SlideShare a Scribd company logo
1 of 48
Download to read offline
A a �.4 -
" '
MORE COMMUNIST PAYPHONES
In Czechoslovakia
CAPITALIST PAYPHONES
In Israel
2600 (lSSN 0749-3851) is pllblished qlUUterly by 2600 EnlerpriSl!s inc. 7 Slron/:'s
Lane. SelaWcel. NY 11733. Second class poslage pennil paid al Selau/ccl. New York.
POSTMASTER: Send address changes 10
2600, P.O. Box 752,Middle Island, NY 11953-0752.
Copyright (c) 1989,2600 Enterprises, Inc.
Yearly subscription: U.S. and Canada -. $18 individual, $45 corporate.
Overseas _. S30 individual,$65 corporate.
Back issues available for 1984,1985. 1986, 1987,1988
at $25 per year. $30 per year overseas.
ADDRESS ALL SUBSCRIYfION CORRESPONDENCE TO:
2600 Subscription Dept.. P.O. Box 752, Middle Island, NY 11953-0752.
FOR LETTERS AND ARTICLE SUBMISSIONS, WRITE TO:
2600 Editorial Dept., P.O. Box 99, Middle Island, NY 11953-0099.
2600 Office Line: 516·751·2600,2600 FAX Line: 516-751-2608
STAFF
Editor-In-Chief
Emmanuel Goldstein
Artwork
Holly Kaufman Spruch
Design
Zelda and the Right Thumb
Writers: Eric Corley, John Drake, Paul Estev, Mr. French, The Glitch, The
Infidel, The Plague, David Ruderman, Bernie S., Lou Scan non, Silent
Switchman, Violence, and the growing anonymous bunch.
Remote Observations: Geo. C. Pilyou
Winter 1989-90 2600 Magazine Page 3
the day the phone system
We all knew the day would come.
And at least some of us were prepared
for it. But, as usual, the vast majority
had absolutely no idea what was going
on.
AT&T was hit hard by a computer
worm on January 1 5. That is a fact.
And after reading the technical expla­
nation below, you'll see why this is so.
But AT&T wasn't the only entity hit
by this worm - we all were, some far
more than others. The inability to get
through, the denial of access, coupled
with the blind faith we put in technolo­
gy, the unwillingness to spread infor­
mation so we can all understand the
process. Ye a h , it was f u n f o r t h e
phone phreaks as w e watched the net­
work crumble. But it was also an omi­
nous sign of what's to come.
In t h e words of a h i g h - r a n king
AT&T person, "very little cou ld have
"The news here isn't
so much the failure of
a computer program,
but the failure of
A T& T's entire
structure. "
gone worse". According to AT&T, of
1 48 million attempts, only 50 million
went through. Many claim it was far
worse than that.
But what was it that actually hap­
pened? Here's what we were able to
determine:
The p ro b l e m started in a 4ESS
machine in New York. Th e 4ESS is
used to route calls and is basically, in
the wo rds of a Bell Lab technician,
"nothing more than a big computer".
New York, for reasons unknown, sent
out a broadcast warning m e ssag e
(BWM), which triggered all of the 1 1 3
other 4ESS m ach i n e s a ro u nd t h e
nation to d o likewise.
Why did t h is h appen now? Wel l ,
back i n t h e late seventies, Bell Labs
developed a com m o n c h a n n e l sig­
nalling system known as System Six
or CCS 6 . Internat io nal stand ards
have been developed over the past
couple of years wh ich necessitated
som e change on AT&Ts part. So CCS
7, or System Seven, was introduced.
Somewhere inside System Seven is
where the problem lurked, undetected,
until January 15.
Acco rd i ng to e x p e rt s , Syst e m
Seven i s a much more flexible system
and that's why it's become the interna­
tional standard. It's actually more of a
protocol to which each company m ust
adjust. They don't all use the same
software. AT&T uses its own software,
British Telecom uses something differ­
ent, U.S. Sprint uses something else,
etc. S o m e AT&T peop l e , aided by
well-meaning but ignorant media, were
spreading the notion that many com­
pan ies had t h e same software and
therefore could face the same problem
someday. Wrong. This was entirely an
AT&T software deficiency. Of course,
other companies could face complete­
ly different software proble m s. B ut,
then, so too could AT&T.
The 1 1 4 4ESS m achines aro u nd
t h e co u n t ry h ave n e w software
i n st a lled periodically. When t h is is
done, it's done gradually, circuit by cir­
cuit, one machine at a time. The net­
work is presently configu red so that
the 4ESS mach ines have some cir­
cuits consisting of both System Six
and Syst e m Seve n . E v e nt u a l l y ,
Page 4 2600 Magazine Winter 1989-90
REALLY died
though, all ties to the Six will be elimi­
nated. "There's no reason to be con­
cerned with this," AT&T says. "We've
had some major changes in the net­
wo rk in t h e l ast t e n ye ars. I n fact ,
we've had quite a few in the last three
or four. They've always been for the
better."
B ut w h at cau s e d t h e p rob l e m ?
Exactly the right situation occurred at
the right moment for a particular event
to occur. Possibly the fact that January
15th was a holiday had something to
do with it. Traffic was fairly low, which
was u n u s u a l f o r a M o n d ay . It's
assumed that the problem originated
in a particular component known as
Co m m o n N etwork I n t e rface ( C N I )
Ring. The re i s a com ponent o f that
ring that allows the 4ESS to transmit
messages across the ring and across
t h e Co m m o n C h a n n e l S i g n a l l i n g
Network. What apparently happened
was that there was a flaw of some kind
in the software in one of those rings.
The bogus BWM from New York was
sent out and it caused an excess of
messages going to other 4ESS loca­
tions. A snowball effect began and the
congestion spread and grew rapidly.
All of the 4ESS machines were effect­
ed within half an hour.
Sounds like a worm to us. Not the
kind t h at g ets spread d e l iberately.
Th e re are p l e nty of p ro g ra m m i n g
errors that cause accidental worms. It
could happen to any computer system.
P h o n e c a l l s w e re forced off of
System Seven and onto System Six.
The problem was fixed by overwriting
part of the software, in effect, bypass­
ing it. But, at press time, the specific
cause still hadn't been made known.
The name of the organ ization of
Bell Labs software people trying to fig­
ure all of this out is NESAC, National
E l ect ro n ic Switc h i n g Ass i stance
Center. They're worki ng out of Ly le
and Indian Hill, Illinois.
Lack of Redundancy
One expert said , "There's been a
t e n d e n cy i n t h i s co m pa n y to save
money by centralizing operations and
m aking t h i ngs bigger. And that has
made the whole system more vulnera­
ble."
There is much less redundancy in
today's system , meaning there is less
of a backup. The current infatuation
with fiber optics that certain long dis­
tance companies have (AT&T includ­
ed) spells certain trouble because of
the lack of redundancy in these cheap
systems.
The problem occurred in a part of
t h e sig nal l i ng system t h at doesn't
carry voice traffic. It's known as "out­
of-band signalli ng" because it's out­
side the band that carries the actual
conversation. Data, such as the num­
ber called and the number calling, is
s e nt over t h i s pat h . A m o n g ot h e r
things, this prevents blue boxing since
s u bscribe rs h ave no access to the
routing signals.
And that's basically all we know at
this stage. What we don't know is how
a major force in com munications like
AT&T could be so sloppy. What hap­
pe ned to backups? S u re, co mputer
systems go down all the time, but peo­
ple making phone calls are not the
same as people logging onto comput­
ers. We must make that distinction. It's
not acceptable for the phone system
or any other essential service to "go
down". If we continue to trust technolo­
gy without understand ing it, we can
look forward to many variations on this
theme.
AT&T owes it to its customers to be
prepared to instantly switch to another
(continued onpage 46)
Winter 1989-90 2600 Magazine Page 5
Morris Found Guilty
Robert T. Morri s Jr. , the 25-
year-old Cornell student responsi­
ble for the Internet Worm , was
found gUilty on January 22 of fed­
eral computer tampering charges in
Syracuse, NY. He now faces five
years i n prison and a $250,000
fine. He was the first person to be
prosecuted under a portion of the
1 986 Computer Fraud and Abuse
Act. A hearing is set for February
27 in Albany, NY. Sentencing will
probably be scheduled then.
The gov ernment argu ed that
Mo rri s i ntenti onal l y w ro te the
worm program to break into "fed­
eral interest" computers he was not
authorized to use, and by doing this
prevented their authorized use �d
caused a minimum of $1,000 m
damage.
.
Several jurors said it was ObVI­
o u s Morri s didn ' t i ntend to do
damage. But they say the damage
would never have happened i f
Morris hadn't put the worm there.
None of the jurors owned a home
computer.
One j u ro r said of Mo rri s , "I
bel i ev e h i s integri t y . I did not
beli eve there was any m alice
intended."
Another said Morris was "not a
criminal. I don't think he should go
to jail. I don't think jail would do
anything for him. To me j�il
.
is for
criminals, and he' s not a cnmmal. I
think somebody should thank him
our
in the end."
In its November 26, 1 988 edi­
tion shortly afte r the Inte rne t
Worm m ade i t s appearance, the
New York Times described Morris
as "fascinated with powerful com­
puters and obsessed with the uni­
verse created by interconnected
networks of machines".
Last year Senator Patrick Leahy
of Vermo nt s a i d , "We c annot
unduly inhibit that inquisiliv� 13-
year-old, who, if left to expenment
today, may, tomorrow, develop the
telecommunications or computer
techno l o g y to l e ad the United
States into the 21 st century." He
also expressed doubts that a com-­
puter virus law of any kind would
be effective.
There is no doubt that Robert
Morris Jr. has a lot of potential.
There seems to be no doubt that
he ' s an honest person. Even the
prosecution seems to believe this.
We all know that he was the person
responsible for the Internet Wo�.
S o , w i t h all of thi s i n m i nd , I t
seems as i f the last few weeks have
been a tremendous waste of time
for everyone.
Ye s , he d i d i t . H e admitte d
doing it. He didn't mean to cause
damage, but he made � progran:­
ming error. The shockmg fact IS
that one programming error could
cause so much confusion. Add to
that the fact that the holes he made
use of were common knowledge to
Page 6 2600 Magazine Winter 1989-90
ever-changing world
the Internet community. Yet, noth­
ing was done to close the holes
until after all of this happened. It
seems like someone should answer
for this neglect of responsibilities.
And let ' s not fo rget one other
important fact. Mo rri s nev e r
logged into another computer sys­
tem without authorization. There is
no proof that he ever planned to.
He simply sent out a program to
collect data - through normal and
legal channels. It was data he never
should have had access to, but
thanks to the holes in the system,
he did.
Morris made a mistake. That's
all a part of the le arning game,
which he ' s now been banished
from. This technology is still in its
infancy and, like any system, its
limits need to be constantly tested.
We're making a very grave error if
we choose to simply focus upon
the debatable legalities of what he
did, rather than learn from what
he's taught us.
We're damn lucky it was Morris
who did this. Because if a mali­
cious or immature person had done
it first, the damage would have
been real.
Real Damage
A rather nasty "troj an horse
v i rus" has been showing up on
floppy disks throughout Europe,
Africa, and California. More than
10,000 floppy disks labeled "AIDS
Information Introductory Diskette"
have turned up. After a random
number of times, the program will
format the hard drive and destroy
all data on it. PC Business World
Magazine says its mailing list had
been used by the unknown creators
of this mischief. They're offering a
free program called "AIDS OUT"
to anyone who was hurt by the
diskette. If nothing else, this inci­
dent may remind people that run­
ning unknown software in this day
and age is a risky thing to do. It's
estimated that the cost of putting
thi s whole prank to gether w as
about $20,000 which is a crime in
itself.
Jailed for
Incompetence?
A Georgia man is facing up to
15 years in jail for illegally access­
ing a computer. He was convicted
in November. The difference here
is that the defendant claimed inno­
cence because of technical igno­
rance. Legal experts say this could
be a trend-setting case, where users
could become legal scapegoats for
system crashes.
New Technology
Imagine a day when you can use
any calling card number (AT&T,
Sprint, MCI, and all the others) to
make local calls as well as long
distance ones. Imagine a day when
Winter 1989-90 2600 Magazine Page 7
news and happenings
the Sprint operator will actually
accept a S print c alling c ard !
Imagine not being confused. It all
could happen as Bellcore develops
a new, though temporary, system
for handling calling cards. The
plan calls for 14 digit credit card
numbers. The first six digits would
be known as the C ard I s suer
Identifier (CIID) . That would be
different for every company. The
next four digits would be the cus­
tomer account number and the last
four would be a personal identifi­
cation number. The plan is being
developed as a quick and tempo­
rary way of allowing alternate long
distance companies to use calling
cards to process local calls. The
whole thing will be reevaluated in
1991. One problem we find is the
shortness of the customer account
code (four digits? I). Why is the
company given six digits? Are
there a million companies? Perhaps
they're not explaining this proper­
ly. It wouldn't be the first time....
And Things To
Play With
New York Telephone has a new
toy that allows them to fire even
more employees. Now, when you
dial zero plus a number and hit
another zero at the tone, you get a
computerized menu, which says,
"For collect calls, dial 11; to charge
this call to another number, dial the
complete billing number now; for
person-to-person and other calls,
dial 0 for the operator." When you
dial 1 1 , you're asked to record your
name. The advantage here is that
your name can be anything you
want, like "Call Me B ack". The
system uses voice recognition when
asking the called party i f the y
accept. The caller' s mouthpiece is
cut off during this procedure, so
you can forget about accepting your
own call. Also, the system won 't
accept a response that begins before
it finishes asking the question. This
helps eliminate ans wering
machines that may inadvertently
say "yes" at some point. Thi rd
party billing is only verified when
you place the call from a payphone.
The system asks you for your name
at that point. It's fun to play with,
but once again, ultimately a ripoff
for the average consumer. The rates
haven' t gone down, even though
it's pretty obvious that this system
will save New York Telephone a
bundle. But the worst part of all is
for those people who have resisted
getting a touch tone phone (and
paying the unfair m onthl y and
"installation" fees). Instead of get­
ting an operator a couple of seconds
after the initi al tone, pulse cus­
tomers must sit through the entire
menu before the system finally con­
nects them to an operato r. The
waiting time for an operator under
the old system: three seconds after
(continued on page 42)
Page 8 2600 Magazine Winter 1989-90
n}JnBX data
by The Plague
(Special thanks to Kornflake Killer)
The following information and data relates to the
NYNEX (New York & New England Telephone) tele­
phone switching system. Most of the artide is a huge
database of New York Telephone centers further suI>­
divided by sector. It contains useful information on
every switch in the NYNEX system. This information
is very handy in social engineering, plotting network
switching maps, and finding out particularly useful
infonnation about your Central Office. There is usual­
ly more than one switch per central office. Since step­
by-step offices tend to be good for blue boxing, this
infonnation could come in handy.
In the database the following fields exist:
SECTOR - this is Nynex terminology for a large
inter-office and billing center (i.e., Williamsburg or
White Plains). All switches throughout NYN EX are
cormected to one of these main centers.
The following New York sectors are estabished
by NYNEX:
(Sector:Switching Type:Location)
ALBY:D200:Albany BING:IAES:Binghamton
BUFF:D200:Buffalo C!SP:4ESS:Central Islip
GDCY:4ESS:Garden City NY 21:4ESS:Soho
NY38:4ESS:East 38th St POUG:5ESS:Poughkeel"'ie
SYRA:D200:Syracuse WHPL:4ESS:White Plains
WLMG:4ESS:Williamsburg
CLL! c od e - Common Language Location
Identification. This is Bell system shorthand for the
location and type of the switch. You can refer to Bell
Labs and Bellcore literature or the October 1987 issue
of 2600 for more details. A CIL! code consists of II
characters. The f"lfSt 4 characters define the town, the
next 2 characters define the state abbreviation, the
next 2 the building ID, and the last 3 the building sub­
division.
Example: NYCMNY42CGI is New York City
Manhattan, NY, 42nd street, Control Group I (repre­
senting a I, lA, 2, 2B, or 3ESS switch).
SWITCH TYP E - The switch type, can be one of
the following : AESS, l ESS, ISXS, 2B ESS,
350ASXS, 3556ASXS, 355ASXS, 356ASXS,
360ASXS, 3ESS, 5XB, DlO, DlOO, D5E, NCXB,
RSM, RSS. (XB ; Crossbar, ESS ; Electronic
Switching Sy stem, SXS - Step by Step, D ;
DMSlDigital, R ; Remote)
V & H - These are n u mbers u sed by Bell
Companies to represent Vertical and Horizontal loca­
tion. These are integers which are offsets from a fixed
point on the earth designated by the phone company.
These numbers are used in calculating distances
between central offices as well as for network plan­
ning. Any entries in the following databases which
have the same V & H are in the same building!loca­
tion. You should read Bell Labs and Bellcore literature
to f"md out more about V & H and netwOlk planning.
HOST Switch - This field is shown only for those
switches which are remote in nature (RSM and RSS).
This field is simply the CLL! code of the host switch
that connects to the remote switch.
This artide should be used as reference material,
and doesn't go into explaining any detail s about
switching. Refer to other artides and Bell literature for
that infonnation.
You may need a magnifying glass to read all of
this but it was the only way we could fit it in the issue.
Fields are separated by the : symbol. If there is a
HOST switch present, it appears on the following line
indented.
Rew York relepb.one
Sect:CLLI Code:S.Typ:V:&:
ALBY:CMBRNYCM 6 7 7 arH: 4 537:1 633
ALBY:CMBRNYCMRS 1 :RDGT:UNK:UNl<:
ALBY:GNWCNYGWR S I :ROGT:UNK:UNl<:
TROYNY030S 0
Bo.t Switch
MBY:ALBYNYGDCGO : lES :4 6 4 0:1 6 5 3
MBY:ALBYN YS SCGO : l AE S: 4 6 4 0 :1 630
ALBY:ALBYNYS SCGl : l AE S : 4 6 4 0 :1 630
ALBY:ALBYN Y S S D S I :DGT1,:UNK:UNK
ALBY:ALBYNYWACGO : lAES: 4 639:1 6 4 0
ALBY:ALMTNYALCGO :3ES:4 65 7:1 6 7 2
ALBY:AMS TNYP E D S O :DGTL:UNK:UNK
ALBY:AMSTNYPEMGO: 5 XB:4 632:1 7 2 5
MBY:ARGYNYAYR S I :RSS :4 511:1 6 7 5 :
GLFLNYGFCGO
ALBY:AVPKNYAV 6 7 4:OTH:4 6 2 3:1 6 0 2
ALBY:AVPKNYAVRS 1:RIX.;T:UNK:UNK:
MBYN Y S S D5 0
ALBY:BAL S NYBACGO:2 B E S: 4 5 8 8 :1 6 8 9
ALBY:BERNNYBRMGO :5XB:4 67 7: 1 6 6 7
AL B Y:BERNNYBRRS1:RDGT:UNK:UNK:
S S CHNYSOD S O
ALBY:BLLNNYBGRS1:R S S :4 4 7 2:1 7 3 9:
GLFLNYGFCGO
ALBY:BRNVNYBW4 25 :OTH:4 28 2:1 9 6 1
ALBY:CAIRNYCACGO:3£S:4 7 2 5:1 6 1 5
MBY:CBLSNYZB234 :S X S:4 7 0 6 :17 2 7
ALBY:CBLSNYZBRS1:ROOT:UNK:UNK:
S S CHNYSOD S O
ALBY:CHTGNYZH4 97 :OTH:4 2 7 5: 1 9 7 6
ALBY:CLPKNYC P D S O:DGTL:UNK:UN K
MBY:CLPKNYCPMGO:5XB:4 60 9:1 6 5 9
ALBY:CLVLN YCKRS1: R S S :4 6 7 2 :1 6 4 6 :
ALBYNYGDCGO
ALBY:CLVRNYCVCGO :3E5:4 7 13:15 7 0
TROYNY03DSO
ALBY:CNBRNYCo8 68:arH: 4 68 6:1 712
ALBY:CN BRNYCDRS1:RDGT:UNK:UNK:
S SCHNYSOD S O
ALBY:CSTNNYCs732:cYrH: 4 6 60 :1 613
ALBY:CTBRNYCBRS 1: 5RSM:UNK:UNK:
TROYNYO 30S0
ALBY:CTSKNYCT D S O:DGTL:UNK:UNI<
ALBY:CT S KNYCTMGO: 5XB: 472 6:1 5 4 7
ALBY: OLMRNYDMCGO: 2BE5 :4 6 5 2:1636
ALBY: OLSNNYDL 8 9 5:arR:4 6 6 6:1 6 9 7
ALBY: DNMRNYDNRS1 :ROGT:4 2 7 7:1 9 0 5 :
P LBGN Y P B D S O
ALBY:EGLVNYGLCGO: 2BES :4 613:1 683
ALBY:EGNBNYEG4 7 7: SXC: 4 6 4 5 : 1615
ALBY: EGNBNYEGRS 1: 5RSM:UNK:UNK:
ALBYN Y S S O S O
ALBY:ELDPNYEU 5 9 4 :arH: <12 53:1 9 4 a
ALBY: ES PRNYER 8 7 5:arH: 4 6 6 9 :1 7 0 9
ALBY: EZTWNYEZRS 1: RDGT:4352; 1 8 2 0:
TCNDNY'l'IDS O
ALBY:F"RHONYFHRS1 :RDGT:UNK:UNI<:
CTS KNYCTD S O
ALBY:FRHDN'fFR S G l :OOH: <1 7 2 0 :1 6 2 8
ALBY: FTANNYFARS 1: R S S: 4 4 81:1 6 9 9:
GLFLN YGFCGO
ALBY: FTCVNYFC3 5 8:arH:4 3 0 2 :2 0 3 6
ALBY: FTCVNYFCDS O:DGTL:UNK:UNK
ALBY:GLFLNYGFCGO: IAES:4 51 4 :1 7 0 5
ALBY:GLWYNYGWCGO:3ES: <1 6 03:1 7 1 4
ALBY:GNWCNYGW 6 9 2:arH: 4 5 3 9:1 6 5 7
Winter 1989-90
ALBY:GRCTNYGC8 93:OTH:4 5 6 4 : 1 7 0 6
ALBY:GRCTN YGCRS1:5 RSM:UNK:UNK:
TROYN Y03 OS 0
ALBY:GRVGNYGVRSI :RDGT:UNK:UNK:
CTSKNYCTDSO
ALBY:GRVGNYGVSGI :OTH: 4 7 0 7: 1 633
ALBY:GRV INYGEMGO:5XB:4 4 60: 1 6 7 0
AL BY:GRV I N YGERSI :RDGT:UNf<:UNK:
SRSPNYSRDSO
ALBY:HAGUNYHQRS1:RDGT: 4 4 2 4 :1 7 4 5:
TCNDNYT I D S O
ALBY:HDFLNYHURS 1:RDGT:UNK: UNK:
SRSPNYSROS 0
ALBY:HDFLN'!HUSGI :SXS :4 510: 1 6 9 6
ALBY:RDSNNYHDD S O :DGTL: 4 7 13:1 5 8 1
ALBY:HNTRNYHNCGO :3ES: 4 7 6 1:1631
ALBY :HRFRNYHRRS1:RSS :4 4 8 4:1 6 8 0 :
GLFLNYGFCGO
ALBY:HSFLNYH S 6 8 6:SXS :4 5 5 6: 1612
ALBY:HSFLNYHSRS1:RDGT:UNK:UNK:
TROYNY03DS O
ALBY:JNVLNYJVCGO:3ES :4 6 0 1:1 6 7 3
ALB'!:JNVLNYJVRS I :RDGT:UNK: UNf<:
SRSPNYSRDS O
ALBY :f<NVYNYKVRS 1:RDGT: 4373:1 8 4 2 :
TCNDNYT I D S O
ALBY:KTBAN YKBRS 1:R S S:<1 4 8 8: 1 7 2 3:
GLFLNYGFCGO
ALBY:LKGRNYLRCGO:3ES: 4 5 0 1:1 7 2 9
AL B Y:LKPCN YLACGO:3£S : 4 3 7 7:18 7 9
ALBY:LTHMNY'l'SCGO :1E S:4 6 2 3:1 6 4 4
2600 Magazine Page 9
every Dentral offioe
ALBY:LXTNNYLXRS):1ooT: UNK:UNK:
CTSKNYCTDSQ
ALBY:LXTNNYLXSGI :OT8:4T10:1653
ALBY:LYH'l'NYLORSl:RDGT: 4292:1929:
PLBGHYPBDSO
ALBY:MALNNYMMDSO:DGTL:UNK:UHK
ALBY:MALNNYMI'I1GO:5XB:4308:1992
ALBY:MAllVN'iMV864:OT8:4644:1699
ALBY:MCRVNlMCRS) :SllSM:UNX:UNK:
TRQYNY03DSO
ALBY:HIVLNYNVllS):RooT: 4361:1192:
TCNDNYTIOSO
ALBY:HOIRHYMYS29:OT8:4336:2020
ALBY:HOI1UfYMYllSl :RDGT:UNK:UN1C:
MALNNnt4DS0
ALBY:NGRNNYNGDSO:DGTL:UNlC:UHK
ALBY':NGRNNYNQ!GO:5XB:4625:1624
ALBY:OKHLHYOBRS I:IlDGT:UNK:UNl(:
CTSKNYCTDSO
ALBY:OKRLNYOBSGI :OT8:4120:1649
ALBY:PEllUNYPECGO:31:5:4282:1861
ALBY:PBMTNYPHSGI:OTH:4699:1563
ALBY:PLBGNYlBOSO ;OGTL:42S5:1869
ALBY:PLVLMYlLRS):ROGT:UNK:UNX:
CTSKNYCTOSO
ALBY:PLVLNYPLSGI :OTB :4148:1601
AI.BY:PRVINYlIlRSl:IlDGT:UNX:UNK:
CTSKNYCTOSO
ALBY:PRVINYPRSGI :OT8:476 3:1612
ALBY:PTBWNYPORSI:RooT: 01368:1181:
TCHDHYTIDSO
ALBY:PTNMNYl)(RS1:RDGT: 4414:1132:
TCHDHYTIDSO
ALBY:P'M'WNYl IRS1:RSS:4585: 1621:
TROYHY04CGO
ALBY:IlCVLHYll8294:008:4121:1131
ALBY:IlCVLHYllfl1lS1:IlOGT: UHK:UHK:
SS CBNYSODSO
ALBY:RNLlCNYllLCGO:3E5 :4592:1614
ALBY:RHLKNYR.LIlSI :1l00T:UHK:UHK:
SIl5PNYSAOSO
ALBY:SALMNYS H85:4:OTH:4501:1646
ALBY:SALMNY5H1lSI:AooT: UHK:UHK:
TROYNY03DSO
ALBY:SBTBNYSBCGO:3ES:4663:1623
ALBY:SCBHHYSCCGO:lAES: 4629:1615
ALBY:SCLKHYQXRS1 lRSS:4433:1191:
GLFLNYGFCGO
ALBY:SBSPNYQS284 :OOB:4699:1160
ALBY:SBSPNYQSRSI :ROGT:UNK!UHI(:
SSCRNYSODSO
ALBY: SHVLNYSVllS1:5RSH: UHK: UNK:
TROYNY03DSO
ALBY:SRFLNYQR856:OTS:4362: 2000
ALBY:SRFLNYQIUlSI :ROGT:UNK:UHK:
HALNNYM"IDSO
ALBY:SRLlCNYQLDSO:DGTL:UNK:UNK
ALBY:SRLKNYQLHGO:5XB:4384:1902
ALBY:SRNCNYQCRSI:RooT: 4288:1898:
PLBGNYPBDSO
ALBY:SRS PNYSRDSO:DGTL:UNK:UNK
ALBY:SRSPNYSRHGO:5XB:4568:1691
ALBY:SSCBNYSOOSO:DGTL: UNK: UNK
ALBY:SSCBNYSCMGO:5XB:4631: 1613
ALBY:TCNONYTIDSO:OCTL: 4401: 1751
ALBY:TNVL'NYTNMGO: 5XB: 4156: 1618
ALBY:THVLNYTNASI:RDGT:UNK:UNK:
CTSKNYCTDSO
ALBY:TPLlCNYTL359:SXS: 4434:1930
ALBY:TPLlCNYTLDSO:DGTL:UNK:UNK
ALBY:TIlOYNY030S0:5ES:UNK:UNK
ALBY:TROYNY04CGO:lES:4620: 1632
ALBY:VLFLNYVF753:OTS:4518:1639
ALBY:VLFLNYVl'RSI:ROOT:UNK:UNK:
TROYNY03DSO
ALBY:VRB.VNYVICGO:3ES: 4656: 1652
ALBY :NEllLNYlfLRSI:RSS:4692:1654:
ALBYNYGDCGO
ALBY:NBTHNYUBMGO:5XB :4448:1108
ALBY:NLBaiYUB963:OTS:4308: 1815
ALBY:WLBaiYUBIlSl:RooT:UNK:UNI(:
PLBGNYPBDS0
ALBY:WNBHN�GO:5XB:4148:1648
ALBY:WNRHNYWHRSI:RDGT:UNK:UNK:
CTSlCNYCTDSO
ALBY:NRBGNYWURS1: RSS: 4495:1146:
GLFLNYGFCGO
BING:ARPTNYAR295 :ars: 5051:2110
BING:ARPTNYARRS1: ROGT:UNK:UNK:
CRNGHYCGOSO
BING:AVOCNYAC566:arB: 5029:2075
BING:AVOCNYACltS1:RDGT:UNK:UNK:
CRNGNYCGDSO
BING:BATHNYBB176:SXS:5032:2052
BING: BATHNYBHRS1:RDGT:UNK:UNK:
CRHGNYCG OSO
BING:BGFLNYBF562:OTH:5033: 1916
BING:BGFLNYBFRS1:RDGT:UNK:UNI(:
CRNGNYCGOSO
BING:BNGSNYBYCCO: 1AES :4943: 1831
BING:BNGBNYBYDSO:DGTL:UNK:UNK
BING:BNGBNYROMGO: 5XB: 4935:1824
BING:CANSNYCZ698 :orB: 5011:2082
BINC: CANSNYCZRS1:RDGT:UNK:UNK:
CRNGNYCGOSO
BING:CSVYNYZV264:OTH: 4711:1171
BING: CBVYNYZVDSO:ooTL: UNK:UNK
BING: CliPBNYCP521:ora: 5040:2023
BING:CliPBNYCPRS1: ROGT:UNK:UN!C:
CRHGNYCGOSO
BING:CliRHNYCF695:ara: 5065: 2041
BING:CNSRNYCX545:OTB: 5052:2129
BING:CNSRNYCXltS1: 5RSM:UNK:UNK:
CRNGNYCGDSO
BING:CPTWNYZNCGO: 3ES:4144:1186
BING:CRNGNYCGOSO: 5ES:UNK:UNK
BING:CTONNYZN524:orH:5056:1979
BING:CTONNYZNRS1: RDGT:UNK:UN!C:
CRNGNYCCDSO
BING: DVPTNYDTOSO:OGTL:UNI(:UNI(
BING:EOTNNYET965 :OTH:4174:1821
BING: EOTNNYETOS0:ooTL:UNK:UNK
BING:EMIRNYEMCGO: 1AES:5029: 1954
BING:ENDCNYENOSO:DGTL:UNK:UNK
BING:GRGltNYGGS88:ors: 4162:1681
BING:GRGRNYGGDSO:ooTL:UNK:UN)(
BING:HBRTNYSZOSO:ooTL:UNK:UNK
BING:B.RNLNYBLMGO:5XB:506S:2091
BING:RRNLNYBLRS1:ROGT:UNJ(:UNK:
CRHGNYCGDSO
BING: BRWKNYBW293:arB:4162:1191
BING:RRNKNYBWOSO:ooTL:UNK:UNK
BING: HSBONYHSRS 1:SRSH:UNK:UNK:
CRNGNYCGOSO
BING:HSBONYRBSG1:SXS: 5011:1965
BING:JRCYNYJCCGO:1ES: 4945:1831
BING: JRCYNYJCOSO:DGTL:UNK:UNK
BING:LNDYNYLN523 :arR:5065:1993
BING:LNDYNYLNRS1:RDG'!':UNK:UNK:
CRNGNYCGDSO
BING:MAINNYMECGO: 3ES:4940:1869
BING:MLFRNYHUOSO:DGTL:4765: 1115
BING:NCBLNYNLOSO:DGTL:UNK:UNK
BING:ONNTNYOAMGO:5XB:4199:1112
BING:OOEGNYOOOSO: OOTL:UNK:UNK
BING: OWEGNYONOSO:DGTL:UNK:UNK
BING:RXBYNYRX326:OTH: 4182: 1685
BING:SAVNNYSN583:OTH: 5032:2033
BING:SCBVNYQN638:ora: 4160:1154
BING:SCBVNYQNOSO:ooTL:UNK:UNK
BING: SHFRNY'CJlJCGO:3ES: 4165:1108
BING:WRCSNY'Uc397 :01'S: 4146: 1150
BING: WRCSNYUCDSO:DGTL:UNK:UNK
BING:WTGLNYHG535:SXS:4983: 1999
BING:WVR1NYWVS65:SXS: 5020:1901
BING:WVRLNYWVDSO:DGTL:UN1<:UN1<
BUFF:AKRNNYA1(CGO:3ES:501'1:2294
BUFF:ALBNNYAIDSO:DGTL:4949:2282
BUFF:ALDNNYADCGO:3tS:5039:2219
BurF:AHHRNYHPCGO:lES:5040:2329
BUFF:AMBRNYHPDSO:DGTL:UNK:UNK
BUFF:J.NGENY'AGRS1: ItSS:5102:2142:
OLENNYRACGO
BUFF:ANGLNYA0549:5XB:5133:2318
BUFF:ARCONYAEDS0:DGTL �UN1<:UNK
BUFF:ARCONYAEHGO:5XB:5099:2225
Page 10 2600 Magazine Winter 1989-90
BUFF:ATTCNYATS91:SXB:UNK:UNK
BUFF:ATTCNYATDSO:DGTL:UNK:UNK
BUFF:BATVNYBTDSO:DGTL:UNK:UNX
BUFF:BATVNYBTHGO:5XB:4993:2249
BUFr:BFLONYBACGO:lES:5065: 2322
BUFr:SFLOHYBADSO:OG'lL:UNK:UNK
BUFF:BFLONYBAMG9:1XB: 5065: 2322
BUFF:BFLONYELCGO:IMS: 5010:2331
BUFF:BFLOOYFIlCGO: lAES: 5016: 2321
BUFF:BFLaiYHEOSO:DGTL:5064:2335
BUFr:BFLaiYMACGO:1AES: 5061:2329
BUFF:BFLOOYMAHGO:5XB: 5061: 2329
BUFr:BFLOHYSPCGO:ItS:5011: 2316
BurF:BFLONYSPOSO:DGTL:UNK:UNK
BUFF:BFLONYSPMG9: 1XB:5011: 2316
BurF:BLFSNYBZRS1:RSS:5104:2159:
OLENNYBACGO
BUFr:BLMTNYBHRS1:ASS:5119:2134:
OLENNYHACGO
BUFF:BLSSNYBSDsO:DGTL:UNK:UNK
Burr:BLVRNYBX928:5XB:5158:2132
BUFF:BRKRNYBKRS1:RSS:4966:2340:
LCPTNYLKCGO
BUFF:BSTNNYBNCGO:3ES:5108:2218
BUFF: BYRNNY8YDSO:DGTL: UNK:UNK
BUFF:CHCKNYCEDSO :OGTL: UNl<:UNK
BUFF:CHKTNYFRCGO:ItS:5063:2303
BUFr:CLCTNYMACGO:3£S :5031: 2311
BUFF:CLNCNYBACGO:3ES:5032: 2301
BUFr:CTRGNYSODSO:DGTL: UNK:UNK
BUFF:CUBANYEM968:5XB:5141: 2166
BUFF:DNXRNYO}(MGO:5XB:5189:2339
BUFr: DRBYN'lDBCGO:3ES: S120: 2322
BUFF:EAURNYEAMGO:5XB: 5011:2219
BUFF:EDENNYEDCGO:3ES:5119: 2301
BurF:£LBlNYEBDSO:DGTL:UNX:UN1<
BUrr:ELCVNYEVDSO:DGTL: UNK: UNl<
BUFF:ELCVNYEVJlS1:RSS: 516'1: 2225:
OLENNYHACGO
BUFF:FKVLNYFJ(JtS1:RSS: 5136: 2204:
OLENNYHACGO
BUFF:FRSBNYFSRS1:RSS:5130:2145:
OLENNYHACGO
BUFF:rSVLNYFLDSO:OGTL:UNK:UNK
BUFF:GDISNYGICGO: 2BES:5061:2354
BUFF:GSPTNYGPRS1:RSS:4991:2321:
LCPTNYLKCGO
BUFF:GWNONYGOCGO:3ES:515'1:2284
BUFF:BLLONYBOCGO:3ES:5089: 2253
BUFF:BLLYNYHECGO :3tS:4931:225'1
BUrl':HMBGNYHBDSO :DGTL: UNit: UNK
BUFr:HMBGNYHBMGO:5XB:5102: 2301
BUFF:BNDLNYBIRS1:RSS:5158:2115:
OLENNYHACGO
BUFF:JAVANYJACGO:3tS:5015:2241
Burr:KENDNYKDDSO:DGTL:UNK:UNK
BUFF:LCPTNYLKCGO:1AES:5008:2338
BurF:LMSTNY'LMRS1:ltSS:5208:2188:
OLENNYHACGO
BUFF:LNCSNYLCDSO:DGTL: URK:UNK
BUFF:LNCSNYLOo'IGO:5XB:5054:2302
BUFF:LNCSNYLCMG1:5XB:S054:2302
BUFF:LSTNNYLNCGO:3ES: 5031:2384
BUFF:LTVYNYLIRS1:RSS:5183:2239:
OLENNYHACGO
BurF:LYVLNYLLRS1:RSS:4953:2316:
LCPTNYLKCGO
BUFF:HCHSNYMARS1:RSS:5124: 2219:
OLENNYHACGO
BurF:HDPTNYMPCGO:3ES:4980:2315
BurF:HEDNNYPAMGO:5XB:49'12:2304
BUFF:NCLNNYNOCGO:3£5:UNK:UNK
BUFF :NGFLNy16CGO:2BtS: 5050:2364
BUFr:NGFLNYPOCGO:lAES:5053:23'15
BUFF:NGFLNYWOOSO:DGTL:UNX:UNK
BUFF:NGrLNYNCliGO:5XB:5043:2369
BUFr:NWFNNYMACGO :3£s:4988: 2354
BUFF:OKrDNYOKQSO:DGTL:UNK:UNK
BUFF:OLENNYHACGO:1AES:5180:2169
BUFF:ORPKNYSTCGO:2BES:5085:2296
Burr:PRTVNyPV933:5Ax-B:5179:2150
BUFr:RSFRNYRFRSI:RSS:5108:2184:
OL£NNYHACGO
Burr:ItSVLNYRVRSl:RSS:5014:23'15:
•
In nem
NGFLNy76CGO
BUFF:SDTNNYFIDSO DGTL:UNK:UNK
BurF:SLCKN'fSICGO 3£5:5163:2325
BUFF:SLMNNyww945 5XB:5192:2216
BUFf:SPVLNYWHCGO 3E5:5125:2253
surF:SRPLNYSB2520TB:5275:2356
BUFF:SRPLNYSBDSO DGTL:UNK:UNK
BUFF:TNWNNYTWCGO IllS:5050:234"
BUFF:VRBGNYVBDSO DGTL:lJNK:UNK
BUFF:WLSNNYMERSI RSS:4994:2373:
LCPTN'fLKCGO
BUFF:WLVLNYNM593 SXB:5129:2108
BUFF:WNKHNYWKCGO 28£5:5103:2313
BUFF:WSNCNYUNDSO DGTL:UNK:UNK
BurF:WSNCNYUNMGO 5XB:5074:2304
BUFF:WSVLNYNCCGO lAES:5049:2319
BUFF:WTPTNYWRCGO 3£5:4935:2292
BUFF:YNTWNTITCGO 3£5:5025:2395
CISP:BBYLNYBNDSO DGTL:4939:1314
CIS? :BRWDNYBWDSO SES:4912:1311
CISP:BYSHNYBYDSO DGTL:UNK:UNK
CISP:CALVNYSPRSO 5RSM:UNK:UlH(:
RVRDNYRVDSO
CISP:C!ofo1KN'fCMDSO 5[5:4911:1327
CISP:C�KNyC�GO 5XB:UNK:UNK
CISP:CTCHNYCUOSO DGTL:UHK:UHK
CISP:CTCHNYCUMGO 5XB:4191:1246
CISP:DRPKNYDPCGO 1AEs:4928:1321
CISP:DRPKNYDPMGO 5XB:4928:1321
CISP:EBTNNYEHMGO 5XB:4185:1200
CISP:ENPTNYENCGO lES:4906:1331
CISP:ENPTNYENDSO DG'I'L:UlU(:UHK
CISP:ENPTNYENMGO 5XB:4906:1331
CISP:GPTSNYGPMGO 5XB:4112:1243
CISP:GPTSNYGPRSO ROGT:UHK: UNK:
CTCBNYCUDSO
CISP:BMB'fNYBBOSO DG'l'L:UNK:UNK
CISP:HMB'fNYBBMGO 5XB:4836:1232
CISP:HNSTNYHUCGO lAES:4920:1344
CISP:HNSTNYHUDSO 5ES:UNK:UNK
CISP:HNSTNYBUMGO 5XB:4920:1344
CISP:BNSTNYBUMGI 5XB:4920:1344
CISP:LHSTNYLBCGO 1£5:4946:1315
CISP:LHSTNYLBDSO 5ES:UNK:UNK
CISP:MNTKNYMTD50 5ES:UNK:UNK:
RVBDNYRVOS0
CISP:MNTKNYMTMGO 5XB:4139:1118
CISP:MSTCNYMCOSO 5r.s:UNK:UNK
CISP:OCBHNYOBCGO 2£S:4929:1284
CISP:OCBHNYOBRSO 5RSM:UNK:UNK:
BYSBNYBYDSO
CISP:PCBGNYPBCGO lAES:4894:1280
CISP:PCBGNY'PBMGO 5XB:4894:1280
CISP:PJSTNYPJDSO DG'l'L:4870:1309
CISP:RNKNNYRNCGO lES:4894:1302
CISP:RNKNNYRNDSO 5ES:UNK:UNK
CISP:RNKNNYRNMGO 5XB:4894:1302
CISP:RVHDNYRVDSO 5ES:4843:1256
CISP:SATNNYSNMGO 5XB:4821:1216
CISP:SGHRNYSGDSO DG'l'L:UNK:UNK
CISP:SGHRNYSGMGO 5XB:4796:1211
CISP:SHHMNYSBDSO DG'l'L:UNK:UNK
CISP:SEiHMNYSHMGO 5XB:4862:1292
CISP:SLDNNYSEDSO DGTL:UNK:UNK
CISP:SLDNNYSEMGO 5XB:4819:1296
CISP:SMTWNYSMCGO I£S:4898:1311
CISP:SM'l'KNYSMDSO DGTL:UNK:UHK
CISP:SMTNNYS!+1GO 5XB:4898:1317
CISP:STKTNYSKDSO DGTL:UNK:UNK
CISP:STKTNYSKMGO 5XB:4876:1311
CISP:SYVLNYSADSO DGTL:4906:1286
CISP:WHBHNYWBDSO DGTL:UNK:UNK
CISP:NHBHNYWBMGO 5XB:4859:1240
GDCY FLPKNYFPCGO lAES:4970:1367
GDCY FLPKNYFPDSO DGTL:UNK:UNK
GDCY FLPKNYFPMG1 5XB:4910:1361
GDCY FRDLNYFMCGO lAES:4943:1333
GDCY FRDLNYFMUSO 5ES:UNK:UNK
GDCY fRPTNYfPDSO DG'!'L:4912:1341
GDCY FRPTNYFPMG1 5XB:4912:1341
GDCY FRPTNYFPMG2 5XB:4972:1341
GDCY GLCVNYGCDSO 5£S:4940:1315
"9opk St a t e
GOCY:GRCYNYGCCGO:lAES:4958:1355
GOCY:GRCYNYGCOS0:[x;TL:UNK:UNK
GOCY:GRNKNYGHDS0:5ES:4962:1377
GDCY:HCVLNYHVCGO:IMS:4946:1348
GDCY:HCVLNYHVDSO:[x;TL:UNK:UNK
GDCY:BCVLNYHVMG1:5XB:4946:1348
GDC'l:BCVLNYRVMG2:5XB:4946:1348
GOCY:HMPSNYHSDS0:[x;TL:4966:1354
GDCY:HMPSNYHSMG1:5XB:4966:1354
GOCY:LNBBNYLBDSO:DGTL:UN!::UN!:
GDCY:LNBBNYLB/-CO:5XB:4991:1343
GOCY:LNBHNYLBMG1:5XB:4991:1343
GOCY:LVTIfNYLTDSO:DGTL:UNI<:UNK
GOCY:LVTNNYLTMGO:5XB:4952:1341
GOCY:LVTNNYLTMG1:5XB:4952:1341
GDCY:LYBRNYLBCGO:1AtS:4978:1352
GDCY:LYBRNYLBDSO:DGTL:UNI<:UNK
GOCY:MINLNYMIDS0:[x;TL:4961:1359
GDCY:MINLNYMIMG2:5XB:4961:1359
GDCY:MNHSNYMHDSO: SES:UNI<:UNI<
GOCY:MNRSNYMHKiO:lXB:4958:1375
GDCY:MSPQNYHPOSQ:OGTL:4954:132<1
GDCY:HSPQNYMPMG1:5XB:4954:1324
GOCY: OYBANYOYMGO:5XB:4930:1364
GDCY:OYBAN'fOYRSO:5RSH :UNK:UNI<:
GLCVNYGCDSO
GDCY:PLVWNYFVCGO:1ES:4940:1344
GDCY:PLVWNYPVOSO:5ES:UN!::UNK
GDCY:PTWANYPWDSO:5ES:UNK:UNI<
GDCY:PTWANYP�O:5XB: 4952:1380
GOCY:RSLNN'lRODS0:DGTL:4953:1367
GOCY:SYOSNYSYOS1:[X;TL:UNI<:UNI<
GOCY: WBYNNYNEDSO:DGTL:4954:1355
GDCY: WDMRNYFRDSO:DGTL:UNK:UNK
GOCY:WDMRNYFRMGO:5XB:4987:1354
GOC'l:NOMRNYFRMGl:5XB:4981:1354
GDCY:NNTGNYWTCGO:lAES:4961:1334
GDCY:NNTGNYWTDS0:[X;TL:UNK:UNK
GDCY:WNTGNYWTMGl:5XB:4961:133-4
GOC'f:yPHNNYYAMGO:5XB:4882:1282
N'f21:N'lCMNYl3CGO:1MS:4998:1404
NY21:NYCMNY13DS0:5ES:4998:1404
NY21:NYCMNYI3DS1:DGTL:UNK:UNK
NY21: NYCMNY13MGl:lXB:4998:1404
NY21:NYCMNY13MG2:lXB:4998:1404
NY21:NYCMNY18CGO:lAES:4998:1407
NY21:NYCMNY18DSO:5ES:4998:1407
NY21:NYCMNYl8DS1:DGTL:UN!::UNK
NY21: NYCMNYl8MGO:lXB:4998:1407
NY21:N'lCHNYl8MG1:lXB:4998:1407
NY21:NYCMNYI8MG2:1XB:4998:1407
NY21:NYCMNY30CGO:lAES:4995:1405
NY21:NYCMNY30CG1:lAtS:4995:1405
NY21:NYCMNY30DS0:[x;TL:UN!(:UN!(
NY21:NYCMNY30MGl:lXB:4995:1405
NY21:NYCHNY30MG2:lXB:4995:1405
NY21:NYCMNY30MG3:lXB:4995:1405
NY21:NYCMNY36CGO:IES:4995:1408
NY21:NYCMNY36CG1:IMS:4995:1408
NY21:NYCMNY36CG2:lES:4995:1408
NY21:NYCMN'l36DSO:DGTL:4995:1408
NY21:NYCMNY36DS1:5ES:UNK:UN!(
NY21:NYCMNY42CGO:IMS:4994:1407
NY21:NYCMNY42CGl:IAES:4994:1401
NY21:NYCMNY42CG2:1MS:4994:1407
NY21:NYCMNY42CG3:IAES:4994:1407
NY21:NYCMNY42DS0:DGTL:UN!::UN!:
NY21:NYCMNY50CGO:1AES:4993:1409
NY21:NYCMNY50CG1:lAtS:4993:1409
NY21:NYCMNY50DSO:DGTL:4993:1409
NY21:NYCMNY50DS1:5ES:UN!::UNK
NY21:NY01NY50DS2:DGTL:UN!(:UN!(
NY21:NY01NY50MG2:lXB:4993:1409
NY21:NYCMNY50MC3:5XB:4993:1409
NY21:NYCMNY50MG4:5XB:4993:1409
NY21:NYCMNY50MG5:5XB:4993:1409
NY21:NYCMNYAAMGO:lXB:5002:1405
NY21:NYCMNYAPRSO:RDGT:4993:1409:
NYCMNY50DSO
NY21:NYCMNYBSCGO:lAES:5005 1404
NY21:NY01NYBSCGI:IAES:5005 1404
NY21:NYCMNYBSCG2:IAES:5005 1404
NY21:NYCMNYBSCG3:1AES:5005 1404
N'l21:NYCMNYBSCG4 lAtS 5005:1404
NY21:NYCMNYBSDSO DGTL UNI<:UNK
NY21:NYCMNYBSDSI DGTL UNI<:UNK
NY21 :NYCMNYBSDS2 DGTL UNK:UNI<
NY21:NYCMNYSRRSO ROGT 4993:1409:
NYCMNY50DSO
NY21:NYCMNYSRRS1:ROOT:UNK:UNK:
NYCMN'l50DS1
NY21:NYCMNYSRRS2:ROGT:UNK:UN!(:
NYCMNY50DS2
NY21:NYCMNYSTCGO lAtS:S004:1405
NY21:NYCMNYSTCGl lAtS:5004:1405
NY21:NYCMNYSTDSO DGTL:UN!(:UN!:
NY21:NYCHNYVSCGO lAtS:5002:1405
NY21:NYCMNYVSDSO 5ES:UN!::UN!:
NY21:NYCMNYWSCGO lES:5004:1406
NY21:NYCMNYWSCGl lAtS:5004:1406
NY21:NYCMNYWSCG2 1AES:5004:1406
NY21:NYCMNYWSCG3 1AES:5004:1406
NY21:NYCMNYWSCG4 lAES:5004:1406
NY21:NYCMNYWSDSO DGTL:5004:1406
NY21:N'lCMNYWSDSl DGTL:UNI<:UNI<
NY21:NYCMNYWSDS2 DG'l'L:UNI<:UNI<
NY21:NYCMNYWSDS3 DG'TL:UNK:UNI<
NY21:NYCMNYWSMG2 1XB:5004:1406
NY21:NYCMNYWSMG4 5XB:5004:1406
NY21:NYCMNYWSMG5 5XB:5004:1406
NY21:NYCMNYWSMG8 5)(8:5004:1406
NY21:NYCMNYWSRSO RDGT:5004:1406:
NYCMN'fwSDSO
NY21:NYCRNYNOCGO lAES:5039:1401
NY21:NYCRNYNDMGO 5XB:5039:1401
NY21:NYCRN'fNSDSO DGTL:5027:1406
NY21:NYCRNYNSDS1 DGTL:UN!::UNX
NY21:NYCRN'fNSMGO 1XB:5027:1406
NY21:NYCRN'fNSMGl 5XB:5027:1406
NY21:NYCRNYSSCGO lAES:5052:1404
NY21:NYCRNYSSMGO 5XB:5052:1404
NY21:NYCRNYWSCGO lAES:5037:1411
NY21:NYCRNYWSMGO 5XB:5037:1411
NY38:NYCMNY37CGO lAES:4994:1405
NY38:NYCHNY37CG1 1AES:4994:1405
NY38:NYCMNY37DSO DGTL:UNX:UNK
NY38:NYCMNy)7DSl 5E5:UNK:UNK
NY38:NYCMNY37MGl 1XB:4994:1405
NY38:NYCMNY37MG2 1XB:4994:1405
NY38:NYCMNY37MG3 lXB:4994:1405
NY3:::NYCMNY31MG4 5XB:4994:140S
NY38:NYCMNY37MG5 SXB:4994:140S
NY38:NYCMNY31MG6 5XB:4994:1405
NY38:NYCMNY56CGO lAES:4991:1405
NY38:NYCMNY56CGl lAtS:4991:1405
NY38:NYCMNY56CG2 lAES:4991:1405
NY38:NYCMNY56CG3 1AES:4991:140S
NY38:NYCMNY56CG4 lAt5:4991:1405
NY38:NYCMNY56DSO DG'l'L:UNK:UNK
NY38:NYCMNY56MG6 5xB:4991:1405
NY38:NYCMNY7]CGO lAES:4989:1410
NY38:NYCMNY7)DsO DGTL:UNK:UNK
NY38:NYCMNY73MGO lXB:4989:1410
NY38:NYCMNY"13MG1 5XB:4989:1410
NY38:NYCMNY79CGO 1ES:4988:1406
NY38:NYCMNY79CG1 lAtS:4988:1406
NY3e :NYCMNY790S0 DGTL:UNK:UNI<
NY38:NYCMNY79MGO lXD:4988:1406
NY38:NYCMNY79MG1 5xB:4988:1406
NY38:NYCMNy79MG2 5XB:4988:1406
NY38:NYCMNY97CGO 1AES:4985:1407
NY38:NYCMNY970S0 5ES:UNI<:UNK
NY38:NYCMNY97MGO lXB:4985:1407
NY38:NYCMNY97MG1 lXB:4985:1407
NY38:NYCMNYCACGO lES:4911:1411
NY38:NYCMNYCADSO DGTL:UNI<:lJNK
NY38:NYCMNYCAMGO 1XB:4977:1411
NY38:NYCMNYMNCGO lAES:4983:1410
NY38:NYCMNYMNDSO DGTL:UNK:UNK
NY38:NYCMNYMNMG1 1XB:4983:1410
NY38:NYCMNYTHCGO 1E5:4969:1414
NY38:NYCMNYTBMGO lXB:4969:1414
NY38:NYCMNYWACGO lES:4973:1413
NY38:NYCMNYWADSO DGTL:UNK:UNK
NY38:NYCMNYWAMGO lXB:4973:1413
NY38:NYCXNYCIRS1 5RSM:UN!::UNK:
Winter 1989-90 2600 Magazine Page 11
�ou knOm
NYCXNYGCDSO
NY38:NYCXNYCRCGO:1ts:4962:1401
NY38:NYCXNYCRDSO:DG'TL:UNK:UNK
NY38:NYCXNYCRMGO:1XB :4962:1401
N138 :NYCXNYCRHG1:1XB :4962 :1401
HY38:NYCXNYCRMG2:5XB:4962:140'7
NY38:NYCXNYEACGO:1ES:4959:1403
NY38:HYCXNYGCDSO:5ES:UNX:UNK
NY38:NYCXNYGC1GO:1XB:49'71:1410
NYl8:NYCXNYGCRSO:ltOOT:UNK:UNX:
NYCXNYXBDS0
NY38:NYCXNYBOCGO:1MS:49'72:1404
NY38:NYCXNYBCMGI:IXB:49'72:1404
NYl8:NYCXNYBCMG2:1XB:4912:1404
NYl8:NYCXNYJECGO: lES:4973 :1409
NYl8:NYCXNYJE;MGO:1XB:49'73:1409
NY38:NYCXNYKBDSO:OGTL:4964 :1414
NY38:NYCXNYKBMGO:1XB:4964:1414
NY38:NYCXNYXBMG1:5XB:4964:1414
NY38 :NYCXNYMBDSO:DGTL :UNIt :UNit
NY38:NYCXNYMBMGO:1XB:49'76:140'7
NY38:NYCXN'CHBMG1:1XB:4916:140'7
NY38:NYCXNYMBR.SO:5RSM:UNK :UNK:
NYCXNYGCDSO
NYl8:NYCXNYTBCGO:1MS:4961 :1409
NY38:NYCXNYTBDSO:DGTL:ONX:UNK
NYl8:NYCXNYTBMGO:1XB:496'7:1409
NY38:NYCXNYTllCGO:1ES:4966:1400
NY38 :NYCXNYTRDSO:DGTL:UNX:UNK
NY38:NYCXNY'rRHGO:1XB:4966:1400
NY38 :NYCXNYTRMG1:5XB:4966:1400
POUG:AMENNYAN RSO:511SM:UNX:UNK:
PGBKNYSBDSO
POUG:AMENNYANSGI:OTB:4761 :149'7
POUG:BECNNYBr.oSO:DGTL:UNK:UHK
POUG:BECNNYBEHGO:5XB:4861 :15C4
POUG:CLCNNYCNMGO:5XB:4921:1681
POUG:CLClUiYCCRSO:5ltSH :UNK:UNK:
PGHKNYSBDSO
POUG :CNDLHYCLCGO :3ES :4835 :1541
POUG:CRNWNYCWCGO:3ES :4879:1504
POUG:CRNWNYCNRSO:RDGT:UNK :UNK:
NNBRNYNNDS0
POUG:DVPLNYOPRSO:5RSH:UNK:UNK:
PGflXNYSRDSO
POUG:DVPLNYDPSGI:OTB:4181:1486
POUG:ELVLNYELHGO:5XB:4866:1588
POUG:FLBGHYFBMGO :5XB:4888 :1618
POUG:FLBGHYFBRSO :ROOT:UNK :UNK:
MNTINYHTDSO
POUG:FLSCNYFM'4GO:5XB:4802:1665
POUG :FLSCNYFHRSO:ROOT:UNK :UNK:
KGTNNYKGDSO
POUG:FSBKNYLDDSO:DGTL:UNK : UNK
POUG:FSRKNYLDHGO:5XB:4844 :1491
POUG :GHVLNYGHSGI :OTH :UNK :UNK
POUG:BG1.DNYHGCGO :3ES:4823:1532
POUG:BGLDHYRGRSO:ROOT:UN}( :UNK :
PGHKNYSHDSO
POUG:BIFLNYBFRSO:ROGT :UHK :UNK :
XGTNNYXGDS0
POUG :HIFLNYBFSG1 :OTH:4820:1569
POUG:HYFKNYBKRSO:SRSH :UNK:UNK :
PGBXNYSHDSO
POUG:JFVLNYJFHGO:5XB:4906:1667
POUG:J'FVLNYJFRSO:ROOT :UNK :UNK :
MNTINYHTDSO
POUG :KGTNHYKGOSO:DGTL:UNK :UHK
POUG :}(GTNNY1(QIotGO :5XB:4190:IS65
POUG:KRBHNYXRCGO :3£5:4846:1584
POUG :LBRTHYLBMGO :5XB :4885 :1645
POUG:LKBNHYLHSG1 :OTH:4928 :1662
POUG:LKXTNYLKCGO :1[5:4'781 :15'70
POUG:LVHNHYLVMGO:5XB:4816:1669
POUG:HLBKNYMLRSO:5RSM :UNK:UNK:
PGBXNYSHDSO
POUG :MLBKNYMLSG1:OTH:4184:1506
POUG :MLTHNYMNRSO :ROOT :UNK :UNK :
NNBRNYHNDS0
POUG :HLTNHYMNSGI OTB:4833 :1524
POUG :HNTINYHTDSO DGTL :UNK:UNK
POUG :HHTIHYM'I'HGO 5XB:4905 :1618
POUG :MNTINYHTRSQ 5RSH :UNK:UNK
PCXJG:HRBOHYHBSGI :OTR:4844 : 1�19
POOG :NCLVNYNCRSO :5RSM :UNK :UNK :
PGBKNYSHDSO
POOG:NNBRHYNNDSO :5ES :UNK :UNK
POUG :NNBRHYNNMGO :5XB :4865 :1510
POOG:NWBRNYNTMGO :5XB:4863:1527
POUG :NWBRNYWTRSO :5RSH:UNK :UNK, :
NNBRNYNNOSO
POUG :NNPLNYNPHGO:5XB:4830:1552
POOG:NWWNNYNWRSO:5RSH:UNK :UNK :
NNBRNYNNDSO
POUG : PGBKNYSHDSO: 5ES:4822 :1525
POUG :PGBKNYSPDSO :OOTL :UNK:UNK
POUG :PGBKNYSPHGO :5XB :4828 : 1518
POOG :PRNCNYPBRSO :RSS:UNK:UNK :
LDTNYLKCGO
POOG:PVYDMnDCGO :3r.S:4804 :151'7
POOG :PWNGNYSSRSO :5RSH:UNK :UNK :
PGBKNYSBDSO
POOG :RODLNYRDRSO : RDGT :UNK :UHI< :
PG8KNYSHDSO
POUG:RODLNYRDSGI:arB:4813:1564
POUG:SGRTNYSGRSO:5RSM:UNK :UNK :
PGBKNYSBDSO
POOG:SGRTNYSGSGl :SXS :4'759 : 1579
POUG :SBKNNYSKCGO:3ES :4802 :1598
POUG :STNVNYSTCGO :3ES :4770 :1518
POOG :NDSTNYNSRSO :RDGT:UHK:UHK :
PGHKNYSRDSO
POUG:NDSTNYNSSG1 :OTB:4'782 :1595
POOG:NBLKNYNRt«;O:5XB:4914:1640
POUG:NNDLNYNDCGO:3ES:4196:1471
POOG:NPFLNYNFCGO :2BES :4839 :1510
SYRA. :NtBRNYABRSO: RSS :UNK: UNK :
SYRCNYSUCGO
SYRA :ATNPHYAW6S9 :OTH :4544 :20'70
SYRA:ATNPNYAWRSO:RDGT :UNK :UNK :
WTTWNYUNDSO
SYRA :AUBNNYAUDSO :OOTL:UNK :UNK
SYRA :AUBNNYAUSG1 :SXS :485'7:2029
SYIlA :AXBANYAX482 :SXS:4548 :2121
SYRA :AX.BANYAXRSO :RDGT :UNl< :UNK :
NTTWNYUNDSO
SYIlA :BAVLHYBVCGO :2SES :4194 : 2028
SYIlA:BLRVNYBCDSO :DGTL :4594 :2069
SYRA :BNVDNYBD896 :OTH:4668:1896
SYRA:BNVDNYBDRSO :RDGT :UHK :UNK :
NH.BaiYWBDSO
SYIlA :BRPTNYBP633 :OTH : 4760: 1977
SYRA:BRPTHYBPDSO :DGTL :t'HK :UHK
SYIlA:CICRNYCJCGO : 2BES :4772 :2003
SYRA:CLAYNYOSCGO :1ES :4'785 :2016
SYRA :CLEVNYCEllSO :llSS :UNK :UNK :
SYRCNYSUCGO
SYRA :CLTNNYZIDSO : OOTL :UNK :UNK
SYRA :CLTNNYZISGl :SXS :47 25 :1891
SYllA:CLYDHYCY923 : OTR: 4857 :2088
SYRA :OfDNNYZHDSO :DGTL :UHK :UHK
SYRA :CMDNNYZMMGO :5XB :4709:1976
SYRA :CMLSNYIDRSO :RSS :UNK :UNK :
SYRCNYSUCGO
SYRA:CMLSNY�CGO : IES :4806:2002
SYRA :CNSTHYZADSO :DGTL :4756:1942
SYRA :CNTNNYZORSO:5RSM :UNK :UN"':
PTSDNYFSDSO
SYRA :CNTNNYZOSG 1 : OTE: 4434:2067
SYR.A :CNTTNYCIllSO :RSS :UNK :UNK :
SYRCNYSUCGO
SYRA :COTNNY56HGO : OCC :4403:2054
SYRA:COTNNY56RSO :RDGT :UNK :UNK :
PTSDNYFSOSO
SYRA :CPNBNYZP 688:orB :4605 :2039
SYRA:CPNBNYZPllSO :RDGT :UNK :UNK :
trrrrNNYUHDSO
SYRA :CRLDNYCRDSO:DGTL:4880:1937
SYRA :CRTBNYZGDS0:DGTL :UNK :UNK
SYRA:CTNGNYCHCGO :3ES :4711:1953
SYRA :CYTNNYZYCGO: 3ES: 4581: 2136
SYRA : DLGVNYOO429:OTH:4659: 1820
SYRA:DLGVNYDGRSO :RDGT :UNK: UNK :
HRKMNYBCDSO
SYRA :EVHLNYEIRSO RDGT:UNK:UNK:
WTTWNYUNDSO
Page 12 2600 Magazine Winter 1989-90
SYRA :FABSNYFBltSO :ltSS :ONK:UNK:
SYRCNYSUCGO
SYM :FYTTNYFY549:OTH:4900:2046
SYRA :FYTTNYFnSO:ROOT:UNK :UNK :
GENVNYGHDSO
SYRA:FYVLNYFVDSO:DGTL :4188 :1969
SYRA :GENVNYGNDSO tDG'rL :4907:20'76
SY:RA :GRTNNYGTRSO :RDGT:4900 :1959 :
CllLDNYCRDSO
SYRA :GVRNNYGCI4GO:5XB:4501 :2070
SYRA :GVRNNYGORSO :5RSM:UNX :UNK :
PTSDNYFSDSO
SYRA :BMI'HNYRAMGO:5XB:4780 :1883
SYRA :Sa.RNYBHDSO:DGTL :UNK:UNK
SYRA:HRKMNYBCDSO:DGTL:UNK:UNK
SYRA :BRKMNYBC1GO:5XB :4692 :1838
SYRA :HRVLNYBV543:OTH:4525:2028
SYRA :HVTNNYHXl44 :OTH :4452 :2100
SYRA:BVTNNYHXRSO :5RSM:UNK:UNK :
PTSONYPSOSO
SYRA:ILINNYILRSO:ROOT :UNK :UNK :
HRKMNYHCDSO
SYRA :ILINNYILSGI:SXS:4699: 1842
SYRA :ITHCNYIBDSO :DGTL :4938 :1957
SYRA :ITHCNYFGMGO:5XB :4931 :1958
SYRA :J1lDNNYJDCGO :3ES :4825:2034
SYRA :LFRVNYLE658 :OTH :4580 :2115
SYRA :LFRVNYLERSO:ROOT:UNK :UNK :
WTTWNYUNDSO
SYRA :LFYTNYLFRSO :RSS:UNK :ONK :
SYRCNYSUCGO
SYRA :LNNGNYLG533:OTH:4923 :1976
SYAA :LTFLNYLSMGO :5XB:4671 :1823
SYRA :LYNSHYLYCGO :3ES:4873 :2102
SYRA:MACDNYHCCGO :2ES:4903 :2145
SYRA :MARNNYHR926 :OTH :481'7 :2137
SYM :HCDGNYHD585 :OTH :4910 :205'7
SYRA :MCGRNYMGRSO:llOOT :4872:1924 :
CRLDNYCRDSO
SYRA :MCLNNYHZRSO :RDGT :4899:1945 :
CRLDNYCRDSO
SYRA :MDRDNYHK322 :OTH :4403:2081
SYRA :MEXCNYMXRSO :llSS :UNK :UNK :
SYRCNYSUCGO
SYRA :HINONYMIDSO :DGTL:UNK :UNK
SYRA :HORVNYHc:JoIIGO :5XB :4883 :1982
SYRA :MRTKNYMW315 :OTB :4483:2119
SYRA :MRTNNYHNRSO :5RSM :UNK :UNK :
PTSDNnSDSO
SYRA :MSSNNYMQDSO :OGTL :4349:2077
SYRA :NRFLNYN0384 :OTH:4382 :20/2
SYRA :NRFLNYNORSO :5RSM :UNK :UNK :
PTSDNYPSDSO
SYRA :NROSNYNR581 :OTH :4841 :2104
SYRA:NROSNYNRRSO :RDGT :UNK :UNK :
GENVNYGHDSO
SYRA :NRWDNYND353 :SXS :4390:2066
SYRA :NRNDNYNDRSO :5RSM :UNK :UNK :
PTSDNYPSDSQ
SYRA :NSYRHYNSMGO 5XB :UNK :UNK
SYRA:NNFONYNF564 0'1'8:4961:1960
SYRA :NWRKNYNKDSO DGTL :UNK :UNK
SYRA :NWRKNYNKMGO 5XB:4886:2113
SYRA :OGBGNYOGHGO 5XB:4445:2120
SYRA :OGBGNYOGRSO 5RSM:UNK:UNK:
PT50NYFSDSO
SYRA :ONEDHYODMGO 5XB:4143:1931
SYRA :ONTllNYOHCGO 3E5:4871:2159
SYRA :OSWGNYOSDSO DGTL :Ul'iK :UNK
SYRA :OSWGNYOSMGO 5XB:4759:2088
SYRA :ONSCNYOO'784 OTH:4861:2006
SYRA:PHLANYFF642 OTB;4560:2077
SYRA :PRLANYPFR.50 RDGT :UNK :UNK :
WTTWNYUNDSO
SYRA :PUoIYNYFYCGO 3ES :4894:2132
SYRA :PNYNNY'PN536 SXS :4<j50:2058
SYRA :PNYNNYPHDSO DGTL :UNK :UNK
SYRA :PPllGHYFP364 078:4895:2011
SYRA :PllISNYPARSO RSS :UNK :UNK :
SYR.CNYSUCGO
SYRA :PTSDNYP5DSO 5ES :UNK :UNK
SYRA :PTSDHYFSHGO 5XB:4403:2054
SYRA :RCSPNYRSMGO 5XB:4723:181S
SYRA:RCSPNYRSllSO RDGT:UNK:UNK:
mha t t h e � knom
RRl<MNYHC D S O
SYRA : RDC KN YR.C 1 5 4 : OTH : 4 8 1 S 2 0 90
5YRA : RCMENYRMD S Q : DGTL : UN K UN K
SYRA : RCMENYRMMGO : 5 XB : 4 1 0 4 1 9 2 2
SYRA : SALKNYQT8 4 8 : OTH : 4 4 9 S 1 9 94
SYRA : 5 CBRNYQHRS O : RDGT : UN K ON K :
tfTTWNYUN D S O
S Y RA : S KNTNYS E 6 8 5 : S XS : 4 8 4 2 : 2 0 1 3
SYRA : S KNTNYS ERSO : DGTL : UN K : UN K
5YRA : SNFLNYS L5 68 : S XS : 4 8 8 2 : 2 0 5 1
5'/RA : SNFLN Y S L D S Q : DGTL : UNK : UN K
SYRA : SOOSNYS D 4 8 3 : OTH : 4 8 4 8 : 2 1 3 3
SYRA : SODSNYSODSO : DGT 1 : UN X : UN K
SYRA : S YBHNY0Y1 62 : OTH : 4 73 3 : 1 9 5 4
SYRA : S YBBNYQYD S O : DGTL : UN K : UN K
SyItA : S YRCN YODDSO : DGTL : UN K : UN K
SYRA : S YllCNYE P D S Q : DGTL : UN K : UN K
SYRA : S YRCNYEPMGO : 5 XB : 4 1 9 2 : 2 0 0 2
SYRA : S YRCNYG S D S O : DGTL : 4 1 9 1 : 1 98 3
SYRA : S YRCNYJSCGO : I E S : 4 7 8 9 : 1 9 8 1
SYRA : S YRCNYSACGO : I E S : 4 8 0 5 : 1 9 8 3
SYRA : S YRCNYS UCGO : l AE S : 4 1 91 : 1 9 9 0
SYRA : S YRCNYSUCGl : 1 M S : 4 1 91 : 1 9 9 0
SYRA : T HRS NY"I'H6 28 : OTH : 4 S 5 9 : 2 0 9 6
5YRA : T HRSNYTllR S O : &OOT : UN K : UN K :
WTTNNYUN D S O
SYRA : TLLYNY'l'YllSO : RS S : 4 8 3 8 : 1 9 5 2 :
SYRCNYSUCGO
SYRA : UNS P NYU S 8 8 9 : OTH : 4 8 8 5 : 2 0 3 4
SYRA : UN S P N YU S R S O : RDGT : UN K : UN K :
AUBNNYAU D S O
SYRA : UT I CNYUTCGO : 1AES : 4 1 0 3 : 1 8 1 9
SYRA : WDPTN YWT8 3 4 : OTH : 4 83 1 : 2 0 4 3
SYRA : ltDTNN YW Y3 8 8 : OTH : 4 3 9 1 : 2 1 0 6
SYRA : ltHBOOYWBD S O : OG'lL : 4 1 0 4 : 1 8 8 9
SYRA : WLCTNYWCS 94 : OTH : 4 8 2 9 : 2 0 9 9
SYRA : wLCTNYWCR S O : RDGT : UNK : UN K :
GENVNYGNDS 0
SYRA : WMSNNYWN 5 8 9 : OTH : 4 8 6 2 : 2 1 4 1
SYRA : WMSNNYWN R S O : RDGT : UN K : UN K :
NWllKNYNKDS 0
SYRA : N'I'RLNYWT 5 3 9 : S XS : 4 8 8 9 : 2 0 65
SYRA : WTRLN YWTDS O : DGTL : UN X : UN K
SYRA : WTT tlH YUND50 : OG'lL : 4 6 1 2 : 2 0 8 0
SYRA : NWVLNYltW1 3 1 : OTH : 4 1 1 9 : 1 8 1 6
SYRA : NWVLNYWQ50 : RDGT : UN K : UN K :
ltBBONYWBOS 0
HBPL : ARVGNYAVMGO 5 XB : 4 90 2 : 1 4 2 1
WHPL : BOVGNYBVD 5 0 OGTL : UN K : UN K
WHP I. : B RWSNYBNCGO 2 B E S : 4 8 4 5 : 1 4 4 4
WHP I. : CBPQNYC P 0 5 0 OGTI. : 4 90 1 : 1 4 3 3
WH PL : CNGRN"YCND 5 0 DGTL : 4 9 1 9 : 1 4 5 2
WHP!. : C RHONYCBO S O DGTL : 4 9 0 5 : 1 4 5 5
WHP L : CRHLNYCLCGO 2 £ 5 : 4 8 4 4 : 1 4 5 8
WHPL : C RMLN YCLR50 RDGT : UN K : UN K :
YRTWNYYT O S O
WHPL : C 5 P PN YC SCGO 3 £5 : 4 8 1 4 : 1 4 9 1
WHP L : OBFYNYDFDSO OGT L : 4 9 3 6 : 1 4 2 6
WBPL : GNBGNYFVD5 0 OGT L : UN X : UN K
WBPL : GNBGNYFVMGO 5 XB : UNK : UNK
WHP L : GNWCCTGNCG1 1 £S : 4 9 1 1 : 1 3 9 6
WBP L : GRLKN YGLRS O RDGT : UN K : UN K :
NNCYNYNCDS O
WBP L : GRLKNYGLSG1 OTB : 4 94 2 : 1 5 1 0
NHPI. : GRSNNYGACGO 3 ES : 4 8 8 1 : 1 4 8 4
NBP L : BHFLNYBFO S O OGTL : 4 8 8 4 : 1 4 8 6
NBP L : BRSNN YBNDS O OGTL : UN K : UN K
WHP L : HRSNNYBNHGO 5 XB : 4 92 2 : 1 4 0 8
WHP L : KTNHNYl<ADS O OGTL : 4 8 1 6 : 1 4 3 5
WHPL : L RMTNYLAD SO 5 E S : UNK : U NK
WBP L : LRMTNYLAHGO 5 XB : 4 8 4 0 : 1 4 0 1
NBP L : MBPCNYMPCGO 2 E S : 4 8 6 4 : 1 4 5 6
WHP L :MMRNN YMAD S O DGT L : UNK : UNK
WHP L : MMRNNYMAMGO 5 XB : 4 93 3 : 1 4 0 1
WBP L : MTKSN YMKCGO 2 B E S : 4 8 8 8 : 1 4 3 3
WBPL :MTKSN YM KD S O 5 E S : UNK : UNK
WBP L :MTVRN YMVO S O DGTL : 4 9 5 2 : 1 4 0 9
WHP L : N NCYNYNCDSO DGTL : 4 9 2 6 : 1 4 5 9
WHP L : N NRCN YN RCGO 1 E 5 : 4 94 8 : 1 4 0 1
WHPL : N WRCNYNRO S O DGT L : lIN K : UNK
WHP L : N WRCN YN RH G 1 5 XB : 4 94 8 : 1 4 0 1
WBPL : N YACNYN KD S O DGTL : UN K : UN K
WBPL : N YACNYNKMGO 5 XB : UHK : U NK
WhP L : ORBGNYOB D S O OGTL : UNK : UNK
WHP L : ORBGNYOBMGO 5XB : 4 9 3 8 : 1 4 4 0
WHP L : OSNGNYOS D S O DGTL : 4 9 1 1 : 1 4 4 5
WHP L : PASNNYPTCGO 3 E S : 4 8 2 3 : 1 4 5 9
WHP L : PASHNYPTDS 0 DGTL : UNK : UNK
WHP L : P KSKNYP S O S O DGTL : 4 8 9 3 : 1 4 1 0
W8P L : P OHNNYPODS O DGTL : UNK : UNK
NBP L : PQMNNYFOHGO SXB : 4 9 2 1 : 1 4 6 9
W HP L : PRDYNYPDCGO 2£ S : 4 8 6 1 : 1 4 4 0
WBP L : PRRVNYN P D S O 5 E S : UN K : UNK
WHP L : PRRVNYNPMGO 5 XB : 4 9 4 9 : 1 4 4 1
WBP L : PRRVNYN P R S O RDGT : UNK : UNK :
N NCYNYN C D S O
WHP L : P S VLNYPVO S O : DGTL : UNK : U N K
WBP L : PTCBNYPCCGO : 1 E S : 4 9 1 8 : 1 3 9 8
WHP L : PTVYNYPYCGO : 2 E S : 4 8 1 3 : 1 4 6 8
WBP L : RYE-NYRY D S O : DGTL ; UNK : UNK
W8P L : RYE-NYRYMGO : 5XB : 4 9 23 : 1 3 9 9
WHP L : SCDLNYS R D S O : DGTL : 4 93 4 : 1 4 1 4
W HP L : SF RNN Y S U D S O : DGTL : UNK : UNK
WBP L : SFRNNYSUHG O : 5X8 : 4 9 4 6 : 1 4 1 5
WRP L : SLTSNYSLRS O : RDGT : 4 9 4 4 : 1 4 8 1 :
N NC YN YN C O SO
N HP t : S P vYNYSVCGO : 2BtS : 4 93 8 : 1 4 62
WBP L : S P VYNYSVD S O : DGTL : UNK : UNK
WHP L : S P VYNYSVMGO : 5XB : 4 9 3 8 : 1 4 6 2
WHP L : S S LHNY 5 5 D S O : DGTL : UNK : UNK
W HP L : TKHONYTUCGO : I t S : 4 9 4 4 : 1 4 1 2
W8P L : TRTWNYTT O S O : DGTL : 4 92 5 : 1 4 3 4
WBP L : TUXONYTXRS O : RDGT : UNK : UNK :
P RRVNYN P D S O
WHP L : TUXDNYTX S G 1 : SX S : 4 9 3 6 : 1 4 9 4
W8P L : WHPLNYWPCGO : 1AtS : 4 92 4 : 1 4 1 6
WHP L : WHP LNYWP D S O : 5ES : UN K : UNK
WBP L : WHPLNYWPMG O : I X ! : 4 9 2 4 : 1 4 1 6
WBP L : WBPLNYWPHG 1 : 5XB : 4 9 2 4 : 1 4 1 6
WHP L : NHVRNYWBDS 0 : OGTL : UNK : UNK
WRP L : WHVRNYNHMGO : 5XB : 4 9 1 4 : 1 4 6 8
NBP L : YN KRNYYNCGO : 1AES : 4 95 4 : 1 4 2 0
WHPL : YN KRNYYN D S O : DGTL : UNK : UNK
WHP L : YNKRNYYNMG2 : 5XB : 4 9 5 4 : 1 4 2 0
W8P L : YRTWNY'fT D S O : DGTL : U NK : UNK
W 8P t : YRTWNYY'I'MGO : 5XB : 4 8 7 9 : 1 4 5 5
WLMG : NYCKNY 1 4 CGO : 1 E S : 5 0 1 0 : 1 3 9 6
WLMG : NYCKNY7 1 CGO : 1 E S : 5 0 1 9 : 1 3 9 1
WLMG : NYCKN Y 7 1 DS O : 5 E S : UN K : UNK
NLHG : NYCKN Y 1 1 MG O : 1 X B : 5 0 1 9 : 1 3 9 1
WLMG : NYCKN Y l 1 CGO : 1 E S : 5 0 2 0 : 1 3 9 6
WlJo!G : NYCKNY 1 1 Q S O : OGTL : UNK : UNK
WLMG : NYCKNY1 1MGO : 1 X B : 5 0 2 0 : 1 3 9 6
WLHG : NYCKNY11MG 1 : 5XB : 5 0 2 0 : 1 3 9 6
WLH G : NYCKNYA I D S O : DGTL : 5 0 0 9 : 1 3 8 3
WLMG : NYCKHYAI MG O : 5XB : 5 0 0 9 : 1 3 8 3
WLMG : NYCKNYAIMG 1 : 5XB : 5 0 0 9 : 1 3 8 3
WLMG : NYCKNYAI MG 2 : 5XB : 5 0 0 9 : 1 3 8 3
WLMG : NYCKNYALCGO : 1AES : 5 0 1 0 : 1 3 8 9
WLHG : NYCXNYALDS 0 : DGTL : UNK : UNK
WLHG : NYCKNYALMGO : 1XB : 5 0 1 0 : 1 3 8 9
WLMG : NYCKNYARCGO : 1 E S : 5 0 1 8 : 1 3 8 4
WLMG : NYCKNYAR D S O : DGTL : UNK : UNK
WLHG : NYCKNYARMGO : 1 XB : 5 0 1 8 : 1 3 & 4
WLMG : NYCKNYAUCGO : 1 E S : 5 0 2 1 : 1 3 8 6
WLHG : NYCKNYAU D S O : OOTL : UNK : UNK
WLMG : NYCKNYAUMGO : 1 XB : 5 0 2 1 : 1 3 8 6
WLMG : NYCKNYAYCGO : l E S : 5 0 1 9 : 1 3 8 1
W!.MG : NYCKNYAYDS 0 : DGTL : UNK : UNK
WLMG : NYCKNYAYMGO : l X B : 5 0 1 9 : 1 3 8 1
WLMG : NYCKNYBRCGO : 1 E S : 5 0 0 5 : 1 3 9 9
WLHG : NYCKNYBRCG 1 : 1 E S : 5 0 0 5 : 1 3 9 9
WLHG : NYCKNYBRDSO : 5 E S : 5 0 0 5 : 1 3 9 9
WLMG : NYCKNYBRDS 1 : DGTL : UNK : UNK
WLMG : NYCKNYBRMG O : 1 X B : 5 0 0 5 : 1 3 9 9
WLMG : NYCKNYBRMG 1 : 5XB : 5 0 0 5 : 1 3 9 9
WLMG : NYCKNYBUCGC : 1 E S : 4 9 9 9 : 1 3 9 0
WU4G : NYCKNYBU D S O : OOTL : UNK : UNK
WLHG : NYCKHYBUMGO : 5XB : 4 9 9 9 : 1 3 9 0
WLMG : NYCKNYCLCGO : 1 E S : 5 0 0 S : 1 3 9 5
WLMG : NYCKNYCLD S O : 5 t S : UN K : UNK
WLHG : NYCKNYCLMGO : 1 X B : 5 0 0 5 : 1 3 9 5
WLHG : NYCKNYCLRSO : 5RSM : 5 0 0 5 : 1 3 95 :
N YC KN YSRD S O
W111G : NYCRNYFACGO : 1 E S : 4 9 94 : 1 3 9 0
NLHG : NYCKNYFAO S O : OGTL : UHK : UNR
WLMG : N YCKNYFAMGO 1 XB : 4 9 9 4 : 1 3 90
WLMG : N YC KNYFAMG1 5 XB : 4 9 9 4 : 1 3 90
WLMG : N YC KNYFTCGO 1AES : 5 0 1 4 : 1 3 9 2
WLMG : N YC KN YFTD S O OGTL : UN R : UN R
WLMG : N YC KNYFTMGO 1 XB : 5 0 1 4 : 1 3 92
NLHG : N YC KN YKPCGO 1AES : 5 0 1 3 : 1 3 8 7
WLMG : N YC KNYKPMGO l XB : 5 0 1 3 : 1 3 8 1
WLMG : N YCKNYLACGO l E S : 4 9 9 1 : 1 3 8 3
WLMG : N YCKNYLADSO DGTL : UN K : UN K
WLMG : N YCKNYLAHGO 5 XB : 4 99 1 : 1 3 8 3
WLMG : N YCKNYRACGO 1 £ 5 : 5 0 0 2 : 1 3 8 5
WLMG : N YC KN YRAD S O OGTL : UN K : UNK
WLMG : N YCKN YRAMGO 1 XB : 5 0 0 2 : 1 3 8 5
WLHG : N YC KN YT'lCGO 1AES : 5 0 0 5 : 1 3 8 9
WLMG : N YC KN YTYD S O DGTL : 5 0 0 5 : 1 3 8 9
WLMG : N YC KN YTYMGO 1 XB : 5 0 0 5 : 1 3 8 9
WLHG : N YCKNYWMCGO 1AES : 5 0 0 2 : 1 3 8 5
WLHG : N YC QN YASCGO 1 AE S : 4 9 8 5 : 1 4 0 1
WLMG : N YCQNYASDSO DGTL : UN K : UN K
WLMG : N YCQN YASMGO 1 XB : 4 98 5 : 1 4 0 1
WLMG : N YCQN YB AD S O DGT L : UN K : UNK
WLHG : N YCQNYBAHGO 1 XB : 4 91 1 : 1 3 8 0
WLMG : N YCQNYBAMG 1 5 XB : 4 97 1 : 1 3 8 0
WLM:; : N YCQNYBARSO RDGT : UN K : UN K :
NYCQNYFL D S O
WLMG : N YCQN YBHD S O : 5 E S : 5 0 0 5 : 1 3 62
WLMG : N YC QN YBHMGO : 1 XB : 5 0 0 5 : 1 3 62
WLMG : N YCQNYBHR S 1 : 5 RSM : UN K : UN K :
NYCQNYFRDS O
WLMG : N YCQNYCOOSO : 5 ES : UNK : UNK
WLMGl : N YCQN YCCMGO : 5 XB : 4 98 4 : 1 3 8 9
WLMG : N YCQN YFHCGO : 1 E S : 4 9 8 6 : 1 3 8 4
WLMG : N YC QN YFHDSO : DGTL : UN X : UN K
WLMG : N YCQlNYF BMGO : l XB : 4 98 6 : 1 3 8 4
WLMG : N YCQN YFHMG1 : l XB : 4 98 6 : 1 3 8 4
WLMG : N YC QN YFHMG2 : 5 XB : 4 98 6 : 1 3 8 4
WLMG : N YCQNYFLD S O : 5 E S : UNK : UNK
WLMG : N YCQNYFLHG1 : S XB : 4 91 1 : 1 3 8 8
WLMG : N YCQHYFLHG2 : 5 XB : 4 91 1 : 1 3 8 8
WLMG : N YCQNYFRD S O : 5 ES : 4 9 9 7 : 1 3 5 1
WLHG : N YCQNYFRMGO : l XB : 4 9 9 1 : 1 3 5 1
WLMG : N YCQNYHSDSO : DGTL : 4 9 7 8 : 1 3 7 2
WLMG : N YCQNYHSMGO : l XB : 4 91 8 : 1 3 1 2
WLMG : N YCQNYHSMG1 : 5 XB : 4 91 8 : 1 3 1 2
WLMG : N YCQN YBSRSO : RDGT : UN K : UN K :
NYCQNYLNDS I
WLHe : N YCQNYHSRS 1 : RDGT : UN !': : UNK :
N'lCQNYLNDS 1
WLMG : N YCQN Y I ACGO : 1 ES : 4 9 9 2 : 1 3 6 9
WLMG : NYCQN Y I AQ S O : DGTL : UNK : UNK
WLMG : N YCQN Y I IIMGO : 5 XB : 4 9 9 2 : 1 3 6 9
WLMG : N YCQN Y JAD SO : DGT L : 4 9 8 4 : 1 3 1 6
HLMG : N YCQN Y L I CGO : 1 ES : 4 9 9 2 : 1 4 0 1
WLMG : N YCQNYL I O S O : DGTL : UN!': : UN K
WLMG : N YCQNYLIMGl : 5 XB : 4 9 9 2 : 1 4 0 1
WLMG : N YCQNYLND S I : DGTL : UN K : UNK
WLMG : N YCQNYLNMGO : 1 XB : 4 98 6 : 13 67
WLMG : N YCQN YLNMG1 : 5 XB : 4 98 6 : 1 3 61
WLHG : N YCQN YN JD S O : OGTL : UN K : UNK
WLMG : N YCQN YN JHGO : 5 XB : 4 9 8 0 : 1 3 8 0
WLMG : N YCQNYNWCGO : 1 At S : 4 9 8 6 : 1 3 9 2
WLHG : N YCQNYN WO S O : 5 ES : UNK : UN!':
WLMG : N YCQNYNWMGl : 5 XB : 4 98 6 : 1 3 92
WLMG : N YCQNYOPCGO : 1 ES : 4 9 9 1 : 1 3 1 5
WLMG : N YCQNYOPD S O : DGTL : UN K : UNK
WLMG : N YCQNYOPMGO : l XB : 4 9 9 1 : 1 3 1 5
WLMG : N YCQN'lOPMGl : 5 XB : 4 9 9 1 : 1 3 1 5
WLMG : N YCQNYRHD S O : DGTL : 4 9 90 : 1 3 8 0
WLMG : N YCQNYRHMGO : 1 XB : 4 9 90 : 1 3 8 0
WLHG : N YCQNYRHRS O : RDGT : UN K : UN K :
NYCQNYLNDS 1
WLMG : N YCQNYliSCGO : 1 ES : 4 91 1 : 1 3 8 8
Too risky to mail?
Too paranoid to
speak its name?
Then FAX it!
516-751-2608
Winter 1989-90 2600 Magazine Page 13
by Violence
This is the second part of a series on
the P RI MOS operating system. I n this part I
will detail the several useful applications
you are likely to find on Prime computers.
You will learn about the DSM (Distributed
Sy stem M a n ag e m e n t) uti l i ti e s , the
EDIT_PROFILE utility (the P RI MOS user
editor), and several others. This will enable
you to make the most of any Prime comput­
er you happen to visit.
Examples appear in italics. Bold italics
indicate user input, regular italics indicate
computer output.
EDIT PROFILE
EDIT_PROFILEis the utility that is used
to add, delete, and modify users on a Prime
computer running PRI MOS. It is similar to
the VAXIVMS AUTHORIZE utility . There
are three m odes of E D I T_P RO F I LE
access, and these are:
System Initialization (SI) mode
System Administrator (SA) mode
Project Administrator (PA) mode
Y o u w i l l p robably never be u s i n g
E D IT_P ROFI LE in Syste m I nitializati on
mode as that mode is used for initial sys­
tem user setup. SA mode will allow you to
perform who lesale u s e r modification s ,
whereas P A mode will only allow you to
perform modifications to users in the same
project as you. When you decided to try out
E DIT_PROF I LE on the system that you
have hacked into, type this:
OK, edit_profile
If it g ives you an error message then
you obviously don't have good enough priv­
ileges. Don't give u p hope, however, as
there are ways around this. Unfortunately,
though, the methods which you m ust use
are beyond the scope of this tutorial . It
involves programming in a high level lan­
guage (FORTRAN IV, FORTRAN-77, PU1
Subset G, et. aL) as well as knowledge of
the appropriate system calls to make. Do
lots of research and experiment. You might
just get lucky.
If, on the other hand, it allows you to
invoke EDIT_PROFI LE then it will display
the utility's herald (revision number, serial
number, and copyright information) and a
MORE HACKING
message stating what mode you are i n .
The mode message will b e one o f these :
In system administrator mode
In project administrator mode
If you are in SA mode then the account
you are using has SYS1 privileges (that's
the best you can do from a remote stand­
point) . Before I get deep in how to use
EDIT_PROFILE properly I should mention
that I have the source code to this wonder­
fully useful program and a security audit
feature was added in during the last few
years (circa 1 986). It will log all successful
and failed commands. The only way I have
discovered around this is to remove the
logg i n g procedures from the code and
reco m p i l e it o n l i n e , but that' s p retty
advanced stuff and not advised at any rate.
The best you can do at maintaining your
presence o n the sy stem is not to u se
EDIT_PROFILE overly much. I n fact, don't
use it unless you m u st. I generally use
EDIT_PROFILE once per hack, and that is
after I get in. What do I do? I obtain a full
u s e r/project l i sti n g for future hacking
purposes. You can't obtain an account's
password from within EDIT_PROFILE, but
you can obtain a full user and project list­
ing, as well as add , modify, and delete
u sers. If you get a user list, try and hack at
"One user is
easier to hide
than three or
more. "
those accounts before wantonly adding
u ser accounts. Be sensible. Get all that you
can before adding a user. And if you must
add a user, just add one. There is no need
to add three or four users. No need at all .
One user is easier to hide than three or
more. U se common sense here, guys.
Page 14 2600 Magazine Winter 1989-90
O N PRIM O S
Once E D I T_ P RO F I L E has been
invoked you will be dispatched mercilessly
to the ">" prompt. To obtain help, just type
HELP and press RETURN. Before I get into
adding users, I'll discuss the procedures for
pulling user lists and similar information.
To get full information about the system
you are on (projects, users, etc) you simply
need to type:
>lisLsystem -sll
You can abbreviate the LIST_SYSTEM
command with LS. You can list individual
system attributes by substituting new argu­
ments in place of the -ALL argument. To
see what LS arguments are available, type
H E LP . You should ex peri ment with the
avai lable " L I ST " c o m m a n d s i n
EDIT_PROFILE.
Before attempting to add a user on any
Prime system you should always list the
sy stem attributes so that you will know
what projects and groups are in use. When
you decide to add a super-user, make sure
that you add yourself to the common pro­
ject (usually DE FAULT) and all of the high­
access groups (examples I have seen are:
. A D M I N ISTRATORS$, . P ROJ E CT_AD­
M I N I STRATO RS$ , . O P E RATO R S $ ,
. N ET_MGT$, etc.). Adding super-users i s
not always a good idea. Never add more
than 1 or 2 users on a system. Also, try to
follow the naming conventions used on the
system. If users have their first name as a
User ID, then when you add a user make
sure that your new user's User I D is a first
name. Likewise, if all users have their ini­
tials as their User I D then make sure that
your new user has a User ID with initials.
Now, to add a u ser, type:
>sdd_user usernsme
Where "username" is the U ser I D you
wish to use. After you type this you will be
asked for your password. Enter the pass­
word that you wish to use. Then you will be
asked for your g roup(s) and your default
login project. Like I said , you should use
the " L I ST_" co m m a n d s to see what
group(s) are i n use. Groups always start
with a period (.). Give yourself the adminis­
trator groups and you will be doing good.
As for project, an entry of DEFAULT will
u sually suffice.
An easier method to add users is to use
the -LIKE argument. Try this:
>sdd_user username -like system
Again, "username" is the name of the
U ser ID that you wish to use. This argu­
ment of the A D D_U S E R com mand will
make a copy of the user called SYSTEM
(found on all Primes that I have seen; also
a user of the super-user class) and add the
copy as a new u ser but with a different
name. Now, set your password with the
CHANGE_USER command. Type :
>change_user usernsme -pw
You will be prompted for your new pass­
word. Ta da. You now have a User ID with
the same stats as the User ID "SYSTEM".
Occasionally upon adding a user you may
have to add your User I D to a file called
LOGUFD located in one of the UFD's off of
MFD O. This will generally not happen. If it
does, then simply correct it with one of your
other accounts.
You are advised not to wantonly delete
users or edit them. Also try not to u se the
CHANG E_SYSTEM _AD M I N I STRATOR
command. Basically, type H ELP and start
to experiment (but be careful of what you
do). Make sure that you keep track of the
changes that you make so that in case you
mess something up you can fix it. Get your
feet wet.
If you find yourself in PA mode you can
do most of the above, but only regarding
the project that you are admi n i strating .
Thus you can only add users to that pro­
ject, only delete u sers from that project, etc.
This means no adding of super-users, etc.
The Distributed System Management
(DSM) Utilities
The DSM utilities is a set of commands
and services that help with the administra­
tion and day-to-day operatio n of Prime
computer systems. It is intended primarily
for use with networked systems, but can
also be u sed on single Pri m e syste m s
(those lacking networking capability).
The DSM u t i l i ties a l l ow Prime system
administrators and senior operators to per­
form system management tasks from any
point on a network. DSM's main facilities
Winter 1989-90 2600 Magazine Page 15
are summarized below.
S I M (System Information/Meteri ng)
Commands System status and resource
monitoring of local and remote systems
from any point within the network.
RESUS (REmote System USer) Facility
Control of remote Prime systems from any
terminal. Allows use of console-only com­
mands from a remote terminal.
Collection and collation of event mes­
sages, including PRIMOS and network
eve n t s , through D S M ' s U n s o l ici ted
Message Handling (UMH) and logging ser­
vices, with redirection of event messages to
log files or users throughout the network.
Generalized logging of DSM messages
in private or system logs, with commands
for administering, displaying and printing
logs.
Facilities for defining users' access to
DSM commands throughout the network,
in a single configuration file.
As you can see, the DSM utilities can
be a very u seful asset to have .
Unfortunately, SYS1 privileges (administra­
tor) are required to use the most exciting
aspects of the DSM utilities. All normal
users can utilize the SIM commands, and I
have even mentioned some of them i n
other parts o f this series. What is really
useful to us, however, are the RESUS and
log utilities. In a nutshell here are the basic
DSM commands. After this list will be full
discourses on the RESUS utility and the
SIM commands.
Remote System Control:
R ESUS - I nvokes P r i m e ' s R E mote
System USer facility.
Event M essage Handling and
Redirection:
CON FIG_UM confi g u re s DSM
Unsolicited Message Handling.
Administering Logs:
ADMIN LOG - creates and administers
DSM 109 files.
Displaying and Printing Logs:
DISPLAY_LOG - displays and prints the
contents of log files, including system and
network event logs.
DSM Configurator Commands:
CONFIG DSM - creates a new DSM con­
figuration
-
file.
MORE
DlSTRIBUTE_DSM - distributes a new
DSM configuration file.
STATUS_DSM - displays the currently
active configuration.
DSM Startup and Shutdown Commands :
START_DSM - starts DSM system con­
sole commands.
STOP_DSM - stops DSM system console
commands.
For more information on any of the DSM
commands, type:
HELP command-name
or
command-name -HELP
The RESUS Utility
RESUS is the REmote System U Ser
facility, and allows remote operation of the
physical supervisor console from any termi­
nal. What this basically means is that, with
RESUS enabled, all users with administra­
tor access will be able to execute com­
mands that are normally only executable
from the system console. It will let you force
other users off the system (not a good idea
to use this capability unless you MUST),
take the sy stem down (you m u s t be
STU PID to do such a thing), etc. RESUS
s u p p o rts the fol low i n g co m m an d l i n e
options:
-ENABLE
-DISABLE [-FORCE]
-START [-ON node name]
-STOP
-STATUS [-ON node group]
-HELP [-NO_WAIT]
-USAGE
-ENABLE
This option enables RESUS to be used
o n a s y s te m . I t i s o n l y valid from the
supervisor terminal.
-DISABLE
This option is used to prevent RESUS
from being used on a system on which it
has previously been -E NABLEd. The -
FORC E option must be supplied if the
RESUS is actually in use. It is only valid
from the supervisor terminal.
-START [-ON node name]
This is the means by which an autho­
rized user of RESUS may invoke REmote
System USer facilities on a system. If -ON
Page 16 2600 Magazine Winter 1989-90
PRIME HACKING
node name i s omitted, the default is the
local node. For this command to be suc­
cessful, RESUS must previously have been
-ENABLEd at the supervisor terminal.
-STOP
This option terminates remote control of
the su pervi s o r term i n al , leaving the
REmote System USer facilities available for
use by other authorized u sers . It is only
valid from the remote terminal in control of
the supervisor terminal through RESUS.
-STATUS [-ON nodegroup]
This displays the current stat u s o f
RESUS o n all nodes in a specified node
group. If a node group is not specified, the
status of the local node is displayed.
-HELP, -H [-NO_WAIT, -NW]
Displays command-specific Help text.
-USAGE
Displays command line syntax.
The DSM SIM Commands
The D S M S I M (Sy stem
Information/Metering) commands gather
and display information about system/net­
work status and resource usage from any
point on the network.
SI M commands are invoked from the
P R I MOS com m a n d l i n e . They can be
invoked from any terminal to display infor­
mation about any system on the network.
They can be invoked once, or periodically
at specified time intervals. Output displays
are paginated for screen display and can
be recorded in private or system log files.
User access to SIM commands on local
and remote nodes is controlled by DSM
security.
A list of S I M commands and descrip­
tions of the general SIM options follows.
LIST ASSIGNED DEVICES - lists
assigned devices
-
L1ST_ASYNC - lists asynchronous termi­
nals
LIST COMM CONTROLLERS - lists
comms contrOllers configuration
LIST_CONFIG - lists PRIMOS coldstart
configuration
LIST_DISKS - lists disk partition names
L1ST_LAN_NODES - lists nodes on
LAN300 local networks
LIST_MEMORY - lists physical memory
usage
L1ST_PRIMENET_NODES - lists
PRI MENET configured nodes
LIST PRIMENET LINKS - lists active
PRI MENET links -
L1ST_PRIM ENET_PORTS - lists assigned
PRIMENET ports
LIST_PROCESS - lists active system pro­
cesses
LIST_SEMAPHORES - lists active
semaphores
LIST_SYNC - lists synchronous line config­
uration
LIST_UNITS - lists users open file units
L1ST_VCS - lists active virtual circuits
General SIM options are:
-HELP, -H [-NO_WAIT, -NW]
-USAGE
-ON {node, nodegroup}
-PRIVATE_LOG, -PLOG pathname [-
NTTY, -N]
-SYSTEM_LOG, -SLOG path name [­
NTTY, -N)
-NO WAIT, -NW
-FR EQ integer
-TIMES integer
-START, -S date+time
-STOP date+time .
-ON {node, nodegroup}
This option allows you to specify the tar­
get node, or nodegroup to which the com­
mand is to be directed. The default is to
direct the command to the node on which
the command is invoked.
-PRIVATE_LOG, -PLOG pathname [ ­
NTIY, -N )
-SYSTEM_LOG, -SLOG pathname [
-NTTY, -N ]
The -PRIVATE_LOG option allows you
to specify a standard PRI MOS pathname
as a DSM log file to which all messages
from the target nodes are to be logged. If
the log does not already exist, it is created
automatically for you. User DSMASR (the
DSM application server) must have ALL
access to the directory that contains the
log.
The -SYSTEM_LOG option allows you
a ·similar facility using logs that are main­
tained on the system logging directory
DSM*>LOGS. System logs only exist on
Winter 1989-90 2600 Magazine Page 1 7
this directory or its subdirectories, and must
be created with the ADMIN_LOG command
prior to use.
Logged d ata can s u b sequentl y be
retrieved, printed and displayed using the
DISPLAY LOG command.
-NTTY, -N; can be used with the -PRI­
VATE_LOG and -SYSTE M_LOG options,
and indicates that no data i s to be dis­
played to the user. When this option is
used, the command spawns a phantom
which executes the com mand on your
behalf, and frees your terminal.
-HELP, -H [NO_WAIT, -NW]
This option overrides all other options to
display help information about the associat­
ed command.
-USAGE
This option overrides all other options to
display usage information, for the associat­
ed command.
-NO WAIT, -NW
This option indicates that you are not to
be prompted or queried during the com­
mand output display.
I f th i s option is n o t u s e d , y o u are
prompted betwee n each target node ' s
response, and after every 2 3 lines (1 page)
of output displays "-More-" and waits for
your response. To see more output press
the carriage return. To suppress further
output and return to command level, type
Q, Quit, N , or No. Any other response will
display more output.
-FREQ
-TIMES
-START, -S
-STOP
These options can be u sed to imple­
ment periodic execution of a command.
-FREQ option provides periodic execu­
tion of a c o m m an d , with the i n terval
between executions determined i n sec­
onds. The interval you specify is the inter­
val between two successive executions of a
com mand, and not the interval between
completion of the command's display and
the next execution. The interval is corrected
to the n earest m ultiple of fou r seconds
below that specified. If FREQ 0 is specified,
the command is re-executed immediately
on completion of the previous execution. If
INFILTRATING
the interval elapses before completion of
the previous display, the next execution is
delayed until the display is complete.
-TIMES is used in association with the -
FREQ option, to set a limit on the number
of times that a command is to be executed.
-START, -S sets the date and time that
execution starts. The format can be in
either ISO standard:
(YY_MM_DD.HH:MM:SS)
or in USA standard:
(MM/DDIYY.HH:MM :SS)
Defaults are: year to current year; date
to current date; and time to zero.
-STOP sets the date and time execution
stops ; format and defaults are the same as
for -START.
I n the absence of any of these four
options, the command is executed once,
and immediately.
I n the presence of any of these four
options, the defaults applied to the ur.speci­
fied options are:
-FREQ - Immediate reexecution
-TIMES - infinite
-START - now
-STOP - never
For more information on any of the SIM
commands, type:
HELP command-name
or
command-name -HELP
PRIMOS Electronic Mail Capabilities
PRIMOS, like any other operating sys­
tem worth its beans, supports full electronic
mail capabilities. However, the mail system
used will vary from system to system. A
lack of standards? Perhaps. But I find it
enjoyable learning the differences between
the many mail systems available.
I won't discuss how to use the mail sys­
tems due to lack of space, but that should
pose no problem, as all of them have online
help available.
Prime Computer, I nc.'s old mail system
(invoked by typing MAI L) is your typical
run-of-the-mill mail system. It's not too diffi­
cult to figure out how to use.
Prime Computer, Inc. has also created
a P R I MOS im plementation of the U N I X
XMAIL system. This seems to b e their pre-
Page 18 2600 Magazine Winter 1989-90
A P R I M E
ferred electronic mail system. It i s very
easy to use, not to mention very powerful.
My favorite electronic mail server is
N ETMAIL, written by those cunning pro­
grammers at Bramalea Software Systems
(the same firm that created LOGI N_SEN­
TRY). NETMAIL is the mail server with the
most useful features. Not only do you get
the normal features of sending user-to-user
mail locally and to similarly configured sites
on the network, you can also send:
Courtesy copies to other users
Encapsulated non-SAM files
Courtesy copies is basically message
forwarding. Assume I wrote a memoran­
d u m . If I wanted all the people on the
"Board of Trustees" to get a copy I just
send cc's (courtesy copies) to them.
The file encapsulation feature makes
NETMAIL a pseudo-file transfer application
l ike FTS (File Transfer Service, Prime's
answer to UNIX's FTP utility). Say I wrote a
useful public domain program and want to
distribute it to some users on the local sys­
tem and some remote systems. Don't want
them to get the sources, now do we? So
we encapsulate the executable file (com­
piled program) and mail it out as an encap­
sulated file. When the receivers read their
mail, they will be able to tell NETMAI L to
save it as a file to their directory. Very nice!
Some sites use custom-written mail utili­
ties. It all depends. Most, if not all, are
rather user-friendly and easy to learn with­
out documentation. Don't forget! Online
help files.
ED - The PRIMOS Text Editor
ED is the PRIMOS text editor and it is
line-oriented as opposed to full-screen . If
you are using VT-1 00 or a similar emula­
tio n , you m i g h t play around with the
E MACS full-screen editor, but I won't be
discussing EMACS here. After all, it comes
with its own interactive tutorial . Another
reason why I won't be discussing it is
because not all Prime sites have it online (it
is a separately priced product). RUNOFF is
another separately priced product. It is a
fully equipped word processor. ED, on the
other hand, comes with PRI MOS and it is
always available.
To invoke the PRIMOS EDitor, type:
ed
at the "OK," prompt.
T h i s w i l l e nter E D with an e m pty
workspace. You are creating a new file. To
edit an existing filesystem object, type:
ed filename
When y o u enter E D with an e m pty
workspace you will be dumped into I NPUT
mode. Everything you type here will be
taken as input into the file you are creating.
If you tell ED to load a file and edit it
(i.e. , ED filename) then you will be dumped
into EDIT mode. Everything you type will be
taken as ED editing commands.
To switch between I N PUT and EDIT
"You are
advised not to
wantonly delete
users or edit
them. "
mode, issue a null line (that is to say, press
the RETURN key). This brings a new prob­
lem into mind. How do you make a blank
line if when you press RETURN alone it
switches between modes? Yes, this is a
shortcoming for PRI MOS users who are
used to standard text editing systems. To
create a "null" line, type a space and then
press RETURN. It looks nUll, but it is really
treated as a line one character in length by
ED. Take note that both INPUT mode and
EDIT mode use no prompt.
To illustrate what we have learned so
far, consider this "pretend" session with the
ED line editor. (Since this magazine is not
an 80-column environment, we 'll use the
H> H
symbol at the beginning of lines that
are actually part of the preceding line in an
80-column setting.)
OK, eel
INPUT
Hey, this is pretty nice. A nice text
(continued on page 34)
Winter 1989-90 2600 Magazine Page 19
b y M r . U p s e t t e r
E v e ry d ay p e o p l e u s e t o u c h
t o n e s t o s i g n a l b e t w e e n t h e i r
p h o n e a n d t h e p h o n e co m p a n y's
s w i tc h i n g e q u i p m e n t . W h at t h e
ave rage m an o n t h e street does n't
know i s t h at t h e re are f o u r oth e r
t o u c h t o n e s t h at a r e n 't u s e d i n
reg u lar telephone sig n a l i n g . As a l l
g o o d phone experi m e nters know, a
s i l v e r b o x i s a d e v i c e t h at c a n
create t h e fo u r ext ra DTM F (d u a l ­
t o n e m u lti-freq u e n cy ) to n e s t h at
are n ot used i n normal telepho n e
s e rv i c e . T h e s e DT M F to n e s a r e
k n o w n a s A , B , C , a n d D . I t i s
q u ite easy to g e n erate t h e s e DTM F
t o n e s b e c a u s e t h e s t a n d a rd 1 6
tone for m at i s used i n many popu­
l a r DT M F t o n e g e n e r a t o r I C ' s .
T h i s a r t i c l e s h ow s two ways to
modify telepho ne equ ipment o n the
m a rket to m ake silver box ton es
and t h e n g iv e s a s ch e m atic of a
d e v i c e t h at w i l l p r o d u c e a l l 1 6
DTMF tones.
M o d i f i c a t i o n f o r Te l e p h o n e s
Yo u m ay not k n o w it , b u t y o u
m i g ht a l ready o w n a s i l v e r box .
T h at i s , t h e D T M F e n c o d e r I C
inside yo u r touch to ne phone m ay
be capable of prod ucing s i lver box
to n e s . If yo u r p h o n e is a n e w e r
touch t o n e a n d does not have fea­
tu res s u c h as call sto rage o r red i­
a l , t h e m o d p re s e n t ed h e re w i l l
wo r k , i f i t h a s t h e r i g h t ch i p .
T h e re a r e m a ny d iff erent ty pes
of DTM F c h i ps , b ut t h i s mod ifica­
tion is for phones u s i n g the 1 6 pin
TCM5087 to n e e n cod e r . This chip
is specifically designed to g e n e r­
ate t h e e i g ht d iffe rent tones used
HOW TO BUILD
i n d u al tone telephon e dialing sys­
t e m s . S e e Fig u re s 1 a n d 2 for a
list of t o n e s and associated fre­
q u e n c i e s . He r e ' s h o w t h e 5 0 8 7
wo rks. W h e n a key is pressed , it
c o n n e c t s t w o p i n s o n t h e I C
together. One is a row pin and one
is a col u m n pi n . For i n stance, if a
6 i s p r e s s e d , t h e r o w 2 p i n i s
con n ected t o t h e col u m n 3 p i n o n
t h e 5 0 8 7 . T h i s causes a 770 Hz
and 1477 Hz t o n e to be e m itted .
For normal pho n e use, the col u m n
4 p i n , wh ich is u s e d to make t h e
A, B , C, a n d D to nes is u n used .
B ef o r e y o u st a rt t h i s s i m p l e
m o d i f i c at i o n y o u m u s t h av e a
p h o n e with a 5 0 8 7 c h i p . On t h e
n ew t r i m l i n e s t y l e p h o n e s t h i s
c h i p i s located i n t h e center of the
l a rg e r p r i nted c i rcu it board (PCB)
in the h an d s et . T h e chip s h o u l d
h av e t h e n u m b e r s 5 0 8 7 o n t h e
back along with some oth e r n u m­
b e r s , s o it w i l l r e a d s o m et h i n g
l i k e " T 9 5 0 8 7 " o r " T C M 5 0 8 7" .
Once you h ave ide ntif ied the chip,
you m u st gain access to t h e sold e r
s i d e o f the PCB.
T h e fou r to n e s a re 8 n abled by
i n s t a l l i n g t h r e e w i r e s a n d a
switc h . F i rst , cut t h e t race on the
PCB going f ro m pin 5 of the 5 087
to the keypad . Use a razo r blade
o r a s m a l l f i l e . (On an I C the f i rst
p i n is t h e o n e i n t h e l o w e r l e f t
corner when you h o l d t h e c h i p s o
t h e l e t t e r s a r e r i g h t s i d e u p .
T h e re m ay also b e a d ot o n t h e
c a s e above p i n 1 . ) N e x t , s o l d e r
s e p a r a t e w i r e s t o p i n 5 , p i n 9 ,
a n d to co l u m n 3 of t h e k e y p ad .
T h i s is the p o i n t o n the k e y p ad
Page 20 2600 Magazine Winter 1989-90
A SIL VER BOX
that was co n n ected to p i n 5 of the
I C before yo u cut t h e trace. See
Fig u re 3 for t h e sch e m atic of t h e
mod ificat i o n . O n a t r i m l i n e t y p e
p h o n e it i s e a s i e st t o m ak e a l l
co n n ectio ns t o t h e sold e r side of
the PCB. Be s u re you h ave ide nti­
f i e d t h e p i n s on t h e IC correct l y
before y o u start s o ld e r i n g . N o w ,
s o ld e r t h e w i re f ro m t h e keypad
t o t h e m i d d l e t a b of an S P O T
switch . S o ld e r t h e w i r e f ro m p i n
9 t o o n e s i d e o f t h e switch and t h e
w i r e f ro m pi n 5 to t h e oth e r. T h e
mod ification is n o w co m plete. Fo r
n o r m a l O T M F to n e s t h e s w it c h
sim ply con n ects t h e keypad t o pin
5, t h e co l u m n 3 p i n . Fo r s i l v e r
b o x to n e s , t h e s w i t c h c o n n ects
t h e prev i o u s ly u n used p i n 9, the
co l u m n 4 p i n , to t h e keypad . The
keys 3, 6, 9, and # now beco m e
A, B , C, and 0 respective l y .
B efore y o u p u t eve ryt h i ng back
tog et h e r d o u b l e c heck y o u r work.
Tog g l e the switch and m ake sure
all t h e to n e s work. M ake s u re the
w i r e s you i n st a l l ed d o n 't c a u s e
a n y s h o rts. Lastly, f i n d a p l ace to
securely i n stal l t h e switch .
A n ot he r M o d i f i c a t i o n
I f t h e above m o d w o n 't work o n
a n y o f y o u r phones, you can do a
s i m i lar mod o n a prod uct sold by
R a d i o S h a c k . T h e i r " e c o n o m y
pocket tone d i al e r" ($ 1 5 . 95 ) u s e s
a 5 0 8 7 c h i p and c a n be co nverted
fo r s i lver box tones. Th e mod ifi­
c at i o n u s e s t h r e e w i r e s a n d a
switch , as befo re. Once co mpl et­
ed , yo u w i l l have a n ice po rtable
1 6 to n e OTM F g e n e rato r.
The fi rst step of t h i s mod i s to
rem ove the P C B . Caref u l ly pop off
t h e back of t h e u n it a n d r e m ove
t h e p o w e r s w i t c h a n d t h e s i x
screws i n the PCB. Th e n d esolder
t h e two s p e a k e r w i r e s a n d t h e
batt e ry wires f rom t h e P C B . Yo u
m ay also want to r e m ove t h e key­
pad and the keys. Now look at the
keypad side of t h e P C B ( n ot the
co m po n e n t s i d e ) . Cut t h e t race
going from p i n 5 of t h e I C to co l­
u m n 3 of t h e keypad . This is the
o u t e r m o s t o f t h e t h r e e t r a c e s
g o i n g f ro m t h e I C t o t h e keypad.
Now t h e switch m ust be i n stalled.
Find a tinned rou nd pad m arked C3
in the upper left of t h e co m po n e nt
side of the PCB and sold e r a w i re
from h e re to t h e m id d l e tab of an
S P OT switch. This switch m ust be
a v e r y s m a l l t o g g l e o r s l i d e
s w i t c h . A l s o o n t h e co m p o n e n t
sid e , sold e r a wi re f ro m p i n 9 to
one side of the switch and a wire
f r o m p i n 5 t o t h e o t h e r . A s
b e f o r e , b e s u r e t o i d e n t i f y t h e
p i n s co r rectl y . Th e re i s roo m to
i n stal l a switch inside the enc lo­
s u re i n t h e gap to the l eft of the
d i o d e at th e top of th e PCB. As
usual, ch eck for shorts cau sed by
t h e w i r e s o r t h e s w i t c h . T h e
s w i t c h w i l l o p e r at e e x a ct l y a s
described in t h e previo u s modifi­
catio n .
A l t e r n a t i v e 1 6 T o n e
D T M F G e n e r a t o r
I f y o u d o n ' t h a v e t h e r i g h t
phone and don't want to spend $ 1 6
at Radio S h ack , you can build your
own touch tone encode r using the
sch e m atic i n Fig u re 4. This d evice
is ve ry s i m i lar to the o n e s o l d by
Radio S hack. It uses the TCM5089
OTM F e ncod er IC to produce all 1 6
Winter 1989-90 2600 Magazine Page 21
ton e s . The 5089 is closely related
to the 5087 i n both f u nction and
p i n o u t . One i m portant d iff e r e n c e
is that t h e 5087 prod uces a t o n e
w h e n a row a n d col u m n p i n are
c o n n e ct e d t o g e t h e r , w h i l e t h e
5089 p rod uces a to n e when a row
and col u m n pin are conn ected to
g r o u n d . As a r e s u lt , t h e 5 0 8 9
m u st b e used w ith a specific type
of keypad , called a 2-of-8 keypad .
Explanation of the sch e m atic is
as fol lows : p ressing a key causes
a row and col u m n pin to go low,
thus prod ucing a DTMF tone at pin
1 6, t h e o utp ut. Th e IC req u i res a
sine wave input s upplied by a TV
c o l o r - b u rst c ry s t a l at 3 . 5 7 9 5 4 5
M H z (X1 ) t o g e n e rate e ig ht d iffe r­
e nt audio s i n uso idal freq u encies.
The tone output f ro m pin 1 6 goes
to a 32 ohm speaker, C2, C3, and
R 1 . Varyi ng the values of C2, C3 ,
and R1 will change t h e volume and
audio q u ality of the signal. If you
use a speaker of h ig h e r and lower
i m pedance, you should experiment
wit h t h e values of C2, C3, and R 1
f o r t h e b e s t a u d i o v o l u m e a n d
q u ality. T h e d evice is powered by
4.5V but t h e 5089 can handle u p
to 1 2V.
P a r t s L i s t a n d S u p p l i e r s
C 1 - 2 2 u f , 1 6 V e l e c t r o l y t i c
C 2 - 1 u f , 1 6 V e l e c t r o l y t i c
C 3 - 2 . 2 u f , 1 6 V e l e c t r o l y t i c
I C 1 - T C M 5 0 8 9 D T M F
e n c o d e r
R 1 - 6 8 o h m , 1 / 4 W
X 1 - 3 . 5 7 9 5 4 5 M H z c o l o r­
b u r s t c r y s t a l
O t h e r p a r t s : 2 - o f - 8 k e y p a d ,
s p e a k e r , b a t t e r i e s , b a t t e r y
h o l d e r , e n c l o s u r e , p o w e r
USING THOSE
s w i t c h , c i r c u i t b o a r d , e t c .
Th e TCM5089 is available fro m
m a n y s o u r c e s . O n e i s J a m e c o
E l e c t r o n i c s , 1 3 5 5 S h o r e w a y
Ro ad , B e l m o nt , CA 94002. A 2-
of-8 keypad is avai lable f ro m The
E l e ct r o n i c G o l d m i n e , P . O . Box
540 8 , Scotts d a l e , AZ 8 5 2 6 1 . The
c r y s t a l i s av a i l a b l e f ro m R a d i o
S h ack o r Jam eco, a n d m any oth­
e rs . Total cost of e l ect ro n ic parts
should be around $6-7.
If you buy the keypad from The
E lectro n ic Gold m i n e , the pinout is
as fo l lo w s :
0 0 0 0 0 0 0 0 0
E F G H J K L M N
These are the n i n e pi ns o n the
back of the keypad . E : g rou nd, F:
col u m n 4, G: co l u m n 3 , H: col u m n
2 , J : co l u m n 1 , K : r o w 4 , L : row
3, M : row 2 , N: row 1 .
N o w W h a t ?
Some of you may b e wondering
w h at to d o with yo u r n ew toy . A
s i lv e r box i s n 't a t o l l avo i d a nce
device l i ke a blue o r red box ; it is
anot h e r tool wit h w h ich to explo re
the pho ne syste m . And that m eans
you h ave to do the experimenting .
Try beeping silver box to nes i nto
voice m essage syst e m s , c e l l u l ar
V M S , test exch ang es, loops, pay
phones, 1 0NXX and 950 nu mbers,
a n swering m ach i n e s , o r anywhere
else you think the to nes shouldn't
b e lo n g . S e e w h at h appe n s w h e n
you d rop a s i l v e r b o x to n e o r two
d o w n y o u r l o c a l e x c h a n g e o r
t h ro u g h d i ff e r e n t l o n g d i sta n c e
c a r r i e r s . If you e x p e r i m e n t sys­
t e m a t i c a l l y a n d k e e p g o o d
record s , yo u w i l l s u re l y u ncov e r
s o m et h i n g i nterest i n g .
Page 22 2600 Magazine Winter 1989-90
FOUR EXTRA TONES
!
I ", i "J Q
i
.,. =
i
"' I " I
I ": z � , '"
1:
i " I
I col ,,1: e N i N '"
1 '-'
i
::! I
1
-[ I I
I
I
- ..
i
... .
I
I I -
N ,.., ..
= = =
rlgurp 4. 1111,. s t h e rn n t l c h sl",lIIftr t o thp RediD Shar.k dellite
1
I
1 2 J,1 r
e . Up
[Ol I
cnl 2 . e .
C O L 3
COL 4
·1.SU ROW 1
M
ROW 2
ROW ]
n olO 4
2 - 0 F - 8
G N O
KEyrRD
6 �� "
[ 2 �l ).1 f I 3 2 0 speaker 7'
Winter 1989-90
ose 1
'N
H.
C=:J
lONE . 6
OUT
2600 Magazine
..,
c
"
Page 23
HeZp Needed
Dear 2600:
I am hoping you may be able to
help me. I am in a position where
several times people I do not know
have tried to trick me into saying
illegal things on the phone. I need
a way to be able to tell their phone
numbers as they call me.
I have heard that there exists
phones or boxes that can pick up
the number calling you from a sig­
nal transmitted with any call and
display it. Do you know where I
could buy one, get one, or how I
could build one?
Concerned
Syracuse, NY
Yes, such boxes exist, but it will
be some time before they can tell
you the phone number ofANY call,
that is, calls outside your local
calling area. And it won't work at
all if your local phone company
isn't offering a caller-ID type ofser­
vice.
Caller-ID is becoming a very
controversial topic. Anonymity on
the phone is something we all take
for granted. Removing this would
make using the phone a complete­
ly different experience, one that
would probably be a whole lot less
jim and a great deal more intimi­
dating.
But then there are those who
abuse the anonym ity feature.
What do we do with them? In your
case, you'd be wise not to remain
on the line when these people call
if indeed they are trying to trick
you. If they continue to call, file a
complaint with your phone compa­
ny. Nobody (including the phone
w o r d s a n d
company, law enforcement, or reg­
ular people) has the right to harass
you on the phone if they're told to
stop. If you're determined enough,
they will be tracked down.
Interesting Facts
Dear 2600:
The ANI 's for the 4 1 2
(Pittsburgh) area code are scat­
tered in the 4 1 0 exchange . We
know of the following:
4 1 0-41 00: downtown Pittsburgh
and suburban.
4 1 0-6633: east suburban.
Also, US Sprint issues a com­
plete rundown of who called an
800 number. We got our 800 bill
and surprisingly it showed every
number that called us.
The Renegade of Pittsburgh
Sysop of Charlotte
(412) 829-2767
The copy of the bill you sent us
looks exactly like a regular Sprint
bill, except the numbers on it are
the numbers that called you.
Something to think about. especial­
ly those ofyou who like to call 800
numbers. Look in our Spring 1 989
issue to find out which 800
exchanges are owned by Sprint.
We'd like to know if the other com­
panies prov ide such detailed
billing.
By the way, Sprint's FONLine
800 serv ice isn 't a bad deal.
There's currently no startup fee to
obtain an 800 number and you
can attach it to any existing phone
number. Your 800 number w ill
work all over the country and the
monthly fee is only $ 1 0. The per
call fee is rather steep, though. It
averages about 22 cents a minute.
Page 24 2600 Magazine Winter 1989-90
c h a r a c t e r s
But it·s one way to virtually guar­
antee not getting ripped off by an
AOS somewhere. Of course. you
can only dial one number.
More Frequencies
Dear 2600:
In your Autumn 1 989 issue a
reader pointed out the Mobile
Telephone Assignments. The read­
er however left out an important
set of frequencies which are used
for phones on airplanes. These fre­
quencies usually have senators.
congressmen. and other important
business people calling home, set­
ting appointments . or talking
about other things:
454 . 6 7 5 , 4 5 4 . 7 0 0 . 4 54 . 72 5 .
4 5 4 . 7 5 0 . 4 5 4 . 7 7 5 . 4 5 4 . 8 0 0 .
4 5 4 . 8 2 5 , 4 5 4 . 8 5 0 , 4 5 4 . 8 7 5 .
4 5 4 . 9 0 0 . 4 5 4 . 9 2 5 . 4 5 4 . 9 5 0 .
454.975.
Please n o t e : " I t is a fed e ral
crime with s evere punishment
and/or fines to 1) divulge what you
hear to anyone who is not a party
to the broadcast; 2) to make use of
any broadcast information for your
own personal gain; 3) to make use
of any broadcast information for
illegal purposes or to commit a
crime. Any such violations may be
investigated by the FBI and prose­
cuted by the US Department of
Justice."
MM
Rutherford. NJ
We wonder if those same penal­
ties apply to anyone who over­
hears a conversation on a bus. It's
basically the same thing. The only
difference is that thepeople talking
on the phone often aren't aware of
how easy it is for others to listen
in. The crime in that case is igno­
rance. often perpetuated by manu­
facturers who would rather their
customers not know how non-pri­
vate their conversations really are.
Still. this is better than the cellular
fiasco. where Congress decided
that the best (and only) protection
would be to simply make listening
in illegal. Who would be fool
enough to listen to something ille­
gal in the privacy of their own
home?
Numbers Needed
Dear 2600:
I am writing to inquire as to
whether any issue of your maga­
zine has information regarding
access to long distance telephone
calling card codes using AT&T or
Sprint services without a comput­
er.
I used to have a calling card
number that worked and billed to
someone else. but it is no longer
valid.
I don't have a computer, so I
need some way of finding a valid
card number that works . From
what I 've read in one of your
books. that isn't easy to do at ran­
dom because AT&T is difficult to
hack without a computer. I've tried
using my oid card and changing
the last four digits, but it won't go
through.
If you have anything on this or
know of a publication that does,
please let me know.
MC
Van Nuys. CA
What you want to do really has
nothing to do w it h hacking or
phreaking. There are lots of ways
Winter 1989-90 2600 Magazine Page 25
i n
to make telephone calls. You dis­
cover t he m t hroug h individual
experimentation. Using someone
else's calling card is not the way
to go. You v ictimize an innocent
person and you also run a tremen­
dous risk oj getting caught. If you
want to explore and manipulate
the system, there's never been a
better time. If you simply want to
steal, you'll have to wait in line.
BBS Question
Dear 2600:
What are the requirements for
putting up a 2600 BBS? I have an
Amiga and I want to put u p a
board. What BBS program should
I use?
Greg
New York
As it stands right now, there are
no 2600 boards. It was working
out Jairly well Jor a while but then
we Jound ourselves devoting more
and more time to the boards when
we should have been working on
the magazine. We've got our priori­
ties and t hey center around the
magazine itself. Anyone interested
in running boards has our bless­
ings, and if they want to spread
the word through 2600, we'll do
w ha t we can. The o n ly b a s ic
requirements we insist upon are
user anonymity and private mail
that cannot be read by system
operators.
Comments/
Suggestions
Dear 2600:
I had not intended to renew this
time, since I've found very little of
interest in the last few issues. In
o t h e r w o r d s ,
particular, the articles about the
command languages of several
(common) o p e rating systems
seemed no more than a reprint of
what was easily available in users'
manuals. I read those all day. Your
Fall issue was superb, however, so
I'd like to renew.
Don't misunderstand. I do like
the artic les on computers when
they present something fresh. But,
in general. I find the articles on the
telephone system m u c h more
interesting. And I especially like
the information on threats to pri­
vacy (and would appreciate more
about "practical" ways to counter­
act these threats).
I do have one question. In many
cases, the telephone information is
a bit too advanced for me, as I am
only a beginner. I would appreciate
it if sometime you could publish a
bibliography of above- and under­
ground information, from which I
could learn the basics. As you may
have most of this information
already, which may otherwise be
hard to find, maybe you could put
it altogether into a ·primer" which
you could offer for sale.
In closing, again, thanks for the
last issue, which was golden.
He
Phoenix
It WAS a good issue, wasn't it?
We were responding to our read­
ers' suggestions, which we never
tire oj hearing. We need a continu­
ing flow oj more articles, however,
in order to keep issues like that
one coming.
The project you suggest is one
we ' ve had our eye on Jor some
time. We've had our eye on others
Page 26 2600 Magazine Winter 1989-90
t h e l e t t e rs
as well. Maybe something w ill
materialize soon....
COCOT Hacking
Dear 2600:
A non Bell System lookalike
payphone was recently installed
outside in the parking lot of a con­
venience store across the street
from my residence . The phone
wires corning out of it are exposed
and unprotected; you could proba­
bly splice into them leaving extra
connections to hook up a conven­
tional telephone.
No phone number is listed on it
so I made a short long distance
collect call to a friend. A choppy
woman's digitized computer voice
said, MThis is a public payphone.
This is not a billable number." It
repeated this about four or five
times as the call was being initiat­
ed - even the person I phoned
could hear it. I was then able to
get the payphone's number from
my friend's phone bill.
I called the payphone and after
two rings the same voice answered
by just saying MThank you" fol­
lowed by a series of four touch­
ton e s (I assume) in rapid
succession . There's about a 20
second pause. (I would guess the
payphone owners enter a code
from a touchtone phone on their
end to d e te rmine how much
money has been collected, etc. It
would be fun to hang an FM trans­
mitter on the line and eventually
get all the codes to activate its var­
ious information modes.) Without
entering a chain of touchtones it
recognizes, it simply hangs up.
I then took my cordless phone
over to it and dialed it up. The
payphone produces a soft chirping
sound instead of a ringing bell,
and it's not loud at all. When you
pick up the handset it simply says
MOne moment please" four or five
times but it simply will not con­
nect you through to the caller. As
a general rule I avoid these pri­
vately owne d payphones and
whenever possible go for genuine
Bell.
As an open suggestion, could a
knowledgeable 2600 reader submit
a s c h e matic for a d evi c e that
would display a digital readout of a
string of touch tones applied to its
input? The NSA uses such devices
in the ir surve illan c e work.
Recently Modern Electronics had a
device that would give an actual
voice of the various touch tone dig­
its. Its construction was fairly sim­
ple . b u t the tones had to be
entered very slowly - it couldn't
tell you a rapid string like you'd
get from an auto speed dialer or
even from normal hand dialing.
This d evice would be great for
monitoring cellulars or the 46/49
Mhz cordless portaphones.
And finally, one question: is it
possible to call a 900 number from
a payphone using a red box some­
where in this country? It doesn't
work in my area.
I enjoy your periodical a great
deal (the phone articles are by far
the best since access is universal).
Keep up the good work!
Akron. Ohio
The COCOT (Customer Owned
Coin Operated Telephone) you
investigated is a very common one.
Some others Jor our readers to
Winter 1989-90 2600 Magazine Page 27
play with are at 602-820- 1 430,
51 6-467-9183, and 214-286-3334.
It may take a good ten rings for
them to answer with the computer
voice and it might be hard to keep
curious humans from picking up
when you call. 1hefour tones after
the 'Thank you� sound suspicious­
ly like silver box tones (A, B, C, D)
- we don't know what their pur­
pose is. ObViously, the phone then
waitsfor you to enter the right dig­
its. Currently, we have no idea as
to what the format is. Once we
have that information, it'll be easi­
er to crack and we can see just
what these phones can do. We
encourage our readers to evaluate
the different types ofpayphones in
their areas, get their numbers, call
them, experiment, etc. Let us know
what youfmd.
Regarding 900 numbers from
payphones: generally it doesn't
work, not even 900 -555- 1 2 1 2
which is a free call. But softwar�
errors in the central office can
make wonderful things happen.
There was a time when quite a
few payphones in New York City
would call ANY 900 numberfree of
charge. You may find this in your
area if nobody 's caught it. You
may find a COCOT that allows
this. But don't expect it to last.
Usually after the first bill rolls in,
they fl[Jure out what's wrong pret­
ty quickly. If you are lucky enough
to find one of these holes, you'll
soon discover how boring most of
these services are, even for free.
And then you won't have to wony
about falling for that crap in the
future. It's too bad the general pop­
ulace can't share that realization.
t h e 2 6 0 0
GTE Mysteries
Dear 2600:
I'm the kind of guy that likes to
just try things for the hell of it
(what's this button for??) . You
know, to see what happens or just
for the sake of knowing something
new, even if it's "useless". Anyway,
that's how I stumbled upon this
little telephone episode.
I live in the "south bay� region
of Los Angeles and my phone com­
pany is the infamous GTE. Just
recently, I had the "Smart Pack"
features (call forward, call waiting,
call conferencing, and speed call­
ing) added to my service. Anyway, I
dialed my own number, for what­
ever reason, and much to my sur­
prise, I did not get a busy signal.
What I got instead were four short
beeps (sounding just like "conver­
sation being recorded" beeps)
spaced apart about a half second
each. Then I'm disconnected and
just dead silence. I waited a few
seconds, pushed assorted buttons,
nothing. Then a nice steady tone
like one would get calling a long
distance 800 number. Not knowing
why, how, or what to do, I just
pushed more tones. Nothing. Then
the nasty "line off the hook" tone
comes blasting through, so I hung
up.
Are you familiar with an inci­
dent such as this? Is this related
to the Smart Package? GTE? Freak
of nature? Sorry I can't tell you
what ESS is in use here. If you
haven't already guessed , I am a
novice at phone hacking.
By the way, I love your publica-
Page 28 2600 Magazine Winter 1989-90
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel
Communist and Capitalist Payphones in Eastern Europe and Israel

More Related Content

What's hot

The future of__the_internet
The future of__the_internetThe future of__the_internet
The future of__the_internetAmorim Albert
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityDoug Thompson
 
Delivering Critical Information and Services [JavaScript & Friends 2021]
Delivering Critical Information and Services [JavaScript & Friends 2021]Delivering Critical Information and Services [JavaScript & Friends 2021]
Delivering Critical Information and Services [JavaScript & Friends 2021]Aaron Gustafson
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
 
Prayas Session; Impact of Social Media by Rana Ghosh
Prayas Session; Impact of Social Media by Rana GhoshPrayas Session; Impact of Social Media by Rana Ghosh
Prayas Session; Impact of Social Media by Rana GhoshTenet Systems Pvt Ltd
 
Furture of the Internet
Furture of the InternetFurture of the Internet
Furture of the InternetDavidjonothan
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"Wendy Knox Everette
 
2600 v21 n2 (summer 2004)
2600 v21 n2 (summer 2004)2600 v21 n2 (summer 2004)
2600 v21 n2 (summer 2004)Felipe Prado
 
2600 v13 n1 (spring 1996)
2600 v13 n1 (spring 1996)2600 v13 n1 (spring 1996)
2600 v13 n1 (spring 1996)Felipe Prado
 
Internet ppt 2009
Internet ppt 2009Internet ppt 2009
Internet ppt 2009Lisa Stack
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comeducatedcommuni79
 
Internet safety
Internet safetyInternet safety
Internet safetyshoconnor
 
The Balanced Engineer
The Balanced EngineerThe Balanced Engineer
The Balanced EngineerDug Song
 
Magazine Feature
Magazine FeatureMagazine Feature
Magazine Featuredchin25
 
Evolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge OrganisationEvolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge OrganisationCollabor8now Ltd
 

What's hot (20)

The future of__the_internet
The future of__the_internetThe future of__the_internet
The future of__the_internet
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
 
Delivering Critical Information and Services [JavaScript & Friends 2021]
Delivering Critical Information and Services [JavaScript & Friends 2021]Delivering Critical Information and Services [JavaScript & Friends 2021]
Delivering Critical Information and Services [JavaScript & Friends 2021]
 
Technology By The Bay
Technology By The BayTechnology By The Bay
Technology By The Bay
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript
 
Prayas Session; Impact of Social Media by Rana Ghosh
Prayas Session; Impact of Social Media by Rana GhoshPrayas Session; Impact of Social Media by Rana Ghosh
Prayas Session; Impact of Social Media by Rana Ghosh
 
Furture of the Internet
Furture of the InternetFurture of the Internet
Furture of the Internet
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
 
2600 v21 n2 (summer 2004)
2600 v21 n2 (summer 2004)2600 v21 n2 (summer 2004)
2600 v21 n2 (summer 2004)
 
2600 v13 n1 (spring 1996)
2600 v13 n1 (spring 1996)2600 v13 n1 (spring 1996)
2600 v13 n1 (spring 1996)
 
Internet ppt 2009
Internet ppt 2009Internet ppt 2009
Internet ppt 2009
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.com
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Skype
SkypeSkype
Skype
 
The Balanced Engineer
The Balanced EngineerThe Balanced Engineer
The Balanced Engineer
 
Ht f43
Ht f43Ht f43
Ht f43
 
Internet
InternetInternet
Internet
 
Magazine Feature
Magazine FeatureMagazine Feature
Magazine Feature
 
Internet culture
Internet cultureInternet culture
Internet culture
 
Evolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge OrganisationEvolution of Social Media and its effects on Knowledge Organisation
Evolution of Social Media and its effects on Knowledge Organisation
 

Similar to Communist and Capitalist Payphones in Eastern Europe and Israel

2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)Felipe Prado
 
2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)Felipe Prado
 
2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)Felipe Prado
 
2600 v12 n4 (winter 1995)
2600 v12 n4 (winter 1995)2600 v12 n4 (winter 1995)
2600 v12 n4 (winter 1995)Felipe Prado
 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)Felipe Prado
 
2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)Felipe Prado
 
2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)Felipe Prado
 
E Business Overview Edit
E Business Overview EditE Business Overview Edit
E Business Overview EditMrirfan
 
Zittrain thefutureoftheinternet
Zittrain thefutureoftheinternetZittrain thefutureoftheinternet
Zittrain thefutureoftheinternetweichengwendao
 
2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)Felipe Prado
 
2600 v03 n11 (november 1986)
2600 v03 n11 (november 1986)2600 v03 n11 (november 1986)
2600 v03 n11 (november 1986)Felipe Prado
 
2600 v17 n2 (summer 2000)
2600 v17 n2 (summer 2000)2600 v17 n2 (summer 2000)
2600 v17 n2 (summer 2000)Felipe Prado
 
2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)Felipe Prado
 
Bill gurleys-above-the-crowd-compilation (1)
Bill gurleys-above-the-crowd-compilation (1)Bill gurleys-above-the-crowd-compilation (1)
Bill gurleys-above-the-crowd-compilation (1)tylerboone
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)Felipe Prado
 
How To Write Woring Paper In Mun Https Static1 Squ
How To Write Woring Paper In Mun  Https Static1 SquHow To Write Woring Paper In Mun  Https Static1 Squ
How To Write Woring Paper In Mun Https Static1 SquAlexis Naranjo
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)Felipe Prado
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxsmile790243
 
Information Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxInformation Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxannettsparrow
 

Similar to Communist and Capitalist Payphones in Eastern Europe and Israel (20)

2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)
 
2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)
 
2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)2600 v16 n4 (winter 1999)
2600 v16 n4 (winter 1999)
 
2600 v12 n4 (winter 1995)
2600 v12 n4 (winter 1995)2600 v12 n4 (winter 1995)
2600 v12 n4 (winter 1995)
 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)
 
2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)
 
2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)
 
E Business Overview Edit
E Business Overview EditE Business Overview Edit
E Business Overview Edit
 
Zittrain thefutureoftheinternet
Zittrain thefutureoftheinternetZittrain thefutureoftheinternet
Zittrain thefutureoftheinternet
 
2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)
 
2600 v03 n11 (november 1986)
2600 v03 n11 (november 1986)2600 v03 n11 (november 1986)
2600 v03 n11 (november 1986)
 
2600 v17 n2 (summer 2000)
2600 v17 n2 (summer 2000)2600 v17 n2 (summer 2000)
2600 v17 n2 (summer 2000)
 
2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)
 
Bill gurleys-above-the-crowd-compilation (1)
Bill gurleys-above-the-crowd-compilation (1)Bill gurleys-above-the-crowd-compilation (1)
Bill gurleys-above-the-crowd-compilation (1)
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
How To Write Woring Paper In Mun Https Static1 Squ
How To Write Woring Paper In Mun  Https Static1 SquHow To Write Woring Paper In Mun  Https Static1 Squ
How To Write Woring Paper In Mun Https Static1 Squ
 
Policy Implications of the Digital Economy
Policy Implications of the Digital EconomyPolicy Implications of the Digital Economy
Policy Implications of the Digital Economy
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
Information Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docxInformation Sharing, Dot Connecting and Intelligence Failures.docx
Information Sharing, Dot Connecting and Intelligence Failures.docx
 

More from Felipe Prado

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryFelipe Prado
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...Felipe Prado
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsFelipe Prado
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionFelipe Prado
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101Felipe Prado
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentFelipe Prado
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareFelipe Prado
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...Felipe Prado
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationFelipe Prado
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceFelipe Prado
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionistFelipe Prado
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksFelipe Prado
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityFelipe Prado
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsFelipe Prado
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchFelipe Prado
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...Felipe Prado
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksFelipe Prado
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationFelipe Prado
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncFelipe Prado
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesFelipe Prado
 

More from Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Communist and Capitalist Payphones in Eastern Europe and Israel

  • 1.
  • 2. A a �.4 - " ' MORE COMMUNIST PAYPHONES In Czechoslovakia CAPITALIST PAYPHONES In Israel
  • 3. 2600 (lSSN 0749-3851) is pllblished qlUUterly by 2600 EnlerpriSl!s inc. 7 Slron/:'s Lane. SelaWcel. NY 11733. Second class poslage pennil paid al Selau/ccl. New York. POSTMASTER: Send address changes 10 2600, P.O. Box 752,Middle Island, NY 11953-0752. Copyright (c) 1989,2600 Enterprises, Inc. Yearly subscription: U.S. and Canada -. $18 individual, $45 corporate. Overseas _. S30 individual,$65 corporate. Back issues available for 1984,1985. 1986, 1987,1988 at $25 per year. $30 per year overseas. ADDRESS ALL SUBSCRIYfION CORRESPONDENCE TO: 2600 Subscription Dept.. P.O. Box 752, Middle Island, NY 11953-0752. FOR LETTERS AND ARTICLE SUBMISSIONS, WRITE TO: 2600 Editorial Dept., P.O. Box 99, Middle Island, NY 11953-0099. 2600 Office Line: 516·751·2600,2600 FAX Line: 516-751-2608 STAFF Editor-In-Chief Emmanuel Goldstein Artwork Holly Kaufman Spruch Design Zelda and the Right Thumb Writers: Eric Corley, John Drake, Paul Estev, Mr. French, The Glitch, The Infidel, The Plague, David Ruderman, Bernie S., Lou Scan non, Silent Switchman, Violence, and the growing anonymous bunch. Remote Observations: Geo. C. Pilyou Winter 1989-90 2600 Magazine Page 3
  • 4. the day the phone system We all knew the day would come. And at least some of us were prepared for it. But, as usual, the vast majority had absolutely no idea what was going on. AT&T was hit hard by a computer worm on January 1 5. That is a fact. And after reading the technical expla­ nation below, you'll see why this is so. But AT&T wasn't the only entity hit by this worm - we all were, some far more than others. The inability to get through, the denial of access, coupled with the blind faith we put in technolo­ gy, the unwillingness to spread infor­ mation so we can all understand the process. Ye a h , it was f u n f o r t h e phone phreaks as w e watched the net­ work crumble. But it was also an omi­ nous sign of what's to come. In t h e words of a h i g h - r a n king AT&T person, "very little cou ld have "The news here isn't so much the failure of a computer program, but the failure of A T& T's entire structure. " gone worse". According to AT&T, of 1 48 million attempts, only 50 million went through. Many claim it was far worse than that. But what was it that actually hap­ pened? Here's what we were able to determine: The p ro b l e m started in a 4ESS machine in New York. Th e 4ESS is used to route calls and is basically, in the wo rds of a Bell Lab technician, "nothing more than a big computer". New York, for reasons unknown, sent out a broadcast warning m e ssag e (BWM), which triggered all of the 1 1 3 other 4ESS m ach i n e s a ro u nd t h e nation to d o likewise. Why did t h is h appen now? Wel l , back i n t h e late seventies, Bell Labs developed a com m o n c h a n n e l sig­ nalling system known as System Six or CCS 6 . Internat io nal stand ards have been developed over the past couple of years wh ich necessitated som e change on AT&Ts part. So CCS 7, or System Seven, was introduced. Somewhere inside System Seven is where the problem lurked, undetected, until January 15. Acco rd i ng to e x p e rt s , Syst e m Seven i s a much more flexible system and that's why it's become the interna­ tional standard. It's actually more of a protocol to which each company m ust adjust. They don't all use the same software. AT&T uses its own software, British Telecom uses something differ­ ent, U.S. Sprint uses something else, etc. S o m e AT&T peop l e , aided by well-meaning but ignorant media, were spreading the notion that many com­ pan ies had t h e same software and therefore could face the same problem someday. Wrong. This was entirely an AT&T software deficiency. Of course, other companies could face complete­ ly different software proble m s. B ut, then, so too could AT&T. The 1 1 4 4ESS m achines aro u nd t h e co u n t ry h ave n e w software i n st a lled periodically. When t h is is done, it's done gradually, circuit by cir­ cuit, one machine at a time. The net­ work is presently configu red so that the 4ESS mach ines have some cir­ cuits consisting of both System Six and Syst e m Seve n . E v e nt u a l l y , Page 4 2600 Magazine Winter 1989-90
  • 5. REALLY died though, all ties to the Six will be elimi­ nated. "There's no reason to be con­ cerned with this," AT&T says. "We've had some major changes in the net­ wo rk in t h e l ast t e n ye ars. I n fact , we've had quite a few in the last three or four. They've always been for the better." B ut w h at cau s e d t h e p rob l e m ? Exactly the right situation occurred at the right moment for a particular event to occur. Possibly the fact that January 15th was a holiday had something to do with it. Traffic was fairly low, which was u n u s u a l f o r a M o n d ay . It's assumed that the problem originated in a particular component known as Co m m o n N etwork I n t e rface ( C N I ) Ring. The re i s a com ponent o f that ring that allows the 4ESS to transmit messages across the ring and across t h e Co m m o n C h a n n e l S i g n a l l i n g Network. What apparently happened was that there was a flaw of some kind in the software in one of those rings. The bogus BWM from New York was sent out and it caused an excess of messages going to other 4ESS loca­ tions. A snowball effect began and the congestion spread and grew rapidly. All of the 4ESS machines were effect­ ed within half an hour. Sounds like a worm to us. Not the kind t h at g ets spread d e l iberately. Th e re are p l e nty of p ro g ra m m i n g errors that cause accidental worms. It could happen to any computer system. P h o n e c a l l s w e re forced off of System Seven and onto System Six. The problem was fixed by overwriting part of the software, in effect, bypass­ ing it. But, at press time, the specific cause still hadn't been made known. The name of the organ ization of Bell Labs software people trying to fig­ ure all of this out is NESAC, National E l ect ro n ic Switc h i n g Ass i stance Center. They're worki ng out of Ly le and Indian Hill, Illinois. Lack of Redundancy One expert said , "There's been a t e n d e n cy i n t h i s co m pa n y to save money by centralizing operations and m aking t h i ngs bigger. And that has made the whole system more vulnera­ ble." There is much less redundancy in today's system , meaning there is less of a backup. The current infatuation with fiber optics that certain long dis­ tance companies have (AT&T includ­ ed) spells certain trouble because of the lack of redundancy in these cheap systems. The problem occurred in a part of t h e sig nal l i ng system t h at doesn't carry voice traffic. It's known as "out­ of-band signalli ng" because it's out­ side the band that carries the actual conversation. Data, such as the num­ ber called and the number calling, is s e nt over t h i s pat h . A m o n g ot h e r things, this prevents blue boxing since s u bscribe rs h ave no access to the routing signals. And that's basically all we know at this stage. What we don't know is how a major force in com munications like AT&T could be so sloppy. What hap­ pe ned to backups? S u re, co mputer systems go down all the time, but peo­ ple making phone calls are not the same as people logging onto comput­ ers. We must make that distinction. It's not acceptable for the phone system or any other essential service to "go down". If we continue to trust technolo­ gy without understand ing it, we can look forward to many variations on this theme. AT&T owes it to its customers to be prepared to instantly switch to another (continued onpage 46) Winter 1989-90 2600 Magazine Page 5
  • 6. Morris Found Guilty Robert T. Morri s Jr. , the 25- year-old Cornell student responsi­ ble for the Internet Worm , was found gUilty on January 22 of fed­ eral computer tampering charges in Syracuse, NY. He now faces five years i n prison and a $250,000 fine. He was the first person to be prosecuted under a portion of the 1 986 Computer Fraud and Abuse Act. A hearing is set for February 27 in Albany, NY. Sentencing will probably be scheduled then. The gov ernment argu ed that Mo rri s i ntenti onal l y w ro te the worm program to break into "fed­ eral interest" computers he was not authorized to use, and by doing this prevented their authorized use �d caused a minimum of $1,000 m damage. . Several jurors said it was ObVI­ o u s Morri s didn ' t i ntend to do damage. But they say the damage would never have happened i f Morris hadn't put the worm there. None of the jurors owned a home computer. One j u ro r said of Mo rri s , "I bel i ev e h i s integri t y . I did not beli eve there was any m alice intended." Another said Morris was "not a criminal. I don't think he should go to jail. I don't think jail would do anything for him. To me j�il . is for criminals, and he' s not a cnmmal. I think somebody should thank him our in the end." In its November 26, 1 988 edi­ tion shortly afte r the Inte rne t Worm m ade i t s appearance, the New York Times described Morris as "fascinated with powerful com­ puters and obsessed with the uni­ verse created by interconnected networks of machines". Last year Senator Patrick Leahy of Vermo nt s a i d , "We c annot unduly inhibit that inquisiliv� 13- year-old, who, if left to expenment today, may, tomorrow, develop the telecommunications or computer techno l o g y to l e ad the United States into the 21 st century." He also expressed doubts that a com-­ puter virus law of any kind would be effective. There is no doubt that Robert Morris Jr. has a lot of potential. There seems to be no doubt that he ' s an honest person. Even the prosecution seems to believe this. We all know that he was the person responsible for the Internet Wo�. S o , w i t h all of thi s i n m i nd , I t seems as i f the last few weeks have been a tremendous waste of time for everyone. Ye s , he d i d i t . H e admitte d doing it. He didn't mean to cause damage, but he made � progran:­ ming error. The shockmg fact IS that one programming error could cause so much confusion. Add to that the fact that the holes he made use of were common knowledge to Page 6 2600 Magazine Winter 1989-90
  • 7. ever-changing world the Internet community. Yet, noth­ ing was done to close the holes until after all of this happened. It seems like someone should answer for this neglect of responsibilities. And let ' s not fo rget one other important fact. Mo rri s nev e r logged into another computer sys­ tem without authorization. There is no proof that he ever planned to. He simply sent out a program to collect data - through normal and legal channels. It was data he never should have had access to, but thanks to the holes in the system, he did. Morris made a mistake. That's all a part of the le arning game, which he ' s now been banished from. This technology is still in its infancy and, like any system, its limits need to be constantly tested. We're making a very grave error if we choose to simply focus upon the debatable legalities of what he did, rather than learn from what he's taught us. We're damn lucky it was Morris who did this. Because if a mali­ cious or immature person had done it first, the damage would have been real. Real Damage A rather nasty "troj an horse v i rus" has been showing up on floppy disks throughout Europe, Africa, and California. More than 10,000 floppy disks labeled "AIDS Information Introductory Diskette" have turned up. After a random number of times, the program will format the hard drive and destroy all data on it. PC Business World Magazine says its mailing list had been used by the unknown creators of this mischief. They're offering a free program called "AIDS OUT" to anyone who was hurt by the diskette. If nothing else, this inci­ dent may remind people that run­ ning unknown software in this day and age is a risky thing to do. It's estimated that the cost of putting thi s whole prank to gether w as about $20,000 which is a crime in itself. Jailed for Incompetence? A Georgia man is facing up to 15 years in jail for illegally access­ ing a computer. He was convicted in November. The difference here is that the defendant claimed inno­ cence because of technical igno­ rance. Legal experts say this could be a trend-setting case, where users could become legal scapegoats for system crashes. New Technology Imagine a day when you can use any calling card number (AT&T, Sprint, MCI, and all the others) to make local calls as well as long distance ones. Imagine a day when Winter 1989-90 2600 Magazine Page 7
  • 8. news and happenings the Sprint operator will actually accept a S print c alling c ard ! Imagine not being confused. It all could happen as Bellcore develops a new, though temporary, system for handling calling cards. The plan calls for 14 digit credit card numbers. The first six digits would be known as the C ard I s suer Identifier (CIID) . That would be different for every company. The next four digits would be the cus­ tomer account number and the last four would be a personal identifi­ cation number. The plan is being developed as a quick and tempo­ rary way of allowing alternate long distance companies to use calling cards to process local calls. The whole thing will be reevaluated in 1991. One problem we find is the shortness of the customer account code (four digits? I). Why is the company given six digits? Are there a million companies? Perhaps they're not explaining this proper­ ly. It wouldn't be the first time.... And Things To Play With New York Telephone has a new toy that allows them to fire even more employees. Now, when you dial zero plus a number and hit another zero at the tone, you get a computerized menu, which says, "For collect calls, dial 11; to charge this call to another number, dial the complete billing number now; for person-to-person and other calls, dial 0 for the operator." When you dial 1 1 , you're asked to record your name. The advantage here is that your name can be anything you want, like "Call Me B ack". The system uses voice recognition when asking the called party i f the y accept. The caller' s mouthpiece is cut off during this procedure, so you can forget about accepting your own call. Also, the system won 't accept a response that begins before it finishes asking the question. This helps eliminate ans wering machines that may inadvertently say "yes" at some point. Thi rd party billing is only verified when you place the call from a payphone. The system asks you for your name at that point. It's fun to play with, but once again, ultimately a ripoff for the average consumer. The rates haven' t gone down, even though it's pretty obvious that this system will save New York Telephone a bundle. But the worst part of all is for those people who have resisted getting a touch tone phone (and paying the unfair m onthl y and "installation" fees). Instead of get­ ting an operator a couple of seconds after the initi al tone, pulse cus­ tomers must sit through the entire menu before the system finally con­ nects them to an operato r. The waiting time for an operator under the old system: three seconds after (continued on page 42) Page 8 2600 Magazine Winter 1989-90
  • 9. n}JnBX data by The Plague (Special thanks to Kornflake Killer) The following information and data relates to the NYNEX (New York & New England Telephone) tele­ phone switching system. Most of the artide is a huge database of New York Telephone centers further suI>­ divided by sector. It contains useful information on every switch in the NYNEX system. This information is very handy in social engineering, plotting network switching maps, and finding out particularly useful infonnation about your Central Office. There is usual­ ly more than one switch per central office. Since step­ by-step offices tend to be good for blue boxing, this infonnation could come in handy. In the database the following fields exist: SECTOR - this is Nynex terminology for a large inter-office and billing center (i.e., Williamsburg or White Plains). All switches throughout NYN EX are cormected to one of these main centers. The following New York sectors are estabished by NYNEX: (Sector:Switching Type:Location) ALBY:D200:Albany BING:IAES:Binghamton BUFF:D200:Buffalo C!SP:4ESS:Central Islip GDCY:4ESS:Garden City NY 21:4ESS:Soho NY38:4ESS:East 38th St POUG:5ESS:Poughkeel"'ie SYRA:D200:Syracuse WHPL:4ESS:White Plains WLMG:4ESS:Williamsburg CLL! c od e - Common Language Location Identification. This is Bell system shorthand for the location and type of the switch. You can refer to Bell Labs and Bellcore literature or the October 1987 issue of 2600 for more details. A CIL! code consists of II characters. The f"lfSt 4 characters define the town, the next 2 characters define the state abbreviation, the next 2 the building ID, and the last 3 the building sub­ division. Example: NYCMNY42CGI is New York City Manhattan, NY, 42nd street, Control Group I (repre­ senting a I, lA, 2, 2B, or 3ESS switch). SWITCH TYP E - The switch type, can be one of the following : AESS, l ESS, ISXS, 2B ESS, 350ASXS, 3556ASXS, 355ASXS, 356ASXS, 360ASXS, 3ESS, 5XB, DlO, DlOO, D5E, NCXB, RSM, RSS. (XB ; Crossbar, ESS ; Electronic Switching Sy stem, SXS - Step by Step, D ; DMSlDigital, R ; Remote) V & H - These are n u mbers u sed by Bell Companies to represent Vertical and Horizontal loca­ tion. These are integers which are offsets from a fixed point on the earth designated by the phone company. These numbers are used in calculating distances between central offices as well as for network plan­ ning. Any entries in the following databases which have the same V & H are in the same building!loca­ tion. You should read Bell Labs and Bellcore literature to f"md out more about V & H and netwOlk planning. HOST Switch - This field is shown only for those switches which are remote in nature (RSM and RSS). This field is simply the CLL! code of the host switch that connects to the remote switch. This artide should be used as reference material, and doesn't go into explaining any detail s about switching. Refer to other artides and Bell literature for that infonnation. You may need a magnifying glass to read all of this but it was the only way we could fit it in the issue. Fields are separated by the : symbol. If there is a HOST switch present, it appears on the following line indented. Rew York relepb.one Sect:CLLI Code:S.Typ:V:&: ALBY:CMBRNYCM 6 7 7 arH: 4 537:1 633 ALBY:CMBRNYCMRS 1 :RDGT:UNK:UNl<: ALBY:GNWCNYGWR S I :ROGT:UNK:UNl<: TROYNY030S 0 Bo.t Switch MBY:ALBYNYGDCGO : lES :4 6 4 0:1 6 5 3 MBY:ALBYN YS SCGO : l AE S: 4 6 4 0 :1 630 ALBY:ALBYNYS SCGl : l AE S : 4 6 4 0 :1 630 ALBY:ALBYN Y S S D S I :DGT1,:UNK:UNK ALBY:ALBYNYWACGO : lAES: 4 639:1 6 4 0 ALBY:ALMTNYALCGO :3ES:4 65 7:1 6 7 2 ALBY:AMS TNYP E D S O :DGTL:UNK:UNK ALBY:AMSTNYPEMGO: 5 XB:4 632:1 7 2 5 MBY:ARGYNYAYR S I :RSS :4 511:1 6 7 5 : GLFLNYGFCGO ALBY:AVPKNYAV 6 7 4:OTH:4 6 2 3:1 6 0 2 ALBY:AVPKNYAVRS 1:RIX.;T:UNK:UNK: MBYN Y S S D5 0 ALBY:BAL S NYBACGO:2 B E S: 4 5 8 8 :1 6 8 9 ALBY:BERNNYBRMGO :5XB:4 67 7: 1 6 6 7 AL B Y:BERNNYBRRS1:RDGT:UNK:UNK: S S CHNYSOD S O ALBY:BLLNNYBGRS1:R S S :4 4 7 2:1 7 3 9: GLFLNYGFCGO ALBY:BRNVNYBW4 25 :OTH:4 28 2:1 9 6 1 ALBY:CAIRNYCACGO:3£S:4 7 2 5:1 6 1 5 MBY:CBLSNYZB234 :S X S:4 7 0 6 :17 2 7 ALBY:CBLSNYZBRS1:ROOT:UNK:UNK: S S CHNYSOD S O ALBY:CHTGNYZH4 97 :OTH:4 2 7 5: 1 9 7 6 ALBY:CLPKNYC P D S O:DGTL:UNK:UN K MBY:CLPKNYCPMGO:5XB:4 60 9:1 6 5 9 ALBY:CLVLN YCKRS1: R S S :4 6 7 2 :1 6 4 6 : ALBYNYGDCGO ALBY:CLVRNYCVCGO :3E5:4 7 13:15 7 0 TROYNY03DSO ALBY:CNBRNYCo8 68:arH: 4 68 6:1 712 ALBY:CN BRNYCDRS1:RDGT:UNK:UNK: S SCHNYSOD S O ALBY:CSTNNYCs732:cYrH: 4 6 60 :1 613 ALBY:CTBRNYCBRS 1: 5RSM:UNK:UNK: TROYNYO 30S0 ALBY:CTSKNYCT D S O:DGTL:UNK:UNI< ALBY:CT S KNYCTMGO: 5XB: 472 6:1 5 4 7 ALBY: OLMRNYDMCGO: 2BE5 :4 6 5 2:1636 ALBY: OLSNNYDL 8 9 5:arR:4 6 6 6:1 6 9 7 ALBY: DNMRNYDNRS1 :ROGT:4 2 7 7:1 9 0 5 : P LBGN Y P B D S O ALBY:EGLVNYGLCGO: 2BES :4 613:1 683 ALBY:EGNBNYEG4 7 7: SXC: 4 6 4 5 : 1615 ALBY: EGNBNYEGRS 1: 5RSM:UNK:UNK: ALBYN Y S S O S O ALBY:ELDPNYEU 5 9 4 :arH: <12 53:1 9 4 a ALBY: ES PRNYER 8 7 5:arH: 4 6 6 9 :1 7 0 9 ALBY: EZTWNYEZRS 1: RDGT:4352; 1 8 2 0: TCNDNY'l'IDS O ALBY:F"RHONYFHRS1 :RDGT:UNK:UNI<: CTS KNYCTD S O ALBY:FRHDN'fFR S G l :OOH: <1 7 2 0 :1 6 2 8 ALBY: FTANNYFARS 1: R S S: 4 4 81:1 6 9 9: GLFLN YGFCGO ALBY: FTCVNYFC3 5 8:arH:4 3 0 2 :2 0 3 6 ALBY: FTCVNYFCDS O:DGTL:UNK:UNK ALBY:GLFLNYGFCGO: IAES:4 51 4 :1 7 0 5 ALBY:GLWYNYGWCGO:3ES: <1 6 03:1 7 1 4 ALBY:GNWCNYGW 6 9 2:arH: 4 5 3 9:1 6 5 7 Winter 1989-90 ALBY:GRCTNYGC8 93:OTH:4 5 6 4 : 1 7 0 6 ALBY:GRCTN YGCRS1:5 RSM:UNK:UNK: TROYN Y03 OS 0 ALBY:GRVGNYGVRSI :RDGT:UNK:UNK: CTSKNYCTDSO ALBY:GRVGNYGVSGI :OTH: 4 7 0 7: 1 633 ALBY:GRV INYGEMGO:5XB:4 4 60: 1 6 7 0 AL BY:GRV I N YGERSI :RDGT:UNf<:UNK: SRSPNYSRDSO ALBY:HAGUNYHQRS1:RDGT: 4 4 2 4 :1 7 4 5: TCNDNYT I D S O ALBY:HDFLNYHURS 1:RDGT:UNK: UNK: SRSPNYSROS 0 ALBY:HDFLN'!HUSGI :SXS :4 510: 1 6 9 6 ALBY:RDSNNYHDD S O :DGTL: 4 7 13:1 5 8 1 ALBY:HNTRNYHNCGO :3ES: 4 7 6 1:1631 ALBY :HRFRNYHRRS1:RSS :4 4 8 4:1 6 8 0 : GLFLNYGFCGO ALBY:HSFLNYH S 6 8 6:SXS :4 5 5 6: 1612 ALBY:HSFLNYHSRS1:RDGT:UNK:UNK: TROYNY03DS O ALBY:JNVLNYJVCGO:3ES :4 6 0 1:1 6 7 3 ALB'!:JNVLNYJVRS I :RDGT:UNK: UNf<: SRSPNYSRDS O ALBY :f<NVYNYKVRS 1:RDGT: 4373:1 8 4 2 : TCNDNYT I D S O ALBY:KTBAN YKBRS 1:R S S:<1 4 8 8: 1 7 2 3: GLFLNYGFCGO ALBY:LKGRNYLRCGO:3ES: 4 5 0 1:1 7 2 9 AL B Y:LKPCN YLACGO:3£S : 4 3 7 7:18 7 9 ALBY:LTHMNY'l'SCGO :1E S:4 6 2 3:1 6 4 4 2600 Magazine Page 9
  • 10. every Dentral offioe ALBY:LXTNNYLXRS):1ooT: UNK:UNK: CTSKNYCTDSQ ALBY:LXTNNYLXSGI :OT8:4T10:1653 ALBY:LYH'l'NYLORSl:RDGT: 4292:1929: PLBGHYPBDSO ALBY:MALNNYMMDSO:DGTL:UNK:UHK ALBY:MALNNYMI'I1GO:5XB:4308:1992 ALBY:MAllVN'iMV864:OT8:4644:1699 ALBY:MCRVNlMCRS) :SllSM:UNX:UNK: TRQYNY03DSO ALBY:HIVLNYNVllS):RooT: 4361:1192: TCNDNYTIOSO ALBY:HOIRHYMYS29:OT8:4336:2020 ALBY:HOI1UfYMYllSl :RDGT:UNK:UN1C: MALNNnt4DS0 ALBY:NGRNNYNGDSO:DGTL:UNlC:UHK ALBY':NGRNNYNQ!GO:5XB:4625:1624 ALBY:OKHLHYOBRS I:IlDGT:UNK:UNl(: CTSKNYCTDSO ALBY:OKRLNYOBSGI :OT8:4120:1649 ALBY:PEllUNYPECGO:31:5:4282:1861 ALBY:PBMTNYPHSGI:OTH:4699:1563 ALBY:PLBGNYlBOSO ;OGTL:42S5:1869 ALBY:PLVLMYlLRS):ROGT:UNK:UNX: CTSKNYCTOSO ALBY:PLVLNYPLSGI :OTB :4148:1601 AI.BY:PRVINYlIlRSl:IlDGT:UNX:UNK: CTSKNYCTOSO ALBY:PRVINYPRSGI :OT8:476 3:1612 ALBY:PTBWNYPORSI:RooT: 01368:1181: TCHDHYTIDSO ALBY:PTNMNYl)(RS1:RDGT: 4414:1132: TCHDHYTIDSO ALBY:P'M'WNYl IRS1:RSS:4585: 1621: TROYHY04CGO ALBY:IlCVLHYll8294:008:4121:1131 ALBY:IlCVLHYllfl1lS1:IlOGT: UHK:UHK: SS CBNYSODSO ALBY:RNLlCNYllLCGO:3E5 :4592:1614 ALBY:RHLKNYR.LIlSI :1l00T:UHK:UHK: SIl5PNYSAOSO ALBY:SALMNYS H85:4:OTH:4501:1646 ALBY:SALMNY5H1lSI:AooT: UHK:UHK: TROYNY03DSO ALBY:SBTBNYSBCGO:3ES:4663:1623 ALBY:SCBHHYSCCGO:lAES: 4629:1615 ALBY:SCLKHYQXRS1 lRSS:4433:1191: GLFLNYGFCGO ALBY:SBSPNYQS284 :OOB:4699:1160 ALBY:SBSPNYQSRSI :ROGT:UNK!UHI(: SSCRNYSODSO ALBY: SHVLNYSVllS1:5RSH: UHK: UNK: TROYNY03DSO ALBY:SRFLNYQR856:OTS:4362: 2000 ALBY:SRFLNYQIUlSI :ROGT:UNK:UHK: HALNNYM"IDSO ALBY:SRLlCNYQLDSO:DGTL:UNK:UNK ALBY:SRLKNYQLHGO:5XB:4384:1902 ALBY:SRNCNYQCRSI:RooT: 4288:1898: PLBGNYPBDSO ALBY:SRS PNYSRDSO:DGTL:UNK:UNK ALBY:SRSPNYSRHGO:5XB:4568:1691 ALBY:SSCBNYSOOSO:DGTL: UNK: UNK ALBY:SSCBNYSCMGO:5XB:4631: 1613 ALBY:TCNONYTIDSO:OCTL: 4401: 1751 ALBY:TNVL'NYTNMGO: 5XB: 4156: 1618 ALBY:THVLNYTNASI:RDGT:UNK:UNK: CTSKNYCTDSO ALBY:TPLlCNYTL359:SXS: 4434:1930 ALBY:TPLlCNYTLDSO:DGTL:UNK:UNK ALBY:TIlOYNY030S0:5ES:UNK:UNK ALBY:TROYNY04CGO:lES:4620: 1632 ALBY:VLFLNYVF753:OTS:4518:1639 ALBY:VLFLNYVl'RSI:ROOT:UNK:UNK: TROYNY03DSO ALBY:VRB.VNYVICGO:3ES: 4656: 1652 ALBY :NEllLNYlfLRSI:RSS:4692:1654: ALBYNYGDCGO ALBY:NBTHNYUBMGO:5XB :4448:1108 ALBY:NLBaiYUB963:OTS:4308: 1815 ALBY:WLBaiYUBIlSl:RooT:UNK:UNI(: PLBGNYPBDS0 ALBY:WNBHN�GO:5XB:4148:1648 ALBY:WNRHNYWHRSI:RDGT:UNK:UNK: CTSlCNYCTDSO ALBY:NRBGNYWURS1: RSS: 4495:1146: GLFLNYGFCGO BING:ARPTNYAR295 :ars: 5051:2110 BING:ARPTNYARRS1: ROGT:UNK:UNK: CRNGHYCGOSO BING:AVOCNYAC566:arB: 5029:2075 BING:AVOCNYACltS1:RDGT:UNK:UNK: CRNGNYCGDSO BING:BATHNYBB176:SXS:5032:2052 BING: BATHNYBHRS1:RDGT:UNK:UNK: CRHGNYCG OSO BING:BGFLNYBF562:OTH:5033: 1916 BING:BGFLNYBFRS1:RDGT:UNK:UNI(: CRNGNYCGOSO BING:BNGSNYBYCCO: 1AES :4943: 1831 BING:BNGBNYBYDSO:DGTL:UNK:UNK BING:BNGBNYROMGO: 5XB: 4935:1824 BING:CANSNYCZ698 :orB: 5011:2082 BINC: CANSNYCZRS1:RDGT:UNK:UNK: CRNGNYCGOSO BING:CSVYNYZV264:OTH: 4711:1171 BING: CBVYNYZVDSO:ooTL: UNK:UNK BING: CliPBNYCP521:ora: 5040:2023 BING:CliPBNYCPRS1: ROGT:UNK:UN!C: CRHGNYCGOSO BING:CliRHNYCF695:ara: 5065: 2041 BING:CNSRNYCX545:OTB: 5052:2129 BING:CNSRNYCXltS1: 5RSM:UNK:UNK: CRNGNYCGDSO BING:CPTWNYZNCGO: 3ES:4144:1186 BING:CRNGNYCGOSO: 5ES:UNK:UNK BING:CTONNYZN524:orH:5056:1979 BING:CTONNYZNRS1: RDGT:UNK:UN!C: CRNGNYCCDSO BING: DVPTNYDTOSO:OGTL:UNI(:UNI( BING:EOTNNYET965 :OTH:4174:1821 BING: EOTNNYETOS0:ooTL:UNK:UNK BING:EMIRNYEMCGO: 1AES:5029: 1954 BING:ENDCNYENOSO:DGTL:UNK:UNK BING:GRGltNYGGS88:ors: 4162:1681 BING:GRGRNYGGDSO:ooTL:UNK:UN)( BING:HBRTNYSZOSO:ooTL:UNK:UNK BING:B.RNLNYBLMGO:5XB:506S:2091 BING:RRNLNYBLRS1:ROGT:UNJ(:UNK: CRHGNYCGDSO BING: BRWKNYBW293:arB:4162:1191 BING:RRNKNYBWOSO:ooTL:UNK:UNK BING: HSBONYHSRS 1:SRSH:UNK:UNK: CRNGNYCGOSO BING:HSBONYRBSG1:SXS: 5011:1965 BING:JRCYNYJCCGO:1ES: 4945:1831 BING: JRCYNYJCOSO:DGTL:UNK:UNK BING:LNDYNYLN523 :arR:5065:1993 BING:LNDYNYLNRS1:RDG'!':UNK:UNK: CRNGNYCGDSO BING:MAINNYMECGO: 3ES:4940:1869 BING:MLFRNYHUOSO:DGTL:4765: 1115 BING:NCBLNYNLOSO:DGTL:UNK:UNK BING:ONNTNYOAMGO:5XB:4199:1112 BING:OOEGNYOOOSO: OOTL:UNK:UNK BING: OWEGNYONOSO:DGTL:UNK:UNK BING:RXBYNYRX326:OTH: 4182: 1685 BING:SAVNNYSN583:OTH: 5032:2033 BING:SCBVNYQN638:ora: 4160:1154 BING:SCBVNYQNOSO:ooTL:UNK:UNK BING: SHFRNY'CJlJCGO:3ES: 4165:1108 BING:WRCSNY'Uc397 :01'S: 4146: 1150 BING: WRCSNYUCDSO:DGTL:UNK:UNK BING:WTGLNYHG535:SXS:4983: 1999 BING:WVR1NYWVS65:SXS: 5020:1901 BING:WVRLNYWVDSO:DGTL:UN1<:UN1< BUFF:AKRNNYA1(CGO:3ES:501'1:2294 BUFF:ALBNNYAIDSO:DGTL:4949:2282 BUFF:ALDNNYADCGO:3tS:5039:2219 BurF:AHHRNYHPCGO:lES:5040:2329 BUFF:AMBRNYHPDSO:DGTL:UNK:UNK BUFF:J.NGENY'AGRS1: ItSS:5102:2142: OLENNYRACGO BUFF:ANGLNYA0549:5XB:5133:2318 BUFF:ARCONYAEDS0:DGTL �UN1<:UNK BUFF:ARCONYAEHGO:5XB:5099:2225 Page 10 2600 Magazine Winter 1989-90 BUFF:ATTCNYATS91:SXB:UNK:UNK BUFF:ATTCNYATDSO:DGTL:UNK:UNK BUFF:BATVNYBTDSO:DGTL:UNK:UNX BUFF:BATVNYBTHGO:5XB:4993:2249 BUFr:BFLONYBACGO:lES:5065: 2322 BUFr:SFLOHYBADSO:OG'lL:UNK:UNK BUFF:BFLONYBAMG9:1XB: 5065: 2322 BUFF:BFLONYELCGO:IMS: 5010:2331 BUFF:BFLOOYFIlCGO: lAES: 5016: 2321 BUFF:BFLaiYHEOSO:DGTL:5064:2335 BUFr:BFLaiYMACGO:1AES: 5061:2329 BUFF:BFLOOYMAHGO:5XB: 5061: 2329 BUFr:BFLOHYSPCGO:ItS:5011: 2316 BurF:BFLONYSPOSO:DGTL:UNK:UNK BUFF:BFLONYSPMG9: 1XB:5011: 2316 BurF:BLFSNYBZRS1:RSS:5104:2159: OLENNYBACGO BUFr:BLMTNYBHRS1:ASS:5119:2134: OLENNYHACGO BUFF:BLSSNYBSDsO:DGTL:UNK:UNK Burr:BLVRNYBX928:5XB:5158:2132 BUFF:BRKRNYBKRS1:RSS:4966:2340: LCPTNYLKCGO BUFF:BSTNNYBNCGO:3ES:5108:2218 BUFF: BYRNNY8YDSO:DGTL: UNK:UNK BUFF:CHCKNYCEDSO :OGTL: UNl<:UNK BUFF:CHKTNYFRCGO:ItS:5063:2303 BUFr:CLCTNYMACGO:3£S :5031: 2311 BUFF:CLNCNYBACGO:3ES:5032: 2301 BUFr:CTRGNYSODSO:DGTL: UNK:UNK BUFF:CUBANYEM968:5XB:5141: 2166 BUFF:DNXRNYO}(MGO:5XB:5189:2339 BUFr: DRBYN'lDBCGO:3ES: S120: 2322 BUFF:EAURNYEAMGO:5XB: 5011:2219 BUFF:EDENNYEDCGO:3ES:5119: 2301 BurF:£LBlNYEBDSO:DGTL:UNX:UN1< BUrr:ELCVNYEVDSO:DGTL: UNK: UNl< BUFF:ELCVNYEVJlS1:RSS: 516'1: 2225: OLENNYHACGO BUFF:FKVLNYFJ(JtS1:RSS: 5136: 2204: OLENNYHACGO BUFF:FRSBNYFSRS1:RSS:5130:2145: OLENNYHACGO BUFF:rSVLNYFLDSO:OGTL:UNK:UNK BUFF:GDISNYGICGO: 2BES:5061:2354 BUFF:GSPTNYGPRS1:RSS:4991:2321: LCPTNYLKCGO BUFF:GWNONYGOCGO:3ES:515'1:2284 BUFF:BLLONYBOCGO:3ES:5089: 2253 BUFF:BLLYNYHECGO :3tS:4931:225'1 BUrl':HMBGNYHBDSO :DGTL: UNit: UNK BUFr:HMBGNYHBMGO:5XB:5102: 2301 BUFF:BNDLNYBIRS1:RSS:5158:2115: OLENNYHACGO BUFF:JAVANYJACGO:3tS:5015:2241 Burr:KENDNYKDDSO:DGTL:UNK:UNK BUFF:LCPTNYLKCGO:1AES:5008:2338 BurF:LMSTNY'LMRS1:ltSS:5208:2188: OLENNYHACGO BUFF:LNCSNYLCDSO:DGTL: URK:UNK BUFF:LNCSNYLOo'IGO:5XB:5054:2302 BUFF:LNCSNYLCMG1:5XB:S054:2302 BUFF:LSTNNYLNCGO:3ES: 5031:2384 BUFF:LTVYNYLIRS1:RSS:5183:2239: OLENNYHACGO BurF:LYVLNYLLRS1:RSS:4953:2316: LCPTNYLKCGO BUFF:HCHSNYMARS1:RSS:5124: 2219: OLENNYHACGO BurF:HDPTNYMPCGO:3ES:4980:2315 BurF:HEDNNYPAMGO:5XB:49'12:2304 BUFF:NCLNNYNOCGO:3£5:UNK:UNK BUFF :NGFLNy16CGO:2BtS: 5050:2364 BUFr:NGFLNYPOCGO:lAES:5053:23'15 BUFF:NGFLNYWOOSO:DGTL:UNX:UNK BUFF:NGrLNYNCliGO:5XB:5043:2369 BUFr:NWFNNYMACGO :3£s:4988: 2354 BUFF:OKrDNYOKQSO:DGTL:UNK:UNK BUFF:OLENNYHACGO:1AES:5180:2169 BUFF:ORPKNYSTCGO:2BES:5085:2296 Burr:PRTVNyPV933:5Ax-B:5179:2150 BUFr:RSFRNYRFRSI:RSS:5108:2184: OL£NNYHACGO Burr:ItSVLNYRVRSl:RSS:5014:23'15:
  • 11. • In nem NGFLNy76CGO BUFF:SDTNNYFIDSO DGTL:UNK:UNK BurF:SLCKN'fSICGO 3£5:5163:2325 BUFF:SLMNNyww945 5XB:5192:2216 BUFf:SPVLNYWHCGO 3E5:5125:2253 surF:SRPLNYSB2520TB:5275:2356 BUFF:SRPLNYSBDSO DGTL:UNK:UNK BUFF:TNWNNYTWCGO IllS:5050:234" BUFF:VRBGNYVBDSO DGTL:lJNK:UNK BUFF:WLSNNYMERSI RSS:4994:2373: LCPTN'fLKCGO BUFF:WLVLNYNM593 SXB:5129:2108 BUFF:WNKHNYWKCGO 28£5:5103:2313 BUFF:WSNCNYUNDSO DGTL:UNK:UNK BurF:WSNCNYUNMGO 5XB:5074:2304 BUFF:WSVLNYNCCGO lAES:5049:2319 BUFF:WTPTNYWRCGO 3£5:4935:2292 BUFF:YNTWNTITCGO 3£5:5025:2395 CISP:BBYLNYBNDSO DGTL:4939:1314 CIS? :BRWDNYBWDSO SES:4912:1311 CISP:BYSHNYBYDSO DGTL:UNK:UNK CISP:CALVNYSPRSO 5RSM:UNK:UlH(: RVRDNYRVDSO CISP:C!ofo1KN'fCMDSO 5[5:4911:1327 CISP:C�KNyC�GO 5XB:UNK:UNK CISP:CTCHNYCUOSO DGTL:UHK:UHK CISP:CTCHNYCUMGO 5XB:4191:1246 CISP:DRPKNYDPCGO 1AEs:4928:1321 CISP:DRPKNYDPMGO 5XB:4928:1321 CISP:EBTNNYEHMGO 5XB:4185:1200 CISP:ENPTNYENCGO lES:4906:1331 CISP:ENPTNYENDSO DG'I'L:UlU(:UHK CISP:ENPTNYENMGO 5XB:4906:1331 CISP:GPTSNYGPMGO 5XB:4112:1243 CISP:GPTSNYGPRSO ROGT:UHK: UNK: CTCBNYCUDSO CISP:BMB'fNYBBOSO DG'l'L:UNK:UNK CISP:HMB'fNYBBMGO 5XB:4836:1232 CISP:HNSTNYHUCGO lAES:4920:1344 CISP:HNSTNYHUDSO 5ES:UNK:UNK CISP:HNSTNYBUMGO 5XB:4920:1344 CISP:BNSTNYBUMGI 5XB:4920:1344 CISP:LHSTNYLBCGO 1£5:4946:1315 CISP:LHSTNYLBDSO 5ES:UNK:UNK CISP:MNTKNYMTD50 5ES:UNK:UNK: RVBDNYRVOS0 CISP:MNTKNYMTMGO 5XB:4139:1118 CISP:MSTCNYMCOSO 5r.s:UNK:UNK CISP:OCBHNYOBCGO 2£S:4929:1284 CISP:OCBHNYOBRSO 5RSM:UNK:UNK: BYSBNYBYDSO CISP:PCBGNYPBCGO lAES:4894:1280 CISP:PCBGNY'PBMGO 5XB:4894:1280 CISP:PJSTNYPJDSO DG'l'L:4870:1309 CISP:RNKNNYRNCGO lES:4894:1302 CISP:RNKNNYRNDSO 5ES:UNK:UNK CISP:RNKNNYRNMGO 5XB:4894:1302 CISP:RVHDNYRVDSO 5ES:4843:1256 CISP:SATNNYSNMGO 5XB:4821:1216 CISP:SGHRNYSGDSO DG'l'L:UNK:UNK CISP:SGHRNYSGMGO 5XB:4796:1211 CISP:SHHMNYSBDSO DG'l'L:UNK:UNK CISP:SEiHMNYSHMGO 5XB:4862:1292 CISP:SLDNNYSEDSO DGTL:UNK:UNK CISP:SLDNNYSEMGO 5XB:4819:1296 CISP:SMTWNYSMCGO I£S:4898:1311 CISP:SM'l'KNYSMDSO DGTL:UNK:UHK CISP:SMTNNYS!+1GO 5XB:4898:1317 CISP:STKTNYSKDSO DGTL:UNK:UNK CISP:STKTNYSKMGO 5XB:4876:1311 CISP:SYVLNYSADSO DGTL:4906:1286 CISP:WHBHNYWBDSO DGTL:UNK:UNK CISP:NHBHNYWBMGO 5XB:4859:1240 GDCY FLPKNYFPCGO lAES:4970:1367 GDCY FLPKNYFPDSO DGTL:UNK:UNK GDCY FLPKNYFPMG1 5XB:4910:1361 GDCY FRDLNYFMCGO lAES:4943:1333 GDCY FRDLNYFMUSO 5ES:UNK:UNK GDCY fRPTNYfPDSO DG'!'L:4912:1341 GDCY FRPTNYFPMG1 5XB:4912:1341 GDCY FRPTNYFPMG2 5XB:4972:1341 GDCY GLCVNYGCDSO 5£S:4940:1315 "9opk St a t e GOCY:GRCYNYGCCGO:lAES:4958:1355 GOCY:GRCYNYGCOS0:[x;TL:UNK:UNK GOCY:GRNKNYGHDS0:5ES:4962:1377 GDCY:HCVLNYHVCGO:IMS:4946:1348 GDCY:HCVLNYHVDSO:[x;TL:UNK:UNK GDCY:BCVLNYHVMG1:5XB:4946:1348 GDC'l:BCVLNYRVMG2:5XB:4946:1348 GOCY:HMPSNYHSDS0:[x;TL:4966:1354 GDCY:HMPSNYHSMG1:5XB:4966:1354 GOCY:LNBBNYLBDSO:DGTL:UN!::UN!: GDCY:LNBBNYLB/-CO:5XB:4991:1343 GOCY:LNBHNYLBMG1:5XB:4991:1343 GOCY:LVTIfNYLTDSO:DGTL:UNI<:UNK GOCY:LVTNNYLTMGO:5XB:4952:1341 GOCY:LVTNNYLTMG1:5XB:4952:1341 GDCY:LYBRNYLBCGO:1AtS:4978:1352 GDCY:LYBRNYLBDSO:DGTL:UNI<:UNK GOCY:MINLNYMIDS0:[x;TL:4961:1359 GDCY:MINLNYMIMG2:5XB:4961:1359 GDCY:MNHSNYMHDSO: SES:UNI<:UNI< GOCY:MNRSNYMHKiO:lXB:4958:1375 GDCY:MSPQNYHPOSQ:OGTL:4954:132<1 GDCY:HSPQNYMPMG1:5XB:4954:1324 GOCY: OYBANYOYMGO:5XB:4930:1364 GDCY:OYBAN'fOYRSO:5RSH :UNK:UNI<: GLCVNYGCDSO GDCY:PLVWNYFVCGO:1ES:4940:1344 GDCY:PLVWNYPVOSO:5ES:UN!::UNK GDCY:PTWANYPWDSO:5ES:UNK:UNI< GDCY:PTWANYP�O:5XB: 4952:1380 GOCY:RSLNN'lRODS0:DGTL:4953:1367 GOCY:SYOSNYSYOS1:[X;TL:UNI<:UNI< GOCY: WBYNNYNEDSO:DGTL:4954:1355 GDCY: WDMRNYFRDSO:DGTL:UNK:UNK GOCY:WDMRNYFRMGO:5XB:4987:1354 GOC'l:NOMRNYFRMGl:5XB:4981:1354 GDCY:NNTGNYWTCGO:lAES:4961:1334 GDCY:NNTGNYWTDS0:[X;TL:UNK:UNK GDCY:WNTGNYWTMGl:5XB:4961:133-4 GOC'f:yPHNNYYAMGO:5XB:4882:1282 N'f21:N'lCMNYl3CGO:1MS:4998:1404 NY21:NYCMNY13DS0:5ES:4998:1404 NY21:NYCMNYI3DS1:DGTL:UNK:UNK NY21: NYCMNY13MGl:lXB:4998:1404 NY21:NYCMNY13MG2:lXB:4998:1404 NY21:NYCMNY18CGO:lAES:4998:1407 NY21:NYCMNY18DSO:5ES:4998:1407 NY21:NYCMNYl8DS1:DGTL:UN!::UNK NY21: NYCMNYl8MGO:lXB:4998:1407 NY21:N'lCHNYl8MG1:lXB:4998:1407 NY21:NYCMNYI8MG2:1XB:4998:1407 NY21:NYCMNY30CGO:lAES:4995:1405 NY21:NYCMNY30CG1:lAtS:4995:1405 NY21:NYCMNY30DS0:[x;TL:UN!(:UN!( NY21:NYCMNY30MGl:lXB:4995:1405 NY21:NYCHNY30MG2:lXB:4995:1405 NY21:NYCMNY30MG3:lXB:4995:1405 NY21:NYCMNY36CGO:IES:4995:1408 NY21:NYCMNY36CG1:IMS:4995:1408 NY21:NYCMNY36CG2:lES:4995:1408 NY21:NYCMN'l36DSO:DGTL:4995:1408 NY21:NYCMNY36DS1:5ES:UNK:UN!( NY21:NYCMNY42CGO:IMS:4994:1407 NY21:NYCMNY42CGl:IAES:4994:1401 NY21:NYCMNY42CG2:1MS:4994:1407 NY21:NYCMNY42CG3:IAES:4994:1407 NY21:NYCMNY42DS0:DGTL:UN!::UN!: NY21:NYCMNY50CGO:1AES:4993:1409 NY21:NYCMNY50CG1:lAtS:4993:1409 NY21:NYCMNY50DSO:DGTL:4993:1409 NY21:NYCMNY50DS1:5ES:UN!::UNK NY21:NY01NY50DS2:DGTL:UN!(:UN!( NY21:NY01NY50MG2:lXB:4993:1409 NY21:NYCMNY50MC3:5XB:4993:1409 NY21:NYCMNY50MG4:5XB:4993:1409 NY21:NYCMNY50MG5:5XB:4993:1409 NY21:NYCMNYAAMGO:lXB:5002:1405 NY21:NYCMNYAPRSO:RDGT:4993:1409: NYCMNY50DSO NY21:NYCMNYBSCGO:lAES:5005 1404 NY21:NY01NYBSCGI:IAES:5005 1404 NY21:NYCMNYBSCG2:IAES:5005 1404 NY21:NYCMNYBSCG3:1AES:5005 1404 N'l21:NYCMNYBSCG4 lAtS 5005:1404 NY21:NYCMNYBSDSO DGTL UNI<:UNK NY21:NYCMNYBSDSI DGTL UNI<:UNK NY21 :NYCMNYBSDS2 DGTL UNK:UNI< NY21:NYCMNYSRRSO ROGT 4993:1409: NYCMNY50DSO NY21:NYCMNYSRRS1:ROOT:UNK:UNK: NYCMN'l50DS1 NY21:NYCMNYSRRS2:ROGT:UNK:UN!(: NYCMNY50DS2 NY21:NYCMNYSTCGO lAtS:S004:1405 NY21:NYCMNYSTCGl lAtS:5004:1405 NY21:NYCMNYSTDSO DGTL:UN!(:UN!: NY21:NYCHNYVSCGO lAtS:5002:1405 NY21:NYCMNYVSDSO 5ES:UN!::UN!: NY21:NYCMNYWSCGO lES:5004:1406 NY21:NYCMNYWSCGl lAtS:5004:1406 NY21:NYCMNYWSCG2 1AES:5004:1406 NY21:NYCMNYWSCG3 1AES:5004:1406 NY21:NYCMNYWSCG4 lAES:5004:1406 NY21:NYCMNYWSDSO DGTL:5004:1406 NY21:N'lCMNYWSDSl DGTL:UNI<:UNI< NY21:NYCMNYWSDS2 DG'l'L:UNI<:UNI< NY21:NYCMNYWSDS3 DG'TL:UNK:UNI< NY21:NYCMNYWSMG2 1XB:5004:1406 NY21:NYCMNYWSMG4 5XB:5004:1406 NY21:NYCMNYWSMG5 5XB:5004:1406 NY21:NYCMNYWSMG8 5)(8:5004:1406 NY21:NYCMNYWSRSO RDGT:5004:1406: NYCMN'fwSDSO NY21:NYCRNYNOCGO lAES:5039:1401 NY21:NYCRNYNDMGO 5XB:5039:1401 NY21:NYCRN'fNSDSO DGTL:5027:1406 NY21:NYCRNYNSDS1 DGTL:UN!::UNX NY21:NYCRN'fNSMGO 1XB:5027:1406 NY21:NYCRN'fNSMGl 5XB:5027:1406 NY21:NYCRNYSSCGO lAES:5052:1404 NY21:NYCRNYSSMGO 5XB:5052:1404 NY21:NYCRNYWSCGO lAES:5037:1411 NY21:NYCRNYWSMGO 5XB:5037:1411 NY38:NYCMNY37CGO lAES:4994:1405 NY38:NYCHNY37CG1 1AES:4994:1405 NY38:NYCMNY37DSO DGTL:UNX:UNK NY38:NYCMNy)7DSl 5E5:UNK:UNK NY38:NYCMNY37MGl 1XB:4994:1405 NY38:NYCMNY37MG2 1XB:4994:1405 NY38:NYCMNY37MG3 lXB:4994:1405 NY3:::NYCMNY31MG4 5XB:4994:140S NY38:NYCMNY37MG5 SXB:4994:140S NY38:NYCMNY31MG6 5XB:4994:1405 NY38:NYCMNY56CGO lAES:4991:1405 NY38:NYCMNY56CGl lAtS:4991:1405 NY38:NYCMNY56CG2 lAES:4991:1405 NY38:NYCMNY56CG3 1AES:4991:140S NY38:NYCMNY56CG4 lAt5:4991:1405 NY38:NYCMNY56DSO DG'l'L:UNK:UNK NY38:NYCMNY56MG6 5xB:4991:1405 NY38:NYCMNY7]CGO lAES:4989:1410 NY38:NYCMNY7)DsO DGTL:UNK:UNK NY38:NYCMNY73MGO lXB:4989:1410 NY38:NYCMNY"13MG1 5XB:4989:1410 NY38:NYCMNY79CGO 1ES:4988:1406 NY38:NYCMNY79CG1 lAtS:4988:1406 NY3e :NYCMNY790S0 DGTL:UNK:UNI< NY38:NYCMNY79MGO lXD:4988:1406 NY38:NYCMNY79MG1 5xB:4988:1406 NY38:NYCMNy79MG2 5XB:4988:1406 NY38:NYCMNY97CGO 1AES:4985:1407 NY38:NYCMNY970S0 5ES:UNI<:UNK NY38:NYCMNY97MGO lXB:4985:1407 NY38:NYCMNY97MG1 lXB:4985:1407 NY38:NYCMNYCACGO lES:4911:1411 NY38:NYCMNYCADSO DGTL:UNI<:lJNK NY38:NYCMNYCAMGO 1XB:4977:1411 NY38:NYCMNYMNCGO lAES:4983:1410 NY38:NYCMNYMNDSO DGTL:UNK:UNK NY38:NYCMNYMNMG1 1XB:4983:1410 NY38:NYCMNYTHCGO 1E5:4969:1414 NY38:NYCMNYTBMGO lXB:4969:1414 NY38:NYCMNYWACGO lES:4973:1413 NY38:NYCMNYWADSO DGTL:UNK:UNK NY38:NYCMNYWAMGO lXB:4973:1413 NY38:NYCXNYCIRS1 5RSM:UN!::UNK: Winter 1989-90 2600 Magazine Page 11
  • 12. �ou knOm NYCXNYGCDSO NY38:NYCXNYCRCGO:1ts:4962:1401 NY38:NYCXNYCRDSO:DG'TL:UNK:UNK NY38:NYCXNYCRMGO:1XB :4962:1401 N138 :NYCXNYCRHG1:1XB :4962 :1401 HY38:NYCXNYCRMG2:5XB:4962:140'7 NY38:NYCXNYEACGO:1ES:4959:1403 NY38:HYCXNYGCDSO:5ES:UNX:UNK NY38:NYCXNYGC1GO:1XB:49'71:1410 NYl8:NYCXNYGCRSO:ltOOT:UNK:UNX: NYCXNYXBDS0 NY38:NYCXNYBOCGO:1MS:49'72:1404 NY38:NYCXNYBCMGI:IXB:49'72:1404 NYl8:NYCXNYBCMG2:1XB:4912:1404 NYl8:NYCXNYJECGO: lES:4973 :1409 NYl8:NYCXNYJE;MGO:1XB:49'73:1409 NY38:NYCXNYKBDSO:OGTL:4964 :1414 NY38:NYCXNYKBMGO:1XB:4964:1414 NY38:NYCXNYXBMG1:5XB:4964:1414 NY38 :NYCXNYMBDSO:DGTL :UNIt :UNit NY38:NYCXNYMBMGO:1XB:49'76:140'7 NY38:NYCXN'CHBMG1:1XB:4916:140'7 NY38:NYCXNYMBR.SO:5RSM:UNK :UNK: NYCXNYGCDSO NYl8:NYCXNYTBCGO:1MS:4961 :1409 NY38:NYCXNYTBDSO:DGTL:ONX:UNK NYl8:NYCXNYTBMGO:1XB:496'7:1409 NY38:NYCXNYTllCGO:1ES:4966:1400 NY38 :NYCXNYTRDSO:DGTL:UNX:UNK NY38:NYCXNY'rRHGO:1XB:4966:1400 NY38 :NYCXNYTRMG1:5XB:4966:1400 POUG:AMENNYAN RSO:511SM:UNX:UNK: PGBKNYSBDSO POUG:AMENNYANSGI:OTB:4761 :149'7 POUG:BECNNYBr.oSO:DGTL:UNK:UHK POUG:BECNNYBEHGO:5XB:4861 :15C4 POUG:CLCNNYCNMGO:5XB:4921:1681 POUG:CLClUiYCCRSO:5ltSH :UNK:UNK: PGHKNYSBDSO POUG :CNDLHYCLCGO :3ES :4835 :1541 POUG:CRNWNYCWCGO:3ES :4879:1504 POUG:CRNWNYCNRSO:RDGT:UNK :UNK: NNBRNYNNDS0 POUG:DVPLNYOPRSO:5RSH:UNK:UNK: PGflXNYSRDSO POUG:DVPLNYDPSGI:OTB:4181:1486 POUG:ELVLNYELHGO:5XB:4866:1588 POUG:FLBGHYFBMGO :5XB:4888 :1618 POUG:FLBGHYFBRSO :ROOT:UNK :UNK: MNTINYHTDSO POUG:FLSCNYFM'4GO:5XB:4802:1665 POUG :FLSCNYFHRSO:ROOT:UNK :UNK: KGTNNYKGDSO POUG:FSBKNYLDDSO:DGTL:UNK : UNK POUG:FSRKNYLDHGO:5XB:4844 :1491 POUG :GHVLNYGHSGI :OTH :UNK :UNK POUG:BG1.DNYHGCGO :3ES:4823:1532 POUG:BGLDHYRGRSO:ROOT:UN}( :UNK : PGHKNYSHDSO POUG:BIFLNYBFRSO:ROGT :UHK :UNK : XGTNNYXGDS0 POUG :HIFLNYBFSG1 :OTH:4820:1569 POUG:HYFKNYBKRSO:SRSH :UNK:UNK : PGBXNYSHDSO POUG:JFVLNYJFHGO:5XB:4906:1667 POUG:J'FVLNYJFRSO:ROOT :UNK :UNK : MNTINYHTDSO POUG :KGTNHYKGOSO:DGTL:UNK :UHK POUG :}(GTNNY1(QIotGO :5XB:4190:IS65 POUG:KRBHNYXRCGO :3£5:4846:1584 POUG :LBRTHYLBMGO :5XB :4885 :1645 POUG:LKBNHYLHSG1 :OTH:4928 :1662 POUG:LKXTNYLKCGO :1[5:4'781 :15'70 POUG:LVHNHYLVMGO:5XB:4816:1669 POUG:HLBKNYMLRSO:5RSM :UNK:UNK: PGBXNYSHDSO POUG :MLBKNYMLSG1:OTH:4184:1506 POUG :MLTHNYMNRSO :ROOT :UNK :UNK : NNBRNYHNDS0 POUG :HLTNHYMNSGI OTB:4833 :1524 POUG :HNTINYHTDSO DGTL :UNK:UNK POUG :HHTIHYM'I'HGO 5XB:4905 :1618 POUG :MNTINYHTRSQ 5RSH :UNK:UNK PCXJG:HRBOHYHBSGI :OTR:4844 : 1�19 POOG :NCLVNYNCRSO :5RSM :UNK :UNK : PGBKNYSHDSO POOG:NNBRHYNNDSO :5ES :UNK :UNK POUG :NNBRHYNNMGO :5XB :4865 :1510 POOG:NWBRNYNTMGO :5XB:4863:1527 POUG :NWBRNYWTRSO :5RSH:UNK :UNK, : NNBRNYNNOSO POUG :NNPLNYNPHGO:5XB:4830:1552 POOG:NWWNNYNWRSO:5RSH:UNK :UNK : NNBRNYNNDSO POUG : PGBKNYSHDSO: 5ES:4822 :1525 POUG :PGBKNYSPDSO :OOTL :UNK:UNK POUG :PGBKNYSPHGO :5XB :4828 : 1518 POOG :PRNCNYPBRSO :RSS:UNK:UNK : LDTNYLKCGO POOG:PVYDMnDCGO :3r.S:4804 :151'7 POOG :PWNGNYSSRSO :5RSH:UNK :UNK : PGBKNYSBDSO POOG :RODLNYRDRSO : RDGT :UNK :UHI< : PG8KNYSHDSO POUG:RODLNYRDSGI:arB:4813:1564 POUG:SGRTNYSGRSO:5RSM:UNK :UNK : PGBKNYSBDSO POOG:SGRTNYSGSGl :SXS :4'759 : 1579 POUG :SBKNNYSKCGO:3ES :4802 :1598 POUG :STNVNYSTCGO :3ES :4770 :1518 POOG :NDSTNYNSRSO :RDGT:UHK:UHK : PGHKNYSRDSO POUG:NDSTNYNSSG1 :OTB:4'782 :1595 POOG:NBLKNYNRt«;O:5XB:4914:1640 POUG:NNDLNYNDCGO:3ES:4196:1471 POOG:NPFLNYNFCGO :2BES :4839 :1510 SYRA. :NtBRNYABRSO: RSS :UNK: UNK : SYRCNYSUCGO SYRA :ATNPHYAW6S9 :OTH :4544 :20'70 SYRA:ATNPNYAWRSO:RDGT :UNK :UNK : WTTWNYUNDSO SYRA :AUBNNYAUDSO :OOTL:UNK :UNK SYRA :AUBNNYAUSG1 :SXS :485'7:2029 SYIlA :AXBANYAX482 :SXS:4548 :2121 SYRA :AX.BANYAXRSO :RDGT :UNl< :UNK : NTTWNYUNDSO SYIlA :BAVLHYBVCGO :2SES :4194 : 2028 SYIlA:BLRVNYBCDSO :DGTL :4594 :2069 SYRA :BNVDNYBD896 :OTH:4668:1896 SYRA:BNVDNYBDRSO :RDGT :UHK :UNK : NH.BaiYWBDSO SYIlA :BRPTNYBP633 :OTH : 4760: 1977 SYRA:BRPTHYBPDSO :DGTL :t'HK :UHK SYIlA:CICRNYCJCGO : 2BES :4772 :2003 SYRA:CLAYNYOSCGO :1ES :4'785 :2016 SYRA :CLEVNYCEllSO :llSS :UNK :UNK : SYRCNYSUCGO SYRA :CLTNNYZIDSO : OOTL :UNK :UNK SYRA :CLTNNYZISGl :SXS :47 25 :1891 SYllA:CLYDHYCY923 : OTR: 4857 :2088 SYRA :OfDNNYZHDSO :DGTL :UHK :UHK SYRA :CMDNNYZMMGO :5XB :4709:1976 SYRA :CMLSNYIDRSO :RSS :UNK :UNK : SYRCNYSUCGO SYRA:CMLSNY�CGO : IES :4806:2002 SYRA :CNSTHYZADSO :DGTL :4756:1942 SYRA :CNTNNYZORSO:5RSM :UNK :UN"': PTSDNYFSDSO SYRA :CNTNNYZOSG 1 : OTE: 4434:2067 SYR.A :CNTTNYCIllSO :RSS :UNK :UNK : SYRCNYSUCGO SYRA :COTNNY56HGO : OCC :4403:2054 SYRA:COTNNY56RSO :RDGT :UNK :UNK : PTSDNYFSOSO SYRA :CPNBNYZP 688:orB :4605 :2039 SYRA:CPNBNYZPllSO :RDGT :UNK :UNK : trrrrNNYUHDSO SYRA :CRLDNYCRDSO:DGTL:4880:1937 SYRA :CRTBNYZGDS0:DGTL :UNK :UNK SYRA:CTNGNYCHCGO :3ES :4711:1953 SYRA :CYTNNYZYCGO: 3ES: 4581: 2136 SYRA : DLGVNYOO429:OTH:4659: 1820 SYRA:DLGVNYDGRSO :RDGT :UNK: UNK : HRKMNYBCDSO SYRA :EVHLNYEIRSO RDGT:UNK:UNK: WTTWNYUNDSO Page 12 2600 Magazine Winter 1989-90 SYRA :FABSNYFBltSO :ltSS :ONK:UNK: SYRCNYSUCGO SYM :FYTTNYFY549:OTH:4900:2046 SYRA :FYTTNYFnSO:ROOT:UNK :UNK : GENVNYGHDSO SYRA:FYVLNYFVDSO:DGTL :4188 :1969 SYRA :GENVNYGNDSO tDG'rL :4907:20'76 SY:RA :GRTNNYGTRSO :RDGT:4900 :1959 : CllLDNYCRDSO SYRA :GVRNNYGCI4GO:5XB:4501 :2070 SYRA :GVRNNYGORSO :5RSM:UNX :UNK : PTSDNYFSDSO SYRA :BMI'HNYRAMGO:5XB:4780 :1883 SYRA :Sa.RNYBHDSO:DGTL :UNK:UNK SYRA:HRKMNYBCDSO:DGTL:UNK:UNK SYRA :BRKMNYBC1GO:5XB :4692 :1838 SYRA :HRVLNYBV543:OTH:4525:2028 SYRA :HVTNNYHXl44 :OTH :4452 :2100 SYRA:BVTNNYHXRSO :5RSM:UNK:UNK : PTSONYPSOSO SYRA:ILINNYILRSO:ROOT :UNK :UNK : HRKMNYHCDSO SYRA :ILINNYILSGI:SXS:4699: 1842 SYRA :ITHCNYIBDSO :DGTL :4938 :1957 SYRA :ITHCNYFGMGO:5XB :4931 :1958 SYRA :J1lDNNYJDCGO :3ES :4825:2034 SYRA :LFRVNYLE658 :OTH :4580 :2115 SYRA :LFRVNYLERSO:ROOT:UNK :UNK : WTTWNYUNDSO SYRA :LFYTNYLFRSO :RSS:UNK :ONK : SYRCNYSUCGO SYRA :LNNGNYLG533:OTH:4923 :1976 SYAA :LTFLNYLSMGO :5XB:4671 :1823 SYRA :LYNSHYLYCGO :3ES:4873 :2102 SYRA:MACDNYHCCGO :2ES:4903 :2145 SYRA :MARNNYHR926 :OTH :481'7 :2137 SYM :HCDGNYHD585 :OTH :4910 :205'7 SYRA :MCGRNYMGRSO:llOOT :4872:1924 : CRLDNYCRDSO SYRA :MCLNNYHZRSO :RDGT :4899:1945 : CRLDNYCRDSO SYRA :MDRDNYHK322 :OTH :4403:2081 SYRA :MEXCNYMXRSO :llSS :UNK :UNK : SYRCNYSUCGO SYRA :HINONYMIDSO :DGTL:UNK :UNK SYRA :HORVNYHc:JoIIGO :5XB :4883 :1982 SYRA :MRTKNYMW315 :OTB :4483:2119 SYRA :MRTNNYHNRSO :5RSM :UNK :UNK : PTSDNnSDSO SYRA :MSSNNYMQDSO :OGTL :4349:2077 SYRA :NRFLNYN0384 :OTH:4382 :20/2 SYRA :NRFLNYNORSO :5RSM :UNK :UNK : PTSDNYPSDSO SYRA :NROSNYNR581 :OTH :4841 :2104 SYRA:NROSNYNRRSO :RDGT :UNK :UNK : GENVNYGHDSO SYRA :NRWDNYND353 :SXS :4390:2066 SYRA :NRNDNYNDRSO :5RSM :UNK :UNK : PTSDNYPSDSQ SYRA :NSYRHYNSMGO 5XB :UNK :UNK SYRA:NNFONYNF564 0'1'8:4961:1960 SYRA :NWRKNYNKDSO DGTL :UNK :UNK SYRA :NWRKNYNKMGO 5XB:4886:2113 SYRA :OGBGNYOGHGO 5XB:4445:2120 SYRA :OGBGNYOGRSO 5RSM:UNK:UNK: PT50NYFSDSO SYRA :ONEDHYODMGO 5XB:4143:1931 SYRA :ONTllNYOHCGO 3E5:4871:2159 SYRA :OSWGNYOSDSO DGTL :Ul'iK :UNK SYRA :OSWGNYOSMGO 5XB:4759:2088 SYRA :ONSCNYOO'784 OTH:4861:2006 SYRA:PHLANYFF642 OTB;4560:2077 SYRA :PRLANYPFR.50 RDGT :UNK :UNK : WTTWNYUNDSO SYRA :PUoIYNYFYCGO 3ES :4894:2132 SYRA :PNYNNY'PN536 SXS :4<j50:2058 SYRA :PNYNNYPHDSO DGTL :UNK :UNK SYRA :PPllGHYFP364 078:4895:2011 SYRA :PllISNYPARSO RSS :UNK :UNK : SYR.CNYSUCGO SYRA :PTSDNYP5DSO 5ES :UNK :UNK SYRA :PTSDHYFSHGO 5XB:4403:2054 SYRA :RCSPNYRSMGO 5XB:4723:181S SYRA:RCSPNYRSllSO RDGT:UNK:UNK:
  • 13. mha t t h e � knom RRl<MNYHC D S O SYRA : RDC KN YR.C 1 5 4 : OTH : 4 8 1 S 2 0 90 5YRA : RCMENYRMD S Q : DGTL : UN K UN K SYRA : RCMENYRMMGO : 5 XB : 4 1 0 4 1 9 2 2 SYRA : SALKNYQT8 4 8 : OTH : 4 4 9 S 1 9 94 SYRA : 5 CBRNYQHRS O : RDGT : UN K ON K : tfTTWNYUN D S O S Y RA : S KNTNYS E 6 8 5 : S XS : 4 8 4 2 : 2 0 1 3 SYRA : S KNTNYS ERSO : DGTL : UN K : UN K 5YRA : SNFLNYS L5 68 : S XS : 4 8 8 2 : 2 0 5 1 5'/RA : SNFLN Y S L D S Q : DGTL : UNK : UN K SYRA : SOOSNYS D 4 8 3 : OTH : 4 8 4 8 : 2 1 3 3 SYRA : SODSNYSODSO : DGT 1 : UN X : UN K SYRA : S YBHNY0Y1 62 : OTH : 4 73 3 : 1 9 5 4 SYRA : S YBBNYQYD S O : DGTL : UN K : UN K SyItA : S YRCN YODDSO : DGTL : UN K : UN K SYRA : S YllCNYE P D S Q : DGTL : UN K : UN K SYRA : S YRCNYEPMGO : 5 XB : 4 1 9 2 : 2 0 0 2 SYRA : S YRCNYG S D S O : DGTL : 4 1 9 1 : 1 98 3 SYRA : S YRCNYJSCGO : I E S : 4 7 8 9 : 1 9 8 1 SYRA : S YRCNYSACGO : I E S : 4 8 0 5 : 1 9 8 3 SYRA : S YRCNYS UCGO : l AE S : 4 1 91 : 1 9 9 0 SYRA : S YRCNYSUCGl : 1 M S : 4 1 91 : 1 9 9 0 SYRA : T HRS NY"I'H6 28 : OTH : 4 S 5 9 : 2 0 9 6 5YRA : T HRSNYTllR S O : &OOT : UN K : UN K : WTTNNYUN D S O SYRA : TLLYNY'l'YllSO : RS S : 4 8 3 8 : 1 9 5 2 : SYRCNYSUCGO SYRA : UNS P NYU S 8 8 9 : OTH : 4 8 8 5 : 2 0 3 4 SYRA : UN S P N YU S R S O : RDGT : UN K : UN K : AUBNNYAU D S O SYRA : UT I CNYUTCGO : 1AES : 4 1 0 3 : 1 8 1 9 SYRA : WDPTN YWT8 3 4 : OTH : 4 83 1 : 2 0 4 3 SYRA : ltDTNN YW Y3 8 8 : OTH : 4 3 9 1 : 2 1 0 6 SYRA : ltHBOOYWBD S O : OG'lL : 4 1 0 4 : 1 8 8 9 SYRA : WLCTNYWCS 94 : OTH : 4 8 2 9 : 2 0 9 9 SYRA : wLCTNYWCR S O : RDGT : UNK : UN K : GENVNYGNDS 0 SYRA : WMSNNYWN 5 8 9 : OTH : 4 8 6 2 : 2 1 4 1 SYRA : WMSNNYWN R S O : RDGT : UN K : UN K : NWllKNYNKDS 0 SYRA : N'I'RLNYWT 5 3 9 : S XS : 4 8 8 9 : 2 0 65 SYRA : WTRLN YWTDS O : DGTL : UN X : UN K SYRA : WTT tlH YUND50 : OG'lL : 4 6 1 2 : 2 0 8 0 SYRA : NWVLNYltW1 3 1 : OTH : 4 1 1 9 : 1 8 1 6 SYRA : NWVLNYWQ50 : RDGT : UN K : UN K : ltBBONYWBOS 0 HBPL : ARVGNYAVMGO 5 XB : 4 90 2 : 1 4 2 1 WHPL : BOVGNYBVD 5 0 OGTL : UN K : UN K WHP I. : B RWSNYBNCGO 2 B E S : 4 8 4 5 : 1 4 4 4 WHP I. : CBPQNYC P 0 5 0 OGTI. : 4 90 1 : 1 4 3 3 WH PL : CNGRN"YCND 5 0 DGTL : 4 9 1 9 : 1 4 5 2 WHP!. : C RHONYCBO S O DGTL : 4 9 0 5 : 1 4 5 5 WHP L : CRHLNYCLCGO 2 £ 5 : 4 8 4 4 : 1 4 5 8 WHPL : C RMLN YCLR50 RDGT : UN K : UN K : YRTWNYYT O S O WHPL : C 5 P PN YC SCGO 3 £5 : 4 8 1 4 : 1 4 9 1 WHP L : OBFYNYDFDSO OGT L : 4 9 3 6 : 1 4 2 6 WBPL : GNBGNYFVD5 0 OGT L : UN X : UN K WBPL : GNBGNYFVMGO 5 XB : UNK : UNK WHP L : GNWCCTGNCG1 1 £S : 4 9 1 1 : 1 3 9 6 WBP L : GRLKN YGLRS O RDGT : UN K : UN K : NNCYNYNCDS O WBP L : GRLKNYGLSG1 OTB : 4 94 2 : 1 5 1 0 NHPI. : GRSNNYGACGO 3 ES : 4 8 8 1 : 1 4 8 4 NBP L : BHFLNYBFO S O OGTL : 4 8 8 4 : 1 4 8 6 NBP L : BRSNN YBNDS O OGTL : UN K : UN K WHP L : HRSNNYBNHGO 5 XB : 4 92 2 : 1 4 0 8 WHP L : KTNHNYl<ADS O OGTL : 4 8 1 6 : 1 4 3 5 WHPL : L RMTNYLAD SO 5 E S : UNK : U NK WBP L : LRMTNYLAHGO 5 XB : 4 8 4 0 : 1 4 0 1 NBP L : MBPCNYMPCGO 2 E S : 4 8 6 4 : 1 4 5 6 WHP L :MMRNN YMAD S O DGT L : UNK : UNK WHP L : MMRNNYMAMGO 5 XB : 4 93 3 : 1 4 0 1 WBP L : MTKSN YMKCGO 2 B E S : 4 8 8 8 : 1 4 3 3 WBPL :MTKSN YM KD S O 5 E S : UNK : UNK WBP L :MTVRN YMVO S O DGTL : 4 9 5 2 : 1 4 0 9 WHP L : N NCYNYNCDSO DGTL : 4 9 2 6 : 1 4 5 9 WHP L : N NRCN YN RCGO 1 E 5 : 4 94 8 : 1 4 0 1 WHPL : N WRCNYNRO S O DGT L : lIN K : UNK WHP L : N WRCN YN RH G 1 5 XB : 4 94 8 : 1 4 0 1 WBPL : N YACNYN KD S O DGTL : UN K : UN K WBPL : N YACNYNKMGO 5 XB : UHK : U NK WhP L : ORBGNYOB D S O OGTL : UNK : UNK WHP L : ORBGNYOBMGO 5XB : 4 9 3 8 : 1 4 4 0 WHP L : OSNGNYOS D S O DGTL : 4 9 1 1 : 1 4 4 5 WHP L : PASNNYPTCGO 3 E S : 4 8 2 3 : 1 4 5 9 WHP L : PASHNYPTDS 0 DGTL : UNK : UNK WHP L : P KSKNYP S O S O DGTL : 4 8 9 3 : 1 4 1 0 W8P L : P OHNNYPODS O DGTL : UNK : UNK NBP L : PQMNNYFOHGO SXB : 4 9 2 1 : 1 4 6 9 W HP L : PRDYNYPDCGO 2£ S : 4 8 6 1 : 1 4 4 0 WBP L : PRRVNYN P D S O 5 E S : UN K : UNK WHP L : PRRVNYNPMGO 5 XB : 4 9 4 9 : 1 4 4 1 WBP L : PRRVNYN P R S O RDGT : UNK : UNK : N NCYNYN C D S O WHP L : P S VLNYPVO S O : DGTL : UNK : U N K WBP L : PTCBNYPCCGO : 1 E S : 4 9 1 8 : 1 3 9 8 WHP L : PTVYNYPYCGO : 2 E S : 4 8 1 3 : 1 4 6 8 WBP L : RYE-NYRY D S O : DGTL ; UNK : UNK W8P L : RYE-NYRYMGO : 5XB : 4 9 23 : 1 3 9 9 WHP L : SCDLNYS R D S O : DGTL : 4 93 4 : 1 4 1 4 W HP L : SF RNN Y S U D S O : DGTL : UNK : UNK WBP L : SFRNNYSUHG O : 5X8 : 4 9 4 6 : 1 4 1 5 WRP L : SLTSNYSLRS O : RDGT : 4 9 4 4 : 1 4 8 1 : N NC YN YN C O SO N HP t : S P vYNYSVCGO : 2BtS : 4 93 8 : 1 4 62 WBP L : S P VYNYSVD S O : DGTL : UNK : UNK WHP L : S P VYNYSVMGO : 5XB : 4 9 3 8 : 1 4 6 2 WHP L : S S LHNY 5 5 D S O : DGTL : UNK : UNK W HP L : TKHONYTUCGO : I t S : 4 9 4 4 : 1 4 1 2 W8P L : TRTWNYTT O S O : DGTL : 4 92 5 : 1 4 3 4 WBP L : TUXONYTXRS O : RDGT : UNK : UNK : P RRVNYN P D S O WHP L : TUXDNYTX S G 1 : SX S : 4 9 3 6 : 1 4 9 4 W8P L : WHPLNYWPCGO : 1AtS : 4 92 4 : 1 4 1 6 WHP L : WHP LNYWP D S O : 5ES : UN K : UNK WBP L : WHPLNYWPMG O : I X ! : 4 9 2 4 : 1 4 1 6 WBP L : WBPLNYWPHG 1 : 5XB : 4 9 2 4 : 1 4 1 6 WHP L : NHVRNYWBDS 0 : OGTL : UNK : UNK WRP L : WHVRNYNHMGO : 5XB : 4 9 1 4 : 1 4 6 8 NBP L : YN KRNYYNCGO : 1AES : 4 95 4 : 1 4 2 0 WHPL : YN KRNYYN D S O : DGTL : UNK : UNK WHP L : YNKRNYYNMG2 : 5XB : 4 9 5 4 : 1 4 2 0 W8P L : YRTWNY'fT D S O : DGTL : U NK : UNK W 8P t : YRTWNYY'I'MGO : 5XB : 4 8 7 9 : 1 4 5 5 WLMG : NYCKNY 1 4 CGO : 1 E S : 5 0 1 0 : 1 3 9 6 WLMG : NYCKNY7 1 CGO : 1 E S : 5 0 1 9 : 1 3 9 1 WLMG : NYCKN Y 7 1 DS O : 5 E S : UN K : UNK NLHG : NYCKN Y 1 1 MG O : 1 X B : 5 0 1 9 : 1 3 9 1 WLMG : NYCKN Y l 1 CGO : 1 E S : 5 0 2 0 : 1 3 9 6 WlJo!G : NYCKNY 1 1 Q S O : OGTL : UNK : UNK WLMG : NYCKNY1 1MGO : 1 X B : 5 0 2 0 : 1 3 9 6 WLHG : NYCKNY11MG 1 : 5XB : 5 0 2 0 : 1 3 9 6 WLH G : NYCKNYA I D S O : DGTL : 5 0 0 9 : 1 3 8 3 WLMG : NYCKHYAI MG O : 5XB : 5 0 0 9 : 1 3 8 3 WLMG : NYCKNYAIMG 1 : 5XB : 5 0 0 9 : 1 3 8 3 WLMG : NYCKNYAI MG 2 : 5XB : 5 0 0 9 : 1 3 8 3 WLMG : NYCKNYALCGO : 1AES : 5 0 1 0 : 1 3 8 9 WLHG : NYCXNYALDS 0 : DGTL : UNK : UNK WLHG : NYCKNYALMGO : 1XB : 5 0 1 0 : 1 3 8 9 WLMG : NYCKNYARCGO : 1 E S : 5 0 1 8 : 1 3 8 4 WLMG : NYCKNYAR D S O : DGTL : UNK : UNK WLHG : NYCKNYARMGO : 1 XB : 5 0 1 8 : 1 3 & 4 WLMG : NYCKNYAUCGO : 1 E S : 5 0 2 1 : 1 3 8 6 WLHG : NYCKNYAU D S O : OOTL : UNK : UNK WLMG : NYCKNYAUMGO : 1 XB : 5 0 2 1 : 1 3 8 6 WLMG : NYCKNYAYCGO : l E S : 5 0 1 9 : 1 3 8 1 W!.MG : NYCKNYAYDS 0 : DGTL : UNK : UNK WLMG : NYCKNYAYMGO : l X B : 5 0 1 9 : 1 3 8 1 WLMG : NYCKNYBRCGO : 1 E S : 5 0 0 5 : 1 3 9 9 WLHG : NYCKNYBRCG 1 : 1 E S : 5 0 0 5 : 1 3 9 9 WLHG : NYCKNYBRDSO : 5 E S : 5 0 0 5 : 1 3 9 9 WLMG : NYCKNYBRDS 1 : DGTL : UNK : UNK WLMG : NYCKNYBRMG O : 1 X B : 5 0 0 5 : 1 3 9 9 WLMG : NYCKNYBRMG 1 : 5XB : 5 0 0 5 : 1 3 9 9 WLMG : NYCKNYBUCGC : 1 E S : 4 9 9 9 : 1 3 9 0 WU4G : NYCKNYBU D S O : OOTL : UNK : UNK WLHG : NYCKHYBUMGO : 5XB : 4 9 9 9 : 1 3 9 0 WLMG : NYCKNYCLCGO : 1 E S : 5 0 0 S : 1 3 9 5 WLMG : NYCKNYCLD S O : 5 t S : UN K : UNK WLHG : NYCKNYCLMGO : 1 X B : 5 0 0 5 : 1 3 9 5 WLHG : NYCKNYCLRSO : 5RSM : 5 0 0 5 : 1 3 95 : N YC KN YSRD S O W111G : NYCRNYFACGO : 1 E S : 4 9 94 : 1 3 9 0 NLHG : NYCKNYFAO S O : OGTL : UHK : UNR WLMG : N YCKNYFAMGO 1 XB : 4 9 9 4 : 1 3 90 WLMG : N YC KNYFAMG1 5 XB : 4 9 9 4 : 1 3 90 WLMG : N YC KNYFTCGO 1AES : 5 0 1 4 : 1 3 9 2 WLMG : N YC KN YFTD S O OGTL : UN R : UN R WLMG : N YC KNYFTMGO 1 XB : 5 0 1 4 : 1 3 92 NLHG : N YC KN YKPCGO 1AES : 5 0 1 3 : 1 3 8 7 WLMG : N YC KNYKPMGO l XB : 5 0 1 3 : 1 3 8 1 WLMG : N YCKNYLACGO l E S : 4 9 9 1 : 1 3 8 3 WLMG : N YCKNYLADSO DGTL : UN K : UN K WLMG : N YCKNYLAHGO 5 XB : 4 99 1 : 1 3 8 3 WLMG : N YCKNYRACGO 1 £ 5 : 5 0 0 2 : 1 3 8 5 WLMG : N YC KN YRAD S O OGTL : UN K : UNK WLMG : N YCKN YRAMGO 1 XB : 5 0 0 2 : 1 3 8 5 WLHG : N YC KN YT'lCGO 1AES : 5 0 0 5 : 1 3 8 9 WLMG : N YC KN YTYD S O DGTL : 5 0 0 5 : 1 3 8 9 WLMG : N YC KN YTYMGO 1 XB : 5 0 0 5 : 1 3 8 9 WLHG : N YCKNYWMCGO 1AES : 5 0 0 2 : 1 3 8 5 WLHG : N YC QN YASCGO 1 AE S : 4 9 8 5 : 1 4 0 1 WLMG : N YCQNYASDSO DGTL : UN K : UN K WLMG : N YCQN YASMGO 1 XB : 4 98 5 : 1 4 0 1 WLMG : N YCQN YB AD S O DGT L : UN K : UNK WLHG : N YCQNYBAHGO 1 XB : 4 91 1 : 1 3 8 0 WLMG : N YCQNYBAMG 1 5 XB : 4 97 1 : 1 3 8 0 WLM:; : N YCQNYBARSO RDGT : UN K : UN K : NYCQNYFL D S O WLMG : N YCQN YBHD S O : 5 E S : 5 0 0 5 : 1 3 62 WLMG : N YC QN YBHMGO : 1 XB : 5 0 0 5 : 1 3 62 WLMG : N YCQNYBHR S 1 : 5 RSM : UN K : UN K : NYCQNYFRDS O WLMG : N YCQNYCOOSO : 5 ES : UNK : UNK WLMGl : N YCQN YCCMGO : 5 XB : 4 98 4 : 1 3 8 9 WLMG : N YCQN YFHCGO : 1 E S : 4 9 8 6 : 1 3 8 4 WLMG : N YC QN YFHDSO : DGTL : UN X : UN K WLMG : N YCQlNYF BMGO : l XB : 4 98 6 : 1 3 8 4 WLMG : N YCQN YFHMG1 : l XB : 4 98 6 : 1 3 8 4 WLMG : N YC QN YFHMG2 : 5 XB : 4 98 6 : 1 3 8 4 WLMG : N YCQNYFLD S O : 5 E S : UNK : UNK WLMG : N YCQNYFLHG1 : S XB : 4 91 1 : 1 3 8 8 WLMG : N YCQHYFLHG2 : 5 XB : 4 91 1 : 1 3 8 8 WLMG : N YCQNYFRD S O : 5 ES : 4 9 9 7 : 1 3 5 1 WLHG : N YCQNYFRMGO : l XB : 4 9 9 1 : 1 3 5 1 WLMG : N YCQNYHSDSO : DGTL : 4 9 7 8 : 1 3 7 2 WLMG : N YCQNYHSMGO : l XB : 4 91 8 : 1 3 1 2 WLMG : N YCQNYHSMG1 : 5 XB : 4 91 8 : 1 3 1 2 WLMG : N YCQN YBSRSO : RDGT : UN K : UN K : NYCQNYLNDS I WLHe : N YCQNYHSRS 1 : RDGT : UN !': : UNK : N'lCQNYLNDS 1 WLMG : N YCQN Y I ACGO : 1 ES : 4 9 9 2 : 1 3 6 9 WLMG : NYCQN Y I AQ S O : DGTL : UNK : UNK WLMG : N YCQN Y I IIMGO : 5 XB : 4 9 9 2 : 1 3 6 9 WLMG : N YCQN Y JAD SO : DGT L : 4 9 8 4 : 1 3 1 6 HLMG : N YCQN Y L I CGO : 1 ES : 4 9 9 2 : 1 4 0 1 WLMG : N YCQNYL I O S O : DGTL : UN!': : UN K WLMG : N YCQNYLIMGl : 5 XB : 4 9 9 2 : 1 4 0 1 WLMG : N YCQNYLND S I : DGTL : UN K : UNK WLMG : N YCQNYLNMGO : 1 XB : 4 98 6 : 13 67 WLMG : N YCQN YLNMG1 : 5 XB : 4 98 6 : 1 3 61 WLHG : N YCQN YN JD S O : OGTL : UN K : UNK WLMG : N YCQN YN JHGO : 5 XB : 4 9 8 0 : 1 3 8 0 WLMG : N YCQNYNWCGO : 1 At S : 4 9 8 6 : 1 3 9 2 WLHG : N YCQNYN WO S O : 5 ES : UNK : UN!': WLMG : N YCQNYNWMGl : 5 XB : 4 98 6 : 1 3 92 WLMG : N YCQNYOPCGO : 1 ES : 4 9 9 1 : 1 3 1 5 WLMG : N YCQNYOPD S O : DGTL : UN K : UNK WLMG : N YCQNYOPMGO : l XB : 4 9 9 1 : 1 3 1 5 WLMG : N YCQN'lOPMGl : 5 XB : 4 9 9 1 : 1 3 1 5 WLMG : N YCQNYRHD S O : DGTL : 4 9 90 : 1 3 8 0 WLMG : N YCQNYRHMGO : 1 XB : 4 9 90 : 1 3 8 0 WLHG : N YCQNYRHRS O : RDGT : UN K : UN K : NYCQNYLNDS 1 WLMG : N YCQNYliSCGO : 1 ES : 4 91 1 : 1 3 8 8 Too risky to mail? Too paranoid to speak its name? Then FAX it! 516-751-2608 Winter 1989-90 2600 Magazine Page 13
  • 14. by Violence This is the second part of a series on the P RI MOS operating system. I n this part I will detail the several useful applications you are likely to find on Prime computers. You will learn about the DSM (Distributed Sy stem M a n ag e m e n t) uti l i ti e s , the EDIT_PROFILE utility (the P RI MOS user editor), and several others. This will enable you to make the most of any Prime comput­ er you happen to visit. Examples appear in italics. Bold italics indicate user input, regular italics indicate computer output. EDIT PROFILE EDIT_PROFILEis the utility that is used to add, delete, and modify users on a Prime computer running PRI MOS. It is similar to the VAXIVMS AUTHORIZE utility . There are three m odes of E D I T_P RO F I LE access, and these are: System Initialization (SI) mode System Administrator (SA) mode Project Administrator (PA) mode Y o u w i l l p robably never be u s i n g E D IT_P ROFI LE in Syste m I nitializati on mode as that mode is used for initial sys­ tem user setup. SA mode will allow you to perform who lesale u s e r modification s , whereas P A mode will only allow you to perform modifications to users in the same project as you. When you decided to try out E DIT_PROF I LE on the system that you have hacked into, type this: OK, edit_profile If it g ives you an error message then you obviously don't have good enough priv­ ileges. Don't give u p hope, however, as there are ways around this. Unfortunately, though, the methods which you m ust use are beyond the scope of this tutorial . It involves programming in a high level lan­ guage (FORTRAN IV, FORTRAN-77, PU1 Subset G, et. aL) as well as knowledge of the appropriate system calls to make. Do lots of research and experiment. You might just get lucky. If, on the other hand, it allows you to invoke EDIT_PROFI LE then it will display the utility's herald (revision number, serial number, and copyright information) and a MORE HACKING message stating what mode you are i n . The mode message will b e one o f these : In system administrator mode In project administrator mode If you are in SA mode then the account you are using has SYS1 privileges (that's the best you can do from a remote stand­ point) . Before I get deep in how to use EDIT_PROFILE properly I should mention that I have the source code to this wonder­ fully useful program and a security audit feature was added in during the last few years (circa 1 986). It will log all successful and failed commands. The only way I have discovered around this is to remove the logg i n g procedures from the code and reco m p i l e it o n l i n e , but that' s p retty advanced stuff and not advised at any rate. The best you can do at maintaining your presence o n the sy stem is not to u se EDIT_PROFILE overly much. I n fact, don't use it unless you m u st. I generally use EDIT_PROFILE once per hack, and that is after I get in. What do I do? I obtain a full u s e r/project l i sti n g for future hacking purposes. You can't obtain an account's password from within EDIT_PROFILE, but you can obtain a full user and project list­ ing, as well as add , modify, and delete u sers. If you get a user list, try and hack at "One user is easier to hide than three or more. " those accounts before wantonly adding u ser accounts. Be sensible. Get all that you can before adding a user. And if you must add a user, just add one. There is no need to add three or four users. No need at all . One user is easier to hide than three or more. U se common sense here, guys. Page 14 2600 Magazine Winter 1989-90
  • 15. O N PRIM O S Once E D I T_ P RO F I L E has been invoked you will be dispatched mercilessly to the ">" prompt. To obtain help, just type HELP and press RETURN. Before I get into adding users, I'll discuss the procedures for pulling user lists and similar information. To get full information about the system you are on (projects, users, etc) you simply need to type: >lisLsystem -sll You can abbreviate the LIST_SYSTEM command with LS. You can list individual system attributes by substituting new argu­ ments in place of the -ALL argument. To see what LS arguments are available, type H E LP . You should ex peri ment with the avai lable " L I ST " c o m m a n d s i n EDIT_PROFILE. Before attempting to add a user on any Prime system you should always list the sy stem attributes so that you will know what projects and groups are in use. When you decide to add a super-user, make sure that you add yourself to the common pro­ ject (usually DE FAULT) and all of the high­ access groups (examples I have seen are: . A D M I N ISTRATORS$, . P ROJ E CT_AD­ M I N I STRATO RS$ , . O P E RATO R S $ , . N ET_MGT$, etc.). Adding super-users i s not always a good idea. Never add more than 1 or 2 users on a system. Also, try to follow the naming conventions used on the system. If users have their first name as a User ID, then when you add a user make sure that your new user's User I D is a first name. Likewise, if all users have their ini­ tials as their User I D then make sure that your new user has a User ID with initials. Now, to add a u ser, type: >sdd_user usernsme Where "username" is the U ser I D you wish to use. After you type this you will be asked for your password. Enter the pass­ word that you wish to use. Then you will be asked for your g roup(s) and your default login project. Like I said , you should use the " L I ST_" co m m a n d s to see what group(s) are i n use. Groups always start with a period (.). Give yourself the adminis­ trator groups and you will be doing good. As for project, an entry of DEFAULT will u sually suffice. An easier method to add users is to use the -LIKE argument. Try this: >sdd_user username -like system Again, "username" is the name of the U ser ID that you wish to use. This argu­ ment of the A D D_U S E R com mand will make a copy of the user called SYSTEM (found on all Primes that I have seen; also a user of the super-user class) and add the copy as a new u ser but with a different name. Now, set your password with the CHANGE_USER command. Type : >change_user usernsme -pw You will be prompted for your new pass­ word. Ta da. You now have a User ID with the same stats as the User ID "SYSTEM". Occasionally upon adding a user you may have to add your User I D to a file called LOGUFD located in one of the UFD's off of MFD O. This will generally not happen. If it does, then simply correct it with one of your other accounts. You are advised not to wantonly delete users or edit them. Also try not to u se the CHANG E_SYSTEM _AD M I N I STRATOR command. Basically, type H ELP and start to experiment (but be careful of what you do). Make sure that you keep track of the changes that you make so that in case you mess something up you can fix it. Get your feet wet. If you find yourself in PA mode you can do most of the above, but only regarding the project that you are admi n i strating . Thus you can only add users to that pro­ ject, only delete u sers from that project, etc. This means no adding of super-users, etc. The Distributed System Management (DSM) Utilities The DSM utilities is a set of commands and services that help with the administra­ tion and day-to-day operatio n of Prime computer systems. It is intended primarily for use with networked systems, but can also be u sed on single Pri m e syste m s (those lacking networking capability). The DSM u t i l i ties a l l ow Prime system administrators and senior operators to per­ form system management tasks from any point on a network. DSM's main facilities Winter 1989-90 2600 Magazine Page 15
  • 16. are summarized below. S I M (System Information/Meteri ng) Commands System status and resource monitoring of local and remote systems from any point within the network. RESUS (REmote System USer) Facility Control of remote Prime systems from any terminal. Allows use of console-only com­ mands from a remote terminal. Collection and collation of event mes­ sages, including PRIMOS and network eve n t s , through D S M ' s U n s o l ici ted Message Handling (UMH) and logging ser­ vices, with redirection of event messages to log files or users throughout the network. Generalized logging of DSM messages in private or system logs, with commands for administering, displaying and printing logs. Facilities for defining users' access to DSM commands throughout the network, in a single configuration file. As you can see, the DSM utilities can be a very u seful asset to have . Unfortunately, SYS1 privileges (administra­ tor) are required to use the most exciting aspects of the DSM utilities. All normal users can utilize the SIM commands, and I have even mentioned some of them i n other parts o f this series. What is really useful to us, however, are the RESUS and log utilities. In a nutshell here are the basic DSM commands. After this list will be full discourses on the RESUS utility and the SIM commands. Remote System Control: R ESUS - I nvokes P r i m e ' s R E mote System USer facility. Event M essage Handling and Redirection: CON FIG_UM confi g u re s DSM Unsolicited Message Handling. Administering Logs: ADMIN LOG - creates and administers DSM 109 files. Displaying and Printing Logs: DISPLAY_LOG - displays and prints the contents of log files, including system and network event logs. DSM Configurator Commands: CONFIG DSM - creates a new DSM con­ figuration - file. MORE DlSTRIBUTE_DSM - distributes a new DSM configuration file. STATUS_DSM - displays the currently active configuration. DSM Startup and Shutdown Commands : START_DSM - starts DSM system con­ sole commands. STOP_DSM - stops DSM system console commands. For more information on any of the DSM commands, type: HELP command-name or command-name -HELP The RESUS Utility RESUS is the REmote System U Ser facility, and allows remote operation of the physical supervisor console from any termi­ nal. What this basically means is that, with RESUS enabled, all users with administra­ tor access will be able to execute com­ mands that are normally only executable from the system console. It will let you force other users off the system (not a good idea to use this capability unless you MUST), take the sy stem down (you m u s t be STU PID to do such a thing), etc. RESUS s u p p o rts the fol low i n g co m m an d l i n e options: -ENABLE -DISABLE [-FORCE] -START [-ON node name] -STOP -STATUS [-ON node group] -HELP [-NO_WAIT] -USAGE -ENABLE This option enables RESUS to be used o n a s y s te m . I t i s o n l y valid from the supervisor terminal. -DISABLE This option is used to prevent RESUS from being used on a system on which it has previously been -E NABLEd. The - FORC E option must be supplied if the RESUS is actually in use. It is only valid from the supervisor terminal. -START [-ON node name] This is the means by which an autho­ rized user of RESUS may invoke REmote System USer facilities on a system. If -ON Page 16 2600 Magazine Winter 1989-90
  • 17. PRIME HACKING node name i s omitted, the default is the local node. For this command to be suc­ cessful, RESUS must previously have been -ENABLEd at the supervisor terminal. -STOP This option terminates remote control of the su pervi s o r term i n al , leaving the REmote System USer facilities available for use by other authorized u sers . It is only valid from the remote terminal in control of the supervisor terminal through RESUS. -STATUS [-ON nodegroup] This displays the current stat u s o f RESUS o n all nodes in a specified node group. If a node group is not specified, the status of the local node is displayed. -HELP, -H [-NO_WAIT, -NW] Displays command-specific Help text. -USAGE Displays command line syntax. The DSM SIM Commands The D S M S I M (Sy stem Information/Metering) commands gather and display information about system/net­ work status and resource usage from any point on the network. SI M commands are invoked from the P R I MOS com m a n d l i n e . They can be invoked from any terminal to display infor­ mation about any system on the network. They can be invoked once, or periodically at specified time intervals. Output displays are paginated for screen display and can be recorded in private or system log files. User access to SIM commands on local and remote nodes is controlled by DSM security. A list of S I M commands and descrip­ tions of the general SIM options follows. LIST ASSIGNED DEVICES - lists assigned devices - L1ST_ASYNC - lists asynchronous termi­ nals LIST COMM CONTROLLERS - lists comms contrOllers configuration LIST_CONFIG - lists PRIMOS coldstart configuration LIST_DISKS - lists disk partition names L1ST_LAN_NODES - lists nodes on LAN300 local networks LIST_MEMORY - lists physical memory usage L1ST_PRIMENET_NODES - lists PRI MENET configured nodes LIST PRIMENET LINKS - lists active PRI MENET links - L1ST_PRIM ENET_PORTS - lists assigned PRIMENET ports LIST_PROCESS - lists active system pro­ cesses LIST_SEMAPHORES - lists active semaphores LIST_SYNC - lists synchronous line config­ uration LIST_UNITS - lists users open file units L1ST_VCS - lists active virtual circuits General SIM options are: -HELP, -H [-NO_WAIT, -NW] -USAGE -ON {node, nodegroup} -PRIVATE_LOG, -PLOG pathname [- NTTY, -N] -SYSTEM_LOG, -SLOG path name [­ NTTY, -N) -NO WAIT, -NW -FR EQ integer -TIMES integer -START, -S date+time -STOP date+time . -ON {node, nodegroup} This option allows you to specify the tar­ get node, or nodegroup to which the com­ mand is to be directed. The default is to direct the command to the node on which the command is invoked. -PRIVATE_LOG, -PLOG pathname [ ­ NTIY, -N ) -SYSTEM_LOG, -SLOG pathname [ -NTTY, -N ] The -PRIVATE_LOG option allows you to specify a standard PRI MOS pathname as a DSM log file to which all messages from the target nodes are to be logged. If the log does not already exist, it is created automatically for you. User DSMASR (the DSM application server) must have ALL access to the directory that contains the log. The -SYSTEM_LOG option allows you a ·similar facility using logs that are main­ tained on the system logging directory DSM*>LOGS. System logs only exist on Winter 1989-90 2600 Magazine Page 1 7
  • 18. this directory or its subdirectories, and must be created with the ADMIN_LOG command prior to use. Logged d ata can s u b sequentl y be retrieved, printed and displayed using the DISPLAY LOG command. -NTTY, -N; can be used with the -PRI­ VATE_LOG and -SYSTE M_LOG options, and indicates that no data i s to be dis­ played to the user. When this option is used, the command spawns a phantom which executes the com mand on your behalf, and frees your terminal. -HELP, -H [NO_WAIT, -NW] This option overrides all other options to display help information about the associat­ ed command. -USAGE This option overrides all other options to display usage information, for the associat­ ed command. -NO WAIT, -NW This option indicates that you are not to be prompted or queried during the com­ mand output display. I f th i s option is n o t u s e d , y o u are prompted betwee n each target node ' s response, and after every 2 3 lines (1 page) of output displays "-More-" and waits for your response. To see more output press the carriage return. To suppress further output and return to command level, type Q, Quit, N , or No. Any other response will display more output. -FREQ -TIMES -START, -S -STOP These options can be u sed to imple­ ment periodic execution of a command. -FREQ option provides periodic execu­ tion of a c o m m an d , with the i n terval between executions determined i n sec­ onds. The interval you specify is the inter­ val between two successive executions of a com mand, and not the interval between completion of the command's display and the next execution. The interval is corrected to the n earest m ultiple of fou r seconds below that specified. If FREQ 0 is specified, the command is re-executed immediately on completion of the previous execution. If INFILTRATING the interval elapses before completion of the previous display, the next execution is delayed until the display is complete. -TIMES is used in association with the - FREQ option, to set a limit on the number of times that a command is to be executed. -START, -S sets the date and time that execution starts. The format can be in either ISO standard: (YY_MM_DD.HH:MM:SS) or in USA standard: (MM/DDIYY.HH:MM :SS) Defaults are: year to current year; date to current date; and time to zero. -STOP sets the date and time execution stops ; format and defaults are the same as for -START. I n the absence of any of these four options, the command is executed once, and immediately. I n the presence of any of these four options, the defaults applied to the ur.speci­ fied options are: -FREQ - Immediate reexecution -TIMES - infinite -START - now -STOP - never For more information on any of the SIM commands, type: HELP command-name or command-name -HELP PRIMOS Electronic Mail Capabilities PRIMOS, like any other operating sys­ tem worth its beans, supports full electronic mail capabilities. However, the mail system used will vary from system to system. A lack of standards? Perhaps. But I find it enjoyable learning the differences between the many mail systems available. I won't discuss how to use the mail sys­ tems due to lack of space, but that should pose no problem, as all of them have online help available. Prime Computer, I nc.'s old mail system (invoked by typing MAI L) is your typical run-of-the-mill mail system. It's not too diffi­ cult to figure out how to use. Prime Computer, Inc. has also created a P R I MOS im plementation of the U N I X XMAIL system. This seems to b e their pre- Page 18 2600 Magazine Winter 1989-90
  • 19. A P R I M E ferred electronic mail system. It i s very easy to use, not to mention very powerful. My favorite electronic mail server is N ETMAIL, written by those cunning pro­ grammers at Bramalea Software Systems (the same firm that created LOGI N_SEN­ TRY). NETMAIL is the mail server with the most useful features. Not only do you get the normal features of sending user-to-user mail locally and to similarly configured sites on the network, you can also send: Courtesy copies to other users Encapsulated non-SAM files Courtesy copies is basically message forwarding. Assume I wrote a memoran­ d u m . If I wanted all the people on the "Board of Trustees" to get a copy I just send cc's (courtesy copies) to them. The file encapsulation feature makes NETMAIL a pseudo-file transfer application l ike FTS (File Transfer Service, Prime's answer to UNIX's FTP utility). Say I wrote a useful public domain program and want to distribute it to some users on the local sys­ tem and some remote systems. Don't want them to get the sources, now do we? So we encapsulate the executable file (com­ piled program) and mail it out as an encap­ sulated file. When the receivers read their mail, they will be able to tell NETMAI L to save it as a file to their directory. Very nice! Some sites use custom-written mail utili­ ties. It all depends. Most, if not all, are rather user-friendly and easy to learn with­ out documentation. Don't forget! Online help files. ED - The PRIMOS Text Editor ED is the PRIMOS text editor and it is line-oriented as opposed to full-screen . If you are using VT-1 00 or a similar emula­ tio n , you m i g h t play around with the E MACS full-screen editor, but I won't be discussing EMACS here. After all, it comes with its own interactive tutorial . Another reason why I won't be discussing it is because not all Prime sites have it online (it is a separately priced product). RUNOFF is another separately priced product. It is a fully equipped word processor. ED, on the other hand, comes with PRI MOS and it is always available. To invoke the PRIMOS EDitor, type: ed at the "OK," prompt. T h i s w i l l e nter E D with an e m pty workspace. You are creating a new file. To edit an existing filesystem object, type: ed filename When y o u enter E D with an e m pty workspace you will be dumped into I NPUT mode. Everything you type here will be taken as input into the file you are creating. If you tell ED to load a file and edit it (i.e. , ED filename) then you will be dumped into EDIT mode. Everything you type will be taken as ED editing commands. To switch between I N PUT and EDIT "You are advised not to wantonly delete users or edit them. " mode, issue a null line (that is to say, press the RETURN key). This brings a new prob­ lem into mind. How do you make a blank line if when you press RETURN alone it switches between modes? Yes, this is a shortcoming for PRI MOS users who are used to standard text editing systems. To create a "null" line, type a space and then press RETURN. It looks nUll, but it is really treated as a line one character in length by ED. Take note that both INPUT mode and EDIT mode use no prompt. To illustrate what we have learned so far, consider this "pretend" session with the ED line editor. (Since this magazine is not an 80-column environment, we 'll use the H> H symbol at the beginning of lines that are actually part of the preceding line in an 80-column setting.) OK, eel INPUT Hey, this is pretty nice. A nice text (continued on page 34) Winter 1989-90 2600 Magazine Page 19
  • 20. b y M r . U p s e t t e r E v e ry d ay p e o p l e u s e t o u c h t o n e s t o s i g n a l b e t w e e n t h e i r p h o n e a n d t h e p h o n e co m p a n y's s w i tc h i n g e q u i p m e n t . W h at t h e ave rage m an o n t h e street does n't know i s t h at t h e re are f o u r oth e r t o u c h t o n e s t h at a r e n 't u s e d i n reg u lar telephone sig n a l i n g . As a l l g o o d phone experi m e nters know, a s i l v e r b o x i s a d e v i c e t h at c a n create t h e fo u r ext ra DTM F (d u a l ­ t o n e m u lti-freq u e n cy ) to n e s t h at are n ot used i n normal telepho n e s e rv i c e . T h e s e DT M F to n e s a r e k n o w n a s A , B , C , a n d D . I t i s q u ite easy to g e n erate t h e s e DTM F t o n e s b e c a u s e t h e s t a n d a rd 1 6 tone for m at i s used i n many popu­ l a r DT M F t o n e g e n e r a t o r I C ' s . T h i s a r t i c l e s h ow s two ways to modify telepho ne equ ipment o n the m a rket to m ake silver box ton es and t h e n g iv e s a s ch e m atic of a d e v i c e t h at w i l l p r o d u c e a l l 1 6 DTMF tones. M o d i f i c a t i o n f o r Te l e p h o n e s Yo u m ay not k n o w it , b u t y o u m i g ht a l ready o w n a s i l v e r box . T h at i s , t h e D T M F e n c o d e r I C inside yo u r touch to ne phone m ay be capable of prod ucing s i lver box to n e s . If yo u r p h o n e is a n e w e r touch t o n e a n d does not have fea­ tu res s u c h as call sto rage o r red i­ a l , t h e m o d p re s e n t ed h e re w i l l wo r k , i f i t h a s t h e r i g h t ch i p . T h e re a r e m a ny d iff erent ty pes of DTM F c h i ps , b ut t h i s mod ifica­ tion is for phones u s i n g the 1 6 pin TCM5087 to n e e n cod e r . This chip is specifically designed to g e n e r­ ate t h e e i g ht d iffe rent tones used HOW TO BUILD i n d u al tone telephon e dialing sys­ t e m s . S e e Fig u re s 1 a n d 2 for a list of t o n e s and associated fre­ q u e n c i e s . He r e ' s h o w t h e 5 0 8 7 wo rks. W h e n a key is pressed , it c o n n e c t s t w o p i n s o n t h e I C together. One is a row pin and one is a col u m n pi n . For i n stance, if a 6 i s p r e s s e d , t h e r o w 2 p i n i s con n ected t o t h e col u m n 3 p i n o n t h e 5 0 8 7 . T h i s causes a 770 Hz and 1477 Hz t o n e to be e m itted . For normal pho n e use, the col u m n 4 p i n , wh ich is u s e d to make t h e A, B , C, a n d D to nes is u n used . B ef o r e y o u st a rt t h i s s i m p l e m o d i f i c at i o n y o u m u s t h av e a p h o n e with a 5 0 8 7 c h i p . On t h e n ew t r i m l i n e s t y l e p h o n e s t h i s c h i p i s located i n t h e center of the l a rg e r p r i nted c i rcu it board (PCB) in the h an d s et . T h e chip s h o u l d h av e t h e n u m b e r s 5 0 8 7 o n t h e back along with some oth e r n u m­ b e r s , s o it w i l l r e a d s o m et h i n g l i k e " T 9 5 0 8 7 " o r " T C M 5 0 8 7" . Once you h ave ide ntif ied the chip, you m u st gain access to t h e sold e r s i d e o f the PCB. T h e fou r to n e s a re 8 n abled by i n s t a l l i n g t h r e e w i r e s a n d a switc h . F i rst , cut t h e t race on the PCB going f ro m pin 5 of the 5 087 to the keypad . Use a razo r blade o r a s m a l l f i l e . (On an I C the f i rst p i n is t h e o n e i n t h e l o w e r l e f t corner when you h o l d t h e c h i p s o t h e l e t t e r s a r e r i g h t s i d e u p . T h e re m ay also b e a d ot o n t h e c a s e above p i n 1 . ) N e x t , s o l d e r s e p a r a t e w i r e s t o p i n 5 , p i n 9 , a n d to co l u m n 3 of t h e k e y p ad . T h i s is the p o i n t o n the k e y p ad Page 20 2600 Magazine Winter 1989-90
  • 21. A SIL VER BOX that was co n n ected to p i n 5 of the I C before yo u cut t h e trace. See Fig u re 3 for t h e sch e m atic of t h e mod ificat i o n . O n a t r i m l i n e t y p e p h o n e it i s e a s i e st t o m ak e a l l co n n ectio ns t o t h e sold e r side of the PCB. Be s u re you h ave ide nti­ f i e d t h e p i n s on t h e IC correct l y before y o u start s o ld e r i n g . N o w , s o ld e r t h e w i re f ro m t h e keypad t o t h e m i d d l e t a b of an S P O T switch . S o ld e r t h e w i r e f ro m p i n 9 t o o n e s i d e o f t h e switch and t h e w i r e f ro m pi n 5 to t h e oth e r. T h e mod ification is n o w co m plete. Fo r n o r m a l O T M F to n e s t h e s w it c h sim ply con n ects t h e keypad t o pin 5, t h e co l u m n 3 p i n . Fo r s i l v e r b o x to n e s , t h e s w i t c h c o n n ects t h e prev i o u s ly u n used p i n 9, the co l u m n 4 p i n , to t h e keypad . The keys 3, 6, 9, and # now beco m e A, B , C, and 0 respective l y . B efore y o u p u t eve ryt h i ng back tog et h e r d o u b l e c heck y o u r work. Tog g l e the switch and m ake sure all t h e to n e s work. M ake s u re the w i r e s you i n st a l l ed d o n 't c a u s e a n y s h o rts. Lastly, f i n d a p l ace to securely i n stal l t h e switch . A n ot he r M o d i f i c a t i o n I f t h e above m o d w o n 't work o n a n y o f y o u r phones, you can do a s i m i lar mod o n a prod uct sold by R a d i o S h a c k . T h e i r " e c o n o m y pocket tone d i al e r" ($ 1 5 . 95 ) u s e s a 5 0 8 7 c h i p and c a n be co nverted fo r s i lver box tones. Th e mod ifi­ c at i o n u s e s t h r e e w i r e s a n d a switch , as befo re. Once co mpl et­ ed , yo u w i l l have a n ice po rtable 1 6 to n e OTM F g e n e rato r. The fi rst step of t h i s mod i s to rem ove the P C B . Caref u l ly pop off t h e back of t h e u n it a n d r e m ove t h e p o w e r s w i t c h a n d t h e s i x screws i n the PCB. Th e n d esolder t h e two s p e a k e r w i r e s a n d t h e batt e ry wires f rom t h e P C B . Yo u m ay also want to r e m ove t h e key­ pad and the keys. Now look at the keypad side of t h e P C B ( n ot the co m po n e n t s i d e ) . Cut t h e t race going from p i n 5 of t h e I C to co l­ u m n 3 of t h e keypad . This is the o u t e r m o s t o f t h e t h r e e t r a c e s g o i n g f ro m t h e I C t o t h e keypad. Now t h e switch m ust be i n stalled. Find a tinned rou nd pad m arked C3 in the upper left of t h e co m po n e nt side of the PCB and sold e r a w i re from h e re to t h e m id d l e tab of an S P OT switch. This switch m ust be a v e r y s m a l l t o g g l e o r s l i d e s w i t c h . A l s o o n t h e co m p o n e n t sid e , sold e r a wi re f ro m p i n 9 to one side of the switch and a wire f r o m p i n 5 t o t h e o t h e r . A s b e f o r e , b e s u r e t o i d e n t i f y t h e p i n s co r rectl y . Th e re i s roo m to i n stal l a switch inside the enc lo­ s u re i n t h e gap to the l eft of the d i o d e at th e top of th e PCB. As usual, ch eck for shorts cau sed by t h e w i r e s o r t h e s w i t c h . T h e s w i t c h w i l l o p e r at e e x a ct l y a s described in t h e previo u s modifi­ catio n . A l t e r n a t i v e 1 6 T o n e D T M F G e n e r a t o r I f y o u d o n ' t h a v e t h e r i g h t phone and don't want to spend $ 1 6 at Radio S h ack , you can build your own touch tone encode r using the sch e m atic i n Fig u re 4. This d evice is ve ry s i m i lar to the o n e s o l d by Radio S hack. It uses the TCM5089 OTM F e ncod er IC to produce all 1 6 Winter 1989-90 2600 Magazine Page 21
  • 22. ton e s . The 5089 is closely related to the 5087 i n both f u nction and p i n o u t . One i m portant d iff e r e n c e is that t h e 5087 prod uces a t o n e w h e n a row a n d col u m n p i n are c o n n e ct e d t o g e t h e r , w h i l e t h e 5089 p rod uces a to n e when a row and col u m n pin are conn ected to g r o u n d . As a r e s u lt , t h e 5 0 8 9 m u st b e used w ith a specific type of keypad , called a 2-of-8 keypad . Explanation of the sch e m atic is as fol lows : p ressing a key causes a row and col u m n pin to go low, thus prod ucing a DTMF tone at pin 1 6, t h e o utp ut. Th e IC req u i res a sine wave input s upplied by a TV c o l o r - b u rst c ry s t a l at 3 . 5 7 9 5 4 5 M H z (X1 ) t o g e n e rate e ig ht d iffe r­ e nt audio s i n uso idal freq u encies. The tone output f ro m pin 1 6 goes to a 32 ohm speaker, C2, C3, and R 1 . Varyi ng the values of C2, C3 , and R1 will change t h e volume and audio q u ality of the signal. If you use a speaker of h ig h e r and lower i m pedance, you should experiment wit h t h e values of C2, C3, and R 1 f o r t h e b e s t a u d i o v o l u m e a n d q u ality. T h e d evice is powered by 4.5V but t h e 5089 can handle u p to 1 2V. P a r t s L i s t a n d S u p p l i e r s C 1 - 2 2 u f , 1 6 V e l e c t r o l y t i c C 2 - 1 u f , 1 6 V e l e c t r o l y t i c C 3 - 2 . 2 u f , 1 6 V e l e c t r o l y t i c I C 1 - T C M 5 0 8 9 D T M F e n c o d e r R 1 - 6 8 o h m , 1 / 4 W X 1 - 3 . 5 7 9 5 4 5 M H z c o l o r­ b u r s t c r y s t a l O t h e r p a r t s : 2 - o f - 8 k e y p a d , s p e a k e r , b a t t e r i e s , b a t t e r y h o l d e r , e n c l o s u r e , p o w e r USING THOSE s w i t c h , c i r c u i t b o a r d , e t c . Th e TCM5089 is available fro m m a n y s o u r c e s . O n e i s J a m e c o E l e c t r o n i c s , 1 3 5 5 S h o r e w a y Ro ad , B e l m o nt , CA 94002. A 2- of-8 keypad is avai lable f ro m The E l e ct r o n i c G o l d m i n e , P . O . Box 540 8 , Scotts d a l e , AZ 8 5 2 6 1 . The c r y s t a l i s av a i l a b l e f ro m R a d i o S h ack o r Jam eco, a n d m any oth­ e rs . Total cost of e l ect ro n ic parts should be around $6-7. If you buy the keypad from The E lectro n ic Gold m i n e , the pinout is as fo l lo w s : 0 0 0 0 0 0 0 0 0 E F G H J K L M N These are the n i n e pi ns o n the back of the keypad . E : g rou nd, F: col u m n 4, G: co l u m n 3 , H: col u m n 2 , J : co l u m n 1 , K : r o w 4 , L : row 3, M : row 2 , N: row 1 . N o w W h a t ? Some of you may b e wondering w h at to d o with yo u r n ew toy . A s i lv e r box i s n 't a t o l l avo i d a nce device l i ke a blue o r red box ; it is anot h e r tool wit h w h ich to explo re the pho ne syste m . And that m eans you h ave to do the experimenting . Try beeping silver box to nes i nto voice m essage syst e m s , c e l l u l ar V M S , test exch ang es, loops, pay phones, 1 0NXX and 950 nu mbers, a n swering m ach i n e s , o r anywhere else you think the to nes shouldn't b e lo n g . S e e w h at h appe n s w h e n you d rop a s i l v e r b o x to n e o r two d o w n y o u r l o c a l e x c h a n g e o r t h ro u g h d i ff e r e n t l o n g d i sta n c e c a r r i e r s . If you e x p e r i m e n t sys­ t e m a t i c a l l y a n d k e e p g o o d record s , yo u w i l l s u re l y u ncov e r s o m et h i n g i nterest i n g . Page 22 2600 Magazine Winter 1989-90
  • 23. FOUR EXTRA TONES ! I ", i "J Q i .,. = i "' I " I I ": z � , '" 1: i " I I col ,,1: e N i N '" 1 '-' i ::! I 1 -[ I I I I - .. i ... . I I I - N ,.., .. = = = rlgurp 4. 1111,. s t h e rn n t l c h sl",lIIftr t o thp RediD Shar.k dellite 1 I 1 2 J,1 r e . Up [Ol I cnl 2 . e . C O L 3 COL 4 ·1.SU ROW 1 M ROW 2 ROW ] n olO 4 2 - 0 F - 8 G N O KEyrRD 6 �� " [ 2 �l ).1 f I 3 2 0 speaker 7' Winter 1989-90 ose 1 'N H. C=:J lONE . 6 OUT 2600 Magazine .., c " Page 23
  • 24. HeZp Needed Dear 2600: I am hoping you may be able to help me. I am in a position where several times people I do not know have tried to trick me into saying illegal things on the phone. I need a way to be able to tell their phone numbers as they call me. I have heard that there exists phones or boxes that can pick up the number calling you from a sig­ nal transmitted with any call and display it. Do you know where I could buy one, get one, or how I could build one? Concerned Syracuse, NY Yes, such boxes exist, but it will be some time before they can tell you the phone number ofANY call, that is, calls outside your local calling area. And it won't work at all if your local phone company isn't offering a caller-ID type ofser­ vice. Caller-ID is becoming a very controversial topic. Anonymity on the phone is something we all take for granted. Removing this would make using the phone a complete­ ly different experience, one that would probably be a whole lot less jim and a great deal more intimi­ dating. But then there are those who abuse the anonym ity feature. What do we do with them? In your case, you'd be wise not to remain on the line when these people call if indeed they are trying to trick you. If they continue to call, file a complaint with your phone compa­ ny. Nobody (including the phone w o r d s a n d company, law enforcement, or reg­ ular people) has the right to harass you on the phone if they're told to stop. If you're determined enough, they will be tracked down. Interesting Facts Dear 2600: The ANI 's for the 4 1 2 (Pittsburgh) area code are scat­ tered in the 4 1 0 exchange . We know of the following: 4 1 0-41 00: downtown Pittsburgh and suburban. 4 1 0-6633: east suburban. Also, US Sprint issues a com­ plete rundown of who called an 800 number. We got our 800 bill and surprisingly it showed every number that called us. The Renegade of Pittsburgh Sysop of Charlotte (412) 829-2767 The copy of the bill you sent us looks exactly like a regular Sprint bill, except the numbers on it are the numbers that called you. Something to think about. especial­ ly those ofyou who like to call 800 numbers. Look in our Spring 1 989 issue to find out which 800 exchanges are owned by Sprint. We'd like to know if the other com­ panies prov ide such detailed billing. By the way, Sprint's FONLine 800 serv ice isn 't a bad deal. There's currently no startup fee to obtain an 800 number and you can attach it to any existing phone number. Your 800 number w ill work all over the country and the monthly fee is only $ 1 0. The per call fee is rather steep, though. It averages about 22 cents a minute. Page 24 2600 Magazine Winter 1989-90
  • 25. c h a r a c t e r s But it·s one way to virtually guar­ antee not getting ripped off by an AOS somewhere. Of course. you can only dial one number. More Frequencies Dear 2600: In your Autumn 1 989 issue a reader pointed out the Mobile Telephone Assignments. The read­ er however left out an important set of frequencies which are used for phones on airplanes. These fre­ quencies usually have senators. congressmen. and other important business people calling home, set­ ting appointments . or talking about other things: 454 . 6 7 5 , 4 5 4 . 7 0 0 . 4 54 . 72 5 . 4 5 4 . 7 5 0 . 4 5 4 . 7 7 5 . 4 5 4 . 8 0 0 . 4 5 4 . 8 2 5 , 4 5 4 . 8 5 0 , 4 5 4 . 8 7 5 . 4 5 4 . 9 0 0 . 4 5 4 . 9 2 5 . 4 5 4 . 9 5 0 . 454.975. Please n o t e : " I t is a fed e ral crime with s evere punishment and/or fines to 1) divulge what you hear to anyone who is not a party to the broadcast; 2) to make use of any broadcast information for your own personal gain; 3) to make use of any broadcast information for illegal purposes or to commit a crime. Any such violations may be investigated by the FBI and prose­ cuted by the US Department of Justice." MM Rutherford. NJ We wonder if those same penal­ ties apply to anyone who over­ hears a conversation on a bus. It's basically the same thing. The only difference is that thepeople talking on the phone often aren't aware of how easy it is for others to listen in. The crime in that case is igno­ rance. often perpetuated by manu­ facturers who would rather their customers not know how non-pri­ vate their conversations really are. Still. this is better than the cellular fiasco. where Congress decided that the best (and only) protection would be to simply make listening in illegal. Who would be fool enough to listen to something ille­ gal in the privacy of their own home? Numbers Needed Dear 2600: I am writing to inquire as to whether any issue of your maga­ zine has information regarding access to long distance telephone calling card codes using AT&T or Sprint services without a comput­ er. I used to have a calling card number that worked and billed to someone else. but it is no longer valid. I don't have a computer, so I need some way of finding a valid card number that works . From what I 've read in one of your books. that isn't easy to do at ran­ dom because AT&T is difficult to hack without a computer. I've tried using my oid card and changing the last four digits, but it won't go through. If you have anything on this or know of a publication that does, please let me know. MC Van Nuys. CA What you want to do really has nothing to do w it h hacking or phreaking. There are lots of ways Winter 1989-90 2600 Magazine Page 25
  • 26. i n to make telephone calls. You dis­ cover t he m t hroug h individual experimentation. Using someone else's calling card is not the way to go. You v ictimize an innocent person and you also run a tremen­ dous risk oj getting caught. If you want to explore and manipulate the system, there's never been a better time. If you simply want to steal, you'll have to wait in line. BBS Question Dear 2600: What are the requirements for putting up a 2600 BBS? I have an Amiga and I want to put u p a board. What BBS program should I use? Greg New York As it stands right now, there are no 2600 boards. It was working out Jairly well Jor a while but then we Jound ourselves devoting more and more time to the boards when we should have been working on the magazine. We've got our priori­ ties and t hey center around the magazine itself. Anyone interested in running boards has our bless­ ings, and if they want to spread the word through 2600, we'll do w ha t we can. The o n ly b a s ic requirements we insist upon are user anonymity and private mail that cannot be read by system operators. Comments/ Suggestions Dear 2600: I had not intended to renew this time, since I've found very little of interest in the last few issues. In o t h e r w o r d s , particular, the articles about the command languages of several (common) o p e rating systems seemed no more than a reprint of what was easily available in users' manuals. I read those all day. Your Fall issue was superb, however, so I'd like to renew. Don't misunderstand. I do like the artic les on computers when they present something fresh. But, in general. I find the articles on the telephone system m u c h more interesting. And I especially like the information on threats to pri­ vacy (and would appreciate more about "practical" ways to counter­ act these threats). I do have one question. In many cases, the telephone information is a bit too advanced for me, as I am only a beginner. I would appreciate it if sometime you could publish a bibliography of above- and under­ ground information, from which I could learn the basics. As you may have most of this information already, which may otherwise be hard to find, maybe you could put it altogether into a ·primer" which you could offer for sale. In closing, again, thanks for the last issue, which was golden. He Phoenix It WAS a good issue, wasn't it? We were responding to our read­ ers' suggestions, which we never tire oj hearing. We need a continu­ ing flow oj more articles, however, in order to keep issues like that one coming. The project you suggest is one we ' ve had our eye on Jor some time. We've had our eye on others Page 26 2600 Magazine Winter 1989-90
  • 27. t h e l e t t e rs as well. Maybe something w ill materialize soon.... COCOT Hacking Dear 2600: A non Bell System lookalike payphone was recently installed outside in the parking lot of a con­ venience store across the street from my residence . The phone wires corning out of it are exposed and unprotected; you could proba­ bly splice into them leaving extra connections to hook up a conven­ tional telephone. No phone number is listed on it so I made a short long distance collect call to a friend. A choppy woman's digitized computer voice said, MThis is a public payphone. This is not a billable number." It repeated this about four or five times as the call was being initiat­ ed - even the person I phoned could hear it. I was then able to get the payphone's number from my friend's phone bill. I called the payphone and after two rings the same voice answered by just saying MThank you" fol­ lowed by a series of four touch­ ton e s (I assume) in rapid succession . There's about a 20 second pause. (I would guess the payphone owners enter a code from a touchtone phone on their end to d e te rmine how much money has been collected, etc. It would be fun to hang an FM trans­ mitter on the line and eventually get all the codes to activate its var­ ious information modes.) Without entering a chain of touchtones it recognizes, it simply hangs up. I then took my cordless phone over to it and dialed it up. The payphone produces a soft chirping sound instead of a ringing bell, and it's not loud at all. When you pick up the handset it simply says MOne moment please" four or five times but it simply will not con­ nect you through to the caller. As a general rule I avoid these pri­ vately owne d payphones and whenever possible go for genuine Bell. As an open suggestion, could a knowledgeable 2600 reader submit a s c h e matic for a d evi c e that would display a digital readout of a string of touch tones applied to its input? The NSA uses such devices in the ir surve illan c e work. Recently Modern Electronics had a device that would give an actual voice of the various touch tone dig­ its. Its construction was fairly sim­ ple . b u t the tones had to be entered very slowly - it couldn't tell you a rapid string like you'd get from an auto speed dialer or even from normal hand dialing. This d evice would be great for monitoring cellulars or the 46/49 Mhz cordless portaphones. And finally, one question: is it possible to call a 900 number from a payphone using a red box some­ where in this country? It doesn't work in my area. I enjoy your periodical a great deal (the phone articles are by far the best since access is universal). Keep up the good work! Akron. Ohio The COCOT (Customer Owned Coin Operated Telephone) you investigated is a very common one. Some others Jor our readers to Winter 1989-90 2600 Magazine Page 27
  • 28. play with are at 602-820- 1 430, 51 6-467-9183, and 214-286-3334. It may take a good ten rings for them to answer with the computer voice and it might be hard to keep curious humans from picking up when you call. 1hefour tones after the 'Thank you� sound suspicious­ ly like silver box tones (A, B, C, D) - we don't know what their pur­ pose is. ObViously, the phone then waitsfor you to enter the right dig­ its. Currently, we have no idea as to what the format is. Once we have that information, it'll be easi­ er to crack and we can see just what these phones can do. We encourage our readers to evaluate the different types ofpayphones in their areas, get their numbers, call them, experiment, etc. Let us know what youfmd. Regarding 900 numbers from payphones: generally it doesn't work, not even 900 -555- 1 2 1 2 which is a free call. But softwar� errors in the central office can make wonderful things happen. There was a time when quite a few payphones in New York City would call ANY 900 numberfree of charge. You may find this in your area if nobody 's caught it. You may find a COCOT that allows this. But don't expect it to last. Usually after the first bill rolls in, they fl[Jure out what's wrong pret­ ty quickly. If you are lucky enough to find one of these holes, you'll soon discover how boring most of these services are, even for free. And then you won't have to wony about falling for that crap in the future. It's too bad the general pop­ ulace can't share that realization. t h e 2 6 0 0 GTE Mysteries Dear 2600: I'm the kind of guy that likes to just try things for the hell of it (what's this button for??) . You know, to see what happens or just for the sake of knowing something new, even if it's "useless". Anyway, that's how I stumbled upon this little telephone episode. I live in the "south bay� region of Los Angeles and my phone com­ pany is the infamous GTE. Just recently, I had the "Smart Pack" features (call forward, call waiting, call conferencing, and speed call­ ing) added to my service. Anyway, I dialed my own number, for what­ ever reason, and much to my sur­ prise, I did not get a busy signal. What I got instead were four short beeps (sounding just like "conver­ sation being recorded" beeps) spaced apart about a half second each. Then I'm disconnected and just dead silence. I waited a few seconds, pushed assorted buttons, nothing. Then a nice steady tone like one would get calling a long distance 800 number. Not knowing why, how, or what to do, I just pushed more tones. Nothing. Then the nasty "line off the hook" tone comes blasting through, so I hung up. Are you familiar with an inci­ dent such as this? Is this related to the Smart Package? GTE? Freak of nature? Sorry I can't tell you what ESS is in use here. If you haven't already guessed , I am a novice at phone hacking. By the way, I love your publica- Page 28 2600 Magazine Winter 1989-90