text
stringlengths
0
1.99k
4 Kowack, G and Healy, D "Can the holes be plugged?" Computerworld
Vol 18 (26 September 1984) pp 27-28
5 Farrow, R "Security issues and strategies for users" Unix/World
(April 1986) pp 65-71
6 Farrow, R "Security for superusers, or how to break the Unix system"
Unix/World (May 1986) pp 65-70
7 Grampp, F T and Morris, R H "Unix operating system security" AT&T Bell
Lab Tech. J. Vol 63 No 8 (1984) pp 1649-1672
8 Wood, P H and Kochan, S G "Unix system security" USA (1985)
9 Nowitz, D A "UUCP Implementation description: Unix programmer's manual
Sec. 2" AT&T Bell Laboratories, USA (1984)
10 Thomas, R "Securing your terminal: two approaches" Unix/World
(April 1986) pp 73-76
11 Karpinski, D "Security round table (Part 1)" Unix Review
(October 1984) p 48
12 Karpinski, D "Security round table (Part 2)" Unix Review
(October 1984) p 48
13 Lobel, J "Foiling the system breakers: computer security and access
control" McGraw-Hill, USA (1986)
14 National Computer Security Center "Department of Defense trusted
computer system evaluation criteria" CSC-STD-001-83, USA (1983)
15 Stewart, F "Implementing security under Unix" Systems&Software
(February 1986)
16 Schaffer, M and Walsh, G "Lock/ix: An implementation of Unix for the
Lock TCB" Proceedings of USENIX (1988)
17 Chuck, F "AT&T System 5/MLS Product 14 Strategy" AT&T Bell Labs,
Government System Division, USA (August 1987)
==============================================================================
==Phrack Inc.==
Volume Two, Issue 18, Phile #8 of 11
Control C
and
The Tribunal of Knowledge presents...
LMOS (Loop Maintenance Operation System)
-A List of Commands-
This file contains what to our knowledge are the best things to do on
LMOS. We were really vague due to the great power of the information provided
in this file. You now know the commands so we will not go into (either in
this file or when talking to us) how to use this information, it is up to you
to figure out how to use it.
+: Increase the voice volume on a line
+ lets you increase the volume when you are talking on or monitoring a
sub-scriber's line over a callback path. The volume is increased because MLT
adds amplifier to the line. + may be used after a mon, talk, rev, talkin or
call request. Sometimes MLT adds an amplifier automatically to a long line.
You will not know it is there so if you try to add amplification, a + will
appear in the status sections but the voices will not get any louder because
they are already loud as possible.
-: Decrease the voice volume on a line
- lets you decrease the volume when you are talking on or monitoring a
subscriber's line over a callback path. The volume is decreased because MLT
removes amplifier from the line. - may be used to remove amplifier that you
have placed on the line with the + request, or amplifier that MLT has
automatically places on a long line. The main reason to remove the amplifier
is because it can sometimes cause a shrill or howl.
Call: Make a call on a subscriber's line
Call lets you use your touch-tone pad to dial any number you want using the
customer's line circuit. It does this by simulating an off-hook condition in
order to draw dial tone. A callback number is a required entry on the tv mask
and an mdf access is required for calling out (except in SXS and panel
offices). You can use a call when: 1) You want to know the TN for a known CA
& PR - you would call TSPS or ANI. 2) Calls cannot be completed to a TN - you
would call that TN. 3) To monitor dial tone on a customer's line.
Callrd: Make a call on a dial pulse line circuit
Callrd lets you use your touch-tone pad to dial using the customer's rotary
dial line circuit. MLT does this by translating tones on a customer's line.
mdf access is required for calling out (except in SXS, DMS10, DMS100, and
DMS100AC offices). Use a callrd if you want to know the TN for a known CA &
PR - you would call TSPS or ANI.
Ccol: Collect coins using coin relay
Ccol attempts to collect any coins that are in the hopper of a coin telephone
set by operating the coin relay. Ccol does not check the totalizer or check
the rest of the line. The results tell you only about relay operation, speed,
and the current that is necessary to operate it. A ver code is not returned
by ccol. You must have access to the line before your request ccol. You will
use ccol most often when you are talking to a repair person who is trying to
fix a coin phone.
Channel: Run enhanced channel tests on DLC lines
Chan or channel runs channel isolation tests and tells you if you have a bad
COT or RT channel unit. Use this request to run enhanced channel tests on
lines served by digital loop carriers such as SLC Series 5. Chan can only be