some shit off of a computer
system which was online and available to the public. ok, most of the public
doesn't know how to get stuff like that, but the fact that they did get it
means it could be considered available. the phone company surely knows of
phreakers, and that these people can be quite clever, therefore they knew the
information could be had.

30 years in jail for a fucking program, come on!!! people are killed and the
murderers get less. i realize that they probably won't get 30 years, but just
the possibility of getting it is outrageous.

f/h

Numb ->117 (51u7u2k2-117)
Sub ->Reply to: busting hackers
From -> (#321)
To ->all
Date ->02/09/90 02:59:00 AM

32 years for printing a publication. Hey you guys think there is some
issues of freedon of press or speech here. No probabably not because of the
subject matter but anyway It does seem kind of harsh considering there are alo
of other more important things to bust assholes for like murder and drug
smuggling. Its just another waste of tax payers money just like trying to
eleminate abortion. Who gives a fuck if you can't bring a kid into this world
right then there should be a choice. Too many people in this world anyway.

Numb ->118 (51u7u2k2-118)
Sub ->Reply to: Reply to: busting hackers
From -> (#70)
To ->J CRAZY
Date ->02/09/90 03:12:00 AM

A CLASSIC EXAMPLE OF "NOT COMPLAINING UNLESS YOUR OX IS GORED"! NOW I AGREE
WITH YOU THAT 32 YEARS, OR ANY YEARS FOR PUBLISHING IS RIDICULOUS...PER THE
FIRST AMENDMENT, BUT THEN YOU GO ON ABOUT MURDER AND "DRUG SMUGGLING" IN THE
SAME BREATHE. SINCE WHEN DOES THE GOVERNMENT HAVE THE RIGHT TO TELL US WHAT
WE CAN AND CAN'T DO WITH OUR BODIES IN PRIVATE? SINCE WHEN DOES THAT
PROHIBITION JUSTIFY JAIL? COMPLAIN ABOUT VIOLENT CRIMES PER SE, DON'T BE A
GOVERNMENT CONTROLLED STOOGE AND BUY INTO THEIR LATEST DEMAGOGUERY.

Numb ->119 (51u7u2k2-119)
Sub ->Reply to: busting hackers
From -> (#450)
To ->
Date ->02/09/90 06:58:00 AM

The prison sentence..or the one that they face is quite high! That is more
than they give murderers/rapists and any other hard crime! I'm not saying that
they should go scot free,but lets be realistic and give a sentence that does
fit the crime. Whatever 31 years is way to long.


Numb ->120 (51u7u2k2-120)
Sub ->stuff
From -> (#75)
To ->folks
Date ->02/10/90 03:00:00 AM

I don't think they're actually being PROSECUTED for publishing the information
they just play up the fact that the information was distributed in their cop
press releases to build public antipathy towards the suspects... Generic peopl
tend to think very highly of things like 911 that shouldn't be "monkeyed with"
so when they hear that kids are spreading "confidential" information about
those systems around, they get afraid and are sympathetic to prosecution. The
only charges I can imagine are related to 'breaking and entering' into the
Bellcore computer.

To the best of my knowledge, there is no precedent for a "clear and present
danger"
prosecution against publication of information on law enforcement
procedures. A successful one, anyway.

* * * * * * *

The following came across the wires from a member of LoD explaining his view,
which contrasts remarkably from "official" media descriptions. The bottom line
is that it seems like the pheds are engaging in a witch hunt of sorts and
whether they can make charges stick is irrelevant for the Heavy Hasslers with
the power.


--------------------


-< Life, The Universe, & LOD >-


To set the record straight, a member of LOD who is a student in Austin and who
has had his computer account at UT subpoenaed by the DA out of Chicago because
of dealings with the above happenings:

My name is {deleted}, but to the computer world, I am Erik Bloodaxe. I have
been a member of the group known as Legion of Doom since its creation, and
admittedly I have not been the most legitimate computer user around, but when
people start hinting at my supposed Communist-backed actions, and say that I
am involved in a world-wide consipracy to destroy the nations computer and/or
911 network, I have to speak up and hope that people will take what I have to
say seriously.

Frank, Rob and Adam were all definately into really hairy systems. They had
basically total control of a packet-switched network owned by Southern Bell
(SBDN)...through this network they had access to every computer Southern Bell
owned...this ranging from COSMOS terminals up to LMOS front ends. Southern
Bell had not been smart enough to disallow connections from one public pad to
another, thus allowing anyone who desired to do so, the ability to connect to,
and seize information from anyone else who was using the network...thus they
ended up with accounts and passwords to a great deal of systems.

This was where the 911 system came into play. I don't know if this system
actually controlled the whole Southern Bell 911 network, or if it was just a
site where the software was being developed, as I was never on it. In any
case, one of the trio ended up pulling files off of it for them to look at.
This is usually standard proceedure: you get on a system, look around for
interesting text, buffer it, and maybe print it out for posterity. No member
of LOD has ever (to my knowledge) broken into another system and used any
information gained from it for personal gain of any kind...with the exception
of maybe a big boost in his reputation around the underground. Rob took the
documentation to the system and wrote a file about it. There are actually two
files, one is an overview, the other is a glossary. (Ray has the issue of
PHRACK that has the files) The information is hardly something anyone could
possibly gain anything from except knowledge about how a certain aspect of the
telephone company works.

The Legion of Doom used to publish an electronic magazine called the LOD
Technical Journal. This publication was kind of abandoned due to laziness on
our part. PHRACK was another publication of this sort, sent to several
hundred people over the Internet, and distributed widely on bulletin boards
around the US. Rob sent the files to PHRACK for the information to be read.
One of PHRACK's editors, Craig, happened to be the one who received the files.
If Rob had sent the files to one address higher, Randy would have been the one
who would probably be in trouble. In anycase, Craig, although he may have
suspected, really had no way to know that the files were propriatary
information and were stolen from a Southern Bell computer.

The three Atlanta people were busted after having voice and data taps on their
lines for 6 months. The Phrack people were not busted, only questioned, and
Craig was indicted later.

What I don't understand is why Rob and Craig are singled out more often than
any other people. Both of them were on probation for other incidents and will
probably end up in jail due to probation violations now. Frank and Adam still
don't know what is going on with their cases, as of the last time I spoke with
them.

The whole bust stemmed from another person being raided and rolling over on
the biggest names he could think of to lighten his burden. Since that time,
Mr. William Cook, the DA in Chicago, has made it his life's goal to rid the
world of the scourge of LOD. The three Atlanta busts, two more LOD busts in
New York, and now, my Subpoena.

People just can't seem to grasp the fact that a group of 20 year old kids just
might know a little more than they do, and rather than make good use of us,
they would rather just lock us away and keep on letting things pass by them.
I've said this before, you cant stop burglars from robbing you when you leave
the doors unlocked and merely bash them in the head with baseball bats when
they walk in. You need to lock the door. But when you leave the doors open,
but lock up the people who can close them for you another burglar will just
walk right in.

If anyone really wants to know anything about what is going on or just wants
to offer any opinions about all this directly to me, I'm

erikb@walt.cc.utexas.edu

but my account is being monitored so don't ask anything too explicit.

--------------------

>--------=====END=====--------<



***************************************************
*** Pirate Magazine Issue IV / File 4 of 10 ***
*** >Zipping and Archiving< ***
***************************************************


Swapping warez requires considerable zipping, unzipping, and rezipping, and we
offer the following tips to help assure that we get the most out of our ZIP
programs and procedures. ALthough most boards will accept any reputable
compression, there's not much disagreement on which compression method is the
best: Phil Katz's PKZIP is the standard. It's fast, tight, and offers many
options. Although some, such as ICE 1.14, may have higher compression ratios,
no other program has the all around power and utility as PKware.
Unfortunately, too many warez hobbyists don't use PKZIP to it's full potential,
and this can result in lost files, confused archives, or incomplete files on
uploading. We offer the following tips to improve zipping procedures.

1. Always zip from the original disks or programs when possible rather then do
a file dump and then rezip. In a file dump, it is easy to forget to include
subdirectories.

2. *ALWAYS* put a zip comment in each zip file so you (or others) know what
that file is. If you are zipping up a program called "LAWRITE" that has 6
disks, with the first being the program disk, type this command:
PKZIP LRT21-1 (for "Law Rite, ver. 2.1, disk 1). Then, type: PKZIP -Z
LRT21-1 (this will allow a zip comment) and type at the prompt something
like: "
LAWRITE BY MACON, VER. 2.1, PROGRAM DISK (1/6). This lets you (or
whoever) know what the program is, what the disk is should the installation
procedure ask for the specific disk, and give you the version so it won't
be confused with an upgrade.

3. Experienced hobbyists keep their backup zip files as they come
off the disk, and this means *KEEPING SUBDIRECTORIES INTACT AND SEPARATE FROM
OTHER FILES.** There are two ways to do this. The first is to INSTALL a
complete program, including all options, so a complete program exists on hard
disk. Then, we go into each subdirectory and zip the files. For example, if
LAWRITE has a main directory called LAWRITE and three subdirectories called a)
FILES, b) LAW, and c) DICTNRY, you first go into each of the three
subdirectories and zip the the files with the command: PKZIP -M FILES (or LAW
or DICTNRY). This will zip all the files in that directory and remove them
after zipping. This saves the need to delete files individually. THEN: Go into
the LAWRITE directory and type the command:
PKZIP -m -P -r LRT21 (note lower case m & r and UPPER case P)
This will zip the entire program, Law Rite 2.1. The -m command
removes individual files, the -P switch retains the file's original
path, and the -r recurses the subdirectories. For a helpful article on
this, even for experienced users, see Steven J. Vaughan-Nichols:
"Zippity PKzip" in PC COMPUTING, Feb., 1990 (p. 96-99).

When finished, you should have one main zip file that contains all the files
from the LAWRITE directory and three additional zip files from the three
subdirectories. BE SURE TO ADD A "README.NOW" note and explain that, when
unzipping, these directories and subdirectories should be created, unzipped in
the LAWRITE directory (with the PKUNZIP command). If you have a large program
with several zip files in it (ALWAYS RUN THE PKUNZIP -v *.zip command to see
what's in a zip file before unzipping), you might first create subdirectoriese
named after those zip files just to be safe, and keep your fingers crossed that
whoever zipped it knew what they were doing. That's why it is crucial to name
those other zip files exactly as the subdirectory appears.

The disadvantage of this kind of zipping for hobbyists is that when unzipping,
the files will be from an installed program and not the original disk. This
means that if unzipped on a different computer, some needed files may be
missing. Besides, it's always helpful to have a second backup that
doesn't take much space that is complete. That's why we prefer
to keep zips off the original disks, because you never know what
kind of system it will be unzipped on, and installation programs
rarely copy over all files, but only those needed during the
initial configuration.

We suggest creating a test directory with a few subdirectories and placed some
short, unneeded files in them and then spending an hour practicing with the
PKzip/UNzip commands until you are familiar with them. You might also consider
experimenting with various batch commands, and use wildcards to create an
auto-zip program that saves typing time.

There have been reports that ICE 1.14 is a hacked version of LHarc, but this
does not appear true. A nice summary of other compression programs appeared in
PC COMPUTING (see above):

----------
FOUR OTHER DATA COMPRESSORS PKzip stands above other data-compression shareware
in terms of overall performance. Here are some more very popular utilities:

ARC 5.02. Long the industry standard, Arc 6.02 has deteriorated into a
middle-of-the-road performer in terms of speed and compression ratios. It has
the bad habit of aborting a job and leaving a file half-compressed if it
doesn't have enough disk space to complete the operation....

ICE .14. One of the newest entries in the data-compression arena, Ice (also
known as LHarc) emerged as a popular shareware program in Japan. It has the
highest compression ratio of any program mentioned here, but it's painfully
slow--and very difficult to use, in part because of its limited documentation.
Ice .14 is currently available on GEnie.

PAK 2.1. Though it's been around for a while, Pak has never had the prominence
of either Arc or PKzip, mostly because its performance lags behind that of the
other two programs. Pak excels at handling multiple file specifications and can
create and convert files read by Arc.

Zoo 2.01. Neither the fastest nor the most efficient compression utility
available, Zoo offers some advantages. This shareware program allows you to
selectively extract multiple generations of the same file--a terrific feature
for programmers and writers. It also spans several operating systems, including
Xenix, VAX/VMS, and Amiga DOS, so that you can archive files across platforms.
It's a difficult program to master, and the documentation isn't much help in
figuring it out.


>--------=====END=====--------<



***************************************************
*** Pirate Magazine Issue IV / File 5 of 10 ***
*** Cracking Tips by NICODEMUS KEEZARVEXIUS ***
*** (and Company of Wolves) ***
***************************************************


Company of Wolves and ace cracker Nicodemus Keezarvexius will appear here



periodically in their own corner. A few of the following were printed last
issue but we thought we'd reprint them to keep CoW's work in a single file. Any
suggests or requests, you can reach NK at PC-EXEC (414-789-4210) or the CoW
board (301-791-1595).

In this file: Unprotects for

BOP'N WRESTLE
KARATEKA
IMPOSSIBLE MISSION II
MIGHT AND MAGIC
POOL OF RADIANCE
GAUNTLET


FROM:
THE COMPANY OF WOLVES

----------------------------------------------------------------
MINDSCAPES BOP'N WRESTLE
----------------------------------------------------------------
NEEDED:
1. Norton Utilities (or similar program)
2. A copy of the file Bop.exe from your original disk.
3. A bit of your time
----------------------------------------------------------------

1. HOW TO UNPROTECT BOP'N WRESTLE:
First load one of the above file into Norton.
Then search for the string B8 00 19 CD.
Change these bytes to 31 C0 EB 2F.
Save the changes

2. FOR ALL OF YOU DEBUG FANS:
Rename Bop.exe to Bop.try
type E CS:96D [return] 31 [space] C0 [space] EB [space] 2F
[return]
Save the changes with the W command
Exit debug
Rename Bop.try back to Bop.exe
Enjoy the game on any drive you choose to.

The program will now skip the check for copy protection all together. The first
change (31 C0) is an xor ax,ax. The Second (EB 2F) jumps to a return. (just in
case you wanted to know)

If you have any problems with any of the patches above check the date of the
file BOP.EXE on your original disk A for the date 11/06/87. If your file has a
different date then they probably changed the copy protection method and your
out of luck with this patch.

----------------------------------------------------------------


----------------------------------------------------------------
**KARATEKA**
----------------------------------------------------------------
NEEDED:
Norton Utilities (or simular program).
A copy of the file Karateka.exe from your original disk.
A bit of your time.
----------------------------------------------------------------


1. HOW TO UNPROTECT BRODERBUND'S KARATEKA:
First load KARATEKA.EXE into Norton.
Then search for the string E8 81 14.
Change the string to 90 90 90.
Skip ahead 4 bytes to the string 75 2D.
Change the 75 to EB.
Search for the string E8 74 14.
Change the string to 90 90 90.
Once again skip ahead 4 bytes to the string 75 20 and Change the
75 to EB.
Write the changes.
The program will now skip over the part where it looks for the copy protection
but you aren't done yet.
Now search for the string B2 00 B4 0E CD 21.
Change all of these bytes to 90.
Write the changes.
Now the program will play on whatever drive you want.


----------------------------------------------------------------

If you have any problems with any of the patches above check the date of the
file KARATEKA.EXE on your original disk for the date 07-01-87. If your file has
a different date then they proabably changed the copy protection method and
your out of luck with this patch.

---------------------------------------------------------------
MISSION IMPOSSIBLE II
----------------------------------------------------------------


FROM:
THE COMPANY OF WOLVES
----------------------------------------------------------------
NEEDED:
Norton Utilities (or simular program).
A copy of the game file from your original Manhunter disk.
IM2_CGA.EXE if you have CGA graphics,IM2_TAN.EXE for Tandy,
IM2_EGA.EXE for EGA, or IM2_MGGA.EXE for MCGA.
A bit of your time.
----------------------------------------------------------------


1. HOW TO UNPROTECT IMPOSSIBLE MISSION II:
First load the appropiat file into Norton.
Search for the string A2 CA 99 A2 28 9C.
Change these 6 bytes and the next 6 bytes (total of 12) to 90's.
Write the changes.
Then search for the bytes CD 21 B9 01 14.
Change the CD 21 to 90 90.
Write the changes.
Now search for F6 C4 10.
Change the byte immediatly following the 10 (75) to EB.
Write the changes.
Next search for the bytes BB 09 9A 8B CD.
Change the 2 bytes before this string (72 xx (xx is different for
some of the above files)) to 90 90.
Write the changes.
Now search for B9 10 00 F3 A7.
Change the 2 bytes following this string (75 xx) to 90 90.
Write the changes.
Now search for B9 04 00 F3 A7.
Change the 2 bytes following this string (75 xx) to 90 90.
Write the changes.
Now search for B8 09 02 CD 13.
Change the CD 13 to 90 90, and the byte following it (73) to EB.
Write the changes.

Now the check for the copy protection (a bad sector on disk A) is disabled. If
you don't intend to use the game on your hard disk you can now play the game
from and DISKCOPYed disk. If you want to play this game from a single directory
on any fixed disk follow the procedure below.

2. FIXING THE PROGRAM TO PLAY FROM 1 DIRECTORY: Once again load the appropiate
EXE file into Norton. Search for the string CHARSf. Basicly you will type
the file name after the CHARSf over CHARSf. For example if the full string is
CHARSfTHISFILE.A to THISFILE.A(00) (Note. the end of the file name is denoted
by a 00) hex). Be sure to look to see if the . after the file is indeed a . or
a 00 hex because some files have extentions and some don't and make sure that
you end the name you just typed over ends with a 00.
Write the changes.
Repete the prodcedure until you reach the end of the file.
Next do the same thing exept look for the string ROOMSf.

Now when you copy the game just copy all of the files from all directories from
your original disks to the directory on the hard drive you intend to use. You
can now enjoy the game without flipping thru floppy disks.

-------------------------------------------------------------------
MIGHT AND MAGIC
------------------------------------------------------------------


----------------------------------------------------------------
NEEDED:
1. Norton Utilities (or similar program)
2. A copy of the file MM.EXE from your original disk.
3. A bit of your time
----------------------------------------------------------------


1. HOW TO UNPROTECT MIGHT AND MAGIC:
First load the file MM.EXE into Norton.
Then search for the string CD 13 72 EE.
Change these bytes to 90 90 90 90.
Write the changes.
Next search for the string CD 13 72 05.
Change these bytes to 90 90 90 90.
Write the changes.
Next search for the string CD 13 72 05.
Change the CD 13 to 90 90 and the 72 05 to EB 05.
A few bytes after this is a 75 F6, change these bytes to 90 90.
you will have to do this 4 more times here are the jumps to look
for: 75 20, 75 18, 75 10, 75 08. These will all be 7 bytes apart,
change them all to 90's.
Once again their will be another jump 7 bytes after the last one
you changed (74 03), change it to EB 03.
Write the changes.

----------------------------------------------------------------
The program will now skip the check for copy protection all
together.

If you have any problems with any of the patches above check the
date of the file MM.EXE on your original disk 1 for the date
11/18/87. If your file has a different date then they probably
changed the copy protection method and your out of luck with this
patch.

------------------------------------------------------------------
HOW TO FIX COPY PROTECTION FROM
AND SUPERCHARGE CHARACTERS
FOR POOL OF RADIANCE.


----------------------------------------------------------------
NEEDED:
Norton Utilities (or similar program)
A copy of the file start.exe from your pool of radiance disk
A bit of your time
----------------------------------------------------------------


1. HOW TO UNPROTECT POOL OF RADIANCE:
First load START.EXE into Norton
Then search for one of the key words from the code disk
Change the 6 letters of each word to whatever you want (make then
all the same for convince)
Save the changes


11/08/89
I just completed a new fix which will completely skip over the part where the
program asks you for the word from the code disk. For Norton Utilities users
search for the string 9A 25 00 1D 00, change all of these bytes to 90's. For
all of you Debug fans out there rename the file START.EXE to say 123.AAA (or
whatever), then type S cs:100 900 9A 25 00 1D 00. It should show a match at
xxxx:05D7. Change the bytes by typing the following: E 05D7 EenterL, 90 EspaceL
90 EspaceL 90 EspaceL 90 EspaceL 90 EenterL. Then write the file with the W
command and quit Debug. Now rename the file you just fixed to START.EXE and
your done.

01/03/90
I have just been made aware of another version of start.exe dated 12/12/88. To
get around the copy protection for this version with Norton search for the same
string listed above, with this version change the first four bytes to 90's and
leave the 00 alone.

Thanx Karl.

----------------------------------------------------------------

2. SUPERCHARGING YOUR CHARACTERS:
Copy the file CHARFIX.EXE (included in this fix) into the directory where your
saved games reside. Change to that directory. Run the program, it is self
explanatory.
----------------------------------------------------------------

If you have any problems with any of the patches above check the
date of the file START.EXE on your original disk A for the date
10-26-88. If your file has a different date then they probably
changed the copy protection method and your out of luck with this
patch.

-------------------------------------------------------------
MINDSCAPE'S GAUNTLET
------------------------------------------------------------


NEEDED:
1. Norton Utilities (or similar program)
2. A copy of the file's gintro.exe and gprog.exe from your
original disk.
3. A bit of your time
-----------------------------------------------------------------


1. HOW TO UNPROTECT GAUNTLET:
First load one of the above files into Norton.
Then search for the string F3 A7.
Change the byte immediately following (74) to EB.
Continue the search and once again change the 74 to EB.
Save the changes
Repeat the steps above for the other .EXE file.

For you Debug fans rename each of the two files to 1.aaa and 2.aaa
respectivaly. Search (the S command) for F3 A7, you should get at least 3
matches. You will need to unassemble each of the matches, the first copy
protection match should read REPZ CMPSW, JZ 2D96, ect..., and the second REPZ
CMPSW, JZ 2DB1, ect... With the E command using the FULL address of the JZ
commands change the 74's to EB's. Write the files with the W command and
repeat the process for the other file. When finishes erase Gintro.exe and
Gprog.exe and rename 1.aaa gintro.exe and 2.aaa gprog.exe.

In this version of the program will still look for the copy protection (which
is a sector at the end of the hard disk that the install program writes then
marks bad to prevent overwriting to that sector) but will continue the program
as if the comparison (F3 A7) was successful.
-----------------------------------------------------------------

If you have any problems with any of the patches above check the date of the
file GINTRO.EXE on your original disk A for the date 03/25/88. If your file has
a different date then they probably changed the copy protection method and your
out of luck with this patch.

----------------------------------------------------
How to fix copy protection from
Mindscape's Paperboy.
-----------------------------------------------------

1. Norton Utilities (or similar program)
2. A copy of the file's papercga.exe, papercgt.exe, and
papercg2.exe from your original disk.
3. A bit of your time
-----------------------------------------------------------------

1. HOW TO UNPROTECT PAPERBOY:
First load one of the above files (whichever applies to your graphics, papercga
for cga graphics, papercgt for tandy graphics , or papercg2 for ega graphics)
into Norton. Then search for the string 3D 33 00 75 FE. Change the 74 FE to
90 90. Save the changes

The program will still look for the copy protection files DEMAA.COM and
DEMAB.COM but will skip the instruction that locks up the system (74 FE (jump
back two bytes if comparison is not zero)).

If you have any problems with any of the patches above check the date of the
file PAPERxxx.EXE on your original disk A for the date 06/17/88. If your file
has a different date then they probably changed the copy protection method and
your out of luck with this patch.


>--------=====END=====--------<




***************************************************
*** Pirate Magazine Issue IV / File 2 of 10 ***
*** Response to a U's Anti-Piracy Policy ***
***************************************************


---------
The following response to a University anti-piracy announcement was downloaded
from a midwest BBS. We reprint it without permission, and it is apparently a
draft. We thought the comments were sufficiently interesting to pass on.
---------


SOFTWARE PIRACY: AN ALTERNATIVE VIEW

Jim Thomas and Gordon Meyer
(February, 1990)



%Jim Thomas is an associate professor in Sociology.
Gordon Meyer received his M.S. in Sociology in
1989. They are currently researching the
computer underground from which the data for this
note are drawn.%

---------------
Draft copy: Uploaded to PC-EXEC for comments. Not to
be cited without permission
----------------

The university policy against computer software piracy has been widely
publicized, including in a recent issue of Computing News (December, 1989).
There is no question that the university must protect itself against actions
of the NIU community for which it could be held legally accountable.
However, based on our current research of the "computer underground" and the
activities of "phreaks, hackers, and pirates," we find no evidence to
support the many value judgments offered in the rationale circulated by the
university.

Our intent here is neither to justify software piracy nor to challenge
University policy. However, because the area of copyright and "computer
abuse"
law is so new, and because these laws tend to rely on media and other
depictions of "computer underground" activity as criminally sanctionable, it
is important to counter conceptions of underground activity that seem
unsubstantiated by evidence.

The university's normative justification of the University policy can be
summarized in three broad principles:

1. Software piracy shows disrespect for the intellectual work and property
of others and subverts the mission of higher education.

2. Software piracy deprives authors of a "fair return" for their work.

3. Software piracy is unethical.

The data from our research do not support these judgments for several
reasons.

First, software pirates make a clear distinction between "pirates," persons
who collect and share software as hobbyists akin to stamp collectors,
and "bootleggers." Bootleggers are persons who distribute software for
material gain. Pirates may copy and install programs, but generally their
goal is to collect, and they derive satisfaction from running programs for
which they have no need and that they will rarely, if ever, use.

Second, software pirates, despite the claims of the SPA (Software Publishsers
Association) report spending considerably more money purchasing software than
the average user. Many of these purchases are for trading, and there is a
strong ethos in the pirate world that if one uses a program, one purchases
it. Reasons for purchasing include documents, information and discounts on
updates, and online technical support. It is quite common for pirates to
purchase programs identical to those they have already obtained.

Third, the "no return" policy of most software merchandisers makes it
difficult for potential buyers to assess the ability of a program to meet
their needs or work adequately on their system. Piracy creates an informed
public by assuring that programs are available for pretesting, by providing
a pool of reasonably literate users to publicly discuss whether Word
Perfect is better than XYwrite or WordStar, and to even offer
technical assistance to those who have purchased a program. In this sense,
the "unauthorized" copying of software can be seen as contributing to the
university mission of expanding knowledge, of preventing exploitation of
consumers through education, and above all, for expanding computer literacy
by contributing to the free flow of information.

Fourth, pirates spend a considerable sum on their hobby. One of the most
active topics of discussion among pirates is that of the need to continually
upgrade, the continual purchase of diskettes on which to store programs,
and with the popularity of 9600 baud modems to invest between $600-900 for
telecommunications hardware. Because most pirates exchange software across
telephone lines, piracy has benefitted telephone companies because of the
growth of Bulletin Board Systems (BBSs). Our data indicate that an average
monthly phone bill of $200 or more is common, and active pirates easily
double that cost.

Fifth, there is simply no evidence to corroborate that piracy deprives
authors of revenue. Our data suggest that pirates annually purchase no less
than three times the 1.5 programs the SPA estimates for the "average" user.
Further, few students or faculty could afford the price of Dbase 4 and
other large programs, and few people could afford to spend several thousand
dollars a year on computer games. Programs would simply remain unpurchased.
However, piracy creates an interest, expands consumer literacy, and
contributes to a "user culture" that benefits the industry as a whole. We
suggest that without such a culture, there would be less interest in software
and, consequently, less revenue for authors.

Sixth, the claim that piracy is unethical is usually a glib one made without
a strong rationale. Although we make no metaphysical claims here, we do
suggest that piracy and current attempts to criminalize it are far to serious
to be so glibly stigmatized, and the issues require far more research and
debate.

The rapid growth of computer and telecommunications technology brings with
it new questions of the nature of "private property," free and open access to
information and resources, and definitions of "authorship." Few among us
condone any form of predatory behavior. However, we find equally disturbing
the tendancy to perpetuate claims and definitions that should be brought into
a public forum for debate rather than simply asserted from the position of
authority that leads to criminalization.


>--------=====END=====--------<


***************************************************
*** Pirate Magazine Issue IV / File 6/10 ***
*** PTL Cracking tips (reprinted) ***
***************************************************

{This file has been around for awhile, but it's sufficiently good
that it deserves reprinting (eds.)}

IN THIS FILE: Unprotects for:
Title: Case Study: A Colorful CLS
Title: Cracking On the IBM PC Part I
Title: Cracking On the IBM PC Part II
Title: MEAN-18 UnProtect For CGA/EGA Version
Title: Space Station Oblivion Crack
Title: F-15 Unprotect
Title: BATTLEHAWKS-1945 Doc Check Crack
Title: Yeager's Advanced Flight Trainer
Title: Microsoft Flight Simulator 1.00 Unprotect


Version 1.3
By
Specular Vision

Special Thanks to:
Mr. Transistor
Ironman
The Grand Elusion
Banzai Buckaroo

Another fine PTL Production
Call The Myth Inc. BBS
------------------ (Page Numbers will be aprox. until
final version is finished)
i. Table of Contents 2

ii. Introduction 3

I. How to Crack 4
Debugging DOS 4
Cracking on the IBM PC Part 1 7
Cracking on the IBM PC Part 2 11

II. Example Cracks 14
Mean-18 by Accolade 14
Submarine by Eypx 18
Space Station Oblivion by Eypx 22

III. Removing Doc Check Questions 23
F-15 Strike Eagle by MicroProse 23
Battlehawks 1945 by Lucasfilms 25
A - Interrupt Tables 36
(This will be an add-on file)

















01 90 FE C5 80 FD 0C

04. After modifying the bytes, write the modified file
E1 90 CD 20


2

Comments Key:
-------------

Comments in the following material will be made by one of the
following and the lines that enclose the comments show who
made the comment.

