Copy Link
Add to Bookmark
Report

Mishandled Information Publication! issue 1

  

Welcome to the Mishandled Information Publication!

This is a magazine put out for informational purposes to the masses. It
is created for the people that enjoy to learn new things, and this first issue
is a biggie. The magazine itself would not be in existance if it were not for
the help of these people:

Bellcon
Surge
Ansi-Christ
and DITTO

All the files in this magazine were donated by people who decided it was time
that thier knowledge be shown so that others could learn. Expect to see some
regular features in this magazine, and some big changes, so sit back, relax,
and start your journey into the land of knowledge, welcome to the first issue
of the Mishandled Information Publication!

The Fascist Plate




Please note that all files are not spell checked, so the appearance of
some of these files just depended on the "intelligence" of the writers. I
think I'll be buying some dictionaries for Christmas this year........BC




TABLE OF CONTENTS

1. Local Area Networks...................Ansi-Christ
2. On Payphones................................Surge
3. On Pedestals......................Bellcon & Surge
4. Hotel Fun.................................Bellcon
5. MERIT Systems...............................Surge
6. Ring-Busy Device............................Ditto
7. Crashing C-NET's II.........................Ditto
8. Caldor Numbers......................Fascist Plate
9. Neat Numbers........................Fascist Plate
10. Parody Song...................Bellcon & The Surge












Local Area Networks
(LAN)
by
Ansi-Christ


A local area network connects devices that are within a
short range. Most LANs are unable to connect to public
communications services. LANs were developed because most
communications within a business either occur in the very
same building or within a short distance of each other.
This allows for the sharing of information and equipment and
thus a large savings for the company.
This files is the first in a series of files. It is not
meant to be a complete systems manual for all LANs, but a basic
reference manual on the terminology and general set up. In later
files there will be more specific information.
This file can be distributed freely as long as none of the
information is changed. If I have made a mistake, please remember
that we are all human and this does happen. Contact me on one of
the two boards listed at the end to point out an error.


Topologies:

Ring -

A ring type set up goes in one direction around a group
of devices until it reaches the device that is meant as the
destination. The ring will be connected by a cable to form
the ring. The ring topology uses a method known as token
passing. A token is like a bucket in which information can be
dumped. If a certain device does not contain this "bucket"
then it can not send out the data until it gets it. This will
prevent data collision from occurring.
A LAN will usually transmit data in packets (buckets =
packets) and add the necessary routing information to the
packet. (this tells the packet where it's destination is)
Because a ring system has a circular shape the information is
routed in one direction and it will still reach its
destination.
One note - I have altered the description of a token
slightly to avoid confusion. A token is usually sent before a
packet and will tell the next device if the following packet
is full or is capable of receiving data.

Diagram of a ring topology:

O---------O
/ \ O = nodes
| |
O O (I apologize for the shitty diagram)
\ |
\ |
O-----O----O



Tree -

The tree set up links components to the network via
connectors. The network can be tapped at any available
point. Data can pass from one device to another and does not
have to route through a centralized point. Just the way a
tree network is set up should make it much faster than a ring
type network with the same computers and devices connected to
it. This type of network is also very useful because you
could add any additional devices as they were need via a
connector without having to go through major modifications to
the network itself.
A tree network does occasionally, just because of the
nature of it's set up, have certain problems with controlling
the passing of data. There is a safety factor involved with a
tree network though. If one of the systems along the network
go down it will not adversely affect the network as a whole,
just that certain part.

Diagram of a tree network:

again I apologize for the shitty diagram.

O
/ \
O \
| O
| O |
| | O
O | /
| /
O


Star -

The star network is connected through a central
processing device. This device usually takes the form of a
PBX or a host computer system. All lines in this network are
connected to this central unit. When information must go to
another node on this network it must first pass through the
center. The star topology is very common and is probably the
most common set up for a network.
There is a problem with the star though. If the central
unit goes down then the whole network is useless.

Diagram of a star topology:

O
O | O
\ | /
\ | /
\ | /
O--------O--------O
/ |\
/ | \
/ | \
O | O
O



Transmission media -

Twisted pair wire is commonly used to connect all kinds of
equipment. This is used in older buildings where it may be
very expensive to convert to newer types of cable. Problems
with this include distortion of signals especially at higher
transmission speeds.

Coaxial cable consists of a single conductor surrounded by a
flexible metallic shielding to minimize signal loss and
interference. Coaxial permits a high transmission speed.

Twin - Axial cable uses two Coaxial cables, one receiving and
one transmitting. These cables are better than twisted pair
cable because of the higher transmission speed and longer
distance.


