mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1158 lines
36 KiB
Text
1158 lines
36 KiB
Text
==Phrack Magazine==
|
||
|
||
Volume Six, Issue Forty-Seven, File 6 of 22
|
||
|
||
|
||
|
||
18. What is an Internet Outdial?
|
||
|
||
An Internet outdial is a modem connected to the Internet than you can
|
||
use to dial out. Normal outdials will only call local numbers. A GOD
|
||
(Global OutDial) is capable of calling long distance. Outdials are an
|
||
inexpensive method of calling long distance BBS's.
|
||
|
||
|
||
19. What are some Internet Outdials?
|
||
|
||
This FAQ answer is excerpted from CoTNo #5:
|
||
|
||
Internet Outdial List v3.0
|
||
by Cavalier and DisordeR
|
||
|
||
|
||
Introduction
|
||
------------
|
||
There are several lists of Internet outdials floating around the net these
|
||
days. The following is a compilation of other lists, as well as v2.0 by
|
||
DeadKat(CoTNo issue 2, article 4). Unlike other lists where the author
|
||
just ripped other people and released it, we have sat down and tested
|
||
each one of these. Some of them we have gotten "Connection Refused" or
|
||
it timed out while trying to connect...these have been labeled dead.
|
||
|
||
|
||
Working Outdials
|
||
----------------
|
||
as of 12/29/94
|
||
|
||
NPA IP Address Instructions
|
||
--- ---------- ------------
|
||
215 isn.upenn.edu modem
|
||
|
||
217 dialout.cecer.army.mil atdt x,xxxXXXXX
|
||
|
||
218 modem.d.umn.edu atdt9,xxxXXXX
|
||
|
||
303 yuma.acns.colostate.edu 3020
|
||
|
||
412 gate.cis.pitt.edu tn3270,
|
||
connect dialout.pitt.edu,
|
||
atdtxxxXXXX
|
||
|
||
413 dialout2400.smith.edu Ctrl } gets ENTER NUMBER: xxxxxxx
|
||
|
||
502 outdial.louisville.edu
|
||
|
||
502 uknet.uky.edu connect kecnet
|
||
@ dial: "outdial2400 or out"
|
||
|
||
602 acssdial.inre.asu.edu atdt8,,,,,[x][yyy]xxxyyyy
|
||
|
||
614 ns2400.acs.ohio-state.edu
|
||
|
||
614 ns9600.acs.ohio-state.edu
|
||
|
||
713 128.249.27.153 atdt x,xxxXXXX
|
||
|
||
714 modem.nts.uci.edu atdt[area]0[phone]
|
||
|
||
804 ublan.virginia.edu connect hayes, 9,,xxx-xxxx
|
||
|
||
804 ublan2.acc.virginia.edu connect telnet
|
||
connect hayes
|
||
|
||
|
||
|
||
Need Password
|
||
-------------
|
||
|
||
206 rexair.cac.washington.edu This is an unbroken password
|
||
303 yuma.ACNS.ColoState.EDU login: modem
|
||
404 128.140.1.239 .modem8|CR
|
||
415 annex132-1.EECS.Berkeley.EDU "dial1" or "dial2" or "dialer1"
|
||
514 cartier.CC.UMontreal.CA externe,9+number
|
||
703 wal-3000.cns.vt.edu dial2400 -aa
|
||
|
||
|
||
Dead/No Connect
|
||
---------------
|
||
|
||
201 idsnet
|
||
202 modem.aidt.edu
|
||
204 dial.cc.umanitoba.ca
|
||
204 umnet.cc.manitoba.ca "dial12" or "dial24"
|
||
206 dialout24.cac.washington.edu
|
||
207 modem-o.caps.maine.edu
|
||
212 B719-7e.NYU.EDU dial3/dial12/dial24
|
||
212 B719-7f.NYU.EDU dial3/dial12/dial24
|
||
212 DIALOUT-1.NYU.EDU dial3/dial12/dial24
|
||
212 FREE-138-229.NYU.EDU dial3/dial12/dial24
|
||
212 UP19-4b.NYU.EDU dial3/dial12/dial24
|
||
215 wiseowl.ocis.temple.edu "atz" "atdt 9xxxyyyy"
|
||
218 aa28.d.umn.edu "cli" "rlogin modem"
|
||
at "login:" type "modem"
|
||
218 modem.d.umn.edu Hayes 9,XXX-XXXX
|
||
301 dial9600.umd.edu
|
||
305 alcat.library.nova.edu
|
||
305 office.cis.ufl.edu
|
||
307 modem.uwyo.edu Hayes 0,XXX-XXXX
|
||
313 35.1.1.6 dial2400-aa or dial1200-aa
|
||
or dialout
|
||
402 dialin.creighton.edu
|
||
402 modem.criegthon.edu
|
||
404 broadband.cc.emory.edu ".modem8" or ".dialout"
|
||
408 dialout.scu.edu
|
||
408 dialout1200.scu.edu
|
||
408 dialout2400.scu.edu
|
||
408 dialout9600.scu.edu
|
||
413 dialout.smith.edu
|
||
414 modems.uwp.edu
|
||
416 annex132.berkely.edu atdt 9,,,,, xxx-xxxx
|
||
416 pacx.utcs.utoronto.ca modem
|
||
503 dialout.uvm.edu
|
||
513 dialout24.afit.af.mil
|
||
513 r596adi1.uc.edu
|
||
514 pacx.CC.UMontreal.CA externe#9 9xxx-xxxx
|
||
517 engdial.cl.msu.edu
|
||
602 dial9600.telcom.arizona.edu
|
||
603 dialout1200.unh.edu
|
||
604 dial24-nc00.net.ubc.ca
|
||
604 dial24-nc01.net.ubc.ca
|
||
604 dial96-np65.net.ubc.ca
|
||
604 gmodem.capcollege.bc.ca
|
||
604 hmodem.capcollege.bc.ca
