mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1217 lines
No EOL
37 KiB
Text
1217 lines
No EOL
37 KiB
Text
==Phrack Magazine==
|
||
|
||
Volume Four, Issue Forty-Three, File 4 of 27
|
||
|
||
|
||
// // /\ // ====
|
||
// // //\\ // ====
|
||
==== // // \\/ ====
|
||
|
||
/\ // // \\ // /=== ====
|
||
//\\ // // // // \=\ ====
|
||
// \\/ \\ // // ===/ ====
|
||
|
||
******************************************************************************
|
||
|
||
PHRACK TRIVIA
|
||
|
||
This is pretty damn hard. In fact, some of it is downright obscure.
|
||
And the bonuses? Forget about it. Answer the questions, expand the
|
||
acronyms, explain the numbers.
|
||
|
||
The five highest scorers by the next issue (or the first 5 to get
|
||
perfect scores) win COOL STUFF!
|
||
|
||
Send your answers to phrack@well.sf.ca.us
|
||
|
||
|
||
1) CCIS
|
||
|
||
2) Stimpson J. Cat's Roommate is?
|
||
|
||
3) Name the cracker.
|
||
|
||
4) METAL AE password.
|
||
|
||
5) Who invented the TeleTrial?
|
||
|
||
6) Name Bloom County's hacker.
|
||
|
||
7) What was the Whiz Kids' computer named?
|
||
|
||
8) Western Union owned what long distance service?
|
||
|
||
9) What computer read both Apple ][ and IBM PC disks?
|
||
|
||
10) Who made the "Charlie" board?
|
||
|
||
11) How many credits for a CNE?
|
||
|
||
12) What was in the trunk of the Chevy Malibu?
|
||
|
||
13) Name three bands A. Jourgensen had a hand in.
|
||
|
||
14) SYSTEST Password:
|
||
|
||
15) What computer makes the best SimStim decks?
|
||
|
||
16) What magazine brought the telephone underground to national
|
||
attention in 1971?
|
||
|
||
17) What is the significance of 1100 + 1700 hz?
|
||
|
||
18) What magazine was raided for publishing black box plans?
|
||
|
||
19) What BBS raid spawned the headlines "Whiz Kids Zap Satellites" ?
|
||
|
||
20) CLASS
|
||
|
||
21) What computer responds "OSL, Please" ?
|
||
|
||
22) RACF secures what OS?
|
||
|
||
23) The first person to create a glider gun got what?
|
||
|
||
24) QRM
|
||
|
||
25) PSS
|
||
|
||
26) What PSN was acquired by GTE Telenet?
|
||
|
||
27) 914-725-4060
|
||
|
||
28) April 15, 1943
|
||
|
||
29) 8LGM
|
||
|
||
30) WOPR
|
||
|
||
31) What happened on March 1, 1990?
|
||
|
||
32) Port 79
|
||
|
||
33) Who starred in the namesake of Neil Gorsuch's UNIX security
|
||
mailing list?
|
||
|
||
34) What Dutch scientist did research in RF monitoring?
|
||
|
||
35) What was the author of GURPS Cyberpunk better known as?
|
||
|
||
36) Who would "Piss on a spark plug if he thought it would do
|
||
any good?"
|
||
|
||
37) What thinktank did Nickie Halflinger escape from?
|
||
|
||
38) NCSC
|
||
|
||
39) Who is Pengo's favorite astronomer?
|
||
|
||
40) What language was Mitnik's favorite OS written in?
|
||
|
||
41) Abdul Alhazred wrote what?
|
||
|
||
42) The answer to it all is?
|
||
|
||
43) Who is the father of computer security?
|
||
|
||
44) Who wrote VCL?
|
||
|
||
45) What kind of computer did Cosmo have?
|
||
|
||
46) Hetfield, Ulrich, Hammet, Newstead
|
||
|
||
47) What company wrote the computer game "Hacker?"
|
||
|
||
48) Who does Tim Foley work for?
|
||
|
||
49) Who played Agent Cooper?
|
||
|
||
50) Vines runs over what OS?
|
||
|
||
51) Mr. Peabody built what?
|
||
|
||
52) Who makes SecurID?
|
||
|
||
53) What's in a Mexican Flag?
|
||
|
||
54) Who created Interzone?
|
||
|
||
55) JAMs (as led by John Dillinger)
|
||
|
||
56) Abbie Hoffman helped start what phreak magazine?
|
||
|
||
57) What was once "Reality Hackers?"
|
||
|
||
58) Gates and Allen "wrote" BASIC for what computer?
|
||
|
||
59) Tahoe is related to what OS?
|
||
|
||
60) CPE 1704 TKS is what?
|
||
|
||
61) Telemail's default was what?
|
||
|
||
62) "Do Androids Dream of Electric Sheep" became what?
|
||
|
||
63) What broadcasts between roughly 40 and 50 mhz?
|
||
|
||
64) Who created Tangram, Stratosphere, and Phaedra among others?
|
||
|
||
65) What was Flynn's most popular video game?
|
||
|
||
66) Who lived in Goose Island, Oregon?
|
||
|
||
67) 516-935-2481
|
||
|
||
68) What is the security of ComSecMilNavPac?
|
||
|
||
69) What has the "spiral death trap?"
|
||
|
||
70) Who was the Midnight Skulker?
|
||
|
||
71) TMRC
|
||
|
||
72) Who wrote "Jawbreaker?"
|
||
|
||
73) 213-080-1050
|
||
|
||
74) What is the Tetragrammaton represented as?
|
||
|
||
75) Who is Francis J. Haynes?
|
||
|
||
76) Who ran into one of the Akira test subjects?
|
||
|
||
77) What had "Munchies, Fireballs and Yllabian Space Guppies?"
|
||
|
||
78) PARC
|
||
|
||
79) Alex and his droogs hung out where?
|
||
|
||
80) Jane Chandler in DC's "Hacker Files" is based on who?
|
||
|
||
81) The Artificial Kid lives on what planet?
|
||
|
||
82) 208057040540
|
||
|
||
83) What are the two most common processors for cellular phones?
|
||
|
||
84) Who came up with the term "ICE?"
