Computer underground Digest    Thu  Jan 2, 1997   Volume 9 : Issue 01 
                           ISSN  1004-042X

       Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
       News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
       Archivist: Brendan Kehoe
       Shadow Master: Stanton McCandlish
       Field Agent Extraordinaire:   David Smith
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Cu Digest Homepage: http://www.soci.niu.edu/~cudigest

CONTENTS, #9.01 (Thu, Jan 2, 1997)

File 1--CLO#21-Negotiating the end of the millennium
File 2--Jenott case: More gossip, so-called criminal hacker stuff
File 3--Soldier Innocent of Giving Secret Code to Chinese
File 4--Crack5: ANNOUNCE: Daily Telegraph Article (fwd)
File 5--BoS: Phrack 49 (fwd)
File 6--Cu Digest Header Info (unchanged since 13 Dec, 1996)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

---------------------------------------------------------------------

Date: Tue, 24 Dec 1996 17:22:23 +0100
From: "William S. Galkin" <wgalkin@EARTHLINK.COM>
Subject: File 1--CLO#21-Negotiating the end of the millennium

[PLEASE NOTE: All back issues can now be found at the
Computer Law Observer site located at:
http://www.lawcircle.com/observer]

=============================================================
December, 1996     The Computer Law Observer     Issue No. 21
=============================================================
The Computer Law Observer is distributed monthly for free by Challenge
Communications. To subscribe, e-mail to lawobserver-request@charm.net
with the word "subscribe" (leaving out the quotation marks) in the
message area. To unsubscribe, do the same, inserting the word
"unsubscribe". Re-posting is prohibited without permission. Copyright
1996 by Challenge Communications. See our website for back issues:
http://www.lawcircle.com/observer
------------------------------------------------------------

 ++++++++++++++++++++++++++++++++++++++++++++++
      NEGOTIATING THE END OF THE MILLENNIUM
 ++++++++++++++++++++++++++++++++++++++++++++++
            by William S. Galkin, Esq.
                (biography at end)


Irony -

Billions of dollars, and the world's best and brightest, have been
devoted to the development of information technologies. And, now, with
the meteoric rise in use of the Internet, we seem finally to be at the
dawn of a new era where information resources will truly permeate our
lives - dramatically altering the landscape of mankind in a manner many
compare to the industrial revolution.

And yet, someone discovered a flaw, a fault line that runs through much
of the system. A simple programming error, that when viewed with
hindsight one wonders "How could anyone have made such an obvious
mistake?"

This article focuses on the legal issues involved in successfully
negotiating a solution to what is often referred to as the "Year 2000
Problem".

Mistake -

Date calculations play an essential role in most applications. Almost
all applications record information regarding the year with two digits
(i.e., 96 for 1996).   The basic functions involving dates include
calculating, comparing and sequencing. Therefore, when a program wants
to calculate a person's current age, it will perform a calculation by
subtracting the person's date of birth from the current year. In my
case, subtract 57 (1957)  from 96 (1996) and the result is 39. However,
when the new millennium arrives, the year information contained in most
applications will be "00". The calculation of my age (i.e., 00 minus 57)
produces an erroneous result of  negative 57!

Magnitude -

All hardware and software systems are potentially affected by the Year
2000 problem, even applications that are resident with service bureaus.
Major corporations are expected to have to pay at least $40 million to
rectify the problem. The worldwide cost could reach $400 billion.
Federal Express was reported as having paid 5 cents per line of code to
correct the problem, which resulted in a $500 million total cost. Chubb
Insurance has paid $180 million and the state of Nebraska has paid $32
million.

The problem is estimated to affect 95% of all U.S. companies. To date,
only one third of affected companies are undergoing conversion. Some
estimate that either the cost to repair or the failure to repair could
result in a bankruptcy rate of 1 to 5%.

The repair process is complex  and involves either a data solution or a
procedural solution. The data solution involves the modification of each
occurrence of a date. This requires a methodical line-by-line analysis
of code. With each change, the affected logic must be revisited and the
modification must then be tested. Mid-sized companies will often have
millions of lines of code. As many as one in every 50 lines could have a
date reference. Data entry screens and output formats will have to be
modified as well. A procedural solution involves changing the processing
methodology so that an application will know that "18" means "2018"
instead of "1918".  This approach is difficult to implement as well.

First steps -

Every affected company needs to design its own approach to the Year 2000
problem. Usually a team will be set up to oversee the process. The team
will include the appropriate internal technical personnel as well as
management and outside consultants.  Financial and legal advisors may
also need to be included.

The first step is to take a thorough inventory of all affected
applications and gather all of the software license and support
agreements that govern such applications to determine each party's
rights and liabilities.  There are a variety of provisions that might be
found in these agreements, especially for custom software or where
agreements went through a negotiation process.

Some provisions might obligate the vendor to assist with the repairs or
impose liability for damages that occur due to the Year 2000 problem.
Additionally, a licensee will need to identify all confidentiality
restrictions that might be found in the license agreements in order that
when the repair work begins, it can proceed efficiently without
violating these provisions. Many modifications will require access to
the source code. Therefore, it is important to determine whether a
source code escrow agreement requires delivery to rectify such a
problem.

Negotiating the cure -

Rectifying the Year 2000 problem is complex because of both the variable
times when problems might arise and because of the variety of forms the
problems might take. Accordingly, when hiring outside consultants to
repair the problem, a careful agreement needs to be drafted to specify
what the problem is, how and when it is going to be fixed, and what
happens if it is not adequately fixed.  Following is a discussion of
some of the important issues that need to be considered:

DEFINITION OF PROBLEM: A survey of the problem is the first step. This
can be performed in house, by a third party consultant or by the vendor
hired to correct the problem. The results of this analysis will become
an essential component of the agreement. The survey should include a
catalogue of all applications reviewed and specifications as to what
kind of corrections are needed for each application. There are a variety
of correction methods that can be implemented - some will be appropriate
for some applications, and not for others. The ideal goal is for the
vendor to represent that all Year 2000 problems will be corrected, even
those not listed in the survey results.  However, most vendors will not
agree to such a global representation.

CONFIDENTIALITY: The vendor will be having intimate contact with a large
portion of the information about the company. Additionally, the company
itself will be under confidentiality restrictions that may prohibit the
company granting access to certain applications. Accordingly, the
confidentiality issues need to be settled in advance.

IMPLEMENTATION SCHEDULE: It cannot be over stressed, that with Year 2000
repairs, time is of the essence. A detailed implementation schedule
needs to be prepared and specific remedies and options need to be
available if the schedule becomes delayed due to the actions of the
consultant or the company.

EVALUATING PROGRESS: Having the work completed by a certain date, well
in advance of December 31, 1999, if possible, may be crucial in
accomplishing an effective transition. Accordingly, the vendor should be
required to keep the company regularly informed of progress and of any
delays.

CHANGE ORDERS:  As the work begins to be performed, it is inevitable
that additional tasks will be identified as needing to be performed. The
agreement needs to be flexible enough to adjust for these changes in
scope.

TIME OF WORK AND DISRUPTION: Much of the Year 2000 repair work will have
to be performed when the system or certain applications are down. This
means that companies will want this work performed at night or over the
weekends.  Accordingly, it is important that the agreement set forth
when the system will be done, and who determines the down schedule.

TESTING PROCEDURES: Given the complexity of the repair methods, testing
must be an essential component of the repair services. The vendor and
the customer must develop and agree upon test criteria, how the tests
will be performed, and when the system is considered to have passed the
test. Additionally, it is important that a significant period of live
use be a part of the test period. In order for this to be effectively
available, the repair work must be completed well before December 31,
1999.

FOLLOW-UP REPAIRS: It is likely that the testing procedures will turn up
problems and errors. These errors may or may not fall within the scope
of the repair services. Accordingly, the vendor should agree to be
available (i.e., have personnel available) to rectify whatever problems
arise. This is an important provision. As the year 2000 approaches,
vendors will be stretching themselves thinner and thinner to complete
the work by the deadline. Without prior assurances, there may not be
personnel available to perform these follow up services.

COST INCREASES; EMERGENCY SERVICES: Many service agreements are done on
a time and materials basis and the vendor can increase the hourly rate
after giving proper notice (e.g., 60 days' prior written notice).  These
provisions are workable when other vendors are available to substitute
for a vendor that raises its price too much.  As time goes on, it will
be prohibitively expensive to find a substitute vendor, if one can be
found at all.

LENGTH OF WARRANTY: Not all Year 2000 glitches will be apparent at the
turn of the century. It may take months or even years for some to
surface. The warranty provision needs to take this issue into account.

Other issues -

Obviously, all new license agreements should include Year 2000
compliance requirements. This is a complex provision and should be
carefully drafted. However, a discussion of this provision is beyond the
scope of this article.

Given the cost to repair and the potential for damage resulting from
lack of compliance, due diligence for any corporate acquisition or
significant loan or investment, must include a thorough evaluation of
this issue.

Many boards of directors have been postponing dealing with the problem
because of the large expense that will appear on their financial
statements. To make matters worse, the Financial Accounting Standards
Board emerging issues committee has determined that money spent on the
Year 2000 Problem must be charged against the current year's earnings,
and cannot be amortized.

However, a corporation that does not develop, in a timely manner,  a
complete compliance plan, will be a good target for shareholder suits
against the officers and directors if failure in this regard results in
a decrease in the value of the stock or company.

Conclusion -

Some companies are waiting for a "silver bullet" that will be developed
which will simply and efficiently rectify the problem. However, the most
optimistic predictions foresee the best technological developments
providing at most a 30% savings in repair time and costs.

The process of making systems Year 2000 compliant can be complex and
fraught with unknown variables. A good agreement is necessary to
successfully deal with the many issues involved. However, given that the
end of the millennium is approaching fast, a prudent company will
construct alternate plans if compliance is not achieved on time.

ABOUT THE AUTHOR:

Mr. Galkin can be reached for comments or questions
about the topic discussed in this article as follows:
  E- MAIL:   wgalkin@lawcircle.com
  WWW:       http://www.lawcircle.com/galkin
  TELEPHONE: 410-356-8853/FAX:410-356-8804
  MAIL:      10451 Mill Run Circle, Suite 400
             Owings Mills, Maryland 21117.

Mr. Galkin is an attorney in private practice.
He is also the adjunct professor of Computer Law at the
University of Maryland School of Law. He is a
graduate of New York University School of Law
and has concentrated his private practice on
intellectual property, computer and technology law
issues since 1986. He represents small startup,
midsized and large companies, across the U.S. and
internationally, dealing with a wide range of legal
issues associated with computers and technology,
such as developing, marketing and protecting
software, purchasing and selling complex computer
systems, launching and operating a variety of online
business ventures, and trademark and copyright
issues.

------------------------------

Date: Sat, 21 Dec 1996 18:50:46 -0600 (CST)
From: Crypt Newsletter <crypt@sun.soci.niu.edu>
Subject: File 2--Jenott case: More gossip, so-called criminal hacker stuff

The so-called criminal hacker
=============================

By December 17th, the U.S. Army's prosecution of Eric Jenott, "the Ft.
Bragg hacker," was in full swing. Much of the testimony appeared aimed
at proving Jenott to be a criminal hacker.  However, a key witness
turned out to be little more than a convicted thief attempting to
curry favor for himself in return for helping to convict Jenott. Other
testimony appeared to be standard circumstantial hacker hearsay attributed
to the Ft. Bragg soldier. Very little of the court's unclassified
proceedings convincingly portrayed Jenott as a potential spy for
communist China.

Raymond Chen, a former Marine, testified Jenott gave "the [Internet]
address for the secretary of defense computer system" to him "before
Jenott joined the Army." Chen accessed the system using this information,
he said.

According to Chen, Jenott confided that he had been hacking into Navy,
Air Force and other DoD computers since 1994. He claimed that Jenott
had admitted to deleting information from a Navy system.

Chen, who is also in legal trouble from this case and a convicted
thief stemming from a 1991 break-in at the University of Washington in
which he stole a computer, claimed he has been granted immunity from
prosecution in exchange for his testimony in the Jenott case. Chen was
convicted of burglary and possession of stolen property in December 1992.
His sentence was 60 days in jail and 30 days of community service.

Chen testified that he had negotiated immunity with Army prosecutor
Emmett Wells.  According to the Fayetteville Observer, Chen said
in court "Wells said if I can get Jenott convicted of espionage, he
will get me out of my trouble in Washington state."

Wells was removed from the case when he attempted to commit suicide
by slashing a wrist a few days earlier.

Army prosecutor Matthew Wilkov had Chen say "he understood that Wells
was an Army prosecutor and had no direct control over the charges in
Washington."  However, Wilkov added "he had agreed to write a letter
saying Chen had cooperated in an Army case."

Testimony continued from Army employees who worked the Fort Bragg
bulletin board system.  Janet Warden said she had been monitoring
posts by Jenott and undisclosed others on the board.  It was
about computer hacking, she said, and included references to S-MILS,
a military acronym for secure military sites.

Warden said she had been instructed to observe Jenott's conversations
on the system.

Logs from the Ft. Bragg BBS indicated Jenott sent "several" electronic
messages to Qihang Liu at Oak Ridge, Tennessee. Liu did not reply.

Another military intelligence investigator, Ronald E. Davis, said that
he interviewed Jenott and that "I learned he passed the password . . ."

Davis was asked twice by prosecution what he learned from Jenott.  The
second time he said he "learned [Jenott] committed espionage."  Jenott's
lawyer, Tim Dunn, immediately objected and Fred Arquilla sustained it.

The court was then closed again for the purposes of secrecy during
the rest of Davis' presentation and testimony from John F. Deasy, a
soldier from the Land Information Warfare Activity at Fort Belvoir,
Virginia.

When the court was re-opened, Deasy said he had been asked to look
"over a file about someone from Fort Bragg hacking into [a] University
British Columbia computer."  Deasy also said he was told the security
of a "switching station" on the Army's Mobile Subscriber Network
was breached.

Ray Chen testified again, claiming he had learned in a chat group
with Jenott's brother, Lance, and unnamed others that Jenott had
"hacked" into a university of British Columbia computer.

Other prosecution witnesses said they had followed Jenott's discussions
on the Ft. Bragg BBS on the use of passwords of "professors and students"
to hack into computers and the utilization of laptops and payphones to
avoid being traced.


Izzit secret?
=============

While the U.S. Army contended Eric Jenott gave a secret password
for a secure cellular telephone network to Quihang Liu, the
system's builder did not consider the password verboten until more
than a full month after the Ft. Bragg hacker was charged with
espionage.

GTE developed the system and an employee, Steven Sullivan, testified
at Jenott's court martial in another closed session, December 18th.

The prosecution's Matthew Willkov maintained the password was classified.
"If classified information is carried on the system, the password is
secret" he said, according to the Fayetteville Observer.

Jenott's defense disagreed.

Judge Fred Arquilla said the password is classified, but only in the
context of determining whether the court should be in closed session
during testimony. He informed the jury that closing the court should
not bear on its decision as to whether or not the password in
contention was or is actually classified.

Clear?

Anyway, much later FBI agent Steven McFall -- who said he was suffering
from a case of food poisoning -- testified that federal agents had seized
an Army jacket and uniform with Jenott's name on it from the apartment of
Quihang Liu.


Suicide?  Or not?  In court gossip rules
========================================

Jenott's counsel, Tim Dunn, said on Friday that he had checked
out a tip "that a former prosecutor [Emmett Wells] in the case
tried to kill himself because he was being pressured to alter
documents."

According to the Fayetteville Observer, Dunn said he had also talked
to Wells and the rumor proved unsubstantiated.

"He said it was not true, it was fascinating, but he had to go,"
Dunn said.   Wells is currently being treated at Walter Reed Army
Medical Center after apparently trying to kill himself by slashing
a wrist last Sunday.

The Observer also reported the defense's effort to have some evidence
declared inadmissible because the government has kept sloppy records
on it. Judge Fred Arquilla denied Dunn's request but said he could
introduce evidence pointing out the government's sloppiness.

Kevin Nauer testified on computer data apparently seized from Jenott's
hard disks or diskettes. It included words purported to be written by
the Ft. Bragg hacker.

According to Knauer and reported in the Observer, a poem credited to
Jenott said "At least I'll have a tiny part in bringing this nation to
its knees."

According to prosecution testimony, Jenott is also claimed to have said
he had "wiped out hundreds of computers at the Defense Information Systems
Agency."

Throughout most of the Jenott case, it has been impossible to distinguish
whether much of the testimony is based on anything more substantive than
weird hacker bragging, notes from the underground, hearsay or crazy gossip.

Full text from the Fayetteville Observer: http://www.foto.com


George Smith
Crypt Newsletter
http://www.soci.niu.edu/~crypt

------------------------------

Date:    Tue, 31 Dec 96 12:31 CST
From: Jim Thomas <tk0jut1@mvs.cso.niu.edu>
Subject: File 3--Soldier Innocent of Giving Secret Code to Chinese

Copyright Chicago Tribune
Monday, December 23, 1996

SOLDIER INNOCENT OF GIVING SECRET CODE TO CHINESE

   A soldier accused of passing a secret computer code to a
Chinese citizen was acquitted Sunday  (Dec. 23) of espionage, the
most serious charge at his court martial.

   But Pfc. Eric Jenott, 21, was convicted of damaging government
property and computer fraud after closing arguments.

   Jenott, of Graham, Wash., was sentenced to three years in
prison and ordered to forfeit all benefits.

<snip>

------------------------------

Date: Fri, 27 Dec 1996 13:20:01 -0600 (CST)
From: Chip Rosenthal <chip@UNICOM.COM>
Subject: File 4--Crack5: ANNOUNCE: Daily Telegraph Article (fwd)

Just wanted to bring this news posting to your attention.  The
Telegraph appears to be on-line as <http://www.telegraph.co.uk/>.
It might be worth checking the "Connected" section next week to
see if something appears there.

------- start of forwarded message -------
From--Alec Muffett <alecm@crypto.dircon.co.uk%antispam>
Subject--Crack5--ANNOUNCE--Daily Telegraph Article


I gather (from the journalist concerned) that next week's (tuesday?)
Daily Telegraph Computing Section will carry an article regarding the
release of Crack5, in which "most security experts" are "highly
critical" of "gifted amateurs" (!) such as myself, who "irresponsibly"
release software such as Crack, SATAN, COPS, etc, onto the net.

I've chatted with the fellow quite extensively, and also gather that he
was unable (in the midst of the christmas break) to find any "security experts"
who could find a good word to say about Crack; undeterred, I've had a go at
putting a positive spin on the matter, and can only but hope that between
his hands and the final print that I don't wind up looking a villan
- I suspect I shan't, but you never know...

Regardless, I must admit that I look forward to the almost inevitable
furore with some enthusiasm.  8-)

Followups set to comp.security.unix.

------------------------------

Date: Wed, 18 Dec 1996 01:54:46 -0500 (EST)
From: "noah@enabled.com" <noah@enabled.com>
Subject: File 5--BoS: Phrack 49 (fwd)

From  -Noah

---------- Forwarded message ----------
Date--Fri, 8 Nov 1996 19:46:47 -0800 (PST)
Subject--BoS--Phrack 49

-----BEGIN PGP SIGNED MESSAGE-----


	The new issue of Phrack Magazine, the underground's *premier*
computer security publication, is upon us all!!



http://www.infonexus.com/~daemon9/phrack49.tgz
ftp://ftp.infonexus.com/pub/Philes/Phrack/phrack49.tgz
http://www.fc.net/~phrack

	or send email to the below address...

An excerpt from Issue 49, P49-01:


 			        .oO Phrack 49 Oo.

                   	  Volume Seven, Issue Forty-Nine
			
                                      1 of 16

                                  Issue 49 Index
                               ____________________

                                 P H R A C K   4 9

                                 November 08, 1996
                               ____________________


Welcome to the next generation of Phrack magazine.  A kinder, gentler, Phrack.
A seasoned, experienced Phrack.  A tawdry, naughty Phrack.  A corpulent,
well-fed Phrack.  Phrack for the whole family.  Phrack for the kids, Phrack
for the adults.  Even Phrack for the those enjoying their golden years.

If you thought 48 was a fluke, here is 49, RIGHT ON SCHEDULE.  Full speed
ahead, baby.  We promised timely Phrack.  We promised quality Phrack.  Here
are both in ONE CONVENIENT PACKAGE!  We trimmed the fat to bring you the lean
Phrack.  Chock full of the healthy information you need in your diet.  All
natural.  No artificial ingredients.  No snake oil.  No placebo effect.
Phrack is full of everything you want, and nothing you don't.
	
This issue is the first *official* offering from the new editorial staff.  If
you missed them, our prophiles can be found in issue 48.  Speaking of 48,
what a tumultuous situation article 13 caused.  All that wacking SYN flooding.
Well, it got the job done and my point across.  It got vendors and programmers
working to come up with work-around solutions to this age-old problem.  Until
recently, SYN-flooding was a skeleton in the closet of security professionals.
It was akin the crazy uncle everyone has, who thinks he is Saint Jerome.  We
all knew it was there, but we ignored it and kinda hoped it would go away...
Anyway, after this issue, I hope it *will* just go away.  I have done
interviews for several magazines about the attack and talked until I was blue
in the face to masses of people.  I think the word is out, the job is done.
Enough *is* enough. " SYN_flooding=old_hat; ".  Onto bigger and better things.

A few more quick points (after all, you want Phrack Warez, not babbling
daemon9).  I want to thank the community for supporting me (and co.) thus far.
Countless people have been quite supportive of the Guild, the Infonexus, and
of Phrack.  Time and work do permit me to get back to all of you individually,
so just a quick blurb here.  Thank you all.  I will be using Phrack as a tool
to give back to you, so please mail me (or any of the editors with your
suggestions).  This is *your* magazine.  I just work here.

Most of all, I am stoked to be here.  I am giving this my all.  I'm fresh, I'm
ready... I'm hyped + I'm amped (most of my heros don't appear on no stamps..).

Drop us a line on what you think of 49.  Comments are encouraged.


Bottom line (and you *can* quote me on this):  Phrack is BACK.

	- daemon9

       [ And remember: r00t may own you, but the Guild loves you ]
     [ TNO, on the other hand, doesn't even fucking care you exist ]

- ---------------------------------------------------------------------------


Enjoy the magazine.  It is for and by the hacking community.  Period.


	  Editors : daemon9, Datastream Cowboy, Voyager
          Mailboy : Erik Bloodaxe
	    Elite : Nirva (*trust* me on this one)
	   Raided : X (investigated, no charges as of yet)
   Hair Technique : Mycroft, Aleph1
	    Tired : TCP SYN flooding
	    Wired : Not copping silly slogans from played-out, vertigo
		    inducing magazines.
	Pissed off: ludichrist
	 Pissed on: ip
             News : DisordeR
	   Thanks : Alhambra, Halflife, Snocrash, Mythrandir, Nihil, jenf,
		    xanax, kamee, t3, sirsyko, mudge.
       Shout Outs : Major, Cavalier, Presence, A-Flat, Colonel Mustard,
		    Bogus Technician, Merc, Invalid, b_, oof, BioHazard,
	  	    Grave45, NeTTwerk, Panzer, The Bishop, TeleMonster,
		    Ph0n-E, loadammo, h0trod.

Phrack Magazine V. 7, #49, November 08, 1996.
Contents Copyright (c) 1996 Phrack Magazine. All Rights Reserved.
Nothing may be reproduced in whole or in part without written
permission from the editors.  Phrack Magazine is made available
quarterly to the public free of charge.  Go nuts people.
Subscription requests, articles, comments, whatever should be directed to:

                phrackedit@infonexus.com

Submissions to the above email address may be encrypted
with the following key (note this is a NEW key):

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2

mQENAzJuWJgAAAEH/2auap+FzX1AZOsQRPWRrRSOai2ZokfVpWWJI8DRuSpX9l7w
5qWHrZdL/RweA4lgwAmcrAOD6d8+AzZfXEhkKi92G9ZNy2cjsb5g7oamkcPmC03h
pdhRe5rHXDWUtXDEhHlkV0WvkLXrhFijW2VdJ2UDFyFd8q0nBSIz+JTGneNO0w4q
aowCx3gZpEb4hkEU1LFoJXywZhnBg06jSxD9exbBF2WKeealqTlntlcsMmeJ3OdS
9fqnGI19BWirqkIJYtNXdzP4M2usOEvikrdhXwSbCNcDGcY6pyKco2rKbBUj5V2I
8/2L0TSGSaRBZ/YKRplwycldy63UVVTLMNGQCCUABRG0KlBocmFjayBNYWdhemlu
ZSA8cGhyYWNrZWRpdEBpbmZvbmV4dXMuY29tPg==
=eHJS
- -----END PGP PUBLIC KEY BLOCK-----

	ENCRYPTED SUBSCRIPTION REQUESTS WILL BE IGNORED

Phrack goes out plaintext...  You certainly can subscribe in plaintext


 			   .oO Phrack 49 Oo.
 		 -------------------------------------
			   Table Of Contents
		
 1. Introduction							7  K
 2. Phrack loopback						 	6  K
 3. Line Noise							  	65 K
 4. Phrack Prophile on Mudge		           by Phrack Staff      8  K
 5. Introduction to Telephony and PBX systems      by Cavalier		100K
 6. Project Loki: ICMP Tunneling                   by daemon9/alhambra 	10 K
 7. Project Hades: TCP weaknesses 		   by daemon9 		38 K
 8. Introduction to CGI and CGI vulnerabilities    by G. Gilliss 	12 K
 9. Content-Blind Cancelbot           		   by Dr. Dimitri Vulis	40 K
10. A Steganography Improvement Proposal 	   by cjm1		6  K
11. South Western Bell Lineman Work Codes 	   by Icon		18 K
12. Introduction to the FedLine software system    by Parmaster		19 K
13. Telephone Company Customer Applications        by Voyager		38 K
14. Smashing The Stack For Fun And Profit 	   by Aleph1		66 K
15. TCP port Stealth Scanning	   		   by Uriel		32 K
16. Phrack World News				   by Disorder		109K

									575k
 		 -------------------------------------

"...There's MORE than maybes..."

	- Tom Regean (Gabriel Bryne) "Miller's Crossing"
	[ Obviously referring to the blatent truism that Phrack IS back ]

"...Fuckin' Cops..."

	- Verbal Kint/Keyser Soze (Kevin Spacey) "The Usual Suspects"
	[ Not sure what was meant by that.. ]

"Got more funky styles than my Laserjet got fonts"
        - 311/Grassroots "Omaha Stylee"
        [ That would be referring to us, of course ]

EOF


- --
[ route@infonexus.com ]  Editor, Phrack Magazine / Member, Guild Corporation

	...check out the nametag..  you're in MY world now grandma...

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMoP+pgtXkSokWGapAQFpqgQAgDEjwg7Q9TDbTQHzECneOc4FHK4QNAkb
pynBsLq21gzhzzGDxLDveKv4lEJBPxqGnE1Fex3hnqdsL46oXMjRECRHkmP8Lhqx
+P1N7Xa+q50NKkvuh2vZFdTN3Jgihwf5AF+5ngrlVbeV945BCJ1K9mr4GAUGccQD
KoAKHrOPKIw=
=deJO
-----END PGP SIGNATURE-----

------------------------------

Date: Thu, 15 Dec 1996 22:51:01 CST
From: CuD Moderators <cudigest@sun.soci.niu.edu>
Subject: File 6--Cu Digest Header Info (unchanged since 13 Dec, 1996)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send post with this in the "Subject:: line:

     SUBSCRIBE CU-DIGEST
Send the message to:   cu-digest-request@weber.ucsd.edu

DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.

The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

To UNSUB, send a one-line message:   UNSUB CU-DIGEST
Send it to  CU-DIGEST-REQUEST@WEBER.UCSD.EDU
(NOTE: The address you unsub must correspond to your From: line)

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         In ITALY: ZERO! BBS: +39-11-6507540
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)


The most recent issues of CuD can be obtained from the
Cu Digest WWW site at:
  URL: http://www.soci.niu.edu/~cudigest/

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #9.01
************************************