ÛÛÛÛÛÛÛ ÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛ ÛÛÛÛÛÛÝ ÞÛÛÛÛÛÛ ÛÛÞÛÛÛÛÛÛÝÛÛÛÛÛÝ ÍÍÍÞÛÛÛ ÛÛÛÍÞÛÛ ÛÛÛÍÞÛÛ ÛÛÝÞÛÝÞÛÛ ÛÛÛÍÞÛÛ ÍÍÍÍ ÛÛÜÜÜ ÍÍÍÍÍÞÛÝÛÛÝ ÞÛÝÞÛÛÝÍÍÍÍÍÍ ÍÍÍÍÛÛÝ ÛÛÛÍÛÛÝÛÛÛÛÍÛÛÝÞÛÛÍÛÛÍÛÛÝÛÛÛÛÍÛÛÝÍßÛÛÝÞÛÝßßßÍÍÍÍÍÍÛÛÞÛÛ ÛÛ ÛÛÝ ÍÍÍÍÍ ÞÛÛÛÛÛÛÛÛÞÛÛÛ ÛÛÛÞÛÛ ÛÛÝÞÛÝÞÛÛÛ ÛÛÛÞÛÛÛÛÛÛÛÝÛÛÛÛÛÛÛ ÛÛÝÞÛÝÛÛÝ ÞÛÝÞÛÛÛÛÛÝÛÛÝ "The name speaks for itself!" ÞÝ Presents the Damage, INC. Newsletter November 1997 Issue #3. "You ain't seen nothin' yet!" ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ C O N T E N T S : þ INTRODUCTION - An Introduction to the Damage, INC. Newsletter. þ BIG BROTHER BASHING - The Internet: Big Brother's pride and joy. ¯ Search String: {BIG BROTHER} þ BLACKENED'S TIP OF THE MONTH - Practical uses for batch files. ¯ Search String: {BLACKENED} þ CONSPIRACIES AND COVERUPS - Mondex and Electronic Cash: From 1s to 0s. ¯ Search String: {COVERUPS} þ CORRUPTION AND GREED - Corruption and Greed in our Global Markets. ¯ Search String: {GREED} þ H/P INFORMATION AND NEWS - Information for newbies and h/p News. ¯ Search String: {NEWS} þ INTERVIEWS AND INTERROGATIONS - An interrogation of Billy Gates. ¯ Search String: {INTERVIEWS} þ LETTERS TO THE EDITOR - More feedback about the Damage, INC. Newsletter. ¯ Search String: {LETTERS} þ OBJECTIVE OPINIONS - The Media - Mistakes or Misinformation? ¯ Search String: {OPINIONS} þ REPORTS FROM THE FRONT - Privacy Policy Chart - Online Service Providers. ¯ Search String: {REPORTS} þ SOURCE AND SCRIPTS - The File Creator Utility assembly source code. ¯ Search String: {SOURCE} þ THE JOURNALIST'S TOP TEN LIST - Top Ten pranks on the Internet. ¯ Search String: {TOP TEN} þ CLOSING COMMENTS - BLACKENED'S Disturbing Closing Comments. ¯ Search String: {CLOSING} ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ INTRODUCTION: Another issue of the Damage, INC. Newsletter is here... so sit back and enjoy the fucking ride. We're going to take you on a journey that will expand your mind, enlighten your thoughts and awaken your very soul. ;) This November issue is packed with interesting information and we hope it will open your eyes slightly after you've read the articles that we've written. If not, then perhaps you should go back to your clan of zombies, chat for hours in #warez or call your favourite lame board because the Damage, INC. Newsletter wasn't intended for you. That's point blank d00d! Haha... The content and message are more important than the aesthetics and layout. For the loyal readers that understand the concept: enjoy reading the newsletter and send us feedback. BIG BROTHER BASHING - {BIG BROTHER} The Internet: Big Brother's pride and joy. The Internet is well known for the mass amounts of information that are available to its users all around the world. As millions of people obliviously post email and in newsgroups, or move from web site to web site, Big Brother is watching. Never before has it been so easy for Big Brother to profit from the private information it has obtained, as well as track Internet users' activities. It is sickening, but not shocking, how many databases that contain private information are accessible on the Internet. Do you know how easy it is for someone to find your phone number, email address, and street address? Or that extremely sensitive information like your SIN/SSN number is probably available on a pay-for-query database? It is very easy. The more active you are on the Internet, the more chances Big Bro has to learn about you. It is Big Brother's intent to create online dossiers by collecting vast amount of data, and indexing said data by your name. A search engine could retrieve your dossier, and then the searcher could examine it. Every bit of personal data, personal habits, newsgroup posts, etc. would all be disclosed without your knowledge. That information can easily be used against you. With the information that is available, your identity could be easily stolen from you. Decades from now, your words can be used against you. In essence, Big Brother can use the Internet to destroy you...or to control you. For many people, Internet Service Providers (ISPs) are their link to the Internet. What most Internet users don't consider is that their ISP operator could be bought out by Big Brother. How else do you think Yahoo, Hotbot and their kin maintain their email databases? ISP operators sell them! If you chose to be a legitimate Internet user (use an account under your own name) that means that the ISP has your real name, street address, telephone number, plus any other information you had to give them. Does that information get sold as well? Can your particular ISP be trusted to keep your personal information private? Those are the questions you should ask when choosing an ISP. Don't forget that the system administrator can sniff your TCP/IP packets or use a protocol analyzer to see what you are up to. I have also been informed that different types are logs are created, and can't be cleaned up unless your ISP allows you to have a shell account. Everyone that has used Internet Email should realize that their Username@Location attached to every post. Therefore, every email posted can easily be traced back to you. And in any event, your ISP could possibly has a copy of your message backed up. Big Brother has created scanners that scan email messages for "obscene" words. It is not unreasonable to believe that your email is scanned for private information that can be added to your dossier. Plus the administrator of your ISP can read all of your incoming and outgoing email. If you use the Internet at work, your employer has a legal right to read your email. And do you know for sure if an email message is purged after you delete it? Big Brother has found that the World Wide Web is an excellent way to track Internet users, and to learn more about their personal interests. First of all, when you connect to a web site/page the TCP/IP packet contains your your origin site (ISP address) and username. From that information, your email address can be ascertained. With your email address, it is very easy for a web site operator to find out any other personal information, like your real name, street address, telephone number, etc. Of course, all the activities you perform and are logged in a cookie file. Also, any information you have inputted on the web site will be in the cookie file, as well as a database on the actual site. Web sites can read cookie files to find out other information, such as the last web site you have visited. If you return to the site without deleting the cookie file, it reloads all of what you did during previous visits. With all of the information at their disposal, they can do virtually anything. They can spam you with advertising targeted at your perceived interests, sell what they have found to marketing firms, etc. As you can imagine, the battle to keep information private has been lost. The only hope that remains is to give users the option to access the Internet anonymously. Various techniques have been implemented to that end. Anonymous (email) remailers, and the services provided by web proxy servers try to provide anonymity to Internet users. However, anonymous web browsing and email are currently unsophisticated and underdeveloped. Big Brother and hackers will always find ways to defeat the anonymizing systems. Obviously, the best way to access the internet anonymously is to use a "borrowed" account that contains none of your information. Big Brother can't track you then. I am certain that this will be the first of many articles on Big Brother and the Internet. To expose every area of the Internet that Big Brother has infiltrated is impossible in this one article. :-( The intention of this article is: 1) To make you aware of how much of your personal information is easily attainable from the Internet. 2) To let you know how easy it is for Big Brother to link you to your Internet activities. Written by Shatazar - Damage, INC. (C)opyright 1997. BLACKENED'S TIP OF THE MONTH - {BLACKENED} Practical uses for batch files: Here's a quick tip. The batch file below can be used as a shell to DOS utility (or backdoor if you prefer to call it that). Just put it onto a menu and have it execute it like a door. You can also convert it to a filename.com by using a BAT2EXEC utility... to make it more difficult to read. ;) @Echo Off ctty com1 command You should create your own batch files, to automate any of the repetitive commands you do on your system. The DOS manual isn't the greatest reference to use, but most people already have a copy of it just collecting dust on a shelf somewhere. As a start, I suggest you try to learn more about batch programming by reading through your DOS manual. After that, you can download a more advanced reference like TSBAT50.ZIP and learn from those examples. Programming batch files to perform tasks is a simple, efficient way to improve your system. They can be very useful if properly applied. Also, using a batch file for frequently used commands is a real time saver. We've included a copy of DAMZIP.BAT. It's a small (only 650 bytes) batch file that adds zip comments to .ZIP files and includes bbs ads in them as well. Simply clip out the code, and save it to a file named DAMZIP.BAT. Then, you will need to modify it slightly so that it works on your system. As in, change the paths from c:\ads\ to the directory that contains the ascii zip comment file... and your bbs ads. Obviously, the filenames must also be changed to match the files you are going to use for the zip comment and bbs ads. DAMZIP uses .ZIP as a default extension so it's not necessary to enter a filename extension when using it. DAMZIP filename # - Processes a single .ZIP file. DAMZIP * # - Processes *.ZIP files in the current directory. You can select the zip comment file by using the # switch. Examples: DAMZIP * 4 - Processes *.ZIP (all .ZIP files in the current directory) and uses justice4.asc as the zip comment. DAMZIP damage-3 1 - Processes damage-3.zip only and uses justice1.asc as the zip comment. ------------------------------------------------------------------------------ @Echo Off IF "%1"=="" GOTO Help IF not exist %1.zip GOTO Error ECHO. ECHO DAMZIP v1.00 - By Damage, INC. (C)opyright 1997. ECHO Working... FOR %%a IN (%1.zip) DO pkzip -z %%a nul FOR %%a IN (%1.zip) DO pkzip -a %%a c:\ads\(519) >nul FOR %%a IN (%1.zip) DO pkzip -a %%a c:\ads\nuke-you >nul IF not "%1"=="*" GOTO Done ECHO. ECHO ZIP files found: DIR *.ZIP /b GOTO Done :Help ECHO. ECHO DAMZIP v1.00 - By Damage, INC. (C)opyright 1997. ECHO DAMZIP ®filename¯ ®file number¯ ECHO. GOTO End :Done ECHO. ECHO Finished. ECHO. GOTO End :Error ECHO. ECHO Aborting DAMZIP. %1.ZIP was not found. ECHO. :End ------------------------------------------------------------------------------ CONSPIRACIES AND COVERUPS - {COVERUPS} Mondex and Electronic Cash: From 1s to 0s For thousands of years, humans have exchanged currency for goods and services. Currency has always had some real value. In ancient times, currency was judged on the composition of a coin. Gold coins were literally "worth their weight in gold." In modern times, governments issue paper money and coins. Most modern currency doesn't obtain its value from composition. They are backed by the gold reserves of that particular country. The currency only becomes worthless when the country totally collapses. Chartered banks are also afforded protections from that country's reserve bank, so that innocent citizens don't lose all of their money if the bank goes bankrupt. For some reason, governments and "society" wants to change the tried and true method of real currency. With the introduction of "smart" cards, it will be possible for corporations to issue "electronic money." Of course these companies are outside of the regulated banking system, so they are not afforded any protections that currency and bank deposits do. Unlike cash, electronic money has nothing backing it up. You must trust the corporation holding your money completely! Smart cards look like any plastic credit or debit card. They differ in that they do not rely on magnetic strip technology. Inside of a smart card is a microprocessor that is capable of storing, sending and receiving information. To put electronic cash on the card, one must go to an ATM machine and download it onto the smart card. The money in your bank account is gone. It now only exists on the smart card. These cards are also referred to as a Stored Value Card. You then may go to businesses that have a compatible smart card system to purchase items or services. Gee, doesn't cold hard cash do the same thing? ;) What is the advantage gained by using electronic cash? The only advantage I've heard is "I don't have a whole bunch of change in my pocket." Haha... In reply I say that you can easily have nothing in your pocket...and in the "smart" card. Mondex International is one of many corporations that are competing to establish their technology as the standard electronic cash system. They currently have pilot programs under way in various small cities in, such as Guelph, Ontario. The current Mondex system requires an Automatic Teller Machine (ATM) of a participating bank to put money onto a card. Then the electronic cash can be used at retailers that are participating in the trial. Mondex cards are also capable of performing card-to-card electronic cash transfers. Of course, the transfer is offline, so Mondex's records have to be updated at an ATM. Fat cat banks and corporations that back Mondex are MasterCard International (which owns 51% of Mondex), Royal Bank of Canada, Canadian Imperial Bank of Commerce, and the most corrupt of them all, Bell Canada. What Mondex users may not know is that Mondex once claimed that all of their transfers were "anonymous, just like cash." They said this in a previous pilot program in Swindon, United Kingdom. However, Privacy International made a formal complaint, exposing Mondex's lie. A lie that should be obvious since each Mondex card has its own unique ID number. It may be of interest to Guelph Mondex users that CIBC was planning on creating dossiers and marketing reports on all Mondex users that would use their ATM machines. While telling Mondex users that their system was "anonymous", they told the participating banks and corporations that "the Mondex card system is fully auditable. There is an electronic record of the time, date, amount, and participants of each transaction." Huh? How can something be "anonymous" and "fully auditable" at the same time? Mondex is really trying to have it both ways. Mondex was caught in a blatant lie. And yet you are expected to trust them with your money! What integrity does this corporation have? The truth is that the Mondex auditing system is complete enough to invade the privacy of users, but not "fully auditable." A Mondex card has a very limited amount of storage. Therefore, an active "offline" Mondex user can overflow the memory, causing data loss. And were talking "money" here, so data loss means money loss. If the electronic cash is lost in cyberlimbo, or if the card is damaged guess who benefits? The word `Mondex' should come to mind. The flaws in the Mondex auditing system leaves the entire system very vulnerable to fraud. Imagine an organized crime syndicate creating a huge amount of counterfeit electronic cash? Mondex would meltdown. And if Mondex's system is compromised by fraud, who pays in the end? Let's put it this way, you might as well take your Mondex card and melt it down. You won't be able to access the money on your card because Mondex will shut its system down. Are you skeptical that Mondex can indeed meltdown? I'll quote Mondex's `top security man'. "Let's be honest -- no system is fraud-proof. If I were to claim Mondex is fraud-proof, you'd say I was an idiot. And you'd be right. We don't claim that. The system has to be built to tolerate a loss. If you don't design your system like that, you've had it. We've designed a system that will tolerate loss." Mondex is ready to "tolerate a loss." Are you? Are you prepared to lose everything when Mondex's system is compromised? Mondex doesn't care. They'll just change their internal encryption scheme and send you a new card with an apology letter. Are you prepared for your Mondex card to be shut down if Mondex is suspicious of fraudulent activity? Do you believe it could be shut down just before you need to pay for lunch, or taxi fare? Cash just doesn't disappear like the insecure electronic version can. ;) If you use a Mondex card, you are a puppet...and Mondex is pulling your strings. There is a price to be paid if you have the need to be "high-tech." If Mondex cards are distributed throughout North America, Europe, and the rest of the world, we'll all have to decide whether we will use a smart card or cash. Damage, INC. just wanted to warn you that Mondex and other similar "smart cards" aren't as secure as they claim to be, and aren't as fast or convenient as cash. Written by Shatazar - Damage, INC. (C)opyright 1997. CORRUPTION AND GREED - {GREED} Corruption and Greed in our Global Markets: ..an article by the journalist FOREWORD: In writing this article, I want to make you aware of some of the reasons behind the hacking/phreaking/anarchy/viruses/carding scene. Why do people join together to learn about information that goes "against the state?" Why do people risk themselves to participate in illegal activity? Big Brother sees this as a form of treason... and I think if you learn the philosophy behind h/p, you will understand why *we* think our gov't officials are the real perpetrators. Corruption is the cancer of our society. It eats away at the living flesh from the inside out. Corruption multiplies, it mutates, and it infects. Ask any politician what their original motives were for getting into politics. Compare their answer to what their current activities are. You will most like see the "greed virus" has overtaken their psyche. They have seen the briefcases of bribe money in front of them, and they were weak. Their weakness becomes manifested in society as "cutbacks" and "downsizing." Of course none of this can be proven. What I can prove though, is what happens globally and nationally in our economic system. How corruption and greed in our global markets have caused a once stable system to fall to its knees. How individual and mass decisions affect entire nations' economic balance. I will also provide you with educated predictions on current cover-ups of corruption/greed in economic markets. Who is the criminal behind the mask in most of these situations? Either the United States Gov't, or large corporations such as Microsoft, McDonalds, Coca-Cola, etc. As an example, when you buy a CD such as Pearl Jam, or Spice Girls... you are paying around $20.00 when all is said and done. Let me give you a general price break-down for your $20.00: Cost of CD to produce: $1.00 or less Taxes going to Big Brother: $2.50 Royalties to the artist: $3.00 or less Royalties to BMG/SONY/VIRGIN: $12.00 or more. That is an estimation, but it shows you how greedy the music companies are... we should only be paying about 1/2 of what we do for CD's and tapes. Most people are too ignorant to realize this.. although there's not much we can do about it except stop buying CD's. The focus of this article however is global markets. So I would like to start off by bringing your attention to our nice little deal with US and the Mexicans - NAFTA. In case you don't know, this stands for North American Free Trade Agreement. And essentially what it does is enable large manufacturers to move plants down into mexico where labour is dirt cheap. The old factories are either run at 1/2 the output (with 50% less employees) or shutdown completely). This is simplified to prove a point, and perhaps NAFTA was not originally meant to cause poverty. But it has, and that makes me doubt this fact. Key questions are: "why would a company sell-out its employees just for bigger profits?" and "How does the government let this happen?" The answer is up to you to find. When it comes to greed, all big companies know that the most profits are gained when you have a monopoly on a market. A monopoly means that only one company is providing a product, and there is no competition to drive down prices, and increase quality standards. In our capitalist society today, this kind of behaviour dominates. Micro$oft is probably the epitome of this negative action. Microsoft is the bully of the software market, and if you weren't aware of this, and still support Microsoft's inferior software, then perhaps you should re-evaluate. Microsoft's marketing scheme is extremely aggressive and self-serving. I'm all for making big profits, but this is getting out of hand. What Bill does is force retailers who want to be a licensed microsoft vendor to put win95 on the new machines that they sell. Microsoft crams its shitty software down their throats (retailers), and as a result, they cram it down *our* throats, in order to make what little profit they can to pay the bills. This information is from a reliable source. Because this kind of behaviour is very bad for publicity, companies try to hide it from you. If you an ignorant zombie, you might perhaps not believe anything I illustrate here. Go fuck yourself. To continue, I am going to outline a couple of ideas that a lot of enlightened people believe to be true. Currently we are cutting down trees at a rate of something to the order of one square kilometer per minute. It is sickening. If you have ever driven past a "de-forested area" you will immediately feel death in the air. Logging companies are relentlessly slaughtering our earth's beautiful forests. The shocking thing is, we know of an alternative source for this material, yet it is illegal to grow for industrial, and recreational purposes. I am talking about Cannabis; Hemp; Marijuana. Hemp is known to yield higher gains for paper products than any tree. Hemp grows annually, unlike trees which take 40-100 years to mature. And Hemp is cheaper and easier to grow. Why then, are we not utilizing this wonderful plant? The answer my friends is because of a little word called 'greed'. Let me explain, logging has been a huge business over the course of the 20th century. The companies are all associates, and are all aware of the inevitable ban on de-forestation. Of course they don't want to go out of business. These fat cats have been living the good life their whole lives, and they do not want to give it up. Now focus on the politician, who is going to vote yes or no to a bill that will make hemp legal for industrial use. It is in the interest of the logging company to "buy" this guy's vote. The politician is offered $25000 to vote 'no' to legalize hemp. This situation happens so much more than you know my comrades. In almost *every* multi-million dollar industry, kick-backs, bribes, and pay-offs are made every day. The rules seem to be different at a billion dollars. It seems you are allowed to fuck with the earth's precious balance for the promise of incredible profits. Another quick example of how this is occurring right now has to do with the oil and car companies. It appears there are serious repercussions in all this corruption. Pollution threatens to take over our earth's atmosphere, because of harmful smoke from factories, and also because of the oxides let into the air by cars and trucks. It seems to me, that this follows the textbook case for an industrial scandal in order for continued profits. There is *no doubt in my mind* that a superior engine to the gasoline engine exists that is cheaper to produce, requires cleaner fuel, and is available to produce in mass-amounts for little or no change-over costs. Unfortunately, these incredible inventions have to get a patent before anything can be done. I believe that the oil companies buy these patents (through corrupt methods) before any scientist has a chance to build a prototype, or attempt to publicize their findings. The oil companies then lock the blueprints up so that they can continue to reap the profits they know and love. EPILOGUE: I could continue on for pages with examples of how greed is starting to seriously affect our society. Big Brother (our gov't) is guilty of many times choosing capital gain over the good of society. You must find out for yourself what is *really* going on in the world right now. Get off your butt and read a book, or call FoI and enlighten yourself. Until more people become aware of this corruption, it will continue to happen. Thank you for taking the time to read this article, and the Damage, INC. Newsletter. H/P INFORMATION AND NEWS - {NEWS} Since Army Boy made a request for files and information that would benefit a newbie, I decided to create a 'reference for newbies' in this section. However, it is up to you to download, read, learn and use the utilities in this list. We can't and won't hold your hands and just give you information like codes etc. You'll have to learn how to obtain them on your own. We will tell you what's necessary to get started though. ;) The Ultimate Wish List for Newbies: 2600_795.ZIP - FAQ on hacking and phreaking from alt.2600 newsgroup and 2600 magazine. ABCHACK.ZIP - The ABC's of Hacking. COMPUNIX.ZIP - The Complete Guide to Unix and Unix Hacking. CRACKDOW.ZIP - The Hacker Crackdown book by Bruce Sterling. CRYPTFAQ.ZIP - Cryptology FAQ. SNIFFER.ZIP - Sniffer FAQ. SOCIAL~1.ZIP - The Complete Social Engineering FAQ. PHREAK_M.ZIP - The Official Phreaking Manual. FIELDPHR.ZIP - Information on Field Phreaking. FONE_T~1.ZIP - Phone Systems Tutorial by The Jolly Roger 1/2 FONE_T~2.ZIP - Phone Systems Tutorial by The Jolly Roger 2/2 SIRHACKS.ZIP - A Unix Hacking Tutorial by Sir Hackalot. TL110.ZIP - ToneLoc v1.10 Wardialer/Scanner. MENTOR.ZIP - The Mentor's Guide to Hacking. NOUTIL2.ZIP - Nowhere Man's Utilities. CRJACK41.ZIP - Cracker Jack v1.4 Unix Password Cracker. SR504.ZIP - Sourcer v5.04 Disassembler. TASM31.ZIP - Borland's Turbo Assembler v3.1 (or new version). HELPPC.ZIP - HelpPC v2.10 Quick Reference Utility for assembly. QEDIT.ZIP - QEdit text file editor. XE353.ZIP - XE v3.53 Hex Editor. There are also some magazines that newbies should download and start reading. We recommend CUD (Computer Underground Digest), 40-Hex, The Crypt Newsletter, Phrack, NuKE Info-Journals, LOD/H Technical Journals and VLAD. úúúÄÄÄ H/P NEWS ÄÄÄúúú Unfortunately, there's not a tremendous amount of local h/p news to report since nothing major has happened in 519. However, we might publish news from the 604 area code in the next issue. - BLACKENED I've just recently entered the h/p scene in 312 (Chicago)... and so far it looks fairly promising. Sure, there have been some busts in this area in the past, but at the moment it seems rather stable and calm. From what BLACKENED told me the last time we spoke, 519 is in a hellish state... with very little interest or excitement. The 312 area code isn't nearly that bad, although it is larger with more experienced people involved. Thus far, I have found a few good h/p boards to call and check out... and I'm enjoying my stay here. I actually found a few boards quickly by scanning. :) - Blackie Lawless INTERVIEWS AND INTERROGATIONS - {INTERVIEWS} An interrogation of Billy Gates. -B = BLACKENED -G = Billy Gates -L = Micro$oft lamers/lackies Hello, Micro$oft. This is BLACKENED of Damage, INC. I'd like to do an interview with Billy Gates. Is he available or is he going to dodge my questions again? -B Billy might be currently tied up ruining... I mean buying some other companies right now.. Let me check. I'll put you through... -L ... Hello, this is Will. -G Hello there. I was finally able to get through your lame security. ;) -B Security? haha, I have no concept of what security is. Just look at my Operating systems. -G I meant, you have lackies screening your phone calls for you. Why have you been trying to hide from Damage, INC. for years man? All I want to do is ask a few simple questions... The future of Micro$oft will depend upon this interview. So, be honest for once in your fucking life. ;) First, why did you ever release that piece of shit called Win95? Was it done totally for quick profit? -B I resent that. I believe windows 95 is the best product on the market right now. If it has the Microsoft label, it's good old Microsoft quality. Haha. I released it so that I could become the most hated man in the world. I'm doing a good job don't you think? Would I put out an overrated operating system just for quick profit? ... you bet your life i would. -G Hahaha. Yes, of course you would. Micro$oft and the word quality don't go together man. Windoze is completely bug ridden and an inferior operating system. You know it, I know it, and the only people that don't are the Windoze zombies that buy the shit you peddle. Next thing you know, you'll be trying to defend your shitty Win95 keyboards. Haha. Why hasn't Win98 been released yet? Are your highly paid programmers still trying to fix up their Visual Basic code? -B Why you facetious little punk! Who the hell do you think you are? Insulting my company, and my excellent, rayon coated keyboards. Zombies? hahah, that's interesting, that's the word I used to describe that in my marketing plan. I'm waiting to release win98, actually its been ready for months. But I want to squeeze more money out of my first attempt at real multitasking. -G I'm your worst enemy Billy. Now that you know who I am, I have a few more questions to ask you. What companies are you planning on buying next? Also, are you ever going to buy yourself a new shirt and tie, or an expensive suit? Or are you that cheap that you want to hoard your $40 billion dollars... Most people that I associate with call you a greedy bastard. Do you realize that? -B A greedy bastard? Geez, nobody's ever called me that before... . So I am worth more than Cuba. That's greedy? I thought I was being generous. You say I wear cheap clothes? Thats' because I'm a four-eyed nerd, who doesn't have an inkling of social acceptance, or moral conscience. Does that answer your question? You think I would tell you what companies I'm buying next? ...actually I don't even know myself - I have a big wheel that I spin, and the space it lands on corresponds to a business that becomes part of Microsoft that day. hahahah -G That doesn't surprise me at all. I agree, you're the biggest geek/lamer around. Yeah, you do wear cheap clothes. You should also consider buying a new pair of glasses. Hahaha. As for the companies that you'll buy next, I'm sure you have secret plans to buy out Intel and have a monopoly on the hardware industry... to go along with your software monopoly. You're a very lucky man in some respects Billy. IBM really gave you a good start back in the 1980's. You have them to thank for your wealth... but I'm sure your ego forces you to credit yourself with building Micro$oft. I just hope the U.S. Government fines the hell out of you! Hahaha. -B FUCK YOU MOTHERFUCKER!! THEY'LL NEVER GET MY MONEY. NEVER. ..AND NEVER *EVER* SAY 'IBM' IN MY PRESENCE AGAIN. SPIT, SPIT. -G The rest of the words were too big for me to understand... -G After the sweet deal IBM gave you back then, I'm surprised at your hatred for them. Of course, your deal with Apple soured a little bit too. Is that a soft spot that I detect? You don't like any other companies besides your own, do you? Haha. As for the U.S. Government, they're doing what is right for once... in attempting to stop you from dominating and controlling the world. Just as, hackers do their part to destroy your little, shitty network. -B I have no idea what you're talking about. I have no plans to dominate the world. Maybe North-America. Shit, oops, that's off the record. Don't print that okay? No I don't like competition. Capitalism is a full-scale war, and I'm winning. Why would i want to stop? Death is symbolized in takeovers, and I have killed thousands. Those who try to battle with Microsoft will feel the iron fist of the most influential fighter strike them down as if they were flies. No one can stop me, no-one can stop me now. -G Damage, INC. doesn't make deals with lamers Billy... and you more than qualify for the lamer category. Haha. Someone will stop you. Damage, INC. will continue to inform people about you and Micro$oft. You influence the ignorant zombies and prey upon their lack of knowledge to sell inferior products. Without them buying your shitty software, you'd be nothing man! You've tainted the word capitalism... and sicken me. Of course you don't know what I'm talking about. You pretend to be coy, meanwhile you're probably planning your attack on the rest of the software market as we speak. I speak for millions of people when I say, Fuck You! We'll do everything in our power to stop you... and your corrupt, greedy, underhanded company. You can't influence the intelligent Gates. That's why you'll never defeat us. -B What's your name again? Blackened. You are absolutely right there Blackened. But I am smart because I know that the people you talk about only represent 1% of the population. The government thinks they can try and stop me by fining me. Haha. I make a million dollars a day in interest. I am a man who lives with no emotions. My wife and I sleep in separate beds, and when we have sex, well, we never have sex, as my pecker's too small. You may think you know everything Mr. Blackened, but my only weakness is my greed. Try and find a way to exploit that. Tell me why I should be scared of Damage, INC. -G I'll never install any version of Windoze. That's one thing I *do* know Mr. Billy Gates. Sure, I only represent a very small portion of the population, but the Damage, INC. Newsletter will be distributed world wide... and you *will* be exposed. Everyone will know that you're a corrupt bastard that thrives on greed... after they read the next issue! Hahaha. Stick that in your pipe and smoke it Billy! Actually, that's a good idea. Try smoking a little weed sometime and calm down... As for exploiting that, if there's a way to destroy Micro$oft, we'll find it. That's a promise man. I don't want to hear about you and the pathetic situation with your wife... All that tells me is that you aren't a man, but a fucking geek that lives for money. Do you sit in a big leather chair behind your desk and look at your bank books and investments every night like a fat cat while others do your dirty work for you? -B Actually my chair is zombie-hide. And I have a nice big 50" monitor that updates me every second of how much money I make. Did you know I make over $100 000 a second? muahahahah. What's this Newsletter? fuck it, its no match for my team of skilled investigators. We will find and destroy Damage, INC. But you can't tell them all. -G I'm shaking my head at you Gates. As if I'd give you any information about the Damage, INC. Newsletter. Let's see if your paid lackies can stop us. Haha. Check your Caller ID... I'm calling Micro$hit from your home phone number d00d... Hehe... ;) -B ??? - "Hey Sergio, go look at the call-display, NOW." ... -G "Yassir, ze nomber eez 555-GEEK.. eetz your hom phon nomber." -L "How the hell??... quick call security." -G I don't know who you are Mr. Blackened, but don't play games with me. I don't know what you're up to. I'm losing faith in my excellent team of security guards. What are you trying to prove here you big bully? -G Haha. You don't fucking know anything Billy... ;) I'm not playing games, this is war... as you said earlier. I will do whatever is necessary to make you pay. Speaking of making you pay, I *really* appreciate you allowing me to use your phone line. In return, you will get an early Christmas present when you receive your phone bill... Hahahaha! Thanks again. I enjoyed beige boxing for the past few days and calling all over the world while you were at Micro$oft wheeling and dealing. I've only just begun though man. You ain't seen nothin' yet fucker! CLICK! -B ..."hello, hello?". Fucker must be lying, those "beige-boxes" only work in the movies. ;) -G LETTERS TO THE EDITOR - {LETTERS} The message below was posted on FoI and addressed to The Journalist, but since it's feedback about the Damage, INC. Newsletter... I decided to include it. ;) If you have a comment, suggestion or hate mail that you want published, just leave me Email on AJFA, FoI or Distraught Continuum. - BLACKENED From: Army Boy Base : [General] Discussion To : The Journalist Refer #: None Subj: Newbie (of course) Replies: None Stat: Normal Origin : Local Hate to bug you on a day like today but I just read the newest damage newsletter release, and enjoyed it. Very comical, informative and inspirational ;) I was just wondering (since I'm a newbie scum or whatever) if you could refer me to some information philes (<-cheap reference) on getting started. I know nothing about programming, assembly, boxes, etc... and It would be nice If I could get my hands on something that puts it all in perspective. No prompt reply necessary, but if you could assist me in any way, I'd appreciate it. Also, while I've thought about it, If you know of any books in the library (I live in Guelph) that could help put this in perspective, or even how to learn programming (borland, c++, etc..) I would appreciate a few references. Thanx, Army Boy, alias Sir_Autechre. P.s. I must say again that the damage newsletter 002 was Excellent! Right on, keep it coming! ------------------------------------------------------------------------------ Editor - I'm thankful that you wrote that message man since I enjoy receiving feedback. We're all glad that you enjoyed the last issue of the Damage, INC. Newsletter. Also, everyone was a newbie at one time or another, but that doesn't mean we think you're scum man. ;) We can only judge you upon how you act, your attitude and willingness to learn about h/p. You've already taken the first step towards learning more...and thus far you seem to be respectful and eager to learn more. Read the H/P Information and News section. I've included a list of necessary files to download and read. They'll assist you in learning the basics of h/p, unix etc. You should also get a copy of ToneLoc, Turbo Assembler and the other programs and utilities that I listed. As for information on boxes, there is a vast amount available on AJFA and FoI. If you are serious about wanting to learn how to program in assembly, contact me via Email. I don't program in C++ though, so I cannot refer you to any good books for that language. Thanks again for the feedback and compliments. ;) OBJECTIVE OPINIONS - {OPINIONS} The Media - Mistakes or Misinformation? The media is a sickness. They are quick to spread misinformation to the masses (of zombies)... and they know that it'll be believed by them without question. Every once in a while, they make a major mistake and have to retract their comments. In a feeble attempt to take back their words, they print a very small article on page 38 (just as an example), and admit that what they previously wrote was incorrect. However, by that time the damage has already been done by the media... and innocent people's lives have been permanently affected. Thus far, it might sound like I'm being overly harsh and not objective with my opinion on the media. Perhaps you're thinking or assuming that I have nothing to base my statements on. If that's the case, you are mistaken. There are plenty of incidents in the media that I'm using to base my opinion on... as proof to show you that they "aren't always right". The media jumps to conclusions, wrongly accuses innocent people, makes huge assumptions and prints stories (including rumours) submitted by unreliable sources. Plus, they never want to reveal their sources to anyone... even after the information has been proven to be false. Take the Richard Jewel story as one example of the mass media destroying someone's reputation and life. His very name will forever be associated with the "Olympic Park Bombing"... even though he's an innocent man. People still believe that he's guilty. He's been confronted in public places, heckled, threatened etc. Who's at fault? The media. Why should the media be held responsible for what has happened to Richard Jewel? A small newspaper in Atlanta wrote a story, naming him as the prime suspect for the Olympic Park bombing (right after he'd been called a hero by the press for trying to clear people away from the sound stage tower). Then, the mass media jumped on the story... and thus a "media frenzy" was created. Almost instantly, it was a national story on TV, the radio and in every major newspaper. Suddenly, the name Richard Jewel was a household name... and people were calling him an evil man, a sick terrorist etc. Obviously, the zombies (citizens that believe whatever the media tells them) couldn't talk enough about the story. They were fascinated by it. Yet, did any of them even consider for a second that he *might* be innocent and wrongly accused? Did they go by the facts and evidence or rumours and speculation? Basically, they just condemned him before he was even formally charged with committing any crime. Is that justice? I think not. Was it a mistake by the media? Again, I think not. The mass media spreads misinformation on a daily basis. Sure, that's a bold statement to make... but it is true. They don't always check the facts first before printing an article on someone and making false accusations against them. Just as, the media enjoys stories that get people talking and last for long periods of time. There have been several public court cases in recent years that I could draw upon as examples, but I'm sure you know what the "big, fat, juicy, money making stories" were. I'll just use one example, the infamous Unabomber case. Afterall, it's still making the headlines and the press hasn't quite lost interest in it... yet. As a result of the media coverage, I don't think Theodore Kazinski will be granted a fair trial. If you disagree and honestly believe he will have a fair trial by untainted jurors that have no bias against him... then perhaps you should consider the influence that the media has upon the average citizen. Almost everyone has been exposed to and assaulted by the media barrage of coverage on the Unabomber. Sure, they try to use words like "suspected Unabomber" etc. when speaking about Kazinski... but in reality aren't they trying him in the press before he receives a trial in court? Is it innocent until proven guilty or guilty until proven innocent? That is something that you'll have to decide for yourselves. What about the headlines that declared the Unabomber was caught and arrested after an exhaustive 17 year FBI man hunt? Was that just a mistake? Or was that the media trying to mislead people with misinformation again? In summary, the media should answer to someone. They aren't "all knowing" and "all powerful". They sure love to write stories and profit but don't enjoy answering any questions. Also, the media was hesitant to print the Unabomber's Manifesto...yet they were quick to take credit when Kazinski was arrested. In fact, they were even patting themselves on the back and claimed the arrest was a direct result of publishing the Unabomber's words. Meanwhile, many people on this earth have a similar writing style, vocabulary etc. Only now are they starting to reveal some of the actual evidence that was found in Kazinski's Montana cabin. I urge people not to judge someone before they have been convicted. Don't base your opinions solely on media propaganda you've read, seen or heard. Make a conscious effort to become informed. Question what you are told to believe. Use your own mind to think, instead of allowing the media to think for you. Written by BLACKENED ú Damage, INC. (C)opyright 1997. REPORTS FROM THE FRONT - {REPORTS} Privacy Policy Chart - Online Service Providers This Privacy Policy Chart details the fair information practices of major commercial online service providers. We arrived at these results by analyzing the service providers' written polices (such as Terms of Service) and policies distributed online to subscribers. Boxes marked Yes indicate that the service provider practices this fair information policy, and that the practice is disclosed to members. Boxes marked No indicate that the service provider does not practice this fair information policy. Boxes marked NP, or "No Policy", indicate that no policy statement is available that informs the subscriber of this fair information practice. Boxes marked n/a, or "not applicable", indicate that the specific fair information practice does not apply to this commercial online service provider. Fair Information Principle Commercial Online Service AOL CIS M$Net Prodigy 1. Does the service explain its general Yes No Yes Yes information practices? (Notice) Subscription Data 2. Does the service tell you how it Yes Yes Yes Yes intends to use subscription data? (Informed) 3. Can you limit the internal use of No Yes Yes Yes subscription data for purposes unrelated to billing and system administration? (Consent for Secondary Use) 4. Does the service disclose subscription Yes Yes Yes No data to third parties, such as direct marketers and content providers? 5. Can you limit the disclosure of subscription data for purposes unrelated Yes Yes Yes n/a to billing and system administration? (Consent for Secondary Use) Personally Identifiable Transactional Data 6. Does the service tell you what, if any, Yes No Yes Yes personally identifiable transactional data -- information about your online activities -- they are gathering and what they use it for? (Informed) Fair Information Principle Commercial Online Service AOL CIS M$Net Prodigy 7. Does the service allow you to limit No No No No the collection of personally identifiable transactional data? (Limitation on collection) 8. Can you limit the internal use of personally identifiable transactional data unrelated to billing No Yes Yes Yes and systems administration? (Consent for Secondary Use) 9. Can you limit the disclosure of Yes Yes Yes n/a personally identifiable transactional data? 10. Does the service limit how information NP NP NP No that identifies you is used by others -- such as payment facilitators and content providers? 