|
||
|
||
85) What group is hoped might help the "Angels" contact RMS?
|
||
|
||
86) Who is Akbar's friend?
|
||
|
||
87) What company's games was David Lightman after?
|
||
|
||
88) 26.0.0.0
|
||
|
||
89) Who was Mr. Slippery forced to locate?
|
||
|
||
90) Who is "The Whistler?"
|
||
|
||
91) What use would a 6.5536 crystal be?
|
||
|
||
92) .--. .... .-. .- -.-. -.-
|
||
|
||
93) The Dark Avenger likes what group?
|
||
|
||
94) What book spawned the term "worm?"
|
||
|
||
95) Michael in "Prime Risk" wanted money for what?
|
||
|
||
96) Automan's programmer worked for who?
|
||
|
||
97) What signal filled in keystrokes on TOPS-20?
|
||
|
||
98) ITS
|
||
|
||
99) (a/c)+121
|
||
|
||
100) What drug kept the scanners sane?
|
||
|
||
Bonus 1
|
||
3 pts Name three bodies of work by Andrew Blake.
|
||
|
||
Bonus 2
|
||
3 pts Name three currently available titles with N. L. Kuzma.
|
||
|
||
Bonus 3
|
||
4 pts Why would I hate Angel Broadhurst?
|
||
|
||
*****************************************************************************
|
||
|
||
IF SECURITY TYPES WERE K-RAD
|
||
|
||
----------------------------------------------------------------
|
||
|
||
|
||
IRC log started Fri June 18 01:14
|
||
*** Value of LOG set to ON
|
||
<Pat> bye peter
|
||
*** Signoff: hackman (slavin' to da' MAN at TRW)
|
||
<Ed> Dudez, I HATE filling out thez incident Rep0rtz
|
||
<bartman> MUAHAHA Tuff J0b edd1e!
|
||
<Ed> Funni
|
||
*** zen (zen@death.corp.sun.com) has joined channel #CERT
|
||
<Ed> re dan, just missed yer pal peety
|
||
<Pat> Hi Dan!
|
||
<zen> pal? right. ask the wife...
|
||
<venom> re
|
||
<zen> d00dz, we have SO many bugz. sux 2 be me.
|
||
*** venom has left channel #CERT
|
||
*** venom (weitse@wzv.win.tue.nl) has joined channel #CERT
|
||
*** venom has left channel #CERT
|
||
*** venom (weitse@wzv.win.tue.nl) has joined channel #CERT
|
||
*** venom has left channel #CERT
|
||
*** venom (weitse@wzv.win.tue.nl) has joined channel #CERT
|
||
<venom> ARG!
|
||
<bartman> WTF Weitse?
|
||
<venom> s0rri
|
||
<zen> Where is everyone? Anyone seen spaf?
|
||
<Pat> I have. He was going to install something. He should be bak.
|
||
<zen> ah
|
||
*** Action: Ed throws darts at a cracker
|
||
<zen> heh
|
||
<venom> muaha
|
||
*** bartman is now known as Cracker
|
||
*** Action: Cracker hacks Cert with an axe
|
||
<venom> dats a good 1
|
||
*** Action Ed kicks cracker in the nuts
|
||
<Cracker> OUCH!
|
||
*** Signoff: donn (Bad Link?)
|
||
<Cracker> [high voice] fuk u CERT!
|
||
<Ed> heh.
|
||
*** Action: Pat is ROFL
|
||
<Cracker> wonder who's on #hack? Mebbe i should go log em.
|
||
<Ed> Yeah. Oh hey, I got certbot online. Ill send it to go log.
|
||
*** certbot (ed@cert.org) has joined channel #CERT
|
||
*** certbot has left channel #CERT
|
||
<Ed> this will be fun.
|
||
<venom> Hey, letz deop them and take over the channel.
|
||
<zen> thats L A M E
|
||
<Cracker> Ooooh. OPWARZ! I'll go make their channel +i muahaha
|
||
*** Cracker has left channel #CERT
|
||
*** Casper (casper@fwi.uva.nl) has joined channel #CERT
|
||
<Casper> re all
|
||
<Venom> hey dik-head.
|
||
<zen> re
|
||
<Pat> hahahaha hi d00d.
|
||
<Casper> funni whitesey venombreath
|
||
<Ed> lame.
|
||
*** donn (parker@bandit.sri.com) has joined channel #CERT
|
||
<donn> 'sup?
|
||
<Ed> re, oh great bald one
|
||
<donn> eat me
|
||
<zen> bahhahaha
|
||
<Pat> Now now boyz.
|
||
*** spaf (spaf@cs.purdue.edu) has joined channel #CERT
|
||
<Pat> Spaffie!
|
||
<zen> 3l33t SPAF!
|
||
<Ed> re spaf
|
||
<spaf> Yo.
|
||
<venom> spaf...your book sucks.
|
||
<spaf> oh fuck off dutch boy.
|
||
<Casper> HEY!$!@%
|
||
*** spaf has been kicked off channel #CERT by Casper
|
||
<venom> thx dude
|
||
<Ed> oh gawd...feetball
|
||
*** spaf (spaf@cs.purdue.edu) has joined channel #CERT
|
||
<spaf> lame
|
||
*** Mode change "+o -o spaf Casper" on channel #CERT by Pat
|
||
<spaf> thanks sweetie.
|
||
<Casper> op!
|
||
*** Mode change "+o Casper" on channel #CERT by venom
|
||
<Casper> thx d00d
|
||
<Ed> Hey dan, you got those patches online?
|
||
<zen> maybe. What YOU got?
|
||
<donn> WAREZZ
|
||
<Pat> heh
|
||
<Ed> I dunno. Ill dcc you a filelist.
|
||
<zen> kool
|
||
*** zardoz (neil@cpd.com) has joined channel #CERT
|
||
<zardoz> HEY ... anyone want to contribute to my new list?
|
||
<Ed> not me
|
||
<zen> mebbe. Whats this one called? Coredoz?
|
||
<donn> what list?
|
||
<spaf> BAH. Fuck your list man. More crackrs have them than we do!
|
||
<zardoz> who pissed in your coffee gene?
|
||
<donn> heh
|
||
*** zardoz is now known as neil
|
||
<spaf> bah... I'm sick of those dicks using my own holes against me!
|
||
<venom> Your holes? Yer a-hole?
|
||
<Pat> What is your list about this time?
|
||
<neil> same thing. Its called REWT!
|
||
*** neil is now known as REWT
|
||
<REWT> SEND ME YER BUGZ!@#
|
||
*** Action: spaf sends REWT a 50 gig coredump
|
||
<Pat> :)
|
||
<REWT> u r lame.
|
||
*** REWT is now known as neil
|
||
<Ed> I hate these reports. I wish I got to travel more.
|
||
<Pat> come see me!
|
||
<Casper> oooohhhh....netsex!
|
||
<spaf> tramp. :P
|
||
*** bill (whmurray@dockmaster.ncsa.mil) has joined channel #CERT
|
||
<bill> word!
|
||
<Pat> hi bill.
|
||
<donn> Bill! D00d! I am gonna be in Ct. next week!
|
||
<bill> RAD! call me voice at werk. we'll thrash!
|
||
<donn> you know it!
|
||
<zen> oh puh-lease...the geriatric partiers :)
|
||
<donn> farmboy
|
||
<Ed> ***** ***** ***** *****
|
||
<Ed> * * * * *
|
||
<Ed> * *** **** *
|
||
<Ed> * * * * *
|
||
<Ed> ***** ***** * * *
|
||
<Ed>
|
||
<Ed> ***** * * * ***** ***** **
|
||
<Ed> * * * * * * * **
|
||
<Ed> **** * * * *** ***** **
|
||
<Ed> * * * * * * *
|
||
<Ed> * * ***** ***** ***** ***** **
|
||
<Pat> No DUMPING!
|
||
<zen> cert freshens your breath
|
||
<donn> ACK!
|
||
<venom> hee! certs haha
|
||
*** ray (kaplan@bpa.arizona.edu) has joined channel #CERT
|
||
<ray> hey guys!
|
||
<Ed> ugh. Cracker lover alert.
|
||
<donn> commie
|
||
<bill> Hey ray, come to snoop for your little cracker friends?
|
||
<ray> come on, give it a rest guys.
|
||
<Pat> hi ray
|
||
<venom> ?
|
||
*** Action: spaf spits on ray
|
||
<spaf> heh
|
||
*** ray has been kicked off channel #CERT by spaf
|
||
*** Mode change "+b *!*@bpa.arizona.edu" on channel #CERT by spaf
|
||
<neil> hey I wanted to talk to him about my list...
|
||
<spaf> tough shit.
|
||
<donn> heh.
|
||
*** bartman (ddrew@opus.tymnet.com) has joined channel #CERT
|
||
<Pat> re
|
||
<Ed> how goes the takeover?
|
||
<venom> didja kick em?
|
||
<bartman> #hack is +i! muahahaha
|
||
<zen> how exciting. not
|
||
<donn> they deserve it...they are all punks.
|
||
<spaf> hmm..did you get emails? I may want to call their admins.
|
||
<bartman> nope damn.
|
||
<Ed> certbot was there. He got it.
|
||
<spaf> coolness
|
||
*** Signoff: bill (Bad link?)
|
||
<Casper> ne1 going to hactics thing?
|
||
<venom> me
|
||
<Casper> besides you. duh.
|
||
<Ed> dunno.
|
||
<bartman> not me. I have no desire to pay for anything done by hackers
|
||
<Ed> That reminds me. Did anyone subscribe to Phrack?
|
||
<Pat> nope.
|
||
<bartman> oops. HAHAHAHAHAHA
|
||
<Ed> heh.
|
||
<donn> Whats phrak?
|
||
<neil> nope. my list is better. Who wants on it?
|
||
<Pat> me!
|
||
<donn> what list?
|
||
<Pat> OOH! I have mail! bye!
|
||
<bartman> itz an ansi bomb!
|
||
<Ed> bye Pat
|
||
<Spaf> l8r
|
||
<neil> heh.
|
||
*** Signoff: Pat (Hugs to all)
|
||
<Casper> well, i better do something productive 2. cya
|
||
<venom> slatez d00d.
|
||
*** Signoff: Casper (Hi ho hi ho its off to work I go)
|
||
<donn> man its late. I better go. I gotta speech in the morn
|
||
<Ed> you are getting old.
|
||
<donn> am not
|
||
<Ed> are so
|
||
<donn> am not
|
||
<Ed> are too! infinity
|
||
<donn> hasta
|
||
*** Signoff: donn (|/dev/null)
|
||
<Ed> laterz
|
||
<Spaf> geez. what a bunch of lamers.
|
||
(ray/#CERT) UNBAN ME!
|
||
<Spaf> hahaha
|
||
<Ed> never gives up does he?
|
||
<neil> seriously ed, Ive helped you guys out, send me stuff for REWT.
|
||
<Ed> ill think about it
|
||
<spaf> not
|
||
<neil> it will be most savory. I promise. And secure!
|
||
<spaf> pfft...and monkeys might fly out of my butt
|
||
<Ed> Ill think about it.
|
||
<zen> heh, I should do one called Supernova. Exploding suns. hehe
|
||
<Ed> heh
|
||
<spaf> dats tha tr00f!
|
||
<bartman> i like my sun
|
||
<Ed> i know a bunch of crackerz who like bt's suns too.
|
||
<spaf> hahahahahahahahahaha
|
||
<venom> oh shit. Im late.
|
||
*** Signoff: venom (LATE!)
|
||
<Ed> late 4 what?
|
||
<spaf> his vasectomy. har har
|
||
<neil> heh
|
||
*** REVENGE (kaplan@ai.bpb.arizona.edu) has joined channel #CERT
|
||
*** Mode change "+o REVENGE" on channel #CERT by eff.org
|
||
<Ed> whoops
|
||
*** Mode change "+i" on channel #CERT by REVENGE
|
||
<spaf> fuCK! KICK HIM!
|
||
*** spaf has been kicked off channel #CERT by REVENGE
|
||
*** neil has been kicked off channel #CERT by REVENGE
|
||
*** bartman has been kicked off channel #CERT by REVENGE
|
||
*** Ed has been kicked off channel #CERT by REVENGE
|
||
*** zen has been kicked off channel #CERT by REVENGE
|
||
*** REVENGE is now known as ray
|
||
<ray> hehe
|
||
|
||
---------------------------------------------------------------------
|
||
|
||
****************************************************************************
|
||
|
||
Phrack Library of Periodicals
|
||
|
||
2600
|
||
Subscription Department
|
||
P.O. Box 752
|
||
Middle Island, NY 11953-0752
|
||
$21.00/Year
|
||
|
||
Animation Magazine
|
||
5889 Kanan Road, Suite 317
|
||
Agoura Hills, CA 91301
|
||
$21.00/Year
|
||
|
||
Bank Technology News
|
||
Faulkner & Gray, Inc.
|
||
Eleven Penn Plaza
|
||
New York, NY 10117-0373
|
||
$50.00/Year
|
||
|
||
Ben Is Dead
|
||
P.O. Box 3166
|
||
Hollywood, CA 90028
|
||
$20.00/Year
|
||
|
||
Boardwatch Magazine
|
||
7586 West Jewell Ave., Suite 200
|
||
Lakewood, CO 80232
|
||
$36.00/Year
|
||
|
||
Boing Boing
|
||
11288 Ventura Blvd. #818
|
||
Studio City, CA 91604
|
||
$14.00/Year
|
||
|
||
Communications of the ACM
|
||
1515 Broadway
|
||
New York, NY 10036
|
||
$30/Year
|
||
|
||
CQ - The Radio Amateur's Journal
|
||
76 North Broadway
|
||
Hicksville, NY 11801-9962
|
||
$22.95/Year
|
||
|
||
Details
|
||
P.O. Box 50246
|
||
Boulder, CO 80321
|
||
12.00/Year
|
||
|
||
Dirt
|
||
230 Park Ave
|
||
New York, NY 10169
|
||
(Supplement to Sassy & Marvel Comics)
|
||
|
||
Electronics Now
|
||
Subscription Service
|
||
P.O. Box 51866
|
||
Boulder, CO 80321-1866
|
||
$17.97/Year
|
||
|
||
Farout
|
||
9171 Wilshire Blvd. Suite 300
|
||
Beverly Hills, CA 90210
|
||
$3.95/Issue
|
||
|
||
Fate
|
||
170 Future Way
|
||
P.O. Box 1940
|
||
Marion, OH 43305-1940
|
||
$18.00/Year
|
||
|
||
Femme Fatales
|
||
P.O. Box 270
|
||
Oak Park, IL 60303
|
||
$18.00/Year
|
||
|
||
Film Threat
|
||
Subscriptions Department
|
||
P.O. Box 16928
|
||
N. Hollywood, CA 91615-9960
|
||
$11.85/Year
|
||
|
||
Film Threat Video Guide
|
||
P.O. Box 3170
|
||
Los Angeles, CA 90078-3170
|
||
$12/Year
|
||
|
||
Fringe Ware Review
|
||
P.O. Box 49921
|
||
Austin, TX 78765
|
||
$12.00/Year
|
||
|
||
Future Sex
|
||
1095 Market Street, Suite 809
|
||
San Francisco, CA 94103
|
||
$18.00/Year
|
||
|
||
Gray Areas
|
||
P.O. Box 808
|
||
Broomall, PA 19008-0808
|
||
$18.00/Year
|
||
|
||
High Times
|
||
P.O. Box 410
|
||
Mt. Morris, IL 61054
|
||
$29.95/Year
|
||
|
||
IEEE Spectrum
|
||
445 Hoes Lane
|
||
P.O. Box 1331
|
||
Piscataway, NJ 08855-1331
|
||
800-678-IEEE for info
|
||
|
||
The "I Hate Brenda" Newsletter
|
||
c/o Ben Is Dead
|
||
P.O. Box 3166
|
||
Hollywood, CA 90028
|
||
$2.00
|
||
|
||
InfoSecurity News
|
||
P.O. Box 3168
|
||
Lowell, MA 01853-3168
|
||
$40.00/Year
|
||
|
||
International UFO Library Magazine
|
||
11684 Vewntura Blvd. #708
|
||
Studio City, CA 91604
|
||
$15.00/Year
|
||
|
||
Magical Blend
|
||
1461 Valencia St. Dept. GA
|
||
San Francisco, CA 94110
|
||
$14.00/Year
|
||
|
||
Midnight Engineering
|
||
1700 Washington Ave.
|
||
Rocky Ford, CO 81067-9900
|
||
$19.95/Year
|
||
|
||
Mobile Office
|
||
Subscription Department
|
||
21800 Oxnard St. Suite 250
|
||
Woodland Hills, CA 91367-9644
|
||
$23.90/Year
|
||
|
||
Mondo 2000
|
||
P.O. Box 10171
|
||
Berkeley, CA 94709
|
||
$24.00/Year
|
||
|
||
Monitoring Times
|
||
P.O. Box 98
|
||
140 Dog Branch Road
|
||
Brasstown, NC 28902-0098
|
||
$19.95/Year
|
||
|
||
New Media
|
||
P.O. Box 1771
|
||
Riverton, NJ 08077-9771
|
||
$48.00/Year
|
||
|
||
The Nose
|
||
1095 Market Street, #812
|
||
San Francisco, CA 94103-9654
|
||
$15.00/Year
|
||
|
||
Nuts & Volts
|
||
430 Princeland Court
|
||
Corona, CA 91719-9938
|
||
$17.00/Year
|
||
|
||
Popular Communications
|
||
76 North Broadway
|
||
Hicksville, NY 11801-9962
|
||
$19.95/Year
|
||
|
||
Sassy
|
||
P.O. Box 50093
|
||
Boulder, CO 80321-0093
|
||
$9.97/Year
|
||
|
||
Security Insider Report
|
||
11511 Pine St. North
|
||
Seminole, FL 34642
|
||
$99.00/Year
|
||
|
||
SunExpert Magazine
|
||
1330 Beacon St.
|
||
Brookline, MA 02146-3202
|
||
$60.00/Year
|
||
|
||
Tech Connect
|
||
12407 MoPac Expwy. N. #100-374
|
||
Austin, TX 78758-2499
|
||
$12.00/Year
|
||
|
||
Telephone Engineer & Management
|
||
Advanstar Communications, Inc.
|
||
P.O. Box 6100
|
||
Duluoth, MN 55806-9822
|
||
$24.00/Year
|
||
|
||
UFO
|
||
1536 S. Robertson Blvd.
|
||
Los Angeles, CA 90035
|
||
$21.00/Year
|
||
|
||
Wild Cartoon Kingdom
|
||
9171 Wilshire Blvd., Suite 300
|
||
Beverly Hills, CA 90210
|
||
$3.95/Issue
|
||
|
||
Wired
|
||
P.O. Box 191826
|
||
San Francisco, CA 94119-1826
|
||
$20.00/Year
|
||
|
||
*****************************************************************************
|
||
|
||
!!!!POST EVERYWHERE!!!!
|
||
|
||
THE WORLD'S FIRST NOVEL-ON-THE-NET (tm) SHAREWARE!!!
|
||
By Inter.Pact Press
|
||
|
||
"TERMINAL COMPROMISE"
|
||
by Winn Schwartau
|
||
|
||
A high tech thriller that comes from today's headlines!
|
||
|
||
"The Tom Clancy of computer security."
|
||
Assoc. Prof. Dr. Karen Forcht, James Madison University
|
||
|
||
"Terminal Compromise" is a highly praised novel about the inva-
|
||
sion of the United States by computer terrorists.
|
||
|
||
Since it was first published in conventional print form, (ISBN:
|
||
0-962-87000-5) it has sold extremely well world-wide, but then
|
||
again, it never hit the New York Times Bestseller List either.
|
||
But that's OK, not many do.
|
||
|
||
Recently, someone we know very well came up with a real bright
|
||
idea. They suggested that INTER.PACT Press take the unprece-
|
||
dented, and maybe slightly crazy, step to put "Terminal Compro-
|
||
mise" on the Global Network thus creating a new category for book
|
||
publishers. The idea is to offer "Terminal Compromise," and
|
||
perhaps other titles at NOVEL-ON-THE-NET SHAREWARE(tm) rates to
|
||
millions of people who just don't spend a lot of time in book-
|
||
stores. After discussions with dozens of people - maybe even
|
||
more than a hundred - we decided to do just that. We know that
|
||
we're taking a chance, but we've been convinced by hackers and
|
||
phreakers and corporate types and government representatives that
|
||
putting "Terminal Compromise" on the net would be a fabulous step
|
||
forward into the Electronic Age, (Cyberspace if you will) and
|
||
would encourage other publishers to take advantage of electronic
|
||
distribution. (It's still in the bookstores, though.)
|
||
|
||
To the best of our knowledge, no semi-sorta-kinda-legitimate
|
||
-publisher has ever put a complete pre-published 562 page book on
|
||
the network as a form of Shareware. So, I guess we're making
|
||
news as well as providing a service to the world's electronic
|
||
community. The recommended NOVEL-ON-THE-NET SHAREWARE fees are
|
||
outlined later (this is how we stay in business), so please read
|
||
on.
|
||
|
||
WE KEEP THE COPYRIGHTS!
|
||
|
||
"Terminal Compromise" is NOT being entered into the public
|
||
domain. It is being distributed electronically so hundreds
|
||
of thousands more people can enjoy it and understand just where
|
||
we are heading with our omnipresent interconnectedness and the
|
||
potential dangers we face. INTER.PACT Press maintains all copy-
|
||
rights to "Terminal Compromise" and does not, either intentionally
|
||
or otherwise, explicitly or implicitly, waive any rights to
|
||
this piece of work or recourses deemed appropriate. (Damned
|
||
lawyers.)
|
||
|
||
(C) 1991, 1992, 1993, Inter.Pact Press
|
||
|
||
|
||
|
||
TERMINAL COMPROMISE - THE REVIEWS
|
||
|
||
" . . . a must read . . ."
|
||
Digital News
|
||
|
||
"Schwartau knows about networks and security and creates an
|
||
interesting plot that will keep readers turning the pages."
|
||
Computer World
|
||
|
||
"Terminal Compromise is fast-paced and gripping. Schwartau
|
||
explains complex technology facilely and without condescension."
|
||
Government Computer News
|
||
|
||
"An incredibly fascinating tale of international intrigue . . .
|
||
action . . . characterization . . . deserves attention . . .
|
||
difficult to imagine a more comprehensive resource."
|
||
PC Laptop
|
||
|
||
"Schwartau . . . has a definite flair for intrigue and plot
|
||
twists. (He) makes it clear that the most important assets at
|
||
risk are America's right to privacy and our democratic ideals."
|
||
Personal Identification News
|
||
|
||
"I am all too familiar with the appalling realities in Mr.
|
||
Schwartau's book. (A) potentially catastrophic situation."
|
||
Chris Goggans, Ex-Legion of Doom Member.
|
||
|
||
" . . . chilling scenarios . . . ", "For light summer reading
|
||
with weighty implications . . . ", " . . . thought provoking,
|
||
sometimes chilling . . . "
|
||
|
||
Remember, it's only fiction. Or is it?
|
||
|
||
|
||
|
||
TERMINAL COMPROMISE: SYNOPSIS
|
||
|
||
"It's all about the information . . . the information."
|
||
From "Sneakers"
|
||
|
||
Taki Homosoto, silver haired Chairman of Japan's huge OSO Indus-
|
||
tries, survived Hiroshima; his family didn't. Homosoto promises
|
||
revenge against the United States before he dies. His passion-
|
||
ate, almost obsessive hatred of everything American finally comes
|
||
to a head when he acts upon his desires.
|
||
|
||
With unlimited resources, he comes up with the ultimate way to
|
||
strike back at the enemy. Miles Foster, a brilliant 33 year old
|
||
mathematician apparently isn't exactly fond of America either.
|
||
The National Security Agency wanted his skills, but his back-
|
||
ground and "family" connections kept him from advancing within the
|
||
intelligence community. His insatiable - borderline psychotic-
|
||
sex drive balances the intensity of waging war against his own
|
||
country to the highest bidder.
|
||
|
||
Scott Mason, made his fortune selling high tech toys to the
|
||
Pentagon. Now as a New York City Times reporter, Mason under-
|
||
stands both the good and the evil of technology and discovers
|
||
pieces of the terrible plot which is designed to destroy the
|
||
economy of the United States.
|
||
|
||
Tyrone Duncan, a physically huge 50-ish black senior FBI agent
|
||
who suffered through the Hoover Age indignities, befriends Scott
|
||
Mason. Tyrone provides the inside government track and confusion
|
||
from competing agencies to deal with the threats. His altruistic
|
||
and somewhat pure innate view of the world finally makes him do
|
||
the right thing.
|
||
|
||
As Homosoto's plan evolves, Arab zealots, German intelligence
|
||
agents and a host of technical mercenaries find the weaknesses in
|
||
our techno-economic infrastructure. Victims find themselves
|
||
under attack by unseen adversaries; Wall Street suffers debili-
|
||
tating blows; Ford and Chrysler endure massive shut downs. The
|
||
U.S. economy suffers a series of crushing blows.
|
||
|
||
From the White House to the Pentagon to the CIA to the National
|
||
Security Agency and FBI, a complex weaving of fascinating politi-
|
||
cal characters find themselves enmeshed a battle of the New World
|
||
Order. Sex, drugs, rock'n'roll: Tokyo, Vienna, Paris, Iraq,
|
||
Iran. It's all here.
|
||
|
||
Enjoy reading "Terminal Compromise."
|
||
|
||
|
||
|
||
SHAREWARE - NOVEL FEES:
|
||
|
||
We hope that you enjoy "Terminal Compromise" as much as everyone
|
||
else has, and that you will send us a few shekels according to
|
||
the following guidelines.
|
||
|
||
The NOVEL-ON-THE-NET SHAREWARE(tm) fees for us as a publishing
|
||
company are no different than the fees for software application
|
||
shareware publishers, and the intent is the same. So please, let
|
||
us continue this form of publishing in the future.
|
||
|
||
|
||
NOVEL-ON-THE-NET SHAREWARE Fees For The People:
|
||
|
||
The suggested donation for individuals is $7. If you hate Termi-
|
||
nal Compromise after reading it, then only send $6.50. If you're
|
||
really, really broke, then tell a hundred other people how great
|
||
it was, send us a rave review and post it where you think others
|
||
will enjoy reading it, too. If you're only a little broke, send
|
||
a few dollars. After all, this is how we stay in business. With
|
||
each registration, we will also send a FREE! issue of "Security
|
||
Insider Report," a monthly security newsletter also published by
|
||
Inter.Pact Press.
|
||
|
||
|
||
NOVEL-ON-THE-NET SHAREWARE Fees For Businesses:
|
||
|
||
We hope that you put "Terminal Compromise" on your internal
|
||
networks so that your employees will have the chance to enjoy it
|
||
as well. It's a great way to increase security awareness amongst
|
||
this country's 50,000,000 rank and file computer users. Plus,
|
||
it's a hell of a good read.
|
||
|
||
One company plans on releasing a chapter every few days
|
||
throughout its E-Mail system as a combination of security aware-
|
||
ness and employee 'perc'. Try it; it works and your employees
|
||
will appreciate it. Why? Because they'll all talk about it -
|
||
bringing security awareness to the forefront of discussion.
|
||
|
||
FEES
|
||
|
||
Distribution for up to 100 people on a single network: $ 500
|
||
(Includes 1 Year subscription to "Security Insider Report.")
|
||
|
||
Distribution for up to 1000 people on a single network: $ 3000
|
||
(Includes 10 1 Year subscriptions to "Security Insider
|
||
Report.")
|
||
|
||
Distribution for up to 2500 people on a single network: $ 6250
|
||
(Includes 1 Year electronic Corporate site license to
|
||
"Security Insider Report.")
|
||
|
||
Distribution for up to 5000 people on a single network: $ 10000
|
||
(Includes 1 Year electronic Corporate site license to
|
||
"Security Insider Report.")
|
||
|
||
Distribution for up to 10000 people on a single network: $ 15000
|
||
(Includes 1 Year electronic Corporate site license to
|
||
"Security Insider Report.")
|
||
|
||
Distribution for up to 25000 people on a single network: $ 25000
|
||
(Includes 1 Year electronic Corporate site license to
|
||
"Security Insider Report.")
|
||
|
||
Distribution for more than that - Please call and we'll figure it
|
||
out. Would you like us to coordinate a special distribution
|
||
program for you? Would you like in Postscript or other visual
|
||
formats? Give us a call and we'll see what we can do.
|
||
|
||
* * * * * * * * * *
|
||
Please DO NOT UPLOAD AND DISTRIBUTE "Terminal Compromise"
|
||
into your networks unless you intend on paying the recom-
|
||
mended fees.
|
||
|
||
* * * * * * * * * *
|
||
|
||
|
||
NOVEL-ON-THE-NET SHAREWARE Fees for Universities: FREE!
|
||
|
||
"Terminal Compromise" has been used by many schools and universi-
|
||
ties as a teaching supplement. Recognized Educational institu-
|
||
tions are entitled to use "Terminal Compromise" at NO COST, as
|
||
long as you register with us that you are doing so. Please pro-
|
||
vide: School name, address, etc., the course, the instructor, and
|
||
the reason for using it. Also, we'd like to hear from you and
|
||
tell us how it went. Thanks.
|
||
|
||
|
||
SHAREWARE-NOVEL Fees for Local, State and Federal Governments.
|
||
|
||
You have the money. :-) Please send some back by following
|
||
the same fee guidelines as those for businesses.
|
||
|
||
Government employees: You are The People - same fees are
|
||
appreciated.
|
||
|
||
* * * * * * * * * *
|
||
|
||
Agencies: Do not upload and distribute "Terminal Compromise"
|
||
unless you plan on paying the fees.
