| ==Phrack Magazine== |
|
|
| Volume Six, Issue Forty-Seven, File 6 of 22 |
|
|
|
|
|
|
| 18. What is an Internet Outdial? |
|
|
| An Internet outdial is a modem connected to the Internet than you can |
| use to dial out. Normal outdials will only call local numbers. A GOD |
| (Global OutDial) is capable of calling long distance. Outdials are an |
| inexpensive method of calling long distance BBS's. |
|
|
|
|
| 19. What are some Internet Outdials? |
|
|
| This FAQ answer is excerpted from CoTNo #5: |
|
|
| Internet Outdial List v3.0 |
| by Cavalier and DisordeR |
|
|
|
|
| Introduction |
| ------------ |
| There are several lists of Internet outdials floating around the net these |
| days. The following is a compilation of other lists, as well as v2.0 by |
| DeadKat(CoTNo issue 2, article 4). Unlike other lists where the author |
| just ripped other people and released it, we have sat down and tested |
| each one of these. Some of them we have gotten "Connection Refused" or |
| it timed out while trying to connect...these have been labeled dead. |
|
|
|
|
| Working Outdials |
| ---------------- |
| as of 12/29/94 |
|
|
| NPA IP Address Instructions |
| --- ---------- ------------ |
| 215 isn.upenn.edu modem |
|
|
| 217 dialout.cecer.army.mil atdt x,xxxXXXXX |
|
|
| 218 modem.d.umn.edu atdt9,xxxXXXX |
|
|
| 303 yuma.acns.colostate.edu 3020 |
|
|
| 412 gate.cis.pitt.edu tn3270, |
| connect dialout.pitt.edu, |
| atdtxxxXXXX |
|
|
| 413 dialout2400.smith.edu Ctrl } gets ENTER NUMBER: xxxxxxx |
|
|
| 502 outdial.louisville.edu |
|
|
| 502 uknet.uky.edu connect kecnet |
| @ dial: "outdial2400 or out" |
|
|
| 602 acssdial.inre.asu.edu atdt8,,,,,[x][yyy]xxxyyyy |
|
|
| 614 ns2400.acs.ohio-state.edu |
|
|
| 614 ns9600.acs.ohio-state.edu |
|
|
| 713 128.249.27.153 atdt x,xxxXXXX |
|
|
| 714 modem.nts.uci.edu atdt[area]0[phone] |
|
|
| 804 ublan.virginia.edu connect hayes, 9,,xxx-xxxx |
|
|
| 804 ublan2.acc.virginia.edu connect telnet |
| connect hayes |
|
|
|
|
|
|
| Need Password |
| ------------- |
|
|
| 206 rexair.cac.washington.edu This is an unbroken password |
| 303 yuma.ACNS.ColoState.EDU login: modem |
| 404 128.140.1.239 .modem8|CR |
| 415 annex132-1.EECS.Berkeley.EDU "dial1" or "dial2" or "dialer1" |
| 514 cartier.CC.UMontreal.CA externe,9+number |
| 703 wal-3000.cns.vt.edu dial2400 -aa |
|
|
|
|
| Dead/No Connect |
| --------------- |
|
|
| 201 idsnet |
| 202 modem.aidt.edu |
| 204 dial.cc.umanitoba.ca |
| 204 umnet.cc.manitoba.ca "dial12" or "dial24" |
| 206 dialout24.cac.washington.edu |
| 207 modem-o.caps.maine.edu |
| 212 B719-7e.NYU.EDU dial3/dial12/dial24 |
| 212 B719-7f.NYU.EDU dial3/dial12/dial24 |
| 212 DIALOUT-1.NYU.EDU dial3/dial12/dial24 |
| 212 FREE-138-229.NYU.EDU dial3/dial12/dial24 |
| 212 UP19-4b.NYU.EDU dial3/dial12/dial24 |
| 215 wiseowl.ocis.temple.edu "atz" "atdt 9xxxyyyy" |
| 218 aa28.d.umn.edu "cli" "rlogin modem" |
| at "login:" type "modem" |
| 218 modem.d.umn.edu Hayes 9,XXX-XXXX |
| 301 dial9600.umd.edu |
| 305 alcat.library.nova.edu |
| 305 office.cis.ufl.edu |
| 307 modem.uwyo.edu Hayes 0,XXX-XXXX |
| 313 35.1.1.6 dial2400-aa or dial1200-aa |
| or dialout |
| 402 dialin.creighton.edu |
| 402 modem.criegthon.edu |
| 404 broadband.cc.emory.edu ".modem8" or ".dialout" |
| 408 dialout.scu.edu |
| 408 dialout1200.scu.edu |
| 408 dialout2400.scu.edu |
| 408 dialout9600.scu.edu |
| 413 dialout.smith.edu |
| 414 modems.uwp.edu |
| 416 annex132.berkely.edu atdt 9,,,,, xxx-xxxx |
| 416 pacx.utcs.utoronto.ca modem |
| 503 dialout.uvm.edu |
| 513 dialout24.afit.af.mil |
| 513 r596adi1.uc.edu |
| 514 pacx.CC.UMontreal.CA externe#9 9xxx-xxxx |
| 517 engdial.cl.msu.edu |
| 602 dial9600.telcom.arizona.edu |
| 603 dialout1200.unh.edu |
| 604 dial24-nc00.net.ubc.ca |
| 604 dial24-nc01.net.ubc.ca |
| 604 dial96-np65.net.ubc.ca |
| 604 gmodem.capcollege.bc.ca |
| 604 hmodem.capcollege.bc.ca |
| 609 128.119.131.11X (X= 1 - 4) Hayes |
| 609 129.119.131.11x (x = 1 to 4) |
| 609 wright-modem-1.rutgers.edu |
| 609 wright-modem-2.rutgers.edu |
| 612 modem_out12e7.atk.com |
| 612 modem_out24n8.atk.com |
| 614 ns2400.ircc.ohio-state.edu "dial" |
| 615 dca.utk.edu dial2400 D 99k # |
| 615 MATHSUN23.MATH.UTK.EDU dial 2400 d 99Kxxxxxxx |
| 616 modem.calvin.edu |
| 617 128.52.30.3 2400baud |
| 617 dialout.lcs.mit.edu |
| 617 dialout1.princeton.edu |
| 617 isdn3.Princeton.EDU |
| 617 jadwingymkip0.Princeton.EDU |
| 617 lord-stanley.Princeton.EDU |
| 617 mpanus.Princeton.EDU |
| 617 mrmodem.wellesley.edu |
| 617 old-dialout.Princeton.EDU |
| 617 stagger.Princeton.EDU |
| 617 sunshine-02.lcs.mit.edu |
| 617 waddle.Princeton.EDU |
