| ==Phrack Magazine== |
|
|
| Volume Four, Issue Forty-Three, File 7 of 27 |
|
|
| CONFERENCE NEWS |
| PART I |
|
|
| **************************************************************************** |
|
|
| The Missouri Programmers' Convention Transcripts |
|
|
| Compiled by Synapse 403 |
|
|
| For those of you who were at the con, or moreover were at the con |
| and can remember it (Sir Lance?), these transcripts are for you. |
| They are not absolute in their accuracy and are most likely full |
| of holes, however please keep in mind they are the transcribed |
| product of a hacker who is suffering from a hangover of heroic |
| proportions, and is typing to keep his mind off the mutiny |
| happening in his stomach. |
|
|
|
|
| Please note that within the transcripts you will find parts of |
| the speaker's words paraphrased, this is not intended to |
| misrepresent them, this is simply an easy way to cut to the chase |
| and get this job done. Another note to make is that with in this |
| transcript, several people have been labeled unknown, this is |
| either due to I could not see their face while they were speaking |
| or they wished to remain anonymous. These folks will be labeled |
| "unknown" keep in mind that this is for the above reasons and not |
| any slight, or K-RaD At|T|_|D3. |
|
|
| SummerCon |
|
|
| Introductions on camera were the essential beginning of the |
| meeting, with Drunkfux wandering counter clockwise through the |
| room, pointing the camera (that he was clinically joined with), |
| in your face and asking your name and to say a bit about yourself. |
|
|
| Surprisingly enough there was little adverse reaction to this |
| aside from a few quiet jokes in relation to people wondering how |
| much $ Drunkfux would be getting from SRI for the tape <G> |
|
|
| Stuart Hauser from SRI, Stanford Research Inst. was the first |
| speaker of the day, he was (or is) a older looking man who looked |
| relaxed and confident. He was here to tell us about SRI and their |
| goals (or he was here to milk the crowd for info, depends who you |
| talk to I suppose). |
|
|
| SRI is an international corporation, employing over 3000 |
| people, that claims no ties to the Feds, NSA , CIA or any other |
| government arm interested in harming, persecuting or even |
| prosecuting the hacker community. |
|
|
| Their main concern is major network security, on a corporate |
| level. However there was talk of SRI having contract work for |
| military related arms producers this was not brought up at the |
| conference. |
|
|
| He started by talking about himself and SRI, he mentioned their |
| policy and their feelings towards dealing with the hacker |
| community on a productive level. He went on to confirm, that |
| someone we all know or know of that works for the same company is an |
| asshole, and we are not the only community to realize this. I |
| will leave his name out for reasons of privacy, however a good |
| hint for those who were not at scon and are reading this his first |
| name starts with DON. |
|
|
| After allowing us all to laugh this over he went to tell us of |
| the finding of his teams research form SRI. His team consisted of |
| himself, Doug Web, and Mudhead, they were tasked to compile a |
| report on the computer underground in some nebulous fashion, he |
| was of course (at least to me and everyone I was sitting with) |
| not very clear with this. To the best of our knowledge the report |
| was like a damage potential report, ie: How much can the hackers |
| really do, and HOW much will the hackers do? |
|
|
| Stu conceded that the networks and companies had more to fear |
| from corporate espionage at the hands of employees and |
| mismanagement then they did from hackers. However he fears a |
| new breed of hackers he says are becoming a reality on the nets, |
| the hacker for cash, digital criminals. He felt that this new |
| breed of hacker will be counterproductive for the both the PD |
| world and the underground on the basis that if they destroy it |
| for the corps, we cannot use it either. |
|
|
| In the way of security Stuart felt the Social engineering was |
| the biggest weakness of any system, and the most difficult to |
| defend against. Also he felt too much info about machines and |
| security of them was public info, also public info was available |
| for use in social engineering. He felt that the only way to |
| combat this is to make the employees and owners of companies more |
| aware of these threats. Beyond the social engineering he feels |
| that physical measure are too weak at most facilities and do not |
| protect there hardcopy data well enough he meant this both for |
| Trashing and actual b&e situations again he felt the situation |
| was to spread awareness. |
|
|
| While conducting the interviews to for this report Stuart formed |
| his own opinion of the hacker which he shared with us. He feels |
| that hackers for the most part are not malicious at all, and are |
| actually decent members of cyberspace. Moreover he feels that |
| hackers should be put to work as opposed to put to jail. |
| Something we all feel strongly about. Stuart finished his speech with |
| brief allusions to scholarships and upcoming programs, at this point he |
| left the floor open to questions. The are as follows: |
|
|
| Emmanuel Goldstien: "Earlier you (Stuart) mentioned the existence |
| of 'malicious hackers', where are they?" |
|
|
| Stu: "Holland, Scandinavia, the UK poses a great threat, |
| Israel, Australia. The bloc countries for virii and piracy are very |
| busy right now, We have to wonder what will happen when they get full |
| access to our nets. What happens when the eastern bloc catches |
| up?" |
|
|
| Unknown: "Who finances this". |
|
|
| Stuart: "Really that's none of your business" (paraphrased <G>) |
|
|
| Unknown: "Where is the evidence of these so called malicious |
| hackers, I think the whole malicious hacker idea is spawned by the |
| media to justify the persecution of hackers". |
|
|
| Stuart: [Has no chance to reply] |
|
|
| Control-C: (interjects) "Punk kids are all over the place doing it |
| man." |
|
|
| KL: "its common knowledge that it is happening there." |
|
|
| Stu: (offers example) Was told that at three companies have tried |
| to hire tiger teams, for corporate breaches however he has no proof |
| of this. Yet he feels the sources were reliable. |
|
|
| Unknown: "I have heard rumors that SRI is writing software to |
| catch hackers. is this true?" |
|
|
| Stu: Says he hasn't heard about this. However if they are more |
| interested in what SRI is doing he will be sticking around until |
| this afternoon or evening. And has about 15 copies of the report that |
