|
D E L P H I H A C K I N G F I L E V1.0 This is a file written for those of us who would like free online service accounts, Internet access, and other services by using fraudulent accounts or other illegal means of attaining them. This file simply tells you the basics on doing this to the online service DELPHI. With DELPHI, you get immediate access with valid information and once you're on the system there's a variety of things you can do to get the maximum use out of your account(s). That's what is in this file, plain and simple. I focus mostly on the Conference Area, DELPHI's version of chat-rooms. Enjoy! This file was written by Jim Morrison in December 1995. Feel free to distribute. NOTE that this file is for people who are not accessing DELPHI through the Beta Software. CONTENTS 1 - Accounts 1.1 - Getting ready to set up a fraudulent account 1.2 - Setting up fraudulent accounts 1.3 - Access methods 2 - Mail 2.1 - Mailbombing 2.2 - Set forward command 2.3 - Fake forwards 2.4 - Fakemail and port 25 2.5 - Fakemail bombs 2.6 - Getting people kicked off 2.7 - Phishing 3 - Conference 3.1 - Keysubs and macros 3.2 - Intercepting pages 3.3 - Text manipulation 3.4 - Fake sends 3.5 - Annoyance features 3.6 - Scramble and free areas 3.7 - Shutting down Conference 3.8 - Special areas 4 - Miscellaneous 4.1 - Multiple telnets 4.2 - Setting up new accounts 4.3 - Forums 5 - People 5.1 - Employees 5.2 - Hackers 5.3 - Special thanks 1 - ACCOUNTS Accounts are practically the only way to get on the system. If you aren't planning on paying, and don't already have an account, then I suggest creating a fraudulent one, unless you're a really good guesser of other people's passwords :) 1.1 Getting ready to set up a fraudulent account If you call directly from your modem line to the toll-free number, you're going to get caught. If you use any of your own information during signup, you're probably going to get caught. Just use common sense. You can either set them up by AT&T or by a dialout (see below). The old method of telnetting to delphi.com to set up an account no longer works. I suggest using the Internet for now, because I'm still not totally sure you can't get traced through AT&T. You'll need the information that you're going to use for the account ahead of time. If this is your first time, use a local name and address. The name or address doesn't have to be real, just have a valid city, state, zip, and phone number. The person can live anywhere in the US or Canada, but I suggest just using US addresses for now. Also have a valid credit card number ready to use. Sometimes DELPHI alternates and won't take certain card types, but don't worry about it.. you don't always get an account set up on your first attempt. 1.2 Setting up fraudulent accounts There's two ways to call their toll-free signup numbers: 1) AT&T - Dial on one phone 1-800-CALL-ATT. Have a valid credit card ready. Choose option 1, then type in either 800-695-4002 or 800-365-4636 when they ask for the phone number you'd like to call. Then they'll have you type in your credit card number and expiration date. Have the computer on the same phone line and have your modem pick up by typing ATDT in your communications software the second after you type in your credit card number. Hang up the phone you dialed from.. your computer will connect you. 2) DIALOUT - Telnet to a dialout (modem.d.umn.edu, for example) and type ATZ (if it's working, it'll respond with "OK"). Then type ATDT918006954002 or ATDT918003654636 (note that most dialouts use PBX's so you have to dial a 9 before the toll-free number). After a few seconds, you're in. Once you get the word CONNECT after using either way to access the signup lines, wait a few seconds, then press RETURN. It'll prompt you for a temporary password. "FREE" will get you in every time, but you can also use passwords like CUSTOM5, CUSTOM7, LAWFORUM, DIXIE, KMA987, IP22, DG87, etc. It'll then ask for your full name, address, city, state, zip, and phone number. After that you get to choose a Username. Usernames can be 3-12 characters (spaces don't count). I've noticed that anything with the word PUSSY, FUCK, CUNT, BITCH, etc. no longer works, but you can still get away with ASS if you're looking to offend people ;) After choosing a name it'll ask for your billing method. Though it doesn't list AMEX (American Express) as a valid option, it's still there to choose from. Type in the card number and expiration date. Then you're prompted for your mother's maiden name (just make up some surname) and your temporary password. Then it processes. If you get an AGREE prompt, you're in. If it wants to find your local access number, disconnect and try again.. because they're not going to give you an account for some reason.. chances are it has to do with the credit card you gave them. At the AGREE prompt, they ask you to type AGREE in, but you can type something like AGREENOT!!, or AGRE, etc. and still take it, making it void if you ever were caught. Choose local access numbers accordingly. If you call a number other than the one you specify to them, it's going to look suspicious and if they find out, you're history. At the end of the signup procedure, they give you access instructions. Enjoy.. because now you have an account :) 1.3 Access methods You can either use the AT&T method of calling long distance access numbers (or you're own long distance since they can't really trace you from non-ANI numbers). I'd suggest using *67 as a dialing prefix before calling a local access number, however. You can have more than one person on an account, though it usually gets deleted faster when you do that or if you access from a different access number than you specified to them. Using real information with a stolen account helps the account last alot longer as well, compared to generated and extrapolated credit cards. 2 - MAIL E-Mail can be quite a powerful tool when you're online. All mail on DELPHI is sent through the BOS node, that's why you see BOS:: before a username when that person sends you mail. You can also send faxes and postal mail, but I wouldn't suggest saying anything personal, since DELPHI has been known to read certain user's mail. 2.1 Mailbombing The easiest way to send a mailbomb is to go into the conference area and program this string into a macro or keysub (see 3.1): /m USERNAME Message Replace USERNAME with the person you want to bomb/spam, and Message with whatever you'd like to tell them. Each time you do this, it sends one piece of mail to their E-Mail box. The Message line is the subject line of the message. You can mailbomb several people at once by typing commas in between usernames like this: /m ADAB,CHORH you're both fucking whores. Don't ever mailbomb from your account if it is a real account, because your username shows up on every message they get. Mailbombing will get you suspended from DELPHI, usually about 24 hours after the offense. 2.2 Set forward command If you are the victim of a mailbomb, there are a few interesting tools you can use to fight back. If the mailbomb is still taking place while you're in MAIL (You can enter MAIL in Conference by typing /MAIL), simply type SET FORWARD at the MAIL> prompt and type in the Username of the person bombing you (this will forward all your mail to his/her account, so when he/she tries to send you mail, they'll get it right back at them) or you can forward all your mail to SERVICE or ROOT or any other administrative account that you know of. This will get them suspended, but it's not suggested if you're doing it from your real account. Just set the forward back to them in that case and forward one mail to SERVICE telling them you've been mailbombed. NEVER mail SERVICE, even if you are reporting someone, from your fraudulent account however, because they will delete you AND the other person then. You can delete all your messages with ease by typing DEL /ALL at the MAIL> prompt. Don't forget to set your forward back to normal by typing SET NOFORWARD. If you want it to look like you're dead, account is deleted, etc. you can type ANY word in place of the username you want your mail forwarded to, so if you set it to DELETED or DEAD, when a person tries to mail you they get: No such user DELETED If you think your account is going to be deleted for real soon, you can set the forward to another one of your usernames (though DELPHI can see that you've set your forward and will probably look into all the names it might be set to) or an Internet address. Once again, don't set your forward to your own account or real Internet address from a fraudulent account. 2.3 Fake forwards If you want to forward a piece of false mail to some user that supposedly was sent to you by another user, there's a way. It can also be used to trick SERVICE into thinking somebody mailed you and left you a death threat, but it's not suggested from your real account nor from a fake one anymore. Here's the format for fake forwards. Actual number of spaces shown: From: BOS::USERNAME 1-DEC-1995 00:00:00.00 To: YOUR USERNAME CC: Subj: Test Test Message Here. Be sure to use a correct date format, your own username in the To: prompt, and use the right number of spaces, or it's going to look suspicious. To send one, just type SEND at the MAIL> prompt (not FORWARD, because it's not a real forward), type a subject line, and then type in the above format your forwarded message. Don't include anything else in the body of your message because it is not possible to add anything in, except for the subject line. 2.4 Fakemail and port 25 It is possible to send fake Internet mail (it will look like an Internet message, not a DELPHI message) to anyone FROM anyone on any system. To do this, find an Internet provider that lets you telnet to Port 25 of certain telnet addresses (DELPHI is not one of them). Then telnet to DELPHI.COM,25 or NAUTICOM.NET,25, etc. and you should get a message informing you of the that you have connected and that a certain language is spoken there. Just ignore this and type HELO delphi.com. At this point type MAIL FROM: and the username of the person you want the mail to be from. If you're not connected to Port 25 of DELPHI, then add a @delphi.com to the end of the username, otherwise the username will appear to have come from the system you're currently connected to. Then type RCPT TO: and the username of the person you want the fakemail to go to. While you could send from any name, even non-existant, you can only send to an actual username. Once again, if you're on any other mail port besides DELPHI.COM, then add a @delphi.com qualifier to the end of their username or the message will never make it to DELPHI. Once you get OK messages for both of the above, type DATA, press and it will tell you to go ahead and type your message below. Press RETURN once at this point so there's a space between the header files of the message and your fake message. Once you're done typing, end it with a "." (without the quotes) on a separate, blank line. Once it says that the message has been received for delivery, it simply means that that message has been sent. You can type as many messages as you want to any number of people. Once you are finished, type QUIT and it will close the connection. 2.5 Fakemail bombs You can send a person a fakemail bomb from another person by following the steps above but repeatedly sending the same message over and over again. I suggest doing this by macros. Keysubs don't work in any place other than the Conference Area. 2.6 Getting people kicked off If you don't like a particular user on the system, there's a variety of ways of getting him kicked off: 1) Manipulate what he says in the Conference Area in hopes that others will report him (see 3.3 and 3.4). 2) Send a fake forward to SERVICE allegedly from that user to you threatening your life or something. 3) Send fakemail from that user to any other user threatening their lives or anything else of an offensive nature. 4) Send fakemail from that user to SERVICE telling them you'd like to cancel your account. 5) Send a fakemail bomb from that user to any other user, including SERVICE. Despite what they say, ANYONE can send Internet E-Mail without having to register for Internet Services by typing the format IN%"address@goes.here.com" at the To: prompt. 6) Breaking onto a real account and reporting the user. If none of these methods work the first time, try another. Don't forget that many small complaints can add up to a big one get a user kicked off for good. 2.7 Phishing There are ways that you can scam users for their password with the help of fakemail and an extra Internet account (that's not registered under your name). It can involve sending email from SERVICE to a number of users telling them to change their password to an assigned password because of maintenance problems, etc., or tell them to mail their password to another Internet address because they won free time, a local server went down, etc. Be creative, but remember that you can't trick all the people all the time. Trust me, I haven't yet. 3 - CONFERENCE Conference is the life-line of DELPHI. It can either be used to learn about other people or torment them. The actual Conference program is called PBATCH, and operates in a hidden group 0 named " Private Node CO (sysops welcome)." Note that you cannot name a group name starting with a space, but this group is named in that fashion. In it resides several nodes operating under the PBATCH Program/ Username with nicknames like *WHO_BOS1A, etc. The group looks like this: 0) Private Node CO (Sysops welcome) *WHO_BOS1E, *WHO_BOS1A, *WHO_BOS1B, *WHO_BOS1C, *WHO_BOS1D, *WHO_BOS1F, *WHO_BOS1G While it is virtually impossible to get inside the group since it is private, if you were inside it what you'd see would be Login and Logoff messages being displayed by the several nodes, along with probably New Mail messages, etc. or anything else to do with specific nodes. If you would like more information on this, E-Mail PETER, who is the Conference programmer for DELPHI. We will deal with a few Conference tricks now in case you end up being the person tormented, or just want to go out for vengeance upon other users. 3.1 Keysubs and macros This is a brief summary of how you can use keysubs and macros in Conference. Please note that keysubs are part of DELPHI, and can only be used in Conference. Macros stay in your software and are there permanantly or until you remove them. The usage parameters for /KEYSUB is as follows: /KEYSUB $IDENTIFIER$COMMANDS/COMMENTS $ For example: /KEYSUB $$Fuck $ would echo Fuck everytime you press RETURN. /KEYSUB $,$Fuck $ would echo Fuck evertime you typed a "," and RETURN. To turn /KEYSUB off, type /NOKEYSUB. There will be more discussed on Keysubs later in 3.5 Macros will depend on your specific communications software, but they are generally more effective than Keysubs because everytime you press the key or key combination on your keyboard, it produces the same result, as programmed in by you. For example, if you programmed the word Fuck as F1, everytime you would press the F1 key, the word Fuck would appear. It will appear without pressing RETURN unless you add a ^M after it. ^I is a tab and ^G is a beep. Both of these will come in handy, as you will later see in this section. 3.2 Intercepting pages If a user has been paged but is no longer in the Conference Area, you can type /NAME and the name of the person getting paged. You can then answer that page by typing /ANSWER or /ACCEPT. I haven't tried this before, but I assume it works. 3.3 Text manipulation You can manipulate what someone says in a chat room or produce a fake message and get away with it IF the people you want to trick have their widths set at 80 and have /SHOWRN off. You can still try this if your width isn't at 80, even though it won't look normal on your computer, but to others who have their widths at 80 (the default width) there won't be a difference. The length of your Username/nickname and what you type DOES make a difference, but one proven method is to: 1) Change your nickname to a one-character name. 2) Type an 8 character string, such as "whatsup?" or "hmmmmmmm" 3) Tab 9 times or program ^I into a macro 9 times without pressing RETURN or using a ^M in the macro. 4) Type the person's name and what you want them to say. Remember to add in a period before their nickname and to capitalize their username if they aren't using a nickname. You can also type other messages (see below). Some other messages instead of manipulating what somebody says might be: New mail received on node BOS1C from BOS::USERNAME or Conference will be shutting down in 5 minutes. You may add a beep before your message by pressing CTRL-G and RETURN. In a macro, you'd type ^G, the message, and then ^M, so the macro would now look something like this: ^I^I^I^I^I^I^I^I^I^GNew mail received on node BOS1C from BOS::SERVICE^M Which would look something like this in the chat room if your nickname was "S" and you typed "Whastup?": .S> Whatsup? New mail received on node BOS1C from BOS::SERVICE If your not sure of how it's going to turn out, just go into a private group by yourself and start experimenting. It's all in the Tabs. 3.4 Fake sends You can also send fake /SENDS, one of two ways: 1) Simply use the method above, but substitute a CTRL-G and the SEND where you would normally type any other message. 2) Type the fake send when you are /SENDING that individual, that way only they will see it, as shown below. Type /SEND and their name, followed by an 8 character string, and then tab 18 times, press CTRL-G, type out the send, and tab an additional 10 times to add an extra space between the send and the chat room conversation. This way it will look like it's double-spaced, which is how DELPHI spaces each SEND you receive. A macro would look like this: ^I^I^I^I^I^I^I^I^I^I^I^I^I^I^I^I^I^I^GSERVICE>> Fuck you^I^I^I^I^I^I^I^I^I^I^M And would appear like this to the other individual: YOURUSERNAME>> Whatsup? SERVICE>> Fuck you You can always experiment by /SENDING yourself first. It may sound complicated at first, but it's a proven method of tricking people. 3.5 Annoyance features There are many ways to annoy people on DELPHI. A few are: 1) CTRL-G to cause beeps 2) Mailbombs/Spamming 3) Text manipulation 4) Fake sends 5) Fake signing off by typing "- signed off -" 6) Entering a chat room that has two people in it, fake sign off, then sit there quietly and listen in on their conversation, and start fake sending them from EACH OTHER just to piss them off and watch the confusion set in. 7) Fake forwards 8) Fakemail and fakemail bombs 9) Changing your nickname to look similar to their Username. If they have an I in their name, replace it with a lowercase L in yours, or vice versa. 10) Mass Paging (can be used with both keysubs and macros) 11) Mass Sending (can be used with both keysubs and macros) 12) Paging every user on the system at once, causing an intolerable Idle list for many users, since it scrolls several pages down the screen 12) /Sending them while squelching them (with the /SQUELCH command) so they can't reply. I'm sure there are hundreds of others out there as well.. these are the only that come to mind right now. Forgive me if I left something out :) Here are some examples of how you would use keysubs to perpetrate the above instances: /KEYSUB $$/P USERNAME $ - To page a user each time you press RETURN. /KEYSUB $$/S or /Z USERNAME Message $ - Can be used for mass sending/zending. /KEYSUB $$/M USERNAME Message - For mailbombing /KEYSUB $$/S USERNAME ^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G^G$ - Will sometimes effectivly log them off if done in excess as long as they have beeps turned on and the /BUSY flag isn't set. 3.6 Scramble and free areas To win at Scramble Word Games more often on DELPHI, you may want to create a word list in your DOS Edit program and upload it everytime you're playing a Scramble Game. This will allow you to scroll words down screen and attain higher scores. Through this technique, I am the second highest scorer in Scramble history with 2677 as a score under the username LAMENT. In a few instances GAMEs may disappear from the Conference area. If this occurs, simply nickname yourself GAME and create a group called Scramble Word Game, so once they come back they will be forced to create a different group name since the traditional one, Scramble Word Game, is already in use. The pleasure in doing this is minimum, however, as sometimes you may have to wait hours for the GAMEs to be reset. However, it can be fun if somebody enters the group and thinks you really are GAME. There are also Scramble Games in the Free Area under the Using DELPHI menu. Type GO USING NEW CON at the Main Menu to access it. Note that it's only open on certain evenings. 3.7 Shutting down Conference It has been done before, though not by me. It's not too hard to do, either. Just open multiple telnet sessions (see 4.1), upload a large text file and /SEND it to yourself by using the keysubs, then squelch yourself right in the middle of it. It will cause an overflow of data, forcing Conference to shut down temporarily. If you want to hear from the expert on this get in touch with me. 3.8 Special areas As noted in the Introduction to this section there is a group 0 and other nodes located in Conference, but only hidden. Sometimes, with the help of system glitches and what not, you are thrown into these areas (while not actually inside group 0) and see weird occurences. These have mainly become a thing of the past but if you are ever thrown into these areas this is what you may experience: - All the GAMEs have disappeared - There are a considerably less number of users in Conference than there was a second ago - When you list the Available list, you see Employee accounts and sub-programs like NI-CONFAGENT which aren't even usernames. - Group 0 with DELPHI's nodes operating under the username PBATCH (a program much like NI-CONFAGENT) - JOINDELPHIs (People signing up for an account in North America) and GODELPHIs (People signing up for an account under UKDELPHI) in the Available List - Unable to /SEND or /ZEND certain people that are on the system. - SERVICE logged on occasionally in the Avaiable List A neat trick is to /ZEND all the JOINDELPHIs and GODELPHIs telling them that they're being traced and to log off immediately, or that DELPHI is nothing but a shit service (very true) and that it just ain't worth their time to sign up. You'll see that over half of them log off by the next time you /ZEND them :) Not much else to do here. You can /ZEND SERVICE, etc., but that's not always wise. To get back into regular conference, simply exit and then come back. You are usually thrown into areas though glitches that you don't even notice until you see half the people in Conference are no longer there. 4 - MISCELLANEOUS In this section are just some miscellaneous notes that couldn't really be fitted in elsewhere. These includes multiple telnet sessions, setting up more accounts from one that already exists, and an introduction to forums and Moderator commands. 4.1 Multiple telnets If you are telnetting to DELPHI on a provider that allows multiple telnet sessions to be opened up at one time, then you can enter DELPHI several times on the same or different accounts, which comes in handy for things like shutting down Conference (see 3.6) or just for annoyance purposes. You may also telnet into DELPHI from your own account on DELPHI by going to the Internet SIG, registering for Internet use, then typing DELPHI.COM in where you want to telnet to. You will only be able to control the last session you telnetted from, and will either have to hang up (not recommended) or individually sign off each account to get back to your main connection. This is troublesome to DELPHI because it causes system lag and can ultimately lead to many unfortunate mishaps :) 4.2 Setting up new accounts You can telnet to a dialout once on your fraudulent account (not suggested if you own a real account) and set up additional accounts without having to even leave the system. If they are watching the account you telnet from to set up the new accounts, however, they will know about all the accounts you set up and any other activity on your account. 4.3 Forums Many Custom Forums exist throughout DELPHI with a wide range of topics that many members may be interested in. Each of these forums have Conference areas specifically designated for that area. The areas are similar to the Main Conference Area. You can check to see a user's real name or when a particular user was last on by typing this format: /ENTRY USERNAME Also, there are many secret commands used by Moderators, Hosts, etc. in these smaller Conference areas: /XMOD Turns the group into a moderated group or switches /NOXMOD it back to normal. Only works for people with W, A, or C flags. W and A flags can transfer the moderator status to another user by typing /XMOD name. Moderator is given usage of all group functions regardless of who started the group. /XPUB Publishes the groupname in DELPHI MAIN. Use /NOXPUB sparingly, when there is a good reason to make the presence of your CO known to people outside the SIGs. /XSPON sched Cause billing to be shut off for people who are /NOXSPON in the conference group. Requires approval by DELPHI for a specific date, time, and duration. /XGLISTEN Make the group an Audience group. Anyone joining /NOXGLI the group from that point on will be in listen-only mode and will not be able to say anything to the rest of the group unless the moderator recognizes him with a /NXL. /GN shows who is talking in an Audience group. Anyone who is listen-only and who tries to talk will be instructed to use the /QUEUE command. /XLISTEN name Keep a person from talking in a group, whether it /NOXL name is an Audience group or not. /NOXLISTEN allows a person to talk. The person whose name you use in these commands gets told that he is "on stage" or "listening in the audience" when the commands are issued. /NXL (This is the same as /NOXLISTEN). This is used by the moderator to recognize a speaker. It starts the queued message. After the message is done, you can use /XL to put the speaker back in the audience, but you don't have to (i.e., a guest can queue a message and remain in talk mode after). 5 - PEOPLE In this section I included some information about several employees, so-called hackers, and finally my special thanks. 5.1 Employees Some employees include: DRSAX - Laurence Sax? Security employee HAUNTEDHOUSE/CRYAN - Chris Ryan, Security employee ICEBLINK - Security employee? SECURITY - The main security account, operated by a number of individuals SERVICE - Operated by Richard Learoyd (DELPHI Online Support Specialist), Tim Wingo (usually security matters), and Kevin Plankey (Domestic affairs) RICHARD - Richard Learoyd KEVIN/HACKTRACK - Kevin Michael Plankey, Member Servies Manager CHAIKIN - John Chaikin, old Head of Security CARYW - Cary Watson, Security employee JSRIBERG/PHISH - Jonathon Sriberg SOCRATES - Hosts the New Member Conferences in the free area. ASKDELPHI - Information about DELPHI, operated by a number of individuals CHARLEEN - Charleen, sometimes operates the SERVICE account in place of Richard Learoyd KIP/GAME - Kip, operates GAMEs and uses his account to operate certain Games. RMESARD/GROOVASAURUS/RONM - Ron Mesard, DELPHI employee MZANGER - Mark Zanger, DELPHI Senior Editor Other alleged employees include: NFISH, ANDERSON1160, LUEDTKE, KHAMADA, PIEDMONT, SKLEIN, BTREMP, GOOMP, WAYNE46, CHETAY, SHEREE, CLYDEFLOWERS, EBRESNER, LEIGHANN, SUGLIO, JBUCHER, OSBAN, TBROOKS22, WHITEW, CMUISE, COATES132, DECARR, AMYC, BADUBLINSKE, RLPARSONS, ELI27, DGMANNEL, JKCRAUN, DGEN, OWENTIME, DANIELCROSBY, DAVIDNASON, CASE, DEAN144, RWBROOKS, JERRYAUTHOR, SS_RAT, CCORN, LPRIBANIC, JHTAY, ABLEE, VIPERDOG, BENJMN, MOHATMA, MAZMAN, PJORSTAD, RSALIK, CHUCKT, IANJ, KFRERKER, MAZOUE, KIRKPATRICK, SKYCLAD, DARREN42, KATHYCOBB, MADBRO, FRANKS, DBOX, CRUISE, RGERBER, JHERBST, WCIESLA, GARY1324, FREDL, SHAWN89, NAZIMEK34, MICHAELP, STESMI, MAVRACHANG, RODBER, NILSON, MSTEEVES, KINGUANA, PEAPI, JAMIE_K, CAROLAK, LISA, YAKFNORD, NI-CONFAGENT, DTEN, JULIE, ECAREY, RGS, MARK2122, JPOLITO, DARREN, TJMARTINEZ, DAVECLEMENTS, RANDYALLMAN, RCJOHNSON, JOHNPROBERTS, 4990TCW, HANKEL, BRUMIT, CRUISE, SHANNONLA, KRAFTWIZ, ROCKETMAN666, DENLEWIS, GARYREYNOLDS, DAVEW, LUCAS330, CH567, ARTSIMON, PHASSETT, JOEBRADY, HEIDI, SARAH, FRANK, JIM, RJOHNSON, and any other suspicious looking name would qualify. Usually on during regular business hours as well. 5.2 Hackers Many "hackers" frequent DELPHI. I use the term hackers loosely due to the fact that "hacking" DELPHI isn't as much work as hacking into bank accounts or the Pentagon. But, since it's still hacking in my book, and most everyone else's, I'll use that term for people who use fraudulent accounts or phish passwords/credit cards off other people. I won't give any usernames or aliases of such people but most anyone who "hacks" into DELPHI by way of fraudulent accounts would qualify as such. 5.3 Special thanks Special thanks to all those that helped me along my way here, and taught me the ways of DELPHI. Many have left, but there are a few that stand out in my mind right now: Blah, Adam, Tisdal, Henley52, Neil, PiL. And to all my helping hands: Eddie, June, Anj, sillygirly, Michele, and anyone else I may have failed to mention in this version. THE END