Copy Link
Add to Bookmark
Report

Ruthless Anarchists Getting Even Issue 01

  

ÃÄÄÄùú "RaGE - Coming to you like an affliction, úùÄÄÄ´
ÃÄÄÄùú Leaving you like an addiction."
úùÄÄÄ´


01110010 01100001 01100111 01100101
ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ
sselhtuR ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ Ruthless
stsichranA ÛÛ ÛÛÛÛÛÛÛÛ ÛÛ ÛÛ ÛÛ ÛÛ Anarchists
gnitteG ÛÛ ÛÛ ÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ Getting
nevE ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ Even
ÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ
01110010 01100001 01100111 01100101

An H/P/A Mag for the 90's.


Issue #1, released 01/13/95


.úùÄÄÄÄ´ Table of Kontentz ÃÄÄÄÄùú.

I. K0mpUtiNg tOpiX
1. Masters of Deception
2. Intel Pentium Controversy
3. Cracking "Pathways into Darkness"
II. FoNe pHUn
1. USA Telephone System
2. 1-800-825-5xxx Scanlist
3. 1-800-FUCK-ATT
III. KaUZinG KaoS
1. Gerbil Feed Bomb
2. Gelled Flame Fuels
3. Mercury Fulminate
4. HMTD
5. Picric Acid from Aspirin
6. Red/White powder propellant
IV. iMPR0v153d D3t0N4t10n T3chNiqUe5
1. Clothespin Switch
2. The Knife Switch
3. Mousetrap Switch
4. Pull-loop switch
V. Ev3ry7h1nG El53
1. Internet Editorial
2. Hypocrites? Editorial


.úùÄÄ[ø]Äð K0mpUtiNg tOpiX ðÄ[ø]ÄÄùú.


ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ Masters of Deception À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

"Cyberspace Hacker Gangs Gain Revenge on Author"

- Joshua Quittner's book exposed the hacker war, so they took over his phone
line, voice mail, and filled his on-line account with messages.

In his forthcoming book, "Masters of Deception: Gang Wars in
Cyberspace, "
writer Joshua Quittner chronicles the bizarre but true tale of a
Harfiled-and-McCoys feud in the nether world of computer hackers. Now the
hackers have extracted revenge for Quittner's attention, taking control of
his phone line and voice mail and bombarding his online account with thousands
of messages.
To wreak their hacker havoc, they broke into computer systems run by
Sprint Corp., International Business Machines Corp., and Pipeline, which
provides Internet access to consumers. Billing themselves as the Internet
Liberation Front, the pranksters have warned corporate America to get out of
cyberspace, declaring war "on any company suspected of contributing to the
demise of the Internet."
The antics and break-ins underscore the security
risks as companies seek a presence on the Internet, and point up how difficult
it is to stop hackers from going where they please.
"I don't believe I've ever been hacked to this degree," said Quittner,
whose book, written with his wife, Michelle Slatalla, was excerpted in the
latest issue of Wired magazine, apparently prompting the attack. The article
and book tell of the Long Island hacker gang Masters of Deception and its
"war" with a rival break-in group, the Legion of Doom.
"People in MOD and LOD are very unhappy about the story," Quittner says.
"This is what I believe prompted this whole thing." During the Thanksgiving
weekend, the offended computer prowlers took command of Quittner's phone line
and forwarded it to an out-of-state answering machine, substituting his
greeting with a profane message of their own. One former MOD member was able
to patch through a call to someone claiming to be a member of the Internet
Liberation Front. He, in turn, played the messages left by Quittner's friends
and family on the bogus answering machine they had set up. The messages
included a call from Quittner's mother asking about her grandchildren and
noting, "I think you ought to check your answering message." Another came
from Quittner himself, after he realized he'd been had: "Very funny, guys."
The group also zapped tens of thousands of messages to his E-Mail
account, as well as about 1,000 messages to the mailbox of Wired magazine.
The messages came from computers owned by IBM, Sprint, and Pipeline. Hackers
had broken in and installed a script to fire off the Internet Liberation
Front message to Quittner every five seconds. The "mail bombs" were "probably
closely related to the Quittner article,"
said Ian McFarland, a Wired engineer.
Sprint had to shut down several computers for about four hours, a company
spokesperson said. "I don't know if it's an organized group," he said of the
Internet Liberation Front. "We never heard of them before." The Masters of
Deception was a notorious gang of clever New York teens whose on-line pranks
landed four of them in jail. In Quittner's book, he sympathetically tells the
story of young hackers who, in their quest for knowledge, go too far. "A
number of them got sent to jail when they should have been sent to college,"

he said.
In 1992, MOD was charged with tampering or stealing passwords to gain
services from computers at the former Southwestern Bell Corp., now SBC
Communications; British Telecommunications PLC's North American subsidiary,
BT North America; TRW Inc., and NYNEX Corp., among others.

The Wall Street Journal, New York

GD: Internet Liberation Front.. now why can't we see more of that shit?
Finally some dudes who know what they're doing.

ÃÄÄÄùú "Every time we try to impose order, we create chaos.." úùÄÄÄ´

ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ The Intel Pentium Controversy À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

Last summer, Intel discovered a flaw in their new Pentium processor
which caused errors in some floating-point calculations. Since the chances
of an error were slim, with a 1 in 5 million chance of an error occurring,
the famed microprocessor chip corporation decided to wait to fix the error
until the fall of 1994. All they had to do was add one instruction.
Intel recently took responsibility for the error and has announced a
free replacement Pentium chip for all customers. The total number of Pentium
processor owners worldwide tops 2 million, putting quite a burden and an
expense on Intel.
The biggest concern is for scientists in the fields of research and
development who rely heavily on ultimate accuracy and speed in their
computers. Normal games and word processor programs could not be affected in
a large way by the Floating-point Division (FDIV) bug. Instead, government
agencies, businesses, and laboratories are more prone to disaster due to
their direct reliance on exact calculations. The fact that the Pentium
processor is supposed to be the fastest and most advanced microprocessor for
Personal Computers causes those who need the speed and power to rush out,
pick up a Pentium system, and expect it to be inperfect condition. No one
would think it would be necessary to check their calculations elsewhere.
Intel has created a disaster for themselves, and in the future, who will
make the chips for the PC's? For many years, there has seemed to be a
monopoly of sorts in the PC world. You get an IBM or compatible system, and
what often comes with it? Microsoft software and Intel processors. Due to
this incident alone, the PC world may have lost their faith in the Intel
products.
Below is a C++ source code for a program to check a pentium chip to
see if it has the FDIV bug. It has been distributed since the bug was announced,
and its author is unknown.