Specular Vision = -------------
Mr. Transistor = +++++++++++++
Ironman = |||||||||||||


Special thanks to Mr. Transistor, for coming out of "Retire-
ment"
to help compose this document.



























3

-------------------------------------------------------------
Let's start with a simple introduction to patching a program
using the DOS DEBUG program. The following article will in-
troduce you to the basic ideas and concepts of looking for a
certain area of a program and making a patch to it.
-------------------------------------------------------------


By: Charles Petzold / Specular Vision
Title: Case Study: A Colorful CLS

This article originally appeared in the Oct. 14,1986 Issue
of PC Magazine (Vol 15. Num 17.). Written by Charles Petzold.

The hardest part of patching existing programs is determin-
ing where the patch should go. You really have to make an
intelligent guess about the functioning of the program.

As an example, let's attempt to modify COMMAND.COM so that
is colors the screen on a CLS command. As with any type of
patch try it out on a copy and NOT the original.

First, think about what we should look for. CLS is differ-
ent from all the other DOS internal Commands, It is the only
internal command that does something to the screen other than
just write to it with simple teletype output. CLS blanks the
screen and homes the cursor. Since it can't do this through
DOS Calls (unless ANSI.SYS is loaded), it is probably calling
the BIOS Directly. The BIOS Interrupt 10h call controls the
video, and so the CLS command probably uses several INT 10h
instructions. The machine code for INT 10h is CD 10.

(While this same method will work under any version of
PC-DOS, Version 2.0 and later, the addresses I'll be using
are from PC-DOS 3.1. Other versions of PC-DOS(or MS-DOS) will
have different addresses; you should be absolutely certain
that you're using the correct addresses.)

Load COMMAND.COM into DEBUG:

DEBUG COMMAND.COM

and do an R (Registers) command. The size of COMMAND.COM is
in register CX. For DOS 3.1's COMMAND.COM, this value is
5AAA.

Now do Search command to look for the CD 10 bytes:

S 100 L 5AAA CD 10

You'll get a list of six addresses, all clustered close to-

4
gether. The first one is 261D. You can now pick an address a
little before that (to see what the first call is doing) and
start disassembling:

U 261B

The first INT 10 has AH set to 0F which is a Current Video
State call.

  
The code checks if the returned value of AL
me to get started. Next we'll look at two other articles,
both written by Buckaroo Banzi. These two articles CRACK-1
and CRACK-2 give you an introduction to the different copy
protection schemes used on IBM PC's, and how to find and by-
pass them.
-------------------------------------------------------------



By: Buckaroo Banzai
Title: Cracking On the IBM PC Part I


Introduction
------------
For years, I have seen cracking tutorials for the APPLE
computers, but never have I seen one for the PC. I have de-
cided to try to write this series to help that pirate move up
a level to a crackest.

In this part, I will cover what happens with INT 13 and how
most copy protection schemes will use it. I strongly suggest
a knowledge of Assembler (M/L) and how to use DEBUG. These
will be an important figure in cracking anything.


INT-13 - An overview
--------------------

Many copy protection schemes use the disk interrupt
(INT-13). INT-13 is often use to either try to read in a il-
legally formatted track/sector or to write/format a
track/sector that has been damaged in some way.

INT-13 is called like any normal interrupt with the assem-
bler command INT 13 (CD 13). [AH] is used to select which
command to be used, with most of the other registers used for
data.

INT-13 Cracking College
-----------------------
Although, INT-13 is used in almost all protection schemes,
the easiest to crack is the DOS file. Now the protected pro-
gram might use INT-13 to load some other data from a normal
track/sector on a disk, so it is important to determine which
tracks/sectors are important to the protection scheme. I
have found the best way to do this is to use LOCKSMITH/pc
(what, you don't have LS. Contact your local pirate for it.)

Use LS to analyze the diskette. Write down any track/sector
that seems abnormal. These track are must likely are part of
the protection routine. Now, we must enter debug. Load in

7
the file execute a search for CD 13. Record any address
show.

If no address are picked up, this mean 1 or 2 things, the
program is not copy protected (right...) or that the check is
in an other part of the program not yet loaded. The latter
being a real hassle to find, so I'll cover it in part II.
There is another choice. The CD 13 might be hidden in self
changing code. Here is what a sector of hidden code might
look like

-U CS:0000
1B00:0000 31DB XOR BX,BX
1B00:0002 8EDB MOV DS,BX
1B00:0004 BB0D00 MOV BX,000D
1B00:0007 8A07 MOV AL,[BX]
1B00:0009 3412 XOR AL,12
1B00:000B 8807 MOV [BX],AL
1B00:000D DF13 FIST WORD...

In this section of code, [AL] is set to DF at location
1B00:0007. When you XOR DF and 12, you would get a CD(hex)
for the INT opcode which is placed right next to a 13 ie,
giving you CD13 or INT-13. This type of code can't and will
not be found using debug's [S]earch command.



Finding Hidden INT-13s
----------------------

The way I find best to find hidden INT-13s, is to use a
program called PC-WATCH (TRAP13 works well also). This pro-
gram traps the interrupts and will print where they were
called from. Once running this, you can just disassemble
around the address until you find code that look like it is
setting up the disk interrupt.

An other way to decode the INT-13 is to use debug's [G]o
command. Just set a breakpoint at the address give by
PC-WATCH (both programs give the return address). Ie, -G
CS:000F (see code above). When debug stops, you will have
encoded not only the INT-13 but anything else leading up to
it.


What to do once you find INT-13
-------------------------------

Once you find the INT-13, the hard part for the most part
is over. All that is left to do is to fool the computer in
to thinking the protection has been found. To find out what
the computer is looking for, examine the code right after the
INT-13. Look for any branches having to do with the

8
ny CMP to the AH register. If a JNE or JC
(etc) occurs, then [U]nassembe the address listed with the
jump. If it is a CMP then just read on.

Here you must decide if the program was looking for a pro-
tected track or just a normal track. If it has a CMP AH,0
and it has read in a protected track, it can be assumed that
it was looking to see if the program had successfully com-
plete the READ/FORMAT of that track and that the disk had
been copied thus JMPing back to DOS (usually). If this is
the case, Just NOP the bytes for the CMP and the correspond-
ing JMP.

If the program just checked for the carry flag to be set,
and it isn't, then the program usually assumes that the disk
has been copied. Examine the following code

INT 13 <-- Read in the Sector
JC 1B00 <-- Protection found
INT 19 <-- Reboot
1B00 (rest of program)

The program carries out the INT and find an error (the il-
legally formatted sector) so the carry flag is set. The com-
puter, at the next instruction, see that the carry flag is
set and know that the protection has not been breached. In
this case, to fool the computer, just change the "JC 1B00" to
a "JMP 1B00" thus defeating the protection scheme.

NOTE: the PROTECTION ROUTINE might be found in more than just
1 part of the program


----------------------------
00 - Successful
01 - Bad command given to INT
*02 - Address mark not found
03 - write attempted on write protected disk
*04 - request sector not found
08 - DMA overrun
09 - attempt to cross DMA boundary
*10 - bad CRC on disk read
20 - controller has failed
40 - seek operation failed
80 - attachment failed
(* denotes most used in copy protection)
AH=2 Read Sectors

input
DL = Drive number (0-3)
DH = Head number (0or1)
CH = Track number
CL = Sector number
AL = # of sectors to read
ES:BX = load address
output
AH =error number (see above)
[Carry Flag Set]
AL = # of sectors read

AH=3 Write (params. as above)
AH=4 Verify (params. as above -ES:BX)
AH=5 Format (params. as above -CL,AL
ES:BX points to format
Table)

------------------------------------------------------------
For more information on INT-13 refer to appendix A.
------------------------------------------------------------

END.







10
In part II, Buck cover's Calls to INT-13 and INT-13 that are
located in different overlays of the program. This is a
method that is used often.
-------------------------------------------------------------


Cracking Tutorial II.

By: Buckaroo Banzai
Title: Cracking On the IBM PC Part II


Introduction
------------

OK guys, you now passed out of Copy Class 101 (dos files)
and have this great new game with overlays. How do I crack
this one. You scanned the entire .EXE file for the CD 13 and
it's nowhere. Where can it be you ask yourself.

In part II, I'll cover cracking Overlays and the use of
locksmith in cracking. If you haven't read part I, then I
suggest you do so. The 2 files go together.


Looking for Overlays
--------------------
it can mean
4 things.

1: The .EXE (though it is mostly .COM) file is just a
loader for the main file.

2: The .EXE file loads in an overlay.

3: The CD 13 is encrypted &/or hidden in the .EXE file.

4: Your looking at the WRONG file.


I won't discuss case 1 (or at least no here) because so
many UNP files are devoted to PROLOCK and SOFTGUARD, if you
can't figure it out with them, your stupid.

If you have case 3, use the technique in part I and restart
from the beginning. And if you have case 4, shoot your self.

You know the program uses overlays but don't see and on
disk? Try looking at the disk with good old Norton's. Any
hidden files are probably the overlays. These are the ones
we are after. If you still can't find them, use PC-WATCH
(this program is a must!!! For all crackists. Traps ALL in-
terrupts).

11

Using PC-Watch to Find Overlays
-------------------------------
Start up PC-Watch and EXCLUDE everything in the left Col..
Search the right Col. until you find DOS21 - OpnFile and
select it.

Now run the program to be cracked.
Play the game until the protection is checked.
Examine you PCWatch output to see what file was loaded
right before it.
This probably is the one holding the check.
If not, go through all the files.


You Have Found the Overlays
---------------------------
Great, now just crack the overlay as if it was a DOS file.
You don't need to worry about .EXE file, debug can write an
overlay file. Part I explains the basics of cracking. I
suggest that you keep a backup copy of the overlay so if you
mess up, and you will, you can recover quickly. Ah, and you
I find it useful, before I even start cracking, to analyze
the protected disk to find and id it's protection. This
helps in 2 ways. First, it helps you to know what to do in
order to fake out the protection. Second, it helps you to
find what the program is looking for.

I suggest that you get locksmith if you don't already have
it. Check your local pirate board for the program. I also
suggest getting PC-Watch and Norton Utilities 3.1.(Now 4.1)
All of these program have many uses in the cracking world.

END.










12



-------------------------------------------------------------
OK, now let's put some of this information into practice by
examining a few cracks of some common programs. First we'll
look at a Crack for Mean-18 Golf by Accolade. Accolade has
been one of those companies that has a fervent belief in Copy
Protection.
-------------------------------------------------------------




Title: MEAN-18 UnProtect For CGA/EGA Version

This crack works by eliminating the code that tests for known
bad sectors on the original diskette to see if it is the
genuine article or an illegal copy. The code begins with an
INT 13 (CD 13 HEX), a DOS BIOS disk service routine followed
a few bytes later by another INT 13 instruction. The program
then checks the returned value for the bit configuration that
signifies the bad sectors and, if all is as expected, contin-
ues on with program execution.

The code that needs to be patched is in the GOLF.EXE file and
in the ARCH.EXE file. It is identical in both files and lies
near the end of each file.

In the following steps, you'll locate the start of the test
code and patch it by replacing it with NOP instructions (HEX
90). The method described uses the DOS DEBUG utility but
Norton's Utility (NU) works too.

Copy all of the files from the MEAN-18 disk onto a fresh
floppy using the DOS COPY command and place your original
diskette out of harm's way.

Assuming DEBUG is in the A: drive and the floppy containing
the files to be unlocked is in the B: drive , proceed as fol-
lows:

First REName the GOLF.EXE file so it has a different
EXTension other than .EXE.

REN GOLF.EXE GOLF.DEB


Next load the file GOLF.DEB into DEBUG and displays the "-"
DEBUG prompt.

A:> DEBUG B:GOLF.EXE

13
Search for the beginning of the code to be patched by typing:


- S CS:100 FFFF CD 13

Searches the file for the two byte INT 13 instruction. If
all goes well, two addresses should appear on the screen.

XXXX:019C
XXXX:01A8

XXXX indicates that the numbers preceeding the ":" vary from
system to system but the numbers following the ":" are the
same on all systems.

The next step is to use the "U" command as indicated to
un-assemble a few bytes in order to verify your position in
the file)

- U CS:019C

(Un-assembles 32 bytes of code. Verify the following se-
quence of instructions:

INT 13
JB 01E9
MOV AL,[BX+01FF]
PUSH AX
MOV AX,0201
INT 13
POP AX
JB 01E9
CMP AL,F7
JNZ 01B5

These are the instructions you'll be patching out in the fol-
lowing step)

- A CS:019C

This command assembles the new instructions you enter at the
keyboard into the addresses shown. Beginning at CS:019C, and
for the next 21 bytes, ending with and including CS:01B0, en-
ter the no op command "NOP" (90h) followed by a <return> or
<enter>. Just hit <enter> at address XXXX:01B1 to end the
assemble command.)

XXXX:019C NOP <enter>
XXXX:019D NOP <enter>
.
.
.
XXXX:01AE NOP <enter>
XXXX:01AF NOP <enter>

14
XXXX:01B0 NOP <enter>
XXXX:01B1 <enter>

This just wipes out the section of code containing the INT 13
check.

Now do a HEX dump and verify that bytes 019C through 01B0
have been set to 90 HEX.
- D CS:019C

If they have, write the patched file to the disk as follows)

- W

This writes the patched file back to the

but
now, it can be run from any drive, including the hard
drive)

Now just [Q]uit or exit back to DOS. This command can be ex-
ecuted at any "-" DEBUG prompt if you get lost. No modifica-
tion will be made to the file on the disk until you issue the
"W" command.

- Q

The process is the same for the ARCH.EXE file but because it
is a different length, the segment address, (XXXX part of the
13 instruction at address XXXX:019C and the second one at
XXXX:01A8 as before.

You will again be patching 21 bytes and you will start with
019C and end with 01B0 as before. After doing the HEX dump
starting at address 019C, you again write the file back to

RCS<cr>


16
Debug will prompt you for the new value of CS with:

CS:27FC:

You respond by typing the value of DS you saw when you
dumped the registers the first time. For example, I typed
"12CE<cr>". The value you type will be different. Debug
will again respond with the "-" prompt which means we are
ready to do our search. Type in the following after the "-"
prompt:

S CS:0 FFFF CD 13<cr>

The computer should respond with three lines of information
which are the addresses of the three Interrupt 13 calls built
into the program. The first four digits are the segment ad-
dress and will equal to the value of CS you have just set.
The second four digits following the colon are the offset ad-
dresses which are of primary interest to us. On my machine
they came back as follows:

12CE:4307
12CE:431F
12CE:4335

The segment addresses will be identical and the three off-
set addresses should all be relatively close together. Now
look at the first offset address. (As you can see, mine was
"4307".) Write it down. Now we do a bit of Unassembly.

Type "U4307<cr>" which is the letter "U", followed immedi-
ately (with no blank spaces) by whatever your first offset
address turned out to be, followed by a carriage return. If
you are not familiar with unassembled machine code, it will
look like lines of gibberish as follows:

12CE:4307 CD13 INT 13
12CE:4309 4F DEC DI
12CE:430A 744C JZ 4358
.
.
12CE:431F CD13 INT 13
12CE:4321 4F DEC DI
.
.
12CE:4324 BF0400 MOV DI,0004
12CE:4326 B80102 MOV AX,0201

In my computer, Unassemble will automatically output 16
lines of code to the screen. Yours may differ. Note, in the
(INT 13) correspond to the first two addresses we found in
our search. Now we continue the unassemble, and here comes

17
another tricky part. Just type in "U<cr>" after the "-"
prompt.

You'll get sixteen more lines of code with the third Inter-
rupt 13 on a line which begins with the address (CS):4335 if
you have the same version of Submarine as I do. It's not
terribly important to this exercise, but it will at
least show you that things are proceeding okay. Now type in
"U<cr>" again after the prompt. You are now looking for
three key lines of code. On my program they appear as fol-
lows:

12CE:4335 07 POP ES
12CE:4356 5D POP BP
12CE:4357 CB RETF

The true key is the instruction "POP ES". This instruction
begins the normal return sequence after the program has ex-
ecuted its Interrupt 13 instructions and accompanying checks.
If Debug on your machine prints fewer than 16 lines of code
at a shot, you may have to type in "U" more than twice at the
"-" to find these instructions. (If you haven't found any of
this stuff, either get help on the use of Debug or go back to
A4307<cr>

This first bit tells Debug that new Assembler code will be
inserted at the address of the first Interrupt 13. If your
first Interrupt 13 is at an address other that "4307", use
the correct address, not mine. The computer will prompt you

with the address:

12CE:4307

After which you will immediately type:

JMP 4354<cr>

This instruction jumps the program immediately to the normal
return code instructions. Again, at the risk of being redun-
dant, if your "POP ES" instruction is at a different address,
use that address, not "4354"!

The computer will prompt you with the address of the next in-

18
struction if all went well. MAKE SURE you just hit the
carriage return at this point. Debug will then return the
familiar "-" prompt.

Now it's time to examine your handiwork. Let's do the
unassemble again starting at the address of what had been the
first Interrupt 13 instruction, but which is now the Jump in-
struction. Type in "U4307<cr>" or "U" followed by the appro-
priate address and a carriage return. The first line begin-
ning with the address should appear as follows:

12CE:4307 EB4B JMP 4354

The key here is the four bytes immediately following the ad-
dress. In my example they are "EB4B". Yours may not be.
But, they are VERY IMPORTANT because they represent the ac-
tual machine code which is the Jump instruction. WRITE THESE
FOUR BYTES DOWN AND MAKE SURE THEY ARE CORRECT.

Now if you want to have some fun before we go on, reset
register CS to its original value by first typing "RCS<cr>"
and execute your program. If you have followed my instruc-
tions, it should run fine. Get help if it doesn't. Now, you
should be all set. You can load onto your hard disk, if you
haven't already. You can run it from a RAM disk using a BAT
file if you really want it to hum. Or, if you have the fa-
cilities, you can copy it from 5-1/4" floppy to 3-1/2" dis-
kette and run it on machines which accept that medium if you
upgrade to a new computer.

END.


















20
Now let's take a look at a newer crack on the program, Space
Station Oblivion by Eypx. At a first [S]earch with Debug and
Norton's Utility no CD 13's could be found, and yet it was
using them... So a different approach had to be taken...
-------------------------------------------------------------


By: PTL
Title: Space Station Oblivion Crack


First of all, you must determine which file the INT 13's are
in, in this case it had to be the file OBLIVION.EXE since it
was the main program and probably contained the INT 13's. So
then rename it to a different EXTension and load it into De-
bug.

Then do a [S]earch for INT 13's.

-S 100 FFFF CD 13

Which will promptly turned up nothing. Hmmm...

Next you might decide that, maybe, the code was modifying it-
self. So quit from Debug and load up PC-Watch, include all
the INT 13 Calls. For those of you not familiar with
PC-Watch, it is a memory resident program that can be set to
look for any type of BIOS call. When that call is made
PC-Watch prints to the screen the contents of all the regis-
ters and the current memory location that the call was made
from.

After PC-Watch is initialized, then run the OBLIVION.EXE file
from the hard disk, leaving the floppy drive door open, and
sure enough, when the red light comes on in the diskette
drive, PC-Watch will report the address's of some INT 13
calls. Which you should then write down.

From there, quit the game, reboot, (To dump PC-Watch from
memory) and load the OBLIVION.EXE into Debug and issue a [G]o
command with a breakpoint. What address should you use for a
breakpoint? You guessed it, the same address PC-Watch gives
you.
Well, it locked up did'nt it? Which is quite common in this
line of work so don't let that discourage you. So next re-
loaded it into debug and this time [U]nassemble the address
that you got from PC-Watch. But instead of finding the INT
13's you'll find harmless INT 21's.

Hmm... could it be that the program was converting the CD
21's to CD 13's during the run? Well, to test the idea as-
semble an INT 20 (Program Terminate) right after the first

21
INT 21. Then I run the program, and yes immediately after the
red light comes on the drive, the program will terminate nor-
mally.

Then [U]nassemble that same area of memory, and low and be-
hold, some of the INT 21's have magically turned into INT
13's. How clever...

So, then it is just a matter of locating the address of the
routine that it jumped (JMP) to if the correct disk was found
in drive A:. Once you have that address, just go to the
start of all this nonsense and [A]ssemble a JMP XXXX command.
Where XXXX was the address to jump to if the original disk
was in drive A:.

Then just [W]rite the file back out to the disk and [Q]uit
debug, and then REName the file back to OBLIVION.EXE
afterwhich it should work fine.


END.

22

-------------------------------------------------------------
A new fad has recently started up with software vendors, it
involves the use of "Passwords" which are either stored in
the documentation or are actually the documentation itself.
Then when you reach a certain part of the program (Usually
the beginning) the program will ask for the password and you
have to look it up in the Docs before being allowed to con-
tinue. If the wrong password is entered, it will usually
drop you to DOS or take you to a Demo version of the program.

This new form of copy protection is very annoying, but can
usually be cracked without too much effort, and the files
and the disk are usually in the standard DOS format. So now
we'll take a look at cracking the Doc check questions.

First of all we'll crack the startup questions in F-15
Strike Eagle by MicroProse.
-------------------------------------------------------------


By: JP ASP
Title: F-15 Unprotect



Make a copy of the original disk using the DOS DISKCOPY pro-
gram.

>DISKCOPY A: B:

Then insert the copy disk in the A drive and invoke DOS DE-
BUG.

>DEBUG

Now we'll [F]ill an area of memory with nothing (00).

-F CS:100 L FEFF 0

Next we will [L]oad into address CS:0100 the data that is on
the A: disk (0) from sector 0 to sector 80.

-l cs:100 0 0 80

Now lets [S]earch the data we loaded for the area where the
copy protection routine is.

-s cs:100 l feff FA EB FD

Then for each of the occurences listed, use the address DEBUG
returned in the [E]nter command below.

23

-e xxxx 90 90 90

-------------------------------------------------------------
Here's the part we are interested in, it's where you change
all the autorization codes to a space. Notice how you can
use the [S]earch command to look for ASCII text.
-------------------------------------------------------------

-s cs:100 l feff "CHIP"

Then for each occurance of "CHIP" use the address DEBUG re-
turned in the [F]ill command below.

-F XXXX L F 20

Write out the modified data

-W CS:100 1 0 80

Quit DEBUG

-Q


You should now be able to DISKCOPY and boot from all copies
also just press the space bar when it ask for ANY authority
code and then press "ENTER". Now there is no need to remember
(or look up) any codes that are so finely tucked away in the
manual!

END.






















24
-------------------------------------------------------------
Here is a similar method that was used break the passwords in
the program BATTLEHAWKS 1945 by Lucasfilms. However Norton
Utilities is used to search for the passwords and change
them.
-------------------------------------------------------------

By: PTL
Title: BATTLEHAWKS-1945 Doc Check Crack


In keeping in line with their previous programs, Lucasfilms
has released yet another program which uses Doc Checks for
its means of copy protection, Battlehawks 1942.

When you run this program, it first goes through a series of
graphic displays, then it goes through a series of questions,
asking what type of mission you want to fly, such as Train-
ing, Active Duty, or which side of the war you want to be on.

Then right before the simulation begins, it shows you a pic-
ture of a Japanese Zero and ask you for a password which you

are then supposed to get by looking up the picture of the
Zero in the User Manual and typing the corresponding password
in. After which it enters the simulation, in the event you
enter the wrong password, it puts you into a training mis-
sion.

Removing the Doc Check in a program like this is usually
pretty easy. The ideal way to do it is to remove the Doc
Check routine itself, but if you don't have all day to debug
and trace around the code this might not be the best way.
For instance if you only have your lunch hour to work on it
(Like I did), then you need to use the standard Q.D.C.R.S.
(Quick Doc Check Removal System).

How do you do a QDCRS? Well first of all, play around with
the program, find out what it will and will NOT accept as a
password. Most programs will accept anything, but a few
(Like Battlehawks) will only accept Alpha characters.

Once you've learned what it likes, make an educated guess as
to what program the Doc Check routine is in. Then load that
program into Norton's Utility (NU).

At this point, take a look at the passwords, and write down
the most unusual one that you can find (I'll explain later).
Now type that password in as the search string, and let NU
search through the file until it finds the password. Now a
couple of things can happen.

1. It only finds one occurrence
2. It finds more than one occurrence
3. It doesn't find any occurrence

In the event of case 2 then YOU have to determine where the
passwords are stored, you can do this by opening your eyes
and looking.

In the event of case 3, go to the kitchen and start a pot of
coffee, then tell you wife to go to bed without you, because
you have a "Special Project" that you have to finish tonight.
And by the way, Good Luck. You'll need it.

Hopefully case 1 will occur, now you have to take a look at
the data and ask yourself 2 questions:

1. Are all the passwords the same length?
2. Is there a set number of spaces between each pass-
word?
3. Does the next password always start a certain number
of characters from the first character of the previ-
ous password?

If you can answer yes to any of the above questions, you in
luck. All you have to do is change the passwords to spaces

(If the program allows that, Battlehawks doesn't) or change
them to you favorite character. The letter X works good, it's
easy to type and easy to remember.

If you can't answer yes to any of the questions then you ei-
ther need to bypass the Doc Check routine itself or you need
to be adventurous and experiment. Battlehawks will not follow
any of the above patterns, and your quickly running out of
time, so you'll have to try something, fast...

So just wiped out all of the data area with X's, all the
passwords and associated "garbage" between them. Then saved
the changes and drop out of NU and into BH. Then when it ask
for the password, just filed the area with X's. Next thing
you know, you'll be escorting a bombing run on a Japanese
carrier.

So, this one turned out to be fairly simple. Where you may
run into trouble is on Doc Checks that use a graphic system,
such as Gunship by MicroProse. When it comes to this type of
Doc Check, you almost have to bypass the routine itself. And
again, a good way to do this is with setting break points and
using the trace option in Debug.

END.







25

-------------------------------------------------------------
That was the easy version Doc Check crack, however there a
"Better" way to crack Doc Checks, is to bypass the routine
completely so the user can just press enter and not worry
about spaces. Let's take a lot at this method by looking at
a crack for the program, Yeager's Advanced Flight Trainer, by
Electronic Arts.
-------------------------------------------------------------


By: PTL
Title: Yeager's Advanced Flight Trainer
















26



-------------------------------------------------------------
Now we'll take a look at cracking self booters. A few compa-
nies have found this to be the best copy protection scheme
for them, one of which is DataEast, makers of Ikari Warriors,
Victory Road, Lock-On, Karnov, etc... This posses a special
problem to the Amateur Cracker, since they seldom use stan-
dard DOS formats. So let's jump right in!
-------------------------------------------------------------


This is the area where a "Higher than Normal" knowledge of
Assembly Language and DOS Diskette structures, so first of
all, the Basic's.


The Disk's Physical Structure

Data is recorded on a disk in a series of concentric circles,
called Tracks. Each track if further divided into segments,
called Sectors. The standard double-density drives can
record 40 tracks of data, while the new quad-density drives
can record 80 tracks.

However, the location, size, and number of the sectors within
a track are under software control. This is why the PC's
diskettes are known as soft-sectored. The characteristics of
a diskette's sectors (Their size, and the number per track)
are set when each track is formatted. Disk Formatting can be
done either by the operating system or by the ROM-BIOS format
service. A lot of self booters and almost all forms of copy
protection create unusual formats via the ROM-BIOS diskette
services.

The 5 1/4-inch diskettes supported by the standard PC BIOS
may have sectors that are 128,256,512, or 1,024 bytes in
size. DOS, from versions 1.00 through 4.01 has consistently
used sectors of 512 bytes, and it is quite possible that this
will continue.

Here is a table displaying 6 of the most common disk formats:
_____________________________________________________________

Type Sides Sectors Tracks Size(bytes)
_____________________________________________________________

S-8 1 8 40 160K
D-8 2 8 40 320K
S-9 1 9 40 180K
D-9 2 9 40 360K
QD-9 2 9 80 720K
QD-15 2 15 80 1,200K
_____________________________________________________________



S - Single Density
D - Double Density
QD - Quad Density

Of all these basic formats, only two are in widespread use:
S-8 and D-9. The newer Quad Density formats are for the 3
1/2" and 5 1/4" high density diskettes.


* SIDES.PER.DISK

And here are the formulas for converting sequential sector
numbers to three-dimensional coordinates:

BIOS.SECTOR = 1 + DOS.SECTOR.NUMBER MOD SECTORS.PER.SIDE
BIOS.SIDE = (DOS.SECTOR.NUMBER f SECTORS.PER.SIDE)
MOD SIDE.PER.DISK
BIOS.TRACK = DOS.SECTOR.NUMBER f (SECTORS.PER.SIDE
* SIDES.PER.DISK)

(Note: For double-sided nine-sector diskettes, the PC's
most common disk format, the value of SECTORS.PER.SIDE
is 9 and the value of SIDES.PER.DISK is 2. Also note
that sides and tracks are numbered differently in the
ROM-BIOS numbering system: The sides and tracks are num-
Diskette Space Allocation

The formatting process divides the sectors on a disk into
four sections, for four different uses. The sections, in the
order they are stored, are the boot record, the file alloca-
tion table (FAT), the directory, and the data space. The
size of each section varies between formats, but the struc-
ture and the order of the sections don't vary.
The Boot Record:

This section is always a single sector located at sector
1 of track 0, side 0. The boot record contains, among other
things, a short program to start the process of loading the
operating system on it. All diskettes have the boot record
on them even if they don't have the operating system. Asisde
from the start-up program, the exact contents of the boot
record vary from format to format.

The File Allocation Table:

The FAT follows the boot record, usually starting at
sector 2 of track 0, side 0. The FAT contains the official
record of the disk's format and maps out the location of the
sectors used by the disk files. DOS uses the FAT to keep a
record of the data-space usage. Each entry in the table con-
tains a specific code to indicate what space is being used,
what space is available, and what space is unusable (Due to
defects on the disk).

The File Directory:

The file directory is the next item on the disk. It is

-------------------------------------------------------------
Here is a simple routine to just make a backup copy of the
Flight Simulator Version 1.0 by Microsoft. I know the latest
version is 3.x but this version will serve the purpose of
demonstrating how to access the data and program files of a
selfbooter.
-------------------------------------------------------------


By: PTL
Title: Microsoft Flight Simulator 1.00 Unprotect


This procedure will NOT convert the Flight Simulator disk to
files that can be loaded on a hard drive. But... it will
read off the data from the original and put it onto another
floppy. And this should give you an idea of how to read data
directly from a disk and write it back out to another disk.

First of all take UNFORMATTED disk and place it in drive B:.
This will be the target disk.

Now place your DOS disk (which has Debug) into drive A:, or
just load Debug off you hard disk.

A>DEBUG

Then we are going to enter (manually) a little program to
load the FS files off the disk.

-E CS:0000 B9 01 00 BA 01 00 BB 00
01 0E 07 06 1F 88 E8 53
hexadecimal which is location 17,415 decimal in the


>--------=====END=====--------<



***************************************************
*** Pirate Magazine Issue IV / File 7 of 10 ***
*** Good Boards and BBS Ethics ***
***************************************************


What makes a BBS a *GOOD BOARD*? Here's a discussion logged from a good BBS. We
think the *USERS* make a good BBS, and we like Steve King's "BBS ETHICS," so
reprint it here. It appears on most TELEGARD systems, and in case you haven't
read it, you should.

--------------------------------------------------------

Date: 6:19 pm Wed Dec 27, 1989 Public 17/53
From: Sparkplug General Messages
To: Potato Man
Title: Good BBS

A good BBS is not only having all files online (as the phringe used to do) but
also! having a good user base that is helpfull and not worring about petty
problems. There aren't many real good boards among the many boards available
here locally, but a board that comes to mind that you should try to emulate and
exceed is winplace's old board wasteland I, This is just my opinion and I hope
that this board becomes as good as you hope it to be!
Sparky


Date: 1:33 pm Wed Dec 27, 1989 Public 15/53
From: Potato Man General Messages
Title: What makes a BBS a "GOOD" BBS?!

Well I had this chat talk with a user and he referred to few BBSs as the "GOOD"
BBSs and I stopped him to ask him why are those the good BBSs and if there's
anything the matter with this one so the answer to that was that I should'nt
even "DARE" to compare my BBS with those "GOOD" ones! The question is WHY?
What am I missing in this BBS that the others don't or what the A or B bbs is
missing (not mine in particular). So that brings up another very INTERESTING
topic that I expect to hear some views on...WHAT MAKES A BBS TICK???
Is it the users?
Is it the file section?
Is it the Message section?
Is it the mass storage?
etc etc....
If you want my opinion, I think that the users make a BBS tick and thats the
bottom line, a BBS with no users or dorky users or users that are just there
and they just exist without offering anything is just NOT a BBS... This guy
also said that the BIG BBSs (the ones with mass storage, and lots of phone
lines and stuff!) are BAD! he says that "you rich guys! (without even knowing
me or my W2) think you can put 300 or 600 megs online and have a BBS"
well I
personally think that a BBS with most of the files being ONLINE and not OFFLINE
has a TREMENDOUS advantage over the BBS that has every file in the world but
all of them are OFFLINE!... What good would it do me if I need a file right now
and I call my supporting BBS to take it down but due to the lack of space the
sysop has it OFFLINE and then I kinda have to beg for the file to be online and
call back till he or she decides to put it up for me (not necessarily the case
always!). I was also reffered to as "a snobish guy"! (again without knowing
me)..Now please really tell me if (and this is your best chance to get back at
me!) I seemed snobish or not willing to help any and all of you outthere... I
wanna make this BBS work and try to make it (if not the BEST in the MIDWEST) at
least one of the best, I want it to have a unique look I want it to have
respect for its users and I want its users to have respect for it..

Please FEEL FREE to respond to this message and I do expect you to FREELY
express your opinions and let us know WHAT MAKES A BBS TICK?!



Date: 12:58 am Sat Dec 30, 1989 Public 22/54
From: Gil Fish General Messages
Title: Good BBS's

Well, I feel what makes a good BBS is a friendly attitude between the users and
the sysop('s). I just logged off the Melting Point and felt verbaly abused.
That board bombards you with demands that you participate in every aspect of
his bbs. This is not an attack on him, as I'm sure he isnt attacking me
personally, but I dont like to have demands thrown at me in mass e-mail. And
this post or die attitude many boards are getting is putting me off too. I dont
know, mabey the majority of us pirates are a bunch of assholes that need to be
screamed at, but I like to think not.


Date: 5:26 pm Sat Dec 30, 1989 Public 24/54
From: Rocky Roccoco General Messages
To: Gil Fish
Title: Melting Point

i think people should contribute to a board,there are those of you who log on a
bbs,look through the board,then log off!.....thats just wasting the time of the
sysop (trying to provide a quality bbs not a library book) and wasting the time
of other user that are probably autodialing like mad to get on and contribute.
i have a few users that do it and i get fed up with it. ....also the sysop go's
out and spends MULTI THOUSANDS OF DOLLARS makeing a bbs buying the equipment
and so forth.....i think the sysop has a right to know who's using his bbs and
what the user has to offer him in exhchange for the privelige of haveing time
on the system......so all you out there that read this and dont abide by "the
way it is"
shouldnt bitch about it.....just dont call anymore.....its not good
to lose people on a board but if u look at it this way.......there are alot
more people out there to take your user number! replies are always encouraged
in the constant effort of keeping users happy with the systems they
call........SO LETS SEE SOME POSTS!!!!!!


Ethics for BBS users - By Steve King

The following are a few points of general BBS etiquette. If you wish to
maintain your welcome on whatever system you happen to call, it would be to
your advantage to observe these few rules. (Sysops - feel free to download
this & display it on your BBS)

1. Don't habitually hang up on a system. Every Sysop is aware that
accidental disconnections happen once in a while but we do tend to get
annoyed with people who hang up every single time they call because they are
either too lazy to terminate properly or they labor under the mistaken
assumption that the 10 seconds they save online is going to significantly
alter their phone bill. "Call Waiting" is not an acceptable excuse for
long. If you have it and intend to use the line to call BBS systems, you
should either have it disconnected or find some other way to circumvent
it.

2. Don't do dumb things like leave yourself a message that says "Just
testing to see if this thing works"
. Where do you think all those other
messages came from if it didn't work? Also, don't leave whiney messages that
say "Please leave me a message". If ever there was a person to ignore, it's
the one who begs someone to leave him a message. If you want to get
messages, start by reading the ones that are already online and getting
involved in the conversations that exist.

3. Don't use the local equivalent of a chat command unless you really have
some clear cut notion of what you want to say and why. Almost any Sysop is
more than happy to answer questions or offer help concerning his system.
Unfortunately, because about 85% of the people who call want to chat and
about 99% of those people have absolutely nothing to say besides "How old are
you?"
or something equally irrelevent, fewer Sysops even bother
answering their pagers every day.

4. When you are offered a place to leave comments when exiting a system,
don't try to use this area to ask the Sysop questions. It is very rude to
the other callers to expect the Sysop to carry on a half visible
conversation with someone. If you have a question or statement to make and
expect the Sysop to respond to it, it should always be made in the section
where all the other messages are kept. This allows the Sysop to help many
people with the same problem with the least amount of effort on his part.

5. Before you log on with your favorite psuedonym, make sure that handles
are allowed. Most Sysops don't want people using handles on the system.
There is not enough room for them, they get silly games of one-upmanship
started, it is much nicer to deal with a person on a personal basis, and
last but not least, everyone should be willing to take full responsibility
for his actions or comments instead of slinging mud from behind a phoney
name.

6. Take the time to log on properly. There is no such place as RIV, HB, ANA
or any of a thousand other abbreviations people use instead of their proper
city. You may think that everyone knows what RIV is supposed to mean, but
every BBS has people calling from all around the country and I assure you
that someone from Podunk, Iowa has no idea what you're talking about.

7. Don't go out of your way to make rude observations like "Gee, this system
is slow"
. Every BBS is a tradeoff of features. You can generally assume
that if someone is running a particular brand of software, that he is
either happy with it or he'll decide to find another system he likes
better. It does nobody any good when you make comments about something that
you perceive to be a flaw when it is running the way the Sysop wants it to.
Constructive criticism is somewhat more welcome. If you have an alternative
method that seems to make good sense then run it up the flagpole.

8. When leaving messages, stop and ask yourself whether it is necessary to
make it private. Unless there is some particular reason that everyone
shouldn't know what you're saying, don't make it private. We don't call
them PUBLIC bulletin boards for nothing, folks. It's very irritating to other
callers when there are huge blank spots in the messages that they can't read
and it stifles interaction between callers.

9. If your favorite BBS has a time limit, observe it. If it doesn't, set
a limit for yourself and abide by it instead. Don't tie up a system until it
finally kicks you off and then call back with another name. This same rule
applies to downloading or playing games. Only one person at a time can be
logged on to a BBS and it isn't fair to everyone else if you overstay
your welcome. Remember, a BBS is best when it can be left wide open. If you
try and cheat the rules you just hurt everybody by forcing the Sysop to adopt
more strigent policies. I can't count the number of systems that are now
locked tighter than a drum because of people who cheat and abuse.

10. Don't call a BBS just to look at the list of other BBS numbers.
Most especially don't call a system as a new user and run right to the other
numbers list. There is probably very little that's more annoying to any
Sysop than to have his board completely passed over by you on your way to
another board.

11. Have the common courtesy to pay attention to what passes in front of
your face. When a BBS displays your name and asks "Is this you?", don't say
yes when you can see perfectly well that it is mispelled. Also, don't start
asking questions about simple operation of a system until you have
thouroghly read all of the instructions that are available to you. I assure
you that it isn't any fun to answer a question for the thousandth time when
the answer is prominently displayed in the system bulletins or instructions.
Use some common sense when you ask your questions. The person who said
"There's no such thing as a stupid question" obviously never operated a BBS.

12. If by some chance you should encounter an error while you are online
(Heaven forbid!), ALWAYS take the time to leave the Sysop a message
describing the circumstances. Don't just say "There was an error". That is
not helpful in the least. Chances are that he knows there was an error. What
he needs to know is what you were doing when the error occurred so that he
can have some chance of finding and correcting it. If the error happened
after you input something, tell him what it was. Remember that a BBS can't
improve unless you're willing to help.

13. Don't be personally abusive. It doesn't matter whether you like a Sysop
or think he's a jerk. The fact remains that he has a large investment in
making his computer available, usually out of the goodness of his heart. If
you don't like a Sysop or his system, just remember that you can change the
channel any time you want. Calling a Sysop names or making uninformed
comments about his lifestyle only shows you for the child you really are.

14. Keep firmly in mind that you are a guest on any BBS you happen to
call. Don't think of logging on as one of your basic human rights. Every
person that has ever put a computer system online for the use of other people
has spent a lot of time and money to do so. While he doesn't expect
nonstop pats on the back, it seems reasonable that he should at least be
able to expect fair treatment from his callers. This includes following any
of the rules for system use he has laid out without grumping about it.
Every Sysop has his own idea of how he wants his system to be run. It is
really none of your business why he wants to run it the way he does. Your
business is to either abide by what he says, or call some other BBS where
you feel that you can obey the rules.

Steve King is Sysop of Commnet-80 Riverside (714 359-3189) as well as the
author of the Commnet-80 Bulletin Board System

***************

We've sen a lot of boards with great potential that don't live up to their
promise because of sysop laziness. So, here's what the contributors to PIRATE
see as a good board:

1. The files are well organized into sections or topics so you don't have to
hunt for everything. TAKE NOTE SYSOPS!! You shouldn't have to search all files
to find the telecom program you're looking for.

2. There is a wildcard function so files can be found between directories and
uploaders can quickly check for duplicates by typing a "S" or "F" and then, if
looking for a program called first choice, the keyword "CHOI*.*" We especially
like TELEGARD.

3. A good board should support 9600 or higher.

4. Users should not be allowed in at 300, and even 1200 should be discouraged.

5. Programs *MUST BE* complete, properly labeled (to include version), and
sorted in some coherent fashion.

6. The users should not be lamerz who upload junk for upload credits and users
should participate regularly in message sections. Most users on good boards
call long distance and can't afford to hang out on message bases for too long.
The way around this is to capture message logs and respond after logging up by
tying out the responses and then uploading the ascii text as a message
response the next time logging on.

6. Sysops *MUST* be friendly, knowledgeable, and willing to put the files in
order, change descriptions, and weed out good/bad users. Sysops should also
be patient and help nurture novices.

7. Batch up/down loading should be available, and so should bimodem.

>--------=====END=====--------<



***************************************************
*** Pirate Magazine Issue IV / File 8 of 10 ***
*** BBS Symbols ***
***************************************************


Good users are informed users, and informed users know the symbols that are
used in messages.
The following was sent via BITNET by Ruth Hanschka (RHANSCHK@HARTFORD)

"THE IMFAMOUS SYMBOL LIST" {With Additions}

:-) humorous, joking
:-( sad, this is no joke even though it looks like one
:-') tongue in cheek
:-0 shout
;-) say no more, nudge nudge
=:-0 scares me too
:-! foot in mouth
:-$ put your money where your mouth is
0:-) don't blame me, I'm innocent
%-/ don't blame me, I'm hung over
<:-) don't blame me, I'm a dunce
C:-) don't blame me, I'm an egghead
[:-|] sent by a robot
:-)8 sent by a gentleman
8:-) sent by a little girl
(8-) sent by an owl
(:\/ sent by a duck
:-)=== sent by a giraffe
(-:|:-) sent by siamese twins
d:-) I like to play baseball
q:-) I am a baseball catcher
:-| I play the harmonica
:-8 I just ate a pickle

"In printed communications (in this case bulletin boards), it is tough
to get the idea across that you are being sarcastic etc. Scott Fahlman, with
the help of other participants on FIDONET, might just have the answer..."
This
appears at the top of the original. There are probably more of them by this
time, but I do not have them. The original notice asks FIDONET contributors
to send more in. My copy of this came from a photocopy of a printout in the
University of Hartford Computer Resource Library, so blame them :-') not me.

And now the additions. These came from a VAX discussion line.
these really were [:-|].

:-) joking or sarcastic face
:-} fiendish grin
;-) wink
:-( sad or angry face
|-( late night


>--------=====END=====--------<



***************************************************
*** Pirate Magazine Issue IV / File 9 of 10 ***
*** Gene and Roger at the BBS ***
***************************************************


----------
REVIEW OF: EURO-AMERICAN CONNECTION (708) 296-0242 (Chicago Suburbs)
----------

GENE: Hey, Rog' -- here's a new board, just started up in December, and I
think it has the potential to be one of the best boards in the country.
You go in at 9600 and get 1550+ CPS, all the warez on on-line, and they
all work. Can't beat that. You've seen the nearly 1 gig of space, and
there's plans to go multi line. The users are a nice mix of
instate/outstate. We've both read the message logs, and even you agree
that there's not a lamer in the bunch. The files are well ad says, it's
sure about the friendliest board I've been on. If you're having
problems, Hot Mix is usually around to help, and he doesn't hide like a
lot of sysops do. And I like the feature that *ALL* users only get 60
minutes a day, not counting upload time, and that time returned for
uploads is a straight one-to-one. Keeps users from hogging or from
uploading garbage just for more time. And don't forget that HST
14,400!! One meg in 10 minutes!

ROGER: I dunno, Gene. I've seen lots of new boards, even good ones, come and
go, and too often they don't live up to their promise. The sysops get
lazy, the good users upload all their stuff, mooch what they can, then
move on. You're NAIVETE amazes me! Yeh, yeh, the messages are good, but
they're mostly about prolems with warez. I personally like the
occasional flame and political discussion, and I didn't see any of that
there. I agree that all the fixin's are there for a super board, but
we'll see what it looks like in a year. But I'll admit that it's one of
the best new ones I've seen, and in just looking a file dates, it looks
like people are putting stuff up consistently.

GENE: You're just jaded because Stealth went down and Berserker is still at
2400. C'mon! You *know* in your heart of hearts this is a darn good
board. And you can't beat the small user's fee--just a couple of bucks
a month--to store backup copies of stuff. And have you ever seen such a
generous u/d-load ratio as five-to-one?

ROGER: Look, I'm not knocking the board. But I've just seen to many fast
starts and quick stumbles. If Hot Mix and the users can keep it up,
I'll eat my words. I hope they do. I'll even call it. I'll bet you
didn't know that the sysop's handle, "hot mix," is from his DJ days as
a hot mixer of records, did you?
-----RATING: -----
GENE: An enthusiastic 10!! THIS IS A GREAT BOARD!
ROGER: Yeh, ok, I'll concede. I give it a 9+ -- but ask me again next year

Here's what you see when you look on, Rog' -- there's lots of different areas
and something for everybody. It's running TELEGARD, and that's about the
hottest sysem around right now, and when 3.0 comes out, nothing will touch
it!!

zddddddddddddddddddddddddddddddddddQ
3 cdQ
3 EuroAmerican Connection BBS 3 3
3 Niles, IL 3 3
cdddddddddddddddddddddddddddddddddd4 3 ATTENTION: ALL NEW USERS !!!
cdddddddddddddddddddddddddddddddddd4 3 > Use 10 for User Number >
cdddddddddddddddddddddddddddddddddd4 3 > Use 1111 for User Phone # >
cdddddddddddddddddddddddddddddddddd4 3
3 SHUTTLE LOGON MENU 3 3



Enter BBS Password:

Telegard BBS Version 2.4 Standard - Copyright 1988,89,90
Eric Oman, Martin Pollard, and Todd Bolitho - All Rights Reserved.

Display ANSI logon? No
;;;;;;;;;;;;;;;;;;;;;;;; ;;;;;;;;;;;;;;;;;;;;;;;; ;;;;;;;;;;;;;;;;;
1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;;;;;;;;;;;;;;;
1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;;;;;;;;;;;;;;;
1;;;;;;11111111111111111 1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;1111111111111
1;;;;;; 1;;;;;;111111111111;;;;;; 1;;;;;
1;;;;;; 1;;;;;; 1;;;;;; 1;;;;;
1;;;;;;;;;;;;;;;;;; 1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;
1;;;;;;;;;;;;;;;;;; 1;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;
1;;;;;;11111111111 1;;;;;;111111111111;;;;;; 1;;;;;
1;;;;;; 1;;;;;; 1;;;;;; 1;;;;;
1;;;;;; 1;;;;;; 1;;;;;; 1;;;;;
1;;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;; 1;;;;;; 1;;;;;;;;;;;;;;;;;;;;;;;
1;;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;; 1;;;;;; 11;;;;;;;;;;;;;;;;;;;;;;
1;;;;;;;;;;;;;;;;;;;;;;;;; 1;;;;;; 1;;;;;; 11;;;;;;;;;;;;;;;;;;;;;
1111111111111111111111111 111111 111111 111111111111111111111

> > > > > ;;;;;;;; ;;;;;;;; ;;;;;;;;;
> hmn hmn ;;FFFFFF;; ;;FFFFFF;; ;;FFFFFFFF;
> >? > ;;;;;;;;F ;;;;;;;;F ;;;;;;;;; F
;;FFFFFF; ;;FFFFFF; FFFFFFF;;
; ; ?FFF?FF;FF ;; F;; ;; F;; ?; F;;
;FFF; FF? ; ;;;;;;;;;;F ;;;;;;;;;;F ;;;;;;;;;;F
; ; F???F ; ;;;;;;;;; ;;;;;;;;; ;;;;;;;;Enter your User # or you
Logon :90

User password :
Complete phone #: ###-###-

Welcome to EuroAmerican Connection BBS,

Please wait .... thank you.

Last few callers:
2511: Sp. Fly #34 from Waukegan, IL
2512: Jay Cepe #63 from Arlington Hts, IL
2513: The Untouchable #53 from Chicago, IL
2514: Captain Sir Henry Morgan #38 from Ann Arbor, MI

3 O | ------------------------------------------------------------ | O 3
3 O | NEWS FLASH from EuroAmerican Connection BBS | O 3
3 O | Sent by HOT MIX on 02/03/90 at 08:30am | O 3
3 O | | O 3
3 O | New News! | O 3
3 O | | O 3
3 O | Well I hope everyone noticed that we now have 660 Megs of | O 3
3 O | very fast ESDI storage! I still hav

  
e an extra 300 Megs to | O 3
3 O | install and I'm waiting for some answers, (it may not be | O 3
3 O | possible) but I did promise a gigabyte and I keep my | O 3
3 O | promises so the gigabyte is NOT far fetched! | O 3
3 O | Anyway..I would like for everyone to be a total part of | O 3
3 O | this BBS and help it grow in every direction! We do have a | O 3
3 O | great FILE base but we also need a great MESSAGE base and | O 3
3 O | that can only happen with your participation! | O 3
3 O | Please make sure that you DO read your mail (and don't just | O 3
3 O | see it and delete it) and make sure that you delete it | O 3
3 O | after you carefully read it! If it's there it's serves a | O 3
3 O | purpose...Alot of you ask me things that I already | O 3
3 O | mentioned in mail but you didn't take time to read it! | O 3
3 O | Thats all...Enjoy the BBS | O 3
3 O | HOT MIX | O 3
3 O | | O 3
3 O | ------------------------------------------------------------ | O 3

Oooops it seems that it's me and you now! Teddy is out...Let's Party


Now the EuroAmerican Connection supports High Speed Transfers of over 1500 cps
All HST users PLEASE read message in the General Messages area with same title
Always striving to be the BEST (and proving it!)...Coming soon 1.5 GigaBytes!!

You are caller #2515,

Time allowed - 60 minutes
Mail waiting - 1 letter
You have called - 64 times
Last on - 02/24/90
Account limits - 7 calls, using a maximum of 60 minutes, per day.

Read your mail now? Yes

You have no mail waiting:

.----------------------------------------------------.
: AVAILABLE BULLETINS :
: :
: :
: :
: :
: :
: :
`----------------------------------------------------'


The EuroAmerican Connection BBS
SysOp : HOT MIX
Co-Sys : MAD COOK

List of Users by User Name in Ascending Order
Total Number of Users Listed = 147

User Name City & State Last Logon
========= ============ ==========
AGENT 007 Lombard, IL 02/23/90
AMBER Lyons, IL 01/21/90
ANDY COOPER Mcgaw Park, IL 01/15/90
BAD SECTOR Leyden Township, IL 02/15/90
BADGER Gilbert, AZ 02/19/90
BARCLAY Henry, IL 02/11/90
BIG MAN Chicago, IL 01/03/90
BILLY THE KID Elmhurst IL 01/14/90
BLACK KNIGHT Naperville, IL 01/13/90
BLACKHAWK River Grove, IL 01/06/90
BONG HITS River Forest, IL 02/20/90
BOOMER Chgo., IL 01/25/90
BRIAN So.Holland, IL 02/23/90
BRIAN SMITH Wildwood, IL 02/08/90
BRYAN ALLISON Wheaton, IL 02/08/90
CAPT'N JACK Morgantown, WV 02/23/90
CAPTAIN COOK Hoover, AL 02/10/90
CAPTAIN DEATH Columbia, MO 02/18/90
CAPTAIN SIR HENRY MORGAN Ann Arbor, MI 01/31/90
CHLORINE SHARK Chattanooga, TN 01/14/90
CONSOLE COMMANDER Buffalo Grove, IL 02/19/90
COSTA SAPUNTZAKIS Hinsdale, IL 02/04/90
DARKSTORM Lemont, IL 01/03/90
DIRTY HARRY Wheeling, IL 02/21/90
DOCTOR CRACK Richton Park, IL 02/23/90
DOCTOR DOS Naperville, IL 02/11/90
DON JARVIS Chicago, IL 02/08/90
DON RIEB Glenview, IL 02/24/90
DON STIEN Chicago, IL 02/22/90
DOUG TAPP Schaumburg, IL 01/11/90
DR. FEELGOOD Greatlakes Il, IL 01/25/90
EGGHEAD DUDE Sesame Street, HI 01/07/90
ELVIS PRESLEY Elgin, IL 02/09/90
EPEIOS Dekalb, IL 02/13/90
ETHAN GRIGGS Chicago, IL 02/03/90
FAST FREDDIE Glenview, IL 02/04/90
FATSO Schaumburg, IL 02/23/90
FELIX FELLNER Skokie, IL 02/22/90
GANDALF Buffalo Grove, IL 02/23/90
GILGAMESH OF URUK Itasca, IL 02/15/90
GLENN ROSE Westmont, IL 02/09/90
GOLDEN MEDUSA~ Northbrook, IL 01/29/90
GORDON THOMPSON Dekalb, IL 02/21/90
GRAFFIX MAN Lisle, IL 02/11/90
GREG KLIMA Chicago, IL 01/21/90
GUEST USER Your Town 02/17/90
HACKMAN Downers Grove 02/11/90
HI-FI Glenview, IL 01/23/90
HOT MIX Niles, IL 02/24/90
JAEGERMECH Wheeling, IL 02/21/90
JAMMER Oslo Norway, NO 02/22/90
JAY CEPE Arlington Hts, IL 02/21/90
JAY CHEN Chicago, IL 01/20/90
JEDI Chicago, IL 02/24/90
JEFF YANG Wheaton, IL 01/20/90
JERRY CLAXTON Huntley, IL 01/27/90
JIM MCMAHON Baltimore, MD 02/23/90
JIM RICHARDS Sycamore, IL 01/20/90
JIM SHOE Chgo Il, IL 01/28/90
JIM VANATOR Chicago, IL 02/21/90
JOE CHARLIER Elk Grove Il, IL 02/03/90
JOE MARTIN Chicago, IL 02/22/90
JOHNNY Morton Grove, IL 01/06/90
JULIUS CAESAR Skokie, IL 01/25/90
KAT Niles, IL 02/20/90
KEITH DOERING Schaumburg, IL 02/18/90
KENNY JASON Chicago, IL 01/13/90
KING LEECH Chicago, IL 02/23/90
LORD HAVOC Chicago, IL 01/05/90
LORD SHIVA Joliet, IL 02/22/90
LORD X Chicago, IL 02/03/90
MAC Willowbrook, IL 02/07/90
MAD COOK Des Plaines, IL 02/21/90
MADMAN Mount Prospect, IL 02/13/90
MAMOMAN VAKAMAN Rolling Meadows Il, IL 02/15/90
MASTER BLASTER Waukegan, IL 02/10/90
MASTER NINJA Schaumburg, IL 02/24/90
MAVERICK Lincolnwood, IL 02/24/90
MEDIEVAL KNIGHTMARE Chicago Heights, IL 02/21/90
MERLIN Hinsdale, IL 02/23/90
METAL GODS Waukegan, IL 02/22/90
MIKE REED Palatine, IL 02/02/90
MIKE YOUNG Elgin, IL 01/21/90
MISTER MONOCHROME Chicago, IL 02/21/90
MR Z Tulsa, OK 02/23/90
MR. HARDWARE Skokie Il, IL 02/23/90
NICE PERSON Deerfield, IL 02/23/90
NIGHTOWL Wheeling, IL 01/12/90
NUN TUCKET Wheeling IL 01/16/90
OL' YELLER Arlington Hts. IL 02/17/90
OLD GUY Northbrook, IL 02/17/90
OLIVER WENDELL JONES Chicago, IL 02/15/90
PIG KILLER Cicero, IL 01/27/90
PINK PANTHER Chicago, IL 02/21/90
POWER BREAKER Chicago, IL 02/18/90
PUNKY STAR Chicago, IL 02/24/90
QUICK SILVER Mt. Prospect Il, IL 01/28/90
RAINMAN Evanston, IL 01/21/90
RAISTLIN MAJERE Barrington, IL 01/17/90
RAZZMATAZZ CHAZ Oak Park, IL 02/23/90
REEGADE Wheaton, IL 01/18/90
RICHARD STANALAND Tulsa, OK 02/15/90
ROADRUNNER Chicag0, IL 02/03/90
ROBOCOP Des Plaines, IL 01/08/90
ROCCO Park Ridge, IL 02/22/90
ROCKET Chicago, IL 02/24/90
RODNEY CLINGERMAN Maywood, IL 02/23/90
RON EARL Dekalb, IL 02/20/90
RON TOCCO Grayslake Il, IL 01/28/90
RONALD GOLZ Midlothian, IL 01/14/90
RONALDGOLZ Midlothian, IL 01/12/90
SAM HOUSTON Chgo, IL 02/17/90
SCHATTEN Desplaines, IL 02/04/90
SINISTER EXAGGERATOR Chicago, IL 02/24/90
SLADE Grayslake, IL 02/15/90
SP. FLY Waukegan, IL 02/23/90
SPANKY Skokie, IL 02/23/90
SPARKY Schaumburg, IL 01/09/90
SPEED DEMON Brookfield, IL 02/20/90
STARBUCK Sycamore, IL 01/17/90
STARSHIP Glen Ellyn, IL 02/09/90
STASH Park Ridge, IL 02/22/90
STEEL RAT Great Lakes, IL 01/05/90
STEVE Oak Park, IL 01/21/90
SUB ZERO Hinsdale, IL 01/28/90
SWITCH BLADE Chicago Il, IL 02/13/90
TED KOPPEL Chicago, IL 02/24/90
THE COUNSEL Mt. Prospect, IL 02/23/90
THE HEAD ZOOKEEPER Lhfjkl'F, IL 02/19/90
THE MAD CELT Glenview, IL 02/24/90
THE MAN Dekalb, IL 02/20/90
THE MISFIT Wheeling, IL 02/16/90
THE ONE AND ONLY SQUID Marengo, IL 02/18/90
THE REPORTER Niles, IL 02/21/90
THE SEEKER Chicago, IL 02/01/90
THE SPIDER Glenview, IL 02/22/90
THE UNTOUCHABLE Chicago, IL 02/24/90
THUNDER STICK Elgin, IL 02/23/90
TIM CHAPMAN Warrenville, IL 02/22/90
TONY WALLS Hometown, IL 02/05/90
TORA TORA Lombard, IL 02/22/90
TYPHON Glen Ellyn, IL 02/16/90
VIC RODELL Wheeling, IL 01/22/90
WHIZ KID Joliet, IL 02/23/90
WINPLACE Greshaam, OR 01/25/90
ZACH HARRIS Skokie, IL 02/23/90
ZEUS Niles, IL 02/24/90


Listing of Top 20 Downloaders:

Downloads Uploads UL/DL
User name and number Num KB Num KB Ratio
------------------------------------------ --- ----- --- ----- -----
1 Punky Star #30 270 -19012 96 28004 60.
2 Gandalf #137 260 -18393 9 1778 3.
3 Jedi #90 180 -29927 164 24695 69.
4 Mr. Hardware #21 139 14182 133 24610 173.5
5 Felix Fellner #14 130 27041 66 16961 62.7
6 Maverick #40 85 15758 24 7815 49.5
7 Sam Houston #56 76 16566 37 8653 52.2
8 Spanky #3 70 18043 174 -22438 -124
9 Fatso #96 66 14839 23 3735 25.1
10 Mr Z #47 63 13958 31 6288 45.0
11 Zeus #16 60 10023 22 2171 21.6
12 King Leech #15 59 14619 22 4259 29.1
13 Jim Mcmahon #119 55 12777 18 5469 42.8
14 The Untouchable #53 52 6985 73 19360 277.1
15 Golden Medusa~ #72 48 8473 13 1602 18.9
16 Hackman #8 45 7980 82 23054 288.8
17 Nice Person #42 41 6707 8 1643 24.4
18 Merlin #17 36 7657 13 2006 26.1
19 Richard Stanaland #60 29 6934 12 2315 33.3
20 Captain Sir Henry Morgan #38 27 5319 17 4755 89.3
------------------------------------------ --- ----- --- ----- -----
19 Power Breaker #12 20 4671 18 4028 86.2
20 Speed Demon #51 16 5085 18 3843 75.5

------------------------------------------ --- ----- --- ----- -----

EuroAmerican Connection BBS
immmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm<
Thu Feb 23, 1990 >
Wed Feb 22, 1990 >
Tue Feb 21, 1990 >
Mon Feb 20, 1990 >
Sun Feb 19, 1990 >
Sat Feb 18, 1990 >
Fri Feb 17, 1990 >
Thu Feb 16, 1990 >
Wed Feb 15, 1990 >
Tue Feb 14, 1990 >
Mon Feb 13, 1990 >
Sun Feb 12, 1990 >
Sat Feb 11, 1990 >
Fri Feb 10, 1990 >
hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm#
Average system activity = 62%.
Each block represents 2% of usage.



Date: 3:10 am Sat Feb 24, 1990 Public 4/5
From: Hints and Tips!
Title: 386 and an Epson lq1000
>> This message has 1 reply

Can ANYONE help me on this:
I had an IBM (True Blue) XT with an Epson LQ1000 which worked fine all of the
time. Well now I have upgraded to a 386 and when I plugged in my epson and try
to print anything all I get is alot of $ > mixed into the file and it doesnt
even look like the file I am trying to print. Can anyone help me out to get
this working properly? Is there anything you have to include in the
config.sys/autoexec.bat to get the printer to recognise the files properly?
Thanks alot to anyone for any help.......I will try anything to get it to work
with the 386.


Date: 2:36 pm Sat Feb 24, 1990 Public 5/5
From: Hints and Tips!
To:
Title: well
>> This message is a reply

First of all, is the printer serial or parallel? (or both), if u are using
the parallel setup, the u might want start by checking your cables on a diff
machine (but u said it worked on your xt, so that's not the culprit), second,
if it is parallel setup, u want to try slowing your cpu down (if your computer
allows it.....the computer could be shooting out the data too fast, and
there's not enuf time to do handshaking, so you're getting shit printer
out)...if it's serial, make sure your serial port is set at the same baud rate
as the printer is....if it is, make sure u'r cable has its handshaking signal
enabled (make sure the cable is wired properly).....(the first thing i would
try is slowing the computer down, cuz high speeds usually do cause errors
(especially at 33 MHZ!!!))

|~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
| ELITE ACCESS ONLY Message ... |
| I want to remind you that if you 're planning to upload something NEW |
| make sure that you upload it to the ELITE section ! |
| Thank you for your support |
| HOT MIX |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


0* PD ONLY UPLOADS 1* ** NEW UPLOADS **
2* Miscellaneous 3* DOCs, Cheats & Solves!
4* Music/MIDI 5* DOS Utilities
6* Hard Disk Utilities 7* Cracking/Unprotect Utilities
8* VGA Graphics etc 9* ANSI/Graphic Programs
10* Telecommunications 11* Printer Utilities
12* Word Processing 13* DeskTop Publishing
14* DataBases 15* Spreadsheets
16* Financial 17* Integrated
18* OCR/SCAN utilities 19* CAD/CAM programs
20* 386 Utilities 21* Programming Languages
22* Operating Systems 23* XENIX/UNIX/VpIX
24* Entertainment 25* Older Games
26* Telegard BBS software! 27* Other BBS software!
28* PD IBM Games 29* PD Utilities
30* ELITEs! 31* FREEWARE <NR>



>--------=====END=====--------<


***************************************************
*** Pirate Magazine Issue IV / File 10 of 10 ***
*** Numbers to Call ***
***************************************************

Area Code 201 - (NJNEW) Newark
BBS Name Number Sysop Software Baud Comments
Soft Board 228-5862
Realm 335-9586 Forum
Eastern Telecom 402-1772 Dr. Null Ptr.Forum 12/24
Underground II 502-9115 Rambone Emulex/II 12/24
Joe's Garage 661-4327 Joe WWIV 12/24
Al's Cabin 827-7815
Metal AE 879-6668 Emulex/II 12/24
Runaway Train 927-1154 GBBS

Area Code 203 - (CTHAR) Hartford
BBS Name Number Sysop Software Baud Comments
Stairway Heaven 393-0899 Emulex 12/24 Home of PHUCK
DSC Inc. 456-3531 Rengd. Chem. TCS 12/24 Phortune 500

Area Code 205 - Alabama
Byte Me 979-2983 Omega Ohm WWIV 12/24
Firebase Eagle 554-0480 Shamus Power Plus 12/96

Area Code 206 - (WASEA) Seattle
BBS Name Number Sysop Software Baud Comments
The Void 232-4941 1200
Society of Sin 234-2777
Thieves Guild 235-6779 Monarch 1200
Ethernal Dimension 255-1282 Jhereg Monarch 12/24
Alternate Reality 352-4606 Mr. Classic Emulex/II 12/24
Agnostic Front 432-6904 Emulex/II 12/24 Home of WASP
Dark Tangent 454-3552 12/24
Gateway 588-5239
Neutral Zone 839-5865 Emulex/II 12/24

Area Code 212 & 718 - (NYNYO) New York
BBS Name Number Sysop Software Baud Comments
Alternate Universe 326-0720 TCW 12/24 Area Code (718)
Hackers Den 358-9209 Red Knight Emulex/II 12/24 Area Code (718)
Adventure's Guild 591-0925 Realm Keeper Monarch 12/24 (718), TSAN

Area Code 213 - (CALAN) Los Angeles
Best of Both 325-3237 WWIV 12/24 New Users 2400
Mystic Knights 426-6490 The Sniper Emulex/II 12/24 TSAN
The Archives 545-0707 Mac ONLY
Insomnia 833-8309 Emulex/II 12/24
The Manor 865-3826 WWIV 12/24
Freakers Den 941-1534 Black Jack WWIV 12/24

Area Code 214 & 817 - (TXDAL) Dallas
BBS Name Number Sysop Software Baud Comments
Oblivion 221-4638
Far Side 231-7920 The Molester Emulex/II 12/24
Redlight Inn. 393-0156 Emulex/II 12/24
Mentality Distrup. 258-4935 TNW 12/24
Dead Zone 522-5321 12/24
Ice Dimensions 641-7085 Emulex/II 12/24
Pub & Tavern 690-4634 Jolly Bard. Emulex/II 12/24
D.U.N.E. 733-0568 Fred Kruuger WWIV 12/24

Area Code 216 - (OHCLE) Cleveland
BBS Name Number Sysop Software Baud Comments
Rich's BBS 482-6079 Rich Little PCB 12/24
Walden Pond 792-0981 Brooksie Forum 12/24

Area Code 217 - (ILCHA) Champaign
BBS Name Number Sysop Software Baud Comments
Golf City BBS 332-4019 Egghead Dude WWIV 12/24
Realm of Darkness 359-2071 Dark Shadow Emulex/II 12/24

Area Code 301 - Maryland
BBS Name Number Sysop Software Baud Comments
Speakeasy 358-0849 WWIV 12/24
Black Box BBS 360-2018 WWIV 12/24
Gates of Dawn 384-2938 Pho. Apollo Apex 12/24 NAPPA #1
Salsbury Hill 428-3269 Laughing Gas WWIV 12/24
Devil's Courier 437-7017 Lord Omar WWIV 12/96
Anarchy Inter. 464-7023 Anthrax Angel Emulex/II 12/24
The Future World 486-4515 The Killer WWIV 12/24
The Gallows 486-5073 Prank Call WWIV 12/24
Just Another BBS 551-2583 Jack Cassidy Forum 12/96
Ram Free 557-6841 Monarch 12/24
Clendestine Corner 647-6631 WWIV 1200
Courier's Annex 666-2077 Aragon WWIV 12/96
The Free World 668-7657 Major Havoc WWIV 12/24
Jolly Roger BBS 675-2566 Emulex/II 12/24
The First Sector 679-3394 WWIV 12/24
Corner Pocket 823-5710 WWIV 1200
The New Republic 828-8291 The Nark WWIV 12/24
The Iron Curtain 843-5052 Agent Orange WWIV 12/24
Fun House 924-1543 Emulex/II 12/24
Surf Shop 990-1715 Emulex/II 12/96

Area Code 303 - (CODEN) Denver
BBS Name Number Sysop Software Baud Comments
Late Night BBS 399-8811 Emulex/II 12/24
Ace's Place 421-1380 1200
Fajita Republic 431-2931 Cap't Blood Monarch 12/24
Insane Asylum 447-2691 Live Wire Monarch 12/24 CIA Home, Inv.
Altered Plane 526-0801 Monarch 12/24 9pm-6am Mtn.
Vulgar Unicorn 680-8622 One Thumb Monarch 12/24
Most Composers 771-5937 Monarch 12/24
Distillery 797-1330 Monarch 1200
Discordian Society 969-8195 Organ Grinder Monarch 12/24
Radio KAOS 979-9533 British Spectrum 12/24

Area Code 305 -
BBS Name Number Sysop Software Baud Comments

Area code 312 & 815 - (ILCHI) Chicago
BBS Name Number Sysop Software Baud Comments
Dragon's Lair 215-4937 Dirty Harry Monarch 12/24
Custom Software 246-7705 Steve Merenkov PCboard 12/96 Join Conf. 3
Alcatraz 256-0422 Black Guardian Pcboard 12/24
Zoo 350-9346 Zoo Keeper SBBS 12/96
Snarf's Music Std. 351-0288 Snarf Monarch 12/24
Fox River Valley 426-3279 George Krueger PCBoard 12/96 400 MEGZ
Shop 426-8228 Bud PCboard 12/96 NO HANDLES!
Truckstop 478-3045 The Dispatcher Forum 12/96
GGS 530-2209 Pedro Gomez Wild, Form.12/24 open door 15
Bootleggers BBS 535-2761 Megz Diamond PCboard 12/96 400 MEGZ
E.T.'s Home 537-3463 Nightowl Telegard 12/24
Rasputin's Dungeon 653-1765 Rasputin RBBS 12/96 300 MEGZ
Great Cavern 683-3666 Gary Nelson PCboard 12/96 NO HANDLES!
O'hare Oasis 693-2904 Pinball Wiz. Telegard 12/24
New World 749-8137 Virgin Dest. Telegard 12/24 Private
NIU Connection 753-1800 12/24 (815)
Jousting Fields 756-3023 Med. Knight. Spectrum 12/24
M. Lapse of Reason 759-2699 Pink Floyd PC Board 12/24
Defiant Sceptor 885-1237 The Dealer PCB, Telg. 12/24 Ask for Club
Sycamore ELITE 895-5573 12/24 (815)
Aquila BBS 898-5672 898-5806 12/24
Anonymous Wonder 935-4339 Brown Bomber Telegard 12/24

Area Code 313 - (MIDET) Detroit
BBS Name Number Sysop Software Baud Comments
Seitch Tabr 255-2767 12/24
Genesis II 291-2520
The Ballroom 295-7279 T.A.G. 12/24
Mission Compatible 295-7308
007's VIP Lounge 348-8535
Dungeon of Doom 352-3666 12/24
GLBBS 360-0106 WWIV Pwd: POWERUP
The Nuthouse 381-2931 12/24
Spider's Web 381-5244 12/24
PC Playhouse 381-8633
Dude Man Dude HQ 420-4624 12/24
Crash Landing 455-5821 12/24 Private
Unlimited Reality 489-0747 QBBS 12/24
Ariel System 569-3194 T.A.G. 12/24
Slipped Disk 585-8315
Starship Enterprise 843-1581
Get Serious 846-0731
Tin Pan Alley 939-6339 Monarch 12/24 NAPPA #10
Beyond Reality 995-0754 12/24

