Академический Документы
Профессиональный Документы
Культура Документы
SOUTHERN DIVISION
Docket No. 598
I
MOL
IN ne LONG OISTANeE
LI TIGATION All CAses
TELECOMMUNICATIONS
Han. AnnA Diggs TAylor
NOTICE OF CLASS ACTION ANO PROPOSEO SETTLEMENT TO CERTAIN CURRENT ANO
FORMER CUSTOMERS OF ALLNET COMMUNICATION SERVICES, INC.
Order 01 the United Statp.s District Court for Ihe Eastern District of Michigan, PLEASE TAKE NOTICE THAT:
Ry
A ClASS acllon lawsul' has been fUad on bah,,11 d. corlsln 'ormer find current customers aORlnst Allnet Communlcallon
Services, Inc., formerly known as Combined Network, Inc. The Court hAl preUmlna,lly approved. leltlement of this 'awsult.
YOU ARE URGED TO READ THIS NOTICE CAREFULLY BECAUSE . IT AFFEC T S YOUR RIGHTS AND Will BE BINDING
ON YOU IN THE FUTURE.
L NOTICE OF A PENOING CLASS ACTION
A. DNertp"_"" L •••un
Plalnllffs have
IUed Annet. alleging that Allnet charged cuslomeJS lor cer'aln unanswered letephana caU., holding
lime, busy signets. and Cfmtrllr oftlc8 recordings (collecltvftly "unanswered calls". without adequately dlsdoslng eueh charon
to lhelr customers the pubHc. Plalnt"'!!f'ek to pre5ent their
or clafms for charges fOf' unanswered caAs, wei
own ••
a! t
�II::::r::�t,: .z��:I��:�����yA:'';�lf�:�=�:":,r��,c:t�r;r� AHnet has charged Its eubscrlbers f.lrly
and properry and has dlsclo� tun)' and '."'y he basis for Its tong distance charges. AHnftt has agreed 10 seltle PI.'ntlff,· suR
sole'y to avotd the expen'J8, Inconvenlonce andI dlsrupUon of further litigation.
This Nollce Is nol an expression 01 any opinion by 'hit Courl or thf'J merits of this 11II 811on or or the Settlement A reemeni.
' S t , rn a rr s
hour!': �h�n:,:::�, �� 6'':�����:B:,,::n�:a�:' g. ��tc��=':"�:'::'�:'�t� ':tr,,=-=!,. � /1 ;:. t���m: Boutevard.
Detroit. Michigan 48226.
•. The S.ttlement CI....
Plalntlfts and Alinel have entered Into a S�ttlement Agreement. which has been pre1lmlnarlly approved by the Court.
Under the Utfms 01 the Settlement Agreement, the parUes have agreed, lor purposes of settlement onty. I"a' Ihls autt h•• been
brought onbehalf of the toftowlng cla,� 01 persons slmltarly situated to Plalntl"' t the "Class"):
All persons and entities that SUMcribed to end utilited the long distance tetephone MrVk:e of AHnet or Its predecesSOf.
Combined Networ1t, Inc. (referred to coHectivety "Annet'·). at any tkne durlnQ the period March 2. 1981 through
H
December 31. 1985.
C. How 10 Rem.ln • C .... M.m......
w t t e
198 ft��� :�:�:�'tt ��:;,�"��:!=::�, t���::;;:. ��:���::a�� :�!�rn �":e��c!.�t! ����a�:��8y
parUclpate In this ttettlement and you wm be bound by the resulls ot the settlement and/or the laWllUlt.
D. How to EKCIuda Yoar.... From 1M Cl •••.
You Are not required to be member 01 the Clllss. Should you decide that you do nol want to be. mf'mber of the Class,
•
you must send an exclusl('ln notice that statfts your name. current address. And your desire to be excludl8d 'rom the Cla!'lsio Ihe
Clerk of the United States Dtstrlct Court for the Eastern Dls'rlct of Michigan at the address given at the and 0' this Notice.
postmarked no laler than June lB. 198ft " you choose to be excluded 'rom the Class, you may not participate In the settlement.
You will no1. howtMfr, be bound by any Judgment dlsmlsslng this action and you wilt rematn I,.. to pur_ your own behaH
on
any Mga' rights you may h.....
n. TERMS OF THE SETTLEMENT
c s t lm m
of 1�2��II:��:-Yt';='�::�:'�i :����� ���n�� �p :: : =�� ':."'7���{:t!:��R��::'i. �,:=)( U
benefits are available to Class members who propMly complete and m. a Proof 01 Claim In the manner described In Section
III be4ow. Class members may choose one benef it from the following options:
A. A slandardlzed credit toward Allnel long dlslanc.telephone service 0' 90 cftnl, lor each year 'rom 1981 through
1985 In which the Ctass memb9r� (Il was an Annet cuslomer; and (II) claims that ahe/he w.. charged by
Allnet for unanswered calls; or
B. A s'.""dardlztKI cash r.'und 0' 90 cents for each)'Par Irom 1981 through 1985In whtch It1e ele.. member: (I) WlIS
an Annet customer; Rnd «") claims that shelhe was chArged by Allnet lor UnR�!Wered calls; or
C. An lIem/led credit toward Aline' long distance telAphone service of 30 cents 'ot pach minute 01 unan.�red calls
Class mftmb." .. nMd not be current Allnet cu!!lomers to claim the standardltlMl and It"ml,ed crftdltl Allnet will
automatically open an account lor any Cla!!s membf!r who reque,ts c,edlts and executes an authorltatlon 10 o� 'Wt"h
an Account. "'" eh,,. ""'mber Incur. lOcal telephon8 company �Cf'J charge m connecllon wilh U", Gp@f\lng 01 an AII".1
II
account. Allnet will ls�ue credit to the Clas.. mll9mher', act:f)Unt 10' 1M fun amount of .... ch tarvlcft cha'ge upon fII!C�P'
A
ol'� Iocat t�ephone companys bm lOf the !",vtce ctlll rge Anmt(" not r�DOMlbM for any other..w.e char� 'hat w." II
t
�;�=J :!.';�r::'ir:...��8r;t;:�:��\,:t!: =�,1ctI (up 10 maxJrnum of S240.OOO) end of II
administering the settlement described above.
The Sf'ltllemflnl Agrettment further provides thltl upon Iinal npproval 0' the seltlement. the Court ."." ante, a Judgment
dlsml!'lslng with prejudice An clalml of plaintiffs and members of the Class that hAve been or might have been asserted
In this acllon or refate 10 Allne"a billing And disclosure prllctlces lor unanswered cans.
Counsel for the Class hive Investlg"ted the 'acls and clrcumstances regarding the cl'dms egaln.. Allnet and thetr defenSM.
In ylpw ot those circumstances. ... tOf' the Cia,. have concfuded th.t thle settMment Agreement Ie ,.Ir and raesonable .nd In
coon
the best Interest. of the Clan.
III. HOW TO FILE A PROOF OF CLAIM
To reretve SettlemtH'1t Credtta a Cnh Refund. you must provIde all of the Informanon requested In lhe Proof 01 Cfalm
Of
al lhe end of this Holtee and r.turn It 10 the Clerk 01 tM Courl al Ihe addreu fndk:aled below. postm.... tced no lalllM'
than July 28. 19811. The PrOo' of Claim must be signed by lhe Class member " the Class member I, not In Individual, An
Of'.
authorized representative. An claims.re sublect to conflrmatton Ind �proval. PLEASE FILL OUT fHE CLAIM FORM CAREFUllY.
IV. NOTICE OF SETTLEMENT HEAIIING
A settlement hearing wttI be held on June 28. 1988 befor.the Honorab'e Judge Anna Olgg' Ta or, Un"ad StatM
a I T f- t
��::�r:���:r;�':t��:t2:��,:,:;:� �::: ::=������o.:.�� �o��=by ::'� �s:.�..:r�r::;:'�t::. �nd
adequnt •.
At the selllemenl hearing. counsel tor lhe Class shall petition the Court 'or an aWArd of aUorney!' feM and expenses not
�����::'orS ���:o�. a:��t1����$�f.;:' ��t :!�r;rn�":xt���:!I��c,:;,��al�d���'1:r',I�:'t�:�:lfree::.�. r�=r,::�:I::�nsM \
shall not reduce any of Ihe Settlement Credits or Cash Refunds avallabte to Class memhe'"
Any Class member wl!';hlng to appear and he heard at the Spltlement Hearing must file a notice of Intenllon to apPAAr \
with the Clerk 0' the Court, which nollce must be postmarked no later than June 18, 198f'- "Iuch CI.,s member
ohlp.clS 10 any one or mo,e terms 01 the Settlement Agreement. the notice of Intention to appflar must be BCC"ompanlftd by a
stalement 01 the basl'J tor this obJection. A Class member may nl'\o oblect 10 the Settlement Agre8mf'nt without
personally appearing at the Hearing by filing written obJections to the Settlement with Ihe Clerk of the Court no laler than
June 18. 1988. A copy of the obJection! In any case must also be �rved upon lead counset for the plalntl" clan. Sachno" Weaver
& Rubenstein. Ltd., AflenUon: Aline' S.Wemenf. 30 South Wacker Drive. Suite 2900, Chicago, 1111na1.60808. You will not be
heard at the Hearing entitled to conte!!! the Proposed Seltlement unless you me and
or your object� In
\181''''
accordance wllh th.foregoing Instructions.
V. IF YOU HAVE ANY QUESTIONS ABOUT THIS NOTICE 011 THIS LA WSUIT
"you have any qup.sllons about this Notice. the attached Prool nt Claim, the ....w.ull or the A.t....lnehl. you may write to·
Ann g��=�E�
� :LUb�:7�1�:r;.��i SHOUlI) BE MAtlE TO AllNET, COUNSEL FOIl PLAINTIFF.,
011 THE COURT.
We think you 'II find this issue to another 2600 computer bulletin
be most informative and education board, this one in the Washington
al. At last we've devoted some space DC area. This one is PC
to the subject of computer viruses. P ursuitable and you can reach it at
But we've done it in a way no (703) 823-6591. Hopefully, we'll
other magazine has yet done. For expand to the west coast by next
the first time, you can read what issue.
goes through the mind of someone Remember that 2600 meetings
who deliberately plants viruses in now take place on the first Friday of
computer systems. And you can also the month only. See page 41 for
see what measures are being taken details. Turnout has been quite good
to thwart this person's efforts. in recent months.
We're happy to announce yet
STAFFBOX
Editor-In-Chief
Emmanuel Goldstein
2600 (ISSN U74'1-385I ) i.1 puhlished lIIon/hll" hI" 26UU t·n/erprise.1 Inc.. 7 S/rong:- Lane. SetauAet . .\}" 11733.
Second class pm/age pennit pending at Setauket. Sell lork.
POSTMASTER: Send address changes to 2600. P.O. Box 752. Middle hland. :'lOY II95.HJ752.
out what commands to send to the hard to the next cluster. That i ndex is called the
disk, the hard disk responds and the data File Allocation Table, com monly abbreviat
is read or written as directed. ed to " FAT" . The FAT contains an e ntry for
The first track on the hard disk typically each cluster on the di sk. An FAT entry can
will contain a small program which i s read have a few values: ones which i ndicate
from the hard disk and executed when you that the cl uster is unused, another which
fi rst power up your m achin e . The powe r i nd icate s that the associated clu ster has
u p s e q u e nce i s c a l l e d " b o o ti n g " y o u r be e n d a m ag e d s o m e h o w and t h a t i t
m achi n e , a n d therefore t h e first track i s should be marked a s a "bad cluster" , and
known as th e "boot track" . a pointer to the next cluster for a given file.
In order to read i nformation from your This allows for what is cal led a linked l i st:
disk in a log i cal sequence , there has to be once you start looking u p clusters associ
s o m e s o rt of i n d e x . A n u n us u a l i n d e x ated with a given fi le, each FAT entry tells
m e th o d w a s s e l e c t e d f o r M S - D O S . you what the next cluster is. At the end of
I m ag i n e g o i n g t o t h e c a rd i n d e x i n a the linked list is a special indicator which
l ibrary, looking up the title you desire , and i ndicates that there are no more clusters
getti ng a place in another i ndex which tells associated with the file.
you where o n the racks the book is stored. There are actually two copies of the
Now, when you read the book, you discov FAT stored on your disk, but no one really
er that only the first chapter of the book is knows what the second copy was intend
there . In order to find the next c hapter of ed for. Often , if the first copy of the FAT is
the book, you have to go back to that mid corrupted for some reason , a clever pro
dle i ndex, which tells you where the next g ram m e r could recover i nformatio n from
chapter is stored. This process continues the second copy to restore to the primary
until you get to the end of the book. FAT. These clever programmers can be
Sounds pretty convolute d , right? You called "hackers" , and should not be con
bet! However, this is pretty much how MS fused with the thieves who break into com
DOS does its "cataloguing" of files. puter systems and steal thi ng s , or the
The d i re c to ry structure o f M S - DO S "worms" [Joanne Dow gets credit for that
allows for you t o look up an item called the phrase !] who would get joy out of causing
"first cluster" . A cluster represents a set of you heartache !
co nti g u o u s ("touching o r i n co ntact" But that heartache is exactly what can
according to Random H ouse) tracks and happen if the directory (which contains the
sectors. It i s the smallest amount of i nfor pointer to the first cluster a fil e uses), the
matio n which the fil e structure of M S-DOS FAT (wh ich c ontai n s that l i n ked l i st to
knows how to read or write . other a re a s on the disk which the f i l e
Based on the first cluster number as uses), or other areas of the d i s k g e t cor
stored i n the directory, the first portio n of a rupted.
f i l e can be read. When the i nformati o n And that's what the l i ttle worms who
contained there i n i s exhausted, M S-DOS create T rojan programs do: they cause
goes to that secondary i ndex for a poi nter what at first appears to be a useful pro-
a virus shou l d be written i n asse m bly lan the destruction of protected software (i.e .,
g uage, 'C', o r a n y o the r l a n g u a g e that the Amiga vi rus, which wo uld not affect
al lows l ow-level functions (byte manipula standard disks but would destroy protect
tion, syste m ca lls, m e m o ry m o v e s ) . I ed disks due to their non sta ndard f i l e /d isk
-
viruses use for reproduction and where da ily activities. You can run a virus-infect
tiley may hide themselves e d program a hundred t im e s and it will
After attaching itself to a file or disk behave n orm al ly with the e xc e ptio n that it
that was previously u n i n fec ted , the actions will make copies 01 the v iru s portio n and
of any part i c ular virus may vary, but the attach itself to other disks/applications, but
virus wi l l check the d is k co un ter b e fo re when yo u run it the final time, it will per
pr oc ee ding to any intended action o ther form its inten ded activity. Since only tha t
than rep rodu ct i o n The disk co unt e r , an
. copy of the virus has detonated, you are
individual byte som ewhere o n the infected still left with perhap s doze ns o f i nfecte d
di sk , kee p s track of how many ti m e s the file s which will not d eto n a te until they are
viru s has acce s sed that particular di s k, run several hundred time s ( and thu s will
a n d thu s a s sure s t h at the vi r u s will not spread the virus even m ore).
d e tonate pre m aturely. So m e vir u s e s are T he be nefit s o f an a ppl ica t io n resident
to tally h arm le s s and print a s i m pl e text v i ru s s u ch as Cybe rAI D S are s e v e ral.
m e s sa g e ( such as the Macintosh virus), Since no new files are ever created on the
while o thers are cr e ate d to cause h arm disk by the virus, the user will prob ably not
a nd/o r to d e s tro y data (like CyberAIDS). notice a n yt hi n g is wro ng. Instead, normal
T he re are still o ther viru se s which were a p plicatio ns are m od ified b y the vir u s to
not o ri g i na lly m eant to be destructive, but execute v i ra l cod e . When individual fi l e s
due to the fact that they come between an (non-text executable code fil e s) are infect
o p e r ating s y s t e m a n d it's applic atio n s , ed the viru s can be spread i n three ways:
,
cau s e h a r m n o n ethe le s s. This harm is (1) The man u al copying of the file from
u s u a l l y in the fo r m of system crashe s or disk to disk by the u ser. User-group disk
distri bution can achieve the best res u l ts a. Make sure vol u m e is not write
when this method of reprod uction is used . protected
(2) The automatic copyi n g of viral code b. Make sure vo l u m e is on l i n e
Ily the viru s itse l f to non-i nfected files i n ( n o I/O error)
other drives or t h e hard d isk. U s ua l l y 2. I n cre m e n t d i s k c o u n te r ( S e e
s erves t o g ive the virus a better foothold NOT E 1) a n d go t o destroy (See NOTE2)
within a particular user's software l i brary. if necessary.
(3)The transfer of i n fected files o ver 3. Check for enough space on vol
the m o de m . The i n fe c ti o n h as a g o o d ume.
c hance (wh e ther by acc i d e n t or o n pur 4 . Choose candidate f i l e .
plose ) of reachi ng public domain or pi rate a . Fi le m ust b e a system or appli
bulletin boards . The d istri buti o n of that file cation fi l e .
wi l l be i ncredi b l e . I n fected fi les may also b . File m ust not be al ready infect
b e s pread thro ugh LAN's ( L o c a l Are a ed (cho o se ap pro pri ate m e tho d for
Nletworks) . ide nti fying i nfected fil es) .
Application Resident Virus Outline c. Fi le m ust be small enough to
A. INI T I A L IZ E . a l l o w viral attac h m e n t (so t h a t t h e
1. F i n d curren t locat i o n o f virus i n appl icati o n and virus c o d e bo t h fit i n
m e mory. m e m o ry).
2. Relocate itself to predefi ned m e m d . If the fi le is locked then unlock
ory locati o n . it.
3. M a ke sure D O S i s a c t i ve a n d C.INF ECT.
ready t o accept system calls. 1. Open candidate file .
4. Move original application header 2. Load first block of candidate fi le
i n to a m ai n . buffer.
1NThe V irus may 3. Take first (6 by1es) and save to
even call its creator alt.buffer (also known as S H ) .
4 . Calculate viral location in new fi le .
and allow the a . V i raI . Addr= Appl icatio n . S tarl. Addr
Length.of.Application 6
transfer of data 5.
+ +
(YOYoP'fi4E>
.
de
who IS flO/ some th i e a l l i l d i bvi-i'd s " u se . And trle only rea
anon t ri e friend o r re l a ti v e o f s o r:i rtn c y SCI: it's a pr::: b iem t o be g i n with i s because
who u n de rs ta n d s t h e concepts i n Jolved . trle ' ttlrealened' o rg a n i z atio n s o r ca m pa
n o t o n l y the co m m a n d s · w h o thi 0 k s i t n i l! s have ridiculously bad security.
w o u l d be a b l a s t to t u r n o ff C A M A o n a Wh ile i t i s tr ue ttlii! 111 0re pe ople now
few sw i t c h e s , o r d i s ru pt CO S MO S o pe ra own p e r so na l com pute r s than at a n y other
tio n s . A l l of t h i s potential dam age i s m ade t i m e I n h i s t o ry , trw o ve ra l l effect o f t h i s
p o s s i b l e by t h e R B O C ' s t h e m s e l v e s , i n f l u x o f n e w �Iackers i s n e g l i g i b l e . I n stead
wh ich pro v i d e e x t re m e l y m i n i m a l s e c urity of one kid a n n o y i n g h i s l o c a l CO f r o m
that I S m o re o f a study I n fau l t y securi ty i nfo rm ation he found o n some boa rd , there
tech n i q u e s and shoddy organization than a re 10 kids u s i n g the same i nform a t i o n
any k i n d o f o b stacle t o the potential hack fro m the same board to hara s s t h e sam e
er. C O . I n s h o rt, t h e re i s a d e l u g e of ' i d i o t
W h i l e 'co m puting power" i s n o w w i th i n s a v a n t s ' w h o a r e c a p a b l e o f d o i ng n o
reach o f a vast n u m be r of p e o pl e , a l m o st m o re d a m age t h a n tra i n e d chi m p s .
a 1 l of that 'vast n u m be r' are i g n o ra n t as to T h e B u l l et i n Board Systems
t h e i r s y s te m ' s p o t e n t i a l . In f a c t , m o st B u l l e ti n board syste m s ( B BS's) po se a
n e v e r g e t be y o n d r u n n i n g the i r s p r e a d · possible threat for the s i m p l e reason that
s h e e t o r d o i n g t a x e s o n t h a t wo nderful P C the m o r e h i g h l y s k i l l e d u s e rs w i l l p o s t
w i t rl " 1 6 M B R A M " . And if t h e y e v e r do pote n t i a l l y dangero u s inform a t i o n i n a
sink into the s o r d i d d e p t h s o f d e p r a v i t y ( continued on next pUf{c)
that don't coincide with what society hap The previous paragraph s h o u l d n ' t be
pe n s to find acceptable at that particular m i sco n s t r u e d as a m o r a l j u d g m ent o n
tim e . cri m i na l s . Persona l l y we couldn't care less
.. Accessing government and m i l i tary h o w yo u m ake yo u r l i v ing as l o n g a s
com pu te r s : Why it is that people com e to you're good at what y o u do .
the co nclusion that governm e n t com puters
should be bastion s of security we couldn't
begin to g uess. Whe n yo u speak of the
gove r n ment and m il itary, we p re s u m e you
mean our govern m e n t and m i l i tary ; you
k n o w , the o n e r u n by i n c o m pete n t s ,
bureauc rats , and other pape r pushers that \
excel at nothing e xcept wasting time and
m oney.
For so m e o n e who c a u ti o ns o t h e rs
agai nst m aking 'rash statem ents', Captain
Zap has apparently written an entire article
fil led with statements that neatly i gnore his
own dictu m .
Lastly, we'd l i ke t o bring u p one rele
vant fact t h a t m ost ' se c u r i ty a n a l ysts'
m anage to ignore: hackers and phreaks
(fo r the m ost part) are not c ri m i nals. At
least that isn't the way they view the m
selves. W h i l e nobody lays awake nig hts
worry i n g about the fact t h a t today he's
cost a f e w p h o ne c o m pa n i e s so m e
m o n e y , a n d p e r h a p s w a s t e d syst e m A rtwork by J.R. " B o b " Dobbs
resources o n u n-authorized applications, a Red Box article on p age 1 3
').o�,.F ..... ,
T
the shareware concept, or believe that A little later in this article you'll see how
there ain't no such thing as Trojan or virus to disguise the data file name, making life
programs, and that a person who profits tougher for the worm s out there . But for
from the distribution of a program such as the purpose of this article, we 'll assume
FLUSHOT m ust be i n it for the money. that the file is called C :\FLUSHOT. DAT.
I 've created an alternative for these The FLUSHOT + program will read this
folks. I'll cal l it "charityware" (first called data file exactly once . It reads the data
that, to m y knowledge, by Roedy G reenJ. from the data file into memory and over
You can also reg i ster F L U S HOT + by write s the n a m e of the data file in so
sending me a check for $10 m ade out to doing. A little extra protection in hiding the
your favorite charity. Be sure to include a name of the file.
stamped and addressed envelope . I'll for This data file contai n s a n u m be r of
ward the monies o nto them and register l i ne s o f text. Each l i ne of text is of the
you ful ly. form :
Of course , if you wish, you can send (Command)=(fi lenam e)(options)
me a check for more than $10. I'll cash it Com mand can be any one of the fol -
gladly ( I 'm no foo/ ! ) . lowing characters:
Site Licensing of FLUSH OT + P - Write Protect the file named.
So, you run the com puter department R - Read Protect the file named .
o f a big corporation, you got a copy of E - Exclude the file named from match
FLUSHOT + , decided it was wonderful and i ng P or R lines.
that it did everything you wanted and sent T - The named file is a legitimate TSR.
in your ten bucks. Then you distributed it C - Perform checksum operations on
to your 1000 users. the file named.
Not what i s i ntended by the shareware The filename can be an ambiguous file
sch e m e . Each s i t e u s i n g F L U S HOT + if you wish for all com m ands except the 'T'
should be registered. That's ten bucks a and 'C' com mands. This means that:
site, me bucko ! Again, make the check out C :\level l \* .COM
to charity if you're uncomfortable with the wil l specify all COM files on your C :
idea of a program mer actually deriving an drive i n the level l directory ( o r its sub
income from their work. directories). Specifying :
H oweve r , if you've real ly g o t 1000 C :\level 1 \*\*. EXE
com puters, you should give me a call . As would specify all EXE files in subdi rec
m uch as I'd like to get $10 for each site, tories under the C :\leve l l di rectory, but
that wouldn' be fair to you . So, quantity would not include that directory itself.
discounts are available . You can also use the '?' operator to
T h e FLUSH OT.DAT fi le specify ambiguous characters as in:
FLUSHOT + is table-driven by the con ? :\usr\bin\? .COM
tents o f the FLUS HOT. OAT file. This file which would be used to specify files on
normally exists in the root directory of your any drive in the \usr\bin directory on that
C: drive ( C :\FLUSHOT.DAT). drive . The files would have to be single let-
ter filename s with the extension of 'CO M ' . Y o u c o u l d exclude F L U S HOT + fro m
Am bi g u o u s file nam e s are not al lowed be i n g t riggered by including a l i ne such a s :
for the 'T' and 'C' opti o n s . E = C :\devel o p\' .-
Protecting files from Write Access O f c o u rse , you m i gh t have deve l o p
U se the ' P = ' o ption to protect files from ment work on m a n y di sks u n d e r a directo
write acce s s . To disallow writes to any of r y of t h a t n am e . If y o u d o , yo u m i g h t
your C O M , E X E , S Y S , and B A T f i l e s , i nclude a l ine which looks l i ke :
specify l ines o f the form : E = ? :\develop\ ' '
P = ' . CO M or
P='.EXE E = '\develop'
P = ' . SYS Checksumming fi les
P = ' . BAT T h i s l i n e is a l i ttle m ore co m p l i cated
which protects these f i l e s on any disk, t h a n o t h e r s a n d i n vo l v e s s o m e s e t u p
i n any directory. work. It's worth i t , thoug h !
Protecting f i l es from Read Access A c h e c k s u m i s a m e th o d u s e d t o
S i m i larly, you can u se the ' R ' com mand reduce a f i l e ' s validity i nto a s i n g l e n u m
to protect f i l e s from bei ng read by a pro be r . A d d i ng u p the va l u e s of t h e b y t e s
gram ( i nc l u d i n g t h e a b i l i t y t o ' T Y P E ' a which m ake up t h e fi le would be a Si m pl e
file ! ) . To preven t read access to a l l of your c h e c k s u m m e thod . Do i n g m ore com pl e x
BAT files, use a line s u c h a s : m a t h e m a t i c s a l l o w s f o r m o re a n d m o re
R = ' . BAT c h e c k i n g i nform atio n to be incl uded i n a
C o m b i n ati o n s of R a n d P l i n e s a r e tes t .
I f you u se a l ie o n the form :
FLUSHOT.DAT file so that future runs of disk, which may be a legitimate operatio n
this program will not trigger FLUSHOT +. made by the D O S FOR MAT prog ram ,
However, if you get this m essage when you'll see a message such as:
running a program you don't think has any D i s k b e i ng formatted ! Are You
need to go TSR ( such as the proverbial Sure?
c h e c k bo o k bal a n c i n g p r o g ra m ), yo u Press "Y" to allow, "G " to go till exit,
should be a l ittle suspicio u s . Having a any other key to fall.
TSR program is not, in and of itself, some which follows similarly to the direct disk
thing to be suspicious of. But having one write o pe rati o n s . You sho uld q u e stion
you don't expect --- well, that's a different whether the formal operation is appropri
story. ate at the time and take whatever action
M o st TSR's ' hook i nto' an interrupt you think is best.
vector before they go TSR. These hooks If one of your prolecled files is aboul lo
m ight interce pt and process key stroke s be written to, you'll see a message like :
('hotkeys'), or they m ight hook and inter Write access being attempted on :
cept direct disk writes them selves. In any (filename)
event, FLUS HOT + (in this version!) does Press "Y" to al low, "G " to go till exit,
n't have the smarts to do more than advise any other key to fail.
you of the T S R ' i n g of the program . I f where (filename) represents the fi l e
y o u ' re t r u l y s u sp i c i o u s, r e b o o t yo u r you're trying 10 protect from these write
machine im mediately! operations. Your red flag should fly, and
If a program attem pts to write directly you should question why the program cur
to the interrupts which are reserved for rently running should cause such an oper
disk writes, FLUSHOT + will also be trig ation.
gered and you'll see som ething like : You may also see the same type of
D i rect D i s k Write atte m pt by pro m e s s a g e w h e n o n e of y o u r ' R e a d
g ram other than DOS! Protected' files is being accessed:
(From Interrupt (xx)) Read Access being attempted on:
Press "Y" to allow, G to go till exit,
" " (filename)
any other key to fail. Press "Y" to allow, "G" to go til l exit,
where the (xx) represents either a 1 3 any other key to fail.
(indicating a direct B IOS write to the disk) Again, the same red flag should fly, but
or a 26 (indicating a direct DOS write ) . it doesn't m ean that you're infected with
Again, pressing a 'V' or a 'G' allows the som e nasty virus program ! It could be
operation to continue, pressing any other something harm less or i nte nded. You'll
key will cause the o pe ration to return a have to be the judge.
which have the h i g h es t percentage of amusing to see what the worms out there
Trojans attached to them . are wasting their efforts o n .
This di rectory aid program l isted m y A t this pOint, Trojans and viruses are
d irectories i n a wonderful tree structure, becom ing a hobby with me: watching what
using diffe rent colors for different types of the worm s try to do, figuring out a way to
files. Nice program . When it exited , how defend aga i nst it, and then updating the
ever, it went out and looked for a directory FLUSHOT series.
with the word "FLU" in it. Once it found a H owever, there is a pos sibility that the
directory with a match in it, it proceeded to FLUSHOT series (as well as other protec
try to erase all of the files i n that directory. tion program s which are just as val uable)
An assault! No big deal . That's what back are causing an escalation of the term s of
u ps are for. this war. The wo rms out t here a re sick
But it brings up an i nteresting point: I individuals . They m ust enjoy causing the
was attacked by a clever worm , and i t damage they do. But they haven 't the guts
erased a bunch of files which were pretty to stand up and actually do something in
val uable. All of the protection I had would perso n . They prefer to hide behind a m ist
have been for naught i f I didn't use the fi rst 01 anonym ity.
line of defense from these worm s : ful l and But you have the ultim ate defense ! No,
adequate backup. not the FLUSHOT + progra m .
I 've spent three years of my life devel Full and adequate backupsl
o p i n g o n e particular software package . There are a variety of very good back
I magine what would have happened if that up programs which can save you m o re
had bee n e rased by a worm ! Fortunately, I work than you can i m a g i n e . I u s e the
m ake backups at least once a day, and FASTBACK+ program , which i s a great lit
usually m o re frequently than that. You tle progra m . I backup 30 m egs once in a
should, too . while, and do an i ncremental backup on a
Now, I quaranti n e that m ac h i ne as very frequent basis. There are a variety of
we l l . I spe n t a c o u p l e of d o l l ars and very good commerCial, public dom a i n , and
bought a bunch of bright red floppy disks. shareware backup prog ram s out the re .
The basic rule around he re is that Red Use them ! Because , n o m atter what soft
Disks are the only disks that go into the ware protection yo u u se , so m ebody will
B B S m achine , and the Red Disks go into fi nd a way around it o n e day. B u t they
no other machine. You see, I know that can't find a way aro u nd your backups.
the re is s o m e worm o u t there who is And, if you (and everyone else) do regular
gonna find some way to infect my system. backups, you'll remove the only joy i n life
No m atter what software protection I use, these worms have. They'l l kill hemselves,
there is a way around it. hopefully, and an entire subspecies will be
You needn't be concerned though - wiped out -- and you'll be partially respon
you're making backups on a regular baSis, sible !
right? And you aren't asking for trouble. I M y a d v a n c e t h a n k s f o r h e l p i n g to
am , I expect to find it, and it is sort of extermi nate these l ittle slime buckets .
Cray-Z Phreaker
204 87 5 5
<:>1 1 956 6537
S kunk Works
<>123 865 392
Dublin 885634
3. Please choose one of the four options listed below. Please provide the Information r equested .
A. __ Siondordi.ed Credll or B. _ _ ._. BI.ndordl.ed C •• h Retund
Subject t o the pro rata provisions set forth above i n Section II of the Notice of Settlement, a S t a n d a r d ized
Credit or Cash Refund equals 90 cents lor each year you were a customer.
(I) Please circle each year or part of a year i n which you wel e an Allnet customer.
1981 1983 1985
1 982 1984
( ii ) T olal number of years circled ___ _. ...
( til ) Please altach copies 01 the bills lor each call listed. II you no longer have the bills, prOvide the Allnet access
code to which the calls were billed, or " an access code was not usAd. the tAlephone numl:'l�r to which
the calls were billed _ ..
4, I f yo u chose t h e .t.ndardized credit or itemized credit options. and you a r e n o t c u r r � n t l y an Aline! c u s t o m e r .
you mu st complete t h e f o l l o w i n g authorization f o r m :
I authorize Allnel 10 nollfy my local t e l e p h o n e c o m p a n y t h a t I am c h o o s i n g Allnet as m y P r i m a r y Long D i s t a n c e
C a r r i e r on t h e t e l e p h o n e number listed b e l o w . I understand t h a t :
(I) IfI Incur a telephone company service charge I n connection with the opening o f m y Allnel account, I will receive a
credit to be applied 10 my Allnet account lor the full amount of such service charqe upon submission to Allnel.
at the address to which this authorization form WAS senl, of a copy of the Invoice for such chRirge
( II I While Allnet will be m y Primary l onq Distance Carrier, I will also be able t o place call9 with A T & T or any olhp, c a r r l "' r 9
al any lime I wish.
( iii ) ImAy choose only one Primary Lonq Dlc;t�flcp. C a n ip.r lor the lic;lP.d lp.I"'phone numb'!r If I chao,"" Anoth�r r. ::I . nN 1�'Pr
on, t h i s ''If!I'!r.tion will be invali<1�I'"
(Iv) I m a y c. han g e t o another carriei' a t any t i m e . and. ,1 1 d o , m y local t '!lepho ne compmy M a y apply a servic. ... r.h�.gp.
(v) t may deSignate only one telephone number. The tetephone number listed below i s the one lor which I A m m A k ing this
designation
CuslomPf nAme _
Name 01 billing contact (" dlnerent I _ ._� _ �
Billing address __ � __ . _ _ __
C ! l y _ ________ _ _ _ _ _ _ _ S te t e � __ _ _
DAIA Signature
C E RTIFICATION AND R E L E A S E
I certify u n d e r p e nal ty of p e r j u r y that I A m authorized to m A k e I h l s c l l'I l m , t h a t the c l a i m a n t was an A l l net c u s t o m e r a l
s o m e t i m e d u r i n g t h e p e r i o d M a r c h 2 , 1 9 8 1 1 hro u g h December 3 1 , 1 9 8 5 , Rnd t h a i t h e c l a i m a n t was c h a r ged for
u n a n sWNed calls for which n o credit or refund was previously recp.ived t f u r t h e r certify thai all Information I n t h i s Pr o o f of
C l a i m i s t r u e a n d correct t o t h e best of my knowledge, Information and belief; t h a i t h e c l a i m a n t d i d nol elect 10 be excluded from
t h e S e t t l e m e n t C l a s s ; t h a t t h e undersigned Is the claimant or i s authorized to execute and s u b m i t t h i s Proof of C l a i m on
c l a i m a n t ' s behalf; and that this claim is the only claim being s u b m i t t e d I n this set tlement by or on behalf of t h e c l a i m a n t .
I n c o n s i d e r a t i o n of t h e r i g h t to receive benefits under the settlement, t h e c l a i m a n t expressly covenants and a g r e e s t h a t
h e / s h e / i t s h a l l not now or h e r e a f t e r i n s t i t u t e , m a i n t a i n or a s s e r t any c l a i m r e ( a t l n g t o the b i l l i n g of c l a i m a n t f o r
u n a n sw e re d c a l l s by Allnet d u r i n g the p e r i o d from March 2 , 1 9 8 1 t h rough December 3 1 , 1 9 8 5 . C l a i m a n t further r e l e a s ,," s a l l
c l a i m s a g a i n s t A l l n e t , i t s predecessors, successors, aff i l i a t es. a s s i g n s and I t s officers, directors. agents and e mployees.
pa st a n d present, that have been, might have been. are now or could be asserted I n t h e lawsuits described I n t h e Notice or
that relate i n any way t o t h e matters alleged In t h e complaints I n those lawsuits.
( 80 0 1 638-8369
( 80 0 ) 227 -3404 Bowlan N e t w o r k
GEn i e
( 80 0 ) 22 7 - 6544 [UnI X ]
( 80 0 1 826-8855 AM . Peop l e l l n k
( 80 0 1 2 2 8-0003 ?? 1300 b a ud on l y *
( 80 0 1 828-632 1 XEROX
( 80 0 ) 228-00 1 8 ??
( 800 ) 84 7 - 0 1 0 9 ??
( 800 ) 2 28-0329 ??
( 80 0 1 848-4480 COlpuse r v e
( 800 1 22 8 -06 1 6
[ D I AL : ]
Mar y l an d C . C .
( 80 0 1 852-0005
( 80 0 1 228-0748 ??
( 80 0 ) 228-0993 BCS
( 80 0 1 228-0994 BCS
+-----------------------+
( 80 0 1 228- 1 1 1 1 V i sa ( ? )
: V O I CE MESSAGE S Y S TEMS :
( 80 0 1 228- 1 1 7 0 ?? +-----------------------+
( 800 1 228- 1 657 PH I LNE T
( 800 ) 238-063 1 Tel enet ( 20 1 1 953-2222 VMB5
( 800 ) 32 1 - 1 646 ?? 1300 baud on l y .
( 3 1 7 ) 26 7 - 1 90 1 VMB5
( 8 00 ) 32 1 -3 9 1 0 ?? ( 4 1 5 1 330 - 783 1 VMBS
( 800 ) 325 - 4 1 1 2
( 4 1 5 1 338-70uO ASPEN
Easy l i n k
( 800 ) 327 -%38 Easynet
( 4 1 5 ) 463-60'3'3 VMBS
( 80 0 1 328-0024 ??
( 4 1 5 1 882 - 7 1 7 0 V"BS
YMBS
( 80 0 ) 328-0 1 3 7 1?
( 70 3 ) 9 3 4 - 3400
( 80 0 1 328-0 1 5 7 ??
( 800 ) 328-i;198 ??
I. b i) l) .! ;j 7 7 - T A ll' \'! M 8 :J
; o U I} ) ti 8 8 - u \.! j \ ! r e c e I ver A rn e r I ( �
i 8uu l 8dd-MA I L P n o n e h a l l S y s t em
l �uu ! � 2 j - �S I 7 VMHj ' 8�u ' dd-yu l l t V O l c eb a n K liS t h e 3 a m e a s i L -VU l lE t
l 80U l 3 2 3 - 8 2 1 4 VMhj
i b u O .! j j � - U U i j Ac c ess Je( V l C �
l du 0 ) j 2 J - � 1 J 4 Vh�j
I dUU ! ���-UU�J Aj�E�
I buU ! J j l - l i b � I nnovat I ve So f t wa r e
( HvU ! � j�- I AL K AjPtN
!. ;j ij ij } :j.3 .3 - fi A 1 L ( t1 0 n e M .i l i J t = r e !f!
i C;' i) (! i 3 4 ': - M A l L "l" J n e M a l i J 'i s t e m t------------------t
VM8S
: u Hl e t r n Li n ::, t u l f :
l. o l. <' I ·o 4 4 - 1 d 8 4
i �uU ) 4 2 � - 7 5 j 4 V"bj
( 2 U l ) b 4 4 - L 3 j i) j !l F n t f.' r J � r �. i: � i-i il 1 � C; I rl ,.".j IT! P • • • L1 )
I dUU l 4L4 34J4 VMbj
U 0 1 J b H - i J .J 2 . • . !.· a l i t rd 3 i:, n e ( o l l e n � I
1 80U I 4 2 4 - 6i�2 IT f M a l l S y s t em
l .: u l l b 4 4 - l 3 J 5 News ber V I C E
VO I C 2
( ci 0 U ) 4 4 1 - j S l i VMbj
! �v l ) b44-�j3� C r e d i t l f a � s f p f j A l �i
VMb�
' i " i \ b4 � - l jjj Au t o � a t e d J u r o r Se l 2( t
1 80U ! 444-�uUJ
\ ou u ! 4 4 J - � A . L P h o n e M a l l j j s t e rn
i � U l l b4 4 - lJ4U lred l t l r a� 5 ! er ! A i M
l bv v ) �jb-bd�� U J y mp l c i r a n s p o r t a t l o n
1 2v 1 Q4�-JD L l � ( ffi p u t e ( l : e Q l e s t
I dUU I J . I - dQ / 1 VMb�
$1 5 . . . . . . . . . . . . . . . . . . . . . . . 1 y e a r of 2600
. . . . . . . . . . . . . . . . . . . . . . . . .
$ 28 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 ye a r s
of 2 600
S41 . . . . . . ... . . . . .
. . . . .
. . . . . . . 3 years
of 2 600
. . . . . . . . . . .
$ 40 . . . . . . . . . . . . . . . . . . 1 ye a r c o r p o r a te s u bsc r i pt i o n
$ 75 . . . . . . . . . . 2 y e a r c o r p o r a t e s u b s c r i pt i o n
s 1 ! 0 . 3 y e a r c o r p o r a t e s u b s c r i pt i o n
S 25 . . . . . . . . . . . . . . . . . . o v e r s e a s s u b s c r i pt i o n ( 1 ye Cl r o n l y )
$ 55 . . . . . . . . . . . . . ove r s e a s corpo r a te s u bsc r i pt i o n ( 1 yea r o n ly )
5 2 60 . . l l f e t i m e s u b s c r i p t i o n ( n e v e r a g a i n w i l l w e b ot h e r y o u )
.
$25 . . . . . . . . . 1 9 84 , 1 9 8 5 , o r 1 9 8 6 i s s u e s (1 2 pe r y e a r )
$ 50 . . . . . . . . A n y two y e a r s .
S75 . .A I I t h r e e y e a r s ( 3 6 I s s u e s )
I O v (; r S f.; (j �) or d e r s a d d 5 5 f o r e a c h y e a r o r d e r e j )
A l l ow 4 t ( ) (3 w e e k s f o r d e l i v e r y
S ( : n d Cl i l or d e r s t o . 1 987 ISSU ES
2 6 00
A LSO AVAI LA B L E t
PO Box 7 5 2
M l d d l p I s l ;m d , N Y 1 1 9 5 3 U . S . A
( 5 1 6 ) 7 5 1 · 2 6 00
-----------------------------
A M O U N T E N C LO S E D F O R S U B S C R I PT I O N : __
A M O U N T E N C LO S E D F O R B A C K I S S U E S :
A SOLUTION TO ViRUSES . . . . . . . . . . . . . . . . . . . . . . . 4
HOW TO WRITE A ViRUS . .. 8 . . . . . . . . . . . . . . . . . . . . .
LEITERS . . . . . . . . . . . . . 24
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2600 MARKETPlACE 41 . . . . . . . . . . . . . . . . . . . . . . . . . . . .
I
,"
I Permit Pending at
E ast S et a u k et . N Y
1 1 733
I �� S N 0 7 ..1 9 - 3 8 5 1
2600 Maaazine
PO Box 752
Middle Island, NY 1 1 953 U.sA
Forwarding and Address Correction Requested