| are available to the public. |
|
|
| Next speaker |
|
|
| [I was out of the room for this speaker and asked Black Kat to |
| type this in, so your guess is as good as mine.] |
|
|
| Someone showed a DES encryption laptop, 8 months old, with a built in |
| chip to encrypt everything in and out (modem, disk, etc). Didn't have |
| an overhead projector but was giving personal demos. Made by BCC |
| (Beaver Computing Company) out of California. Doesn't advertise, but |
| will give sales brochures etc, if you call the 800 number. |
| Thinks the govt is discouraging wide scale distribution. |
|
|
| Count Zero & RDT |
|
|
| Count Zero announced he would be talking on a unique telco |
| feature they found and about packet radio. Stickers and |
| board adds from RDT and cDc were handed out at this time. |
|
|
| White Knight and Count0 started by introducing a bizarre |
| telco feature they came across, and played a tape recording to |
| demonstrate some of its features to the crowd. After some chatter with |
| the rest of the con, nothing definite was concluded, however, some |
| good ideas are brought out. (As well as some insight by folks who have |
| discovered similar systems.) |
|
|
| Next came some comic relief from Count0 and White Knight in the |
| way of the termination papers of an employee from a telco, the |
| employees case report was read to the crowd and essentially painted the |
| picture of a really disgruntled and ornery operator. Specifics were read, |
| and people laughed at the shit this guy had gotten away with, end of |
| story. |
|
|
| Following this Count0 spoke for Brian Oblivion who could not be |
| there about an American Database/social program called America 2000. |
| Brian came across this information by the way of a group in Penn state, |
| the program is meant to monitor the attitudes of students, and how |
| they behave with within state standards.. |
|
|
| Furthermore the Database is compiled without the knowledge or |
| permission of parents, beyond this the file can stay with a man |
| or woman for life, in the hands of the state. |
|
|
| Count0 on Packet Radio |
| Self-empowering Technology |
|
|
| Next came the actual Packet radio discussion, Count0 displayed |
| his hardware and talked at great length on a whole spectrum of issues |
| related to the radio packet switching, and some points while straying, |
| even the morality of the FCC. This went on for quite some time. |
| Count0 instructed the crowd on the principle behind packet switch |
| radio as well as explaining which licenses to get and to apply. |
|
|
| Drunkfux, Merchandising |
|
|
| Drunkfux |
|
|
| Drunkfux started by, Merchandising a shitload of ho-ho con |
| shirts, 15$ a piece as well as mthreat his tonloc shirts, also selling the |
| mods for the Mistubishi 800, mthreat also had a chip preprogrammed for |
| the Mits 800 avail. Those who could not get the mod were told to get it |
| from cypher.com in /pub/vind. He told us of the new Metal Land revival and |
| said a bit about it. |
|
|
| Next and most interesting was the discussion of the fate of |
| Louis Cypher, and his companions in the recent bust. It seems Cypher |
| and ALLEGED accomplices Doc and JP have been charged with numerous |
| felonies not which the least of is Treasury Fraud and b&e of a federal |
| post office. Drunkfux went into detail on how they had been turned |
| on, and essentially entraped into the situation. Also how the media as |
| per usual had made a witch hunt out of it by connecting Doc to the a |
| remote relation to the Kennedys etc, etc. |
|
|
| Eric Neilson with CPSR |
|
|
| Eric Nielson started by telling the crowd what had drawn him to |
| the CPSR, by the way of reading a discussion in congress about a |
| congressman defending the strength of a Starwars network by stating that the |
| gov had an excellent example for security: the phone networks in the |
| USA. Needless to say Eric had little faith in this analogy <G>. |
|
|
| He went on to describe what the CPSR covers and what they have |
| done recently in the of the clipper debate, Sundevil and other 1st |
| Amend. issues. He discussed the internal workings of CPSR and its |
| funding police as well as telling Conf Members how to go about joining. |
|
|
| Erik Bloodaxe |
|
|
| Erik started out with explaining why Phrack 43 is not yet out. |
| This is due to the fact that Stormking.com will not allow it to be mailed |
| from it, seeing as the owner does telco consulting and feels it would |
| be a conflict of interest. Furthermore he won't give the listserve to |
| the Phrack Staff, making it somewhat difficult to distribute. However KL |
| is acting as a mediator and hopefully this will be settled soon. |
| Mindvox was considered but rejected as a choice, for fear of people |
| getting a hold of the list.. |
|
|
| On the issue of Phrack and the copyright, Erik had only ONE fed |
| register out of all those who collect it. However Phrack has |
| obtained logs of both CERT forwarding Phrack by mail, as well as Tymnet |
| obtaining the mag. |
|
|
| Beyond this Agent Steel was discussed in an "I told you so |
| fashion" it turns out that him being accused of being a narc in the past |
| were valid, seeing it was proved by way of documentation that Agent |
| ratted out Kevin Poulsen (Dark Dante) resulting in his current 19 |
| charges. |
|
|
| And of Course the new LOD issue was broached, however very |
| little was discussed on it and it was simply agreed to a large degree that |
| Cameron (lord Havoc) must have been seriously abused as a child to |
| display the type of obvious brain damage he is afflicted with now. |
|
|
| Emmanuel Goldstein 2600 |
|
|
| Emmanuel Goldstein in his purple Bellcore shirt discussed with us |
| his appearance before a Congressional hearing on a panel with Don |
| Delaney and how the hostility shown towards him by the house |
| representatives in session. Beyond this he went on to describe several |
| nasty letter letters sent to him by telcos for PUBLIC info he had posted |
| in the winter issue of 2600. This is a very brief summary of what he had to |
| say, mainly due to the fact that I was too busy listening to him to |
| concentrate my apologies go to those who were interested in |
| reading the whole thing. |
|
|
|
|
| Next up was a lengthy discussion on Novel Software and its |
| weaknesses, By Erreth Akbe however the speaker he wished me to leave |
| this out of the transcripts so I will respect his wishes in this. |
|
|
| ********End Of Transcript*********** |
|
|
| I would like to thank the following for making the Con an |
| experience for me that I will not soon forget: |
|
|
| Arist0tle, Black Kat, Butler, Control-C, Erreth Akbe, Tommydcat, |
| the Public and theNot. Thx guys. |