Area Code 314 - (MOSOL) St. Louis
BBS Name Number Sysop Software Baud Comments
Brewery 394-8259 WWIV 12/24
Parthenon 522-1460 WWIV
Enterprise 664-7148
Hellfire Club 772-3153
Pinball Place 863-2954 WWIV 12/24

Area Code 404 - (GAATL) Atlanta
BBS Name Number Sysop Software Baud Comments
Revo Emag 435-5737 Black Star TCE BBS 12/24 TCE Home
Blueberry MUFF 458-7696 WWIV 12/24
The Pit 487-7829 Dispater WWIV 12/24
Duck Board Elite 564-3592 Mad Gator Pcboard 12/24
923-3870 Mad Gator PcBoard 12/24
Planet X 591-1620 Emuexl/II 12/24
Iron Sheath 594-0086 T.A.G. 12/24
CIA 676-0900 Emulex/II 12/24
Sun Bane Inc. 921-4635 Lord Foul Emulex/II 12/24
New Silicon Guild 985-1321 T.A.G. 12/24
Yellow Jacket 985-8244 Simon Emulex/II 12/24
Tammy Hall 991-6604 Mad Max WWIV 12/24

Area Code 407 -
BBS Name Number Sysop Software Baud Comments
Thrash BBS 631-4601 12/24

Area Code 408 - (CASJO) San Jose
BBS Name Number Sysop Software Baud Comments
The Pubb 251-4689 The Bartender Monarch 12/24
Billion Boys Club 268-6692 Wind Walker PCboard 12/24
Nuclear Wasteland 268-7793 12/24
The BELL Board 297-8383 Gold Finger Emulex/II 12/24
TCH Trading Post 358-3273 12/24
Underground I 426-2576 The Enforcer Monarch 12/24
The Pentagon 426-7228
*.* 429-8312 Baby Eagle WWIV 12/24
Mt. Olympus 438-3349
Atlantis 475-2729
Dragon's Heaven 735-8685 Master Ryu Monarch 12/24
Snake Bytes 997-6399 12/24

Area Code 412 - (PAPIT) Pittsburgh
BBS Name Number Sysop Software Baud Comments
The Eagles Nest 539-1965 Emulex/II 12/24 NAPPA #12

Area Code 415 - (CASFA) San Francisco
BBS Name Number Sysop Software Baud Comments
Vector One 221-5033 WWIV 12/96
Leecher's Paradise 234-4588 12/24
Lunatic Labs 278-7421 Mad Alchem Monarch 12/24
The Skull 341-1362 Forum 12/24
Ojai 341-7564 Matrix 12/24
Strictly Business 583-1673
Mordor 673-8670
U.C.I. 770-0140
Playboy Mansion 851-4368 1200
Camelot 887-0983
House of Solitude 948-4925 Forum 12/24
Wild West 968-4717 Sidewinder Wild West 12/24

Area Code 416 - Toronto, Ontario, CANADA
BBS Name Number Sysop Software Baud Comments
The lost Souls 241-2119 Dark Spirit Matrix 12/24 Matrix Home
The High Command 247-4491 Emulex/II 12/24
Thieve's Guild 267-3938 Master Thief Forum 12/24
Time Tunnel 283-6765 Time Master USSR 12/24
Life After Death 431-9265 Jack Daniels USSR 12/24
Air Academy 439-8374 Top Gun FCP 12/24
Euphoria 467-6387 RJ MacReady Monarch 12/24 FiRM dist.
467-6998
Saucerful/Secrets 756-3467 Angel Heart Monarch 12/24
Warez R Us 769-3189 Capt. Caveman USSR 12/24
Hunting Grounds 823-9439 Huntsman Monarch 12/24
Canadian Tech. 846-7528 Bit Splice Emulex/II 12/24
Swashbucklers II ???-???? Desert Foxx Emulex/II 12/24 Emulex/IIHome/PTL

Area Code 502 -
BBS Name Number Sysop Software Baud Comments
Rasputen's Playgrd 782-0260 12/24
Pirate's Chest 926-2857 12/24

Area Code 503 - (ORPOR) Portland, Oregon

Area Code 504 - (LANOR) New Orleans
BBS Name Number Sysop Software Baud Comments
TMOZ 272-9633 Bulldog Telegard 12/24

Area Code 507 - (MNROC) Rochester
BBS Name Number Sysop Software Baud Comments
Electric Ocean 281-0275 Brand-X 12/24
Didactic Gallery 282-5063 Purl. Illus. Brand-X 12/19.2 Brand-X Home

Area Code 508 - (MAWOR) Worchester
BBS Name Number Sysop Software Baud Comments
Country Morgue 250-8098 Undertaker TBBS 12/24
Eternal War 285-5325 Warlord QBBS 12/24
Inf. Intoxication 750-8035 Invi. Stalker TCS 12/24

Area Code 513 - (OHCIN) Cincinatti
BBS Name Number Sysop Software Baud Comments
Psychedelic Sanct. 451-6188 Emulex/II 12/24
Ultimate Empire 896-4550 Sax Pistol Fcp V3.0 12/24

BBS Name Number Sysop Software Baud Comments
Rock'in Ranch 249-7248 Ranger Rick Emulex/II 12/24 TSAN
Knights Rnd. Tbl. 281-3214 DarkMage Emulex/II 12/24
The Prism 678-1642 Monarch 12/24
Junkyard BBS 932-7394 Junkman Emulex/II 12/24 TSAN

Area 517 - (MILAN) Lancing
BBS Name Number Sysop Software Baud Comments
Hades BBS 259-4641 12/24
Nite Line 477-9315 Black Jack Emulex/II 12/24
Mission Compat. 5 529-4287 Energy Wave Fcp 12/24
The Magick Link 592-2741 Emulex/II 12/24

Area Code 519 - London, Ontario, Canada
BBS Name Number Sysop Software Baud Comments
Bopper Land 660-1960 Big Bopper Monarch 12/24
The Coffee Shop 679-2696 Monarch 12/24

Area Code 602 - (AZPHO) Pheonix
BBS Name Number Sysop Software Baud Comments
Boss BBS 242-3935 Sysop Pokey Emulex/II 12/24
Beta Cygnus 274-8917 Mastermind Forum 12/24 FiRM Dist.
Radio Free Europe 866-7864 12/24
Vahalla Islands 942-0087 Pharigm God Tcs 12/24
ESP Headquarters 942-2111 Mr. Peace Forum 12/24 ESP Club Home
2001 Odyssey 953-1893 ABBS 12/24
Temple of Doom 996-8002 WWIV 12/24

Area Code 606 - Eastern Kentucky
BBS Name Number Sysop Software Baud Comments
The Vortex 331-5133 Terminator Forum 12/96 PTL Dist.

Area Code 607 - (NYBIN) Binghamton
BBS Name Number Sysop Software Baud Comments
Ahab's Abbey 729-7019 12/24
Wizards Workshop 754-2950 Pirate Master Forum 12/96

Area Code 612 - (MNMIN) Minneapolis
BBS Name Number Sysop Software Baud Comments
Avenger's Island 439-9782 Forum
Radio Waves 471-0060 The Sensei Forum 1200
Playdo Land II 522-3959 Heavy Metal Emulex/II 12/24
Playdo Land 557-1489 Emulex/II
The Establishment 559-8289

Area Code 615 -
BBS Name Number Sysop Software Baud Comments
Syd's Place 691-9073 Syd Womack PC Board 12/96

Area Code 617 - (MABOS) Boston
BBS Name Number Sysop Software Baud Comments
Country Morgue 250-8098 12/24
Swift's Ridge 364-3304 Sir Swift Gen. Delux 12/24
Forgotten Dimension421-6755 Monarch 12/24
Player's Guild 455-8154 The Outlaw Spectrum 12/96 FiRM dist.
Spinward Marches 474-0602 12/24
Edge of Insanity 484-4921 12/24
The Realm 527-6567 The Enchanter Emulex/II 12/24
Taster's Choice 868-5731 Emulex/II 12/24
Jabba's PC Hut 884-9498 Genesis 12/24
Lion's Den 889-0777 12/24

Area Code 619 - (CASAD) San Diego
BBS Name Number Sysop Software Baud Comments
Private Sector 353-0970 The Spy WWIV 12/24
Somewarez 436-9861 Jon Emulex/II 12/24
Convent 475-6187 Emulex/II 12/24
Starhelm Greystaff 479-3006
Parallax 486-2858 WWIV 1200
dBORED 748-3644 PCboard
Knavery 942-0408 WWIV 12/24

Area Code 703 - Arlington, Virginia
BBS Name Number Sysop Software Baud Comments
Treasure Island 442-6653 Monarch 12/24
The Daily Exchange 466-2120 12/24
Gathering Gods 641-0190 The Noid Monarch 12/24
Star Pirates II 644-2347 Darkstar Apex 12/24
Pirates Island 759-3979 Monarch 1200
Figment/Imagination759-6579 Monarch 12/24
Cornerstone 971-7874 The Maestro Forum 12/96 FiRM Home

Area Code 713 - (TXHOU) Houston
BBS Name Number Sysop Software Baud Comments
?? 356-2042
Sperical Planes 358-2683 12/24
London at Midnight 373-1769 12/24
General Electric 438-3156 Pheonix 12/24
Crystal Orbe 488-3744 12/24
Alternate Mindlink 489-7779
Ultimate Revolution492-1179 Celtic Phrost Emulex/II 1200 NAPPA #4
Hellfire 497-5547 Damian Emulex/II 12/24
Lighthouse 556-5652 T.A.G. 12/24
Optical Illusion 578-0722 SYS-PC 1200
Killer's Domain 578-1455 12/24
Shadow's Realm 578-1527 12/24
Celestial Woodlands 580-8213 The Ranger SYS-PC 12/24 SYS-PC & BSP Home
Super Dimension 586-9721 SYS-PC
Anarchist's Realm 774-0767 1200
Smash Palace Mac 821-3901 12/24
Anarchist's Under. 890-0561 Shadow Walker SYS-PC 12/24
Fantasy World 933-0062
Round Table 980-3977 Emulex/II 12/24

Area Code 714 - (CAANA) Anaheim
BBS Name Number Sysop Software Baud Comments
CopyWorks Inc. 496-7069 12/24
The Wish List 831-6235 12/24
Zero Gravity 860-5779 Emulex/II 12/24
Focal Point 946-9234 Enforcer Emulex/II 12/24
Area Code 716 - (NYBUF) Buffalo, New York
BBS Name Number Sysop Software Baud Comments
Stoney Man's Farm 439-3269 Emulex/II 12/24 UnderGr. Home
Plutonium Mines 636-4540 Jenetic Bytm. Neuromancer 12/24 PTL dist.
636-5185 Jenetic Byte. Nueromancer 12/24 PTL dist.
Land of Fa 773-7526 WWIV 1200
Heaven or Hell 832-0118 Master Blaster Neuromancer12/96 NAPPA #7

Area Code 719 - Colorado Springs, Colorado
BBS Name Number Sysop Software Baud Comments
The Edge (718) 631-8135 12/24
Playdo Land 260-8472 Mr. Bill Emulex/II 12/24 NAPPA #15
Insane Asylum II 597-3973 12/24
Forbidden Passage 774-0449 Mr. X Monarch 12/24 NAPPA/FiRM Dist.

Area Code 801 - Utah
BBS Name Number Sysop Software Baud Comments
The Kingdom 292-8118 Xavier WWIV 12/24
Plutocrazy 295-7522 WWIV 12/24
Berserker 485-7646 Earl Smith PC Board 12/24
Stealth 521-3837 12/24 Private

Area Code 805 - (CABAK) Bakersfield
BBS Name Number Sysop Software Baud Comments
Sherwood Forest 255-2850 Robin Hood WWIV 12/24
Theebbs 324-9239 12/24
Unknown World 373-0574 The CooZ Monarch 12/24 TSAN
West World 379-1616 Monarch 12/24
Mage's Lair (804) 451-3551 The Mage Monarch 12/24

Area Code 813 - (FLTAM) Tampa
BBS Name Number Sysop Software Baud Comments
The Trading Post 544-2108 WWIV 12/24
Mission Compat. 3 647-2580 Paladin Emulex/II 12/24
Dungeon of Dread 689-2103 12/24
Arabian Knight BBS 871-2189 Sinbad WWIV 12/24
Point Blank 875-5153 Brian Hart Monarch 12/24
Faw or Foad 962-2937 Wendle WindlesWWIV 12/96 TSAN
Sentry's Post 980-2447 The Sentry WWIV 12/24

Area Code 818 - (CAGLE) Glendale
BBS Name Number Sysop Software Baud Comments
Land of Warlord 280-4065 Shogun WWIV 12/24
Night Industries 2 281-4587 Air Wolf WWIV 12/24
Night Undustries 1 284-5946 Space Kid WWIV 12/24
ACC 287-0408 WWIV 12/24
Phantom's Domain 368-2945 Phantom Emulex/II 12/24 Pwd: ZERO GROUND
Roach Motel 369-2083 Black Flag Emulex/II 12/96 WHOA
Stranger Eye 409-9472 Jagged Edge Emulex/II 12/24 TSAN
Land of Illusion 447-9049 Maurader Monarch 12/24
Burial Grounds 571-8389 Emulex/II 1200
Cemetery Gates 575-1887 Holy Grenade WWIV 12/24 FiRM Dist.
Project Genesis 706-8167 One Monarch 12/24
Gotham City 718-8227 Batman WWIV 12/24
Krypton 773-0461 Superman WWIV 12/24
Influx 799-3589 WWIV 12/24 Real names only
Hecker 912-4183 WWIV 12/24
ANI Systems 912-7848 The Tracer Emulex/II 12/24 Home of WHOA
Crys. Strike Force 965-1580 Battlehawk Emulex/II 12/24

Area Code 904 - Northern Florida
BBS Name Number Sysop Software Baud Comment
Pool Hall 757-3578 WWIV 12/24
South East. Coil. 779-9152 Emulex/II 12/24

BBS Name Number Sysop Software Baud Comment
City Limits 357-0316 Tuf Dog Monarch 12/24

Area Code 914 - White Planes, New York
BBS Name Number Sysop Software Baud Comment
Phortress 221-0035 Forum 12/24
Ninja's Place 297-0334 The Ninja Emulex/II 12/24
Time Zone 354-1185 The Watcher Forum 12/24 TSAN
Inner Sanctum 683-6926 Seadough Gen. Delux 12/24
Software Cellar 795-5092 Forum 12/24
Hacker's Hideout 838-2319 Forum 12/24

Area Code 919 - (NCRTP) Research Triangle Park
BBS Name Number Sysop Software Baud Comments
Park Place 460-9441 Joe Isuzu WWIV 12/24
Boinger Board 846-3734 WWIV


>--------=====END=====--------<

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT