+----------------------------------------------------------------------------+

!                     Beginners Guide to VAX/VMS Hacking                     !

!                                                                            !

!             File By ENTITY /  Corrupt Computing Canada  (c) 1989           !

!                                                                            !

!                                                                            !

!                          CORRUPT COMPUTING CANADA!                         !

!                                                                            !

!                CALL: (416)/398-3301  Login: Guest, PW: Guest               !

!                      (416)/756-4545  type !!    Login: lynx                !

!                                                                            !

+----------------------------------------------------------------------------+

!                                                                            !

! You may freely distribute this file as long as no modifications of any     !

! form are made to the file. All rights reserved by...What rights?!          !

!                                                                            !

!                                                                            !

+----------------------------------------------------------------------------+



September 12,1989





INTRODUCTION

------------





       Perhaps the most exciting Operating system to HACK on is VAX/VMS.

It offers many challenges for hackers and boasts one of the best security

systems ever developed.  In comparison to the security on UNIX, VMS is far

superior in every respect.  It can be very difficult to get inside such a

system and even harder to STAY inside, but isn't that what this is all about?!

I have written this file as a way for beginning hackers to learn about the VMS

operating system.  There is such a vast amount of information that can be

related about VAX/VMS hacking that it is not possible for me to cover

everything in just one file.  As such i will try and stick to the basics for

this file and hopefully write another file in the future that deals with

heavy-duty kernal programming, the various data structures, and system service

calls. All right so lets get at it!









GETTING IN

----------



       First of all how do you recognize a VAX when you see one?! Well the

thing that always gives a VAX away, is when you logon you will see:



Username:



It may also have some other info before it asks you for the username, usually

identifying the company and perhaps a message to the effect of:



Unauthorized Users will be prosecuted to the fullest extent of the law!



That should get you right in the mood for some serious hacking!  Ok so when you

have determined that the system you have logged into is indeed a VAX, you will

have to at this point enter your SYSTEM LOGIN.  Basically on VAX's there are

several default logins which will get you into the system. However on MOST

systems these default logins are changed by the system manager. In any case,

before you try any other logins, you should try these (since some system

managers are lazy and don't bother changing them):



Username           Password        Alternate

-------------------------------------------------------------------------------



SYSTEM             MANAGER         OPERATOR

FIELD              SERVICE         TEST

DEFAULT            DEFAULT         USER

SYSTEST            UETP            SYSTEST

DECNET             DECNET          NONPRIV





That's it. Those are the default system users/passwords.  The only ones on the

list that are GUARANTEED to be in the userlist are SYSTEM and DEFAULT. However,

I have never come across a system where these two haven't been changed from

their default passwords to something else.  In the above list, the alternate

password is simply a password many operators set the password to from the

deafult. So if the first password doesn't work, try the alternate password.  It

should be noted when the a user is added into the system, the default password

for the new user the SAME as his username.  You should keep this point in mind

because it is VERY important. Most of the accounts you hack out, will be found

in this way! Ok if above ones don't work,  then you should try these accounts.

These following accounts are NOT defaults, but through experience i have found

that many systems use these accounts or some variation thereof:



Username           Password

---------------------------

VAX                VAX

VMS                VMS

DCL                DCL

DEC                DEC       *

DEMO               DEMO      *

TEST               TEST      *

NETNONPRIV         NONPRIV   *

NETPRIV            PRIV

ORACLE             ORACLE    *

ALLIN1             ALLIN1    *

INGRES             INGRES    *

GUEST              GUEST     *

GAMES              GAMES

BACKUP             BACKUP    *

HOST               HOST

USER               USER      *

DIGITAL            DIGITAL

REMOTE             REMOTE    *

SAS                SAS

FAULT              FAULT

USERP              USERP

VISITOR            VISITOR

GEAC               GEAC

VLSI               VLSI

INFO               INFO      *

POSTMASTER         MAIL

NET                NET

LIBRARY            LIBRARY

OPERATOR           OPERATOR  *

OPER               OPER



The ones that have asterisks (*) beside them are the more popular ones and you

have a better chance with them, so you should try them first. It should be

noted that the VAX will not give you any indication of whether the username

you typed in is indeed valid or not.  Even if you type in a username that does

not exist on the system, it will still ask you for a password.  Keep this in

mind because if you are not sure if whether an account exists or not, don't

waste your time in trying to hack out its password. You could be going on a

wild goose chase!  You should also keep in mind that ALL bad login attempts are

kept track of and when the person logs in, he is informed of how many failed

attempts there were on his account.  If he sees 400 login failures, I am sure

that he will know someone is trying to hack his account.









THE BASICS

----------



Ok i am assuming you tried all the above defaults and managed to get yourself

into the system. Now the real FUN begins!  Ok first things first. After you log

in you will get some message about the last time you logged in etc. If this is

the first time you have logged into this system then you should note the last

login date and time and WRITE IT DOWN! This is important for several reasons.

The main one being that you want to find out if the account you have just

hacked is an ACTIVE or INACTIVE account.  The best accounts are the inactive

ones. Why?! Well the inactive accounts are those that people are not using

currently, meaning that there is a better chance of you holding onto that

account and not being discovered by the system operator.  If the account has

not been logged into for the last month or so, theres a good chance that it

is inactive.  Ok anyhow once your in, if you have a normal account with access

to DCL you will get a prompt that looks like:



$



This may vary from machine to machine but its usually the same. If you have a

weird prompt and would like a normal one, type:



$set prompt=$



If this is the first time you have hacked into this system there are a couple

of steps you should take immediately. First type:



$set control=(y,t)



This will enable your break keys (like ctrl-c) so that you can stop a file or

command if you make a mistake.  Usually ctrl-c is active, but this command will

insure that it is. (Note: in general to abort a command, or program you can

type ctrl-c or ctrl-y) Ok anyhow, the next step is to open the buffer in your

terminal then type:



$type sys$system:rightslist.dat



This will dump a file that has all the systems users listed in it.  You may

notice a lot of weird garbage characters. Don't worry about those, that is

normal.  Ok after this file ends and you get the shell prompt again ($) then

save the buffer, clear it out and leave it open. Then type:



$show logical



Ok after this file is buffered save it also.  Ok at this point you have two

files on your disk which will help you hack out MORE accounts on the system.

For now, lets find out how powerful the account you currently hacked into is.

You should type:



$set proc/priv=all



This may give you a message telling you that all your privileges were not

granted. That's ok. Now type:



$show proc/priv



This will give you a list of all the privileges your account is set up for.

Usually most user accounts only have NETMBX and TMPMBX privs.  If you have

more than these two, then it could mean that you have a nice high-level user.

Unlike UNIX which only has a distinction between user and superuser, VMS has

a whole shitload of different privileges you can gain.  The basic privs are as

follows:



PRIVILEGE      DESCRIPTION

------------------------------------------------------------------------------

NONE           no privilege at all





NORMAL PRIVS

------------

MOUNT          Execute mount volume QIO

NETMBX         Create network connections (you need this to call out!)

TMPMBX         Create temporary mailbox





GROUP PRIVS

-----------

GROUP          Control processes in the same group

GRPPRV         Group access through SYSTEM protection field





DEVOUR PRIVS

------------

ACNT           Disable accounting

ALLSPOOL       Allocate spooled devices

BUGCHK         Make bugcheck error log entries

EXQUOTA        Exceed disk quotas

GRPNAM         Insert group logical names n the name table

PRMCEB         Create/delete permanent common event flag clusters

PRMGBL         Create permanent global sections

PRMMBX         Create permanent mailboxes

SHMEM          Create/delete structures in shared memory





SYSTEM PRIVS

------------

ALTPRI         Set base priority higher that allotment

OPER           Perform operator functions

PSWAPM         Change process swap mode

WORLD          Control any process

SECURITY       Perform security related functions

SHARE          Access devices allocated to other users

SYSLCK         Lock system-wide resources





FILES PRIVS

-----------

DIAGNOSE       Diagnose devices

SYSGBL         Create system wide global sections

VOLPRO         Override volume protection





ALL PRIVS

---------

BYPASS         Disregard protection

CMEXEC         Change to executive mode

CMKRNL         Change to kernal mode

DETACH         Create detached processes of arbitrary UIC

LOG_IO         Issue logical I/O requests

PFNMAP         Map to specific physical pages

PHY_IO         Issue physical I/O requests

READALL        Possess read access to everything

SETPRV         ***  ENABLE ALL PRIVILEGES!!! ***

SYSNAM         Insert system logical names in the name table

SYSPRV         Access objects through SYSTEM protection field





Ok that's the lot of them! I will explain some of the more important privileges

later in the file.  For now, at least you can see just how powerful the account

is.  It should be noted that most accounts usually are only granted the TMPMBX

and NETMBX privileges, so if you don't have the others, don't fret too much.







GENERAL TERMINOLOGY

-------------------



    I think that i should clarify some of the basic concepts involved with

VAX/VMS operating systems before we go any further:



PROCESS: this is what is created when you log in.  The system sets aside CPU

         time and memory for you and calls it a process. Any task that is run

         in VMS is called a process.



SUBPROCESS: also known as child-process, this is just a process that was

            created by another process.



DCL    : Digital Command Language. This is the shell ($) that you are put into

         when you log into a VAX



MCR    : an alternate shell that is used (rarely) on certain accounts. Login

         prompt is a  >  as opposed to DCL which gives a  $

SHELL  : this is the '$' that you see once you are logged in. This is your

         interface with the system, where you can enter the various commands

         execute files and perform other activities.



JOB    : a process and a group of its subprocesses performing some task



SPAWN  : this is the actual command that allows you to create subprocesses

         'SPAWNING' is the act of creating subprocesses



PID    : process identification number. This is an 8 byte ID code that is

         uniquely given to each process that is created on the system.



IMAGE  : this is an EXE file that you can execute (ie run)



UIC    : User identification code. This is in two parts, namely: [group,member]

         The way this works is that users in the same group can access each

         others files through the group protection code.  However since the UIC

         MUST uniquely identify each user, the member portion separates the

         individuals in each group.  If an account does not have a different

         member number, he will NOT be put in the RIGHTSLIST database.







CONTROL KEYS

------------



 A brief note on control sequences.  Several different actions can be activated

via control sequences. They are:



CTRL-H  :delete last character

CTRL-B  :redisplay last command (can go back up to the last 20 commands issued)

CTRL-S  :pause display

CTRL-Q  :continue after pause

CTRL-Z  :*EXIT* use to break out of things such as CREATE and EDIT

CTRL-C  :*CANCEL* will exit out of most operations

CTRL-Y  :*INTERRUPT* will break out of whatever you are doing

CTRL-T  :print out statistical info about the process



NOTE: sometimes upon login, the CTRL-Y, CTRL-C keys are disabled.  To ensure

      these are enabled, issue this command upon login:



$ SET CONTROL





-------------------------------------------------------------------------------

NOTE: all the commands that are executed from DCL can be referenced from an

      online help manual.  To access this, simply type help at any '$' prompt

      This help is also available within the various utilities and programs

      such as authorize and mail. The two MOST important commands are SET and

      SHOW. These should be buffered and printed out for your own reference.

-------------------------------------------------------------------------------



FILES and DIRECTORIES

---------------------



 The directory structure of VMS is a heirarchical one similar to MS-DOS and

UNIX. Its a simple concept, and i will only briefly skim over it.  First of all

it should be noted that there may be more than one hard drive or other

mass-storage device hooked up to your system. Within each hard drive there is

the ROOT directory. This is the highest directory in the tree and is referenced

by [000000]. (this will be explained in a minute)  Within the root there are

several subdirectories. Within these subdirectories there may be files and even

further subdirectories.  The concept is quite simple, but can be difficult to

explain.  Here is a diagram to give you a rough idea of how it is set up:







                                 [000000] <--root directory

                                     !

                                     !

          +--------------------------+---------------------------------+

          !                          !                                 !

          !                          !                                 !

        [d1]                       [d2]                              [d3]

          !                          !                                 !

    +-----+--------+           +-----+-----+                  +--------+

    !     !        !           !           !                  !        !

    !     !        !           !           !              [d3.d3a]  [d3.d3b]

 [d1.da] [d1.db] [d1.dc]    [d2.d2a]   [d2.d2b]

            !                  !           !

            !                  !        +--+-----------+

       [d1.db.db1]        [d2.d2a.d2a1] !              !

                                       [d2.d2b.d2b1] [d2.d2b.d2b2]









    Hopefully this will give you some sort of an idea of how the directories

can be structured. Within each subdirectory there may be other files also. For

example to see the directory after you log in you would type:



$dir



a sample result may be:





Directory DISK$SCHOOL:[REPORTS.JOHN]



average.com;3

generate.exe;1

mail.mai;10

marks.dat;4

marks.dat;5

reportcard.dir

projects.dir



Total 7 files.



What does this tell you? The first line tells you what drive and subdirectory

you are in. The next lines are the actual files. As you can see each file has

a 3 character extension, followed by a comma and a number.  The name before the

period is the actual filename (eg. average) the 3 characters after the period

is known as the extension (eg.com) and the number after the comma refers to the

version of the file. So in this case, this is version number 3.  Any time you

modify or save a file, it automatically assigns it a version number of 1. If

file already exists on your disk, it increments the version number by 1 and

then saves it as such.  So the next time i go ahead and save the file

average.com, it would add another file to the list called average.com;4

  Special note should be taken of the files that have an extension of '.DIR'

These are not really files, but rather subdirectories.  I will show you how to

switch subdirectories in just a minute. First you should take note of the

different file extensions.  Although you can name the files anything you want

some of the more important extensions are:



TYPE      DESCRIPTION

-------------------------------------------------------------------------------

EXE       Executable IMAGE. These files are programs that can be RUN

COM       DCL SCRIPT files. These can also be executed, utilizing the @ command

DAT       DATA file. Sometimes useful things to look at.

LIS       Listing File, many times important info is in here

MAI       Mail file,  use the MAIL command to read these

DIR       DIRECTORY - not a file

JOU       Journal File, often created thru the use of other programs eg EDIT

TXT       Text Files, often hold useful information.



These are just some of the extensions you are most likely to see. The two

important ones are the EXE and COM files. These can be executed from the DCL

level. EXE files are executed via the RUN command. Eg. to run authorize.exe:



$run authorize



This will run the authorize IMAGE. Supposing there were more than one version

of authorize you could specify a version number. eg.



$run authorize.exe;4



The other type of file you can run is the COM files. These are like SCRIPT

files in UNIX or .BAT files from MS-DOS.  They are just a sequence of DCL

commands strung together that are executed when you initiate the file. To run

COM files, use the @ command. For example to run adduser.com, type:



$@adduser



The version number thing i stated for EXE files also applies for COM files.



***NOTE***  To get a listing of all the files on the whole drive, try this:



$sd [000000]

$dir [...]*.*



Similarly you type dir [...]*.com, if you wanted just the COM files listed.

To see the contents of a file, you can use the TYPE command. For example:



$type login.com



this might type out something like:



$ sd:==set default

$ set control=(y,t)

$ set proc/name=entity

$ set term/dev=vt100

         :

         :

         :

        etc



This is great for COM files, DAT files and some of the other types, but you

will always get garbage when you type EXE files so don't bother trying those.

This is very useful for snooping around other peoples files and getting

information. Many times i have found user/passwords lying around in TXT or

LIS files left by some careless user.



 Now, how do you go about changing directories? Well, first you should set up

a shortcut.  The normal command to change directories is SET DEFAULT. For

example to change to a subdirectory called REPORTS, you would have to type:



$set default [.reports]



To make life simpler on yourself, as soon as you log in, you should type:



$sd:==set default



This defines a macro called SD that is interpreted by DCL as SET DEFAULT. You

can similarly define other 'favorite' commands to some short, easy to remember

definition.  Anyhow heres the syntax for changing directories:



SD DEVICE:[dir1.dir2.dir3....]



The device can be optionally left out, if you plan to remain in the same hard

drive. You have to then enter a '[' followed by the root directory, followed

by a period, followed by another subdirectory name etc. Eg.



$sd dub0:[cosy.users]



Suppose at this point, you were in directory cosy, subdirectory users and there

was a further subdirectory called 'info.dir'.  Rather than specify the full

pathname, you can simply type:



$sd [.info]



This will advance you one level into the info subdirectory. Remember to put the

period in front of the subdirectory. If you don't, in this case it would assume

that you were trying to reference the root directory called info.  Another

important thing to note is moving back levels in terms of subdirectories. For

example if you were in [cosy.users.info] and wanted to move back to

[cosy.users] you could type:



$sd [-]



Similarly you can put in as many hyphens (-) as you want to move back. For

example  sd [--]  would put you back to the cosy directory.



Another important thing to note about subdirectories are logical assigned

symbols. These are names assigned to certain things. For example the main

system directory is called sys$system. So to go to it you could type:



$sd sys$system



This would throw you into the system directory. Similarly you can type:



$sd sys$login



and this will put you back into the directory that you were initially in, when

you first logged in.  These symbols stand for actual device:directory

combinations.  To see the various definitions that are assigned to each process

you should type:



$show logical



This will list a whole bunch of global system equates that you can use to

access various parts of the VAX structure.  In addition to view all of your

locally defined symbols, use:



$show symbol *







FILE PROTECTION

---------------



Ok before i begin this, let me just state that whatever i say about files also

applies to directories.  There are four types of file protections. There is

SYSTEM,WORLD,GROUP and OWNER. These are briefly:



SYSTEM- All users who have group numbers 0-8 and users with physical or logical

        I/O privileges  (generally system managers, system programmers, and

        operators)

OWNER - the owner of the file (or subdirectory), isolated via their User

        Identification Code (UIC). This means the person who created the file!

GROUP - All users who have the same group number in their UICs as the owner of

        the file.

WORLD - All users who do not fall in the categories above



Each file has four types of protection within each of the above categories.

They are: Read, Write, Execute, Delete. Explanations are:



READ   - You can read the file and copy it.

WRITE  - You can modify and rename that file.

EXECUTE- You can run the file

DELETE - You can delete the file



When you create a file the default is that you have all the privileges for that

particular file. Group, world and system may only have limited privileges. This

can be changed with the set protection DCL command. For example:



$set protection=(group:rwed,world:r)/default



would set your default protection to allow other users in your group to have

full read,write,execute,delete privs to the file, and others only read access

to the file. The /default means that from now on all the files you create will

be set with this particular protection.  To change one of your own files to

some other protection you can alternatively use:



$set prot topsecret.dat /prot=(system:rwed,group:rwed,world:rwed,owner:rwed)



This would enable all users on the system to access the file 'topsecret.dat'

When specifying the protection, you do not have to list them for each of the

four groups.  You can simply choose only those thatPath: works!merk!alliant!linus!agate!ames!pacbell.com!tandem!UB.com!grafex!steveh

From: [email protected] (Steve Harding KA6ETB)

Newsgroups: comp.bbs.waffle

Subject: Re: Forced un-join?

Message-ID: 

Date: Tue, 29 Sep 92 22:50:22 PDT

References: <[email protected]>

Distribution: usa

Organization: The GRAFex Company

Lines: 15



[email protected] (Bob Kirkpatrick) writes:



> Use Chris Winemiller's expire (CWEXP104.ZIP). It has a 'keeper' option

> that will always retain at least one message in any group. I've been

> using it since he first issued v1.0 and it just gets better with each

> new rev level. He has a rev 1.05 in the wings, but I don't know if he

> turned it loose yet.



As a beta site for 1.05...it works...it's super.



steve



-- 

play:[email protected] 408.252.0578     work:[email protected]

              A prince trapped in the body of a dirty old man.

emiller's expire (CWEXP104.ZIP). It has a 'keep           p�$�����r�|�"�������.��<�r����'�r�,��Uz��(����{��}���]���*�B������X��?�R��qX��N�N����H�M�$�����(/�V��)	��~�/�U��vL��x���K�!>�x|���y��H����}��7���(�N+P`��(� �-`�
P�غ5���ֈ��k���"��@�8�.=�~sPg�+�!�s�q
�R��>�8:�IM#a]�z��9��.@P�L(��X�*N@�˷������g���.��g�x0�u<����!ϵ
P�?X��%��Nj���g���~��~}(P�2���P�
P�
PҐ	�鎛��"@"����O� �&k�w��  i���["��z�����c0�{��	��uz�PȧC(�E�bp�m^A�	(5.61/UUNET-internet-primary) id AA03070; Sat, 19 Sep 92 11:38:51 -0400

Received: by nyx.cs.du.edu (4.1/SMI-4.1)

	id AA06069; Fri, 18 Sep 92 15:06:39 MDT

From: [email protected] (tao master of existential angst)

Message-Id: <[email protected]>

X-Disclaimer: Nyx is a public access Unix system run by the University

	of Denver.  The University has neither control over nor

	responsibility for the opinions or correct identity of users.

Subject: Re: The real deal on Blade Runner

To: [email protected]

Date: Fri, 18 Sep 92 15:06:35 MDT

In-Reply-To: <[email protected]>; from "Strider" at Sep 17, 92 10:11 pm

X-Mailer: ELM [version 2.3 PL11]



Strider

|

|I think we might all consider ending this thread and taking the time to read

|the P.K. Dick book _Do_Androids_Dream_of_Electric_Sheep?_.  From what I've

|been told it is heads and tails better than the movie, not to mention

|completely different.



Well, any time someone suggests people "read the book" I get a little

mad.  Rarely does it occur that the author of the movie is the author

of the book, thus the two can not be compared.  I'm sure Ridley Scott

can not read to the fullest Phillip K Dick's mind, nor should we want

him to make a movie based completely on the book or Dick's vision.  



I just think movies and books are completely seperate works of art

that can't really be compared.  To me it might be comprable to seeing

a Monet painting and then reading a book about the place that is the

subject of the painting in real life.  Just enjoy the painting for

what it is, and if you want to read the book, that's certainly ok too,

but don't compare 'em - that's my view.



|Steve J. White		  |"Either there's something wrong with me,	  |

|[email protected]  | or there's something wrong with the universe."|

|skeptic@large@9600bps	  |	- Dr. Crusher on ST:TNG			  |



-- 

 [email protected]   FutureCulture E-List: [[email protected]]

 andy (hawkeye)         new edge, technoculture, cyberpunk, virtual reality,

                        raves, etc. Home of the famous :) FutureCulture FAQ!

 

From merk!nyx.cs.du.edu!ahawks Sat Sep 19 23:27:35 1992 remote from works

Received: by works.uucp (1.65/waf)

	via UUCP; Sat, 19 Sep 92 23:26:39 EDT

	for phantasm

Received: by merk.merk.com (/\==/\ Smail3.1.25.1 #25.17)

	id ; Sat, 19 Sep 92 23:27 EDT

Received: from nyx.cs.du.edu by relay1.UU.NET with SMTP 

	(5.61/UUNET-internet-primary) id AA03068; Sat, 19 Sep 92 23:25:31 -0400

Received: by nyx.cs.du.edu (4.1/SMI-4.1)

	id AA07828; Sat, 19 Sep 92 19:53:43 MDT

From: [email protected] (morrissey's therapist)

Message-Id: <[email protected]>

X-Disclaimer: Nyx is a public access Unix system run by the University

	of Denver.  The University has neither control over nor

	responsibility for the opinions or correct identity of users.

Subject: Mindless Babble for the Terminally Bored

To: [email protected]

Date: Sat, 19 Sep 92 19:53:41 MDT

X-Mailer: ELM [version 2.3 PL11]



If you have nothing else better to do this weekend than watch CNN,

look for their "FutreWatch" segment...Featured some pretty interesting

stuff including:



--a snippet about the new Blade Runner (PS- look for a scene that

shows Rachael on the streets of LA - I don't think this was in either

release of the movie....)



--a little thing about Sneakers, talking about (if I remember right)

the plausibility of breaking the code (DES, I assume), and ummm, the

possibility of getting government information via computer or

something like that...



--and a very interesting and disturbing little piece about a company

that seeks to put a sort of universal price rate on all

information...I only caught the last portion of this, but it seemed

very disturbing to me...The impression I got from the representative

of the corporation was that someday he hoped to see a sort of "cost

this session" applied to *any* information retrieval via computer...

I hope I see this again so I can confirm this and get more accurate

info...Very scary thought that information will not be a free or

almost-free or as-close-to-free-as-you-can-get in the coming

information age....People are already starting to jack up the price of

everything that you could possibly want to knw....

-- 

 [email protected]   FutureCulture E-List: [[email protected]]

 andy (hawkeye)         new edge, technoculture, cyberpunk, virtual reality,

                        raves, etc. Home of the famous :) FutureCulture FAQ!

 

From merk!nyx.cs.du.edu!ahawks Sun Sep 20 14:29:11 1992 remote from works

Received: by works.uucp (1.65/waf)

	via UUCP; Sun, 20 Sep 92 14:53:30 EDT

	for phantasm

Received: by merk.merk.com (/\==/\ Smail3.1.25.1 #25.17)

	id ; Sun, 20 Sep 92 14:28 EDT

Received: from nyx.cs.du.edu by relay1.UU.NET with SMTP 

	(5.61/UUNET-internet-primary) id AA12908; Sun, 20 Sep 92 14:26:34 -0400

Received: by nyx.cs.du.edu (4.1/SMI-4.1)

	id AA04001; Sun, 20 Sep 92 11:18:05 MDT

From: [email protected] (morrissey's therapist)

Message-Id: <[email protected]>

X-Disclaimer: Nyx is a public access Unix system run by the University

	of Denver.  The University has neither control over nor

	responsibility for the opinions or correct identity of users.

Subject: interesting p h i l e (fwd)

To: [email protected]

Date: Sun, 20 Sep 92 11:18:01 MDT

X-Mailer: ELM [version 2.3 PL11]



Morpheus writes:



Thought you might want to check this out, maybe send it out to the list if you

think it's decent...





--------------------------- begin digital.txt -------------------------------



Unauthorised Access UK	0636-708063  10pm-7am  12oo/24oo



X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X

X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X

X/\/                                                                    \/\X

X\/X                        - Digital Underground -                     X\/X

X/\X      Story by Mark Bennett. Published in i-D Technology Issue      X/\X

X\/X                                                                    X\/X

X/\X            Transcribed by Phantasm. 12th September 1992            X/\X

X\/X                                                                    X\/X

X/\X    Unauthorised Access UK. Online 10.00pm-7.00am. +44-636-708063   X/\X

X\/\                                                                    /\/X

X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X

X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X



They've got a file on you. It's on computer. And that computer is connected

to a global network. Who's going to stand up for our civil liberties in the

digital era? Can the anarchic activities of hackers and cyberpunks make them

freedom fighters for the information age?

 

CYBERPUNK

TECHNOLOGY



Cyberspace, the Net, Non-Space, or the Electronic Frontier call it what you

will, but it's out there now, spread across the world like an opulent

immaterial spider's web, growing as each new computer, telephone or fax

machine is plugged in, as satellites close continental divides, hooking

independent phone systems together. It's almost a living entity - the

backbone is the various telephone exchanges, the limbs the copper and fibre-

optic links. Increasingly the world is shifting to this unseen plane. Your

earnings, your purchasing patterns and your poll tax records are processed

there. You may not realise it exists, but it's part of everyday life. As

John Barlow, writer and electronic activist puts it, "Cyberspace is the place

you are when you're on the telephone."



As life moves to this electronic frontier, politicians and corporations are

starting to exert increasing control over the new digital realm, policing

information highways with growing strictness. Before we even realise we're

there, we may find ourselves boxed into a digital ghetto, denied simple

rights of access, whiSubject: Two birds with one can of sauce.

From: ferret (Dave Ferret)

Level SYSOP: Work you Damn insidious machine!

Message-ID: 

Date: Sun, 12 Jan 92 17:19:18 EST



First in response to a /reports section -  

    

    For a long time, there was a section for school reports, and I just 

haven't had a chance to put it back up here, we have a mere dozen or so 

reports, all lacking the pertinant information you wanted, but hey, you have 

to figure if YOU think its good, then thats all that counts. I'll create a 

/tfiles/reports right now for you to start out and I'll dump the other 

reports in there when I get some time.





As for Illegal/illicit material on the works,and what can we get caught for?



     Why don't I quote something for you (From The Department of Criminal 

Justice on Publications - Which I believe extends to text publications) 



This is taken from a Publication Denial Notice (2600Mag, Winter 90-91)



 (a) Publication contains contraband.

 

 (b) Publication contains information regarding the manufacture of 

     explosives, weapons or drugs.

 

 (c) Publication contains material that a reasonable person would construe 

     as written solely for the purpose of communicating information designed 

     to achieve a breakdown of prisons through inmate disruption such as 

     strikes or riots. 

 

 (d) A specific factual determination has been made that the publication is 

     detrimental to prisoners rehabilitation because it would encourage 

     deviate criminal sexual behavior.



                  ...and finally...



  (e) Publication contains material on the setting up and operation or 

      criminal schemes or how to avoid detection of criminal schemes by 

      lawful authorities charged with the responsibility for detecting 

      such illegal activity. 

 

--- End Document quotes ---

                                                                    _     _

 Now considering our archives, we could very possibly be cited for =_EVERY_= 

item on there, except that we _allegedly_ are allowed to have these items 

and have our rights to have them protected by the First Amendment to 

garuantee FREE SPEECH. But thats something for you to chew on for a while.





























































































































































































































































































and maybe even get them signed. Is anyone else interested in
meeting sometime during the conference for this purpose?

This would at least be slightly more secure than trusting a
posted public key. Of course, whether you believe that it
really is me is a different story. I'm presenting a paper that
I wrote with a co-author that I've never met. So I can't know
that even he is who he claims - or that I am who I claim :-)

Please Email or reply via post. Even if we simply meet to talk
about PGP over a beer, it could be worthwhile.

Pat


Pat Farrell,      Grad Student                       [email protected]
Department of Computer Science, George Mason University, Fairfax, VA
PGP Public key available via finger           #include standard.disclaimer
#! rnews 808
Newsgroups: comp.bbs.waffle
Path: merk!alliant!linus!agate!spool.mu.edu!wupost!zaphod.mps.ohio-state.edu!pacific.mps.ohio-state.edu!linac!att!att!fang!gator!towers!bluemoon!grant
From: [email protected] (Grant DeLorean)
Subject: Re: Multiple modems?
Message-ID: <[email protected]>
Organization: Blue Moon
References: <[email protected]>
Date: Sat, 3 Oct 92 14:31:20 GMT
Lines: 12

[email protected] (Richard Myers) writes:

>I want to hang 2000 modems off one waffle box (DOS).

 Well folks, Mr. Dell will be retiring on the check for this one so he
should have plenty of time for Waffle enhancements... ;-}

-- 
\   Grant DeLorean  - IHMSA & NRA Life Member -  ([email protected])   /

   Talk sense to a fool and he calls you foolish.  -- Euripides

#! rnews 1825
Newsgroups: alt.drugs
Path: merk!alliant!linus!agate!spool.mu.edu!sdd.hp.com!elroy.jpl.nasa.gov!news.claremont.edu!jarthur.claremont.edu!jrhine
From: [email protected] (Jared Rhine)
Subject: Nitrous : mechanism
Message-ID: <[email protected]>
Sender: [email protected] (The News System)
Organization: Harvey Mudd College, Claremont, CA 91711
Date: Sat, 3 Oct 1992 21:59:04 GMT
Lines: 26

Come on, don't tell me there isn't a single scuba diver out there who
reads this group?  The mechanism of nitrous oxide is same as for
nitrogen narcosis, commonly called rapture of the deep.  When a diver
goes below about 80 ft, they are in "danger" of getting this effect
(actually I know people who go diving JUST for that effect).  The
nitrous buzz is a function of the amount of nitrogen disolved in your
fatty tissues.  You ongas at an approximately exponetial rate and
offgas at an approximately linear rate.  The nitrogen in your fatty
tissues interferes with neuron transmission.  It is indeed inert to
the body, just hangs around and blocks.  It is NOT a function on
oxygen deprevation; divers are still breathing the same amount of
oxygen at those depths.  When a diver comes up, the nitrogen offgases
safely as it is under a lower pressure (divers breath gases at ambient
pressure which at 100 ft is something like 4 atms; when you come up,
you are under lower pressure so the nitrogen comes out).

So now you can go find another source, go look up nitrogen narcosis in
a scuba book.

-- Jared

-- 
             _   _   _   _   _   _   _   _   _   _   _   _   _   _  _
            / \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \/ \
---------> <  Jared Rhine | Student, Philosopher, Zymurgy Specialist  >
            \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/
#! rnews 568
Newsgroups: alt.bbs.internet
Path: merk!alliant!linus!agate!spool.mu.edu!wupost!news.miami.edu!cybernet!news
From: [email protected] (donna schweikert)
Subject: internet
Message-ID: 
Sender: [email protected]
Organization: Cybernet BBS, Boca Raton, Florida
Date: Sat, 3 Oct 1992 21:26:27 GMT
Lines: 6

i would like to know if there is anyway of telneting out of the state
of michigan without having to go thru merit.
i have accounts in other states, is there a way the internet allows
for this.
thanx 
garth (donna)
#! rnews 1087
Newsgroups: alt.locksmithing
Path: merk!alliant!linus!agate!spool.mu.edu!sdd.hp.com!think.com!rpi!newsserver.pixel.kodak.com!psinntp!psinntp!cubetech.com!imladris!andrew
From: [email protected] (Andrew Loewenstern)
Subject: Re: auto club locks
Message-ID: <[email protected]>
Organization: Cube Technologies, Inc.
References: <[email protected]> <[email protected]>
Distribution: usa
Date: Fri, 2 Oct 1992 20:57:31 GMT
Lines: 14

In article <[email protected]> [email protected] (Jeremy Porter) writes:
>Now maybe the car is less likely to be stolen if it has a club on it, but
>I doubt it makes much difference to a "professional" car thief.

Nothing will stop someone if they want it badly enough.  The trick
then is to drive a piece of shit car like I do.   ;-)


andrew
-- 
[email protected]     | "We shall not cease from exploration
Andrew Loewenstern      |  And the end of our exploring
Cube Technologies, Inc. |  Will be to arrive where we started
                        |  And know the place for the first time." -T.S. Eliot
#! rnews 1279
Path: merk!alliant!linus!agate!spool.mu.edu!uwm.edu!linac!att!cbnewsi!cbnewsh!att-out!rutgers!psuvax1!postscript.cs.psu.edu!fenner
From: [email protected] (Bill Fenner)
Newsgroups: comp.bbs.waffle
Subject: Re: UDFB 1.0
Message-ID: 
Date: 3 Oct 92 22:06:15 GMT
References: <[email protected]> 
Sender: [email protected] (Usenet)
Organization: Penn State Computer Science
Lines: 21
Nntp-Posting-Host: postscript.cs.psu.edu

In article  [email protected] (Duane Davis) writes:
|You could have saved yourself some time. I wrote and released a program
|that does exactly the same thing over a month ago.

And then, of course, there's the perl scripts that I posted to alt.bbs.waffle
last year, and the usenet-file updator that added group descriptions
automagically, so you can get things like

(public) 5:53p (891 left) (?=help) : comp.dcom.modems

comp.dcom.modems (messages from 16475 to 16575)
Data communications hardware and software. 

(comp.dcom.modems) 5:54p (891 left) (?=help) : echo %B
Data communications hardware and software. 
(comp.dcom.modems) 5:54p (890 left) (?=help) : 

I can repost or make the scripts available via mail-server if anyone is
interested.

  Bill
#! rnews 16979
Organization: Senior, Physics, Carnegie Mellon, Pittsburgh, PA
Path: merk!alliant!linus!agate!ames!haven.umd.edu!darwin.sura.net!udel!rochester!cantaloupe.srv.cs.cmu.edu!crabapple.srv.cs.cmu.edu!andrew.cmu.edu!cc4b+
Newsgroups: alt.fan.mike-jittlov
Message-ID: 
Date: Sat,  3 Oct 1992 17:59:50 -0400 
From: Christopher Brian Cox 
Subject: Re: Bitmapped Wizard?
In-Reply-To: 
References: <[email protected]>
	
Lines: 599

Here's a version I made from one of the bitmaps that came across the net
a while back.  Freehand version is available upon (limited I hope)
request.

Chris

ps. anybody remember the 20page square KGB logo we hung off Wean hall?
pps. I wish the Freehand EPS header was smaller


%!PS-Adobe-2.0 EPSF-1.2
%%Creator: FreeHand 3.1
%%Title: Wizard Logo (Freehand)
%%CreationDate: 10/3/92 5:58 PM
%%BoundingBox: 30.8218 154.9947 578.6112 702.7841
%%DocumentProcSets: FreeHand_header 3 1
%%DocumentSuppliedProcSets: FreeHand_header 3 1
%%ColorUsage: Color
%%FHPathName: Dora:Wizard Logo (Freehand)
%%EndComments
%%BeginProcSet: FreeHand_header 3 0
/FHIODict 30 dict def
FHIODict begin
/bdf{bind def}bind def
/d{setdash}bdf
/h{closepath}bdf
/H{}bdf
/J{setlinecap}bdf
/j{setlinejoin}bdf
/M{setmiterlimit}bdf
/n{newpath}bdf
/N{newpath}bdf
/q{gsave}bdf
/Q{grestore}bdf
/w{setlinewidth}bdf
/u{}bdf
/U{}bdf
/sepdef{
dup where not
{
FreeHandSepDict
}
if
3 1 roll exch put
}bdf
/`
{false setoverprint
end %. FreeHandDict
/-save0- save def
pop pop pop pop pop
concat
userdict begin
/showpage {} def
0 setgray 0 setlinecap 1 setlinewidth
0 setlinejoin 10 setmiterlimit [] 0 setdash newpath
/languagelevel where {pop languagelevel 1 ne you want changed from your

default.







EDITING FILES

-------------



  An important utility that all VAX hackers should be familiar with is the EDT

text editor. To call it up, use the EDIT DCL command. ie:



$edit [filename]



This will invoke the EDIT/EDT text editor.  The [filename] refers to the file

that you want to edit.  If the file does not exist, it is created at this point.

The EDT editor does not provide a default file type when creating files, so if

you do not specify one, it will leave it as NULL.  It should be noted that there

is more than just the EDT editor, but when you type in EDIT, the default is

/EDT.  Basically it is an editor that you can use to create/modify COM or any

other type of text files.



 After the editor is invoked, it keeps track of everything that you enter in a

JOU file.  In case of lost carrier or some other accident, you can recover what

you had by specifying the /RECOVER qualifier. For example:



$edit/recover memo.dat



This would take the last copy of memo.dat, load it into memory, then process

your last JOU file, updating it to virtually exactly where you were before you

got cut off.  Journaling is automatically defaulted to ON, but can be turned

off with the /NOJOURNAL qualifier.  For a description of what all the qualifiers

are, and what they do, refer to the online HELP manual.



 Ok here is a list of the basic commands you can perform in the EDT editor:





--------------------------------------------------------------------------------



X   (where X = line number)............show line X only

X:Y (where X,Y = line numbers).........show line X through line Y

A,B,C,D (a,b,c,d = line numbers).......list lines A,B,C,D

X:e ...................................list from X to end

T W ...................................TYPE WHOLE. List ALL of the text lines

S/string1/string2/W....................substitute ALL occurrences of string1

                                       for string2 as they occur from current

                                       line number downwards

"string" ..............................search for first occurrence of string

                                       from current line downwards

T A "string" ..........................type all occurrences of string from

                                       current line downwards

X:Y a "string" ........................search for occurrences of string within

                                       range denoted by X through Y

D X ...................................Delete line X

D X:Y .................................Delete line X through Y, inclusively

I .....................................insert a line

I X ...................................insert from line X

M X:Y to Z ............................move lines X through Y to line Z

RES ...................................resequence line numbers

RES/SEQ:X:10 ..........................resequence from line X in intervals of 10

R X ...................................replace from line X. This deletes the

                                       current line and automatically goes into

                                       insertion mode.

EXIT ..................................leave the editor, and SAVE the current

                                       text.

QUIT ..................................leave the editor and DO NOT SAVE the

                                       current text.



--------------------------------------------------------------------------------



A sample editing session is shown:



$edit lame.txt



* i



     hi this is just some bullshit text to test out how this EDIT program

     works.  Oh well, easy enough.  bye!



     



*exit



$type lame.txt



 hi this is just some bullshit text to test out how this EDIT program

 works.  Oh well, easy enough.  bye!



$del lame.txt;*



COMMANDS

--------



In this section i will outline some of the more important commands that you can

issue from the DCL level. This is not meant to be a complete guide. I will

merely point out some of the more important commands and a very brief

description. Proper help can be obtained from the online HELP facility.





NOTE: It should be noted that each of the following commands may have further

----- qualifiers that you can specify. You should check up on these from the

      online help also.





@               -Lets you execute COM script files

ACCOUNTING      -allows you to view and edit system accounting data that keeps

                 track of what system time you have racked up.

ANALYZE         -lets you view the contents of OBJ files in HEX/ASCII format.

ANALYZE/SYSTEM  -Invokes the SDA. VERY VERY USEFUL!! Allows you to view other

                 running processes, their type-ahead buffers etc.

APPEND          -appends the contents of file1 to file2

ATTACH          -allows you to attach yourself to one of your subprocesses

CLOSE           -closes a file that was opened for input/output via OPEN

CONTINUE        -continue a process that you have aborted with control-y

COPY            -copy file1 to file2. You can specify full pathnames, with

                 device and subdirectory. If you want to copy it to your home

                 directory just use sys$login as your 'TO' file.

CREATE          -create a text file of any type. Eg. you want to create a

                 simple COM file or perhaps a letter to another hacker on the

                 system. (you shouldn't be using MAIL to send messages!)

CREATE/DIR      -If you want to create a subdirectory

DELETE          -delete a filename. Remember to specify a version number when

                 you are deleting a file or it wont work.eg. del garbage.com;1

DELETE/INTRUSION_RECORD -gets rid of the failed password attempts

DIFFERENCES     -compares two files and notifies you of their differences

DIRECTORY       -get a directory of the files. Various qualifiers can be chosen

DUMP            -get a hex/ascii file dump

EDIT/EDT        -invokes the VAX EDT interactive text editor

EXAMINE         -view the contents of virtual memory

HELP            -ONLINE HELP MANUAL. REFER TO IT OFTEN!

LINK            -link object files into EXE files that you can run

LOGOUT          -the proper way to terminate a session

PHONE           -Allows you to chat with another user on the system. It is not

                 recommended that you use this, except with fellow hackers.

RENAME          -rename a file or directory

RUN             -lets you execute EXE files

SET CONTROL     -disables/enables interrupts via ctrl-y/ctrl-c

SET DEFAULT     -change directories

SET HOST        -allows you to connect to another mainframe

SET PASSWORD    -change the password of your account

SET PROCESS     -change the characteristics of your process

SET PROMPT      -change the prompt ($)

SET TERMINAL    -change your terminal characteristics

SHOW ACCOUNTING -show the current security/accounting enabled

SHOW AUDIT      -show SECURITY enabled

SHOW DEFAULT    -see your current directory. (Like PWD in UNIX)

SHOW DEVICES    -check out the system setup

SHOW INTRUSION  -view the contents of the breakin database

SHOW LOGICAL    -current logical name assignments

SHOW NETWORK    -lists all the available nodes that you can connect to

SHOW PROCESS    -View your process settings

SHOW PROTECTION -show the default protection you have set

SHOW SYSTEM     -useful to see the running processes

SHOW TERMINAL   -display your terminal characteristics

SHOW USERS      -see who else is logged in.

SPAWN           -spawn a subprocess

STOP            -kill off a subprocess

TYPE            -view a file





  This should give you a general overview of some of the more important

commands that you can use.  It would be impossible for me to list ALL the

commands, and their descriptions, so i suggest that you go through the online

HELP facility and familiarize yourself with the syntax of some these commands.





HACKING

-------



Up to this point i have mainly discussed the basic concepts involved with VMS.

By now you should be familiar and comfortable with the various {false setstrokeadjust}if}if
} bdf
/~
{end
-save0- restore
FreeHandDict begin
}bdf
/FreeHandDict 191 dict def
FreeHandDict begin
/currentpacking where{pop true setpacking}if
/xdf{exch def}bdf
/ndf{1 index where{pop pop pop}{dup xcheck{bind}if def}ifelse}bdf
/min{2 copy gt{exch}if pop}bdf
/max{2 copy lt{exch}if pop}bdf
/isLino statusdict /product get (Lino) anchorsearch{pop pop true}{pop
false}ifelse def
/dr{transform .25 sub round .25 add
exch .25 sub round .25 add exch itransform}bdf
/C{dr curveto}bdf
/L{dr lineto}bdf
/m{dr moveto}bdf
/printerRes
gsave
matrix defaultmatrix setmatrix
72 72 dtransform
abs exch abs
max
grestore
def
/maxsteps 256 def
/calcgraysteps {
currentscreen pop exch 
printerRes exch div exch
2 copy
sin mul round dup mul
3 1 roll
cos mul round dup mul
add 1 add
dup maxsteps gt {pop maxsteps} if
} bdf
/bottom -0 def
/delta -0 def
/frac -0 def
/left -0 def
/numsteps -0 def
/numsteps1 -0 def
/radius -0 def
/right -0 def
/top -0 def
/xt -0 def
/yt -0 def
/df currentflat def
/tempstr 1 string def
/clipflatness currentflat def
/inverted?
0 currenttransfer exec .5 ge def
/level2 
/languagelevel where {pop languagelevel 1 ne}{false}ifelse def
/colorexists
level2
{
statusdict/processcolors known
{statusdict/processcolors get exec}{1}ifelse
4 eq def
}
{systemdict/setcmykcolor known def}
ifelse
/tc1 [0 0 0 1] def
/tc2 [0 0 0 1] def
/fc [0 0 0 1] def
/sc [0 0 0 1] def
/concatprocs{
/packedarray where
{pop dup type /packedarraytype eq 2 index type /packedarraytype eq
or}{false}ifelse
{
/proc2 exch cvlit def/proc1 exch cvlit def
proc1 aload pop proc2 aload pop
proc1 length proc2 length add packedarray cvx
}
{
/proc2 exch cvlit def/proc1 exch cvlit def
/newproc proc1 length proc2 length add array def
newproc 0 proc1 putinterval newproc proc1 length proc2 putinterval
newproc cvx
}ifelse
}bdf
/storerect{/top xdf/right xdf/bottom xdf/left xdf}bdf
/rectpath{newpath left bottom m left top L
right top L right bottom L closepath}bdf
/i{dup 0 eq
{pop df dup}
{dup} ifelse
/clipflatness xdf setflat
}bdf
version cvr 38.0 le
{/setrgbcolor{
currenttransfer exec 3 1 roll
currenttransfer exec 3 1 roll
currenttransfer exec 3 1 roll
setrgbcolor}bdf}if
/gettint{0 get}bdf
/puttint{0 exch put}bdf
/vms {/vmsv save def} bdf
/vmr {vmsv restore} bdf
/vmrs{vmsv restore /vmsv save def}bdf
/eomode{
{/filler /eofill load def /clipper /eoclip load def}
{/filler /fill load def /clipper /clip load def}
ifelse
}bdf
/CD{/NF exch def{exch dup/FID ne 1 index/UniqueID ne and{exch NF 3 1 roll put}
{pop pop}ifelse}forall NF}bdf
/MN{1 index length/Len exch def
dup length Len add string dup
Len 4 -1 roll putinterval dup 0 4 -1 roll putinterval}bdf
/RC{4 -1 roll /ourvec xdf 256 string cvs(|______)anchorsearch
{1 index MN cvn/NewN exch def cvn
findfont dup maxlength dict CD dup/FontName NewN put dup
/Encoding ourvec put NewN exch definefont pop}{pop}ifelse}bdf
/RF{dup FontDirectory exch known{pop 3 -1 roll pop}{RC}ifelse}bdf
/FF{dup 256 string cvs(|______)exch MN cvn dup FontDirectory exch known
{exch pop findfont 3 -1 roll pop}{pop dup findfont dup maxlength dict CD
dup dup
/Encoding exch /Encoding get 256 array copy 7 -1 roll {3 -1 roll dup 4
-2 roll put}forall put definefont}ifelse}bdf
userdict begin /BDFontDict 20 dict def end
BDFontDict begin
/bu{}def
/bn{}def
/setTxMode{av 70 ge{pop}if pop}def
/gm{m}def
/show{pop}def
/gr{pop}def
/fnt{pop pop pop}def
/fs{pop}def
/fz{pop}def
/lin{pop pop}def
end
/MacVec 256 array def
MacVec 0 /Helvetica findfont
/Encoding get 0 128 getinterval putinterval
MacVec 127 /DEL put MacVec 16#27 /quotesingle put MacVec 16#60 /grave put
/NUL/SOH/STX/ETX/EOT/ENQ/ACK/BEL/BS/HT/LF/VT/FF/CR/SO/SI
/DLE/DC1/DC2/DC3/DC4/NAK/SYN/ETB/CAN/EM/SUB/ESC/FS/GS/RS/US
MacVec 0 32 getinterval astore pop
/Adieresis/Aring/Ccedilla/Eacute/Ntilde/Odieresis/Udieresis/aacute
/agrave/acircumflex/adieresis/atilde/aring/ccedilla/eacute/egrave
/ecircumflex/edieresis/iacute/igrave/icircumflex/idieresis/ntilde/oacute
/ograve/ocircumflex/odieresis/otilde/uacute/ugrave/ucircumflex/udieresis
/dagger/degree/cent/sterling/section/bullet/paragraph/germandbls
/registered/copyright/trademark/acute/dieresis/notequal/AE/Oslash
/infinity/plusminus/lessequal/greaterequal/yen/mu/partialdiff/summation
/product/pi/integral/ordfeminine/ordmasculine/Omega/ae/oslash
/questiondown/exclamdown/logicalnot/radical/florin/approxequal/Delta/guillemotl
eft
/guillemotright/ellipsis/nbspace/Agrave/Atilde/Otilde/OE/oe
/endash/emdash/quotedblleft/quotedblright/quoteleft/quoteright/divide/lozenge
/ydieresis/Ydieresis/fraction/currency/guilsinglleft/guilsinglright/fi/fl
/daggerdbl/periodcentered/quotesinglbase/quotedblbase
/perthousand/Acircumflex/Ecircumflex/Aacute
/Edieresis/Egrave/Iacute/Icircumflex/Idieresis/Igrave/Oacute/Ocircumflex
/apple/Ograve/Uacute/Ucircumflex/Ugrave/dotlessi/circumflex/tilde
/macron/breve/dotaccent/ring/cedilla/hungarumlaut/ogonek/caron
MacVec 128 128 getinterval astore pop
/fps{
currentflat 
exch 
dup 0 le{pop 1}if
{
dup setflat 3 index stopped
{1.3 mul dup 3 index gt{pop setflat pop pop stop}if}
{exit}
ifelse
}loop
pop setflat pop pop
}bdf
/fp{100 currentflat fps}bdf
/clipper{clip}bdf
/W{/clipper load 100 clipflatness fps}bdf
end%. FreeHandDict
end%. FHIODict
%%EndProcSet
%%EndProlog
%%BeginSetup
FHIODict begin
FreeHandDict begin
30.8218 154.9947 578.6112 702.7841 storerect rectpath clip newpath
/onlyk{false}ndf
/ccmyk{dup 5 -1 roll sub 0 max exch}ndf
/setcmykcolor{1 exch sub ccmyk ccmyk ccmyk pop setrgbcolor}ndf
/setcmykcoloroverprint{4{dup -1 eq{pop 0}if 4 1 roll}repeat setcmykcolor}ndf
/findcmykcustomcolor{5 /packedarray where{pop packedarray}{array astore
readonly}ifelse}ndf
/setcustomcolor{exch aload pop pop 4{4 index mul 4 1 roll}repeat
setcmykcolor pop}ndf
/setseparationgray{1 exch sub dup dup dup setcmykcolor}ndf
/setoverprint{pop}ndf
/currentoverprint false ndf
/colorimage{pop pop
[5 -1 roll/exec cvx 6 -1 roll/exec cvx 7 -1 roll/exec cvx 8 -1 roll/exec cvx
/cmykbufs2gray cvx]cvx image}
%. version 47.1 on Linotronic of Postscript defines colorimage
incorrectly (rgb model only)
version cvr 47.1 le isLino and{userdict begin bdf end}{ndf}ifelse
/customcolorimage{
colorexists
{
aload pop pop 4 array astore
setimagecmyk
currentcolortransfer
{ik mul ik sub 1 add}concatprocs 4 1 roll
{iy mul iy sub 1 add}concatprocs 4 1 roll
{im mul im sub 1 add}concatprocs 4 1 roll
{ic mul ic sub 1 add}concatprocs 4 1 roll
setcolortransfer
/magentabuf 0 string def
/yellowbuf 0 string def
/blackbuf 0 string def
{invbuf dup length magentabuf length ne
{dup length dup dup
/magentabuf exch string def
/yellowbuf exch string def
/blackbuf exch string def}if
dup magentabuf copy yellowbuf copy blackbuf copy pop}concatprocs
{magentabuf}{yellowbuf}{blackbuf}true 4 colorimage
}
{
pop image
}
ifelse
}ndf
/separationimage{image}ndf
/newcmykcustomcolor{6 /packedarray where{pop packedarray}{array astore
readonly}ifelse}ndf
/inkoverprint false ndf
/setinkoverprint{pop}ndf
/overprintprocess{pop}ndf
/setspotcolor
{spots exch get 0 5 getinterval exch setcustomcolor}ndf
/currentcolortransfer{currenttransfer dup dup dup}ndf
/setcolortransfer{systemdict begin settransfer end pop pop pop}ndf
/getcmyk {
dup length 4 eq
{aload pop}
{aload pop spots exch get 0 4 getinterval aload pop 4
{4 index mul 4 1 roll}repeat 5 -1 roll pop} ifelse
}bdf
/setimagecmyk{
getcmyk/ik xdf /iy xdf /im xdf /ic xdf
}ndf
/autospread{pop}ndf
/fhsetspreadsize{pop}ndf
/fhsetspreadallow{pop}ndf
/strokeopf false def
/fillopf false def
/R{0 ne /strokeopf xdf}bdf
/O{0 ne /fillopf xdf}bdf
/filler{fill}bdf
/F{fc fhsetcolor fillopf setoverprint false autospread
gsave /filler load fp grestore false setoverprint}bdf
/f{closepath F}bdf
/S{sc fhsetcolor strokeopf setoverprint true autospread {stroke}fp false
setoverprint}bdf
/s{closepath S}bdf
/B{fc fhsetcolor fillopf setoverprint gsave /filler load fp grestore
sc fhsetcolor strokeopf setoverprint true autospread {stroke}fp false
setoverprint}bdf
/b{closepath B}bdf
/setcolorscreen where{pop}{/setcolorscreen{setscreen pop pop pop pop pop
pop pop pop pop}bdf}ifelse
/fhsetcolor{dup length 4 eq
{aload overprintprocess setcmykcolor}
{aload 1 get spots exch get 5 get setinkoverprint setspotcolor}
ifelse
}ndf
/settextcolor{
dup fhsetcolor
textblackopf
{
dup length 4 eq
{onlyk{3 get 1.0 eq{true setinkoverprint}if}{pop}ifelse}
{pop}
ifelse
}
{pop}ifelse
}ndf
/ka{/fc xdf}bdf
/Ka{/sc xdf}bdf
/xa{/fc xdf} bdf
/Xa{/sc xdf} bdf
/bc2[0 0]def
/bc4[0 0 0 0]def
/absmax{2 copy abs exch abs gt{exch}if pop}bdf
/calcstep
{ {calcgraysteps}{maxsteps}ifelse
tc1 length 4 eq
{
0 1 3
{tc1 1 index get
tc2 3 -1 roll get
sub
}for
absmax absmax absmax
}
{
bc2 tc1 1 get 1 exch put
tc1 gettint tc2 gettint
sub abs
}
ifelse
mul abs round dup 0 eq{pop 1}if 
dup /numsteps xdf 1 sub dup 0 eq{pop 1}if /numsteps1 xdf
}bdf
/cblend{
tc1 length 4 eq
{
0 1 3
{bc4 exch
tc1 1 index get
tc2 2 index get
1 index sub
frac mul add put
}for bc4
}
{
bc2
tc1 gettint
tc2 gettint
1 index sub
frac mul add
puttint bc2
}
ifelse
fhsetcolor
}bdf
/logtaper{/frac frac 9 mul 1 add log def}bdf
FHIODict begin
/origmtx matrix currentmatrix def
/iminv false def
/invbuf{0 1 2 index length 1 sub{dup 2 index exch get 255 exch sub 2
index 3 1 roll put}for}bdf
/cmykbufs2gray{
dup length 0 1 3 -1 roll 1 sub
{4 index 1 index get
4 index 2 index get
4 index 3 index get
4 index 4 index get
255 exch sub ccmyk ccmyk ccmyk pop 5 mul exch 45 mul add exch 14 mul add
-6 bitshift
2 index 3 1 roll put}for
4 1 roll pop pop pop
}bdf
end
/currentpacking where{pop false setpacking}if
/spots[1 0 0 0 (Process Cyan) false newcmykcustomcolor
0 1 0 0 (Process Magenta) false newcmykcustomcolor
0 0 1 0 (Process Yellow) false newcmykcustomcolor
0 0 0 1 (Process Black) false newcmykcustomcolor
0 0 0 0  (White) false
newcmykcustomcolor
]def
%%EndSetup

[] 0 d
3.863708 M
1 w
0 j
0 J
0 O
0 R
0 i
false eomode
[0 0 0 1] Ka
[0 0 0 1] ka
vms
u
u
true fhsetspreadallow
47.8019 428.881 m
47.8019 571.7924 163.6511 687.6416 306.5625 687.6416 C
449.4739 687.6416 565.3231 571.7924 565.3231 428.881 C
565.3231 285.9697 449.4739 170.1204 306.5625 170.1204 C
163.6511 170.1204 47.8019 285.9697 47.8019 428.881 C
b
U
u
69.0672 428.881 m
69.0672 560.0477 175.3958 666.3763 306.5625 666.3763 C
437.7292 666.3763 544.0578 560.0477 544.0578 428.881 C
544.0578 297.7144 437.7292 191.3858 306.5625 191.3858 C
175.3958 191.3858 69.0672 297.7144 69.0672 428.881 C
[0 0 0 0] ka
b
U
U
vmr
vms
u
u
true fhsetspreadallow
30.8218 702.7841 m
578.6112 702.7841 L
578.6112 154.9947 L
30.8218 154.9947 L
30.8218 702.7841 L
n
U
453.0146 593.299 m
503.5003 620.4117 L
560.5305 539.0736 L
514.7194 497.937 L
453.0146 593.299 L
[0 0 0 0] ka
f
n
105.224 324.0418 m
84.6558 277.2957 L
115.5082 241.7687 L
142.6209 272.6211 L
105.224 324.0418 L
f
n
31.3653 382.0069 m
87.4605 398.8354 L
94.9399 354.8941 L
37.9097 357.6989 L
31.3653 382.0069 L
f
n
257.6161 618.5418 m
290.8058 600.7783 311.2391 589.9844 348.7709 586.287 C
358.2205 585.3562 373.1002 585.3447 373.1002 585.3447 C
400.1465 584.2971 416.0852 557.3045 416.0852 557.3045 C
403.9545 557.2953 L
403.9545 546.6366 403.9545 539.3438 403.9545 530.181 C
391.3098 525.9847 366.0669 495.5997 366.0669 495.5997 C
362.14 513.9253 334.7471 545.1505 307.1669 549.8251 C
307.1669 549.8251 328.6701 554.0323 338.506 565.7101 C
317.4511 571.7958 310.0845 574.4759 295.9479 584.4172 C
272.1074 598.441 257.6161 618.5418 257.6161 618.5418 C
[0 0 0 1] ka
f
n
498.3873 599.3694 m
498.8623 599.6678 511.25 588 511.477 581.6048 C
511.6147 577.723 509 555.5 497.4523 555.4254 C
491.9902 555.3901 475.0128 562.4836 475.0128 569.4501 C
475.0128 583.4747 L
482.5 589 488.25 593 498.3873 599.3694 C
f
n
205.7392 458.1877 m
217.8939 458.1877 L
223.6909 458.1877 228.5 452 230.0486 448.8379 C
230.0486 436.6832 L
230.0486 435.0938 222.5688 422.6585 216.0239 422.6585 C
212.9385 422.6585 191.7145 431.9148 191.7145 437.6182 C
191.7145 445.5655 205.7392 458.1877 205.7392 458.1877 C
f
n
271.1725 408.1846 m
276.3146 396.4981 279.1001 395.0016 288.4685 383.8767 C
295.9479 374.9949 326.8003 383.8767 326.8003 383.8767 C
312.25 373.25 250.75 327.25 236.5 321.5 C
218.9345 314.4122 161.3193 297.3965 161.3193 297.3965 C
157.5 300.75 151.9523 328.9807 127.201 347.8603 C
107.5613 362.841 105.7565 362.0152 90.2653 366.5806 C
72.5483 371.802 43.053 370.2998 43.053 370.2998 C
68.5 379.75 79.75 384.5 113.1709 384.8116 C
133.1919 384.9983 134.9789 384.5441 171.6034 376.8648 C
200.586 370.7878 224.8939 353.0243 224.8939 353.0243 C
271.1725 408.1846 L
f
n
127.201 323.5509 m
131.9696 321.8555 138.3317 317.3007 142.1534 312.8227 C
148.8164 305.0155 151.5105 296.4365 151.5105 296.4365 C
151.5105 296.4365 137.003 289.0936 124.3899 277.7632 C
113.3639 267.8584 103.9519 256.4436 101.0169 241.7687 C
100.5494 239.4314 95.4074 238.7302 94.005 246.4433 C
92.6041 254.1479 94.4724 267.9465 94.4724 267.9465 C
94.4724 267.9465 103.2604 285.616 108.4962 294.1243 C
117.285 308.2424 118.5 315 127.201 323.5509 C
f
n
427.3289 317.941 m
436.8083 318.1114 451.6384 317.941 451.6384 317.941 C
451.6384 317.941 452.0963 314.4705 451.6384 312.3311 C
449.7424 303.4735 435.4632 303.7293 412.3693 294.5665 C
387.1249 284.4688 374.5865 279.9465 368.8717 279.1656 C
358.7999 277.7893 361.3923 286.8786 361.3923 286.8786 C
361.6261 295.2929 369.084 303.4974 374.9487 314.9263 C
374.9487 314.9263 406.8697 317.5731 427.3289 317.941 C
f
n
407.2035 451.6584 m
414 452.25 429.5476 452.4064 436.6535 451.6584 C
436.6535 451.6584 446.4701 451.191 456.3132 448.8379 C
460.757 447.7756 465.5 446.1464 465.5 442.5 C
465.5 429.6908 412.25 332 410.0082 324.5092 C
388.0376 330.5862 348.4569 322.4282 313.7114 305.8108 C
281.4566 290.3846 239.3852 258.1298 239.3852 258.1298 C
273.4962 297.4235 317.7643 338.7731 351.5757 366.5806 C
401.5939 407.7172 411.8538 409.6046 422.1622 420.8061 C
422.1622 420.8061 316.9836 387.6164 305.2971 388.0838 C
293.0587 388.5733 278.6674 408.4469 278.6674 416.1137 C
278.6674 421.7235 296.4153 452.5934 296.4153 452.5934 C
316.5161 433.4275 L
350.4226 445.7434 394.7965 450.5786 407.2035 451.6584 C
f
n
548.3765 603.1156 m
549.7789 583.0148 548.1756 564.8962 542.767 554.9672 C
534.75 540.25 536.5 538.5 511.477 512.4164 C
501.1094 501.6095 461.6426 475.9523 447.8985 475.9523 C
437.2397 475.9523 424.4995 484.8481 405.8011 496.5347 C
387.1027 474.0965 380.0908 464.7473 372.1439 456.8005 C
367.25 455.5 338.4961 448.6926 325.8654 448.3862 C
320.25 448.25 308 459 302.9769 463.7975 C
302.9598 506.8188 L
293.6106 510.091 267.4328 519.4402 253.8764 524.5823 C
253.8764 524.5823 234.2431 476.4339 229.101 465.2148 C
215.0772 468.9545 204.3217 470.4189 196.3788 469.8894 C
175.3431 468.487 169.5542 468.0956 148.6978 457.268 C
120.2738 442.5116 101.9518 420.3386 101.9518 420.3386 C
108.6836 430.2494 133.5483 488.5854 196.8463 528.7894 C
202.4561 532.3423 239.3433 555.5533 254.358 556.3604 C
263.2257 556.8371 317.75 535.25 320.7415 532.9859 C
342.9023 516.2136 361.6 479.9727 364.6854 476.8872 C
409.5644 524.5711 L
412.3693 522.7012 432.8877 511.5058 451.1447 502.6116 C
460.0004 517.5828 467.0384 531.1267 479.1924 554.9672 C
489.944 549.8251 502.4621 545.9127 518.459 555.4347 C
538.0924 567.1212 539.4948 582.5474 548.3765 603.1156 C
f
n
U
vmr
%%Trailer
end  % FreeHandDict
end  % FHIODict


#! rnews 680
Path: merk!alliant!linus!agate!ames!pacbell.com!well!moon!cyberden!system
From: [email protected]
Newsgroups: comp.bbs.waffle
Subject: USERS command V1.65 hangs system
Message-ID: 
Date: Sat, 03 Oct 92 14:16:42 PDT
Organization: Indescribable Creations
Lines: 10

Is there a fix for this problem?

I come home to find that some user has type USERS and get's some garbage
for the first user to the extent of some field codes and then it hangs forever.

orcist

__________________________________________________________________________
   |       /         |\
   | H E   \ Y B E R |/ E N       [ [email protected] ]
#! rnews 1482
Path: merk!alliant!linus!think.com!rpi!batcomputer!munnari.oz.au!network.ucsd.edu!porgy!kestanol
From: [email protected] (Keith C. Estanol)
Newsgroups: rec.games.mud.tiny
Subject: Re: TINYSNOOPING AGAIN
Date: 3 Oct 1992 22:15:46 GMT
Organization: UC San Diego
Lines: 28
Distribution: world,local
Message-ID: <[email protected]>
References: 
NNTP-Posting-Host: porgy.ucsd.edu

In article 

References: 

Date: Thu, 20 Aug 92 03:19:43 EDT



thanatos (Thanatos) writes:



> Nobody call Newton Underground. It's a bad bbs, all it has is good games, 

> lots of games. But, they're liberal but not anarchists(how can the two not 

> go together...oh i see..anarchist don't believe in any form of government)

> but...I just yelled at the sysop for not giving me higher acces after i ul'd 

> a bunch of anarchy sections to the education file section...It's educational 

> isn't it? Well, I thought so, he didn't...I'll put in a copy of his 

 

        Don't be too hard on Joe. As messed up as he can seem, he's a good 

guy, in my opinion. He incredibly, rigidly lawful in his ways, and he's a 

neopagan, which i respect, but still find a bit cheesey... But he makes for 

good discussions.



        - Random



)

> but...I just yelled at the sysoFrom: makari (Random Tox)

Level Janus: Yo ho ho and a bottle of Demerol

Message-ID: 

References: 

Date: Thu, 20 Aug 92 03:29:19 EDT



smut (Vince Niel) writes:



> I just went on a leeching spree of the works.  I'm sorry, I, I, just

> couldn't help it.  So many files, so little time to read them all.  I

> love this place.  Never have I found such a vast amount of knowledge and

> information under one roof at 2400 bps with a semi-small hard disk.  Ans

> this aint a warezz%$^@%^ board either.  Sorry I kept other years from

> logging on.  I will try to keep my works leech sprees, unlike my Argus

> porno gif sprees, at night.  Thanks.  I feel better already!

 

        Kind of sad. Don't get ripped, Vince, but ... Oh well.



        Your RA hacking thing was mostly plagiarized anyway, and via certain 

measures, RA can be safeguarded quite well.



        And the MATP BBS system that MAcula wanted you to call is indeed a 

butt ugly bbs with shit-ass structure. I would have preferred to have 

Aldebaran take over the BBS, but he's living in a tiny dorm room, so it's 

almost impossible. Too bad, since MAcula is twisting The Eleventh HOur into 

little bits. I streamline it and come back from france to discver he's 

trashed my BBS completely, and KILLED the hard drive. He backed it up, but 

ALL the files are gone. I'm fucking ripped at him. He's competent what has 

he done?  Jesus fuck, im mad.



        I need to reconsider leaving it with him... he ruined it.. he bent 

it out of shape.. and the modem doesn't answer very well or do decent work.. 

fuck! and i cant switch to another bbs, because i'll lose allt he user 

records and bases and its too much of a pain. Anyone know if theres a 

telegard 2.7 to TAG messagebase converter? Yes i run a tg board, so sue me, 

its the first BBS software i ever played with, and the BBS was originally 

aimed at teachers, so i wanted something simple, friendly and easy to use, 

since most arent computer literate. Ah vell. I'll be running a Remote Access 

BBS at Amherst, on campus... if anyone cares. Unfortunately Trog will be 

sysop, and thus be totally foolish and silly, and dream of playing Food 

Fight. Help me god.... But as cosysop and designerof the board, i'll have 

some major say. Fuck. All these thoughts are pissing me off.



- Random "I'm 'Mad' too 'Bob'!" Tox





 the BBS was originally 

aimed at teachers, so i wanted something simple, friendly and easy to use, 

since moFrom: makari (Random Tox)

Level Janus: Yo ho ho and a bottle of Demerol

Message-ID: 

References: 

Date: Thu, 20 Aug 92 03:30:09 EDT



jupiter (Peregrinus Jupiter) writes:



> > logging on.  I will try to keep my works leech sprees, unlike my Argus

> > porno gif sprees, at night.  Thanks.  I feel better already!

> 

> 

> That's about as low as it gets.

> -ASJ

 

        That's what i wanted to say. Thanks... I agree. Porn GIFs are 

pathetic.





From: makari (Random Tox)

Level Janus: Yo ho ho and a bottle of Demerol

Message-ID: 

References: 

Date: Thu, 20 Aug 92 03:30:09 EDT



jupiter (Peregrinus Jupiter) writes:



> > logging on.  I will try to keep my works leech sprees, unlike my Argus

> > porno gif sprees, at night.  Thanks.  I feel better already!

> 

> 

> That's about as low as it gets.

> -ASJ

 

        That's what i wanted to say. Thanks... I agree. Porn GIubject of the painting in real life.  Just enjoy the painting for

what it is, and if you want to read the book, that's certainly ok too,

but don't compare 'em - that's my view.



|Steve J. White		  |"Either there's something wrong with me,	  |

|[email protected]  | or there's something wrong with the universe."|

|skeptic@large@9600bps	  |	- Dr. Crusher on ST:TNG			  |



-- 

 [email protected]   FutureCulture E-List: [[email protected]]

 andy (hawkeye)         new edge, technoculture, cyberpunk, virtual reality,

                        raves, etc. Home of the famous :) FutureCulture FAQ!

 

From merk!nyx.cs.du.edu!ahawks Sat Sep 19 23:27:35 1992 remote from works

Received: by works.uucp (1.65/waf)

	via UUCP; Sat, 19 Sep 92 23:26:39 EDT

	for phantasm

Received: by merk.merk.com (/\==/\ Smail3.1.25.1 #25.17)

	id ; Sat, 19 Sep 92 23:27 EDT

Received: from nyx.cs.du.edu by relay1.UU.NET with SMTP 

	(5.61/UUNET-internet-primary) id AA03068; Sat, 19 Sep 92 23:25:31 -0400

Received: by nyx.cs.du.edu (4.1/SMI-4.1)

	id AA07828; Sat, 19 Sep 92 19:53:43 MDT

From: [email protected] (morrissey's therapist)

Message-Id: <[email protected]>

X-Disclaimer: Nyx is a public access Unix system run by the University

	of Denver.  The University has neither control over nor

	responsibility for the opinions or correct identity of users.

Subject: Mindless Babble for the Terminally Bored

To: [email protected]

Date: Sat, 19 Sep 92 19:53:41 MDT

X-Mailer: ELM [version 2.3 PL11]



If you have nothing else better to do this weekend than watch CNN,

look for their "FutreWatch" segment...Featured some pretty interesting

stuff including:



--a snippet about the new Blade Runner (PS- look for a scene that

shows Rachael on the streets of LA - I don't think this was in either

release of the movie....)



--a little thing about Sneakers, talking about (if I remember right)

the plausibility of breaking the code (DES, I assume), and ummm, the

possibility of getting government information via computer or

something like that...



--and a very interesting and disturbing little piece about a company

that seeks to put a sort of universal price rate on all

information...I only caught the last portion of this, but it seemed

very disturbing to me...The impression I got from the representative

of the corporation was that someday he hoped to see a sort of "cost

this session" applied to *any* information retrieval via computer...

I hope I see this again so I can confirm this and get more accurate

info...Very scary thought that information will not be a free or

almost-free or as-close-to-free-as-you-can-get in the coming

information age....People are already starting to jack up the price of

everything that you could possibly want to knw....

-- 

 [email protected]   FutureCulture E-List: [[email protected]]

 andy (hawkeye)         new edge, technoculture, cyberpunk, virtual reality,

                        raves, etc. Home of the famous :) FutureCulture FAQ!

 

From merk!nyx.cs.du.edu!ahawks Sun Sep 20 14:29:11 1992 remote from works

Received: by works.uucp (1.65/waf)

	via UUCP; Sun, 20 Sep 92 14:53:30 EDT

	for phantasm

Received: by merk.merk.com (/\==/\ Smail3.1.25.1 #25.17)

	id ; Sun, 20 Sep 92 14:28 EDT

Received: from nyx.cs.du.edu by relay1.UU.NET with SMTP 

	(5.61/UUNET-internet-primary) id AA12908; Sun, 20 Sep 92 14:26:34 -0400

Received: by nyx.cs.du.edu (4.1/SMI-4.1)

	id AA04001; Sun, 20 Sep 92 11:18:05 MDT

From: [email protected] (morrissey's therapist)

Message-Id: <[email protected]>

X-Disclaimer: Nyx is a public access Unix system run by the University

	of Denver.  The University has neither control over nor

	responsibility for the opinions or correct identity of users.

Subject: interesting p h i l e (fwd)

To: [email protected]

Date: Sun, 20 Sep 92 11:18:01 MDT

X-Mailer: ELM [version 2.3 PL11]



Morpheus writes:



Thought you might want to check this out, maybe send it out to the list if you

think it's decent...





--------------------------- begin digital.txt -------------------------------



Unauthorised Access UK	0636-708063  10pm-7am  12oo/24oo



X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X

X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X

X/\/                                                                    \/\X

X\/X                        - Digital Underground -                     X\/X

X/\X      Story by Mark Bennett. Published in i-D Technology Issue      X/\X

X\/X                                                                    X\/X

X/\X            Transcribed by Phantasm. 12th September 1992            X/\X

X\/X                                                                    X\/X

X/\X    Unauthorised Access UK. Online 10.00pm-7.00am. +44-636-708063   X/\X

X\/\                                                                    /\/X

X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X

X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X



They've got a file on you. It's on computer. And that computer is connected

to a global network. Who's going to stand up for our civil liberties in the

digital era? Can the anarchic activities of hackers and cyberpunks make them

freedom fighters for the information age?

 

CYBERPUNK

TECHNOLOGY



Cyberspace, the Net, Non-Space, or the Electronic Frontier call it what you

will, but it's out there now, spread across the world like an opulent

immaterial spider's web, growing as each new computer, telephone or fax

machine is plugged in, as satellites close continental divides, hooking

independent phone systems together. It's almost a living entity - the

backbone is the various telephone exchanges, the limbs the copper and fibre-

optic links. Increasingly the world is shifting to this unseen plane. Your

earnings, your purchasing patterns and your poll tax records are processed

there. You may not realise it exists, but it's part of everyday life. As

John Barlow, writer and electronic activist puts it, "Cyberspace is the place

you are when you're on the telephone."



As life moves to this electronic frontier, politicians and corporations are

starting to exert increasing control over the new digital realm, policing

information highways with growing strictness. Before we even realise we're

there, we may find ourselves boxed into a digital ghetto, denied simple

rights of access, whiSubject: Two birds with one can of sauce.

From: ferret (Dave Ferret)

Level SYSOP: Work you Damn insidious machine!

Message-ID: 

Date: Sun, 12 Jan 92 17:19:18 EST



First in response to a /reports section -  

    

    For a long time, there was a section for school reports, and I just 

haven't had a chance to put it back up here, we have a mere dozen or so 

reports, all lacking the pertinant information you wanted, but hey, you have 

to figure if YOU think its good, then thSubject: Re:Re:Re:Re:E.T. phone home

From: makari (Random Tox)

Level Janus: Yo ho ho and a bottle of Demerol

Message-ID: 

References: 

Date: Thu, 20 Aug 92 03:34:01 EDT



jupiter (Peregrinus Jupiter) writes:



> C'mon, I'm serious.  I'm not worried about people stealing my stuff, just 

> fucking with it.  (No puns, please.)  Thanks, Noid, I will look for those 

> phone jack locks.  One of my roommates is from Idaho and I don't want to end 

> up footing the bill for his calls back to his potato(e)-pickin' gf in 

> Boise...

> 

> As for the paper shredder/scissors.  I think having a paper shredder would 

> be k-k00l.  It adds an air of importance and suspicion to things.  Plus I'll 

> have a fireplace and it will be good for makin' kindlin'.

> 

 

Fireplace? Fone jack lock? I thought you were going to UMass/Amherst...





anks, Noid, I will look for those 

> phone jack locks.  One of my roommates is from Idaho and I don't want to end 

> up fo  deviate criminal sexual behavior.



                  ...and finally...



  (e) Publication contains material on the setting up and operation or 

      criminal schemes or how to avoid detection of criminal schemes by 

      lawful authorities charged with the responsibility for detecting 

      such illegal activity. 

 

--- End Document quotes ---

                                                                    _     _

 Now considering our archives, we could very possibly be cited for =_EVERY_= 

item on there, except that we _allegedly_ are allowed to have these items 

and have our rights to have them protected by the First Amendment to 

garuantee FREE SPEECH. But thats something for you to chew on for a while.





























































































































































































































































































and maybe even get them signed. Is anyone else interested in
meeting sometime during the conference for this purpose?

This would at least be slightly more secure than trusting a
posted public key. Of course, whether you believe that it
really is me is a different story. I'm presenting a paper that
I wrote with a co-author that I've never met. So I can't know
that even he is who he claims - or that I am who I claim :-)

Please Email or reply via post. Even if we simply meet to talk
about PGSubject: Re: E.T. phone home

From: makari (Random Tox)

Level Janus: Yo ho ho and a bottle of Demerol

Message-ID: 

References: 

Date: Thu, 20 Aug 92 03:36:22 EDT



> Actually, I've found that by far the best way to keep your roommate from 

> fucking with your stuff is to get rid of your roommate... My preferred 

> method is to Gross/weird him out, by leaving the room a pigsty, playing 

> strange music, and just acting very odd in general. I got rid of my last 

> roommate in just under 3 weeks that way...

 

        I thought you went to high school and were taking a year off before 

college... Where'd you get a roommate?



I get em for summer study programs or whatever, but they're not long enough 

to make it practical.





te from 

> fucking with your stuff is to get rid of your roommate... My preferred 

> method is to Gross/weird him out, by leaving the room a pigsty, playing 

> strange music, and just acting very odd in general. I got rid lk sense to a fool and he calls you foolish.  -- Euripides

#! rnews 1825
Newsgroups: alt.drugs
Path: merk!alliant!linus!agate!spool.mu.edu!sdd.hp.com!elroy.jpl.nasa.gov!news.claremont.edu!jarthur.claremont.edu!jrhine
From: [email protected] (Jared Rhine)
Subject: Nitrous : mechanism
Message-ID: <[email protected]>
Sender: [email protected] (The News System)
Organization: Harvey Mudd College, Claremont, CA 91711
Date: Sat, 3 Oct 1992 21:59:04 GMT
Lines: 26

Come on, don't tell me there isn't a single scuba diver out there who
reads this group?  The mechanism of nitrous oxide is same as for
nitrogen narcosis, commonly called rapture of the deep.  When a diver
goes below about 80 ft, they are in "danger" of getting this effect
(actually I know people who go diving JUST for that effect).  The
nitrous buzz is a function of the amount of nitrogen disolved in your
fatty tissues.  You ongas at an approximately exponetial rate and
offgas at an approximately linear rate.  The nitrogen in your fatty
tissues interferes with neuron transmission.  It is indeed inert to
the body, just hangs around and blocks.  It is NOT a function on
oxygen deprevation; divers are still breathing the same amount of
oxygen at those depths.  When a diver comes up, the nitrogen offgases
safely as it is under a lower pressure (divers breath gases at ambient
pressure which at 100 ft is something like 4 atms; when you come up,
you are under lower pressure so the nitrogen comes out).

So now you can go find another source, go look up nitrogen narcosis in
a scuba book.

-- Jared

-- 
             _   _   _   _   _   _   _   _   _   _   _   _   _   _  _
            / \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \/ \
---------> <  Jared Rhine | Student, Philosopher, Zymurgy Specialist  >
            \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/
#! rnews 568
Newsgroups: alt.bbs.internet
Path: merk!alliant!linus!agate!spool.mu.edu!wupost!news.miami.edu!cybernet!news
From: [email protected] (donna schweikert)
Subject: internet
Message-ID: 
Sender: [email protected]
Organization: Cybernet BBS, Boca Raton, Florida
Date: Sat, 3 Oct 1992 21:26:27 GMT
Lines: 6

i would like to know if there is anyway of telneting out of the state
of michigan without having to go thru merit.
i have accounts in other states, is there a way the internet allows
for this.
thanx 
garth (donna)
#! rnews 1087
Newsgroups: alt.locksmithing
Path: merk!alliant!linus!agate!spool.mu.edu!sdd.hp.com!think.com!rpi!newsserver.pixel.kodak.com!psinntp!psinntp!cubetech.com!imladris!andrew
From: [email protected] (Andrew Loewenstern)
Subject: Re: auto club locks
Message-ID: <[email protected]>
Organization: Cube Technologies, Inc.
References: <[email protected]> <[email protected]>
Distribution: usa
Date: Fri, 2 Oct 1992 20:57:31 GMT
Lines: 14

In article <[email protected]> [email protected] (Jeremy Porter) writes:
>Now maybe the car is less likely to be stolen if it has a club on it, but
>I doubt it makes much difference to a "professional" car thief.

Nothing will stop someone if they want it badly enough.  The trick
then is to drive a piece of shit car like I do.   ;-)


andrew
-- 
[email protected]     | "We shall not cease from exploration
Andrew Loewenstern      |  And the end of our exploring
Cube Technologies, Inc. |  Will be to arrive where we started
                        |  And know the place for the first time." -T.S. Eliot
#! rnews 1279
Path: merk!alliant!linus!agate!spool.mu.edu!uwm.edu!linac!att!cbnewsi!cbnewsh!att-out!rutgers!psuvax1!postscript.cs.psu.edu!fenner
From: [email protected] (Bill Fenner)
Newsgroups: comp.bbs.waffle
Subject: Re: UDFB 1.0
Message-ID: 
Date: 3 Oct 92 22:06:15 GMT
References: <[email protected]> 
Sender: [email protected] (Usenet)
Organization: Penn State Computer Science
Lines: 21
Nntp-Posting-Host: postscript.cs.psu.edu

In article  [email protected] (Duane Davis) writes:
|You could have saved yourself some time. I wrote and released a program
|that does exactly the same thing over a month ago.

And then, of course, there's the perl scripts that I posted to alt.bbs.waffle
last year, and the usenet-file updator that added group descriptions
automagically, so you can get things like

(public) 5:53p (891 left) (?=help) : comp.dcom.modems

comp.dcom.modems (messages from 16475 to 16575)
Data communications hardware and software. 

(comp.dcom.modems) 5:54p (891 left) (?=help) : echo %B
Data communications hardware and software. 
(comp.dcom.modems) 5:54p (890 left) (?=help) : 

I can repost or make the scripts available via mail-server if anyone is
interested.

  Bill
#! rnews 16979
Organization: Senior, Physics, Carnegie Mellon, Pittsburgh, PA
Path: merk!alliant!linus!agate!ames!haven.umd.edu!darwin.sura.net!udel!rochester!cantaloupe.srv.cs.cmu.edu!crabapple.srv.cs.cmu.edu!andrew.cmu.edu!cc4b+
Newsgroups: alt.fan.mike-jittlov
Message-ID: 
Date: Sat,  3 Oct 1992 17:59:50 -0400 
From: Christopher Brian Cox 
Subject: Re: Bitmapped Wizard?
In-Reply-To: 
References: <[email protected]>
	
Lines: 599

Here's a version I made from one of the bitmaps that came across the net
a while back.  Freehand version is available upon (limited I hope)
request.

Chris

ps. anybody remember the 20page square KGB logo we hung off Wean hall?
pps. I wish the Freehand EPS header was smaller


%!PS-Adobe-2.0 EPSF-1.2
%%Creator: FreeHand 3.1
%%Title: Wizard Logo (Freehand)
%%CreationDate: 10/3/92 5:58 PM
%%BoundingBox: 30.8218 154.9947 578.6112 702.7841
%%DocumentProcSets: FreeHand_header 3 1
%%DocumentSuppliedProcSets: FreeHand_header 3 1
%%ColorUsage: Color
%%FHPathName: Dora:Wizard Logo (Freehand)
%%EndComments
%%BeginProcSet: FreeHand_header 3 0
/FHIODict 30 dict def
FHIODict begin
/bdf{bind def}bind def
/d{setdash}bdf
/h{closepath}bdf
/H{}bdf
/J{setlinecap}bdf
/j{setlinejoin}bdf
/M{setmiterlimit}bdf
/n{newpath}bdf
/N{newpath}bdf
/q{gsave}bdf
/Q{grestore}bdf
/w{setlinewidth}bdf
/u{}bdf
/U{}bdf
/sepdef{
dup where not
{
FreeHandSepDict
}
if
3 1 roll exch put
}bdf
/`
{false setoverprint
end %. FreeHandDict
/-save0- save def
pop pop pop pop pop
concat
userdict begin
/showpage {} def
0 setgray 0 setlinecap 1 setlinewidth
0 setlinejoin 10 setmiterlimit [] 0 setdash newpath
/languagelevel where {pop languagelevel 1 ne you want changed from your

default.







EDITING FILES

-------------



  An important utility that all VAX hackers should be familiar with is the EDT

text editor. To call it up, use the EDIT DCL command. ie:



$edit [filename]



This will invoke the EDIT/EDT text editor.  The [filename] refers to the file

that you want to edit.  If the file does not exist, it is created at this point.

The EDT editor does not provide a default file type when creating files, so if

you do not specify one, it will lSubject: Re: bAd bbs

From: makari (Random Tox)

Level Janus: Yo ho ho and a bottle of Demerol

Message-ID: 

References: 

Date: Thu, 20 Aug 92 03:42:07 EDT



thanatos (Thanatos) writes:



> i didn't exactly demand to have more access, i just was kinda in a state of 

> befuddlement b/c he has all this unregistered stuff, and even his bbs in 

> unregistered, but he's real hypocritical about the whole thing, cuase he 

> uses unreged ware and doesn't like ul of anarchist stuff..which is more 

> illegal..

 

        Yes, but the sicko actually stops using the software after a while 

if its unregistered, unless he can pay for it. Seriously. Creepy, huh? He 

switches BBS software every week it seems, lately. I remember when it was 

WWIV. Yick!





nda in a state of 

> befuddlement b/c he has all this unregistered stuff, and even his bbs in 

> unregistered, but he's real hypocritical about the whole thing, cuase he 

> uses unreged ware and doesn't likFrom: makari (Random Tox)

Level Janus: Yo ho ho and a bottle of Demerol

Message-ID: <[email protected]>

References: <[email protected]>

Date: Thu, 20 Aug 92 03:44:05 EDT



iskra (Iskra) writes:



> Hate to disagree with you yet again, Jupitor, but it's illegal to write 

> instructions for committing a crime. I'm fairly certain about this. Whether 

> this has particular law has ever stood up in court I do not know. (I doubt 

> it, but I've been wrong before).

 

        Then how can Loompanics legally sell the How to Kill series of 

books, or whatever it is (Book 1: Your first kill, using a garotte, etc.)





[email protected]>

Date: Thu, 20 Aug 92 03:44:05 EDT



iskra (Iskra) writes:



> Hate to disagree with you yet again, Jupitor, but it's illegal to write 

> instructions for committing a crime. I'm fairly certain about this. Whether 

> this has particular law has ever stood up in court I do not know. (I doubt 

> it, but I've been wrong before).
>have the guts to say who he was, and just for the record i know. The
>problem was discussed and worked out. This petty revenge is stupid and if

Discussed and worked out? The guy was killed and toaded.
This is what you call being 'worked out'?  If you have more 
information about this, please contradict me.
So far as I know, it was *not* petty revenge.

>you all supposedly adults want to act like children . BE MY GUEST! but go
>back to 
>nursery school to do. IMHO i am sick and tired of it. 

Nursery school was kinda fun.

>*steps off her podium and waits for flames.

Stop baiting the newbies.


Keith C. Estanol	    	| [email protected]
UCSD, Cognitive Science 	| [email protected]
Institute of Geo and Planetary Physics : [email protected]
---------------------------------------------------------------
"We don't want to be victims, on that we all agree.
 So we lock up the killer instinct, and throw away the key.."

#! rnews 3013
Newsgroups: rec.games.mud.diku
Path: merk!alliant!linus!think.com!yale.edu!spool.mu.edu!umn.edu!csus.edu!netcom.com!exel
From: [email protected] (Frederick Myers)
Subject: Re: TNG DikuMud opend
Message-ID: <[email protected]>
Organization: Netcom - Online Communication Services  (408 241-9760 guest) 
References: <[email protected]>
Date: Sat, 3 Oct 1992 22:22:56 GMT
Lines: 59



ok, lets see. i get in the mud today and a bunch of people are telling
  me to go read the news groups because some fool (their words, not 
  mine) decided to post some flames about hopper (tng) diku.
ok, well lets see.

1) the prompt -- well if you have bothered to look, the prompt
   offers the options of having the scroll bar or not ( in either
   graphic or ascii) or if you want it to be the standard command
   line prompt (what a lot of diku currently use). so if your
   computer pukes on the idea of the scroll bar, you 
   do not have to use it. and there is also a 'cls' command.
2) using midgaard -- yeah, we tossed around the idea of
   zapping midgaard. well, we decided not to because midgaard
    serves as a good 'ol familiar' to alot of players. if you
    would have bothered to look, there is also another
    town (guernica) that for the time is a little trivial to
    most players ountil the southern continet is done.
3) the say command -- yeah, that space is a toughie. how can
    you judge a mud bassed on having to type a space after 'say'.

4) about use being lazy and not doing anything-- yeah whatever.
    you are right, we have not put anything to the mud. it is all
    generic diku release. NOT. and i think that the commands or
    whatever else we have put in ( a totally re-written crash and
    renting code, fixing the game loop, etc etc) are a little bit
    more than 'bells and whistles'. we take many of the suggestions
    that are given to us by the players, and try to put as 
    many in as possible. we run the game to make others happy
    obviously.
4) about having no creativity -- once again i say 'whatever'.
    yeah, everything on our mud can be seen on other muds.
    uh huh. yeah, nah, we have no areas that are just on our mud.
    we have no things (such as the prompt) that are tng only.
    NOT AGAIN.

by no means do i claim tng to be the best. by no means at all.
   i do not think that any mud can honeslty 100% call itself the
   best.

we try to mke it the best we can. and if you do not like it
   you do not have to play. there is nothing else to say.

i just suggest that people come on and see what it is like b4
   judging it based on someones uninformed judgements.


just a side thought --  i was reading the flame on deth's mud on this
   news group too. i dunno'. i think muds such as deth's, ours and
   some other muds out there are out there and making diku a little
   bit more interesting by creating new and innovative ideas instead
   of just adding the same old stuff. 



reni (co-imp of tng diku, and proud of it)


#! rnews 1202
Path: merk!alliant!linus!agate!spool.mu.edu!sol.ctr.columbia.edu!ucselx!crash!slic!mikey
From: [email protected] (Mike Shirley)
Newsgroups: comp.bbs.waffle
Subject: Multiple copies of Waffle
Message-ID: <[email protected]>
Date: Sat, 03 Oct 92 09:56:35 PDT
References: <[email protected]>
Organization: Muth Valley Seismic Control District, San Diego, CA / Port2
Lines: 19

[email protected] (Ralph Sims) writes:

> Ah, true enough.  I'm running under DESQview and haven't logged out of
> that account in months.  'login' didn't work there, and I never checked
> to see if 'manually' coming in via waffle online.  Learn something new
> every day.

I also use Desqview and keep a window open with Waffle local
console using "waffle online mikey".  I found out the hard way,
while leaving that window open for months, not to stay in the
mailer will your mail file open.  I've lost and/or buggered up a
few letters when the dial-in/dial-out window was writing to my
mail file.  I don't run share.

I know I need to watch for these sort of conflicts but I was
lazy.  Just a reminder from a lazy bum...

--
     Mike, WB6WUI   //   INET:  [email protected]   //   GEnie: SLIC
#! rnews 927
Path: merk!alliant!linus!agate!spool.mu.edu!sol.ctr.columbia.edu!ucselx!crash!sound!markr
From: [email protected] (Mark B. Reinhold)
Newsgroups: sdnet.waffle,comp.bbs.waffle
Subject: Re: COLORS!
Keywords: Colors
Message-ID: <[email protected]>
Date: Sat, 03 Oct 92 13:06:13 PDT
References: 
Organization: SDCT 1-619-461-3415
Lines: 16

[email protected] (Mike Shirley) writes:
> So, which colors did you end up with?  Did you figure out a way
> to do it without re-running Waffle?

I change them in the static and then rerun waffle. At this point
I have black letters on a green background, which seems pretty
relaxing for the eyes. The status bar is suppose to something
different but is not. As for the windows, I haven't seen any
yet.

The problem that I have is that I use VI as my editor, so when I
create a message I go back to black background with white
letters.

Life is fun...

#! rnews 1743
Path: merk!alliant!linus!agate!ames!sun-barr!cs.utexas.edu!uwm.edu!linac!att!att!fang!gator!towers!bluemoon!somenode!a-dent
From: [email protected] (Bryan Hannahs)
Newsgroups: comp.bbs.waffle
Subject: Re: poor transfer rates in Dos Waffle
Message-ID: <[email protected]>
Date: Sat, 03 Oct 92 13:27:13 EDT
References: 
Organization: .sdrawkcaB sgnihT gnipyT roF yteicoS ehT
Lines: 27

[email protected] (Bob Peterson) writes:

>   I just started talking to another Waffle 1.65 running on a fast 386
> under Desqview-386, X00 FOSSIL locked at 19,200 bps, 7 packet window,
> transferring news packets, and see log entries like these.
> 
> 27-Sep-92  19:40 19:44  bluecafe   | 4226 sent   38 rcvd  0 errs 1474 cps
> 02-Oct-92  04:09 04:13  bluecafe   | 5035 sent   38 rcvd  0 errs 1482 cps
> 02-Oct-92  17:12 17:13  bluecafe   | 1097 sent    9 rcvd  0 errs 1467 cps
> 
>   The window size seems critical at these speeds.  I've not played with
> the (experimental) packet size parameter available in uucico for 1.65,
> but that may also have a positive impact.

You didn't say what modem the other end is using. If they're using a
v.32bis modem instead of just v.32, that would mostly explain it, though
the best I've gotten (running Waffle on a 386SX-25 w/a Twincom 14.4DF
modem, FOSSIL unlocked, Waffle 1.65 locked at 38400, talking to a Sun
Sparc 2 using an HST/v.32bis DS) is about 1450cps, with about 1420cps
average. Also, talking to a Supra 14.4 on the same system, I only get
about 1110-1140 cps.

---
"Man created God in his own image." - Lazarus Long

Bryan Hannahs      |   [email protected]    [email protected]
(aka Arthur Dent)  |               [email protected]
#! rnews 1189
Path: merk!alliant!linus!agate!ames!sun-barr!cs.utexas.edu!uwm.edu!linac!att!att!fang!gator!towers!bluemoon!somenode!a-dent
From: [email protected] (Bryan Hannahs)
Newsgroups: comp.bbs.waffle
Subject: Re: Multiple modePath: works!merk!alliant!linus!agate!ames!olivea!spool.mu.edu!sgiblab!kludge!therat!spud!tom

From: [email protected] (Tom Lemos)

Newsgroups: comp.bbs.waffle

Subject: Waffle Offline Reader for 1.65

Message-ID: 

Date: 29 Sep 92 20:08:29 GMT

Organization: Tater Tot Liberation Front, San Francisco CA

Lines: 12



hello there...

does an offline reader for 1.65 exist? 

I know of Wafmail but what version works with 1.65 or is the current 

version compatible. 

 

thanks for your help. any offline reader will be helpful,as my users are 

starting to complain... 





Tom Lemos ([email protected])          Tater Tot Liberation Front

"It's Dan Quayle, FORGET about it!"       San Francisco, California

-Frank Fontana to Murphy Brown.                     +1 415 255 8340

beration Front, San Francisco CA

Lines: 12



hello there...

does an offline reader for 1.65 exist? 

I know of Wafmail but what version works with 1.65 or is the current 

version compatible. 

 

thanks fo