|
||
609 128.119.131.11X (X= 1 - 4) Hayes
|
||
609 129.119.131.11x (x = 1 to 4)
|
||
609 wright-modem-1.rutgers.edu
|
||
609 wright-modem-2.rutgers.edu
|
||
612 modem_out12e7.atk.com
|
||
612 modem_out24n8.atk.com
|
||
614 ns2400.ircc.ohio-state.edu "dial"
|
||
615 dca.utk.edu dial2400 D 99k #
|
||
615 MATHSUN23.MATH.UTK.EDU dial 2400 d 99Kxxxxxxx
|
||
616 modem.calvin.edu
|
||
617 128.52.30.3 2400baud
|
||
617 dialout.lcs.mit.edu
|
||
617 dialout1.princeton.edu
|
||
617 isdn3.Princeton.EDU
|
||
617 jadwingymkip0.Princeton.EDU
|
||
617 lord-stanley.Princeton.EDU
|
||
617 mpanus.Princeton.EDU
|
||
617 mrmodem.wellesley.edu
|
||
617 old-dialout.Princeton.EDU
|
||
617 stagger.Princeton.EDU
|
||
617 sunshine-02.lcs.mit.edu
|
||
617 waddle.Princeton.EDU
|
||
619 128.54.30.1 atdt [area][phone]
|
||
619 dialin.ucsd.edu "dialout"
|
||
703 modem_pool.runet.edu
|
||
703 wal-3000.cns.vt.edu
|
||
713 128.249.27.154 "c modem96" "atdt 9xxx-xxxx"
|
||
or "Hayes"
|
||
713 modem12.bcm.tmc.edu
|
||
713 modem24.bcm.tmc.edu
|
||
713 modem24.bcm.tmc.edu
|
||
714 mdmsrv7.sdsu.edu atdt 8xxx-xxxx
|
||
714 modem24.nts.uci.edu
|
||
714 pub-gopher.cwis.uci.edu
|
||
801 dswitch.byu.edu "C Modem"
|
||
808 irmodem.ifa.hawaii.edu
|
||
902 star.ccs.tuns.ca "dialout"
|
||
916 129.137.33.72
|
||
916 cc-dnet.ucdavis.edu connect hayes/dialout
|
||
916 engr-dnet1.engr.ucdavis.edu UCDNET <ret> C KEYCLUB <ret>
|
||
??? 128.119.131.11X (1 - 4)
|
||
??? 128.200.142.5
|
||
??? 128.54.30.1 nue, X to discontinue, ? for Help
|
||
??? 128.6.1.41
|
||
??? 128.6.1.42
|
||
??? 129.137.33.72
|
||
??? 129.180.1.57
|
||
??? 140.112.3.2 ntu <none>
|
||
??? annexdial.rz.uni-duesseldorf.de
|
||
??? dial96.ncl.ac.uk
|
||
??? dialout.plk.af.mil
|
||
??? ee21.ee.ncu.edu.tw cs8005
|
||
??? im.mgt.ncu.edu.tw guest <none>
|
||
??? modem.cis.uflu.edu
|
||
??? modem.ireq.hydro.qc.ca
|
||
??? modems.csuohio.edu
|
||
??? sparc20.ncu.edu.tw u349633
|
||
??? sun2cc.nccu.edu.tw ?
|
||
??? ts-modem.une.oz.au
|
||
??? twncu865.ncu.edu.tw guest <none>
|
||
??? vtnet1.cns.ut.edu "CALL" or "call"
|
||
|
||
|
||
Conclusion
|
||
----------
|
||
If you find any of the outdials to have gone dead, changed commands,
|
||
or require password, please let us know so we can keep this list as
|
||
accurate as possible. If you would like to add to the list, feel free
|
||
to mail us and it will be included in future versions of this list,
|
||
with your name beside it. Have fun...
|
||
|
||
[Editors note: Updates have been made to this document after
|
||
the original publication]
|
||
|
||
|
||
20. What is this system?
|
||
|
||
|
||
AIX
|
||
~~~
|
||
IBM AIX Version 3 for RISC System/6000
|
||
(C) Copyrights by IBM and by others 1982, 1990.
|
||
login:
|
||
|
||
[You will know an AIX system because it is the only Unix system that]
|
||
[clears the screen and issues a login prompt near the bottom of the]
|
||
[screen]
|
||
|
||
|
||
AS/400
|
||
~~~~~~
|
||
UserID?
|
||
Password?
|
||
|
||
Once in, type GO MAIN
|
||
|
||
|
||
CDC Cyber
|
||
~~~~~~~~~
|
||
WELCOME TO THE NOS SOFTWARE SYSTEM.
|
||
COPYRIGHT CONTROL DATA 1978, 1987.
|
||
|
||
88/02/16. 02.36.53. N265100
|
||
CSUS CYBER 170-730. NOS 2.5.2-678/3.
|
||
FAMILY:
|
||
|
||
You would normally just hit return at the family prompt. Next prompt is:
|
||
|
||
USER NAME:
|
||
|
||
|
||
CISCO Router
|
||
~~~~~~~~~~~~
|
||
FIRST BANK OF TNO
|
||
95-866 TNO VirtualBank
|
||
REMOTE Router - TN043R1
|
||
|
||
Console Port
|
||
|
||
SN - 00000866
|
||
|
||
TN043R1>
|
||
|
||
|
||
DECserver
|
||
~~~~~~~~~
|
||
DECserver 700-08 Communications Server V1.1 (BL44G-11A) - LAT V5.1
|
||
DPS502-DS700
|
||
|
||
(c) Copyright 1992, Digital Equipment Corporation - All Rights Reserved
|
||
|
||
Please type HELP if you need assistance
|
||
|
||
Enter username> TNO
|
||
|
||
Local>
|
||
|
||
|
||
Hewlett Packard MPE-XL
|
||
~~~~~~~~~~~~~~~~~~~~~~
|
||
MPE XL:
|
||
EXPECTED A :HELLO COMMAND. (CIERR 6057)
|
||
MPE XL:
|
||
EXPECTED [SESSION NAME,] USER.ACCT [,GROUP] (CIERR 1424)
|
||
MPE XL:
|
||
|
||
|
||
GTN
|
||
~~~
|
||
WELCOME TO CITIBANK. PLEASE SIGN ON.