Baseband and Broadband Systems -

A baseband LAN assigns its entire capacity to a single
user for a brief time. Only one device can use its pathway.
These networks usually use 3/8 inch coaxial cable.
Advantages are low cost, easy installation, and considerable
capacity. Baseband does, though, not lend itself to voice
quality communication.

A broadband LAN is sophisticated and uses common
television cable and a modem. Although it is expensive it
will allow the network to handle voice, video,
teleconferencing, and graphics transmission. It does
this by using different bandwidths so one signal does not
interfere with another signal. It is good for
high volume office communication.

Fiber Optics are the next step although very expensive
it will eventually replace the other cables. Fiber Optics
use light to transmit large amounts of information in a very
short time. A single cable can carry 240 thousand calls at
once.


Interconnecting LANs -

Bridges are one way of connecting similar networks.

Gateways are a way of connecting dissimilar networks.
It acts as a translator between these networks. It
understands different file structures, data types, and access
methods.


Vendors -

Ungermann-Bass is a large independent vendor. Offering both
base and broadband services and coaxial cable and fiber optic
LANs.

Systek is the OEM supplier of IBM's broadband network.

3Com is a major supplier of PC LANs.

Corvus sells Omninet. They offer a system based on twisted
pair wiring.

Interlan Inc. provides Ethernet based products.

Wangnet by Wang laboratories.

Codex 4000 series by Codex corp.

Information systems network by none other than AT&T
information systems. (commonly abbreviated ISN)

Novell network


LAN terms and what they mean - (note - originally printed in LAN
magazine)

Access method: a way to determine which workstation or PC
will be next to use the LAN. A set of rules by network
hardware and software that direct the traffic over the
network. Examples include Token passing and Carrier Sense
Multiple Access for Collision Detection (CSMA/CD)

Collision: The result of two workstations trying to use a
shared transmission medium (cable) at the same time. The
electronic signals collide and ruin both signals. The whole
process takes seconds.

Collision detection: The process of detecting when a
collision has occurred. Workstations know a collision has
occurred if the other station sends no reply that the signal
was received.

Disk Server: a device equipped with disks and a program that
allows users to make and store files on the disks. Allows
each user to have an increase in storage space normally not
accessible at their PC.

Drop cable: The cable which allows connection and access to
the trunk cables of a network.

Locking: prevents people from changing the same data at the
same time.

Polling: used in star networks. allows the central "hub"
system to know when a node wants to transmit.





LAN Magazine Call Anarchia at 518-869-6035
12 West 21 Street TSD at 518-377-6487
New York, NY 10010
1-800-LIBRARY or boards for those who take their
212-691-8251 telecom seriously.

Look for part II soon - Novell Network
commands and syntax


-------------------------------------------------------------------------------
On Payphones - By The Surge

A payphone is a payphone is a payphone, I think that Shakespeare said that
once. At anyrate, the payphone I will be dealing mostly with, due to my
familiarity with this model, is the Western Electriric Rotary fone.This should
hold true to most models of payphones as I will not go into vivid detail on
the aspects of this model alone. This is basically my notes on the findings
that I have come up with upon opening payphones that I deem noteworthy to
myself and others who have not opened payphones or have not studied payphones
that they have opened in depth.
Opening the phone.
One of the most important concepts to realize when opening a payphone is
that a payphone is basically a wall-mounted safe containing a phone (with dtmf
pad/rotary dial exposed) and a cashbox (and related mechanisms). When opening
a safe, you must realize that the easiest way to open a safe is through the
opening method provided. In the case of the payphone, this consists of a lock
and a turn-key insert. This lock is in the middle of the right hand side of
the phone. This contains many tumblers similar to a safe and can be
manipulated by drilling a hole around the key insert with a hole-saw drill.
The turn-key is on the left side at the same level as the cradle for the hand-
set. Drill a similar hole around this mechanism also. In removing the
tumblers of the right side, you will expose the slide that should be pressed
downward by a screwdriver or similar probing type tool. Then the same should
be done to the turn-key side. Use of a mallet may assist the pushing of the
probe to get the slide into the down position. At this time the top-front of
the phone should be lifted upward and outward and the insides will be exposed.
The black metal is only a shell that covers the inner metal and removal of this
metal will accomplish nothing.
Payphones were meant to withstand the attact of a vandal who does not have
power tools. No matter what gamma rays may turn you into the Incredible Hulk,
you will not be able to open the phone without power tools. To elaborate on
how strong the metal is, in opening a dented phone, I broke 1 hole-saw drill
bit, 2 screwdrivers and a mallet. All physical manhandling will do to a phone
is to bind the lock and wreck the electrical devices inside. Once the lock is
bound, it is next to impossible to open the phone without a blow-torch. Also,
if you know a locksmith well enough and the lock is still in working condition
you may be able to have a key made up for it (with the right connections, this
is not impossible as I have found out).
Tone Oscilator-
AKA the redbox holds, on the Western Electric models at least, a 2 way
switch which you may find interesting. It is labled CF DTF for Coin First
and Dial-tone First as you may have read in BIOC 003's course VI on payphones.
It is very interesting and annoying to realize that it is a switch you will
find every time that you walk up to a phone that is set to CF. "Jeeze, all I
have to do is throw one stupid leetle (Mexican for little) switch and I could
use a Blue Box, code, 3rd party billing, collect-call, 800-diverter ect....
The tone oscilator is connected to a central unit via 11 pin connector.
Dialing Unit-
The dialing unit is also connected into the central unit via an 11 pin
connector. The dialing unit holds the dtmf pad/rotary dialing wheel and the
cradle and the cord to the hand-set. The cord to the hand-set is protected
with an armoured outside shell and a very strong cable inside which the red,
yellow, black and green wires braid themselves around.
Coin Mechanism-
The coin mechanism starts in the upper left hand side of the phone and
goes back to the back of the phone, through the totalizer (red-box mechanism)
and and back out to the bottom-front of the phone. It will hold a maximum of
17 quarters before the load has to be dropped into the cashbox (that is why you
should never try to red-box more than $4.25 into a phone at any one interval.)
At that point as one noted friend of mine found out (Dr. Killdeath) something
like this will happen:
"Hello?"
"Hello sir, this is the operator. Just what exactly are you trying to pull
here?"
"Your leg baby!"
-click!
Conclusion-
Maybe I will find out even more with my next payphone and as allways, I
will be willing to share my findings with all that are willing to take interest
and read. Dr. Killdeath, if you read this, contact me at one of the boards
I have mentioned bellow as I haven't heard from you since Red Square. Any
comments (especially additions) please contact me at any of the boards I call.