| 619 128.54.30.1 atdt [area][phone] |
| 619 dialin.ucsd.edu "dialout" |
| 703 modem_pool.runet.edu |
| 703 wal-3000.cns.vt.edu |
| 713 128.249.27.154 "c modem96" "atdt 9xxx-xxxx" |
| or "Hayes" |
| 713 modem12.bcm.tmc.edu |
| 713 modem24.bcm.tmc.edu |
| 713 modem24.bcm.tmc.edu |
| 714 mdmsrv7.sdsu.edu atdt 8xxx-xxxx |
| 714 modem24.nts.uci.edu |
| 714 pub-gopher.cwis.uci.edu |
| 801 dswitch.byu.edu "C Modem" |
| 808 irmodem.ifa.hawaii.edu |
| 902 star.ccs.tuns.ca "dialout" |
| 916 129.137.33.72 |
| 916 cc-dnet.ucdavis.edu connect hayes/dialout |
| 916 engr-dnet1.engr.ucdavis.edu UCDNET <ret> C KEYCLUB <ret> |
| ??? 128.119.131.11X (1 - 4) |
| ??? 128.200.142.5 |
| ??? 128.54.30.1 nue, X to discontinue, ? for Help |
| ??? 128.6.1.41 |
| ??? 128.6.1.42 |
| ??? 129.137.33.72 |
| ??? 129.180.1.57 |
| ??? 140.112.3.2 ntu <none> |
| ??? annexdial.rz.uni-duesseldorf.de |
| ??? dial96.ncl.ac.uk |
| ??? dialout.plk.af.mil |
| ??? ee21.ee.ncu.edu.tw cs8005 |
| ??? im.mgt.ncu.edu.tw guest <none> |
| ??? modem.cis.uflu.edu |
| ??? modem.ireq.hydro.qc.ca |
| ??? modems.csuohio.edu |
| ??? sparc20.ncu.edu.tw u349633 |
| ??? sun2cc.nccu.edu.tw ? |
| ??? ts-modem.une.oz.au |
| ??? twncu865.ncu.edu.tw guest <none> |
| ??? vtnet1.cns.ut.edu "CALL" or "call" |
|
|
|
|
| Conclusion |
| ---------- |
| If you find any of the outdials to have gone dead, changed commands, |
| or require password, please let us know so we can keep this list as |
| accurate as possible. If you would like to add to the list, feel free |
| to mail us and it will be included in future versions of this list, |
| with your name beside it. Have fun... |
|
|
| [Editors note: Updates have been made to this document after |
| the original publication] |
|
|
|
|
| 20. What is this system? |
|
|
|
|
| AIX |
| ~~~ |
| IBM AIX Version 3 for RISC System/6000 |
| (C) Copyrights by IBM and by others 1982, 1990. |
| login: |
|
|
| [You will know an AIX system because it is the only Unix system that] |
| [clears the screen and issues a login prompt near the bottom of the] |
| [screen] |
|
|
|
|
| AS/400 |
| ~~~~~~ |
| UserID? |
| Password? |
|
|
| Once in, type GO MAIN |
|
|
|
|
| CDC Cyber |
| ~~~~~~~~~ |
| WELCOME TO THE NOS SOFTWARE SYSTEM. |
| COPYRIGHT CONTROL DATA 1978, 1987. |
|
|
| 88/02/16. 02.36.53. N265100 |
| CSUS CYBER 170-730. NOS 2.5.2-678/3. |
| FAMILY: |
|
|
| You would normally just hit return at the family prompt. Next prompt is: |
|
|
| USER NAME: |
|
|
|
|
| CISCO Router |
| ~~~~~~~~~~~~ |
| FIRST BANK OF TNO |
| 95-866 TNO VirtualBank |
| REMOTE Router - TN043R1 |
|
|
| Console Port |
|
|
| SN - 00000866 |
|
|
| TN043R1> |
|
|
|
|
| DECserver |
| ~~~~~~~~~ |
| DECserver 700-08 Communications Server V1.1 (BL44G-11A) - LAT V5.1 |
| DPS502-DS700 |
|
|
| (c) Copyright 1992, Digital Equipment Corporation - All Rights Reserved |
|
|
| Please type HELP if you need assistance |
|
|
| Enter username> TNO |
|
|
| Local> |
|
|
|
|
| Hewlett Packard MPE-XL |
| ~~~~~~~~~~~~~~~~~~~~~~ |
| MPE XL: |
| EXPECTED A :HELLO COMMAND. (CIERR 6057) |
| MPE XL: |
| EXPECTED [SESSION NAME,] USER.ACCT [,GROUP] (CIERR 1424) |
| MPE XL: |
|
|
|
|
| GTN |
| ~~~ |
| WELCOME TO CITIBANK. PLEASE SIGN ON. |
| XXXXXXXX |
|
|
| @ |
| PASSWORD = |
|
|
| @ |
|
|
| =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= |
|
|
| PLEASE ENTER YOUR ID:-1-> |
| PLEASE ENTER YOUR PASSWORD:-2-> |
|
|
| CITICORP (CITY NAME). KEY GHELP FOR HELP. |
| XXX.XXX |
| PLEASE SELECT SERVICE REQUIRED.-3-> |
|
|
|
|
| Lantronix Terminal Server |
| ~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Lantronix ETS16 Version V3.1/1(940623) |
|
|
| Type HELP at the 'Local_15> ' prompt for assistance. |
|
|
| Login password> |
|
|
|
|
| Meridian Mail (Northern Telecom Phone/Voice Mail System) |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| MMM MMMERIDIAN |
| MMMMM MMMMM |
| MMMMMM MMMMMM |
| MMM MMMMM MMM MMMMM MMMMM |
| MMM MMM MMM MMMMMM MMMMMM |
| MMM MMM MMM MMM MMM MMM |
| MMM MMM MMM MMMMM MMM |
| MMM MMM MMM MMM MMM |
| MMM MMM MMM MMM |
| MMM MMM MMM MMM |
| MMM MMM MMM MMM |
| MMM MMM MMM MMM |
| MMM MMM MMM MMM |
|
|
| Copyright (c) Northern Telecom, 1991 |
|
|
|
|
| Novell ONLAN |
| ~~~~~~~~~~~~ |
| N |
|
|
| [To access the systems it is best to own a copy of ONLAN/PC] |
|
|
|
|
| PC-Anywhere |
| ~~~~~~~~~~~ |
| P |
|
|
| [To access the systems it is best to own a copy of PCAnywhere Remote] |
|
|
|
|
| PRIMOS |
| ~~~~~~ |
| PRIMENET 19.2.7F PPOA1 |
|
|
| <any text> |
|
|
| ER! |
|
|
| =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= |
|
|
| CONNECT |
| Primenet V 2.3 (system) |
| LOGIN (you) |
