From: firstname.lastname@example.org (The Marauder)
Subject: Re: I HAVE A QUESTION. IS FBI.COM A FED PLACE
Date: 25 Jul 1995 20:42:46 -0400
Organization: LoD Communications, Inc.
X-Newsreader: TIN [UNIX 1.3 950515BETA PL0]
Phil Oldham (email@example.com) wrote:
> I received a message tellin that i was being investigated.
> in the header there was something about netcom.com
> can some one help me?
Your only hope in de-railing the investigation is to unplug your computer
and throw away your modem.
best of luck
Marauder, The ||"Maybe going camping might provide a badly
LoD Communications, Inc. || needed dose of perspective? The radiation
firstname.lastname@example.org || from your computer setup is affecting your mind"
___________________________|| [Circa 1994 - Universe aka ANI-Failure]
From: sean warren
Subject: Re:hacking in to computer on inter-net
Date: 18 Aug 1995 10:36:43 GMT
Organization: dolphin fans of hawaii
Content-Type: text/plain; charset=us-ascii
X-Mailer: Mozilla 1.1N (Macintosh; I; 68K)
to people out there if you know how to hack in to a persons computer
while there on the inter-net. if you do could you please e-mail me. at
From: NNeel@ionet.net (The Steel Lynx)
Subject: Re: COULD SOMEBOD Y SHOW ME HOW TO HACK???
Date: Sun, 20 Aug 95 05:13:44 GMT
X-Newsreader: News Xpress Version 1.0 Beta #3
>If you don't know how to phreak you'll get busted anyway.. So go turn
>yuorself (sic) in lame ass!
One thing about phreaking: for most of us (I think), it's usually the stage
of our development prior to hacking. We need to learn about phone systems so
we know exactly how we can be traced, tapped, etc. We need to learn about
them to get around things like that. One thing I must say at this point:
Mark Abene (AKA Phiber Optik) was/is one of the nation's foremost experts on
the telephone system (he knows more than the telco due to his study of the
*entire* phone system rather than a bit of it), yet it didn't help much. He
was raided at least twice by the Secret Service and got a 1 year jail
sentence. Just a note here, because I thought you might find it informative.
Phreaking is neccessary, but it is not the ultimate solution.
THE STEEL LYNX
"I have taken all knowledge to be my province."
-Francis Bacon, 1592
Yes, I used to be called the Neon Samurai, but due to recent developments
I have changed my handle to Steel Lynx. Please take note of it.
From: email@example.com (Mitch Stein)
Subject: Re: Information is Power
Date: Sun, 20 Aug 1995 00:00:11 GMT
Organization: Garage Action BBS(610) 832 0925
-> From: firstname.lastname@example.org (BCSD4805)
-> Subject: Information is Power
-> How much is a list of all the O.J. Jurors worth? w/addresses and
-> hotel phone numbers?
a punch in the face asshole...
From: email@example.com (Ron)
Subject: please help me - I am trying to defeat some pests at their own game
Date: 20 Aug 1995 00:54:54 GMT
References: <1995Aug9.firstname.lastname@example.org> <email@example.com> <1995Aug16.firstname.lastname@example.org> <email@example.com>
X-Newsreader: WinVN 0.99.5
Xref: lod.com alt.2600:69087 alt.cyberpunk:630
ok, a while back, a guy really got really PO'd when I retaliated against his
brutal attack of my character. now he's been constantly flooding IRC whenever
I'm there and he's been trying to get into my computer. and some other people
who I've PO'd (on purpose) have been trying to get in, too. I feel like I've
been violated and I will not tolerate this anymore. I want to fight back
against those mother-fuckers at their own game. So I will resort to hacking
(a dangerous activity and totally against every moral fiber in my body) to
stop them from harming my precious baby.
I would like to know EXACTLY and HONESTLY what a person can do to my computer
while I am connected via PPP.
Is it possible to run a firewall on my PC that runs with trumpet winsock to
prevent EVERYBODY from getting here?
Also, I saw 'The Net' (cool movie) and was wondering if there was a Windows
utility that can scan an IP address for ALL users currently connected? This
would definitely help me to find out where all of these assholes are (as well
as giving me an email address that I can send to the postmaster of the domain
and have them removed and maybe even prosecuted). Also, it would help when
I'm trying to call up people with vidcall, iphone, and cu-seeme.
Please help and I shall return the favor tenfold.
Subject: Hacker And Growing...
Date: 20 Aug 1995 05:17:00 GMT
Organization: InterServ News Service
X-Newsreader: AIR News 3.X (SPRY, Inc.)
Hey if anyone has any good reference books they could recommend or any
online text files, on becoming a hacker or learning how to hack, i would
appreciate it if they could help me out. I'm trying to learn about
hacking and how to do it, so please if you can help me out, thanks.
Subject: Re:I am trying to defeat some pests at their own game//TRY THIS!
Date: Mon, 21 Aug 95 14:21:16 GMT
References: <1995Aug9.firstname.lastname@example.org> <email@example.com> <1995Aug16.firstname.lastname@example.org> <email@example.com> <firstname.lastname@example.org> <email@example.com>
X-Newsreader: News Xpress Version 1.0 Beta #4
Xref: lod.com alt.2600:69519 alt.cyberpunk:640
In article <firstname.lastname@example.org>,
email@example.com (Sourcerer) wrote:
%]In article <firstname.lastname@example.org>,
%] email@example.com (Ron) wrote:
%]>ok, a while back, a guy really got really PO'd when I retaliated against
%]>brutal attack of my character. now he's been constantly flooding IRC
An effective modem weapon, especially on crossbar phone systems. (Will
still operate on ESS but you will kill phone service to your prefix for a
few hours, and everyone talking will be cut off on your prefix and the one
What is this device?
It's a Tesla Coil! Concentrated static electricity. The Tesla coil when
properly used will generate litrally thousands of volts at very low
amperage. (Just the right current to bake silicon chip cookies!)
1. Disconnect all phones from your line. Disconnect answering devices and
any data-transmission devices.
2. Run a preliminary test on the coil and disconnect nearby grounded
objects. (Lamps, stereos, TV's, etc...)
3. Connect one phone that you see fit to subject. (It usually does not
destroy phones, but I have seen them melt off walls.)
4. Connect iron or steel balls to the green and red wires of your
connected phone (these are the line wires that go into the wall.) It
and 12 terminals of your phone.
5. Put on a pair of thick rubber gloves (EXTREMELY IMPORTANT!)
6. Charge coil to at least 10,000 volts. An ideal setting is around 18 to
19 thousand, but 10 will jump Ma-Bells line surge protectors.
7. Hold metal balls in your left hand. (Make sure they don't touch each
other) When the coil is fully charged, clip the steel ball connected to
the red wire to the base of the Tesla coil and hold the other metal
ball as far away from the coil as you can.
8. Dial the offending modems number.
9. When connected, move the metal object connected to the green wire
within 2 feet of the coils top. (Note: Don't be afraid of the little
bolts of electricity shooting from the top of the coil...)
10. Within 3 seconds a huge bolt of lightning will shoot forth at the phone
from the hand you are holding the balls in. (Hold on tight cause it'll
feel like loads of ants!) You will immediatly hear many strange
occilations to the carrier on the phone. The last noise you will hear
from the phone is a pop! (That is the last cry of agony as it shuts
Crossbar just disconnects.
Guaranteed to fry the modem, the computer and any peripherals.
[ -=Jesus Saves!..Rebounds to Moses... HE SCORRRRRES!!!...Holy Cow!=- ]
[ -=It's a sick world; I'm a happy girl!=- ]
[ -=Bill Of Rights...Void Where Prohibited By Law!=- ]
From: firstname.lastname@example.org (The Sicilian Civilian)
Subject: Probbaly a stupid question, possibly interesting..
Date: 22 Aug 1995 02:31:55 -0400
Organization: Rutgers University
Sorry for the typo in the subject line... anyway here it goes..
Let's say that I ACCIDENTALLY (I'm not that stupid to do it on purpose) type
my password instead of my login name at the UNIX login prompt so that it is
echoed to the screen.. who would be able to view it other than sysadmin.. and
anyone who is lucky enough to be looking over my shoulder? WOuld it be echoed to a system console or something? Is there a way to monitor all that from within the system? BTW, I am doing this over a dial up line.
Date: 23 Aug 1995 18:02:52 PST
Subject: seeking hacker to write column
Publisher of newsletter seeking person with expert knowledge of hacking
and other electronic security breaching techniques. Must possess
writing ability and be willing to present honest and reliable
information. All material can be presented on an anonymous basis,
payment can still be arranged for all work published. Will also be
responsible for reviewing other material on same subject by other
writers/hackers. If interested reply with sample of work to ScamNews,
853 Vanderbilt Beach Road, Suite #212Ha, Naples, FL 33963. Must supply
a return address.
On 30 Mar 1995, Robert W wrote:
> Is there a way to red box from a normal phone? Like going through a LD
> service or something. Thanks...
You have to use the black box decoder. From your own line,
everything is recorded on a telco computer. If you want to make free
calls from home, then you have to break the telco link to your phone, and
for that you need a telco black box decoder to send the proper key sequenes.