-------------------------------------------------------------------------------
On pedestals - By The Surge & Bellcon

First off, by far, phreaking entails much much more than codes. The
true phreak is into the "hands-on" aspect of phreaking more than the
bluebox programs or the codes. This experience is using actual blueboxes,
trashing and the now ever so popular and still growing field of 'pedestal
hacking.' Pedestals are the 'cans', or grey-green boxes that are owned by Bell
on the side of the road. These appear only in rural or suburban areas. In
cities, you must use the same methods but these ports may be found in
manholes instead. Basically, a pedestal is an interface, are bridging
gap, between two stretches of telephone cables. The first stretch being from
your Central Office to your street, and the second from there to your house.
In every-day use, it is mainly used as an access port for line testing and
installation by lineman. They are no longer needed in the use of manual
eavesdropping by Bell since all modern eavesdropping is done in your Central
Office, and will be undetected because there is no voltage drop. This is not
to say that you cannot eavesdrop from these points though. Radio Schlock
sells a $20.00 recorder that will only record when there is a drop in voltage
on the line (someone picks up a phone) which can be attached at the terminal
set of the person you wish to eavesdrop on. Other than this device, Radio
Schlock also sells the new CPA-1000 pen register. This will keep acurate tabs
on any phoneline you wish to keep these records on and runs about $100.00. (See
May '87 of 2600 Magazine.) Keep in mind that to hook these devices up to
someones phone lines is not only
an invasion of privacy but is also in
many ways against the law. If you are in the pedestal to begin with you
obviously have no reguard for either so I guess it is no big deal. Of course
you all have the files on how to build "beige" boxes aka linesman's handsets
so I won't bother with that. This is of course an effective tool to monitor
conversations. I personally use an actual test set which has the built in
monitor on it so it goes virtually un-noticed. If you wish to modify your
own phone to do the same, just disconnect the grey (or blue or white)
wire on the F1-Post and the same effect will be accomplished in a cruder way.
The big drawback is that you will wind up bringing the entire base of the
phone along with you to have this feature.
Next order of business is some annoying things that you can do to
someone from the pedestal. Basically, when you are at the pedestal you have
much more power than at any of their phones. If they detect you on the line
and go to call the "proper" authorities, just disconnect the wires
from the terminal blocks and they can not complete the call because their
phone will be dead. Then run like hell. Elsewhere in this issue of MIP
are the plans for the 'ring-busy' device. This may also be hooked to the
terminal blocks easily. I do recommend printing out that file or at least
saving it to disk as it could come in very handy. It makes the line ring
once, then give busy status. The owner of the line can make outgoing calls but
will not even hear the first ring. One thing to remember when using the
monitor/disconnect or the ring-busy device is that if the owner of the line
has 2 lines, be sure to disconnect/busy both of them.
Experimentation is something that is the best about pedestal hacking.
It is pretty much wide open. [No pun intended.] One interesting thing that
you can do is to run wires from one set of terminal blocks to the other. Both
lines will be connected to each other and this provides quite a humourous
effect to listen in on a test set with. Another good way of phucking around is
to take the wires running from one set of terminal blocks and change them with
wires from another set of terminal blocks. This will cause all line A's
calls to go to house B and vice-versa. Another interesting device to hook up
(neither of us have tried this but in theory it could work) is to take a
battery that will produce a large (but not too large) amount of voltage (like
a car battery) and hook this up to an alternater which will cause the voltage
to run in pulses. This will cause the line to constantly ring [or at least
make the bell ringer lock up] until the phone is picked up. When the phone is
put back down, this will continue. This will disallow outgoing and
incoming calls and be a general annoyance.
Opening the pedestal can be acheived simply. If it is the type of
a case that has 2 doors on the front and opens like a closet (quiet front or
QF) just insert a 7/16" socket wrench (key word-socket since there are
washers around the nut that make it impossible to use anything but a socket
wrench or nut-driver) and just follow the directions printed above the
handle. For the 'can' type boxes, just undo the nuts with a 7/16" socket
wrench (again, only socket) and lift the front cover off by pulling on the
'handle' at the bottom and pulling down and off. (This also makes a great seat
on those wet nights!).
Now all you have to do is find out what line you are accessing (be sure
it's not yours!) by using ANI. If you are not from the 518 area I would
suggest subscribing to 2600 and writing in for your ANI (if you don't allready
know it) If you are from 518, 998 (or in some weird places 997) is what you
want to dial to find the number of the line that you are on. Once you are
sure that it is not yours, you can call anywhere for free since you are using
the phone of someone else.
One thing that I have noticed in looking around at a lot of pedestals is
what we call a 'node'. It is protected by a black rubber cap. The nodes are
easy to see, as they are usally two or three feet up the pole, and have black
wires running either from the ground, or the top of the pole. The caps can
be very easily removed to expose a set of terminal posts. Since these nodes
are mounted on the telephone pole they provide easy access to the lines since
you don't have to open a pedestal at all to get at them. They are, other
than the access-ability factor, the same as the terminal blocks inside of a
pedestal.
One thing that should be mentioned is a reminder. If you happen to cut
any of the wires inside, intentionally or not, you have committed a serious
crime. Not only is this theft and vandalism, it may be deemed by
officials as something more organized. Many things are carried over phone
lines besides just voices. Lines such as bank or lottery data, medical
systems, and alarm systems are a few of the things that when cut, could lead to
some serious trouble. In one such case similar to this, the local division of
the FBI showed up for some thorough investigating (along with TelCo and
State Police.)
Well, that is just about all that I have to say 'on pedestals'.
One final note, a pedestal is not yet in use, there is still current
running through it although you will not get a dialtone from any of the
terminals or wires themselves. They are basically useless although the
cases make great end tables for your room. Look in the future for a follow
up file dealing with test probes and other lineman paraphenalia as well as
with anything else that we learn from Ma Bell (knock on wood).

TTFN! The Surge (T$) Bellcon

+-----------------------------------------------------------------------------+
! Getting The Most For Your Money -- Hotels !
! Written for M.I. Magazine -- 5-4-87 !
+-----------------------------------------------------------------------------+


Have you ever been on vacation and while staying in a hotel you realized
that they are ripping you off? If so, read on. I will list some various ways
to save money and possibly have a good time screwing them over.

While staying in a hotel room you may realize that it is not very easy
to phreak from the room due to the fact that they monitor every outgoing call.
If there is no charge for outgoing calls, feel 'free' to phreak as you
normally would from home. If there is a charge, you may be able to phreak
using alternative methods. On your hotel phone it may say 'dial 8+1+(area
code) + number.' This is of course is just designating that you want an
outside line, and to record billing for hotel records purposes. Try dialing
other numbers first other than an 8 first. If you get a dial tone then use
that line to dial out. You may still get billed for it, but then again, you
may not. It sure as hell can't hurt. For some reason hotels are now all
going to modular jacks...this is a direct invitation to take what (what
could be easier?) When most maids are done cleaning they will leave the doors
to rooms open. Walk right in and take a phone from that room. I would not
advise that you take your own phone (for obvious reasons.)
There is of course the tried and true method of walking over to a hotel
pay phone to carry out your business. This also brings up an interesting
point. Most hotel phones are indoors on hotel walls. The strongest support
they have to the wall is some plaster and a few wood screws. It would be a
bit risky to take one from this location, but it's always an option.
Upon looking around many hotels, you may notice that the power switches
for ENTIRE hallways are left in the open, unlocked. This could bring about
a quite chaotic situation, making it quite easy for you to enter someone's
room and take what you please. Be weary of the emergency power lights
that are ALWAYS in hotels. I would not suggest you do this, it is only proving
that hotel management is not always the smartest class of people in the world.
If the hotel is of any good quality, it will have a restaurant
somewhere on the premisis. Walk in and eat until you burst, upon paying your
bill politely ask if you can bill it to your hotel room. Be sure to ask if
these arrangements can be made before-hand. All they will want is a
name and room number. Make any room and name up as they will not usually
verify it. (What hotel would want to harrass and 'honest' customer?)
Finally, when checking in and out, keep your eyes on the computer. As
stated earlier, hotel management is not too smart. Not smart enough to
remember logon procedures and passwords that is. It is not unlikely that the
whole procedure will be written stamped on the terminal. Keep this for future
reference!

If you are not impressed with this file, stop complaining. Request
something next issue, or take whatever you get. You're not PAYING for this!

(A Mishandled Magazine Production!)



================================?==============================
Merit destinations---

Autonet CMU-Cyber Datapac Dial1200-AA
Dial300-AA Internet ITI MAGNET
MSUnet-CLSI MSUnet-EGRNET MSUnet-IBM MSUnet
MTU MTUS5 OU-SECS RPI
RUAC SDSC Telenet UM-CAVAX
UM-CLINFO UM-CVVAX UM-DSC UM-EnginHarris
UM-MMVAX UM-QuickSlides UM-RAVAX umix
UMLIB UMLIB-300 WMU-CAE WMU-Kanga
WMU-Pooh WMU-Puff WMU-Tigger WSU-CSVAX
WSU-ET ZOOnet-KCollege Zoonet-KVCC

Here are some additional destinations that are accessable via merit.....
ABA/NET ACP ADPNS-261 ADPNS-3
ADPNS-446 ADPNS-9 Alberta ARTFL
Automail-23 Automail-297 Boeing British-Columbia
BRS Cal-Berkeley Calgary Caltech-HEP
Carnegie-DEC-20 Carnegie-MICOM Carnegie-11/45 CompuServe
Comshare Cornell Dalhousie DatapacInfo
Dialcom Dialog-Index Dialog-V1 Dialog-V2
Dow-Jones Guelph Illinois Illinois-Cyber
LEXIS Manitoba Maryland-Unix McGill
MGH Minnesota-Cyber Minnesota-VAX MIT-Multics
MIT-VM Montreal Natl-Lib-Med NCAR-Telenet
New-Brunswick Newsnet NJIT-EIES NLM
NLM-MCS Notre-Dame NRC NYTimes
OAG Queens Rice RLIN
SDC SFU Simon-Fraser Source
Source-11 Source-12 Source-13 Stanford
STN Sumex Telenet-Cust-Serv Telenet-Mail
Telenet-Telemail Toronto TUCC UBC
UBC-CS UBC-EAN UBC-VISION UQV
Press RETURN to continue
Victoria VMShare Vutext-Can Vutext-Freep
Vutext-other Washington Waterloo-TSS Waterloo-VM
WestLaw Wilsonline Wisconsin-MACC Wisconsin-VAX
Yale

This is the best list that I could get a hold of. Hacking Merit is very
interesting as you can reach telenet via merit as well as all these adresses
that are listed above. If you know telenet, you know that this makes Merit
practically unlimited. I hear from Bellcon that there is a UNIX out there
with the uucp account and password uucp but it needs a core dump to get to
the prompt. If you are into that sort of thing, go for it! If not, there are
still quite a few other destinations that you may wish to hack. I am sure that
that UNIX is wide open seeing that uucp's pw was uucp. Try the other default
accounts. Merit is down at this time due to extensive hacking and a friend of
mine got a little note on his MTS account about this so be carefull not to do
this from MTS or anywhere where it can be tied to you. To get to MERIT just
type:
%call 999900009999
when you are connected to the 266-8989 dialup or any dialup of ISNET. I hear
that the 266 prefix will be soon changed to 276 but the last 4 digits of ISNET
will remain the same 8989. I hope you enjoyed this file. It took no great
intelligence to write but can be used as a reference for serious hackers who
have not tried MERIT yet. This is a way for you to get started and I wish you
the best of luck on getting accounts in all your travels and hope you never
choose to destroy any data or system anywhere. Remember, the greatest sence of
power comes from holding the power to destroy a system, and choosing not to..
T$
===============================================================================


.......................................
. The HOW TO File .
. On Making .
. The Ring-Busy Device .
. Designed And Written By .
. ]>itto AKA Shlomo .
. .
.......................................


Introduction
------------
Well this is the How To file on The Ring-Busy Device. This is very simple
to construct and is also very simple to connect on someones fone line. It is
probably the easiest thing you will ever do what is actually worth what
little effort you put in. Now your probably saying to yourslef:


What The Hell Is A Ring-Busy Device?
------------------------------------
A Ring-Busy Device is ofcourse a
device that when connected on to you enemys fone line will make it so that
when you call this persons fone you will get a Ring-Busy. A ring-busy is
exactly what it says, A ring and then a busy, That is One ring and from then
on busy. Also the pathetic person who has the fone that this device is being
used on will not have his fone ring. This means he will not even know that
anyone is calling. Your probably saying BIG DEAL, why not just cut his line!
Well this is better because he can still use his fone, thats right, if
he wanted to he could pick up his fone and he would get a dial tone, he could
then dial out not knowing of this device. This is especially useful for
those r0dent BBS's that are pissing you off. If someone has a BBS and this
device is on the line then they wont get any calls for their BBS (hehe), and
they wont know why either!


How the Ring-Busy Device Was Conceived
--------------------------------------
It all started one morning at 4am when I went out special to steal this
emergency police/fire fone. Once I got
it home I hooked it up to my line and noticed that whenever someone called
me they would get a ring-busy, this was extremely odd, so I tried to figure out
why the hell that was happening, and I did, and now we have the Ring-Busy
device. It is also useful if dont want to talk to someone but you dont want to
put the fone off the hook, just put this little device on and those leeches
that keep bothering you for games wont be a problem anymore.


Ring-Busy Device Plans
----------------------
As I said before this is very very simple to construct.

Parts Needed:
(1) 7k resistor (7000 OHMS)
(1) Fone line
(1/2) a brain (at least)

Procedure:
Now all you have to do is connect up this 7k resistor to the fone line on
the red and green terminals, Here is an easy diagram of how to add it onto
someones fone line. The diagram represents the nice little box that the
fone line comes through on the side of your house.
NOTE: This is for a 1 fone line configuration. If they have two I think
you'd figure it out? If not too Bad...

Diagram:
#########
# #
# G-7-R #
# #
#########
G - Green terminal
R - Red Terminal
7 - 7k resistor

Now if they have 2 fone lines then connect another 7k resistor to the
black and yellow terminals.

Its That Simple....
7k resistors might be a some-what hard to get, try your local electronics
store and dont bother with Rat Shack, I already checked, they dont sell them.
If you must, a 6.5k or maybe 7.5k resistor will work, but Ma Bell uses
7k so I do the same.


Suggestions
-----------
Here are a few ways to use or misuse this device.
1) Connect it on to your fone:
Simple just cut off the modular end of your fone cord and connect it to the
red and green wires, then connect the modular plug you cut off to the
resistor too, and then just plug the fone in and you have a permanent
Ring-Busy Device, Another way of doing it would be to put a SPST switch in
there so you can turn it on or off, thats what I do and it works great
(Especially when r0dents start bothering me)
2) Connect it to your favorite enemys fone line, and enjoy while watching
him try to figure out why he isn't getting any fone calls, BUT if the
luser has 2 fone lines I suggest that you connect one Ring-Busy Device onto
each fone so he doesn't get calls on the other fone from people telling him
that his fone is phucked.


Conclusion
----------
Well as this file comes to an end, I would like to tell you to call some
of the best boards around:


Disclaimer
----------
This file is for informational purposes only, it is not meant for
small children or the mentally unbalanced. In no way is the author
liable for use or misuse of this device. Also note that the author can
not and will not take any responsiblity for any actions as a result of this
file.

.......................................
. The HOW TO File .
. On Crashing A C-Net .
. Part Two .
. By ]>itto .
. AKA Shlomo .
.......................................


Introduction:
-------------
In this file on Crahing a C-Net I will discuss methods of making, using, and
getting backdoors on C-Net, I will also show some C-Net programming and how to
make your very own backdoor!
First I will discuss ways to get SysOp access on a cnet...There are a
few ways and most are effective.


Method 1
--------
Now this method is quite simple BUT a certain access level is needed. This
works like this:
First: you must try and convince the SysOp to give you SubOp access of one
of the UD sections, this is the only thing stopping you from complete
control of his board. If you dont have a commie then try to convince him to
have maybe a g-philes section or a UD section of your computer type and for
him to make you a subop, this won't be too hard if you are an expert in the
art of bullshitting.
Second: (This is the easy part) Log on the board real late at night (somewhere
between 2-4am) and go into your sub in the UD section, then hit Z for subop
maintenance and once in there hit 2, once you are at this menu change the
name of the UD section to:
name/e (where the name is the name of the UD). Then leave the subop
maintenance and leave the UD section, then go back into the UD section and
you will see that your UD section is now a ENTIRE DISK EXCHANGE MODE which
means you can kill/upload/download anything on the disk.
Third: Now you must make for yourself backdoor, and then upload it to the
board in place of the a prg. file already on the disk (making a backdoor
for yourself will be discussed later)
Fourth: Now just execute the prg. file you replaced with your backdoor and
your set!!


Method 2
--------
Now this method is simple and you dont need subop access BUT the sysop
of the BBS you want to install this backdoor on has to be either:
1) a Lazy bum
or
2) a completely stupid asshole
This is how it works...
First: You must go into the p-files section and see if there are any games
in there, if not then funs over, this method wont work. Dont get your hopes
up just because there are online games, now what you have to do is execute each
one and make sure that each one is there and make sure you dont see:
'Error reading "name of game"', if you dont get any errors and all the games
are there then your out of luck.
Sorry, but the reason why it would say error reading the game is because that
game isn't on the disk (or maybe it is just that the sysop misspelled the name
, in any case...If there is an error than you now have the ability to
install a backdoor.
Second: This is easy from now on, now all you have to do is go into the UD
section and upload a game with the name prg.name of game missing.
Example: game missing is wrestling, so you upload a game called prg.wrestling.
Get it? Well anyways this prg. that you upload must be you very own
backdoor (this will be discussed later) Third: Just execute that game after
you have uploaded it and you in control


Method 3
--------
This is probably the most worthless method and the hardest to do, but what
the hell. In this method you must:
First: Get ahold of an online game that the sysop does not have and is
somewhat a good game, then install a backdoor (discussed later) and then
upload it to the UD section, if the sysop is an idiot he will add it to the
p-files section without even checking it, if he is smart he will check it
for backdoors and if he is a complete idiot or you are good at hiding back
doors than he'll add it to the p-files section.
Second: Once it's in the p-files section just execute it and go with
your backdoor. That simple!


Method 4
--------
Do the same as method 3 BUT do not install a backdoor in the game, and
wait till he puts it in the p-files section, once he does go into the UD
section you uploded it to and check if its still there, if so then since
you uploaded it, just kill it and then upload your backdoor, then execute
the game and Ta Da!


Making A Backdoor For Yourself
------------------------------
NOTE: It always helps to have a commie at hand when editing or making games
or backdoors for CNET but I'm sure any computer will do.
Here I will discuss some of the variables needed and some sub-routuines
need to make a backdoor or game.
Well first of all to start out all CNET games MUST be between the lines of
512-580, and you can not skip lines.
---------------------
Important Variables:
---------------------
a$ - used to print out things on the BBS, goes with a gosub 40, for example if you wanted to print out 'axeman is
an asshole' you could do that by doing:
a$="axeman is an asshole":gosub40
ac% - this is your access level, the access levels of cnet go from 0-9 (9
being sysop, and 0 being new user) I will discuss access levels in detail
in a later file.
NOTE: one easy way to make a backdoor would be to but somewhere in the game
a line like this:
ac%=9, that would give you sysop access an$ - the response of an input, (in
other words what the luser typed in)
b$ - current board # your in.
cm$ - prompt (example=MAIN:)
id - your id
d1$ - last call date
d2$ - current time and date
pw$ - your password
------------------------
Important Sub-Routines:
------------------------
gosub 2100 - like input.(an$=the inputs response)
gosub 40 - to print something out to the modem,(Example: a$="hello":gosub40
will print out 'hello')
goto 6000 - logoff the user
goto 1300 - the main menu
goto 512 - execute a p-file(game)
goto 16000 - read a file
gosub61000 - do this 1st before going
to 512 for loading in a game example:
to load 'dumb game' do this:
a$="dumb game":goto61000:goto512
Well those are some of the real neccesities.

NOTE: When printing something out to the modem a ctrl-k will act as a
carriage return. Example:
a$="<ctrl-k>hello<ctrl-k>":gosub40 that will print a return then hello and
then another return.

Backdoor Example:
-----------------
Here is a very simple example of a backdoor file for cnet, if you want
you can use this, or your very own backdoor.
Here goes:
512 a$=" a stupid backdoor ":gosub40
513 ac%=9:goto1300
As you probably know the example i've given will print out' a stupid backdoor
' and will then give you sysop access, and then return you to the main menu.
The above is ofcourse a lame example, I dont have time for a complicated one.
But I think you got the idea...If not then leave me mail on any board I'm on.
Also try contacting your local commie user, he might be able to supply you
with some nice ones, If you need one real bad, let me know and I'll make
a few for you.


C-Net Trick
-----------
This isn't much but it is a simple way to find out who posted a anonymous msg
on a CNET, this only works with the main message not the responses. What
you do is read the message and then privately reply to the idiot who posted
the message(Ooops I forgot to tell ya that you have to have a good idea of
who the hell posted it...) then once you have done that go into the e-mail
section by hitting M at the main menu and then type V to verify someones mail
then all you do is enter that persons name and if it says that guy has a
msg from you that you know it's him...
Not so great a trick eh?

-----------------
/ / BY
/ HAVE SOME /
/ / THE
/ FUN WITH /
/ / FASCIST
/ CALDOR PHONES! /
/ / PLATE
-----------------

So, you are walking through your local Caldor, you see a phone sitting
there, there are no clerks around, and nobody is watching you, it is now time
to use the phone. Yes, you too can make calls to lots of different and strange
places in your Caldor! In this first issue of Caldor Phone Numbers, I will
give you some neat numbers to mess around with. To use these numbers, pick up
the phone, dial a 7, then wait for a louder dial tone, then you can put in the
number of your choice. Here are the numbers you could use:

SPECIAL NUMBERS
------- -------

Accounts Payable 6235
Accounts Payable Adjustments 6234
Admore Distribution 7186
Advertisement Department 6161
Cafeteria 6269
Charge Sales 6219
Central Delivery 6129
Check Authorization 6401
Check Control 6211
Co-op Advertisement 6253
Computer Room 6025
Conference Room I 6244
Conference Room II 6356
Conference Room III 6388
Conference Room IV 6337
Construction Department 6266
Consumer Affairs 6004
Controller 6008
Data Processing 6365
Distribution Center 3020
Duplicating 6158
Executive Benefits 6003
Expense Department 6215
Gym 6196
Help Desk 6667
Internal Audit 6083
Inventory Control 6222
Legal Department 6242
Leisure Line Toys 7300
Mailroom 6159
Maintenance Department 6678
Operations Supervisor 6230
Payroll 6251
Personnel 6174
Personnel Benefits 6317
Printshop 6272
Purchasing 6203
Ralar Distribution 7195
Real Estate 6242
REceptionist 6240
Sales Audit 6217
Security Department 6256
Security REgionals 6256
Telelcommunications 6339
Traffic Accounts Payable 6663
Traffic Hauling 6315
TWX Message Center 6152

Those are all the numbers for this first file on Caldor Phone System.

One last thing you might want to do is to dial 0, then ask the operator to page
customer assistance to hardware or some other department, it might be
interesting...remember, these numbers are for informational purposes only, I do
not approve of you using them. Be sure to look for the next file on Caldor
Phone Systems!

TFP


Some neat telephone numbers to call on a boring day.


-------------------------------------------------------------------------------

NATIONAL STATES' RIGHTS PARTY 404-427-0283
NAZIS IN ARLINGTON 703-524-2175
NAZIS IN CHICAGO 312-863-8700
NAZIS IN CLEVELAND 216-631-6448
LIBERTY LOBBY 703-546-5611
NATIONAL ALLIANCE 703-525-3223

KU KLUX KLAN CHAPTERS:

DAVID DUKE 404-835-7959
HAROLD COVINGTON 919-834-0063
BILL WILKINSON 504-665-1018
FRED WILKINS 303-232-8114
FALLBROOK, CALIFORNIA 714-728-0280
SAN DIEGO, CALIFORNIA 714-563-4555
ANAHEIM, CALIFORNIA 714-750-7848
LAKEWOOD, COLORADO 303-232-8373

OTHER REACTIONARY LOWLIFES:

PHYLISS SCHLAFFLY 618-462-5415
G. GORDON LIDDY 301-567-3607
DAVID ATLEE PHILIPS 301-365-2238
PETER BOURNE 202-462-7266
WILLIAM COLBY 301-320-4646
RICHARD HELMS 202-686-1560
BERNARD BARKER 305-266-2220
L. PATRICK GRAY 203-535-1685

I am not too sure if these numbers are all still correct, these people might
have moved since these were compiled. It is a little bit old. Oh well, have
fun with them anyways...and remember...phone harassment is against the law!

One little address you might want to write to...

THE CROSS & THE FLAG
P.O. BOX 27895
L.A., CALIFORNIA 90027

Remember, this stuff is just informational, and the author of this file can not
take responsibility for what the readers do with this information!


This information was taken from the book GETTING EVEN 2.




Well, that was the first issue of the Mishandled Information Publication! If
you would like to talk with any of the writers of this magazine, please call
these fine BBS's:

TSD 24 HOURS 518/377-6487
ANARCHIA 24 HOURS 518/869-6035

If you would like to submit an article for upcoming issues of MIP, please
contact me on TSD or Anarchia, I am on them as The Fascist Plate.

I hope you have enjoyed reading the Mishandled Information Publication, if you
have any comments or questions, contact me on the boards listed above.

The Fascist Plate

loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT