==Phrack Inc.==
Volume One, Issue Nine, Phile #1 of 10
Introduction
""""""""""""
Welcome, after an ever-too-long gap, to Phrack Inc. Issue Nine! Yes,
I've waited too long to do this, but hey, what can I say. We have it together
now and the file content is quite good, with some unique new writers as well
as some old ones popping up again. Let me once again stress that ANYONE can
write for Phrack Inc. You aren't required to be on a particular board, much
less a board at all, all you need is some means to get the file to us, as we
do not discriminate against anyone for any reason. This Phrack issue contains
the following:
#1 Introduction to Phrack Inc. Issue Nine by Taran King (1.4K)
#2 Phrack Pro-Phile on The Nightstalker by Taran King (6.4K)
#3 Fun With the Centagram VMS Network by Oryan Quest (3.9K)
#4 Programming RSTS/E File2: Editors by Solid State (12.9K)
#5 Inside Dialog by Ctrl C (8.4K)
#6 Plant Measurement by The Executioner (12.8K)
#7 Multi-User Chat Program for DEC-10's by TTY-Man and The Mentor (6.5K)
#8 Introduction to Videoconferencing by Knight Lightning (10.5K)
#9 Loop Maintenance Operations System by Phantom Phreaker and Doom Prophet
(17.2K)
#10 Phrack World News VIII by Knight Lightning (16.3K)
==Phrack Inc.==
Volume One, Issue Nine, Phile #2 of 10
==Phrack Pro-Phile VI==
Written and Created by Taran King
9/28/86
Welcome to Phrack Pro-Phile VI. Phrack Pro-Phile is created to bring
info to you, the users, about old or highly important/controversial people.
This month, I bring to you a particularly influential user from days of old...
The Nightstalker
~~~~~~~~~~~~~~~~
The Nightstalker was involved with Tap and 8080B, the first home
computer which he helped build for NY Telephone.
------------------------------------------------------------------------------
Personal
~~~~~~~~
Handle: The Nightstalker
Past handles: Stainless Steel Rat, The Old Wazoo, C.T.
Handle origin: TV movie and series called "The Nightstalker"
Date of Birth: 12/51
Age at current date: 34 years old
Height: 6'+
Weight: 200+ lbs.
Eye color: Blue-Green
Hair Color: Brownish-Black
Computers: ALTAIR 8080B, Apple IIe, Commodore 64
------------------------------------------------------------------------------
The Nightstalker started in the phreak world in 1971 due to the
Esquire article on blue boxes and YIPL magazine. He obtained his first blue
box by January, 1972. He started hacking in 1975 after obtaining a TI Silent
700 Series, Model 700 exceedingly dumb terminal. He stumbled upon ARPAnet in
Massachusetts, the bridge at MIT...1 hour later, he figured out how to get
on. He toyed with the MIT exchange and found the MULTICS system and their
artificial intelligence system. They were just beginning to use a language
called LISP at the time. He also helped with the building of the ALTAIR
8080B, holding 22 slots for cards 4 inches thick, 18 of which were used to get
16K on the computer. He helped out NY Telephone with "Let's Get Together", a
game at fairs which utilized Area Codes for answers. He also was involved
with the standard old phone phreak tricks like a loop around the world from
one phone booth to the one next to it. His first computer was a Commodore 64
due to the cost to him (free) and it was easier to upgrade than the Apple IIe
(pick up a brochure on Commodore and see how many voices it has as well as the
tone range...I'm sure that it covers 2600 hz quite nicely).
Members of the telecom world which he has met include Cheshire Catalyst,
Captain Crunch, Steve Wozniak, and Bill Gates (head of Microsoft). He has met
many phone phreaks at science fiction conventions, but doesn't know them by
name or handle.
-------------------------------------------------------------------------------
Interests: Telecommunications (modeming, phreaking, hacking),
telecomputing, science fiction, short wave radio, scanner
listening, classic music, and shooting.
The Nightstalker's Favorite Things
----------------------------------
Women: Goes without saying; preferably ones involved in science
fiction as an interest or a hobby.
Sci-Fi Cons: He attends many and has met many phreaks through them.
Short wave radio: As previously mentioned, scanning.
Hack: A classic hack (scam), participating in or hearing of.
Anarchy: Confusing people with authoritative positions.
Shooting: Target shooting or machine guns.
Space programs: Obsessed since Sputnik program.
Most Memorable Experiences
--------------------------
Machine gun gallery in Atlanta, Georgia. Lots of fun!
First time he hacked his way into a trade show.
Boxing a call to AUTOVON and to Lebanon during U.S. occupancy and billed the
call to the local KKK member.
Some People to Mention
----------------------
Ron Rosenbaum (wrote the Esquire article on Blue Boxes [all his fault]).
Various science fiction authors.
Wozniak and Jobs (for inventing the Apple).
MIT (for inventing the Altair computer).
Marx Brothers (for his anarchial views towards bureaucracy).
Robert Shea and Robert Anton Wilson (wrote Illuminatus Trilogy [recommended]).
John Draper (for showing us all how it was done).
Original MIT Hackers (for showing us the light).
AT&T (for providing us with this wonderful Network).
------------------------------------------------------------------------------
The Nightstalker is not fond of the current society that claims themselves as
hackers or phreakers but don't learn the systems themselves. These aren't the
real hackers that sit down and literally hack away at a system. Pirates
aren't hackers. Just because you have a computer doesn't mean you're a
hacker. Another thing he's displeased about is the term "hacker" used by the
media as anyone owning a computer. He considers the people that destroy
systems criminals and fiends, not hackers. Those that find the back doors and
something unknown about a system non-malevolently or without profit in mind
are true hackers and phreakers.
About computers, The Nightstalker has strong feelings about the symbolisms of
the brand names as status symbols in society. He feels, rather than buying
the computer because it's the most expensive, the neatest looking, or what
everyone else has, you should buy it for it's capabilities which can help you
rather than hypothetical situations many computer advertising agencies use.
------------------------------------------------------------------------------
I hope you enjoyed this phile, look forward to more Phrack Pro-Philes coming
in the near future. ...And now for the regularly taken poll from all
interviewees.
Of the general population of phreaks you have met, would you consider most
phreaks, if any, to be computer geeks? He feels that the term, "computer
geek" or closer, "geek" is too relative to be able to generalize. There have
been people that he's met, though, that he'd not wish to exist on the same
planet with. Thanks for your time, Mr. Nightstalker.
Taran King
Sysop of Metal Shop Private
==Phrack Inc.==
Volume One, Issue Nine, Phile #3 of 10
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% %
% Oryan Quest presents... %
% %
% Fun With the Centagram VMS Network %
% %
% Written 10/13/86 for Phrack Inc. %
% %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Introduction:
Centagram VMS networks are located throughout the country. This file will
briefly outline ways of defeating all Centagram security and how to become a
superuser. I take full responsibility for any deaths, injuries, or venereal
diseases resulted from use of the information in this file.
Finding the idle VMS:
Generally, the easiest way to find an idle VMS is by scanning the last
digits in the net (ie: XX99, XX98, XX97 etc.). The idle VMS will identify
itself by saying, "Please leave your message at the tone" or something to that
effect in a clear, female, synthesized voice. It will not sound unclear in any
way. AHA! You've found your victim.
Attacking the idle VMS:
While the "Please leave.." message is playing, hit 0. It will ID itself
as "Mailbox XX99, please enter your passcode". If the mailbox does not say the
above message then DON'T fuck with it. It is probably in use and any effort
you make to hack it will be useless because it will just get taken over again.
At this point, you must hack a 4 digit passcode. The usual defaults are as
follows are 5000, 9876, 1234, and any # is that order. Usually, most accept
1000, 2000, 3000, etc. I don't think 4 digits is to much to ask. W0W! Your in!
It will then tell you how to change your passcode and generally customize your
newly stolen VMS.
Hopping around the net:
Suppose you have a friend that has mailbox 5286 and want to read his mail
(if you have their passcode) or just want to listen to their announcement. You
enter 9 on your VMS command module to logoff while it is saying "You have X
messages remaining. Bye!" you enter the # or a 0. It will then ask you for a
four digit extension. You enter 5286 and WHAM! you get their announcement.
Now, wasn't that fun.
Becoming the superuser:
So, you want to fly higher than no man has ever done before; you want to
leap high building in a single bound; you want to be a stud. Well, listen to
Oryan, he'll tell you how. Well, remember how you jumped across the net?? You
follow the same procedure but, when it asks you for a four digit extension,
you enter 9999 or 9998 or even 0000. If you were successful, it will ask you
for a second four digit extension. You will have to hack this one on your own.
But, I have found on at least 3 nets that it was 1986 or 1987. Gee, people are
dumb aren't they? Once you hacked this, it will give you an expanded menu.
WOW! You can now, read anyone's mail, take over VMS's and disconnect VMS's.
Other commands depend on the net. But you can bet there are always a bunch of
k-rad commands!
Conclusion:
I hope you have enjoyed this file. Watch for updated versions in Phrack.
If you have problems finding Centagrams, here are a few nets: 214-733-XXXX,
415-647-XXXX, 408-790-XXXX. I can be reached at 214-733-5294. Don't play with
my net. If I see idle mailboxes getting taken over I will just get rid of
them. There are plenty of other networks. Special thanks to: Taran King Knight
Lightning, SJE, The Egyptian Lover, and Ryche. Some added notes: Call the
Attila the Hun/Master Blaster loser line at 214-733-5283.
(C) Quest/Sentry Productions 10/13/86
==Phrack Inc.==
Volume One, Issue Nine, Phile #4 of 10
$$$$$$$$$$$$$$$$$$$$$$$$
$ PROGRAMMING RSTS/E $
$ File2: Editors $
$ by: $
$ Solid State $
$$$$$$$$$$$$$$$$$$$$$$$$
Written (c) Oct 11, 1986
------------------------
Within this article I will be focusing on the TECO text editor found on
almost every installation of RSTS that you will pass by today. I feel it is
unneeded to do a write up on the other editors such as EDT, a screen editor
for VT100 and VT52 terminals, and EDFOR, a FORTRAN text editor, as most
hackers will not have the proper hardware/software at their disposal.
This file does not contain many tricks, but has straightforward information
that most assuredly can be found in the user manual. Since not everyone has
access to help documents though, this file will provide a base for the first
time editor user and hopefully a reference for the experienced. If you feel
otherwise.. don't waste your time reading it.
Following the main portion of the file is an updated copy of the decoy
trick I promised to revise that was featured in my first file. Hopefully, (I
am not promising though), I have succeeded in removing all the bugs this time.
USES
====
A text editor, for those of you that happen to be brain dead, is a utility
similar to the word processor you use everyday on your micro: it allows a
person to create, modify, and compile text files. But, also can edit, and if
need be, create program files. For these reasons and many others, knowing how
to use an editor thoroughly can be a major advantage to the hacker on future
explorations.
EXECUTING
=========
Typing TECO invokes the TECO text editor. If TECO is just typed without any
modifiers, then the file edited last will be placed in the editing buffer.
(More on this subject can be found below under MEMORY.) To edit a different
file, or create a new file, the following forms are used:
TECO filename.ext To edit an existing file.
TECO outfile.ext=infile.ext To edit from one file to another.
MAKE filename.ext To create a new file.
Other ways to execute TECO involve VT terminals, but we are not going into
that much detail within this text.
INITIALIZATION
==============
If there is a file named TECO.INI in your directory when TECO is invoked,
it is assumed to be the macro settings for a VT terminal. We don't need to
bother with those, so make sure to disable the search by appending the switch
/NOINI on execution.
MEMORY
======
Each time TECO is executed, the name of the file being edited is placed
into another file titled TECFnn.TMP where nn is your job number. If you invoke
TECO and wish to edit a file different than the one currently in the memory
file, select the switch /NOMEMORY.
MODIFIERS
=========
There are a number of options, called switches, which modify the execution
of the TECO utility. Some like /NOINI and /NOMEMORY I have previously
mentioned. Other important switches follow along with a short description of
each. To select one of these options, append it to the call string when you
invoke TECO:
TECO filename.ext /[option1] /[option2] ...
/FIND This places the pointer at
the last marked position
within the input file.
/INSPECT If selected, you can only
read the file, not edit.
There are a few more that deal with the VT terminals, but as I've said
already, there is really no need to list them.
INTERRUPT
=========
The control character 'C' (CTRL/C or ^C -which it shall from now on be
referred to as.) is used to halt the execution of the current TECO command,
the same as it does in the BASIC monitor. If ^C is typed twice without a TECO
command in between, the utility is aborted. (You are returned to the keyboard
monitor whichever it was.. eg. BASIC, BASIC+2, RSX..)
COMMAND EXECUTION
=================
When TECO is called, you will receive the * prompt. This is the command
prompt. Almost all commands used by the editor are one or two characters in
length and are typed in using a normal ASCII keyboard. To terminate a TECO
command the sequence is used. When typed, it will echo back as a $
character. Two consecutive s must be entered before a command will be
carried out. This allows you to string together a line of commands like:
* [command1]$[command2]$[command3]$ ... $$
COMMANDS
========
]Moving the Pointer[
The text pointer is used to represent where you are working, ie. if you
were to enter a command, what part of the text it would affect. It's similar
to the job your cursor does when writing a program on your micro.
'J'
The "J" command is used to move the text pointer to the beginning or end of
the editing buffer.
BJ Move to the beginning of the buffer.
ZJ Move to end of the editing buffer.
'L'
The "L" command moves the text pointer from one line to another. Common
forms of the command are:
L Move to beginning of the next line.
0L Move to front of current line.
3L Move to the third line down from the current line.
-1L Move back to previous line. (One above current.)
...
'C'
The "C" command is used to move the text pointer past a specified number of
characters, forward or backwards, on the current line. Common forms include:
C Advance the pointer to the next character.
5C Move the pointer forward five characters.
-5C Move back five characters.
...
]Listing Text[
There is one command with a couple various forms to list the text within
the editor; they follow.
'T'
The "T" is used to list text from the editing buffer. Commonly found forms
are:
HT Print the entire contents of the editing buffer.
T Type text from the pointer to the end of the current line.
0T Type text from the beginning of the line to the text pointer.
5T Print the next five lines of text from the buffer, starting where
the pointer is located.
...
]Entering Text[
What use is an editor if you can't add to the text? There is one command,
insert, which allows you to write. If you are creating a file from scratch,
you would enter the insert command each time you wanted to add a new line to
your document.
'I'
The "I" command is used to insert text into the buffer. After issued, the
text entered will be placed where the text pointer is located. The command is
of the form:
I
For example, to insert the sentence, "This is an example.", type:
IThis is an example$
(Note: Remember that echoes back to your screen as $)
]Deleting Text[
The TECO text editor makes it easy to delete words, sentences, etc. from
the buffer. There are two different commands used, line delete, and letter
delete.
'K'
The "K" issued when you choose to delete lines of text from the editing
buffer. Common forms are as follows:
K Delete the text from the pointer through the end of the current
line.
0K Delete the text from the beginning of the line to through the
pointer.
5K Omit the following five lines from the buffer.
HK Kill the entire contents of the buffer.
...
'D'
The "D" appropriately is used to delete individual characters. A few of the
forms found are:
D Delete the character which follows directly after the text pointer.
5D Delete the following five characters from the text, starting from
the pointer.
-1D Delete the character directly behind the pointer.
...
]Searching[
All good word processors include a routine to search and replace a string
of text. So does the TECO text editor. Two forms are used, the locate text,
and the search and replace text commands.
'S'
The "S" is used to locate a specified string of text currently in the
editing buffer. If the text is found, the pointer is positioned directly after
the specified text. If the string is not found, an error message results and
the text pointer is placed at the beginning of the buffer.
S
For example, to locate "This is an example.", enter:
SThis is an example.$
'FS'
"FS" for find and replace does exactly that. It searches for a specified
string of text, and if found replaces it with another sting of text. If the
specified text is not found though, the pointer is positioned at the beginning
of the buffer just like the "S" command. The "FS" command is of the form:
FS
For an example, to replace "hullo" with "hello!", use the command:
FShullo$hello!$
]Saving[
To save the new version of the file which you have been editing, you enter
the exit command and it shall be saved in your directory. Remember though, if
you wish to quit but not replace a file with your edited version, just type ^C
twice.
'EX'
The "EX" command is used to write the current buffer to the output file,
then exit from TECO. For example:
EX$$
(Note: Remember that is echoed as $, and typing twice causes
a command to be executed.)
FLAGS
=====
The TECO text editor is not limited to the commands already shown. The
editor has a few flags which can be entered at the * prompt that will modify
the TECO environment.
To examine the value of a flag type:
[flag]x
Where [flag] is the specified flag and x is a numeric argument which returns
text. To set the value of a flag enter:
x[flag]
Where x is the number or command being specified for the flag [flag].
'EH'
EH is the error handling flag. Here's the table of arguments and their
meanings:
Value Meaning
1 If an error is encountered within the operation of TECO, only the
3-character error code is printed.
2 If an error is encountered during operation, a short message
explaining the error is printed. (default setting)
3 If an error is encountered, the command(s) which led to the error
are printed.
'ET'
ET, or Edit Terminal, is the command for modifying terminal output. Table
of arguments follows:
Value Meaning
1 Output is in image mode.
2 Terminal in use is a scope.
4 Terminal in use has lowercase available.
8 ^T is read without echo.
16 Cancels ^O during output.
128 TECO aborts if an error is encountered.
256 Output to screen is truncated to the terminal's width.
512 VT terminal support available.
1024 (same as above)
32768 Traps ^C
'^X'
^X, the last flag I'll mention, deals with searches. (Look above for the
command to search.)
Value Meaning
0 Either case matches during searches.
1 An exact case match is required to complete a search.
CONCLUSION
==========
That just about wraps up the TECO text editor.. boring eh? But as I've said
time and again, editors are important to hackers.
Till next time...
Solid State
>>>PhoneLine Phantoms!
_______________________________________________________________
File1- Addendum:
Here's the updated version of the decoy program (yeah, the one that had an
error!) that was featured in File1. The concept of this revision is slightly
different, but it 'should' work more efficiently and easily than the first.
To execute the program, first do a SYstat and record the KB numbers of
potential targets. Run the program, and enter the number of the KB only..
(Don't hang up!) ..then just wait till the program has ended and then check
the output file.
Note: This listing will not without modification work on all systems or under
all conditions.
1 ! R S T S decoy
10 EXTEND
100 ON ERROR GOTO 1000
120 PRINT CHR$(140):PRINT:PRINT
130 INPUT "To which keyboard (KB)";K$
140 K$=CVT$$(K$,4%)
200 OPEN "KB:"+K$ AS FILE #1%
220 INPUT LINE #1%,A$
230 IF CVT$$(A$,4%)="" THEN 220
240 PRINT #1%
240 PRINT #1%,"RSTS"
250 PRINT #1%
260 PRINT #1%,"User: ";
270 INPUT LINE #1%,U$:U$=CVT$$(U$,4%)
280 T$=SYS(CHR$(3%))
290 PRINT #1%,"Password: ";
300 INPUT LINE #1%,P$:P$=CVT$$(P$,4%)
310 Z$=SYS(CHR$(2%))
320 PRINT #1%
330 PRINT #1%,"Invalid entry - try again":PRINT #1%
340 CLOSE #1%
400 OPEN "DATA.TXT" FOR OUTPUT AS FILE #2%
410 PRINT #2%,U$;";";P$
420 CLOSE #2%
999 END
1000 PRINT "?ERROR line #";ERL:STOP
==Phrack Inc.==
Volume One, Issue Nine, Phile #5 of 10
<*************************************************>
<* *>
<* Inside Dialog *>
<* By *>
<* Ctrl C *>
<* Advanced Telecommunications Inc. *>
<* *>
<*************************************************>
DIALOG is one of the largest online databases. DIALOG
currently provides access to over 250 databases containing a
total of over 100 Million records. The range of information
available is enormous.
BEGIN:
The BEGIN command starts a search and tells Dialog which
database you want it to check out. The BEGIN command is followed
(without a space) by the file number of the database you want.
Either of the following ways could get you into the file 229
(Drug information):
Begin229
or
B229
Dialog will then put the date, the time, your user number,
and what it costs for the database you just left. For example,
if you move from ERIC (file 1) to Management Contents (file 75)
it would look like this:
-------------------------------------------------------
? b75
28sep86 13:59:25 User08331
$0.10 0.00 Hrs File1
$0.02 Uninet
$0.12 Estimated Total Cost
File75:Management Contents - 74-86/Sep
(Corp. Management Contents Inc.)
Set Items Description
___ _____ ___________
-------------------------------------------------------
EXPAND:
The EXPAND command is used to pick keywords for a search.
You can search for any word; but knowing how common a word is
gives you a good idea where to start your search.
All databases have a index of searchable words. You can see
if there are any words of the same spelling to a keyword you want
to search for. For example:
-------------------------------------------------------
? Expand Drink
Ref Items Index-term
E1 1 Drina
E2 1 Drinfeld
E3 31 *Drink
E4 2 Drinkers
. . .
. . .
. . .
E12 3 Dripping
-------------------------------------------------------
The word -more- at the bottom of the screen means that
typing Page or P will display another screen of information.
SELECT:
When you find the word you want to search for, you use the
SELECT command to tell the database what to search for. The
SELECT command can be followed with one or more search terms.
SELECT STEP:
The SELECT STEP command works just like the SELECT command,
except the files it finds are listed separately.
-------------------------------------------------------
? SS television? OR tv
1 21347 TELEVISION
2 6376 TV
3 22690 1 or 2
? SS s3 AND violen? AND child?
4 1680 VIOLEN?
5 20577 CHILD?
6 38 3 AND 4 AND 5
-------------------------------------------------------
TYPE and DISPLAY:
There are two commands, TYPE and DISPLAY, that you can use
to look over the information you have found. The difference is
the TYPE command causes a non-stop list of the information. The
DISPLAY lets the information to list a page at a time, you have
to type PAGE or P to see the next page.
DIALOG offers nine formats to display retrieved files.
Format Parts of Record Listed
~~~~~~ ~~~~~ ~~ ~~~~~~ ~~~~~~
1 Accession Number
2 Complete record except abstract
3 Bibliographic citation
4 File dependent
5 Complete record
6 Accession number and title
7 Bibliographic citation and abstract
8 Accession number, title, and indexing
9 File dependent
LOGOFF:
The LOGOFF command has no abbreviation. It's self
explanatory.
DIALOG is has help commands, typing ?HELP, or ?EXPLAIN will
give you help.
-------------------------------------------------------
? ?EXPLAIN
Valid EXPLAIN commands are:
Basic Commands:
?BEGIN ?ENDSDI ?MAPRN ?SCREEN
?COMBINE ?EXPAND ?ORDER ?SELECT
?COST ?KEEP ?PAGE ?SFILES
?DISPLAY ?LIMIT ?PRINT ?SORT
?DS ?LIST ?REVIEW ?TYPE
?ENDSAVE ?LOGOFF
***
News/Status:
?DIALINDX ?FILESUM ?ONTAP ?SUBSCRIP
?DISCOUNT ?HELP ?RATES ?SUPPLRS
?EXPLAIN ?INSTRUCT ?SCEDULE ?TOLLFREE
?FILES ?MESSAGE ?SDI ?TRUNCATE
?FILESAZ ?NEWS ?SEMIARS ?UPDATE
***
Telecommunication Access:
?ACCESS ?DIALNET ?SABD ?TRANSPAC
?DARDO ?FINNPAK ?TELENET ?TWX
?DATAPAC ?IDAS ?TELEPAKD ?TYMNET
?DATEX ?NORPAC ?TELEPAKS ?UNINET
?PSS ?TELEX ?WATS
***
File Information:
?FIELDn* ?FILEn* ?LIMITn* ?RATESn*
*Enter desired file# in place of the n
***
Training (DIALOG Service):
?TRAIN (For information on DIALOG
training sessions, including
descriptions of particular
training sessions.)
***
Training (Database Suppliers):
?ANZNEWS (Australia/New Zealand)
?CANNEWS (Canada)
?EURNEWS (Europe)
?KINONEWS (Kinokuniya Japan)
?MMCNEWS (Masis Japan)
?USNEWS (United States)
***
Online User Group News:
?CANOUG ?OUGNEWS MMCOUG ?USOUG
?EUROUG
-------------------------------------------------------
Logging on
For: Type:
Telenet C 41520
C 41548
C 213170
C 213236
Tymnet DIALOG
UNINET DIALOG
Dialnet DIALOG
To dial directly:
Baud: Number:
300 415/858-2575
300 415/858-2461
1200(Bell 202) 415/858-2421
1200(Bell 212A)415/858-0511
1200(Bell 212A)415/858-2460
1200(VADIC) 415/858-2391
WATS:
1-800/847-1620
1-800/792-6680
When it connects type P.
When you connect it will say ENTER YOUR DIALOG PASSWORD.
Passwords are usually eight letters long. When you type the
correct password you will see something like this:
-------------------------------------------------------
ENTER YOUR DIALOG PASSWORD
XXXXXXXX LOGON File1 Sun 28sep86 18:35:12 Port866
** FILES 13,104 & 139 ARE UNAVAILABLE **
** FILE 262 SROTS ARE NOT WORKING **
** FILES 7 AND 50 ARE NOT WORKING **
And a bunch more shit..
-------------------------------------------------------
When the announcements are done, you are given a question
mark (?). The first command you will want is to move to a
database. This is done by typing B(no space) and a the database
number.
-------------------------------------------------------
? B296
28sep86 18:37:22 User08331
$0.00 0.006 Hrs File1*
$0.05 Telenet
$0.05 Estimated Total Cost
File296:ONTAP TRADEMARKSCAN - O.G.
(END/SAVE, END/SDI, .EXECUTE, .RECALL, & .RELEASE invalid for file)
Set Items Description
--- ----- -----------
-------------------------------------------------------
I don't have a list of all the databases, you'll just have to
play around with it.
Here's a few I know of:
File Database
---- --------
75 Management Contents
201 ERIC
204 CA Search
205 BIOSIS Privews
208 Compendex
213 INSPEC
215 ABI/INFORM
216 PTS Prompt
229 Drug Information
231 CHEMNAME
247 Magazine Index
250 CAB Abstracts
254 Medline
290 Dialindex
296 TrademarkScan
Summary of command Abbreviations
B=BEGIN E=EXPAND S=SELECT SS=SELECT STEP
T=TYPE D=DISPLAY PR=PRINT P=PAGE
Dialog Training office 1-800-227-8282 or 1-800-982-5838
Have Fun..
<----Ctrl C---->
ATI!
=========================================================================
Received: (from LISTSERV@PSUVM for TK0EEE1@UCLAMAIL via NJE)
(LISTSE00-8268; 328 LINES); Wed, 20 Dec 89 09:57:41 CST
Date: Wed, 20 Dec 89 09:57 CST
To: TK0EEE1
From: LISTSERV@PSUVM
==Phrack Inc.==
Volume One, Issue Nine, Phile #6 of 10
[<+>]->->->->->->->->->->PLP<-<-<-<-<-<-<-<-<-<-[<+>]
|-| --- |-|
|P| S [+] The Executioner [+] L |P|
|h| t [+]-PhoneLine Phantoms!-[+] i |h|
|a| a |-|-===================-|-| n |a|
|n| l |S|-| -Present- |-|S| k |n|
|t| a |e|-===================-|e| o |t|
|o| g |x|-|Plant Measurement|-|x| L |o|
|m| |y|-===================-|y| a |m|
|s| 1 |-|-| Thanks to AT&T. |-|-| n |s|
|-| 3 [+]-===================-[+] d |-|
|P| |P|
|L| [+] Carrier Culprit [+] Egyptian Lover |L|
|P| [+] The Executioner [+] Solid State |P|
|-| [+] Black Majik [+] Mr. Icom |-|
|$| ----------------------------------------- |$|
[<+>]->->->->->->->->->->PLP<-<-<-<-<-<-<-<-<-<-[<+>]
Preface
=======
This first part in a series of three deals with how your CO measures its
efficiency and hardware performance. I don't know how far I will go in this
first segment so whatever I don't finish will be completed in parts two and
three.
Introduction
============
Have you ever gone trashing and the only thing you found was a large
printout that looked like it was written in Chinese? Did you curse yourself
because you spent 30 minutes digging through someone's lunch and digestive
rejectables and the only thing that was readable was a large spool that
contained such acronyms as TRUNK and CAMA and LATA linked by foreign letters
that you never thought could be conjugated? Well, in this 3 part series, I
hope to show you that that large printout with coffee stains isn't all
useless.
Types of Measurements
=====================
Now, the way your CO determines how well it is serving you is by the
Plant Measurement. The purpose of these measurements is to provide maintenance
personnel with a quantitative summary of the condition of the hardware and its
impact on customer service.
This data is printed out at the system terminal and is used to alert
personnel about problems before they occur.
Plant Measurement data is printed on the maintenance terminal via the
following output messages:
1. PM01 - The PM01 is a daily printout which is printed daily at 2:30 am.
2. PM02 - The PM02 is a monthly summary printed immediately after the
daily PM01 printout only on the 23rd of each month.
3. PM05 - The PM03 is a daily printout which is printed after the PM01 or
PM02 (on the 23rd). The PM05 is utilized in offices equipped
with the AUTOPLEX System 100 (Advanced Mobile Telephone
Service).
4. PM03 - This is a daily or monthly printout which is available upon
manual request.
------------------------------------------------------------
The counts provided by the plant measurement are basically 3 types:
1. Customer Service Measurements
2. Hardware Performance Measurements
3. Base Measurements
Customer service measurements are a measure of the service received by
the customer as influenced by the condition of the system's hardware. These
include the number of calls to billings that are offered to the system but are
delayed or lost because of marginal or faulty equipment.
Hardware Measurements are an indication of the condition of the system
hardware which is described in terms of the number of errors, trouble
indications, and out of service intervals. These measurements may not reflect
customers directly, but do indicate how well the system is functioning.
Base Measurements that are provided are counts of the total calls carried
by the system broken into various categories. These counts are necessary to
normalize service counts and performance counts of mechanical units if
comparisons are to be made of offices with dissimilar traffic characteristics.
Daily PM01 Output Message
=========================
The daily Plant Measurement data in the PM01 output message is organized
as follows:
o Base Measurements
o Selected Customer Service Measurements
o Maintenance Measurements including emergency action
(EA), maintenance interrupts, and network failures
o Performance measurements of system hardware including
the central processor and bus system
o Coded enable peripheral units, peripheral units, and
trunk and service circuits.
o Time-Out totals
o Attached processor measurements
o Circuit Switch Digital Capability measurements
o Improved Public Telephone Service measurements
o Remote Switch System measurements
===================
=Base Measurements=
===================
The base measurements provided by the PPMP1A00 are needed to normalize
the service counts and performance counts of units whose uses vary with the
traffic load. By using these counts, meaningful comparisons can be made with
past performance and with the performance of offices with dissimilar traffic
characteristics. The counts are taken in terms of carried load (excluding all
traffic overflow).
The BASE MEASUREMENTS are as follows, with the printout in parenthesis:
1. Originate Calls (ORIG CALLS): Counts the number customer receiver seizures
for which at least 1 digit is received. The count includes partial dials
(but not permanent signals) as well as additional partied added to a
conference circuit. The PPMP1A00 obtains this from the traffic measurements
program.
2. Incoming Calls (INC CALLS): Counts the number of calls originating from
trunks incoming from distant locations that seize an incoming register (and
in the case of a by-link, receive one digit). The PPMP1A00 obtains this
count directly from the traffic measurements program.
3. Outgoing Calls (OUTG CALLS): Counts the number of calls for which
outpulsing is required and a transmitter is successfully seized.
4. Coin Control Seizures (COIN CONTR SEIZ): Counts the number of times the
coin control circuit is successfully connected to a coin line. This count
will exceed coin line originations as the coin control circuit may be
seized more than once during a call.
5. CAMA Seizures (CAMA SEIZ): Counts then number of times an incoming CAMA
trunk (operator or ANI) is seized.
6. AMA Entries (AMA ENTRIES): Counts the number of billing entries put on AMA
tape.
7. Automatic ID. Outward Dialing Seizures (AIOD SEIZ): Counts the number of
successful connections to an AIOD receiver.
8. Centrex Data Link Seizures (CTX DL SEIZ): Counts the number of connections
to a centrex DL for transmission or reception of lamp and key orders. This
is NOT a count of centrex calls.
9. Output Message Register (OMR SEIZ): Counts the number of seizure output
message registers.
======================
=Service Measurements=
======================
The service measurements give valid indications of the level of customer
service. A count of the calls lost by the system, as a result of hardware
malfunctions, is a significant measure of the influence of the condition of
the central office hardware on customer service. The following service
measurements are provided.
1. Hardware Lost Calls (HWR LOST CALLS): Counts the number of calls dropped
when a trunk is suspected and is placed on the trunk maintenance list (TML)
for diagnosis or when a network failure has occurred on the call.
2. Hardware Lost Billing (HWR LOST BILLING): Counts the number of calls not
billed because both AMAs are out of service (local, long distance, and
special service calls are allowed to proceed without billing).
3. Coin Control Failures (COIN CONTR FAILURES): Counts the number of stuck
coin conditions and coin telephones served by the office which had coin
relays that were out of limits.
4. Automatic Identification Outward Dialing Special Billing Number Billing
(AIOD SBN BILLING): Counts the number of times the AIOD equipment fails to
bill a local PBX number correctly.
5. Dial Tone Speed Test (DTST): Counts the number of times the customer has to
wait an excessive amount of time for the system to process the call because
trunks in the desired trunk group are busy or the system is overloaded,
causing queuing for equipment. The count includes 3-second and 11-second
delays.
NOTE:
Maintenance personnel may find it necessary
to suspend the running of the DTST because in
certain trouble conditions DTST may generate
traffic that would interfere with maintenance
activities. Extended or frequent use of this
feature is not recommended. To discourage the
unnecessary use of this function, the PM01 output
message will include a one-line message alerting
maintenance personnel to it's use.
6. CAMA Lost Billing (CAMA LOST BILLING): Counts the number of times a CAMA
call is handled but due to hardware failure, no AMA register is available
which is necessary for billing.
7. CAMA ANI Failures (CAMA ANI FAILURES): Counts the number of calls for which
ANI failure digit is received.
8. Receiver Attachment Delay (RCVR ATT DELAY): Counts the number of times a
receiver connection was not made in 4 seconds.
9. Receiver Attachment Delay Recorder (RADR Inhibit Usage): Counts tR described.
This is rather simple when you think about it and is one example of how a once
shattered network is working together.
Some Sample CP ID Uses
----------------------
This can be used by large telephone ordering companies to instantly display a
record of that persons credit, previous orders, etc... before the call is even
answered on the attendant's terminal.
When someone logs onto a computer, the originating # is listed on the user log
along with the account name, etc... so that if---------
The software EA phases may be initiated by the following sources:
1. A failure by the system to answer an interrupt request
2. An E-to-E cycle becoming excessive
3. An E-to-E priority class frequency failure
4. An excessive rate of interrupts
5. Two successive data validation failures
6. The time spent in a phase becoming excessive
7. Aborting of a phase
The number of EA phases is printed on the PM01 output message.
Interrupts
----------
The number of various maintenance interrupts provides a picture of nonroutine
maintenance action taken by the system. These interrupts are generally not as
serious as a higher order EA phase, but they do interrupt normal call
processing to correct possible hardware problems. A counts of these interrupts
will give a good indication of the state of the systems' equipment. This is
printed on the PM01 output message.
Network Failures
----------------
The network failure counts are provided to give an indication of how well the
network is completing and terminating calls. Each time a network failure
occurs in the system an 'NT' output message is printed. The following are
printed as part of the PM01 message:
1. Supervisory Scan failure (SUPF)
2. False cross and ground test failure (FCGF)
3. Ringing Current Failure (RC)
4. Low-line resistance failure (LLR)
5. Power Cross test (PX)
6. Restore verify failure count (RVFY)
7. Showering line test failure (SHWL)
8. Call Cutoff Failure (CO)
================================
=An Example of the PM01 Message=
================================
PM01
201-232 PLANT MEASUREMENTS SUMMARY
TUES
10/17/86
SERVICE AFFECTING DATA
BASE MEASUREMENTS
2 ORIG CALLS
1 INC CALLS
0 OUTG CALLS
0 COIN CONTR FAILURES
0 OMR SEIZ
34 CAMA SEIZ
0 AMA ENTRIES
0 AIOD SEIZ
0 CTX D-L SEIZ
SERVICE MEASUREMENTS
0 HWR LOST CALLS
0 HWR LOST BILLING
0 COIN CONTR FAILURES
0 AIOD-SBN BILLING
0 DTST DELAYS
0 CAMA LOST BILLING
0 CAMA ANI FAILURE
0 RCVR ATT DELAYS
0 RADR INHIBIT USE
2 FALSE STARTS
[Note 201-232 is the area code-office code]
============================================================
= (C) Copyright Sexy-Exy and PLP 1986 =
============================================================
==Phrack Inc.==
Volume One, Issue Nine, Phile #7 of 10
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
(512)-396-1120
The Shack // presents
A Multi-User Chat Program for DEC-10s
Original Program by
TTY-Man
Modified and Clarified by
+++The Mentor+++
October 6th, 1986
Intro: Unlike its more sophisticated older brother, the VAX, the DEC has no
easy-to-use communication system like the VMS PHONE utility. The following
program makes use of the MIC file type available on most DECs. Each user that
wishes to be involved in the conference needs to run the program from his area
using the .DO COM command. The program can be entered with any editor (I
recommend SED if you have VT52 emulation), and should be saved as COM.MIC. The
program does not assume any specific terminal type or emulation. You will
have to know the TTY number of any person you wish to add to the conference,
but this is available through a .SYSTAT command or .R WHO (see below.)
SYSTAT
This is an example of a SYSTAT to used to determine TTY#...
Status of Saturn 7.03.2 at 7:27:51 on 03-Oct-86
Uptime 40:41:14, 77% Null time = 77% Idle + 0% Lost, 9% Overhead
27 Jobs in use out of 128. 27 logged in (LOGMAX of 127), 16 detached.
PPN# TTY# CURR SIZE
19 [OPR] 6 OPR 56+39 HB 18
20 7,20 5 OPR 23+39 HB 24 $
21 2501,1007 56 COMPIL 8+8 ^C 1:34 $
22 66,1012 57 TECO 10+12 TI 39
23 66,1011 62 1022 16+55 TI 36 $
24 [SELF] 64 SYSTAT 23+SPY RN 0 $
26 [OPR] DET STOMPR 10+9 SL 2
27 16011,1003 DET DIRECT 17+32 ^C 30 $
36 [OPR] DET FILDAE 17 HB 1:57
The TTY# is available in the TTY column... DET means that the user is
detached and is unavailable for chatting...
Below is an example of .R WHO to obtain the same information...
/- jobs in use out of 127.
Job Who Line PPN
20 OPERATOR 20 5 7,20
21 DISPONDENT 56 2501,1007
22 ADP-TBO 57 66,1012
23 ADP-MDL 62 66,1011
24 THE MENTOR 64 XXXX,XXX
27 GEO4440103 Det 16011,1003
In each case, I am on TTY# 64...
Anyway, use the following program, it's more convenient that doing a
.SEN every time you want to send a message. Also, to shut out an
annoying sender, use .SET TTY GAG. To remove, .SET TTY NO GAG... pretty
simple, huh?
start::
!
!Now in loop: 'a 'b 'c 'd 'e 'f
!
.mic input A,"Destination Terminal 1:"
.if ($a="") .goto welcome
.mic input B,"Destination Terminal 2:"
.if ($b="") .goto welcome
.mic input C,"Destination Terminal 3:"
.if ($c="") .goto welcome
.mic input D,"Destination Terminal 4:"
.if ($d="") .goto welcome
.mic input E,"Destination Terminal 5:"
.if ($e="") .goto welcome
.mic input F,"Destination Terminal 6:"
.if ($f="") .goto welcome
welcome::
!Sending Hello Message...
sen 'a Conference Forming on TTYs 'b 'c 'd 'e 'f ... DO COM to these to join'
sen 'b Conference Forming on TTYs 'a 'c 'd 'e 'f ... DO COM to these to join'
sen 'c Conference Forming on TTYs 'a 'b 'd 'e 'f ... DO COM to these to join'
sen 'd Conference Forming on TTYs 'a 'b 'c 'e 'f ... DO COM to these to join'
sen 'e Conference Forming on TTYs 'a 'b 'c 'd 'f ... DO COM to these to join'
sen 'f Conference Forming on TTYs 'a 'b 'c 'd 'e ... DO COM to these to join'
!
!Type /h for help
com::
.mic input G,"T>"
!Checking Commands.. Wait..
.if ($g="/h") .goto help
.if ($g="/k") .goto kill
.if ($g="/l") .goto list
.if ($g="/d") .goto drop
.if ($g="/t") .goto time
.if ($g="/w") .goto who
.if ($g="/u") .goto users
.if ($g="/q") .goto quit
.if ($g="/r") .backto start
.if ($g="/ac") .goto ack
!Transmitting.. Wait..
sen 'a 'g
sen 'b 'g
sen 'c 'g
sen 'd 'g
sen 'e 'g
sen 'f 'g
.backto com
help::
!
! Internal Commands
!
! /H -> This Menu /K -> Kill
! /L -> List Terminals /U -> Users
! /W -> R who /AC-> Alert Caller
! /Q -> Quit
! /R -> Restart/Add
! /T -> Show Date/Time
! /D -> Drop Caller
!
! All Commands must be in lower case.
!
.backto com
list::
!
!Currently Connected To Terminals: 'a 'b 'c 'd 'e 'f
!
.backto com
who::
.revive
.r who
'
.backto com
users::
.revive
.r users
'
.BACKTO COM
QUIT::
!
!Call The Shack... 512-396-1120 300/1200 24 hours
!
.mic cancel
drop::
!
!Send Hangup Message:: Enter Terminal Number To Be Disconnected.
!
.mic input h,"Destination Terminal Number:"
.sen 'h <=- Communication Terminated at '