Read The Anarchist Cookbook Online

Authors: William Powell

Tags: #Reference, #Handbooks & Manuals

The Anarchist Cookbook (23 page)

BOOK: The Anarchist Cookbook
8.39Mb size Format: txt, pdf, ePub
ads

89. Remote Informer Issue #2 by Tracker, Norman Bates, and Ye Cap'n

Raggers and Braggers

This section is to make you aware of well-known raggers and braggers. Since this is the

first time this section is being printed, we will tell you what classifies people as raggers

and braggers. In the future issues the top raggers and braggers will be listed in this

newsletter to let the SysOps know who not to let on their board, or to atleast keep an

eye on. A ragger is someone who will put someone else down for something. The person

might post a message asking a novice question about hacking and phreaking, or may say

something that is completely wrong, and a ragger will put the other person down for he

said, posted, etc. The ones that usually classify in this category are the ones that think

they know it all and consider themselves right no matter what anyone says. Most of the

users that use codes and consider themselves a master phreaker usually become

raggers.

A bragger is someone who either does or thinks he does know everything, and puts it upon

himself to tell the whole world that he knows it all. This person is also one who thinks

he is better than everyone else and he believes he is Elite, and no one else is. People who

tend to do this are those who have, for some reason, become well-known in the

underworld, and as a result become a bragger. Those usually not too well-known will not

tend to brag as much as those who think everyone would love to be their friend and be

like them.

As a well-known ragger and bragger, The Toad, learned that it does not help to be one or

both of those. He has since changed and is now easily accepted by most. Most people

disliked him because others they knew had said something bad about him. This is called

peer pressure and is a bad influence to those who are new to the underworld. I would

suggest in the future, to not judge someone by what others say, but rather by how they

act around/to you. The current most popular Atarian that classifies as a ragger and a

bragger is Ace of Aces, and is well-hated by many users and SysOps, since he tends to put

down anything anyone says and considers himself the best at writing hacking programs. He

is commonly referred to as Ass of Asses and Ass of Assholes. Even holding an open mind

about this guy, you would soon come to find that what others said coincides with what you

see from him.

A New 950 has arrived!

LDDS, who as mentioned above bought out TMC, is installing a new 950 port to most

major cities. By the time you read this, it should be in almost every area that supports

950 ports. The number is 950-1450. This port will dial 976 numbers, but not 700, 800,

or 900 numbers. The dialing method for LDDS is: 7 digit code, then even if the code is

bad it will give you a dial tone. Then dial the area code plus the number. If you have a

bad code it will simply say your call cannot be completed as it was dialed. There is a

default code used on the system that currently works. The code is simply, 1234567. I

have seen codes from 5 different companies and they all are in the format of 00xxxxx. I

do not know what type of software they use, but I will know by the next issue

exactly what they place on the bills. This could be the answer to a lot of people's

problems with fear of Sprint and ITT, especially AllNets. Just remember, Tracker is the

one who found this, and all information about it. If someone is seen saying they found

this, then they will be listed in the next issue which will contain an article on leeches.

Mailbox Systems

Mailbox systems are the link between information and the underworld. If you have ever

called one, then you will know the advantages of having one, especially the ones that are

open to whole underworld, rather than just a select few. There are two types of mailbox

systems that are widely used. The first type we will talk about is the multiple mailbox

systems, or commonly referred to as message systems. These systems have several

mailboxes set up on one number. Usually, you can access other mailboxes from that

number by pressing '*' or '#'. Sometimes you just enter the mailbox number and you

are connected. These are the safest systems to use to protect information from US

Sprint and other long distance companies. Since US Sprint and other companies call the

destination numbers, it is safer to have 800 mailbox systems, and most of the time, the

multiple mailbox systems are on 800 numbers. The passcode on these systems can vary

in length and can be accessed by several different methods, so it is impossible to explain

exactly how to hack these systems.

The other type is the single mailbox system. These are usually set up in a reserved

prefix in an area code. (Ex: 713-684-6xxx) These systems are usually controlled by the

same type of hardware/software. To access the area where you enter the passcode,

just hit '0' for a second or so. The passcodes are four (4) digits long. The only way to

hack these is manually. The best thing you could do is to find one that does not have a

recording from a person, but just the digitized voice. If you hack one that someone

already owns, they will report it and it will not last as long.

Here is a list mailboxes or prefixes to help you get started

--------------------------------------------------------------------------

SingleMultipleNameDigits
213-281-8xxx212-714-2770

3213-285-8xxx216-586-5000

4213-515-2xxx415-338-7000Aspen

Message

System3214-733-5xxx714-474-

2033Western Digital 214-855-6xxx800-222-0651Vincent and Elkins4214-978-2xxx800-

233-8488 3215-949-2xxx800-447-8477Fairylink7312-450-8xxx800-521-5344 3313-

768-1xxx800-524-2133RCA4405-557-8xxx800-527-0027TTE TeleMessager6602-230-

4xxx800-632-7777Asynk6619-492-8xxx800-645-7778SoftCell Computers4713-684-

6xxx800-648-9675Zoykon4 800-847-0003Communications World3

90. Remote Informer Issue #3 by Tracker, Ye Cap'n, Norman Bates

Introduction

It's been a month now, and A LOT has happened. So much, in fact, that the information

will be split into several issues. This should be no shock since I mentioned in the first issue

that we may put several issues out sometimes. I want to congratulate the readers for

finally contributing to the newsletter. This first two issues were all on information that I,

myself, obtained. Several people gave me information for these issues, and their handle

and information is included in the articles.

