Filename: Hacking USA -->Hackin' USA -->I was in the 'fast lane' of computer hacking for about 3 or 4 years (more than enough) and am now semi-retired. It is now time to pass the torch to those with extra time, the will and those under age (very important as you will soon find out). What is about to follow can be found in many many underground philes that are available. I have compiled the highlights of the best philes here and more details can be found in these other philes which are available on any good Cat- fur. One note...all of this is true (hard to believe but not streching the truth one bit, I've even seen most of it myself at one tyme or an other). Firstly, the most important tool of the hacker is the Apple Cat modem. Anyone who is someone has one (and even some losers have them too!). The reason for this is that it does 1200 baud at a 300 baud price and you can also do lots of neat illegal things with it (more on this later). The first most important piece of information is the L05ER. This is a person (person?) usually about 14-15 years old who acts like a geek "I got more wares than anyone else and I want two wares for one I give you" or "no you can't have my new MCI number I found", or uploads COPYA to a cat-fur line in order to get access to the good wares on drive 2. They are all around pests but it is sometymes fun to get your friends together on the phone lines for some fun ragging on the L05ER! Much worse than the L05ER is the nark. This is the guy who will tell on your activities to your parents, school and the authorities. These are dangerous and require the best hackers to exterminate. (this is done by hacking Ma Bell, and giving the nark a $5000 phone bill, after this his parents will usually confiscate the modem, computer and the nark is never heard from again). Then finally is the all famous Dude. This is the person who wish to trade wares with, will cover for you when the feds get on your case, and helps you rag on L05ERS and eliminate narks. He is in all cases a real 'dude'. There are a few things needed to make it in the 'underworld' of hacking. This can be divided further into 4 catagories: 1)Piracy (very mild form...anyone can do it, means you say 'phuck the copyright and cat-fur all nite and all day). Most losers and leeches are experts in this field...can set up cat-fur recieve faster than you can hang up a phone. (Some real losers still use AE and don't even have Apple-Cats (more on Cats later) 2)Phreaking: This is the next rung up the ladder. This involves ripping off the phone company and call for free all over the world. Many do this by finding MCI and Sprint (American phone companies) codes (very easy to do) and call for hours on end Cat-fur-ring the latest wares everywhere from Kalamazoo to Moscow. You have to be a real L05ER to get caught by MCI or sprint (use the same code for a year), so its a good way of weeding out the losers early in thier career. Pirates who know how to phreak are a bit above those who don't know a soul from out of his local calling district and then there is the other genre of phreakers who have been around long before the hackers....The boxers. These were the people in the 1960's who built electronic devices (the contents were placed in box like casings, hence the name 'boxing') that would emulate the tones of a phone company. It requires much more skill than MCI phreaking, so there aren't all that many losers in this field. Now-a-days, the phone company knows about phreaking with boxes and it is quite dangerous. Apple Cats can do the tones that the old boxes of the 60's did, so thats why they (Cats) are phun. (They are also used to 'wargames' hack and dial for MCI accounts and hidden computer lines). Most of you have probably heard of boxes. (In fact, the apple computer wouldn't have been created with these since Steve Wosniak met Steve Jobs (Apple's founders) in order to create one of those infamous blue boxes). These are some of the most famous boxes: Black box (the first box invented), this lets you recieve f!!@9  ȩ !  g*B( p~C@p  "Dԁ^A1 K@pp @@( 6@ `A` !"8&!> 08p !>r 8& >80!>">9>2 >0 8>""0!?qA r  !>r  8 >9> 8>!?? !>>">8 !> >08"08>>80!?!>!> 8!>#>!>' >> 8 !>>8"8!>08!>0uters and having phun. You need to phreak to do this cuz the best systems are always out of state and you don't want to pay $1000 long distance bills. There exist many philes and lists for access to banks, fortune 500 firms and how to hack or do stuff (ie, get visa account numbers, give people high phone bills on ma bell's Cosmos computer and of course, the 'Official telenet hackers list" of every corp. and institution on telenet( a 100 sector phile too!)) 4)Finally, there is :Kracking. This involves taking a commercial program and taking out the software protection so that it can be Copya'ed (the offical standard of kracking). This takes a good knowledge of Assembly programming and knowing what the bastards at the software companies are up too (seriously, they put in things just to phuck us up, they spend more tyme with the protection than the game itself....well, makes more phun for my kind! That is pretty much the mainstream, but there are many many small groups (ie, TAP) (these dudes specialize in theft and rip-offs of any kind (ie, how to steal cable TV (the scrambled stations), to spot a plainclothes agent in a department store, to make phake price tags, etc...really strange bunch). Then there are the pyro's who tell you how to make nepalm, bombs, nitro, pipe bombs and all sorts of exotic stuff in easy steps with junk available at radio shack and drug stores. Then, there are the terrorists who know how to do all the above and a few more things (stratagies etc...). Again, there are many. many philes out there on all this stuff and again, most of is quite possible and real (I showed someone I knew in the field of chemistry the chem pyro philes and he asked 'where did you get this stuff?!'). Finally, there are those superboards, the BBS's that run on 3 lines, 45 megs on line, AE, BBS, Catfur all on one system, and you wonder where they got the money for all this junk (remember the visa hack phile to find some visa numbers....)...thats where. These systems are the gathering point for hackers. Usually, they don't allow local users, only out of states who phreak their way into the board. They got all the wares, know the krackers and are able to release kracked versions of programs that havent even been released commercially yet (anyone ever seen the pre-release version of miner 2049'er...I have it....really wierd) The rest is an experience which I cannot write down. Above you have seen a taste of the way it is. You hear about people who get busted every day, and wonder if the system you call has the Ph.B.I. and Ma swarming all over it and if your next. Well, its something...really, and after a while, its time to stop, and when you see about some hackers on the news, you can say, I know it, I saw it, I was a piece of the action...And finally, you slow down, look for something else...and retire the day you turn 18 (on this day, you are no longer a minor, and the risks of hacking outwiegh the advantages....)..But you were there at one tyme....