Вы находитесь на странице: 1из 48

IN TIlE UNITED STAlES DISTRICT counT Fon HIE EASTERN DISTRICT OF MICHIGAN

SOUTHERN DIVISION
Docket No. 598
I
MOL
IN ne LONG OISTANeE
LI TIGATION All CAses
TELECOMMUNICATIONS
Han. AnnA Diggs TAylor
NOTICE OF CLASS ACTION ANO PROPOSEO SETTLEMENT TO CERTAIN CURRENT ANO
FORMER CUSTOMERS OF ALLNET COMMUNICATION SERVICES, INC.

Order 01 the United Statp.s District Court for Ihe Eastern District of Michigan, PLEASE TAKE NOTICE THAT:
Ry
A ClASS acllon lawsul' has been fUad on bah,,11 d. corlsln 'ormer find current customers aORlnst Allnet Communlcallon
Services, Inc., formerly known as Combined Network, Inc. The Court hAl preUmlna,lly approved. leltlement of this 'awsult.
YOU ARE URGED TO READ THIS NOTICE CAREFULLY BECAUSE . IT AFFEC T S YOUR RIGHTS AND Will BE BINDING
ON YOU IN THE FUTURE.
L NOTICE OF A PENOING CLASS ACTION
A. DNertp"_"" L •••un
Plalnllffs have
IUed Annet. alleging that Allnet charged cuslomeJS lor cer'aln unanswered letephana caU., holding
lime, busy signets. and Cfmtrllr oftlc8 recordings (collecltvftly "unanswered calls". without adequately dlsdoslng eueh charon
to lhelr customers the pubHc. Plalnt"'!!f'ek to pre5ent their
or clafms for charges fOf' unanswered caAs, wei
own ••
a! t
�II::::r::�t,: .z��:I��:�����yA:'';�lf�:�=�:":,r��,c:t�r;r� AHnet has charged Its eubscrlbers f.lrly
and properry and has dlsclo� tun)' and '."'y he basis for Its tong distance charges. AHnftt has agreed 10 seltle PI.'ntlff,· suR
sole'y to avotd the expen'J8, Inconvenlonce andI dlsrupUon of further litigation.
This Nollce Is nol an expression 01 any opinion by 'hit Courl or thf'J merits of this 11II 811on or or the Settlement A reemeni.
' S t , rn a rr s
hour!': �h�n:,:::�, �� 6'':�����:B:,,::n�:a�:' g. ��tc��=':"�:'::'�:'�t� ':tr,,=-=!,. � /1 ;:. t���m: Boutevard.
Detroit. Michigan 48226.
•. The S.ttlement CI....
Plalntlfts and Alinel have entered Into a S�ttlement Agreement. which has been pre1lmlnarlly approved by the Court.
Under the Utfms 01 the Settlement Agreement, the parUes have agreed, lor purposes of settlement onty. I"a' Ihls autt h•• been
brought onbehalf of the toftowlng cla,� 01 persons slmltarly situated to Plalntl"' t the "Class"):
All persons and entities that SUMcribed to end utilited the long distance tetephone MrVk:e of AHnet or Its predecesSOf.
Combined Networ1t, Inc. (referred to coHectivety "Annet'·). at any tkne durlnQ the period March 2. 1981 through
H
December 31. 1985.
C. How 10 Rem.ln • C .... M.m......
w t t e
198 ft��� :�:�:�'tt ��:;,�"��:!=::�, t���::;;:. ��:���::a�� :�!�rn �":e��c!.�t! ����a�:��8y
parUclpate In this ttettlement and you wm be bound by the resulls ot the settlement and/or the laWllUlt.
D. How to EKCIuda Yoar.... From 1M Cl •••.
You Are not required to be member 01 the Clllss. Should you decide that you do nol want to be. mf'mber of the Class,

you must send an exclusl('ln notice that statfts your name. current address. And your desire to be excludl8d 'rom the Cla!'lsio Ihe
Clerk of the United States Dtstrlct Court for the Eastern Dls'rlct of Michigan at the address given at the and 0' this Notice.
postmarked no laler than June lB. 198ft " you choose to be excluded 'rom the Class, you may not participate In the settlement.
You will no1. howtMfr, be bound by any Judgment dlsmlsslng this action and you wilt rematn I,.. to pur_ your own behaH
on
any Mga' rights you may h.....
n. TERMS OF THE SETTLEMENT
c s t lm m
of 1�2��II:��:-Yt';='�::�:'�i :����� ���n�� �p :: : =�� ':."'7���{:t!:��R��::'i. �,:=)( U
benefits are available to Class members who propMly complete and m. a Proof 01 Claim In the manner described In Section
III be4ow. Class members may choose one benef it from the following options:
A. A slandardlzed credit toward Allnel long dlslanc.telephone service 0' 90 cftnl, lor each year 'rom 1981 through
1985 In which the Ctass memb9r� (Il was an Annet cuslomer; and (II) claims that ahe/he w.. charged by
Allnet for unanswered calls; or
B. A s'.""dardlztKI cash r.'und 0' 90 cents for each)'Par Irom 1981 through 1985In whtch It1e ele.. member: (I) WlIS
an Annet customer; Rnd «") claims that shelhe was chArged by Allnet lor UnR�!Wered calls; or
C. An lIem/led credit toward Aline' long distance telAphone service of 30 cents 'ot pach minute 01 unan.�red calls

���;; 1981 through December 31.1985) and 'or


��':=�::'��':!:�::t;:!l":,���::��ee:��/�:;��:r�:���r�I�
O. An /remlzfld cash r.fund of 30 ctmts for each minute of unanswered calls for which lhe Class membe, wa. chargPd
during the Class period (March 2, 19811hrouoh December 31. 1985) and lor which the Clast member ha.
not bRan prevtously reimbursed or credited.
To obtAin an IIemlled credIt or cash refund, the Cllts! member musl ltemlle and allest to ellch unanswered cltll 'Of which
• rpfund or credit Is claimed. It the tOlal credits clnlmf'Jd by Cln's mpmbers eJ(ceed $525.000. eltch Clas, membpr
clalmln" Soltlen'l8nl Credits will receive hls/her/ o r.'a share of the lotal Settlement Credits IIYAllable. It the 101AI ctlsh
f fI ' �' 175.�e8Ch Clnss member claiming a Cash Refund wtll recelvtt hls/her/ltl pro rllf.
�� �,� �f��!";�a��:; �s,:p��d:: ari:��

Class mftmb." .. nMd not be current Allnet cu!!lomers to claim the standardltlMl and It"ml,ed crftdltl Allnet will
automatically open an account lor any Cla!!s membf!r who reque,ts c,edlts and executes an authorltatlon 10 o� 'Wt"h
an Account. "'" eh,,. ""'mber Incur. lOcal telephon8 company �Cf'J charge m connecllon wilh U", Gp@f\lng 01 an AII".1
II
account. Allnet will ls�ue credit to the Clas.. mll9mher', act:f)Unt 10' 1M fun amount of .... ch tarvlcft cha'ge upon fII!C�P'
A
ol'� Iocat t�ephone companys bm lOf the !",vtce ctlll rge Anmt(" not r�DOMlbM for any other..w.e char� 'hat w." II
t
�;�=J :!.';�r::'ir:...��8r;t;:�:��\,:t!: =�,1ctI (up 10 maxJrnum of S240.OOO) end of II
administering the settlement described above.
The Sf'ltllemflnl Agrettment further provides thltl upon Iinal npproval 0' the seltlement. the Court ."." ante, a Judgment
dlsml!'lslng with prejudice An clalml of plaintiffs and members of the Class that hAve been or might have been asserted
In this acllon or refate 10 Allne"a billing And disclosure prllctlces lor unanswered cans.
Counsel for the Class hive Investlg"ted the 'acls and clrcumstances regarding the cl'dms egaln.. Allnet and thetr defenSM.
In ylpw ot those circumstances. ... tOf' the Cia,. have concfuded th.t thle settMment Agreement Ie ,.Ir and raesonable .nd In
coon
the best Interest. of the Clan.
III. HOW TO FILE A PROOF OF CLAIM
To reretve SettlemtH'1t Credtta a Cnh Refund. you must provIde all of the Informanon requested In lhe Proof 01 Cfalm
Of
al lhe end of this Holtee and r.turn It 10 the Clerk 01 tM Courl al Ihe addreu fndk:aled below. postm.... tced no lalllM'
than July 28. 19811. The PrOo' of Claim must be signed by lhe Class member " the Class member I, not In Individual, An
Of'.
authorized representative. An claims.re sublect to conflrmatton Ind �proval. PLEASE FILL OUT fHE CLAIM FORM CAREFUllY.
IV. NOTICE OF SETTLEMENT HEAIIING
A settlement hearing wttI be held on June 28. 1988 befor.the Honorab'e Judge Anna Olgg' Ta or, Un"ad StatM
a I T f- t
��::�r:���:r;�':t��:t2:��,:,:;:� �::: ::=������o.:.�� �o��=by ::'� �s:.�..:r�r::;:'�t::. �nd
adequnt •.
At the selllemenl hearing. counsel tor lhe Class shall petition the Court 'or an aWArd of aUorney!' feM and expenses not
�����::'orS ���:o�. a:��t1����$�f.;:' ��t :!�r;rn�":xt���:!I��c,:;,��al�d���'1:r',I�:'t�:�:lfree::.�. r�=r,::�:I::�nsM \
shall not reduce any of Ihe Settlement Credits or Cash Refunds avallabte to Class memhe'"
Any Class member wl!';hlng to appear and he heard at the Spltlement Hearing must file a notice of Intenllon to apPAAr \
with the Clerk 0' the Court, which nollce must be postmarked no later than June 18, 198f'- "Iuch CI.,s member
ohlp.clS 10 any one or mo,e terms 01 the Settlement Agreement. the notice of Intention to appflar must be BCC"ompanlftd by a
stalement 01 the basl'J tor this obJection. A Class member may nl'\o oblect 10 the Settlement Agre8mf'nt without
personally appearing at the Hearing by filing written obJections to the Settlement with Ihe Clerk of the Court no laler than
June 18. 1988. A copy of the obJection! In any case must also be �rved upon lead counset for the plalntl" clan. Sachno" Weaver
& Rubenstein. Ltd., AflenUon: Aline' S.Wemenf. 30 South Wacker Drive. Suite 2900, Chicago, 1111na1.60808. You will not be
heard at the Hearing entitled to conte!!! the Proposed Seltlement unless you me and
or your object� In
\181''''
accordance wllh th.foregoing Instructions.
V. IF YOU HAVE ANY QUESTIONS ABOUT THIS NOTICE 011 THIS LA WSUIT
"you have any qup.sllons about this Notice. the attached Prool nt Claim, the ....w.ull or the A.t....lnehl. you may write to·
Ann g��=�E�
� :LUb�:7�1�:r;.��i SHOUlI) BE MAtlE TO AllNET, COUNSEL FOIl PLAINTIFF.,
011 THE COURT.
We think you 'II find this issue to another 2600 computer bulletin
be most informative and education­ board, this one in the Washington
al. At last we've devoted some space DC area. This one is PC­
to the subject of computer viruses. P ursuitable and you can reach it at
But we've done it in a way no (703) 823-6591. Hopefully, we'll
other magazine has yet done. For expand to the west coast by next
the first time, you can read what issue.
goes through the mind of someone Remember that 2600 meetings
who deliberately plants viruses in now take place on the first Friday of
computer systems. And you can also the month only. See page 41 for
see what measures are being taken details. Turnout has been quite good
to thwart this person's efforts. in recent months.
We're happy to announce yet

STAFFBOX

Editor-In-Chief
Emmanuel Goldstein

Office Manager Production Cover Art


Bobby Arwatt Mike DeVoursney Ken Copel

Writers: Eric Corley, John Drake, Mr. French, Chester


Holmes, Lex Luthor, Phantom Phreaker, Bill from RNOC,
David Ruderman, Bernie S., Silent Switchman, Mike Yuhas,
and the usual anonymous bunch.

2600 (ISSN U74'1-385I ) i.1 puhlished lIIon/hll" hI" 26UU t·n/erprise.1 Inc.. 7 S/rong:- Lane. SetauAet . .\}" 11733.
Second class pm/age pennit pending at Setauket. Sell lork.

POSTMASTER: Send address changes to 2600. P.O. Box 752. Middle hland. :'lOY II95.HJ752.

Copyright ' 19�HL 2600 Enterprises Inc.

Yearly subscription: U.S. and Canada $15 individual. $40 corporate.


Overseas $25 individual. $55 corporate.
Back issues available for 19H4. 19H5. 19H6. 19H7 at $25 per year. $30 per year overseas.
ADDRESS ALL Sl:BSCRIPTION CORRESPONDENCE TO: 2600 Subscription Dept.. P.O. Box 752.
Middle Island. NY II953-{)752.
FOR LETTERS AND ARTICLE SUBMISSIONS, WRITE TO: 26{)() Editonal Dept.. P.O. Box 99. \1iddlc
Island. :'lOY 11953-0099.
2600 Office Line: 516-751-2600
BBS #1 (OSUNY): 914-725-4060
BBS #2 (CE:'IiTRAI. OFFICE): 914-234-3260
BBS 113 (YOYODY:'IOE): 402-564-45IH
BBS 114 (BEEHIVE): 703-H23-659I
USE)I;E I ADDRESS: 26OO@dasys l .UUCP
ARPANET ADDRESS: phri'dasysl !26OO@ nyu

Summer 1988 2600 Magazine Page 3


n Form of Protection
by Ross M. Greenberg the o peration of your disk is in order. For
those who aren' concerned , turn the page
What Is a Trojan? or something.
Back in the g o o d o l d d ays ( before Data is preserved on a disk in a variety
the re were c o m pute rs ) , the re was this of d i fferent physical ways having to do
bunch of soldiers who had no chance of with how the data is encodi ng in the actual
beating a superior force or of even making recording of that data. The actual struc­
it i nto their fortress. They had this nifty ture of that data , however, is the sam e
i dea: presen t the other s i de with a g ift. between MS-DOS m achines. Other oper­
Once the gift had been accepted, soldiers ating system s have a diffe rent structure ,
hiding within the gift would sneak out and but that doesn't concern us now.
overtake the enemy from within. Each disk has a num be r of "tracks " .
We can o n l y t h i n k o f the i ntel lectual T h e s e a r e s o m e t i m es c a l l e d cyl i nders
giants of the day who would accept a gift from the old type I B Mers . These are the
large enough to h o use e n e m y soldiers sam e people who call hard disks DAS Ds
without checking its contents. Obviously, ( D i rect Access Storage Devices), so we
they had l i ttle o p p o rtunity to watch old can safely ignore their techno-speak, and
World War II m ovies to see the same j ust c a l l t h e m tracks. Tracks c a n b e
device used over and over again. thought of a s the individual little grooves
C o ns i d e r t h e types o f people w h o on an audio record, sort of.
would b e thrilled a t t h e concept of owning Anyway, each track is subdivided into
t h e i r own roug h h e w n , l a r g e w o o d e n a num ber of sectors. Each track has the
horse ! Perhaps they wanted t o b e t h e first sam e number of sectors. Tracks are num ­
one on their block, or something silly like bered, as are sectors. Any given area on
that.
Anyway, you're all aware of the story of "Typical Trojan programs
The Trojan Horse.
Bringing ourselves a bit closer to the
cause damage to your
reali ty we've all grown to know and love , data, and were designed
there's a m odern day equivalent: getting a to do so by the worms
gift from your B B S or user group which who writhe in delight at
contains a little gem which will attack your
hard disk, destroying whatever data it con­
causing this damage. "
tains.
In order to understand how a potential­
the disk can be accessed if a request is
ly useful program can cause such damage
made to read or write data into or out of
when corrupted by some m isguided soul,
Track-X, Sector Y. The read or write com­
i t's useful to understand how your disk
mand is given to the disk controller, which
works, and how absurdl y e asy i t is to
is an interface between the com puter itself
c a u s e d a m a g e to t h e data contai n e d
and the hard disk. The co ntroller figures
thereon. So , a brief technical discussion o f

Page 4 2600 Magazine S ummer 1988


For You and Your Computer

out what commands to send to the hard to the next cluster. That i ndex is called the
disk, the hard disk responds and the data File Allocation Table, com monly abbreviat­
is read or written as directed. ed to " FAT" . The FAT contains an e ntry for
The first track on the hard disk typically each cluster on the di sk. An FAT entry can
will contain a small program which i s read have a few values: ones which i ndicate
from the hard disk and executed when you that the cl uster is unused, another which
fi rst power up your m achin e . The powe r i nd icate s that the associated clu ster has
u p s e q u e nce i s c a l l e d " b o o ti n g " y o u r be e n d a m ag e d s o m e h o w and t h a t i t
m achi n e , a n d therefore t h e first track i s should be marked a s a "bad cluster" , and
known as th e "boot track" . a pointer to the next cluster for a given file.
In order to read i nformation from your This allows for what is cal led a linked l i st:
disk in a log i cal sequence , there has to be once you start looking u p clusters associ­
s o m e s o rt of i n d e x . A n u n us u a l i n d e x ated with a given fi le, each FAT entry tells
m e th o d w a s s e l e c t e d f o r M S - D O S . you what the next cluster is. At the end of
I m ag i n e g o i n g t o t h e c a rd i n d e x i n a the linked list is a special indicator which
l ibrary, looking up the title you desire , and i ndicates that there are no more clusters
getti ng a place in another i ndex which tells associated with the file.
you where o n the racks the book is stored. There are actually two copies of the
Now, when you read the book, you discov­ FAT stored on your disk, but no one really
er that only the first chapter of the book is knows what the second copy was intend­
there . In order to find the next c hapter of ed for. Often , if the first copy of the FAT is
the book, you have to go back to that mid­ corrupted for some reason , a clever pro ­
dle i ndex, which tells you where the next g ram m e r could recover i nformatio n from
chapter is stored. This process continues the second copy to restore to the primary
until you get to the end of the book. FAT. These clever programmers can be
Sounds pretty convolute d , right? You called "hackers" , and should not be con­
bet! However, this is pretty much how MS­ fused with the thieves who break into com­
DOS does its "cataloguing" of files. puter systems and steal thi ng s , or the
The d i re c to ry structure o f M S - DO S "worms" [Joanne Dow gets credit for that
allows for you t o look up an item called the phrase !] who would get joy out of causing
"first cluster" . A cluster represents a set of you heartache !
co nti g u o u s ("touching o r i n co ntact" But that heartache is exactly what can
according to Random H ouse) tracks and happen if the directory (which contains the
sectors. It i s the smallest amount of i nfor­ pointer to the first cluster a fil e uses), the
matio n which the fil e structure of M S-DOS FAT (wh ich c ontai n s that l i n ked l i st to
knows how to read or write . other a re a s on the disk which the f i l e
Based on the first cluster number as uses), or other areas of the d i s k g e t cor­
stored i n the directory, the first portio n of a rupted.
f i l e can be read. When the i nformati o n And that's what the l i ttle worms who
contained there i n i s exhausted, M S-DOS create T rojan programs do: they cause
goes to that secondary i ndex for a poi nter what at first appears to be a useful pro-

(continued on next page)


S ummer 1988 2600 Magazine Page 5
Protecting Yourself
g ram to e ve ntually corrupt the im portant A new breed o f p ro g ra m s has t h e
parts of your disk. This can be as simple capability of n o t o n l y reserving m alicious
as changing a few bytes of data, o r can damage lor a given evenl's occurrence,
include wiping entire tracks clean. but of also replicating itself as well.
Not all progra ms which write to you r This i s what people refer to when they
hard disk are bad ones, obviously. Your mention the term "Virus Program".
word proce ssor, spreadsheet, database, Typically, a virus will spread itself by
and utility progra m s have to write to the replicating a portion of itself o nto another
hard d i sk. Som e of the DOS program s program. Later, when thai normally safe
(such as FOR M AT ) , if u sed i m prope rly, program i s run it will, in part, execute a set
can also erase po rtions of your hard disk of instructions which will infect other pro­
causing yo u m assive a m o unts of grief. gram s and then pote n tially, trigger the
You'd be surprised what damage the sim ­ Trojan portion o f the program contai ned
p l e " DEL" com m and c a n do with j u s t a within the virus.
sim ple typo. The dange r of the virus program i s
But what defines a Trojan program is twofold. First, it contains a Trojan which
its delivery m echanism: the fact that you're will cause damage to your hard disk. The
run n i ng s o m e t h i n g y o u d idn't e x pect. second danger i s the reason why every­
Typical Trojan progra m s cause damage to one is busy building bomb shelters. This
your data, and were designed to do so by danger i s that the virus program will infect
the worms who writhe in delight at causing other program s and they in turn will infect
this damage . May they rot in hell -- a m i nd other program s and so forth. Since it can
is a terrible thing to waste ! also infect programs on your floppy disks,
Considering the personality required to y o u c o u l d u n k n o w i n g l y i nf e c t o t h e r
cause such damage , you can rest assured machines ! Pretty dangerous stuff, all right!
that they have few friends, and even their Kenneth van Wyck, one of the com put­
mother doesn't like to be in the same room er folks ove r at Le high U n i versity, fi rst
with them . They sit back and chortle about brought a particular virus to the attention
the damage they do with a few other lowly o f the com puter com m unity. This virus
worm s. This is thei r entire social universe. i nfects a program , which every M S-DOS
You should pity the m . I know that I do. c o m p u te r m ust h ave , called
What is a Virus? COMMAN D .COM. This i s the Com m and
Troj a n progra m s a re but a d e l ivery L i n e I n te r prete r and is t h e i nte rface
m echanism , as stated above . They can be between your keyboard and the MS-DOS
im plemented in a clever manner, so that operating system itself. Whatever you type
they only trigger the malicious part on a at the C> prompt will be interpreted by it.
certain date, whe n your disk contains cer­ Wel l , the virus subverts this intended
tai n i nformation or whateve r. H oweve r function, causing the i nfection of neighbor­
they're coded, though, they typically affect ing COM MAND.COMs before continuing
the disk only in a destructive m anner o nce with normal functionality of the com m and
triggered. you type d . Afte r a ce rta i n n u m b e r o f

Page 6 2600 Magazine S ummer 1988


From Infection
"infections" , the Trojan aspect of the pro­ son . I chal lenge them to upload a virus or
gram goes off , causing you to lose data. other Trojan horse to m y BBS that I can't
The program mer was clever. But still a disarm . It is doubtful the chall e nge will be
wo rm . And sti l l deserv i n g of co nte m pt take n : the profil e of such a perso n pro­
i nstead of respect. T h i n k of what good hibits the m from attacking those who can
purposes the program mer could have put fight back . Alas, having a g o w i th this
his or her talents to instead of creating this lowlife would be amusing for the five m in­
dam age. And consider what this program ­ utes it takes to d i sarm whateve r t h e y
mer m ust do, in covering up what they've i nvent.
done. They certainly can't tell anyone what "Go ahead , you good-for-nothing little
they've accom plished. Justifiable hom icide slimebucket: m ake my day ! "
comes to mind, but since the worm s they Alas, somebOdy o u t there o pted t o d o
must hang around are probably as disrep­ t h e cowardly thi ng a n d use t h e FLUSHOT
utable as they are , they must hold thei r l it­ programs as a vehicle fo r wrecki ng sti l l
tle creation a secret. more destruction on people like you . The
A pity. Ho pefu lly, the worm is losing F L USH OT3 program was red i str i b uted
s l e e p . O r g e tti n g a sore neck l o o k i n g along with a co m panion program to aid
b e h i n d t h e m wo n d e r i ng w h i c h of t h e i r you i n reading the documentation. It was
"friends" are gonna turn them i n . renamed FLUS HOT4. And the reader pro­
T h e Challenge t o t h e Worm gram was turned into a Trojan itself.
When I first released a program to try (continued on page 28)
to thwart the i r d e m e nted l i ttle efforts, I ,...""
... ....
"" ..
published this letter. What I say in it sti ll
holds:
"As for the designer of the vi rus pro­
gram : m ost l i kely an i m potent adolescent,
i ncapable of normal social relationships,
and attem pting to prove their own worth to
themselves through these types of terrorist
attacks.
" Never succeeding in that task (o r in
any other), since they have no worth, they
will one day take a look at themselves and
what they've done in thei r past, and k i l l
the m s e l ves i n disgust. T h i s i s a Good
Thing, since it saves the taxpayers' m o ney
which normally would be wasted on thera­
py and treatment of thi s m i screant.
"If they really want a challenge, they'll
try to destroy my hard disk on m y B BS,
instead of the disk of some innocent per-

Summer 1988 2600 Magazine Page 7


th.e d.a.rk. sid.e

by The Plague spiny blinking sphere) as it e ntered the


I'm sure you've heard about computer resistors on the m otherboard (come on,
viruses. But what you were probably fed are the se guys for real ? ) . This was fol ­
was misinfo rm a ti o n . This arti c l e wi l l lowed by a g u y w h o clai m e d to be t h e
attempt t o de-mystify your pe rceptio n of i nventor of the virus, which is absolutely
the computer virus, give you the facts, as bogus, because the com puter virus was
well as teach you how to create your very not invented by any one perso n . I don't
own virus. This is not a second-hand or even know why he decided to claim the
bystander e xplanation of viruses; I have credit -- irs nothing to be proud of.
had first-hand experie nce in the writing, M y e xpe rie nce with viruses co m e s
distribution, and tracking of my very own from writi ng CyberAIDS, a virus for the
virus, so I'm quite knowledgeable on the Apple II fam ily of com puters. This is the
subject. M o st viruses do destro y data. fi rst and only virus for the Apple which
They also spread som ewhat exponentially o perates under Pro DOS that I know of.
when unnoticed and not controlled. The Due to ease of u se of the ProDOS MLI
beauty of the com puter virus is that it per­ ( Machine Language I nte rface) , it was
fectly m i m ics a real virus or small organ­ i ncredibly easy to write the virus. This is
ism , thus having the potential of being a because I did n't need to deal with the
great tool in artificial intelligence. I will not hardware directly, only make a few simple
write about how to protect yourself from a system calls (Le., read block, write block,
virus, because that would defeat the pur­ o pen fil e , close file, etc. ) . The fact that
pose of thi s article , and anyone with com ­ Pro DOS runs on the e ntire spectrum of
mon sense already knows how to prevent the Apple II fam ily also allows my virus to
being i nfected. reach the broadest audience available .
Recently, viruses have been a very hot The ProDOS MLI i s ve ry s i m i l ar to the
issue in the m edia, but I assure you that operating systems of most personal com ­
I'm n o t j u m p i n g o n t h e bandwago n puters, m ini-compute rs, and mainframes.
because my virus has been around long Thus the virus can be adapted to run on
before the term "com puter virus" was ever any com puter, so don't make the sam e
mentioned in the media. The media has a m istake that the Apple community made ,
very shallow understanding of what a virus that is in thinking that a virus will never
is. Exam ple s of the media's reporting of appear for their computer. Operating sys­
com puter viruses include the article in the tem s with similar calls and characteristics
February 1, 1988 issue of Newsweek writ­ as Pro D O S M L I are M S - D O S , U n i x ,
ten by William D. Marbach and Richard AmigaOOS, Atan's TOS, and Macintosh's
Sandza called " I s your com puter infected? OS.
Syste m s fal l to s i l e n t and contag i o u s I was asked whether I had any moral
killers." Another report appeared on ABC fee l i n g s a b o u t v i ruse s , or w h e t h e r I
World News Tonight in late February, and thought that they were wrong , or evil, or
I must say that the com puter ani m ation whatever. My feelings are the fol lowing : I
was quite good. It showed the virus (a pink don't care one way or the other. If people's

Page 8 2600 Magazine S ummer 1988


c:>f'V"ir'-1ses

data i s destroyed , the n so be i t. If people giving the m at least a good start.


are stupid e n ough to accept pirated soft­ My m a i n concern abo u t my project was
ware, the n the y de serve to be p u n i shed. how to track t h e s pread o f the viru s , i n
The fact i s that m o st busi n e s s PC u sers order t o gather data. T h i s data cou l d be
will never be infected w i th a virus u n l e s s u se d in the future to m a ke better, stronger,
t h e y downloa d p u blic do m a i n or pirated and m ore deceptive viruse s. The technolo­
software. A l s o , busi n e s s e s m ay be affect­ gy behind the virus has com e a l o ng way
ed if som eo n e in the organization decides s i nce the 1970's. It's a field yet to be fully
to i nfect t h e syste m , in w h i c h ca se the explored and appreciated by the com puter
destruct i o n is not preven t a b l e, because com m u n i ty. I, for o ne , h o p e that people
the person d o i ng the i nfecti ng wou l d have becom e m ore aware of the com pu ter virus
enjoyed des troying da ta even if viruses and that they take measures to protect
didn't exist. A s for people who u se their
computers for ho m e/entertainment/hobby, liThe beauty of
they are the o nes m o st su sceptible to the
viru s revo l ut i o n. They sho u l d be wary of
the computer virus
software that was not previo u sly tested by is that it perfectly
other s . Nowa d a y s, i t' s beco m i n g qui te
d a ngero u s to a ccept s o f t w are 'off t h e mimics a real virus
II
street'. I hate to u se t h i s expression, but
or small organism.
'viruses d o n't kill data, people kill data'. A
viru s i s perf e c t l y harmle s s u n l e s s i t i s
bei ng spread b y people wi l l i ngly/u nwi l l i ng­
l y. T h eref ore, p e o ple m u s t t a k e t h e their data. The !deal scenar i o wo u l d be
re spo n s i b i l ity t o protect them selves a n d compu ter compa nies rewri ting their o per­
others by taking precauti o n s. Th i s w i l l not ating system s to be virus-resi stant. In the
be d i scussed i n this article. l o ng run, the computer virus may strength­
Creating a virus i s by no m ea n s a s i m ­ en o u r d ef e n s e s a g a i n s t d a t a l o s s ,
ple project. Anyone who has e ver attem pt­ whether i t be due to viruses, trojan horses ,
ed t o wr i t e a v i r u s , or a n y c y be r n et i c power o utages, or unauthorized u sers. My
orga n i s m for that m atter, w i l l tell y o u about m ai n h o pe is that the threat of the viru s
the d i fficu l t i e s and tribulations involved. If w i l l h e l p curb software p iracy a n d a l l ow
anyt h i n g , I'm quite u p set that m ost peo p le software co m panie s to pro sper. If a per­
d o n ' t rea l i ze w ha t an acco m pl is h m e n t thi s s o n k n o w s that he s t a n d s a c h a n ce of
i s. One person even tol d m e , "Hey, any­ be i ng i nfec te d by a c ce p t i n g pirated or
bo d y co uld wri te a viru s. T h e re a s o n I modem distributed software , he w i l l realize
never wrote one is becau se i t's wrong to that he's m uch better off buying the soft­
do s o." We l l , he wa s wro ng at the t i m e ware and receiving the docum e ntati o n as
becau se i t i s quite d ifficult t o wri te a virus well.
com pletely fro m scratc h. But perhaps thi s H ow The Virus Works
article will al low anyone t o wri te a v irus by Before I go any further, let me just say that

(continued on next page)


Summer 1988 2600 Magazine I'al(e 9
straight frc>IX1

a virus shou l d be written i n asse m bly lan­ the destruction of protected software (i.e .,
g uage, 'C', o r a n y o the r l a n g u a g e that the Amiga vi rus, which wo uld not affect
al lows l ow-level functions (byte manipula­ standard disks but would destroy protect­
tion, syste m ca lls, m e m o ry m o v e s ) . I ed disks due to their non sta ndard f i l e /d isk
-

do ubt you can write a v irus in BAS IC o r fo rm a t ) .


PASCAL (a troj a n horse m aybe, but cer­ How The Virus Spreads
tainl y not a virus). Viru s e s in the fut u r e All v i r u se s sp read This is what m akes
.

m ay be wri t t e n i!"l Prolog o r L I S P a n d them d i stinct from t roj a n horses. Whereas


inco rporate artificial inte lligence . a trojan horse program simply wipes out
As an example, i'li discuss t h e your hard drive when you run it o nce or
CyberAIDS virus, which was written p urel y twice, a v irus will attach itself to normal
in 6502 A s se m bly. Cyb e r A IDS is a n applications o r disks and make them carri­
" ap p l i ca tion r e sid e n t' v i r u s ( s e e Virus ers. Care must be taken t ha t the virus will
Types). Most viruse s must m ake them­ only infect one file each tim e the infected
selves perf'1anentn the storage device i:1 ap;Jiication runs, rtlUS making sure that the
order to continue reproduction. See !tie time before the original application exe­
Virus Types section for a detailed cutes is kept to a minimum. This will a l l o w
description of the various Methods that the virus to go unnoticed during the user s '

viruses use for reproduction and where da ily activities. You can run a virus-infect­
tiley may hide themselves e d program a hundred t im e s and it will
After attaching itself to a file or disk behave n orm al ly with the e xc e ptio n that it
that was previously u n i n fec ted , the actions will make copies 01 the v iru s portio n and
of any part i c ular virus may vary, but the attach itself to other disks/applications, but
virus wi l l check the d is k co un ter b e fo re when yo u run it the final time, it will per­
pr oc ee ding to any intended action o ther form its inten ded activity. Since only tha t
than rep rodu ct i o n The disk co unt e r , an
. copy of the virus has detonated, you are
individual byte som ewhere o n the infected still left with perhap s doze ns o f i nfecte d
di sk , kee p s track of how many ti m e s the file s which will not d eto n a te until they are
viru s has acce s sed that particular di s k, run several hundred time s ( and thu s will
a n d thu s a s sure s t h at the vi r u s will not spread the virus even m ore).
d e tonate pre m aturely. So m e vir u s e s are T he be nefit s o f an a ppl ica t io n resident
to tally h arm le s s and print a s i m pl e text v i ru s s u ch as Cybe rAI D S are s e v e ral.
m e s sa g e ( such as the Macintosh virus), Since no new files are ever created on the
while o thers are cr e ate d to cause h arm disk by the virus, the user will prob ably not
a nd/o r to d e s tro y data (like CyberAIDS). notice a n yt hi n g is wro ng. Instead, normal
T he re are still o ther viru se s which were a p plicatio ns are m od ified b y the vir u s to
not o ri g i na lly m eant to be destructive, but execute v i ra l cod e . When individual fi l e s
due to the fact that they come between an (non-text executable code fil e s) are infect­
o p e r ating s y s t e m a n d it's applic atio n s , ed the viru s can be spread i n three ways:
,

cau s e h a r m n o n ethe le s s. This harm is (1) The man u al copying of the file from
u s u a l l y in the fo r m of system crashe s or disk to disk by the u ser. User-group disk

Page ]() 26()O Magazine Summer 1988


the sC>"CI.rce

distri bution can achieve the best res u l ts a. Make sure vol u m e is not write
when this method of reprod uction is used . protected
(2) The automatic copyi n g of viral code b. Make sure vo l u m e is on l i n e
Ily the viru s itse l f to non-i nfected files i n ( n o I/O error)
other drives or t h e hard d isk. U s ua l l y 2. I n cre m e n t d i s k c o u n te r ( S e e
s erves t o g ive the virus a better foothold NOT E 1) a n d go t o destroy (See NOTE2)
within a particular user's software l i brary. if necessary.
(3)The transfer of i n fected files o ver 3. Check for enough space on vol­
the m o de m . The i n fe c ti o n h as a g o o d ume.
c hance (wh e ther by acc i d e n t or o n pur­ 4 . Choose candidate f i l e .
plose ) of reachi ng public domain or pi rate a . Fi le m ust b e a system or appli­
bulletin boards . The d istri buti o n of that file cation fi l e .
wi l l be i ncredi b l e . I n fected fi les may also b . File m ust not be al ready infect­
b e s pread thro ugh LAN's ( L o c a l Are a ed (cho o se ap pro pri ate m e tho d for
Nletworks) . ide nti fying i nfected fil es) .
Application Resident Virus Outline c. Fi le m ust be small enough to
A. INI T I A L IZ E . a l l o w viral attac h m e n t (so t h a t t h e
1. F i n d curren t locat i o n o f virus i n appl icati o n and virus c o d e bo t h fit i n
m e mory. m e m o ry).
2. Relocate itself to predefi ned m e m ­ d . If the fi le is locked then unlock
ory locati o n . it.
3. M a ke sure D O S i s a c t i ve a n d C.INF ECT.
ready t o accept system calls. 1. Open candidate file .
4. Move original application header 2. Load first block of candidate fi le
i n to a m ai n . buffer.
1NThe V irus may 3. Take first (6 by1es) and save to
even call its creator alt.buffer (also known as S H ) .
4 . Calculate viral location in new fi le .
and allow the a . V i raI . Addr= Appl icatio n . S tarl. Addr
Length.of.Application 6
transfer of data 5.
+ +

Store a J U M P Viral. Addr at begin­


from t he infected n i ng of file.
" 6. Rewrite main.buffer.
sys tem. 7. Set file poi n ter to end of fi le (for
appe n d ) .
8. Wri te the alt.buff (6 bytes).
(6 by1es) back to ori g i nal m e m ory. 9 . Write the viral code afterwards.
10. Cl ose candidate file.
B. S EARC H . D . DESTROY (Optional).
1. C h o ose ra n d om vo l u m e (d i s k 1. Lock out Keyboard and Reset Key
,device). if possible.

(continued on next page)


Summer 1988 2600 Magazine Page 11
2. Destroy data. unless the viral code can run anywhere in
a. R e c o g n i z e all d i s k device s memory, it must be able to relocate itself
( hard disks, floppies, 3 .5" , ram) . i nto a pre-set memory location where it will
b. Wipe out the directory ( FAT) run.
blocks of each device .
c. Wipe out key block for each file (a) Normal (not i nfected file)
in each d irectory block. t----t---------------------t----t
3 . Do graphics and music (optional). I SH I rest of application I EOFI
a. Totally up to virus writer. t----t---------------------t----t
4. Present text message (optional ) . (b) I nfected file
a . Totally up to virus writer. t----t---------------------t----t-·--t-----t

E . LEAVE. I JC I rest of application I SH I VC I


1 . Jump back to Application.Start.Addr EOF I
a. T h u s conti nue as i f nothing t----t---------------------t----t----t-----t
had happe ned.
SH = Standard Header (fi rst few bytes
NOTE 1 : The disk counter i s a particu­ of the original file's executable code) .
lar byte on the disk that the virus uses to J C Jump Code (jum ps t o the address
=

hold the value of how many times that of the virus).


vi rus has run with that particular disk VC Viral Code (see Virus Outline).
=

i nserted (active). EOF End of File.


=

NOTE2: DESTROY or LEAVE is exe­


cuted depending o n the status of the disk Boot Block Resident:
counter. Activated upon boot . U sually loads
Virus Types additional program code from other blocks
Application Resident: on disk. This is quite i nvisi ble as files are
H i d e s in a p p l i c at i o n s ( s e e Vi r u s never altered , and blocks used by the
Outline). Patches an appli cation ( o r sys­ vi rus on disk are designated as busy for
tem file, .EXE, .COM , . SYS file) so that the protecti on. The Amiga vi rus is a perfect
virus i s appended at the end of the file and exam ple.
a call to the virus is provided at the begin­
ning of the file. The original beginning of
the file i s saved to the end of the file as Memory R esident:
wel l , as it w i l l be moved back ( S H is R e s i d e s in me m o r y . U s u a l l y a
m oved back to where JC is, see Figure 8) terminate and stay utility that can be acti­
i nto place at the beginning of the file when vated by any event (clock, keyboard , DOS
the virus executes, thus allowing the appli­ call). On multi-tasking systems (such as
cation to execute normally after the viral Unix, Xenix, OS/2) it can be a background
chores are completed. Due to the different task. It will usually allocate m e m o ry for
position of the viral code in each infected itself from the memory m anager.
file ( because of different file lengths) and

(continued on page 14)


Page 12 2600 Magazine Summer 1988
BUILDING A RED BOX
by J.R. ''Bob'' Dobbs Circuit Operation
Essentially, the red box is a Each time the pushbutton is
device used to fool the phone com­ pressed, it triggers half of ICl, con­
pany into thinking you are figured as a monostable multivi­
depositing coins into a payphone. brator to energize the rest of the
Every time you drop a coin into a circuit for a length of time deter­
payphone, the phone signals the mined by the setting of the coin
type of coin inserted with one or selector switch. This in tum starts
more bursts of a combination of the other half of ICl, configured as
1 700 hz and 2200 hz. The tone an astable multivibrator, pulsing
bursts are coded as follows: on and off at regular intervals at a
Nickel: One 60 millisecond rate determined by the SDk pot
pulse between pins 12 and 13. The out­
Dime: Two 60 millisecond puls­ put of the astable thus alternately
es separated by 60 milliseconds powers of IC2, configured as a
Qu arter: Five 35 millisecond square wave oscillator, providing
pulses separated by 35 millisec­ the required 1700 hz and 2200 hz
onds to the op amp which acts as a
How to Use It buffer to drive the speaker.
Operation is simple. Simply dial Construction
a long distance number ( some Assemble the circuit as you
areas require you to stick in a gen­ wish. Component placement is not
uine nickel first ) , wait for the critical. I found the easiest method
ACTS computer to demand your was to use point-to-point wiring
cash, and press the "deposit" bu t­ on a "universal" PC grid board
ton on the red box for each coin with solder ringed holes. Use sock­
you want to simulate. The coin ets if you aren't a whiz with a sol­
signals are coupled from the red dering iron. Be sure to leave easy
box into the phone with a small access to the potentiometers for
speaker held to the mouthpiece. alignment.
For local calls, either you must Alignment and Testing
first d eposit a genuine nickel For alignment, a frequency
before "simulating" more coins or counter and triggered sweep oscil­
place your call through the opera­ loscope are extremely handy (but
tor with 0 + 7d. Use some care not absolutely necessary ).
when the operator is on the line -­ Install a temporary jumper from
sometimes they catch on to your +9v supply to pin 14 of IC2 and
beeper ploy. temporarily disconnect the 0.01uF

(continued on page 22)


Summer 1988 2600 Magazine Page 13
how it's done
(continuedfrom page 12)

D OS Resid ent: Slow Disk Data Deg radation :


A virus that's patched i nto DOS and Sim ilar to above , except data is slowly
infects any disk, file, or DOS on disk that's destroyed on a disk with each activation of
accessed during the time that the i nfected the virus. Usually a disk block at a time,
DOS is active. Since DOS is the program but m ay be done a byte or even a bit at a
which runs on the com puter 98% of the lime. This is perhaps the most sinister viral
tim e , it would be advantageous to add actio n as it will take qu ite a long ti m e
viral code to a frequently executed portion before anyone notices anything is wrong.
of DOS (such as Read Block code). The Also known as the 'disk bit spray'.
infected DOS will usually attempt to patch
any DOS on disk and to m ake it infected. Slow Memory Data D eg radation:
Care must be taken to prevent crashes, Data i n memory is m odified a byte or a
thus making sure the virus will only patch bit at a time . Usually done by a memory
DOS versions that can be succe ssfully resident or background task virus. This will
alte red by the virus. Any unrecognized slowly destroy program code and data as
DOS on a disk should be left alone. the person is working at the com puter.
Wei rd things may happen and usually data
Application Oriented : i n t e g r i t y i s c o m p ro m i se d or program
A virus that's integrated into an appli­ crashes will occur at random times. This is
ca ti o n a n d w o r k s c l o s e l y w i t h i t . also known as the 'memory bit spray'.
Application orie nted trojan horses are
quite com mon, but viruses that are inte­ Hardware Destruction:
grated i nto an application are hardly ever A virus will attem pt to de stroy hard­
seen . For exam ple , a packing (file com ­ ware if possible. It usually attem pts things
pression) program such a s ARC o r a ter­ like overloading the address or data bus
m i nal p rogram that i n fects files before by atte mpti ng to activate all peri pheral
packing or transm itting them . cards at the sam e tim e . 'Head Slam ming'
may also be done , a process which allows
Types o f Viral Action older hard disks to have their read/write
Complete Disk Data Destruction: heads slammed at high velocities i nto the
Affects floppy, 3.5', hard disks, ram parking position or into the side of the disk
disks. Usually the m o st co m m on action enclosure . If any mech anical parts are
take n by a viru s . It i s quick and is not pre s e n t in the co m puters ( re lays ) , the
noticed until it is too late . Care m ust be virus will attem pt to wear out or jam these
taken to prevent the user from prematurely devices by turning them on and off at very
stopping the destruction by locking out the high speeds. This may also destroy vari­
keyboard or by giving a text message that ous video and uart chips. Also , the virus
w i ll m ake t h e m fe e l c o m fortable (I. e . , will attem pt to alter the tim e and date in
' Loading Data Segm e nt", 'Checking for any clock card or chip, or even destroy the
files'). pre - s e t con fi g u ration in batte ry-backed
ram.

Page 14 2600 Magazine Summer 1988


and w hy
. C;.4t�� ()NE()FQtJR<
Modem manipulation : .· ·COIVIPOTER BULlETIN
A v i rus that usua l l y attacks B B S sys­ .. BOARDs ToDAVI<
..

tems and is a m e m o ry resident vi rus. It will


activate i tsel f d uri ng the time the B B S is
26QOBBS#1>
not i n use and play wi th the m odem and
the phone l i n e . I t does t h i n gs l ike cal l <9i4L��tJ�()60 . .
E u ro pe directly o r call the pol i ce over and
over. This vi rus may actua l l y ca use the 2600 BBS#2
infected pe rso n to go to j a i l o r i ncrease (CENriALOFFlCE)··· ·
t h e i r p h o n e bil l or both . T h e virus may 914';'234,:;3260
even cal l its creator and a ll ow the transfer *
of data from the infected system. 2600···.BBSIt3··· · ·
, .
.
.. . . ...

(YOYoP'fi4E>
.

That concludes this article. I h o pe you 402�564::4518


enjoyed it. I would l i ke to see so me m o re
viruses out there . To write and distribute a
virus you m ust lose every shred of moral
2600JmsIt4··
f i b e r, and if I k n o w the readers of this
(BEEHIVE)
.
. .. .

m agazine, there will be a com puter virus


·· '()3';'823�659i
plague i n the very near future. So have ALL ()PEN 24liOURS
fun, kids. I f you write a successful virus,
d o n ' t h esitate to re l e ase i t , a n d by a l l
m eans se n d t h e so u rc e c o d e t o 2600.
We'd l i ke to hear from you .

Summer 1988 2600 Magazine Page 15


A READER 'S REPLY
by The Rancid G rapefruit that "today's personal computers" are sup­
Que ry : "What happens to i n e p t c o m ­ posedly equipped with.
puter cri m i nals who g e t caught?" T h i s l e a d s i n t o the " i nform a t i o n i s
Answer: "They open u p 'security' com ­ power" spiel, and the inevitable arrival of
panies and start preaching t o a n extremely ISDN wherein phones and cc. m puters will
g u l l i ble p u b l i c -- usually casting the m ­ beco m e one glorious entity and l ive happi­
selves as so m e kind o f 'hacker e x pe rt' ly ever after.
whereas the only thing they are 'experts' All of this ends up with Zap giving you
at is getting caught." his opinion on "The Dawn of Phreaking",
The opening com ments have absol ute­ the usual mention of Drape r and blue box­
ly nothing to do with Captain Zap, whose ing, fol lowed by a sum mary of the boxes
reputati o n is i m peccable , and we m ost that matches slang to function, and term i­
certainly would not want people to m iscon­ nati n g with a si m pl i fi e d acco u n t of t o l l
strue the com ments as a vicious attack on fraud where Z a p babbles about t h e vari ­
his person. Lord, no . .. . ous OCC's for a whi le.
O bviously, we disagree w i t h Captain Although we were very i m pressed by
Zap's brilliant observations on the state of the programm ing ingenuity of the supplied
"Hacking and Phreaki ng" . If we did agree "Wargames dialer" listing , and find our­
with h i m , we'd hardly be writing this swell selves constantly looking to the first sec­
response , eh? tion of Zap's article when we feel lost or at
"The ongoing wave of com puter crim e a need for guidance, we will regrettably
that is be i n g reported i n t h e m edia around have to let it stand. Since aside from the
the world shows" the shallowness of the ill-chosen "highlights of yesteryear" there
m ed ia's never e nding quest for anything is nothing there th a t hasn't been dis-
that will titillate a technology-ignorant pub­
lic, and push u p the ratings of whateve r
publication or feed happens to be catering
to the public's fear of technology on that
"Rarely is the purpose of
particular occasion. a conference to 'pass
"An I n te rp re t a t i o n o f Com p u t e r information over to other
Hacking" is just that: Captain Zap's per­
sonal opinion on the subject. I n the first
hackers that can work
several paragraphs, Zap essentially sum­ on a problem and plan
m arizes the opening chapter of almost any for more tactical attacks
g i v e n " Be g i n n e r ' s I n t r o d u c t i o n to
to the target system. ",
C o m puters" and s o m e h ow manage s to
pass off observations that have already
been made a few hundred times as his c u s s e d o r o t h e rw i s e s u m m arized t o o
own "ideas". The only real mystery to us i s many times in the past. A s such it would
why he d e c i d e s o n " 1 6 . M e gabytes of be a waste of our time to do so yet again.
RAM" as an arbitrary amount of memory H a c k e r C o m m u n ic a ti o n s ! S h h h h h !

Page 1 6 2600 Magazine Summer 1988


TO CAPTAIN ZAP
Secre t s bei n g exchanged I and actua l l y try som e t h i n g awful l i ke mak­
W h i l e we d o n ' t d i s p u te t h e fact that i n g a bil copy of someone e l se ' s program
people do cal l each o t h e r , so m e t i m e s in and xeroxing its m anual , it's our pe rsonal
large groups hooked together o n a confer· be l i e f that the wo rld will in a l l probab i l i t y
e nce (without paying for i t , g a sp l ) , rarely i s not com e to a n e n d . O f course , we c o u l d
the purpose o f a confere nce t o 'pass i n fo r · be wrong
m ation o v e r to o t h e r hackers that c a n work A l m o s t all po t e n t i a l hackers are l i tt l e
on a p ro b l e m and c o m p a re re s u l t s a n d k i d s with a lot o f t i m e o n thei r hands. and
p l a n f o r m o re tactical attacks to th e ta r g e t most o f those kids w i l l never get anywhere
syste m : The u s u a l rea so n a co nf ere n ce becau se the y Jfe n o t b r i l l i a nt or in any
s t a rts i s beca u s e o n e k i d i s b o r n d a n d way gifted I c qard l e s s o f what
.. the public
v; a n l s to t a l k to a b u n c h of h i s pe e r :: at the th i n k 0 1 trlt?iT l The v a s t m ajority Of
sa.m e ti m e . W!>at takes p l ac e s o n a : r-:l 0 st that the
public v i e w s a s com pi Iter
:, n y (j i v e n nfere nce is a bu 9 C rl I U S G S are q U l :8 a v e rage
(u:F:1 trlQ kds h a ra s s i �: g 1 S P S c pe r J " s " I I ' I "� u p boa rds
i n [uro pc .
8i dnnc: y'ing arl],c r",i'.: t h e' },
can ;\ r-'; :':, o f a t the m o r h : ri L

de
who IS flO/ some th i e a l l i l d i bvi-i'd s " u se . And trle only rea
anon t ri e friend o r re l a ti v e o f s o r:i rtn c y SCI: it's a pr::: b iem t o be g i n with i s because
who u n de rs ta n d s t h e concepts i n Jolved . trle ' ttlrealened' o rg a n i z atio n s o r ca m pa
n o t o n l y the co m m a n d s · w h o thi 0 k s i t n i l! s have ridiculously bad security.
w o u l d be a b l a s t to t u r n o ff C A M A o n a Wh ile i t i s tr ue ttlii! 111 0re pe ople now
few sw i t c h e s , o r d i s ru pt CO S MO S o pe ra own p e r so na l com pute r s than at a n y other
tio n s . A l l of t h i s potential dam age i s m ade t i m e I n h i s t o ry , trw o ve ra l l effect o f t h i s
p o s s i b l e by t h e R B O C ' s t h e m s e l v e s , i n f l u x o f n e w �Iackers i s n e g l i g i b l e . I n stead
wh ich pro v i d e e x t re m e l y m i n i m a l s e c urity of one kid a n n o y i n g h i s l o c a l CO f r o m
that I S m o re o f a study I n fau l t y securi ty i nfo rm ation he found o n some boa rd , there
tech n i q u e s and shoddy organization than a re 10 kids u s i n g the same i nform a t i o n
any k i n d o f o b stacle t o the potential hack­ fro m the same board to hara s s t h e sam e
er. C O . I n s h o rt, t h e re i s a d e l u g e of ' i d i o t
W h i l e 'co m puting power" i s n o w w i th i n s a v a n t s ' w h o a r e c a p a b l e o f d o i ng n o
reach o f a vast n u m be r of p e o pl e , a l m o st m o re d a m age t h a n tra i n e d chi m p s .
a 1 l of that 'vast n u m be r' are i g n o ra n t as to T h e B u l l et i n Board Systems
t h e i r s y s te m ' s p o t e n t i a l . In f a c t , m o st B u l l e ti n board syste m s ( B BS's) po se a
n e v e r g e t be y o n d r u n n i n g the i r s p r e a d · possible threat for the s i m p l e reason that
s h e e t o r d o i n g t a x e s o n t h a t wo nderful P C the m o r e h i g h l y s k i l l e d u s e rs w i l l p o s t
w i t rl " 1 6 M B R A M " . And if t h e y e v e r do pote n t i a l l y dangero u s inform a t i o n i n a
sink into the s o r d i d d e p t h s o f d e p r a v i t y ( continued on next pUf{c)

S u m m e r 1 988 2 6 0 0 Magazill e I'age 1 7


A READER 'S VIEW
place where the "idiot savants" can read it. place is copyright i nfringem ent.
The better versed user's reason for post- Specific Responses to
i n g i t is ego g rati ficati o n . Regard less of Some of Zap's Statements
what he claims, the o n l y incenti ve he has Le t's cover Zap's state m e n ts one by
to post this i n formation is an ego boost. one:
He already knows t h a t t h e "idiot savants" .. " S u c h i nformation like d i a l - u p po rt
are going to do something stupid with the n u m be rs, logons, and passwords are com -
i nformation, at worst sim pl y m aking it val - m o n i n fo r m at i o n ava i l ab l e to t h e m a i n
ue less, d t best flexing their m uscles and hacker population." No shit. I t's also com ·
showing the i r target how vulnerable they mon i n fo rm ation avai l able to anyone who
are to an outside attack, calls up any of the carriers and reque sts it.
G rante d , if B B S's didn't e x i st, m uch of The logons and passwords are usually the
the t rouble vari o u s ;>eo p i e and com panies end result of credit card fraud , and have
now e x p e ri e nce wc uld v a n i s h along with nothing to do with the i ngenuity o f hacking
the i d iot savants". But the only thing the
" i nto a syste m .
boards real l y do i s provide a forum f o r t h e .. Zap's e ntire spiel o n board security,
m o reintelligent USe r S to bask i n the adora· the "select few", and the security of hacke r
tion o f foo l s , T h e y are n o t s o m e great boards takes place for the m o st part i n h i s
organizEd c r i m e w"ve o f the futu re ; they head and nowhere else. The only reason
a r e s i m ply u se d L y s e v e r a l t ho u sa n d m o s t pe o p l e never m ove i nto the se h a l -
bored kids, the g re 2 t m ajority of them try- l owed ranks is beca u se they have some·
ing to l ive o u t s o m e k i n d o f powe r tri p how convi nced the m se lve s that t h i s i sn't
w h i l e thn re m a i n i n g m i n o rity congre gate p o s s i b l e . The o n l y t h i n g s e parating y o u
to g e t h e r be c a u s e t h e y l i k e b e i n g s u r - f r o m anything y o u w a n t t o acce s s i s igno­
rounded by tho se they view a s thei r peers, rance of how the sysops' m i nds functio n
I n s u m m ary, board s are a social medi- and the reality o f how security works, a s
u rn - n o t t h e f o r e f ro n t o f s o m e we l l
-
o pposed t o the ridicu l o u s fanta s i e s pre ·
o rchestrated , nationwide attack on loop- sented by Zap .
h o l e s i n " t h e s y ste m " . J u s t a bo u t a n y Assu m i ng a sysop h a d no l ife outside
i ssue of Soldier of FOi1une contain s all the o f his board , and he got paid by the h ou r
i nfor m ation you could possibly w an t about to s i ft through all o f tho se records of h i s
w h e re t o o btai n b o o k s o n plastic e x p l o - potential users, all he d acco m pl i s h wou l d
'

sive s , n e r v e g a s , special weapo n s , e lec- be to weed o u t people who didn't know


tro n i c device s , and anything else that has how the syste m w o r ke d . An y o n e w h o
been dreamed u p . Y o u hardly need a B B S wanted acce ss a n d understood t h e basics
in o rd e r to have acce s s to that kind of of how to falsify i nformati o n wou l d still gai n
knowledge. In fact n:ost of the i nformation e n tr y , a n d the e n d r e s u l t is a s e c u r i t y
po sted o n t h e " d e a t h a n d d e structi o n " breach . There is n o such thing as perfect
subs of boards is a word-for-word copy of security. When anyone " b u i l d s a be tte r
so m e arti c l e that o r i g i n a l l y a p p e a re d i n m o u s e trap " , a few days late r an i nventive
one o f these boo k s . The only cri m e taking person will "build a better m o u se " .

Page 18 2 600 Magazine Summer 1988


OF THE ZAP AR TICLE
In any case, the security exam ples pre­ off Blottoland and b e i ng declared " u n ­
sented by Zap do not exist on any private cool !" (The horror!)
or "elite" phreak or hacker B B S now i n It is impossible for anyone to enforce
existence . If t h e sysop claims that is what any " r u l i ng " o ve r a n y o n e e l se in t h e
they do, it's sim ply meant to scare poten­ modem com munity. The boards are n o t all
tial users into submitting valid i nform ation i nterconnected and what one person , or
which the sysop doesn't bother to verify group of people, declares as "law" on one
beyond the telephone number. system , or set of systems, is utterly mean­
... Disclaimers and Clauses: Whether ingless to the hackers the next area code
Zap's c o m m e nts o ri g i n ate from actual over. And even to the people involved with
ignorance or sim ply a desire to knowingly those specific systems, it only pe rtains to
m isinform , is u nknown to us . them if they want to play the game . There
A disclaimer, any disclaimer, will have is nothing preve nting an "exiled" pe rso n
very little value in any kind of legal situa­ from picking up a new handle and starting
tion. While the sysop m ight feel better if over.
"it's not my fault" and "for i nformation pur­ Aside from the com p lete i m possibility
poses only!" are splattered over every part of enforcing such "rulings" over anyo ne
of his board, it isn't going to make any dif­ but the most brain-dam aged kids , all of
f e r e n c e to a ny j u d g e i n a ny c o u r t ' this is nothing more than a history lesson.
D iscl a i m e rs are n o t l e g a l l y b i n d i n g . All
(continued on next page)
they do is take up space and lull sysops
into a false sense of security.
Thinking you're safe because you have
a good disclaim er translates out to "igno­
rance is bliss" . If you haven't had any trou­ WI LL PAY
$ 1 ,000
ble with law enforcement agencies to date ,
it only means that they don't know about
your existence ( buried as you are amongst F O R EARLI EST I N F O RMATIO N
LEAD I N G T O ARR E ST
1 ,000 other quasi -legal B B S ' s ) , or that A N D PROSECUTION
they know and don't care because you WITH I N NEW YORK AREA OF
aren't doing anything that they're worried •CALLING ROOM OPERATORS .'
about. •BLUE BOX OPERATORS ::
•COMPUTER HACKING INVADING � , .:. ! '
... Tele-Trial : I can't believe this! Zap, = •
LONG DISTANCE TELECOMMUNICAnONS
where ya been for the last three years ?
Tele-Trial was a ridiculous "electronic tri­
(2 1 2) 22 7·45 1 9
Ca l l
. ("tw..n 7:00 A.. M. and l l :OO .�l�
i2...

bunal " started by King B l o tto as a joke. �.CO


�NF1�D�ENT1�

UTY
A�STR
� ICTL
� Y MAI
� JInAIIU
_ialU ';!I .�;:
For whatever reaso n , he started taking THIS AD APPEARED IN A NEW
himself seriously and for a few months in YORK NEWSPAPER THIS
1 9 85 "Tele -Trials" were being held, i n SPRIN G . THE HUNT IS ON!
which "el ectro n i c executio n" took pl ace
and stupid kids cried about being thrown

Summer 1988 2600 Magazine Page 19


RESPONDING TO THE
Tele-Trials have been over since the sum­ lion by Zap.
mer of 1 985. .. 'The boards in general have been a
As for Richard Sandza, T ele-Trial still m ajor problem in the control of information
existed at the tim e of the publishing of his due to the use of the boards by what so m e
articles for Newsweek. The 'Tele-Trial' he m ay cal l ' i n f o r m a t i o n j u n k i e s ' . " What's
was put on was sim pl y a conference of wro n g with people who want to col lect
abusive kids who felt that he had give n inform ation ? Are you suggesting that arbi­
hackers u n fair treatm e nt . I n re ta l iation trary censorship wo uld be an i m p rove ­
they thre ate ned h i m : a C aptain Quieg ment?
posted his credit report and numerous kids .. 'One of the m ajor contributing fac­
ran up bills on his cred it cards , sending tors involving computer abuse is the non­
assorted junk to his house. education of the users in ethics: While it
Hackers cannot 'perform the destruc­ m akes for a nice sweeping general ization,
tion' of anyone. All they can do is scare this statement has little to do with reality.
the shit out of 'normal' people who are Most "normal users' think no more of
shocked that a bunch of kids can get their copying a piece of software than they thi nk
unlisted number, credi t cards, and various of taping a copy of an album, or xeroxing a
other records, and abuse the m . page o u t of a copyrighted publ icati o n .
In a n y case, Sandza i s som e th i ng o f While a l l of these acts a re illegal, the re
an exception since he m anaged t o piss off are n ' t m a n y peo ple that actual l y care .
a large percentage of people who were in " Educating' peo ple is not going to eradi­
a position to m ake l i fe hard for him i n cate these problems.
return. Most people w h o disagree with h i m As far as the phreaks and hackers are
c a n write a com plaint t o Newsweek, b u t i f concerned, the state m e n t is even m o re
you have t h e ability t o bring your displea­ lud icrous. While a m inority undoubtedly
sure to his perso nal attention , in a way j u stify their actions to the m s e l ves a s
that w i l l e n s u re he g i v e s n o tice to it, 'curiosity' and thus set their consciences
wouldn't you do the same thing? After all, to rest, the greater percentage know that
i t is n 't Ne wsweek y o u 're m ad a t , it's in the course of doing whatever it is that
R ichard Sandza. Some of you probably they happen to be doing at the mom ent,
wouldn't, but that's one of the fringe bene­ they are com mitting crimes. And they don't
fits of being a hacker. I nstead of being care.
bound by 'the system's' rules and regula­ Morality and ethics are subjects that
tions, you can get around it and let your cannot be 'taught' to anyone. Each indi­
conscience be your guide (if you happen vidual has to make his or her personal
to have a conscience ) . choices based u pon whatever tenets or
.. 'And rem e m ber, t h e hacker can be bel iefs they h a p p e n to e s p o u s e . V e ry
the best prevention for computer security often people who function from a predom i­
sickness and that a reformed hacker can nantly logical perspective com e to the con­
m ake for the best data processing security clusion that "right and wrong' are relative
person: Another token stab at self-promo- to a given time and situation. As applied in

Page 20 2600 Magazine Summer 1988


CAPTAIN ZAP AR TICLE
o u r society they typica l l y de note values hacker o r phreak's prim ary m otivati o n is
that m ost of our p resent po pulation su b­ e i ther a real hunger for knowledge, o r ego
scribes to . Why should anyone do som e ­ gratification. I n neither case does m o n e ­
thing j ust because everyone else is d o i ng tary gain enter t h e picture. The pe o p l e you
it? rea l l y have to worry about are career cri m ­
Ethics will always be u p to the individu­ inals. They aren't kids a n d they don't call
al, who will i n many cases co m e to the boards. I f a hacker is present i n your sys­
l o g i ca l c o n c l usion that he d oesn't care tem , the n a cri m i nal could easily gain entry
what the rest o f so c i e t y c o n d ones or to your syste m as wel l . I f a n yt hi n g , yo u
acce pts , and i n stead o f b l i n d l y followi n g should view it as a blessing that the hack­
t h e i r dictu m s he w i l l c h o o s e to t h i n k f o r e r has brought your lack of security to you r
h i m se l f a n d pe rhaps arrive at conclusions a tt ention.

that don't coincide with what society hap­ The previous paragraph s h o u l d n ' t be
pe n s to find acceptable at that particular m i sco n s t r u e d as a m o r a l j u d g m ent o n
tim e . cri m i na l s . Persona l l y we couldn't care less
.. Accessing government and m i l i tary h o w yo u m ake yo u r l i v ing as l o n g a s
com pu te r s : Why it is that people com e to you're good at what y o u do .
the co nclusion that governm e n t com puters
should be bastion s of security we couldn't
begin to g uess. Whe n yo u speak of the
gove r n ment and m il itary, we p re s u m e you
mean our govern m e n t and m i l i tary ; you
k n o w , the o n e r u n by i n c o m pete n t s ,
bureauc rats , and other pape r pushers that \
excel at nothing e xcept wasting time and
m oney.
For so m e o n e who c a u ti o ns o t h e rs
agai nst m aking 'rash statem ents', Captain
Zap has apparently written an entire article
fil led with statements that neatly i gnore his
own dictu m .
Lastly, we'd l i ke t o bring u p one rele­
vant fact t h a t m ost ' se c u r i ty a n a l ysts'
m anage to ignore: hackers and phreaks
(fo r the m ost part) are not c ri m i nals. At
least that isn't the way they view the m ­
selves. W h i l e nobody lays awake nig hts
worry i n g about the fact t h a t today he's
cost a f e w p h o ne c o m pa n i e s so m e
m o n e y , a n d p e r h a p s w a s t e d syst e m A rtwork by J.R. " B o b " Dobbs
resources o n u n-authorized applications, a Red Box article on p age 1 3

Summer 1988 2600 Magazine Page 21


(continuedfrom page 13)
HOW T O B UILD
capaci tors from pins 5 and 9 o f " Q u a r t e r " . A d j u s t t h e 5 0 k pot
IC2. Power up the circui t . labelled "Quarter" until exactly 5
Measuring the output from pin 5 very quick beeps are heard for
of IC2 with the frequency counter, each button press. Don't worry if
adjust the 20k pot between pins 1 the qua rter beeps sound shorter
and 6 for an ou tput of 1 700 hz. and faster than the nickel and
Now adjust the 20k pot between dime ones. They should be.
pins 8 and 13 for an output of 2200 Conclusion
hz from pin 9 of IC2. Remove the If all went well to this point,
temporary jumper and re-attach your red box should be completely
the capacitors to pins 5 and 9 . aligned and functional. A final test
(Note : if no frequency counter i s should now be conducted from a
a v a i l ab l e , t h e o u tp u t s c a n b e payphone using the D ATL ( d i a l
adjusted b y e a r o n e a t a time b y access test line) coin test. Dial
zero-beating the output tone with 09591 230 and follow the compu ter
a computer generated tone o f instructions using the red box a t
known precision .) the proper prompts. The compu ter
Next, temporarily d i sconnect should correctly identi fy all coins
the wire between pins 5 and 1 0 of "simulated" and flag any anoma­
IC1 . Set coin selector switch in the lies. With a li ttle di scretion, your
" N " (nickel ) p o s i t i o n . With the red box should bring you many
oscilloscope measuring the output years of use. Remember, there's no
from pin 9 of IC1 , adjust the 50k such thing as space change!
pot between pins 12 and 13 of ICl Parts List for Red B ox
for output pulses of 60 millisecond Semiconductors
d u ra t i o n . R e c o n n e c t the w i r e (2) 556 Dual Timer
between pins 5 and 10. (Note: If no ( 1 ) 741 Op Amp
scope is available, adjust the pulse ( 1 ) IN9 1 4 Switching Diode
rate by ear u sing computer gener­ Resistors
ated tones for comparison.) (6) 1 0k ( 1 ) 4 .7k
The remaining adjustments are (2) l OOk
made by ear. (4) 50k PC Mount Potentiometer
Leave the selector swi tch in the (2) 50k Multi-Turn Potentiometer
"N" position. Adjust the 50k pot Capacitors
labelled "Dime" for a quick double ( 1 0) 0.01 uF ( 1 ) 1 .0 uF
beep each time the pushbutton is (2) 1 0.0 uF Electrolytic
pressed. Miscellaneous
F i n a l l y , s e t the s e l e c t o r to (2) 14 Pin Dip Socket

Page 22 2 600 Magazine Summer 1988


A RED BOX
(1) 8 Pin Dip Socket 0 ) Speaker or Telephone Earpiece
(1) 3-position Rotary Switch Circuit Board
( 1 ) M omentary Push - B utton Box
Switch (normally open) Mounting Hardware
(1) SPST Toggle Switch 9V Battery Clip

').o�,.F ..... ,
T

S ummer 1988 2600 Magazine Page 23


TH ES E ARE
Dear 2600:
Is Captain Zap for real? Is
Reactions to Zap this the same Captain Zap who
Dear 2600: used to go by the name of Ian
After reading Captain Zap 's M u rphy and is consulting on
article in your last issue I'm left computer security? U's a pretty
with the feeling that it was not far- fetch e d picture of an evil
m e ant to inform . Rat h e r it underground conspiracy. All of
seems to me th at Zap wants to the "elite" underground BBS's I
scare legitimate users and peo­ was on (and I was on several of
ple in charge of security at var­ the exact same ones Captain
ious comp anies into believing Zap was on) had no real check­
in the existence of an incredi­ u p s on i d e ntity . M o st e v e n
b ly o r g a n iz e d a n d c om p l ex skipped t h e c allb ack to verify
organization that decides upon and a famous name could get
wh o attacks what and makes you on.
up l aws and regulations . I n The FBI has some of the best
short, it looks to m e like Zap hacking info available and I'm
d e s p e r a t e ly wants p e op le t o su re they would tra d e a few
believe that the big bad h ack­ trapped MCI codes and traced
ers are out there waiting to get computer passwords to get on
them (especially if they happen any system.
to be Fortune 500 companies, The biggest bull of the whole
i n w h i c h c a s e t h e h ac ke r s article is: "Granted they did not
really have i t i n for them) , and move the b ird [ satellit e ] , but
only Captain Zap and his secu­ they d i d g a in a c c e s s t o the
rity company c an protect you rotation c ontrol for the satel­
from u s , so by G o d ya b etter lite . " Pure bull. Please see the
h and h im s o m e c a s h and a article I wrote for you on page
long term contract, or we'll eat 2 -52 (August '85) about moving
you alive! sat ellit e s . Tells exactly what
Either t h a t or Zap is j u st was misu ndersto o d . I know,
hopelessly out of it . In either because I posted the "satellite
case I wouldn't put my security routing codes" .
into his hands. The Shadow
Murdering Thug
and The BOY! Dear 2600:
Circle of Deneb/ In th e S p ring 1 9 8 8 issu e ,
Digital Gang 2 6 0 0 p r e s e n t e d a n art i c l e
c a l l e d "Th e H a c ke r Thre a t "

Page U 2600 Magazine Summer 1988


TH E L E TT E R S
written by Captain Zap . While I such periodicals as The Wal l
don't agree with the article . I 'm Street Joumal. and USA Today.
glad you published it because I I n t h e s e int e rviews h e h a s
like to see d iffere nt opinions admitted to such acts as: mon­
wh ic h p ro v o k e d i s c u s s i o n . itoring his ex-wife's telephone
Aft e r r e a d ing t h e a r t i c l e I with an illegal wiretap. break­
decided to do a little research ing and entering a client corpo­
on him. ration's facilities. and refUSing
C a p t a in Zap . w h o s e t r u e to turn in information abo u t
name i s Ian M urphy. i s now a alleged criminals .
computer sec urity consultant . I h ope this is of interest.
This was not always tru e. Until Yevgeny Zamyatin
the time of his arrest. he was a
hack (Taxi Driver) by trade and For a rep ly to las t issue's
a hacker by hobby. In 1 984 he C ap tain Zap article. turn to
was convicted of credit card page 1 6.
fra u d . N o w . as a r e fo rm e d
h acker. h e a t temp ts t o h e l p
companies free t h e i r systems Gripes and
from hackers. Recently. he has
b e e n active on m a ny B B S ' s .
Feedback
inclu ding those sponsored by Dear 2600:
2600. On Central Office BBS Hi. I am one of your numer­
he claimed that a rival comput­ ous subscribers and interested
e r s e c u rity c o n s u lta nt from re aders who has a few gripes
Detroit had been charged with with the Spring 1 988 issue of
criminal sexu al conduct and 2600.
harassment . H e then threat ­ Altho ugh I don't mind the
ened to sue that same consul­ new format and appreciate its
tant for alleg e d s l a n d e r . He l arg e r size I t h ink it c o u l d
also vigorously attacked The stand somewhat better editing.
T e l e c om S e c u rity Group "Th e Th r e a t of C om p u t e r
(TTSGl . a respected Newburgh H a c k e rs . " O n e o r t w o n i c e
(NY) based consulting firm. for anecdotes but the rest should
having advertised in 2600 and h av e g o n e i n t o B y t e o r
for being closely involved with C o mp u t e ! I m e a n y o u c a n
c o m p u t e r h a c k e r s . TTS G is assume t h at y o u h ave more
considering legal action against enlightened r e a ders on that
Murphy. s u bj e c t that d o n ' t n e e d a
Murphy has been profiled by " H C K- 1 0 0 B B S & Sys t e m s
Intro" .
(continued on next page)
S ummer 1988 2600 Magazine Page 25
�c __ > L.J I �
"ROLM Phone System. " You We never mind getting com­
could h ave cut this to one or ments and criticism. It shows
two pages. About 50 percent of that our subscribers are read­
the article is fluff, like the com­ ing the magazine. What more
plaints t h at p e ople can't use could we askJor?
t h e n e w p h o n e with t h o s e We presented Captain Zap's
weird b uttons . Times ch ange article ("Threa t oj Comp u ter
faster than humans and some Hackers") not as a revelation
of t h e complaints are hardly but as an example oj what is
worthy of the reader's time . So being said by some. We did
w h a t if t h e info n u mb e r this with the intention oj open­
changes from 246-3636 t o 632 - ing up a dialogue whiCh, judg­
6830? ing Jrom the response in this
Given a larger magazine this issue and on the boards, is
wouldn't be so bad , but 2600 is precisely what happened.
relatively small and so I'd pre­ The ROIM article was meant
fer more and shorter articles (if to illustrate more than the sim­
they exist) . ple inconvenience oj having to
OK. What I LIKE D : adjus t to some thing new. We
"Monitoring TIRO. " Although I w ere attemp ting to point o u t
am no p h reak I love to read how it's becoming increasingly
s t u ff like t h a t j u st t o k e e p common Jor the ins tallers oj
informed . such systems to blatantly dis­
''VM/ CMS.'' Although I hope regard the needs oj the users
I will never be on a system like and just assume everyone will
t h at it might come in h andy fIgure it out in the end. Being
sometime . denied the freedom to select an
'Weathertrak. " Not my real easy- to-remember phone num­
interest, but interesting never­ ber seemed particularly ironic,
theless. considering user flexibility was
"From the 2600 Files." Fun one oj the "advantages" oj this
and informative. new phone system.
"Happenings" and "Letters" . By the way, another pag e
These are my favorites. that we got lots oj comment on
I hope you don't mind a little was the reprint oj our six-cent
feedback from a reader. R CI p h o n e b i l l t h a t ' s b e e n
Best of luck to you and your s ho w ing u p Ja i t hJu l ly here
mag. every month Jor nearly t w o
Natuerlich ! years. Well, g uess w hat? RCI
mus t be reading these pages

Page 26 2600 Magazine Summer 1988


L E •• E I � S
because we suddenly s topped (where x is any digit) will tell
g e t t ing t h e m . (Ma y b e w e you the number you're calling
s hould reprin t our $200 Mel from.
bill and hope that goes away!) H ave fun and keep up the
good work.

A Useful Trick Your little tnck for getting an


Dear 2600: unrestricted dial tone is proba­
J u s t a n o t e fr o m a s u b ­ b l y the s ing le m o s t common
SCriber. I love 2600. It gives a t e c hn i q u e t h a t exis t s . A n d
lot of food for thought. w hat's s o remarkable about it
A contribution: On the AT&T is t h a t so many c o mp a n ie s
Horizon PBX (lately disc ontin­ s e e m c o mp l e t e l y u n a b l e o r
ued) there is a "toll-restriction" even unwilling t o put a s top to
feature . Ports can be connected it! We urge our readers to try
to a special card that enforces this on any sys tem that offers
toll-restriction: L e . , you can't any kind of dialing restrictions.
dial 1+ for long distanc e . The Please le t us know w ha t you
software knows about this too . fmd.
If you try to dial 1 + , you 'll get a We app rec i a t e t h e A NI
fast busy tone to let you know (A u t o m a t ic N u m b e r Ide n t ij­
i t ' s fo rb i d d e n . H owev e r , t h e cation) information. If readers
hardware i s expensive to modi­ from other parts of the country
fy and it's the software that know what their ANI numbers
gives the busy tone , so many are, please let us know. (In the
companies just let the software New York metro area, it's 958.)
do the toll-restriction and don't
bother buying the special hard­
ware . "Deluxe" Call
Mistake . If you are on such a
system and get the fast busy,
Waiting
Dear 2600:
j ust hang on the line for about
Enclosed is another example
30-45 seconds . P r e st o !
of how Ma Bell loves screwing
Unrestri c t e d dial t o ne . Most
the telecommunicating public .
people give up when they hear
This was clipped from "On Line
the fast busy.
Today" , the Compuserve maga­
Also, here in Atlanta the dig­
zine . On one page is a letter in
it a l exc h a n g e s (Northern
which the writer thanks anoth­
Telecom D M S - l OO 's) are pro ­
er correspondent for advice on
grammed so that 940-xxxxxxx
tem p o rarily s u s p e nding c a l l
(continued o n page 39)
Summer 1988 2600 Magazine Page 2 7
P ro t e c t i o n F ro m
(continued from page 7)
I guess the programmer involved was nisms.
too cowardly to take me up on my offer Additionally, FLUSHOT2 forced an exit
and prefers to hurt people not capable of of the program currently running instead of
fighting back. I should have known that, I a fail condition when you indicated that an
suppose , but I don't normally think of peo­ operation should not be carried out.
ple who attack i nnocents. Normally, I think F L U S HOT2 was also now d istributed
of people to respect, not people to pity, i n the po pular archive format ( have yo u
certainly not people who m ust cause such re m e m b e re d to s e n d yo u r s h a reware
damage in order to "get ofr. check i n to Phil Katz for his efforts? You
They are be low conte m pt, o bviously, really should. It ain't that m uch money ! ) .
and can do l ittle to help them selves out of N e x t c a m e F L U S HOT3 . A b u g w a s
the m ire they l ive in. fixed which could h a v e c a u s e d c e rtai n
Sti l l , a worm i s a worm . weird things when you denied direct disk
About FLUSHOT 1/0 to certain portions of DOS 3.x.
A Brief H istory The e n h ance m e nt s to F L U S HOT3
The o rigi nal incarnation of F L U S HOT included t h e a b i l i ty t o e nte r a 'G' when
was a quick hack done i n my s pare time. It F L U S HOT was triggered . This a l l owed
had a couple of bugs in i t which caused it FLU SHOT to become inactive until an exit
to trigger when it shouldn't, and a few con­ was called by the foreground ta s k . So ,
ditions which I had to fix . A strangeness in when you u sed som e trustworthy program
how CO M MA N D .COM processed certain which did direct disk 1/0, you wouldn't be
conditions when I " fa i l e d " an o pe rati o n pestered with con stant triggering after you
caused people to lose more data than they e nte r the 'G'. P ri marily this was a quick
had intended -- certainly not my i ntent! hack to allow programs such as the FOR­
MAT pro g ram to run without F L U S H OT

"No matter what being triggered each ti me it tried to do any


work it was suppo sed to .
software protection Additionally, a CMOS RAM check was

you use, somebody i nstalled. If a foreground program attem pt­


ed to change CMOS m e m ory, you'd be
will find a way advised.

around it one day. "


What the heck is CMOS m e mory, you
m i ght be aski n g . Good questio n . In AT
class and better m achines, certain i m por­
tant parameters (such as the type of hard
FLUSHOT was modified and became
disk you're using, or how m uch mem ory
FLUS HOT2. I t included some additional
there is in your machine) are stored up i n
protections, protecting som e other i mpor­
s p e c i a l n o n - v o l ati l e m e m o r y , c a l l e d
tant syste m files, and protecti ng agai n st
CMOS.
direct disk writes which can be u sed to cir­
If this gets changed, you m ight have a
cumvent FLUS HOT's protection m echa-
pro b l e m when you re boot. FL U S HOT3

Page 28 2600 Magazine Summer 1988


C o m p u t e r U iru s e s
sends at least one little slimebucket back po p-ups and other useful programs to be
to the d rawing b o a rd , because it wi l l created. A worm could create a program
restore the CMOS and prevent this hassle w h i c h l e av e s a b i t of s l i m e be h i n d .
from occurring . Programs l i ke Borland's S i d e K ick pro ­
FLUSHOT + Features gram , a wonderful program and certainly
and Enhancements not a Trojan or virus, is probably the best
This rel ease of F L U S HOT has a new known TSR. FLUSHOT + wi l l advise you if
nam e : FLUSHOT+. Because FLUS HOT4 any program attem pts to go TSR which
was a Trojan, I opted to change the nam e . yo u haven't a l ready registered i n your
Besides, FLUS HOT + i s t h e result of som e FLU SHOT. DAT file.
real effort on m y part, i nstead of be i n g a Finally, FLUSHOT + will also now pop­
part-ti m e q u ick hack. I h o p e the e ffo rt u p a l ittle window in the m iddle o f yo ur
shows. screen when it gets triggered. It also will
F L U S H OT is now table drive n . That more fu l l y explain why it was triggered .
ta b l e is in a f i l e w h i c h I c a l l T h e p o p - u p w i n d o w m e ans t h a t y o u r
FLUSHOTDAT. It exists in the root direc­ scre e n w o n ' t g e t screw e d u p beyo n d
tory on your C : drive. However, I'll advise reco g n i tion -- u n l ess you 're i n graph ics
you later on how to change its location so m ode when it pops up. So rry, 'dems the
that a worm can't create a Trojan to modi­ breaks !
fy that file. Reg isteri ng FLUSHOT +
This file now al lows you to write and/or F L U S H O T + is n o t a free progra m .
read protect entire classes o f program s. You're encouraged t o use it, to distribute it
This m eans that you can write protect from to your friends and co-workers. If you end
dam age all of your * .COM , * . E X E , * .BAT, up not using it for so m e reason , let me
and *.SYS files. You can read protect all of know why and I ' l l see if I can do some­
your *. BAT files so that a nasty program thing about it in the next release .
cannot even d e te r m i n e what name you But, the right to use FLUSHOT + is con­
used for FLUSHOT + when you invoked it ! tingent upon yo u paying fo r the right to
Additionally, you can now autom atically use it. I ask for ten dol lars as a registration
check p rograms when yo u first invoke fe e . T h is e n titles y o u to g e t the n e x t
F L U S H O T + to d e te r m i n e i f t h e y ' v e u p d ate s h i p p e d w h e n avai l a b l e . A n d
changed since y o u last looked a t them . allows you to pay me, in part, for m y labor
Called checksu m m in g , it allows yo u to in creating the entire FLUS HOT series. I
know imm ediately if one of the protected don't expect to get my normal consulting
programs has been changed when you're rate or to get a return equal to that of other
not looking. Additionally, this checksum­ programs which I've developed and se ll
m ing can even take place each time you through more traditional channels. That's
load the program for execution. n o t m y i n t e n t , or I w o u l d have m ad e
Also , FLUS HOT + will advise you when F L U S HOT + a com m e rcial program and
any program "goes TSR". TSR stands for you'd be paying lots m ore money for it.
"Term inate and Stay Reside nt" , allowing So m e people are u nco m fortable with

(continued on next page)


Summer 1988 2600 Magazine Page 29
R Flu Shot F o r

the shareware concept, or believe that A little later in this article you'll see how
there ain't no such thing as Trojan or virus to disguise the data file name, making life
programs, and that a person who profits tougher for the worm s out there . But for
from the distribution of a program such as the purpose of this article, we 'll assume
FLUSHOT m ust be i n it for the money. that the file is called C :\FLUSHOT. DAT.
I 've created an alternative for these The FLUSHOT + program will read this
folks. I'll cal l it "charityware" (first called data file exactly once . It reads the data
that, to m y knowledge, by Roedy G reenJ. from the data file into memory and over­
You can also reg i ster F L U S HOT + by write s the n a m e of the data file in so
sending me a check for $10 m ade out to doing. A little extra protection in hiding the
your favorite charity. Be sure to include a name of the file.
stamped and addressed envelope . I'll for­ This data file contai n s a n u m be r of
ward the monies o nto them and register l i ne s o f text. Each l i ne of text is of the
you ful ly. form :
Of course , if you wish, you can send (Command)=(fi lenam e)(options)
me a check for more than $10. I'll cash it Com mand can be any one of the fol -
gladly ( I 'm no foo/ ! ) . lowing characters:
Site Licensing of FLUSH OT + P - Write Protect the file named.
So, you run the com puter department R - Read Protect the file named .
o f a big corporation, you got a copy of E - Exclude the file named from match­
FLUSHOT + , decided it was wonderful and i ng P or R lines.
that it did everything you wanted and sent T - The named file is a legitimate TSR.
in your ten bucks. Then you distributed it C - Perform checksum operations on
to your 1000 users. the file named.
Not what i s i ntended by the shareware The filename can be an ambiguous file
sch e m e . Each s i t e u s i n g F L U S HOT + if you wish for all com m ands except the 'T'
should be registered. That's ten bucks a and 'C' com mands. This means that:
site, me bucko ! Again, make the check out C :\level l \* .COM
to charity if you're uncomfortable with the wil l specify all COM files on your C :
idea of a program mer actually deriving an drive i n the level l directory ( o r its sub­
income from their work. directories). Specifying :
H oweve r , if you've real ly g o t 1000 C :\level 1 \*\*. EXE
com puters, you should give me a call . As would specify all EXE files in subdi rec­
m uch as I'd like to get $10 for each site, tories under the C :\leve l l di rectory, but
that wouldn' be fair to you . So, quantity would not include that directory itself.
discounts are available . You can also use the '?' operator to
T h e FLUSH OT.DAT fi le specify ambiguous characters as in:
FLUSHOT + is table-driven by the con­ ? :\usr\bin\? .COM
tents o f the FLUS HOT. OAT file. This file which would be used to specify files on
normally exists in the root directory of your any drive in the \usr\bin directory on that
C: drive ( C :\FLUSHOT.DAT). drive . The files would have to be single let-

Page 30 2600 Magazine Summer 1988


P e rs o n a l C o m p u t e r s

ter filename s with the extension of 'CO M ' . Y o u c o u l d exclude F L U S HOT + fro m
Am bi g u o u s file nam e s are not al lowed be i n g t riggered by including a l i ne such a s :
for the 'T' and 'C' opti o n s . E = C :\devel o p\' .-
Protecting files from Write Access O f c o u rse , you m i gh t have deve l o p ­
U se the ' P = ' o ption to protect files from ment work on m a n y di sks u n d e r a directo­
write acce s s . To disallow writes to any of r y of t h a t n am e . If y o u d o , yo u m i g h t
your C O M , E X E , S Y S , and B A T f i l e s , i nclude a l ine which looks l i ke :
specify l ines o f the form : E = ? :\develop\ ' ' ­

P = ' . CO M or
P='.EXE E = '\develop'
P = ' . SYS Checksumming fi les
P = ' . BAT T h i s l i n e is a l i ttle m ore co m p l i cated
which protects these f i l e s on any disk, t h a n o t h e r s a n d i n vo l v e s s o m e s e t u p
i n any directory. work. It's worth i t , thoug h !
Protecting f i l es from Read Access A c h e c k s u m i s a m e th o d u s e d t o
S i m i larly, you can u se the ' R ' com mand reduce a f i l e ' s validity i nto a s i n g l e n u m ­
to protect f i l e s from bei ng read by a pro­ be r . A d d i ng u p the va l u e s of t h e b y t e s
gram ( i nc l u d i n g t h e a b i l i t y t o ' T Y P E ' a which m ake up t h e fi le would be a Si m pl e
file ! ) . To preven t read access to a l l of your c h e c k s u m m e thod . Do i n g m ore com pl e x
BAT files, use a line s u c h a s : m a t h e m a t i c s a l l o w s f o r m o re a n d m o re
R = ' . BAT c h e c k i n g i nform atio n to be incl uded i n a
C o m b i n ati o n s of R a n d P l i n e s a r e tes t .
I f you u se a l ie o n the form :

"1challe nge them to C = C :\COM MAND.COM[12345)


then when F L U S HOT + first loads i t w i l l
upload a virus or check the val i d i ty o f the fi l e a g a i n s t t h e

other Trojan horse to n u m b e r i n t h e s q u are b r a c ke t s . I f t h e


c h e c k s u m calculated d o e s not m atch the
my BBS tha t I can 't n u m be r prese nted , you ' l l be advised with
disarm. " a triggering of FLUSHOT, whi ch presents
the co rrect checksum .
W h e n yo u f i r s t set up your
al lowe d , so the com bi nati o n of the above
F L U S H OT. DAT fi l e , u se a d u m m y n u m be r
l ines would prevent read o r wri te acce ss to
s u c h as 123 4 5 f o r each of t h e f i l e s you
' '
a l l batch fi l e s .
w i s h to checksum . T he n , whe n yo u r u n
Ex c l u d i n g f i l e s
F L U S H O T , you s h o u l d copy d o w n t h e
Program m e r s i n pa rt i c u l a r should find
"erro ne o u s " checksu m pre se nted . The n ,
u sa g e for the 'E' co m m an d . This a l lows
e d i t t h e F L U S HOT. D AT f i l e a n d repl ace
you to e x c l ude match i n g filenames fro m
the d u m m y number with the actual check­
o t h e r m a tch o pe r a ti o n s . A s s u m e y o u ' re
sum value you had copied down. Voi l a ! If
d o i n g develo p m e n t work in the C :\deve l o p
even one b yte i n the file i s changed, you'll
d i rectory .
(continued on next page)
Summer / 988 2600 Magazine Page 3 /
Cont r o l l i n g t h e
b e a d vi s e d t h e n e x t t i m e y o u r u n - : o n l y checksum t h i s f i l e when
FLU SHOT+. F L U S H O T + f i r s l l o ad s . ' , 1' a n d ' - ' a re
B u t wai t ! There's more ! equivalent.
When a 'checks u m m ed" f i l e i s loaded +: only checksum t h i s file w h e n it i s
by M S - DO S , i t wi il, by default, be check­ l o a de d and execute d , n o t w he n
sum med agai n . So, i f you had a l i ne such F L USHOT + first loads.
as: T h e refore , if you Wished to only check
C = C :\usr\bi nIW S. COM [ 1 2345 ] you r WS .COM file when yo u first l o a d e d
the v e n e r a b l e old WordStar pr o g ra m the F L U S H OT+ program , you'd specify a
( sti ll my :ditor of noice i) wouid be check l ine a s :
sum med e ach time you wellt II) ed!l a fiie C=C :\l. ; s, ' blrwi<iS 2345] , 1
O f c o u r s e , you m i 9 h t not want the O!
o '/ erlleao 0 1 tliat c��ecksLJm m i ng to tak .·' C=C :\ucr\hi r,' ws c0m l l
P ! C L 8 e ·:l c r li m e you l o a d a p ' o g r a rc ; f '/o u Vv S:-lP(j :.::·: f�c k s u m your o ro
n, G re !(y :; , a lew swi tche s have bee n " 13m callerj ' M YPRC(� E XE '
aj(:'�d. 1 he sWl tctes a r c placed i m rneo: \'V a s
u,�e(j,
(; t r e r the T in : Ie cne« surn line , C � C \pati·!'.�,�vP HnG ': X F. .
7.C :\usr\t:Jin\W:.i. GOMj i ;�345)( �;'''' itch) Reg istering a TSR program
i i ,E) ',8 sWi tche s are : Any unregi stered ! SF< prc'gram 'NiliCh
JL WI,! only cht·cksum tile file o n l y ' n ' i s run after FLLJ S HO T + WI!! cause a tngger
tlll� e s . O n l y one dlg:t aliowe a , when they 'go 1 S Ft . You ca[l register a
pro g ra m so no trigger g o e s off by specify
r·v. J lbn Du.h i ng II in a l ine such a s :
M.cc l ub "Bt:ncl lD. B B S
l\mt:terdam
8 0 M 13 63 (3:1 1)
20 1 � '-: 1 <; 1 T =C \usr\bin\lsr s\sk.com
ROT.Cnhurg
Arneu:foot
1 8 19 1 8 1" �
11 75 54 4';
which will k e e p FLUSHm ... trom com ­
Elndh(lVen
l..e;ckn
40 48 1 7 9 2
71 12 \ 1 25
plai n i n g about sk.com . Make sure t o take
Sittard 47 5 5 20 4 1 a look at the . T' optio n ,
' specified i n the
Amhen 8 5 23 3 3 77
Kampen 5 2 02 24 3 8 0 next section.
Gromngen 50 1 4 \ 1 4 5
Boom 22 90 34 04 6 Protecting the FLUSHOT , D AT file
Almdo 54 90 62 54 2
MICldd burg 1 1 80 3 4 33 6 Obvi0 usly, the weak l i n k in the chain of
Venlo 77 82 2 5 22
Zoctermoer 79 5 1 04 2 5 (3(12) the protecti o n w h i c h F L U S H OT + o ffe r s
Apel doom 15 21 1 8 1 1
Den Hug 7 0 29 5 0 8 8 y o u i s the FLUS HOT . DAT file.
I lclJlC1"' :t t 23 23 32
Alkmm ' 2 1 2 67 8 3 You would think that you'd want to pro·
tect the F L U S H O T . DAT file tram reads
Rotten.la.m 1 0 48 14 2� 6
Gouda ' 8 20 22 3 1 4
Emmcn
a nd writes a s specified above . However
'9 1 0 2 1 00 0
CPiM gg "4 42 3 8 60 (3 )
Ill M PC gg
MSX gg
;,2 86 1 4 2 1 (3)
20 98 25 02 (3 }
this, too , leaves a gapping security h ol e
Sha'1'!MZ.gg
CP/M SWBoo. 7 0 69 40 8 1
:· 2 40 38 86 6
m e m o ry could be searched for i t , and i t
P2000 gg
Olivetti gg
1 0 47 05 7 3 2 could be l ocated that way. A better alter­
79 5 1 75 7 5
Apple gg 1 5 62 24 2 1 (3 ) native exists. I n the d i stri bution p a c k a g e
NOS Hobby Scoop ] 5 45 39 5 (3)
Fido Genrd 47 84 23 0 1 (3) for F L U S HOT + e x i sts a program cal l e d
Fldo John 4 0 53 1 4 5 ] (l )
Fldo S<lnt.ech 34 89 8 1 9 F L U PO K f= . CO M . This program al lows y o u

Page 32 26{)O Magazinf S u mmer 1 988


Epidemic
to specify the new name you wish to call your trusted programs have run .
the FLUSHOT. DAT file. Simply type : B u t there are some options you should
FLU POK E (flushot name) know about:
where (flushot name) represe nts the C hecking CMOS · How often?
f u l l path f i l e n a m e o f yo u r c o p y of The C MOS, as described earlier in this
FLU SHOT+. article, is a spot where i n a worm can just
You'll be prom pted for the name of the make thi ngs a bit m i serable for you when
F L U S H O T . D AT f i l e . E n t e r the n a m e you n e x t boot y o u r syste m . Howeve r ,
you've selected (re m e m be r t o specify the FLUSHOT + al lows y o u t o protect the con­
d i s k and d i rectory as part of the nam e ) . tents of your CMOS agai nst such a worm .
Voilal Nothing could be easier. CMOS only exists on AT class and bet­
Protection Recommendations ter m achines l ! !
He re's a sam ple F L U S HOT. DAT f i l e, You m u st specify the '-C' option when
basica l l y the same o n e i ncluded i n the you i nvo ke the F L U S H O T + progra m in
archive . Your actual checksums will differ, o rder to have yo ur CMOS safeguarded.
and you may want to m odify what fi les and There is a check done whenever ooS is
directories are protected. Obviously, your accessed to determine if the CMOS has
exact needs are diffe re nt than m ine , so c h a n g e d . This c a u se s a s l i g h t pe rfo r­
consider this a generic F L U S HOT.DAT : m a nce penalty. However, this only hap­
P = * . bat pens once every 1 28 oo S accesses. You
P=*.sys can modify this ratio, to more or less, by
P=*.exe specifying a number after the '- C ' :
P=*.co m FSP -C 1 0
R = *AUTO E X EC .BAT will check CMOS every ten accesses.
R= *CON FIG .SYS Intercepting Direct Disk Writes
E = ?\dev\* Through I NT1 3
C=C:\COMMAND.COM(1 2345) ­ The default operation of FLUS HOT + is
C=C:\l B M B IO.COM(1 2345)­ to intercept and examine every cal l to the
C=C:\l B MDOS .COM(1 2345)- direct disk routines. You can disable this
Running FLUSHOT + by including the '-F' switch on your com ­
For extra protection , after you've run mand line :
F L U P O K E , y o u s h o u l d rena m e the FSP -F
FLU SHOT + program t o something unique This is not reco m m ended, but exists
and meaningful to you , but not a worm . primarily for developers who can't use the
Assum ing you didn't rename it, howev­ constant triggering o ne o f their programs
er, you co uld invoke the program sim ply may cause .
by typing : What about INT26?
FSP S im ilarl y, the same exists for the direct
when at the pro m pt. That's all there is writes which normally are only made by
to it. When you're satisfied, you can add it DOS through interrupt 26. Again, I do not
to you r AUTO E X E C . BAT file, after all of recom mend you disable the checking, but

(continued on next page)


Summer 1988 2600 Magazine Page 33
U irus and Troj an
if you desire to do so , use the '-D' switch. turned into a '-'? Well, FLUS HOT t is now
Turning off the header messag e disabled, and will not trigger on any event.
If you've no desire to see the rather If you de pre ss the AL T key three m o re
' '
lengthy welco m e message which is dis­ tim es, you'll see the '-' tum back into a t ·
played when you fi rst use F L U S HOT t , - each time you depress the AL T key three
use the '-h' switch. t i m e s , F L U S HOT t w i l l toggle betwee n
Allowing Trusted TSR's to Work being enabled and disabled.
Normally, you'd load all of your trusted Disabling FLUSHOT + Toggle Display
TSR's before FLUSHOT + is l oaded from Alas, there a re g raphics appl ications
w i t h i n yo u r A U TO E X E C . B AT f i l e .
However, you m ight want to use SideKick
once i n a while , removing it from memory "A ll of the protectio n I
as you d e s i re . T h is co u l d cause so m e had wo uld have been
pro blems, since SideKick, and programs
l i ke it, take over ce rtai n i n te rru pts , and
for na ugh t if I didn 't
F L U S H OT t co u l d get c o n f u s e d a b o u t u se the first line of
whethe r t h i s is a vali d c a l l o r a cal l that
defense from these
s h o u l d n ' t be a l l o we d . N o rm a l l y,
F L U S HO T t wi l l trigger on these calis, worms : full and ade­
which is safer, but can be annoying. I f you q uate back up . "
use the special '-T' switch upon prog ram
i nvocation, then calls which trusted TSR's
'
(those specified with the 'T command in
= which will be screwed up by the '-' or ' t ' in
your F L U S H O T . DAT fi l e ) m ak e w i l l be the u ppe r right hand corne r of your dis­
a l l owed . U nd e rsta n d , p l e a s e , that this play. Therefore , if you depress the CTR L
basica l l y means that cal l s m ade b y a key three times, yo u'll be able t o togg le
Trojan while a trusted TSR is loaded m ay the display capability of FLUSHOT t . The
not be caught. Please , use this switch with default co nfiguration of F L U S HOT t is to
caution ! 'come up' with display turned on. You can
Disabling FLUSHOT + reverse this capability if you i ncl ude the '­
There may be times when you're about G' (for graphics) switch on your com m and
to do some work which you know wil l trig­ line when you run FLUSHOT t.
ger FLUSHOT t. And you m ight not want Interpreti ng a FLUSHOT + Trigger
to be bothered with all o f the triggering, So, you've run FLUSHOT +, and you're
the pop-up windows, and your need to at yo ur C> prom pt. Great! Now stick a
respond to each trigger. If you look i n the blank disk which you don't care about into
upper right hand corner of your screen , your A: drive and try to format it.
you'll s e e a 't' sign . This indicates that S u rprise ! F L U S HOTt caught the
FLUSHOT t i s m onitoring and attem pting attempt! You have three choices now: typ­
to protect your system . Depress the ALT ing 'Y' al lows the o peration to co nti nue,
key three times. Notice that the 't' sign' but the next o ne will be caught as well .

Page 34 2 600 Magazine Summer 1988


Pr e u e n t i o n
Typing a 'G' (for Go ! ) allows the operation FLUSHOT t checks the checksum on all of
to continue, disabling F L U S HOT t until an t h e " C = " f i l e s w h e n you f i rs t i n v o k e
exit from the program is made . Whe n F L U S HOT t . T h e files m ust b e read i n
FLU SHOT t is in the 'G' state , a 'G' will from disk, their checksum calculated and
appear in the upper ri g ht hand comer of t h e n c o m pared against the v a l u e y o u
your screen. claim the checksum should equal .
Any otl1ef key wilt cause a failu re of the If the checksum does not equal what
operation to occ ur . you claim it should (which means that the
Whe n you've got F L U S HOT t running file may have been written to and m ight
and y o u g e t s i g n a l e d t h a t t h e re is a therefo re be suspect) , a wi ndow will pop
problem , you s h o u l d t h i n k about what u p in the m iddle of your screen :
m ight have caused the probl e m . S o m e Bad Checksum on (fi lename)
programs, l ike FOR MAT, o r t h e No rton Actual Checksum Is: (checksum)
Utilities, P C -Tools, o r D R E P have ve ry Press "Y" to allow, "G " to go til l exit,
good reasons for doing direct reads and any other key to exll
writes to your hard disk. H owever, a public This m essage simultaneously advises
domain checkbo o k accounting prog ram you there is a problem with the checksums
doesn't. You'll have to be the judge of not matching , shows you what the check­
what are legitimate operations and which sum s h o u l d be , a n d t h e n awaits y o u r
are questionable. response .
There is no reason to write to I B M B IO Except for the initial run of FLUS HOT t ,
or I BM OO S , right? if y o u type a 'Y' or a ' G ' , then the program
Wrong ! wil l load and execute . Typing any other
When yo u form at a disk with the 'IS' key will cause the program to abort and
option, those files are created on the tar­ you will be returned to the C> prom pt.
get diskette. The act of creating, opening When FLUSHOT t is in the 'G' state, a 'G'
u p , and writing those f i l e s w i l l tri g g e r will appear in the upper right hand comer
FLUSHOT t a s part of its expected o pera­ of your screen.
tion . There a re m a n y o t h e r l e g i t i m ate If this is the initial run of FLUS HOT t ,
operations which may cause FLUS HOT t howeve r, you ' l l be advised of the pro ­
to trigger. gram 's actual checksum , but FLUS HOT t
So will copying a CO M or EXE file if will conti nue to run, checking all remaining
you have those protected with a 'P=' com ­ "C=" files in the FLU SHOT. DAT file.
mand. FLUSHOT t is not particularly intel­ If you're running a program and you
l igent about what is allowed and what isn't. see a screen like :
That's where you , the pilot, get to decide. ? WARNING ! TSR Request from a n
Here's a fuller l isting of the m essages unreg istered prog ram!
which yo u m ight see when you're using Number of paragraphs of memory
FLUSHOTt : requested (In decimal) are : (cnt)
Checking ===)(fi lename) (Press any key to continue)
This m essage is d i s p l ayed as you're being advised that a program is

(continued on next page)


Summer 1988 2600 Magazine Page 35
Con t r o l l i n g t h: e
about to go TSR. If this is a program you failed status to DOS , and the operation will
trust (such as S ide Kick, or KBHIT, or a not take place . When FLUS HOT + is in the
host of other TSR programs you've grown 'G' state, a 'G' wi ll appear i n the upper
to know and love), then you should con­ right hand corner of your screen.
s i d e r i ng i n s ta l l i ng a 'T li n e i n t h e If an attempl is made to format your
'
=

FLUSHOT.DAT file so that future runs of disk, which may be a legitimate operatio n
this program will not trigger FLUSHOT +. made by the D O S FOR MAT prog ram ,
However, if you get this m essage when you'll see a message such as:
running a program you don't think has any D i s k b e i ng formatted ! Are You
need to go TSR ( such as the proverbial Sure?
c h e c k bo o k bal a n c i n g p r o g ra m ), yo u Press "Y" to allow, "G " to go till exit,
should be a l ittle suspicio u s . Having a any other key to fall.
TSR program is not, in and of itself, some­ which follows similarly to the direct disk
thing to be suspicious of. But having one write o pe rati o n s . You sho uld q u e stion
you don't expect --- well, that's a different whether the formal operation is appropri­
story. ate at the time and take whatever action
M o st TSR's ' hook i nto' an interrupt you think is best.
vector before they go TSR. These hooks If one of your prolecled files is aboul lo
m ight interce pt and process key stroke s be written to, you'll see a message like :
('hotkeys'), or they m ight hook and inter­ Write access being attempted on :
cept direct disk writes them selves. In any (filename)
event, FLUS HOT + (in this version!) does­ Press "Y" to al low, "G " to go till exit,
n't have the smarts to do more than advise any other key to fail.
you of the T S R ' i n g of the program . I f where (filename) represents the fi l e
y o u ' re t r u l y s u sp i c i o u s, r e b o o t yo u r you're trying 10 protect from these write
machine im mediately! operations. Your red flag should fly, and
If a program attem pts to write directly you should question why the program cur­
to the interrupts which are reserved for rently running should cause such an oper­
disk writes, FLUSHOT + will also be trig­ ation.
gered and you'll see som ething like : You may also see the same type of
D i rect D i s k Write atte m pt by pro­ m e s s a g e w h e n o n e of y o u r ' R e a d ­
g ram other than DOS! Protected' files is being accessed:
(From Interrupt (xx)) Read Access being attempted on:
Press "Y" to allow, G to go till exit,
" " (filename)
any other key to fail. Press "Y" to allow, "G" to go til l exit,
where the (xx) represents either a 1 3 any other key to fail.
(indicating a direct B IOS write to the disk) Again, the same red flag should fly, but
or a 26 (indicating a direct DOS write ) . it doesn't m ean that you're infected with
Again, pressing a 'V' or a 'G' allows the som e nasty virus program ! It could be
operation to continue, pressing any other something harm less or i nte nded. You'll
key will cause the o pe ration to return a have to be the judge.

Page 36 2600 Magazine Summer 1988


Finally, you may see a me ssage like: how I protect m yself from gett i ng wormed .
CMOS has been chang e d ! The Ram N e t B u l l etin Board System
Hit "Y" to continue, a n y other k e y to site I run is open access. No need to reg­
restore CMOS. i ster, or to leave yo ur phone n u m be r or
which i ndicate s that yo ur CMOS has address, although a note to that effect i s
been changed while you weren't looki ng. always appreciated. A s mentioned above ,
Or m aybe yo u were : i f you 're running a I dare the worm to try to affect the disk of
setup program which changes the date or somebody who can fight back. A couple of
the ti me, or the disk type attached to your worm s have tried and I have a nice col lec­
AT class machine , this message should tion of T rojans a nd viruse s . Obviously, I
pop up. Losing your CMOS is not fatal , but run FLUS HOT + on my board, along with
can be an annoyance . If you hit a 'Y', then checking incom ing files with CHK4 BO M B .
the new setting of the CMOS wi ll be stored My procedure for testing o u t newly upload­
and you'll be able to continue, with alerts e d code i n vo l ves me d o i ng a back u p ,
to any other change to the C MO S . Any i n stal l i ng all sorts o f software t o monito r
other key will result in the original setting what is going o n , a n d dOing a checksum
of the CMOS be i ng restored. on all files on the disk. I then try out all of
How Good is FLUSHOT + , Real ly? the code I get, primarily to determ ine if the
FLUSHOT + is a pretty handy piece of code is of high enough quality to be post­
cod e . But i t can 't absolute l y protect yo u e d . Afte r test i n g out a l l of the wee k ' s
from a worm . No software can do that. u pl o a d s , I r u n the c h e c ks u m p ro g ram
There are ways around F L U S H O T + . again to determine i f any of m y files m ight
I'm of tw o minds about discussing the m , have been m odified by a worm 's virus pro­
since the worm s o u t there are reading this, gram .
too . So I'll only discuss them in passi n g . Recently, what l ooked l ike a decent lit­
And I'll t e l l you what I u s e here t o protect tle di rectory lister was posted to the board.
m yse lf from worm s. First, though , a l i ttle For some reason I've yet to fathom , direc­
story to tel l you what it's l i ke here , and to ry aid prog ram s see m to be the ones
(continued on next page)

S ummer 1988 2600 Magazine Page 3 7


Y o u r C o m p u t e r C o u l d B e N e N t

which have the h i g h es t percentage of amusing to see what the worms out there
Trojans attached to them . are wasting their efforts o n .
This di rectory aid program l isted m y A t this pOint, Trojans and viruses are
d irectories i n a wonderful tree structure, becom ing a hobby with me: watching what
using diffe rent colors for different types of the worm s try to do, figuring out a way to
files. Nice program . When it exited , how­ defend aga i nst it, and then updating the
ever, it went out and looked for a directory FLUSHOT series.
with the word "FLU" in it. Once it found a H owever, there is a pos sibility that the
directory with a match in it, it proceeded to FLUSHOT series (as well as other protec­
try to erase all of the files i n that directory. tion program s which are just as val uable)
An assault! No big deal . That's what back­ are causing an escalation of the term s of
u ps are for. this war. The wo rms out t here a re sick
But it brings up an i nteresting point: I individuals . They m ust enjoy causing the
was attacked by a clever worm , and i t damage they do. But they haven 't the guts
erased a bunch of files which were pretty to stand up and actually do something in
val uable. All of the protection I had would perso n . They prefer to hide behind a m ist
have been for naught i f I didn't use the fi rst 01 anonym ity.
line of defense from these worm s : ful l and But you have the ultim ate defense ! No,
adequate backup. not the FLUSHOT + progra m .
I 've spent three years of my life devel­ Full and adequate backupsl
o p i n g o n e particular software package . There are a variety of very good back­
I magine what would have happened if that up programs which can save you m o re
had bee n e rased by a worm ! Fortunately, I work than you can i m a g i n e . I u s e the
m ake backups at least once a day, and FASTBACK+ program , which i s a great lit­
usually m o re frequently than that. You tle progra m . I backup 30 m egs once in a
should, too . while, and do an i ncremental backup on a
Now, I quaranti n e that m ac h i ne as very frequent basis. There are a variety of
we l l . I spe n t a c o u p l e of d o l l ars and very good commerCial, public dom a i n , and
bought a bunch of bright red floppy disks. shareware backup prog ram s out the re .
The basic rule around he re is that Red Use them ! Because , n o m atter what soft­
Disks are the only disks that go into the ware protection yo u u se , so m ebody will
B B S m achine , and the Red Disks go into fi nd a way around it o n e day. B u t they
no other machine. You see, I know that can't find a way aro u nd your backups.
the re is s o m e worm o u t there who is And, if you (and everyone else) do regular
gonna find some way to infect my system. backups, you'll remove the only joy i n life
No m atter what software protection I use, these worms have. They'l l kill hemselves,
there is a way around it. hopefully, and an entire subspecies will be
You needn't be concerned though -­ wiped out -- and you'll be partially respon­
you're making backups on a regular baSis, sible !
right? And you aren't asking for trouble. I M y a d v a n c e t h a n k s f o r h e l p i n g to
am , I expect to find it, and it is sort of extermi nate these l ittle slime buckets .

Page 38 2600 Magazine Summer 1988


S U M M E RT I M E LETT E RS
(continucdfrom pagc 2 7)

waiting (by d i al ing * 7 0 or I t' s a m a z i ng h o w p op u l a r


1 1 70) . O n t h e very n ex t page is t hese n u m be rs are in the hack­
a news r e l e a s e fr om B e l l c o re er world. We did a l i t t le check­
ab o u t deluxe call waiting . ing (we called 800 info) and got
which lies abo u t the newest 8 0 0 - 3 2 5 -3388 . Three t o l l -free
" m u lt H i e r e d " fe a t u re t o su s­ n u mbers ! Scar!! , is n't it ?
p e n d c a l l wait ing. A� usual . the
lia rs want t o c h arge fo r a "new"
fe a t u re w h i c h a l r e a dy e x i s t s . Wha t is Sprint
T h i s i s t y p i c a l o f t h e ge n i ll s
m i ne! o f M a B e l l . I h o p e t h a t
Up To ?
y o u w i 1 1 tl l u st ra t e t h i s a b u s(' i n D e ar 2 600:
you r s u rn rn e r issu e , T h e v (' 1)' d ay t hat I received
Also , I h av e m ix e d fe el i n g s vo u r Spring issu e , I a l s o go t my
reg a rd i ng t h e q u a rk rly fOrTn a !. S p r in t bill. 1 read y o u r issu e
H i l i , as u s u al , it ' s w o r t h the fi r s t. 0 1 '. · o u r s C' , and I didn't
w a it , t o u c h m y b ill u n til I re ad y o u r
GH l i t t le bl u rL abo u t Sp rint ' s
billing sy s t e m in your
We a c t u a l /!J d id p o i ll t
t ha i ' H a p pe ni ngs ' c ol u Il l I l . And was
i fl j u � l i c e o u t i n a p r e p i o u s I i n fo r a su rp rise ,
L'i '; ue. While i t is n ' t comp let ely My bill was a t ot al mess!
'J l ie (it s e e m s s 01 /t c body d i d S p r i n t h a d d O I 1C two t h ings t o
i' l l'crt ! some t h ing a W il e b i t cl ff­ m y b ill as far a s I c o u l d fathoIll
Ie, ,-' n t Uw l does b a s ica l l lJ t h e from t h e mess printed on t h o s e
s a m e !l t ing as the old " * 70"), it page s . 1 ) They h ad c h a rg e d m e
c er tainlu q u a l ifies as m i s lead­ fo r b u sy s i g n a l c a l l s . 2 ) Th ey
ing t he p u b l ic. had ch�pped up l a rge c a l l s inl�
4 o r 5 sma l l e r c a l l s .
I called Sprint r igh t a w ay
New Falwe l l a n d h a d it o u t w i t h t h e b il l i ng
Numbers p e rs o n . l i e g ave me c r e d i t fo r
a ll of t h e o n e m i n u t e b u sy c a l l s
D e ar 2600:
I j u st g o t a h o l d o f t h e new ( a b o u t 40 a l t o g e t h e r ) . As for
t o l l - fr e e n u m b e r s fo r .J e rry wh y t h ey d i d t h i s i n t h e fi r s t
pl ace I d o n ' t k n o w . Is t h e i r
F alwe l l ' s Al l Time G o spel I l o u r!
b i l l i ng c om p u t e r real ly t h a t
Th e y a r e 8 0 0 - 3 4 5 - 8 0 9 5 a n d
messed u p t h a t t h ey c a n t k e e p '
bOO - '1 5 : 3 -· 3 800 .
t ra c k of t h e s t a t u s of a c a l l?
A True B e ll e v e r
They m u st have a l o t of t h i s
happening, b e c a u se he gave
(((In tin ltcd on n ext {luge)
S u m m e r 1 988 2 6(){) MaKa zine PaKe 3 9
2 6 0 0 L E TT E R S
me credit without too much of ble (something a Lot oj phone
a problem . p h re a ks w o uLd n o do u b t rel­
As for the c h opped up calls, i s h) . Le t ' s Jind o u t Jo r s u re .
t h a t ' s a different m a LL e r a l t o ­ Le t's a l l p u t them to t he tes t
g e t h e r . H e r e fu se d t o c h a nge and keep logs. In Jaci, w hy not
my b illing t o make t h e series of do iUo, all oj the companies ?
smaller c alls i nt o one big cal1....
I ' l l h ave to wri te the comp a ny if you have a letter for us ,
abo u t that one . send it to:
H e re i� wha: I w o u l d l ike yo u 2 6 0 0 Le t ters
guy s t o t h ink a b o u t : We a ll P. O. Box 99
I
know abo u t t h ose t h ieves wh o Middle Is land, NY 1 1 953
reprogram a b a nk ' s c om p u t e r O r sen d it e l e c t ro n ic a l ly
t o sh ave otT . 0000 1 p e r c e nt of usi ng our b u l l e t i n b o a rds or
all the a c c o u n t s in th e b a n k n e t wo rk addresses l is ted i n
and d ro p it i n t o a n o t h e r our stq[fbox.
a c c o ll n t fo r t h eu1 s e lve s . T h e
mn a l l amo u nt t a ke n fro m t h e
i n d i v i d u a l a c c o u n t s w i ll b e NORWAY n B S ') BY T O i l S DRAKE
Regen B y ie � 12 0'2 96
i n s i g n i fi c a n t fo r a n y o n e t o B I g Blue 2 42 66 H 8
C.ru;� &:- VL�ne. " 1 '5 1 6 1 0
n o t i c e , b u t t h e t o t a l a m o u nt DAr R B S 2 1 � 98 07
DA SAN 3 4\ 95 10
c a n be qu ite larg e . Well , h e re DuLahyslwkn 2 bS 92 SO
l·l . � b y D&l.I. Klubb 2 92 R9 52
we h ave a long d istance com ­ Hack" Unhmiied 2 24 37 4 0

pany that is c u tting u p callers '


Hluge,nmd R B B S 4 7 1 010 4 tl
lie Info H H S 3 75 4\ 74
l Iol S tuff B BS 2 30 M I)()
long cans into smaller c alls and Modul. 2 Fido 6 97 JJ 3 5
lJ. K RBS'S BY J O l i N DRAKi
then charging the c a llers more TBRS 348 9<1 00

for the first minute on all of the


I.ondon UndergmWld 863 0 1 98
Apple 2000 039<1 276306
Apple
s m a l l c a l l s . Th i s a m o u nt i s Black '[OlVer
0268 7789565
474 5 5 0 5

small a n d I d o n ' t re ally c are l1r: OUl.er i .lmi l5


A dwl PBB5
54 9 4845
<>1862 25 1 7 4

ab o u t it . B u t if t h ey ' re doing 444


Airtel
m 87 247 6 1 9
200 3439
this to ALL c a llers - - how much Mac Tel 0602 4 5 5444
Mega Anchovy 7 4 7 4662
are they a c t u ally ma king p e r TlVl b ghl Zorr, (5T) 7 8 8 08R4
BHS09 (ST) m05 7 360'25
month? Ahr-rnak Re.l.lt ly 09 5 9 7 66 9 5

Cray-Z Phreaker
204 87 5 5
<:>1 1 956 6537

S kunk Works
<>123 865 392
Dublin 885634

What you're impLy ing here is


800 BBS'S
THA NKS TO DE N NlS l'ROM LL
AND WHAI IN NEW YORK
a very serious matter. IF Sprint �DO 323 746-1 800 222-4921
SOO 365 6262 800 R42 � 1 5 1
is m Jact doing this , they could 8(l O 6 ] 2 72Z7

be Jacing an awJuL Lot oj tro u -

Page 40 260() Magazille Su mmer 1 988


2 600
W A N TE D c o p i e d ( d e a d ) o r a l i v e ! M i chel l S t . , Rid l ey Park, P A 1 9 0 7 8 .
TAP'S " C " & " D " elec . courses. Cassette T h i s p l a n is completely LEG A L .
tape (TAP exclusive), & fac t sheets # 1 - Q U A L ITY TAP RE P R I N T S .
4 . H ave a n y or all? Contact me-will­ C o m p l e t e s e t ( # 1 -9 1 ) p u n c h e d a n d
ing to pay good m o ney for orig ' s . B. bound . H i g h quality copies with a l l
B a r t o n , 8 4 D a p h n e C re s . , B a r r i e , special su pplemental s . $75 / set,
Ontario L 4 M 2Y9 . (705-726-66 1 7) s h i p p e d U PS o r U S PS o r $ 9 0 / s e t
WANTED: A l l newer hard ware you s h i p p e d Fed e r a l E x p r e s s . M o ne y
fi n d a m u s t t o quic k l y get rid o f . orders o nly, payable t o Jeff. TZG, P.O.
P r o d u c t e v a l u a t i o n s a r e w e l c o m ed . Box 1 5 1 5, Columbus, NE 6860 1 - 1 5 1 5 .
Also looking for Technics SL1 200 and WANTED: G-file "I3ctter H o m e s a n d
any i n forma tion related to pirate radio B1ueboxing Part 2" by Mark Taba s . I f
( i n c l u d i n g s t o r i e s w r i t t e n by e x ­ anyone can provid e a hardcopy,
pirates, gro u p s, equ i p m e n t i n forma­ please send i t to J RE, 1 447 G raber Dr.,
tion, FCC) for a write-u p . David J o n Cleveland, OH 441 07.
Hyams, E 9 1 1 6 BACK
· ·· '
Sprague Av., I S S UES, com-
Apt. 111, ��ete s et Vol . �;
Spokane, WA: ·
99206 Q U A L I T Y
from
COPIE S
A b b i e
H o f f m a n ' s
"Stea I Th i s ,:,:,:,:,:::,:::::,:,:,:,:,:,:::,:,:,:,:,:,:1"":�:'=!':
Book" . $7 .95 + $2 shipping & handling. postpaid via UPS or First Class Mai l .
M a rco, P . O . Box 1 2 1 1 , Westerly, RI C a s h / M O s e n t s a m e d a y, checks t o
0289 1 . Pete G . , P.O. Bo x 463, M t . Laurel, NJ
FOR SALE: Ultimate blue box, Berry 08054 . We are the original; all others
Electronics M od el 3 1 2A trunk test set, are copies !
has rotary d ial / M F keypad, monitor FOR SALE: Okidata Microline 92 per­
speaker. Uses L-C o scillators. V E RY s o n a l p r i n t e r . I n c l u d e s m a n u a l for
stable. Can be used as Std phone when i n struct i o n s . Hardly u sed . M a ke an
h ea d / h a n d s e t a d d ed . $ 25 0 . W r i t e : offer and if it's reasonable, I will pay
Testset, 6 7 1 5 Eberlein Ave., Klamath postage. Matt K e l l y, 31 0 I sb e l l ,
Falls, OR 97603. Howell, M I 48843.
WANTED: Any hacker and phreaker 2600 MEETI N G S . First Frid a y of the
s o ft w a re for I B M c o m p a t i b l e a n d month at the Cit icorp Center-from 6
H ayes compatible mod e m . If you are to 8 pm in the M arket (also known a s
selling or know anyone who is, send t h e lobby with t h e tables where a l l o f
replies t o A . H . M o o n , 25 A m a ra n th t h e weird os h a n g o u t ) . Located a t 1 53
Crt., Toronto, ONT., Ca nada M6A 2Pl . East 53rd Street, New York City. Come
W O U LD YOU LIKE TO MAKE by, d r o p off articles, a sk quest i o n s .
SOME MO NEY? Big money? Send a Ca11 51 6-751 -2600 for still more info.
business sized S.A.S.E. to: J . Duffy, 408 Deadline for Autumn Issue: 8/3 1/88.

S ummer 1988 2600 Magazine Page 41


VI. K E E P YOUR A D D R E S S CURRENT
1 0 a s s i s t t h e C o u r t a n d t h e p a r t i e s in m a i n t a i n i n g an a c c u r a t e l i s t 01 the mp.rnbers of t h f' C!;}!';<;, pip a ,> '" notify t h � r:l N k 01
t h p Court of any r. h a n g e of address.
A l l Pl oofs of Claim�, E" x c luslon Noticp,,>. not icflo; of i n l fl n l i n n 10 appf"ilf. ob jec t i o ns. and <lrldre5s corrections should be
a ct d r es�f>d 1 0 :
C l e r k of t h e U n i t e d S t a l e s District Court
Eastern District 0' Michigan
Aline' C l a s s Action
P . O . Box 2 7 7 E N T E R E D BY ORDER O f :
F r a n k l i n , M ichigan 48025
Honorable A n n a Diggs Taylor. Judge
United Stales District Court
Eastern District of Michigan
Detroit, Michigan
Clerk
United Stales District Court
Eastern District of Michigan
Detroit. Michigan
Dated: March 30. 1 9 8 8
P R O O F OF CLAIM
T o participate i n t h e settlement. you must complete this Proof of C l a i m and mall it ( along w i t h t h e address label
below ) t o t h e Clerk of t h e United States District Court. Eastern District o f Michigan, A l l net Class A c t i o n ,
P . O. Box 2 7 7 . Franklin. Michig an 48025. Tbl. Proof or Claim muol '" _ t mork ed on or ",Ior. July 2', 1111. Please
print or type_
1. Name of claimant ____ _ _._�__ _ _ _ _ _
, ___ _ _ _ _ ._ _ _ _
Add ress __________ ___ _ ______ � _ ____ _ _ . _ _ .. _
Telephone number where you can be reached during bu�lne99 hOur9 ( __ ) . , __ _ _ _ _ __ __
. . .. _

Name and position of person completing t h i s form If claimant i s not an individual __ _ _ . � _ _ _ _ _ .


Allnet account number ____ __ _ _ _ _ ______________ ,_. ____ _ . __ _ _ _� _ . _ _ . _ _ _ _
. .
2. Check here it claimant Is currently an Allnet subscriber . _ __ _ ___ _ ____ ___ _

3. Please choose one of the four options listed below. Please provide the Information r equested .
A. __ Siondordi.ed Credll or B. _ _ ._. BI.ndordl.ed C •• h Retund
Subject t o the pro rata provisions set forth above i n Section II of the Notice of Settlement, a S t a n d a r d ized
Credit or Cash Refund equals 90 cents lor each year you were a customer.
(I) Please circle each year or part of a year i n which you wel e an Allnet customer.
1981 1983 1985
1 982 1984
( ii ) T olal number of years circled ___ _. ...

C. _ _ __ Itemized Credit or D. itemized C •• h Relund


S u b j ec t to the pro rata provisions set forth above In Section II of the Notice of Settlemen t . an Itemized Cred:, t
or Ca sh Refund e q u a l s 30 c e n l s f o r e a c h m i n u t e of unanswered calls f o r which you w e r e charged .
(II Provide the 'allowing Information lor each unanswered call lor which you were charged and have not received
a prior credit or refund. This Information may be provided by attaching caples of your bills with the calls
circled
Area Code
-�---�- � - -- . - - -- .. , ..
Date of Call And Number Called Number of Minutes

( II ) Total number of minutes listed __ _ _ � �_

( til ) Please altach copies 01 the bills lor each call listed. II you no longer have the bills, prOvide the Allnet access
code to which the calls were billed, or " an access code was not usAd. the tAlephone numl:'l�r to which
the calls were billed _ ..
4, I f yo u chose t h e .t.ndardized credit or itemized credit options. and you a r e n o t c u r r � n t l y an Aline! c u s t o m e r .
you mu st complete t h e f o l l o w i n g authorization f o r m :
I authorize Allnel 10 nollfy my local t e l e p h o n e c o m p a n y t h a t I am c h o o s i n g Allnet as m y P r i m a r y Long D i s t a n c e
C a r r i e r on t h e t e l e p h o n e number listed b e l o w . I understand t h a t :
(I) IfI Incur a telephone company service charge I n connection with the opening o f m y Allnel account, I will receive a
credit to be applied 10 my Allnet account lor the full amount of such service charqe upon submission to Allnel.
at the address to which this authorization form WAS senl, of a copy of the Invoice for such chRirge
( II I While Allnet will be m y Primary l onq Distance Carrier, I will also be able t o place call9 with A T & T or any olhp, c a r r l "' r 9
al any lime I wish.
( iii ) ImAy choose only one Primary Lonq Dlc;t�flcp. C a n ip.r lor the lic;lP.d lp.I"'phone numb'!r If I chao,"" Anoth�r r. ::I . nN 1�'Pr
on, t h i s ''If!I'!r.tion will be invali<1�I'"
(Iv) I m a y c. han g e t o another carriei' a t any t i m e . and. ,1 1 d o , m y local t '!lepho ne compmy M a y apply a servic. ... r.h�.gp.
(v) t may deSignate only one telephone number. The tetephone number listed below i s the one lor which I A m m A k ing this
designation
CuslomPf nAme _
Name 01 billing contact (" dlnerent I _ ._� _ �

Billing address __ � __ . _ _ __

Suite or apart ment no _ _ � ____ _ _ _ �_ , _ __ _ _ _. _ __ _ �

C ! l y _ ________ _ _ _ _ _ _ _ S te t e � __ _ _

lnslal!31ron a d d r e s s ( if d.lferen I J __ ___ _


T e l E" p h o n e n u mbe r to be connected ( _ _ __ _ I _ _

DAIA Signature

C E RTIFICATION AND R E L E A S E
I certify u n d e r p e nal ty of p e r j u r y that I A m authorized to m A k e I h l s c l l'I l m , t h a t the c l a i m a n t was an A l l net c u s t o m e r a l
s o m e t i m e d u r i n g t h e p e r i o d M a r c h 2 , 1 9 8 1 1 hro u g h December 3 1 , 1 9 8 5 , Rnd t h a i t h e c l a i m a n t was c h a r ged for
u n a n sWNed calls for which n o credit or refund was previously recp.ived t f u r t h e r certify thai all Information I n t h i s Pr o o f of
C l a i m i s t r u e a n d correct t o t h e best of my knowledge, Information and belief; t h a i t h e c l a i m a n t d i d nol elect 10 be excluded from
t h e S e t t l e m e n t C l a s s ; t h a t t h e undersigned Is the claimant or i s authorized to execute and s u b m i t t h i s Proof of C l a i m on
c l a i m a n t ' s behalf; and that this claim is the only claim being s u b m i t t e d I n this set tlement by or on behalf of t h e c l a i m a n t .
I n c o n s i d e r a t i o n of t h e r i g h t to receive benefits under the settlement, t h e c l a i m a n t expressly covenants and a g r e e s t h a t
h e / s h e / i t s h a l l not now or h e r e a f t e r i n s t i t u t e , m a i n t a i n or a s s e r t any c l a i m r e ( a t l n g t o the b i l l i n g of c l a i m a n t f o r
u n a n sw e re d c a l l s by Allnet d u r i n g the p e r i o d from March 2 , 1 9 8 1 t h rough December 3 1 , 1 9 8 5 . C l a i m a n t further r e l e a s ,," s a l l
c l a i m s a g a i n s t A l l n e t , i t s predecessors, successors, aff i l i a t es. a s s i g n s and I t s officers, directors. agents and e mployees.
pa st a n d present, that have been, might have been. are now or could be asserted I n t h e lawsuits described I n t h e Notice or
that relate i n any way t o t h e matters alleged In t h e complaints I n those lawsuits.

Page 42 2 600 Magazine Summer 1988


Ph otos by
Joh n Dra k
e

Sum mer 1988


2600 Magazine
Page 43
1 80 u 1 336-U 1 4 9 TYlnet
1 = = = = = = = = = = = = = = = = = = = = = = == = = === = = == = = =
1 ( 800 ) 34 5 - 3 8 78 T e l e x [ 1 20 u ]
I
• ( 800 ) 358-58 80 ??
• T HUNDER SEVEN ' S I ( 80 0 1 3ti8-3343 T h e Sour c e

• ( 800 ) 4 2 1 -0082 ' p l ease LOG I N '
i List Of NUlbers I
( 8 00 1 42 1 -0092 �i?
I Rev . l . u
I ( 800 ) 424 - 9494 Tel enet
I
Ii ( 800 ) 4 2 ti - 2 ti 38 So f t Sear c h
1 = = = = = = == = == == = = = == = = = = = = = = = = = = = = = == = 1
( 80 0 ) 4 44 - 44 7 2 Nov e l l
( 800 1 52 1 -2255 Aut o n e t
(800) 526-37 1 4 RCA
COlp i l e d as o f 5 / 4 / 8 8
( 80 0 ) 533-5294
( 800 ) 5 33- 52 95
( 800 1 533 - 5 29 6
+ - ----------------+
( 800 ) 5 3 3 - 5 2 '1 7
: ( 800 1 COMPUTERS :
( 80 0 ) 533-5298
+-----------------+
( 80 0 ) 533-5299
( 8 0 0 ) 543-0 0 1 0 C I N T I OH AD
( 80 0 1 222-00 1 1 ??
( 80 0 1 558-00 0 1 AQ r i d a t a
( 80 0 1 222-0555 Wor l d Bank Mal n f r a le
( 800 1 62 1 - 1 4 1 1 F ; eedol n e t wo r k 1 3 0 0 b au d o� l y t
( 80 0 ) 223-33 1 2 C i t i C or p
( 800 ) 6 2 1 - 4243 P a t h o l ogy C l e o
( 800 1 2 2 7-0074 R I 5 BBS
( 8 00 I ti2 1 -9080 Dat a l y n x
I BM 3708
( 80 0 ) 6 2 4 - 5 1 23 AT&T Mal l
( 800 ) 2 2 7 -3083

( 80 0 1 638-8369
( 80 0 ) 227 -3404 Bowlan N e t w o r k
GEn i e
( 80 0 ) 22 7 - 6544 [UnI X ]
( 80 0 1 826-8855 AM . Peop l e l l n k
( 80 0 1 2 2 8-0003 ?? 1300 b a ud on l y *
( 80 0 1 828-632 1 XEROX
( 80 0 ) 228-00 1 8 ??
( 800 ) 84 7 - 0 1 0 9 ??
( 800 ) 2 28-0329 ??
( 80 0 1 848-4480 COlpuse r v e
( 800 1 22 8 -06 1 6
[ D I AL : ]
Mar y l an d C . C .
( 80 0 1 852-0005
( 80 0 1 228-0748 ??
( 80 0 ) 228-0993 BCS
( 80 0 1 228-0994 BCS
+-----------------------+
( 80 0 1 228- 1 1 1 1 V i sa ( ? )
: V O I CE MESSAGE S Y S TEMS :
( 80 0 1 228- 1 1 7 0 ?? +-----------------------+
( 800 1 228- 1 657 PH I LNE T
( 800 ) 238-063 1 Tel enet ( 20 1 1 953-2222 VMB5
( 800 ) 32 1 - 1 646 ?? 1300 baud on l y .
( 3 1 7 ) 26 7 - 1 90 1 VMB5
( 8 00 ) 32 1 -3 9 1 0 ?? ( 4 1 5 1 330 - 783 1 VMBS
( 800 ) 325 - 4 1 1 2
( 4 1 5 1 338-70uO ASPEN
Easy l i n k
( 800 ) 327 -%38 Easynet
( 4 1 5 ) 463-60'3'3 VMBS
( 80 0 1 328-0024 ??
( 4 1 5 1 882 - 7 1 7 0 V"BS
YMBS
( 80 0 ) 328-0 1 3 7 1?
( 70 3 ) 9 3 4 - 3400
( 80 0 1 328-0 1 5 7 ??

800 ' 5 are MUCH b e t t e r •


( 80 0 ) 328-0 1 8 7 BWRR
. .

( 800 ) 328-i;198 ??

( 80 0 1 222 -03 1 1 ASPEN


( 80 0 ) 328-40 1 1 ??

( 800 ) 2 22 - 4663 VM85


Page 44 2600 Magazine Summer 1988
i n g r am ��I t ( h o oa r d
G ') !) ) i 7 7 - M A I L rl C I ;.-1 ', , '
I l ':! l i

l a ') I) U � - V U I I. E i i) l ( e �).j n , t a n o t n e r d I a l u p [ O f" Ij d - ; 1Ci . t f


I dOO J i b l - 8 4 ; 7 un l S Y 5 Answer I n g Se r v i c e
1 8UO l i � 4 - " A 1 L Mer i d I an M a l i

I. b i) l) .! ;j 7 7 - T A ll' \'! M 8 :J
; o U I} ) ti 8 8 - u \.! j \ ! r e c e I ver A rn e r I ( �

i 8uu l 8dd-MA I L P n o n e h a l l S y s t em
l �uu ! � 2 j - �S I 7 VMHj ' 8�u ' dd-yu l l t V O l c eb a n K liS t h e 3 a m e a s i L -VU l lE t
l 80U l 3 2 3 - 8 2 1 4 VMhj
i b u O .! j j � - U U i j Ac c ess Je( V l C �
l du 0 ) j 2 J - � 1 J 4 Vh�j
I dUU ! ���-UU�J Aj�E�
I buU ! J j l - l i b � I nnovat I ve So f t wa r e
( HvU ! � j�- I AL K AjPtN
!. ;j ij ij } :j.3 .3 - fi A 1 L ( t1 0 n e M .i l i J t = r e !f!
i C;' i) (! i 3 4 ': - M A l L "l" J n e M a l i J 'i s t e m t------------------t

VM8S
: u Hl e t r n Li n ::, t u l f :
l. o l. <' I ·o 4 4 - 1 d 8 4

! 80 u ! j4b- � I U4 bec ur l t y L I n k ana l ei e l l n K t------------------t

i �uU ) 4 2 � - 7 5 j 4 V"bj
( 2 U l ) b 4 4 - L 3 j i) j !l F n t f.' r J � r �. i: � i-i il 1 � C; I rl ,.".j IT! P • • • L1 )
I dUU l 4L4 34J4 VMbj
U 0 1 J b H - i J .J 2 . • . !.· a l i t rd 3 i:, n e ( o l l e n � I

1 80U I 4 2 4 - 6i�2 IT f M a l l S y s t em
l .: u l l b 4 4 - l 3 J 5 News ber V I C E
VO I C 2

i 8UU I 43 } - b I UU Phone Mal l System


U I.l l .d:.4 4 - d j E, ( " i: n t e r f l f 3 t a n d 1 1 , \ n U 2 • . . " ,

( ci 0 U ) 4 4 1 - j S l i VMbj
! �v l ) b44-�j3� C r e d i t l f a � s f p f j A l �i
VMb�
' i " i \ b4 � - l jjj Au t o � a t e d J u r o r Se l 2( t
1 80U ! 444-�uUJ
\ ou u ! 4 4 J - � A . L P h o n e M a l l j j s t e rn
i � U l l b4 4 - lJ4U lred l t l r a� 5 ! er ! A i M
l bv v ) �jb-bd�� U J y mp l c i r a n s p o r t a t l o n
1 2v 1 Q4�-JD L l � ( ffi p u t e ( l : e Q l e s t
I dUU I J . I - dQ / 1 VMb�

l dVU I J4 1 - Ub Q I 1Mb] �� ' 4 )b- j . 1 4 T h e �n l t e house


I �UU J � � J - �A 1 L VM�:
� i,.l i.: 1 4 � b - 7 6 .:., '� t. ., e l: u t l \' 2 r. � f ; _ _ o r ; h e t'( e '� l G e n t
( d v i} j b J � - � l � b jMb�
l V i .! 4 5 7 - � 9 8 u Hr l dg e
I b U i) l b j 4 - L b 'j ,' S e c u r i t y I. N I I f e I n s u r a n c E \ i} ': H i - .j i i..".)
� J b l' I G Q 2
l 80u ' 66L-MA 1 L VO I c e Message E X C hange
\ 80u ' b ! � -�A I L VMbS

N ll l t ::, ; t i n e U U I .J b 4 4 - A X X X n U ITi o e r s a r e ,yd y b e d ,: ,:; m p l l t e i ; : e d t e s t n u m o e r s a n a


t h e I r j UG c t l 0n � dIe n o t 1C I Ua l l J p u t I n t o e l t ec t ,a; ;J a; . K n GW ) .

t 'i t"l e s t a t u ::. o f b r l o g e s m a y ,� "l a n 9 E u a : � y , ":e - ..t· ri t'


- LI '- ,. 01r r1-:. '}
, ..
:�! j' 11! a V

n I) t be up
at d q l v e n t l ffi e . A l i t h e o n e s O� h e r e 11 d i e w o r k e d r � :: E Gt l j .
\ ] n e , l X k I n r l n Q b a c k n u mo e r s 3 ( E t 1 2 l ast � 01 y o u r numaer , a n a y ou
{� l i l P ( O l} d O i y h a V 2 t o p l ( r. Jj iJ t I"! e n� ,'l n- ,1 E a n a n a n "tn II u p a o. lin C � ; O ( E It ( I nqs.
� or l ar g e l l st _ ''',; e. j l n e S , t d U L A 'l e " , I I} ,; b ,, , '.
.
_ ,'·
·,·., t. I·,. P · · i '.•.
.H _ see ,. ' �
1: � (r T

I tLt�0M Par : . 1 , many �:J I I ,G( k .

Summer 1988 2600 Magazine Page 45


1 2 ( 2 ) 9 7 U - 4 7 4 7 , 4 8 4 8 , 7 2 7 2 , 7 9 7 9 , 8U80 , H6 86 , 8 7 8 1 , 3 U j u , � 4 � 4 , j 8 � d , S j � j
( 2 1 3 ) 6 1 7-2287 � l b Bac k d o o f
( 2 1 3 ) 6 1 7-3284 � 7 6 Bac k d oo r
\ 80 0 ) 7 7 Hi E E T bay Con f e r en c e L i n e ( k i l l em ' i) f,
( 2 1 3 ) 935- 1 1 1 1 Sweep l on e l es t
1 8u O ) 826-6290 Automat i c u l s c onnec t Ser v i c e
( 2 1 4 ) 3 5 7 -8686 Sw ee p T o n e T e s t
( 800 1 8 7 7 - 4 7 0 0 S p r i n t Wea t h e r L i n e
( 2 1 5 1 340-0052 Pa c k e t Swi t c h
( 80 1 ) 782-9699 S w e e p l on e T e s t
( 2 1 5 ) 53 8 - 7 032 Pac k e t S W l t c n
( 8 1 8 ) 7 6 1 - 1 1 98 Br i dge
1 2 1 5 ) b l u- X m k i n g b ac k l 2 1 5 ��A l
( 8 1 B ) 50 1 -3400 Br i d g e
( 2 1 5 ) 6'j t!-lj()4'j Sweep T o n e l es t
0 -959 - 1 230 CO i n fest ( wor k s I r OI sOle payphones J
i 2 l J 1 86 / - 1 2 1 2 W l l O Weat h e r l l n e
0-700-456- 1 00 x A l l i a n c e T e l e c on f er e n c i n g
( 303 ) 363-5�29 Br i d g e
1 004 1 - 1 - 7 u u - 7 1 7 - 7 7 7 7 A l l n e t Con f e r en c e
( 3 1 2 ) 592- 6888 Br i d g e
( 3 1 3 ) 424-0900 M i c h . B e l l Au t o . a t ed C N / A
( 3 1 3 ) 82 7 - 7 1 5 1 Br i d g e
( 4 1 2 1 633-3333 A T � T News l i n e , PA @ L6uO NO T E : kE T HUROUGHLY D E P L O R E l tiNOkAN I
( 4 1 5 ) 284- 1 1 1 1 Sweep l on e Test AND P H E J U u I CE O 5 1 A 1 E M E N T S L I k E T rl l S ONE
( 5 1 3 ) 375-8580 Br i dge AND HOPE MOST Of OUR RE ADE R S D O T OO . W t
( 5 1 3 ) 24 1 -85BO Br i d g e DEC I DE D T O K E E P I T I N T H I S L I S T T O F A C E
( 60 3 ) 226-3949 Br i d g e UP T O T H � F AC T THAT THE HACK / P H R E A K
( 6 1 7 ) 494-9900 Sweep T o n e T es t WORLO HAS I T S OWN REDNECK ELEMEN T .
( 6 1 9 ) 3 7 5 - 1 234 f i le & Te.per a t u r e
( 7 1 7 ) 255-5555 A T & T Newsl i ne , P A
( 7 1 8 1 528-9979 S wee p T o n e T e s t
I B O U ) 222-TALk Conso l i d a t ed Connec t i on T a l k i n g Y e l l o w P a g e s
( 80 0 1 223-33 3 1 B a n k - B y -P hon e
( 80 0 ) 225-0233 Con f e r e n c e O p er a t or
( 80 0 1 228-00 1 4 CG Lhec � ( h i t I a f t er t o n e l
( 80 0 1 228-0032 CC C h e c k ( h I t I )
( 80 0 ) 228 -'3'30 1 CC CheC K
( 80 0 ) 233-3996 D i sc over C h ec k
( 80 0 ) 2 5 7 - T ALK Mon e y T a l k
( BOO ) 325-5555 AT�T se r v i c e r epo r t / C h ec k ?
( 80u ) 32 7 - 1 1 1 1 V i s a / M as t e r c a r d Ch eC K
Or i g i n a l l y up l oa d e d t o :
( 80 0 ) 433-4424 D i sc over Ch ec k
======================
( 800 ) 424-5454 f r aud Ho t l i n e
kh l t e house P r es s L i ne
At l an t i s
( 8 0 0 ) 414-90�O
D i g i t a l Log i C
( 80 0 1 445-3024 Spr I n t Uper a t or
J a m Demo Hot l i n e
Delon Roa c h U n a e r g r o u n d
I Bu o ) 526-3366
T h e Cen t r a l O f f i c e
( 80 0 ) 5 2 7 -6 1 78 M i d a s Touc h C r ed i t Chec k
( 80 U I 528-2 1 2 1 Amer i c an E x p r e s s Cn e c k
( 80 0 1 554-2265 V i s a C h ec k
( Bu O l b92-816b W a t son VO i c e hessage Demo
( 80 0 ) 7 3 2 - L255 " H i g h Seas " Op e r a t o r

Page 46 2600 Magazine Summer 1988


N OT I C E
D o e s y o u r a d d r e s s l a be l s a y "T i m e to R e n ew " ? D o n ' t m i s s a n
I s s u e . R e n e w yo u r s u b s c r i p t i o n t od a y a n d e n j o y p e a c e o f m i n d .
S i m p l y i nd icate t h e a m o u nt e n c l osed a nd wh i c h , i f a ny, back
I s s u e s y o u w a n t . Y o u r a d d r e s s l a b e l s h o u l d b e o n t h e b a c k of t h i s
fo r m .

$1 5 . . . . . . . . . . . . . . . . . . . . . . . 1 y e a r of 2600
. . . . . . . . . . . . . . . . . . . . . . . . .

$ 28 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 ye a r s
of 2 600
S41 . . . . . . ... . . . . .
. . . . .
. . . . . . . 3 years
of 2 600
. . . . . . . . . . .

$ 40 . . . . . . . . . . . . . . . . . . 1 ye a r c o r p o r a te s u bsc r i pt i o n
$ 75 . . . . . . . . . . 2 y e a r c o r p o r a t e s u b s c r i pt i o n
s 1 ! 0 . 3 y e a r c o r p o r a t e s u b s c r i pt i o n
S 25 . . . . . . . . . . . . . . . . . . o v e r s e a s s u b s c r i pt i o n ( 1 ye Cl r o n l y )
$ 55 . . . . . . . . . . . . . ove r s e a s corpo r a te s u bsc r i pt i o n ( 1 yea r o n ly )
5 2 60 . . l l f e t i m e s u b s c r i p t i o n ( n e v e r a g a i n w i l l w e b ot h e r y o u )
.

Back I s s u e s a r e ava i l a b l e . Pr i ces a re :

$25 . . . . . . . . . 1 9 84 , 1 9 8 5 , o r 1 9 8 6 i s s u e s (1 2 pe r y e a r )
$ 50 . . . . . . . . A n y two y e a r s .

S75 . .A I I t h r e e y e a r s ( 3 6 I s s u e s )
I O v (; r S f.; (j �) or d e r s a d d 5 5 f o r e a c h y e a r o r d e r e j )
A l l ow 4 t ( ) (3 w e e k s f o r d e l i v e r y

S ( : n d Cl i l or d e r s t o . 1 987 ISSU ES
2 6 00
A LSO AVAI LA B L E t
PO Box 7 5 2
M l d d l p I s l ;m d , N Y 1 1 9 5 3 U . S . A
( 5 1 6 ) 7 5 1 · 2 6 00
-----------------------------

A M O U N T E N C LO S E D F O R S U B S C R I PT I O N : __

A M O U N T E N C LO S E D F O R B A C K I S S U E S :

1 984 1 985 1 986 ( c i rc le yea rs o rd e red )


T O T A L A M O U N T E N C LO S E D : _____

(clip a n d s e n d to us-- your address is on the back)


ALLN ET'S LEGAL PROBLEMS . 2 . . . . . . . . . . . . . . . . .

A SOLUTION TO ViRUSES . . . . . . . . . . . . . . . . . . . . . . . 4
HOW TO WRITE A ViRUS . .. 8 . . . . . . . . . . . . . . . . . . . . .

BU I LDING A RED BOX 13 . . . . . . . . . . . . . . . . . . . . . . . . . .

REPLY TO CAPTAIN ZAP 16 . . . . . . . . . . . . . . . . . . . . . . .

LEITERS . . . . . . . . . . . . . 24
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2600 MARKETPlACE 41 . . . . . . . . . . . . . . . . . . . . . . . . . . . .

RJN PHON E NUMBERS 44 . . . . . . . . . . . . . . . . . . . . . . . . .

I
,"

S ECOND CLASS POSTAGE

I Permit Pending at
E ast S et a u k et . N Y
1 1 733

I �� S N 0 7 ..1 9 - 3 8 5 1

2600 Maaazine
PO Box 752
Middle Island, NY 1 1 953 U.sA
Forwarding and Address Correction Requested

Вам также может понравиться