|
|
| Please send all responses to Besaville@acdm.sait.ab.ca |
|
|
| ***************************************************************************** |
|
|
| Presenting ::: |
|
|
| SummerCon 1993 in Review !!! |
|
|
| Hacking Tales and Exploits by the SotMESC |
|
|
| Additional Activities by the GCMS MechWarriors |
|
|
| -()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()- |
|
|
| The weather was right, too right. Something was foul in the |
| air. It was akin to that mythical 'Calm before the Storm' scenario |
| that is dreaded by so many. But, Scribbles and I boarded the |
| Techno-Laden SotMESC compact and took off down the Highway to our |
| ultimate goal . . . Hacker Heaven in Summertime Fun - SummerCon !!! |
|
|
| Instantly, weather was seen brewing in the Caribbean. Hints |
| of Hurricanes echoed through the towns we drifted through. To |
| alleviate any anxieties, massive quantities of Jolt! were obtained |
| in the infamous town of Hatties-Gulch, a small town taken over by |
| the virulent filth called College Students. |
|
|
| The trip continued, over hill and over dale. Dale was quite |
| considerate not to press charges. Colleges were passed in a blink |
| of the eye. Nothing was going to stop us. We were on a mission |
| from the Church. But, that's another story. |
|
|
| After locating that famous arch, a beeline was made at speeds |
| over 100 MPH through St. Louis until our destination came into |
| view: The St. Louis Executive International (800-325-4850). We |
| came to meet our nemesis and friends at the fest hosted by the |
| Missouri Programming Institute. Brakes were quickly applied |
| as the car appeared to be going off the off-ramp and into the ditch. |
|
|
| From the lobby it was obvious, there were unusual people here. |
| These were the kind of people that you fear your daughters would |
| never meet. The kind of people that kicked themselves into |
| caffeine frenzies and would become infatuated with virtual lands. |
| Yes, these were my kind of people. |
|
|
| Now, the adventure may start . . . |
|
|
| Oh, and in response to A-Gal on pg 30 of 2600, Scribbles |
| says she's the sexiest hacker on the nets. Hmmmmm, I'm inclined |
| to agree with that. I'm sure Control-C will agree too, especially |
| after he trailed her for half of SCon. |
|
|
| Now, we all know that Friday is the warm-up day on what we can |
| expect to see at SCon during the main Saturday drag. It was no |
| surprise to find the main junction box rewired, pay-phones providing |
| free services, rooms rerouted and computers running rampant down the |
| hallways. But, the traditional trashing of Control-C's room this |
| early signaled that more would be needed to top the night. The |
| maid was definitely not pleased. |
|
|
| For a list of those that attended, maybe KL can provide us |
| with that information. There were too many faces for my fingers |
| to lap into. And, there were quite a few new faces. I believe |
| that Weevil was the youngest hacker at 16, and Emmanuel was the |
| oldest, although he didn't give his age. |
|
|
| -()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()- |
|
|
| THE CONFERENCE |
|
|
| -()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()- |
|
|
| Let's get to the meat of the matter. The conference had |
| a nice spacious central area with tables neatly lining alongside |
| the wall. Between the tables and the walls were many hacks packed |
| as tightly as they could get. Why didn't we think of moving the tables |
| closer together ??? |
|
|
| KL took control and ran the conference smoothly. dFx panned |
| everyone on his digital camcorder. Several cameras were around |
| to provide us with gifs later. And the conference took off . . . |
|
|
|
|
| First up was Stuart from SRI (Stanford Research Institute). |
| He elaborated on SRI's being involved in research, engineering and |
| design. From studies done around the world with hackers and those |
| associated, malicious hacking can not be stopped. There is no |
| evidence, though, that the current hackers are interested in |
| bringing the networks down at all. Concern was given to new |
| hackers that may be emerging with financial gain and maliciousness |
| occurring. The top security hole with system was noted as |
| being the infamous social engineering technique. SRI did note |
| that many places did not utilize the security that they even had |
| in place. It was also noted that laws against malicious hackers, |
| and probably any hacker, should be fair and just. The most |
| malicious hacks that are turning up have been spotted in the |
| following named countries: Holland, Scandinavia countries, |
| very possibly soon in the UK, Australia, Israel, the former USSR, |
| and Bulgaria ( noted for virii writers ). |
|
|
| A voice made mention of Operation Rahab, hackers in German Intelligence. |
|
|
| Next up was Count Zero from cDc/RDT to talk about packet |
| radio. His talk included information about the IESS and handed |
| out a flyer on America 2000 ( school under 1984 regimes ). |
| Maybe someone will provide us with a copy of this. A packet |
| radio modem at 1200 can be obtained easily for $50. TCP/IP |
| packets are already being send over the bandwidth along with |
| other network protocols. The usefulness of all this is that |
| the information is broadcast and it is virgin territory. The |
| baud limitation is due only based upon the bandwidth you are |
| operating at and the number of collisions occurring. On a |
| band you can see every packet that is being transmitted if |
| you wish. All this is located on a 2 meter band. Currently |
| the FCC forbids encryptions on the airwaves, although this is |
| noted as being virtually impossible to enforce. It also takes |
| 5 months to get an amateur radio license, and your personal info |
| is recorded in a book easily obtained at libraries. The problem |
| with going around the FCC is that there exist vigilante HAMs that |
| monitor the bands and have nothing better to do than filter |
| info and whine to the FCC. Bandwidths are decreasing though. |
| This is due to an increased interest overall by communications |
| in these areas. Unless you do something major the FCC will |
| not give you much interest. The book on preparing yourself for |
| a Tech Class can be obtained from Radio Shack for $9. |
|
|
| Next up was dFx. He was promoting the HCon and Tone-Loc |
| t-shirts that were for sale. Merchandising was getting pretty |
| high. He also gave out a few Mitsubishi 800 disks. He was |
| also recognized as the ONLY and LAST member of the Neon Knights, |
| a club that had a wide range of comedy names generated. The |
| word was put out the HCon '93 will be in December 17-19 with |
| a hint that it could also wind up being in Austin. Then the |
| conversation turned to Lord Byron's bust, which we should here |
| more information on any day this week. The conversation |
| reiterated the government narc that was at the AA meeting |
| that was pressuring Byron. Byron was also noted as having |
| rejected a plea bargain the courts offered him. And lastly, |
| it is going to happen soon so get them while you can. The |
| FTP site at eff.org will be dropping its CuD directory due |
| to a conflict of interest with EFFs major contributors, mainly |
| the RBOCs and other interest groups that don't like us. |
|
|
| Erik Bloodaxe took the table next to talk about what |
| was happening with his involvement with Phrack and some |
| interesting info about Agent Steel. As for Phrack, the |
| Email list is being with-held by Tuc. The mailing list |
| has been refused at Mindvox due to files missing mysteriously |
| at that site. And, no organization registered for Phrack #42 |
| since it was copyrighted with a nice and lengthy preamble, |
| except for one company from Mitre. Currently Phrack #43 is |
| in limbo and is estimated at 1 Meg long. Going onto the |
| info about Agent Steel, basically he's a narc. Lord Havok from |
| Canada is trying to restart the LOD under some unknown |
| logical rationale that since LOD is defunct, anyone can |
| reclaim the name. Lord Havoc, aka Cameron, has been going |
| around trying to get documentation to put together an LOD |
| technical journal #5. Supposedly there is a skin-head group |
| in Canada that in now tracking Cameron down. |
|
|
| Someone came up next [Minor Threat] and gave us an update on |
| Codec. Two weeks after the last SCon, Codec was pulled over while |
| on the run from the law for speeding and then arrested for |
| burglary, resisting arrest, etc . . . He is estimated to |
| be out of jail in 1995 and still has time to serve in a few |
| other states. Mail can be sent to him at this address: |
| codec@cypher.com. Maybe Crunch can give Codec some hints on |
| how to get by in prison? |
|
|
| From the CPSR, Eric Nielson took the table. He elaborated |
| on the CPSR and ran a Q&A period. Basically, the CPSR files many |
| FOIA requests and sues the government. Their focus is on the |
| workplace computing. Elaboration was given on the Clipper Chip |
| and computer ship security. The CPSR is staffed with lawyers |
| and takes their funding from dues and grants. They are not |
| sponsored by any corporations. |
|
|
| From the far side of the table came the infamous Emmanuel |
| Goldstein from 2600. He stated how he had testified at congress and |
| gave them a live demonstration of bandwidth scanning and redboxing. |
| While he was there, the inquisition started against him on the |
| issue of 2600. Emmanuel then tried to explain the culture to |
| our representative that it is bad to classify all hackers as |
| criminals. Goldstein then went on to talk about the DC 2600 bust |
| and how it has resulted in 2600 meetings springing up all across |
| the country. A review of several films on software piracy at |
| the office, disaster recovery and viruses from Commonwealth |
| Films was given. And, to highlight everything, 2600 has purchased |
| an AT&T van that they plan to take to assorted conventions and |
| start a fleet of these up. |
|
|
| Pst, BTW, on pg 43 of 2600 the intersection should be a jump =:) |
|
|
| Last up was Erreth Akby, a Certified Netware Engineer. He |
| explained that the only upgrade in Novell 4.0 is the disk compression. |
| He also informed us that the supervisor and guest accounts generally |
| have default passwords. TO hack into this Net, you should use a PC |
| with full alt and functions keys. The supervisor p/w is on the |
| RConsole in a file called autoexec.mcf on version 3.11. Netcrack |
| will not work on a system with Intruder Lock-Out. Non-dedicated |
| netware must boot from a floppy. Best of all, you can dial out |
| by using cubix-quarts, which are PC with modems on the system. |
|
|
| Below is a quick reprint of a paper that was recovered |
| from Control-C's trashed room. |
|
|
| Mrs Jasnagan, |
|
|
| I would like to set up a meeting |
| to discuss Kevin's progress in Social |
| Studies and English. Please let |
| me know when it would be |
| convenient. |
|
|
| Thank you |
|
|
| ( Scribble , scribble ) |
|
|
| Dear Mr + Mrs Gormby, |
|
|
| We would be happy |
| to meet with you at |
| 9:30 on Thursday, April |
| 1st in Room 104 |
|
|
| Sincerely, |
| M.Jarnagin |
| & |
| S.Dietrich |
|
|
|
|
| Now, could this be Kevin Poulson ??? Naaa, no way. |
| Amazing what technical data trashing will uncover. I guess |
| I should throw this away now . . . |
|
|
| After the convention, there was much rejoicing. The reasons |
| would become fairly obvious as a 'swingers party' sign was soon |
| located outside one of the hotel wings. Yes, it would be a very |
| good convention. |
|
|
| Several people made their way to the vehicles for a long |
| night of trashing and raiding of the various FedEx, UPS and |
| other assorted boxes around town. Other groups made their |
| way to computers that were trying to connect with anything |
| they could out in town. There were also those that reluctantly |
| went to the mall to take advantage of the local population. |
|
|
| What did not happen ??? Control-C did not get laid, but |
| it was rumored that there were a few 12-year olds wandering |
| around the hotel looking for this legendary hacker. No deaths |
| had occured, the fires were kept to a minimum and nothing major |
| was noted as being broken. |
|
|
| One thing was for sure, there were a lot of alcoholic |
| beverages going around, walkie-talkies, scanners, and wild |
| tales. Several area buildings were broken into, but nothing |
| major was done. |
|
|
| Then the shit hit the fan. It seems several hackers had riled |
| the swingers into a frenzy. I guess the swingers couldn't swing |
| with it. What happened ??? Phones went ringing room to room and |
| radios blared to life that the cops were here !!! At count, there |
| were 6 cops, 1 sheriff and 4 hotel employees that started patrolling |
| the hallways. Yes, we were under room arrest at our own convention |
| in our own wing. Anyone that left there room was told to stay there |
| or they would be arrested. The cops were very insistent that no |
| pictures were to be taken. The swingers had broken our balls. |
|
|
| But, this would not stop us. Soon, there was a phone network |
| going on with radio interfaces. The windows opened and a few migrated |
| to other locations of the hotel. After a while, the authorities left |
| feeling satisfied that they had intimidated us. They didn't. |
|
|
| After they left, the hallways erupted again. In the SotMESC |
| room a gathering turned out to watch several techno-infested |
| videos. At the cDc room were others viewing the HoHoCon '92 film |
| that dFx brought down with him. At one point, the microwave |
| around the lobby was detonated and a mysterious stack of Credit |
| Card carbons was found. The liberated phones were being |
| utilized to their full international extent, and several of the |
| soda machines decided to give out a few free drinks. |
|
|
| But, we couldn't leave well enough alone. Sir Lance went |
| to the lobby and took a picture of the hotel Asst. Manager. |
| I guess this guy didn't like his photo being taken, since he |
| turned around and called the cops on Sir Lance. Down the hallway |
| the cops came, dragging Sir Lance back with them. In the end, |
| the cops explained to the Asst. Manager that it was not a crime |
| in the US to take pictures of people. |
|
|
| In another related story, Kaos Wizard wound up calling the |
| SotMESC room with a wild plea for help. It seemed he was with |
| a large group of trashers that included Albatross, Intrepid, |
| Forced Entry, Zippy, The Public and more. Kaos was at a Central |
| Office close to the hotel on Woodson and needed help. He had |
| taken off to take a piss and noticed that the trashers were |
| surrounded by cops when he returned. There was no way he was going |
| back with all those cops there ( and, might I mention, there was |
| also a police dog ). Mystic Moos gathered up a few people and |
| went to rescue Kaos Wizard as the rest of the trashers returned |
| to the hotel. It seems they had eluded the cops by telling them |
| that they were waiting for their friend to return from taking |
| a bathroom break ( Kaos Wizard ). Unfortunately, he never |
| returned. The cops let them go eventually. Mystic Moos rescued |
| Kaos Wizard, and the hotel was aglow in activity again. |
|
|
| Control-C came down the hall at one point to make a startling |
| discovery. It seems that at a local club there was a band playing |
| that featured 'Lex Luthor'. The elusive X-LOD founder had been |
| located. AFter some thought, it was decided he could stay there |
| and sing the blues while the rest of us partied the night away. |
|
|
| For those interested, the hotel fax is 314-731-3752. |
|
|
| One of the police officers detaining us was S.M. Gibbons. |
|
|
| IBM will send a 36 page fax to the number you give them. |
| To activate, call 1-800-IBM-4FAX. As you can imagine, it wasn't |
| long before the hotels fax ran out of thermal paper. |
|
|
| Below is a gathering of Flyers . . . |
|
|
| HoHoCon '92 Product Ordering Information |
|
|
| If you are interested in obtaining either HoHoCon shirts or videos, |
| please contact us at any of the following: |
|
|
| drunkfux@cypher.com |
| hohocon@cypher.com |
| cDc@cypher.com |
| dfx@nuchat.sccsu.com |
| 359@7354 (WWIV Net) |
|
|
| HoHoCon |
| 1310 Tulane, Box #2 |
| Houston, Tx |
| 77008-4106 |
|
|
| 713-468-5802 (data) |
|
|
| The shirts are $15 plus $3 shipping ($4 for two shirts). At this |
| time, they only come in extra large. We may add additional sizes if |
| there is a demand for them. The front of the shirt has the following |
| in a white strip across the chest: |
|
|
| I LOVE FEDS |
|
|
| ( Where LOVE = a red heart, very similar to the I LOVE NY logo ) |
|
|
| And this on the back: |
|
|
| dFx & cDc Present |
|
|
| HoHoCon '92 |
|
|
| December 18-20 |
| Allen Park Inn |
| Houston, Texas |
|
|
| There is another version of the shirt available with the following: |
|
|
| I LOVE WAREZ |
|
|
| The video includes footage from all three days, is six hours long and |
| costs $18 plus $3 shipping ($4 if purchasing another item also). |
| Please note that if you are purchasing multiple items, you only need |
| to pay one shipping charge of $4, not a charge for each item. If |
| you wish to send an order in now, make all checks or money orders |
| payable to O.I.S., include your phone number and mail it to the street |
| address listed above. Allow a few weeks for arrival. |
|
|
| Thanks to everyone who attended and supported HoHoCon '92. Mail us if |
| you wish to be an early addition to the HoHoCon '93 (December 17-19) |
| mailing list. |
|
|
|
|
|
|
| Calvary Black Crawling Systems |
| 617-267-2732 617-482-6356 |
|
|
| ATDT EAST |
| 617-350-STIF |
|
|
| DemOnseed sez: "Call ATDT East or I'll crush your skull" |
|
|
| Home of -= RDT... |
|
|
|
|
| Trailings to follow . . . Slug, slug, slugfest . . . |
|
|
| Join the ranks of the Cons: HoHoCon, MardiCon, SummerCon !!! |
|
|
| **************************************************************************** |
|
|
| Top 25 Things I Learned at SummerCon '93 |
| -------------------------------- |
| By Darkangel |
|
|
|
|
| SummerCon is a place where many hackers from all over the |
| world meet to discuss the current state of hacking today, and to |
| drink themselves under the table. Every year, pages and pages of |
| useful information is passed and traded among the participants. |
| In this brief summery, I will attempt to point out the things |
| that I learned and I thought were the most helpful to the whole |
| hacker community. I hope you enjoy it. |
|
|
| #1) DON'T let Control-C within 15 feet of any person that |
| does not have a penis. |
|
|
| #2) Knight Lightning will have a stroke before the age of |
| 30. |
|
|
| #3) French Canadians ALWAYS sound drunk. |
|
|
| #4) Loops do not make good pickup lines. |
|
|
| #5) The Zenith is outside the window. Just look up. |
|
|
| #6) Smoking certain herbs is still illegal in St. Louis. |
|
|
| #7) If you see a taxi and think it might be a cop, it |
| probably is. |
|
|
| #8) Hotel Security is worse than Mall Security. |
|
|
| #9) The payphones in the lobby are not meant to be free. |
|
|
| #10) Do not climb through the ceiling to get to the room |
| with the PBX in it. |
|
|
| #11) Do not glue the locks shut on an entire floor of the |
| hotel. (especially when people are in them) |
|
|
| #12) This machine is broken. |
|
|
| #13) Do not dump bags you got trashing on the floor of |
| someone else's room. |
|
|
| #14) St. Louis police do not appreciate the finer points of |
| Simplex lock hacking. |
|
|
| #15) VaxBuster should never be allowed to drink Everclear. |
|
|
| #16) Scribbles has a very nice ass. |
|
|
| #17) Do not photograph Pakistani hotel security guards. |
|
|
| #18) Do not try to bring a six pack through customs. |
|
|
| #19) Loki is the Fakemail God. |
|
|
| #20) Do not rip the phone boxes out of the walls and cut |
| the wires. |
|
|
| #21) Barbie Doll pornos can be cool. |
|
|
| #22) Frosty can do weird things with techno and movies. |
|
|
| #23) Always remove the mirrors from the walls to check for |
| hidden cameras. |
|
|
| #24) Do not threaten or harass other people staying at the |
| same hotel. This can be bad. |
|
|
| #25) I really don't think the hotel will let us come back. |
|
|
| That wraps it up! See you at HoHoCon! |
|
|
| -Darkangel |
|
|
| *************************************************************************** |
|
|
| Hack-Tic Presents |
|
|
| H A C K I N G |
|
|
| at the E N D of the |
|
|
| U N I V E R S E |
|
|
| 1993 SUMMER CONGRESS, THE NETHERLANDS |
|
|
| ========================================================================= |
|
|
| HEU? |
|
|
| Remember the Galactic Hacker Party back in 1989? Ever wondered what |
| happened to the people behind it? We sold out to big business, you |
| think. Think again, we're back! |
|
|
| That's right. On august 4th, 5th and 6th 1993, we're organizing a |
| three-day summer congress for hackers, phone phreaks, programmers, |
| computer haters, data travellers, electro-wizards, networkers, hardware |
| freaks, techno-anarchists, communications junkies, cyberpunks, system |
| managers, stupid users, paranoid androids, Unix gurus, whizz kids, warez |
| dudes, law enforcement officers (appropriate undercover dress required), |
| guerilla heating engineers and other assorted bald, long-haired and/or |
| unshaven scum. And all this in the middle of nowhere (well, the middle |
| of Holland, actually, but that's the same thing) at the Larserbos |
| campground four meters below sea level. |
|
|
| The three days will be filled with lectures, discussions and workshops |
| on hacking, phreaking, people's networks, Unix security risks, virtual |
| reality, semafun, social engineering, magstrips, lockpicking, |
| viruses, paranoia, legal sanctions against hacking in Holland and |
| elsewhere and much, much more. English will be the lingua franca for |
| this event, although one or two workshops may take place in Dutch. |
| There will be an Internet connection, an intertent ethernet and social |
| interaction (both electronic and live). Included in the price are four |
| nights in your own tent. Also included are inspiration, transpiration, a |
| shortage of showers (but a lake to swim in), good weather (guaranteed by |
| god), campfires and plenty of wide open space and fresh air. All of this |
| for only 100 dutch guilders (currently around US$70). |
|
|
| We will also arrange for the availability of food, drink and smokes of |
| assorted types, but this is not included in the price. Our bar will be |
| open 24 hours a day, as well as a guarded depository for valuables |
| (like laptops, cameras etc.). You may even get your stuff back! For |
| people with no tent or air mattress: you can buy a tent through us for |
| 100 guilders, a mattress costs 10 guilders. You can arrive from 17:00 |
| (that's five p.m. for analogue types) on August 3rd. We don't have to |
| vacate the premises until 12:00 noon on Saturday, August 7 so you can |
| even try to sleep through the devastating Party at the End of Time |
| (PET) on the closing night (live music provided). We will arrange for |
| shuttle buses to and from train stations in the vicinity. |
|
|
| HOW? |
|
|
| Payment: in advance please. Un-organized, poor techno-freaks like us |
| would like to get to the Bahamas at least once. We can only guarantee |
| you a place if you pay before Friday June 25th, 1993. If you live in |
| Holland, just transfer fl. 100 to giro 6065765 (Hack-Tic) and mention |
| 'HEU' and your name. If you're in Germany, pay DM 100,- to Hack-Tic, |
| Konto 2136638, Sparkasse Bielefeld, BLZ 48050161. If you live elsewhere: |
| call, fax or e-mail us for the best way to get the money to us from your |
| country. We accept American Express, we do NOT cash ANY foreign cheques. |
|
|
| HA! |
|
|
| Very Important: Bring many guitars and laptops. |
|
|
| ME? |
|
|
| Yes, you! Busloads of alternative techno-freaks from all over the |
| planet will descend on this event. You wouldn't want to miss that, |
| now, would you? |
|
|
| Maybe you are part of that select group that has something special to |
| offer! Participating in 'Hacking at the End of the Universe' is |
| exciting, but organizing your very own part of it is even more fun. We |
| already have a load of interesting workshops and lectures scheduled, |
| but we're always on the lookout for more. We're also still in the |
| market for people who want to help us organize during the congress. |
|
|
| In whatever way you wish to participate, call, write, e-mail or fax us |
| soon, and make sure your money gets here on time. Space is limited. |
|
|
| SO: |
|
|
| - 4th, 5th and 6th of August |
|
|
| - Hacking at the End of the Universe |
| (a hacker summer congress) |
|
|
| - ANWB groepsterrein Larserbos |
| Zeebiesweg 47 |
| 8219 PT Lelystad |
| The Netherlands |
|
|
| - Cost: fl. 100,- (+/- 70 US$) per person |
| (including 4 nights in your own tent) |
|
|
| MORE INFO: |
|
|
| Hack-Tic |
| Postbus 22953 |
| 1100 DL Amsterdam |
| The Netherlands |
|
|
| tel : +31 20 6001480 |
| fax : +31 20 6900968 |
| E-mail : heu@hacktic.nl |
|
|
| VIRUS: |
|
|
| If you know a forum or network that you feel this message belongs on, |
| by all means slip it in. Echo-areas, your favorite bbs, /etc/motd, IRC, |
| WP.BAT, you name it. Spread the worm, uh, word. |
| ========================================================================= |
|
|
| SCHEDULE |
|
|
| day 0 August 3rd, 1993 |
| ===== |
| 16:00 You are welcome to set up your tent |
| 19:00 Improvised Dinner |
|
|
| day 1 August 4th, 1993 |
| ===== |
| 11:00-12:00 Opening ceremony |
| 12:00-13:30 Workshops |
| 14:00-15:30 Workshops |
| 15:30-19:00 'Networking for the Masses' 16:00-18:00 Workshops |
| 19:00-21:00 Dinner |
| 21:30-23:00 Workshops |
|
|
|
|
| day 2 August 5th, 1993 |
| ===== |
| 11:30-13:00 Workshops |
| 14:00-17:00 Phreaking the Phone 14:00-17:00 Workshops |
| 17:30-19:00 Workshops |
| 19:00-21:00 Dinner |
|
|
|
|
| day 3 August 6th, 1993 |
| ===== |
| 11:30-13:00 Workshops |
| 14:00-18:00 Hacking (and) The Law 14:00-17:00 Workshops |
| 18:00-19:00 Closing ceremony |
| 19:00-21:00 Barbeque |
| 21:00-??:?? Party at the End of Time (Live Music) |
|
|
| day 4 August 7th, 1993 |
| ===== |
| 12:00 All good things come to an end |
|
|
| ========================================================================= |
|
|
| 'Networking for the masses', Wednesday August 4th 1993, 15:30 |
|
|
| One of the main discussions at the 1989 Galactic Hacker Party focused on |
| whether or not the alternative community should use computer networking. |
| Many people felt a resentment against using a 'tool of oppression' for |
| their own purposes. Computer technology was, in the eyes of many, |
| something to be smashed rather than used. |
|
|
| Times have changed. Many who were violently opposed to using computers |
| in 1989 have since discovered word-processing and desktop publishing. |
| Even the most radical groups have replaced typewriters with PCs. The |
| 'computer networking revolution' has begun to affect the alternative |
| community. |
|
|
| Not all is well: many obstacles stand in the way of the 'free flow of |
| information.' Groups with access to information pay such high prices for |
| it that they are forced to sell information they'd prefer to pass on for |
| free. Some low-cost alternative networks have completely lost their |
| democratic structure. Is this the era of the digital dictator, or are we |
| moving towards digital democracy? |
|
|
| To discuss these and other issues, we've invited the following people |
| who are active in the field of computer networking: [Electronic mail |
| addresses for each of the participants are shown in brackets.] |
|
|
| Ted Lindgreen (ted@nluug.nl) is managing director of nlnet. Nlnet is the |
| largest commercial TCP/IP and UUCP network provider in the Netherlands. |
|
|
| Peter van der Pouw Kraan (peter@hacktic.nl) was actively involved in the |
| squat-movement newsletters 'Bluf!' and 'NN' and has outspoken ideas |
| about technology and its relation to society. Had a PC all the way back |
| in 1985! |
|
|
| Maja van der Velden (maja@agenda.hacktic.nl) is from the Agenda |
| Foundation which sets up and supports communication and information |
| projects. |
|
|
| Joost Flint (joost@aps.hacktic.nl) is from the Activist Press Service. |
| APS has a bbs and works to get alternative-media and pressure groups |
| online. |
|
|
| Felipe Rodriquez (nonsenso@utopia.hacktic.nl) is from the Hack-Tic |
| Network which grew out of the Dutch computer underground and currently |
| connects thousands of people to the global Internet. |
|
|
| Andre Blum (zabkar@roana.hacktic.nl), is an expert in the field of |
| wireless communications. |
|
|
| Eelco de Graaff (Eelco.de.Graaff@p5.f1.n281.z2.fidonet.org) is the |
| nethost of net 281 of FidoNet, EchoMail troubleshooter, and one of the |
| founders of the Dutch Fidonet Foundation. |
|
|
| Michael Polman (michael@antenna.nl) of the Antenna foundation is a |
| consultant in the field of international networking. He specialises in |
| non-governmental networks in the South. |
|
|
| Alfred Heitink (alfred@antenna.nl) is a social scientist specializing in |
| the field of computer-mediated communication as well as system manager at |
| the Dutch Antenna host. |
|
|
| Rena Tangens (rena@bionic.zer.de), was involved in the creation of the |
| Bionic Mailbox in Bielefeld (Germany) and the Zerberus mailbox network. |
| She is an artist and wants to combine art and technology. |
|
|
| The discussion will be led by freelance radiomaker and science |
| journalist Herbert Blankesteyn. He was involved in the 'Archie' |
| children's bbs of the Dutch VPRO broadcasting corporation. |
| ========================================================================= |
|
|
| 'Phreaking the Phone', Thursday August 5th 1993, 14:00 |
|
|
| Your own telephone may have possibilities you never dreamed possible. |
| Many years ago people discovered that one could fool the telephone |
| network into thinking you were part of the network and not just a |
| customer. As a result, one could make strange and sometimes free |
| phonecalls to anywhere on the planet. A subculture quickly formed. |
|
|
| The phone companies got wise and made a lot of things (nearly) |
| impossible. What is still possible today? What is still legal today? |
| What can they do about it? What are they doing about it? |
|
|
| Billsf (bill@tech.hacktic.nl) and M. Tillman, a few of the worlds best |
| phreaks, will introduce the audience to this new world. Phone phreaks |
| from many different countries will exchange stories of success and |
| defeat. Your life may never be the same. |
| ========================================================================= |
|
|
| 'Hacking (and) The Law', Friday August 6th, 14:00 |
|
|
| You can use your own computer and modem to access some big computer |
| system at a university without the people owning that computer knowing |
| about it. For years this activity was more or less legal in Holland: if |
| you were just looking around on the Internet and didn't break anything |
| nobody really cared too much... |
|
|
| That is, until shortly before the new computer crime law went into |
| effect. Suddenly computer hackers were portrayed as evil 'crashers' |
| intent on destroying systems or, at least, looking into everyone's |
| files. |
|
|
| The supporters of the new law said that it was about time something was |
| done about it. Critics of the law say it's like hunting mosquitoes with |
| a machine-gun. They claim the aforementioned type of hacking is not the |
| real problem and that the law is excessively harsh. |
|
|
| To discuss these issues we've invited a panel of experts, some of whom |
| are, or have been, in touch with the law in one way or another. |
|
|
| Harry Onderwater (fridge@cri.hacktic.nl), is technical EDP auditor at the |
| Dutch National Criminal Intelligence Service (CRI) and is responsible for |
| combatting computer crime in the Netherlands. He says he's willing to |
| arrest hackers if that is what it takes to make computer systems secure. |
|
|
| Prof. Dr. I.S. (Bob) Herschberg (herschbe@dutiws.twi.tudelft.nl), gained |
| a hacker's control over his first system 21 years ago and never ceased |
| the good work. Now lecturing, teaching and publishing on computer |
| insecurity and imprivacy at the technical university in Delft. His |
| thesis: 'penetrating a system is not perpetrating a crime'. |
|
|
| Ronald 'RGB' O. (rgb@utopia.hacktic.nl) has the distinction of being the |
| only Dutch hacker arrested before and after the new law went into effect. |
| He is a self-taught UNIX security expert and a writer for Hack-Tic |
| Magazine. |
|
|
| Ruud Wiggers (ruudw@cs.vu.nl), system manager at the Free University |
| (VU) in Amsterdam, has for 10 years been trying to plug holes in system |
| security. He was involved in the RGB arrest. |
|
|
| Andy Mueller-Maguhn (andy@cccbln.ccc.de) is from the Chaos Computer Club |
| in Germany. |
|
|
| Eric Corley (emmanuel@eff.org) a.k.a. Emmanuel Goldstein is editor |
| of the hacker publication '2600 magazine'. The first person to realize |
| the huge implications of the government crackdown on hackers in the US. |
|
|
| Winn Schwartau (wschwartau@mcimail.com) is a commercial computer |
| security advisor as well as the author of the book 'Terminal |
| Compromise'. His new book entitled 'Information Warfare' has just been |
| released. |
|
|
| Ray Kaplan (kaplan@bpa.arizona.edu) is a computer security consultant. |
| He is constantly trying to bridge the gap between hackers and the |
| computer industry. He organizes 'meet the enemy' sessions where system |
| managers can teleconference with hackers. |
|
|
| Wietse Venema (wietse@wzv.win.tue.nl) is a systems expert at the |
| Technical University in Eindhoven. He is the author of some very well |
| known utilities to monitor hacking on unix systems. He has a healthy |
| suspicion of anything technical. |
|
|
| Peter Klerks (klerks@rulfsw.leidenuniv.nl) is a scientist at the centre |
| for the study of social antagonism at the Leiden University. He has |
| studied the Dutch police force extensively, and is author of the book |
| 'Counterterrorism in the Netherlands.' |
|
|
| Don Stikvoort (stikvoort@surfnet.nl), one of the computer security |
| experts for the Dutch Academic Society and chairman of CERT-NL (Computer |
| Emergency Response Team). He is also actively involved in SURFnet |
| network management. |
|
|
| Rop Gonggrijp (rop@hacktic.nl) was involved in some of the first |
| computer break-ins in the Netherlands during the 80's and is now editor |
| of Hack-Tic Magazine. |
|
|
| The discussion will be led by Francisco van Jole (fvjole@hacktic.nl), |
| journalist for 'De Volkskrant'. |
| ========================================================================= |
|
|
| WORKSHOPS |
|
|
| HEUnet introduction |
| an introduction to the Hacking at the End of the Universe network. |
|
|
| Jumpstart to VR, 3D world-building on PC's |
| Marc Bennett, editor of Black Ice magazine, will explain how to |
| design worlds on your own PC which can be used in Virtual Reality |
| systems. |
|
|
| Replacing MS/DOS, Running UNIX on your own PC |
| People who are already running unix on their PCs will tell you what |
| unix has to offer and they'll talk about the different flavours in |
| cheap or free unix software available. |
|
|
| Unix security |
| RGB and fidelio have probably created more jobs in the unix security |
| business than the rest of the world put together. They'll talk about |
| some of the ins and outs of unix security. |
|
|
| E-mail networking |
| Should we destroy X400 or shall we let it destroy itself? |
|
|
| 'User Authorization Failure' |
| A quick introduction to the VAX/VMS Operating System for those that |
| consider a career in VMS security. |
|
|
| 'The right to keep a secret' |
| Encryption offers you the chance to really keep a secret, and |
| governments know it. They want you to use locks that they have the |
| key to. The fight is on! |
|
|
| 'Virus about to destroy the earth!'. Don't believe the hype! |
| What is the real threat of computer viruses? What technical |
| possibilities are there? Are we being tricked by a fear-machine that |
| runs on the money spent on anti-virus software? |
|
|
| 'It came out of the sky' |
| 'Receiving pager information and what not to do with it'. Information |
| to pagers is sent through the air without encryption. Rop Gonggrijp |
| and Bill Squire demonstrate a receiver that picks it all up and |
| present some spooky scenarios describing what one could do with all |
| that information. |
|
|
| Cellular phones and cordless phones |
| How do these systems work, what frequencies do they use, and what are |
| the differences between different systems world-wide? |
|
|
| Zen and the art of lock-picking. |
| In this workshop The Key will let you play with cylinder locks of all |
| types and tell you of ingenious ways to open them. |
|
|
| "Doesn't mean they're not after you" |
| The secret services and other paranoia. |
|
|
| Audio Adventures |
| Steffen Wernery and Tim Pritlove talk about adventure games that you |
| play using a Touch Tone telephone. |
|
|
| Botanical Hacking (THC++) |
| Using computers, modems and other high tech to grow. |
|
|
| Wireless LAN (Data Radio) |
| How high a data rate can you pump through the air, and what is still |
| legal? |
|
|
| Social Engineering |
| The Dude, well known from his articles in Hack-Tic, will teach you |
| the basics of social engineering, the skill of manipulating people |
| within bureaucracies. |
|
|
| 'Hacking Plastic' |
| Tim and Billsf talk about the security risks in chip-cards, magnetic |
| cards, credit cards and the like. |
|
|
| Antenna Host Demo |
| The Antenna Foundation is setting up and supporting computer |
| networks, mainly in the South. They are operating a host system in |
| Nijmegen, The Netherlands, and they will demonstrate it in this |
| workshop, and talk about their activities. |
|
|
| APS Demo |
| APS (Activist Press Service) is operating a bbs in Amsterdam, The |
| Netherlands. You'll see it and will be able to play with it |
| 'hands-on'. |
|
|
| 'Hocking the arts' |
| Benten and Marc Marc are computer artists. They present some of their |
| work under the motto: Hocking the arts, demystifying without losing |
| its magic contents. |
|
|
| Public Unix Demo |
| Demonstrating the Hack-Tic xs4all public unix, as well as other |
| public unix systems. |
|
|
| Packet Radio Demo |
| Showing the possibilities of existing radio amateur packet radio |
| equipment to transport packets of data over the airwaves. |
| ========================================================================= |
|
|
| COMPUTERS AT 'HACKING AT THE END OF THE UNIVERSE' |
|
|
| This will get a little technical for those who want to know what we're |
| going to set up. If you don't know much about computers, just bring |
| whatever you have and we'll see how and if we can hook it up. |
|
|
| We're going to have ethernet connected to Internet (TCP/IP). You can |
| connect by sitting down at one of our PC's or terminals, by hooking up |
| your own equipment (we have a depository, so don't worry about theft), |
| or by using one of our 'printerport <--> ethernet' adapters and |
| hooking up laptops and notebooks that way. There may be a small fee |
| involved here, we don't know what they're going to cost us. Contact us |
| for details, also if you have a few of these adapters lying around. |
| There might also be serial ports you can connect to using a nullmodem |
| cable. |
|
|
| You can log in to our UNIX system(s) and send and receive mail and |
| UseNet news that way. Every participant that wants one can get her/his |
| own IP number to use worldwide. Users of the network are urged to make |
| whatever files they have on their systems available to others over the |
| ethernet. Bring anything that has a power cord or batteries and let's |
| network it! |
| ========================================================================= |
|
|
| -- |
| Hstorm ++31 2230 60551 |
| Ad Timmering <north@hstorm.hacktic.nl> |