--CUT--

#include <iostream.h>
#include <math.h>
#include <iomanip.h>

void main() {
double x,y,z;
x = 4195835.0;
y = 3145727.0;
/*
Divide x by y
The correct answer is 1.333 820 449 136 241. Bad Pentiums'll return
1.333 739 068 902 038. That's wrong.
*/

z = x - (x / y) * y ;

if ( fabs(z) >= 1.e-1) {
cout << " This CPU has the FDIV bug " << endl;
cout << " 4195835 / 3145727 should equal 1.333820449136241 "
<< endl << " while your CPU yields " ;
cout << " " << setprecision(16)
<< x/y << endl ;
}
else
cout << "This CPU does not have the FDIV bug " << endl;

/*
Another example
cout << (1.0/824633702449.0)*824633702449.0 << " should be 1" << endl ;
cout << 824633702449.0 - (1.0/824633702449.0)*824633702449.0*824633702449.0
<< " should be 0" ;
*/

return;
}

--CUT--

GraveDigger/uuDW

ÃÄÄÄùú "We have determined that your whole system sucks." úùÄÄÄ´

ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ Cracking Pathways Into Darkness À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

Copy Protection --

When launching Pathways Into Darkness for the Macintosh for the first
time, it will ask you to enter a specific monster sequence that can be found
in the original manual (on the bottom of the pages). But seeing how you
wouldn't need this text file if you had the REAL manual I guess I'll have to
give them to you! In order to do this right the first time your gonna have
to know a few things about how the manual is setup. In order to beat the
copy protection you have to click on FOUR monsters upon the initial startup
of Pathways. There are more than FOUR monsters displayed, but you ONLY have
to click on FOUR. Alright in the REAL manual there are sets of FOUR monsters
on the right and left sides of each page starting from page #1 and finally
ending on page #19. Below are a bunch of descriptions I made up for you to
identify each monster, a key that I made up so you will know which monster is
which, and a listing of all the monsters IN ORDER on each page of the
original manual.

Descriptions --

Headless - No head, only a large tongue sticking out surrounded by teeth.
Ooze - The faceless dude with an open stomach that looks like a mouth.
Nightmare - That fishy looking thing with wiskers and beady eyes.
Ghoul - The hunchback guy that's wearing a loincloth.
Zombie - The skeleton dood that looks egyptian.
Skitter - The only one there that resembles a spider.

Key --

[H]eadless
[O]oze
[N]ightmare
[G]houl
[Z]ombie
[S]kitter

Monster Listing --

-- Pg. #01: Left -- [N], [H], [O], [H] -- Right -- [Z], [O], [S], [G] --
-- Pg. #02: Left -- [S], [G], [N], [N] -- Right -- [H], [Z], [O], [S] --
-- Pg. #03: Left -- [H], [N], [G], [Z] -- Right -- [S], [O], [N], [H] --
-- Pg. #04: Left -- [H], [Z], [G], [N] -- Right -- [G], [O], [Z], [G] --
-- Pg. #05: Left -- [O], [S], [N], [O] -- Right -- [O], [N], [O], [H] --
-- Pg. #06: Left -- [Z], [Z], [G], [S] -- Right -- [S], [H], [O], [S] --
-- Pg. #07: Left -- [H], [O], [Z], [N] -- Right -- [S], [H], [S], [G] --
-- Pg. #08: Left -- [O], [Z], [S], [N] -- Right -- [O], [G], [G], [Z] --
-- Pg. #09: Left -- [S], [Z], [O], [H] -- Right -- [H], [N], [N], [G] --
-- Pg. #10: Left -- [N], [S], [H], [S] -- Right -- [O], [H], [S], [H] --
-- Pg. #11: Left -- [Z], [H], [N], [G] -- Right -- [S], [O], [Z], [G] --
-- Pg. #12: Left -- [O], [S], [O], [S] -- Right -- [H], [H], [G], [N] --
-- Pg. #13: Left -- [N], [H], [N], [G] -- Right -- [S], [N], [H], [G] --
-- Pg. #14: Left -- [G], [S], [G], [H] -- Right -- [S], [G], [G], [G] --
-- Pg. #15: Left -- [H], [G], [O], [S] -- Right -- [G], [N], [O], [S] --
-- Pg. #16: Left -- [N], [Z], [N], [Z] -- Right -- [Z], [S], [G], [H] --
-- Pg. #17: Left -- [G], [G], [S], [O] -- Right -- [S], [Z], [G], [N] --
-- Pg. #18: Left -- [N], [Z], [H], [S] -- Right -- [S], [Z], [H], [G] --
-- Pg. #19: Left -- [O], [S], [Z], [O] -- Right -- [Z], [S], [H], [O] --

PSYC0SiS/uuDW


.úùÄÄ[ø]Äð FoNe pHUn ðÄ[ø]ÄÄùú.


ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ The USA Telephone System À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

The USA is running out of telephone numbers. Talks have circulated of
updating the existing phone switching system to accomodate new customers as
well as old customers. The current system has some interesting limitations
"designed" into it. For example, all area codes must have a middle digit of
0 or 1. This limits the maximum area codes to 162. In a sense it is good,
because it prevents the phone companies from ripping us off. Though, in a
recent issue of 2600 magazine, some new area codes have been created which
donot use the conventional system. Their middle digits can be any number, so
it looks as though changes have begun in some areas. The actual phone number
itself is limited to 7 digits, which allows for 1,000,000 possibilities per
area code. This is only true if the number 000-0000 is to be used, though.
The new system would probably increase the number of digits in a phone
number to 8. How would this change occur though? After midnight, your
newphone number will be xxx-xxxxx? Or, as they notate it in France,
xx-xx-xx-xx? One thing is for sure, it will cost a lot to make the new system
user-friendly. For example, if you dial a wrong number nowadays, a
cyber-bitch will inform you that "That number is not in service," or maybe
"The number you have reached, ...has been changed. The new number is..."
Will that be set up forthe entire new system? Imagine the kind of money it
will take for these kinds of changes. The fact that everyone will have a new
phone number will totally cut off communications for an extended period of
time. Automated phone services will have to be reprogrammed. Computer
software may become outdated or useless. It's an overlooked detail as to how
much we rely on the phone system to stay the same as it is. Now, think of
the easy way out. Higher rates, less customers, no need to change the
existing system. With the increased interest in modem communications, fax
services, answering machines, and multi-line businesses, it is expected that
the demand for a phone line will continue to increase, and in many cases, the
demand will have nothing to do with the cost of service.
On the other hand, if the government prevents the rates and fees from
going out of hand, the phone system will need to be changed, but how will it
be funded if the prices can't be raised? There's jobs to protect, too. It
seems likely that as time goes on, the existing phone system in the USA will
slowly meet its downfall. Perhaps an independent group of investors will
attempt to create their own system, with some kind of access to the existing
lines. Who knows what the future will bring?