|
||
XXXXXXXX
|
||
|
||
@
|
||
PASSWORD =
|
||
|
||
@
|
||
|
||
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
PLEASE ENTER YOUR ID:-1->
|
||
PLEASE ENTER YOUR PASSWORD:-2->
|
||
|
||
CITICORP (CITY NAME). KEY GHELP FOR HELP.
|
||
XXX.XXX
|
||
PLEASE SELECT SERVICE REQUIRED.-3->
|
||
|
||
|
||
Lantronix Terminal Server
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
Lantronix ETS16 Version V3.1/1(940623)
|
||
|
||
Type HELP at the 'Local_15> ' prompt for assistance.
|
||
|
||
Login password>
|
||
|
||
|
||
Meridian Mail (Northern Telecom Phone/Voice Mail System)
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
MMM MMMERIDIAN
|
||
MMMMM MMMMM
|
||
MMMMMM MMMMMM
|
||
MMM MMMMM MMM MMMMM MMMMM
|
||
MMM MMM MMM MMMMMM MMMMMM
|
||
MMM MMM MMM MMM MMM MMM
|
||
MMM MMM MMM MMMMM MMM
|
||
MMM MMM MMM MMM MMM
|
||
MMM MMM MMM MMM
|
||
MMM MMM MMM MMM
|
||
MMM MMM MMM MMM
|
||
MMM MMM MMM MMM
|
||
MMM MMM MMM MMM
|
||
|
||
Copyright (c) Northern Telecom, 1991
|
||
|
||
|
||
Novell ONLAN
|
||
~~~~~~~~~~~~
|
||
N
|
||
|
||
[To access the systems it is best to own a copy of ONLAN/PC]
|
||
|
||
|
||
PC-Anywhere
|
||
~~~~~~~~~~~
|
||
P
|
||
|
||
[To access the systems it is best to own a copy of PCAnywhere Remote]
|
||
|
||
|
||
PRIMOS
|
||
~~~~~~
|
||
PRIMENET 19.2.7F PPOA1
|
||
|
||
<any text>
|
||
|
||
ER!
|
||
|
||
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
||
CONNECT
|
||
Primenet V 2.3 (system)
|
||
LOGIN (you)
|
||
User id? (system)
|
||
SAPB5 (you)
|
||
Password? (system)
|
||
DROWSAP (you)
|
||
OK, (system)
|
||
|
||
|
||
ROLM-OSL
|
||
~~~~~~~~
|
||
MARAUDER10292 01/09/85(^G) 1 03/10/87 00:29:47
|
||
RELEASE 8003
|
||
OSL, PLEASE.
|
||
?
|
||
|
||
|
||
System75
|
||
~~~~~~~~
|
||
Login: root
|
||
INCORRECT LOGIN
|
||
|
||
Login: browse
|
||
Password:
|
||
|
||
Software Version: G3s.b16.2.2
|
||
|
||
Terminal Type (513, 4410, 4425): [513]
|
||
|
||
|
||
Tops-10
|
||
~~~~~~~
|
||
NIH Timesharing
|
||
|
||
NIH Tri-SMP 7.02-FF 16:30:04 TTY11
|
||
system 1378/1381/1453 Connected to Node Happy(40) Line # 12
|
||
Please LOGIN
|
||
.
|
||
|
||
|
||
VM/370
|
||
~~~~~~
|
||
VM/370
|
||
!
|
||
|
||
|
||
VM/ESA
|
||
~~~~~~
|
||
VM/ESA ONLINE
|
||
|
||
TBVM2 VM/ESA Rel 1.1 PUT 9200
|
||
|
||
Fill in your USERID and PASSWORD and press ENTER
|
||
(Your password will not appear when you type it)
|
||
USERID ===>
|
||
PASSWORD ===>
|
||
|
||
COMMAND ===>
|
||
|
||
|
||
Xylogics Annex Communications Server
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
Annex Command Line Interpreter * Copyright 1991 Xylogics, Inc.
|
||
|
||
Checking authorization, Please wait...
|
||
Annex username: TNO
|
||
Annex password:
|
||
|
||
Permission granted
|
||
annex:
|
||
|
||
|
||
21. What are the default accounts for XXX?
|
||
|
||
AIX
|
||
~~~
|
||
guest guest
|
||
|
||
|
||
AS/400
|
||
~~~~~~
|
||
qsecofr qsecofr /* master security officer */
|
||
qsysopr qsysopr /* system operator */
|
||
qpgmr qpgmr /* default programmer */
|
||
|
||
also
|
||
|
||
ibm/password
|
||
ibm/2222
|
||
ibm/service
|
||
qsecofr/1111111
|
||
qsecofr/2222222
|
||
qsvr/qsvr
|
||
secofr/secofr
|
||
|
||
|
||
DECserver
|
||
~~~~~~~~~
|
||
ACCESS
|
||
SYSTEM
|
||
|
||
|
||
Dynix (The library software, not the UnixOS)
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
(Type 'later' to exit to the login prompt)
|
||
setup <no password>
|
||
library <no password>
|
||
circ <9 digit number>
|
||
|
||
|
||
Hewlett Packard MPE-XL
|
||
~~~~~~~~~~~~~~~~~~~~~~
|
||
HELLO MANAGER.SYS
|
||
HELLO MGR.SYS
|
||
HELLO FIELD.SUPPORT HPUNSUP or SUPPORT or HP
|
||
HELLO OP.OPERATOR
|
||
MGR CAROLIAN
|
||
MGR CCC
|
||
MGR CNAS
|
||
MGR CONV
|
||
MGR COGNOS
|
||
OPERATOR COGNOS
|
||
MANAGER COGNOS
|
||
OPERATOR DISC
|
||
MGR HPDESK
|
||
MGR HPWORD
|
||
FIELD HPWORD
|
||
MGR HPOFFICE
|
||
SPOOLMAN HPOFFICE
|
||
ADVMAIL HPOFFICE
|
||
MAIL HPOFFICE
|
||
WP HPOFFICE
|
||
MANAGER HPOFFICE
|
||
MGR HPONLY
|
||
FIELD HPP187
|
||
MGR HPP187
|
||
MGR HPP189
|
||
MGR HPP196
|
||
MGR INTX3
|
||
MGR ITF3000
|
||
MANAGER ITF3000
|
||
MAIL MAIL
|
||
MGR NETBASE
|
||
MGR REGO
|
||
MGR RJE
|
||
MGR ROBELLE
|
||
MANAGER SECURITY
|
||
MGR SECURITY
|
||
FIELD SERVICE
|
||
MANAGER SYS
|
||
MGR SYS
|
||
PCUSER SYS
|
||
RSBCMON SYS
|
||
OPERATOR SYS
|
||
OPERATOR SYSTEM
|
||
FIELD SUPPORT
|
||
OPERATOR SUPPORT
|
||
MANAGER TCH
|
||
MAIL TELESUP
|
||
MANAGER TELESUP
|
||
MGR TELESUP
|
||
SYS TELESUP
|
||
MGE VESOFT
|
||
MGE VESOFT
|
||
MGR WORD
|
||
MGR XLSERVER
|
||
|
||
Common jobs are Pub, Sys, Data
|
||
Common passwords are HPOnly, TeleSup, HP, MPE, Manager, MGR, Remote
|
||
|
||
|
||
Major BBS
|
||
~~~~~~~~~
|
||
Sysop Sysop
|
||
|
||
|
||
Mitel PBX
|
||
~~~~~~~~~
|
||
SYSTEM
|
||
|
||
|
||
Nomadic Computing Environment (NCE) on the Tadpole Technologies SPARCBook3
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
fax <no password>
|
||
|
||
|
||
PICK O/S
|
||
~~~~~~~~
|
||
DSA # Desquetop System Administrator
|
||
DS
|
||
DESQUETOP
|
||
PHANTOM
|
||
|
||
|
||
Prolog
|
||
~~~~~~
|
||
PBX PBX
|
||
NETWORK NETWORK
|
||
NETOP <null>
|
||
|
||
|
||
Rolm
|
||
~~~~
|
||
CBX Defaults
|
||
|
||
op op
|
||
op operator
|
||
su super
|
||
admin pwp
|
||
eng engineer
|
||
|
||
|
||
PhoneMail Defaults
|
||
|
||
sysadmin sysadmin
|
||
tech tech
|
||
poll tech
|
||
|
||
|
||
RSX
|
||
~~~
|
||
SYSTEM/SYSTEM (Username SYSTEM, Password SYSTEM)
|
||
1,1/system (Directory [1,1] Password SYSTEM)
|
||
BATCH/BATCH
|
||
SYSTEM/MANAGER
|
||
USER/USER
|
||
|
||
Default accounts for Micro/RSX:
|
||
|
||
MICRO/RSX
|
||
|
||
Alternately you can hit <CTRL-Z> when the boot sequence asks you for the
|
||
date and create an account using:
|
||
|
||
RUN ACNT
|
||
or RUN $ACNT
|
||
|
||
(Numbers below 10 {oct} are Priveleged)
|
||
|
||
Reboot and wait for the date/time question. Type ^C and at the MCR prompt,
|
||
type "abo at." You must include the . dot!
|
||
|
||
If this works, type "acs lb0:/blks=1000" to get some swap space so the
|
||
new step won't wedge.
|
||
|
||
type " run $acnt" and change the password of any account with a group
|
||
number of 7 or less.
|
||
|
||
You may find that the ^C does not work. Try ^Z and ESC as well.
|
||
Also try all 3 as terminators to valid and invalid times.
|
||
|
||
If none of the above work, use the halt switch to halt the system,
|
||
just after a invalid date-time. Look for a user mode PSW 1[4-7]xxxx.
|
||
then deposit 177777 into R6, cross your fingers, write protect the drive
|
||
and continue the system. This will hopefully result in indirect blowing
|
||
up... And hopefully the system has not been fully secured.
|
||
|
||
|
||
SGI Irix
|
||
~~~~~~~~
|
||
4DGifts <no password>
|
||
guest <no password>
|
||
demos <no password>
|
||
lp <no password>
|
||
nuucp <no password>
|
||
tour <no password>
|
||
tutor <no password>
|
||
|
||
|
||
System 75
|
||
~~~~~~~~~
|
||
bcim bcimpw
|
||
bciim bciimpw
|
||
bcms bcmspw, bcms
|
||
bcnas bcnspw
|
||
blue bluepw
|
||
browse looker, browsepw
|
||
craft crftpw, craftpw, crack
|
||
cust custpw
|
||
enquiry enquirypw
|
||
field support
|
||
inads indspw, inadspw, inads
|
||
init initpw
|
||
kraft kraftpw
|
||
locate locatepw
|
||
maint maintpw, rwmaint
|
||
nms nmspw
|
||
rcust rcustpw
|
||
support supportpw
|
||
tech field
|
||
|
||
|
||
Taco Bell
|
||
~~~~~~~~~
|
||
rgm rollout
|
||
tacobell <null>
|
||
|
||
|
||
Verifone Junior 2.05
|
||
~~~~~~~~~~~~~~~~~~~~
|
||
Default password: 166816
|
||
|
||
|
||
VMS
|
||
~~~
|
||
field service
|
||
systest utep
|
||
|
||
|
||
XON / XON Junior
|
||
~~~~~~~~~~~~~~~~
|
||
Default password: 166831
|
||
|
||
|
||
22. What port is XXX on?
|
||
|
||
The file /etc/services on most Unix machines lists the port
|
||
assignments for that machine. For a complete list of port
|
||
assignments, read RFC (Request For Comments) 1700 "Assigned Numbers"
|
||
|
||
|
||
23. What is a trojan/worm/virus/logic bomb?
|
||
|
||
This FAQ answer was written by Theora:
|
||
|
||
Trojan:
|
||
|
||
Remember the Trojan Horse? Bad guys hid inside it until they could
|
||
get into the city to do their evil deed. A trojan computer program is
|
||
similar. It is a program which does an unauthorized function, hidden
|
||
inside an authorized program. It does something other than what it
|
||
claims to do, usually something malicious (although not necessarily!),
|
||
and it is intended by the author to do whatever it does. If it's not
|
||
intentional, its called a 'bug' or, in some cases, a feature :) Some
|
||
virus scanning programs detect some trojans. Some virus scanning
|
||
programs don't detect any trojans. No virus scanners detect all
|
||
trojans.
|
||
|
||
Virus:
|
||
|
||
A virus is an independent program which reproduces itself. It may
|
||
attach to other programs, it may create copies of itself (as in
|
||
companion viruses). It may damage or corrupt data, change data, or
|
||
degrade the performance of your system by utilizing resources such as
|
||
memory or disk space. Some virus scanners detect some viruses. No
|
||
virus scanners detect all viruses. No virus scanner can protect
|
||
against "any and all viruses, known and unknown, now and forevermore".
|
||
|
||
Worm:
|
||
|
||
Made famous by Robert Morris, Jr. , worms are programs which reproduce
|
||
by copying themselves over and over, system to system, using up
|
||
resources and sometimes slowing down the systems. They are self
|
||
contained and use the networks to spread, in much the same way viruses
|
||
use files to spread. Some people say the solution to viruses and
|
||
worms is to just not have any files or networks. They are probably
|
||
correct. We would include computers.
|
||
|
||
Logic Bomb:
|
||
|
||
Code which will trigger a particular form of 'attack' when a
|
||
designated condition is met. For instance, a logic bomb could delete
|
||
all files on Dec. 5th. Unlike a virus, a logic bomb does not make
|
||
copies of itself.
|
||
|
||
|
||
24. How can I protect myself from viruses and such?
|
||
|
||
This FAQ answer was written by Theora:
|
||
|
||
The most common viruses are boot sector infectors. You can help
|
||
protect yourself against those by write protecting all disks which you
|
||
do not need write access to. Definitely keep a set of write protected
|
||
floppy system disks. If you get a virus, it will make things much
|
||
simpler. And, they are good for coasters. Only kidding.
|
||
|
||
Scan all incoming files with a recent copy of a good virus scanner.
|
||
Among the best are F-Prot, Dr. Solomon's Anti-virus Toolkit, and
|
||
Thunderbyte Anti-Virus. AVP is also a good proggie. Using more than
|
||
one scanner could be helpful. You may get those one or two viruses
|
||
that the other guy happened to miss this month.
|
||
|
||
New viruses come out at the rate of about 8 per day now. NO scanner
|
||
can keep up with them all, but the four mentioned here do the best job
|
||
of keeping current. Any _good_ scanner will detect the majority of
|
||
common viruses. No virus scanner will detect all viruses.
|
||
|
||
Right now there are about 5600 known viruses. New ones are written
|
||
all the time. If you use a scanner for virus detection, you need to
|
||
make sure you get frequent updates. If you rely on behaviour
|
||
blockers, you should know that such programs can be bypassed easily by
|
||
a technique known as tunnelling.
|
||
|
||
You may want to use integrity checkers as well as scanners. Keep in
|
||
mind that while these can supply added protection, they are not
|
||
foolproof.
|
||
|
||
You may want to use a particular kind of scanner, called resident
|
||
scanners. Those are programs which stay resident in the computer
|
||
memory and constantly monitor program execution (and sometimes even
|
||
access to the files containing programs). If you try to execute a
|
||
program, the resident scanner receives control and scans it first for
|
||
known viruses. Only if no such viruses are found, the program is
|
||
allowed to execute.
|
||
|
||
Most virus scanners will not protect you against many kinds of
|
||
trojans, any sort of logic bombs, or worms. Theoretically, they
|
||
_could_ protect you against logic bombs and/or worms, by addition of
|
||
scanning strings; however, this is rarely done.
|
||
|
||
The best, actually only way, to protect yourself is to know what you
|
||
have on your system and make sure what you have there is authorised by
|
||
you. Make freqent backups of all important files. Keep your DOS
|
||
system files write protected. Write protect all disks that you do not
|
||
need to write to. If you do get a virus, don't panic. Call the
|
||
support department of the company who supplies your anti-virus product
|
||
if you aren't sure of what you are doing. If the company you got your
|
||
anti-virus software from does not have a good technical support
|
||
department, change companies.
|
||
|
||
The best way to make sure viruses are not spread is not to spread
|
||
them. Some people do this intentionally. We discourage this. Viruses
|
||
aren't cool.
|
||
|
||
|
||
25. Where can I get more information about viruses?
|
||
|
||
This FAQ answer was written by Theora:
|
||
|
||
Assembly lanaguage programming books illustrate the (boring) aspect of
|
||
replication and have for a long time. The most exciting/interesting
|
||
thing about viruses is all the controversy around them. Free speech,
|
||
legality, and cute payloads are a lot more interesting than "find
|
||
first, find next" calls. You can get information about the technical
|
||
aspects of viruses, as well as help if you should happen to get a
|
||
virus, from the virus-l FAQ, posted on comp. virus every so often.
|
||
You can also pick up on the various debates there. There are
|
||
alt.virus type newsgroups, but the level of technical expertise is
|
||
minimal, and so far at least there has not been a lot of real "help"
|
||
for people who want to get -rid- of a virus.
|
||
|
||
There are a lot of virus experts. To become one, just call yourself
|
||
one. Only Kidding. Understanding viruses involves understanding
|
||
programming, operating systems, and their interaction. Understanding
|
||
all of the 'Cult of Virus' business requires a lot of discernment.
|
||
There are a number of good papers available on viruses, and the Cult
|
||
of Virus; you can get information on them from just about anyone
|
||
listed in the virus-l FAQ. The FTP site ftp.informatik.uni-hamburg.de
|
||
is a pretty reliable site for proggies and text.
|
||
|
||
|
||
26. What is Cryptoxxxxxxx?
|
||
|
||
This FAQ answer is excerpted from: Computer Security Basics
|
||
by Deborah Russell
|
||
and G.T. Gengemi Sr.
|
||
|
||
A message is called either plaintext or cleartext. The process of
|
||
disguising a message in such a way as to hide its substance is called
|
||
encryption. An encrypted message is called ciphertext. The process
|
||
of turning ciphertext back into plaintext is called decryption.
|
||
|
||
The art and science of keeping messages secure is called cryptography,
|
||
and it is practiced by cryptographers. Cryptanalysts are
|
||
practitioners of cryptanalysis, the art and science of breaking
|
||
ciphertext, i.e. seeing through the disguise. The branch of
|
||
mathematics embodying both cryptography and cryptanalysis is called
|
||
cryptology, and it's practitioners are called cryptologists.
|
||
|
||
|
||
27. What is PGP?
|
||
|
||
This FAQ answer is excerpted from: PGP(tm) User's Guide
|
||
Volume I: Essential Topics
|
||
by Philip Zimmermann
|
||
|
||
PGP(tm) uses public-key encryption to protect E-mail and data files.
|
||
Communicate securely with people you've never met, with no secure
|
||
channels needed for prior exchange of keys. PGP is well featured and
|
||
fast, with sophisticated key management, digital signatures, data
|
||
compression, and good ergonomic design.
|
||
|
||
Pretty Good(tm) Privacy (PGP), from Phil's Pretty Good Software, is a
|
||
high security cryptographic software application for MS-DOS, Unix,
|
||
VAX/VMS, and other computers. PGP allows people to exchange files or
|
||
messages with privacy, authentication, and convenience. Privacy means
|
||
that only those intended to receive a message can read it.
|
||
Authentication means that messages that appear to be from a particular
|
||
person can only have originated from that person. Convenience means
|
||
that privacy and authentication are provided without the hassles of
|
||
managing keys associated with conventional cryptographic software. No
|
||
secure channels are needed to exchange keys between users, which makes
|
||
PGP much easier to use. This is because PGP is based on a powerful
|
||
new technology called "public key" cryptography.
|
||
|
||
PGP combines the convenience of the Rivest-Shamir-Adleman (RSA)
|
||
public key cryptosystem with the speed of conventional cryptography,
|
||
message digests for digital signatures, data compression before
|
||
encryption, good ergonomic design, and sophisticated key management.
|
||
And PGP performs the public-key functions faster than most other
|
||
software implementations. PGP is public key cryptography for the
|
||
masses.
|
||
|
||
|
||
28. What is Tempest?
|
||
|
||
Tempest stands for Transient Electromagnetic Pulse Surveillance
|
||
Technology.
|
||
|
||
Computers and other electronic equipment release interference to their
|
||
surrounding environment. You may observe this by placing two video
|
||
monitors close together. The pictures will behave erratically until
|
||
you space them apart.
|
||
|
||
Although most of the time these emissions are simply annoyances, they
|
||
can sometimes be very helpful. Suppose we wanted to see what project
|
||
a target was working on. We could sit in a van outside her office and
|
||
use sensitive electronic equipment to attempt to pick up and decipher
|
||
the emanations from her video monitor.
|
||
|
||
Our competitor, however, could shield the emanations from her
|
||
equipment or use equipment without strong emanations.
|
||
|
||
Tempest is the US Government program for evaluation and endorsement
|
||
of electronic equipment that is safe from eavesdropping.
|
||
|
||
|
||
29. What is an anonymous remailer?
|
||
|
||
An anonymous remailer is a system on the Internet that allows you to
|
||
send e-mail anonymously or post messages to Usenet anonymously.
|
||
|
||
You apply for an anonymous ID at the remailer site. Then, when you
|
||
send a message to the remailer, it sends it out from your anonymous ID
|
||
at the remailer. No one reading the post will know your real account
|
||
name or host name. If someone sends a message to your anonymous ID,
|
||
it will be forwarded to your real account by the remailer.
|
||
|
||
|
||
30. What are the addresses of some anonymous remailers?
|
||
|
||
The most popular and stable anonymous remailer is anon.penet.fi,
|
||
operated by Johan Helsingus. To obtain an anonymous ID, mail
|
||
ping@anon.penet.fi. For assistance is obtaining an anonymous account
|
||
at penet, mail help@anon.penet.fi.
|
||
|
||
To see a list on anonymous remailers, finger
|
||
remailer-list@kiwi.cs.berkeley.edu.
|
||
|
||
|
||
31. How do I defeat Copy Protection?
|
||
|
||
There are two common methods of defeating copy protection. The first
|
||
is to use a program that removes copy protection. Popular programs
|
||
that do this are CopyIIPC from Central Point Software and CopyWrite
|
||
from Quaid Software. The second method involves patching the copy
|
||
protected program. For popular software, you may be able to locate a
|
||
ready made patch. You can them apply the patch using any hex editor,
|
||
such as debug or the Peter Norton's DiskEdit. If you cannot, you must
|
||
patch the software yourself.
|
||
|
||
Writing a patch requires a debugger, such as Soft-Ice or Sourcer. It
|
||
also requires some knowledge of assembly language. Load the protected
|
||
program under the debugger and watch for it to check the protection
|
||
mechanism. When it does, change that portion of the code. The code
|
||
can be changed from JE (Jump on Equal) or JNE (Jump On Not Equal) to
|
||
JMP (Jump Unconditionally). Or the code may simply be replaced with
|
||
NOP (No Operation) instructions.
|
||
|
||
|
||
32. What is 127.0.0.1?
|
||
|
||
127.0.0.1 is a loopback network connection. If you telnet, ftp, etc...
|
||
to it you are connected to your own machine.
|
||
|
||
|
||
33. How do I post to a moderated newsgroup?
|
||
|
||
Usenet messages consist of message headers and message bodies. The
|
||
message header tells the news software how to process the message.
|
||
Headers can be divided into two types, required and optional. Required
|
||
headers are ones like "From" and "Newsgroups." Without the required
|
||
headers, your message will not be posted properly.
|
||
|
||
One of the optional headers is the "Approved" header. To post to a
|
||
moderated newsgroup, simply add an Approved header line to your
|
||
message header. The header line should contain the newsgroup
|
||
moderators e-mail address. To see the correct format for your target
|
||
newsgroup, save a message from the newsgroup and then look at it using
|
||
any text editor.
|
||
|
||
A "Approved" header line should look like this:
|
||
|
||
Approved: will@gnu.ai.mit.edu
|
||
|
||
There cannot not be a blank line in the message header. A blank line
|
||
will cause any portion of the header after the blank line to be
|
||
interpreted as part of the message body.
|
||
|
||
For more information, read RFC 1036: Standard for Interchange of
|
||
USENET messages.
|
||
|
||
|
||
|
||
|
||
Section B: Telephony
|
||
~~~~~~~~~~~~~~~~~~~~
|
||
|
||
01. What is a Red Box?
|
||
|
||
When a coin is inserted into a payphone, the payphone emits a set of
|
||
tones to ACTS (Automated Coin Toll System). Red boxes work by fooling
|
||
ACTS into believing you have actually put money into the phone. The
|
||
red box simply plays the ACTS tones into the telephone microphone.
|
||
ACTS hears those tones, and allows you to place your call. The actual
|
||
tones are:
|
||
|
||
Nickel Signal 1700+2200 0.060s on
|
||
Dime Signal 1700+2200 0.060s on, 0.060s off, twice repeating
|
||
Quarter Signal 1700+2200 33ms on, 33ms off, 5 times repeating
|
||
|
||
|
||
02. How do I build a Red Box?
|
||
|
||
Red boxes are commonly manufactured from modified Radio Shack tone
|
||
dialers, Hallmark greeting cards, or made from scratch from readily
|
||
available electronic components.
|
||
|
||
To make a Red Box from a Radio Shack 43-141 or 43-146 tone dialer,
|
||
open the dialer and replace the crystal with a new one.
|
||
The purpose of the new crystal is to cause the * button on your tone
|
||
dialer to create a 1700Mhz and 2200Mhz tone instead of the original
|
||
941Mhz and 1209Mhz tones. The exact value of the replacement crystal
|
||
should be 6.466806 to create a perfect 1700Mhz tone and 6.513698 to
|
||
create a perfect 2200mhz tone. A crystal close to those values will
|
||
create a tone that easily falls within the loose tolerances of ACTS.
|
||
The most popular choice is the 6.5536Mhz crystal, because it is the
|
||
eaiest to procure. The old crystal is the large shiny metal component
|
||
labeled "3.579545Mhz." When you are finished replacing the crystal,
|
||
program the P1 button with five *'s. That will simulate a quarter
|
||
tone each time you press P1.
|
||
|
||
|
||
03. Where can I get a 6.5536Mhz crystal?
|
||
|
||
Your best bet is a local electronics store. Radio Shack sells them,
|
||
but they are overpriced and the store must order them in. This takes
|
||
approximately two weeks. In addition, many Radio Shack employees do
|
||
not know that this can be done.
|
||
|
||
Or, you could order the crystal mail order. This introduces Shipping
|
||
and Handling charges, which are usually much greater than the price of
|
||
the crystal. It's best to get several people together to share the
|
||
S&H cost. Or, buy five or six yourself and sell them later. Some of
|
||
the places you can order crystals are:
|
||
|
||
Digi-Key
|
||
701 Brooks Avenue South
|
||
P.O. Box 677
|
||
Thief River Falls, MN 56701-0677
|
||
(80)344-4539
|
||
Part Number:X415-ND /* Note: 6.500Mhz and only .197 x .433 x .149! */
|
||
Part Number:X018-ND
|
||
|
||
JDR Microdevices:
|
||
2233 Branham Lane
|
||
San Jose, CA 95124
|
||
(800)538-5000
|
||
Part Number: 6.5536MHZ
|
||
|
||
Tandy Express Order Marketing
|
||
401 NE 38th Street
|
||
Fort Worth, TX 76106
|
||
(800)241-8742
|
||
Part Number: 10068625
|
||
|
||
Alltronics
|
||
2300 Zanker Road
|
||
San Jose CA 95131
|
||
(408)943-9774 Voice
|
||
(408)943-9776 Fax
|
||
(408)943-0622 BBS
|
||
Part Number: 92A057
|
||
|
||
|
||
04. Which payphones will a Red Box work on?
|
||
|
||
Red Boxes will work on TelCo owned payphones, but not on COCOT's
|
||
(Customer Owned Coin Operated Telephones).
|
||
|
||
Red boxes work by fooling ACTS (Automated Coin Toll System) into
|
||
believing you have put money into the pay phone. ACTS is the
|
||
telephone company software responsible for saying "Please deposit XX
|
||
cents" and listening for the coins being deposited.
|
||
|
||
COCOT's do not use ACTS. On a COCOT, the pay phone itself is
|
||
responsible for determining what coins have been inserted.
|
||
|
||
|
||
05. How do I make local calls with a Red Box?
|
||
|
||
Payphones do not use ACTS for local calls. To use your red box for
|
||
local calls, you have to fool ACTS into getting involved in the call.
|
||
|
||
One way to do this, in some areas, is by dialing 10288-xxx-xxxx. This
|
||
makes your call a long distance call, and brings ACTS into the
|
||
picture.
|
||
|
||
In other areas, you can call Directory Assistance and ask for the
|
||
number of the person you are trying to reach. The operator will give
|
||
you the number and then you will hear a message similar to "Your call
|
||
can be completed automatically for an additional 35 cents." When this
|
||
happens, you can then use ACTS tones.
|
||
|
||
|
||
06. What is a Blue Box?
|
||
|
||
Blue boxes use a 2600hz tone to size control of telephone switches
|
||
that use in-band signalling. The caller may then access special
|
||
switch functions, with the usual purpose of making free long distance
|
||
phone calls, using the tones provided by the Blue Box.
|
||
|
||
|
||
07. Do Blue Boxes still work?
|
||
|
||
Blue Boxes still work in areas using in band signalling. Modern phone
|
||
switches use out of band signalling. Nothing you send over the voice
|
||
portion of bandwidth can control the switch. If you are in an area
|
||
served by a switch using out of band signalling, you can still blue
|
||
box by calling through an area served by older in-band equipment.
|
||
|
||
|
||
08. What is a Black Box?
|
||
|
||
A Black Box is a 1.8k ohm resistor placed across your phone line to
|
||
cause the phone company equipment to be unable to detect that you have
|
||
answered your telephone. People who call you will then not be billed
|
||
for the telephone call. Black boxes do not work under ESS.
|
||
|
||
|
||
09. What do all the colored boxes do?
|
||
|
||
Acrylic Steal Three-Way-Calling, Call Waiting and programmable
|
||
Call Forwarding on old 4-wire phone systems
|
||
Aqua Drain the voltage of the FBI lock-in-trace/trap-trace
|
||
Beige Lineman's hand set
|
||
Black Allows the calling party to not be billed for the call
|
||
placed
|
||
Blast Phone microphone amplifier
|
||
Blotto Supposedly shorts every fone out in the immediate area
|
||
Blue Emulate a true operator by seizing a trunk with a 2600hz
|
||
tone
|
||
Brown Create a party line from 2 phone lines
|
||
Bud Tap into your neighbors phone line
|
||
Chartreuse Use the electricity from your phone line
|
||
Cheese Connect two phones to create a diverter
|
||
Chrome Manipulate Traffic Signals by Remote Control
|
||
Clear A telephone pickup coil and a small amp used to make free
|
||
calls on Fortress Phones
|
||
Color Line activated telephone recorder
|
||
Copper Cause crosstalk interference on an extender
|
||
Crimson Hold button
|
||
Dark Re-route outgoing or incoming calls to another phone
|
||
Dayglo Connect to your neighbors phone line
|
||
Divertor Re-route outgoing or incoming calls to another phone
|
||
DLOC Create a party line from 2 phone lines
|
||
Gold Dialout router
|
||
Green Emulate the Coin Collect, Coin Return, and Ringback tones
|
||
Infinity Remotely activated phone tap
|
||
Jack Touch-Tone key pad
|
||
Light In-use light
|
||
Lunch AM transmitter
|
||
Magenta Connect a remote phone line to another remote phone line
|
||
Mauve Phone tap without cutting into a line
|
||
Neon External microphone
|
||
Noise Create line noise
|
||
Olive External ringer
|
||
Party Create a party line from 2 phone lines
|
||
Pearl Tone generator
|
||
Pink Create a party line from 2 phone lines
|
||
Purple Telephone hold button
|
||
Rainbow Kill a trace by putting 120v into the phone line (joke)
|
||
Razz Tap into your neighbors phone
|
||
Red Make free phone calls from pay phones by generating
|
||
quarter tones
|
||
Rock Add music to your phone line
|
||
Scarlet Cause a neighbors phone line to have poor reception
|
||
Silver Create the DTMF tones for A, B, C and D
|
||
Static Keep the voltage on a phone line high
|
||
Switch Add hold, indicator lights, conferencing, etc..
|
||
Tan Line activated telephone recorder
|
||
Tron Reverse the phase of power to your house, causing your
|
||
electric meter to run slower
|
||
TV Cable "See" sound waves on your TV
|
||
Urine Create a capacitative disturbance between the ring and
|
||
tip wires in another's telephone headset
|
||
Violet Keep a payphone from hanging up
|
||
White Portable DTMF keypad
|
||
Yellow Add an extension phone
|
||
|
||
Box schematics may be retrieved from these FTP sites:
|
||
|
||
ftp.netcom.com /pub/br/bradleym
|
||
ftp.netcom.com /pub/va/vandal
|
||
ftp.winternet.com /users/craigb
|
||
|