11. Can you see the subscription Yes Yes Yes Yes information the service maintains about you? (Access) 12. Can you correct and update subscription Yes Yes Yes Yes information? (Correction) 13. Can you see the personally identifiable NP No Yes NP transactional information the service maintains about you? (Access) 14. Can you correct and update personally NP No Yes NP identifiable transactional information? (Correction) Fair Information Principle Commercial Online Service AOL CIS M$Net Prodigy 15. Is your name and email address No No NP No automatically made available in a directory to other subscribers? 16. Does the service monitor public Yes NP Yes Yes chatrooms? 17. Does the service monitor instant No NP NP No messages? 18. Does the service monitor bulletin Yes NP Yes Yes boards? 19. Does the service monitor kids areas? NP NP NP NP 20. Can you have more than one online Yes Yes No NP identity? 21. Does the service retain the contents Yes NP Yes No of your email once you've downloaded it? 22. Does the service retain the contents Yes NP No No of your email once you've deleted it? 23. Does the service retain the header of Yes NP Yes No your email once you've downloaded it? 24. Does the service retain the header of Yes NP No No your email once you've deleted it? 25. Does the service provide you with any NP NP NP NP remedy if they don't follow their rules? 26. Do they have security practices to Yes NP Yes Yes safeguard your information? (Security) Law Enforcement Access to: Law enforcement access to the contents of your communications and personally identifiable transactional data held by commercial online service companies is governed by federal law. All the commercial online service providers comply with the law. Contents of your communications The Electronic Communications Privacy Act (ECPA) governs law enforcement access to the contents of your communications. The law was updated in 1986 to cover electronic communications including email and computer-to-computer communications. Law enforcement must get a warrant in order to access the contents of your message. Whether law enforcement can get access to the contents of your email is largely dependent on the email retention policy of your service provider. For example, if the policy of your service is to only retain the email header once you've read your email, then law enforcement will not have access to read the contents of your email. Personally Identifiable Transactional Data The Communications Assistance for Law Enforcement Act of 1994 (commonly known as the Digital Telephony Act) amended ECPA, increasing the privacy protection for online transactional information. The law now includes a heightened standard for law enforcement access to transactional data generated by electronic communications services. Instead of a mere subpoena, law enforcement officials must obtain a court order based on "specific and articulable facts" that such records are "relevant and material to an ongoing criminal investigation" (sec 207 (a)(2)). Subscription Information Under the Communications Assistance for Law Enforcement Act of 1994 (commonly known as the Digital Telephony Act), access to subscription information requires an administrative subpoena. This is a less privacy-protective standard than the standards governing law enforcement access to the contents of your communication or personally indentifiable transactional information. For more information, write webmaster@cdt.org SOURCE AND SCRIPTS - {SOURCE} ;File Creator Utility v1.00 (C)opyright by Damage, INC. and Kronik ;TASM /M filename.asm then TLINK /T filename.obj to assemble using ;Turbo Assembler v3.1 for DOS. FCU.COM should be 350 bytes. This ;utility just creates a 64000 byte DAMAGE.INC file from memory. ;It loops ten times to increase the total size to 640000 bytes. .model tiny ;Small and efficient ;) code segment assume cs:code, ss:code, ds:code, es:code org 100h ;All COM files start here start: mov ah, 9 ;Print string function mov dx, offset menu ;pointer to menu int 21h ;call DOS to display it mov ah, 0 int 16h ;get input from the user mov dl, al mov ah, 2 ;display the character pressed int 21h cmp al,63h ;"c" je short make_file ;Yes, create file cmp al,43h ;"C" je short make_file ;Yes, create file jmp short exit ;No, so exit to DOS make_file: mov ah, 5Bh ;create a file mov dx, offset file_name ;pointer to file name xor cx, cx ;zero cx int 21h ;call DOS to do it xchg bx, ax ;move filehandle to bx mov cx,10 ;# times to loop fill_file: push cx ;push cx to stack mov ah, 40h ;write to file mov cx, 64000 ;# of bytes to write mov dx, offset junk_stuff ;pointer to var with junk int 21h ;call DOS to do it pop cx ;get cx from stack loop fill_file ;loop 10 times jmp short close_file ;Finished close_file: mov ah, 3Eh ;close file int 21h ;call DOS to do it mov ah, 9 ;Print string function mov dx, offset done ;pointer to done int 21h ;call DOS to display it exit: mov ax,4c00h ;terminate process int 21h ;Exit to DOS ;DATA storage area menu db 13, 10, 'File Creator Utility v1.00',13,10 db '(C)opyright 1997 ' db 'by Damage, INC. and Kronik',13,10,13,10 db ' [C]reate a DAMAGE.INC file',13,10 db ' [Q]uit to DOS',13,10 db ' Command: $',13,10 done db '',13,10 db 13,10, 'Finished...',13,10,'$' file_name db 'damage.inc', 0 ;name of the file to be created junk_stuff db 1 dup('Damage, INC.') ;data buffer code ends end start THE JOURNALIST'S TOP TEN LIST - {TOP TEN} "Top Ten pranks on the Internet:" 0. E-Mail Bombing. This is a fun one to pull if some asshole on IRC or USENET is pissing you off. Basically you get hold of either a win95 app, or some source code that is designed to "mail-bomb" an address. What it will do is send up to 100,000 e-mails to your target, and the victim will have to go through and delete each one ;) One glitch i have heard of is if you do this to a gov't site they have "email bouncers" setup, so that every email you send to that address is sent back to you. If this was the case, you would essentially be e-bombing yourself! ;) 1. Sniffer Programs. For this you need to have access to a shell account on your local ISP. MGL, Hookup, Sentex all provide shell access. Golden Triangle does not however. If you happen to have shell, you can run something called a "sniffer program." What this does is reside in memory, and captures all logins and passwords. It is really that easy! Once you have these, you can use any account you wish. You can hack, email-bomb from that account, *without getting charged any hourly rates*. Sniffer Programs can be found on Freedom of Information Archives. 2. Webpage Hacking. This is a lot quicker if you have obtained accounts using the above method. Essentially you have to obtain root on the system that the webpage resides on. Then you can modify homepages to make them fucked up. Fatal Vision told me the "Hackers" movie webpage was hacked, and changed to be hilarious. There are many ways to obtain root on the remote system, so I will not go into the methods. To find the homepage, use cd /home/"name"/public_html or something similar. It will be a directory residing in the user's home directory.. (type home to see where that is). 3. Socket Killing. Hehehaha.. this is probably the most fun. If there's a user on the net that is giving you lip, and intentionally pissing you off, with a program called WINNUKE, you can kick them off the net! It is a win95 Util that takes advantage of one of the many glitches in the PPP code of win95. The util sends a continual denial-of-service message to the victim, and win95 crashes horribly at this. Not only will you be killing his internet connection, but crashing his win95 every time. This is much more effective if you write a script that executes WINNUKE everytime the d00d logs in to his ISP. He will think it is something wrong with his computer/modem/software, and it will cause him/her a *lot* of hassle. ;) 4. IRC Bots. I'm sure a lot of people know what these are, but they are always a good prank, provided you can find an IRC server that will allow you to run them. The amount of pranks you can pull with BOTS is amazing! You can control a dedicated channel and only let in certain people. Or you can wreak havoc on other channels by automating a script, making it resident, and then logging out. The BOT keeps running even if you're not logged on, and only stops if another BOT is clever enough to boot it, or if the sysAdmn sees it and decides to remove it. These are just brief explanations, and would have to be read-up on before trying! ;) 5. Porno E-mailing. This one is not quite as well known, but I think is the ultimate prank. Your mark has to be a reserved, dignified arsehole. You may want to use a fake return address for this, (or a hacked account) but go on the net and find the raunchiest XXX pics you can find (disgusting looking old women etc.), and e-mail them to your victim. I'm pretty sure you can email a .JPG and it will come up on his screen. I would love to see his face if he had people looking at his screen when he happened to read his email. You could also leave captions such as "The night you were conceived" and other friendly comments like that.. haha 6. AOL Pranks. These major services, mainly AOL are largely responsible for the sorry state of the internet today. Their mass-marketing served only to lower the quality of the newsgroups, and increase the profits of AOL. These assholes need to be avenged. There is a program on h/p boards (refer to EOF) called AOLHELL. I won't even go into what one can do with this, except to say that it is worth checking out. I'm not sure if AOL has combatted the methods used by AOLHELL, but I'm sure there are still some holes in their interface. 7. Chain Letters. Everyone's seen these, all over USENET, all the time. You can't read 10 message without one of them being a "get rich quick" scheme. I was always very pissed off at this, and then I figured a way to get revenge. (And possibly some cash). Get the addresses of the people in the letter. You know they are susceptible to the idea of fast-money. This is their downfall, and your advantage. Email each one of the people, telling them of some lottery they've won, or of some "super-chain-letter" that promises 10 times the amount of the one they were on. You have to catch their eye, and entice their interest. Make up shit, make up phoney documents, claiming to be a legitimate fund-raising co. What I would do is setup a Mail Box at somewhere like Shopper's Drug Mart, and tell the people to send money to it. You never know if it will work until you try it boys and girls... 8. Carding is making a comeback due to the anonymity guaranteed by the internet. With a hacked account, you are omnipotent, untouchable and you can use this to make money. (or get stuff). If you know how to get credit card #'s then you can skip this, but if not, there are a few ways to quickly get somebody else's info. (exp. date, and card #). The first is to go "trashing." go through the garbage of some retail outlets that might leave papers in there with interesting info on them. Alternatively, if you are clever with hacking, you could scan all packets leaving and entering a site that is commonly used for purchasing things. If they have online VISA charging, I am guessing you could watch what information goes into and out of the server. The web page cannot decrypt the CC# before it gets there, so there is a time lag where there are millions of Credit-Card #'s floating around in cyberspace. The other way to get Credit Card #'s is to simply steal them if you work at a place where people pay with credit card. Its a lot easier if you haven't seen the face of the person whose card it is you're using though. Once you have the necessary info, you can pretty much order anything you want. Software, Porno Passwords, etc. Don't get *anything* mailed to your house. But software can usually be emailed to your box, so no-one has a chance of knowing who did it. 9. I.P. Spoofing. This is an advanced topic, so I will make it simple. One, you have to have a shell account to do this. Two you must have a basic knowledge of how Unix/TCP_IP works. This is a method of hacking to obtain root access on a remote server. There are many reasons why you might want to do this, most of the common ones are covered in this list however. You need to d/l source code for an IP Spoofing program - yes the hard work has already been done for you. Run the code from your shell, and wait until you get access. I would recommend going through and deleting any logs that might incriminate you. Written by The Journalist - Damage, INC. (C)opyright 1997. CLOSING COMMENTS - {CLOSING} BLACKENED's Disturbing Closing Comments: I'm disappointed with the lack of feedback and letters to the editor. We were expecting more readers to send us quality, insightful comments and suggestions. At this point, I would be actually grateful to receive hate mail to publish and reply to. The Damage, INC. Newsletter has generated some interest in h/p in 519... but hasn't had the type of impact that we'd hoped. The main problem lies in the people that are "involved" in the local h/p scene. (and I'm being generous by using the word involved). I realize there aren't many people in this area with a tremendous amount of h/p experience and knowledge. I've even publicly stated that we have nothing against newbies, and are willing to help those with a legitimate desire to start learning, experimenting and putting the information that they've given into practice by becoming active in the h/p scene... and trying to do a few things. Thus, the majority of this issue was dedicated to teach newbies and refer them to the essentials for beginners. Other than that, we cannot do everything for you. It is your responsibility to take the initiative, become dedicated and self-taught. That's not only how it is, but how it has always been. Reading h/p text files is only a small portion of the learning process. It'll only take you so far. If you want to limit yourself to that, you won't ever progress and achieve anything. However, if you really want to become involved and contribute, let us know. We are also planning to distribute the Damage, INC. Newsletter to other area codes very soon. It's possible that there will be a Damage, INC. Distribution Site in British Columbia before January 1998. ;) We're still looking for Writers, Members and Distribution Sites. If you'd like to apply to Damage, INC. and join a respected h/p group, then download a copy of the Damage, INC. Application Generator. If you want any of our releases, they are currently available on the following boards: ...AND JUSTICE FOR ALL - Damage, INC. WHQ, h/p/a/c/v/t, no ratios, invite only. Freedom of Information Archives - Damage, INC. Dist. Site, h/p/a/c/v/t. Distraught Continuum - h/p/a/c/v/t, programming, etc. Any feedback or letters to the editor should be sent to BLACKENED in Email on a Damage, INC. board near you. - EOF