Beruflich Dokumente
Kultur Dokumente
1.''faOO'l'lO.'.
............ ...,u.~,.. ..... !Nt II .... I~..., v....: ... ~I,. tM ............. ,. . . . . . . . .
11'_.......,.,................ __•._
~
..................
. . . . ___
. . . . _wIIIob _ _
..... CIooto....-..
~~_wiIl--...auo.-_
u.. .... _"'r..... .........
_
. __..
........
• poDIM _ _
.l tIoo a..........oa rqOJ .. " " 1 - o,.r- ... --.. Ie _ _
_ _ \O UO' . . . . . . . . .
Ia.......,
..
~
\
I
I
4
I
i
I
'
-sw. MOl IW ""', bJ' <ilia _ ......, -IlIaC ot uo. .~ ... " ' - .
We Know
You should have had this issue last in this column) and are rather
month. We know. We're sorry. pleased with the results. We have all
Hut just because we avoided the ofthe advantages ofequal access
holiday rush (by not contributing to and direct overseas dialing without
it) doesn't mean that you'll be losing having an electronic or digital
out. Infact, we used the extra time switch. The extra time involved to
to further pursue the late breaking complete a call is negligible. And
MCI scandal (see page 10) as well touch tones are still free!
as a couple of other stories, includ The MCI story is the first result of
ing the latest on the famous virus. our new toy. As we scan out differ
We've been playing with our new ent companies and investigate them,
adjunctframe (mentioned last time more tales will unfold.
STAFFBOX
Editor-In-Chief
Emmanuel Goldstein
POSTMASTER: Send address changes to 2600, P,O. Box 752, Middle Island, NY 11953-0752.
Back issues available for 1984. 1985. 1986, 1987 at $25 per year, $30 per year overseas.
FOR LETTERS AND ARTICLE SUBMISSIONS, WRITE TO: 2600 Editorial Dept., P.O. Box
by Bob Page
worm opens a TCP connection to
University of Lowell
another machine's sendmail (the
Computer Science Depanment
SMTP port), invokes debug mode,
(Reprinted from the RISKS and sends a RCPT TO that
Newsletter, an electronic publica requests its data be piped through
tion available on many machines a shell. That data, a shell script
that are accessible by networks.) (first-stage bootstrap) creates a
temporary second-stage bootstrap
Here's the scoop on the file called x$$,11.c (where "$$" is
"Inte'rnet Worm". Actually it's not a the current process ID). This is a
virus a virus is a piece of code small (40-line) C program.
that adds itself to other programs, The first-stage bootstrap com
including operating systems. It piles this program with the local cc
cannot run independently, but and executes it with arguments
rather requires that its "host" pro giving the Internet hostid/
gram be run to activate it. As such, socket/password of where it just
it has a clear analogy to biological came from. The second-stage
viruses -- those viruses are not bootstrap (the compiled C pro
considered live, but they invade gram) sucks over two object files,
host cells and take them over, x$$,vax.o and x$$,sun3.0 from the
making them produce new viruses. attacking host. It has an array for
A worm is a program that can 20 file names (presumably for 20
run by itself and can propagate a different machines), but only two
fully working version of itself to (vax and sun) were compiled in to
other machines. As such, what this code. It then figures out
was set loose on the Internet was whether it's running under BSD or
clearly a worm. SunOS and links the appropriate
This data was collected through file against the C library to produce
an emergency mailing list set up an executable program called
by Gene Spafford at Purdue lusr/tmp/sh -- so it looks like the
University, for administrators of Bourne shell to anyone who
major Internet sites some of the looked there.
text is included verbatim from that The Fingerd Attack
list. In the fingerd attack, it tries to
The basic object of the worm is infiltrate systems via a bug in fin
to get a shell on another machine gerd, the finger daemon.
so it can reproduce further. There Apparently this is where most of its
are three ways it attacks: send success was (not in sendmail, as
mail, fingerd, and rsh/rexec. was originally reported). When fin
The Sendmail Attack gerd is connected to, it reads its
In the send mail attack, the arguments from a pipe, but doesn't
ger command
being executed, a------------beater,
shell was started with no argu beethoven. beloved, benz,
bassoon, batman,
beauty,
menls. Since this is run in the con beowulf, berkeley, berliner, beryl,
text of the finger daemon, stdin beverly, bicameral, bob, brenda,
and stdout are connected to the brian, bridget, broadway, bum
network socket, and all the files bling, burgess.
were sucked over just like the shell campanile, cantor, cardinal,
that sendmail provided. carmen, carolina, caroline, cas
The RSH/REXEC Attack cades, castle, cat, cayuga, cellics,
The third way it tried to get into cerulean, change, charles, charm
systems was via the .rhosts and ing, charon, chester, cigar, clas
letclhosts.equiv files to determine sic, clusters, coffee, coke, collins,
"'rusted" hosts where it might be comrades, computer, condo,
able to migrate to. To use the cookie, cooper, cornelius, cous
.rhosls feature, it needed to actual- cous, creation, creosote, cretin.
Iy get into people's accounts - daemon, dancer, daniel,
siQce the worm was not running as danny, dave, december, defoe,
root (it was running as daemon) it deluge, desperate, develop,
had to figure out people's pass dieter, digital, discovery, disney,
words. To do this, it went through dog, drought, duncan.
the letc/passwd file, trying to eager, eaSier, edges, edin
guess passwords. It tried combina burgh, edwin, edwina, egghead,
lions of- the username, the last, eiderdown, eileen, einstein, ele
first, last and first, nicknames (from phant, elizabeth, ellen, emerald,
the GECOS field), and a list of engine, engineer, enterprise,
files had all the symbols intact with Anyone who looks at the binary
somewhat meaningful names) and will not see any embedded strings
disassembled it into about 3000 - they are XOR'ed with 81 (hex).
lines of C. The BSD development That's how the shell commands
team poked fun at the code, even are imbedded. The "obvious"
going so far to point out bUgs in passwords are stored with their
the code and supplying source high bit set.
patches for it! They have not Although it spreads very fast, it
released the actual source code, is somewhat slowed down by the
howev.er, and refuse to do so. That fact that it drives the load average
could change -- there are a num up on the machine -- this is due to
ber of people who want to see the all the encryptions going on, and
code. the large number of incoming
Portions of the code appear worms from other machines.
incomplete, as if the program [Initially, the fastest defense
development was not yet finished. against the worm is to create a
For example, it knows the offset directory called lusr/tmp/sh. The
needed to break the BSD fingerd, script that creates lusrltmp/sh from
but doesn't know the correct offset one of the .0 files checks to see if
for Sun's fingerd (which causes it lusr/tmplsh exists. but not to see if
to dump core); it also doesn't it's a directory. This fix is known as
erase its tracks as cleverly as it "the condom".]
might; and so on. Now What?
The worm uses a variable None of the ULoweli machines
called "pleasequit" but doesn't cor were hit by the worm. When BBN
rectly initialize it, so some folks staffers found their systems infect
added a module called _worm.o to ed, they cut themselves off from all
the C library, which is produced other hosts. Since our connection
from: int pleasequit :::; -1; the fact to the Internet is through BBN, we
that this value is set to -1 will were cut off as well. Before we
cause it to exit after one iteration. were cut off, I received mail about
The close scrutiny of the code the sendmail problem and installed
also turned up comments on the a patch to disable the feature the
programmer's style. Verbatim from worm uses to get in through send
someone at MIT: "From disassem mail. I had made local modifica
bling the code, it looks like the pro tions to fingerd which changed the
grammer is really anally retentive offsets, so any attempt to scribble
about checking return codes, and, over the stack would probably
in addition, prefers to use array have ended up in a core dump.
indexing instead of pointers to Most Internet systems running
walk through arrays." 4.3BSD or SunOS have installed
(1988 issues are still available at $5 each. All others are sold
POBox 752
It all started with what sounded like a Perhaps MCI feels they're taking a cal
friendly phone call in October: culated risk here. They only seem to make
"Hello, this is Patricia from MCL We these calls to people who already USE!' MCI
noticed that you presently have an account in some form. Maybe they feel these peo
with MCI and we wanted to let you !mow ple won't raise a fuss when they discover
that we'll be offering 'one plus' service in who their long distance company is. In
your area starting December 10th. We'd fact, they may never even discover that
like to verify your address." MCI is their carrier since they most likely
The nice lady then read us our address, have been getting MCI bills in the past.
which was one hundred percent correct. Remember, these are people who have
She then said another person would call us already been using MCl's services.
to confirm this information. That call Regardless of whether or not it pays
came within minutes and was almost iden off. it's distressirig to see such dishonest
tical in content. tactics on the part of a major company.
A couple of weeks later we got another This isn't our only gripe with MCI. We
one of those calls on another of our lines had been using an account on MCfs 950
that had an MCI account attached to it. 1986 dialup. In November we paid the bill
But this time the second call never came. a few days late (it was under $10). Well,
In early December, equal access came 10 and behold. they disconnected our code
to our phone lines. We decided to check without any warning. When we asked
the status of those two lines that had got them to reconnect it, they said they would
ten the calls, We dialed 1-700-555-4141. have to handle our payment for 10 days
And guess what? They had both been first. Ten days went by and the code was
claimed by MCL Surprised? We weren't. still down. We asked again. This time.
In fact, when those cal1s come in, we they said they were phasing out that ser
expected them to try and pull this scam vice, so they couldn't reconnect us. But
we'd heard so much about. They made one they came up with a bright idea. We could
big mistake though -- they tried it on us. use our 14-digit MCI Card code instead of
We always listen very carefully when our old 5-digit code. "It's just as easy to
phone companies call us, And we can say remember," they said.
very definitely that MCI never asked us if Clearly, they have the right to phase
we wanted to choose them as our long dis out their services and replace them with
tance carrier. All they asked us to do was less desirable ones. But once again. it's the
to verify our address. way in which they did it. MCI jumped at
OK, so it was a sloppy representative. the first opportuniry to take away our old
Maybe even a corrupt one. How can you code instead of being up front and letting
condemn an entire company because of their customers know that as of a certain
the actions of one person? That's quite date this service would be terminated.
easy, It happened more than once. Being sneaky about it doesn't do anyone
Different representatives called diffe;enl any good.
phone numbers and gave the same little The Real Scam
speech, And we've found out that other We've saved the best for last. When we
people have gotten the same treatment. discovered that MCI had selected them
This indicates to us that these representa selves as our long distance carriers, we
tives are reading a script that tells them decided to experiment a little. One of our
no/ to a')k the customer whether they actu experiments involved trying to make an
ally wan.1 Mel's "one plus" service. operator assisted call ("zero plus") on an
Address verification. aftel al1. is a much MCI line. MCI doesn't offer operator
less controversial issue, assisted services. So we were curious as to
what would happen when we tried to do know that your friend selected MCI as his
this. long distance carrier and that you've just
What happened was a big surprise. We been swindled by an AOS? Perhaps MCl's
gOl the same little fading dial tone that we new slogan can be: "We bring the thrill of
got on AT&T ~~ in other words, the hotel phones right into your own home!"
prompt to enter our AT&T calling card Now we should point out that this
number. We entered the card number and "NTS Connection" doesn't work every
were astounded to hear a recording say, where. In some areas you get recordings
"Thank you for using NTS." when you try to make "zero plus" calls
NTS? Who the hell were they?' And using Mel. We need to know where it
what were they doing accepting AT&T does work. You can find out at no charge
calling card numbers on Mel lines'! by dialing 10222~0 followed by a ten digit
We'll skip all of the drama and simply phone number (you can use your own). If
tell you what we found out. NTS is an you hear a fading dial tone, it means
Allcmate Operator Service (AOS) compa you're about to be connected to NTS. You
ny. They handle calls from hotel rooms can stay on and ask a whole lot of ques
and privately owned payphones. Their tions if you want. Let us know if it works
rates are often double those of AT&T. in your area. (You can do the above even
And it seems that in various parts of the if MCI isn't your primary carrier the
country, MCI has a clandestine relation 10222 routes the call to MCI. You must
ship with these people. We say clandestine have equal access in your area in order to
because we're in the habit of reading all of try this.)
the literature from every phone company There's really not much more to add.
that serves our area. And nowhere has this We are demanding a public statement
lillie "service" been mentioned. We have from Mel addressing the issues of signing
yet to find anyone in MCI who is even up unsuspecting consumers and billing
aware of this arrangement. On the other their own customers exorbitant rates for
hand, NTS (based in Rockville, Maryland) operator-assisted calls without telling
is quite proud of the Mel connection. All them. We don't expect to ever get such a
of the NTS operators (who can trick any statement.
one into believing they're really from Several yeats ago, we printed a story
AT&T) are aware that they provide ser about MCl's electronic mail system. Mel
vice for MCI "zero plus" customers. Mail, which had a policy of terminating
Why does Mel use an AOS? We can't accounts that had received mail not to
imagine. But we can tell you the effects. If MCl's liking. We called it a flagrant inva
you decide to call someone collect from sion of privacy to peruse the mail of their
YOUT phone and Mel happens to be your own paying subscribers. The president of
long distance carrier, the person who Mel indicated that he couldn't care less.
accepts on the other end will wind up with So all we can say right now is that it
one hell of a surprise when they get the would be a very good idea to boycott
bIll. You'1I be the one getting the surprise Mel for all of the above reasons. A com
if you forget that MCI doesn't have opera pany that resorts to such devious methods
tors ,md you attempt to place an operator of making money and that treats its cus
assisted or calling card call through them. tomers so shabbily is not worthy of the
The most likely scenario, though. would historical significance its founders
be something like this: you visit a friend achieved.
and need to make a phone call from his We would appreciate it if this article
hOllse. Since you don't want to make your was spread around in whatever ways pos
friend pay, you dial it "zero plus" and bill sible.
it \0 your calling c!lld. How are you to
Winter 1988-89 2600 Magazine Page 11
A HACKER'S GUIDE
try to do is get you to be more familiar [dlrname] not empty - the directory
with UNIX operation and its useful contains files so you must delete the
gueSSing valid user 10's. You may wrong with the system and it can't exe·
come across this one when trying to cute the pwd command.
other account.
The letters can be in upper case or
unmountsys . unmounts files.
lower case. Here are some of the
setup. system setup.
passwords that 1 have seen: Ansuya1,
makefsys . makes a new file.
PlATOON6, uFo/7B, ShAsHi .. ,
sysadm . allows useful commands
Div417co.
(doesn't need root login).
The passwords for the super user
powerdown . powering system down.
accounts will be difficult to hack. You
mountfsys . mounts files.
can try th'e accounts interchangeably
checkfsys . checks files.
(example: login:sysadm password:
Thes.e accounts will definitely have makefsys). It really could be anything.
passwords assigned to them. These The user passwords are changed by
accounts are also commands used by an aging process at successive inter·
the system administrator. Here are vals. The users are forced to change
some examples of accounts I have it. The super user will pick a password
seen' that won't need changing for a long
cron
period of time.
uuhelp
You Have Made It!
usenet
The hard part is over and hopefully
anonuccp
you have hacked a super-user
news
account. The next thing you'll probably
network
see is the system news:
bellboy
Ip
login:john
vector
password:hacker1
guest
System news
games
There wilt be no networking offered
ninja
to the users till August 15, due to
vote
hardware problems.
warble
sysinfo
$
Is, etc., the shell is at work figuring out ular user (this directory contains the
whether you have entered a command Ipasswd file).
correctly or not. The second most Here are some files under the letc
important reason for the shell is its directory:
ability to be used as programming lan letclpasswd
guage. Suppose you're performing letclutmp
Basic s!ructure
I I I I I I I I
IUniX liHC Idev Itmp Ilib lusr lusr2 Ibin
I __L .._
10gll1 passwd I I I
level /john Icathy
-1-'
,profile {mail
I
lpers Igames fbin
I
I I
fmichelle
_l_ _
·.profile in case I _L I
you wish to change capital I I data I I
, your environment. othello stalWars letter lelter1
Afler you log off, il
resets to the default.
FIGURE ill.
$15 -I
total 60
·rwxr-x.. - 5 John bluebox 10 april 9 7:04 mail
drwx...... 7 joM bluebox 30 april 2 4:09 pers
$
FIGURE B
chmod
The chmod command changes per
mission of a directory or a file. Format passwd
is chmod who(+, -, =)(r, w, x). The who Password changing seems to be a
is substituted by u-user, g-group, 0 big thing among some. To change the
other users, a-all. The + means add password, one would use the "pass
(continued on page 40)
Winter 1988-89 2600 Magazine Page 17
GALL DEPT.
CI
Cl
'"
o
-
a.
'"'"
...I
...<'t
o
.
....
III
......
III
;..:~
CI""
.o~
E .
'" '"
z~
'§t.
8g~
u u '"
<00.
~
o
~
Z
CIt
U
C
III
iii
'iii
:l...
- o
f
CIt
Q.
o
IT TOOK i\ LOT OF GALL for someone to call us collect and somehow convince
an untrained operator that we had accepted the charges and then apparently talk to
our answering machine for seven minutes. It also takes a lot of gall for an Alternate
Operator Service company like the above to charge the astronomical rates they do,
let alone come up with an official sounding name like "Operator Assistance
Network". When we first saw that line on the phone bill, we thought it was some
kind of tax or surcharge. That's why we decided to expend a little gall of our own
and expose the entire sordid affair, phone numbers and all.
You too can be nosy and lis phone base channels are locat
ten in to other people's tele ed.
phone calls with a radio Standard UHF/VHF Scanner:
receiver. Depending on what You can pick up cordless
kind of radio(s) you have. here phones in your immediate
are the things you can pull in: viCinity. IMTS (old style car
Short Wave Radio: You need a phones) in your general area.
general coverage receiver that and airplane phones flying
is capable of receiving in single overhead. For the base sta
sideband mode (SSB) or has a tions. you'll usually hear both
BFO mode. Your antenna can sides of the conversation,
either be the whip antenna on although sometimes the mobUe
the radio or a long piece of caller won't be audible and
wire, ten to fifty feet. running you'll just have to imagine
around your home or better what they're saying. Use either
yet. outside to a tree or pole. the whip antenna on your
You will be able to tune ship to scanner or buy an outdoor
shore telephone calls within scanner antenna. These fre
the following frequency bands quencies are listed in mega
(all numbers in kilohertz): hertz:
4357-4434. Cordless phones
6506-6521. 46.610 to 46.970
8718-8812. IMTS car phones
13100-13197, 152.510 to 152.810
17232-17356. (base stations)
22596-22716. Airplane phones
These frequencies are the 454.025 to 455.000
shore station. which usually (land stations)
broadcasts both sides of the 459.025 to 460.000
conversation. TransmIssions (airplanes)
are in upper sideband (USB) The ECPA bans listening to
mode. Conversations may roll car telephones. Cordless and
in from all over the world. airplane phones are governed
especially at night. and will be by section 605 of the
in many different languages. Communications Act of 1934,
Some shortwave receivers which says you can listen all
can tune all the way down to you want as long as you do not
the AM band. If yours does, divulge the information to any
check 1690 to 1770 kilohertz, one else or use it for profit.
where the old cordless tele 800 Mhz Scanner: Newer
WHAT MIGHT YOU HEAR ON A CAR < Kids are great, Bill.
PHONE? WE'RE NOT SAYING THAT > You got 'em a iob yet?
STUFF AND THEN WRIrES Ir DOWN > You got 'em a iob yet?
> Yeah. Yup. How's the kids? > Yeah. It was definitely dif
< Sure.
> Okay, then you know
> I like squished it with my
what I'm talking about.
left hand. And I iust left a
< Of course I know, but you
space open for that leeeetle
know, you're looking at it
clitoris to stick out.
like through a microscope••••
< You were squishing it?
> No••..
Cause it felt like you were
< And you're going to say it's
pulling it apart?
entirely different but if you
squashing it in.
well with it, but it really is
horny.
< You don't think it's the
> Oh.
< Noh, then you're losing it.
< Yeah?
< Right.
totally different.
< What's the money thing?
not get along very well. < And Old Bergen Avenue.
< No bullshit about it. ing, you iust gOHa wait a lit
mean they see, they see a lot > That's right, that's right.
was in the fourth doss he was told to 18 days of holiday are over and she
write a composition called My Future is back at work -- how could they
Career. He wrote: "I want to be a manage without her? She hurries to
switchboard girl." When his mother light her beacon for the Sea of
saw it, she lQughed and told him to Anxiety, the Sea of Joy, and the Sea
change it to "man". He looked at of Loneliness.
her from under his brows and said: Tomorrow I shall have to ring
"What do you mean, 'man', when Khabarovsk. I'll dial the inter-city
they're all girls~" and book my call. And how'good it
Over the past two years she has will be to hear that friendly voice
not been very well. The strain of the saying, "Did you book a call to
job is starting to tell. Not long ago Khabarovsk? Putting you through
she did a break, but nOW' her short, nOW'. "
. .
PwsoeRaht.3Minutes
.
'" SlUJ3
.
Ch4Ibt Computer Club, Sch......ellCkmf.85. 0·2000 HamtM-g 20. Telefon: (M(J. 490 3151. 8Tx ·CHAOS+
No ,.g{stf'atlonn~sSBry.
ThE hiNT.
Hils ~lfrO"E bEE" cAU'l"r TIlE koST OPER~TOR of TIlE
,."d tI,,~d
C"iI ll'lE 7
0" A "ACt,,,'l SYSTEM s~id, "IT's ONly bEC~USE
oJ TIiE Ck~os CO~UTER Club
TIt~T TIlE BET~X vjd"EOTEX sys
ntE oNly TltiNG TIt~ T I CAN TEM is A flop." TItEY WERE
TltiNk of is STEVE iN pRisON, bUT TElliNG.. us ~T TItE dEMONSTRA
ItE ItASN'T bEEN CItARGEd. TiON 01 BEf~X TIi~T iT W~S
bEC~USE OlliE CItAOS
C,." you 'lirE ",E SO"'E
01 ",Edi,.
E~,.",pIE.1
COMPUTER.Club TIi~T pEoplE
WON T USE IT.
d,srollrlo"l Also, wkENEVER THERE is ~
SHOW of TItE BET~X vidEOTEX
TItERE W~S Tltis biT wiTlt ~ b~Nk !{Yn~M, pEQplE c~ll up TIiE
iN H~MbUR!I, ON A vidEOTEX aub S MOVIE ON TItE dEMON
SYSTEM iN GERMANY. IT ItAS STRATioN ~CCOUNTS.
M~Ny M~Ny bUGS ~Nd MANy
MiST~kES iN iT ~Nd wIlEN you Ho W dOES r"E,,,"O"E
lt~vE ~N OVERflow of dAT~, SYSlE", WORt ,f; RfGARd ro
~Ny'TltiN<.I could lt~ppEN. MOtlf'lslls Ir dIG'''''A' OR II
So iN TItIS WAY ThEy 10UNd OUT CIU"k,/f!; ",EC"" "'CA'
TItE P~5SWORcI of this b~Nk iN sysrE",r
H~MbURG ~Nd TItEY USEd rliis,
~Nd TIlEN TIlE CIi~os COMPUTER You STillli~"E rliE clUNk,
Club R~N A SECTiON of iNfoR clUNk, clUNk synEM iN MOST
M~TioN ~~GES ON TItE vidEOTEX TOWNS. THEY Ii~VE jyST ST~RrEd
SYSTEM. -"TltEy ~lso Ii~VE ~ TO CIt~NGE TO THE itiGiTAl sys
MoviE iN TIiERE wliicli you C~N TEM.
look ~T bUT you It~VE TO GiVE If you W~NT ~ ModEM you It~VE
~ dON~IioN fOR lookiNG ~T TItE ro buy ir OR RENT iT fROM TkE
MoviE fiVE dolll\RS, witicli is p"on offict;:. OR .Y.OU USE ~
TItE M~xiMUM SUM fOR lookiNG HAYES ModEM wHiclt is illEG~l.
~T ~ vidEOTEX P'~GE. TIlE ModEMS fROM TItE pOST
WElt TIlEy M~aE TItE b~Nk offiCE AREN'T VERy POWERful.
look ~T Tfli5..P~GE OVER ~N<t TIlERE iSN'T ~NY G.ood soh
OVER ~G~IN. 1ltEy' WROTE A lIT W~Rfi TO WORI( WITIt TIiEM ~Nd
TlE .PRO~R~M 50 iT W~S ~lw~y's TIto' RE VERY. EXP.ENShIE.
C~UiNG iT b~ck ~G~iN ANd 1i~i1 IN GERM~NY iT is fORbiddEN TO
iT RUN OVER TItE WEEkENd so Nt) do ANYTliiN~ YOURsElf wiTlt ritE
ONE fROM TIlE b~Nk W~S ThERE TElEplioNE liNE. TIlERE is ~ jOkE
TO SlOP iT. IN TItE ENd iT W~s TIt~T you EVEN NEEd PERMissiON
I~O,OOO M~Rks WORTIt of wltEN you USE ~ pEN TO di~l
dON~TioNS fROM TItE b~Nk TO TIlE pJiONE.
TkE Ck~os COMPUTER Club. If you NEEd ~ lONGER c~blE
TkE Club could" lt~vE cl~iMEd you 1t~\IE TO GO TO TIlE pOST
THE MONEy' fROM TItE bANk OffiCE ~Nd p~ Y 6~ M~Rks ~Nd
bEC~USE TItERE ~RE NO l~ws fill OUT ~ REQUEST fORM fOR ~
SAyiNG. THAT THis W~SN'T ok. lONGER c~blE TO YOUR TElE
Tkty didN'T, bUT TkEY SkOWEd pkoNE. .
TIiE N~TioN~l dAM SECURiTy
OffiCE WH~T is possiblE. TIfE
b~Nk WAS VERy TItANkhJl fOR
mary carrier, you can call any industrial centers are also good
where in the world. Some other spots. These usually have the
long distance carriers have limited green boxes clumped together in
calling areas. The drawbacks are, lots Of four. Late at night, no one is
first, you have to do this at night - around, so it's only a matter of
like, 3 or 4 am. If you do this, you hooking up. I'm talking about those
always run the risk of getting places where a company leases
caught. Some neighbor might think the shop or office space to various
you're a prowler. You should companies. Trying to hook up
therefore dress in dark clothes and where a 7-11 is located probably
not carry any identification with wouldn't be too smart.
you. There is also a limited Canning
amount of things you can do. After A subject I'm going to touch
all, you can't call up your relatives upon is canning. The rea,son I say
or too many of your friends at that I just want to "touch" upon it is
time of day. because this topic really deserves
There is a wealth of locations a whole article by itself, but since
where one can try to hook up. One you can use the same tools of the
spot is housing construction - trade, I'm going to mention it here.
going up and coming down. Cans are those ugly green con
Sometimes, when houses or tainers that stick out of the ground.
apartments are being built, the Most of the smaller and isolated
phones are connected before con cans can be easily opened with
struction is complete. I've also vise grips. The bigger ones some
seen cases where people move times have locks on them, but
out and the phones are not discon nothing a bolt cutter couldn't han
nected. Once the people lived in a dle. Most cans that I've come
mobile home and they moved out, across come in two flavors: ones
leaving a vacant lot with a utility where there are just masses of
pole. Well, 10 and behold, the individual telephone wires
phone was still connected. The clumped together, and the others
phone company didn't disconnect that break apart the clumps of
it until about seven months later, wires to help the distribution of the
and that was after practically telephone wires. The ones that
everyone in the neighborhood had have just the bundles of wires
crank-called people in Japan and clumped together I've found to be
Australia. You can also try rural of little use. I imagine that a guy
neighborhoods late at night, would have to match up the two
although using your own probably wires for each single phone to get
isn't a good idea. a current that will work. But then
Small business clusters or again, I'm not an expert.
INDIVIDUAL SUBSCRIPTION
CORPORATE SUBSCRIPTION
OVERSEAS SUBSCRIPTION
LIFETIME SUBSCRIPTION
BACK ISSUES (never out of date and the same old price!)
Q 1988/$25
TOTAL AMOUNT ENCLOSED:
CONTENTS
LETTERS 24
SOVIET OPERATORS 30
2600 MARKETPLACE 41
t 1733
ISSN 0749·3851