|
||
|
||
* * * * * * * * * * *
|
||
|
||
|
||
NOVEL-ON-THE-NET SHAREWARE Fees for the International Community
|
||
Make payments in $US, please.
|
||
|
||
GETTING TERMINAL COMPROMISE:
|
||
|
||
You can get your copy of Terminal Compromise from a lot of
|
||
sites; if you don't see it, just ask around. Currently the novel is
|
||
archived at the following sites:
|
||
|
||
ftp.netsys.com
|
||
/pub/novel
|
||
|
||
wuarchive.wustl.edu
|
||
/doc/misc
|
||
|
||
soda.berkeley.edu
|
||
/pub/novel
|
||
|
||
It consists of either 2 or 5 files, depending upon how you re-
|
||
ceive it. (Details at end of this file.)
|
||
|
||
Feel free to post all five files of "Terminal Compromise" any-
|
||
where on the net or on public or private BBS's as long as this
|
||
file accompanies it as well.
|
||
|
||
|
||
Please forward all NOVEL-ON-THE-NET SHAREWARE fees to:
|
||
|
||
INTER.PACT PRESS
|
||
11511 Pine St. N.
|
||
Seminole, FL., 34642
|
||
|
||
Communications:
|
||
|
||
Phn: 813-393-6600
|
||
Fax: 813-393-6361
|
||
E-Mail: p00506@psi.com
|
||
wschwartau@mcimail.com
|
||
|
||
We will accept checks, money orders, and cash if you must, and we
|
||
mean if you must. It's not the smartest thing in the world to
|
||
send cash through the mail. We are NOT equipped at this point
|
||
for credit cards.
|
||
|
||
Remember, "Terminal Compromise is copyrighted, and we will vigor-
|
||
ously pursue violations of that copyright. (Lawyers made us say
|
||
it again.)
|
||
|
||
If you ABSOLUTELY LOVE "Terminal Compromise," or find that after
|
||
50 pages of On-Screen reading, you may want a hard copy for your
|
||
bookshelf. It is available from bookstores nationwide for
|
||
$19.95, or from Inter.Pact directly for $19.95 + $3.50 shipping
|
||
and handling. If you first paid the $ 7 NOVEL-ON-THE-NET SHARE-
|
||
WARE fee, send in proof and we'll deduct $ 7 from the price of
|
||
the hard copy edition.
|
||
|
||
ISBN: 0-962-87000-5
|
||
|
||
Enjoy "Terminal Compromise" and help us make it an easy decision
|
||
to put more books on the Global Network.
|
||
|
||
Thank you in advance for your attention and your consideration.
|
||
|
||
|
||
|
||
The Publishers,
|
||
INTER.PACT Press
|
||
|
||
|
||
|
||
READING "TERMINAL COMPROMISE"
|
||
|
||
"Terminal Compromise" will come to you in one of two ways:
|
||
|
||
1) Original Distribution Format From Inter.Pact Press contains
|
||
only two -2- files.
|
||
|
||
TC_READ.ME 13,927 Bytes
|
||
|
||
That is this file you are now reading and gives an overview of
|
||
"Terminal Compromise" and how NOVEL-ON-THE-NET Shareware works.
|
||
|
||
TERMCOMP.ZIP 605,821 Bytes
|
||
|
||
This is the total content of "Terminal Compromise". Run PKUNZIP
|
||
to expand the file into four -4- readable ASCII files.
|
||
|
||
2) Some locations may choose to post "Terminal Compromise" in
|
||
readable ASCII form. There will then be four files in addition
|
||
to the TC_READ.ME file.
|
||
|
||
TERMCOMP.1 250,213 Bytes
|
||
|
||
contains the Introduction and Chapters 1 through 5.
|
||
|
||
TERMCOMP.2 337,257 Bytes
|
||
|
||
contains Chapters 6 through 14.
|
||
|
||
TERMCOMP.3 363,615 Bytes
|
||
|
||
contains Chapters 15 through 21.
|
||
|
||
TERMCOMP.4 388,515 Bytes
|
||
|
||
contains Chapters 22 through 30 and the Epilogue.
|
||
|
||
|
||
Enjoy "Terminal Compromise!" and pass it on to whomever you
|
||
think would enjoy it, too!
|
||
|
||
Thank You!
|
||
|
||
****************************************************************************
|
||
|
||
THE STATE OF SECURITY IN CYBERSPACE
|
||
|
||
SRI International conducted a worldwide study in 1992 of a broad range of
|
||
security issues in "cyberspace." In brief, cyberspace is the full set of
|
||
public and private communications networks in the United States and elsewhere,
|
||
including telephone or public switched telephone networks (PSTNs), packet data
|
||
networks (PDNs) of various kinds, pure computer networks, including the
|
||
Internet, and wireless communications systems, such as the cellular telephone
|
||
system. We did not address security vulnerabilities associated with
|
||
classified, secure communications networks used by and for governments.
|
||
|
||
The study was conducted as part of our ongoing research into the
|
||
vulnerabilities of various software components of cyberspace. Our approach was
|
||
to conduct research through field interviews with a broad range of experts,
|
||
including people we characterize as "good hackers," about security issues and
|
||
vulnerabilities of cyberspace and the activities of the international
|
||
"malicious hacker" community.
|
||
|
||
While the specific results of the study are proprietary to SRI, this brief
|
||
report summarizes our general conclusions for the many individuals who kindly
|
||
participated in our field interviews. As we indicated during our field
|
||
interviews, the original research for this project was not part of any other
|
||
kind of investigation, and we have not revealed the identify of any of our
|
||
respondents.
|
||
|
||
The study aimed to understand "malicious hackers," that is, people who have and
|
||
use the technical knowledge, capability, and motivation to gain unauthorized
|
||
access, for various reasons, to systems in cyberspace. It is important to
|
||
understand that by no means all hackers are malicious nor does most hacking
|
||
involve unauthorized access to cyberspace systems; indeed, only a small
|
||
fraction of computer hacking involves such activities but gives hacking an
|
||
otherwise undeserved bad reputation. While we attempted to focus on technical
|
||
(software) vulnerabilities, our interviews led us to look more at the broader
|
||
motivations and different approaches to cracking into various networks and
|
||
networked systems.
|
||
|
||
MAIN CONCLUSIONS
|
||
|
||
Our main conclusion is that social, organizational, and technological factors
|
||
still combine in ways that make much of cyberspace relatively vulnerable to
|
||
unauthorized access. The degree of vulnerability varies from one type of
|
||
communications system to another. In general, the PSTN is the least vulnerable
|
||
system, the PDNs are somewhat more vulnerable than the PSTN, the Internet is
|
||
relatively insecure, and as is widely known, the cellular phone system is the
|
||
most vulnerable of the four major areas we addressed.
|
||
|
||
The main vulnerabilities in most communications networks involves procedural,
|
||
administrative, and human weaknesses, rather than purely technical
|
||
vulnerabilities of network management, control systems, and hardware, and
|
||
software. There are technical vulnerabilities--poor system design and specific
|
||
security flaws in software--but they are mainly exploitable because of the
|
||
above problems.
|
||
|
||
Highlights of the study's conclusions include:
|
||
|
||
o Malicious attacks on most networks and networked systems cannot be completely
|
||
prevented, now or in the future. More than enough information is publicly
|
||
available to hackers and other technically-literate people to preclude attempts
|
||
at prevention of intrusions.
|
||
|
||
o It is possible individuals or groups could bring down individual systems or
|
||
related groups of systems, on purpose or by accident. However, security is
|
||
generally improving as a result of dealing with past threats and challenges to
|
||
system security. For instance, responses to the most recent serious threat to
|
||
the Internet, the so-called Internet Worm in 1989, included improved security
|
||
at sites vulnerable to this sort of worm.
|
||
|
||
o We found no evidence that the current generation of U.S. hackers is
|
||
attempting to sabotage entire networks. On the contrary, doing so is
|
||
inconsistent with the stated ethics and values of the hacker community, which
|
||
are to explore cyberspace as a purely intellectual exercise without malicious
|
||
intent or behavior. Some individuals who operate outside this informal ethical
|
||
framework, however, can and do damage specific systems and occasionally use
|
||
systems for personal gain or vindictive activities.
|
||
|
||
o There is some evidence that the newest generations of hackers, may be more
|
||
motivated by personal gain than the traditional ethic of sheer curiosity. This
|
||
development could mean that networks and networked systems could become more
|
||
likely targets for attacks by hardened criminals or governments' intelligence
|
||
services or their contractors (i.e., employing malicious hackers). This threat
|
||
does not appear to be significant today but is a possible future scenario.
|
||
|
||
o The four major areas of vulnerability uncovered in our research have little
|
||
or nothing to do with specific software vulnerabilities per se. They relate
|
||
more to the ways in which hackers can gain critical information they need in
|
||
order to exploit vulnerabilities that exist because of poor systems
|
||
administration and maintenance, unpatched "holes" in networks and systems, and
|
||
so on.
|
||
- The susceptibility of employees of businesses, public organizations, schools,
|
||
and other institutions to "social engineering" techniques
|
||
- Lax physical and procedural controls
|
||
- The widespread availability of non-proprietary and of sensitive and
|
||
proprietary information on paper about networks and computer systems
|
||
- The existence of "moles," employees of communications and computer firms and
|
||
their suppliers who knowingly provide proprietary information to hackers.
|
||
|
||
o The vulnerabilities caused by shortcomings in software-based access controls
|
||
and in hardware-related issues constitute significantly lower levels of risk
|
||
than do the four areas discussed above on more secure networks such as the PSTN
|
||
and PDNs. However, on the Internet and similar systems, software-based access
|
||
controls (for instance, password systems) constitute significant problems
|
||
because of often poor system maintenance and other procedural flaws.
|
||
|
||
RECOMMENDATIONS
|
||
|
||
Based on our research, we recommend the following:
|
||
|
||
1. Protection of organizational information and communications assets should be
|
||
improved. Issues here range from those involving overall security systems to
|
||
training employees and customers about maintenance of security on individual
|
||
systems, handling and disposition of sensitive printed information, and dealing
|
||
with "social engineering."
|
||
|
||
2. Techniques used to protect physical assets should be improved. For example,
|
||
doors and gates should be locked properly and sensitive documents and equipment
|
||
guarded appropriately.
|
||
|
||
3. Organizations and their employees should be made aware of the existence and
|
||
role of moles in facilitating and enabling hacker intrusions, and care taken in
|
||
hiring and motivating employees with the mole problem in mind.
|
||
|
||
4. Software- and hardware-based vulnerabilities should also be addressed as a
|
||
matter of course in systems design, installation and maintenance.
|
||
|
||
5. Organizations concerned with information and communications security should
|
||
proactively promote educational programs for students and parents about
|
||
appropriate computer and communications use, personal integrity and ethics, and
|
||
legitimate career opportunities in the information industry, and reward
|
||
exemplary skills, proficiency and achievements in programming and ethical
|
||
hacking.
|
||
|
||
6. Laws against malicious hacking should be fairly and justly enforced.
|
||
|
||
SRI's believes that the results of this study will provide useful information
|
||
to both the operators and users of cyberspace, including the hacker community.
|
||
We are planning to continue our research in this area during 1993 within the
|
||
same framework and conditions (i.e., anonymity of all parties and
|
||
organizations) as we conducted the 1992 research. We invite hackers and others
|
||
who are interested in participating in this work through face-to-face,
|
||
telephone or email interviews should contact one of the following members of
|
||
the SRI project team:
|
||
|
||
A. J. Bate
|
||
SRI International
|
||
Phone: 415 859 2206
|
||
Fax: 415 859 3154
|
||
Email: aj_bate@qm.sri.com,
|
||
aj@sri.com
|
||
|
||
Stuart Hauser
|
||
SRI International
|
||
Phone: 415 859 5755
|
||
Fax: 415 859 3154
|
||
Email: stuart_hauser@qm.sri.com
|
||
|
||
Tom Mandel
|
||
SRI International
|
||
Phone: 415 859 2365
|
||
FAX: 415 859 7544
|
||
Email: mandel@unix.sri.com
|
||
|
||
***************************************************************************** |