The document appears to be from a newsletter or magazine and includes several short articles about an airline booking phone system called "Pick Up & Go" that allows unlimited bookings without payment, alliances for teleconferencing services, and tips for running successful teleconferences. It provides details on how to use the airline booking system to make multiple reservations, numbers to call for teleconferencing services through Alliance, and advice on choosing certain conference lines that may allow more flexibility. The articles raise concerns about potential issues with the airline booking system and costs that could be incurred with teleconferencing if not managed properly.
This document summarizes an article posted on a hacked bulletin board system (BBS) run by a TV station to catch hackers. The TV station operator, Mike Wendland, reveals that the BBS was a "sting" operation designed to obtain names, emails, and other information from users to implicate them in illegal activities. Wendland thanks users for the information provided and says he will be contacting some users and law enforcement in the coming weeks. Another user calls on users to direct any retaliation at Wendland and the TV station rather than each other.
This document provides an annotated set of slides on the computational complexity of air travel planning. It introduces the air travel planning problem and presents original computational complexity results, demos, and an introduction to how seat availability works. The complexity results assume a basic understanding of formal languages and complexity theory.
This document summarizes an article from the October 1985 issue of 2600 magazine. It discusses the experiences of two individuals who attempted to contract their hacking services to phone companies but were not compensated as promised. They provided information about vulnerabilities in phone systems to companies for a fee, but the companies denied agreements or obligations to pay once the information was received. The article warns that companies cannot be trusted and any agreements should be gotten in writing.
AUTOVON is a worldwide voice network for unsecure communication within the US Department of Defense (DOD) and related agencies. It uses analog switches and works in tandem with other defense communication systems. AUTOVON provides over 68,000 government circuits and 73,000 commercial circuits. System switches can be controlled using silver box tones, which are unused touchtone frequencies. Updates are being made to defense data networks, but AUTOVON remains analog.
MOBILE TRENDS IN HOSPITALITY AND TRAVEL
• Improving the flying experience for both passengers and pilots.
• Providing hotel guests better service with less face time.
• Offering cruise passengers the amenities they expect on land.
Chaos Theory is from the minds at Chaotic Moon and the writers of Wired, Fast Company, and Popular Science. Expect mobile tech trends and smart takes on the travel customer experience.
This document summarizes the capabilities of early electronic switching systems (ESS). It notes that while ESS presents challenges for phone phreaking, it also has interesting features to study. Specifically, ESS allows for specialized "classes of treatment" for individual phone lines, restricting them to only outgoing calls, only incoming calls, local calls only, long distance only, collect calls only, or requiring caller ID codes for outgoing calls. In total there are said to be around 50 such classes available on ESS networks.
The document summarizes how Telenet, a major data network, could easily be hacked in the 1980s to scan for connected computers. It describes how hackers would program their computers to automatically connect to addresses in a given area code, record any "connected" addresses, and increment to the next address. The network was vulnerable because it did not require user identification and would allow connections without logging in.
This document discusses analyzing factors that contribute to flight cancellations using two datasets from the Bureau of Transportation Statistics. It describes exploring relationships between cancellation rates and variables like the number of departures by airline, total passengers by airport, and flight distance. Unsupervised and supervised models will be used to analyze segments, airports, and airlines to determine the best predictor of cancellations. Recommendations will aim to help travelers, airlines, and airports respond to cancellation patterns.
This document summarizes an article posted on a hacked bulletin board system (BBS) run by a TV station to catch hackers. The TV station operator, Mike Wendland, reveals that the BBS was a "sting" operation designed to obtain names, emails, and other information from users to implicate them in illegal activities. Wendland thanks users for the information provided and says he will be contacting some users and law enforcement in the coming weeks. Another user calls on users to direct any retaliation at Wendland and the TV station rather than each other.
This document provides an annotated set of slides on the computational complexity of air travel planning. It introduces the air travel planning problem and presents original computational complexity results, demos, and an introduction to how seat availability works. The complexity results assume a basic understanding of formal languages and complexity theory.
This document summarizes an article from the October 1985 issue of 2600 magazine. It discusses the experiences of two individuals who attempted to contract their hacking services to phone companies but were not compensated as promised. They provided information about vulnerabilities in phone systems to companies for a fee, but the companies denied agreements or obligations to pay once the information was received. The article warns that companies cannot be trusted and any agreements should be gotten in writing.
AUTOVON is a worldwide voice network for unsecure communication within the US Department of Defense (DOD) and related agencies. It uses analog switches and works in tandem with other defense communication systems. AUTOVON provides over 68,000 government circuits and 73,000 commercial circuits. System switches can be controlled using silver box tones, which are unused touchtone frequencies. Updates are being made to defense data networks, but AUTOVON remains analog.
MOBILE TRENDS IN HOSPITALITY AND TRAVEL
• Improving the flying experience for both passengers and pilots.
• Providing hotel guests better service with less face time.
• Offering cruise passengers the amenities they expect on land.
Chaos Theory is from the minds at Chaotic Moon and the writers of Wired, Fast Company, and Popular Science. Expect mobile tech trends and smart takes on the travel customer experience.
This document summarizes the capabilities of early electronic switching systems (ESS). It notes that while ESS presents challenges for phone phreaking, it also has interesting features to study. Specifically, ESS allows for specialized "classes of treatment" for individual phone lines, restricting them to only outgoing calls, only incoming calls, local calls only, long distance only, collect calls only, or requiring caller ID codes for outgoing calls. In total there are said to be around 50 such classes available on ESS networks.
The document summarizes how Telenet, a major data network, could easily be hacked in the 1980s to scan for connected computers. It describes how hackers would program their computers to automatically connect to addresses in a given area code, record any "connected" addresses, and increment to the next address. The network was vulnerable because it did not require user identification and would allow connections without logging in.
This document discusses analyzing factors that contribute to flight cancellations using two datasets from the Bureau of Transportation Statistics. It describes exploring relationships between cancellation rates and variables like the number of departures by airline, total passengers by airport, and flight distance. Unsupervised and supervised models will be used to analyze segments, airports, and airlines to determine the best predictor of cancellations. Recommendations will aim to help travelers, airlines, and airports respond to cancellation patterns.
The document discusses techniques for hacking UNIX operating systems and provides instructions on how to gain unauthorized access. It begins by explaining the different versions of UNIX and how making them all compatible will make hacking easier. It then describes how to identify a UNIX system by its standard login and password prompts. The document provides usernames and likely passwords to try and gain initial access. It also discusses how to send anonymous email and view the password file. The overall purpose is to teach methods for compromising UNIX security without authorization.
Windows maintains an area of memory called system resources for operating system functions. When programs exit, they are supposed to return these resources to Windows but sometimes have memory leaks where they do not. This can eventually cause the system to run out of resources and crash if too many programs are opened and closed without rebooting. The document discusses the different types of system resources - I/O addresses, interrupt requests (IRQs), direct memory access (DMA) channels, and memory addresses - and how to view which resources devices are using in Windows to avoid conflicts when adding new hardware.
This document provides information about RSTS/E, an early operating system commonly used on PDP computers. It describes how to identify an RSTS/E system upon connecting, explains the login process using a Project-Programmer Number and password, and lists some basic system commands like HELP, DIRECTORY, and BYE once logged in. The document aims to describe the basics of interacting with an RSTS/E system for beginners.
I am Spenser K. I am a Database Exam Helper at liveexamhelper.com. I hold a Masters' Degree in Database from, RMIT University, Australia. I have been helping students with their exams for the past 15 years. You can hire me to take your exam in Database. Visit liveexamhelper.com or email info@liveexamhelper.com.
You can also call on +1 678 648 4277 for any assistance with the Database exam.
The document provides information about Standard Air (StndAIR), a seaplane service operating in the Northeast US. StndAIR offers scheduled flights and charters to destinations within 300 miles of New York, including the Hamptons, Nantucket, and Cape Cod. Key details include:
- StndAIR operates a Cessna 208 Caravan seaplane that seats 8 passengers and has an 822 nm maximum range.
- In addition to scheduled flights, StndAIR offers charter flights that can be booked individually or via a social "Flight Board" where passengers compete to fill seats and lower the price.
- Standard procedures for StndAIR staff include checking availability, booking flights,
simple airline database project..By Amarulla khan, :- amarullakhan8@gmail.comhk2208820
The document provides details about creating an airline database management system. It includes entity structures with attributes for tables like aircrafts, routes, airfares, flight schedules, discounts, charges, countries, states, contacts, passengers, branches, employees and transactions. It also provides sample SQL commands to create the tables and insert sample records. The entity relationship diagram maps the relationships between the various tables.
This document describes an automatic toll ticketing system that improves on prior systems by removing certain apparatus, including a switching mechanism, from each register sender and making it available to multiple register senders. Specifically, it provides common office code translating apparatus that can be selected for exclusive use by a register sender to translate an office code into routing digits to route the call. It also allows charging the called subscriber instead of the calling subscriber by using a special office code.
This document describes an automatic toll ticketing telephone system that produces records of call information. It aims to improve the system by eliminating certain apparatus from individual register senders and making it available to multiple register senders instead. This involves removing switching mechanisms from each register sender and controlling common translating apparatus based on called office code digits to select routing for calls. The goals are to simplify register sender design and translate office codes into routing digits even if the full called number is not received.
This document discusses payphones in various European cities and provides subscription information for the 2600 magazine. It then summarizes an article about cellular phone hacking, including how hackers can capture other phones' electronic serial numbers and phone numbers to make fraudulent calls. It provides background information on cellular networks and terminology. Key points covered include how cellular phones communicate with cell towers, vulnerabilities that can be exploited to hack phones, and frequency bands used in cellular networks.
The document describes the requirements for an online airline reservation system. It identifies key actors like the customer and airline databases. It then lists 23 functional and non-functional requirements for the system like allowing customers to search, select, and book flights. Next, it specifies the hardware, software, and network requirements. Finally, it provides use case diagrams that show the interactions between actors and the main use cases of searching, selecting, booking and cancelling flights.
This document summarizes the December 1985 issue of 2600 magazine. It provides an overview of the magazine's content, including wishes for technological advances in 1986 and beyond. The key ideas presented are a call for uniform long distance rates, elimination of touch tone charges, legislation to protect bulletin boards from seizure, and more reasonable pricing of online services. The summary also briefly describes the magazine's purpose and how to subscribe.
Task QuestionsThere are 9 questions in this assignment. Yo.docxmattinsonjanel
Task / Questions
There are 9 questions in this assignment. You must answer all questions.
Question 1
(9 marks)
Select the applicable Global Indicator (GI) for the following journeys: (1 mark each)
ROUTING
GLOBAL INDICATOR
BNE – NAN – SFO - NYC
PA
HKG – SEL – AMS – HEL
TS
FRA – SEA – PER – SIN
AP
DUB – LON – ATH – CAI
EH
SYD – PER – BOM – JNB
EH
CNS – HNL – SFO - BUE
PN
ADL – TYO – FRA – MAN
TS
SYD - SIN - MOW
EH
ATH – HEL – LAX – SYD
AP
Question 2
(10 marks)
Encode or decode the following cities and airports as relevant: (1 mark each)
Airport/City
Answer
Airport/City
Answer
BCN
Barcelona
OSA
Osaka
SAPPORO, JAPAN
CTS
WLG
Wellington
MAA
Chennai
ULN
Chinggis Khaan
LONDON, GATWICK
LGW
KINSHASA, ZAIRE
FIH
NEW YORK, KENNEDY AIRPORT
JFK
HO CHI MINH CITY
SGN
Question 3
(15 marks)
Place the following cities in the correct sub-area identified in the diagram below:
(½ mark each)
Raratonga
Zurich
Moscow
Singapore
Perth
Jeddah
Jakarta
Port Elizabeth
Nadi
Tehran
Bali
Khartoum
Lusaka
Rome
Tel Aviv
Port Moresby
Ulaanbatar
Freetown
Harare
Port Vila
Chaing Mai
Nice
Cairo
Budapest
Johannesburg
Bangkok
Madrid
Queenstown
Mauritius
Beirut
Question 4
(10 marks)
For each of the journeys listed below, indicate where the EMA does apply and state the amount of miles to be deducted in the EMA column.
a. When an EMA does not apply to the journey, write NO EMA in the EMA column.
b. Then nominate the appropriate fare calculation box entry code (Ticket code column)
(½ mark each)
Routing
Excess mileage allowance (EMA)
Ticket code
Example: ADL /SIN / KHI / ISB
700
E/KHI
SYD/BOM/KHI/DEL
700
SYD/HRE/ATH
518
IST/ISB/KHI/SIN/SYD
CAI/JNB/MEL
SYD/HKG/DEL/BOM/MAA
Question 5
(5 marks)
Complete the ‘free baggage allowance’ for the following passengers: (1 mark each)
Type of passenger
Airline class of travel
JourneyFree Baggage Allowance
ADULTY
SYD to HKG
ADULT
C
MEL to TYO
INFANT
J
SFO to SYD
CHILD
F
LON to NBO
ADULT
F
BOM to PAR
Question 6
(6 marks)
With the use of ‘Add-Ons’, establish the ‘through business class’ (C/J) NUC fareamount and the MPM for the following journey.
Note: the complete calculation of the journey airfare is not required.
SYD(Sydney, Australia)
HNL
(Honolulu, United States)
LON
(London, United Kingdom)
CBG
(Cambridge, United Kingdom)
NUC FARE
MPM
TOTAL NUC
TOTAL MPM
Question 7
(15 marks)
a. Calculate the Business Class, normal airfare for an adult travelling on the following one way journey, requiring a ‘one way backhaul check’.
b. Work in NUCs and fill in all fare construction details with appropriate conversion to AUD, in the automated ticket format.
c. Show all workings on the Fare Calculation sheet provided here.
City
TPM
Carrier
SYD
BUE
7773
AR
RIO
1232
AR
LON
5767
BA
IST
898
BA
ZRH
435
BA
AUD
TAX
TAX
TAX
FARE CONSTRUCTION LADDERSFARE BASIS: ___________________
City
TPM
Tax
Code
FARE COMPONENTS
OUTBOUND
INBOUND
GI
GI
NUC
NUC
...
The document provides information for travelers at the Philadelphia International Airport (PHL). It includes a directory of airline contact information, descriptions of passenger services available at PHL like shops, restaurants, business services, a children's play area, and foreign currency exchange. It also provides contact information for airport operations and local visitor services in the Philadelphia area.
This document discusses electronic banking services provided by Chemical Bank called PRONTO. It allows customers to perform banking tasks like checking balances and transferring funds by calling into the bank's computer system using a personal computer and modem. While the service aims to increase security through the use of passwords and restricting funds transfers to pre-approved recipients, the summary notes hackers could potentially gain unauthorized access by eavesdropping on conversations to obtain customer codes or copying the required PRONTO software. It concludes by inviting reader feedback on local electronic banking services.
The document summarizes information from the Sherwood Forest bulletin board on various topics:
1. It discusses the recent raids by the Secret Service that shut down the Sherwood Forest II and III bulletin boards, likely due to credit card numbers being posted, and reprints an article from their archives.
2. It also reprints a guide from Sherwood Forest on exploiting vulnerabilities in the Israeli telephone system to make free calls.
3. Additional articles and guides from Sherwood Forest are promised to be reprinted in the future to spread their knowledge since their bulletin boards were shut down.
This document summarizes the history of the development of electronic switching systems (ESS) by Bell Labs and AT&T from the 1950s through the 1970s. It describes how the project took much longer and cost far more than initially anticipated due to the significant technical challenges involved. The first small-scale trial was in 1960, but the first commercial installation was not until 1965. By the mid-1970s, ESS was serving over 5 million customers across hundreds of offices, representing a massive technical achievement despite the project requiring over 4,000 man-years of work and $500 million in costs.
This document provides an overview of a student project on developing an airline reservation system. It includes sections acknowledging those who helped with the project, a certificate confirming the project work, a table of contents, and sections defining the problem, conducting a feasibility study, analyzing the existing system, designing the new system, and discussing implementation. The overall goal of the project is to automate an airline reservation system to make it faster, more accurate, and reliable compared to the existing manual process.
This document discusses using data mining techniques to predict flight delays. It begins with an introduction discussing the growing issue of flight delays costing billions of dollars. It then discusses previous work applying classification algorithms like KNN, decision trees, and neural networks to flight delay data. The document focuses on applying these techniques to datasets containing over 1 million flights from January 2017 and 2018 with 60 features related to delays. It analyzes the performance of KNN, C5.0 decision trees and neural networks at predicting arrival delays, finding decision trees to be most accurate at 85%.
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryFelipe Prado
The document discusses strategies for red teaming Active Directory security. It begins with an overview of Active Directory components and how they can be exploited by attackers. It then covers offensive PowerShell techniques and how PowerShell security can be bypassed. The document also provides methods for effective Active Directory reconnaissance, including discovering administrator accounts and network assets without port scanning. Finally, it discusses some Active Directory defenses that can be deployed and potential bypass techniques.
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...Felipe Prado
The document discusses vulnerabilities found in seismological network devices that could allow remote exploitation. It begins with a disclaimer and agenda. The speakers are then introduced as researchers from Costa Rica who were interested in these networks due to potential attack scenarios. Through a search engine, they discovered vulnerabilities in devices from multiple vendors. The talk demonstrates taking control of a device and outlines impacts such as sabotage. Recommendations are made to vendors to improve security of these critical scientific instruments.
The document discusses techniques for hacking UNIX operating systems and provides instructions on how to gain unauthorized access. It begins by explaining the different versions of UNIX and how making them all compatible will make hacking easier. It then describes how to identify a UNIX system by its standard login and password prompts. The document provides usernames and likely passwords to try and gain initial access. It also discusses how to send anonymous email and view the password file. The overall purpose is to teach methods for compromising UNIX security without authorization.
Windows maintains an area of memory called system resources for operating system functions. When programs exit, they are supposed to return these resources to Windows but sometimes have memory leaks where they do not. This can eventually cause the system to run out of resources and crash if too many programs are opened and closed without rebooting. The document discusses the different types of system resources - I/O addresses, interrupt requests (IRQs), direct memory access (DMA) channels, and memory addresses - and how to view which resources devices are using in Windows to avoid conflicts when adding new hardware.
This document provides information about RSTS/E, an early operating system commonly used on PDP computers. It describes how to identify an RSTS/E system upon connecting, explains the login process using a Project-Programmer Number and password, and lists some basic system commands like HELP, DIRECTORY, and BYE once logged in. The document aims to describe the basics of interacting with an RSTS/E system for beginners.
I am Spenser K. I am a Database Exam Helper at liveexamhelper.com. I hold a Masters' Degree in Database from, RMIT University, Australia. I have been helping students with their exams for the past 15 years. You can hire me to take your exam in Database. Visit liveexamhelper.com or email info@liveexamhelper.com.
You can also call on +1 678 648 4277 for any assistance with the Database exam.
The document provides information about Standard Air (StndAIR), a seaplane service operating in the Northeast US. StndAIR offers scheduled flights and charters to destinations within 300 miles of New York, including the Hamptons, Nantucket, and Cape Cod. Key details include:
- StndAIR operates a Cessna 208 Caravan seaplane that seats 8 passengers and has an 822 nm maximum range.
- In addition to scheduled flights, StndAIR offers charter flights that can be booked individually or via a social "Flight Board" where passengers compete to fill seats and lower the price.
- Standard procedures for StndAIR staff include checking availability, booking flights,
simple airline database project..By Amarulla khan, :- amarullakhan8@gmail.comhk2208820
The document provides details about creating an airline database management system. It includes entity structures with attributes for tables like aircrafts, routes, airfares, flight schedules, discounts, charges, countries, states, contacts, passengers, branches, employees and transactions. It also provides sample SQL commands to create the tables and insert sample records. The entity relationship diagram maps the relationships between the various tables.
This document describes an automatic toll ticketing system that improves on prior systems by removing certain apparatus, including a switching mechanism, from each register sender and making it available to multiple register senders. Specifically, it provides common office code translating apparatus that can be selected for exclusive use by a register sender to translate an office code into routing digits to route the call. It also allows charging the called subscriber instead of the calling subscriber by using a special office code.
This document describes an automatic toll ticketing telephone system that produces records of call information. It aims to improve the system by eliminating certain apparatus from individual register senders and making it available to multiple register senders instead. This involves removing switching mechanisms from each register sender and controlling common translating apparatus based on called office code digits to select routing for calls. The goals are to simplify register sender design and translate office codes into routing digits even if the full called number is not received.
This document discusses payphones in various European cities and provides subscription information for the 2600 magazine. It then summarizes an article about cellular phone hacking, including how hackers can capture other phones' electronic serial numbers and phone numbers to make fraudulent calls. It provides background information on cellular networks and terminology. Key points covered include how cellular phones communicate with cell towers, vulnerabilities that can be exploited to hack phones, and frequency bands used in cellular networks.
The document describes the requirements for an online airline reservation system. It identifies key actors like the customer and airline databases. It then lists 23 functional and non-functional requirements for the system like allowing customers to search, select, and book flights. Next, it specifies the hardware, software, and network requirements. Finally, it provides use case diagrams that show the interactions between actors and the main use cases of searching, selecting, booking and cancelling flights.
This document summarizes the December 1985 issue of 2600 magazine. It provides an overview of the magazine's content, including wishes for technological advances in 1986 and beyond. The key ideas presented are a call for uniform long distance rates, elimination of touch tone charges, legislation to protect bulletin boards from seizure, and more reasonable pricing of online services. The summary also briefly describes the magazine's purpose and how to subscribe.
Task QuestionsThere are 9 questions in this assignment. Yo.docxmattinsonjanel
Task / Questions
There are 9 questions in this assignment. You must answer all questions.
Question 1
(9 marks)
Select the applicable Global Indicator (GI) for the following journeys: (1 mark each)
ROUTING
GLOBAL INDICATOR
BNE – NAN – SFO - NYC
PA
HKG – SEL – AMS – HEL
TS
FRA – SEA – PER – SIN
AP
DUB – LON – ATH – CAI
EH
SYD – PER – BOM – JNB
EH
CNS – HNL – SFO - BUE
PN
ADL – TYO – FRA – MAN
TS
SYD - SIN - MOW
EH
ATH – HEL – LAX – SYD
AP
Question 2
(10 marks)
Encode or decode the following cities and airports as relevant: (1 mark each)
Airport/City
Answer
Airport/City
Answer
BCN
Barcelona
OSA
Osaka
SAPPORO, JAPAN
CTS
WLG
Wellington
MAA
Chennai
ULN
Chinggis Khaan
LONDON, GATWICK
LGW
KINSHASA, ZAIRE
FIH
NEW YORK, KENNEDY AIRPORT
JFK
HO CHI MINH CITY
SGN
Question 3
(15 marks)
Place the following cities in the correct sub-area identified in the diagram below:
(½ mark each)
Raratonga
Zurich
Moscow
Singapore
Perth
Jeddah
Jakarta
Port Elizabeth
Nadi
Tehran
Bali
Khartoum
Lusaka
Rome
Tel Aviv
Port Moresby
Ulaanbatar
Freetown
Harare
Port Vila
Chaing Mai
Nice
Cairo
Budapest
Johannesburg
Bangkok
Madrid
Queenstown
Mauritius
Beirut
Question 4
(10 marks)
For each of the journeys listed below, indicate where the EMA does apply and state the amount of miles to be deducted in the EMA column.
a. When an EMA does not apply to the journey, write NO EMA in the EMA column.
b. Then nominate the appropriate fare calculation box entry code (Ticket code column)
(½ mark each)
Routing
Excess mileage allowance (EMA)
Ticket code
Example: ADL /SIN / KHI / ISB
700
E/KHI
SYD/BOM/KHI/DEL
700
SYD/HRE/ATH
518
IST/ISB/KHI/SIN/SYD
CAI/JNB/MEL
SYD/HKG/DEL/BOM/MAA
Question 5
(5 marks)
Complete the ‘free baggage allowance’ for the following passengers: (1 mark each)
Type of passenger
Airline class of travel
JourneyFree Baggage Allowance
ADULTY
SYD to HKG
ADULT
C
MEL to TYO
INFANT
J
SFO to SYD
CHILD
F
LON to NBO
ADULT
F
BOM to PAR
Question 6
(6 marks)
With the use of ‘Add-Ons’, establish the ‘through business class’ (C/J) NUC fareamount and the MPM for the following journey.
Note: the complete calculation of the journey airfare is not required.
SYD(Sydney, Australia)
HNL
(Honolulu, United States)
LON
(London, United Kingdom)
CBG
(Cambridge, United Kingdom)
NUC FARE
MPM
TOTAL NUC
TOTAL MPM
Question 7
(15 marks)
a. Calculate the Business Class, normal airfare for an adult travelling on the following one way journey, requiring a ‘one way backhaul check’.
b. Work in NUCs and fill in all fare construction details with appropriate conversion to AUD, in the automated ticket format.
c. Show all workings on the Fare Calculation sheet provided here.
City
TPM
Carrier
SYD
BUE
7773
AR
RIO
1232
AR
LON
5767
BA
IST
898
BA
ZRH
435
BA
AUD
TAX
TAX
TAX
FARE CONSTRUCTION LADDERSFARE BASIS: ___________________
City
TPM
Tax
Code
FARE COMPONENTS
OUTBOUND
INBOUND
GI
GI
NUC
NUC
...
The document provides information for travelers at the Philadelphia International Airport (PHL). It includes a directory of airline contact information, descriptions of passenger services available at PHL like shops, restaurants, business services, a children's play area, and foreign currency exchange. It also provides contact information for airport operations and local visitor services in the Philadelphia area.
This document discusses electronic banking services provided by Chemical Bank called PRONTO. It allows customers to perform banking tasks like checking balances and transferring funds by calling into the bank's computer system using a personal computer and modem. While the service aims to increase security through the use of passwords and restricting funds transfers to pre-approved recipients, the summary notes hackers could potentially gain unauthorized access by eavesdropping on conversations to obtain customer codes or copying the required PRONTO software. It concludes by inviting reader feedback on local electronic banking services.
The document summarizes information from the Sherwood Forest bulletin board on various topics:
1. It discusses the recent raids by the Secret Service that shut down the Sherwood Forest II and III bulletin boards, likely due to credit card numbers being posted, and reprints an article from their archives.
2. It also reprints a guide from Sherwood Forest on exploiting vulnerabilities in the Israeli telephone system to make free calls.
3. Additional articles and guides from Sherwood Forest are promised to be reprinted in the future to spread their knowledge since their bulletin boards were shut down.
This document summarizes the history of the development of electronic switching systems (ESS) by Bell Labs and AT&T from the 1950s through the 1970s. It describes how the project took much longer and cost far more than initially anticipated due to the significant technical challenges involved. The first small-scale trial was in 1960, but the first commercial installation was not until 1965. By the mid-1970s, ESS was serving over 5 million customers across hundreds of offices, representing a massive technical achievement despite the project requiring over 4,000 man-years of work and $500 million in costs.
This document provides an overview of a student project on developing an airline reservation system. It includes sections acknowledging those who helped with the project, a certificate confirming the project work, a table of contents, and sections defining the problem, conducting a feasibility study, analyzing the existing system, designing the new system, and discussing implementation. The overall goal of the project is to automate an airline reservation system to make it faster, more accurate, and reliable compared to the existing manual process.
This document discusses using data mining techniques to predict flight delays. It begins with an introduction discussing the growing issue of flight delays costing billions of dollars. It then discusses previous work applying classification algorithms like KNN, decision trees, and neural networks to flight delay data. The document focuses on applying these techniques to datasets containing over 1 million flights from January 2017 and 2018 with 60 features related to delays. It analyzes the performance of KNN, C5.0 decision trees and neural networks at predicting arrival delays, finding decision trees to be most accurate at 85%.
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryFelipe Prado
The document discusses strategies for red teaming Active Directory security. It begins with an overview of Active Directory components and how they can be exploited by attackers. It then covers offensive PowerShell techniques and how PowerShell security can be bypassed. The document also provides methods for effective Active Directory reconnaissance, including discovering administrator accounts and network assets without port scanning. Finally, it discusses some Active Directory defenses that can be deployed and potential bypass techniques.
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...Felipe Prado
The document discusses vulnerabilities found in seismological network devices that could allow remote exploitation. It begins with a disclaimer and agenda. The speakers are then introduced as researchers from Costa Rica who were interested in these networks due to potential attack scenarios. Through a search engine, they discovered vulnerabilities in devices from multiple vendors. The talk demonstrates taking control of a device and outlines impacts such as sabotage. Recommendations are made to vendors to improve security of these critical scientific instruments.
DEF CON 24 - Tamas Szakaly - help i got antsFelipe Prado
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
DEF CON 24 - Ladar Levison - compelled decryptionFelipe Prado
This document appears to be a preview of slides for a presentation at DEF CON 24 about compelled decryption. The slides discuss the difference between first and third parties in communications and the Communications Assistance for Law Enforcement Act. It also lists several third parties like technology companies and individuals that could potentially be compelled to decrypt communications. The document indicates that it is a preliminary version and the slides may be altered before the actual presentation.
Deep learning systems are susceptible to adversarial manipulation through techniques like generating adversarial samples and substitute models. By making small, targeted perturbations to inputs, an attacker can cause misclassifications or reduce a model's confidence without affecting human perception of the inputs. This is possible due to blind spots in how models learn representations that are different from human concepts. Defending against such attacks requires training models with adversarial techniques to make them more robust.
DEF CON 24 - Chris Rock - how to overthrow a governmentFelipe Prado
This document outlines various strategies and tactics for overthrowing a government through covert and clandestine means, including cyber espionage, propaganda, agitation of public unrest, sabotage of critical infrastructure, and manipulation of financial systems. It discusses using mercenaries and private intelligence agencies to carry out these activities at an arm's length from sponsorship by nation states. Specific examples from Kuwait in 2011 are referenced to illustrate techniques for fomenting revolution through cyber and information operations.
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareFelipe Prado
This document discusses various ways that hardware can become "bricked", or rendered unusable, through both software and hardware issues. It covers 101 different bricking scenarios across firmware, printed circuit boards, connectors, integrated circuits, and unexpected situations. Examples include wiping firmware, damaging traces on PCBs, breaking solder joints on connectors, applying too much voltage to ICs, and devices being bricked by environmental factors. The document provides tips for both bricking and avoiding bricking hardware, as well as techniques for potentially unbricking devices.
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...Felipe Prado
This document provides an overview of a talk on novel USB attacks that can provide remote command and control of even air-gapped machines with minimal forensic footprint. It describes building an open-source toolset using freely available hardware that implements a stealthy bi-directional communication channel over USB using a keyboard/mouse and generic HID profiles to deploy payloads and proxy traffic without touching the network. The talk will demonstrate attacking Windows systems by staging payloads in memory to avoid disk artifacts and establishing a VNC session without user interaction or malware deployment. Source code and documentation for the toolset, called USaBUSe, will be released on GitHub at Defcon.
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationFelipe Prado
The document discusses common challenges and failures that can occur when conducting phishing campaigns professionally. It outlines eleven stories of phishing failures caused by issues like poor scheduling, spam filters blocking emails, not having enough target email addresses, domain name choices being too obvious, and lack of communication. For each failure, it provides recommendations on how to avoid the problem by improving collaboration, communication, planning and negotiation with the client organization. The overall message is that success requires treating phishing engagements as multi-party negotiations and managing expectations through clear communication and involvement of all stakeholders.
The document discusses vulnerabilities found in human-machine interface (HMI) solutions used for industrial control systems. It details a case study of multiple stack-based buffer overflow vulnerabilities found in Advantech WebAccess through an RPC service that could allow remote code execution. The vulnerabilities were caused by improper validation of user-supplied input to functions like sprintf and strcpy. While patches were released, analysis showed the fixes did not fully address the underlying problems with input handling.
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionistFelipe Prado
This document summarizes tool-assisted speedruns (TAS) of video games. It discusses how emulators and tools are used to play games faster than humanly possible by deterministically recording every input. Advanced techniques like memory searching and scripting push games to their limits. Console verification devices were developed to play back TAS movies on original hardware. The document argues that TAS tools are like penetration testing tools and can be used to find and exploit vulnerabilities in games. It demonstrates an arbitrary code execution in Pokemon Red using an unintended opcode execution.
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksFelipe Prado
This document shows a graph with distance on the x-axis ranging from 0 to 35 meters and Received Signal Strength (RSS) in dBm on the y-axis ranging from -100 to -40 dBm. The graph contains a line for a model with a path loss exponent of 2.0 as well as scattered data points representing collected RSS measurements.
This document provides an overview of a hands-on, turbocharged pragmatic cloud security training that covers topics in a fraction of the normal time by slimming down four days of material into four hours. It will cover configuring production-quality AWS accounts, building deployment pipelines, and automating security controls. Most examples will use Ruby and Python. Nearly all labs will be in AWS. There will be minimal slides and hand-holding. Participants are responsible for their own AWS bills after the training.
DEF CON 24 - Grant Bugher - Bypassing captive portalsFelipe Prado
The document discusses the results of a study on the impact of COVID-19 lockdowns on air pollution. Researchers analyzed data from dozens of countries and found that lockdowns led to an average decline of nearly 30% in nitrogen dioxide levels over cities. However, they also observed that this improvement was temporary and air pollution rebounded once lockdowns were lifted as vehicle traffic increased again. The short-term reductions could help policymakers design better emission control strategies in the future.
DEF CON 24 - Patrick Wardle - 99 problems little snitchFelipe Prado
Little Snitch is a host-based firewall for macOS that intercepts connection attempts and allows the user to approve or deny them. The document discusses understanding, bypassing, and reversing Little Snitch. It provides an overview of Little Snitch's components and architecture, describes several methods for bypassing its network filtering, and examines techniques for interacting with and disabling Little Snitch's kernel extension through the I/O Kit framework.
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...Felipe Prado
The document summarizes two presentations on cracking electronic safe locks. It discusses cracking a Sargent & Greenleaf 6120 safe lock by using a power analysis side-channel attack to recover the keycode stored in clear in the lock's EEPROM. It also discusses cracking a Sargent & Greenleaf Titan PivotBolt safe lock by using a timing side-channel attack to recover the keycode, and defeating the lock's incorrect code lockout feature.
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksFelipe Prado
This document discusses hacking heavy trucks and related networking protocols. It describes building a "Truck-in-a-Box" simulator to experiment with truck electronics and protocols like J1939 and J1708. The document outlines adventures in truck hacking, including modifying engine parameters, impersonating an engine control module, and exploiting bad cryptography. Details are provided on new hardware tools like the Truck Duck for analyzing truck communication networks.
DEF CON 24 - Dinesh and Shetty - practical android application exploitationFelipe Prado
The document provides an overview of a workshop on practical Android application exploitation. The workshop aims to teach skills for performing reverse engineering, static and dynamic testing, and binary analysis of Android applications. It will use demonstrations and hands-on exercises with custom applications like InsecureBankv2. The workshop focuses on discovery and remediation, targeting intermediate to advanced skill levels. It will cover tools, techniques, and common vulnerabilities to exploit Android applications.
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncFelipe Prado
The document discusses vulnerabilities in VNC implementations that allow unauthenticated access. It notes that a scan of the internet found over 335,000 VNC servers, with around 8,000 having no authentication. This lack of authentication allows attackers to access and "pivot" into internal networks. The document provides statistics on different VNC protocol versions found and describes exploits that could allow compromising devices to access additional internal systems through insecure VNC implementations and proxies.
DEF CON 24 - Antonio Joseph - fuzzing android devicesFelipe Prado
Droid-FF is an Android fuzzing framework that aims to automate the fuzzing process on Android devices. It uses Python scripts and integrates fuzzing tools like Peach and radamsa to generate test case data. The framework runs fuzzing campaigns on Android devices, processes the logs to identify crashes, verifies the crashes are unique, maps crashes to source code locations, and analyzes crashes for exploitability using a GDB plugin. The goal of Droid-FF is to make fuzzing easier on mobile devices and help find more crashes and potential vulnerabilities in Android applications and frameworks.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Presentation of the OECD Artificial Intelligence Review of Germany
2600 v02 n05 (may 1985)
1. IN THIS ISSUE
ALLIANCE INFO
MORE ALLIANCE INFO I MAY, 1985PEOPLE EXPRESS
COMPUTER IPHONE NEWS
2 NEW PAGES'
AND EVEN MORE'
- - •• ~- - - - - - - +- -2600
l
.'NII/I' rllhh"'lI'll h :'f".lllIh·r~IN·' tUl .In r!C'("rnU'ffiU nrJl,.lnl/,lllnn
'Uh"'llplI1HII.I1(-, ,:' I t";U 'I. ('III..olh.. 1 re" n.U"''''UI" (hf'f'J."a" 'I'i I (,;If
V()/.UMF TWO. ,V('MHI:R FlU:
I Lit-IIIIl," 'un.... I 'plU>Il "1(41 ( <1'1'<".111' 'p' .,'" ",fup ".lr~W! "'.'''1' L11:', .., p,l,lhk I., ,'",111 I nlt'frO"-'
,",I,il 1,' 'flll/l It", '~, !l<ldh hl,lll. '" 11'1~O~'il 111.11 'ilf.~'il.lf-II.I nil" 'fJll,,(,.wI, ,......, 111.11, W;I _ _ _ _ _ _ _ _ _ _ _ _ •_ __
People Express To Be Hacked To Pieces
by Paul G. Estev
If a business is starting a new, expensive
touch-tone interactive phone service, it
should assess its real usefulness. New
systems should be tested by the real users
as well as the system creators. All too
often, businesses do not notice that their
systems have fatal flaws or are user
unfriendly.
People Express, the growing economy
airline (economy carrier) has started such a
new service that has many of the worst
features of any Tone Activated Service
(TAS). Other services like this are George
Bank By Phone, IBM-Audio Distribution
System, and Mobil Credit Check.
The new service is called "Pick Up & Go"
and has been described in detail in recent
advertising. It is a system where anyone
could reserve airplane tickets for any
People's flight using a telephone.
Originally developed by AT&T, Pick Up &Go
should be going soon.
This service is in many ways like other
TAS's, but unlike a voice-mail system, there
is no real reward for exploring this system.
With voice-aail systems, people acquire
accounts which they can use. In Pick Up &
Go, there are no free plane tickets to get,
because you can only book the flights. The
tickets must be picked up at your
flight ... and paid for then. Yet, it is an
example of poor design using this now common
technology, which integrates phone systems
with data lines-in this case, the reserva
tion computers.
People Express is known for their low
prices, which gives the. the competitive
edge to be known as the fastest growing
airline as well as good investment. This
also has its drawbacks. Low prices means
low incentive for travel agents to book
flights on the airline. In addition,
People's is well known for overbooking
flights while expecting many of the
potential passengers to not show up.
People's instituted this service so they
could ~et around the travel ~ent problem.
But it IS expected that they w1ll have more
of the same ~roblems with the booking of
flights, 1f not more of different
problems ...
This is how the system works: As with
most TAS's, there is a voice that asks for
touch tone input as to what date, time,
flight, etc. you wish to take. At fIrst, a
female voice asks you for a seven digit
identification number which you can make up
(they suggest that you enter your phone
number, so it is easy for you to remember).
You tell the people at People Express this
number when you pick up the tickets, so they
know that it is really you who made the
reservation. In effect you are just giving
them a password. So you enter your seven
di~it code then a 't'. (Rememb~ you enter
a #' after each command, and n ers can be
either one or two digltS. You will be
. prompted by the voice for each entry.).
Then you enter the month you wish to travel
then a 'f'; then the date you wish to
travel; then the coding for the.air~ort you
wish to leave fra.; your destInatIon; then
the nu.ber of tickets you want; then your
desired departure hour. (Follow the hour by
an 'a' or a 'p' for a. or ~. After this
prompt the voice will tell you the two
closest flights to the hour you indicate.
It will also check to see if any seats are
available at this point.) Finally, you
enter the flight you desire. You are then
told the price of the flights you have
booked. At this point you are looped back
to the beginning, where you can hit a 't' at
each pra.pt and it will 'ditto' your
previous entry. You can book up to 5 seats
per code, but you are able to enter a new
code when you loop back, in order to book
ten, a hundred, or even thousands of
flights, if you are patient and devious.
Note again that you do not p~y for your
tickets until you get to the plane, nor do
you even tell the. who you are, in fact you
cannot if you wished to. In addition there
is no provision to cancel reservations, you
cannot do this if you wished to either.
This syste. will allow anyone to reserve
almost any number of tickets on any flight
leaving in the next two .cntba or so. You
can book a flight anywhere, even to London
(code-549). This is the way things should
be for travelers, fast and easy, but People
Express is just waiting for people, travel
agents, and other airlines to take
advantage. United Airlines could book whole
planes and clog up People Express just by
makin. a phone call. . .
It IS predicted that th~s system ~lll be
gone quite quickly, or the software WIll be
changed but this takes time as we all know.
If they do not - do away with this system,
there should be a commotion about hundreds
of people waiting in line for empty flights.
If you wish to try out this system, call
201.769.0205. Some airPQrt codes you may
need to know are: 397-tiewark, 529-Los
Angeles, 626-orlandor 743-St. Pete. The
codes correspond ~o the three-character
initials that every airport in the world
has.
There are a few more things you can do
after rou are done booking your flight, like
*H'-He p, *Bf-discard last entry, *D'-Delete
last reservation request, *Rf-Review cu~rent
reservation, *Lt-Review all your confIrmed
reservations. At this last prompt you can
use the followin~ commands: D#-Delete, K.t-
Keep, xt-Exit thIS function. .
The system itself is fairly user fr1endly,
but the female voice should tell you about
the help function you should not have to
read about the heip function in a newspaper
advertisement. The voice should also note
that you must enter a 't' after each entry,
but it only does this after you make an
error. You should also be provided with the
list of airport codes (Actually, some are
Continued on page 2-32
2-25
2. I
How to run a successful teleconference
by The Shadow
Alliance Teleconferencing Service is a
bridgin~ service offering teleconferencing
to busInesses. A conference merely is
several phone lines tied to~ether allowing
peo~le to talk to many locatIons at once.
AllIance is owned by AT&T Communications.
They use #4 ESS's (Electronic Switching
Systems) to control their conferences.
According to Alliance, conferences can be
originated and controlled from most loca
tions in the United States. The service
started out in area code 202, but has been
spreading throughout the country. One thing
to remeJl'lber is that even in the s8JIe area
code some central offices will allow access,
and others may not. Conferees can be from
anywhere dialable by AT&T, including inter
nat iona!. All iance can. be reached at 800
-544-6363 for social-enflneering or for set
ting up conferences 1n Qc~tions that cannot
access Alliance directly.· Usinf this the
conference can be billed to a Cal ing Card
or to a third number.
Alliance says the cost of a teleconference
is 25 cents a line.~er minute, as well as
the cost of a direct dIaled call for each of
the locations from the conference site. A
monitoring Alliance operator costs an addi
tional $3 an hour. Thus, rumors of $6,000
conference bills seem a lIttle exaggerated.
However, conferences can last for several
days and can have several international
participants, thus running the bill up.
CONFERENCE NUMBERS
Dialing 0-700-456-XOOX will result in
"This is Alliance Teleconferencing in [loca
tion)., You may dial during the announcement
for faster setup." The main conference
numbers are -lOOX and -200X. The locations
indicated by the X (as given by Alliance and
the logon recordings) are 1 being Los
Angeles, 2 being Chica~o, 3 being White
Plains New York, and 4 beIng Dallas. 0 gets
you the conference site closest to you. The
-lOOX lines only accept up to 21 confereesland usually don't allow internationa
dialing. The other conference numbers allow
up to 59 lines ,when available as the lines
have to be apportioned between the various
conferences going at the site, and also
allow international dialing. According to
Alliance themselves -200X are graphic con
ferences, -lOOX allows up to 59 conferees,
and both always allow international dialing.
However, actual exploration doesn't bear
these out.
Alliance doesn't seem to admit that -300X
conference (X is from 0 to 2, all located in
Chicago, Illinois) numbers even exist.
These conferences announce that they are
graphic, and they seem to bear this out.
They can also be handled as an audio con
ference. The only difference is that it
asks when adding conferees whether the loca
tion is graphics (hit 4) or audio (hit 5).
It's generally best to choose audio. These
tend most often to allow the passing of con~
trol, dialing of international calls, and
are also less used than the other lines.
Dialing 0-700-456-150X or -250X results in
a modem connect soundinf tone, followed by
"You have reached Bel System Telecon
ferencing Service's Special Set for testing
and measurement. Please enter your service
code [3 digits) or wait for instructions."
These cannot be reached from most area
codes, resulting instead in a "The number
you have dialed cannot be reached from your
calling area" just as if it were an 800
number not reachable from your calling area.
The only one I know that does get through is
201 (Northern New Jersey). The X goes from
o to 4, just like the normal -lOOX and -200X
conferences. There is no -350X series.
haven't as of yet figured out the "service
code." This can 6e used as a nonaal con
ference, exce~t that it requires you to con
firm your chOIce by voice, and each section
is separated by those modem connect sounding
tones. Rumors are that this is the upcoming
new conference system, which is supposed to
add features such as the deletion of con
ferees. However, any keypress I have tried
other than I, 6, or 9 {the normal controls)
results in a dire warnIng telling me "Please
wait for an Alliance operator to come to
your assistance." I haven't yet stuck
around long enough to find out what "assis
tance" means. Alliance won't admit these
exist, and therefore the -150X and -250X
warrant much further and deeper investiga
tion.
Alliance can be reached by other means.
Blue boxing to 213-080-0123 and other direct
routing to the Alliance machines (which used
to be the only way to get through) no longer
seems to work. However, box routin~ to 0
-700-456-XOOX does work. PBX's In con
ference country are often used to call con
ferences. Merely dial a PBX's inward access
line, enter the access code, dial an outside
line, and then either tOUCh tone 0-700-456
-XOOX yourself, or dial 0 and get the
operator to do It for you. Sometimes they
insist that the 0-700 SAC doesn't exist, but
just remain firm and tell them to try it.
Social engineering 'also works, just call an
o~erator and try to convince her to KP+O
-700-456-1000+ST and position release, after
getting her to believe you .are maintenance/
whatever. Getting a direct drop on an
inward operator increases the chance of
succeeding, such as by dialing 0-959-1211
from a pay phone (BLOC Agent 003's Basic
Telcom VI, discovered by Karl Marx) Another
trick suggested by Shooting Shark is to use"
a white boxable phone (see 2600 ~age 1-40,
July 1984) or even an ATM help--llne or a
hotel phone in an airport (as in the April
1985 2600, Page 2-19). Since when arranging
a conference you really don't need to speak,
just set up a conference normally, and when
done call another payphone nearby, pass con
troll and continue. The conference will
stil be charged to the first pay ~hone.
Several techniques are avaIlable to
improve the quality of the call. Since the
call may be going through, up to several
extenders to reach a non-800 PBX, and from
there to Alliance, the signal quality can
get quite poor. A technique that helps to
keep Alliance from knowing your number is to
call Alliance via a PBX, add in the lower
end of a loop, pass control to it, and then
call the hi~h end. A variation on this
technique IS to call your other line or a
payphone next to youl or even, if you have
call waiting, to cal yourself again, pass
control to yourself (it works), and then
hang up the original call. All these
techniques may not always work, as sumetimes
Alliance refuses to pass control, as men
tioned above.
CONFERENCE CONTROLS
Alliance is extremely user friendly, as it
was designed for businessmen. Help messafes
abound, and all you need to do is to fol ow
their directions, but here is a brief going
Continued on page 2-31
2-26
3. ------ - ---
-- - ---- ---- ------ ------- - - --------- ------ - - - - - - - - - -
-- - - - - - - - - - -I~ ffiffiltD
414 Bust
2600 Nev.'~ Sen'ice
Six people in area code 414, Wisconsin, were arrested for
credit card fraud. TheWorld ofCryton BBS was takendownas
a result, but was reportedly not the target of the investigation,
which is being continued by the Secret Service in several cities.
The Wizard, Phoenix, and many other phone phreak~'were
among those were were implicated in the investigation.
Police Hacker Cleared
Computel"olorkf
A preliminary investigation by the San Franciso Police
Commission has cleared the police department ofwrongdoing
in the recent controversy over a breach in computer security.
No evidence had been uncovered to substantiate charges that
a police lieutenant used a specially designed menu to gain access
to Public Defender Jeff Brown's confidential files, which are
stored in a shared computer system in the city's Hall ofJustice
building.
Although the lieutenant admitted that he was givenanaccess
level usually granted only to system administrators to conduct
an internal police probe, he has denied allegations that he read
confidential files stored by other agencies.
As a result of the police department's actions, a public
defender had asked a San Francisco court to dismiss murder
charges filed against one man, saying that the security breach
had violated his right to attorney<lient confidence. The judge
ruled against the defense's motion.
Dial-a.-Directory
USA Today
Soon to be published is a directory that lists more than 2,500
"informative, exciting, and entertaining recorded phone
numbers." Called The Incredible Dial-a-Message Directory, it
lists many of the familar and unfamiliar recorded messages
around the country. "I went through 2,500 phone books," says
Mark C. Guncheon, the book's authorand no strangerto three
digit phone bills. The book includes such numbers as Dial-an
Avalanche 9073376742, The Sleep Line206258279 I,or Dial-a
Romeo 2159766367.
Reagan Hangs Upon Kids
Newark Star ledllt
The two Montgomery, N.J. teenagers who were. promised a
presidential phone call as their prize for winning a national
essaycontest have been put on hold indefinitely, a White House
spokesman said. Donna Woodwell and Kate Baicker, both 13,
have been waiting four months for President Reagan's phone
call, which they were promised as their reward for submitting
the winning essay and illustration in a contest sponsored by
Current Events magazine. Connie Mackey, the White House's
director of student correspondence said she never was
contacted by the publishingcompanyand doubts whether they
had arranged for the presidential call.
The editor of the publication said the kids may get a trip to
Washington, D.C. Their winning essayand illustration was one
of more than 400 entries in the contest, which was open to
students in fourth through 12th grade. The entry, which urged
the Reagan Administration to strive for nuclear disarmament
was written by Baiker and illustrated by Woodwell.
======-= =-= -----=-= -=====
=-= ==-= ~~
MCI goes to U.K.
rhc Wall Street Journal
MCI Communications Corp. said it inaugurated long
distance telephone service to the United Kingdom. increasing
to 18 the number of overseas locations MCI serves. The U.K.
countries represent 15% of the international long-distance
telephone market that totals $6 billion in annual revenue. a'
spokesman for the telecommunications company said. MCI
expects to reach 80% of the international market by the end of
this year.
Yellow Scam
The Woodbridge ~N'!o I ribune
Owners of small businesses in New Jersey are being targeted
by telephone solicitors who are duping them into buying
advertisements that never appear in the Yellow Pages. The
"Yellow Pages" scam is a well operated, out-of-state operation
that floods areas with invoices for Yellow Page advertising.
Unfortunately, the advertising is not for the directory published
and distributed by New Jersey Bell. Businessmenare reportedly
getting invoices from a company that uses the "fingers do the
walking" logo instead of the pretty Bell logo according to
Monmouth County Consumer Affairs Director Sally Mollica.
"Crack~rs" Cra<?ked
Online Today
Transcall America, an Atlanta based discount long-distance
telephone service, has uncovered a group ofcomputercrackers
who ran up at least $12,000 in illegal calls in five months.
According to company officials, no one has been charged. but
the FBI is investigating the case and could bring state and
federal charges. The crackers were caught when investigators
allowed a stolen access code to be posted on a Cocoa Beach,
Florida, bulletin board, to remain valid, and to be traced. The
bogus calls were traced to several homes in Brevard County,
Florida.
Carrier Choosing Time
Associated Press
Bell Atlantic telephone companies in six states and the
District of Columbia will begin using ballots at the end of May
to make it simpler for customers to sign up for easy access
long-distance dialing. Equal access, as the system is called, was
agreed to as part of the AT&T breakup. It gives all long
distance companies equal access to customers by allowing
callers to reach their long-distance company by dialing "I,"
instead of a multi-digit access code. Customers of Bell Atlantic
now must place their orders through the long-distance
company instead of balloting. AT&T competitors claim
balloting gives companies a better chance to get pan of the
long-distance market.
Mystery Transistor
Business Week
Enthusiastically describing ongoing projects, Robert W.
Lucky, executive director of research for communications
sciences, mentioned that Bell Labs researchers were workingon
a "ballistic transistor" that switchesat the incredible speed of 0
femoseconds (I quadrillionth ofa second). No sooner were the
words out then he caught himself. "I guess 1shouldn't have
mentioned that," he said half-jokingly to two public relations
people in the back of the small conn "ence room.
2-27
4. fetters
Which of the many computer networks
are the best to use?
We looked for a few replies to this
and here are a couple of the.:
"I access a database that is on
UNINET, TYIINET, TELENET, and DUSHET.
I've only used TYIINET and TELENET,
I!nd TYIINET is far superior. TELENET
~s one of the .ost exasperating
experiences I've ever had. "
"Why, TYIINET, of course!
"Seriously, Ty.net has .ore nodes
than any of the othersj it is also
.ore secure. I have used TELENET as
a private user~ and it is IIUCH slower
than Ty.net, Dut since you're not
going to out-and-out believe so.eone
who works for one of the.c I suggest
you look at a study done DY DATAPRO
Research Corporation (they're in
Delran, NJ) which co.pares TELENET,
TYIIN~T a~d several other co.pani~s. "
We d l~ke to hear .ore on this.
What are silver box tones?
.Every touch tone phone- can pl'oduce
s~xteen tones, not just twelve.
T~ere is the capability for an addi
t~onal row of buttons on the right
s~de.. These tones are labeled
(.ov~nlf fro. top to bot to.) A, B, C,
and D. They are also referred to as
F1l!sh,. Flash OVl!rride, .Pri~ri ty, and
Pr~or~ty Overr~de (~n ~ncreasing
order of i.portance). This is bow
the calls are treated when they are
.ade. Thus a "0" call gets priority
oVl!r a ."B" call. This syste. is used
p~~~ar~ly on Autovon, or Pa Bell, tbe
.~l~tary phone network, Nhich can
s~ut dONn tbe regular network at any
t~.e. The tones are also used for
test purposes and occasionally do
interesting things for phone phreaks.
What is 950?
.950 is an exchange created to ful
f~ll part of the purpose of equal
access. It was designed to work in
all area codes, so that the sa.e
a~cess nu.ber could be used by a long
d~stance co.pan~ nationwide. In
other words, 950-1022 will get you
IICI wherever ~ou are. There is no
charge to call 950 nu.bers and the
connection is always crystal clear.
You can only dial tbis exchange
locally, i.e. ~ou cannot access San
Francisco's 950 excbange fro•. Los
Angeles.
95 1s it easier to trace 800 calls or
o calls?
Tr~cing an 800 call si.p1y is not
as easy as tracing a 950 call. 800
nu.bers exist allover tbe countr~
whereas 950's aren't an actual
exchange, but Bre located within
every cl!ntral office. Thus, ANI
(Auto.at~c Nu.ber Identification)
intra-exchange is very easy. The
further aNay fro. the central office,
the harder this beco.es.
What is RBMOB?
REIIOB is re.ote observation. Call
a nu.ber, enter a code, enter a
nu.ber, and listen. We need .ore
info o~ this one ourselves.
2-28
Especially as to if these nu.bers
really exist. We do ad.it that the
technology is there. In fact, we
Nere told of the nu.ber where you
could overhear rando. IICI conversa
tioDS in Texas, a feN .onths ago,
without entering any. codes, but it
stopped Norking by the ti.e Ne went
to print.
What follows are two true accounts
of adventures that were sent to us.
The first was sent by The Crazy lIan.
It depicts thievery and destruction.
2600 in no Nay condones this type of
activity. We really do not. But
there are so.e things to learn fro.
the first adventure about the
construction of pay-phones, so we
decided to include it. As they say:
Learn good things-the bad will teach
you by the.se1ves. The second
adventure is presented for your
a.use.ent only.
I a. writinf you because I have
done so.eth1ng that .ight be of
i.portance to the readers of .this
.af. Well. a few days afo·.e and a
fr1end went to a cons ruction site
and found a telefone on a piece of
wood with a wood base. so we decided
to take the bitch ho.e. Well. never
underesti.ate the ~ower of a fortress
fone. We read a f1le that BlOC wrote
called Basic Teleco••unications1 Part
VI. It said that you could dri lout
the .ain lock located on the right
side of the coin box. So we tried to
atte.pt this daring feat. Hever, I
re~eat. never waste your ~i.e
dr11ling out the lock. It will take
da,s and days and probabl, about 30
dr111 bits. After about f1ve hours
of drilling••e and .y friend decided
to try a different approach. We
knocked off the .etal washer located
right on top of the coin return (it
should just break right off). Then
we used a pair of vise gri~s to tear
the .etal off around the C01n return.
By doinf this we ca.e upon the coin
box. bu it still had the lock on top
of it! How. this is the part that
takes the longest ti.e. You have to
ri~ out (with the grips) the .etal,
wh1ch 1S only 1/8 inch. tha~
surrounds the entire coin box. Then
you .ust push all of the locks around
the silver plate in. or the silver
plate will never co.e off. After
pushing in the locks.' you .ight be
able to re.ove the silver plate. If
Dot. then take a good,size sledge
ha••er and a trusty crow-bar and
whack the plate as hard as you can.
.aking the lid co.e off. Now. you
.ight think: Now that I got the
plate off I can just pull the coin
box rifht out. Wrong. To pull the
box ou you .ust have a key to unlock
the coin box. If you don·t have a
key (which I didn·t) then ~ut the
trusty crow-bar around the C01n box
and bend the box till it·s re.ovable.
Now be sure to get the little slips
of paper that say "Sorry. this phone
is te.porarily out of order." They
are co.pli.ents of Bell. Now you
Continued on page 2-30
6. Pl..eo....... "><Cl..l.~"
c)l..I.r changing
typ ..~_c ..... ~
..tyl.. __ ~ ..nd
printing
fn.-thod_ in ol..l.r
contin'-ing
E!'~~C)rt to
cachiIRV'e!!'
peor-Feoction.
Pl.. ..a.seo cont.inl..l."
to l..eot l..I.S knC)"",
ho~ "",eo"r~
doing. Any
cc)fnfnEtnt.s. Dr
assist.cance i s
grE!'catl..y
~E!!'l..cofn_d. Cll..l.r
fnC)c:I~1n is;. _1~_ys;.
opten.
SOME CORPORATE SECRETS:
1-800
227-3414 241-602~
243-7650 321-0845
321-0845 325-7222
325-7222 327-9136
327-9136 327-9S9~
343-1319 343-1385
343-1711 343-1844
343-1844 343-BBS3
521-8400 523-0847
~27-3511 527~3~11
527-3535 ~43-71.8
~47-67~4 621-1~6
6~4-8491 654-8494
682-4000 843-0698
858-9000
SURPRISE 2059870785
CNN 8005:54~924
CNN DATA 8005545925
CNN NEWSROOM 800554~926
MUSAK-NON-SUPED 5124740936
BBC2 AUDIO 0114112468024
VD INFO 0114112468072
TOURIST INFO 0114112468041
IN FRENCH 3
IN GERMAN :5
DJAL-A-PLANET 0114112468055
SLRPRISE 0114112468015
CBS-REMOTE FEED 2125804481
US-DIAL TONE IN UK (POSSIBLY
NON-SUPED) 01144612468011
£etters CODtiDued frOil page 2-28
_ld be .t S) er 60 t.£ks richer by ...., so " SPend it III parts to
like a blue box, er aething related to .eakiiIg. Iiood luck.
belly, IM/Ol/WS 6:11 ill
'[he _ r.. I "t II' looked at the desk, it's 6:11 ill, an hoor
befere I " to School. I pic' the receiver up. •Is this JOOn ItKee?· asked
the caller urgent!,. ·Yes,· I replied half asleep. 'Yoo better get rid of
yoor printwts mit yoor stuff III disks, you're !JIIIII get a visit lIithin the
next 20 IiNltes • the kid -said. He IuIg up. I "t nervws. The pilllle rang
again, ·JOOn tJiis is Jil, Greg just "t busted and his brother has been
callilJg II' all of his frim III a sheet Greg had. Did he call you? ·Yes
he did,· I said. ·Yoo better believe it, because loo're !JIIIII get nailed
!lith the rest of us. Get rid of everything, bum it. I ~t to IYSelf,
·.t did I em to lake thellllllt Ie? Codes? 1m tiE, have to oorn every
thing pertaining to illegalllr~.· I lIaS panic-stricken. I ."t it
together and I8It ootside and burned 1t, di~dJf'intwts, everything. As I
lIaS returning to IY hwse, I lllldered if urey had a tap III IY line. The
phme r. another tile. .1» no. Il1o is it IIOII? I llent in and lIlSIII!I'ed
it, lilly to be told ·April Fools!· Click.
1'IIeNoW..... Not KJdd....Dept.
y..,..............u
COtlECT ONLY SERVICE
(INMATE SERVICE)
Contact your Michigan Bell Inmate Communica
tions Specialist for Information regarding new
service, changes or additions.
CALL TOLL FREE:
1 800 482-0666
THE COST EFFICIENT SYSTEM
for areas 'serviced by Michigan Bell.
@Michigan Bell2-30
7. ALLIANCE Teleconferencing Services Continued from page ~-26
over of the ca.ands. After the 10900 recording, ch~ the nuar of loca
tims for yoor cmference. ChooSe bell* IS locatlms, as BY 1Jeq)1e use
Alliance, and using lOre locatims than avail~le results in "no cmference
facilities available nl*". To ~han~ yoor choIce dI~1 a t, or to go OOIIiIrd
hit a I. To add a nulber Wille In cmtrollOde dIal 1+ the phme nulber.
To dial internatimal dial 1+011 +the phme nulber. Passing cmtrol can
~ dooe by dIalIng 6plus the nulll!er,of the persoo, ~ the cooference yoo
~Ish to ~ass cootroi. Then by hI~tIng a • yoo remn,th~ cmferel)ce, or by
Just hangIng up yoo leave. lIIen In the cooference dIalIng a • wIll return
YOO to cootrol lOde. " "'
lIIen cmferees hang up, a ~t WIll ~ ~eard. Th~ cm~roller also
hears the phme nulber of persoo who left. HIttIng the 'Illedlately calls
the departed back. There is no way to dr~ ~le frOl cmference other
then ,getting a cmf~ren~e operator to 00 it or by bll*ing 2600 hertz ~
~e lIne., ~r, tl)Is,"'Ill drOP, each and every persoo 00 a trunk USIng
In-band sI!JIalIng. HittIng a 0 In cmtrol lOde ~ a cmference
~rator, hl*ever, she/he takes,cmtroJ ~fore helshe answers, so mly do
this,when yoo knl* wh~t yoo are,doll!9' Hlttlll9 a 9 In cmtrollOde,recJl~ts
a sIlent attendant lIstener lIne. AccordIng to the DeIm thIS ~tlm
allONS,the cor:ttr9ller to hear the tmes and phme _s 9f peqll~ h~ing
up whIl~ he IS In cmtroJ lOde. Cmference op's,cJall ~IS flllCtlm IS for
secretanes and such to lIsten to, but not partlClpate In, cmferences for
note taking purPOSes.
If these instructims sound cmfusing, doo't worry. ReIeIber, the entire
cmference is accOlPal)ied by extreaely user fri~dly 1e55age5. RecentIY"m
weekends ,or late nlllt, aany t~lcOl hobbyIStS h~ve had,probleas WI~
tran~fernng cmtrol, Instead gettIng a recordIng Not aVaIlable at thIS
tile". Also, sililarly, int.ernatimal dialing is SOIetiles unavailable.
Generally -JOOX does this less often, then -200X next.
~RS
00e lUSt always be prepared for hsteners Never me cmferences. If
me is discussing "~tionable" tatters 00 a cmference, last nales and
phone nulbers shoold t<EVER be given oot. 00e of yoor felll* telcOl hobby
ists light be an FBI agent, or SOIetiaes a cmference ~ator listens in 00
cmferences lIIich sound, "suspic~ous. " They do not 00 this usually, ~s
Alliance lOSt often carnes buSIness calls (YOO have to reaellber thIS
folks!), and thus doesn't expect fraudtlent calls, SUre ways to interest an
op is to have either all the cmferees but me or mly just the cmtroller
hang up. lIIen a cmtroller hangs up ~e cor:tfer~ce op takes"cmtrol ~
a!t.ts to let the the forlK'l colltf'oller regaIn hIS cmfer~e ~y callIng
hil at hOle., Al,~, cmtrollers who ,spend Img 8IOOIltS of tI~ In cmtrol
lOde, resultIng In everyme else hangIng up, arooses the attentIm of the
~, The nulber which originally started the cmference can hang up though,
after passing cmtrol, but the cmference will still be billed to it.
Dangers of fraudtlently started cmferences seeI to be slight. The mly
persoo I knew who got caught was forced 19 pay for a ~ c~ll fr~ ~llas
(lIIere ,th~ cmference,was s~ted) to hIS hole In ~lIforna. ThIS IS not
to say It IS safe, but It defmtely IS safer than,USlllg 950 s fr~lentlY.
Even phreaks who set up several cmferences a nIght for amths, IncludIng
the harassaent of DA operators, haven't been caught. !biever, lie dm't
~t yoo attelPt a fraudtlent cmf~ence. Even perlitti~g yoorself,to be
added to a fraudtlent cmference IS enoogh for prosecutlm, accordIng to
AT&T. 00e thing that prevents a .lot of this investigatim is ~t IQSt
fraudtlent cmferences are set up WIth PBX's, and thus the prosecutlm lles
with the owners of the PBX, and AT&T isn't even involved. For this reasoo,
PBX's often are traced.
Another risk is that all nulbers dialed are recorded by Alliance, even
lisdials. The nulbers dialed are all printed oot and sent to a vault at the
Chicago Bell Test Labs for storage for their records. In additim, cm
ferences are ranoo.lI taped and aonitored for fraud. It would seeI safer to
use Alliance to cal an extender, and then dial oot frOl there as althoogh
Alliance records all nulbers dialed, logically they prooab}y mly pay atten
tim to nulbers they intend to act 00, i.e. aGI to the cmference. The
SllbsecJJent use of a extender is a tatter of investigatim by another CQl
pany, and doo't forget AT&T and the extender C(IIIaIIies are CQIIIetitors, and
thus they would1't always go oot of their ways to cooperate.
STIJITS ,
Often when a cmference starts to sll* cbrl, ~le start suggestIng
vari~ stunts to liven things up. 00e word of warning, ,lOSt of these
technl~ would be cm~trued ~ harassaen~, and thus ~re Illegal. ,OOe of
the lOSt CQllOn used IS addIng a lUItltude of Directory AssIstance
ClllPUter COIP8IIies or other corporate bureaucracies have sililar chaos
potential 00e interesting thing to try is to pose as a phooe COlP<1ny
e.ployee for social engineering purPOSes. HoIEver, lOSt phreaks fail to
realize that "TSPS taintenance" or "Bell Security" gets a little too
repetitioos and suspicim aroosing dte to their over-heavy use.
Generally, for coortesv's sake, ooe shoold call people who ~e~ally
expect to get lleird calls at o4d hours, ,and are often bored at theIr JOOs,
Radio statim OJ's often el)JDY this, as do hot~l O{lera~ors and bell boys.
Going internatimal often Increases the fasClnatioo IIIt~ cooferences,
Several hotel cps aroond-the NOrId exl;lett and look forward to cooferences ,
calling thet dtring the dtll early IQrn~ng h~s, and the coofereoces SOIe
tiles place calls for thel in apprecIatim. "ilItary bases are another good
site, as are unattended payphooes. SOIetiles people at randal are called
up. It often is ilPOSSible to cmv~nce ~le that they ARE ~tting a cor:t
ference calli as they twist up SOle Il!IPOSSlble theory to explaln,lS chaotIc
~le speaKing at mce. Even PresIdent Reagan (~@ 1-23 April 1984) and
other "celebritIes" have been att~t~ to be reachea 6y cmferences. Of~
t.elling their secretaries tha~ thIS IS a cmference,ca!l can aroose their
curiOSIty enoo9l to COle 00 lIne. ACQllOn statelent IS Yoo daln cOlPllt.er
hackers are so SIiIrt to have fi!J.Ired this oot.." Little do ~ey knOll hOll
silPle it is, and it also shONS hl* ~Ie and the tass ledu cmstant.iy
lisidentify anything lildlV oot of the ordInary as the fault of cOlPllter's
influence 00 people. (Sorr¥ aboot the side digressioo)
ReII!Iber that when addIng recordings or extenders to a cmference that
they generally will not hang up. Sililarly, ~Ie added can't be forciblY
discmnected withoot the cmference operator shelp, and,can stay 00 as Img
as they want, lOOitoring or taking notes. Only way to rid a cmference of
these is to blast 2600 cbrl the line, with the results predicted above.
IIlen adding "dangeroos" peQple such as fBI agents or infor~ts ~ use of
three way calling by me of the cmferees IS generally lOre Inteillgent, as
it per.its the caller to forcibly drop theil,
llany of these stunts aentimed are plain childish, rude, and unthooghtful
to others Hany of these definitely would count as harassaent. FrecJlent
resortatioo to these often arooses the susPicioos curiosity of Alliance cps.
Continual use of these ta~ end up in a ~eral tightening ~ of secur~ty in
Alliance, not dte to fraudtlent cails, but frOl COIPlalnts. ObvIOUSly,
these utterly senseless acts should be cmdtcted in extreae lOderatim.
OTIER CClfEREtaS
The old lethod of cmfer~ing by caqing the operator aQd asking for a
cmference still works. ThlS however IS cmtrolJed phYSIcally by the
operator, as it uses a ~or~rd. Three way calhng of c~rse IS ano~er
cmferencing ~tim. ItIltl-hne loops are rare, but do eXlSt. SOIetlles
businesses cmnect several phme lines together to fori a cmference. One
of the lOSt talOOS was the In.A me at 213-206-2810 to -2817 as last known.
00e up as of the writing 9f ~his article ~s at 602-976'1l770 to i777.
Another cmferencing SYSteliS CIty Conferenc~ In Qakland and San FranCISCO.
Si.ilar to this is a systel called Phme-a-fnend In ,SOle areas at ~-~.
Ever¥ once in a while cmferences are set up In ~e ,old ~~stoncal
phreaking 101d 00 PBX switchboards or 00 telephme SWItchlllg ~Jlpaent by
renegade lineaen and the like. 00e of the lOSt historic of these was the
"2m" cmference" iIIich was ar~. through an unused telex test-board
trlllk in a 4A switching laChIne In Yancoover, Cana~ For severalamths
phme ~reaks coold If via a blue box 604 (Vancoover'~ 'a(ea code) then ?1l1
(code for telex testing board) to reach phre~ks and other 'JelcOl hobbYISts
aroond the world. SOIetiles cmferences set up by this ~od are acces
sible via noraal phme lines. These cmferences, by theIr 'IeQ nature of
actual adjustlent of switching ecJIipaent, are rare.
Several C(Iflanies offer alternate bridgi!19 services, otherwise knowt as
cmferences. These all clail th~ have hIgher ~alIty than Alliance. They.
cmtrol the cmference thelselves so yoo can just get cbrl to business
withoot worrying aboot details." Yoo can ask thel to leave but then there
is no me in cmtro! of the cmference. Generally ther ofter SIiIller cm
ferences then Alliance's S9 (llarket Navigatim's lillt is 19) They all
charge cmsiderably lOre than AlIT (llarket Navigatim Inc. ~oted a rate as
$195 per hoor for a 12 persm cmference !'lus the cost of the dialed ~
calls) Yoo generally have to set up cmferences ahead of tile. They all
will send a bill to your CQIPaIly, and SOle will alll* the use of a credit
card instead Generally yoo have to book ahead of tile. Exaaples of these
i~t firlS are DarOle Connectim (203-797-1300), llark~t Navigatim
Inc. (914-365-0123) and Telesessim. The nUlbers are for settIng up cm
ferences al~ yoo can social-engineer thea as llell.
~ators. Listening to thea ask each other "lIIat city please?" and then' IOO.IBIIItI
arguing aboot who belmgs 00 the line is extreaely huIOrous. Confusim
rel!J1S when yoo attelPt to get thea to look up a nuIber. SOle DA's haYed ~adll
~is dooe so IiIIIY,ti~ that they,realize that this,is a ~ference an III
'eIther hang up lliedlately or WIll threaten yoo WIth taking over yoor cm
ference. Reiebr, mly the clIJference ~rator can take over a ~ference,
so lOSt of these threats are Ineffectual. Ih!n any of thea gIve a hard
tile, just ask to speak to their supervisor, as this usually ~ even aore
cmfuslm. Si.ilar things can be dooe WIth with busi~ offIces,.r~Ir
service. ("sir, 1'1 getting all this cross talk 00 IV lIne" "no1 ' It fIV
line." ad inflnitua) telex cps, and other !OJIe c~ persoone. Aso.
Basically, cmferencing, even frauddently, is me of -the safest ways to
get in cmtact with other telcOI hobbyists, by its track record of busts.
They are very few and far between. Several,tiles Alliance ~ators have
dropped in 00 cmferences and carned 00 Cmversatlms With the
partici,..ts. Itich of the infortatim in this article was picked up frOl
these swrces Often me hears the CQIIOn COllent of IiIIIY telcOl corpora
tims that :they are using us as a tax writeoff," hoIever, hoIIlmg can
they keep taking losses in this past-divestiture age of of telco C(llleti
tim Expect in the near future to see other telcOl CQlPallies such as ITT,
2-31 . Continued on page 2-:' 2
8. People Express Cont inued from page 2-25
easy to find yoorself: 1lt/-336-Denver, SYR-797-Syracuse.). If ~le's
really wishes to encoorage the systet'S usage, it shoold also have a toll
free ndler. In the end this service will result in coofusioo and re<b:ed
service, as well as lcr,ger lines at the ter.inals. Those 1110 have taken
~le Express fli!tlts have both regretted and COle to depend 00 over
booking. And there will be overbooking: by pe~le who want to play with the
systet, by people who lake .istakes, by people who 00 not lind booking a
flifilt just'in case' they plan to travel, by travel agents 1110 custalarily
book hundreds of tickets, and' by cQlPeting airlines who wish to 00 P~le
Express wroog. This service will 00 nothin9 but increase t.he proolet. It
is indicative of the lack of hUIan factor In creating these systetS. It is
surely a pity t.hat bIg c~ies 00 not have real people test their new
technology for the.. Marketing coosultants and prograMers just seet to
torget that it is people who use the prOOJcts in the end. It will be people
1110 lake listakes using their new systet, and it will be people who will
take advantage of this new systet.
AreYoo Reading SomeoneElse'sCopyof2600?
WHY NOT SUBSeR/BE7
• You'll get your very own copy at the sarle
time of every month.
• You won't lose your eyesight trying to read
small print that's been copied six times or more!
• You'll be helping 2600 become financially
solvent, which will result in a better publication.
• By getting more subscribers, we can keep the
price of 2600 down-maybe even lower itl
OUR MAILING LISTS WILL NEVER BE SOLD,
GIVEN AWAY, OR LOOKED AT BY ANYONE OUT
SIDE OF 2600.
teleconference Continued from page 2-31
II:I, and GTE Sprint get into the act! as cooferences are really pretty cheap
to set up and aren't that technically exotic. TeicOl hOObyists can get
together to pick each others brains for info, and starters can learn the
r~ in the presence of several ue experienced phreaks. Also just
norMI socializing with people all over the country is fun, especially !lien
yoo realize yoo prOOably woold have never let thee otherWIse. In order to
join in a cooference try calling SOIeOOe 00 it who has call waiting or till
phone lines, as he can relay to the cootroller that yoo IIaflt to be added.
Cooferencing is all in all an excellent way to cOIUlicate with the telcOI
cOIUlity at large, !lien used in Iklderatioo. Use, doo't abuse.
Infonation provided by Alliance Telecooferencing, the Deton, Elric
Bloodaxe, Forest Ranger John Doe, KeylaSter, Harket Navigatioo Inc., the
Serpent.1 Shooting Shark, TelcOl.ARPA, Joe Turner and the Ietilers of the
officia BBS of ~ lagazine: the Private Sector.
FREEDOM INSURANCE:
ALTERNATE IDENTITY BOOK, $10. Dealers
Wanted' Survival BooK list, $2. SUPER
CONFIDIENTIAL Re-Mail seryice into,
$2. Computer ~.er·vices list, $2.
Tech-Group, Box 93124, Pasadena, CA
91109.
- PASSPORTS t -
Dual Citizenships, still available
fi·om the Principalit)' of Castellania.
Info, $5. Reps Wanted info $2 extra.
Box 40201 P.~sadena. C.A 91104
Advertise in z600!
That's right, America's #1 phone phreak/computer
hacker newsletter is now offering advertising! No, we
haven't sold out. As we have always stated, our
purpose is to bring phreaks and hackers out into
the open where their talents will be appreciated.
By providing advertisements, we keep you updated
on the latest technological toys and help defray
the costs of our publication.
2600 is read by people allover the world who are active
partiCipants in high technology. Swarms of security
minded people also s~bscribe. If you want to reach this
select crowd, why not consider taking out an ad in the
newsletter they read? Call 516-751-2600 for more informa
tion. We offer a 10% discount to subscribers.
2-32