| User id? (system) |
| SAPB5 (you) |
| Password? (system) |
| DROWSAP (you) |
| OK, (system) |
|
|
|
|
| ROLM-OSL |
| ~~~~~~~~ |
| MARAUDER10292 01/09/85(^G) 1 03/10/87 00:29:47 |
| RELEASE 8003 |
| OSL, PLEASE. |
| ? |
|
|
|
|
| System75 |
| ~~~~~~~~ |
| Login: root |
| INCORRECT LOGIN |
|
|
| Login: browse |
| Password: |
|
|
| Software Version: G3s.b16.2.2 |
|
|
| Terminal Type (513, 4410, 4425): [513] |
|
|
|
|
| Tops-10 |
| ~~~~~~~ |
| NIH Timesharing |
|
|
| NIH Tri-SMP 7.02-FF 16:30:04 TTY11 |
| system 1378/1381/1453 Connected to Node Happy(40) Line # 12 |
| Please LOGIN |
| . |
|
|
|
|
| VM/370 |
| ~~~~~~ |
| VM/370 |
| ! |
|
|
|
|
| VM/ESA |
| ~~~~~~ |
| VM/ESA ONLINE |
|
|
| TBVM2 VM/ESA Rel 1.1 PUT 9200 |
|
|
| Fill in your USERID and PASSWORD and press ENTER |
| (Your password will not appear when you type it) |
| USERID ===> |
| PASSWORD ===> |
|
|
| COMMAND ===> |
|
|
|
|
| Xylogics Annex Communications Server |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Annex Command Line Interpreter * Copyright 1991 Xylogics, Inc. |
|
|
| Checking authorization, Please wait... |
| Annex username: TNO |
| Annex password: |
|
|
| Permission granted |
| annex: |
|
|
|
|
| 21. What are the default accounts for XXX? |
|
|
| AIX |
| ~~~ |
| guest guest |
|
|
|
|
| AS/400 |
| ~~~~~~ |
| qsecofr qsecofr /* master security officer */ |
| qsysopr qsysopr /* system operator */ |
| qpgmr qpgmr /* default programmer */ |
|
|
| also |
|
|
| ibm/password |
| ibm/2222 |
| ibm/service |
| qsecofr/1111111 |
| qsecofr/2222222 |
| qsvr/qsvr |
| secofr/secofr |
|
|
|
|
| DECserver |
| ~~~~~~~~~ |
| ACCESS |
| SYSTEM |
|
|
|
|
| Dynix (The library software, not the UnixOS) |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (Type 'later' to exit to the login prompt) |
| setup <no password> |
| library <no password> |
| circ <9 digit number> |
|
|
|
|
| Hewlett Packard MPE-XL |
| ~~~~~~~~~~~~~~~~~~~~~~ |
| HELLO MANAGER.SYS |
| HELLO MGR.SYS |
| HELLO FIELD.SUPPORT HPUNSUP or SUPPORT or HP |
| HELLO OP.OPERATOR |
| MGR CAROLIAN |
| MGR CCC |
| MGR CNAS |
| MGR CONV |
| MGR COGNOS |
| OPERATOR COGNOS |
| MANAGER COGNOS |
| OPERATOR DISC |
| MGR HPDESK |
| MGR HPWORD |
| FIELD HPWORD |
| MGR HPOFFICE |
| SPOOLMAN HPOFFICE |
| ADVMAIL HPOFFICE |
| MAIL HPOFFICE |
| WP HPOFFICE |
| MANAGER HPOFFICE |
| MGR HPONLY |
| FIELD HPP187 |
| MGR HPP187 |
| MGR HPP189 |
| MGR HPP196 |
| MGR INTX3 |
| MGR ITF3000 |
| MANAGER ITF3000 |
| MAIL MAIL |
| MGR NETBASE |
| MGR REGO |
| MGR RJE |
| MGR ROBELLE |
| MANAGER SECURITY |
| MGR SECURITY |
| FIELD SERVICE |
| MANAGER SYS |
| MGR SYS |
| PCUSER SYS |
| RSBCMON SYS |
| OPERATOR SYS |
| OPERATOR SYSTEM |
| FIELD SUPPORT |
| OPERATOR SUPPORT |
| MANAGER TCH |
| MAIL TELESUP |
| MANAGER TELESUP |
| MGR TELESUP |
| SYS TELESUP |
| MGE VESOFT |
| MGE VESOFT |
| MGR WORD |
| MGR XLSERVER |
|
|
| Common jobs are Pub, Sys, Data |
| Common passwords are HPOnly, TeleSup, HP, MPE, Manager, MGR, Remote |
|
|
|
|
| Major BBS |
| ~~~~~~~~~ |
| Sysop Sysop |
|
|
|
|
| Mitel PBX |
| ~~~~~~~~~ |
| SYSTEM |
|
|
|
|
| Nomadic Computing Environment (NCE) on the Tadpole Technologies SPARCBook3 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| fax <no password> |
|
|
|
|
| PICK O/S |
| ~~~~~~~~ |
| DSA # Desquetop System Administrator |
| DS |
| DESQUETOP |
| PHANTOM |
|
|
|
|
| Prolog |
| ~~~~~~ |
| PBX PBX |
| NETWORK NETWORK |
| NETOP <null> |
|
|
|
|
| Rolm |
| ~~~~ |
| CBX Defaults |
|
|
| op op |
| op operator |
| su super |
| admin pwp |
| eng engineer |
|
|
|
|
| PhoneMail Defaults |
|
|
| sysadmin sysadmin |
| tech tech |
| poll tech |
|
|
|
|
| RSX |
| ~~~ |
| SYSTEM/SYSTEM (Username SYSTEM, Password SYSTEM) |
| 1,1/system (Directory [1,1] Password SYSTEM) |
| BATCH/BATCH |
| SYSTEM/MANAGER |
| USER/USER |
|
|
| Default accounts for Micro/RSX: |
|
|
| MICRO/RSX |
|
|
| Alternately you can hit <CTRL-Z> when the boot sequence asks you for the |
| date and create an account using: |
|
|
| RUN ACNT |
| or RUN $ACNT |
|
|
| (Numbers below 10 {oct} are Priveleged) |
|
|
| Reboot and wait for the date/time question. Type ^C and at the MCR prompt, |
| type "abo at." You must include the . dot! |
|
|
| If this works, type "acs lb0:/blks=1000" to get some swap space so the |
| new step won't wedge. |
|
|
| type " run $acnt" and change the password of any account with a group |
| number of 7 or less. |
|
|
| You may find that the ^C does not work. Try ^Z and ESC as well. |
| Also try all 3 as terminators to valid and invalid times. |
|
|
| If none of the above work, use the halt switch to halt the system, |
| just after a invalid date-time. Look for a user mode PSW 1[4-7]xxxx. |
| then deposit 177777 into R6, cross your fingers, write protect the drive |
| and continue the system. This will hopefully result in indirect blowing |
| up... And hopefully the system has not been fully secured. |
|
|
|
|
| SGI Irix |
| ~~~~~~~~ |
| 4DGifts <no password> |
| guest <no password> |
| demos <no password> |
| lp <no password> |
| nuucp <no password> |
| tour <no password> |
| tutor <no password> |
|
|
|
|
| System 75 |
| ~~~~~~~~~ |
| bcim bcimpw |
| bciim bciimpw |
| bcms bcmspw, bcms |
| bcnas bcnspw |
| blue bluepw |
| browse looker, browsepw |
| craft crftpw, craftpw, crack |
| cust custpw |
| enquiry enquirypw |
| field support |
| inads indspw, inadspw, inads |
| init initpw |
| kraft kraftpw |
| locate locatepw |
| maint maintpw, rwmaint |
| nms nmspw |
| rcust rcustpw |
| support supportpw |
| tech field |
|
|
|
|
| Taco Bell |
| ~~~~~~~~~ |
| rgm rollout |
| tacobell <null> |
|
|
| |
| Verifone Junior 2.05 |
| ~~~~~~~~~~~~~~~~~~~~ |
| Default password: 166816 |
|
|
|
|
| VMS |
| ~~~ |
| field service |
| systest utep |
|
|
|
|
| XON / XON Junior |
| ~~~~~~~~~~~~~~~~ |
| Default password: 166831 |
|
|
|
|
| 22. What port is XXX on? |
|
|
| The file /etc/services on most Unix machines lists the port |
| assignments for that machine. For a complete list of port |
| assignments, read RFC (Request For Comments) 1700 "Assigned Numbers" |
|
|
|
|
| 23. What is a trojan/worm/virus/logic bomb? |
|
|
| This FAQ answer was written by Theora: |
|
|
| Trojan: |
|
|
| Remember the Trojan Horse? Bad guys hid inside it until they could |
| get into the city to do their evil deed. A trojan computer program is |
| similar. It is a program which does an unauthorized function, hidden |
| inside an authorized program. It does something other than what it |
| claims to do, usually something malicious (although not necessarily!), |
| and it is intended by the author to do whatever it does. If it's not |
| intentional, its called a 'bug' or, in some cases, a feature :) Some |
| virus scanning programs detect some trojans. Some virus scanning |
| programs don't detect any trojans. No virus scanners detect all |
| trojans. |
|
|
| Virus: |
|
|
| A virus is an independent program which reproduces itself. It may |
| attach to other programs, it may create copies of itself (as in |
| companion viruses). It may damage or corrupt data, change data, or |
| degrade the performance of your system by utilizing resources such as |
| memory or disk space. Some virus scanners detect some viruses. No |
| virus scanners detect all viruses. No virus scanner can protect |
| against "any and all viruses, known and unknown, now and forevermore". |
|
|
| Worm: |
|
|
| Made famous by Robert Morris, Jr. , worms are programs which reproduce |
| by copying themselves over and over, system to system, using up |
| resources and sometimes slowing down the systems. They are self |
| contained and use the networks to spread, in much the same way viruses |
| use files to spread. Some people say the solution to viruses and |
| worms is to just not have any files or networks. They are probably |
| correct. We would include computers. |
|
|
| Logic Bomb: |
|
|
| Code which will trigger a particular form of 'attack' when a |
| designated condition is met. For instance, a logic bomb could delete |
| all files on Dec. 5th. Unlike a virus, a logic bomb does not make |
| copies of itself. |
|
|
|
|
| 24. How can I protect myself from viruses and such? |
|
|
| This FAQ answer was written by Theora: |
|
|
| The most common viruses are boot sector infectors. You can help |
| protect yourself against those by write protecting all disks which you |
| do not need write access to. Definitely keep a set of write protected |
| floppy system disks. If you get a virus, it will make things much |
| simpler. And, they are good for coasters. Only kidding. |
|
|
| Scan all incoming files with a recent copy of a good virus scanner. |
| Among the best are F-Prot, Dr. Solomon's Anti-virus Toolkit, and |
| Thunderbyte Anti-Virus. AVP is also a good proggie. Using more than |
| one scanner could be helpful. You may get those one or two viruses |
| that the other guy happened to miss this month. |
|
|
| New viruses come out at the rate of about 8 per day now. NO scanner |
| can keep up with them all, but the four mentioned here do the best job |
| of keeping current. Any _good_ scanner will detect the majority of |
| common viruses. No virus scanner will detect all viruses. |
|
|
| Right now there are about 5600 known viruses. New ones are written |
| all the time. If you use a scanner for virus detection, you need to |
| make sure you get frequent updates. If you rely on behaviour |
| blockers, you should know that such programs can be bypassed easily by |
| a technique known as tunnelling. |
|
|
| You may want to use integrity checkers as well as scanners. Keep in |
| mind that while these can supply added protection, they are not |
| foolproof. |
|
|
| You may want to use a particular kind of scanner, called resident |
| scanners. Those are programs which stay resident in the computer |
| memory and constantly monitor program execution (and sometimes even |
| access to the files containing programs). If you try to execute a |
| program, the resident scanner receives control and scans it first for |
| known viruses. Only if no such viruses are found, the program is |
| allowed to execute. |
|
|
| Most virus scanners will not protect you against many kinds of |
| trojans, any sort of logic bombs, or worms. Theoretically, they |
| _could_ protect you against logic bombs and/or worms, by addition of |
| scanning strings; however, this is rarely done. |
|
|
| The best, actually only way, to protect yourself is to know what you |
| have on your system and make sure what you have there is authorised by |
| you. Make freqent backups of all important files. Keep your DOS |
| system files write protected. Write protect all disks that you do not |
| need to write to. If you do get a virus, don't panic. Call the |
| support department of the company who supplies your anti-virus product |
| if you aren't sure of what you are doing. If the company you got your |
| anti-virus software from does not have a good technical support |
| department, change companies. |
|
|
| The best way to make sure viruses are not spread is not to spread |
| them. Some people do this intentionally. We discourage this. Viruses |
| aren't cool. |
|
|
|
|
| 25. Where can I get more information about viruses? |
|
|
| This FAQ answer was written by Theora: |
|
|
| Assembly lanaguage programming books illustrate the (boring) aspect of |
| replication and have for a long time. The most exciting/interesting |
| thing about viruses is all the controversy around them. Free speech, |
| legality, and cute payloads are a lot more interesting than "find |
| first, find next" calls. You can get information about the technical |
| aspects of viruses, as well as help if you should happen to get a |
| virus, from the virus-l FAQ, posted on comp. virus every so often. |
| You can also pick up on the various debates there. There are |
| alt.virus type newsgroups, but the level of technical expertise is |
| minimal, and so far at least there has not been a lot of real "help" |
| for people who want to get -rid- of a virus. |
|
|
| There are a lot of virus experts. To become one, just call yourself |
| one. Only Kidding. Understanding viruses involves understanding |
| programming, operating systems, and their interaction. Understanding |
| all of the 'Cult of Virus' business requires a lot of discernment. |
| There are a number of good papers available on viruses, and the Cult |
| of Virus; you can get information on them from just about anyone |
| listed in the virus-l FAQ. The FTP site ftp.informatik.uni-hamburg.de |
| is a pretty reliable site for proggies and text. |
|
|
|
|
| 26. What is Cryptoxxxxxxx? |
|
|
| This FAQ answer is excerpted from: Computer Security Basics |
| by Deborah Russell |
| and G.T. Gengemi Sr. |
|
|
| A message is called either plaintext or cleartext. The process of |
| disguising a message in such a way as to hide its substance is called |
| encryption. An encrypted message is called ciphertext. The process |
| of turning ciphertext back into plaintext is called decryption. |
|
|
| The art and science of keeping messages secure is called cryptography, |
| and it is practiced by cryptographers. Cryptanalysts are |
| practitioners of cryptanalysis, the art and science of breaking |
| ciphertext, i.e. seeing through the disguise. The branch of |
| mathematics embodying both cryptography and cryptanalysis is called |
| cryptology, and it's practitioners are called cryptologists. |
|
|
|
|
| 27. What is PGP? |
|
|
| This FAQ answer is excerpted from: PGP(tm) User's Guide |
| Volume I: Essential Topics |
| by Philip Zimmermann |
|
|
| PGP(tm) uses public-key encryption to protect E-mail and data files. |
| Communicate securely with people you've never met, with no secure |
| channels needed for prior exchange of keys. PGP is well featured and |
| fast, with sophisticated key management, digital signatures, data |
| compression, and good ergonomic design. |
|
|
| Pretty Good(tm) Privacy (PGP), from Phil's Pretty Good Software, is a |
| high security cryptographic software application for MS-DOS, Unix, |
| VAX/VMS, and other computers. PGP allows people to exchange files or |
| messages with privacy, authentication, and convenience. Privacy means |
| that only those intended to receive a message can read it. |
| Authentication means that messages that appear to be from a particular |
| person can only have originated from that person. Convenience means |
| that privacy and authentication are provided without the hassles of |
| managing keys associated with conventional cryptographic software. No |
| secure channels are needed to exchange keys between users, which makes |
| PGP much easier to use. This is because PGP is based on a powerful |
| new technology called "public key" cryptography. |
|
|
| PGP combines the convenience of the Rivest-Shamir-Adleman (RSA) |
| public key cryptosystem with the speed of conventional cryptography, |
| message digests for digital signatures, data compression before |
| encryption, good ergonomic design, and sophisticated key management. |
| And PGP performs the public-key functions faster than most other |
| software implementations. PGP is public key cryptography for the |
| masses. |
|
|
|
|
| 28. What is Tempest? |
|
|
| Tempest stands for Transient Electromagnetic Pulse Surveillance |
| Technology. |
|
|
| Computers and other electronic equipment release interference to their |
| surrounding environment. You may observe this by placing two video |
| monitors close together. The pictures will behave erratically until |
| you space them apart. |
|
|
| Although most of the time these emissions are simply annoyances, they |
| can sometimes be very helpful. Suppose we wanted to see what project |
| a target was working on. We could sit in a van outside her office and |
| use sensitive electronic equipment to attempt to pick up and decipher |
| the emanations from her video monitor. |
|
|
| Our competitor, however, could shield the emanations from her |
| equipment or use equipment without strong emanations. |
|
|
| Tempest is the US Government program for evaluation and endorsement |
| of electronic equipment that is safe from eavesdropping. |
|
|
|
|
| 29. What is an anonymous remailer? |
|
|
| An anonymous remailer is a system on the Internet that allows you to |
| send e-mail anonymously or post messages to Usenet anonymously. |
|
|
| You apply for an anonymous ID at the remailer site. Then, when you |
| send a message to the remailer, it sends it out from your anonymous ID |
| at the remailer. No one reading the post will know your real account |
| name or host name. If someone sends a message to your anonymous ID, |
| it will be forwarded to your real account by the remailer. |
|
|
|
|
| 30. What are the addresses of some anonymous remailers? |
|
|
| The most popular and stable anonymous remailer is anon.penet.fi, |
| operated by Johan Helsingus. To obtain an anonymous ID, mail |
| ping@anon.penet.fi. For assistance is obtaining an anonymous account |
| at penet, mail help@anon.penet.fi. |
|
|
| To see a list on anonymous remailers, finger |
| remailer-list@kiwi.cs.berkeley.edu. |
|
|
|
|
| 31. How do I defeat Copy Protection? |
|
|
| There are two common methods of defeating copy protection. The first |
| is to use a program that removes copy protection. Popular programs |
| that do this are CopyIIPC from Central Point Software and CopyWrite |
| from Quaid Software. The second method involves patching the copy |
| protected program. For popular software, you may be able to locate a |
| ready made patch. You can them apply the patch using any hex editor, |
| such as debug or the Peter Norton's DiskEdit. If you cannot, you must |
| patch the software yourself. |
|
|
| Writing a patch requires a debugger, such as Soft-Ice or Sourcer. It |
| also requires some knowledge of assembly language. Load the protected |
| program under the debugger and watch for it to check the protection |
| mechanism. When it does, change that portion of the code. The code |
| can be changed from JE (Jump on Equal) or JNE (Jump On Not Equal) to |
| JMP (Jump Unconditionally). Or the code may simply be replaced with |
| NOP (No Operation) instructions. |
|
|
|
|
| 32. What is 127.0.0.1? |
|
|
| 127.0.0.1 is a loopback network connection. If you telnet, ftp, etc... |
| to it you are connected to your own machine. |
|
|
|
|
| 33. How do I post to a moderated newsgroup? |
|
|
| Usenet messages consist of message headers and message bodies. The |
| message header tells the news software how to process the message. |
| Headers can be divided into two types, required and optional. Required |
| headers are ones like "From" and "Newsgroups." Without the required |
| headers, your message will not be posted properly. |
|
|
| One of the optional headers is the "Approved" header. To post to a |
| moderated newsgroup, simply add an Approved header line to your |
| message header. The header line should contain the newsgroup |
| moderators e-mail address. To see the correct format for your target |
| newsgroup, save a message from the newsgroup and then look at it using |
| any text editor. |
|
|
| A "Approved" header line should look like this: |
|
|
| Approved: will@gnu.ai.mit.edu |
|
|
| There cannot not be a blank line in the message header. A blank line |
| will cause any portion of the header after the blank line to be |
| interpreted as part of the message body. |
|
|
| For more information, read RFC 1036: Standard for Interchange of |
| USENET messages. |
|
|
|
|
|
|
|
|
| Section B: Telephony |
| ~~~~~~~~~~~~~~~~~~~~ |
|
|
| 01. What is a Red Box? |
|
|
| When a coin is inserted into a payphone, the payphone emits a set of |
| tones to ACTS (Automated Coin Toll System). Red boxes work by fooling |
| ACTS into believing you have actually put money into the phone. The |
| red box simply plays the ACTS tones into the telephone microphone. |
| ACTS hears those tones, and allows you to place your call. The actual |
| tones are: |
|
|
| Nickel Signal 1700+2200 0.060s on |
| Dime Signal 1700+2200 0.060s on, 0.060s off, twice repeating |
| Quarter Signal 1700+2200 33ms on, 33ms off, 5 times repeating |
|
|
|
|
| 02. How do I build a Red Box? |
|
|
| Red boxes are commonly manufactured from modified Radio Shack tone |
| dialers, Hallmark greeting cards, or made from scratch from readily |
| available electronic components. |
|
|
| To make a Red Box from a Radio Shack 43-141 or 43-146 tone dialer, |
| open the dialer and replace the crystal with a new one. |
| The purpose of the new crystal is to cause the * button on your tone |
| dialer to create a 1700Mhz and 2200Mhz tone instead of the original |
| 941Mhz and 1209Mhz tones. The exact value of the replacement crystal |
| should be 6.466806 to create a perfect 1700Mhz tone and 6.513698 to |
| create a perfect 2200mhz tone. A crystal close to those values will |
| create a tone that easily falls within the loose tolerances of ACTS. |
| The most popular choice is the 6.5536Mhz crystal, because it is the |
| eaiest to procure. The old crystal is the large shiny metal component |
| labeled "3.579545Mhz." When you are finished replacing the crystal, |
| program the P1 button with five *'s. That will simulate a quarter |
| tone each time you press P1. |
|
|
|
|
| 03. Where can I get a 6.5536Mhz crystal? |
|
|
| Your best bet is a local electronics store. Radio Shack sells them, |
| but they are overpriced and the store must order them in. This takes |
| approximately two weeks. In addition, many Radio Shack employees do |
| not know that this can be done. |
|
|
| Or, you could order the crystal mail order. This introduces Shipping |
| and Handling charges, which are usually much greater than the price of |
| the crystal. It's best to get several people together to share the |
| S&H cost. Or, buy five or six yourself and sell them later. Some of |
| the places you can order crystals are: |
|
|
| Digi-Key |
| 701 Brooks Avenue South |
| P.O. Box 677 |
| Thief River Falls, MN 56701-0677 |
| (80)344-4539 |
| Part Number:X415-ND /* Note: 6.500Mhz and only .197 x .433 x .149! */ |
| Part Number:X018-ND |
|
|
| JDR Microdevices: |
| 2233 Branham Lane |
| San Jose, CA 95124 |
| (800)538-5000 |
| Part Number: 6.5536MHZ |
|
|
| Tandy Express Order Marketing |
| 401 NE 38th Street |
| Fort Worth, TX 76106 |
| (800)241-8742 |
| Part Number: 10068625 |
|
|
| Alltronics |
| 2300 Zanker Road |
| San Jose CA 95131 |
| (408)943-9774 Voice |
| (408)943-9776 Fax |
| (408)943-0622 BBS |
| Part Number: 92A057 |
|
|
|
|
| 04. Which payphones will a Red Box work on? |
|
|
| Red Boxes will work on TelCo owned payphones, but not on COCOT's |
| (Customer Owned Coin Operated Telephones). |
|
|
| Red boxes work by fooling ACTS (Automated Coin Toll System) into |
| believing you have put money into the pay phone. ACTS is the |
| telephone company software responsible for saying "Please deposit XX |
| cents" and listening for the coins being deposited. |
|
|
| COCOT's do not use ACTS. On a COCOT, the pay phone itself is |
| responsible for determining what coins have been inserted. |
|
|
|
|
| 05. How do I make local calls with a Red Box? |
|
|
| Payphones do not use ACTS for local calls. To use your red box for |
| local calls, you have to fool ACTS into getting involved in the call. |
|
|
| One way to do this, in some areas, is by dialing 10288-xxx-xxxx. This |
| makes your call a long distance call, and brings ACTS into the |
| picture. |
|
|
| In other areas, you can call Directory Assistance and ask for the |
| number of the person you are trying to reach. The operator will give |
| you the number and then you will hear a message similar to "Your call |
| can be completed automatically for an additional 35 cents." When this |
| happens, you can then use ACTS tones. |
|
|
|
|
| 06. What is a Blue Box? |
|
|
| Blue boxes use a 2600hz tone to size control of telephone switches |
| that use in-band signalling. The caller may then access special |
| switch functions, with the usual purpose of making free long distance |
| phone calls, using the tones provided by the Blue Box. |
|
|
|
|
| 07. Do Blue Boxes still work? |
|
|
| Blue Boxes still work in areas using in band signalling. Modern phone |
| switches use out of band signalling. Nothing you send over the voice |
| portion of bandwidth can control the switch. If you are in an area |
| served by a switch using out of band signalling, you can still blue |
| box by calling through an area served by older in-band equipment. |
|
|
|
|
| 08. What is a Black Box? |
|
|
| A Black Box is a 1.8k ohm resistor placed across your phone line to |
| cause the phone company equipment to be unable to detect that you have |
| answered your telephone. People who call you will then not be billed |
| for the telephone call. Black boxes do not work under ESS. |
|
|
|
|
| 09. What do all the colored boxes do? |
|
|
| Acrylic Steal Three-Way-Calling, Call Waiting and programmable |
| Call Forwarding on old 4-wire phone systems |
| Aqua Drain the voltage of the FBI lock-in-trace/trap-trace |
| Beige Lineman's hand set |
| Black Allows the calling party to not be billed for the call |
| placed |
| Blast Phone microphone amplifier |
| Blotto Supposedly shorts every fone out in the immediate area |
| Blue Emulate a true operator by seizing a trunk with a 2600hz |
| tone |
| Brown Create a party line from 2 phone lines |
| Bud Tap into your neighbors phone line |
| Chartreuse Use the electricity from your phone line |
| Cheese Connect two phones to create a diverter |
| Chrome Manipulate Traffic Signals by Remote Control |
| Clear A telephone pickup coil and a small amp used to make free |
| calls on Fortress Phones |
| Color Line activated telephone recorder |
| Copper Cause crosstalk interference on an extender |
| Crimson Hold button |
| Dark Re-route outgoing or incoming calls to another phone |
| Dayglo Connect to your neighbors phone line |
| Divertor Re-route outgoing or incoming calls to another phone |
| DLOC Create a party line from 2 phone lines |
| Gold Dialout router |
| Green Emulate the Coin Collect, Coin Return, and Ringback tones |
| Infinity Remotely activated phone tap |
| Jack Touch-Tone key pad |
| Light In-use light |
| Lunch AM transmitter |
| Magenta Connect a remote phone line to another remote phone line |
| Mauve Phone tap without cutting into a line |
| Neon External microphone |
| Noise Create line noise |
| Olive External ringer |
| Party Create a party line from 2 phone lines |
| Pearl Tone generator |
| Pink Create a party line from 2 phone lines |
| Purple Telephone hold button |
| Rainbow Kill a trace by putting 120v into the phone line (joke) |
| Razz Tap into your neighbors phone |
| Red Make free phone calls from pay phones by generating |
| quarter tones |
| Rock Add music to your phone line |
| Scarlet Cause a neighbors phone line to have poor reception |
| Silver Create the DTMF tones for A, B, C and D |
| Static Keep the voltage on a phone line high |
| Switch Add hold, indicator lights, conferencing, etc.. |
| Tan Line activated telephone recorder |
| Tron Reverse the phase of power to your house, causing your |
| electric meter to run slower |
| TV Cable "See" sound waves on your TV |
| Urine Create a capacitative disturbance between the ring and |
| tip wires in another's telephone headset |
| Violet Keep a payphone from hanging up |
| White Portable DTMF keypad |
| Yellow Add an extension phone |
|
|
| Box schematics may be retrieved from these FTP sites: |
|
|
| ftp.netcom.com /pub/br/bradleym |
| ftp.netcom.com /pub/va/vandal |
| ftp.winternet.com /users/craigb |
|
|
|
|