ITT has 9 digits!

For those of you who did not know this, ITT has nine digit codes. They are said to give

better connections to some extent. This info was originally given to us by Party Beast.

Phreaky Phones Go Down!

The famed Phreaky Phones are down again. Modem Man, the original person that started

them, has said that they will be down until further notice. In the meantime, other

independent boxes are being started. A listing can be made of current ones on request.

Magnus Adept Gets Busted

Fellow Atarian and well-known phreak Magnus Adept got caught by MCI. Details of the

how, when, and where are not known at this time. He got caught with 150 codes and may

have to pay up to 50 dollars for each code.

Sprint Codes Are Dying Fast!

Sprint codes are hard to get and when they are obtained, they tend to die rather quickly.

Phreakers have been saying that the 950-0777 port is dead, but on the contrary, it is still

available in states that are not highly abused by phreaks. Here again, rumors are being

spread.

The Best BBS of the Month

Starting from now on, we will have a BBS of the month. We will choose a BBS, regardless

of computer type, and look at the user participation in phreak related matters, as well as

quality discussions on the various illegal topics. A BBS can remain the BBS of the month as

long as they reside above the rest of the BBS systems. Even though we will sometimes

bring out more than one issue in a month, the board will remain BBS of the month until the

first issue in the next month comes out.

This month's BBS of the month is FBI PirateNet. We chose this board because of the

large numbers of posts in the bases, and not only information, but discussions as well, with

a minimum number of posts from raggers and braggers. The number for it is 516-661-

7360. The Sysop of FBI PirateNet is The Phantom, not to be confused with an earlier

NARC.

US Sprint Expected to Trim Staff, Consolidate Divisions

New York -- US Sprint Communications Corp., the troubled long distance carrier, is

expected to announce soon that it will cut its work force by several hundred people and

reduce its seven regional divisions to 3 operating groups, sources familiar with the company

said.

The company's Pacific division is based in Burlingame, CA. The layoffs and reorganization

are part of a plan by US Sprint's new president, Robert H. Snedaker, to reduce heavy

operating losses, which analysts expect to reach more than $800 million this year.

Snedaker replaced Charles M. Slibo, who was forced to resign in July because losses were

running much higher than the parent companies had expected. Problems with the

company's computerized billing system also contributed to Skibo's ouster. US Sprint is

owned and operated by the GTE Corp. and United TeleCom.

According to sources close to Snedaker, who was vice chairman and chief operating officer

of United TeleCom, he is planning to consolidate the company's 7 divisions, which operate

in the same geographical regions as the seven regional Bell operating companies, into 3

divisions.

The rationale for the move, according to industry analysts, is that the company will need a

much smaller work force once it begins handling all it's phone traffic on it's new fiber

optic network, which can carry a greater number of telephone calls at less cost. Company

officials have said that they expect to have most of the traffic on the network by early

next year. One source said that there would be more than one round of layoffs in the

coming months and that the company ultimately plans to reduce its 14,000 member work

force by 15 percent.

Several top managers are expected to resign as soon as US Sprint centralizes its

marketing and support operations as its headquarters in Kansas City, MO., according to a

report in the latest issue of Business Week magazine.

A spokesman for US Sprint said on Friday that the company would not comment on the

rumors. The company is the nation's third largest long distance company, after the

American Telephone and Telegraph Co. (AT&T) and MCI Communications Co.

Last year, Washington based MCI undertook a similar reorganization in which it posted a

$502« million loss to write down old inventory and restructure operations.

Analysts said that is US Sprint is to turn a profit, the company must increase its market

share. "To do this, US Sprint must gain more large business customers, which account for

about 80 percent of industry revenues," said Robert B. Morris III, Securities in San

Francisco.

Morris said that by using a slick marketing campaign to differentiate its all-fiber

telephone network from those of competitors, US Sprint more than doubled its customer

base last year. But "most of these customers were residential and small business users

that added little to Sprint's bottom line," he added. "If the company expects to be

profitable, it will have to concentrate on providing the best service to volume users."

Secret Service Cracks Down on Teen Hackers

Mount Lebanon, PA -- The US Secret Service and local police departments have put a

scare into the hacker community with a nationwide crackdown on computer crime that has

resulted in the arrests of teenage hackers in at least three cities.

"People who monitor the bulletin boards say there are a lot of nervous hackers out there,

wondering who will be arrested next," says Ronald E. Freedman, vice-president of

Advanced Information Management, a Woodbridge, VA base computer security firm.

Nine teenagers from Mount Lebanon Junior-Senior High School near Pittsburg, PA, were

arrested recently and charged with computer fraud. The juveniles allegedly used home

computers to gain illegal access to a credit card authorization center. They obtained valid

credit card numbers and used them to purchase thousands of dollars worth of mail order

merchandise, the police said.

Freedman says it appears the hackers used some relatively sophisticated techniques in the

scheme, including specially written software that enabled them to bypass security controls

and navigate through credit records to obtain key information.

Police officials say that the hackers also obtained access codes from pirate bulletin board

systems to make free long distance calls and gain access to various business and

BOOK: The Anarchist Cookbook
8.39Mb size Format: txt, pdf, ePub
ads

Other books

A Blind Eye by G. M. Ford
The Crippled Angel by Sara Douglass
Rogue Dragon by Kassanna
The Good Sister by Leanne Davis
The Good, the Bad & the Beagle by Catherine Lloyd Burns
Corpsing by Toby Litt
Bloody Valentine by Melissa de La Cruz