GraveDigger/uuDW

ÃÄÄÄùú "And I abandon all my need for explaination" úùÄÄÄ´

ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ 1-800-825-5xxx Scan Listing À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

017 - "Please enter your 4-digit PIN"
020 - VMB System
030 - "Extension 710 is Unavailable"
032 - VMB System
034 - VMB System
036 - VMB System
040 - Only rings once <?>
043 - Teleconference service
045 - VMB System
069 - VMB System
075 - VMB System
082 - Carrier
090 - VMB System
099 - VMB System
116 - VMB System
122 - VMB System
123 - VMB System
134 - VMB System
135 - "674-0511 is not a working number. Its prime factors are..."
136 - "674-0512 is not a working number, bucko!"
137 - VMB System
138 - "674-0514 is not a working number, bucko!"
139 - "674-0515 is not a working number. Its prime factors are..."
140 - VMB System
141 - "674-0517 is not a working number. <growl>"
148 - Weird ring pattern
166 - Long tone
172 - VMB System
175 - VMB System
176 - Carrier
177 - VMB System (Audix)
192 - Carrier
197 - VMB System
203 - "Please enter your 4-digit PIN"
205 - VMB System
223 - Dialout
225 - VMB System
233 - VMB System
237 - VMB System
246 - VMB System
249 - Carrier
250 - Carrier
254 - VMB System
256 - VMB System (VMX)
262 - "Please enter your password"
265 - VMB System
266 - VMB System
267 - VMB System (Automated Attendant)
275 - Carrier
276 - VMB System
278 - VMB System
282 - VMB System
293 - Dialout
308 - "Please enter your 4-digit PIN"
315 - VMB System
322 - VMB System
332 - VMB System
334 - VMB System
340 - VMB System
346 - VMB System
367 - VMB System
384 - Carrier
411 - VMB System
414 - VMB System (Audix) (Press *7 to access)
415 - VMB System (Press *# to access)
420 - VMB System
422 - VMB System
425 - VMB System
426 - VMB System
427 - VMB System
430 - VMB System
436 - VMB System
450 - Carrier
451 - Carrier
456 - Dialout
474 - VMB System
482 - VMB System
484 - VMB System
488 - VMB System
494 - VMB System
502 - VMB System (transfers after 4 rings)
507 - VMB System
510 - VMB System
521 - Weird beeps
527 - Foreign Language Voice
533 - VMB System (Press *# to access)
548 - VMB System
549 - Loop Low End \
550 - Loop High End /
555 - VMB System (disconnects on one error)
566 - VMB System
570 - Carrier
575 - VMB System
576 - VMB System
579 - VMB System
580 - Carrier
588 - VMB System
601 - Carrier
602 - Carrier
625 - VMB System (Press *# to access)
633 - VMB System
639 - "Enter pager number"
640 - "Please enter your 4-digit PIN"
643 - "Please enter your 4-digit PIN"
649 - "Please enter your 4-digit PIN"
650 - "Please enter your 4-digit PIN"
651 - "Please enter your 4-digit PIN"
658 - "...Please enter your authorization number now."
659 - "Please enter your 4-digit PIN"
660 - "Please enter your 4-digit PIN"
665 - VMB System (Enter password then mailbox.)
679 - VMB System
684 - "Please enter your 4-digit PIN"
687 - VMB System
700 - VMB System
711 - "Please enter your 4-digit PIN"
719 - "You have reached your party's message center."
726 - VMB System
727 - Programmable answering machine
737 - VMB System
738 - VMB System
742 - VMB System
760 - Fax Line
767 - Weird ring
773 - VMB System (Press *1 to access - Enter password then mailbox.)
787 - VMB System
789 - VMB System
800 - VMB System
801 - Loop Low End (High End is ?)
803 - VMB System
810 - VMB System
824 - VMB System
827 - VMB System (Automated Attendant)
833 - Weird beeps
836 - Fax Line
855 - VMB System
858 - VMB System ("Please enter your password")
874 - VMB System
883 - Weird beeps... Press # or *
884 - Weird beeps... Press # or *
885 - "Mailbox 2070" (VMB System)
899 - VMB System
902 - Weird beeps
903 - Weird beeps
904 - Weird beeps
911 - Weird beeps
912 - Weird beeps
915 - Rings then busy signal
920 - VMB System
923 - VMB System
933 - VMB System
936 - Loop Low End \
937 - Loop High End /
941 - USA Paging
953 - "...Enter the number where you can be called."
958 - "...Please enter your authorization number now."
961 - "...Enter the number where you can be called."
964 - VMB System (*1 to access - enter password then mailbox)
968 - "...Enter the number where you can be called."
970 - "Not in service for incoming calls." (payphone/Buffalo, NY)
975 - Carrier
987 - VMB System

ÃÄÄÄùú "We've come to create a new country called chaos, úùÄÄÄ´
ÃÄÄÄùú and a new government called anarchy."
úùÄÄÄ´

ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ "1-800-FUCK-ATT" À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

Once upon a time, I started a little itty bitty war dialer up and
started scanning the "1-800-222-XXXX" exchange (Which by the way was a bad
idea since many of the AT&T operators direct numbers are in this range.).
Well, I got probably about 9000 numbers through it, when suddenly all the
tones quit appearing... And I was rather surprised since the tones normally
pick up in the high ranges. I tried to call a known working number, and was
suddenly greeted by a wonderful intercept message stating that "1-800-555-
1212"
was not available from my calling area... Since "1-800-555-1212" (last
time I checked) was the number for information I began to wonder what was
going on.
I called my local phone company, they sent me to AT&T, they said
call local repair. Local repair told me to call AT&T repair. I called them,
and they said that the number I was trying to dial was not available (I gave
them a "1-800-222" number instead of information.) The kind operator then
told me to call her direct over an "800" number, I hung up dialed it, and got
the intercept message.
I guess this just goes to show that if you fuck with AT&T they'll be
real dicks and cut your calls to FREE numbers that you can call from
anywhere. Even though they never say that you CAN'T call all the "800"
numbers you want, when it gets down to it, they get pissed and yank your
access... (Hmm... Is that unconstitutional?) Dunno... Oh well... But
until I get full access back and an explanation of why I am not able to call
"800" numbers I'm switching to MCI.

(THREE DAYS LATER)

AT&T said they will give me my 800 numbers back after an all day run
around. Said there computer figured something weird was going on when my
line dialed over 79 "1-800" numbers between 3:30 and 5:00 in the morning.
(Hmm... Now I need a new war dialer that slows down in the early morning.)

LATE UPDATE:

Here is a copy of the letter sent to me and received on June 21, 1994:

<Begin Letter>

AT&T Logo

June 17, 1994



<Name Withheld>
46 N. Somewhere Ave.
Somewhere, FU 49666
(212) 781-6012

Dear <Name Withheld>,

AT&T has reason to believe that the telephone list to you has been used
in violation of Federal Communications Commission - AT&T Tariff F.C.C. No. 2
Sections 2.2.3 and 2.2.4.C. These tariff sections prohibit using WATS to
harass another, using WATS to interfere with the use of the service by others
and using WATS with the intent of gaining access to a WATS Customer's
outbound calling capabilities on an unauthorized basis.
Accordingly, AT&T has temporarily restricted your telephone service's
ability to place AT&T 800 Service calls in accordance to Section 2.8.2 of the
above tariff. If the abusive calling reoccurs after AT&T lifts the temporary
restriction, the restriction will be reimposed until AT&T is satisfied that
you have undertaken steps to secure your number against future tariff
violations.
You should also note that unauthorized possession or use of access codes
can constitute a violation of United States Criminal Code - Title 18, Section
1029, which carries a penalty of up to $10,000 fine and up to 10 years
imprisonment for first time offenders. Any future activity from telephones
listed to you may be referred to federal law enforcement officials.
If you wish to discuss this restriction, you may do so in writing to
AT&T Corporate Security, Dept. 19, P.O. Box 6735, Bridgewater, N.J.
08807-9998, or you may call 908-725-6973. *(What? No "1-800" number?)*



<Official hand signed signature of K. Tapaz> *(Who the fuck is he anyway?)*

AT&T Corporate Security



(Lame recycled paper symbol in lower left hand corner)

<End Letter>

And just to be a nice guy... I'll publish my results... See the end of this
file...

Remember they said specifically: FROM YOUR LINES... <Evil Grin>

The moral of this stupid fucking story: AT&T gets very angry when you war
dial 9000 "1-800" numbers... So be sure to do it from a friends house...
And BTW: I never used a code... Not an AT&T one... An out dial a few
times... But not AT&T...

Stumble/uuDW


.úùÄÄ[ø]Äð KaUZinG KaoS ðÄ[ø]ÄÄùú.


ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ The Gerbil Feed Bomb À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

Reprinted by Grendel (An oldie but goody, a terrorist bomb still in use.)

Stuff you'll need:

One glass jar.
One bag of pellet feed (usually green in color, used to feed pet rodents).
Two tubes of modeling cement.
Last but not least you'll need some gasoline.

Manufacturing the bomb:

Powder up enough of the pet food to fill the glass jar halfway. Empty
the two tubes of model cement into the jar and mix thoroughly. Now fill the
rest of the jar with gasoline. Put the cap on the jar and shake. Put a fuse
through the top of the jar. Light the fuse. THEN RUN LIKE HELL!! DIVE TO
THE GROUND!!

This bomb will KILL you if you are not out of range of the blast. (The
range of the blast depends solely on how big the bomb is. 50 feet and some
cover should suffice as a safe distance for most bombs).

A note from Grendel on fuses:

Go to your local gun show and buy REAL fuse. Most gun shows around the
country sell fuse that are safe and fail proof. In fact they may even sell
different grades of fuse, some may burn quicker than others. Another note
these very same gun shows will sell gunpowder to just about anyone. You may
also find electric fuses and starters, they tend to be army surplus and sell
for about $50.00 and up. Of course gun shows are a great place to buy rifles
and shotguns. Also are the wide selections of knives, swords, rapiers,
machetes and various other cutlery. In fact 60 minutes (Or was it 48 hours?)
just had a feature about gun shows around the country and how gun dealers
sell to just about anyone. They showed some guy buying handguns and assault
rifles without a license. :)

DISCLAIMER:

I take no responsibility on any damage or injuries the above information
may cause. If some dumbshit kills 30 people with the bomb I outlined above
then he's more fucked up than me and should get the death penalty. If some
deranged fool blows up part of a school or takes out his enemy's house with
this bomb isn't because of me. If some pissed off dude kidnaps his
ex-girlfriend, ties her up, puts the bomb between her skank legs, lights the
fuse, and watches from a safe distance as the explosion blows her to pieces;
its not my fault that he's fucked up or that she's a slut that cheated on him
then left him broken hearted.

In other words: I DON'T GIVE A FLYING MONKEY FUCK! FUCK YOU!

Grendel/uuDW

ÃÄÄÄùú "Can you feel the RaGE?" "RaGE? No, passion!" úùÄÄÄ´

ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ Gelled Flame Fuels À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

Gelled or paste type fuels commonly known or referred to as "Napalm" are
often preferable to raw gasoline for use in incendiary devices such as fire
bottles (Moltov Cocktails). This type fuel adheres more readily to the
target and produces a greater heat concentration. Several methods are shown
below for transfering ordinary gasoline into a gelled fuel using commonly
available materials. The methods are divided into the following categories
based on the major ingredient:

Lye Systems --

Lye (also known as caustic soda or Sodium Hydroxide) can be used in
combination with powdered rosin or castor oil to gel gasoline for use as a
flame fuel which will adhere to target surfaces. This fuel isn't suitable
for use in the chemical (Sulphuric Acid) type of fire bottle. The acid will
react with the lye and break down the gel.

Lye-Alcohol Systems --

Lye can be used in combination with alcohol (Ethyl alcohol would be the
best choice, but Methyl (wood) alcohol or Isopropyl (rubbing) alcohol can be
used as substitutes; this produces softer gels though.) and any of the several
fats listed below to gel gasoline for use as a flame fuel. Once again don't
try using this fuel with the chemical fire bottle. A reaction will occur
causing the gel to break down.

The following can be used as fats to gel the gasoline:

(a) Castor oil (good)
(b) Any vegetable oil (corn, cottonseed, peanut, linseed, etc.)
(c) Any fish oil
(d) Butter or margarine

It's necessary when using (b) to (d) to double the amount of fat
and lye for satisfactory bodying.

WARNING: Do NOT use an aluminum container when making the 2 gelled fuels
listed above! If you do decide to disobey my instructions, have phun wiping
an acid like substance off of your burnt face. Uhh... You see lye will
react violently when mixed with aluminum and water. The result is a very hot
chemical reaction which produces a flammable Hydrogen gas (Ahh... Gives you
some kewl ideas huh?).

Soap-Alcohol Systems --

Commonly used household soap (not laundry detergent) can be used in
combination with alcohol to gel gasoline for use as a flame fuel which will
also adhere to target surfaces. Unless the word "soap" actually appears
somewhere on the container or wrapper, the washing compound is probably a
detergent. THESE CANNOT BE USED!

Egg Systems --

The WHITE of any bird egg can be used to gel gasoline. Don't get the
yellow egg yolk mixed into the egg whites. If the yellow portion of the egg
gets into the egg white then discard the egg. You MUST also add ONE of the
following ingredients: Table salt, ground coffee, dried tea leaves, cocoa,
sugar, potassium nitrate, epsom salts, washing soda, baking soda, or aspirin.

Latex Systems --

Any milky white plant fluid is a potential source of latex which can be
used to gel gasoline. One of the following acids must be added too: Acetic
acid, sulfuric acid, or hydrochloric acid. Don't get the acids on your skin
dumbfucks, it's not phun!

Wax Systems --

Any of several common waxes can be used to gel gasoline for use as a
flame fuel. Any of the following will do the trick when it comes to waxes:
Candles, crayons, furniture and floor waxes, artificial fruit and flowers,
wax paper, etc...

Animal Blood Systems --

Animal blood can be used to gel gasoline. Okay all of you satanists out
there go and get your devil worship groupies, kill a deer and save some of
that sacrificial blood for this project! Heh. You MUST also add ONE of the
following ingredients: Table salt, ground coffee, dried tea leaves, sugar,
lime, epsom salts, or baking soda.

Personally I have found that styrofoam works well too... A bit sticky
but if your in a pinch then this might help you out! Have phun! Latz...

PSYC0SiS/uuDW

ÃÄÄÄùú "Too many fucking rules!" úùÄÄÄ´

ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ Mercury Fulminate À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

Mercury Fulminate is used as a primary explosive in the fabrication of
detonators. It's to be used with a booster explosive such as picric acid
(see other text files) or RDX...

Material Required --

Nitric Acid, 90% concentrate. (1.48 sp. gr.) Can be found in industrial
metal processors, and chemical supply stores.

Mercury - Can be found in thermometers, mercury switches, old radio tubes,
chemical supply stores, etc.

Ethyl (grain) alcohol (90%)
Filtering material - Paper towels, etc.

Teaspoon measure (1/4, 1/2, and 1 teaspoon capacity) - aluminum, or stainless
steel.

Heat source
Clean wooden stick
Clean water
Glass containers
Tape
Syringe

Procedure --

1. Dilute 5 teaspoons of nitric acid with 2-1/2 teaspoons of clean water in
a glass conatainer by adding the acid to the water.

2. Dissolve 1/8 teaspoons of mercury in the diluted nitric acid. This will
produce dark red fumes.

NOTE: It may be necessary to add water, one drop at a time, to the mercury-
acid solution in order to start the reaction.

CAUTION: Acid will burn skin and destroy clothing. If any is spilled, wash
it away with a large quantity of water. DO NOT INHALE THE FUMES!

3. Warm 10 teaspoons of the alcohol in a container until the alcohol feels
warm to the inside of your wrist.

4. Pour the metal-acid solution into the warm alcohol. A reaction should
start in less than 5 minutes. Dense white fumes will be given off during the
reaction. As time passes, the fumes will become less dense. Allow 10 to 15
minutes to complete the reaction. Fulminate will settle to the bottom.

CAUTION: The reaction generates large quantities of toxic, flammable fumes.
The process must be conducted outdoors or in a well ventilated area, away
from sparks or open flames. DO NOT INHALE FUMES!

5. Filter the solution through a paper towel into a container. Crystals may
stick to the side of the conatainer. If so, tilt and squirt water down the
sides of the container until all of the material collects on the filter
paper.

6. Wash the crystals with 6 teaspoons of ethyl alcohol.

7. Allow these mercury fulminate crystals to air dry.

CAUTION: Handle the dry explosive with GREAT care. Do not scrape or handle
it roughly. Keep away from sparks or open flames. Store in a cool, dry
place.

PSYC0SiS/uuDW

ÃÄÄÄùú "RaGE - The new world order!" úùÄÄÄ´

ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ How to Make HMTD À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

HMTD is a primary explosive which means extremely volatile to heat,
flames, and friction. In other werds don't handle this shit roughly! I have
warned you dumbfucks out there! I'm NOT joking! I know some idiot will
ultimately blow their fucking face off, so don't even try to blame me. Okay
this stuff can be made from hexamethylenetetramine, hydrogen peroxide, and
citric acid. This explosive is to be used with a booster explosive such as
picric acid or RDX in the fabrication of detonators.

Material Required --

Hexamethylenetetramine - In drug stores under the names of: urotropine,
hexamin, methenamine, etc... It can also be found in Army heat tablets.

Hydrogen Peroxide - 6% hair bleach (or stronger if at all possible)

Citric acid - Can be found in grocery stores and drug stores under the name
of "Sour Salt"

Containers, bottles, or glasses
Paper towels
Teaspoon
Pan
Water
Tape

Procedure --

1. Measure 9 teaspoons of hydrogen peroxide into a container.

2. In 3 portions, dissolve 2-1/2 teaspoons of crushed hexamethylenetetramine
in the peroxide.

3. Keep the solution cool for 30 minutes by placing the container in a pan
of cold water.

4. In portions, dissolve 4-1/2 teaspoons of crushed citric acid in the
hexamethylenetetramine-peroxide solution.

5. Let the solution stand at room temperature until solid particles form at
the bottom of the container. Complete precipitation will take place in 8 to
24 hours.

CAUTION: At this point the mixture is a primary explosive. Keep away from
flame.

6. Filter the mixture through a paper towel into a container to collect the
solid particles.

7. Wash the solid particles collected in the paper towel with 6 teaspoons of
water by pouring the water over them. Discard the liquid in the container.

8. Place these explosive particles in a container and allow to dry.

CAUTION: Handle the dry explosive with great care. Do NOT scrape or handle
roughly. Keep away from sparks or open flames. Store in a cool, dry place.

PSYC0SiS/uuDW

ÃÄÄÄùú "Bless the beasts and the children" - Niki Taylor úùÄÄÄ´

ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ Preparation of Picric Acid from Aspirin À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

Picric acid can be used as a booster explosive in detonators, a high
explosive charge, or as an intermediate to preparing lead picrate or DDNP.
See other text files written by me to see how to make some of the other shit
listed above.

Material Required --

Aspirin tablets (5 grains per tablet)
Alcohol, 95% pure
Sulfuric acid, concentrated, (battery acid - boil until white fumes appear)
Potassium Nitrate (saltpeter)
Water
Paper towels
Canning jar, 1 pint
Rod (glass or wood)
Glass containers
Ceramic or glass dish
Cup
Teaspoon
Tablespoon
Pan
Heat source
Tape

Procedure --

1. Crush 20 aspirin tablets in a glass container. Add 1 teaspoon of water
and work into a paste.

2. Add approximately 1/3 to 1/2 cup of alcohol (100 milliliters) to the
aspirin paste; stir while pouring.

3. Filter the alcohol-aspirin solution through a paper towel into another
glass container. Discard the solid left on the paper towel.

4. Pour the filtered solution into a ceramic or glass dish.

5. Evaporate the alcohol and water from the solution by placing the dish
into a pan of hot water. White powder will remain in the dish after
evaporation. The water in the pan should be at hot bath temperature, not
boiling, approximately 160 to 180 degrees fahrenheit. It shouldn't burn the
hands.

6. Pour 1/3 cup (80 milliliters) of concentrated sulfuric acid into a
canning jar. Add the white powder to the sulfuric acid.

7. Heat canning jar of sulfuric acid in a pan of simmering hot water bath
for 15 minutes; then remove the jar from the bath. Solution will turn to a
yellow-orange color.

8. Add 3 level teaspoons (15 grams) of potassium nitrate in three portions
to the yellow-orange solution; stir vigorously during additions. The
solution will turn red, and then back to a yellow-orange color.

9. Allow the solution to cool to a normal room temperature while stirring
occasionally.

10. Slowly pour the solution, while stirring, into 1-1/4 cup (300
milliliters) of cold water and allow to cool.

11. Filter the solution through a paper towel into a glass container. Light
yellow particles will collect on the paper towel.

12. Wash the light yellow particles with 2 tablespoons (25 milliliters) of
water. Discard the waste liquid in the container.

13. Place particles in the ceramic dish and set in a hot water bath, as in
step 5 listed above, for 2 hours.

PSYC0SiS/uuDW

ÃÄÄÄùú "Who cares about food? I'm reading RaGE." úùÄÄÄ´

ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ Red or White Powder Propellant À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

"Red or White Powder" Propellant may be prepared in a fairly simple, and
safe manner. The formulation described below will result in approximately
2-1/2 pounds of powder. This is a small arms propellant and should only be
used in weapons with 1/2 inch inside diameter or less. DO NOT use in pistols!

Material Required --

Heat source (Kitchen stove or open fire)
2 gallon metal bucket
Measuring cup (8 ounces)
Wooden spoon or rubber spatula
Metal sheet or aluminum foil (at least 18 inches square)
Flat window screen (at least 1 foot square)
Potassium Nitrate (granulated) 2-1/3 cups
White sugar (granulated) 2 cups
Powdered ferric oxide (rust) 1/8 cup (if available)
Clear water, 3-1/2 cups

Procedure --

1. Place the sugar, potassium nitrate, and water in the bucket, Heat with a
low flame, stirring occasionally until the sugar and potassium nitrate
dissolve.

2. If available, add the ferric oxide (rust) to the solution. Increase the
flame under the mixture until it boils gently. The mixture will retain the
rust coloration.

3. Stir and scrape the bucket sides occasionally until the mixture is
reduced to one quarter of its original volume, then stir continuously.

4. As the water evaporates, the mixture will become thicker until it reaches
the consistency of cooked breakfast cereal or homemade fudge. At this stage
of thickness, remove the bucket from the heat source, and spread the mass on
the metal sheet.

5. While the material cools, score it with the spoon or spatula in
crisscrossed furrows about 1 inch apart.

6. Allow the material to air dry, preferably in the sun. As it dries,
rescore it occasionally (about every 20 minutes) to aid drying.

7. When the material has dried to a point where it's moist and soft but not
sticky to the touch, place a small spoonful on the screen. Rub the material
back and forth against the screen mesh with a spoon or other flat instrument
until the material is granulated into small worm-like particles.

8. After granulation, return the material to the sun to dry completely.

PSYC0SiS/uuDW


.úùÄÄ[ø]Äð iMPR0v153d D3t0N4t10n T3chNiqUe5 ðÄ[ø]ÄÄùú.


ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ The Clothespin Switch À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

A spring type clothespin can be used to make a circuit closing switch to
activate explosive charges, mines, booby traps, and alarm systems.

Material Required --

Spring type clothespin.
Solid copper wire -- 1/16 in. (2 mm) in diameter.
Strong string or wire.
Flat piece of wood (roughly 1/8 x 1" x 2").
Knife

Procedure --

1. Strip four inches (10 cm) of insulation from the ends of 2 solid copper
wires. Scrape the copper wires with the knife until the metal is shiny.

2. Wind one scraped wire tightly on one jaw of the clothespin, and the other
wire on the other jaw.

3. Make a hole in one end of the flat piece of wood using a knife, heated
nail or a drill. Tie the strong string or wire through the hole.

4. Place the flat piece of wood between the jaws of the clothespin switch.

Basic Firing Circuit --

Attach one of your leads coming off of the clothespin switch directly to
the negative terminal of your battery. Attach the other lead on the switch
directly to one of leads coming off of your initiator (i.e. blasting cap).
Make sure the small piece of wood is separating both jaws on your clothespin!
Now connect the remaining terminal on your intiator and the positive terminal
on your battery with a piece of wire. When the flat piece of wood is removed
by pulling the string, the jaws of the clothespin will close thus completing
the circuit.

CAUTION: Do not attach the battery until the switch and the trip wire have
been planted and examined. Be sure the flat piece of wood is separating the
jaws of the switch.

Usage --

Drive a small headed nail through the spring hole and attaching it to a
stake of some sort (the clothespin MUST turn freely on the nail). Attach
your trip wire to the small wooden block by means of the hole, and run it
over a path, tie the other end of the tripcord to a tree or a large plant.
Use your imagination!

PSYC0SiS/uuDW

ÃÄÄÄùú "I like the RaGE in you." úùÄÄÄ´

ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ The Knife Switch À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

This improvised device will close a firing circuit on mines, booby traps
and other explosive devices when the trip wire is pulled or cut.

Material Required --

A knife or a hack saw blade.
A sturdy wooden board.
Six long nails with heads.
A good length of conductive wire.
A strong string or light rope.

Procedure --

1. Place the knife or hack saw blade on the board. Drive 2 nails into the
board on each side of the knife handle so the knife is held in place.

2. Drive one nail into the board so that it touches the blade of the knife
near the point.

3. Attach the rope or string to the knife. Place the rope accross the path.
Apply tension to the rope, pulling the knife blade away from the nail
slighty. Tie the rope to a tree, bush, or stake.

4. Drive another nail into the board near the tip of the knife blade.
Connect the two nails with a piece of conductive wire. The nail should be
positioned so that it will contact the second nail when the blade is pulled
about 1 inch (2-1/2 cm) to the side. Check the position of the nails to the
knife blade. The nails should be placed so that the knife blade will contact
either one when the rope is pulled or released.

Usage --

Attach one wire from the firing circuit to one of the nails and the
other to the knife blade. The circuit will be completed when the tripcord is
pulled or released. Use your imagination!

PSYC0SiS/uuDW


ÃÄÄÄùú "I'd eat dog biscuits, but damn the calories. úùÄÄÄ´
ÃÄÄÄùú Alpo fucking rules"
- Crax, author of Dementia BBS Software úùÄÄÄ´

ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ The Mousetrap Switch À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

A common mousetrap can be used to make a circuit closing switch for
electrically initiated explosives, mines and other miscellaneous booby traps.

Material Required --

Mousetrap
A hack saw or a small file.
Some good connecting wires.

Procedure --

1. Remove the trip lever from the mousetrap using the hack saw or file.
Also remove the small staple and holding wire.

2. Retract the striker of the mousetrap and attach the trip lever across the
end of the wood base using the staple that was removed previously. If the
trip lever isn't made of metal, a piece of metal of approximately the same
size should be used.

3. Strip one inch (2-1/2 cm) of insulation from the ends of 2 good
connecting wires.

4. Wrap one wire tightly around the spring loaded striker of the mousetrap.

5. Wrap the second wire around some part of the trip lever or the improvised
piece of metal. If a soldering iron is available, solder both of the wires
in place.

Usage --

This switch can be used in a number of ways -- one typical method is
described below:

The switch can be placed inside a box which also contains the
explosive and batteries. The spring loaded striker is held back by the
lid of the box and when the box is opened the circuit closes! Haha!
<BoOm!>

Use your imagination!

PSYC0SiS/uuDW

ÃÄÄÄùú "Could you please pass the jelly?" úùÄÄÄ´

ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ The Pull-Loop Switch À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

This switch will initiate explosive charges, mines, and booby traps when
a trip wire is pulled.

Material Required --

2 good lengths of insulated wire.
A sharp knife and or a pair of wire strippers.
A good amount of strong string or cord.
Some fine thread that will break easily.

Procedure --

1. Remove about 2 inches of insulation from one end of each length of wire.
Scrape the bare wire with a knife until the metal is shiny.

2. Make a loop out of each piece of bare wire.

3. Thread each wire through the loop of the other wire so the wires can
slide along each other. The loops should contact each other when the two
wires are pulled tight.

Usage --

1. Seperate the loops by about 2 inches. Tie a piece of fine thread around
the wires near each loop. The thread should be tight enough to support the
loops and the wire, yet fine enough that it will break under a very slight
pull.

2. Fasten one wire to a tree or stake and connect the end of it to a firing
curcuit.

3. Tie a piece of cord or string around the other piece of wire a few inches
from the loop. Tie the free end of the cord around a tree, bush, or stake.
Connect the free end of the wire to the firing circuit. Initiation will
occur when the tripcord is pulled.

CAUTION: Be sure that the loops do not touch each other when the wires are
connected to the firing circuit.

Other Uses --

The switch without the fine thread may be used to activate a booby trap
by attaching it between the lid and a rigid portion of a box, between a door
and a door jamb, and in similar manners. Use your imagination!

PSYC0SiS/uuDW


.úùÄÄ[ø]Äð Ev3ry7h1nG El53 ðÄ[ø]ÄÄùú.


ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ The Downfall of the Internet À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

In recent times, there has been something terribly wrong with the
Internet. Large numbers of inexperienced users have climbed on the net,
hoping to get a taste of the "Information Superhighway." They are the people
willing to pay a monthly fee for access to internet services, whether direct
or indirect; and in most cases, not knowing the difference. Needless to say,
those who have been on the net for some time simply hate to see these people.
They are a distraction, and their lack of knowledge on the Internet in
general speaks for itself in saying that they shouldn't be there.
The Internet was designed to rely on unreliability. It can never
officially be "shut down," in case of thunderstorms, or even, as its creators
carefully planned, in case of nuclear attack. Due to this, the more people
that occupy the bandwidth of the Internet increases the unreliability and
unstability. This also means things will work slower, in attempts to
accomodate the load of users.
The attitudes of the people are different. Compare the long-time
Internet users, the high school and college students, playing loud music
and dressing according to their own styles, with the middle-class middle-aged
nine-to-fivers, family-oriented people who are climbing on the net, who have
to check their computer's manuals to find out how to turn it on. A conflict
of ideas and beliefs separates the Internet into a fun-loving crowd and a "I
want what I paid for: information, not a bunch of kids swearing and
bothering me."
The Internet is a means to keep people on the breaking edge
of technology and information, not a place to learn family values and preach
about goodness and religion. If there is to be an Information Superhighway
meant for everyone, it definately is not the Internet. I'd like to find the
guy who first provided the Internet as a commercial service and give him a
piece of my mind.
Despite attempts to stop the rush of unexperienced crowds of users who
feel they can get on the Internet and act like they own it, it is still going
on everyday, and at alarming rates. As many as 2 million people will
experience the Internet for the first time each month. At a growth rate like
this, something will have to be done to enforce a kind of population control.
It is already a fact, though, that regular services are slower and sometimes
not available due to an overflow of users. Take the Internet Relay Chat
service (IRC) for example. Getting onto an IRC server is much harder now,
with all the users swarming in for a taste of the infamous live, worldwide,
uncensored teleconference system. The IRC servers have user limits which
only allows so many users on at a time. By adding more users via commercial
providers, and allowing these users to use other servers, they take away from
us the freedom we once had. In the future, the Internet might be up for
sale, but who will buy it? What will they do with it? And who gets paid for
selling it? The simple answer to the demise of the Internet: Money ruins
everything.
If you sympathize with the newbies and offer your helping hand to them,
then maybe you're not really an Internet junkie after all. If you oppose
this invasion of the worldwide realtime network where many cyberpunks call
home, then do something about it. Not everyone can drive the fast, shiny
cars... Not everyone can build their dream home... And not everyone can
enjoy the Internet. Whether we like it or not, our world is segregated.
Very much so. Segregation is not a bad thing in the way of protecting the
Internet, so let's make it a goal to keep it out of the hands of those who
don't deserve it.

GraveDigger/uuDW

ÃÄÄÄùú "rUm 4Nd Gr33n 3gg5" úùÄÄÄ´

ÚÄðÄ Ä ùùú ú ú úùù Ä Äij¿
ú úùij¿ "Hypocrites or not?" À³Äùú ú
À³ÄÄ Ä ùùú ú ú úùù Ä\ÄÄÄÙ

I have to say the whole H/P/A/V scene seems funny to me. There are so
many differences in views! Which is the chaos that anarchists love of
course, but otherwise its sorta fubar. I mean we've got pure hackers out
there who slam through VAX and UNIX systems, take a look around, and then
leave without hurting a thing; doing it all just to learn something new
(which is fine). Then they go flame the destructive hackers. Which again is
fine! That's their opinion. YET they find it alright to card shit. What
the fuck is that shit!?! Its still fucking with shit either way! Now I
could give a bunch more examples between the different actions, but you get
the point. Now I'm not saying everyone in the scene is like this, but there
are those few... If you're gonna take a stand: TAKE A STAND DAMMIT!
I think the coolest people are the mutha-fuckers who don't give a shit
either way. These guys (or girls) just do it and don't give a flying fuck
what anybody thinks about it. I mean lets face it folks, blowing shit up is
against the law, so is hacking into a restricted system, carding a new
motherboard is illegal too, so is using unauthorized codes to get a free
phone call, etc... Now we all know that those crimes may carry different
penalties, but "Big Brother" doesn't like any of it. Lets take this to "Big
Brother"
not each other. In fact lets show them who's "Big Brother" when it
comes to this shit.

Well that's my rant. It turned out smaller then I thought it would. Oh well...

Grendel/uuDW

ÄþøÄ=Äð Disclaimer ÄïÄÄ

The knowledge contained within can be harmful if used improperly. We do
not advocate the construction or use of any of the items described within.
Doing so may result in loss of life, limbs, cats, your mom, your dad, your
parakeet polly, your tricycle, and even your mountain dew!

In other words, don't be a dumb shit and blame us for it.

By the way, have a wicked nice day. :)

ÄþøÄ=Äð Disclaimer ÄïÄÄ

Thanx for reading RaGE#1. We hope you liked it, hated it, farted on it,
or at least fed some to your kid brother. We want to hear from you, in any
case. Send mail to uudw@cyberspace.org with your mailz.

ÄþøÄ=Äð l8z ÄÄÄÄÄÄÄÄïÄÄ



next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

guest's profile picture
@guest
12 Nov 2024
It is very remarkable that the period of Atlantis’s destruction, which occurred due to earthquakes and cataclysms, coincides with what is co ...

guest's profile picture
@guest
12 Nov 2024
Plato learned the legend through his older cousin named Critias, who, in turn, had acquired information about the mythical lost continent fr ...

guest's profile picture
@guest
10 Nov 2024
الاسم : جابر حسين الناصح - السن :٤٢سنه - الموقف من التجنيد : ادي الخدمه - خبره عشرين سنه منهم عشر سنوات في كبرى الشركات بالسعوديه وعشر سنوات ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
6 Nov 2024
Thank you! I've corrected the date in the article. However, some websites list January 1980 as the date of death.

guest's profile picture
@guest
5 Nov 2024
Crespi died i april 1982, not january 1980.

guest's profile picture
@guest
4 Nov 2024
In 1955, the explorer Thor Heyerdahl managed to erect a Moai in eighteen days, with the help of twelve natives and using only logs and stone ...

guest's profile picture
@guest
4 Nov 2024
For what unknown reason did our distant ancestors dot much of the surface of the then-known lands with those large stones? Why are such cons ...

guest's profile picture
@guest
4 Nov 2024
The real pyramid mania exploded in 1830. A certain John Taylor, who had never visited them but relied on some measurements made by Colonel H ...

guest's profile picture
@guest
4 Nov 2024
Even with all the modern technologies available to us, structures like the Great Pyramid of Cheops could only be built today with immense di ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
2 Nov 2024
In Sardinia, there is a legend known as the Legend of Tirrenide. Thousands of years ago, there was a continent called Tirrenide. It was a l ...
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT