Copy Link
Add to Bookmark
Report

The Alliance Productions Vol 01 Issue 01 Premier

eZine's profile picture
Published in 
The Alliance Productions
 · 5 years ago

  

\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
| O | | O |
| O | ==> The Alliance Productions [ZAN] <== | O |
| O | ==> Monthly Publication <== | O |
| O | of | O |
| O | /vvvvvvvvvvvvvvvvvvvvvvvvvvvvv\ | O |
| O | |The Guide to a Better Society| | O |
| O | \^^^^^^^^^^^^^^^^^^^^^^^^^^^^^/ | O |
| O | | O |
| O | Vol. #1 | O |
| O | Issue #1 | O |
| O | August 1991 | O |
| O | | O |
| O | Compliments of The Villa Straylight | O |
| O | The Alliance Publications [ZAN] Origin | O |
| O | | O |
| O | -407- 297.1180 | O |
| O | 3oo, 12oo, 24oo | O |
| O | | O |
| O | Editor in Chief: Wintermute | O |
| O | CoEditors: The Alliance Productions/ZAN Members | O |
| O | | O |
\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\


Welcome to the Premier Issue of "Guide To A Better Society" I am Wintermute,
head of The Alliance Productions and [ZAN] member. The purpose of "Guide To A
Better Society" is to spread information on "How To Improve Your Lifestyle Via
Breaking The `Law'". Some of us over here are members of The Illuminati, so
the more radical ideas will be taken by them. But we at Zhit Axis Nation hope
you enjoy this and future editions of our newsletter.

Editor-in-Chief
Wintermute

(c) The Alliance Productions 1991
(c) Zhit Axis Nation 1991

===============================================================================


Table of Contents

I.> Introduction to Editor.
II.> Lock Picking Tips
III.> Radio Hacking/Satelite Hacking
IV.> Hacking Quiz. How do you rank?
V.> Introduction to PBX's
VI.> Storytime: CyberPUNK Literature
VII.> Appendix


===============================================================================

I.> Introduction to Editor

Hello to all of you out there! I am Wintermute of The Villa Straylight.
As me being the editor, it's my job to make sure this newsletter get put
together correctly. So if there are any problems, or you have comments,
please address them to me. I can be reached via WWIVnet, at 1@4703. So
E-mail user 1@4703 and you'll get me.

Well, let me tell you little about myself. I am an avid Hacker and Phreak.
Cracking is kinda new to me, so i stick to the old ways of doing things. I
have been hacking my way in systems for a little under 2 years now. I've seen
some changes in the way things get set up, but I've managed to stay on top.
Here's some stats on me if you're interested:

Real Name: Mike something or other...
Age: 16 (don't laugh!)
Occupation: Hazard to my school! Looking for a job as a programmer.
Residence: Beautiful Orlando, FL (not! Too many tourists)
Marital Status: 3-4 times a day. he he.
Other: 5'9". Brown hair, brown eyes, bleah....

OK that just about does it. I'm humiliating myself enough.

<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>

II.> Lock Picking Tips


Picking Combination Locks


The writer of this text file takes <all> responsibility for what
this text file is used for. Hopefully it will only be used for
illegal purposes cuz i can't think of a reason it can be used for
legally. Well, on with the text file.


Ok, so ya say ya wanna learn how to pick combination locks...This text
file should help you. As a matter of fact, if ya do it right, it will help
you. First of all, let me tell you about the set-up of a lock. When the lock
is locked, there is a curved piece of metal wedged inside the little notch
on the horseshoe shaped bar that is pushed in to the lock when you lock it.
To free this wedge, you must(must is a word used to much) you usually(that
sounds much better) have to turn the lock to the desired combination and the
pressure on the wedge is released therefore letting the lock open. I will now
tell you how to make a pick so you can open a lock without having to waste
all that time turning the combination (this also helps when ya don't know the
combination to begin with). First of all, ya need to find a hairpin. What's a
hairpin? Well, just ask your mom. She will have one. If she asks what its
for, say ya gotta hold something together... If she says use a rubberband or
use a paperclip, tell her to fuck off and die and then go to the store and rip
off a box of 50 or so. Ok, enough stalling (yea, i was stalling). Once you
have your hair pin (make sure its metal), take the ridged side and break it off
right before it starts to make a U-turn onto the straight side. The curved part
can now be used as a handle. Now, using a file, file down the other end
until it is fairly thin. You should do this to many hairpins and file them
so they are of different thicknesses so you can pick various locks. Some locks
are so cheap that ya don't even have ta file! But most are not. Ok, now you
have a lock pick. Now if ya haven't figured it out, here's how ya use it.
You look at a lock to see which side the lock opens from. If you can't tell,
you will just have to try both sides. When ya find out what side it opens from,
take the lock pick and stick the filed end into the inside of the horseshoe-
shaped bar on whichever side the lock opens from. Now, put pressure on the
handle of the lock pick (pushing down, into the crack) and pull the lock up and
down. The lock will then open because the pick separated the wedge and the
notch allowing us thieves to open it. Don't say bullshit until you've tried it.

because i have gotten lots of beer money from doin' this to fellow students'
gym lockers. Also, this technique works best on American locks. I have never
picked a Master lock before because of the shape a pressure of the wedge but
if anyone does it, let me know how long it took. Also, the Master lock casing
is very tight so ya can't get the pick in. So, if you're locking something
valuable up, use a Master, cuz at least ya know I won't be picking it and I'm
sure there aren't that many that could. And when i say pick, i don't mean
lighting a stick of dynamite next to the lock, picking is opening a lock without
using force, making a substitute key, etc...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Operation: VENDING MACHINE KEYS
By: Wintermute
Source: TAP Magazine

Here's how to do it:

On almost all vending machines they have those damn round almost unpickable
locks on them so:

When no one is looking quickly press a piece of AIR-HARDENING clay into the
lock. (Press hard enough to get a good impression.)

Remove the clay carefully and let it dry for however long the clay has to dry
as specified on the package.

You now have a key to fit that lock, (this Type of 'key' can be easily crushed
if you're seen. But if you're smart you won't though)

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

+--------------------------+
! Locker Docs !
! !
! Complete documentaion to !
! your school locker !
! !
+--------------------------+

Before we start, if you are friends with counselors that let you borrow
their keys, steal the master for all the lockers in your school. You may
now ignore the rest of this file.

:=> What You Need
3/8" Hex Driver
Adjustable Wrench(es)
Needlenose Pliers
Moby Pliers (Vise-Grips work REAL
well!)
6" Steel Rod or Small Crow Bar
Small Standard Screwdriver
Large Standard Screwdriver
Phillipshead Screwdriver
Moderate Size Claw Hammer

:=> Taking Over
At the beginning of each school year, there are a good deal of unused
lockers around the school. If one of these is near your next class, slap a
padlock on it; we'll get into putting a school lock on it later...
Every school has at least one designated "Garbage Locker". Find it
(them), they can be used to your advantage!
If a locker you want already has an owner, no problem! Read the next
section for more information...
If you have a large suppy of padlocks (which every locker
destroyer has!), be sure to put them on the ones that you want so you'll
have it later when we go to put a school-issued lock on it later.

:=> Getting In
Now the real challenge begins! The hardest part of all of this is
getting in the thing in the first place! But it's easy if you know the
tricks of the trade:
> Padlocks (Combination or Key)
Here's where we get to use the crow bar! Slip it between the lock and the
latch on the locker, while going between the two rods of the shank.
Apply serious downward force. This takes 'em off so disgustingly easily.
it's not fair! As a matter of fact, we can rip Master key locks off with
a crummy hex driver!

> Destroying the Thing
If you are so pissed as to rip the lock off and take over by force, be
sure this is your last resort! You leave little marks on the paint, but
a cheap can of canary yellow or what ever color you loker may be will take
care of that. Get the crowbar again. One end should fit between the dial
and the door. If not, pry it open a little with one of the screwdrivers.
Rip the dial off without mercy. The lock itself will fall inside the locker
after the bolts snap and will be free for opening! If you can get a
new dial for the lock you ripped off, try to get it on so you have another
usable lock.

> Going Through The Combination
Getting in this way is rare, but welcomed. Spend an afternoon
wandering the halls looking at the walls, ledges, doors, around a
lockers wherever a combination can be written without being easily seen. If
you find one, try it out-CAREFULLY! Once you get one that works, steal
it!

> Pennied Lockers
Now we're talking REALLY rare! But these are real easy to spot. Walk
around looking at the latch. If it is sticking up a mile higher than the
others, give it a tug. Some of them stick that high naturally or if the
locker is over-filled, so watch for those.

:=> Once You're In
All right, you FINALLY got the locker open and the lock is intact.
Look around. Steal anything of value. Now, let's get the lock, ok? See
those two nuts above and below the lock on the inside of the door? Get
the 3/8" hex driver and remove them. Now grab the dial and the lock and
pull free from the door. Try not to move the dial-it's a real pain in the
ass getting it back right! Refasten the nuts and take it to new location,
and re-install it on the new locker repeating the steps. If the dial does
not go in at first, frob with it awhile until it seats into the lock.
Congrats! You now have just taken over your first locker!

> Ripping Out The Walls!
If you are on the right side of a wall, you can remove it with little
difficulty and get into the locker next to yours. Use the same hex driver
and unfasten the nuts holding it in. Watch out for the shelf, though!

:=> Garbage Lockers
As mentioned above, garbage lockers can be very useful. These usually
evidant the first 2-3 months of school. They reach maturity in about 1-6
months depending on use. The custodians come and clean and
disinfect it thoroughly, killing wahtever new forms of life you may
have developed. They then will usually put a school-owned padlock on it.
Now, scince it's clean, and you know how to get padlocks off, we say it's
ripe for picking!
You previously have been opening lockers seeing if they are worth
conquering, and how come across a trash locker. Maybe you contributed
an unwanted apple, someone's homework, etc to it. You suddenly
notice one day that the janitors have taken it over. Immediately, you
snap the lock off and you have a nice clean locker.

:=> When To Do Your Vandalism
1. At lunch
2. Skip a period
3. After school
(1) Possibly hard to do. Either no one is allowed around school or
everyone is eating at their lockers.
(2) May cause difficulties. That is, unless you are already failing that
class.
(3) This is great. Join some stupid club and then leave early everyday.
Now you have enough time to swipe a few! You could also get a job
at school with the janitors or as a techie. Now you have lots of time
when the school is empty and you have access to MORE TOOLS!

:=> Rating Of Padlocks By Brand
> Combination
Guard- This is the cheapest piece of shit that we've ever run across!
The case is undoubtedly in two peices, and most often, there are cracks
around the edges. Now turn it over and look on the back. See those two rivets?
We took TWO of these off with a SNEAKER!
American- Okay. Getting a little harder to get off now. The shank is
'left-handed', and the dial is firmly secured.
Master- Supposedly 'top-of-the-line', but still can be removed with a little
pressure. LEAN ON THAT MOTHER!

> Key
Master- Several million of these, no reason to break one off as of yet.
Sears- One peice case, gave us a little trouble to take off with
our hex driver.

:=> Glossary Of Most-Used Terms

Padlock- any self-comtained removable lock characterized by a steel shank.
Usually requires key or combination to open.

Dial- Circular unit found on the outside of a school locker used to
dial the combination.

Lock- The unit mounted inside the locker that prevents the latch from
moving when the combination has not been dialed.

Shank- Steel semicircle on a padlock that will lock when pushed into the
case of a padlock.

Latch- Waht you push, pull or twist to get a locker open.

Door- Hinged wall on a locker. Most of the time, the only way into a
locker.

Locker- Aluminum cubicle used for dumping books, freshman, or gym
clothes in.

Master- Company know for making cheap locks that can be easily opened with
a dinky-ass screw driver or the key that opens a given set of locks.

Plate[1]- Metal sheet with a number stamped on it used for identifying
lockers.

Plate[2]- A peice of metal that covers the hole in the door where the dial
goes if one is not present.

Wall- Removable surface inside locker.

Shelf- A sheet of wood cut to the shape and dimensions so that it fits snug
inside a locker.


We would like to dedicate this article to those of us who got busted while
this was being compiled. For those of you to follow in our footsteps, BE
CAREFUL!

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[+][+][+][+][+][+][+][+][+][+][+][+][+]
[+] [+]
[+] L O C K P I C K I N G [+]
[+] [+]
[+][+][+][+][+][+][+][+][+][+][+][+][+]


This tutorial will demonstrate how to "pick" a pin tumbler lock. Use of this
material is for locksmiths only, any use of this information for illegal
purposes is forbidden and against the law. (as long as we are at it, do you
want to buy some land in Florida?)

In order to pick a pin tumbler lock, you will require four items: a lock,
you, a pick, and a tension wrench. you can ussually get these at a locksmith
store, if you can not find one near you there will be an address at the end of
the article that you can order them from. Here is an illustration of a pick
and a tension wrench:

________/ !________
pick tension wrench

Most people know of the need for the pick, but have no idea what the wrench
is for. It is very important and without it it would be impossible to pick
a lock.

In order to pick a lock, we must count upon the imperfection of the lock.
Before we look at how to actually pick the lock, we will look at the parts of
it and how the imperfection part fits in. Here is a dissassembled lock:

/ / / /
\ \ \ \
springs -> / / / /
\ \ \ \
_ _ _ _
! ! ! ! ! ! ! !
! ! ! ! ! ! ! !
drivers ->! ! ! ! ! ! ! !
!_! !_! !_! !_!

_ _
! ! _ ! !
bottom pins ->! ! ! ! _ ! !
! ! ! ! ! ! ! !
\_/ \_/ \_/ \_/

_____________________
! : : : : : : : : !
housing ->! : : : : : : : : !
! : : : : : : : : !
!___: :_: :_: :_: :___!
! : : : : : : : : !
plug ->! : : : : : : : : !
!______________________!
! !
! !
! !
!_____________________!


___
/ \
! !__ _ _
! \__ / \_/ \__
! \/ \
\__/------------------- <- key


When you insert a key into a lock, the bottem pins are pushed up, and if it
is the proper key, the tops of the bottom pins will match with the spot
where the plug and housing meet, thus allowing you to turn the plug, and open
the door, etc.. When you inser the key, the bottom pins go into the valleys of
the key, thus meaning that the key must have the right height valleys to make
the lock open. Pretty elementry, right? Well now we can move on to how to pick
a lock.

In order to pick a lock we (as i said before) depend on the inaccuracy of the
manufacturing process. The first thing to do is to insert the tension wrench
into the lock and apply a slight pressure to the left (or right if you
wish) so that if you could look inside the lock at where the plug and the
housing would meet, it would look like this:

! !*! !
housing ! !*! !
! !*! !
__________! !*! !___________
__________ !*! ____________
! !*!!
plug ! !_!!
! _ !
! !*!!
! \_/!

Now a slight presure is on the pins. Because the pins can not be produced
exactly the same, there is one pin which is the widest and there fore has
more tension on it, and one which is the thinnest and has almost no pressure
on it. We now use the pick to >gently< push each pin up (and try to feel it
when you let it down) until we find which is the tightest on and which is
loosest. Getting the feel for this is the hardest part of lock picking. Now
that you have found the loosest one, gently press it upward until you feel
a slight reduction in tension on the tension wrench. This will happen when
the top of the bottom pin becomes even with the junction of the plug and
the housing. DO NOT RELEASE ANY TENSION FROM THE WRENCH NOW! The driver will
now be trapped in the housing as illustrated here: (don't I draw pretty)

! !*! !
housing ! !*! !
! !*! !
___________! !_! !___________
_______________ ___________
! !*! !
plug ! !*! !
! \_/ !
! !

Now you continue this process with each of the pins until you work your way up
to the one that is widest. With some practice you can get fairly fast at
this. I suggest practicing on a four pin tumbler lock that is bought from a
hardware store, the cheaper the better.

I would like to discuss a paticular configuration of the pins now that may
present a particularly hard job to pick. This is graphicly shown here by
the two middle pins:

!*! !*! !*! !*!
!*! !*! !_! !*!
!*! !*! _ !*!
!_! !*! !*! !_!
_ !*! !*! _
!*! !*! !*! !*!
!*! !_! !*! !*!
!*! _ !*! !*!
!*! !*! !*! !*!
\_/ \_/ \_/ \_/

\_______________

When you try to push the 2nd pin from
the left up, you will unavoidably be
pushing the one in front of it up be-
cause of it's long bottom pin. the only
solution for this is to get a special
pick that looks like this:

\
\ _______________
\_/

The major problem with this is that it is hard to initially detect. The reason
that it makes it harder if it is not immedietly apperant is that you un-
avoidably push the 3rd pin from the left up into the housing, getting it
jammed:

! !*! !
housing ! !_! !
! _ !
! !*! !
__________! !*! !________
___________ !*! ________
!!*!!
plug !!*!!
!\_/!


I would also like to address a technique called raking. it uses a
tool like this:

\/\/\/\___________

Basicly you "rake" it back and forth across the pins, hoping that combined
with the tension it will give you the right combination. This way has been
known to work fast sometimes, but is not very reliable, and I would suggest
learning to actually "pick" the lock.

Earlier I promised an address to order locksmithing materials from, so here it
is:

GARRISON PROTECTIVE ELECTRONICS
BOX 128
KEW GARDENS, NEW YORK, 11415

sources: personal practice and many excellent books from mentor press, if
you would like their catalog, send a SASE to:

THE INTELLIGENCE LIBRARY
MENTOR PULICATIONS
135-53 NORTHERN BLVD.
FLUSHING, NY 11354

and ask for any information available on THE INTELLIGENCE LIBRARY.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

]]]]]]]]]]#[[[[[[[[[[
]] LOCK PICKING [[
]] BY [[
]] ^^^NIGHTWING^^^ [[
]]]]]]]]]]#[[[[[[[[[[

SO YOU WANT TO BE A CRIMINAL. WELL, IF YOU ARE WANTING TO BE LIKE JAMES BOND
AND OPEN A LOCK IN FIFTEEN SECONDS, GO TO HOLLYWOOD BECAUSE THAT'S THE ONLY
PLACE YOUR GONNA DO IT. EVEN EXPERIENCED LOCKSMITHS CAN SPEND 5 TO 10 MINUTES
ON A LOCK IF THEY'RE UNLUCKY. IF YOU ARE LOOKING FOR EXTREMELY QUICK ACCESS,
LOOK ELSEWHERE.
THE FOLLOWING INSTRUCTIONS WILL PERTAIN MOSTLY TO THE "LOCK-IN-KNOB" TYPE
LOCK, SINCE IT IS THE EASIEST TO PICK. IF THERE IS SUFFICIENT DEMAND, I WILL
LATER WRITE A FILE DISCUSSING THE OTHER FORMS OF ENTRANCE, INCLUDING DEAD-BOLT

FIRST OF ALL, YOU NEED A PICK SET. IF YOU KNOW A LOCKSMITH, GET HIM TO MAKE YOU
A SET. THIS WILL BE THE BEST POSSIBLE SET FOR YOU TO USE. IF YOU FIND A
LOCKSMITH WILLING TO SUPPLY A SET, DON'T GIVE UP HOPE. IT IS POSSIBLE TO MAKE
YOUR OWN, IF YOU HAVE ACCESS TO A GRINDER (YOU CAN USE A FILE, BUT IT TAKES
FOREVER.)

THE THING YOU NEED IS AN ALLEN WRENCH SET (VERY SMALL). THESE SHOULD BE SMALL
ENOUGH TO FIT INTO THE KEYHOLE SLOT. NOW, BEND THE LONG END OF THE ALLEN
WRENCH AT A SLIGHT ANGLE..(NOT 90 DEG.) IT SHOULD LOOK SOMETHING LIKE THIS:

#1
\\
\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\s\\\\\\\ (THIS IS THE HANDLE
\\\ THAT WAS ALREADY
\\\ (HERE.)
\\\
\\\
\\\

NOW, TAKE YOUR PICK TO A GRINDER OR A FILE AND SMOOTH THE END (#1) UNTIL IT'S
ROUNDED SO IT WON'T HANG INSIDE THE LOCK. TEST YOUR TOOL OUT ON DOORKNOBS AT
YOUR HOUSE TO SEE IF IT WILL SLIDE IN AND OUT SMOOTHLY.
NOW, THIS IS WHERE THE SCREWDRIVER COMES IN. IS IT SMALL ENOUGH FOR IT AND
YOUR PICK TO BE USED IN THE SAME LOCK AT THE SAME TIME, ONE ABOVE THE OTHER ?
LETS HOPE SO, BECAUSE THAT'S THE ONLY WAY YOUR GONNA OPEN IT.

IN THE COMING INSTRUCTIONS, PLEASE REFER TO THIS CHART OF THE INTERIOR OF A
LOCK:

XXXXXXXXXXXXXXXXXXXXXXX| K
# # # # # # | E
# # # # | Y
* * | sH
* * * * * * | O
| L
| E
XXXXXXXXXXXXXXXXXXXXXXX|

#= UPPER TUMLER PIN
*= LOWER TUMLER PIN
X= CYLINDER WALL

(THIS IS A GREATLY SIMPLIFIED DRAWING)

THE OBJECT IS TO PRESS THE PIN UP SO THAT THE SPAsCE BETWEEN THE UPPER PIN AND
THE LOWER PIN IS LEVEL WITH THE CYLINDER WALL. NOW, IF YOU PUSH A PIN UP, ITS
TENDANCY IS TO FALL BACK DOWN, RIGHT ? THAT IS WHERE THE SCREWDRIVER COMES IN.
INSERT THE SCREWDRIVER INTO THE SLOT AND TURN. THIS TENSION WILL KEEP THE
"SOLVED" PINS FROM FALLING BACK DOWN. NOW, WORK FROM THE BACK OF THE LOCK TO
THE FRONT, AND WHEN YOU'RE THROUGH.....
THERE WILL BE A CLICK, THE SCREWDRIVER WILL TURN FREELY, AND THE DOOR WILL
OPEN. DON'T GET DISCOURAGE ON YOUR FIRST TRY! IT WILL PROBABLY TAKE YOU ABOUT
20-30 MINUTES YOUR FIRST TIME. AFTER THAT YOU WILL QUICKLY IMPROVE WITH
PRACTICE.
THIS IS BY NO MEANS THE MOST EFFICIENT WAY OF ENTERING A HOUSE. IF YOU WOULD
LIKE ANOTHER ITEM OR TWO DEVOTED TO THESE OTHER WAYS, LET THE SYSOP KNOW.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

How to Pick Master Locks

Have you ever tried to impress your friends by picking one of those Master
combination locks and failed? Well then read on. The Master lock company has
made this kind of lock with a protection scheme. If you pull the handle of it
hard, the knob won't turn. That was their biggest mistake...... Ok, now on to
it.

1st number. Get out any of the Master locks so you know what's going on. 1:
The handle part (the part that springs open when you get the combination), pull
on it, but not enough so that the knob won't move. 2: While pulling on it turn
the knob to the left until it won't move any more. Then add 5 to this number.
Congradulations, you now have the 1st number.

2nd number. (a lot tougher) Ok, spin the dial around a couple of times, then
go to the 1st number you got, then turn it to the right, bypassing the 1st
number once. WHEN you have bypassed. Start pulling the handle and turning it.
It will eventually fall into the groove and lock. While in the groove pull on
it and turn the knob. If it is loose go to the next groove; if it's stiff you
got the second number.

3rd number: After getting the 2nd, spin the dial, then enter the 2 numbers,
then after the 2nd, go to the right and at all the numbers pull on it. The lock
will eventually open if you did it right. If can't do it the first time, be
patient, it takes time.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

/-----------------------------------------------------------------------------\
| Mister Shim(TM) - Your Briefcase-Opening Pal |
\-----------------------------------------------------------------------------/

Here'sa toy that will have limited use for most people now, but which might
encourage a bit more sneakiness in the future. It's a simple device that
allowsyou to quickly and silently open, with no injury to yourself or the
target,virtually any briefcase that uses a combination lock as its sole
security measure.

___________________| |_ This is the kind of lock to which I refer.
| ___ _ _ _ | | | It's used primarily on your cheaper-style
|| | |-| |-| |-| | | | attache cases, popular among yuppies and
||___| |-| |-| |-| |____| | other wimpy neo-rich types -- maybe including
|__________________________| that nerdy kid in your homeroom with the
^^^ ^^^^^^^^^ ^^ hornrim glasses and the pencil case in his
Slide Combo Dials Hasp shirt pocket. You never know what he might
have hidden in there . . . like a nice HP
calculator (which he never uses -- he extracts cube roots in his head) or his
lunchmoney. Now you can find out without him knowing. Just snatch the case
fromhis locker, where he keeps it during Gym period, and be sure to put it
backbefore he returns. (And if you don't know how to get into his locker,
checkout the Master Lock file in PHRACK issue #1.)

------------------------
Building Mister Shim(TM)
------------------------

You'llneed a thin piece of metal about 2cm by 3cm. (We're using metric here,
guys. So sue me.) In the one I made I used a piece cut from an aluminum Coke
canand it worked fine. Out of the 2cm end, cut it to look like the diagram
below(which I wish could be less confusing . . . just look at it carefully).

/ - - - - 12mm - - - - \
|_______ _______| _ _
_ | aluminum | | 2mm
1mm| _ |____/\____ ____/\____| _ _ _ _ _ _|_
. .. \/_ _ .._ _ . _ _ _ _ _ _ _| 1mm
2mm wide:____::____::____::____:
about 1.3mm wide ^^ ^^ ^^

(To SCALE? Are you KIDDING?)

Itlookstough, but really isn't . . . use a very sharp exacto knife to cut out
thetwo corners first, then a fine trangular metal file to smooth it and file
outthe small indentations. It'll take about ten to fifteen minutes if you do
itcarefully, and it does NOT have to be EXACT . . . just get it as close as
youcan. It helps to have one of those locks nearby to fine-tune the shim.
Simplyset the lock to its correct combiation and insert Mister Shim(TM) as
described below. If it works as described, your shim is properly designed.

---------------------
UsingMister Shim(TM)
---------------------

Theguywho designed this particular type of lock knew that he'd have to
installsome sort of "back door" in it, for all those airheads who would change
thenumbers on their locks and then forget them, or in case Random Briefcase
Vandalsassaulted the luggage store, raping, pillaging, and changing
combinations as they went. This is that back door.

Useissimple. Slide the modified end of Mister Shim(TM) into the gap right
t to the dial on the lock. (Try both sides, it varies from lock to lock.)
IfMister Shim(TM) goes in ALL THE WAY with a little jiggling, the number shown
onthe dial is correct. If not, turn to the next number and try again. On a
three-dial lock, it will take an average of only fifteen checks to find the
propercombination; on a two-lock case with a practiced operator, this adds up
toLESS THAN A MINUTE to open the case.

Youcannow access anything inside the case you like, or change the combination
ifyou wish. (To change the combination, push the slide towards the hasp [see
firstdiagram] and hold it, then turn the dials to the desired new combo. Your
victimwill have to go to someone with their own Mister Shim(TM) -- or destroy
thelock -- if they ever want to get into their briefcase again.)

UseMisterShim(TM) in good health.
_______________________________________________________________________________

DISCLAIMER: Certain applications of Mister Shim(TM) may be illegal in some
areas. Consult your attorney. Mister Shim(TM) is not intended for internal or
topicaluse. Keep away from cuts or open sores. And remember, this is just an
hibition, not a competition. Please . . . no wagering.

<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>

III.> Radio Hacking/Satelite Hacking


------FREQUING------
********************
* THE BASIS BEHIND *
* RADIO HACKING *
********************


This article deals with Satellite hacking, CB info, and car phone
systems.

Satellite Control
-----------------
Companies try to build satellites to last for as long a time as
possible. Unfortunately, for the companies, things in space can
happen unexpectantly and suddently. Take that satellite released by
the space shuttle. It's orbit carried it way off t he correct
altitude. The company's only hope was to fire a rocket on it in order
to bring it to the correct place.
Now think...how does one on the ground fire a rocket in space?
Radio! Gee, if the company could change the orbit, maybe we can too.
Sound interesting? Of course we were not the first to think of this.
The satellite companies have worried about this for a long time.
There are stories about top secret codes, frequencies, and protocols
required to 'nudge' one of those babies.
The only problem is that-there is little information about this out
there. If you have any info, make a text file, and let others know of
your knowledge. But let me tell you all I know about a simple
satellite whose telemetry is known well.
OSCAR 6 was a satellite sent up in order to take in amateur signals
between 145.9 and 146.0 MHz, and re-transmit them between 29.45 and
29.55 MHz using a transponder. Early in 1976, OSCAR 6 began to have
battery problems. The telemetry allowed the ground command stations
to shut the satellite off at regular intervals to prolong the useful
life of the satellite.
Now we know the satellite sent out telemetry reports at a certain
frequency (OSCAR 7 was 29.502 and 145.972 MHz). And it sent them out
in the form of Morse code at about 20 wpm. Information rate of spin,
power use, and temperature were sent out at 20 wpm. This seems to
suggest that the control might have also used morse code. Strangely
enough, there was never any information in the American Radio Relay
League magazine about just how they control the OSCAR satellites.
(Hams know what's safe and what's crazy also)
Suggestions: Don't overlook RTTY when trying to Satelhack
(Satellite hacking). Also, chances are the owners will figure out
what you did, so 'downing', the ultimate for a satelhack, is pretty
difficult.

Citizen's Band
--------------
CB is a very popular communications method. Again, you need a
license from the FCC to operate legally. But it's so hard to track
down a CB signal unless you have a massive amplifier or talk for hours
straight, there is little use in getting one. Here is a list of
channel frequencies:

Channel Frequency
(MHz)
1 26.965
2 26.975
3 26.985
4 27.005
5 27.015
6 27.025
7 27.035
8 27.055
9-emergency 27.065
10 27.075
11-contact channel 27.085
12 27.105
13 27.115
14 27.125
15 27.135
16 27.155
17 27.165
18 27.175
19-trucker's channel 27.185
20 27.205
21 27.215
22 27.225
22A (optional) 27.235
22B (optional) 27.245
23 27.255

A Cheap Ghost-Interferance
--------------------------
How can you start a real cheap ghost or interferance station? Well,
the Radio Shack wireless FM microphone (the clip on one) is pretty
good for $19.95 (price may change). It's range is said to be 100
yards, but actual tests show its range is about 100 ft. outside, 40
ft. inside. However, in the instructions it says that increasing the
battery power will make it stronger, but this would not be in
compliance with the FCC (oh darn!). One problem with this is that
with a stronger battery comes the risk of frying something inside.
Instead of trying to upgrade the silly thing, just make a new one.
Open it up and take a look at how it is made. Now, get a cheap
microphone then feed it into an amplifier like that on your stereo.
Then take the outputs of the amplifier and feed it into the same kind
of circuit as the wireless microphone contains (use heavy-duty parts
so they won't fry. The only parts are a varactor diode and three
silicon transistors). You new transmitter can now block out stations
in a relatively sized neighborhood (great in cities).

Mobile Phones
-------------
Radio phones have been around for a while. The first mobile
telephone call was made September 11, 1946 between a Houston Post and
a St. Louis Globe reporter. An old mobile phone service in New York
city had 700 subscribers, but could only handle 12 conversations at a
time (because it had 12 channels). There are some 160,000 mobile
telephones nationwide.
The old service was doomed to fail. Each major city had one or two
powerful transmitters to communicate with all car phones in a 30- to
50-mile radius. To make a call from a car, you must find a vacant
channel, then call the operator and supply the number you want to
call. The operator dials the number and connects you when the party
answers. Only a few companies have dial-it-yourself service. If
someone wants to call you, they must first find the mobile phone
operator in your area. The operator finds a vacant channel and
transmits a series of tones that correspond to your phone and make it
ring-sort of as if it were a pager. Once you answer, the operator
connects you and the caller.
Clearly, the system was slow. Worse, it could only serve a few
users at a time. During rush hour, there was little hope of making a
call. Few channels could be added because of the dearth of
frequencies for that kind of operation. So now you can't get a mobile
phone of this type unless someone else gives one up.
Enter the cellular mobile radio. Instead of only 1 or 2
transmitters, an area is divided up into many small sections, called
'cells'. Each has it's own low-powered transmitter just strong enough
to serve it's cell. An average cell covers from one to eight square
miles and varies in shape from a circle to a squashed football. Each
cell touches another, some overlap slightly.
Adjacent cells use different channels-there are more than 600 in
each city to choose from-and a channel may be re-used several times in
the city if the cells are located far enough apart. All of the cell's
transmitters hook into one network switching office, much like a
central office handles calls form land-based telephones.
Each transmitter constantly sends out a special signal, and as you
drive from cell to cell, your telephone automaticly tunes in the
strongest cell. When a call comes in for you, the network switching
office uses the channel to send a digital pulse signal that
corresponds to your ten-digit phone number (NPA+7 digits).
When the phone hears it's number, it in effect says 'Here I am, in
this certain cell'. That information is sent back to the network
switching office, which scans vacant frequencies, and relays the
information to your cell. Finally, your unit tunes to that voice
channel, and the cell site rings you, and you talk.
It sounds complicated-and it is. But it works in seconds. And it
can be expanded. As more and more phones are added, cells can be
split into smaller cells with less power. Cellular radio already
exists in Japan, Denmark, Norway, and Sweden. In Denmark, service
began in 1981 and grew to 100,000 customers almost overnight. Within
a few years all of Scandinavia will have compatable cellular systems.
Australia, Canada, and Mexico also plan systems.
Why has the U.S. lagged behind? Yep, it's our old freinds, the
FCC. They studied the system for 12 years before okaying the service
in 1982. The U.S. may be full celled by 1988. Now is the time to
rent your backyard as a cellular station!
The Bell companies will operate cellular service as the Cellular
Service Company. Others such as GTE and MCI plan similar service.
Even the Washington Post is trying to get into it. There are already
two systems, one in Washington/Baltimore, and one in Chicago. Chicago
users pay about $50 rent and $25 monthly use fee for 120 minutes, and
25 cents/minute hereafter. Average bills are $150/month.
The main unit mounts in the trunk, and just the handset sits up
front. The antennas are very small-about nine inches-and are hidden
inside the car.
Now freaking old car phone systems shoudln't be that hard if you
really try. The following are the freq's to remember:

158.07-158.49 MHz (mobile)
152.81-153.03 MHz (base stations)

You CAN listen in on these freq's. What I'm not sure about is
whether you can place a call-I would think so. So Freq out!

COMMING SOON: Repair trucks, installers, and linesmen, Marine
Radio, and Airplane phones

<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>

IV.> Hacking Quiz. How do you rank?


This test was conceived and written by Felix Lee, John Hayes and Angela
Thomas at the end of the spring semester, 1989. It has gone through
many revisions prior to this initial release, and will undoubtedly go
through many more.


(Herewith a compendium of fact and folklore about computer hackerdom,
cunningly disguised as a test.)


Scoring - Count 1 for each item that you have done, or each
question that you can answer correctly.


If you score is between: You are

0x000 and 0x010 -> Computer Illiterate
0x011 and 0x040 -> a User
0x041 and 0x080 -> an Operator
0x081 and 0x0C0 -> a Nerd
0x0C1 and 0x100 -> a Hacker
0x101 and 0x180 -> a Guru
0x181 and 0x200 -> a Wizard

Note: If you don't understand the scoring, stop here.


And now for the questions...


0001 Have you ever used a computer?
0002 ... for more than 4 hours continuously?
0003 ... more than 8 hours?
0004 ... more than 16 hours?
0005 ... more than 32 hours?

0006 Have you ever patched paper tape?

0007 Have you ever missed a class while programming?
0008 ... Missed an examination?
0009 ... Missed a wedding?
0010 ... Missed your own wedding?

0011 Have you ever programmed while intoxicated?
0012 ... Did it make sense the next day?

0013 Have you ever written a flight simulator?

0014 Have you ever voided the warranty on your equipment?

0015 Ever change the value of 4?
0016 ... Unintentionally?
0017 ... In a language other than Fortran?

0018 Do you use DWIM to make life interesting?

0019 Have you named a computer?

0020 Do you complain when a "feature" you use gets fixed?

0021 Do you eat slime-molds?

0022 Do you know how many days old you are?

0023 Have you ever wanted to download pizza?

0024 Have you ever invented a computer joke?
0025 ... Did someone not 'get' it?

0026 Can you recite Jabberwocky?
0027 ... Backwards?

0028 Have you seen "Donald Duck in Mathemagic Land"?

0029 Have you seen "Tron"?

0030 Have you seen "Wargames"?

0031 Do you know what ASCII stands for?
0032 ... EBCDIC?

0033 Can you read and write ASCII in hex or octal?
0034 Do you know the names of all the ASCII control codes?

0035 Can you read and write EBCDIC in hex?

0036 Can you convert from EBCDIC to ASCII and vice versa?

0037 Do you know what characters are the same in both ASCII and EBCDIC?

0038 Do you know maxint on your system?

0039 Ever define your own numerical type to get better precision?

0040 Can you name powers of two up to 2**16 in arbitrary order?
0041 ... up to 2**32?
0042 ... up to 2**64?

0043 Can you read a punched card, looking at the holes?
0044 ... feeling the holes?

0045 Have you ever patched binary code?
0046 ... While the program was running?

0047 Have you ever used program overlays?

0048 Have you met any IBM vice-president?
0049 Do you know Dennis, Bill, or Ken?

0050 Have you ever taken a picture of a CRT?
0051 Have you ever played a videotape on your CRT?

0052 Have you ever digitized a picture?

0053 Did you ever forget to mount a scratch monkey?

0054 Have you ever optimized an idle loop?

0055 Did you ever optimize a bubble sort?

0056 Does your terminal/computer talk to you?

0057 Have you ever talked into an acoustic modem?
0058 ... Did it answer?

0059 Can you whistle 300 baud?
0060 ... 1200 baud?

0061 Can you whistle a telephone number?

0062 Have you witnessed a disk crash?
0063 Have you made a disk drive "walk"?

0064 Can you build a puffer train?
0065 ... Do you know what it is?

0066 Can you play music on your line printer?
0067 ... Your disk drive?
0068 ... Your tape drive?

0069 Do you have a Snoopy calendar?
0070 ... Is it out-of-date?

0071 Do you have a line printer picture of...
0072 ... the Mona Lisa?
0073 ... the Enterprise?
0074 ... Einstein?
0075 ... Oliver?
0076 Have you ever made a line printer picture?

0077 Do you know what the following stand for?
0078 ... DASD
0079 ... Emacs
0080 ... ITS
0081 ... RSTS/E
0082 ... SNA
0083 ... Spool
0084 ... TCP/IP

Have you ever used
0085 ... TPU?
0086 ... TECO?
0087 ... Emacs?
0088 ... ed?
0089 ... vi?
0090 ... Xedit (in VM/CMS)?
0091 ... SOS?
0092 ... EDT?
0093 ... Wordstar?

0094 Have you ever written a CLIST?

Have you ever programmed in
0095 ... the X windowing system?
0096 ... CICS?

0097 Have you ever received a Fax or a photocopy of a floppy?

0098 Have you ever shown a novice the "any" key?
0099 ... Was it the power switch?

Have you ever attended
0100 ... Usenix?
0101 ... DECUS?
0102 ... SHARE?
0103 ... SIGGRAPH?
0104 ... NetCon?

0105 Have you ever participated in a standards group?

0106 Have you ever debugged machine code over the telephone?

0107 Have you ever seen voice mail?
0108 ... Can you read it?

0109 Do you solve word puzzles with an on-line dictionary?

0110 Have you ever taken a Turing test?
0111 ... Did you fail?

0112 Ever drop a card deck?
0113 ... Did you successfully put it back together?
0114 ... Without looking?

0115 Have you ever used IPCS?

0116 Have you ever received a case of beer with your computer?

0117 Does your computer come in 'designer' colors?

0118 Ever interrupted a UPS?

0119 Ever mask an NMI?

0120 Have you ever set off a Halon system?
0121 ... Intentionally?
0122 ... Do you still work there?

0123 Have you ever hit the emergency power switch?
0124 ... Intentionally?

0125 Do you have any defunct documentation?
0126 ... Do you still read it?

0127 Ever reverse-engineer or decompile a program?
0128 ... Did you find bugs in it?

0129 Ever help the person behind the counter with their terminal/computer?

0130 Ever tried rack mounting your telephone?

0131 Ever thrown a computer from more than two stories high?

0132 Ever patched a bug the vendor does not acknowledge?

0133 Ever fix a hardware problem in software?
0134 ... Vice versa?

0135 Ever belong to a user/support group?

0136 Ever been mentioned in Computer Recreations?

0137 Ever had your activities mentioned in the newspaper?
0138 ... Did you get away with it?

0139 Ever engage a drum brake while the drum was spinning?

0140 Ever write comments in a non-native language?

0141 Ever physically destroy equipment from software?

0142 Ever tried to improve your score on the Hacker Test?

0143 Do you take listings with you to lunch?
0144 ... To bed?

0145 Ever patch a microcode bug?
0146 ... around a microcode bug?

0147 Can you program a Turing machine?

0148 Can you convert postfix to prefix in your head?

0149 Can you convert hex to octal in your head?

0150 Do you know how to use a Kleene star?

0151 Have you ever starved while dining with philosophers?

0152 Have you solved the halting problem?
0153 ... Correctly?

0154 Ever deadlock trying eating spaghetti?

0155 Ever written a self-reproducing program?

0156 Ever swapped out the swapper?

0157 Can you read a state diagram?
0158 ... Do you need one?

0159 Ever create an unkillable program?
0160 ... Intentionally?

0161 Ever been asked for a cookie?

0162 Ever speed up a system by removing a jumper?

* Do you know...

0163 Do you know who wrote Rogue?
0164 ... Rogomatic?

0165 Do you know Gray code?

0166 Do you know what HCF means?
0167 ... Ever use it?
0168 ... Intentionally?

0169 Do you know what a lace card is?
0170 ... Ever make one?

0171 Do you know the end of the epoch?
0172 ... Have you celebrated the end of an epoch?
0173 ... Did you have to rewrite code?

0174 Do you know the difference between DTE and DCE?

0175 Do you know the RS-232C pinout?
0176 ... Can you wire a connector without looking?

* Do you have...

0177 Do you have a copy of Dec Wars?
0178 Do you have the Canonical Collection of Lightbulb Jokes?
0179 Do you have a copy of the Hacker's dictionary?
0180 ... Did you contribute to it?

0181 Do you have a flowchart template?
0182 ... Is it unused?

0183 Do you have your own fortune-cookie file?

0184 Do you have the Anarchist's Cookbook?
0185 ... Ever make anything from it?

0186 Do you own a modem?
0187 ... a terminal?
0188 ... a toy computer?
0189 ... a personal computer?
0190 ... a minicomputer?
0191 ... a mainframe?
0192 ... a supercomputer?
0193 ... a hypercube?
0194 ... a printer?
0195 ... a laser printer?
0196 ... a tape drive?
0197 ... an outmoded peripheral device?

0198 Do you have a programmable calculator?
0199 ... Is it RPN?

0200 Have you ever owned more than 1 computer?
0201 ... 4 computers?
0202 ... 16 computers?

0203 Do you have a SLIP line?
0204 ... a T1 line?

0205 Do you have a separate phone line for your terminal/computer?
0206 ... Is it legal?

0207 Do you have core memory?
0208 ... drum storage?
0209 ... bubble memory?

0210 Do you use more than 16 megabytes of disk space?
0211 ... 256 megabytes?
0212 ... 1 gigabyte?
0213 ... 16 gigabytes?
0214 ... 256 gigabytes?
0215 ... 1 terabyte?

0216 Do you have an optical disk/disk drive?

0217 Do you have a personal magnetic tape library?
0218 ... Is it unlabelled?

0219 Do you own more than 16 floppy disks?
0220 ... 64 floppy disks?
0221 ... 256 floppy disks?
0222 ... 1024 floppy disks?

0223 Do you have any 8-inch disks?

0224 Do you have an internal stack?

0225 Do you have a clock interrupt?

0226 Do you own volumes 1 to 3 of _The Art of Computer Programming_?
0227 ... Have you done all the exercises?
0228 ... Do you have a MIX simulator?
0229 ... Can you name the unwritten volumes?

0230 Can you quote from _The Mythical Man-month_?
0231 ... Did you participate in the OS/360 project?

0232 Do you have a TTL handbook?

0233 Do you have printouts more than three years old?

* Career

0234 Do you have a job?
0235 ... Have you ever had a job?
0236 ... Was it computer-related?

0237 Do you work irregular hours?

0238 Have you ever been a system administrator?

0239 Do you have more megabytes than megabucks?

0240 Have you ever downgraded your job to upgrade your processing power?

0241 Is your job secure?
0242 ... Do you have code to prove it?

0243 Have you ever had a security clearance?

* Games

0244 Have you ever played Pong?

Have you ever played
0246 ... Spacewar?
0247 ... Star Trek?
0248 ... Wumpus?
0249 ... Lunar Lander?
0250 ... Empire?

Have you ever beaten
0251 ... Moria 4.8?
0252 ... Rogue 3.6?
0253 ... Rogue 5.3?
0254 ... Larn?
0255 ... Hack 1.0.3?
0256 ... Nethack 2.4?

0257 Can you get a better score on Rogue than Rogomatic?

0258 Have you ever solved Adventure?
0259 ... Zork?

0260 Have you ever written any redcode?

0261 Have you ever written an adventure program?
0262 ... a real-time game?
0263 ... a multi-player game?
0264 ... a networked game?

0265 Can you out-doctor Eliza?

* Hardware

0266 Have you ever used a light pen?
0267 ... did you build it?

Have you ever used
0268 ... a teletype?
0269 ... a paper tape?
0270 ... a decwriter?
0271 ... a card reader/punch?
0272 ... a SOL?

Have you ever built
0273 ... an Altair?
0274 ... a Heath/Zenith computer?

Do you know how to use
0275 ... an oscilliscope?
0276 ... a voltmeter?
0277 ... a frequency counter?
0278 ... a logic probe?
0279 ... a wirewrap tool?
0280 ... a soldering iron?
0281 ... a logic analyzer?

0282 Have you ever designed an LSI chip?
0283 ... has it been fabricated?

0284 Have you ever etched a printed circuit board?

* Historical

0285 Have you ever toggled in boot code on the front panel?
0286 ... from memory?

0287 Can you program an Eniac?

0288 Ever seen a 90 column card?

* IBM

0289 Do you recite IBM part numbers in your sleep?
0290 Do you know what IBM part number 7320154 is?

0291 Do you understand 3270 data streams?

0292 Do you know what the VM privilege classes are?

0293 Have you IPLed an IBM off the tape drive?
0294 ... off a card reader?

0295 Can you sing something from the IBM Songbook?

* Languages

0296 Do you know more than 4 programming languages?
0297 ... 8 languages?
0298 ... 16 languages?
0299 ... 32 languages?

0300 Have you ever designed a programming language?

0301 Do you know what Basic stands for?
0302 ... Pascal?

0303 Can you program in Basic?
0304 ... Do you admit it?

0305 Can you program in Cobol?
0306 ... Do you deny it?

0307 Do you know Pascal?
0308 ... Modula-2?
0309 ... Oberon?
0310 ... More than two Wirth languages?
0311 ... Can you recite a Nicklaus Wirth joke?

0312 Do you know Algol-60?
0313 ... Algol-W?
0314 ... Algol-68?
0315 ... Do you understand the Algol-68 report?
0316 ... Do you like two-level grammars?

0317 Can you program in assembler on 2 different machines?
0318 ... on 4 different machines?
0319 ... on 8 different machines?

Do you know
0320 ... APL?
0321 ... Ada?
0322 ... BCPL?
0323 ... C++?
0324 ... C?
0325 ... Comal?
0326 ... Eiffel?
0327 ... Forth?
0328 ... Fortran?
0329 ... Hypertalk?
0330 ... Icon?
0331 ... Lisp?
0332 ... Logo?
0333 ... MIIS?
0334 ... MUMPS?
0335 ... PL/I?
0336 ... Pilot?
0337 ... Plato?
0338 ... Prolog?
0339 ... RPG?
0340 ... Rexx (or ARexx)?
0341 ... SETL?
0342 ... Smalltalk?
0343 ... Snobol?
0344 ... VHDL?
0345 ... any assembly language?

0346 Can you talk VT-100?
0347 ... Postscript?
0348 ... SMTP?
0349 ... UUCP?
0350 ... English?

* Micros

0351 Ever copy a copy-protected disk?
0352 Ever create a copy-protection scheme?

0353 Have you ever made a "flippy" disk?

0354 Have you ever recovered data from a damaged disk?

0355 Ever boot a naked floppy?

* Networking

0356 Have you ever been logged in to two different timezones at once?

0357 Have you memorized the UUCP map for your country?
0358 ... For any country?

0359 Have you ever found a sendmail bug?
0360 ... Was it a security hole?

0361 Have you memorized the HOSTS.TXT table?
0362 ... Are you up to date?

0363 Can you name all the top-level nameservers and their addresses?

0364 Do you know RFC-822 by heart?
0365 ... Can you recite all the errors in it?

0366 Have you written a Sendmail configuration file?
0367 ... Does it work?
0368 ... Do you mumble "defocus" in your sleep?

0369 Do you know the max packet lifetime?

* Operating systems

Can you use
0370 ... BSD Unix?
0371 ... non-BSD Unix?
0372 ... AIX
0373 ... VM/CMS?
0374 ... VMS?
0375 ... MVS?
0376 ... VSE?
0377 ... RSTS/E?
0378 ... CP/M?
0379 ... COS?
0380 ... NOS?
0381 ... CP-67?
0382 ... RT-11?
0383 ... MS-DOS?
0384 ... Finder?
0385 ... PRODOS?
0386 ... more than one OS for the TRS-80?
0387 ... Tops-10?
0388 ... Tops-20?
0389 ... OS-9?
0390 ... OS/2?
0391 ... AOS/VS?
0392 ... Multics?
0393 ... ITS?
0394 ... Vulcan?

0395 Have you ever paged or swapped off a tape drive?
0396 ... Off a card reader/punch?
0397 ... Off a teletype?
0398 ... Off a networked (non-local) disk?

0399 Have you ever found an operating system bug?
0400 ... Did you exploit it?
0401 ... Did you report it?
0402 ... Was your report ignored?

0403 Have you ever crashed a machine?
0404 ... Intentionally?

* People

0405 Do you know any people?
0406 ... more than one?
0407 ... more than two?

* Personal

0408 Are your shoelaces untied?

0409 Do you interface well with strangers?

0410 Are you able to recite phone numbers for half-a-dozen computer systems
but unable to recite your own?

0411 Do you log in before breakfast?

0412 Do you consume more than LD-50 caffeine a day?

0413 Do you answer either-or questions with "yes"?

0414 Do you own an up-to-date copy of any operating system manual?
0415 ... *every* operating system manual?

0416 Do other people have difficulty using your customized environment?

0417 Do you dream in any programming languages?

0418 Do you have difficulty focusing on three-dimensional objects?

0419 Do you ignore mice?

0420 Do you despise the CAPS LOCK key?

0421 Do you believe menus belong in restaurants?

0422 Do you have a Mandelbrot hanging on your wall?

0423 Have you ever decorated with magnetic tape or punched cards?
0424 Do you have a disk platter or a naked floppy hanging in your home?

0425 Have you ever seen the dawn?
0426 ... Twice in a row?

0427 Do you use "foobar" in daily conversation?
0428 ... "bletch"?

0429 Do you use the "P convention"?

0430 Do you automatically respond to any user question with RTFM?
0431 ... Do you know what it means?

0432 Do you think garbage collection means memory management?

0433 Do you have problems allocating horizontal space in your room/office?

0434 Do you read Scientific American in bars to pick up women?

0435 Is your license plate computer-related?

0436 Have you ever taken the Purity test?

0437 Ever have an out-of-CPU experience?

0438 Have you ever set up a blind date over the computer?

0439 Do you talk to the person next to you via computer?

* Programming

0440 Can you write a Fortran compiler?
0441 ... In TECO?

0442 Can you read a machine dump?
0443 Can you disassemble code in your head?

Have you ever written
0444 ... a compiler?
0445 ... an operating system?
0446 ... a device driver?
0447 ... a text processor?
0448 ... a display hack?
0449 ... a database system?
0450 ... an expert system?
0451 ... an edge detector?
0452 ... a real-time control system?
0453 ... an accounting package?
0454 ... a virus?
0455 ... a prophylactic?

0456 Have you ever written a biorhythm program?
0457 ... Did you sell the output?
0458 ... Was the output arbitrarily invented?

0459 Have you ever computed pi to more than a thousand decimal places?
0460 ... the number e?

0461 Ever find a prime number of more than a hundred digits?

0462 Have you ever written self-modifying code?
0463 ... Are you proud of it?

0464 Did you ever write a program that ran correctly the first time?
0465 ... Was it longer than 20 lines?
0466 ... 100 lines?
0467 ... Was it in assembly language?
0468 ... Did it work the second time?

0469 Can you solve the Towers of Hanoi recursively?
0470 ... Non-recursively?
0471 ... Using the Troff text formatter?

0472 Ever submit an entry to the Obfuscated C code contest?
0473 ... Did it win?
0474 ... Did your entry inspire a new rule?

0475 Do you know Duff's device?

0476 Do you know Jensen's device?

0477 Ever spend ten minutes trying to find a single-character error?
0478 ... More than an hour?
0479 ... More than a day?
0480 ... More than a week?
0481 ... Did the first person you show it to find it immediately?

* Unix

0482 Can you use Berkeley Unix?
0483 .. Non-Berkeley Unix?

0484 Can you distinguish between sections 4 and 5 of the Unix manual?

0485 Can you find TERMIO in the System V release 2 documentation?

0486 Have you ever mounted a tape as a Unix file system?

0487 Have you ever built Minix?

0488 Can you answer "quiz function ed-command" correctly?
0489 ... How about "quiz ed-command function"?

* Usenet

0490 Do you read news?
0491 ... More than 32 newsgroups?
0492 ... More than 256 newsgroups?
0493 ... All the newsgroups?

0494 Have you ever posted an article?
0495 ... Do you post regularly?

0496 Have you ever posted a flame?
0497 ... Ever flame a cross-posting?
0498 ... Ever flame a flame?
0499 ... Do you flame regularly?

0500 Ever have your program posted to a source newsgroup?

0501 Ever forge a posting?
0502 Ever form a new newsgroup?
0503 ... Does it still exist?

0504 Do you remember
0505 ... mod.ber?
0506 ... the Stupid People's Court?
0507 ... Bandy-grams?

* Phreaking

0508 Have you ever built a black box?

0509 Can you name all of the 'colors' of boxes?
0510 ... and their associated functions?

0511 Does your touch tone phone have 16 DTMF buttons on it?

0512 Did the breakup of MaBell create more opportunities for you?

<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>

V.> Introducion to PBX's


pppp bbbbb x x
p p b b x x
p p b b xx
pppp bbbbb xx
p b b x x
p bbbbb x x

PBX - Public Branch eXchange

For all you new phreakers that are vocabularized real well that's the
formal definations......and for those that know what their doing it's
your best phriend.....

A PBX is no more than a phone line leading into a little box with about
10 lines coming out of it.....Most PBX's are located inside big businesses
such as doctor's office, banks, and other type of important places that
have large masses of people calling in....

You w

  
ill realize when you dial a PBX 'cause you will get a ring or a beep
then drop directly into a dial tone....DO NOT MISTAKE THIS FOR IT HANGING UP.
Most PBX'S are usually easy to scan for and use....The normal PBX's just
requires a 9 before you can outdial....But then you hit a wierd one that
requires you to enter anywhere from 4-6 code before allowing you access....


First of all the easiest way to scan for PBX's would be to set up a
scanner that will dial something like this 'atdt yyy-yyyy,,,9,xxx-xxxx' where
'yyy-yyyy' is the number you're scanning and 'xxx-xxxx' is a local nuber
that you ALWAYS recieve a carrier.....this way when you wake up just see
what you connected to and dial and check them out.....there is no other
way of scanning for PBX's unless you just sit there and listen to each number
that you dial out....

I hope this gives you new phreakers something to do next time you're
wondering where you're going to leech wareZ from.....Ok this covers what
you should need to know about PBX's......HAVE PHUN....



Typed by

tHe gH0st
^^^^^^^^^
at 1:00 in the damn morning!

<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>

VI.> Storytime: CyberPUNK



Load & Run High-tech Paganism-Digital Polytheism

By Timothy Leary and Eric Gullichsen


We place no reliance
On virgin or pigeon;
Our Method is Science,
Our Aim is Religion.

-- Aleister Crowley,
mot from the journal "Equinox"


People jacked in so they could hustle. Put the trodes on and
they were out there, all the data in the world stacked up like one
big neon city, so you could cruise around and have a grip on it,
visually anyway, because if you didn't, it was too complicated,
trying to find your way to a particular piece of data you needed.
Iconics, Gentry called that.
--William Gibson,
Mona Lisa Overdrive



Information is more basic
than matter and energy.

Atoms, electrons, quarks
consist of bits --

Binary units of
information

Like those processed in
computer software

And in the brain.

The behavior of these bits,
and thus of the universe,

Is governed by a single
programming rule.

--Edward Fredkin



A UNIVERSE OF BITS AND BYTES

Major historical accomplishments of the 20th century included
the personalization and popularization of Quantum Physics, an
acceptance of self-reference and circular causality in systems of
mathematics and psychology, and the resulting development of
cybernetic society.
This philosophic achievement, which has dominated the culture
of the 20th century, was based on a discovery by nuclear and
quantum physicists around 1900, that visible-tangible realities
are written in a digital assembly language we could accurately
call "basic."
It turns out that we inhabit a universe made up of a small
number of elements-particles-bits which cluster together in
geometrically-logical, temporary configurations.
The solid Newtonian Universe rested upon such immutable
General-Motors concepts as mass, force, momentum, and inertia,
cast into a Manichaean drama involving equal reactions of good vs.
evil, gravity vs. levity, entropy vs. evolution and coerced by
such pious Bank-of-England notions as conservation of energy. This
dependable, static, predictable, universe suddenly, in the minds
of Planck/Heisenberg became digitized, transformed into shimmering
quantum screens of electronic probabilities.
Up here in 1988, we are learning to experience what Nils
Bohr and Werner Heisenberg could only dream of. The universe,
according to their cyberdelic equations, is best described as a
digital information process with sub-programs and temporary ROM
states, megas called galaxies, maxis called stars, minis called
planets, micros called organisms, and nanos known as molecules,
atoms, particles. All of these programs are perpetually in states
of evolution, i.e., continually "running."
It seems to follow that the great intellectual challenge of
the 20th century was to make this universe "user friendly," to
prepare individual human beings to decode, digitize, store,
process & reflect the sub-programs which make up his/her own
personal realities.


NOBODY KNEW WHAT THESE GUYS WERE TALKING ABOUT

The chain of events that elevated us to this new genetic
status, HOMO SAPIENS CYBERNETICUS, began around the turn of the
century.
Physicists, we recall, are traditionally assigned the task of
sorting out the nature of reality. So it was the quantum
philosophers who figured out that units of energy/matter were sub-
atomic bits of programmed information that zoom around in clouds
of ever-changing, if/then, start/stop, off/on, 0/1, yin/yang
probabilities in clusters of pixels, up-and-down recurring
stairways of paradox.
When they started out, no one understood what these guys were
talking about. They expressed their unsettling theories in complex
equations written on blackboards with chalk. Believe it or not,
these great physicists thought and communicated with a neolithic
took -- chalk-marks on the wall of the cave. The irony was this:
Einstein and his brilliant colleagues could not experience or
operate of communicate at a quantum-electronic level.
Imagine if Max Planck pottering around in his mathematical
chalk-board had access to a video-arcade game! He'd see right away
that the blips on Centipede and the zaps of Space Invaders could
represent the movement of the very particles that he tried to
describe in the dusty symbols of his blackboard.


A WILD AND SCARY HALLUCINOGENIQUE

Now let us reflect on the head-bursting adjustment required
here. The relativistic universe described by Einstein and the
nuclear physicists IS alien and terrifying. Quantum physics is
quite literally a wild, confusing psyberdelic trip. It postulates
an Alice-in-Wonderland, Sartrean universe in which everything is
changing. As Heisenberg implied: nothing is certain except
uncertainty. Matter is energy. Energy and matter are temporary
states of info-bits, frozen at various forms of acceleration.
This digital universe is not user-friendly when approached
with a Newtonian mind. We are just now beginning to write a manual
of operations for the brain and the universe, both of which, it
turns out, are digital galaxies with amazing similarities.
People living in the solid, mechanical world of 1901 simply
could not understand or experience a quantum universe. Dear sweet
old Einstein, who couldn't accept his own unsettling equations,
was denounced as evil and immoral by Catholic bishops and sober
theologians who sensed how unsettling and revolutionary these new
ideas could be. Ethical relativity is still the mortal sin of
religious fundamentalists.


THE CYBERPUNK AS MODERN ALCHEMIST

The baby boom generation has grown up in an electronic world
of TV and personal computing screens. The cyberpunks offer
metaphors, rituals, life styles for dealing with the universe of
information. More and more of us are becoming electro-shamans,
modern alchemists.
Alchemists of the Middle Ages described the construction of
magical appliances for viewing future events, or speaking to
friends distant or dead. Writings of Paracelsus describe a mirror
of ELECTRUM MAGICUM with telegenic properties, and crystal scrying
was in its heyday.
Today, digital alchemists have at their command tools of a
precision and power unimagined by their predecessors. Computer
screens ARE magical mirrors, presenting alternate realities at
varying degrees of abstraction on command (invocation). Aleister
Crowley defined magick as "the art and science of causing change
to occur in conformity with our will," and to this end the
computer is the universal level of Archimedes.
The parallels between the culture of the alchemists and that
of cyberpunk computer adepts are inescapable. Both employ
knowledge of an occult arcanum unknown to the population at large,
with secret symbols and words of power. The "secret symbols"
comprise the languages of computers and mathematics, and the
"words of power" instruct computer operating systems to complete
Herculean tasks. Knowing the precise code name of a digital
program permits it to be conjured into existence, transcending the
labor of muscular or mechanical search or manufacture.
Rites of initiation or apprenticeship are common to both.
"Psychic feats" of telepathy and action-at-a-distance are achieved
by selection of the menu option.


CLASSICAL MAGICKAL CORRESPONDENCES

Alchemists of the Middle Ages believed quite correctly that
their cosmos was composed of four elements: earth, air, fire and
water. Although today our periodic table sports more than 100
chemical elements, the four universal elements still can be
identified as the constituents of some processes in the external
reality, and within the inner psychological world of humankind.
Each of the four elements is an archetype and a metaphor, a
convenient and appropriate name for a universally identified
quality. The four are echoed in the organization of both the four
suits and the four "court cards" of each suit of the Tarot,
inherited from the Egyptians and its symbolism preserved in
ordinary Western playing cards. The four also correspond to the
four principal tools of the classical practitioner of ceremonial
magick.
The wand of the magician represents the phallic male creative
force, fire. The cup stands for the female receptive force, and,
obviously enough, is associated with water. the sword is the
incisive intellect, moving and severing the air, the abstraction
in which it moves. Finally, the pantacle (disk) is the grounding
in earth (magnetic material), the stored algorithms. (We use
Crowley's spelling of pentacle, which communicates the sense of
"all and everything," advisedly.)

These classical instruments of magick exist in modern cyber
technology: The mouse or pen of the digitizing tablet is the wand,
controlling the fire of the CRT display and harnessing the
creative force of the programmer. It is used in all invocations
and ritual as a tool of command. Spinning disk drives are the
pantacles, inscribed with complex symbols, earthen tablets to
receive the input of "air," the crackling dynamic ethereal
intellectual electricity of the processor chip circuitry
programming results. The RAM chips are, literally, the buffers
("buffer pools"), the water, the passive element capable of only
receiving impressions and re-transmitting, reflecting.
Iconic visual programming languages are a Tarot, the
pictorial summation of all possibilities, activated for the
purpose of divination by juxtaposition and mutual influence. A
periodic table of possibilities, the Western form of the Eastern
I Ching. Traditional word-oriented programming languages, FORTRAN,
COBOL, and the rest, are a degenerate form of these universal
systems, grimoires of profit-oriented corporations.
Detailed database logs of the activity of operating systems
from the Akashic records on a microscale. At a macroscopic level,
this is the "world net" knowledge base, the "knoesphere," the
world-wide online hypertext network of information soon to be
realized by the storage capacity of CD ROM and the data
transmission capability of optical fiber. William Gibson's
cyberspace matrix.
Banishing rituals debug programs, and friendly djinn are
invoked for compiling, searching, and other mundane tasks. When
the magic circle is broken (segmentation violation), the system
collapses. Personal transmutation (the ecstasy of the "ultimate
hack") is a veiled goal of both systems. The satori of harmonious
human-computer communication resulting from the infinite regress
into meta-levels of reflection of self is the reward for
immaculate conceptualization and execution of ideas.
The universality of 0 and 1 throughout magic and religion:
yin and yang, yoni and lingam, cup and wand, are manifested today
in digital signals, the two bits underlying the implementation of
all digital programs in the world, in our brains and in our
operating systems. Stretching it a bit, even the monad, symbol of
change and the Tao, visually resembles a superimposed 0 and 1 when
its curving central line is stretched through the action of
centrifugal force from the ever-increasing speed of the monad's
rotation.


CYBER RELIGION OF THE BABY BOOMERS

By the year 2000, Aleister Crowley, William Gibson, and
Edward Fredkin could well replace Benjamin Spock as a Baby Boom
navigator. Why? Because, by then the concerns of the baby boom
generation will be digital. (Or, to use the old paradigms,
philosophic-spiritual.)
During their childhood they were Mouseketeers. In their teens
the Cybers went on an adolescent spiritual binge unequalled since
the Children's Crusade. In their revolt against the factory
culture they re-invented and updated their tribal-pagan roots and
experimented with Hinduism, Haight-Ashbury Buddhism, American
Indianism, Magic, Witchcraft, Ann Arbor Voo Doo, Esalen Yoga,
Computerized I Ching Taoism, 3-D Reincarnation, Fluid Druidism.
St. Stephen Jobs to the Ashram!
Born-again Paganism! Pan-Dionysius on audio-visual cassettes.
Mick Jagger had them sympathizing with the devil. The Beatles had
them floating upstream on the Ganges. Jimi Hendrix taught them how
to be a voodoo child. Is there one pre-Christian or third world
metaphor for divinity that some rock group has not yet celebrated
on an album cover?


ONTOLOGY RECAPITULATES THEOLOGY

The Boomers in the evolving life-cycle seem to have
recapitulated the theological history of our species. Just as
monotheism emerged to unify pagan tribes into nations, so did the
Boomers re-discover fundamentalist Judaism and Christianity in
their young adulthood.
Even far-away Islam attracted gourmet Blacks and ex-hippies
such as Cat Stevens. Bob Dylan nicely exemplifies the consumer
approach to religion. For 25 years Bob (ne Zimmerman) has
continued to browse through the spiritual boutiques dabbing on a
dash of Baptist "born-again," nibbling at Hassidism before
returning to his ole-time faith of sardonic reformed humanism.
We can laugh at this trendy shopping around for the custom-
tailored designer god, but behind the faddism we find a powerful
clue.
Notice how Dylan, for example, preserves his options and
tries to avoid shoddy of off-the-rack soul-ware. No "plastic
christs that glow in the dark" for Bob! The religion here is
Evolutionism, based on the classic humanist, transcendental
assumptions:

1. God is not a tribal father nor a feudal lord nor an engineer-
manager of the universe. There is no god (in the singular)
except you at the moment. There are as many gods (in the
plural) as can be imagined. Call them whatever you like.
They are free agents like you and me.


2. You can change and mutate and keep improving. The idea is to
keep "trading up" to a "better" philosophy-theology.

3. The aim of your life, following Buddha, Krishna, Gurdjieff,
Werner Erhart, Shirley, is this:
Take care of your self so you can take care of others. If
any.


WITH A LITTLE HELP FROM YOUR FRIENDS

This generation, we recall, had been disillusioned by the
religions, politics, & economics of their parents. Growing up with
the threat of nuclear war, the assassination of beloved leaders,
immune deficiencies, a collapsing industrial system, an impossible
national debt, religious fundamentalisms (Christian-Jewish-
Islamic) that fanatically scream hatred and intolerance, and
uncomprehending neglect of the ecology, they have developed a
healthy skepticism about collective solutions.
They can't retreat back home because Mom and Dad are
divorced.
No wonder they have created a psychology of individual
navigation. Singularity. The basic idea is self-responsibility.
You just can't depend on anyone else to solve your problems. You
gotta do it all by yourself -- With a little help from your
friends.


A DO-IT-YOURSELF RELIGION

Since God #1 appears to be held hostage back there by the
blood-thirsty Persian Ayatollah, by the telegenic Polish Pope and
the Moral Majority, there's only one logical alternative. You
"steer" your own course. You start your own religion. The Temple
is your body. Your mind writes the theology. And the Holy Spirit
emanates from that infinitely mysterious intersection between your
brain and your DNA.
The attainment of even the suburbs of Paradise involves good
navigation and planning on your part. Hell is a series of
redeemable errors. A detour caused by failure to check the trip-
maps. A losing streak. Many people are carefully conditioned from
birth to live in hell. As children, they are largely ignored until
something happens to cause them pain or injury. Then, mommy and
daddy quickly lavish aid, attention, succor, positive
reinforcement. When "all grown up," and in the world alone to make
choices, what kind of choices are going to result from those many
years of conditioning? It's no wonder so many people seem to live
in hell, to live pained lives of mishaps and broken dreams. Of
course, by realizing this we can begin to decondition ourselves
towards healthy hedonism. Reward yourself for making choices that
lead to pleasure, and build a cybernetic cycle of positive
feedback. Only from the state of free selfhood can any truly
compassionate signals be sent to others.


THE ADMINISTRATION OF A PERSONAL STATE

The management and piloting of a Singularity leads to a very
busy career. Since the Crowley-Gibson-Fredkin Individual has
established herself as a religion, a country, a corporation, an
information network, and a neurological universe, it is necessary
to maintain personal equivalents for all the departments and
operations of the bureaucracies that perform these duties.
This apparently means forming private alliances, formulating
personal political platforms, conducting your own domestic and
foreign relations, establishing trade policies, defense and
security programs, educational and recreational events. On the
upside, one is free from dependence upon bureaucracies, an
inestimable boon. (Free agents can, of course, make temporary
deals with organizations and officials thereof.)
And if countries have histories and myths, why shouldn't you?


THE PERSONAL MYTHOLOGY

So you search and research your very own genetic memory
banks, the Old Testaments of your DNA-RNA, including, if you like,
past incarnations and Jungian archetypes. And funky pre-
incarnations in any future you can imagine!
You write your very own Newest Testament, recalling that
voluntary martyrdom is tacky and crucifixions, like nuclear war,
can ruin your day.
You can do anything the great religions, empires and racial
groups have done in the name of their God #1. and you're certain
to do it better because... well, look at their track records.
There's no way your Personal State could produce the persecutions,
massacres and bigotries of the Big Guys.
Why? Because there's only one of you, and even with the help
of your friends the amount of damage an individual can do is
insignificant compared with the evil-potential of a collective.
Besides, you're a child of the 60s. You're imprinted to want
a peaceful, tolerant, funny world. You can choose your gods to be
smart, funny, compassionate, cute and goofy.


IRREVERENCE IS A PASSWORD FOR THE 21ST CENTURY

It has been suggested that the philosophic assignment of the
Roaring 20th Century was to prepare the human species for the
shifting realities of Quantum Physics and Singular Steering.
Relativity means that everyone "sees" or reacts to things
differently, depending upon location, velocity and attitude (angle
of approach).
The relativistic insight is in essence irreverent or
humorous, i.e., laughable, comical, delightful. With the law of
gravity repealed, levity is the order of the day. We rise through
our levity, instead of being held down by our gravity.
The word "humor" comes from the Latin word for liquid or
fluid, referring to such qualities as flowing, pliable, smooth,
effortless, easily changed, non-frictional, transparent, shining,
musical, graceful in motion and readily converted into cash.





THE LAST GENERATION IN FLESH?

Through science and technology we will meet the aliens, and
they will be us.
-- Norman Spinrad, "The Neuromantics"

Information-beings of the future may well be fluid. Human
society has now reached a turning point in the operation of the
digital programs of evolution, a point at which the next
evolutionary steps of the species become apparent to us, to surf
as we will. Or, more correctly, as the evolutionary programs run
and run, the next stages pop up in parallel, resulting in
continuing explosions of unexpected diversity. Our concepts of
what is known as "human" continually change. For example, we are
no longer as dependent on physical fitness for survival. Our
quantum appliances and improved mechanical devices can generally
provide the requisite means or defenses. In the near future, the
methods of information technology, molecular engineering,
biotechnology, nanotechnology (atom stacking) and quantum-digital
programming could make the human form a matter totally determined
by individual whim, style and seasonal choice.
Humans already come in some variety of races and sizes. In
comparison to what "human" might mean within the next century, we
humans are at present as indistinguishable from one another as are
hydrogen molecules. Along with the irrational taboo about death,
the sanctity of our body image seems to be one of the most
persistent anachronisms of Industrial Age thought.
We see evolutions of the human form in the future; one more
biological-like: a bio/computer hybrid of any desired form -- and
one not biological at all: an "electronic entity" in the digital
info-universe.
Human-AS-programs, and human-IN-programs.
Of these two post-humanist views, human-as-programs is more
easily conceived. Today, we have crude prosthetic implants,
artificial limbs, valves, and entire organs. The continuing
improvements in the old-style mechanical technology slowly
increase the thoroughness of brain/external-world integration. A
profound change can come with the developments of biotechnology,
genetic engineering, and the slightly more remote success of
nanotechnology.
The electronic form of human-in-programs is more alien to our
current conceptions of humanity. Through storage of one's belief
systems as data structures online, driven by desired programs
one's neuronal apparatus should operate in silicon basically as it
dead on the meatware of the brain, though faster, more accurately,
more self-mutably, and, if desired, immortally.
Clever cyberpunks will of course not only store themselves
electronically, but do so in the form of a "computer virus,"
capable of traversing computer networks and of self-replicating as
a guard against accidental or malicious erasure by others, or
other programs. (Imagine the somewhat droll scenario: "What's on
this CD?" "Ah, that's just that boring adolescent Leary. Let's go
ahead and reformat it.")
One speculation is that such viral human forms might ALREADY
inhabit our computer systems. Cleverly designed, they would be
very difficult, if not theoretically impossible to detect.
Current programs do not permit matching the real-time
operation speed and parallel complexity of conventional brains.
But time scale of operation is subjective and irrelevant, except
for the purposes of interface.
Of course, there is no reason one needs to restrict one's
manifestation to a particular form. One will basically (within
ever-loosening physical constraints, though perhaps inescapable
economic constraints) be able to assume any desired form.
Authors of current science fiction of the cyberpunk or
"neuromantic" school have approached this idea from many angles.
Bruce Sterling's novel SCHISMATRIX recognizes the fact that human
evolution moves in clades, radiating omnidirectionally, not moving
in a line along a single path. His "Mechs" and "Shapers"
correspond closely with our notions of electronic and biogenetic
paths to evolutionary diversity.
Given the ease of copying computer-stored information, it
should be possible to exist simultaneously in many forms. Where
the "I's" are in this situation is a matter for digital
philosophers. Our belief is that consciousness would persist in
each form, running independently, cloned at each branch point.

<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>

VII.> Appendix

Boards in The Alliance Productions:

The Villa Straylight The Lair of the Wolverine Back in Time BBS
(407) 297 1180 (407) XXX-XXXX (407) XXX-XXXX
Home of Alliance Dist Site #1 Dist Site #2
WWIVnet @4703 WWIVnet @4701 PC Relay



Along with anonymous [ZAN] boards....leave message to us for application
for a [ZAN] board.

<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>



(c) CopyMYright The Alliance Production Publications
(c) CopyTHEIRright Zhit Axis Nation


Thank you for your time!
Have Phun!
(how old is that?)

next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT