| ==Phrack Inc.== | |
| Volume Two, Issue 18, Phile #10 of 11 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN >>>>>=-* Phrack World News *-=<<<<< PWN | |
| PWN Issue XVIII/1 PWN | |
| PWN PWN | |
| PWN Created, Compiled, and Written PWN | |
| PWN By: Epsilon PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Intro | |
| ===== | |
| Welcome to yet another issue of Phrack World News. We have once again | |
| returned to try and bring you an entertaining, and informative newsletter | |
| dedicated to the spread of information and knowledge throughout the H/P | |
| community. | |
| ______________________________________________________________________________ | |
| TOK Re-Formed | |
| ============= | |
| A group called Tribunal Of Knowledge, which has undergone previous | |
| re-formations has once again re-formed. The person who is currently "in | |
| charge" of the group says that he had permission from High Evolutionary, the | |
| group's founder, to re-form the organization. Although the group hasn't | |
| publicly announced their existence or written any files, we should be hearing | |
| from them in the near future. | |
| The Current Members of TOK Include - | |
| Control C | |
| Prime Suspect | |
| Jack Death | |
| The UrVile | |
| The Prophet | |
| Psychic Warlord | |
| Information Provided By Control C, and Prime Suspect. | |
| ______________________________________________________________________________ | |
| Phrack Inc. Support Boards | |
| ========================== | |
| Phrack Inc. has always made it a habit to set up Phrack Inc. sponsor accounts | |
| on the more popular boards around. These sponsor accounts are set up, so that | |
| the users may get in touch with the Phrack Magazine staff if they would like | |
| to contribute an article, or any other information to our publication. Please | |
| take note of the boards on which Phrack Inc. accounts are set up. Thank you. | |
| The Current List of Phrack Inc. Sponsor Boards Includes - | |
| P-80 Systems - 304/744-2253 | |
| OSUNY - 914/725-4060 | |
| The Central Office - 914/234-3260 | |
| Digital Logic's DS - 305/395-6906 | |
| The Forgotten Realm - 618/943-2399 * | |
| * - Phrack Headquarters | |
| ______________________________________________________________________________ | |
| SummerCon '88 Preliminary Planning | |
| ================================== | |
| Planning for SummerCon '88 is underway. So far, we have decided on four | |
| tentative locations: New York City, Saint Louis, Atlanta, or Florida. Since | |
| this is only tentative, no dates have been set or reservations made for a | |
| conference. | |
| If you have any comments, suggestions, etc, please let us know. If you are | |
| planning to attend SummerCon '88, please let us know as well. Thank you. | |
| Information Provided By The Forgotten Realm. | |
| ______________________________________________________________________________ | |
| LOD/H Technical Journal | |
| ======================= | |
| Lex Luthor of LOD/H (Legion of Doom/Hackers) has been busy with school, etc., | |
| so he has not had the time, nor the initiative to release the next issue of | |
| the LOD/H Technical Journal. On this note, he has tentatively turned the | |
| Journal over to Phantom Phreaker, who will probably be taking all | |
| contributions for the Journal. No additional information is available. | |
| Information Provided By The UrVile and Phantom Phreaker. | |
| ______________________________________________________________________________ | |
| Congress To Restrict 976/900 Dial-A-Porn Services | |
| ================================================= | |
| Congress is considering proposals to restrict dial-up services in an effort to | |
| make it difficult for minors to access sexually explicit messages. A | |
| House-Senate committee is currently negotiating the "dial-a-porn" proposal. | |
| Lawmakers disagree whether or not the proposal is constitutional and are | |
| debating the issue of requiring phone companies to offer a service that would | |
| allow parents, free of charge, to block the 976/900 services. Other proposals | |
| would require customers to pay in advance or use credit cards to access the | |
| 976/900 services. | |
| Some companies are currently offering free services that restrict minors from | |
| accessing sexually explicit messages. AT&T and Department of Justice | |
| officials are cooperating in a nationwide crackdown of "dial-a-porn" telephone | |
| companies. The FCC recently brought charges against one of AT&T's largest 900 | |
| Service customers, and AT&T provided the confidential information necessary in | |
| the prosecution. AT&T also agreed to suspend or disconnect services of | |
| companies violating the commission ban by transmitting obscene or indecent | |
| messages to minors. | |
| ______________________________________________________________________________ | |
| Some Hope Left For Victims Of FGD | |
| ================================= | |
| US Sprint's famed FGD (Feature Group D) dial-ups and 800 INWATS exchanges may | |
| pose no threat to individuals under switches that do not yet offer equal | |
| access service to alternate long distance carriers. Due to the way Feature | |
| Group D routes its information, the ten-digit originating number of the caller | |
| is not provided when the call is placed from a non-equal access area. The | |
| following was taken from an explanation of US Sprint's 800 INWATS Service. | |
| ************************************************************* | |
| CALL DETAIL | |
| ************************************************************* | |
| With US Sprint 800 Service, a customer will receive call detail information | |
| for every call on every invoice. The call detail for each call includes: | |
| o Date of call | |
| o Time of call | |
| o The originating city and state | |
| o The ten-digit number of the caller if the call originates in an | |
| equal access area or the NPA of the caller if the non-equal access | |
| area. | |
| o Band into which the call falls | |
| o Duration of the call in minutes | |
| o Cost of the call | |
| This came directly from US Sprint. Do as you choose, but don't depend on | |
| this. | |
| Information Provided by US Sprint. | |
| ______________________________________________________________________________ | |
| Telenet Bolsters Network With Encryption | |
| ======================================== | |
| Telenet Communications Corporation strengthened its public data network | |
| recently with the introduction of data encryption capability. | |
| The X.25 Encryption Service provides a type of data security previously | |
| unavailable on any public data network, according to analysts. For Telenet, | |
| the purpose of the offering is "to be more competitive; nobody else does | |
| this," according to Belden Menkus, an independent network security consultant | |
| based in Middleville, NJ. | |
| The service is aimed at users transmitting proprietary information between | |
| host computers, such as insurance or fund-transfer applications. It is priced | |
| at $200 per month per host computer connection. Both the confidentiality and | |
| integrity of the data can be protected via encryption. | |
| The scheme provides end-to-end data encryption, an alternative method whereby | |
| data is decrypted and recrypted at each node in the network. "This is a | |
| recognition that end-to-end encryption is really preferable to link | |
| encryption," Menkus said. | |
| The service is available over both dial-up and leased lines, and it supports | |
| both synchronous and asynchronous traffic at speeds up to 9.6K BPS. | |
| Telenet has approved one particular data encryption device for use with the | |
| service, The Cipher X 5000, from Technical Communications Corporation (TCC), a | |
| Concord, Massachusetts based vendor. TCC "has been around the data encryption | |
| business for quite a while," Menkus said. | |
| The Cipher X implements the National Bureau of Standards' Data Encryption | |
| Standard (DES). DES is an algorithm manipulated by a secret 56 bit key. | |
| Computers protected with the device can only be accessed by users with a | |
| matching key. | |
| The data encryptor is installed at user sites between the host computer and | |
| the PAD (Packet Assembler/Disassembler). | |
| Installation of the TCC device does not affect the user's ability to send | |
| non-encrypted data, according to Telenet. By maintaining a table of network | |
| addresses that require encryption, the device decides whether or not to | |
| encrypt each transmission. | |
| Information Provided by Network World. | |
| ______________________________________________________________________________ | |
| ============================================================================== | |