

                                ==Phrack Inc.==

                  Volume Four, Issue Thirty-Nine, File 1 of 13

                               Issue XXXIX Index
                              ___________________

                               P H R A C K   3 9

                                 June 26, 1992
                              ___________________

                         ~You're Not Dealing With AT&T~

Welcome to Phrack 39.  This will be the final issue before SummerCon '92.
Details of SummerCon will appear in our special anniversary issue due late this
summer -- Phrack 40.  Rumor also has it that the next issue of Mondo 2000 will
contain some type of coverage about SummerCon as well!

Phrack has been receiving an enormous amount of mail containing questions and
comments from our readers and we really appreciate the attention, but we don't
know what to do with it all.  Phrack Loopback was created to address letters of
this sort, but in a lot of cases, the senders of the mail are not indicating if
their question is to be posted to Loopback or if they are to be identified as
the author of their question in Loopback.

Dispater has been moving all across the country over the past couple of months,
which is the primary reason for the delay in releasing this issue.  However,
now that he is settled, the fun is about to begin.  He will be responding to
your mail very soon and hopefully this will all be sorted out by issue 40.
For right now, you can enjoy a variety of special interest articles and letters
in this issue's Loopback, including "A Review of Steve Jackson Games' HACKER"
by Deluge.  Special thanks goes out to Mentor and Steve Jackson for a copy of
the game and the totally cool looking poster.  "Association of Security
Sysadmins" is my favorite!  ;)

Another problem situation that needs to be mentioned has to do with would-be
subscribers.  For some reason the "phracksub@stormking.com" account has been
receiving hundreds of requests from people who want to be added to the
subscription list.  This isn't how it works.  You must subscribe yourself, we
can't and won't do it for you.  The instructions are included later in this
file.  Up till this point we have been informing people of their error and
mailing them the instructions, but we will ignore these requests from now on.
Anyone with an intelligence level high enough to enjoy Phrack should be capable
of figuring out how to subscribe.

Phrack Pro-Phile focuses on Shadow Hawk 1 -- The first hacker ever to be
prosecuted under the Computer Fraud & Abuse Act of 1986.  A lot of people don't
realize that Robert Morris, Jr. was not the first because Shadow Hawk 1 was
tried as a minor and therefore a lot of details in his case are not publicly
known.  Something to point out however is that the same people (William J. Cook
and Henry Klupfel) that were responsible for prosecuting SH1 in 1989, came back
in 1990 to attack Knight Lightning... but this time the government and Bellcore
didn't fare as well and now both Cook and Klupfel (among others) are being sued
in Federal Court in Austin, Texas (See Steve Jackson Games v. United States).

Now, before anyone starts flying off their keyboards screaming about our
article "Air Fone Frequencies" by Leroy Donnelly, we will let you know what's
what.  Yes, the same article did recently appear in Informatik, however, both
publications received it from the same source (Telecom Digest) and Informatik
just had an earlier release date.  At Phrack, we feel that the information was
interesting and useful enough that our readers deserved to see it and we do not
assume by any means that everyone on the Phrack list is also a reader of
publications like Telecom Digest or Informatik.

Phrack's feature article in this issue is "The Complete Guide To The DIALOG
Information Network" by Brian Oblivion.  Our undying gratitude to Mr. Oblivion
for his consistency in providing Phrack and its readers with entertaining
quality articles... and we're told that the best is yet to come.

Longtime fans of Phrack might recall that Phrack 9 had an article on Dialog
services and it also had an article on Centigram Voice Mail.  Now 30 issues
later, both topics are resurrected in much greater detail.

You will also note that the Centigram article in this issue is penned under the
pseudonym of ">Unknown User<," a name that was adopted from the anonymous
posting feature of the Metal Shop Private bulletin board (the birthplace of
Phrack, sysoped by Taran King during 1985-1987).  The name ">Unknown User<" has
traditionally been reserved for authors who did not wish to be identified in
any capacity other than to the Phrack editors.  In this case, however, even the
staff at Phrack has absolutely no idea who the author of this file is because
of the unique way of SMTP Fakemail it was delivered.

No Pirates' Cove in this issue.  Be watching for the next Pirates' Cove in
Phrack 40.

                                - - - - - - - -

Knight Lightning recently spoke at the National Computer Security Association's
Virus Conference in Washington, D.C.  His presentation panel which consisted
of himself, Winn Schwartau (author of Terminal Compromise), and Michael
Alexander (chief editor of ISPNews and formally an editor and reporter for
ComputerWorld) was very well received and the people attending the conference
appeared genuinely interested in learning about the hacking community and
computer security.  KL remarked that he felt really good about the public's
reaction to his presentation because "its the first time, I've agreed to be on
one of these panels and someone in the audience hasn't made accusatory or
derogatory remarks."

                    "It's inappropriate for you to be here."

This was the warm reception KL and a few others received upon entering the
room where the secret midnight society anti-virus group was holding a meeting.
It appears that a small number of anti-virus "experts" have decided to embark
on a mission to rid the country of computer bulletin boards that allow the
dissemination of computer viruses... by any means possible, including the
harassment of the sysops (or the sysops' parents if the operator is a minor).

At Phrack, some of us feel that there are no good viruses and are opposed to
their creation and distribution.  Others of us (e.g. Dispater) just think
viruses are almost as boring as the people who make a carear out of
exterminating them.  However, we do not agree with the method proposed by this
organization and will be watching.

                              - - - - - - - - - -

Special thanks for help in producing this issue:

     Beta-Ray Bill                            Crimson Flash (512)
     Datastream Cowboy                        Deluge
     Dispater, EDITOR                         Dokkalfar
     Frosty (of CyberSpace Project)           Gentry
     The Iron Eagle (of Australia)            JJ Flash
     Knight Lightning, Founder                Mr. Fink
     The Omega [RDT][-cDc-]                   The Public
     Rambone                                  Ripper of HALE
     Tuc                                      White Knight [RDT][-cDc-]

                         We're Back and We're Phrack!

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

                      HOW TO SUBSCRIBE TO PHRACK MAGAZINE

     The distribution of Phrack is now being performed by the software called
Listserv.  All individuals on the Phrack Mailing List prior to your receipt of
this letter have been deleted from the list.

If you would like to re-subscribe to Phrack Inc. please follow these
instructions:

1.  Send a piece of electronic mail to "LISTSERV@STORMKING.COM".  The mail
    must be sent from the account where you wish Phrack to be delivered.

2.  Leave the "Subject:" field of that letter empty.

3.  The first line of your mail message should read:
    SUBSCRIBE PHRACK <your name here>

4.  DO NOT leave your address in the name field!
    (This field is for PHRACK STAFF use only, so please use a full name)

Once you receive the confirmation message, you will then be added to the Phrack
Mailing List.  If you do not receive this message within 48 hours, send another
message.  If you STILL do not receive a message, please contact
"SERVER@STORMKING.COM".

You will receive future mailings from "PHRACK@STORMKING.COM".

If there are any problems with this procedure, please contact
"SERVER@STORMKING.COM" with a detailed message.

You should get a conformation message sent back to you on your subscription.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Table Of Contents
 ~~~~~~~~~~~~~~~~~
 1. Introduction by Dispater and Phrack Staff                              12K
 2. Phrack Loopback by Phrack Staff                                        24K
 3. Phrack Pro-Phile on Shadow Hawk 1 by Dispater                           8K
 4. Network Miscellany V by Datastream Cowboy                              34K
 5. DIALOG Information Network by Brian Oblivion                           43K
 6  Centigram Voice Mail System Consoles by >Unknown User<                 36K
 7. Special Area Codes II by Bill Huttig                                   17K
 8. Air Fone Frequencies by Leroy Donnelly                                 14K
 9. The Open Barn Door by Douglas Waller (Newsweek)                        11K
10. PWN/Part 1 by Datastream Cowboy                                        30K
11. PWN/Part 2 by Datastream Cowboy                                        27K
12. PWN/Part 3 by Datastream Cowboy                                        29K
13. PWN/Part 4 by Datastream Cowboy                                        29K

                                                                   Total: 314K

               "Phrack.  If you don't get it, you don't get it."

                            phracksub@stormking.com

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Somebody Watching?                                          Somebody Listening?

                          *** Special Announcement ***

               KNIGHT LIGHTNING TO SPEAK AT SURVEILLANCE EXPO '92
                                 Washington, DC

The Fourth Annual International Surveillance and Countersurveillance Conference
and Exposition focusing on Information Security and Investigations Technology
will take place at the Sheraton Premiere in Tysons Corner (Vienna), Virginia on
August 4-7.

The seminars are on August 7th and include Craig Neidorf (aka Knight Lightning)
presenting and discussing the following:

-    Are law enforcement and computer security officials focusing their
     attention on where the real crimes are being committed?

-    Should security holes and other bugs be made known to the public?

-    Is information property and if so, what is it worth?

     Experience the case that changed the way computer crime is investigated
     and prosecuted by taking a look at one of America's most talked about
     computer crime prosecutions:  United States v. Neidorf (1990).

     Exonerated former defendant Craig Neidorf will discuss the computer
     "hacker" underground, Phrack newsletter, computer security, and how it all
     came into play during his 7 month victimization by some of our nation's
     largest telephone companies and an overly ambitious and malicious federal
     prosecutor.  Neidorf will speak about his trial in 1990 and how the court
     dealt with complex issues of First Amendment rights, intellectual
     property, and criminal justice.

Security professionals, government employees, and all other interested parties
are invited to attend.  For more information please contact:

     American Technology Associates, Inc.
     P.O. Box 20254
     Washington, DC  20041
     (202)331-1125 Voice
     (703)318-8223 FAX
_______________________________________________________________________________


                                ==Phrack Inc.==

                  Volume Four, Issue Thirty-Nine, File 2 of 13

                          [-=:< Phrack Loopback >:=-]

                                By Phrack Staff

     Phrack Loopback is a forum for you, the reader, to ask questions, air
problems, and talk about what ever topic you would like to discuss.  This is
also the place Phrack Staff will make suggestions to you by reviewing various
items of note; magazines, software, catalogs, hardware, etc.
_______________________________________________________________________________

 A Review of Steve Jackson Games' HACKER
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Deluge

They had to get around to it eventually.  While I was scanning the game section
at the not-so-well-stocked game and comic store where I shop on occasion, I saw
something that caught my eye:  A game called "Hacker" by Steve Jackson Games.

What you see on the cover gives you a clue that this game is a bit more than
the typical trash we see about hackers.  Here we have a guy with a leather
jacket with a dinosaur pin, John Lennon shades, a Metallica shirt, and a really
spiffy spiked hairdo.  This guy has an expression with a most wicked grin, and
his face is bathed in the green glow of a monitor.  Various decorations in the
room include a model rocket, a skateboard, a pizza box, and a couple of Jolt
Cola cans.  Behind him, hanging on his wall, are a couple of posters, one which
says, "Legion of Doom Internet World Tour," and another which says, "Free the
Atlanta Three."  On his bookshelf, we see a copy of Neuromancer, Illuminati
BBS, and The Phoenix-- (I assume "Project" follows, and don't ask me why this
guy has BBSes in his bookshelf).  Finally, there's a note tacked to the LOD
poster that says "PHRACK SummerCon CyberView, St. Louis" which appears to be an
invitation of some kind.

This struck me as quite interesting.

Twenty bucks interesting, as it turns out, and I think it was twenty well
spent.  Now don't tell me Steve Jackson Games has no significance for you
(sigh).  Ok, here is how Steve tells it (in the intro to the game):

-----

"In 1990, Steve Jackson Games was raided by the U.S. Secret Service during a
'hacker hunt' that went disastrously out of control.  We lost several
computers, modems, and other equipment.  Worse, we lost the manuscripts to
several uncompleted games, most notably _GURPS Cyberpunk_, which a Secret
Service agent the next day called 'a handbook for computer crime.'  The company
had to lay off half its staff, and narrowly avoided bankruptcy.

"Eventually we got most of our property back (though some of it was damaged or
destroyed).  The Secret Service admitted that we'd never been a target of their
investigation.  We have a lawsuit pending against the officials and agencies
responsible.

"But since the day of the raid, gamers have been asking us, 'When are you going
to make a game about it?'  Okay.  We give up.  Here it is.  Have fun."

-----

Weeeell...everybody naturally wants to look as good as they can, right?  For
the real lowdown on the whole situation, a scan through some old CUDs would be
in order, where you could find a copy of the warrant which authorized this
raid.  I can tell you that Loyd Blankenship is the author of SJG's _GURPS
Cyberpunk_, so draw your own conclusions.

Hacker is played with cards.  This does NOT, in my view, make it a card game,
though it is advertised that way.  It's pretty similar to Illuminati, requiring
a lot of diplomacy, but it has a totally different flavor.

The goal here is to become the mondo superhacker king of the net by getting
access on twelve systems.  You build the net as you go along, upgrading your
system, hacking systems, and looking for ways to screw your fellow hackers so
they can't be king of the net before you can get around to it.  While the
hacking aspect is necessarily resolved by a dice roll, the other aspects of
this game ring true.  They distinguish between regular and root access on
systems, have specific OSes, specific net types, NetHubs, secret indials, back
doors, and, of course, the feds, which range from local police to combined
raids from the FBI and other government authorities.

This is a good game all on its own.  It's fun, it has a fair amount of
strategy, lots of dirty dealing, and a touch of luck to spice things up.  And
if things get too hairy and blood is about to flow, they inevitably cool down
when someone uses a special card.  Quite a few of these are funny as hell.
Some examples:

Trashing:  Somebody threw away an old backup disk.  Bad idea.  You can leave
           them e-mail about it...from their own account.

Get A Life:  A new computer game ate your brain.  100 hours later, you beat it,
             and you're ready to get back to hacking, but you get only one hack
             this turn.  There is another one of these about meeting a member
             of the opposite sex and briefly entertaining the notion that there
             is more to life than hacking.

Original Manuals:  The official system manuals explain many possible security
                   holes.  This is good.  Some system administrators ignore
                   them.  This is bad.  They usually get away with it because
                   most people don't have the manuals.  This is good.  But
                   YOU have a set of manuals.  This is very interesting.

Social Engineering:  "This is Joe Jones.  My password didn't work.  Can you
                     reset it to JOE for me?"  There is another one of these
                     that says something about being the phone company checking
                     the modem line, what's your root password please.

And my favorite, a card designed to be played to save yourself from a raid:

Dummy Equipment:  The investigators took your TV and your old Banana II, but
                  they overlooked the real stuff!  No evidence, no bust -- and
                  you keep your system.

As you can see, this game goes pretty far toward catching the flavor of the
real scene, though some of it is necessarily stereotypical.  Well, enough
praise.  Here are a couple of gripes.

The game is LONG.  A really nasty group of players can keep this going for
hours.  That isn't necessarily a bad thing, but be forewarned.  A few
modifications to shorten it up are offered, but the short game is a little like
masturbating.  Just not as good as the real thing.

There was too much work to get the game ready to play.  I've gotten used to
some amount of setting up SJGs, and believe me, I would not have bought more
unless they were good, and they always are, but the setup has not usually been
such a pain.  HACKER has a lot of pieces, and a lot of them come on a single
page, requiring you to hack them out with scissors and hope you don't do
something retarded like cut the wrong thing off.  Once I got done with this,
everything was cool, but this was a real pain.

So, overall, what do I think?  Four stars.  If you play games, or if you're
just massively hip to anything about hacking, get this game.  You're gonna need
at least three players, preferably four or five (up to six can play), so if
you only know one person, don't bother unless you have some hope of getting
someone else to game with you.

And when Dr. Death or the K-Rad Kodez Kid calls you up and wonders where you've
been lately, just tell him you're busy dodging feds, covering your tracks, and
hacking for root in every system you find in your quest to call yourself king
of the net, and if he doesn't support you...well, you know what to do with
posers who refuse to believe you're God, don't you?

Muahahahahahahaahaha!
_______________________________________________________________________________

 CPSR Listserv
 ~~~~~~~~~~~~~
Computer Professionals for Social Responsibility (CPSR) has set up a list
server to (1) archive CPSR-related materials and make them available on
request, and (2) disseminate relatively official, short, CPSR-related
announcements (e.g., press releases, conference announcements, and project
updates).  It is accessible via Internet and Bitnet e-mail.  Mail traffic will
be light; the list is set up so that only the CPSR Board and staff can post to
it.  Because it is self-subscribing, it easily makes material available to a
wide audience.

We encourage you to subscribe to the list server and publicize it widely,
to anyone interested in CPSR's areas of work.

To subscribe, send mail to:

        listserv@gwuvm.gwu.edu (Internet) OR
        listserv@gwuvm (Bitnet)

Your message needs to contain only one line:

        subscribe cpsr <your first name> <your last name>

You will get a message that confirms your subscription.  The message also
explains how to use the list server to request archived materials (including
an index of everything in CPSR's archive), and how to request more information
about the list server.

Please continue to send any CPSR queries to cpsr@csli.stanford.edu.

If you have a problem with the list server, please contact the administrator,
Paul Hyland (phyland@gwuvm.gwu.edu or phyland@gwuvm).

We hope you enjoy this new service.
_______________________________________________________________________________

 TRW Allows Inspection
 ~~~~~~~~~~~~~~~~~~~~~
According to USA Today, as of April 30, you can get a free copy of your TRW
credit report once a year by writing to:

TRW Consumer Assistance
P.O. Box 2350
Chatsworth, CA  91313-2350

Include all of the following in your letter:

- Full name including middle initial and generation such as Jr, Sr, III etc.
- Current address and ZIP code.
- All previous addresses and ZIPs for past five years.
- Social Security number.
- Year of birth.
- Spouse's first name.

- A photocopy of a billing statement, utility bill, driver's license or other
  document that links your name with the address where the report should be
  mailed.
_______________________________________________________________________________

 The POWER Computer Lives!
 ~~~~~~~~~~~~~~~~~~~~~~~~~
Do the words of the prophet Abraham Epstein ring true?  (Remember him from his
correspondence in Phrack 36 Loopback?)

If you don't believe that The IBM/TV Power Computer and is attempting to take
over the world then read the following and judge for yourself.

o  IBM is the worlds largest corporation.

o  IBM has more in assets than most small countries.

o  In 1991 IBM and it's arch enemy, Apple Computer, have joined forces to build
   the POWER computer.

o  The POWER computer will replace all existing Macintosh, PS/2, and 
   RS/6000 machines.

o  The POWER architecture will be licenced to third-party companies in order
   that they may build their own POWER computers.

o  With both Apple Computer (QuickTime) and IBM (Ultimedia) advancing their
   work on Multimedia, it can only mean that the POWER computer will speak
   through TV.

- - - - - - - - -

Here are some quotes from Harley Hahn of IBM's Advanced Workstation Division:

     "PowerOpen is a computing architecture based on AIX and the POWER
     Architecture.  To that we've added the PowerPC architecture [a low-
     end implementation if POWER ] and the Macintosh interface and
     applications."

     "Our goal is to create the major RISC computing industry standard
     based on the PowerPC architecture and the PowerOpen environment."

     "Eventually all our workstations will use POWER"

- - - - - - - - -

Here's a quote from Doug McLean of Apple Computer:

     "It is our intention to replace the 68000 in our entire line of
     Macintosh computers with PowerPC chips."

- - - - - - - - -

The PROPHECY IS COMING TRUE.  We have no time to lose.  Unless we act quickly
the world will come to an abrupt end as the POWER COMPUTER passes wind on all
of us.

Abraham Epstein [Big Daddy Plastic Recycling Corporation]
                [Plastic Operations With Energy Resources (POWER)]
_______________________________________________________________________________

 Major Virus Alert
 ~~~~~~~~~~~~~~~~~
George Bush Virus       - Doesn't do anything, but you can't get rid of it
                          until November.
Ted Kennedy Virus       - Crashes your computer, but denies it ever happened.
Warren Commission Virus - Won't allow you to open your files for 75 years
Jerry Brown Virus       - Blanks your screen and begins flashing an 800 number.
David Duke Virus        - Makes your screen go completely white.
Congress Virus          - Overdraws your disk space.
Paul Tsongas Virus      - Pops up on Dec. 25 and says "I'm Not Santa Claus."
Pat Buchanan Virus      - Shifts all output to the extreme right of the screen.
Dan Quayle Virus        - Forces your computer to play "PGA TOUR" from 10am to
                          4pm, 6 days a week
Bill Clinton Virus      - This virus mutates from region to region.  We're not
                          exactly sure what it does.
Richard Nixon Virus     - Also know as the "Tricky Dick Virus."  You can wipe
                          it out, but it always makes a comeback.
H. Ross Perot Virus     - Same as the Jerry Brown virus, only nicer fonts are
                          used, and it appears to have had a lot more money put
                          into its development.
_______________________________________________________________________________

 AUDIO LINKS
 ~~~~~~~~~~~
 By Mr. Upsetter

It all started with my Macintosh...

Some time ago I had this crazy idea of connecting the output from the audio
jack of my Macintosh to the phone line.  Since the Macintosh has built in sound
generation hardware, I could synthesize any number of useful sounds and play
them over the phone.  For instance, with a sound editing program like
SoundEdit, it is easy to synthesize call progress tones, DTMF and MF tones, red
box, green box, and other signalling tones.  So I set out to do exactly this.
I created a set of synthesized sounds as sound resources using SoundEdit.  Then
I wrote a HyperCard stack for the purpose of playing these sounds.  Now all I
needed was a circuit to match the audio signal from the headphone jack of my
Mac to the phone line.


 How The Circuit Works
 ~~~~~~~~~~~~~~~~~~~~~
I designed a simple passive circuit that does the job quite well.  Here is the
schematic diagram.

            +------+                       T1      +------+
      o-----|  R1  |-----o------o--------(| |)-----|  C1  |-----o-----o
            +------+    +|     -|        (| |)     +------+     |
                       +---+  +---+      (| |)                +---+
    to Mac             | D |  | D |   8  (| |) 500            |VR |   to
   headphone           | 1 |  | 2 |  ohm (| |) ohm            | 1 |  phone
     jack              +---+  +---+      (| |)                +---+  line
                        -|     +|        (| |)                  |
      o------------------o------o--------(| |)------------------o-----o

C1-.22 uF, 200V
D1,D2- 1N4148 switching diode
R1-620 ohm, 1/4W
T1- 8 ohm to 500 ohm audio transformer, Mouser part 42TL001
VR1-300V MOV, Mouser part 570-V300LA4

VR1 is a 300V surge protector to guard against transient high voltages.
Capacitor C1 couples the phone line to transformer T1, blocking the phone
line's DC voltage but allowing the AC audio signal to pass.  The transformer
matches the impedance of the phone line to the impedance of the headphone jack.
Diodes D1 and D2 provide clipping for additional ringing voltage protection
(note their polarity markings in the schematic).  They will clip any signal
above 7 volts.  Resistor R1 drops the volume of the audio signal from the Mac
to a reasonable level.  The end result is a circuit that isolates the Mac from
dangerous phone line voltages and provides a good quality audio link to the
phone line.


 Building and Using the Circut
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This simple circuit is easy to build (if you're handy with electronics).  I
personally prefer to solder the circuit together.  A length of shielded audio
cable with a 1/8 inch mono plug on one end should be connected to the audio 
input end of the circuit.  A standard RJ11 phone jack should be connected to
the phone line end of the circuit.   Although this circuit will protect against
dangerous phone line voltages, it is best to disconnect it when not in use.
You just don't want to risk anything bad happening to your brand new Quadra
900, right?

Once you have an audio link between your Mac and the phone line, the
applications are limitless.  Use HyperCard's built-in DTMF dialing to dial for
you, or build a memory dialer stack.  Talk to people with Macintalk.  Play your
favorite Ren and Stimpy sounds for your friends.  Play a ringback tone to
"transfer" people to an "extension".  Build and use a set of synthesized MF
tones.  Try to trick COCOT's with synthesized busy and reorder signals.


 But Wait, There Is More...
 ~~~~~~~~~~~~~~~~~~~~~~~~~~
So you say you don't own a Macintosh?  That is ok, because the circuit can be
used with other devices besides your Mac.  You can use it with the 8 ohm
headphone output from tape recorders, radios, scanners, etc.  You could also
probably use it with any other computer as long as you had the proper audio D/A
hardware and software to create sounds.

All parts are available from Mouser Electronics.  Call 800-346-6873 for a free
catalog.
_______________________________________________________________________________

 Thank You Disk Jockey!
 ~~~~~~~~~~~~~~~~~~~~~~
Date: May 22, 1992
From: Sarlo
To: Phrack
Subject: The Disk Jockey

I was searching through some Phracks (issues 30-38), just checking them out and
noticed something.  It's small and insignificant, I guess, but important to me
all the same.

I noticed in Disk Jockey's Prophile (Phrack 34, File 3) that he "Never got any
thanks for keeping his mouth shut."..I dunno how to get ahold of him or
anything, but if you drop a line to him sometime, tell him I said "thanks."

-Sarlo
_______________________________________________________________________________

 An Upset Reader Responds To Knight Lightning and Phrack
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Mon, 20 Apr 92 16:57 GMT
From: "Thomas J. Klotzbach" <0003751365@mcimail.com>
To: Knight Lightning <kl@stormking.com>
Subject: In response to your comments of Phrack Vol 4, Issue 37, File 2 of 14

    Hi,

    I have a lot of respect for Phrack and all the work they are doing to
promote an understanding of the Computer Underground.  But your comments in the
latest issue of Phrack are what I would like to comment on.

    You say:

        "In short -- I speak on behalf of the modem community in general,
        'FUCK OFF GEEK!'  Crawl back under the rock from whence you came
         and go straight to hell!"

     First, you don't speak for me and about five other people at this college.
I have maintained throughout that the ONLY way to further the efforts of the
Computer Underground is to destroy them with logic - not with creton-like
comments.  Yes, you are entitled to your say - but why not take this Dale Drew
person and destroy him with logic?  The minute that you descend to the level
Dale Drew operates from makes you look just as ridiculous as him.

     In my opinion, you came off very poorly in the exchange with Dale Drew.

Thomas J. Klotzbach                             MCI Mail: 375-1365
Genesee Community College                       Internet: 3751365@mcimail.com
Batavia, NY 14020                               Work: (716) 343-0055 x358

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Dear Mr. Klotzbach,

>From all of us at Phrack, this is our reply to your recent email...

****************************************************************<h1>Error</h1>
Unable to load requested item for reason: -201
