Copy Link
Add to Bookmark
Report
Rhode Island Computer Underground Society Volume 2 Issue 1
____________________________________________________________________
| ___ __ __ | | |
| |___) | | | | (_ | Rhode Island Computer | Volume 2, Issue 1 |
| | \ | |__ |__| __) | Underground Society | January, 1993 |
|______________________|_______________________|_____________________|
=======================================================
RICUS Vol. 2, Iss. 1 Table of Contents
=======================================================
1 .. Opening to RICUS 2.01
2 .. Introduction to the UNIX OS (Part 1)
3 .. Definition of 'Hacker'
4 .. How to By-Pass Callback Verifiers
5 .. Idiotic Submission: What to do w/the Homeless
6 .. Update: List of RI Fido Systems
7 .. PedoFile.Txt - Fake BBS Ad - A Fine Squinky File
8 .. Radio Scanners
9 .. OMNI-Net NodeList/Conference Tags
10 . Closing/Submitting Articles to RICUS
=======================================================
---------------------------------------------------------------------
1: Introduction
---------------
Hey there! Welcome to RICUS 2.01! In this issue, we provide
you with some interesting information. Information can be good or bad,
it is up to the individual user of such information to ensure that it
is used properly. Info can also be amusing... use it wisely...
Remember, cyberspace can be fun. It can also be dangerous, excercise
caution at all times.
CyNom/RICUS Editor
You may have noticed a change in the editing alias. Alas, we must change
the editor alias from time to time, whether the editor changes or not!
--------------------------------------------------------------------------
2: Introduction to UNIX
----------------------
1.1 What is UNIX?
-------------
UNIX is an OS developed by AT&T in the 1970's. It's not really a
mainstream OS like MS-DOS, though I'm sure some people will disagree
with me on that. It is primarily used in colleges/universities and by
businesses with the need for multiuser support.
UNIX is multiuser, meaning more than one person can use the same
computer at the same time. This is done through terminals hooked to a
main CPU. Modems (of course) can also be attached, to allow multiple
users to dial-in. Many UNIX systems are also on networks.
It is also multitasking. This means each user can run more than one
program and switch between them.
1.2 How do I identify a UNIX system?
--------------------------------
The easiest way to identify a UNIX system is by its login screen.
Upon accessing a UNIX system, either by remote or by local terminal,
you will see the following display (assuming you are not already
logged on):
generic.unix
Welcome to the Generic Unix with Computer People who
don't have a clue what they're doing!
The System will be backed up around 2 pm Monday!!!
login:
You may also see 'Login:' in place of 'login:' (notice the caps.)
The login prompt makes it easy to distinguish a UNIX system.
The login: prompt is asking you for a username. There are frequently
default logins that come with a UNIX system, and these are sometimes
left unpassworded, due to the incompetance of most system administrators.
Some common default UNIX login names:
backup
demo
demos
guest
help
lp
news
tutor
bin _
uucpa \
nuucp >--|These will not give you a shell (Unless you're lucky!!)
uucp _/ |They will usually give you the uucico program, part
|of UUCP which will be covered in future chapters of
|RICUS UNIX tutorials.
If the account has a password, it will give you a Password: prompt.
Otherwise, you will be logged in.
There are sometimes also other defaults, like 'games' or something,
that the users may have installed for one reason or another.
There is also sometimes another way to identify a unix system and/or
get more info on that particular UNIX. Login as "sync" (without
the quotes.) If it is a valid account, the system will print a message
like this:
login: sync
SunOS Release (386STD) 4.1.3 on node generic
[...and then logs you out...]
Smart Admins will have gotten rid of this account, since it makes
it really easy to make sure that a computer is, indeed, a UNIX!
2.1 The Shell
--- ---------
After you have somehow logged into a UNIX. You will be at a Shell
prompt. The prompt will be something like:
%
nodename %
/usr/user %
etc...
Whatever it is, you are most likely at a UNIX shell. Type 'pwd'
at the shell prompt, and it'll Print your current Working Directory
^ ^ ^
By the way, UNIX is entirely case sensitive. 'pwd' is NOT the same
as 'PWD', '
Entering 'pwd' is the same as entering CD on an MS-DOS system, without
any options.
The 'cd' command allows you to change directories.
Some common UNIX commands:
Command Description
============== ============================================
ls lists files, UNIX equivelant of MS-DOS 'DIR'
cd change dir, UNIX equiv of MS-DOS 'CD'
pwd Prints current Working Directory (like MS-DOS
'CD' without any args!)
set lists/sets environment vars
echo prints text
cat views a textfile (like MS-DOS 'TYPE')
kermit start kermit front end (for downloading
files) -- Not present on all UNIX systems
sz send ZModem, sends a file FROM the UNIX
(Not on all UNIXes)
rz recieve ZModem sends a file TO the UNIX
(Not on all UNIXes)
man obtain help on a command
rm delete/remove file
mv move/rename file
Note: Certain commands, such as sz, rz, and kermit, may not be found
on particular UNIXes.
Those are some of the more common/useful commands, which will
allow you to obtain text, navigate directories, list them, etc.
You can get help on a command (usually) by typing 'man command'
without the quotes, where "command" is the command you want help
with.
Most commands provide a short summary of there arguments. Type
"command -?" (without the quotes, of course!) to see this short
arg summary.
You can redirect the output of commands using the '>','<', and
'>>' operators, just like MS-DOS.
To write the output of ls /bin to a file, you could use:
ls /bin >file
To view this output, you could then type
cat file
To see a list of many other commands type "ls /bin" The directory
/bin contains many system binaries/commands. You can also try
"ls /usr/bin" which possibly lists additional commands.
Try fooling around with commands and experiment. If you're reading
this, you probably have some type of intelligence in that brain of
yours!
However, please remember that if you are 'borrowing'
someones account (with their permission, of course), *never* delete
(or modify) any files that aren't yours! This is just common courtesy.
2.2 UNIX Directory Structure
--- ------------------------
UNIX utilitizes a file system. At the top of this filesystem is the root
directory. Under this root dir, there are subdirectories, subdirs within
subdirs, files within subdirs, etc.
The root dir is represented by a '/' (slash)
An example unix directory tree:
/ (root dir)
____ ____ __|__ ____ ____
| | | | | |
usr bin dev etc var tmp (dirs)
____|__ _____
| | | |
jon mat guest games (sub-dirs... etc)
In the sample directory tree above, the root dir has 3 subdirs under
it (usr, bin, and dev.) Within usr, the 'home directories' of users
jon, mat, and guest exist. The home directories are the dirs that the
user is initially logged into. You can change back to your home dir
using cd $HOME. To find out your home dir, type echo $HOME. Both at shell
prompts.
The current directory can be represented by a . (a single dot), the
previous dir can be represented with a .. (double dot), just like
MS-DOS! For example, say you were in directory /usr/guest. To move back
to /usr, you could type cd /usr OR type cd .. Obviously, cd .. is
preferable, since it requires less typing!
That's the end of RICUS Intro to Unix, Article 1. In future issues
of RICUS, we will continue to provide you with more UNIX information.
Article 2 will probably have information on networking, one of the most
interesting and fun use of a UNIX.
It is important to note that the BEST source of UNIX info is actual
experience in use of Unixes!
* UNIX is a trademark of Unix Systems Laboratories. (We think.)
[Disclaimer: RICUS does not promote the hacking of any type of computer,
UNIX or otherwise, for malicious and destructive purposes.
Mis-application of the above information is your responsibility, not ours!]
----------------------------------------------------------------------------
3: Definition of 'Hacker'
-----------------------------
[Editor's Note: The "RISA jihad" was in RICUS 1.03. This is a response to
that file.]
I just noticed that inane RISA jihad against "hackers".
I'm a hacker, I do nothing wrong, and this sort of bullshit annoys me.
A hacker is basicly a programmer who programs out of love for the
machine/environment. Programming for its own sake. Programming as
the ends, means, *and* justification. One who leads an e-life instead
of an r-life. (Users don't count. Users are morons.)
Granted, most people who perpetrate illegal computer-related activities
are hackers, merely because few others are qualified. Out of the set of
{hackers} there is a sub-set of {criminals}. This is true of any professional
or cultural group, even sets like {LA-cops} or {Past-Mayors-of-Providence}
or even {Sysops-of-"ligit"-public-BBSs}. The software all you sysops are
so worried about being broken into or abused was writen by hackers.
(For reference, the following is from "the jargon file", a monster
list of hacker slang & culture that circulates the net, and is
available in hardcopy as: _The_New_Hacker's_Dictionary_.)
hacker: [originally, someone who makes furniture with an axe] n.
1. A person who enjoys exploring the details of programmable
systems and how to stretch their capabilities, as opposed to most
users who prefer to learn only the minimum necessary. 2. One who
programs enthusiastically (even obsessively), or who enjoys
programming rather than just theorizing about programming. 3. A
person capable of appreciating {hack value}. 4. A person who
is good at programming quickly. 5. An expert at a particular
program, or one who frequently does work using it or on it; as in
`a UNIX hacker'. (Definitions 1 to 5 are correlated, and people
who fit them congregate.) 6. An expert of any kind. One might
be an astronomy hacker, for example. 7. One who enjoys the
intellectual challenge of creatively overcoming or circumventing
limitations. 8. (deprecated) A malicious meddler who tries to
discover sensitive information by poking around. Hence
`password hacker', `network hacker'. See {cracker}.
That's all. Now go back to sleep.
-dav
-----------------------------------------------------------------------------
4: Call Back Verifiers
----------------------
By-Passing Those Darn Call Back Verifiers!
==========================================
Over the past few years, BBS software has matured and Call Back Verifiers
have become common place.
Initially, one would think CBVs would put an end to fake accounts. Afterall,
they have to disconnect, dial YOUR number, and connect to you, right?
And once your number is divulged, it isn't much trouble to find out
who you are, right?
Wrong. Over the past few months, certain modemers of the demented
persuasion have figured out how to avoid these horrid devices.
The key is to keep the BBS modem (that's SUPPOSEDLY going to disconnect
and call you back) from disconnecting.
In order to do this, you need to have an actual phone as an extension
on your data line, and relatively close to the modem.
If your voice line IS your data line, this shouldn't be much of a problem.
Step 1) Create the account, use an alias, whatever. If the Sysop is
watchful (in other words: always by the computer), make sure
your account appears to have a real name.
2) (Fairly obvious :) Use _fake_ phone numbers. Give it a real
prefix (first 3 digits) and area code, however. IE: 401-273-xxxx,
location Providence, would satisfy a quick glance by most sysops.
3) The system will say something like. "I am now going to hang up
and call you back."
Quick! Before the BBS can disconnect, *pick up your phone*
and *shut off your modem*, with the phone still off hook,
turn the modem back on.
Now, listen to the phone. You will either here the BBSes
modem trying to disconnect, or dead silence.
Wait a few seconds. You will either
1) Hear kind of LOUD clicks.
2) Hear the BBSes modem dialing out.
3) Hear a "That call can not be completed.."
"You need more digits.."
<dialtone>, etc.
In case 3, you have failed. This BBS most likely has a
good phone line (or something) and won't allow these tricks
to work. Move onto another BBS.
In case 1, the BBS is LOOKING for a dialtone. Hold down
"1" on the touchtone pad. This usually fools dumb modems
into thinking there is a dialtone. You should then hear
the BBSes modem dialing "your" number.
In case 2, the BBS thinks it has a dialtone, and is trying
to dial you. Wait til it finishes.
4) Type ATA, your modem will answer (as if it had been called
by the BBS) and the BBS will procede, thinking it has, indeed,
"verified" and called you back, when it never really disconnected!
Enter your password and all that, you are validated.. with a
seemingly legit fake account! Congratulations!
It has yet to be determined which systems are vulnerable/which are
not. It has been noted that E-Nest BBS is *NOT* vulnerable to
such tricks. :( How sad.
The key to this trick is keeping the connection. The majority of
phone calls can not be hung up on unless the *Caller* hangs up
first, or the person being called hangs up for about 90 seconds.
This trick works for around 2 out of 3 BBSes.
This trick is primarily useful for gaining access to message networks
(ie, NE-Net, Fido-323, etc.) that are not tolerant of aliases, and
watching them bitch, cry, and moan about how we are all no-brainers
and stuff.
This trick is also useful, of course, for obtaining more download
credits, more game time, etc.
Be smart! DON'T log in with your "fake" account after you immediately
use up the time on your real one! It doesn't take a genius to notice
that they're _probably_ the same person! Especially since they're
calling at the same baud rate!
Many 401 systems are vulnerable -- A list of these systems would be
released, but it places certain sysops at an unfair advantage.
Because of this vulnerability, every local network, that doesn't
"want" aliases, is open to alias postings.
Have fun guys...
CyNom
-----------------------------------------------------------------------------
5:Idiotic Text Files Section: What to do with the Homeless
----------------------------------------------------------
How to move the homeless population out of your comunity.
Step (1)
Find All the homeless in your community.
Step (2)
Set half of them on fire..
Step (3)
Now employ the other half as Fighters of Homeless person Fires
Step (4)
Now enjoy your homeless free community.
[Editors Note: Yes, that *was* idiotic! I wouldn't normally put that in,
but in the intererest of free expression... no matter how
tasteless!]
-----------------------------------------------------------------------------
6:RI Fido Systems
---------------
Here's a list of all the Fido Systems in RI, their node #'s, and their
phones. Have fun, kiddies. All Phone #'s are 401, unless otherwise stated.
Node# BBS Name Comment Phone#
1:323/1 - The Bloom Beacon - Echo Coordinator - 751-3831
1:323/2 - AMPR.ORG Gate - packet radio gw? - Unpublished
1:323/105 - Prometheus - Head Fascist ;) - 397-7522
1:323/106 - Horses Head BBS - - 726-8186
1:323/107 - IEEE BBS - - 454-2977
1:323/108 - Data Express - - (508) 336-3868
1:323/109 - Art of the Poss. - Easy fake accts - 421-2218
1:323/110 - Cerebral Babylon - not on FidoNet - 435-3576
1:323/111 - Prime Cut BBS - - 334-3096
1:323/112 - Mise en Place - - 461-2605
1:323/113 - Adv. Voice/Data - - 782-6692
1:323/115 - ImageNet - - 822-3060
1:323/116 - FleetHQ - doesn't xfer often- 823-0176
1:323/118 - Connections - - 658-3465
1:323/119 - Bloom Beacon - see 1:323/1 - 751-3831
1:323/120 - ChowdaNet - easy fakes/no fido- 331-0907
1:323/121 - GAYtway - - 739-1380
1:323/122 - Nite Moves - - 528-5796
1:323/123 - 95th Floor - not on FidoNet - 941-7851
1:323/124 - Signals - - 823-3038
1:323/126 - ENest - - 732-5292
1:323/128 - CommPort USA - - (508) 761-9812
1:323/131 - Behind En. Lines - - 463-6973
1:323/132 - IBM World II - always watching!! - 397-5146
1:323/133 - CyberZone - - 732-1641
1:323/201 - BlackStone Valley- - 769-2055
1:323/202 - Comp Exchange - - 762-4293
1:323/203 - Gambit - - 333-6424
1:323/204 - RI Telecomm - an original name! - 658-2033
1:323/205 - EyeStrain BBS - - 765-6205
1:323/206 - DataLine - another original! - 568-6641
1:323/302 - EarthWorld - - 254-1262
1:323/401 - Razors Edge - - 364-6343
1:323/402 - Studio II - - 539-0627
By "No Fidonet", we mean that the BBS doesn't seem to be actively
participating in the FidoNet-323 echoes, and isn't really worth
terrorizing.
Special thanks to Squinky for abusing FrontDoor and acquiring a
new Nodelist for us, at 14,400 bps, no less!
Note: What use is this? I thought they passworded most of the Fido
links! Well, yes! They did! Hint: Even *with* PWs, FD technology
is _still_ not secure.
-----------------------------------------------------------------------------
7: PedoFile.Txt
---------------
[Editor's Note: RICUS and the RICUS Editor are not responsible for the abuse
represented by the following text. If you have any problems, take them up
with the author, it is quite obvious who it is. I wouldn't normally put
that in, except (again) in the interest of free expression. ]
Call The Beagle's Breast BBS -
Home TO PENET(Pedophile Net)!1!
Over 900 Megs of Child Porn!
Just look at some of the .gifs we have!
5 year old boy with 29 year old fat guy!
5 year old boy with TWO(yes, TWO) 20ish guys!
PedoPhile BBS, When you want to fuck and suck little kids, you know where
to call.
Kids welcome, we always need new people to take pictures of.
Also, Available, A list of BBS'ers under 12!1!, yes, you too can make them
give head, just like the owner's have in the past, and will do in the future.
------------------------------------------------------------------------------
I know you are saying, "How Do I register? I want access to little kid's bung
holes too!". Well, to keep up the candy we have to buy to offer to little
kids in exchange for sexual favors/sexual acts, we charge each user the small
sum of $50 a year.
I know you must be thinking, "50 Dollars? That's a lot just to slam little
kids up the ass!", but wait, there's more! Beagle's Breast Staff will
PERSONALLY set up Molestation dates between you and your victims, all as part
of the service. And if you are ever lonely, we will come over and give you
head, just like little "Johny" did!
------------------------------------------------------------------------------
Now, You must be thinking, "Oh dear, what if I get caught?". Well, don't
worry, Child Molestation is not a huge crime! Why, our own sysop got a seven
year suspended sentance simply for saying he has mental problems!
Also, as part of the Beagle's Breast service, we will help find you a good
"Pedophile Defense" lawyer! With any luck, he will twist it around into
making it sound like the child FORCED you to slam your cock into their anal
passage!
------------------------------------------------------------------------------
Yes, the Beagle's Breast, PedoPhile BBS, is the bbs for all of your devient
sexual behaviors. We will be happy to help you in your quest for 12 years
and under dick.
Remember our motto, "The Beagle's Breast BBS, We Care about fuckin small boys!"
------------------------------------------------------------------------------
[ Note: Any similiarity to BBSes, people, things, networks, living, dead, or
mythical, are *purely* coincidental.
Child Molesters are very sick individuals, and such crimes should
not be taken lightly. ]
-----------------------------------------------------------------------------
8: Radio Scanning
-----------------
First off: What *is* a scanner? A radio scanner is a radio reciever that
allows you to scan a range of frequencies and pick out 'active' ones, and
recieve/listen to them.
We're not talking about your FM radio here, folks! We are talking about
scanners that let you pick up police, fire, medical, taxi cab, amateur
radio, cordless phone, and even cellular phone transmissions.
According to a Privacy Act (1974? 1986? One of those, anyways.) It
is illegal to listen to cellular phones. However, we here at RICUS
embrace the policy that any frequency passing through your home and
through your *body* (doing who knows WHAT to it! ;) should be allowable to
listen to. These laws are unenforcable, however, since unless you go
open your window and shout "I listen to cellular..." no ones going to
know. Just remember, it IS illegal to listen to cellular frequencies
(infact, many scanners do not allow these frequencies to be entered),
so if (however unlikely!) you do get caught doing it for some idiotic
reason, RICUS and it's editor(s) are not responsible.
Well, first off: Get a radio scanner. You can find them in your
local electronics store, Rat Shack, etc. or you can go mail order.
Take a look in some of the Amateur Radio Magazines like Popular
Communications and 73 for some mail order places.
There are many different types of scanners to choose from. There are
portable/battery powered (most, if not all portables, use rechargable
batt. packs.) There are also "base" models, that plug into the wall. There
are also mobile models that go permanantely in a car.
I recommend the portable/handheld models... since you can carry them
with you, put them in your car, etc. Note that in some states it's against
the law to have scanners in your car. One could argue that it's
unconstitutional, idiotic, moronic, etc. but from one of the Popular
Communications mags, this isn't the case in RI... you can have a scanner
in your car without any problems. PopComm is a fine magazine, if your
interested in HAM radio, shortwave, scanners. Also, try to find a scanner
that's able to pick up many different bands (ranges of frequencies), the
more frequencies a scanner can pick up, the cooler the stuff you can listen
to.
Personally, I have a BearCat 200XLT, a handheld scanner. It has 200
memory channels. Most modern scanners have anywhere from 20 to over 1000
memory areas. These memories allow you to store a frequency you like into
them, for quick/easy access. Once you store all the active freqs you find in
the memories, you can tell the scanner to only scan the channels stored in
the memories, which allows you to keep up with all the activity in your
area quite easily. If listening to weird things isn't your style, well...
what can I say... you must be a normal person or something!!
Once you have a scanner, you're going to want to do something with it.
You can either read the manual and figure out how to scan ranges of
frequencies, or you can enter frequencies from a frequency list right into
the memories, avoiding the laborous search process. I do, however, recommend
searching for some frequencies yourself, since I defininately don't have a
list of ALL the freqs in use in RI, just some of them.
You could buy a book with a list of radio frequencies in it and blow
15 or 20 bucks. You'll also get a bunch of frequencies for areas all over
the nation, most of which you'll never even use. Instead, we'll give you
a list of some of the local RI frequencies. Here you go:
------------------------------------------
Rhode Island Area Frequency List (Partial)
------------------------------------------
[All Frequencies are listed in Mhz]
---------------------------
City Police/Law Enforcement
---------------------------
Barrington 155.490, 158.970
Burrillville 154.725, 156.090, 158.970
Central Falls 155.430, 158.970, 156.210, 155.655, 155.760
Charlestown 154.710, 154.815, 155.190, 45.100
Chepatchet 156.090
Coventry 154.725, 158.970, 154.695
Cranston 155.250, 155.970, 158.970, 482.4125, 482.4625
482.5825, 485.4125, 485.4625, 485.5625
Cumberland 158.970, 155.430, 156.210, 155.655, 126.210
East Greenwich 154.725, 155.625, 158.970
East Providence 154.770, 155.010
Esmond 156.090
Exeter 154.815
Foster 154.725, 155.190, 155.535
Glocester 156.090
Jamestown 39.040, 158.970
Johnston 154.725, 155.535, 158.970, 155.185
Lincoln 158.970, 156.210, 155.430, 156.060, 155.655
Middletown 155.790, 158.970
Narragansett 154.815, 154.875, 155.190
Newport 155.730
North Kingstown 154.815, 155.190, 155.580, 158.970
North Providence 154.725, 156.090, 156.450, 158.970, 154.800
Pawtucket 154.830, 155.430, 155.655, 158.970
Portsmouth 45.940 , 158.970, 155.850, 154.845
Providence 460.275, 460.100, 460.200, 460.425, 460.325
Scituate 39.140 , 154.725, 155.535, 156.090, 158.970
South Kingstown 154.880, 154.815, 154.875, 158.970, 155.190
Warwick 154.890, 155.130, 155.190, 158.970
West Warwick 154.725, 155.190, 155.625, 156.150, 158.970
Westerly 154.815, 155.190, 156.210
Woonsocket 155.430, 155.655, 156.030, 158.970, 156.330
482.8375
------------
State Police
------------
RI State Police 155.610, 158.970, 155.505, 154.935,
154.905, 155.190, 155.445, 159.150
Listen to the frequencies in your city and neighboring ones.
Obviously, if the city is far away you're not going to be able recieve
it very well.
----------------
Fire Departments
----------------
Barrington 153.950, 154.280
Central Falls 154.280, 154.415
Coventry 45.200, 45.480
Cranston 154.010, 154.280
East Greenwich 154.010, 154.310, 154.280
East Providence 154.070, 154.280
Esmond 154.190
Foster 154.190, 154.290
Jamestown 153.950, 154.190, 154.280
Johnston 154.175, 154.190, 154.280
Narragansett 46.420, 46.500, 154.280
North Kingstown 154.235
North Providence 154.250, 154.400, 33.420
Pawtucket 154.445, 154.280
Portsmouth 46.060
Providence 154.370
Scituate 154.190
South Kingstown 46.420
Warwick 154.310
West Greenwich 46.380
West Warwick 154.280, 154.430
Westerly 46.380, 46.360, 46.500
Woonsocket 154.130
-----------------------
Amateur Radio Repeaters
-----------------------
Cranston 146.700 (Ocean State Amateur Radio Group)
Providence 146.940
Scituate 147.300
The Cranston repeater seems to be the most active. We're not sure
of the status of the others, since the reference I'm getting these
frequencies from is probably out of date.
-----------
Other Stuff
-----------
Misc. Taxi Cab Cos 152.420, 152.390, 152.450, 35.120, 152.360
152.330, 152.270, 152.420, 452.300, 142.150
31.200
NOAA Weather 162.400
6 Meter HAM Band 50 - 54
2 Meter HAM Band 144 - 148
1 1/4 Meter HAM Band 220 - 225
3/4 Meter HAM Band 420 - 450
Cordless Phones 46.0 - 49.0
*Cellular Phones 806 - 821
851 - 866
The HAM bands are sometimes fun to listen to. Might be fun to get
myself a HAM license one of these days!
* Many scanners can't pick up the cellular bands.
However, some are able to pick up frequencies above 900 Mhz. Many
scanners have electronics that produce "image" frequencies of
frequencies below them.
For instance, my scanner lets you listen to frequencies in the 851
to 866 Mhz cellular range by listening to frequencies in the 900
to 915.. mhz range. You have to find out the "IF" frequency of your
scanner (it has to be a "2 stage scanner" or something, this does
NOT work for all scanners) and add 2 x IF to the frequency you
want.
Say you want freq 864 and your scanner's IF is 27 Mhz you would do
864 + 2x27 = 918. You tune to 918 Mhz, and you will hear a slightly
degraded version of the convo on 864. Remember: This ONLY works
for certain types of scanners and you have to find out the IF
frequency!
There you go! And if you can't figure out how to get going with
scanning, ask around on the local boards, and some one'll chime in and
help you! Make sure you mention RICUS and those cool RICUS dudes...
----------------------------------------------------------------------------
9: Omni-Net Information
-----------------------
OmniNet is a network based on FrontDoor/FidoNet technology, originating
from southern RI. Someone though it would be cool to get the nodelist,
conference tag names, etc. So, here they are:
Node List:
----------
Zone,132,Omni-Net_Central,North_Kingstown_RI,Scott_Glynn,1-401-295-2725,9600,CM,FD,TG,V32B,V42B,MNP
Region,200,N.Eastern_USA,NEUS_Control,Scott_Glynn,1-401-295-2725,9600,CM,TG,FD,V32B,V42B,MNP
Host,401,Rhode_Island_Host,North_Kingstown_RI,Scott_Glynn,1-401-295-2725,9600,CM,TG,FD,V32B,V42B,MNP
Hub,10,Omega_Concern,North_Kingstown_RI,Scott_Glynn,1-401-295-2725,9600,CM,TG,FD,V32B,V42B,MNP
,11,Mystic_Illusion,Kingston_RI,Isaac_Rodman,1-401-782-4264,9600,CM,RG,FD,V32B,V42B,MNP
Hub,20,Morlock's_Tower,East_Greenwich_RI,Paul_Sharpe,1-401-885-2390,2400,CM,FD,RG
,21,The_95th_Floor,Cranston_RI,Paul_Mallett,1-401-941-7851,9600,CM,FD,LD,V32B,V42B
,22,Soth's_Domain,Cranston_RI,Marshall_Votta,1-401-785-0347,2400,CM,FD,TG
Hub,30,Necropolis_BBS,Charlestown_RI,Frank_Faubert,1-401-364-0524,9600,CM,FD,XA,RG,V32B,V42B
,31,The_Razor's_Edge,Richmond_RI,Chris_Arnold,1-401-364-6343,2400,CM,FD,RG
Hub,40,Death's_Doorstep,Jamestown_RI,Ed_Beaulieu,1-401-423-2964,9600,WW,V32B,V42B
Conference Tag Names:
----------------------
Short Description Echo Tag
---------------------------------------------------------------------------
*General Discussion ON_GENERAL
*Office ON_OFFICE
#Administration ON_ADMIN
SysOp Support ON-SYSOP
Poetry ON-POETRY
Music ON-MUSIC
Telecom ON-TELECOM
Programming ON-PROGRAM
RI Local News ON-RILOCAL
Literature ON-LIT
Your Ad Here ON-BBSADS
ANSI Art ON-ANSI
Entertainment ON-ENTRTN
Shadowrun ON-SRUN
Spelljammer ON-SJAM
Robotech ON-ROBO
IBM Discussion ON-IBM
Amiga Discussion ON-AMIGA
For Sale/Want Ads ON-SALE
Top Fives ON-FIVE
Rhode Island BBS Users Group ON-RIBUG
Internet Discussion ON-INTERNET
Polical Discussion/Debate ON-DEBATE
Firearms ON-ARMS
Womens Issues ON-WOMEN
---------------------------------------------------------------------------
* - All members MUST carry # - Omni-Net Board Members ONLY
---------------------------------------------------------------------------
[ We're not sure if the nodes use passwords or not. I see no reason to
do anything with this info, I just put it in here cause I was asked to.
However, if you feel the sudden urge to use this info for something,
the same frontdoor tricks will work, of course. There will probably be
an article on these "tricks" in a future RICUS.]
----------------------------------------------------------------------------
10:Submissions to RICUS
-----------------------
Anyone can submit an article to RICUS. Most likely, it will get distributed
with the next issue.
We'd also like to see letters to the RICUS editors. Inflammatory messages
are always welcome!
Leave public mail to "RICUS" in either Fido/323 or NE-Net, since that is
where we primarily wait and watch the locals. <grin>
We are _very_ interested in any info you may have on the CLAN library
computer system. That's the one you see in the libraries, that you look
books up on, that the librarians check books out on, etc.
Also, contact us on one of those "evil subversive user" boards. If you
don't know where they are by now, you probably never will.
Seeya next issue,
CyNom
(Naturally, that's just my 'pen' handle ;)
Note: The next issue will probably be out around March... Celebrating
RICUS' first birthday! ONE full year of RICUS! And _atleast_
one more to come.
____________________________________________________________________
| ___ __ __ | | |
| |___) | | | | (_ | Rhode Island Computer | Volume 2, Issue 1 |
| | \ | |__ |__| __) | Underground Society | January, 1993 |
|______________________|_______________________|_____________________|